PACiS V4.6 ReadMe - G
PACiS V4.6 ReadMe - G
Passing on and copying of this document, use and communication of its contents are not permitted without prior written
authorization.
DISTRIBUTION
G
AREVA
README
PACiS V4.6
PACiS V4.6.6
BP75
34975 Lattes Cedex - France
AREVA T&D Protection & Contrôle, Avenue de Figuières –
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
authorization.
%
& %
!"
'(('(
Intended blank page
#
$
$ ' (!
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
authorization.
%
& %
!"
NAME
A. COULON
M. VERNEY
B. CLAUSSE
'(('(
POSITION
MANAGER
ENGINEER
PACiS QUALITY
PACiS PROJECT
DATE
#
$
SIGNATURE
$) ' (!
RECORD OF REVISION
!" # $
V4.56.9.9.B
Delivery of CR1392: Network names extension
to 15 characters
Add precision on frequency of CPU270 (CPU3)
Add modification on User Documentation (§ 17)
E1 01/03/10 G. JUVANON Add Equipment Simulator (§ 9)
Add Time Stamp on OI documentation
Add modification on Ethernet Switches User
Documentation
F 24/03/10 G. JUVANON Delivery of OI I.01.23, SBUS Agency V5.9L,
SCE V4.56.9.9.C, SMT K.03.05
Delivery of CR1421: GOOSES OUTPUT:
Manual sorting in SCE (§ 12.1)
authorization.
!" # $
%
G
& %
!"
'(('(
05/11/10
G. JUVANON
#
$
Agency V5.9T, SMT K.03.07
Add note on "stuxnet virus" §1
$ ' (!
Delivery of C264 B5.14AC, OI I.01.29, SBUS
TABLE OF CONTENTS
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
1. GENERAL .....................................................................................................................................................9
2. OPERATOR INTERFACE..........................................................................................................................9
2.1 OI INSTALLATION ........................................................................................................................................9
2.1.1 Standard installation ..............................................................................................................................9
2.1.2 Stand-alone OI client installation...........................................................................................................9
2.2 NETWORK SETTING .....................................................................................................................................9
2.2.1 Media Sense feature................................................................................................................................9
2.3 TIME SYNCHRONISATION SETTINGS ............................................................................................................9
2.4 SQL SERVER 2005.......................................................................................................................................9
2.4.1 SQL Server Agent Service.......................................................................................................................9
2.4.2 Russian Report Templates ......................................................................................................................9
2.4.3 Greek Report Templates .........................................................................................................................9
2.4.4 SQL Server memory................................................................................................................................9
2.4.5 Clean Historian Log file .........................................................................................................................9
2.5 PACIS CLIENT WATCH................................................................................................................................9
2.5.1 Generalities ............................................................................................................................................9
authorization.
6. COMPUTER C264........................................................................................................................................9
6.1 COMPUTER INSTALLATION...........................................................................................................................9
6.2 SPECIFIC TO THE VERSION ............................................................................................................................9
6.2.1 Introduction ............................................................................................................................................9
6.2.2 Flash re-formatting and new software installation ................................................................................9
6.3 ETHERNET PORT MANAGEMENT ON CPU3 ...................................................................................................9
6.4 RUSSIAN / CHINESE LANGUAGE CONFIGURATION ........................................................................................9
6.5 C264 BOOT PARAMETERS RESTORATION ......................................................................................................9
6.6 TELNET FROM CMT.....................................................................................................................................9
6.7 LOADING MICOM S1 SETTINGS FILE FOR A REDUNDANT C264 ....................................................................9
7. GATEWAY....................................................................................................................................................9
7.1 INSTALLATION .............................................................................................................................................9
7.2 USER DOCUMENTATION ...............................................................................................................................9
8. STATION BUS AGENCY ............................................................................................................................9
8.1 INSTALLATION .............................................................................................................................................9
8.2 USE SBUS AGENCY ....................................................................................................................................9
!" # $
!" # $
This document gives simplified indications to install and to configure PACiS V4.6
components. In any case, please refer to the User Manuals to have complete information.
To install PACiS SCE, PACiS OI and PACiS Gateway, you must be the Administrator of the
PC.
Mandatory: the 'Administrator' user must be with password. It must be the same on all
PC of the application.
Operating System:
The PC which supports PACiS OI must not have "HMI" as Network name.
Only One OI Client can be opened in each PC. OI Client must not be minimized and
also must not be stopped by task bar.
The network name of all equipments on Station Bus can have until 15 characters. It must be
unique among all the devices per Station Bus (except for OI server and OI client). The first
character must be a letter.
With the CMT, the network name must be also less than 15 characters.
Remark:
The Equipment Simulator must be installed on a dedicated PC (i.e. it cannot be installed with
another PACiS application like SMT).
!" # $
2.1 OI installation
For OI Hot Redundancy, see after standard installation (§ 2.1.1) and SQL server
2005 (§ 2.3) § 16.
1. Check if SQL Server 2005 is installed (see information § 2.3) – If no, install it
5. If it's the first setup of PACiS V4.6, delete the Historian Database and Recreate it
by using "Microsoft SQL Server Management Studio"),
(C:\Program Files\USDATA)
authorization.
