Network Protection and Automation Guide (Electrical Power System)

1 comments

File : pdf, 11.2 MB, 452 pages

TOC
Introduction
Fundamentals of Protection Practice
Fundamental Theory
Fault Calculations
Equivalent Circuits and Parameters of Power System Plant
Current and Voltage Transformers
Relay Technology
Protection: Signalling and Intertripping
Overcurrent Protection for Phase and Earth Faults
Unit Protection of Feeders
Distance Protection
Distance Protection Schemes
Protection of Complex Transmission Circuits
Auto-Reclosing
Busbar Protection
Transformer and Transformer-Feeder Protection
Generator and Generator-Transformer Protection
Industrial and Commercial Power System Protection
A.C. Motor Protection
Protection of A.C. Electrified Railways
Relay Testing and Commissioning
Power System Measurements
Power Quality
Substation Control and Automation
Distribution System Automation
Appendix 1 Terminology
Appendix 2 ANSI/IEC Relay Symbols
Appendix 3 Application Tables

download       :       zip1 zip2 zip3 ch4.pdf app2 mirror


Electrical Exterior Facilities

1 comments

CHAPTER 1. INTRODUCTIONI-PRIMARY CONSIDERATIONS
II-SAFETY
III-AVOIDING PROBLEMS

CHAPTERS 2. INSPECTION AND TESTS
I-PERFORMANCE
II-REQUIREMENTS

CHAPTER 3. TRANSMISSION AND DISTRIBUTION SUBSTATIONS
I-GOVERNING CONSIDERATIONS
II-STRUCTURE MAINTENANCE
III-SUBSTATION YARDS
IV-INSULATORS
V-BUS STRUCTURES
VI-INSTRUMENT TRANSFORMERS
VII-BUSHINGS

CHAPTER 4. OVERHEAD DISTRIBUTION
I-ASSOCIATED OVERHEAD DISTRIBUTION GUIDANCE
II-DEFINING VOLTAGE NOMENCLATURE
III-TYPES OF MAINTENANCE
IV-WOOD POLES
V-CROSSARMS, BRACES, AND PLATFORMS
VI-MAINTENANCE WOOD PRESERVATION
VII-METAL POLES
VIII-CONCRETE POLES
IX-OVERHEAD OPEN WIRE CONDUCTORS
X-OVERHEAD CABLE
XI-CONDUCTOR CONNECTIONS
XII-POLE-LINE INSULATORS
XIII-GUYS
XIV-TREE TRIMMING
XV-LIVE-LINE MAINTENANCE
XVI-AERIAL LIFT REQUIREMENTS
Aerial lift construction
Aerial lift specificss

CHAPTER 5. UNDERGROUND AND SUBMARINE CABLES
I-ASSOCIATED GUIDANCE
II-SAFETY PRECAUTIONS
III-INSPECTION
IV-MAINTENANCE AND REPAIR OF DUCT SYSTEMS
V-CABLE FAULTS AND FAULT LOCATIONS
VI-CABLE REPAIR
VII-CABLE TESTING
IX-UNDERGROUND CORROSION CONTROL

CHAPTER 6. OUTDOOR LIGHTING
I-LIGHTING AND CIRCUIT TYPES
II-MULTIPLE TYPE LIGHTING
III-LIGHT DISTRIBUTION
IV-SERIES TYPE AIRFIELD LIGHTING
 More...............
Download : pdf1

Cavitation and bubble dynamics:

