Micom C264/C264C: Bay Computer
Micom C264/C264C: Bay Computer
Micom C264/C264C: Bay Computer
Bay Computer
C264/EN T/D31
02/2016
Technical Guide
Technical Guide C264/EN T/D31
MiCOM C264/C264C
MiCOM C264/C264C
BAY COMPUTER
CONTENTS
MiCOM C264/C264C
CONTENTS
1. INTRODUCTION 3
1.1 Safety Information 3
1.2 Presentation 4
1. INTRODUCTION
Important information
Read these instructions carefully and look at the equipment to become familiar with the
device before trying to install, operate, service or maintain it. The following special
messages may appear throughout this bulletin or on the equipment to warn of potential
hazards or to call attention to information that clarifies or simplifies a procedure.
The addition of either symbol to a “Danger” or “Warning” safety label
indicates that an electrical hazard exists which will result in personal
injury if the instructions are not followed.
DANGER
DANGER indicates a hazardous situation which, if not avoided, will result in death
or serious injury.
WARNING
WARNING indicates a hazardous situation which, if not avoided, could result in
death or serious injury.
CAUTION
CAUTION indicates a hazardous situation which, if not avoided, could result in
minor or moderate injury.
NOTICE
NOTICE is used to address practices not related to physical injury. The safety alert
symbol shall not be used with this signal word.
Please note
Electrical equipment should be installed, operated, serviced, and maintained only by
qualified personnel. No responsibility is assumed by Schneider Electric for any
consequences arising out of the use of this material.
A qualified person is one who has skills and knowledge related to the construction,
installation, and operation of electrical equipment and has received safety training to
recognize and avoid the hazards involved.
C264/EN SA/D31 Safety & Handling
1.2 Presentation
This guide and the relevant equipment documentation provide full information on safe
handling, commissioning and testing of this equipment. This Safety Guide also includes
descriptions of equipment label markings.
Documentation for equipment ordered from Schneider Electric is despatched separately from
manufactured goods and may not be received at the same time. Therefore this guide is
provided to ensure that printed information which may be present on the equipment is fully
understood by the recipient.
The technical data in this safety guide is typical only, see the technical data section of the
relevant product publication(s) for data specific to a particular equipment.
Before carrying out any work on the equipment the user should be familiar with the
contents of this Safety Guide and the ratings on the equipment’s rating label.
Reference should be made to the external connection diagram before the equipment is
installed, commissioned or serviced.
Language specific, self-adhesive User Interface labels are provided in a bag for some
equipment.
Note: THE SAFETY SECTION MUST BE READ BEFORE STARTING ANY WORK ON
THE EQUIPMENT
Safety & Handling C264/EN SA/D31
Are familiar with the installation, commissioning, and operation of the equipment and
of the system to which it is being connected,
Are able to safely perform switching operations in accordance with accepted safety
engineering practices and are authorised to energize and de-energize equipment and
to isolate, ground, and label it,
Are trained in the care and use of safety apparatus in accordance with safety
engineering practices,
For safety reasons the following symbols and external labels, which may be used on the
equipment or referred to in the equipment documentation, should be understood before the
equipment is installed or commissioned.
*Note: The term Earth used throughout this guide is the direct equivalent of the North
American term Ground.
Safety & Handling C264/EN SA/D31
Equipment connections
Personnel undertaking installation, commissioning or servicing work for this
equipment should be aware of the correct working procedures to ensure safety.
The equipment documentation should be consulted before installing,
commissioning, or servicing the equipment.
Terminals exposed during installation, commissioning and maintenance may
present a hazardous voltage unless the equipment is electrically isolated.
The clamping screws of all terminal block connectors, for field wiring, using M4
screws shall be tightened to a nominal torque of 1.3 Nm.
Equipment intended for rack or panel mounting is for use on a flat surface of a
Type 1 enclosure, as defined by Underwriters Laboratories (UL).
Any disassembly of the equipment may expose parts at hazardous voltage, also
electronic parts may be damaged if suitable electrostatic voltage discharge (ESD)
precautions are not taken.
If there is unlocked access to the rear of the equipment, care should be taken by
all personnel to avoid electric shock or energy hazards.
Voltage and current connections shall be made using insulated crimp
terminations to ensure that terminal block insulation requirements are maintained
for safety.
Watchdog (self-monitoring) contacts are provided in numerical relays to indicate
the health of the device. Schneider Electric strongly recommends that these
contacts are hardwired into the substation’s automation system, for alarm
purposes.
To ensure that wires are correctly terminated the correct crimp terminal and tool
for the wire size should be used.
The equipment must be connected in accordance with the appropriate connection
diagram.
Protection Class I Equipment
- Before energizing the equipment it must be earthed using the protective
conductor terminal, if provided, or the appropriate termination of the
supply plug in the case of plug connected equipment.
- The protective conductor (earth) connection must not be removed since
the protection against electric shock provided by the equipment would be
lost.
- When the protective (earth) conductor terminal (PCT) is also used to
terminate cable screens, etc., it is essential that the integrity of the
protective (earth) conductor is checked after the addition or removal of
such functional earth connections. For M4 stud PCTs the integrity of the
protective (earth) connections should be ensured by use of a locknut or
similar.
The recommended minimum protective conductor (earth) wire size is 2.5 mm²
(3.3 mm² for North America) unless otherwise stated in the technical data section
of the equipment documentation, or otherwise required by local or country wiring
regulations.
The protective conductor (earth) connection must be low-inductance and as short
as possible.
All connections to the equipment must have a defined potential. Connections that
are pre-wired, but not used, should preferably be grounded when binary inputs
and output relays are isolated. When binary inputs and output relays are
connected to common potential, the pre-wired but unused connections should be
connected to the common potential of the grouped connections.
C264/EN SA/D31 Safety & Handling
Battery replacement
Where internal batteries are fitted they should be replaced with the recommended
Safety & Handling C264/EN SA/D31
type and be installed with the correct polarity to avoid possible damage to the
equipment, buildings and persons.
Insulation and dielectric strength testing
Insulation testing may leave capacitors charged up to a hazardous voltage. At the
end of each part of the test, the voltage should be gradually reduced to zero, to
discharge capacitors, before the test leads are disconnected.
Insertion of modules and pcb cards
Modules and PCB cards must not be inserted into or withdrawn from the
equipment whilst it is energized, since this may result in damage.
Insertion and withdrawal of extender cards
Extender cards are available for some equipment. If an extender card is used,
this should not be inserted or withdrawn from the equipment whilst it is energized.
This is to avoid possible shock or damage hazards. Hazardous live voltages may
be accessible on the extender card.
External test blocks and test plugs
Great care should be taken when using external test blocks and test plugs such
as the MMLG, MMLB and MiCOM P990 types, hazardous voltages may be
accessible when using these. *CT shorting links must be in place before the
insertion or removal of MMLB test plugs, to avoid potentially lethal voltages.
*Note: When a MiCOM P992 Test Plug is inserted into the MiCOM P991 Test
Block, the secondaries of the line CTs are automatically shorted, making
them safe.
Fiber optic communication
Where fiber optic communication devices are fitted, these should not be viewed
directly. Optical power meters should be used to determine the operation or signal
level of the device.
Cleaning
The equipment may be cleaned using a lint free cloth dampened with clean water,
when no connections are energized. Contact fingers of test plugs are normally
protected by petroleum jelly, which should not be removed.
C264/EN SA/D31 Safety & Handling
De-commissioning
The supply input (auxiliary) for the equipment may include capacitors across the
supply or to earth. To avoid electric shock or energy hazards, after completely
isolating the supplies to the equipment (both poles of any dc supply), the capacitors
should be safely discharged via the external terminals prior to de-commissioning.
Disposal:
It is recommended that incineration and disposal to water courses is avoided.
The equipment should be disposed of in a safe manner. Any equipment
containing batteries should have them removed before disposal, taking
precautions to avoid short circuits. Particular regulations within the country of
operation, may apply to the disposal of the equipment.
Safety & Handling C264/EN SA/D31
Electrical adjustments
It is possible to change current or voltage settings on some equipment by direct
physical adjustment e.g. adjustment of a plug-bridge setting. The electrical power
should be removed before making any change, to avoid the risk of electric shock.
Exposure of live parts
Removal of the cover may expose hazardous live parts such as relay contacts,
these should not be touched before removing the electrical power
C264/EN SA/D31 Safety & Handling
The recommended maximum rating of the external protective fuse for equipments is 16A,
high rupture capacity (HRC) Red Spot type NIT, or TIA, or equivalent. Unless otherwise
stated in equipment technical manual, the following data is applicable. The protective fuse
should be located as close to the unit as possible.
DANGER: CTs MUST NOT BE FUSED SINCE OPEN CIRCUITING THEM
MAY PRODUCE LETHAL HAZARDOUS VOLTAGES.
The equipment is intended for indoor installation and use only. If it is required for use in an
outdoor environment then it must be mounted in a specific cabinet or housing which will
enable it to meet the requirements of IEC 60529 with the classification of degree of
protection IP54 (dust and splashing water protected).
Pollution Degree - Pollution Degree 2 Compliance is demonstrated by reference
Altitude - Operation up to 2000m to safety standards.
IEC 60255-27:2005
EN 60255-27: 2006
7.5 Humidity during storage
Sustained exposure to high humidity during storage may cause damage to electronics and
reduce the lifetime of the equipment.
We recommend that storage humidity shall not exceed 50% relative humidity.
Once the MiCOM products have been unpacked, we recommend that they are energized
within the three following months.
Where electrical equipment is being installed, sufficient time should be allowed for
acclimatization to the ambient temperature of the environment, before energization.
Safety & Handling C264/EN SA/D31
The following European directives may be applicable to the equipment, if so it will carry the
relevant marking(s) shown below:
Where applicable:
10.1 Labels for standard LED indicators and menu navigation keys
LED labels
Trip
Alarm
Out of service
Healthy
Protection Available
Power
Inst (Instantaneous)
Parallel
Serial
Accept/Read
Set
Reset
Setting Group
Aux Timer
Select/Reset
Power Swing
Enter
Read
Clear
Edit mode
C264/EN SA/D31 Safety & Handling
Schneider Electric SA
nnnn II (2) G
EN 60255-6
Name yy ATEX xxxx IEC 60255-6
[1] nnnn - identifying number of the Notified Body which demonstrated manufacturing Quality
Assurance compliance to EN 13980, e.g. 0891.
[2] Ex logo - signifies compliance with European ATEX directive 94/9/EC.
[3] Name - Notified Body which carried out the EC Type Examination of the equipment design and
construction, e.g. PTB.
[4] yy - year certificate issued e.g. 03 for 2003.
[5] ATEX - compliance with European ATEX directive 94/9/EC.
[6] xxxx - approval number given by the Notified Body for the EC Type Examination of the
equipment, e.g. 3043.