7. Reboot the PC
9. Reboot the PC
Notes:
• The path for the SharedWorkspace and Temp during Installation can't be
modified, even if the custom installation has been selected.
If you can't replace them, it's because the Windows File protection comes into
action and as soon as one writes into the system32 folder the XML files, it
retrieves the old version. To replace them:
use a software which temporarily disables the Windows file protection,
allowing to copy and paste the msxml<xy> dll files.
!" # $
• To be able to visualise the Help file of OI (by clicking on the Help button of the
Command Banner the OI Client), it's mandatory to have the Acrobat Reader
software installed on the PC.
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
authorization.
!" # $
1. During setup of PACiS OI, select custom installation to be able to select Client
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
components only:
authorization.
2. Use the “autologon” (Install Checkup view, Logon button) box to define on which
OI server the client will be connected
3. Be sure to define the same Windows user with the rights on each PC, and log-on
the PC with this user
!" # $
!" # $
Once Windows operating system detects that the network cable has been
disconnected, the entire network protocol stack is disabled. The Media Sense was
designed to enable the network protocol stack once the network cable is plugged
back into the NIC or cable modem/router, but practically, it is noted that sometimes
this does not work and the network protocol stack remains disabled owing to which
the computer cannot establish a connection to the Internet because Windows Media
authorization.
!" # $
Step 2: In Adjust Time/Date… of windows time, use the Internet Time and enter the
SNTP server IP address
Step 4: For OI Server, W32Time will be started by Agency. But for OI Client, there is no
Agency, so put W32Time in Start up of Windows Start menu.
authorization.
!" # $
Microsoft SQL server Agent service must be running on PACIS OI. So if not running,
you have to start it.
Check the state and the Start Mode of SQL Server Agent, if the state is Running and
the Start mode is Automatic, you don't have to do anything, if not do the following
actions:
• Open the properties of SQL Server Agent by clicking right on SQL Server Agent:
!" # $
%
•
•
& %
!"
'(('(
Click on Start button:
#
$
$( ' (!
• Check the state and the Start Mode of SQL Server Agent:
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
!" # $
!" # $
To limit the use of memory by SQL server, change the maximum server memory. Do
the following actions:
1. Open "SQL Server Management Studio" program and connect to the server
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
name
3. Select memory page, and change "Maximum server memory (in MB)" value to
half of PC memory with a minimum of 1024:
!" # $
4. Then click on OK
This will be install a new job on SQL Server, this job will be periodically flush the
Historian_log file.
There is not usefull uninstallation procedure. If need, you have to suppress it from
Tool SQL Manager.
!" # $
2.5.1 Generalities
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
2.5.2.1 Configuration
Configuration options:
Parameter Description
InactiveTimeLimit (ms) Allowable inactive time limit between two consecutive
alive messages. Default is 300. This value can be
changed to change the time of termination of “Client
Builder” application after freeze detection
StopOnFreeze Action to perform after freeze detection. If value is true,
terminate the client on Freeze detection. Default is true
RebootOnStop Action to perform after termination of “Client Builder”. If
value is true, restart the client after Termination. Default
is true
[WatchConfig]
InactiveTimeLimit=300
StopOnFreeze=True
RebootOnStop=True
!" # $
Startup:
On startup application goes into hidden mode and show in system tray.
authorization.
Show Log:
!" # $
Exit:
2.5.2.3 Logging
This application logs important events to log file. These trace logs can be used to
detect the sequence of events happened during each run.
Contents of log:
!" # $
Backup:
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
Sample Log:
!" # $
4. “Do you really want to change the limit to 200?” Type ‘Y’ (Y=Yes)
!" # $
5. “May these files be renamed until end of patching?” Type ‘Y’ (Y=Yes)
6. A countdown (15 seconds) will be started for rechecking the files. During this
authorization.
7. Another popup will appear asking you if you are sure to keep unrecognized
file versions. Click on ‘Yes’.
!" # $
Note: The countdown and the program execution in the command prompt
window don’t wait for the Windows File Protection pop-ups closing.
8. The program execution in the command prompt window will finish and you will
be asked to press any key to exit. Press a key and reboot the PC to finish the
authorization.
installation.
!" # $
3. Copy the file " PacisSrvkeys.reg" into the install folder of SCADA2000 :
"C:_Program files\USDATA\S2K\Bin"
!" # $
%
& %
!"
'(('(
4. Select Properties
#
$
$) ' (!
6. In "Log On" tab, Select "Local System account" and "Allow service to interact
with desktop"
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
8. Click on Apply, then go back to the "General" tab, and start the service
10. Each time, S2Kserver is stopped; the user has to restarted the PacisSrv
service.
!" # $
Select each installed PACIS components from the list and do the uninstallation.
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
After completing the uninstallation of all installed PACIS Components, restart the
machine and make sure that all the folders created during installation and the
registry entries are removed.
