wireless power theft monitoring

21
WIRELESS POWER THEFT MONITORING SUBMITTED TO: MR.RANJAN .K. JENA MR.ABHIMANYU MOHAPATR DEPARTMENT OF ELECTRICAL ENGINEER SUBMITTED BY: RUPALI PATRA 0901106017 7 TH SEM,EE

Upload: biswajit-p

Post on 04-Nov-2014

65 views

Category:

Documents


3 download

DESCRIPTION

 

TRANSCRIPT

  • 1. WIRELESS POWER THEFT MONITORINGSUBMITTED TO:SUBMITTED BY:MR.RANJAN .K. JENARUPALI PATRAMR.ABHIMANYU MOHAPATR09011060177TH SEM,EEDEPARTMENT OFELECTRICAL ENGINEER

2. CONTENTS:INTRODUCTIONi.POWER THEFT :DEFINITION ii.HOW IT OCCURS ? DIFFERENT WAYS OF MONITORING POWER THEFT MICROCONTROLLER BASED POWER THEFTMONITORINGi.PROPOSED ARCHITECTURE BLOCK DIAGRAM DESCRIPTIONWORKING OF WIRELESS SENSOR NETWORKADVANTAGESLIMITATIONSCONCLUSION 3. INTRODUCTION-POWER THEFT :DEFINITIONIt is the use of electrical power without acontract with a supplier with total or partialbypassing of the metering system or interferingwith this system in such a way so as toadulterate its measurements.Contractis understood here as a validobligation to deliver power and to pay for it. 4. HOW IT OCCURS? 1.SLOWING DOWN THE METER:A commonmethod of tamperingolder meters is to attach magnets tothe outside of the meter.When this happens, the rotor disc isexposed to a high magnetic field.Hence, the resultant opposingmagnetic field to the rotor is highlyincreased leading to slowing down ofrotor or perfect stopping of the discrotation.The electricity meter is thusmanipulated and ultimately power isconsumed without being paid for. ex-neodymium magnets. 5. 2.INVERTING THE METER/FEEDER: Another common form of electricity theft isto invert the meter (pull the meter out of thesocket and plug the meter back in upsidedown, which causes the meter to runbackwards and the kWh register to countdown instead of up). 6. 3.BYPASSING THE FEEDER/METER: Usually, the bypass supplies power to large and stable loads which will not trip fuses in the case of overloads. Ex-jumper cables. The rest of the circuits are supplied normally through the meter, so the bill, which is close to average, does not suggest a theft. 7. DIFFERENT WAYS OF MONITORING POWERTHEFT:GSMbased power theftmonitoringMicrocontroller based power theftmonitoringPower theft monitoring usingPLC. 8. MICRO-CONTROLLER BASEDPOWER THEFT MONITORING:OVERVIEW:Thewhole system architecture is based onintegrating wireless network with existingelectrical grid.The proposed module also incorporatesdifferent data aggregation algorithms and effective solutions needed for the differentpathways of the electricity distribution system. 9. THE PROPOSED ARCHITECTURE:The Architecture Consists Of Four ModulesNamely:Controlling Station (CS) Wireless Transformer Sensor Node (WTSN)Transmission Line Sensor Node (TLSN)Wireless Consumer Sensor Node (WCSN) 10. ARCHITECTURE 11. WCSN is a module which acts as a consumerpower metering device that measures the powerconsumed by the consumer and send the dataperiodically to the WTSN.Each feeder of the transformer has a WTSNwhich monitors power through each line andcollects data from WCSN ,aggregates it and sendsto the CS.TLSN is another module associated withdistribution line, mounted in each distribution lineposts . 12. DIFFERENT PARTS AND THEIRFUNCTIONS: ZIGBEE: We are using XBee-PRO OEM RF Module whish uses the zigbee technology. Itis engineered to support the unique needs of low-cost, low-power and low data rate wireless sensor network providing reliable delivery of data between devices.ZIGBEE MODULE The XBee-PRO OEM RF Modules interface to a host device through a logic-level asynchronous serial port. 13. CURRENT TRANSFORMER CIRCUITRY: Weare using Allegro ACS709 current sensor IC chip. The ACS709consists of a Hall sensor integrated circuit (IC) with a copper conduction path located near the surface of the silicon die. Applied current flows through the copper conduction path, and the analog output voltage from the Hall sensor IC linearly tracks the magnetic field generated by the applied current. 14. MICROCONTROLLER:The LPC2148 microcontroller is based on a16-bit/32-bitARM7TDMI-S CPU with embedded high-speed flash memoryranging from 32 kB to 512 kB. A 128-bitwide memory interface architecture enable 32-bitcode execution at the maximum clock rate.Due to their tiny size and low power consumption, LPC2148is ideal for applications where miniaturization is a keyrequirement.Serial communication interfaces ranging from multipleUARTs, on-chip SRAM of 8 kB up to 40 kB, make thesedevices very well suited for communication gateways. 15. LCD:LCD stands for Liquid Crystal Display.Asthe output of the circuit should bedisplayed in some form or the other, LCDdisplay is selected as it can display 16characters at a time.It is also easy to interface with themicrocontroller without any decoder. So itis better than the seven segment display. 16. WORKING OF WIRELESSSENSOR NETWORK:Thesensor network monitors the electrical grid for a specifiedperiod of time, which may be daily, monthly or yearly. Thus the WTSN stores the maximum demand for each consumerincluding the losses.The measured data from each WCSN is send to the neighbouringTLSN.Theaggregated data is then sent to the next nearby WTSN. Thusthe data transfers from WCSN to the corresponding WTSN throughTLSN. The collected data is compared with the measured data by theenergy meter.Normally these two data are almost same. If there is any difference (dmc) in the collected data and themeasured data, there may be a line fault or a power theft in thatsegment. Large value of dmc indicates a line fault and small value of dmcindicate a power theft . 17. ADVANTAGES:Theproposed system provides the solution for someof the main problems faced by the existing Indiangrid system, such as wastage of energy, power theft,manual billing system, and transmission line fault. This method will reduce the energy wastage andsave a lot of energy for future use. We can detect the location from where the power isbeing stolen which was not possible before. Optimized use of energy. 18. LIMITATIONS:Onemajor disadvantage of this project is that it isnot capable of detecting the exact location fromwhere the power is being stolen giving only aapproximation to that place. Cannot determine who is stealing, but even noother existing system is capable of doing this. If implemented on a large scale it may take a lot oftime and manual input. 19. CONCLUSION:Thismethod reduces the heavy power and revenue lossesthat occur due to power theft by the customers. By this design it can be concluded that power theft can beeffectively curbed by detecting where the power theft occursand informing the authorities.Alsoan automatic circuit breaker may be integrated to theunit so as to remotely cut off the power supply to the house orconsumer who tries to indulge in power theft. The ability of the proposed system to inform or send datadigitally to a remote station using wireless radio link adds alarge amount of possibilities to the way the power supply iscontrolled by the electricity board.Thissystem will reduce the energy wastage and save a lotfor future use.