Automation Studio User Manual - UC 500
Automation Studio User Manual - UC 500
2.3 2013-05-03 Incl uded more information in the Automation Module chapter.
2.4 2013-07-10 Incl uded Areas of Responsibility chapter
2.5 2013-07-24 Incl uded new features of UC 500 vers ion 8.0.0 or a bove: changes i n Areas of
Res ponsibility a nd in Get System Log.
3.0 2013-08-08 Vers ion corresponding to Automation Studio 2.6 Rev.4 or l ater.
INTRODUCTION
Chapter 1 - Introduction
INDEX
1
1.1 PURPOSE ................................................................................................................................................................... 1-3
1.2 SCOPE AND AUDIENCE ................................................................................................................................................ 1-4
1.3 REFERENCES ............................................................................................................................................................... 1-5
1.4 I NTRODUCTION .......................................................................................................................................................... 1-6
1.5 HOW TO GET STARTED ? .............................................................................................................................................. 1-7
1.1 PURPOSE
To help Automation Studio users configure and manage UC 500 devices. For device hardware and software
installation and maintenance procedures other documentation is need, please refer to the specific UC 500
product documentation.
1.3 REFERENCES
1.4 INTRODUCTION
1
The UC 500 Configuration Editor is an Automation Studio IDE module designed specifically for managing and
editing the configuration of UC 500 devices. It includes several editors, productivity tools, a device builder
and a communications driver.
This document describes user features and provides hints on how to use them in a productive way. Please
note however that this guide does not cover IDE-wide features such as windowing, device management,
loading, saving and backing up device configurations , project and build system, etc. Before going through
this guide the user is advised to read the IDE Guide 4.
For the experienced engineer the tool is intuitive and provides built-in descriptions of all configuration
parameters so that minimum documentation reference is required during use.
An automation engineer which is inexperienced with this device model will, in most scenarios, need to read
this document1 to get started and be able to handle most configuration activities. If you already know how
to use the IDE you can skip the IDE Guide 4 and go directly to chapter 2 and 3.
In chapter 2 the UC 500 configuration model and the common IDE configuration features are introduced.
In chapter 3 the configuration process is described from a general perspective. From there the user is
directed to specific chapters for guidance on each step or on how to properly handle the configuratio n of
each module. In each specific chapter the reader will find the information which is required but not easily
perceived from the configuration editors and built-in descriptions.
Several annexes are included at the last chapter providing additional insight on specific issues.
1 This document is comprehensive but note that reading referenced documentation may also be necessary.
This document as well as any other required product documentation is included with the tool and
accessible via Start Page or Help menu.
INDEX
1
2.1 UC 500 DEVICE FEATURES AND APPLICATIONS............................................................................................................ 2-3
2.2 PRINCIPLES OF O BJECT-ORIENTED CONFIGURATION ..................................................................................................... 2-4
2.3 UNDERSTANDING UC 500 O BJECTS............................................................................................................................ 2-5
2.4 O BJECTS ON THE USER I NTERFACE ............................................................................................................................... 2-6
2.5 ABOUT MODULES ...................................................................................................................................................... 2-7
2.6 MODULE EDITORS ...................................................................................................................................................... 2-8
2.7 ENTITY TYPES EXPLAINED............................................................................................................................................ 2-9
2.8 SELECTING REFERENCES TO ENTITIES .........................................................................................................................2-10
2.9 DEFAULT VALUES .....................................................................................................................................................2-11
UC 500 device is a communications gateway between remote units or IEDs and control centers. It also
executes functions of communications network management, local automation or soft PLC, communication
with IEDs and SCADA HMI.
The general configuration of the UC 500 device includes the configuration of: data points, controls,
synchronism module, watchdog, redundancy and generic device parameters, as well as the HMI and the
several communications protocols. The HMI includes alarms and trends management, mimi cs and event
logs
Object-oriented configuration introduces many benefits over the conventional table/form-based approach
of configuring devices. Previous device or SCADA engineering tools provide number of forms and tables,
usually a GUI front-end to a database matching its internal characteristics quite closely.
Although this device tool does not make use of automation objects, an object-oriented model of the device
configuration is employed. This model provides views based on configuration objects, their specific
configuration parameters and relationships between the objects. Objects can be created and deleted and
cascading updates ensure configuration is always kept consistent during editing.
The major benefits of this lie on the fact that the defined object model are oriented towards the user needs
and way of thinking and not the internal database model itself, namely:
Presented GUI views closely match the natural objects the user needs to manage
Most unneeded or redundant configuration tasks and parameters are eliminated
The amount of knowledge the engineer needs to have on the specific technological
implementation is reduced.
To keep it short this reduces the learning curve and enhances user productivity.
An UC 500 object model (a given device configuration) can be conceptualized as a box containing a number
of objects of different types. Objects are entities (digitals, analogues, counters and controls), engineering
units, hierarchy levels, serial ports, conversion functions, modules, control centers, emulated RTUs,
communication channels, remote units, alarms, SOE/Event-log triggers, mimic pages, etc.
Each object has a specific type (in table 3.1 the most relevant object types are described). Objects expose
different configuration parameters according to their object type (serial ports have baud rate, stop bits,
etc.) and are related to each other in natural associations (the serial port of a given control center number
is COM1). There are also objects that are similar to each other (all control center objects share some
common parameters, but DNP 3.0 slaves have specific parameters that are not available in IEC 60870 -5-101
controlled stations).
Process System or user interface process that runs on the device to provide a
given functionality.
Automation Studio Designer introduces this virtual object type to allow
Module functionally-oriented views. A module represents a set of functionality
implemented by one or more processes.
Communication channel for obtaining data and sending controls to
remote RTUs or IEDs. Each communication module will provide
Channel
protocol-specific channel parameters and expose other related object
types.
Represents a remote RTU or IEDs available at a given channel. Each
RTU / IED communication module will provide protocol -specific RTU / IED
parameters.
Represents a control center to which the UC 500 device behaves as an
Control Centre RTU or IDE. It also represents the associated communication channel.
Each communication module will provide protocol -specific parameters.
A control center emulated RTU. Most protocol implementati ons allow
Emulated RTU/ IED the user to define more than one RTU for a given channel thereby
emulating several physical RTUs. Each communication module will
provide protocol -specific parameters.
Table 2.1 Overview of some UC 500 object types
Each object type has a specific name and icon that is consistently used in the IDE so that the user
immediately knows what object type is being handled.
When working with the tool the user repeatedly views, check, creates, deletes or modifies the selected
object or set of objects. Objects can be selected by interacting with one of several available views (any
window in the IDE is actually an object view).
In the screenshot above the user is changing the serial port of an IEC 60870 -5-101 controlled station that is
selected. The drop-down is showing all the serial ports available on the UC 500 device and the user is
actually manipulating a reference to an existing serial port that is to be used by this object to communicate
with the actual remote control center front-end.
All objects also have a specific unique identification so that they can be referenced to in any scenarios,
serial ports are referenced by their COM number and control centers are referenced by their unique
number. In fact, any object in the UC 500 model ha s a specific parameter, named Id, which corresponds to
its unique identification.
The UC 500 device software is modular in order to adapt the unit to distinct applications. Functional
modules are organized by functional scope: user interface (chapter 6), automation (chapter 8), local
networking (chapter 11), control center communications (chapter 10) and IED/RTU communications
(chapter 9).
On the left side of the panel, the user can find a tree view, hierarchically representing the current
configuration of the module. On the right side, there is a grid with the entities (or other objects) co ntained
within the selected object on the tree view. The user may delete, fill up/down, and copy from/to grids and
external tools such as spread sheets.
