0% found this document useful (0 votes)
43 views

Chapter3 System Configuration

This chapter describes the system configuration options in the CSC-2000(V2) monitor system, including: 1. Graphics properties to set colors for topology elements like voltage classes. 2. Operator configuration to set validation rules for telecontrol operations like requiring double authorization. 3. Label editor to define custom labels or "hanging boards" that can display on graphics elements to convey status. 4. Autostart configuration and substation properties for other system settings. It also discusses the network node manager for configuring services on host machines in the system, and user management for permissions. The system configuration allows customizing many display and behavioral aspects of the monitoring system.
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views

Chapter3 System Configuration

This chapter describes the system configuration options in the CSC-2000(V2) monitor system, including: 1. Graphics properties to set colors for topology elements like voltage classes. 2. Operator configuration to set validation rules for telecontrol operations like requiring double authorization. 3. Label editor to define custom labels or "hanging boards" that can display on graphics elements to convey status. 4. Autostart configuration and substation properties for other system settings. It also discusses the network node manager for configuring services on host machines in the system, and user management for permissions. The system configuration allows customizing many display and behavioral aspects of the monitoring system.
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 15

CSC-2000(V2)Monitor System –Engineering Maintenance Manual Chapter III System Configuration

Chapter III System Configuration


Contents

1 LOCAL SETTING.........................................................................................................1
2 SYSTEM CONFIGURATION..................................................................................2
2.1 GRAPHICS PROPERTY.........................................................................................................................................3
2.2 OPERATOR CONFIG............................................................................................................................................3
2.3 LABEL EDITOR...................................................................................................................................................5
2.4 AUTOSTART CONFIG..........................................................................................................................................6
2.5 SUBSTATION PROPERTY......................................................................................................................................7
3 NETNODE MANAGER...........................................................................................8
3.1 NODE MANAGEMENT.........................................................................................................................................9
3.2 NODE APPLICATION CONFIG...............................................................................................................................9
4 USER MANAGER..................................................................................................11
4.1 USER MANAGEMENT.......................................................................................................................................11
4.2 USER GROUP MANAGEMENT...........................................................................................................................13
5 History Configuration..............................................................................................14

Chapter III 1
CSC-2000(V2)Monitor System –Engineering Maintenance Manual Chapter III System Configuration

1 Local Setting

Enter local setting by start menu shown as following figure.

Fig.1-1
The interface of local setting is shown as follows. The local configuration is used to start/stop
some functions of system and test whistle and bell. As the shown in the graphics, the function
of start/stop here includes whistle and bell, alarm print, alarm voice, VQC Enable. Hook “”
in front the item of function and after confirmation, the corresponding function can be started,
otherwise, getting ride of “” means to stop the function.

Fig. 1-2

Chapter III 1
CSC-2000(V2)Monitor System –Engineering Maintenance Manual Chapter III System Configuration

It needs to note that the four items of local setting have direct relation with the start/stop status
of dinout, printserver, voiceserver, VQC of node application config in netnode manager. Only
in the working condition of these services in netnode manager, selecting corresponding function
item in local setting can be effective. If the service in netnode manager is in prohibited status,
even if the corresponding enable item has been hooked here, the relative service can not be
acquired.
No matter whether it is I/O card or sound signal to drive whistle and bell, the premise of bell
and whistle is that guarantee the pitching on Enable function of bell and whistle here.
If it needs to play voice file, it needs to guarantee the startup of voiceserver in a set of host in
the system (refer to 3.2 chapter of node application config). At the same time, the enable
function of alarm voice here has been pitched on.

2 System Configuration

System configuration includes the configuration of graphics property, operate config, label
editor, autostart config and substation property. Shown as following figure. Click
Applications->System Manager,enter interface of system configuration.

Fig. 2-3

Chapter III 2
CSC-2000(V2)Monitor System –Engineering Maintenance Manual Chapter III System Configuration

2.1 Graphics Property

Open page box of graphics property of interface of system configuration, shown as following
figure. Set the color of relative items of graphics topology coloring and marking color by
interface. The purpose of coloring is easy to identify relative parameters by graphics’ colors,
such as voltage class, whether wire is live or not.