Folders to Check:
• $:\Program Files\USDATA
• $:\Program Files\AREVA\PACiS\PACiSOI
• $:\S2K_HMI
• $:\SharedWorkspace
• $:\LocalWorkspace
• $:\Temp\Trace
PACiS OI:
• HKEY_LOCAL_MACHINE\SOFTWARE\AREVA\PACIS\Configuration
• HKEY_LOCAL_MACHINE\SOFTWARE\AREVA\PACIS\IECCoupling
• HKEY_LOCAL_MACHINE\SOFTWARE\USDATA
XmlParser:
• HKEY_LOCAL_MACHINE\SOFTWARE\AREVA\OdcConfigurationTool
• HKEY_LOCAL_MACHINE\SOFTWARE\USDATA
If any of the folders or registry keys exists, users have to manually remove all those
folders and the keys. Otherwise a further reinstallation could result in a faulty
behaviour of the PACIS System.
!" # $
The installation software asked for the type of the configuration of PACiS Watch
(Executable only or Executable and Service):
!" # $
Uninstallation:
The uninstallation should be used only if you wish to remove definitely PACiS Watch
from the PC. It can only be performed from the Settings/Control panel/Add/remove
programs panel. Be sure that PacisWatch is stopped before un-installation.
“Uninstall PacisWatch” only performs the removal of files created upon installation.
The files created later by using PacisWatch (like paciswatch.txt) are not deleted.
Nota:
!" # $
If the SMT is installed on a different PC that an OI Server, the user has to install the
patch ''EvID4226Patch.exe' which is delivered in TOOLS\SocketLimitationExtension
folder of delivery of PACiS SMT, see installation in § 2.4.
Notes:
- The Help menu is no more available: it will be replaced by a direct access to the
User Guide in a further release
- The COMTRADE converters (2001 or 1997) are now directly installed with the
SMT
- A new parameter has been added to the kernel.ini file. This parameter is used
to define an additional storage path for the disturbance files. The disturbance
files will be store in the default directory AND in this additional directory. This
additional directory name may point to a remote PC identified by its IP address
or a network name.
Example:
DisturbanceAlternateStoragePath = \\PCLD533NT5\Disturbance
- A new parameter has been added during the installation process. This version
support both COMTRADE 2001 and COMTRADE 1997 format for the
!" # $
Files\AREVA\Pacis\Smt\disturbance_converters\COMTRADE2001” to
DisturbanceConvertersPath=C:\Program
Files\AREVA\Pacis\Smt\disturbance_converters\COMTRADE1997 to switch
from 2001 to 1997 revision year of the COMTRADE standard.
- Use of 2 or more SMT Kernel on the same networks (or on networks being
connected)
If you install 2 or more SMT kernel on the same network (or on networks being
connected), you must define specific broadcast addresses for each SMT kernel.
This can be chosen during installation process.
authorization.
Or by editing the kernel.ini file and hmi.ini file in the SMT installation directory
(default folder
SysDBmcastAddress=230.0.0.250
EquipmentMcastAddress=230.0.0.251
LogMcastAddress=230.0.0.252
Those addresses are used by the kernel to send information’s to the HMIs
!" # $
2. Launch SCE_4.56.9.9.F.installer.exe
If the SCE is not installed on the same PC as PACiS OI, do the followings:
8. Reboot the PC
!" # $
If you can't replace them, it's because the Windows File protection comes into
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
action and as soon as one writes into the system32 folder the XML files, it
retrieves the old version. To replace them:
Use software which temporarily disables the Windows file protection,
allowing to copy and paste the msxml<xy> dll files.
Rename the current files (from msxml<xy>.dll to msxml<xy>.dll__), then
copy the new dll files from zip file.
• Using USB dongle, install the dongle management software: Sentinel Protection.
This software is available at : Driver dongle
• To compile ISaGraf project for PACiS SCE and if Microsoft Access 97 is not
installed, you need to install the ODBC driver (dataacc.exe) provided in the MS
Office 97 Value Pack, available either from :
authorization.
• The ISaGraf workbench cannot be launched from the redundant computer in the
SCE. The following procedure must be applied:
• Launch the ISaGraf workbench from the PLC of the main computer in the
SCE,
• Open the "hardware architecture" window (look at the window menu),
• Click on the graphical link between the ETCP network and the "config1"
equipment to select it,
• Right-click on this link and choose the "property" menu,
• Modify the IP address (i.e. replace the IP address of the main C264 with
the IP address of the redundant one).
• To disable merge of Isagraf functions when a PLC contain only one function, add
in SCE.lax : -Dsce.NoPLCMergeForOneFunction="true"
!" # $
• a C264 computer with at least the BIU241 board and the CPU260 board
flashed with the "bootrom" program
• ) , - , . / + * 0 1 23
/4 5 0"64 5 43 / 4 - 10
• ( + 7
• ! 8 4
• 9
• :
!" # $
Warning:
The FTP server software is configured with the default installation path (C:\Program
Files\Areva\PACIS\Computer). If this path has been modified, you must modify the
FTP server parameters.
The computer has a default factory IP address and alias, this need to be changed to the
application specific values.
The settings to enter are:
• 4 $ . . ;
• $ 4 4 . <
4 4 ( 4 "
authorization.
• ! $ 4 4 .
!" # $
6.2.1 Introduction
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
From release C264 B5.14R1 and above, it's mandatory to format the C264
Flash memory using the below procedure.
Fill with the right value: host IP (the address of your PC)
!" # $
Project boards:
The computer mode can be red using “Computer version” menu button.
authorization.
