123 Main Street, New York, NY 10001

Microgrid Controller for Safe Islanding and Dispatch

← Back to: Smart Grid & Power Distribution

A microgrid controller is the system brain that coordinates DERs, storage, generators and critical loads so that a site can ride through grid disturbances, island safely and use energy more efficiently. This page shows how to size, partition and implement that controller across sensing, compute, dispatch, communications, security and reliability building blocks.

What this page solves

This page explains why a dedicated microgrid controller is needed when PV, battery storage, diesel gensets and critical loads operate as a local grid. It shows how a central controller fixes chaotic power flows, unreliable black start and islanding behaviour, and poor coordination with the utility, SCADA and cloud systems.

Typical microgrid situations

  • Industrial park: roof-top PV, shared battery containers and diesel gensets feeding production lines with steep load ramps and demand charges.
  • Campus or commercial complex: several buildings behind multiple meters, with PV, storage, EV chargers and flexible HVAC and lighting loads.
  • Island or remote microgrid: weak or absent utility grid, diesel as backup, and a strong need to maximise renewables and minimise fuel consumption.

Pain points without a central microgrid controller

  • Uncoordinated power flows: PV inverters, battery PCS and gensets each run local rules, causing conflicting power and reactive behaviour, nuisance trips and difficulty meeting grid codes.
  • Weak black start and islanding behaviour: start-up and islanding sequences are scattered across devices, making it hard to guarantee safe, repeatable transitions between grid-connected and islanded modes.
  • Poor visibility for utility and operators: SCADA or cloud platforms only see fragmented telemetry, with no single point that exposes forecasts, flexibility and dispatchable capacity for the whole microgrid.

What the microgrid controller adds

  1. Sync and islanding decisions: uses sync/islanding AFEs and protection status to decide when to parallel with the utility, when to island and which sources set frequency and voltage.
  2. Energy and load forecasting: runs forecasting models on MCU or SoC to predict PV generation, load profiles and battery state, so that setpoints reflect the next hours instead of only the current second.
  3. EMS and dispatch: turns forecasts and real-time measurements into active and reactive power setpoints for PV inverters, battery PCS, gensets and controllable loads, enforcing priorities and constraints.
  4. Gateway and security: concentrates southbound protocols to inverters, PCS and IEDs, and northbound links to SCADA or cloud, with secure boot, HSM or SE and tamper-resistant logging.

Power-stage topologies, detailed inverter or PCS control loops and revenue metering logic are covered in dedicated pages. This section focuses on the system-level problems and the role of the microgrid controller as the central coordination point.

Microgrid controller in a PV, battery and genset system Block diagram showing a central microgrid controller between utility grid and SCADA on the top side, and PV inverters, battery PCS, diesel generator and critical loads on the sides, with sensors and AFEs along the bottom. Microgrid controller in system context Utility grid PCC & grid codes SCADA / control room Commands & monitoring Cloud / markets Forecasts & tariffs Microgrid controller Sync · EMS · Dispatch · Gateway Sync / islanding Forecast compute EMS / dispatch PV inverters Active / reactive power Battery PCS / diesel genset Critical and flexible loads Priority, shedding and ride-through rules Voltage / current sensors · Sync / islanding AFEs

System context and typical use cases

Microgrid controllers appear in very different projects, from islanded village grids to industrial parks and campuses. This section maps the controller's role into typical business and technical contexts, so that requirements can be traced back to concrete reliability, fuel and cost targets instead of abstract feature lists.

Island microgrid: maximise renewables, minimise fuel

Remote islands and off-grid sites often rely on diesel as the legacy backbone, with PV and battery containers added later. The utility grid is weak or absent, load patterns are driven by households and small businesses, and any extended outage has a visible social impact.

Without a microgrid controller, diesel units run on conservative rules, PV and battery operate as loosely coordinated add-ons and black-start sequences are improvised by local staff. This makes it hard to increase renewable penetration without risking instability or excessive manual intervention.

An island microgrid controller consolidates forecasts, defines start-up and islanding sequences and schedules diesel, PV and storage as a single fleet. Typical targets include cutting annual fuel consumption, raising renewable share and keeping restoration times after faults within an agreed limit.

Key metrics: yearly fuel use, renewable energy share, outage frequency and duration, minimum reserve margin for critical loads.

Industrial park: peak shaving and critical production lines

Industrial campuses connect to a strong utility grid but face demand charges, time-of-use tariffs and sensitive production lines with large drives and motors. PV arrays, shared battery systems and occasional engine gensets are added to reduce bills and support resilience.

If each workshop or building manages its own storage and backup, the site still presents a single hard peak to the utility and a fragmented view to the operator. Load shedding priorities are often embedded in local ATS or UPS settings instead of being aligned with real production loss and restart costs.

A microgrid controller looks at the whole park: it forecasts plant load and PV output, reserves battery capacity for peak periods, coordinates genset dispatch and enforces a site-wide hierarchy for controllable loads. The goal is to flatten demand peaks and protect critical processes without over-building storage or backup capacity.

Key metrics: contracted demand versus actual peaks, energy cost per product, number of production interruptions and time to recover after grid faults.

Campus or commercial complex: multi-meter microgrid

University campuses, hospitals and mixed-use commercial sites are usually supplied via several meters and substations. Rooftop PV, basement storage, EV charging and flexible HVAC and lighting loads are spread across buildings, with different owners and contracts.

Local BMS or EMS systems may operate per building, but there is no single place that aggregates load, generation and flexibility across the whole site. As a result, the operator cannot easily see total flexibility, combined demand peaks or the true effect of new PV or EV charging projects.