Fig. 2-4
If you want to change the color configuration of certain item, click the button of color of
corresponding item to pop-up color palette, select needed color and confirm.

2.2 Operator Config

Open page box of operator config of interface of system configuration shown as following
figure. Set all operations in connection with telecontrol by the interface.

Chapter III 3
CSC-2000(V2)Monitor System –Engineering Maintenance Manual Chapter III System Configuration

Fig. 2-5

2.2.1 Operate of Double Seat

Pitching on the item means the operator and monitor personnel shall complete validation of
operation of telecontrol authority in different computers. If there is no pitch-on, at this time,
operator and monitor personnel need to complete validation operation of telecontrol right in
sequence in one set of computer.

2.2.2 Fail-safe

If fail-safe enable of full station is selected, system will inquire fail-safe service in telecontrol of
breaker and switch equipment.

2.2.3 Station Lock

Station lock is the judgment of digital input of telecontrol lock. If station lock is pitched on,
when digital input prohibited telecontrol, system prohibits to telecontrol unconditionally. If
there is no pitched-on station lock, when digital input prohibited telecontrol, system will
automatically prompt operator “the current telecontrol is locked, continue telecontrol?” Of
course, to realize above-mentioned function, require system have digital information points
corresponding to digital inputs. The name of several digital information points has requirement.
It is only “full station general block” or node name (node ID of node manager) + “lock”. The
node name of computer distinguishes upper/lower case.

2.2.4 Don’t operate on SLD

If pitching on this function, prohibiting telecontrol in the graphics whose type is Single-line

Chapter III 4
CSC-2000(V2)Monitor System –Engineering Maintenance Manual Chapter III System Configuration

diagram and established in graphics edit (not only the established “Single-line diagram .graph”)

2.2.5 Password Valid Time

It is the valid period of once inputting password by operator and monitor personnel in
telecontrol operation, and in the period, it do not need to input again.

2.2.6 Configuration of Telecontrol Validation

As to the equipment requiring telecontrol operation, such as breaker, isalotar, strap, tap raising,
tap lowering, tap stop and general control, you can set validation of operate code, operator,
guardian and operate select respectively according to the requirement. The validation of operate
code is the validation of additional tag set in set box of operate property in real-time database
configuration. If operate select validation is not pitch-on, that is, operate select button of
operate page turns grey when executing telecontrol operation, and operate select automatically
executes without manual operation. If the operate select returns successfully, the executive
button of operate lightens and can be operated, otherwise, it reports timeout. If it needs operate
select validation, the operate select button of operate page is available. It must to click the select
button to make operate select.

2.3 Label Editor

Open page box of label editor (in running SCADA, label is also called hanging board)of
interface of system config shown as the following figure.

Fig. 2-6
In order to meet different requirement of user in different places, system opens hanging board
in electricity system. It can be defined by users themselves. Offer two configurations of “IED
information can’t be received” and “Don’t operate”.
Besides the requirement of defining name of board, it need to define corresponding graphics
element of board . Click “Select Element”, select suitable mark graphics element for hanging
board. (Make in element editor). When hanging board in running condition, it will display the
content of mark graphics element for hanging board. The size of board can adjust the default
size in graphics edit component.
Chapter III 5
CSC-2000(V2)Monitor System –Engineering Maintenance Manual Chapter III System Configuration

“IED information can’t be received” aims to interval. When the board hung in certain
equipment pitches on the configuration, the report of the bay which this equipment belongs to
will not be disposed. The function mainly avoid that the large quantity of alarming in interval
debugging phase influences the normal work of system. “Don’t operate” aims to equipment.
When the board hung in certain equipment pitches on the configuration, the equipment here
main means the breaker, switch, the system prohibits having operation of telecontrol to the
equipment.

2.4 Autostart Config

Open page box of autostart of interface of system config shown as following figure.

Fig. 2-7
Autostart means it can automatically start some applications and among them the “real-time
alarming window” is default after the completion of user login.
Here, the item of “QuickLauch” is a group of conventional shortcut collection defined
according to the requirement of users. It can to open the relative applications expediently in
required occasion by the interface of “QuickLauch”.
The configuration of autostart is saved in local host, so the configuration of autostart each main
station can be different.
The common method is to configure monitor running window as autostart, thus, user can
automatically enter single-line diagram after login.