!" # $
%
& %
!"
'(('(
Messages:
Click "YES"
Confirmation pop-up:
00x% done
#
$
$! ' (!
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
Click "OK"
6.2.2.4 BootInstall
"C:\Program Files\Areva\PACIS\Computer\C264_cpu3"
!" # $
Project boards:
All boards:
authorization.
Click "YES"
Messages:
!" # $
In case of error, fill out the field IP 2 on Ethernet with a correct value.
Production boards:
!" # $
%
& %
!"
'(('(
6.2.2.6 Restart computer
#
$
$! ' (!
6.3 Ethernet port management on CPU3
The configuration of the both Ethernet ports is made by CMT:
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
authorization.
Nota: The existing SCADA protocols are DNP3 and T104. You can't have DNP3 on
both ports.
!" # $
Click on Advanced Tab, select the Russian for Russian or Chinese (Popular
Chinese Republic) for simplified Chinese.
!" # $
Needed Tools
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
A Personal Computer is needed. Any Windows operating system can be used. The PC
hardware requirement is:
• = . ) / 0
•( . 4 1
The PC software's needed is:
• = /6 6 <2 . 6 >0 ?
The Serial COM terminal is configured for serial communication with:
• 66@
•( ? '
authorization.
•+ .
It should be care of selecting into PC application the PORT 1 or 2 that is physically wired to
the computer.
Communication wiring
The serial link between PC PORT and MiCOM C264 Maintenance port is made via RS232C
straight line.
!" # $
5
1 1
5
6 9 1 1
9
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
2 2 6
3 3
4 4
5 5
Computer 6 6 PC serial PORT
MiCOM C264C 7 7
8 8
9 9
OR
1 1
2 2
3 3
4 4
5 5
6 6
7 7
8 8
9 9
C0076ENa
authorization.
Connect the RS cable between the MiCOM C264 and the PC, and run the hyper-terminal
program. If the parameters and wiring are correct, the connection is established.
Restart the C264 with a power reset and stop the first count down with any key. The
following prompt is displayed:
[VxWorks Boot]:
A : $ B <
A. $
A4 $C 4 D
A $' 4' ':EF 1
A 4 $C ! EEE"EEE"EEE"EEED
A 1. $
A4 $C 4 EEE"EEE"EEE"EEED
A - $ """
A $C D
!" # $
Settings to enter
• 4 $ . . - 1
• 4 $ . . ;
• $ 4 4 .
• ! $ 4 4 .
• .. - $86 < 4 86 : ,
authorization.
. 1 . 4 !G .
!G . ) H . - 4 4 . - :EF 1
Other parameters should not be modified.
It is now time to configure with the “c” command the communication settings of the MiCOM
C264 Computer.
Enter the Configuration Command:
[VxWorks Boot]: c CR
Each parameter is displayed one by one with each CR. If a mistake is press CR several
times, then restart the operation again.
The stored value is displayed. If nothing is entered, pressing CR will keep the stored
parameter.
The “.” key allows the replacement of the stored value by nothing.
[VxWorks Boot]:
[VxWorks Boot]: p CR
The following information should be displayed:
A : $ B <
A. $
A4 $C 4 D
A $' 4' ':EF 1
!" # $
A $ E
A $C D
A . . $
A 4 $
[VxWorks Boot]:
Now restart the computer with the new parameters, either with a power reset, or by typing:
[VxWorks Boot]: @ CR
After the reboot the computer C264 is ready for receiving the application software. See C264
Installation manual to go a head.
The "Telnet" button from the CMT tool launches the default Windows Telnet client
on the operator PC. Telnet is connected to the selected computer.
This login and this password are the same for each Computer.
!" # $
2. Make a switch of both C264 to change the former Standby C264 to Active
C264
3. Load the Micom S1 settings file into the new Active C264
authorization.
!" # $
7.1 Installation
5. Reboot the PC
Note:
The "setup serveursurclientopc" can be used to register the server on the client.
!" # $
When this mode is used, don't send a ‘counter interrogation’ from SCADA
because this operation sends a ‘reset+freeze’ request. So, the value is
erased and will be indicated as ‘invalid’.
Key = HKEY_LOCAL_MACHINE\SOFTWARE\AREVA\PACIS\TG\MAIN\flag_log
(0 no write else 1 or 2 write)
In case of only one Ethernet board on the gateway and several IP address, Station
BUS IP address must be the first while typing "ipconfig" request on a DOS session.
!" # $
8.1 Installation
below
In the “License agreement” window, click on “I accept the agreement”, then on “next”
!" # $
In the "Select Start Menu Folder" window, select where the shortcut to launch the
Agency will be available (in PACiS folder by default)
!" # $
%
& %
!"
'(('(
4. Reboot the PC
Then click on "Next" then on “Install” to install the components.
#
3. Install WinPcap software, during the same setup of SBUS Agency
$ ( ' (!
Note1:
The agency must be installed on each PC which supports the OI server, the SMT,
and the Gateway.
Note2:
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
VisualNotification = 0
!" # $
Auto = 1
Debugger = drwtsn32 –p %Id –e %Id -g
authorization.
SMT launches SBUS Agency at the first connection of a device, so the colour of the
SMT icon in the system tray at the start up of SMT is yellow.