A microgrid controller connects to meters and building EMS interfaces, builds a site-wide view and coordinates PV, storage and flexible loads behind multiple meters. It exposes consolidated forecasts, flexibility margins and alarms to SCADA or cloud dashboards so that energy and facility teams can act on a shared picture.

Key metrics: total energy cost, peak demand across meters, use of flexible loads and service levels for critical buildings such as hospitals or data rooms.

Datacenter microgrid: multi-source power with strict SLAs

Modern datacenters mix utility feeds, large UPS banks, diesel or gas generators and, in some cases, on-site renewables. The power architecture is already complex, with N+1 or 2N redundancy, strict uptime SLAs and precise limits on voltage and frequency excursions.

When renewables, storage or demand-response participation are added, a microgrid controller orchestrates these resources above the traditional ATS and generator controls. Its role is to unlock energy and cost optimisation while preserving the risk envelopes defined by the datacenter's reliability and compliance requirements.

Key metrics: uptime SLA, maximum allowed outage duration, power quality at IT loads and controllable flexibility offered to the grid.

Microgrid controller use cases compared Side-by-side illustration of island microgrid, industrial park and campus microgrid use cases, each with PV, storage and loads connected through a microgrid controller. Typical microgrid controller use cases Island microgrid PV array and inverters Battery storage and diesel Microgrid controller Village and critical loads Fuel saving · Resilience Black start orchestration Industrial park Roof-top PV and inverters Shared battery containers Microgrid controller Production and auxiliary loads Peak shaving · Demand charges Critical line protection Campus / complex PV, storage and EV charging Building EMS and meters Microgrid controller Campus and tenant loads Multi-meter · Flex loads Site-wide visibility

Functional blocks of a microgrid controller

A microgrid controller can be viewed as a set of coordinated functional blocks rather than a single processor. Sync and islanding front-ends capture the grid state, compute engines run forecasting and dispatch, gateway modules connect to devices and SCADA, security elements protect firmware and keys, data storage maintains history and configuration, and human I/O provides local visibility and control.

The following blocks form a typical architecture. Later sections expand each area in more technical depth, while this overview focuses on the main roles and signal interfaces.

  • Sync & islanding AFEs: measure voltages and currents at the point of common coupling, provide frequency and phase information and generate observables for islanding criteria.
  • Core compute (MCU / SoC / FPGA): executes real-time control loops, forecasting models, operating mode management and energy management or dispatch logic under deterministic timing.
  • Gateway & communications: terminates fieldbuses and industrial Ethernet towards inverters, PCS, IEDs and meters, and exposes northbound protocols towards SCADA, time synchronisation sources and cloud or market platforms.
  • Security module: enforces secure boot, stores cryptographic keys and certificates in HSM or SE devices, accelerates crypto operations and monitors tamper inputs or secure erase triggers.
  • Data storage & historian: records events, alarms and trends, maintains configuration sets and supports retrieval of past operating states for compliance, analysis and tuning.
  • Human interface & local I/O: provides HMI displays, local pushbuttons, status indicators and hardwired digital I/O for interlocks, trip outputs and mode signals when remote systems are unavailable.

Power-stage current loops, PWM generation and gate-drive details are implemented inside PV inverters, PCS and other converters. The microgrid controller operates at the command and decision layer, issuing setpoints and trip requests rather than directly driving power switches.

Functional blocks inside a microgrid controller Central microgrid controller block containing six functional blocks for sync and islanding AFEs, core compute, gateway and communications, security, storage and historian, and human interface and local I or O, with connections to field signals, inverters and SCADA or cloud. Functional blocks of a microgrid controller Microgrid controller Sync · compute · gateway · security · storage · HMI Sync & islanding AFEs Core compute MCU / SoC / FPGA Gateway & communications Security module Storage & historian HMI & local I/O Field signals Voltages & currents PT CT SCADA control room Cloud / market platforms PV inverters Battery PCS Breaker IEDs

Sync & islanding detection AFEs

Sync and islanding front-ends determine how clearly the microgrid controller can see the PCC. These circuits translate line voltages and currents into safe, accurate signals for ADCs, comparators and digital logic, supporting PLLs, grid code protection functions and anti-islanding criteria.

Sensing quantities and measurement objectives

Typical sync and islanding AFEs observe three-phase voltages and currents at the point of common coupling. From these raw waveforms, the controller derives frequency, phase angle, magnitude, negative and zero sequence components and rate-of-change quantities used in grid-code and anti-islanding logic.

  • Line and phase voltages, with sufficient accuracy to support PLL and protection limits.
  • Three-phase currents and power flow direction, to understand active and reactive power exchange with the grid.
  • Imbalance indicators and rate-of-change metrics that reveal faults, islanding or weak grid conditions.

Measurement chains often sit behind PT or VT devices on medium-voltage systems and must provide enough resolution and bandwidth for both steady-state monitoring and fast disturbance detection.

Key selection points include input range and common-mode capability, bandwidth, interface to existing CT and PT hardware and noise or CMTI performance under fast transients.

Front-end topologies and isolation schemes

Several front-end structures are commonly used to sense grid quantities for sync and islanding detection. Voltage channels typically use precision dividers followed by isolated amplifiers or sigma-delta modulators, while current channels use CTs or Rogowski coils with suitable AFEs before digitisation.