On the toolbar, the user can find several features, such as adding new objects, filtering the grid view and
hide/unhide advanced columns.
To search by entity identifier, the user has to enter a pattern. For more information about patterns and on
how to use regular expressions and wildcards, please refer to 4.
2
As with most objects in the IDE the common operations available for every module are available at the
context menu.
The user has the possibility to set default values for almost every parameters of all kind of objects. These
values are kept for each existent kind of object and per device configuration.
As shown in the figure above, in each parameter, there are several options:
The user may also manage those values manually through the file defaults.def, in the configuration folder.
ADOPTING A CONFIGURATION
PROCESS
Chapter 3 - Adopting a configuration Process
INDEX
1
3.1 PROCESS GUIDANCE.................................................................................................................................................... 3-3
3.2 I TERATIVE CONFIGURATION AND MODIFICATION ......................................................................................................... 3-5
3.3 MANAGING CONFIGURATION VERSIONS...................................................................................................................... 3-6
Device Setup
Review Hardware Configuration
Design Mimics
Configuration
Point List
Add Entities
Automation
Programming
Communications
Communication Settings
UC 500 Configuration
The recommended activity workflow to be employed during the configuration phase of the project is
summarized above. This workflow identifies the major steps to undertake as well as general activity
precedence. Please note that this is not a strict process to follow but a general guideline.
The decision to employ a given process must consider the actual team characteristics, project constraints
and project type (new system or system expansion).
Regarding whole system configuration you can adopt a bottom-up approach (remote devices configured
1 first and UC 500 after) or a top-down approach (configure UC 500 first and remote units after), the tool
supports both. A bottom-up approach is usually recommended when IEDs are used and a top-down
approach, the more conventional approach, when remote units are simple RTUs or I/O modules. More
frequently than not, the adopted approach is a mixed approach3.
Four major configuration tasks (in terms of workload and differentiating engineering skills) are identified: (i)
core configuration (device setup, data model configuration and user interface), (ii) mimics design, (iii)
automation logic programming and (iv) communications setup. These major tasks ca n be performed
sequentially or in parallel, by the same or different engineers. Adequate tool support for any of these
strategies is included.
4
Major Tasks User Profile Reference
Core configuration Database engineer Chapters 4, 5 and 6
Mimics design Graphic designer Chapter 7.5
Automation logic Automation or control engineer Chapter 8
programming
Communications setup Communications engineer Chapters 9, 10 and 11
Table 3.1 Tasks and engineering skill sets
Independently of the adopted approach, particularly if a multi -disciplinary team is working cooperative on
the configuration phase, an integration and validation task should be foreseen prior to the FAT phase.
3 Note that some productivity features such as the IEC 61850 SCL import wizard will yield better results if a
bottom-up approach is used.
4
Remaining chapters 2, 12, 13 and 14 are applicable to all user profiles.
Actual configuration performed by the user is frequently performed iteratively, in small consecutive steps,
leading to an incremental process. Although editing, validating and testing are distinct activities for each
user profile and different features or tools of the IDE are employed, the activity cycle is quite similar (see
figure below).
5
Note that in the current tool release modifying the Mimics or the Automation modules does not auto-
update the configuration version. In such cases the user must ensure it is manually updated.
INDEX
1
4.1 NEW DEVICES ............................................................................................................................................................ 4-3
4.2 EXISTING DEVICES ...................................................................................................................................................... 4-4
To add new UC 500 devices to a device project the usual IDE template-based approach is employed (see 4
for details on adding devices to device projects). After selecting the UC 500 device model and desired
template the user is prompted to enter template parameters as well as the device order code. The newly
created device configuration is based on the selected template and some model and order-code related
parameters (see 5.1), such as available serial ports for UC 500 E devices, are automatically setup for you.
After creating a new device all basic device configuration is ensured by the tool and you can perform any
additional configuration and/or deployment at once.
Source How-to
Choose Add Existing Device command from Solution
Live device on the network Explorer context menu, select UC 500 device model
(previously configured by and enter connection parameters. The newly created
Automation Studio Designer) device will extract the current available configuration
on the live device to the project.
The most common step to take after adding a new UC 500 device to a project is to setup hardware-specific
configuration and select software modules to run. This is usually a quick and simple select task because the
tool sets up the correct configuration in most scenarios.
Chapter 5 - Setting-up Software and Hardware Modules
INDEX
1
5.1 DEVICE MODULE AND ORDER CODE ............................................................................................................................. 5-3
5.2 LOCAL AREA NETWORK I NTERFACES............................................................................................................................ 5-4
5.3 SERIAL PORTS............................................................................................................................................................. 5-5
5.4 SELECTING SOFTWARE MODULES................................................................................................................................ 5-8
5.5 SETTING UP THE MAIN MENU AND TOOLBAR.............................................................................................................. 5-9
5.6 W ATCHDOG.............................................................................................................................................................5-10
5.7 LOCAL CLOCK SYNCHRONIZATION O PTIONS...............................................................................................................5-11
UC 500 devices may have different hardware options such as platform (generic or embedded PC), number
of serial ports, availability of hardware watchdog, redundant or single configuration, etc. Depending on
these options different software configuration options must, may or may not be setup or enabled.
By selecting the correct order code when you add a new device the tool sets up all hardware-dependent
required settings for you. You may later change the device order code at the Properties Window of a loaded
Configuration Settings.
Available on the Advanced Settings command of the Configuration Settings context menu (Processes tab) is
the list of system processes that run once the device is started.
Note that these are advanced options that do not require modification in all but very specific cases. The tool
modifies these options automatically according to other settings chosen by the user. Any incorrect editing
of these parameters may disrupt device operation.
Additional UC 500 E specific advanced settings (available on the Advanced Settings command Configuration
Settings context menu, Files tab) allow the user to fine tune flash disk access. When you create a new UC
500 E device these settings are already setup for you targeting the most commonly used scenario.
Depending on device hardware you may need to manually add all required serial ports (as available on the
6
device ). UC 500 device may contain a maximum of 64 serial ports. If you create a new UC 500 E device all
available serial ports are created automatically for you.
Serial ports may be used by communication modules or by local printers and have specific configuration
parameters such as baud rate, stop bits, number of bits per byte, parity or hardware handshaking. For serial
port configuration please select Serial Ports on the device Configuration Settings context menu.
To a given serial port you may attach a generic modem, a modem with external radio or a telephonic
modem (if direct cable links are used Modem physical medium should be selected).
Figure 5.2 Configurations using Modem physical medium (standard modem, direct cable, integrated
radio/modem, PLC modem, etc.)
6
Note that the COM number must correspond to the installed serial port on device.
Figure 5.3 Configurations using Radio physical medium (standard modem with external radio)
Serial cable
External
UC 500 COM COM
modem
Phone network
Figure 5.4 Configurations using Telephone physical medium (switched network, GSM, etc.)
The required settings for each physi cal medium type are made available to the user at the serial port editor
by manipulating the toolbar filter or at the Properties Window. As physical mediums may not be supported
by every protocol the configuration validator will detect invalid options.
Depending on which module is using the serial port a redundant serial port may also be defined. In such
scenarios the communication channel is physically duplicated (protocol stack is unaware of physical
medium duplication). Several redundancy options exist and may or not be applicable to a given protocol
(read the protocol specific chapter for more information). The configuration validator is capable of
detecting invalid options.
