
99.9%
System Uptime
<100ms
Response Time
IEC 62351
Cybersecurity
24×7
Monitoring
Architecture
Control System Hierarchy
A multi-layered architecture ensures reliable operation from device level to enterprise systems.
Device Level
Inverters, BMS, meters, sensors with embedded controllers
Site Controller
PLC/RTU for local automation and real-time dispatch
SCADA / HMI
Supervisory control and data acquisition for operators
Cloud EMS
AI-powered energy management and optimization platform
Energy Management
EMS Capabilities
Dispatch Optimization
AI-driven charge/discharge scheduling based on tariffs, forecasts, and grid signals.
Load Forecasting
Machine learning models predict consumption patterns for optimal battery utilization.
Solar Forecasting
Irradiance prediction using satellite data and ML for generation planning.
Alarm Management
Intelligent alarm routing, escalation, and root cause analysis.
Grid Compliance
Automated grid code compliance, frequency/voltage support, and reporting.
Revenue Optimization
Multi-objective optimization for tariff arbitrage, demand charge reduction, and ancillary services.
Communication Protocols
| Protocol | Application | Level |
|---|---|---|
| Modbus TCP/RTU | Inverters, meters, sensors | Field |
| IEC 61850 | Substation automation, protection | Substation |
| DNP3 | SCADA, utility interface | Utility |
| IEC 60870-5-104 | Wide-area SCADA, grid operator | Utility |
| MQTT / REST API | Cloud platforms, IoT devices | Cloud |
| OPC UA | Industrial systems, DCS integration | Enterprise |
Compliance
Grid Integration Requirements
CEIG Certification
MandatoryCentral Electricity Grid Code compliance
ABT Metering
MandatoryAvailability-based tariff metering infrastructure
SCADA Interface
MandatoryReal-time data to SLDC/RLDC/NLDC
Frequency Response
Required for BESSPrimary and secondary frequency regulation
Fault Ride Through
MandatoryLVRT/HVRT capability per grid code
Reactive Power
As per PPAPower factor and voltage regulation support
Cybersecurity Measures
Defense-in-depth approach for critical infrastructure protection
Network Segmentation
OT/IT network isolation with DMZ
Encrypted Communications
TLS 1.3 for all data in transit
Role-Based Access
Granular permissions by role and asset
Audit Logging
Complete audit trail of all actions
Intrusion Detection
24/7 monitoring for anomalies
IEC 62351 Compliance
Security for power system communications
Delivery
Integration Process
Requirements
Grid code, utility, and operational requirements
Architecture Design
Control hierarchy, protocols, redundancy
Hardware Selection
Controllers, network equipment, cybersecurity
Software Development
SCADA screens, EMS algorithms, APIs
FAT & SAT
Factory and site acceptance testing
Commissioning
Grid sync, utility coordination, go-live