  • Voltage sensing: divider networks and surge protection feed isolation amplifiers or isolated sigma-delta modulators that translate line potentials into low-voltage differential signals for ADC or digital filters.
  • Current sensing: CT or Rogowski sensors and burden or integrator networks produce signals for dedicated current AFEs and high-resolution ADC channels.
  • ZCD and PLL inputs: zero-crossing detectors or appropriately filtered ADC channels supply phase information for digital PLLs and sync logic at the controller.

Projects that apply active anti-islanding methods may also rely on front-ends that preserve deliberate perturbations injected into voltage or power, so that response patterns remain visible in the sampled data instead of being filtered out.

Important parameters include insulation rating and creepage, linearity and temperature drift, sigma-delta clock and interface constraints and total front-end delay relative to protection and control timing budgets.

Anti-islanding criteria and implementation paths

Anti-islanding functions combine measured quantities into criteria that distinguish normal grid disturbances from true loss-of-mains events. Some thresholds are enforced by comparators and hardware logic, while others run as algorithms on MCU or FPGA devices fed by high-resolution ADC data.

  • Passive methods based on undervoltage or overvoltage, underfrequency or overfrequency, imbalance and rate-of-change limits that can be checked in hardware.
  • Algorithmic methods that analyse power–frequency or voltage–reactive power behaviour over time, implemented on MCU or FPGA using sampled waveforms.
  • Active methods that introduce small disturbances and observe the measured response through the same AFE and ADC chain to confirm the presence or absence of the grid.

Hardware comparators and window detectors provide fast, fail-safe trip paths by latching outputs whenever key limits are exceeded, independent of firmware state. Digital logic in MCU or FPGA combines these hardware signals with more advanced criteria to generate Sync_OK, Island_Detected and Trip_Request outputs towards breakers and converter controls.

Device selection focuses on comparators with stable references and latch outputs, ADC or sigma-delta chains with suitable dynamic range and latency and interfaces that keep total detection time within grid-code requirements.

Sync and islanding sensing chain Signal chain from grid voltages and currents through CT and PT sensors, analog front ends, sigma-delta or ADC devices, comparators and FPGA or MCU logic that generate Sync OK, island detected and trip request outputs. Sync & islanding sensing and decision chain Analog domain Digital domain Grid / PCC Three-phase V & I PT / VT sensors CT / Rogowski Voltage AFE Current AFE ADC / ΣΔ sampled waveforms Comparators window & trip limits FPGA / MCU logic PLL, criteria, voting Sync_OK Island_Detected Trip_Request

Forecasting & energy management compute

A microgrid controller must look ahead instead of reacting only to instantaneous power and state-of-charge. Forecasting engines estimate future PV production, load demand and grid or tariff conditions, so that the energy management system can schedule battery usage, diesel runtime and load shedding with fewer surprises and less stress on assets.

Forecasting inputs and EMS planning outputs

The forecasting and EMS compute block ingests time-series data and configuration from several sources. These inputs feed short-term predictions and multi-step plans that guide dispatch and control logic in later sections.

  • Historical active and reactive power, broken down by feeder or load category where available.
  • PV or wind generation histories and real-time irradiance and temperature measurements.
  • Tariff and market signals such as time-of-use prices, demand charges and demand-response events.
  • Battery status from BMS, including SoC, SoH, power limits and temperature.
  • Weather forecasts and site constraints, including non-sheddable loads and planned maintenance windows.

From these inputs, the compute platform produces short-term PV and load forecasts, proposed battery and diesel operating profiles and recommended grid import or export trajectories. These plans are then translated into per-device setpoints by the dispatch logic.

Compute tiers for forecasting and EMS

Different projects justify different levels of compute. Small island microgrids can rely on microcontroller-class devices and simple algorithms, while large industrial parks or data centers benefit from SoCs with operating systems, ML libraries and even NPUs for edge AI inference. Model training and complex optimisation can remain in the cloud or aggregator tier, with the microgrid controller focused on robust on-site execution.

Tier Typical core Memory & storage Forecasting complexity Typical project scale
Low compute Cortex-M7 MCU with FPU On-chip Flash + QSPI NOR, few hundred kB RAM Rules, moving averages, basic statistics Single-site or small microgrids, sub-MW
Mid compute Cortex-A55 SoC running Linux 512 MB–2 GB DDR, 4–32 GB eMMC Classical ML models, basic optimisation Industrial parks and campuses, MW level
High compute SoC with NPU / GPU acceleration High-bandwidth DDR, large eMMC or SSD Edge AI models, multi-variable optimisation Multi-site systems or data center microgrids

Memory, storage and peripheral requirements

The forecasting and EMS compute platform needs more than CPU cycles. Adequate memory and storage are required for historical time-series, configuration, model files and logs, and sufficient I/O bandwidth is needed to collect data and distribute results with accurate time alignment.

  • DDR or LPDDR for model inference and caching of recent measurements and forecast vectors.
  • eMMC, SD or QSPI NOR for long-term storage of history windows, configuration and signed model or policy binaries.
  • Multiple Ethernet, serial and CAN ports to collect metering, weather station, BMS and gateway data and to receive updates from cloud or aggregator platforms.
  • RTC and time-stamp support tied to PTP, NTP or GNSS so that events and trajectories align correctly with grid, tariff and compliance timelines.

Model training and complex optimisation can remain in a cloud or DR / DER aggregator tier. The microgrid controller focuses on robust and deterministic execution of pre-validated models and policies at the edge.