[7] (2) - The equipment is compliant with Article 1(2) of directive 94/9/EC. It is approved for
operation outside an ATEX hazardous area. It is however approved for connection to “Increased
Safety” motors with rated ATEX protection, Equipment Category 2, to ensure their safe operation
in gas Zones 1 and 2 hazardous areas.
13. GUARANTEES
The media on which you received Schneider Electric software are guaranteed not to fail
executing programming instructions, due to defects in materials and workmanship, for a
period of 90 days from date of shipment, as evidenced by receipts or other documentation.
Schneider Electric will, at its option, repair or replace software media that do not execute
programming instructions if Schneider Electric receive notice of such defects during the
guaranty period. Schneider Electric does not guaranty that the operation of the software shall
be uninterrupted or error free.
A Return Material Authorisation (RMA) number must be obtained from the factory and clearly
marked on the package before any equipment acceptance for guaranty work.
Schneider Electric will pay the shipping costs of returning to the owner parts, which are
covered by warranty.
Schneider Electric believe that the information in this document is accurate. The document
has been carefully reviewed for technical accuracy. In the event that technical or
typographical errors exist, Schneider Electric reserves the right to make changes to
subsequent editions of this document without prior notice to holders of this edition. The
reader should consult Schneider Electric if errors are suspected. In no event shall
Schneider Electric be liable for any damages arising out of or related to this document or the
information contained in it.
Expect as specified herein, Schneider Electric makes no guaranties, express or implied and
specifically disclaims and guaranties of merchantability or fitness for a particular purpose.
Customer's rights to recover damages caused by fault or negligence on the part
Schneider Electric shall be limited to the amount therefore paid by the customer.
Schneider Electric will not be liable for damages resulting from loss of data, profits, use of
products or incidental or consequential damages even if advised of the possibility thereof.
This limitation of the liability of Schneider Electric will apply regardless of the form of action,
whether in contract or tort, including negligence. Any action against Schneider Electric must
be brought within one year after the cause of action accrues. Schneider Electric shall not be
liable for any delay in performance due to causes beyond its reasonable control. The
warranty provided herein does not cover damages, defects, malfunctions, or service failures
caused by owner's failure to follow the Schneider Electric installation, operation, or
maintenance instructions. Owner's modification of the product; owner's abuse, misuse, or
negligent acts; and power failure or surges, fire, flood, accident, actions of third parties, or
other events outside reasonable control.
Safety & Handling C264/EN SA/D31
MiCOM C264/C264C
INTRODUCTION
Introduction C264/EN IT/D30
CONTENTS
1. INTRODUCTION TO MICOM 3
2. INTRODUCTION TO MICOM GUIDES 4
2.1 Chapters description 4
2.1.1 Chapter Safety (SA) 4
2.1.2 Chapter Introduction (IT) 4
2.1.3 Chapter Technical Data (TD) 4
2.1.4 Chapter Functional Description (FT) 4
2.1.5 Chapter Hardware Description (HW) 4
2.1.6 Chapter Connection diagrams (CO) 4
2.1.7 Chapter HMI, Local control and user interface (HI) 4
2.1.8 Chapter Installation (IN) 4
2.1.9 Chapter Settings (ST) 4
2.1.10 Chapter Communication (CT) 5
2.1.11 Chapter Commissioning (CM) 5
2.1.12 Chapter Record Sheet (RS) 5
2.1.13 Chapter Maintenance, Fault finding, Repairs (MF) 5
2.1.14 Chapter Lexicon (LX) 5
2.1.15 Chapter Applications (AP) 5
2.1.16 Cyber Security (CS) 5
2.1.17 Annex (AN) 5
2.2 Operation guide 5
2.3 Technical guide 5
1. INTRODUCTION TO MiCOM
MiCOM is a comprehensive solution capable of meeting all electricity supply requirements. It
comprises a range of components, systems and services from Schneider Electric.
Central to the MiCOM concept is flexibility.
MiCOM provides the ability to define an application solution and, through extensive
communication capabilities, to integrate it with your power supply control system.
The components within MiCOM are:
A range industrial PC
MiCOM products include extensive facilities for recording information on the state and
behaviour of the power system using disturbance and fault records. They can also provide
measurements of the system at regular intervals to a control centre enabling remote
monitoring and control to take place.
The MiCOM range will continue to be expanded. The general features of MiCOM will also be
enhanced, as we are able to adopt new technology solutions.
For up-to-date information on any MiCOM product, visit our website:
www. schneider-electric.com
C264/EN IT/D30 Introduction
The system application on “Figure 1” uses several C264 linked together on SBUS
Ethernet. A gateway grants access to a SCADA.
Standalone application use one C264 linked to IEDs and possibly to a remote SCADA.
Technical Data C264/EN TD/D30
MiCOM C264
TECHNICAL DATA
Technical Data C264/EN TD/D30
CONTENTS
4. RATINGS 23
4.1 Auxiliary Voltage 23
4.2 Power Supply 23
4.2.1 BIU241 Digital Outputs 23
4.2.2 BIU261 Dual Sources power supply board 23
4.3 Circuit breaker Control Unit (CCU) Digital Inputs 25
4.3.1 CCU200 Digital Inputs 25
4.3.2 CCU211 Digital Inputs 25
4.4 Circuit breaker Control Unit (CCU) Digital Outputs 26
4.4.1 CCU200 Digital Outputs 26
4.4.2 CCU211 Digital Output 27
4.5 Digital Input Unit (DIU) Digital Inputs 28
4.5.1 DIU200 Digital Inputs 28
4.5.2 DIU211 Digital Inputs 28
4.6 Digital Output Unit (DOU) Digital Outputs 30
4.6.1 DOU201 Digital Output 30
4.7 Analogue Input Unit (AIU) Analogue Inputs 31
C264/EN TD/D30 Technical Data
5. BURDENS 38
5.1 Auxiliary Voltage 38
5.2 Power Supply 40
5.3 CPU Boards 40
5.3.1 DSPIO 210/211 Boards 40
5.4 Circuit breaker Control Units (CCU) Input Burdens 40
5.4.1 CCU200 Input Burden 40
5.4.2 CCU211 Input Burden 41
5.5 Digital Input Unit (DIU) Input Burden 42
5.5.1 DIU200 Input Burden 42
5.5.2 DIU211 Input Burden 42
5.6 Digital Output Unit (DOU) Input Burden 43
5.6.1 DOU201 Input Burden 43
5.7 Analogue Input Unit (AIU) Input Burden 43
5.7.1 AIU201 Input Burden 43
5.7.2 AIU211 Input Burden 43
5.8 Transducerless Measurement Unit (TMU) CT/VT Input Burden 43
5.8.1 General 43
5.8.2 TMU210 / TMU220 Input Burden 43
5.9 Analogue Output Unit (AOU) Input Burden 43
5.9.1 AOU200 Input Burden 43
5.10 Ethernet Switches Board Input Burden 43
5.11 Front Panel Board Input Burden 43
6. ACCURACY 44
6.1 Reference Conditions 44
6.2 Measurement Accuracy 44
6.2.1 Measurement Accuracy – TMU220 44
6.2.2 Measurement Accuracy – TMU210 45
6.3 How to Measure the Isolation Resistance 45
Technical Data C264/EN TD/D30
7. TYPE TESTS 46
7.1 Dielectric Strength Tests 46
7.1.1 AIU211 – Dielectric Strength Test 46
7.1.2 ECU200/ECU201 – Dielectric Strength Test 46
7.1.3 MiCOM C264 and C264C – Dielectric Strength Test 46
7.2 Mechanical Test 47
7.3 Atmospheric Test 48
7.4 DC Auxiliary Supply Test 48
7.5 AC Auxiliary Supply Test 49
7.6 Electromagnetic Compatibility (EMC) Tests 49
Technical Data C264/EN TD/D30
2. CONFORMITY
(Per Article 10 of EC Directive 73/23/EEC).
The product designated “MiCOM C264/C264C computer” has been designed and
manufactured in conformance with the standard IEC 60255-27:2005 and is compliant with
the European Commission Low Voltage Directive 73/23/EEC.
Technical Data C264/EN TD/D30
3. GENERAL DATA
3.1 Design
Surface-mounted case suitable for wall installation or flush-mounted case for 19” cabinets
and for control panels.
3.2 Installation Position
Vertical ±15°
3.3 Degree of Protection
In agreement with DIN VDE 0470 and EN 60255-27:2006, or with IEC 60255-27:2005:
IP52 for the front panel with LCD or LEDs
IP20 for rear panels of C264/C264C, except reduced to IP10 when the black MiDOS
28-pin terminal block is installed for the TMU board.
3.4 Weight
Case 40 TE: approximately 4 kg
Case 80 TE: approximately 8 kg
3.5 Dimensions and Connections
Please refer to the dimensional drawings (C264_EN_HW, hardware description chapter) and
to the terminal connection diagrams (C264_EN_CO).
3.6 MiCOM C264 Computer: Configuration
The MiCOM C264 computer includes:
A case
C264 Multirack
NOTE 1:
For GHU2 A B:
NOTE 1: If you install a TMU, do not install the CCU in slot P and do not install the CCU in the slot adjacent to the TMU.
NOTE 2: If the board is installed in Slot C; If the rack is full; and if you have no DSPIO installed; ≤ 1
If the board is installed in Slot D; If the rack is full; and if you have a DSPIO or others installed: ≤ 1
NOTE 3: For an explanation of the GHU2AB codes, please refer to C264 Computer – Comparison of Board Installations Between Models
NOTE 4: If the application causes all of the DOs to go active at the same time: ≤ 6
Technical Data C264/EN TD/D30
NOTE 1: If you install a TMU, do not install the CCU in slot K and do not install the CCU in the slot adjacent to the TMU.
NOTE 2: If the board is installed in Slot C; If the rack is full; and if you have no DSPIO installed; ≤ 1
If the board is installed in Slot D; If the rack is full; and if you have a DSPIO or others installed: ≤ 1
NOTE 3: For an explanation of the GHU2AB codes, please refer to C264 Computer – Comparison of Board Installations Between Models
NOTE 4: If the application causes all of the DOs to go active at the same time: ≤ 6
C264/EN TD/D30 Technical Data
NOTE 1: If you install a TMU, do not install the CCU in slot F and do not install the CCU in the slot adjacent to the TMU.
NOTE 2: If you do not install a DSP/DSPIO: ≤ 2 If you do install a DSP/DSPIO: ≤ 1
NOTE 3: For an explanation of the GHU2xx codes, please refer to C264 Computer – Comparison of Board Installations Between Models
Technical Data C264/EN TD/D30
NOTE 1: Do not install the CCU in the slot adjacent to the TMU.
NOTE 2: For an explanation of the GHU2xx codes, please refer to C264 Computer – Comparison of Board Installations Between Models
C264/EN TD/D30 Technical Data
NOTE 1: Do not install the CCU in the slot adjacent to the TMU.
NOTE 2: For an explanation of the GHU2xx codes, please refer to C264 Computer – Comparison of Board Installations Between Models
Technical Data C264/EN TD/D30
NOTE 1: Do not install the CCU in the slot adjacent to the TMU.