Chapter III 6
CSC-2000(V2)Monitor System –Engineering Maintenance Manual Chapter III System Configuration

2.5 Substation Property

Open the page box of substation property of system configuration interface shown as the
following figure.

Fig. 2-8

2.5.1 SafeDay

The content here is the information of number of days of running in security in information bay
in the left upper corner of the screen. If the system is secure without any fault, the value is
increasing daily until the happen of fault and begins to count again after manually modify
initialized value.
After modification, it immediately reflects. It needs to note that the current host can
immediately reflect the number of days of security running after modification, but other host
can reflect modified number of days of running in security on the second day. If wanting other
hosts to reflect immediately, only restarting the user desk in corresponding host is OK.

2.5.2 Bell and Whistle Using Speaker

When it is event alarm, it is not by I/O card driving bell and whistle but playing local voice file.
If the function is enabled to use, it can prohibit I/O process when configuring process in node
application config.

2.5.3 IC Card

User identity validation is realized by IC card and need to enable the function;

2.5.4 Fingerprint

When user identity validation is identified by fingerprint, it needs to enable the function;

Chapter III 7
CSC-2000(V2)Monitor System –Engineering Maintenance Manual Chapter III System Configuration

2.5.5 Fail-safe Integration.

If it is pitched on, it is used to start embedded fail-safe function. If it is not pitched on, it means
the fail-safe system is come from exterior manufacturer. Refer to relative chapters of engineer
book and user book for the relative specific content of fail-safe integration. After the enable of
integrated fail-safe function, it needs the enable of function of “fail-safe on using” of
configuration page of operate of system configuration (2.2 of the chapter). Thus, judge logic
rule of fail-safe when having telecontrol.

3 NetNode Manager

Click Applications->System Manager->NetNode Manager,start node manager. Node manager


is to administrate each host in the same network. It must enter by the identity of super user to
administrate, and it is the same as latter user manager and process manager.
The node manager has two pages shown as following figure: node management and node
application config.

Fig. 3-9

3.1 Node Management

Node management page displays some functions of showing node, adding network node,
Chapter III 8
CSC-2000(V2)Monitor System –Engineering Maintenance Manual Chapter III System Configuration

deleting network node, showing node status and saving to database. The showing network node
shows name, ID, two IP addresses of the node and so on. If adding a new computer into
network, it can add a network node and then save to database. Editing node is also the same;
The showing of the status of network node is to display whether the network connection of each
computer in the network is normal or not.
The records here are usually added automaticly after installation. If there is special requirement,
of modifing the content and it needs to note: the ID of node is the name of added and modified
computer (need to distinguish upper/lower case ,and can be acquired by DOS command
“hostname”). The name of node is the description of computer and usually the same as node ID.

3.2 Node Application config

Page of node application config is shown as following figure which is diveided into “Local
Host App Config” and “Local Host Propetis Config”

Fig. 3-10

3.2.1 Local Host Propetis Config

Configuration the host whether it is operator and main operator station and refer to the
Chapter III 9
CSC-2000(V2)Monitor System –Engineering Maintenance Manual Chapter III System Configuration

explanation in graphics for the relative definition and explanation. Only the node set as operator
and main operator station can make telecontrol operation. The difference between operator and
main operator is exist only while the number of nodes of operator in system exceeds three and
the telecontrol requires that operator and monitor personnel are in different computers. At this
time, require one operator station to make telecontorl, thus monitor personnel monitors in main
operator station.