Compute tiers for forecasting and energy management Three vertical blocks for low, mid and high compute tiers with chip icons and labels for core type, memory and typical use, each feeding a common EMS logic block at the bottom. Compute tiers for forecasting & EMS Low compute Cortex-M7 MCU On-chip Flash + QSPI Basic rules & statistics Single-site microgrids Mid compute Cortex-A55 SoC Linux, DDR, eMMC ML models & optimisation Parks & campuses High compute SoC with NPU Edge AI inference Multi-site dispatch Data center microgrids EMS dispatch & scheduling logic

Dispatch & control logic

Control objectives and operating constraints

Dispatch and control logic turns forecasts and real-time measurements into coordinated setpoints for PV inverters, battery converters, gensets and controllable loads. The logic must respect stability and safety first, while seeking economic and lifetime benefits within technical and regulatory limits.

  • Maintain frequency and bus voltage within grid-code ranges and keep critical loads supplied during disturbances.
  • Minimise fuel and energy costs by scheduling PV curtailment, battery cycling and generator loading intelligently.
  • Honour technical limits such as converter P/Q capability curves, feeder ratings and power-quality constraints.
  • Respect safety, regulatory and operational rules, including non-sheddable loads and required spinning reserves.

Dispatch targets for PV, storage, gensets and loads

From the perspective of dispatch logic, each device class is a controllable element with a small set of setpoints or commands. The microgrid controller computes these targets and updates them at appropriate rates, leaving inner control loops and PWM generation to the respective converters and generator controllers.

  • PV inverters: active power setpoints, reactive power or power-factor commands and operating modes for voltage support and curtailment.
  • Battery PCS: charge and discharge power profiles, reserved capacity for backup and limits derived from BMS SoC, SoH and temperature.
  • Diesel or engine generators: power levels or loading targets, start and stop commands and participation in grid-forming or droop-based sharing strategies.
  • Controllable loads: shed levels, power caps and priority tags that define how flexible and critical loads are treated under stress or market events.

Inner current loops, PWM generation and detailed grid-forming or grid-following behaviour remain inside the converters and generator controllers. The microgrid controller focuses on issuing consistent, constraint-aware setpoints and commands.

Fast and slow control loops, modes and fail-safe behaviour

Dispatch logic operates on at least two time scales. A fast loop tracks plans and reacts to disturbances, while a slower loop updates plans using new forecasts, prices and constraints. Mode management and fail-safe strategies define how the microgrid behaves when partial information or compute resources are lost.

  • Fast loops run at 100 ms to 1 s scales, adjusting setpoints as grid status, SoC and load change and enforcing protection limits.
  • Slow loops run from seconds to minutes, regenerating multi-step dispatch trajectories based on refreshed forecasts and tariff or DR inputs.
  • Mode handling covers grid-connected, islanded, black-start and recovery states, using sync and islanding signals as triggers.
  • Watchdogs and fall-back profiles ensure that loss of forecasting services, communications or measurements leads to conservative, safe behaviour rather than uncontrolled operation.
EMS dispatch and control flow Inputs for forecasts, metering and grid signals feeding an EMS dispatch logic block with fast and slow loops, which then drives PV inverters, battery PCS, gensets and loads under constraints. EMS dispatch & control flow Inputs Forecasts · metering & status · grid & tariff signals EMS dispatch logic Fast loop 100 ms – 1 s tracking Slow loop Seconds – minutes planning Constraints Grid codes & limits SoC & equipment ratings Tariffs & DR events PV inverters P / Q setpoints Battery PCS Charge / discharge Gensets Loading & start / stop Loads Shed levels & caps

Gateway communications & security

The gateway and security subsystem connects the microgrid controller to field devices, station automation and cloud platforms while protecting control traffic from untrusted networks. Southbound interfaces integrate inverters, PCS, gensets, BMS and meters. Northbound protocols expose status and control to SCADA and cloud services. Security hardware and network zoning keep critical control paths isolated and authenticated.

Southbound interfaces to field devices

Southbound communications bring real-time measurements and status from inverters, PCS and auxiliary equipment into the microgrid controller. Protocol drivers and object models present a unified device view to higher-level control and forecasting logic.

  • Modbus/RTU: legacy meters, compact PCS and auxiliaries over serial links, suitable for slow-changing power and status points.
  • Modbus/TCP & industrial Ethernet: PV inverters, larger PCS, breakers and I/O devices using Profinet, EtherNet/IP or EtherCAT on switched networks.
  • CAN / CANopen: genset controllers, BMS units and modular subsystems where short, robust fieldbuses are preferred.
  • Vendor-specific protocols: proprietary device interfaces wrapped by adapter layers into a common data and event model for EMS and SCADA.
  • Refresh intervals are tiered so that fast loops prioritise converter power and status, while configuration and diagnostics use slower polling cycles.

Northbound interfaces to SCADA and cloud

Northbound protocols publish microgrid status, events and power flows to station automation and enterprise systems, and receive grid constraints, power targets or optimisation results. Time-aligned data enables consistent analysis and coordinated operation.

  • IEC 61850: integration as a logical node in substation networks, exposing microgrid measurements, states and controllable points.
  • DNP3 / IEC 60870-5-104: remote telemetry for grid operators, reporting power, breaker positions, alarms and receiving limit or mode commands.
  • MQTT / HTTPS / REST: secure telemetry, logs and forecast summaries towards cloud or aggregator platforms, plus policy and model updates in return.
  • Time stamps tied to PTP, NTP or GNSS allow event logs and trajectories to be aligned with external disturbance records and market data.

Network zoning and traffic isolation

Segmenting traffic into control, management and external zones reduces the attack surface and prevents non-critical applications from disturbing real-time control flows. Multiple Ethernet ports and VLANs can map to dedicated IP segments and firewalled paths.