NOTE 2: For an explanation of the GHU2AB codes, please refer to C264 Computer – Comparison of Board Installations Between Models
.
C264/EN TD/D30 Technical Data
NOTE 1: Item: for the interlock / PSL, an item is the output of an Interlock / PSL, or an intermediate
variable used as an output (such as for the TON/TOFF/SR latch operators). In an interlock
equation, an interlock output is equal to one item.
NOTE 2: Element: After the decomposition of the equation into the sum of multiplications, an element
is the operand of an operator.
C264/EN TD/D30 Technical Data
NOTE 1: Item: for the interlock / PSL, an item is the output of an Interlock / PSL, or an intermediate
variable used as an output (such as for the TON/TOFF/SR latch operators). In an interlock
equation, an interlock output is equal to one item.
NOTE 2: Element: After the decomposition of the equation into the sum of multiplications, an element
is the operand of an operator.
C264/EN TD/D30 Technical Data
3.8 Terminals
PC Maintenance Interface:
DIN 41652 connector, type female D-Sub, 9-pin, installed on the front panel
Two of the RJ-45 female connector, 8-pin for the 10/100Base-T self-negotiation
The IRIG-B interface (standard NF S 87-500, May 1987), installed on the CPU260/270
board:
BNC plug
M3 threaded terminal ends, self-centering with wire protection for conductor cross
sections from 0.2 to 2.5 mm² for BIU241 board
DIN 41652 connector; type D-Sub, 9-pin, installed on the CPU260/270? board.
Optical fibres through ECU200 (external RS232/optical converter): optical plastic fibre
connection in agreement with IEC 874-2 or DIN 47258 or ST ® glass fibre optic
connection (ST ® is a registered trademark of AT&T Lightguide Cable Connectors).
Input /Output or power supply modules:
M3 threaded terminal ends, self-centring with wire protection for conductor cross
sections from 0.2 to 2.5 mm² for these boards:
AIU201, AIU211
AOU200
BIU241
CCU200, CCU211
DIU200, DIU211
DOU201
DSPIO210, DSPIO211
The I/O boards and BIU241 include a 24-pin, 5.08 mm pitch male-connector.
Current-measuring and Voltage-measuring inputs:
M5 threaded terminal ends, self-centering with wire protection for conductor cross
sections between 2.5 and 4 mm² for the TMU board.
4. RATINGS
4.1 Auxiliary Voltage
The C264 computer is available in four auxiliary voltage versions, as follows:
Limitation
The board contains the Port 2 only. The communication port 2 remains the same as
the BIU241.
The board has been design to support two voltage ranges, direct current only:
Performances
For more installation data about this board, please refer to the topic, MiCOM 264 Computer:
Configuration.
4.3.2 CCU211 Digital Inputs
Nominal voltage
Version Triggering threshold (VDC)
(+/-20%)
A01 24VDC if V >10VDC Input status is set
if V < 8VDC Input status is reset
A02 48 thru 60VDC if V >10VDC Input status is set
if V < 8VDC Input status is reset
A03 110 thru 125VDC if V >17.4VDC Input status is set
if V < 12.5VDC Input status is reset
A04 or 220VDC or if V > 50VDC Input status is set
A07 110 thru 125VDC if V< 29.9VDC Input status is reset
(with 80% Threshold)
A08 220VDC if V > 86VDC Input status is set
(with 80% Threshold) if V< 67VDC Input status is reset
if V > 176VDC Input status is set
if V < 132VDC Input status is reset
For more installation data about this board, please refer to the topic, MiCOM 264 Computer:
Configuration.
C264/EN TD/D30 Technical Data
You wire the two output contacts of each relay in serial. In this event, you make the
best use of the Break function for each relay..
On the CCU200 board, the details of the 4 Output Relay Contacts show in the table that
follows:
Description Values
Nominal operating voltage range 24 thru 250VDC / 230VAC
Make 5A
Carry 5A continuously
30A for 500 ms or 250A for 30 ms
Break (Output contacts used DC: 50 W resistive, 30 W inductive (L/R = 40 ms)
separately)
AC: 1250 VA resistive, 1250 VA inductive (cos = 0,7)
In these conditions, the contact resistance is still lower
than 250 m for 10000 operations
Break (Output contacts wired in DC: 80 W resistive for current lower than 1A,
serial) 100W resistive for current upper than 1A,
30 W inductive (L/R = 40 ms)
A self-monitoring device for the output control chain: address check, state monitoring
You can configure the digital outputs only in the double remote signalling configuration
Description Values
Nominal operating voltage range 24 thru 250VDC / 230VAC
Make 5A
Carry 5A continuously
30A for 500 ms or 250A for 30 ms
Break (output contact used DC: 50 W resistive, 30 W inductive (L/R = 40 ms)
separately)
AC: 1250 VA resistive, 1250 VA inductive (cos = 0.7)
In these conditions, the contact resistance is still lower
than 250 m for 10000 operations
Break (Output contacts wired in DC: 80 W resistive for current lower than 1A,
serial) 100W resistive for current upper than 1A,
30 W inductive (L/R = 40 ms)
The inputs are suitable for use on systems with nominal battery voltages from 24Vd.c. to
220Vd.c (+/- 20%). The input responds to negative input voltages. The inputs are not self-
controlled.
Technical Data C264/EN TD/D30
Triggering Threshold
The threshold voltage depends on the selection of the voltage range, please refer on above
table.
For an input voltage from the threshold value to 18V, the input current is 30mA. The voltage
applied to the input terminals, with amplitude of between 19,2VDC and 264VDC powers the
pulse generation circuit. The circuit drives a pulse of current with amplitude of 30mA. The
pulse duration is between 1ms and 2ms.
Input voltage
To reduce thermal dissipation, especially at high input voltages, the inputs draw a current of
less than 1.6 mA.
For details about the input burdens, please refer to the topic DIU211 Input Burden in this
chapter.
For more installation data about this board, please refer to the topic, MiCOM 264 Computer
AP chapter.
C264/EN TD/D30 Technical Data
In the C264 rack, a DOU201 board replaces a DOU200 board. External connections remain
the same as for earlier versions of the board.
For more details of the DOU201 board, please refer to the table that follows:
Description Values
Nominal operating voltage range 24 thru 250VDC / 230 VAC
Make 5A
Carry 5A continuously
30A for 500 ms or 250A for 30 ms
Break DC: 50 W resistive, 15 W inductive (L/R = 40 ms)
For use with CPU 2 board, use a four-position header and jumper to select the address of
the board.
For use with CPU 3 board, the location of the DOU201 in the C264 rack defines the address
of the board. If you use the DOU201 as a spare of a previous board, you can use the jumper
to define the address of the board. Use the PACiS tool, System Configuration Editor (SCE)
to define this location.
Dielectric strength of the coil contacts: 5000 Vrms.
For more installation data about this board, please refer to the topic, MiCOM 264 Computer:
Configuration
Technical Data C264/EN TD/D30
Type Ranges
Current input range 1mA
5 mA
10 mA
20 mA
+ 4mA thru +20mA
Voltage input range 1,25V
2,5V
5V
10V
Sampling period 100 ms
Accuracy 0,1% full scale at 25°C
AD conversion 16 bits (15bits+sign bit)
Common mode rejection ratio (CMMR) > 100dB
Serial mode rejection ratio (SMMR) > 40dB
Range of Gain: user-selectable 1, 2, 4, 16
Input impedance for voltage inputs 11 K
Input impedance for current inputs 75
Type Ranges
Current input range 1mA
5 mA
10 mA
20 mA
+ 4mA thru +20mA
Sampling period 100 ms
Accuracy 0,1% full scale for each range at 25°C
AD conversion 16 bits (15 bits+sign bit)
Common mode rejection ratio (CMMR) > 100dB
50Hz, 60Hz
Serial mode rejection ratio (SMMR) > 40dB
Input impedance for current inputs 75
Operating range
Description
1A 5A
Nominal AC current (In) 1Arms 5Arms
Minimum measurable current with same 0.2 A r m s 0.2 A r m s
accuracy
Maximum measurable current 4 A r m s (4*In) 20 A r m s (4*In)
Frequency 50 or 60 Hz ± 10% 50 or 60 Hz ± 10%
Strength
Duration
1A 5A
3 seconds: not measurable, with no destruction 6 A r m s (6*In) 30 A r m s (6*In)
1 second: not measurable, with no destruction 20 A r m s (20*In) 100 A r m s (20*In)
C264/EN TD/D30 Technical Data
VT load rating:
Duration Strength
10 seconds with no destruction 880 V r m s
Operating range
Description
1A 5A
Nominal AC current (In) 1Arms 5Arms
Minimum measurable current with same 0.1 A r m s 0.5 A r m s
accuracy
Maximum measurable current 4 A r m s (4*In) 20 A r m s (4*In)
Frequency 50 or 60 Hz ± 10% 50 or 60 Hz ± 10%
Values
th
Pass band 10 harmonic
Current threshold accuracy 2%
Compatibility with external transformer 5VA 5P10
In addition, and specific for the 3 phase current inputs for each CT:
Operating range
Description
1A 5A
3 phase current inputs 1A 5A
Power consumption < 0.05 VA < 1,25 VA
Values
Operating range 0.1 thru 40 In
Thermal heating 100 In during 1 second
30 In during 10 seconds
4 In permanent
Technical Data C264/EN TD/D30
In addition, and specific for the 1 earth current input for each CT:
Operating range
Description
1A 5A
1 earth current inputs 1A 5A
Power consumption < 0.008 VA at 0.1 Ion < 0.175 VA at 0.1 Ion
Values
Operating range 0.01 thru 8 Ion
2 other possibilities by cortec code:
0.002 thru 1 Ion or
0.1 thru 40 Ion
Thermal heating 100 Ion during 1 second
30 Ion during 10 seconds
4 Ion permanent
Strength
Duration
1A 5A
3 seconds: not measurable, with no destruction 30 A r m s (30*In) 150 A r m s (30*In)
1 second: not measurable, with no destruction 100 A r m s (100*In) 500 A r m s (100*In)
Description Values
Power consumption < 0.5 VA at 130V
Vn range 57V thru 130V
Thermal heating 2 Vn phase-neutral permanent, and
2.6 Vn phase-neutral during 10 seconds
th
Pass band 10 harmonic
All voltage and power phase protection are done on Vpp voltage direct measured or
derived, and Vr is direct measured or derived.
C264/EN TD/D30 Technical Data
Description Values
Width 16 bits
Conversion period < 30 µs
Scanning period 64 samples/period
Linearity error ± 2 LSB
SINAD ratio as much as 1kHz 0db
Low passed filter at 1kHz -40db/decade
The external power supply must supply a regulated voltage of +48V5% and a power of
10 W for each AOU200 board
For more installation data about this board, please refer to the topic, MiCOM 264 Computer:
Configuration.
For the AOU200 board, the output attributes follow:
After calibration, and at 25°C, the precision = 0,1% X (the full scale + 20%).