An attribute has been added in the SCE to configure TCP/IP address for SMT. This
address must be different than OI address.
!" # $
On Windows XP, in this case of two Internet Protocol (IP) address on the same
network board, after a disconnection of the Ethernet network, the primary address is
reset to 0.0.0.0; the primary IP address is not restored after the network cable is
reconnected.
!" # $
- For SMT :
C:\Program files\AREVA\PACiS\Smt\SBUS
- For OI:
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
You can acces to Edit Flag (MVLLOG and OdLogLevel) with regedit:
Key : HKEY_LOCAL_MACHINE\AREVA\PACIS\UCA2Agency
authorization.
!" # $
9.1 Installation
5. Reboot the PC
!" # $
!" # $
%
& %
!"
'(('(
Start>Settings>Control Panel
#
$
$ + ' (!
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
authorization.
%
& %
!"
menu:
'(('(
Click on "Component Services"
#
$
$
' (!
Select "Security Center" from "Services (Local)" item. Click right on Properties
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
!" # $
%
& %
!"
'(('(
Set the option "Disable error reporting".
#
$
$* ' (!
10.4 Settings for DCOM
This chapter describes the configuration of Windows for DCOM access. In this
configuration, the user name "EveryOne" is mandatory. If it dosen't exist, create it
(Add menu)
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
3. Click on "Computers"
%
& %
!"
'(('(
6. Go to "COM Security" tab
#
$
$*! ' (!
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
8. For all Groups and user names, allow "Local Access" and "Remote Access",
authorization.
then click on OK
!" # $
11. For all Groups and users names, allow "Local Launch", "Remote Launch",
"Local Activation" and "Remote Activation", then click on OK
!" # $
- C:\SharedWorspace
- C:\Temp\trace
- C:\Program files\AREVA\Pacis\PacisOI\Server\MemoFolder
Select "Permissions" and for "Everyone", Allow "Full control", "Change" and "Read".
authorization.
2. C:\Temp\trace:
Select "Permissions" and for "Everyone", Allow "Full control", "Change" and "Read".
!" # $
On Windows XP, in this case of two Internet Protocol (IP) address on the same
network board, after a disconnection of the Ethernet network, the primary address is
reset to 0.0.0.0; the primary IP address is not restored after the network cable is
reconnected.
!" # $
3. Select Security Tab, set "Use Default" for "Launch and Activation
Permissions" and for "Access Permissions", set "Customize" for
"Configuration Permissions"
!" # $
5. For all Group and user names, allow "Full Control" and "Read", then click on
OK
!" # $
%
& %
!"
'(('(
#
8. Go to "Location" Tab, select "Run application on this computer"
$+ ' (!
9. Do the same configuration of Security and Location for "NewClusterMgt"
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
10. Do the same configuration of Security and Location for "USDATA Trend
Datasource Server"
authorization.
!" # $
The tunnelling mode allows to connect the MiCOM S1 setting software to a legacy
MiCOM IED using:
• a serial port of the computer
• or the Ethernet network
Computer
front port
• Hyper-terminal
authorization.
• MiCOM S1
C264
tunnel
Legacy port
(Modbus or
T103)
IED
2. Launch the hyper-terminal on the PC (the baud rate is 19200 bauds, no parity)
!" # $
5. Open a tunnel with the TunRSStart command and stop the hyper-terminal
6. Launch the MiCOM S1 in rear port mode and use it as usual (be careful to
the baud rate and the parity which must be 19200 bauds and no parity)
Note: if there is no exchange between the IED and the setting software during
two minutes, the tunnel is automatically closed.
• PatuSpy software
• UCA2 agency
• MiCOM S1
Ethernet network
(UCA2)
C264
tunnel
Legacy port
(Modbus or
T103)
IED
!" # $
2. Install the Station Bus agency (see § 8). Verify you have requested the
installation of “IED PACiS tunnelling” component (all files for tunnelling are in
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
3. Launch PATDbWin and set your parameters (Edit menu). Then close
PATDbWin.
authorization.
4. Launch the Install_oncrpc.bat file (warning: this file should be modified if the
installation folder of tunnelling components is not the default one)
!" # $
• For T103: copy the dll S1V2T103Patu.dll into the folder "..\Micom S1\S&R-
103" and rename it W32KommDll.dll
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
!" # $
!" # $
! " #
- $ ! #
%
%
& '
" (
- $ ! #
#
- )
)
- )
) '
* # +,-!- &-,+" '
!" # $
When this SPS is SET, all C264 alarms are immediately acknowledged.
This SPS cannot be transmitted on the Station Bus network (i.e. it remains local
to the C264).
authorization.
!" # $
On GTW Slave protocol T101, 3 new attributes have been added under a new
category "Balanced mode":
• Balanced mode (Y/N), default N
• Balanced mode retry number (from 1 to 10), default 3
This attribute defines, in balanced mode, maximum of repetition on non
acknowledged frame
• Balanced mode link timeout (from 2000 to 10000), default 2000
This attribute defines, in balanced mode, a timeout between a gateway
information frame and SCADA acknowledgement
Note: These 3 attributes are no more in registry. The user has to define them by
configuration
!" # $
A new attribute 'Goose rank' has been added under all type of dataObject.