  • Control network: carries time-critical traffic between the microgrid controller, inverters, PCS, genset controllers, meters and protection IEDs.
  • Management network: used for engineering access, web dashboards, configuration and firmware updates under role-based access control.
  • DMZ / WAN segment: terminates VPNs and encrypted tunnels to enterprise and cloud services, kept separate from direct converter control paths.
  • Firewall rules and routing policies ensure that external systems reach only hardened gateways and never directly access field buses.

Security module, secure boot and keys

A dedicated security module anchors trust for firmware, credentials and logs. Secure boot and signed images prevent unauthorised code from running. Hardware security blocks store keys, accelerate cryptography and protect tamper-sensitive events.

  • Secure boot & firmware signing: boot chains verify bootloaders, kernels and application images against immutable roots of trust before execution.
  • HSM / secure element: dedicated ICs or integrated secure islands handle key storage, TLS/DTLS offload and digital signatures for control and telemetry channels.
  • Key and certificate lifecycle: mechanisms for provisioning, rotation and revocation of device and gateway credentials through secure management paths.
  • Anti-tamper inputs and secure logging: tamper signals trigger protected event logs and can lock sensitive functions until authorised recovery procedures are complete.
Protocol Typical use Security considerations
Modbus/RTU Legacy meters and auxiliaries Use isolated ports, strict access lists and monitoring.
Industrial Ethernet Inverters, PCS, I/O and IEDs Segment into control VLANs; use TSN where required.
IEC 61850 / 104 / DNP3 Substation and SCADA integration Enable secure profiles and gateway firewalls.
MQTT / HTTPS Cloud telemetry and policies Require TLS, CA validation and hardened credentials.
Communications and security zones around the microgrid controller Diagram with field devices at the bottom, a central microgrid controller containing gateway and security modules, and SCADA and cloud systems at the top, connected by control, management and secure cloud links. Comms & security zones SCADA & cloud systems Grid control · enterprise · aggregator Microgrid controller Gateway interfaces Southbound & northbound links Security module HSM / SE · secure boot Field devices PV inverters & PCS Gensets & BMS Meters & IEDs Local HMI & I/O Link styles Control network Cloud / WAN link

Power, reliability & safety hooks

Beyond algorithms and communications, the microgrid controller itself must stay powered, survive faults and provide hard safety hooks to power devices. This section focuses on supply paths, redundancy and environmental robustness for the controller chassis, leaving converter topologies and surge component selection to dedicated pages.

Power supply architecture and backup

The controller normally runs from one or more AC or DC sources and should ride through short disturbances with its own backup energy. A clear power tree simplifies fault diagnosis and makes behaviour predictable during brownouts and switchover events.

  • Dual AC/DC or DC/DC inputs allow the controller to draw from a station AC feed, a DC auxiliary bus or both, using OR-ing or eFuse circuits for seamless transitions.
  • Local DC UPS, supercapacitor or small battery modules can keep logic alive long enough to log events and perform controlled shutdowns.
  • PoE options may support compact edge controllers, but should be paired with secondary supplies or PoE switches that match availability targets.
  • Internal regulators fan out from a 24 V or similar bus to 5 V, 3.3 V and core rails, with supervisors enforcing power-up sequencing and reset timing.

Controller and network redundancy

Redundancy can be applied at controller, power and network levels. Clear roles and heartbeat mechanisms reduce the risk of split-brain control or unplanned outages when faults occur.

  • Primary and backup controllers can run in hot standby, with the standby unit tracking configuration and states and taking over when heartbeats from the primary stop.
  • Redundant Ethernet ports and ring or dual-homing schemes allow the control network to survive single link or switch failures without interrupting setpoints.
  • Power-on and restart sequences should ensure that only one controller is active at a time and that setpoints are issued only after communications and measurements stabilise.

Safety hooks and hardware trip paths

Safety hooks provide direct, low-latency paths from protection logic to breakers, PCS and generators. These paths must remain predictable even when higher-level software misbehaves or communications are partially degraded.

  • Dedicated trip outputs, often dry contacts or opto-isolated lines, interface with protection relays, PCS and breaker coils without passing through non-essential software.
  • Safety-related signals use reinforced isolation and clear earthing strategies suitable for the voltage and fault levels present in the switchgear.
  • Internal and external watchdogs can place the controller into a conservative fallback mode or trigger safe stops when main CPUs stall or hang.
  • Degraded modes define how equipment behaves under partial failures, such as reverting to local droop control or fixed setpoints while keeping critical loads supplied.

Environment, EMC and site robustness checklist

Environmental and EMC conditions can undermine controller availability if not addressed explicitly. A concise checklist helps design teams verify that the chosen platform and enclosure match deployment environments from substations to coastal microgrids.

  • Operating temperature, humidity and condensation ranges appropriate for the switchboard, cabinet or outdoor enclosure.
  • Compliance with relevant conducted and radiated EMC standards and surge, lightning and ESD immunity levels for power and communication ports.
  • Mechanical robustness in the presence of vibration, shocks and nearby high-current equipment, including mounting and connector choices.
  • Clear access for maintenance, including replaceable power, storage or communications modules without disturbing field wiring.
  • Verified procedures for firmware updates, configuration backups and recovery after hardware replacement or catastrophic faults.
Power and redundancy layout for a microgrid controller Diagram showing primary and backup microgrid controllers with multiple power sources, redundant Ethernet connections and hardware trip lines to PCS and protection relays. Power & redundancy layout UPS / AC supply AC to DC source DC bus Station auxiliary PoE switch Optional power Primary controller Logic · I/O · trips Backup controller Hot standby DC/DC & rails DC/DC & rails Redundant Ethernet / ring Trip & interlock lines To PCS and protection relays Path legend Power paths Ethernet & control Trip & interlocks

Reference architectures for microgrid controllers

Microgrid controllers can be built from different combinations of compute, security and communications blocks. This section groups typical designs into three reference tiers so that project teams can match microgrid size, budget and availability targets with an appropriate architecture template.