Between -10°C and +70°C, the maximum deviation is <100ppm/°C.
Technical Data C264/EN TD/D30
100ms after the command, the current output is stable. The management of the AOU200
board with an RI relay shows in Figure 1. When the RI relay is in the closed position, you can
read the value.
The WatchDog relay and RI relays include the attributes that show in the table that follows:
Contact type NO
Max operating voltage 250VDC / 230VAC
2,5A continuously
Make and Carry 30A for 500ms
100A for 30ms
Break DC: 50W resistive, 15W inductive (L/R = 40ms).
AC: 1250 VA resistive,
1250VA inductive (cos = 0,7 – relay duration is lower)
Operating time < 7ms
Maximum frequency of
360 operations each hour, on nominal load
commutation
Life Period 100 000 operations, on resistive load at 250 VAC, 8 A
C264/EN TD/D30 Technical Data
5. BURDENS
5.1 Auxiliary Voltage
The MiCOM C264/C264C computer burdens depend on the number of cards installed in the
computer and show in the table that follows:
For more specific details about the MiCOM C264 / C264C computer burdens, please refer to the table that follows:
Digital Input
Voltage range 24V to 250V DC
110V to 250 AC
Filtering by setting 5ms for DC
7.5ms for AC
Logical Output
Resistance contact < 20 mΩ
Breaking capacities 135 Vcc, 0.3A (L/R = 30 ms)
250 VDC : 50 W resistive or 25 W inductive ( L/R = 40 ms)
220 Vac, 5 amp (cos phi = 0.6)
Carry capacity 5A
Operation time < 7 ms
Dielectric Norm ANSI IEC C37.90.1:1989: 50Hz, during 1 minute 2kV common
constraints mode and 1.5kV in differential mode for trip and close relays, for other
1 kV in differential mode.
Mechanic 100000 operations
constraint
The CCU200 board burden on the internal 5V bus is 400mW plus 400mW for each activated
relay.
Technical Data C264/EN TD/D30
For the CCU211 board, the input burden on the internal 5V bus is 290mW plus 400mW for each
activated relay.
C264/EN TD/D30 Technical Data
TMU210 TMU220
1A < 0.02 < 0.02
5A < 0.02 < 0.2
TMU210 TMU220
Vn = 130 V r m s < 0.01 < 0.01
For the TMU210 board, the input burden on the internal 5V bus is 300mW.
For the TMU220 board, the input burden on the internal 5V bus is 300mW.
5.9 Analogue Output Unit (AOU) Input Burden
5.9.1 AOU200 Input Burden
For the AOU200 board, the input burden on the internal 5V bus is 120 mA (maximum).
5.10 Ethernet Switches Board Input Burden
For the SWD202/SWD204 board, the burden on the internal 5V bus is 4W.
For the SWR20x board, the burden on the internal 5V bus is 4 W.
For the SWU20x board, the burden on the internal 5V bus is 3,85W with 2 optical ports.
5.11 Front Panel Board Input Burden
For the GHU200 and GHU210 boards, the input burden on the internal 5V bus is:
6. ACCURACY
For all specified accuracy, the repeatability is 2.5% unless otherwise specified.
If no range is specified for the validity of the accuracy, then the specified accuracy shall be valid
over the full setting range.
6.1 Reference Conditions
Quantity Accuracy
Current 0.2% full scale
Voltage 0.2% full scale
Frequency 0.01 Hz
Amplitude < 1%
Phase 1°
Overall temperature coefficient 10 ppm/°C
Harmonics H15
Technical Data C264/EN TD/D30
7. TYPE TESTS
7.1 Dielectric Strength Tests
7.1.1 AIU211 – Dielectric Strength Test
Dielectric Strength IEC 60255-5 (2000) 50Hz for 1 minute, 2kV (CM),
IEEE C37.90 (1989)
Impulse Voltage Strength
IEC 60255-5 (2000) 5kV (CM)
for inputs of the AIU211
Insulation Resistance IEC 60255-5 (2000) 100 MΩ at 500 VDC (CM and DM)
(between groups)
MiCOM C264/C264C
FUNCTIONAL DESCRIPTION
Functional Description C264/EN FT/D31
CONTENTS
3. COMMUNICATIONS 43
3.1 Telecontrol bus - TBUS 44
3.2 Legacy bus - LBUS 44
3.3 Station bus - SBUS 45
3.3.1 Exchanges 45
3.3.2 Supported Common Data Classes 47
3.3.3 Controls 47
3.4 Inter-rack Ethernet communication 48
3.4.1 Internal Ethernet architecture 48
3.4.2 External network behaviour 48
3.4.3 Ethernet failure 49
3.4.4 Other Ethernet rupture 50
3.4.5 Ethernet Routing table 50
3.5 Ethernet port management on CPU Type 3, CPU 270 51
3.6 Telecontrol Bus redundancy 52
3.6.1 Overview 52
3.6.2 Link Redundancy 52
3.6.3 Protocol Redundancy 53
3.6.4 TBUS Redundancy T101 example 54
3.6.5 Event file synchronization 55
5. DATA PROCESSING 68
5.1 Binary Input Processing 68
5.1.1 Binary Input Definition 68
5.1.2 Processing of Single Point Status 69
5.1.3 Processing of Double Point Status 71
5.1.4 Processing of Multiple Point Status 76
5.1.5 System Inputs (SI) 77
5.1.6 IED inputs 78
5.1.7 Group processing 78
5.1.8 SBMC Mode Processing 79
5.1.9 BI sent to automatism features 79
5.2 Measurement Input Processing 80
5.2.1 Measurement Input Processing - Focus 80
5.2.2 Focus 1: Analogue Measurement Processing as far as Threshold Detection 81
5.2.3 Open circuit management 81
5.2.4 Scaling 81
5.2.5 Zero value suppression 82
5.2.6 Focus 2: Digital Measurement Processing as far as Threshold Detection 82
5.2.7 Focus 3: TMU2XX: CT/VT measurement processing as far as Threshold Detection 83
5.2.8 TMU2XX: CT / VT Calculations - General 85
5.2.9 TMU220: CT / VT Calculations – Inputs: Configuration 88
5.2.10 TMU220: CT / VT Calculations - Inputs: Samples 88
5.2.11 TMU220: CT / VT Calculations – Outputs: Set of measurements 89
5.2.12 TMU220: Measurements - General 90
5.2.13 TMU220: List of Measurements 91
5.2.14 TMU220: Algorithms 94
5.2.15 TMU210: CT / VT Calculations - Inputs: Configuration 96
5.2.16 TMU210: CT / VT Calculations - Inputs: Samples 96
5.2.17 TMU210: CT / VT Calculations – Outputs: Set of measurements 97
5.2.18 TMU210: Measurements - General 97
5.2.19 TMU210: List of Measurements 99
C264/EN FT/D30 Functional Description
7. AUTOMATIONS 168
7.1 Built-in Automation functions 168
7.1.1 Auto-Recloser (AR) 168
7.1.2 Trip Circuit Supervision 174
7.1.3 Circuit breaker condition monitoring (I²t) 176
7.1.4 Automatic Voltage Regulation–AVR 178
7.1.5 Automatic voltage regulation–ATCC 193
7.2 Synchrocheck 206
7.2.1 Synchrocheck – General 206
7.2.2 Synchrocheck Schemes 207
7.2.3 Synchrocheck Algorithm 207
7.2.4 Synchrocheck Applications 208
7.2.5 Synchrocheck Circuit Breaker Closure types 208
7.2.6 Synchrocheck Type 1 and Type 2 208
C264/EN FT/D30 Functional Description
Enhanced inner management with database management, self-test controls and the
capability to synchronize all of the devices.
The components of the software management include:
Communications with the Telecontrol Bus (TBUS), Station Bus (SBUS) and Legacy
Bus (LBUS). Please refer to the Communications (CT) chapter
Programmable Scheme Logic (PSL) for all C264 computers except the C264
Standalone computer
Auto-Recloser (AR)
Trip Circuit Supervision
Circuit Breaker Condition Monitoring (I2t)
xPS/xPC Association
Pole Discrepancy
Automatic Voltage Regulation (AVR)
Automatic Tap Change Control (ATCC)
Synchrocheck
Synchrocheck Bypass
Phase-to-Phase Synchrocheck with the TMU210
C264/EN FT/D30 Functional Description
Depending on whether the Main Rack is redundant or not, the software features are different
for a redundant main 1 rack and for a non-redundant main rack.
1.2 C264 Configurations
The MICOM C264 computer is the base module of the PACiS architectures.
Each C264 computer includes a rack. Computer boards are installed on the rack. The rack is
the technical name, but it can have different functional names.
The functional name depends where the C264 computer is installed in a system. The
functional names for the rack include:
Extension rack: In a multirack system, one or more extension racks that cascade
from the active Main 1 rack or standby Main 2 rack
Multirack system: A system that includes a Main rack and one or more extension
racks
Redundant system: A system that includes an active Main 1 rack and a standby Main
2 rack
The family of C264 computers included in this chapter include the devices and configurations
that follow:
1.2.1 SBUS - C264 with no IED
The C264 connects through the Ethernet Port to the SBUS and uses protocol IEC61850.
IEC 61850
SBUS
C264
Main
Rack
C0433ENb
Functional Description C264/EN FT/D31
IEC 61850
SBUS
C264
Main
Rack
LBUS
C0434ENb
C264/EN FT/D30 Functional Description
IEC 61850
SBUS
Ethernet port 1
C264
Main
Rack
LBUS
Extension
Rack
C0435ENb
For more technical data about the C264 with two extension racks with IEDs, please refer to
the chapter Technical Data.
Functional Description C264/EN FT/D31
IEC 61850
SBUS
C264 C264
Main 1 I/O Main 2
Rack redundancy Rack
IED
LBUS
IED
IED
C0436ENb
C264/EN FT/D30 Functional Description
1.2.5 SBUS - Two C264 redundant computers with two extension racks with IEDs
Each C264 connects through the Ethernet Port 1 to the SBUS and uses protocol IEC61850
Each C264 connects through Ethernet Port 2 to two extension racks
Each extension rack connects through the LBUS to the IEDs. These C264s each include a
CPU 270.
IEC 61850
Main 1 Main 2
I/O Redundancy
Rack Rack
Extension Extension
Rack Rack
Extension Extension
Extension
Extension
Rack Rack
Rack Rack
C0437ENb
For more technical data about the two C264 redundant computers with two extension racks
with IEDs, please refer to the chapter Technical Data C264/EN TD/Cxx.
Functional Description C264/EN FT/D31
TBUS
Main
Rack
C0438ENb
In the C264 Standalone configuration, you do not have C264 redundancy nor the multi rack.
Only one C264 Standalone computer is provided. The main rack (not redundant) manages
the direct acquisitions and controls. The C264 Standalone computer with the main rack:
Receives all data from the IO boards on the rack and updates the archives (SOE
waveform)
Manages the controls received through the active SCADA connection and sends them
to the extension racks
Manages the digital input and measurement acquisition. In event the main 1 rack and
main 2 rack are in a redundant configuration, this function is not available.