4 comments

CHAPTER 1.
PHASE CHANGE, NUCLEATION, AND
CAVITATION
1.1 Introduction
1.2 The Liquid State
1.3 Fluidity and Elasticity
1.4 Illustration of Tensile Strength
1.5 Cavitation and Boiling
1.6 Types of Nucleation
1.7 Homogeneous Nucleation Theory
1.8 Comparison with Experiments
1.9 Experiments on Tensile Strength
1.10 Heterogeneous Nucleation
1.11 Nucleation Site Populations
1.12 Effect of Contaminant Gas
1.13 Nucleation in Flowing Liquids
1.14 Viscous Effects in Cavitation Inception
1.15 Cavitation Inception Measurements
1.16 Cavitation Inception Data
1.17 Scaling of Cavitation Inception
References
CHAPTER 2. SPHERICAL BUBBLE DYNAMICS
2.1 Introduction
2.2 Rayleigh-Plesset Equation
Contents – Cavitation and Bubble Dynamics
2.3 Bubble Contents
2.4 In the Absence of Thermal Effects
2.5 Stability of Vapor/Gas Bubbles
2.6 Growth by Mass Diffusion
2.7 Thermal Effects on Growth
2.8 Thermally Controlled Growth
2.9 Nonequilibrium Effects
2.10 Convective Effects
2.11 Surface Roughening Effects
2.12 Nonspherical Perturbations
References
CHAPTER 3. CAVITATION BUBBLE COLLAPSE


3.1 Introduction
3.2 Bubble Collapse
3.3 Thermally Controlled Collapse
3.4 Thermal Effects in Bubble Collapse
3.5 Nonspherical Shape during Collapse
3.6 Cavitation Damage
3.7 Damage due to Cloud Collapse
3.8 Cavitation Noise
3.9 Cavitation Luminescence
References
CHAPTER 4. DYNAMICS OF OSCILLATING BUBBLES
4.1 Introduction
4.2 Bubble Natural Frequencies
4.3 Effective Polytropic Constant
4.4 Additional Damping Terms
4.5 Nonlinear Effects
4.6 Weakly Nonlinear Analysis
4.7 Chaotic Oscillations
Contents – Cavitation and Bubble Dynamics
4.8 Threshold for Transient Cavitation
4.9 Rectified Mass Diffusion
4.10 Bjerknes Forces
References
CHAPTER 5.


TRANSLATION OF BUBBLES
5.1 Introduction
5.2 High Re Flows around a Sphere
5.3 Low Re Flows around a Sphere
5.4 Marangoni Effects
5.5 Molecular Effects
5.6 Unsteady Particle Motions
5.7 Unsteady Potential Flow
5.8 Unsteady Stokes Flow
5.9 Growing or Collapsing Bubbles
5.10 Equation of Motion
5.11 Magnitude of Relative Motion
5.12 Deformation due to Translation
References
CHAPTER 6. HOMOGENEOUS BUBBLY FLOWS
6.1 Introduction
6.2 Sonic Speed
6.3 Sonic Speed with Change of Phase
6.4 Barotropic Relations
6.5 Nozzle Flows
6.6 Vapor/Liquid Nozzle Flow
6.7 Flows with Bubble Dynamics
6.8 Acoustics of Bubbly Mixtures
6.9 Shock Waves in Bubbly Flows
6.10 Spherical Bubble Cloud
References
Contents – Cavitation and Bubble Dynamics
CHAPTER 7. CAVITATING FLOWS
7.1 Introduction
7.2 Traveling Bubble Cavitation
7.3 Bubble/Flow Interactions
7.4 Experimental Observations
7.5 Large-Scale Cavitation Structures
7.6 Vortex Cavitation
7.7 Cloud Cavitation
7.8 Attached or Sheet Cavitation
7.9 Cavitating Foils
7.10 Cavity Closure
References


CHAPTER 8. FREE STREAMLINE FLOWS
8.1 Introduction
8.2 Cavity Closure Models
8.3 Cavity Detachment Models
8.4 Wall Effects and Choked Flows
8.5 Steady Planar Flows
8.6 Some Nonlinear Results
8.7 Linearized Methods
8.8 Flat Plate Hydrofoil
8.9 Cavitating Cascades
8.10 Three-Dimensional Flows
8.11 Numerical Methods
8.12 Unsteady Flows
Reference:



DOWNLOD : .PDF

Introduction to Data Communications

0 comments


Introduction to Data Communications


Introduction  
This book was written over a period of five years in my spare time while consulting at the Southern Alberta Institute of Technology (SAIT) for various academic departments. Some of the material is reprints of articles that I have written for the Linux Gazette.
When I started consulting in 1994, there were very few books that explored data communications for network computing. The books that I read on data communications only gave a partial view of the "big picture" and tended to assume that the reader had previous knowledge of networking and data communications.
I've tried to sort out the confusing issues in this book and to focus on only the topics of the "moment". I've been successful in the classroom with this approach and hope that you find it meaningful too. I find that most books on the Linux operating system do not cover the data communications aspects of networking. The purpose of this book is to fill this void and introduce the concepts of data communication with a slight leaning towards the Linux operating system.
2. Acknowledgements
I would like to thank my wife, Susan, for putting up with my obsessive behaviour while I was writing the original course material. Without her in my life, this book would never had been started. I would especially like to thank Harold Sylven for the support and faith that he has had in me.
I would also like to thank Michael Wilson for his hard work and dedication to the first Area Network Technical Analyst program and who never received the credit that he deserved. I would like to thank Doug Spurgeon who has been my "partner in crime" at SAIT and who I have relied on extensively for his support in Windows NT and Novell Netware.
Lastly but not least, I would like to thank my parents for supporting and guiding me throughout my life.

Introduction to Data Communications
 Previous Table of Contents Next  

IBM Power 520 and Power 550 (POWER6) System Builder

0 comments

IBM Power 520 and Power 550 (POWER6) System Builder

Redbooks logo An IBM Redbooks publication

Abstract

In 2008, the IBM® System i® and IBM System p® platforms unified the value of their servers into a single, powerful lineup of servers based on industry-leading POWER6™ processor technology with support for the IBM AIX® , IBM i (formerly known as i5/OS® ), and Linux® operating systems. This new, single portfolio of IBM Power Systems™ servers offers industry-leading technology, continued IBM innovation, and the flexibility to deploy the operating system that your business requires—all in the small and medium business environment.
The Power 570 and Power 595 models announced in April 2008 were announced as fully converged and unified at that time. The Power 520 and Power 550 models announced in January 2008 and the announcements in April 2008 brought these models very close to complete convergence. The October 2008 announcements, together with system firmware made available in November 2008, brought full unification for the Power 520 and Power 550 systems.
This IBM Redbooks® publication covers the POWER6 520 and 550 unified models 8203-E4A and 8204-E8A as of May 2009. It is intended for professionals who want to acquire a better understanding of IBM Power Systems products, including:
- Clients
- Sales and marketing professionals
- Technical support professionals
- IBM Business Partners
This book provides a large set of features, including hardware-focused processor, memory, and I/O support feature descriptions supported by the POWER6 Power 520 and Power 550 servers consolidated into a single document.

Table of contents

Chapter 1. Introduction to the IBM Power 520 and Power 550 servers
Chapter 2. IBM Power 520 (MTM 8203-E4A)
Chapter 3. IBM Power 550 (MTM 8204-E8A)
Chapter 4. Adapter feature descriptions and related information
Chapter 5. EXP24 Disk Enclosures
Chapter 6. EXP 12S SAS Disk Enclosure
Chapter 7. PCIe 12X I/O Drawer (#5802)
Chapter 8. Integrated Virtual Ethernet
Chapter 9. Feature Code to CCIN cross-reference
Chapter 10. IBM System i schematics for supported expansion units and towers
Chapter 11. Tape and optical storage attachment summary
Chapter 12. RIO-2, 12X, SPCN, line cord, SAS, and communication cables for Power 520 and Power 550 systems
Appendix A. IBM AIX operating system and release level summary
Appendix B. IBM i operating system and licensed program release level summary
Appendix C. RAID history and definitions summary
Appendix D. Solid state disk (SSD) drives
Appendix E. Upgrades to Power 520 and 550
Appendix F. PowerVM and Management Edition for AIX
Appendix G. IBM i user license entitlement summary
Appendix H. IBM I/O adapters that require an IOP summary
Appendix I. Processor feature numbers, system performance, and IBM i QPRCFEAT system value
Appendix J. POWER6 reliability, availability, and serviceability summary

IBM PowerVM Live Partition Mobility:

0 comments

IBM PowerVM Live Partition Mobility

Redbooks logo An IBM Redbooks publication

Abstract

Live Partition Mobility is the next step in the IBMs Power Systems™ virtualization continuum. It can be combined with other virtualization technologies, such as logical partitions, Live Workload Partitions, and the SAN Volume Controller, to provide a fully virtualized computing platform that offers the degree of system and infrastructure flexibility required by today's production data centers.
This IBM® Redbooks® publication discusses how Live Partition Mobility can help technical professionals, enterprise architects, and system administrators:
* Migrate entire running AIX® and Linux® partitions and hosted applications from one physical server to another without disrupting services and loads.
* Meet stringent service-level agreements.
* Rebalance loads across systems quickly, with support for multiple concurrent migrations.
* Use a migration wizard for single partition migrations.
This book can help you understand, plan, prepare, and perform partition migration on IBM Power Systems POWER6™ technology-based servers that are running AIX.

Table of contents

Chapter 1. Overview
Chapter 2. Live Partition Mobility mechanisms
Chapter 3. Requirements and preparation
Chapter 4. Basic partition migration scenario
Chapter 5. Advanced topics
Chapter 6. Migration status
Chapter 7. Integrated Virtualization Manager for Live Partition Mobility
Appendix A. Error codes and logs


PowerVM Virtualization on IBM System p: Introduction and Configuration Fourth Edition

0 comments

PowerVM Virtualization on IBM System p: Introduction and Configuration Fourth Edition

Redbooks logo An IBM Redbooks publication

Abstract

This IBM® Redbooks® publication provides an introduction to PowerVM™ virtualization technologies on IBM System p™ servers. The Advanced POWER™ Virtualization features and partitioning and virtualization capabilities of IBM Systems based on the Power Architecture® have been renamed to PowerVM.
PowerVM is a combination of hardware, firmware and software that provides CPU, network and disk virtualization. The main virtualization technologies are:
-- POWER6™ and POWER5™ hardware
-- POWER Hypervisor™
-- Virtual I/O Server
Though the PowerVM brand includes partitioning, software Linux® emulation, management software, and other offerings, this publication focuses on the virtualization technologies that are part of the PowerVM Standard and Enterprise Editions.
This publication is also designed to be an introduction guide for system administrators, providing instructions for:
-- Configuration and creation of partitions and resources on the HMC
-- Installation and configuration of the Virtual I/O Server
-- Creation and installation of virtualized partitions
While discussion is focused on IBM System p hardware and AIX® , the basic concepts can be extended to the i5/OS® and Linux operating systems as well as the IBM System i™ hardware.
This edition has been updated with the new features available with the IBM POWER6 hardware and firmware.
Keep in mind that this is Volume 1 of a two volume set. The IBM PowerVM Virtualization Managing and Monitoring Redbook SG24-7590 picks up where this one leaves off with operational considerations for long term sustainable enterprise virtualization solution. Find it here:
http://www.redbooks.ibm.com/abstracts/sg247590.html?
Open

 

Table of contents

Chapter 1. Introduction
Chapter 2. Virtualization technologies on System p servers
Chapter 3. Setting up virtualization: the basics
Chapter 4. Advanced virtualization configurations

Introduction to Storage Area Networks

0 comments

Introduction to Storage Area Networks

Redbooks logo An IBM Redbooks publication


Abstract

The explosion of data created by the businesses of today is making storage a strategic investment priority for companies of all sizes. As storage takes precedence, three major initiatives have emerged:
- Infrastructure simplification: Consolidation, virtualization, and automated management with IBM TotalStorage can help simplify the infrastructure and ensure an organization meets its business goals.
- Information lifecycle management: Managing business data through its life cycle from conception until disposal in a manner that optimizes storage and access at the lowest cost.
- Business continuity: Maintaining access to data at all times, protecting critical business assets, and aligning recovery costs based on business risk and information value.
Storage is no longer an afterthought. Too much is at stake. Companies are searching for more ways to efficiently manage expanding volumes of data, and to make that data accessible throughout the enterprise; this is propelling the move of storage into the network. Also, the increasing complexity of managing large numbers of storage devices and vast amounts of data is driving greater business value into software and services.
With current estimates of data to be managed and made available increasing at 60 percent per annum, this is where a storage area network (SAN) enters the arena. Simply put, SANs are the leading storage infrastructure for the global economy of today. SANs offer simplified storage management, scalability, flexibility, availability, and improved data access, movement, and backup.
This IBM Redbook gives an introduction to the SAN. It illustrates where SANs are today, who are the main industry organizations and standard bodies active in the SAN world, and it positions IBM's comprehensive, best-of-breed approach of enabling SANs with its products and services. It introduces some of the most commonly encountered terminology and features present in a SAN.