3.2.2 Local Host App Config

Displaying relative services requiring configuration. the status of service can be set as stop,
start,wait, and refer to the explanation of graphics for the relative definition and explanation. It
needs to note: as a rule, system required relative service can only be in work status in one set of
host and backup in another host. System can only have topology in one node, so the toposerver
of node can configure in one set of host. After the completion of configuration, it needs to re-
start the system and then configuration effects.
FailSafeServer:Start integarted fail-safe service or fail-safe interface of exterior manufacturer
in the host. Among, configured file of integarated fail-safe service is config\wfserver.ini. The
fail-safe configured file of exterior manufacturer is config\wfserver.sys ,and there is specific
introduction to the specific application of fail-safe interface.
VQC: Start VQC process in the host;
Dinout: If the computer is configured with I/O card and need to start the process; there is a
configured file config\dinout.sys related to the process.It needs to configure the file after
configurin this service. Refer to the explanationa and instruction to make corresponding
modification in file when configuring;When sound signal to drive bell and whistle, the time of
playing bell and whistle voice file can be configured in the file;
DRServer: The host starts DR communication process. It is used to dispose the process of DR
Reprot of Sifang Corporation;
TopoServer:The process for disposing the coloring of network topology .
IEC61850: If the system Enable 62850 relative equipments,I it needs to start the process.
RTUServer : The service process for the Csc2100 system and RTU server, and there is a
configured file config\trans300e.sys related to the process. After configuring the service, it
needs to configure the file and refer to instruction and example in file to make corresponding
modification of file when configuring;
Cscentry: The service process for external issue of Csc2100 system. When it needs to transfer
information to the third party, start the process, and there is a configured file config\cscentry.sys
related to the process. When it is required, make corresponding modification according to the
explanation and example in the file;
PrintServer: Needing to start the process when the host is configured with printer;
VoiceServer:Start the process when it needs to play voice file.
Formula : Complete resolution work of formual logic by host which starts formual
calcualtioon service;

Chapter III 10
CSC-2000(V2)Monitor System –Engineering Maintenance Manual Chapter III System Configuration

4 User Manager

Click Applications->System Manager->User Manager , start user manager shown as follows.


User manager is used administrate user and set the operation authority of each usergroup. The
operation authority is divided into four classes which are superuser, engineer, opreator and
viewer. It need to point that it must enter with the identity of superuser to take following user
manager opeation, such as add, delete user or modify the existed authority of users.

Fig. 4-11
Shown as the figure, user administration has two pages of marks: user management and user
group management.

4.1 User Management

Shown as above figure, the left is user management menu including four function buttons of
adding user, deleting user, editing user and save to database; the right is the information of all
users.
1) Add user:Click “Add”, shown as following figure.

Chapter III 11
CSC-2000(V2)Monitor System –Engineering Maintenance Manual Chapter III System Configuration

Fig. 4-12
Fill new user name in user name textbox and fill password in user password textbox and select
its authority and then click “OK”, finally it needs to click “Save” to save the result to database
and its display is shown as below figure.

Fig. 4-13
2) Delete User

Fig. 4-14
Click “Delete”, and the interface is popup as upper figure appears. Select deleting user in the
pull-down list box and then click confirm to delete. Finally, click “Save” to save the result to
database.
3) Edit user : Firstly, pitch-on certain user and click “Edit” to modify the user name, user
authority and its password and then confirm to complete. Finally, click “Save” to save the
result to database.

Chapter III 12
CSC-2000(V2)Monitor System –Engineering Maintenance Manual Chapter III System Configuration

4.2 User Group Management

Fig. 4-15
The left half part of user group management is four user groups and the right half part is the
configuration of authority of each user group shown as upper figure.
Firstly, click the user group which needs to set and then set each item in right side. In the options of
right side, the options of “Scada Running”, “Curve”, “DeviceMan”, ”RealTime Alarm”, “Report” ,
“Port Manager” in italic blue have subordinate options. Click to pitch on the option, all authorities of
subordinate options under the option will be endowed to user. If you want to endow authority of one
subordinate option to user, click the option with the right key of the mouse and appear the
configuration box of operation authority shown as following figure. Pitch-on operated item of user
group and confirm it.

Chapter III 13
CSC-2000(V2)Monitor System –Engineering Maintenance Manual Chapter III System Configuration

Fig. 4-16

5 History Configuration

History configuration involves two files: config/config.sys and config/hisconfig.ini. The


configured file adopts simple format of configuration file, that is format of “Property=value”. In
the two files, config.sys is used to read the information of master and backup nodes which are
necessary of dual history service. Hisconfig.ini is used to configure database type, database
user, command, terminal port of master and backup and so on. Refer to the relative content of
installation of Chapter II for the content of this part.

Chapter III 14

You might also like