Manages the controls. In event the main 1 rack and main 2 rack are in a redundant
configuration, this function is not available.
NOTE: The C264 Standalone is the new technical name for the C264 Remote
Terminal Unit (RTU).
C264/EN FT/D30 Functional Description
TBU
S
C264
Main
Rack
LBUS
C0439ENb
In the C264 Standalone configuration, you do not have C264 redundancy nor multi rack
configuration. Only one C264 Standalone computer is provided. The main rack (not
redundant) manages the direct acquisitions and controls. The C264 Standalone computer
with the main rack:
Receives all data from the IO boards on the rack and updates the archives (SOE
waveform)
Manages the controls received through the active SCADA connection and sends them
to the extension racks
Manages the digital input and measurement acquisition. In event the main 1 rack and
Main 2 rack are in a redundant configuration, this function is not available.
Manages the controls. In event the main 1 rack and main 2 rack are in a redundant
configuration, this function is not available.
Manages the communication with the IEDs, and the acquisition of the real time data.
In event the main 1 rack and main 2 rack are in a redundant configuration, this
function is not available.
Functional Description C264/EN FT/D31
1.2.8 SCADA – TBUS - C264 Standalone with two extension racks with IEDs
The C264 connects through the Ethernet Port 1 through the TBUS to the SCADA
The C264 connects through the Ethernet Port 2 to two extension racks.
Each extension rack connects through the LBUS to the IEDs. This C264 includes a CPU
270.
TBUS
Main
Rack
Extension LBUS
Rack
Extension LBUS
Rack
C0440ENb
The main rack centralises all of the data acquired by all of the extension racks, and manages
the SCADA interface. In this configuration, you can configure as many as 16 extension
racks. The main rack (non redundant) manages direct acquisitions and controls. The main
rack:
Receives all data acquired from the extension rack and updates the archives (SOE
waveform)
Manages the database downloads through the SCADA connection and distributes the
new configuration to all of the other extension racks
Receives the controls through the SCADA connection, manages the controls, and
sends the controls to the extension racks
Manages the control, that is directly handled by the main rack. In event of a redundant
configuration, this function is not available
C264/EN FT/D30 Functional Description
Manages the communication with the IEDs, and real-time data acquisition. In event of
a redundant configuration, this function is not available.
The extension racks:
Manage the controls that they receive from the main rack
If there are no serial ports available on the main rack, the extension rack can manage
the printer.
There is no rack to manage the Automation functions: Auto-recloser, Synchrocheck, AVR,
ATCC. You can install a CPU2 or CPU3 on the main rack and on the extension rack. If you
install a CPU3 in the extension rack, you must use a CPU3 on the main rack.
1.2.9 SCADA – TBUS - Two C264 Standalone computers, redundant
Each C264 connects through the Ethernet Port 1 through the TBUS to the SCADA
Each C264 connects through Ethernet Port 2 to two extension racks
Each extension rack connects through the LBUS to the IEDs. This C264 includes a CPU
270.
Functional Description C264/EN FT/D31
SCADA
Serial Serial
Port 1 Port 2
TBUS TBUS
Serial Serial
Port 1 Port 1
Main 1 Main 2
Rack Rack
LBUS
Extension
Rack
IED
IED
Inter -rack Ethernet
communication IED
Extension
Rack
IED
IED
IED
C0441ENc
The main 1 rack and the main 2 rack centralise all of the data acquired by the extension
racks and manage the SCADA interface. In this redundant C264 Configuration:
C264/EN FT/D30 Functional Description
There are no I/O boards installed in the main 1 rack or in the main 2 rack
There are no IEDs connected to the serial ports of the main 1 rack and main 2 rack
Of the two computers, SCADA makes the selection and designates one computer as the
main 1 rack and the other computer as the main 2 rack.
Neither the main 1 rack nor the main 2 rack manage these Automations: PSL, PLC,
Auto-recloser, Synchrocheck, AVR, ATCC.
For hardware, the main 1 rack and main 2 rack are identical.
The main 1 rack:
Receives all of the data acquired on the extension racks and updates the archives
(SOE waveform)
Manages the database downloads through the SCADA connection and distributes the
new configuration to all of the other extension racks and to the main 2 rack
Receives the controls through the SCADA connection, manages the controls, and
sends the controls to the extension racks.
The main 2 rack:
Receives all of the data acquired on the extension racks and updates the archives
(SOE waveform)
Freezes all of the transmissions on the SCADA link: Reset of the Link: Function 0
In event of a SCADA General Interrogation (GI Request) to the main 2 rack, the main
2 rack assumes the functions of the main 1 rack
Receives the configuration database from the main 1 rack and updates it
Communicates the status of the main 1 rack and main 2 rack to the SCADA. You can
connect the watchdog relays to the standard DI of one extension rack.
Functional Description C264/EN FT/D31
Initialisation mode
Operational mode
Normal mode
Downgraded mode
Maintenance mode
Test mode
Faulty mode
Halt mode
Computer faults include:
Anomaly: a fault that causes a downgrade in the behaviour of the computer. There
are hardware and/or software anomalies, as follows:
Board failure
Loss of synchronisation
Loss of communication.
Software fault: a major software error causes a software fault, that causes the
computer to go into the Faulty mode.
Vital hardware fault: a fault that causes a software halt, that causes the computer to
stop the application software. Vital hardware faults include:
CPU fault
Bus fault
Communication boards: the computer performs this test within the communication
protocol
Displays, such as the LCD and LEDs: the computer does a single test for the
presence of the HMI board
Peripheral devices, such as the printer, external clock, and so on: the computer
uses timeouts to do a check for the presence of the peripheral devices.
If one of these non-vital hardware tests fails, the computer goes into the related
downgraded mode.
Modify a database
Modify a database
The communication was set up on the main 1 rack connection to the SCADA. The GI
request (ASDU 100) message confirms the set-up of the connection.
The main 2 rack was in operation, a failure occurred, and the main 1 rack received a
GI request.
When the SCADA detects a communication failure, the main 1 rack in operation becomes
the main 2 rack. The SCADA must stop to communicate with one rack when it decides to
communicate with the other rack.
C0447ENa
Functional Description C264/EN FT/D31
Receives all of the data acquired on the extension rack and updates the archives
(SOE, slow waveform)
Transmits all of the data acquired on the extension rack through the SCADA
Receives the database through the SCADA connection or from the CAT and
distributes the new configuration to all of the other racks, including the main 2 rack
Manages the controls received through the active SCADA connection and sends them
to the extension racks
The main 2 rack:
Receives all of the data acquired on the extension rack and updates the archives
(SOE, slow waveform)
In event of a SCADA connection reset (GI Request), the main 2 rack does the
functions of the main 1 rack
Receives the configuration database from the main 1 rack and updates its own
configuration database
To communicate the status of the main 1 rack and main 2 rack to the SCADA, you can wire
the watchdog relays to the standard DI of one extension rack.
For the C264:
The two redundant computers are the main 1 computer and the main 2 computer. The
computer that performs the bay management is the active computer; the other one is the
standby computer. In this configuration, the redundant computer can be:
This switch from the active mode to the standby mode, and from the standby mode to the
active mode, is performed automatically as follows:
SBUS
C0448ENa
DI1/DO1 to indicate the Active Status: DO1 is closed if the computer is Active
The algorithm to elect the Active computer shows in the table that follows.
The initial state is “Initialisation” (state 0) and the “DI11” event is generated.
“L_IS” is the internal status of the computer, “R_IS” is the internal status of the redundant
one.
The “confirmed DI2 1” event is a detection of a Station Bus failure on the other computer
(DI2 = 0) confirmed during 20 seconds.
T1 is the timer of Active status confirmation during the computer initialisation (default value:
5 seconds for the Main 1 computer, marked in configuration, 30 seconds for the Main 2
computer). T2 is the timer of master election (default value: 5 seconds).
Functional Description C264/EN FT/D31
“confirmed” / / ≠ T2 timer / / /
DI2≠1 launching
≠ close DO1
≠ go to state 3
End of / not possible not possible not possible not possible open DO1 if
standby mode conditions to enter
going-on standby mode are
not true anymore
then
≠ T2 timer
launching
≠ go to state 3
else
≠ go to state 2
C264/EN FT/D31 Functional Description
Use the PACiS tool, the Computer Administration Tool (CAT), to download the
database directly over Ethernet. Operators generally use the CAT only for the
download of the first database. During the download, the CAT sends the database to
all of the other racks. This database becomes the new Standby database. At the
Switch command, the computer cascades the switch operation to the other racks.
From SCADA, the C264 receives the database file and saves it in RAM, but does not send it
to the other racks.
On the C264, the database status shows only on the main rack LCD.
The main 1 rack does a check for the compatibility between its database and the database
installed in the main 2 rack and in the extension racks. It the databases are different, the
main 1 rack has the most recent version and deletes the databases on the other racks.
If the main database on the main 1 rack is compatible with the standby database on the
other rack, the computer switches the database.
At any moment, the computer stores as many as two DBs in its flash memory. The two DBs
and their related VDBS have the labels DB1, VDBS1; and DB2, VDBS2.
Each database of the computer, DB1 and DB2, has one of the states that follow:
Missing: the DB is not present in the flash memory of the computer
Standby: the DB was downloaded into the non volatile memory of the computer, but
the software does not acknowledge this version
Current Modified: the DB had a change to a parameter setting and the software
currently acknowledges the DB
Standby Modified: the DB had a change to a parameter setting and the software
does not acknowledge the DB.
Functional Description C264/EN FT/D31
In the computer, the life cycle of the DBs shows in the figure that follows:
At any moment, there is only one DB either in the Current state, or Current Modified state.
In the same way, there is only one DB either in the Standby state, or Standby Modified
state.
For the two downloaded DBs, DB 1 and DB 2, the four possible states show in the table that
follows:
A file descriptor with the label DB context, stored in the flash memory of the computer,
includes the configuration of the DB installed on the device. This file descriptor, that includes
the state of each of the two databases and their related VDBS (for example, DB1 and
VDBS1; DB2 and VDBS2), allows you to know the configuration of the databases at the
moment of the computer boot (initialisation mode), and to start again with the Current
database, if it exists. To update the file descriptor DB Context, use these functions:
Download a database
Check a database
Modify a Database.
C264/EN FT/D31 Functional Description
Assigns the state standby to the downloaded DB and related Vdbs installed in the
computer
Sends a signal to announce the success of the DB installation to the device that
called.
9. The computer updates the file descriptor, Context DB, in flash memory.
Functional Description C264/EN FT/D31
SCADAlink SCADAlink
T101 or T104 T101 or T104
DB in the RAM
Main 1 Rack Main 2 Rack
C264 C264
C C
Extension Rack
I/O
C264 Acquisition
IED Link
Extension Rack
C264
Acquisition I/O
IED Link
C0449ENa
After a successful database download, the SCADA sends the switch command with the “Reset
process command” standard message (ASDU 105) to the computer.