This attribute contains the rank of dataObject inside the goose messages (in
SCL or .dm files). It is set to 0 by default. This value indicates that rank is
undefined. It can be modified by the user to indicate the real goose rank of the
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
dataObject.
The defined (<>0) 'goose rank' are not updated if the dataObject is still "transmitted
by goose".
The defined (<>0) 'goose rank' are reset with an undefined value (0) if the
dataObject is not "transmitted by goose".
The undefined (=0) 'goose rank' are set to the last used rank into the whole 61850
mapping.
The Automatic Addressing dialog box allows selecting a new option of 61850 auto-
addressing: 'reset of goose rank' for each C264 (available for multiple or single auto-
addressing). This option is available through a check box not selected by default.
If the check box ‘reset of goose rank' is selected then all goose ranks of 61850
mapping are reset with an undefined value And all goose ranks are re-computed in
a new order.
!" # $
To be able to print French characters (marked characters), you must select the
code page 1004 on the Lexmark 2591/2591n printer. Refer to the printer manual to
modify this code.
Printing service uses Windows spooling primitives. There are some requirements on
spooler configuration in order to ensure an optimize functionality:
authorization.
− A : I < - . 4 : $
- : <
(<
. . . 4 .
. <
. <
: . "
!" # $
%
& %
!"
'(('(
#
$
$ ! ' (!
12.1.3 Network Printer Configuration
The only difference is that the TCP/IP port used by the printer must start with "IP_".
This is not done by default, so after installing the printer, add a new TCP/IP port
from Windows as described below:
!" # $
%
6.
& %
!"
'(('(
Click on "Next" on the following screen
#
$
$
' (!
7. Type the printer's IP address of the printer and click on "Next". Windows
automatically adds the "IP_" prefix to the port number as Port name
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
11. In the Printer properties, choose the port you have created and click on "Apply"
!" # $
- : <
(<
. . . 4 .
. <
. <
: . "
!" # $
!" # $
The local time is available on all sub-system except at the SCADA level, where the
events are dated in UTC time.
Loss of External Clock source: the C264 Master Clock continues to synchronise the
other equipments. A TS fault is set to 1.
All PC (PACiS OI, PACiS GTW, and PACiS SMT) must be configured with the same
time zone, normally country timezone.
authorization.
!" # $
Be sure that the new tztab is compatible with the file included into the release of
SCE:
If both files are compatibles with syntax described above, the current file can be
replaced by the new file.
!" # $
input
TON /
TOFF
Timer value output
Associated to this timer setting, the user can define its name (on 16 characters), the
range of values, the step (the unit is milli-seconds), and if the parameter is visible
read-only, visible modifiable or not visible in the Micom S1.
!" # $
In the C264, the timer setting is taken into account at the next evaluation of the
TON/TOFF operator (i.e. when the input changes).
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
For Boolean operators (i.e. AND, OR, XOR, NOT operators only), one (and only
one) input can be defined as a parameter
Input x
Logical
Operator
Input y output
Boolean Parameter
(the Boolean parameter input is managed as all others Logical Operator inputs).
authorization.
In the C264, the Boolean setting is taken into account immediately (i.e. managed as
the modification of an operator input).
o if YES : the FBD is opened and timer values < 50 ms are erased.
input
TON output
T
The TON operator aims to maintain the output state to “0” during the T timer when
the input becomes different from “0".
The T timer is reinitialised when the input state becomes “0” whatever is the
previous state (i.e. “1” or Invalid)
!" # $
input
TOFF output
T
The TOFF operator aims to maintain the output state to “1” during the T timer when
the input becomes different from “1”.
The T timer is reinitialised when the input state becomes “1” whatever is the
previous state (i.e. “0” or Invalid).
!" # $
13.2.4 SR Latch
S
SR latch Q
R
The SR latch aims to maintain the Q state to “1” when the S input is set, and
maintain the Q state to “0” when the R input is set. When both inputs are at “0”, Q
state is unchanged. When both inputs are at “1”, Q is forced to reset.
Q-1 is the output value before the reinitialization (stored in the C264).
!" # $
Not initialized VAR= Q-1 VAR=1 VAR= Q-1 VAR= Q-1 VAR=0 VAR= Q-1 X
Goto state Goto state Goto state Goto state Goto state Goto state
0 1 1 1 2 2 2
!" # $
1 0 1 0 1
I1 I2 S R Q
1 0 1 0 1
I1 I2 S R Q
1 1 1 1 0
authorization.
!" # $
!" # $
Wait_Ack_Order
Send_Binary_Order / Send_Digital_Order
!" # $
%
& %
!"
'(('(
Exemple:
#
$
$((( '(!
14.2 Use of MPS datapoints
The use of MPS Datapoints is particular:
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
The MPS values inside IsaGraf (via the debugger) are from 1 to 16, whereas in the
C264, the values are from 0 to15.
In IsaGraf, the group SPS states are seen as OPEN (value 4) and CLOSE (value 5)
and not RESET (value 1) and SET (value 2).