Tier Typical microgrid scale Core compute & security Comms & timing Cost / complexity
Small Tens to a few hundred kW, 5–15 devices (PV inverters, one PCS, small genset, a few critical loads). Single high-performance MCU (for example STM32H743, RA6M4) with on-chip Flash, QSPI NOR and basic secure boot. Single Ethernet port, serial buses and optional 4G/LTE-M or NB-IoT; NTP or basic PTP timing from gateway or cloud. Lowest BOM and wiring complexity, suitable for budget-sensitive projects with limited engineering resources.
Medium Hundreds of kW to a few MW, 10–40 nodes across several feeders in a campus or industrial park. Real-time MCU (for example TI TMS320F2837x, STM32G4) plus Linux SoC (for example i.MX8M, AM64x) and a dedicated secure element or HSM. Dual Ethernet, industrial Ethernet or TSN switch, PTP hardware time stamping and GNSS or substation time reference. Moderate BOM and software complexity, capable of handling forecasting, EMS and multi-protocol gateways with higher availability.
Large Multi-MW microgrids with dozens to over one hundred devices in critical infrastructure sites or data centres. Dual redundant controllers (each similar to the Medium tier) plus station-grade HSM and separate clock/PMU reference modules. Redundant Ethernet rings, independent gateway appliance for IEC 61850/104/DNP3 and GNSS-disciplined PTP grandmaster. Highest cost and integration effort, targeted at microgrids with strict uptime, compliance and cybersecurity requirements.

Small microgrid controller – single MCU architecture

The small architecture targets compact island, rooftop or commercial microgrids where a single controller panel supervises a handful of converters and critical loads. The design focuses on simplicity and low cost rather than deep redundancy or complex protocol stacks.

  • Core compute: single high-performance MCU such as STM32H743, STM32H753, RA6M4 or TMS320F28379D with FPU, multiple ADCs and PWM timers.
  • AFEs: isolated amplifiers or ΣΔ modulators like AMC1301, AMC1306, AD7403 feeding MCU ADCs for grid and converter voltage and current sensing.
  • Communications: one Ethernet PHY (for example DP83848, KSZ8081) for LAN and one cellular modem module for wide-area connectivity, plus RS-485 and CAN for devices.
  • Security: basic secure boot using MCU ROM and eFuse keys, with optional secure element such as ATECC608B when TLS is needed.
  • Best suited for: small microgrids where cost and ease of deployment outweigh strict redundancy or advanced cybersecurity requirements.

Medium microgrid controller – MCU + application SoC

The medium architecture separates real-time control from forecasting and EMS workloads. A dedicated MCU handles fast protection and islanding while a Linux-capable SoC runs dashboards, optimisation algorithms and multi-protocol gateways.

  • Real-time MCU: devices such as TI TMS320F2838x, STM32G4 or RA6T1 interface with sync/islanding AFEs, drive trip outputs and implement fast loops and fail-safe logic.
  • Linux SoC: parts such as NXP i.MX8M Plus, TI AM64x or Sitara AM57x run forecasting, EMS, protocol stacks and user interfaces with DDR4 and eMMC storage.
  • Security module: secure element or HSM such as ATECC608B, NXP SE050 or TPM2.0 devices stores keys, accelerates TLS and signs logs.
  • Networking: dual Ethernet ports, industrial Ethernet switch or TSN bridge (for example KSZ9477, DP83TD510E) and PTP-capable PHYs for accurate time stamping.
  • Best suited for: campus and industrial park microgrids requiring richer communications, forecasting and security without the complexity of full redundancy.

Large microgrid controller – redundant controllers with dedicated gateway

The large architecture mirrors practices from substation automation and data-centre power systems. Dual controllers, a dedicated gateway appliance and time-sync modules support high availability targets and strong cybersecurity controls.

  • Primary and backup controllers: each controller may follow the medium architecture with its own MCU, SoC, HSM and AFEs, using heartbeat links for hot-standby operation.
  • Dedicated gateway: an industrial SoC platform (for example i.MX8, AM57x or x86 SBC) running IEC 61850, IEC 60870-5-104, DNP3 and MQTT stacks with multiple Ethernet ports.
  • Timing module: GNSS receivers (for example u-blox ZED-F9T) with OCXO/TCXO and clock ICs act as PTP grandmaster or boundary clocks; optional synchrophasor reference is available.
  • Security: station-grade HSM modules supporting key management, certificate storage and IEC 62351-style secure profiles across control and gateway layers.
  • Best suited for: critical infrastructure sites, ports, rail hubs or data centres where outages and cyber incidents are unacceptable.
Small, medium and large microgrid controller architectures Three vertical stacks showing small, medium and large microgrid controller architectures, with layers for core compute, security, communications, timing and storage. Reference architecture tiers Small MCU core Basic AFEs Eth + 4G Flash / QSPI Medium MCU core Linux SoC HSM / SE TSN / PTP DDR + eMMC Large Dual cores Gateway HSM module GNSS / PTP Redundant I/O Increasing scale, availability and cybersecurity capability

Design checklist & IC mapping

This section provides a practical checklist and a function-to-IC mapping table for microgrid controllers. The checklist helps project teams confirm that sensing, compute, communications, security and reliability requirements are covered. The mapping table links each functional block to typical IC types, key specifications and example part numbers.