When the computer receives the switch command, the computer downloads the database to the
other racks. Please refer to Figure 5: Database Switching
Extension Rack
C264 I/O
Acquisition
IED Link
Extension Rack
I/O
C264 Acquisition
IED Link
C0450ENa
When this series of downloads is successful, the computer switches the databases in all the
racks.
After a DB switch, and if the DB is coherent with the software, the computer automatically
reboots and goes into Operational Mode.
2.2.4 How to do a check of the database
At each reboot, the computer does a check of the DB.
With the C264 local Operator Interface, with the Human Machine Interface (HMI) front panel,
or with the maintenance laptop computer and the Computer Administration Tool (CAT), you
can set the time and date.
2.2.5 How to modify the database
With the local HMI, you can only modify a parameter setting on the current DB: that is, the
Current or Current Modified DB. You can modify only certain data parameters. To modify the
parameters of the DB, you modify some configuration values in the DB. The modified DB
stores the new parameter settings. The computer increments the internal index of the
parameter setting file and calculates again the checksum of the file. The database takes the
Current Modified state.
Functional Description C264/EN FT/D31
Is the object known to the computer, that is, is the object really present in the
database
Is the value of the parameter setting compatible with the type of data conveyed:
does the value belong in the range of acceptable variation
2. If the request is incoherent, the computer sends a negative report to the device that
sent the request.
3. Write the current value of the data in the DB
4. Write the date that you modified the data in the DB
5. Compute the checksum and to write it in the DB
6. Assign the state Current Modified to the DB
7. Send a positive report to the device that sent the request
8. Update the file descriptor, that is the Context database, in the flash memory
2.2.7 How to consult a parameter setting
To manage a request to consult a parameter setting in the current DB from the Operator
Station, use the computer to:
1. Do a check of the coherence of the request:
Is the object known to the computer, that is, is the object really present in the
database
Is the value of the parameter setting compatible with the type of data conveyed:
does the value belong in the range of acceptable variation
2. If the request is incoherent, the computer sends a negative report to the device that
sent the request:
3. Develop the response to include the parameter setting and to send it to the device that
sent the request
For the C264 , you can use the Computer Administration Tool (CAT) to upload and store a
DB as large as 20 MB in the flash memory.
To synchronize the internal clock in the computer (referred to as the local clock) with:
SBUS or LBUS for all C264 computers except C264 Standalone computers
To synchronise other devices through the SBUS with the local clock
You can synchronize the local clock with an external time reference from four sources:
1
External clock sends an IRIG-B signal
1
SCADA sends a clock message through the TBUS and through the gateway
2
The system master clock sends a clock message through the SBUS - SNTP
2
An operator who sets the time
There is a priority rule for these four external time references. If the external clock operates,
it locks out changes from the three other sources: you cannot make modifications to the local
clock in these ways:
Locked out: SCADA sends a clock message through the TBUS and through the
gateway
Locked out: The system master clock sends a clock message through the SBUS
1
For all C264 computers
2
For all C264 computers except C264 Standalone computers
Functional Description C264/EN FT/D31
C0451ENa
2. Some external clocks do not have the internal accuracy to support the radio signal. In
this event, when the confirmation of loss radio signal occurs in a few minutes, the
status of the local clock shows as not-synchronised
If the computer operates as the system master clock for the other devices in the substation,
then it continues to send the clock synchronisation message to the other devices, even if the
local clock, or system master clock, is not synchronised with an external time reference. A
binary input is dedicated to monitor the status of the external clock.
2.4.2 Clock synchronisation message from a SCADA gateway
The acquisition of a SCADA clock synchronisation message is a SCADA gateway
specification.
The SCADA clock synchronisation depends on the protocol. The clock synchronisation
message goes directly thru the SCADA link to the C264 computer.
The clock synchronisation message from the SCADA gateway is in Universal Time
Coordinated (UTC) time.
From the SCADA, the clock synchronisation message goes to the “local clock update”
function in the computer. The computer does a check of the frame of the clock
synchronisation message, removes the control fields, and transmits the clock
synchronisation message.
When the SCADA gateway operates as the external time reference in agreement with the
priority, the computer receives the clock synchronisation messages from the SCADA. An
interruption relates to the arrival of the frame: the computer can acquire the clock
synchronisation message from the SCADA gateway. The delay in the transmission from the
SCADA gateway is compensated.
The clock synchronisation message from the SCADA gateway must contain:
Day / month / year / hour / minutes / seconds / milliseconds
To update the computer local clock, please refer to 2.3.5 Local Clock Update.
2.4.3 SNTP Client and Servers
On an IEC61850 network, the clock synchronisation uses the Simple Network Time Protocol
(SNTP). In a PACiS system, you can define as many as two computers as the System
Master Clock: they become SNTP servers. All other devices installed on the IEC61850
become SNTP clients. In event that one SNTP server fails, for example a computer is
unserviceable, or an external clock fails, the SNTP clients automatically connect to the
second SNTP server.
Use the PACIS tool, the System Configuration Editor (SCE), to configure a C264 as an
SNTP server, that could be redundant: you can define 2 IP addresses. These IP addresses
must be in the same range as the C264 Ethernet addresses.
In this event, no C264 is the Master Clock: all C264 computers are SNTP clients.
The synchronization performance of the system depends on the accuracy of the third-party
SNTP server.
You can connect one C264, that is configured as an SNTP server, to a second C264 SNTP
server to make a C264 redundant system.
2.4.4 Time set by an operator
If an external time reference operates, such as the external clock, the SCADA clock or the
system master clock, you the operator cannot set the time.
If the system master clock synchronises any other device in a PACiS system architecture,
you cannot set the time for that device. However, in event the system master clock is
unserviceable or the connection fails, you can set the time for the device.
Functional Description C264/EN FT/D31
If the computer does not receive the clock synchronisation messages from the external
clock, from the SCADA gateway, or from the system master clock, you are allowed to set the
time manually.
Normally, you must manually set only the system master clock. You must use the correct
tool for the specific system master clock.
With the C264 local Operator Interface, with the Human Machine Interface (HMI) front panel,
or with the maintenance laptop computer and the Computer Administration Tool (CAT), you
can set the time and date.
You use two commands:
Loss of the external clock; loss of SCADA gateway clock synchronisation message; or
loss of the system master clock
An indication that the local clock was roughly synchronised. This indication shows any
time difference, between the local clock and the clock synchronisation message, that
is greater than the fixed value: threshold = 20 millisecond. The computer sends a
message about the discrepancy, prints the message, and archives the event.
Indication that the operator performed a manual time set. This “manual time set”
indication is required to time-tag the events that occur.
The internal time format for the local clock is Universal Time Coordinate (UTC). The time
difference between UTC and the local time is set during configuration.
The local clock operates automatically:
For seasonal time changes: it uses the values for Daylight Savings Time (DST) as
shown in the Time Zone Adjustment Table (TZTAB) file. The TZTAB file shows the
differences between UTC and local time.
If the DST rules change, you can set the new rules in the computer.
The computer manages the milliseconds with its own quartz.
The Local Clock Update function manages the synchronisation status of the computer as
follows:
Not synchronized: this is the status at initialization, the computer has never been
synchronized since booting or rebooting. Date and time are invalid.
Synchronized: the computer receives periodically the date and time. Date and time
are valid. Or the computer is master clock on the Ethernet network for other
equipment.
C264/EN FT/D31 Functional Description
At initialisation, the computer shows the external clock as not-synchronised with the local
clock. This status remains the same until you send a control message to the initialisation
driver to receive synchronisation frames from an external time reference. When the control is
OK and at the reception of the first external clock message, the synchronisation upon
external clock is declared valid and the external clock is considered connected.
This synchronisation with the external clock could fall back to invalid: for example, in event
the computer did not receive an external synchronisation message for N minute(s). This can
indicate an external clock failure, such as a disconnect or a message that contains invalid
data. The value of this timing is 300 seconds.
In event of an external clock failure, the local clock maintains the frequency in effect before
the external clock failed. The computer generates an internal signal or alarm and declares
the system master clock invalid. When this occurs, the computer makes a non-
synchronisation mark against each event, for as long as the synchronisation with the
external clock remains invalid.
When a device on the SBUS does not receive a clock synchronisation message in 180
seconds, it raises an alarm. The events processed by this device are tagged with a special
mark and with the time, and the device stops the transmission of the synchronization frame
to the IEDs.
2.4.6 Management of loss of external time reference
As the local clock update function receives the external time reference, it manages a loss of
the external time reference as follows:
If the external clock is lost, then the local clock update shows the loss of the external
clock
If the clock message from the SCADA gateway is lost, then the local clock update
shows the loss of the SCADA gateway clock message
If the system master clock is lost, then the local clock update shows the loss of the
system master clock
2.4.7 Update method
When the computer validates the external clock acquisition, the computer manages the
synchronisation of the internal system master clock to the external time reference as follows:
If a difference between the local clock value and the external time reference value
transmitted exists, [C Local – C External] 0:
If [C Local – C External] < 1 ms, the local clock is not modified
If [C Local – C External] > 1ms, two different events are processed:
1. If [C Local – C External] Threshold (20 ms), the value of the local clock is
progressively corrected (reduced or increased). This compensation is performed in a
set time (t1=60 s).
2. If [C Local – C External] Threshold (20 ms), the hour in the local clock is updated
roughly.
If an operator gets the external clock time, the operator must update the local clock.
2.4.8 Limits and performances
The computer local clock has a small drift per day. This quartz drift, that is the deviation of
the internal oscillator of the computer, is less than 0,5 s/day (that is, 5,8 s/s). This quartz
drift is the same through the entire operating temperature range of the computer. The
operator must set the time periodically or synchronize the local clock with a master clock.
Functional Description C264/EN FT/D31
3. COMMUNICATIONS
The C264 includes different types of communications:
Item For this number You can have this Total number of protocols
of Protocols on number of Protocols
allowed
the TBUS on the LBUS
1. 2 0 or 1 or 2 4 or less
2. 1 0 or 1 or 2 or 3 4 or less
3. 0 0 or 1 or 2 or 3 or 4 4 or less
TBUS SBUS
LBUS
IED
C0005ENd
FIGURE 7: COMMUNICATIONS
C264/EN FT/D31 Functional Description
Master/slave protocols: DNP 3.0, DNP3 over IP, MODBUS, T101, HNZ-Elenas, HNZ-
Yemen
DNP3 over IP, T104: Ethernet 10 or 100 Mb/s: RJ45 connector or optical fibre
(multimode or monomode)
On the C264, you can configure as many as 2 different serial telecontrol protocols. If you use
the Ethernet IEC 104, you can connect as many as 4 independent clients.
The redundancy is not available for T104, DNP3 over IP, and MODBUS.
3.2 Legacy bus - LBUS
C264 behaves as a master.