• ORDER_OFF / ORDER_OPEN
• ORDER_ON / ORDER_CLOSE
• SELECT_OFF / SELECT_OPEN
• SELECT_ON / SELECT_CLOSE
!" # $
The event printer (LB or SOE printer) state is translated inside the OI to an MPS
value. This MPS is usually known as “Printer Status”. Some new states are treated.
This feature is available only if the printer is connected to the server LPT (parallel) or
TCP/IP port (network) of the PACiS OI Server and was tested with a “LexMark 2400
series” printer. If you plan to use another printer, please ensure that the status
display works properly.
Summary table of the printer status and the corresponding values of the MPS:
Printer Ok STATE0
The printer is in an error state STATE2
The printer is offline STATE4
The printer is out of paper STATE8
Printer is power off or disconnected STATE11
Unexpected value STATE12
!" # $
16.1 Presentation
The PACiS OI can be used as Bay Local OI with the following constraints:
• Compatible with TouchScreen
• A virtual keyboard can be used
• Controls coming from this OI are accepted by a C264 when the bay local
mode is Local
Audible alarms are not managed in Bay Local OI. An external klaxon cannot be
associated to the audible alarm. All information can be archived, but not printed (i.e.
the bay local OI doesn’t manage printers).
authorization.
From a configuration point of view, the Bay Local OI is seen as a single machine,
composed of one client and one server. No additional OI clients can be added. The
server cannot be redundant.
Each Bay Local OI has its own graphical workspace. It can be client of one or
several IEC61850 servers.
!" # $
This virtual keyboard can also be launched by the OI application, by configuring with
the SCE a "run application" button.
authorization.
!" # $
17.1 Specification
The OI Server Redundancy is managed through a set of 2 OI servers named
Cluster.
The OI Clients can be connected on one of the 2 servers. Their configurations are
such as :
o at least one client must have its preferred server declared as Server 1
o at least one client must have its preferred server declared as Server 2
(reminder: each client has in its configuration the list of servers on which it has to be
connected. The first server in this list is the “preferred” server and the client will try to
connect on it first).
authorization.
After the configured inactivity period (used for the automatic logout if configured), an
OI client which is not connected to its preferred server has to try to re-connect to its
preferred server. A pop-up is displayed on the OI client to indicate this re-
configuration.
Server 1 Server 2
!" # $
OI Servers are managed via a state algorithm. The 2 servers are marked in
configuration (Server 1 and Server 2).
START UP
STANDALONE WAIT
authorization.
GOING TO
STANDALONE
MASTER SLAVE
SHUTDOWN
!" # $
!" # $
Server 1 Server 2
START-UP START-UP
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
STANDALONE WAIT
MASTER SLAVE
Server 1 Server 2
authorization.
MASTER SLAVE
PC halted
GOING TO
STANDALONE
STANDALONE
PC start-up
START-UP
SLAVE MASTER
!" # $
Server 1 Server 2
START-UP START-UP
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
STANDALONE STANDALONE
Ethernet connexion
SHUTDOWN
START-UP
authorization.
SLAVE MASTER
!" # $
Server 1 Server 2
START-UP START-UP
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
STANDALONE STANDALONE
Ethernet connexion
START-UP
authorization.
MASTER SLAVE
The management of the OI client number connected to each server to elect the
Master allows avoiding the case where all OI clients are connected to the Server 2
(both servers are Standalone) and this one is shutting-down to allow the Server 1 to
become Master.
!" # $
Each server has to manage its own system datapoints, which have not to be
consolidated between servers (i.e. system datapoints of server 1 are independent of
system datapoints of server 2, but each server has to be aware of the status
changes of the system datapoints of the other server).
In this case, datapoints from this IEC61850 server will be seen in their current state.
!" # $
3) User the “create backup” function to create the secondary OI Server. Do not
add anything in this secondary server
17.2.2 OI Setting
2) Recreate a new Historian Database, see below characteristics of size and log
file
!" # $
3) Start OI Server
5) Switch OI Server
7) Do the actions described into "SQL Server 2005 configuration" paragraph (§ 16.2.3)
9) Check the names of all jobs in SQL Server Agent tab, jobs must be
'CleanLogHistorian', 'HistorianConsolidation', and 'PURGE_...' for purge table. If
there are others jobs, you have to delete it (example: 'PARTIAL_...'):
10) Do the actions described into "Connection and remote access configuration of
on SQL Server" paragraph (§ 16.2.5)
!" # $
Once the database loaded into OI Server, do actions described into "Script
Installation" paragraph.
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
3. Launch SQL Server Configuration Manager from the windows start menu:
"Programs\Microsoft SQL Server 2005\Configuration Tools
authorization.
!" # $
7. Select "This account" and fill field "Account Name" and "Password" with the data
authorization.
8. Click on Apply and on OK (Note the service must be started, if not Click on Start)
!" # $
- Shared memory,
- Named Pipes,
- TCP/IP
To set status enabled, open properties box by a right click on the item
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
- Shared memory,
- Named Pipes,
- TCP/IP
To set status enabled, open properties box by a right click on the item
Remark: VIA is not important
!" # $
Warning:
Be sure you put the correct name, and these names must be crossed on each
server.
Example, at left the text on server OISM, at right the text on server OISR
authorization.