Redundancy options available are:
Option Notes
When set to accept incoming messages on both channels any message received
Receive Mode on either channel is processed. When set to accept messages on active only any
message received on the inactive channel is discarded.
When set to send messages on both channels any message to be sent is
duplicated and sent simultaneously on both channels. When set to send
Sending Mode
messages on active only messages are not duplicated and sent on the active
channel only.
If set the active port is controlled manually by the user (via local user interface or
Manual Mode control). If unset the automatic failure detection mechanisms are employed to
decide which channel should be active at a given moment.
Sets which events are considered to detect channel failure (only used in
Failure detection
automatic switch mode).
Switch Mode Sets when the active port is switched after failure detection (immediately or after
receiving a valid message).
Table 5.1 Options for duplex channel operation
If your attached modem is used as a networking modem and not as a serial device the interface will not be
available as a COM port but as an IP network interface and would be used like any local area network
interface.
7
Other module configuration parameters are also available at the Properties Window.
Even if you are setting up a gateway or controller configuration without a SCADA user interface please be
sure to check 7.1 on choosing the user interface applications available to the user and the layout of the
main menu toolbar (this is a required step for any configuration).
5.6 WATCHDOG
1
Local software watchdog is used to monitor the operation of each module, thus allowing automatic
recovery procedures to be employed after failure detection. To configure watchdog options for a given
module check the Properties Window when the object is sel ected. The default watchdog options for newly
created devices provide default protection (no changes required in most scenarios). Other common
protection features such as real -time database backup and restart limit are available as parameters of the
loaded Configuration Settings object.
Please note that not all modules support all watchdog options, the configuration validator will issue errors
in such cases.
After setting up the software modules the user should select the clock synchronization source by simply
setting the corresponding parameter at the Configuration Settings object (only modules that may provide
clock synchronization are shown on the list). If you select no synchronization source the local PC clock will
be used as time source.
The UC 500 data model comprises the setup of all the entities (see 2.7 for an overview of UC 500 entity
types) that are to be available on the device real -time database, as well as the general structuring of the
data model.
Entities are created according to source (see 2.7 for an overview of UC 500 entity sources). Local entities are
created in the Hierarchy View (6.1). Remote entities are created in the corresponding RTU/IED module
editor (9 and 11). Diagnostic entities are handled automatically by the tool when the user creates, deletes
or modifies any configuration object that may contain diagnostic entities.
In case of remote entities a communication structure is employed to organize the entity set: RTU/IED
module, Channel, RTU/IED, etc.8. This is the module structure that is mainly used by the automation
engineer to handle configurations.
Entities may also be structured in a hierarchy of user-defined folders, known as hierarchy levels (6.2). This
structuring of the entity set is usually employed to structure the data model according to system or user
specific rules or functional levels. This structure is usually process related and is used on the unit’s user
interface for filtering or other operator interface purposes. It is therefore focused on the system operator
needs and part of the unit’s configuration.
The data model may also be grouped into areas of responsibility. The system engineer divides the data
model into areas of influence that each system operator manages.
8 The lower levels of this structure depend on the data model of each protocol
Chapter 6 - Configuring the Data Model
INDEX
1
6.1 THE HIERARCHY VIEW ................................................................................................................................................. 6-3
6.2 HIERARCHY LEVELS ..................................................................................................................................................... 6-4
6.3 ENGINEERING UNITS................................................................................................................................................... 6-5
6.4 AREAS OF RESPONSIBILITY........................................................................................................................................... 6-6
6.5 IEC 61850 MODEL ................................................................................................................................................... 6-9
In the Hierarchy View, the user may see all the entities defined for the selected device. Filtering can be
done by kind of source, type, Id, as well as by hierarchy level. It is an editor where all entities can be edited,
independently of the source.
9
If the hierarchy level id is terminated with a $ character the level is considered to be a system hierarchy
level and is show in different color to the tool user. Such levels usually contain diagnostic entities or
supporting entities (entities that are typically not of interest for presentation on the unit’s operator
interface).
Just select an area of responsibility, and press either the Hierarchy Levels button or the
Entities button or the Mimics button .This will enable the user to choose what to
associate with the selected area of responsibility.
As mentioned previously, there’s a different way of associating objects to areas of responsibility and that is
when configuring entities, hierarchy levels or mimic pages/folders. Each entity, hierarchy level or mimic
page/folder has a property named Areas of Responsibility which allows the user to define which areas the
entity, hierarchy level or mimic page/folder is associated with. By editing this property the user is presented
with an Area of Responsibility selector as seen below.
10
Earlier versions of UC500 might limit the number of entities and/or hi erarchy levels
Automation Studio 3.0 includes an IEC 61850 model on UC 500 devices that are IEC 61850 -8-1 clients. The
SCL model does not have any servers, therefore all logical nodes are under th e access points.
When the configuration is loaded, Automation Studio detects if the UC 500 device has any IEC 61850 -8-1
configuration and it creates the SCL model based on the current configuration. The structure is as follows:
IED (UC 500 device)
o Access Point (at least one, but each IP configuration will represent an Access Point)
Logical Node (related to Hierarchy Levels)
By default, for each Hierarchy Level there will be a Telemonitoring Interface Logical Node. However, the
user is able to customize this and determine whether or not the Hierarchy Level should have a
representation on the IEC 61850 model. The user can also modify the type of Logical Node the Hierarchy
Level is represented on the IEC 61850 model (e.g. Telecontrol interface, Human machine interface, user-
specific).
The user can also create specific logical nodes and later assign a Hierarchy Level to that logic al node.
If a logical node is associated with a Hierarchy Level, then whenever there’s a new mapping, the created
entities will be associated with that Hierarchy Level.
INDEX
1
7.1 USER INTERFACE APPLICATIONS AND LAYOUT CONFIGURATION ..................................................................................... 7-3
7.2 EVENT-LOG ................................................................................................................................................................ 7-4
7.3 ALARMS ..................................................................................................................................................................... 7-5
7.4 TRENDS...................................................................................................................................................................... 7-6
7.5 MIMICS ..................................................................................................................................................................... 7-7
7.6 NETWORK TOPOLOGY...............................................................................................................................................7-10
7.7 PRINT-FORMS ..........................................................................................................................................................7-16
7.8 SETTING-UP AUTOMATIC MAINTENANCE OF LOCAL DATABASES .................................................................................7-17
7.2 EVENT-LOG
1
The events log keeps information on entities state changes, control execution, alarm generation and user
actions like alarm acceptance and beginning and ending of sessions. This log, depending on the
configuration, can be directed to database and/or printer.
The user can add entities to the event log, mapping existing entities.
7.3 ALARMS
Alarms can be generated by controls execution failure or entities state changes to states considered as
alarm. A control execution failure occurs when a control (or controls sequence) can’t be executed because
of unavailable resources in the central unit, final states failure, interlocking or failed on sending to the
executor process. The alarms generation is configurable individually by possible entity state e by control,
and it can be performed immediately or deferred.
An alarm has individual existence (independently of the entity or contr ol that led to its generation) and a
limited life time. There may be multiple active or inactive, accepted or not accepted alarms for each entity
or control. Alarms keep active during the period on which the entity keeps the state that generated the
alarm. If the entity changes it state to any other, the alarm goes to inactive. The active state of an alarm is
not applicable to alarms generated by failure of controls execution.
The alarms generated by controls execution failure are immediately removed from the alarms database
when accepted by the user. The other alarms can be removed from the database immediately when
crossing to the inactive state or just when they are in the inactive state and accepted. The central unit can
also be configured to keep just the last alarm of each entity.