Table of contents

Chapter 1. Introduction
Chapter 2. How, and why, can we use a SAN?
Chapter 3. Fibre Channel internals
Chapter 4. Topologies and other fabric services
Chapter 5. IP storage networking
Chapter 6. Fibre Channel products and technology
Chapter 7. Management
Chapter 8. Security
Chapter 9. The IBM product portfolio
Chapter 10. Solutions
Appendix A. SAN standards and organizations

Understanding LDAP - Design and Implementation

0 comments

Understanding LDAP - Design and Implementation

Redbooks logo An IBM Redbooks publication

Abstract

The implementation and exploitation of centralized, corporate-wide directories are among the top priority projects in most organizations. The need for a centralized directory emerges as organizations realize the overhead and cost involved in managing the many distributed micro and macro directories introduced in the past decade with decentralized client/server applications and network operating systems.
Directories are key for successful IT operation and e-business application deployments in medium and large environments. IBM understands this requirement and supports it by providing directory implementations based on industry standards at no additional cost on all its major platforms and even important non-IBM platforms. The IBM Directory Server implements the Lightweight Directory Access Protocol (LDAP) standard that has emerged quickly in the past years as a result of the demand for such a standard.
This IBM Redbook will help you create a foundation of LDAP skills, as well as install and configure the IBM Directory Server. It is targeted at security architects and specialists who need to know the concepts and the detailed instructions for a successful LDAP implementation.

Table of contents

Part 1. Directories and LDAP
Chapter 1. Introduction to LDAP
Chapter 2. LDAP concepts and architecture
Chapter 3. Planning your directory
Part 2. IBM Tivoli Directory Server overview and installation
Chapter 4. IBM Tivoli Directory Server overview
Chapter 5. ITDS installation and basic configuration - Windows
Chapter 6. ITDS installation and basic configuration - AIX
Chapter 7. ITDS installation and basic configuration on Intel Linux
Chapter 8. IBM Tivoli Directory Server installation - IBM zSeries
Part 3. In-depth configuration and tuning
Chapter 9. IBM Tivoli Directory Server Distributed Administration
Chapter 10. Client tools
Chapter 11. Schema management
Chapter 12. Group and role management
Chapter 13. Replication
Chapter 14. Access control
Chapter 15. Securing the directory
Chapter 16. Performance tuning
Chapter 17. Monitoring IBM Tivoli Directory Server
Part 4. Developing directory-enabled applications
Chapter 18. Debugging IBM Tivoli Directory Server related issues
Chapter 19. Developing C-based applications
Chapter 20. Developing JNDI-based applications
Part 5. Appendixes
Appendix A. DSML Version 2
Appendix B. Directory Integration - IBM Tivoli Directory Integrator
Appendix C. Moving RACF users to TBDM
Appendix D. Schema changes that are not allowed

TCP/IP Tutorial and Technical Overview

0 comments

 TCP/IP Tutorial and Technical Overview

Redbooks logo An IBM Redbooks publication

Abstract

With continual advances in hardware and TCP/IP networking capabilities, this very popular book deserves an update.
The TCP/IP protocol suite has become the de facto standard for computer communications in today's networked world.
The ubiquitous implementation of a specific networking standard has led to an incredible dependence on the applications enabled by it. Today, we use the TCP/IP protocols and the Internet not only for entertainment and information, but to conduct our business by performing transactions, buying and selling products, and delivering services to customers. We are continually extending the set of applications that leverage TCP/IP, thereby driving the need for further infrastructure support.
It is our hope that both the novice and the expert will find useful information in this publication.

