315COMMUNICATIONSTECHNOLOGYFUNDAMENTALSFORTHEDESIGNOFMODERNPROTECTIONANDCONTROLSYSTEMSWorkingGroupD2.16April2007COMMUNICATIONSTECHNOLOGYFUNDAMENTALSFORTHEDESIGNOFMODERNPROTECTIONANDCONTROLSYSTEMSWorkingGroupD2.16ActiveMembers:AndresCadenas(Convener)SpainCarlosSamitierSpainChrisQuirke(Secretary)IrelandDaveDolezilekUSAJohnFitchUnitedKingdomCorrespondingMembers:MasakazuKoaizawaJapanJosepMariaNadalSpainRodolfoPellizzoniArgentinaCuitlahuacPicassoMexicoCopyright©2007“OwnershipofaCIGREpublication,whetherinpaperformoronelectronicsupportonlyinfersrightofuseforpersonalpurposes.Areprohibited,exceptifexplicitlyagreedbyCIGRE,totalorpartialreproductionofthepublicationforuseotherthanpersonalandtransfertoathirdparty;hencecirculationonanyintranetorothercompanynetworkisforbidden”.Disclaimernotice“CIGREgivesnowarrantyorassuranceaboutthecontentsofthispublication,nordoesitacceptanyresponsibility,astotheaccuracyorexhaustivenessoftheinformation.Allimpliedwarrantiesandconditionsareexcludedtothemaximumextentpermittedbylaw”.n°ISBN:978-2-85873-005-6Page1of40TABLEOFCONTENTSRÉSUMÉ.................................................................................................................................................2KEYWORDS..........................................................................................................................................2FOREWORD..........................................................................................................................................21INTRODUCTION..........................................................................................................................31.1SASDEFINITION.......................................................................................................................31.2SASSTRUCTUREANDFUNDAMENTALS....................................................................................31.3SASDEVICE..............................................................................................................................41.4SASINTERFACES......................................................................................................................51.5SASFUNCTIONS........................................................................................................................61.6SASCOMMUNICATIONS............................................................................................................62DATAEXCHANGEREQUIREMENTS.....................................................................................82.1LEADAPPLICATIONS..................................................................................................................82.2IMPORTANCELEVELOFCOMMUNICATIONS.............................................................................112.3COMMUNICATIONSSERVICELEVELCRITERIA..........................................................................113COMMUNICATIONSTECHNOLOGIESDESCRIPTION...................................................123.1TRANSMISSIONMEDIAOUTSIDESUBSTATIONS......................................................................123.2TRANSMISSIONMEDIAINSIDESUBSTATIONS..........................................................................153.3COMMUNICATIONSMETHODS.................................................................................................163.4COMMUNICATIONTOPOLOGY..................................................................................................183.5COMMUNICATIONTECHNOLOGIES...........................................................................................193.6BACKBONETECHNOLOGY.......................................................................................................203.7DATASECURITY......................................................................................................................244COMMUNICATIONSANDAPPLICATIONSMATRIX.......................................................254.1METHODOLOGY.......................................................................................................................265CROSSWORKINGMATRICES.RESULT.............................................................................266CONCLUSIONS...........................................................................................................................277REFERENCES.............................................................................................................................29ANNEXES.............................................................................................................................................30A.MATRICES...............................................................................................................................30B.SECURITYANNEX................................................................................................................39Page2of40RésuméThistechnicalbrochureanalysestheadvantagesanddisadvantagesofboththeuseandimpactofavailablecommunicationtechno