The alarms have 5 main attributes: priority, description, value, local date and origin date. Priority is a
number between 1 and 255, which indicates the severity of the event that caused the alarm. The
description is a text that identifies the alarm and the value, when available, is the entity value after the
event that caused the alarm. The local date is the date assigned by the central unit on the event detection
that caused the alarm. The origin date, when available, is the date of the event occurrence assigned by the
acquisition unit.
The alarms generator is responsible to insert in the database the generated alarms in the unit and manage
the database.
To create an alarm, the user has to associate it to an entity.
7.4 TRENDS
1
Trends keep historical information of the entities evolution (digitals, analogues and counters). The trends
record is generated either on-event (upon status entity changed) and also periodically (cyclic).
The user can add entities to trends, mapping existing entities.
7.5 MIMICS
To activate this module on the UC500 configuration go to the Advanced Settings (the configuration must be
loaded) of the Configuration Settings and - if it does not exist already - add an entry with the well-known
WEBSERVER process, after accepting the changes the module should appear as shown on the previous
figure.
1 The mimic display engine in UC 500 devices supports the full mimic object model except for the following
restrictions:
Fill animation unsupported;
Write variable actions are not supported;
Only one navigation action per element is supported;
Text wrapping is not supported;
Definition of quality status on mimic animations is unsupported. Onl y values are allowed;
Different start and end caps are not allowed;
Standard animations on multistate symbols and numerics are not allowed;
If a style animation is applied to a text, and its length changes, its background color size doesn't
change with it;
Silent execution controls are only supported on the version 6.2 or higher.
Execute control actions do not support the value with expressions.
Note that when a multistate state is introduced as a scripting expression that expression will be rounded to
an integer, for example, if the expression returns 3.3 then the value that the state will hav e will be 3,
because the HMI500 only support integers for the states value.
In the multistate definition users can associate to a state a tagged value with the key UC500_StateDesc and
set the value with a string that should correspond to the description of that same state value in the
database entity configuration. A state can have multiple UC500_StateDesc to support multiple descriptions
for a given state.
The build compiler of the mimic’s will give a warning when it finds an entity that animates a multistate with
a state with a description that is note found in the tagged values of the state, this validation will only occur
when there is at least one Tagged Value with the key UC500_StateDesc ( Case Insensitive).
Starting in the 7.3.1 version of the UC500, the user has the possibility to check the properties of a given
entity of the RTU. The following table describe each properties of the entities can be query in the mimics
configuration.
Gets the entity level, in terms of value ranges , values don’t make sense for digital
entity type,
Level
For the analog entity type (0-very low, 1-low, 2-normal, 3-high to 4-very high,
etc.); counter entity type doesn’t have the very low nor low concept.
IsImposed Gets if the entity value is imposed (value forced, usually by an operator).
IsManualOffscan Gets if the entity is in manual offscan (usually performed by an operator)
IsAutoOffscan Gets if the entity is in automatic offscan (usually determined by the equipment)
Gets if the entity value has overflown (usually determined by the equipment)
InOverflow
This attribute only applies to analog and counter entity types.
IsAlarmUnaccepted Gets if the entity alarm state was not acknowledged yet
Controls
IsUnderControl Gets if the control is currently being controlled by an operator.
Table 7.1 Scripting properties
Starting in the 8.3 version of the UC500, the user has the possibility to execute some actions of the HMI500
on a given element of the mimics configuration. The following table describe each action available.
Action Description
Execute Script
Note that the scripting properties or the actions available for the device are presented in code snippets in
the editor.
The configuration for the static colors of the topology is made on the User Interface Advanced Settings
on the Network Topology tab (this is only visible when the module is activated).
By default, the template of the UC already contains definitions for the static colors , but it is given the
possibility for the user to remove a given color definition.
To configure the network topology objects on the mimics model just select a given graphic object or a
symbol definition and go to the Property Pad and set the property Type that is under the Network Topology
category (as shown on the Figure 7.10).
After defining the network topology type of the object, the configuration tool will display the specific
property for the chosen type of equipment.
As stated before the type of the network topology equipment can be defined also on the symbol definition,
this will state that all instances of that symbol are from the type defined, any properties of the topology
object that are defined on the symbol definition cannot be defined override on the symbol instances. If the
value of the properties are left undefined then they can be set on each instance.
To create connections between the different equipment’s of the topology the connectivity model of mimics
should be used. To learn more about the connectivity model and tools please refer to 2.
On the network topology model all objects that are a part of the topology have a
Type Description
None Object does not belong to the network topology model.
1 Source Cha rge or l oad of the network, element that make the network live or
energized.
Li ne Connectivity nodes that are colored, the elements ca n received a signal from the
Bus Bar IED tha t states if the equipment i s energized or not.
Tra ns former Connectivity node.
Ci rcui t Breaker
Equi pment that will switch the state of the connection. Ca n contain more than 2
Ci rcui t Switch termi nals.
Ea rthi ng Switch
Ea rth Equi pment that will give the s tate Earthed to the network.
Ca pa citor Ba nk
Connectivity node.
Feeder
Ba y
Provi des a means of grouping pieces of equipment together to represent
Sub Network el ectrical containment.
Compound
Object tha t belongs to the network topology but it does not feat on any of the
Other a va ilable types. It is not colored.
Provi des the representation of the electrical device that converts alternating
11
Recti fier current (AC), whi ch periodically reverses direction, to direct current (DC), which
fl ows in only one direction.
Table 7.3 Network Topology types.
A system library containing symbol definitions samples for almost all equipment types described on the
Table 7.3 can be found in the Automation Studio tool.
11
Only available on the UC 8.3 or higher.
12
State Description Value
Not live Not Energized 0
Live Energized 1
Earthed Earthed 2
Live & Earthed Energized and earthed (abnormal danger situation) 3
Loop Closed path between connectivity nodes 4
Loop & Live Same as the loop state but energized 5
Loop & Earthed Same as the loop state but earthed 6
Loop & Live & Earthed Same as the loop state but energized and earthed 7
Invalid If any of the entities of connectivity nodes have invalid values >= 8
Table 7.4 States description and coloration value.
It is possible as a Beta functionality, to generate the network topology graph. To enable this feature go to
the IDE options on the Automation Studio.
If the network topology compiler does not detect any errors, then a file DeviceName.gv will be generated
on the Output mimics folder.
12
These are the values written by the topology engine on the status variables of the lines or busbars.
13
To export the file generated to a visible image you need to install the GraphViz .
Execute the following command on a Command Prompt to generate the visualization, replacing the
14
parameters that are in italic.
To enable text search in the graph view, export to SVG (scalable vector graphics) using the command , to
view the SVG use a browser (Internet Explorer, Chrome, Opera or Firefox..).
This feature allows a fast detection of errors that were not detected by the network topology compiler and
an entire overview of the network topology model.
13
http://www.graphviz.org/, this program is a third party that does not ship with the tool.
14
The Graphviz program path and version depends on the user personal options on the installation, in here
it is used the default options.
Figure 7.15 Sample of Graphviz output for the Network Topology sample.
7.7 PRINT-FORMS
1
The lists printing is based in layout models named print-forms. A print-form is a text file written i n an
interpreted language (script). This language allows the definition of several kinds of objects, like drawing
objects (lines, rectangles, ellipses with and without text associated, images and regions); one object of list
definition and one object of margins definition. Each UC 500 list viewer based in list will use its own print-
form, it should be named as <process name>.pfr. If this file doesn’t exist, the viewer will use the default
print-form. If neither of them exists, the printing features are inhi bited.
