A method and system for identifying vulnerable nodes in a power distribution system of a data center

A technology for power distribution systems and nodes, applied in electrical components, circuit devices, AC network circuits, etc., can solve the problems of low accuracy of identification results and failure to consider the classification characteristics of load equipment.

Active Publication Date: 2021-08-17
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Usually the vulnerable node identification method of the existing power distribution system is only based on the topological structure of the power distribution system for identification and analysis, without considering the classification characteristics of the load equipment, but in the actual operation of the data center power distribution system, loads of different load levels The degree of influence of equipment during power failure is very different, which leads to the problem of low accuracy of identification results in the vulnerable node identification method in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for identifying vulnerable nodes in a power distribution system of a data center
  • A method and system for identifying vulnerable nodes in a power distribution system of a data center
  • A method and system for identifying vulnerable nodes in a power distribution system of a data center

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] see figure 1 with figure 2 , this embodiment provides a method for identifying vulnerable nodes in a power distribution system of a data center, including:

[0059] Based on the topological structure G of the power distribution system and the load parameters of the load equipment, the importance index of each node in the topological structure G is calculated sequentially. The load parameters include the load amount and load level; multiple different node combinations are screened out according to the importance index, Respectively cut off the corresponding nodes in each node combination from the topology G, and obtain the recovery topology T corresponding to the number of node combinations n ; Based on the recovery topology T n The load parameters of the medium load equipment and the load parameters of the load equipment in the topology G are calculated for each restoration topology T n The load loss index; according to each recovery topology T n Corresponding load...

Embodiment approach

[0066] Select the top m nodes in the order of importance index ranking, m1 , restore the topology T 2 , ..., restore topology T m , and then restore the topology T based on 1 The load parameters of the medium load equipment and the load parameters of the load equipment in the topology G are calculated to restore the topology T 1 The loss of load exponent, based on the restoration topology T 2 The load parameters of the medium load equipment and the load parameters of the load equipment in the topology G are calculated to restore the topology T 2 The load loss index of , ... until the topology T is restored mAfter the load loss index is calculated, the vulnerability values ​​of each recovery topology are calculated separately, and the output of the recovery topology with the highest vulnerability value is screened out to obtain the identification results of vulnerable nodes.

[0067] Specifically, based on the recovery topology T in the above embodiments n The load paramet...

Embodiment 2

[0076] see figure 1 with image 3 , this embodiment provides a power distribution system fault simulation system for data centers, including a first calculation unit 1, a topology simulation unit 2, a second calculation unit 3 and a result output unit 4 connected in sequence;

[0077] The first calculation unit 1 is used to sequentially calculate the importance index of each node in the topology G based on the topology G of the power distribution system and the load parameters of the load equipment, and the load parameters include the load amount and the load level;

[0078] The topology simulation unit 2 is used to screen out a number of different node combinations according to the importance index, respectively cut off the corresponding nodes in each node combination from the topology structure G, and obtain the restoration topology T corresponding to the number of node combinations n ;

[0079] The second calculation unit 3 is used to restore the topology T based on n Th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for identifying vulnerable nodes in a power distribution system of a data center, which belongs to the technical field of power analysis, and can fully consider the topology structure of the power distribution system and the load and load level of load equipment, and accurately analyze the Identification results of vulnerable nodes. The method includes: based on the topological structure G of the power distribution system and the load parameters of the load equipment, sequentially calculate the importance index of each node in the topological structure G; screen out a plurality of different node combinations according to the important index, and combine each node combination The corresponding nodes in are excised from the topology G, and the recovery topology T corresponding to the number of node combinations is obtained n ; Based on the recovery topology T n The load parameters of the medium load equipment and the load parameters of the load equipment in the topology G are calculated for each restoration topology T n The load loss index; according to each restoration topology T n Corresponding load loss index and self-reliability index, screen out the recovery topology T with the highest vulnerability n , and output the vulnerable node identification results.

Description

technical field [0001] The invention relates to the technical field of power analysis, in particular to a method and system for identifying vulnerable nodes in a power distribution system of a data center. Background technique [0002] With the rapid development of Internet, cloud computing, artificial intelligence and other technologies, the infrastructure construction scale of data centers is getting larger and larger. For data centers, once a power outage occurs, it will greatly affect the development of network services. Therefore, data The center has higher and higher requirements for the safety and reliability of the power distribution system. However, the power distribution system may hide large-scale blackout catastrophe accidents due to factors such as man-made, calculation, communication, protection control, and internal faults. The occurrence of these faults is unpredictable and it is extremely difficult to find them in advance. The degree of impact after a power...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H02J3/00
CPCH02J3/00
Inventor 康春建刘鑫沛曹可建苗权刘丙双
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products