Design checklist for microgrid controller implementation

Sync & islanding AFEs

  • Voltage and current sensing bandwidth is sufficient for grid frequency, harmonics and islanding criteria.
  • Effective ENOB and noise performance support required accuracy for phase, unbalance and disturbance detection.
  • Isolation rating, creepage and clearance match system voltage and installation category.
  • Critical islanding criteria have hardware support through comparators or logic rather than relying only on firmware.

Compute & memory for forecasting and EMS

  • MCU and SoC selections leave at least 30–50% CPU and memory headroom under worst-case load.
  • Storage budgets cover historical data windows, forecast models and logs with allowance for growth.
  • Real-time control cores and non-real-time application cores have clearly defined task boundaries and interfaces.
  • Boot, restart, upgrade and rollback procedures are defined and verified under realistic microgrid operating conditions.

Gateway protocols & timing

  • Southbound protocol coverage (Modbus, CAN, industrial Ethernet, proprietary) is complete for all devices in the one-line diagram.
  • Northbound protocol coverage (IEC 61850, IEC 60870-5-104, DNP3, MQTT, REST) matches SCADA and cloud integration plans.
  • Control, management and external networks are segmented with clear VLAN/IP boundaries and firewall policies.
  • Time synchronisation strategy (GNSS, PTP, NTP) achieves required event and power-flow timestamp accuracy.

Security & cybersecurity module

  • Hardware root-of-trust (ROM, eFuse, secure element or HSM) supports secure boot and signed firmware images.
  • Key and certificate lifecycles are defined, including generation, provisioning, rotation and revocation.
  • Encrypted channels (TLS, DTLS, VPN) have hardware acceleration or dedicated modules to avoid overloading main CPUs.
  • Security event and operational logs are integrity-protected and can be exported for audit and incident investigation.

Reliability, power & safety hooks

  • Primary and backup power paths have been tested under realistic fault scenarios, including single-source loss.
  • Watchdog and fail-safe strategies cover CPU lockups, lost communications and sensor faults with safe fallback states.
  • Hardware trip outputs and interlock lines meet isolation, response time and compatibility requirements of PCS and relays.
  • Environmental and EMC limits (temperature, humidity, surge, ESD, vibration) are checked against equipment ratings and site conditions.

Function-to-IC mapping with key specs and examples

The following table links major functional blocks of a microgrid controller to suitable IC types, key specifications and example part numbers. The examples are illustrative and help procurement teams anchor discussions with suppliers and distributors.

Functional block IC type Key specs to watch Example part numbers
Grid voltage AFE Isolated amplifier or ΣΔ modulator Isolation rating, CMTI, gain accuracy, ENOB, bandwidth TI AMC1301, AMC1311; ADI AD7403, ADuM7701
Grid & feeder current AFE ΣΔ current-sense modulator / isolated shunt amplifier Input range, linearity, offset drift, isolation, fault handling TI AMC1306M25, AMC3306; ADI AD7401A, AD8421 + ISO7721
Sync & islanding comparators High-speed comparator / window comparator Propagation delay, input range, hysteresis, output type TI TLV3501, LMV7219; ADI ADCMP601
Real-time control MCU Cortex-M or C2000 class MCU with FPU and rich timers/ADCs CPU speed, ADC channels, PWM timers, safety features, temp range TI TMS320F28379D, F28388D; STM32G474, STM32H743; Renesas RA6T1
Forecasting & EMS SoC Linux-capable application processor Core count, DDR interface, peripherals, crypto extensions, power NXP i.MX8M Plus, TI AM64x, Sitara AM5728, NXP LS1028A
Secure element / HSM Embedded security IC or TPM Key slots, ECC/RSA support, secure storage, certifications Microchip ATECC608B; NXP SE050; Infineon OPTIGA TPM SLB9670
Industrial Ethernet & TSN Switch / PHY with TSN and PTP support Port count, TSN features, HW time stamping, redundancy modes Microchip KSZ9477, KSZ9567; TI DP83869, DP83822 with TSN switch
GNSS & time sync GNSS receiver + disciplined oscillator / clock generator Time accuracy, holdover, interfaces, supported constellations u-blox ZED-F9T, LEA-M8T; Microchip MAC-SA5X OCXO modules
Cellular / LPWAN modem 4G/LTE-M/NB-IoT or 5G module Bands, form factor, industrial temperature, GNSS option Quectel EC25, EG95, BG96; Sierra Wireless HL7800
Power supply front end AC/DC or wide-input DC/DC module Input range, efficiency, isolation, protections, inrush handling Mean Well HDR/DR series; Vicor PI31xx; Recom RAC series
Point-of-load DC/DC & supervisors Buck converters, LDOs, reset and power monitors Output current, efficiency, sequencing, UV/OV detection TI TPS54x, TPS62x; ADI ADM1085; Microchip MCP1316, MCP19118
Digital isolation & trip outputs Digital isolators, optocouplers and high-side drivers Isolation rating, propagation delay, drive capability, approvals ADI ADuM141E, ADuM1250; TI ISO7721; Infineon 1EDI EiceDRIVER
Data storage & logging eMMC, microSD, QSPI NOR / NAND Endurance, temperature grade, ECC, interface voltage Micron MTFC eMMC series; Winbond W25Q/W25N; Swissbit industrial microSD
Microgrid controller design checklist overview Mindmap-style diagram with a central microgrid controller checklist and surrounding bubbles for sync and AFEs, compute and memory, gateway and timing, security, and reliability and safety hooks. Microgrid controller design checklist Microgrid controller Design checklist focus areas Sync & AFEs ENOB · isolation · bandwidth Compute & memory CPU margin · RAM · storage Gateway & timing Protocols · PTP · GNSS Security Secure boot · HSM · TLS Reliability & safety Dual PSU · watchdogs · trips

Request a Quote

Accepted Formats

pdf, csv, xls, xlsx, zip

Attachment

Drag & drop files here or use the button below.