8. Reboot the PC
Server Properties:
!" # $
!" # $
12. Click on OK
Security options:
13. From this tool, expand the tree view until reaching the node "Security\Logins"
!" # $
15. In "Server Roles" page, give all rights (check all boxes on server roles panel)
authorization.
16. In "User mapping" page, for each database, check the "Map" box, and check all
boxes on 'Database role membership' panel
!" # $
• S2KEventMsg_Table_c
• S2KVTQ6_VTQTimeTable_c
• S2KDaily_VTQTimeTable_c
• S2KMonthly_VTQTimeTable_c
• S2KAnnual_VTQTimeTable_c
!" # $
Since they are generated via SQL scripts and not by the OI Server, these files are
not written at the same time as the old kind of CSV, they ensure first the data
consolidation before performing any writing.
WARNING:
While restoring the CSV files, only the old kind of CSV FILENAMES are taking into
account (without ‘_c’ suffix). Therefore, if any file with ‘_c’ suffix is present into the
“ToRestore”directory during the restoration, an error message will appear in the
ScadaTrace:
“Table name '… _c' is not in accordance with to be archived Historian tables”
For restoring the consolidated CSV files they should be first renamed to match the
old kind of CSV filenames (delete the suffix ‘_c’).
!" # $
When right-clicking on the OI Server icon in the task bar the following contextual
menu is displayed:
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
!" # $
By:
For Modbus protocol:
SetPoint address on Modbus is only available for WAGO relay, where output
format is fixed
to UINT15.
[...]
By:
For Modbus protocol:
SetPoint address on Modbus is only available for WAGO relay, where output
format is fixed
to UINT15.
[...]
!" # $
• 6 .: $
4 4 4 4 : <
JKJ 4 4 4 4 : 4
. = :
4 4 4 : "
• 7 $ 4 4 " 64 7 L 6
"64 . M ' ' 44$ $ " M"
•
authorization.
= $ . 4 4 . / E . C
D'C : : D'C D 4 . 4
: 0
• # $ 4 .
• $: 4
. . 4 4 . 4
E /: - 4 4 1 : - 0 A
I"64 . . - 4 4 . 4 -
"
!" # $
In some particular cases, these time-stamp and validity might be overridden by the
S2K server; this is defined in the next paragraph.
Reminder: The datapoint generated by S2K server are time tagged by S2KServer.
There are two cases for the time-stamped by the S2K server.
Case 1: Refresh is older than the last refresh, for the same object (”jump backward
to the past”):
Treatment:
The S2K server sets the time-stamp value. The source is the S2K server.
!" # $
%
& %
!"
7. CONNECTION
'(('(
Document : H15x EN GL/B23
18.4 Ethernet Switch User documentation addendum
#
$
$()+ '(!
7.1 - Fault indication contacts
1-2 Common
authorization.
WIRING RECOMMENDATION: For safety reasons and for compliance with the European
Commission Low Voltage Directive (73/23/EEC), the authorized voltage rating to be applied
on the "Fault Indication relay" is limited to 75 Vdc or 50 Vac and should not exceed 5A.
!" # $
The actions described below are the first actions the user has to process.
1. Open the upper database (Energy_upper.mpc) and delete all IEC physical devices
from system part (Scs), all FBD equations. Don’t change the name of the substation.
2. In case of multiring arcitecture (i.e. the use of IEC61850/IEC61850 gateway), the OI
which is client of the IEC/IEC gateway will be able to display interlock viewer.
Note: the ILK bypass is not allowed from this OI
3. On the system part, add an" IEC generic IED", set its short name, long name, network
name and its TCP/IP address the same as the IEC61850/IEC61850 GTW on the
lower network, in our example: GTWT101M and TCP/IP address: 192.169.0.55
authorization.
4. From the GTW, launch the "Edit relation" in the contextual menu, click on the tab
"To", click on the item "manages: Bay [0..65535]".
!" # $
!" # $
5. On GTW_IEC, change the short name and long name of the Operating mode of the
GTW_IEC. These names must not be the same as name of Operating mode of the
GTW on the lower network
!" # $
%
6.
& %
!"
'(('(
server to be compatible with upper network.
#
$
$(!) '(!
Change the "short name", "long name", "network name" and "TCP/IP address" of OI
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
authorization.
%
7.
& %
!"
'(('(
#
$
At this stage, you can import the xml model GTW_IEC_PROT1_13.3.xml file.
$(!! '(!
8. Click on “Import…” to brows the PC in order to find out the xml file
9. In the upper bow , select the xml file, then in the bottom listbox, select the GTW then
Click on “Set” button (a message box is displayed “IED model import in progress
please wait”)
10. Click on “Close” (a message box is displayed “IED model setting in progress, please
wait")
CONFIDENTIAL. All rights reserved. AREVA. Passing on and copying of this document, use and communication of its contents are not permitted without prior written
At the completion of the import process, check that all "has for IEC address" relations in the
electrical part are filled with the right logical device.
11. Fill the relation between OI server and IEC/IEC GTW (named "has for IEC61850
server").
12. Check in the upper database.
13. If ATCC automatism is present in lower database, do not validate the option "IEC data
model optimisation" (menu Tools/options)
14. Generate the upper database
authorization.
!" # $