Protocols:
ModBus: Serial
DNP3 over IP: Ethernet 10 or 100 Mb/s: RJ45 connector (multimode or monomode
optical fibre via Ethernet switch board)
Functional Description C264/EN FT/D31
IEC 61850
Devices connected to:
SWR with 4 RJ45 ports and 2 optical ports for a redundant ring (multimode or
monomode)
3.3.1 Exchanges
C264 computer acquires & sends data on IEC-61850 network using REPORT/ GOOSE.
The REPORT is specific between a server and one client, it provides:
data value
data state or quality attribute (validity and several kind of invalid state)
time tag quality attribute (server synchronised or not when event has occurred)
Data quality defines if data is valid or several kind of invalidity: unknown when disconnected,
Saturated, Undefined… REPORTS are sent/received with their RFI (Reason For Inclusion):
periodic, spontaneous state/value change or following control.
The GOOSE is a short message (data value and quality) sent in multicast to all SBUS
equipment, this is quicker than Report.
C264/EN FT/D31 Functional Description
REPORTS
SCADA
GTW is a
Report Client GTW Backup
Red
link
HMI is a Report
Client
Report Client
IEC 61850 UPPER NETWORK (TBUS )
AP 2
IEC/IEC GTW1 IEC/IEC GTW2
Main Backup
Red
GTW1 is a Report Server link GTW is a Report Client
( 4 buffered clients maxi)
+
GTW is a Report Client AP1
C264
C264 is a Report Server
(4 buffered clients Maxi)
IED
PACiS HMI 1 PACiS HMI 1 IEC 61850
Server Client
PACiS HMI 1 Server
is a Report Client
C0521ENa
C264 computer provides BRCB (buffered report) to PACiS device clients. A device client is
either HMI (EcoSUI) or IEC/IEC Gateway connected on IEC 61850 SBUS. Total BRCB client
is limited to 4.
C264 records only ST events in buffer to generate buffered report. Buffers are cyclical, FIFO
and unitary event replacement. One Buffer Overflow Information is available for each client
of buffer report configured with SCE.
Note: Data are buffered only after connection established once between
C264 BRCB server and its client
3.3.2 Supported Common Data Classes
C264 computer exchanges data using Common Data Classes. The following list gives
implemented ones:
3.3.3 Controls
C264 supports Common Data Classes control expressed with SPC, DPC, INC and APC
configured as Direct Execute or SBO.
C264/EN FT/D31 Functional Description
T104 T104
C264 C264
Main 1 Rack Main 2 Rack
C264
CAT Extension Rack No.1
C264
Extension Rack No.2 Ethernet Link
Ethernet Switch
C0452ENb
The internal communication on the Ethernet C264 network uses proprietary protocol with
unicast messages. Consecutively all messages used by the computer for internal data
exchanges remain inside the C264. These messages do not pollute the external network
reserved for the SCADA interface.
Furthermore, the CAT tool uses also the Ethernet broadcast to identify racks. This tool is
used only for maintenance purpose (Software and configuration downloading)
Acquisition and front-end racks must have the same group number when they are attached
to the same C264. This group number is defined using the CAT and is limited to 16.
3.4.2 External network behaviour
Due to the connection of the C264 with the external network for the SCADA communication
(T104) a precaution shall be taken in order to avoid Ethernet loops. External switches of the
upstream communication must be able to use the spanning tree algorithm to prevent
Ethernet loops.
The Spanning Tree (802.1D) or the Fast Spanning Tree (802.1W) algorithm of the external
switches identifies the Ethernet ring created with the external and internal Ethernet
infrastructure and computes the appropriate path avoiding Ethernet Loops.
Functional Description C264/EN FT/D31
C264 C264
Main 1 Rack Main 2 Rack
ETHERNET RING
Ethernet Link
Ethernet Switch
C0453ENa
The computation of the network tree is done only one time by the spanning tree algorithm of
External switches.
3.4.3 Ethernet failure
Ethernet ring opening
T104 T104
C264 C264
Main 1 Rack Main 2 Rack
C264
CAT Extension Rack No.1
C264
Extension Rack No.2
Ethernet Link
Ethernet Switch
C0454ENb
The consequence of the ring opening involves to lose the communication between the Main
1 rack and the Main 2 rack.
C264/EN FT/D31 Functional Description
Consecutively we have:
- Data transfer from extension rack #1 through the External Ethernet infrastructure
(outside the C264 Ethernet network) to the Main 2 rack.
- Ethernet ring opening and rebuilding of routine table ordered by the spanning tree
algorithm (> 30 s if 802.1D used)
T104 T104
C264 C264
Main 1 Rack Main 2 Rack
C264
CAT Extension Rack No.1
C264
Extension Rack No.2
Ethernet Link
Ethernet Switch
C0455ENb
The other events of rupture of the Ethernet C264 network do not involve:
- Data Routine outside of the internal Standalone Ethernet network
- Starting of the spanning tree algorithm (Ethernet ring maintained)
All data produced by the insulated rack are defined in an unknown state.
The other racks of the C264 (remaining on Ethernet continuity) are fully operational. Data
transferred to the Main racks through the Standalone private communication do not use the
external Ethernet infrastructures.
3.4.5 Ethernet Routing table
C264 connects to a router and a remote IEC104 SCADA
C264
SCADA
GTW
NETWORK 1 : 10.22.90.0
NETWORK 2 : 192.168.0.0
C0456ENa
Functional Description C264/EN FT/D31
TABLE 2
TBUS
SCADA
Serial Serial
Port 1 Port 2
Serial Serial
Port 1 Port 2
C0512ENa
SCADA
Serial Serial
Port 1 Port 2
TBUS TBUS
Serial Serial
Port 1 Port 1
Main 1 Main 2
Rack Rack
Event files
synchronisation
LBUS
Extension
Rack
IED
IED
Inter-rack Ethernet
communication IED
(NOTE1)
Extension
Rack
IED
IED
IED
C0513ENa
SCADA
Serial Serial Serial Serial
Port 1 Port 2 Port 3 Port 4
TBUS
TBUS
Serial Serial Serial Serial
Port 1 Port 2 Port 1 Port 2
Main 1 Main 2
Rack Rack
Event files
synchronisation
LBUS
Extension
Rack
IED
IED
Inter-rack Ethernet
communication IED
(NOTE1)
Extension
Rack
IED
IED
IED
C 0514 ENa
Open Circuit (AI kind 4-20 mA with current value under 4mA)
Filtering time
Debouncing
time
T0 T1 T2
C0127ENb
Furthermore, an invalidity processing is applied: at the first change of state of one bit
following a confirmed DM value, the TInv delay is launched (value defined in configuration,
from 0 to 300s, with a 10 ms step). If the value is not confirmed at the end of this delay, the
DM is declared UNDEFINED.
Functional Description C264/EN FT/D31
If Vstab is equal to 0, there is no stability processing: all DM values are sent at each
calculation.
4.6.2 Acquisition with Read Inhibit signal
When the RI signal changes to set state, the T inh delay is launched. If the signal is always set
at the end of the delay, the DM is declared UNDEFINED. Otherwise, if the RI signal changes
to reset state before the end of the delay, the current DM value is transmitted.
4.6.3 Encoding
The following codes are allowed for DM:
You can use one supplementary bit for the sign (0 indicates a positive value, 1 indicates a
negative value).
Capability extension for the Tap Position Indication only:
DOU201 boards for alarms (8 normal open DOs + 2 normal open/normal close DOs).
C264/EN FT/D31 Functional Description
Wait for N ms
Wait for N ms
The 0 to 1 transition on the RI output can be used by the external device as a trigger,
indicating that a new value is available.
4.9.3 Open / Close Select Order
An option includes the order-running-SPS: one for the open order control, and one for the
close order control.
The order-running-SPS are available only for Double Point Control (DPC).
When the C264 receives the Select (for SBO control) or the Execute (for DE control) order,
and before the checks, it sets the order-running-SPS to the SET position.
When the C264 receives the control acknowledgement, the C264 sets the order-running-
SPS to the RESET position
In event of a direct negative acknowledgement, the C264 may set the order-running-SPS to
the SET position and to the RESET position with the same time-stamp.
C264/EN FT/D31 Functional Description
5 mA, 0 - 5 mA
10 mA, 0 - 10 mA
4 - 20 mA, 0 - 20 mA, 20 mA
4.10.2 Output management
Each current output is individually managed in 2 modes:
Maintained mode: in event of computer shut down or power off, the output level is
maintained (and the Read inhibit relay is set). Only the reception of a new setpoint will
lead to an output value modification.
Un-maintained Mode: in event of computer shut down or power off, the output is set
to 0.
The Analog Output is stable 100ms after the order. During the Analog output value
modification, the “Read Inhibit” relay is reset (Open) and indicates that the analog output
value is not to be used.
The C264 is not operational or powered off (no communication with the CPU board)
5. DATA PROCESSING
C264 treatment entries can be Binary Inputs or Analogue Inputs. They are issued from
IO boards
System Input (SI): information related to the system, to configurable and built-in
automations or to electrical process but without acquisition possibilities
5.1.1.2 Suppression
A binary input can be suppressed by an order issued from an operator. No subsequent
change of state on a suppressed BI can trigger any action: for example, display, alarm,
transmission. The BI takes the “SUPPRESSED” state. When the operator un-suppresses the
BI, this one takes its actual state.
5.1.1.3 Substitution
A BI can be substituted to a manual set state by an operator (state “SUBSTITUTED xxx”).
The BI stays in the state determined by the operator until he un-substitutes it. When a BI is
substituted, no changes of state are transmitted, and computations, for instance groupings,
are made with the substituted state. When the BI is un-substituted, the actual state is
transmitted to higher control levels and subsequent changes of state are transmitted again.
5.1.1.4 Forcing
When data is invalid: that is, SELFCHECK FAULTY, TOGGLING, UNDEFINED or
UNKNOWN; it can be manually forced by an operator (state “FORCED xxx”). This feature is
similar to the substitution but the data is automatically updated when valid data is available
again. A SUPPRESSED or SUBSTITUTED datapoint cannot be forced. The forcing could
also be automatic: in this event, the invalid data is automatically replaced by the state
defined in configuration.
Functional Description C264/EN FT/D31
5.1.1.5 Transmission
By configuration, a BI could be transmitted on a client-server basis on the station bus using
the two modes:
Report based mode: in this mode, a confirmed change of status is spontaneously
transmitted to the subscribers with the time stamping and the reason for change. The
Report mode is used to transmit filtered data for displaying, printing and archiving.
GOOSE based mode: in this mode, the change of status is transmitted in multicast to
the configured receivers. On IEC61850 network, all types of BI can be transmitted
using GOOSE. Only the BI unfiltered states are transmitted with their time stamping,
the reason for change is not. The GOOSE mode is used to transmit data as soon as
possible after their acquisition and as quickly as possible, for automation purpose.
During a loss of communication, the events detected on the computer are not buffered.
5.1.2 Processing of Single Point Status
A preliminary treatment (filtering) is applied to specific Single Points (SP) in order to confirm
the state.