Microgrid controller FAQs

These questions summarise the main design decisions around microgrid controllers. Each answer points back to earlier sections on system context, sensing, compute, dispatch, communications, security and reliability, and can be used as a quick reference when evaluating architectures or discussing requirements with project stakeholders.

1. When is a dedicated microgrid controller needed instead of letting each PV inverter and PCS run autonomously?

A dedicated microgrid controller becomes necessary once multiple DER types, feeders and critical loads must be coordinated, or when black start, islanded operation and controlled reconnection to the grid are required. It also becomes important when peak shaving, tariff based optimisation or participation in dispatch signals from a utility, DSO or aggregator is planned.

2. At what microgrid size or complexity does it become necessary to use a high performance SoC or edge AI platform for forecasting and energy management?

A high performance SoC or edge AI platform becomes attractive when there are many DER nodes, several feeders, complex tariff structures or frequent dispatch events. If short horizon forecasts for solar, load and storage must be updated every few minutes for dozens of assets, MCU based solutions become tight on CPU, memory and storage headroom.

3. Can all synchronisation and islanding detection be implemented purely in MCU firmware, or when should dedicated comparators or FPGA logic be added?

Simple microgrids with relaxed response times can implement synchronisation and islanding detection entirely in MCU firmware, provided sensing bandwidth and ENOB are adequate. Dedicated comparators or FPGA logic are justified when grid codes demand fast hardware backed trips, when several criteria must be combined, or when protection must remain deterministic under heavy CPU load.

4. How should fast control loops and slow energy management loops be structured so that dispatch decisions do not conflict with converter control?

A practical structure lets fast loops enforce voltage, frequency and protection limits on time scales of hundreds of milliseconds or less, while slow energy management loops operate in seconds to minutes. Slow loops issue high level setpoints and constraints, but do not override protection thresholds. Fast loops may temporarily override economic targets whenever safety or stability is at risk.

5. Where is the practical boundary between a microgrid controller and a DR or DER aggregator platform?

A microgrid controller is responsible for real time operation, protection, islanding and internal energy management within a single site. A DR or DER aggregator operates across many sites, interacts with utilities and markets and issues power or flexibility requests. The aggregator defines external targets and limits, while the microgrid controller decides how local assets meet them.

6. If field devices only support Modbus or RTU today, is it still worthwhile to deploy a microgrid controller?

A microgrid controller can still deliver value when devices only speak Modbus or RTU. The controller centralises setpoints, status, alarms and energy data and can translate Modbus registers into higher level models. Gateway functions then expose modern protocols or secure tunnels to SCADA and cloud systems and provide a migration path as new equipment is added.

7. Can small microgrids safely skip hardware secure boot and HSM, and what risks does that introduce?

Small islanded microgrids sometimes operate with minimal security features, but this creates exposure to firmware tampering, unauthorised parameter changes and credential theft. At least a ROM based secure boot path with fused keys is recommended. When external connectivity or remote access is planned, a secure element or HSM becomes important to protect keys and TLS sessions.

8. How should the microgrid controller’s own UPS or backup supply be separated from the site wide UPS system?

The microgrid controller should receive power from a dedicated, well characterised control supply rather than sharing final UPS branches with large IT or process loads. Typical designs feed the controller from a station DC bus or control power system, then add local DC or battery buffering. Separation reduces the chance that IT faults or maintenance unintentionally shut down control.

9. When utility voltage or frequency is abnormal but the microgrid has not yet islanded, what actions should the controller prioritise?

The controller should first protect equipment and critical loads by enforcing current limits, adjusting power factors and preparing for a controlled island if thresholds are approached. It should then adjust setpoints to support grid codes as far as permitted. If conditions continue to deteriorate, pre planned shedding and islanding sequences should trigger before protective devices trip unpredictably.

10. How should multiple microgrids or sub microgrids be coordinated, with one central controller or several local controllers?

A single central controller suits sites with one owner, shared infrastructure and tightly coupled feeders. Multiple local controllers plus a supervisory layer are better when business boundaries, tariffs or reliability requirements differ between sections. In that case, each sub microgrid manages internal stability, while the supervisory layer coordinates power exchange limits and global objectives between zones.

11. How should local HMI functions and remote cloud monitoring be separated in terms of control authority and user roles?

Local HMI typically retains authority for time critical actions such as start or stop, mode changes and alarm acknowledgement, while cloud systems focus on long term trends, configuration and reporting. Role based access control should enforce different permissions for operators, engineers and administrators, and remote channels should normally avoid direct emergency control without additional safeguards and confirmations.

12. When upgrading from traditional distribution automation to microgrid control, which existing devices and infrastructure can usually be reused?

Many assets from distribution automation projects can be reused, including protection relays, feeder terminals, CT and PT circuits and often the fibre network and industrial switches, provided communications and time sync are adequate. The main additions are the microgrid controller or EMS layer, upgraded gateways and security boundaries between control, corporate and external networks.