Table of contents

Part 1. Core TCP/IP protocols
Chapter 1. Architecture, history, standards, and trends
Chapter 2. Network interfaces
Chapter 3. Internetworking protocols
Chapter 4. Transport layer protocols
Chapter 5. Routing protocols
Chapter 6. IP multicast
Chapter 7. Mobile IP
Chapter 8. Quality of service
Chapter 9. IP version 6
Chapter 10. Wireless IP

Part 2. TCP/IP application protocols
Chapter 11. Application structure and programming interfaces
Chapter 12. Directory and naming protocols
Chapter 13. Remote execution and distributed computing
Chapter 14. File-related protocols
Chapter 15. Mail applications
Chapter 16. The Web
Chapter 17. Network management
Chapter 18. Wireless Application Protocol
Chapter 19. Presence over IP

Part 3. Advanced concepts and new technologies
Chapter 20. Voice over Internet Protocol
Chapter 21. Internet Protocol Television
Chapter 22. TCP/IP security
Chapter 23. Port based network access control
Chapter 24. Availability, scalability, and load balancing
Appendix A. Multiprotocol Label Switching

Introduction to Networking Technologies

0 comments

Introduction to Networking Technologies

Redbooks logo An IBM Redbooks publication


Abstract

There are many different computing and networking technologies -- some
available today, some just now emerging, some well-proven, some quite
experimental. Understanding the computing dilemma more completely
involves recognizing technologies; especially since a single
technology by itself seldom suffices, and instead, multiple
technologies are usually necessary.
This document describes a sampling of technologies of various types,
by using a tutorial approach. It compares the technologies available
in the three major technology areas: application support, transport
networks, and subnetworking. In addition, the applicability of these
technologies within a particular situation is illustrated using a set
of typical customer situations.
This document can be used by consultants and system designers to
better understand, from a business and technical perspective, the
options available to solve customers' networking problems.

Table of contents

Not available.

Others who downloaded this publication also downloaded

TCP/IP Tutorial and Technical Overview:

Abstract

With continual advances in hardware and TCP/IP networking capabilities, this very popular book deserves an update.
The TCP/IP protocol suite has become the de facto standard for computer communications in today's networked world.
The ubiquitous implementation of a specific networking standard has led to an incredible dependence on the applications enabled by it. Today, we use the TCP/IP protocols and the Internet not only for entertainment and information, but to conduct our business by performing transactions, buying and selling products, and delivering services to customers. We are continually extending the set of applications that leverage TCP/IP, thereby driving the need for further infrastructure support.
It is our hope that both the novice and the expert will find useful information in this publication.

Table of contents

Part 1. Core TCP/IP protocols
Chapter 1. Architecture, history, standards, and trends
Chapter 2. Network interfaces
Chapter 3. Internetworking protocols
Chapter 4. Transport layer protocols
Chapter 5. Routing protocols
Chapter 6. IP multicast
Chapter 7. Mobile IP
Chapter 8. Quality of service
Chapter 9. IP version 6
Chapter 10. Wireless IP

Part 2. TCP/IP application protocols
Chapter 11. Application structure and programming interfaces
Chapter 12. Directory and naming protocols
Chapter 13. Remote execution and distributed computing
Chapter 14. File-related protocols
Chapter 15. Mail applications
Chapter 16. The Web
Chapter 17. Network management
Chapter 18. Wireless Application Protocol
Chapter 19. Presence over IP

Part 3. Advanced concepts and new technologies
Chapter 20. Voice over Internet Protocol
Chapter 21. Internet Protocol Television
Chapter 22. TCP/IP security
Chapter 23. Port based network access control
Chapter 24. Availability, scalability, and load balancing
Appendix A. Multiprotocol Label Switching:

 

Free Download Engineering Books - IEEE Books | Copyright 2009-2013 All right reserved | Design by BMW Automobiles | Created by Umair Sheikh