For language definition, please refer to 16.2.
All the information of trends and event logs is kept in a database for which periodical automatic
maintenance may be setup. Database maintenance parameter involve: the time and period, directory and
data backup.
After each maintenance action, the database is compacted and repaired, to effectively remove the occupied
disk space.
Note that a maintenance action implies that all runtime processes that access to the database turn off
temporarily, which means that the visualization and generation processes will have no access to the
database while the maintenance is occurring.
INDEX
Automation Module
Programs have two important tools to be referred: “Add Device Variables” and “Create Missing Device
Variables”.
In the “Add Device Variables” tool, the user can select one or more entities from the database and will
create a program variable for each UC 500 entity. By default, this tool will map entity status therefore, in
the “DeviceId” property will appear the entity name with the suffix .stVal. If a control entity is selected it
will be mapped to a control variable in Automation module and no suffix is needed.
In the next table you will find the default mapping from UC 500 entities to Automation variables.
15
Type Sub-type Source Status Mapping
Single Must be mapped to Boolean type from System Library.
By default mapped to the Dbpos enumeration type but can
Double
be other integer type from System Library.
Digital
2-bit Enumerated
3-bit Enumerated Remote By default mapped to an Int32 type but can be other integer
type from System Library.
4-bit Enumerated Local
Diagnostic
Analogue n/a By default mapped to a Float32 type but can be Float64 type
Automation
Counter n/a either.
Command
Control Sequence Must be mapped to a VariableId type from System Library.
Set-point
In entities source is Automation, variables can be input or output in Automation Module. Otherwise,
variable must be input. For control entities, if source is Automation, you can process the control execution
inside the Automation module.
If it is intended to map quality or timestamp from an UC 500 entity, instead of the status, it is necessary to
write in the “DeviceId” property the entity name with the suffix .q or .t respectively instead of the .stVal
suffix.
The “Create Missing Device Variables ” tool will create an entity, with Automation source if kind output and
Local source if kind input, for each input and output variable that refers an entity that does not exist in the
database. Only variables mapped to controls or status will be created in the database.
15
Changing the default mapping of UC 500 entities may result in problems when simulating the entire
device.
In all RTU/IED communication protocols configuration, the user is required to create channel objects within
which RTU/LRU or IED objects are to be placed (actual object structure depends on specific protocol
characteristics). RTU/LRU or IED objects are entity containers and represent actual physical devices from
which remote entity values are obtained and controls executed.
Note that there is a hard limit of 255 on the number of channels in given UC 500 device and of 256
RTU/IEDs (of all protocols combined). Other limits on the number of objects may also be in place depending
on protocol or protocol options.
Chapter 9 - RTU/ IED communication
INDEX
The IEC 60870-5-101 controlling station implements the unbalanced (master -slave) protocol option.
In this protocol, the maximum number of channels that can be configured is 255 and the maximum number
of RTUs is 256. Note that there is only one logical remote unit (LRU) (that corresponding to one common
address of IEC application layer) for each RTU of link layer.
The process communicates via serial port, supporting every physical medium with half or full duplex
operation. It is not possible to establish, for a given channel, distinct baud rates for sending and receiving.
Each serial port can have, as an option, a redundant serial port.
It is possible to import CC 101 Emulated RTU from another UC 500 into a scanner RTU.
In the first step of the wizard user can chose a device from any project of the current solution.
In the next step user can select the RTU and define import options :
In this protocol, the maximum number of channels that can be configured is 255 and the maximum number
of RTUs is 256. Note that there is only one logical remote unit (LRU) (that corresponding to one common
address of IEC application layer) for each RTU of link layer.
It is possible to import CC 104 Emulated RTU from another UC 500 or from Efacec Devices into a scanner
RTU.
In the first step of the wizard user can chose a device from any project of the current solution.
In the next step user can select the RTU/IED and define import options :
The next step is only available in case of selection of Efacec Devices. In this step user can define the rules
that will be applied in ID generation.
Please note that the previously rules may lead to repeated Ids. In order to create all entities and
automatically give the next available Id, the option Resolve Id Conflicts of the step before this should be
checked.
In this protocol, the maximum number of channels that can be configured is 255 and the maximum number
of RTUs is 256.
The process can communicate via serial port, supporting modem and radio as physical medium, with half or
full duplex operation. It is not possible to establish, for a given channel, distinct baud rates to both ways.
Each serial port can have, as an option, a redundant serial port.
In this protocol, the maximum number of channels that can be configured is 255 and the maximum num ber
of RTUs is 256.
The process can communicate via serial port. It is not possible to establish, for a given channel, distinct
baud rates to both ways. Each serial port can have, as an option, a redundant serial port.
Modbus is a master-slave protocol, which implements the telemetry of digitals, analogues and counters,
allowing controls execution of type digital or analogue. The protocol mode can be ASCII or RTU, via serial
port.
Modbus defines 4 memory zones, where IO can be found to be read or changed. Those zones are: Output
Status (from 1 to 10000), Input Status (from 10001 to 30000), Input Register (from 30001 to 40000) and
Hold Register (from 40001 to 48000).
The process polling works configuring the polling time of digitals, analogues and counters. The process will
try to request the memory zones assigned to each one.
The process communicates via serial port, supporting only Modem as physical medium and he doesn’t
support alternative serial port.
This protocol is a master-slave protocol, this means the protections will only send data if they are asked to
do so.
This protocol communicates with the protections through a serial port, supporting only Modem as physical
medium and supports alternative serial port. Its main task is to update entities with real time values
obtained from the protections, such as communication status, internal digitals, measures, digital indications
and events.
The process starts automatically and it will initialize all protections, detect communication failures,
synchronize protections, get events, status and analogues, allow remote setting from the command center
and send requested commands to the protections.
The protocol accepts requests from the command center to the protections, and sends them to the
protection channel. It will wait for the protection response and sends that response back to the command
center. This allows communications with all the protections without having to stop the protocol.
There are two types of channels: norma l and bypass. To a normal channel there are protections associated
to it. The protocol will scan all protections in all channels, asking for their status and/or values and then
updating those values in entities. So, for the communications with the protecti ons, a time scanning for each
channel must be defined. A bypass channel will communicate with a command center. The protocol will
“listen” this serial port for messages, send those messages to the channel (normal channel), waits for the
response which will send back to the command center. To this channel, a bypass timeout is defined. The
protocol will wait this time (after a command center has sent a message) for another message from that
command center. If it doesn’t appear, the protocol will proceed with its normal polling to the protections.
After a Bypass Channel ends its polling, the protocol will initialize again the protection.
The protocol knows to which channel it must send the message checking the address of the message sent
by the bypass channel, and finding where is the protection with that address. So, if bypass channels are
used, it’s necessary that all protections have different addresses.
The UC 500 Modbus driver shall connect to a RTU through a TCP/IP socket, so for each RTU it will exist a
TCP/IP connection to the RTU.
The connection between the UC 500 and the RTU´s are invisible to the UC 500, but some network delays
shall be considered:
• Typical transport delay is about 700ms for few packets transfer
• Typical transport delay after a new open TCP/IP channel is about 1500ms to 5000ms. But in some
cases it can be 60000ms. This time will be configured in the UC 500 database.
The connection management cannot be done in the UC 500, since it cannot access to GPRS modem, so
every time a GPRS connection falls down, the RTU shall initiate the procedure for login in the GPRS network.
Every time the UC 500 ModBus driver try’s to initiate a ModBus transaction like input status polling, and has
no answer, it shall repeat the message after the described transport time timeout. After a maximum retry
number, it shall give the RTU as failed and shall request messages to do general interrogation, since all data
of RTU will be invalidated.
User can define polling maps. A polling map defines a sequence of readings, using two kinds of trigger
methods:
hour scan or cyclic scan.
The hour scan defines that the scanner shall poll the defined zone at the defined hour.
The cyclic scan defines that the scanner shall poll the defined zone in a periodic way.
The check coil is for Pollar only where, before reading the map zone, the scanner shall set that bit and then
reset.
This scanner allows the use of 32 serial ports, being possible to collect data of 48 ABB modules for each
serial port.
The events, analogues and digitals scan intervals are programmable, becoming possible to optimize the
scanner operation, depending on the number of protections and entities requested to them.
An entity that does not have complementary events associated, on event entity, can be reported only with
timetag information, simply by specifying in its definition that it is pretended to obtain only timetag
information.
Controls can be added to allow the writing in the protections records. To check if the control was
successfully executed, it is possible to associate an analogue to it, which is refreshed with value read from
the record, after the control execution.
The scanner supports several device types already defined, but the user can create more, by choosing the
submenu Device Types in the scanner node.
The JBus scanner may work in two distinct modes, Events and Digitals.
The scanner allows to program the entities requests that the user want to obtain from an IED. Those
requests are distributed by blocks.
The requests are always executed in words, even if the user only pretends to obtain the value of one bit.
The words attributes must be with the Reg Status enabled, to be seen by the CC.
The channel is going to be associated to a serial port, and in general this is connected to an RS -485
converter, which allows to have several IEDs in the same channel. It should not be mixed IEDs of different
brands in the same channel. In the particular case of SEPAM, synchronism should be activated at the
channel level, to achieve a bigger precision. The “Write Enable” parameter is used to condition the writings
relative to the SEPAM parameterizations.
The device function mode, in the particular case of SEPAM, is usually Events, and the “Read Events”
parameter limits the number of requests of consecutive events made to a SEPAM, if it has many events to
report, thereby limiting the time spent with that SEPAM.
To other IEDs, the function mode should be Digitals, except for EMS SAINCO and SEPAM, which should work
in Events mode.
The “Device Type” parameter should be correctly filled, depending on the IED to use. If the IED type is not
within the available types, the GENERIC type should be chosen.
Counter entities are only used in SEPAM devices.
9.9.1 WORDS
The words to ask an IED can be distributed by 8 blocks. Each of these blocks may have more than one
application set of words. The scan period of each block is defined by the parameter “Scan Block”.
Special blocks:
Block 1/ Fast: This block works like a normal block if the scanner is operating in the Events mode. But if it is
in Digitals mode, then the entities that are in this block are requested with a time scan different than the
other blocks.
General Block: In this block all entities are placed, specially the digital entities that are requested when a
general interrogation is executed.
All Blocks: Entities are requested in all blocks.
8 Odd Blocks Only: Entities are requested only in the odd blocks.
Even Blocks Only: Entities are requested only in the even blocks.
CONTROL CENTRE
10
COMMUNICATION
Chapter 10 - Control Centre Communication
INDEX
Control center communication is setup by creating control center objects (locally representing the actual
remote control center and also the physical or logical communication channel). Control centers contain
emulated RTUs. The UC 500 device is capable of emulating one or more physical RTUs on each channel. UC
500 may contain a maximum of 8 control centers and each of them can only communicate through just one
protocol.
An entity in the UC 500 configuration may be mapped to a given emulated RTU (by selecting it using the
entity selector). Such entity maps include protocol specific options such as data type or protocol data object
address16.
16
Please note that if multiple control objects are added in a single operation, the tool automatically verifies
if they should have the same object address, but with different values. In such cases, controls are mapped,
being assigned the same object address hence easily solving the control multiplexing engineering issue
common with most modern protocols.
This protocol can be defined as the synchronization master, which means that if so, it synchronizes the unit
real-time clock.
This protocol can be a master-master and a master slave protocol (either balanced or unbalanced protocol
options are supported).
The process can emulate, for each control center, several remote units, either on logical layer (RTU) either
on application layer (LRU). This ability allows a flexible and powerful data structuring, important benefit for
applying UC 500 as protocol converter unit or data concentrator. Each emulated RTU of logical layer is
composed by a distinct logical layer entity. The emulated RTUs of application layer associated to an
emulated RTU of logical layer are grouped in one application layer entity. It is possible to have a maximum
of 128 emulated RTUs of logical layer. However, regarding emulated RTUs of application layer, it is possible
to have as many as the addressing space of the protocol allows.
The process can communicate via serial port, supporting every physical medium with half or full dup lex
operation. It is not possible to establish, for a given channel, distinct baud rates to both ways. Each serial
port can have, optionally, a redundant serial port.
UDP support, known as Ethernet, is available for balanced and unbalanced logical layers. This
implementation is limited to proprietary UDP unicast.
There is an application entity (LRU) for each emulated RTU of logical layer. All the emulated RTUs of
application layer share the same application entity that contains 8 transmission queues for pri ority
handling.
Each IEC file (identified by a unique logical address) is mapped uniquely in a file of the files system of the
operative system. A single file can’t be in a state of upload and download at the same time, but several files
can be transferred simultaneously.
For a better performance, the objects addresses for the same kind of object to place in the same queue
17
should be contiguous and in the same range of addresses .
17
Please note that there is a feature that optimizes address space. It is enabled in any object within the
module, except for entities.
11
LOCAL AREA NETWORKING AND
DISTRIBUTED AUTOMATION
Chapter 11 - Local Area Networking and Distributed Automation
INDEX
NTP client can be defined as the synchronism master. The user can define several local interfaces and NTP
servers as well.
NTP process is an NTPv3 client, limited to unicast mode, which allows the central unit synchronization to
take as synchronism source one or more NTP servers.
This protocol uses a mapping of entities in MMS format and not in IEC 61850, this is due to the fact that a
MMS stack is used and the requests are done in MMS. The difference between those two formats relates to
the inclusion of the Functional Constraint in the string that identifies the entity. The Functional Constraint
characterizes the services that are allowed on a certain Data Attribute.
IEC 61850 allows mapping IEC entities in UC 500 entities. IEC 61850 may work with cyclic requests of
entities and Reports Control Block or just one of them.
All IEC 61850 compliant devices have a corresponding SCL file containing the description of the device
database (this file can alternatively be generated by the device tool). Such files are produced according to
the IEC 61850-6 XML format that may be imported by this tool to automatically generate the IEC 61850
entities and protocol -specific configuration. The wizard can be found on the toolbar of the IEC 61850 -8-1
configuration window.
To use the wizard the first step is to select and open the SCL file to import (the wizard is capable of reading
any SCL file type (CID, ICD, SSD, SCD, etc.).
In the second step the user selects required data objects from the SCL file (any set of complex data objects
or simple data attributes may be selected).
As of version 3.0 of Automation Studio, the configuration of IEC 618850 -8-1 in UC 500 can also be carried
out using the SCL editor. For more information about the SCL editor please read IEC 61850 and Third-Party
Devices manual.
In UC 500, the SCL editor is client-based which means datasets and control blocks cannot be created. The
user is able to configure the data flow of Reports in much the same way as with the SCL Import Wizard.
Please read chapter 6.5 to learn how to build the SCL model and how it relates to the hierarchy level.
The following example shows the data flow configuration of a UC 500 device, with multiple inputs being
received by report. Each circle represents one or more associations. The user can double-click on an
association and it will expand to the first association found.
18
Depending on this information being available on the input SCL file.
By pressing the button the user can control how the entities are named when mapping the new input.
A wizard similar to the one mentioned above in Figure 11.2 is shown.
The user is able to configure multiple inputs more easily and inspect the flow of information quite rapidly
using this editor.
SNMP manager is a communications process that implements the SNMP communications protocol.
In this process, the maximum number of channels that can be configured is 255 and the maximum number
of RTUs is 256.
The process can emulate, for each communication channel, several agents. Each agent has a community
key, which is the community identifier where the SNMP Manager is going to get connected to the agent.
This process supports SNMPv1 and SNMPv2 versions of the protocol.
SNMP supports the needed functionalities for an implementation of a Network Management Station. The
supported services are reading, writing and event reception (traps).
INDEX
When the user loads a configuration, a copy of the database is created and all the changes the user makes
are kept in that copy. When the user saves the configuration, those changes are copied to the main
database, and it is compacted.
The validate process can be full or partial. The user may validate the entire device, or one module that
belongs to it. The validate process is enabled in UC 500 devices and in all its modules and objects.
The build process can be full or partial. The user may build the entire device or one module that belongs to
it. The build process is enabled in a few modules of the UC 500 device.
14
COMMUNICATING WITH THE
DEVICE
Chapter 13 - Communicating with the device
INDEX
For handling the device configuration, the following commands are available:
Deploy Configuration: The deploy command deploys the device configuration to the device using
the address defined in the default connection.
Get Configuration: The get command gets the configuration from the device using the address
defined in the default connection, to the selected device.
Reset Defaults: Restores the factory configuration on the connected device. This does not affect
your current configuration and requires the user to perform a “Get Configuration” command to
update the local configuration.
Restore Previous Configuration: Restores the device to the configuration before the last one that
was sent by the user. This does not affect your current configuration and requires the user to
perform a “Get Configuration” command to update the local configuration.
These commands allow the user to communicate with the device. They all need a defined connection, and
the user will be asked to give a user name and a password, so the user must be authorized to access the
device. This commands run externally. The user can follow the process in the Task Manager pad, and check
for any errors that may occur in the Output Window pad.
In versions of UC 500 under 6.1.0 a first deploy may fail if file “device.manifest” is missing in the device. If
this problem occurs user can simply copy manually this file located in folder “Configuration” of local device
to folder “Config$” shared in remote UC 500. This operation only need to be done one time, and only if the
this error occurs.
In versions of UC 500 previous to 7.2.0, in redundant configurations, the “Deploy Configuration” action of
configurations must be done twice, one for each unit. If the CLP500.ini file is also included in the action, it
must be modified before each deploy to ensure that the configuration of main and backup unit are
maintained.
For handling the system log, the following command are available:
Get System Log: Retrieves the system logs available on the device, overriding any previous file that
may have already been retrieved before.
In device with firmware version up to 6.1.2 the following files are retrieved:
Error.log: Provides information about errors that may have occurred during device operation.
After that version until version 8.0.0, the following file is also available
CfgSrvLog.log: Provides information regarding device interaction done through the management
interface.
14
PRODUCTIVITY AND REFACTORING
TOOLS
Chapter 14 - Productivity and Refactoring Tools
INDEX
Tool Description
Copy-paste The user may copy and paste any UC 500 device and most objects on it, between
devices and between IEDs, spread sheets, etc…Please refer to 4.
The user may import and export device packages and import an UC 500 database.
Import/Export To be sure that the imported database is consistent within UC 500 features, refer
to 3.
19
Id replacer The user may replace entity identifiers of several objects within the device.
19
Translator The user may translate descriptions of several objects within the device.
19
Comparer The user may compare databases.
Optimize database The user may optimize the database of the selected device.
Statistics The user may see statistics about objects within the device
Table 14.1 Productivity tools
Most of these tools are at the Tools item in the context menu of the Configuration Settings, note that the
majority of the features described here are only available in the Designer Edition.
19
Only available on Designer Edition.
The refactoring tool is very useful. When the user modifies an entity identifier, he will be asked if he wants
to apply changes to Final State Equations, Inhibition Conditions, Automation and Mimics modules, note that
this functionality is only available in the Designer Edition.
8
Figure 14.3 Refactoring options
The same applies to Control Centers identifiers.
To safely modify entity identifiers, the user should choose all the options at the refactoring window options
or in the item Options of the Tools menu. For a more comprehensive replacement, the user may use the
wizard to replace entities identifiers.
If the user wants to translate several descriptions, the better way is to use the Translate tool. It works
exactly like the id replacer wizard but performs integrated replacement on descriptive texts.
The user can compare the selected device database with another da tabase, including Mimics also.
Tools Options
Remember Include Entities If false, the user will be asked whether or not to include missing
Decision entities of checked entity maps in Control Centers .
8 If true, missing maps of selected entities in checked Control Centers
Include Missing Maps
communication objects will be included.
If Automation Object was created in a Symbol, a new file will appear next to the symbol, with the extension
“.uc500.src”.
Other option to use Automation Objects is when adding new device. In this case the device will be created
according to the template chosen and with the configuration defined in the Automation Object (this file has
to be included manually in the template folder by the user).
If Automation Object was created in “Configuration Settings” node, a new file with the extension
“.uc500.src” will be saved in a location chosen by user.
This file can be included in Device Templates, in folder Configuration. Can be included more than one file,
they will be processed by alphabetic order.
As explained before, this file can be edit. In this case the keywords will be the ones defined in device
template creation, and will be replaced when creating a new device.
More information about Device Templates and keywords can be found in Automation Studio User Manual:
chapter 5.9.
INDEX
It is possible to import and export data maps using an excel spreadsheet with the entities configuration.
The user can access this tool using the File menu or the Tools menu of the Configuration Settings.
Hierachy Levels
Name Parent
HLName HLParent
SE
220kV SE
65kV SE
P601 65kV
P602 65kV
P700 220kV
Table 15.1 Hierarchy levels definition
In the Config tab, the user may define which parts will be used to define the entity identifiers, and which
limits and codes can be used, so the generated identifiers can be valid and structured.
In the Data Map tab there are all the parameters that can be set to generate correctly the entities.
The user may fill this This columns use the definitions Represents the full entity
column if he wants to created on the Config tab to allow the identifier, concatenating
define the entity user to define entity identifiers based all existent parts.
identifier. on the rules specified.
Table 15.2 Entity identification
Type
The user may choose the type of entity. If entity is a local control or set-point, this value is
ignored because the control type is defined by the type of entity associated with it.
Table 15.3 Entity type
SOE Printer
Alarm
The user may define if an The user may define if an The user may define if the
alarm will be generated for event log will be generated output will be a printer. If so, it
the entity. for the entity. will be associated to Printer 1.
Table 15.5 HMI
CC 1-8
The user may map the entity to a control center. In this case, the control center must exist in
the configuration to where the data map will be imported. If there is at least one rtu/lru
defined, the entity will be mapped to the first one. Otherwise, an rtu/lru will be created. The
user may write the object address to use for the map, or ‘X’ to generate automatically an
address.
Table 15.6 Control center
The user must choose the module to which associate the entity.
associated
entity.
Automation Ignored.
Table 15.7 Source
Import Data Map
8 For all parameters, except control centers, if they don’t exist, they will be created during the import
operation.
In the Import box, there are two available options: Entities will add/update/remove entities to/from th e
configuration and H. Levels will add/update/remove hierarchy levels from the configuration, accordingly to
the options specified in the Entities box.
ANNEXES
16
Chapter 16 - Annexes
INDEX
#
# SIMPLE
#
# This is a very simple example for a print form. It contains no images
# and has no text references to any particular list.
#
# Top and bottom page margins are one centimeter wide.
# Left and right page margins are two centimeters wide.
#
MARGINS(20,10,20,10);
#
# The header contains the list title only
#
RECTANGLE(0,0,100%,8) {
PEN(NoNe);
BRUSH(NONE);
TEXT(" <title>");
FONT("Arial",12, BOLD, NO, NO, NO, RGB(0,0,0));
}
#
# The footer contains the page number, the page count and the project name
#
REGION(0,-5B,100%,100%) {
LINE(0,0,100%,0) {
pen(solid, 0.1, RGB(0,0,0) );
}
RECTANGLE(0,0,50%,100%) {
PEN(NoNe);
BRUSH(NONE);
TEXT("<project name>", LEFT, BOTTOM, NO, 0, 0);
FONT("Arial",8, NORMAL, NO, NO, NO, RGB(0,0,0));
}
RECTANGLE(50%,0,100%,100%) {
PEN(NoNe);
BRUSH(NONE);
TEXT("Page <page number> of <number of pages>", RIGHT, BOTTOM, NO, 0, 0);
FONT("Arial",8, NORMAL, NO, NO, NO, RGB(0,0,0));
}
}
#
# On top of the list are the line numbers of the current page
#
RECTANGLE(0,10,100%,15) {
PEN(NoNe);
BRUSH(NONE);
TEXT("Lines <first line> to <last line>",RIGHT, MIDDLE, NO, 0, 0);
FONT("Arial",10, BOLD, NO, NO, NO, RGB(0,0,0));
}
#
# The list...
#
LIST (0, 15, 100%, -7B) {
#
# The list head prints general information regarding the report (printed on first
# page only):
# 1) the source application,
# 2) the user who printed the list, and
# 3) the date the list was printed.
#
LISTHEAD (18) {
#
# First draw the information description (bold font)...
#
RECT(0,0,100%,5) {
pen(NONE); BRUSH(NONE);
TEXT("Source:", LEFT, MIDDLE, YES, 0, 0);
FONT("Arial",10, BOLD, NO, NO, NO, RGB(0,0,0));
}
RECT(0,5,100%,10) {
pen(NONE); BRUSH(NONE);
TEXT("User:", LEFT, MIDDLE, YES, 0, 0);
FONT("Arial",10, BOLD, NO, NO, NO, RGB(0,0,0));
8 }
RECT(0,10,100%,15) {
pen(NONE); BRUSH(NONE);
TEXT("Date:", LEFT, MIDDLE, YES, 0, 0);
FONT("Arial",10, BOLD, NO, NO, NO, RGB(0,0,0));
}
#
# ...then draw the information (normal font)
#
RECT(16,0,100%,5) {
pen(NONE); BRUSH(NONE);
TEXT("<application>", LEFT, MIDDLE, YES, 0, 0);
FONT("Arial",10, NORMAL, NO, NO, NO, RGB(0,0,0));
}
RECT(16,5,100%,10) {
pen(NONE); BRUSH(NONE);
TEXT("<user name> (<user full name>)", LEFT, MIDDLE, YES, 0, 0);
FONT("Arial",10, NORMAL, NO, NO, NO, RGB(0,0,0));
}
RECT(16,10,100%,15) {
pen(NONE); BRUSH(NONE);
TEXT("<date and time>", LEFT, MIDDLE, YES, 0, 0);
FONT("Arial",10, NORMAL, NO, NO, NO, RGB(0,0,0));
}
}
#
# The list header has black background and white text
#
LISTHEADER (5) {
pen(solid, 0.01, RGB(0,0,0) );
BRUSH(RGB(0,0,0));
FONT("Arial",10, BOLD, NO, NO, NO, RGB(255,255,255));
TEXT("", LEFT, MIDDLE, NO, 1, 0);
}
#
# The list lines have white background and black text
#
LISTLINES (5) {
pen(solid, 0.01, RGB(80,80,80) );
BRUSH(NONE);
FONT("Arial",8, NORMAL, NO, NO, NO, RGB(0,0,0));
TEXT(LEFT, MIDDLE, NO, 1, 0);
}
#
# There is no list tail
#
LISTTAIL (0);
}
Note that in piecewise linear, you may have a maximum of 4 points and the minimum is 2 points; x and y
are the point coordinates.
The starting point and most relevant input is the source SCL file. The tool supports any SCL file type to be
imported but please ensure that you select a CID or SCD file after device configuration is complete in order
to have more information to start with. The wizard will not be able to automatically generate all required
information if required elements are missing in the SCL input file.
16.5.1 WORKFLOW
When the wizard is finished the tool generates all the module structure elements and entities required to
map the selected IEC 61850 data objects to the device configuration.
The user may (and should in most cases) select top-level data objects on each logical node. For each
selected data object the type and number of entities that should be generated are determined based on the
Common Data Class (CDC) of the source object and the descriptive potential of the UC 500 data model. The
20
Note that information on the source SCL file takes precedence over information from the domain models
(the domain models are used to fill in the gaps).
algorithm works with any CDC, even if not known, yielding the best possible results. For an overview of
some result mappings check the table below:
MV 1 or more Analogues
Table 16.1 Overview of some possible mappings from IEC 61850 data objects to UC 500 entit ies
The generator also provides the possibility of selecting data attributes. You should use this option only if
you want to fine tune the entity set that gets generated. The tool will generate only one entity for each IEC
61850 leaf attribute of the most suitable type (except for commands where usually more than one control
is required).
The generator not only creates the appropriate entity set but also all the container objects required with all
the correct parameters, namely devices, logical devices and addressing configuration.
For each entity in the created set the generator also sets some of the parameters automatically (if
available):
Description of the entity (and applicable states for digital da ta points)
Engineering units (for analogue and counter data points, creating new units if non-existent)
Entity identifier (according to a given pattern)
Initial value (cold start value) for data entities
Hierarchy level (user provided hierarchy level)
The wizard provides options to enable or modify all of the parameters described above as well as the option
to generate controls, status data entities or both. If you decide to generate report control blocks a report
control block object is also added if any of the created entities are available at the control block's dataset (if
8 non-existent).
All of the import and select wizard options are kept between each call of the wizard (including the input
source file) so creating the database step-by-step is as simple as repeating a click-select-go process until you
have all your required database setup.
The entity identifiers that are generated are based on the IEC 61850 naming scheme and you can setup the
name generation pattern. This pattern is basically a string of characters that is copied verbatim to the entity
identifier except for context specific keyword replacement (followed by automatic limits checking and
solving of collisions to ensure uniqueness of identifiers). Available keywords are as follows:
Discrete control value, empty string if n/a (always numeric and applicable to
$value$
digital controls only)
21
Table 16.2 Available keywords (example for SCL object IED\LD\Q50XCBR1.PhV.phsA\a.b.c)
21
If you need to limit the length of each keyword replacement text you can write $<keyword name>:<max
len>$, for example $iedName:4$.
Each user has the possibility to customize some IDE options referred to UC 500 configurations. They are
kept between sessions and can be restored to their default val ues at any time. Those options can be found
on the Tools menu, at the UC 500 item.
All UC 500 model elements may include a set of user defined private extensions, visible within the
Automation Studio as a Tagged Value. These extensions do not have a direct impact on the configuration
model but are kept as part of it.
22
It’s not recommended to modify private extensions that were not created by the user directly. This
modifications may cause external tools to behave differently than expected.