The choice of these SPs and the filtering time are fixed by the C264 configuration. If the
opposite transition occurs before this delay, both transitions are discarded.
This treatment is called persistent filtering.
The status is stamped with the time of the transition.
C264/EN FT/D31 Functional Description
For automation (interlock, PSL, PLC, and built in functions), GOOSE are used. Each valid
state (01, 10 and 00) is configurable to be seen by automation in False, True or Invalid sate.
DPS are commonly used for all switchgears position. From board valid acquisition the two
contacts are Close and Open (set by configuration when voltage is present). The position of
the switch is:
Preliminary treatments (filtering) for some DPs is applied to filter the MOTION state on a
certain period of time. This avoids the transmission of this (normally) transient state.
This treatment is called motion filtering.
The time tag is user-selectable:
Mode 1: the valid state (OPEN or CLOSE) is stamped with the time of the beginning of
the MOTION state
Mode 2: the valid state (OPEN or CLOSE) is stamped with the time of this valid
transition
This time stamping can be superseded if a persistence filtering applies.
If the MOTION state is confirmed, it is always stamped with the time of the beginning of the
MOTION state. Furthermore, the BI takes the state JAMMED (in event of confirmed
MOTION00 state) or UNDEFINED (in event of confirmed MOTION11 state). In this event,
the following valid state (OPEN or CLOSE) is always time-stamped with the time of this valid
transition (depending on the persistence filtering feature).
Functional Description C264/EN FT/D31
Mode 2: the valid state (OPEN or CLOSE) is stamped with the time of this valid
transition
This time stamping can be superseded if a persistence filtering applies.
If the MOTION state is confirmed, it is always stamped with the time of the beginning of the
MOTION state. Furthermore, the BI takes the state JAMMED (in event of confirmed
MOTION00 state) or UNDEFINED (in event of confirmed MOTION11 state). In this event,
the following valid state (OPEN or CLOSE) is always time-stamped with the time of this valid
transition (depending on the persistence filtering feature).
The codes for the DPS data on the C264 server, on IEC61850, and on IEC61850 clients
show in the table that follows:
STATE1 to STATE32
UNDEFINED
TOGGLING
SELFCHECK FAULTY
UNKNOWN
SUPPRESSED
NOT
SET RESET
RESET SET
INVALID INVALID
SUPPRESSED SUPPRESSED
SP and SI from different hierarchical levels can be mixed, for instance a group at substation
computer level can be composed of SP acquired at bay computer level or at substation
computer level.
A group is time stamped with the date / time of the last datapoint that has modified the group
status.
5.1.8 SBMC Mode Processing
When a Bay is in Site Based Maintenance Control (SBMC) mode, the status of the Binary
Inputs (related to this Bay and defined as “SBMC dependant”), takes the forced state defined
in the configuration.
This forced information is delivered to the Remote Control Point (RCP) as long as the SBMC
mode is active on the Bay.
For a group a special feature is implemented: a BI belonging to a group, that is dependent of
SBMC bay state, is not taken into account in group computation if the bay is set in SBMC
mode. If all the BI of a group belong to one or more bays, that are all in SBMC mode, the
group is then in the suppressed state. At the end of a bay SBMC mode, all groups owning BI
of this bay are re-computed.
5.1.9 BI sent to automatism features
In event that an automatism operates on a client computer, with BI information coming from
a server computer, BI are generally transmitted in the GOOSE based mode. In some events
where the GOOSE based mode is not used, BI information received by IEC61850 reports
must be used in automatism features.
In any events where GOOSE based mode and report based mode are used at the same
time, the BI information used is the one receive by GOOSE ( faster transmission than
reports).
C264/EN FT/D31 Functional Description
Linear, multisegments
Quadratic
Value = A X +B or
Value = AX B
Transformation law and A / B coefficients are defined in configuration.
C264/EN FT/D31 Functional Description
X is an analogue measurement
deadband is a percentage of the full scale value of the measurement. These two
parameters have to be set during the configuration of the computer.
To deliver current and voltage data that gives a reliable picture of what happens in the
high voltage part of an electrical substation
To make the galvanic insulation between the high voltage part and the measurement
and protection circuits,
To protect the measurement circuits against damage when a fault comes onto the
high voltage network.
A given electrical network sends voltage (V) and current (I) data to a CT / VT inputs
acquisition function installed on a TMU2XX board.
From the output of the CT / VT inputs acquisitions function, these samples become inputs of
the CT / VT calculation function
The CT / VT calculation function performs basic mathematical processing on the memorised
samples and gives this set of computed measurements, such as power, frequency, and so
on, to the C264 main CPU, the Power PC (PPC).
These measurements are used for the protection function and for the Internal Synchrocheck,
Type 1 and 2
Please refer to: Figure 27: Overview: TMU220 Board – CT / VT Calculations
Figure 28: Overview: TMU210 Board – CT / VT Calculations
Functional Description C264/EN FT/D31
CT / VT Functions
These functions use the measurements from the TMU2XX boards:
Protection
Waveform
The CTVT measurements can be included in the waveform function.
C264/EN FT/D31 Functional Description
DSP200 X X X
DSPIO+TMU210 X X X X
or DSP210
DSP+TMU220 X X X
or DSP220
Reference voltage
Samples of Ia
Samples of Va
Samples of Ib
Samples of Vb
Samples of Ic
Samples of Vc
Samples of Io or Ibb1
Samples of Ia
Samples of Ib
Samples of Ic
Samples of Io or Ibb1
Samples of Vab
Samples of Vbc
Samples of Vca
Frequency
Phase angles
Total Harmonic Distortion (THD) & Total Demand Distortion (TDD) – Harmonics are
th
evaluated through to the 15 order.
Fundamental measurements
Synchrocheck data: ΔF ΔV ΔΦ
With the synchrocheck option, the values that follow are computed:
Slip frequency
Amplitude
Phase difference
Synchrocheck voltage
C264/EN FT/D31 Functional Description
These measurements are put at the disposal of the PPC at every measurement reading
cycle defined by the configuration.
A configuration option [ meas quality when missing ] allows you to choose 2 different
behaviours when all the Input signals disappear: all below the minimum thresholds, 10V for
voltage and 100mA for current:
Behaviour 1: the measures associated to the acquired signals are set to value 0 and
state VALID
Behaviour 2: the measures associated to the acquired signals are set to value 0 and
state FAULTY
5.2.12 TMU220: Measurements - General
Whatever the signal frequency, 64 samples are available for all the input signals.
All these samples are gathered in a revolving list stored in active memory.
A timer is adapted permanently to the frequency of the signal and provides the frequency
measurement
The primary measurements that follow are derived from sample values:
Q: Vars (Using Active Power calculation method with the voltage samples retarded by
90)
The measurements that follow are obtained from the Fourier of sample values or the Fourier
values of the above-derived measurements (DFT ).
Phase angles
Power Factor
SVA
When the signal with the highest priority disappears, the frequency tracking is
performed on the signal with next priority.
When a signal with a higher priority appears, the frequency tracking is performed
on this signal, even if the current reference signal is still present.
When the signal with the highest priority disappears, the frequency tracking is
performed on the signal with next priority.
Even when a signal with a higher priority appears, the frequency tracking remains
on the current reference signal.
In all events, the reference change computation (about 2 seconds), all the measurements
are considered as INVALID (SELFCHECK FAULT).
Fourier Transform
At each period, the DFT (Discrete Fourier Transform) is performed. This gives (among other
things) the value of the phase angle and the magnitude of the fundamental.
RMS values
1 63
Vrms Vi ²
64 i 0
Powers phase in star coupling
Active power: Pa, Pb, Pc
1 63
P Vi I i
64 i 0
Functional Description C264/EN FT/D31
1 63
Q Vi I i16
64 i 0
NOTE: The reactive power is computed by taking the values of the current a
quarter of period before [ sin(x) = cos (x – pi/2) ]
5.2.14.1 Total power
Star Coupling: Total Power
P PaPb Pc
Q Qa Qb Qc
Delta Coupling: Total Active Power
1 63
P U BC (i ). I B (i ) U CA(i ). I A (i )
64 i 0
Delta Coupling: Total Reactive Power
1 63
P U BC (i).I B (i / 2) U CA (i).I A (i / 2)
64 i0
NOTE: The reactive power is computed by taking the values of the current a
quarter of period before [ sin(x) = cos (x – pi/2) ]
Apparent power: S P ² Q²
P
Power factor: cos( )
S
Q
Angle: tan 1 ( )
P
Harmonics
Harmonic values are directly issued from the DFT.
Sequence components
The sequence component computation is based on the fundamental values of phase and
magnitude (from the DFT): that is its imaginary part and real part.
Direct component
Re(direct ) Re( A) Re( B) cos(120) Im( B) sin(120) Re(C ) cos(120) Im(C ) sin(120)
1
3
Im(direct ) Im( A) Im( B) cos(120) Re( B) sin(120) Im(C ) cos(120) Re(C ) sin(120)
1
3
Inverse component
Re(direct ) Re( A) Re( B) cos(120) Im( B) sin(120) Re(C ) cos(120) Im(C ) sin(120)
1
3
Im(direct ) Im( A) Im( B) cos(120) Re( B) sin(120) Im(C ) cos(120) Re(C ) sin(120)
1
3
C264/EN FT/D31 Functional Description
Homopolar component
F = | Fline – Fbusbar |
V = | Vline – Vbusbar |
I1: samples of IA
I2: samples of IB
I3: samples of IC
I4: samples of Io
V1: samples of UA
V2: samples of UB
V3: samples of UC
I1: samples of IA
I2: samples of IB
I3: samples of IC
I4: samples of Io
V1: samples of UA
V2: samples of UB
V3: samples of UC
Frequencies
Thermal status
2
I t measurement
Synchrocheck data: ΔF ΔV ΔΦ
With the synchrocheck option, the values that follow are computed:
Slip frequency
Amplitude
Phase difference
Synchrocheck voltage
These measurements are put at the disposal of the computer every measurement reading
cycle defined by the configuration.
The primary measurements that follow are derived directly from sample values:
2
It and I t measurements
Thermal status
The following measurements are obtained from the Fourier of sample values or from the
Fourier values of the derived measurements (DFT ):
Power Factor
Synchrocheck measurements.
Functional Description C264/EN FT/D31
Frequency 0.01Hz
F: frequency tracking Hertz 36
F81: frequency used by 81 Hertz
Index of F 323
Index of F81 324
Rate of frequency_81 0.03Hz/sec Hertz/sec
Total power
Active phase power ( P ) <3% Watts 26
Active earth power(Po) <3% watts
Reactive power (Q) Vars 28
C264/EN FT/D31 Functional Description
Synchrocheck
Delta F Hertz 37
Delta V Volts 38
Delta phi Degree 39
Freq line Hertz 330
Freq bar Hertz 331
Phase Angle Degree 332
Anticipation angle Degree 333
Shift freq % 334
Acceleration shift freq % 335
Functional Description C264/EN FT/D31
Amplitude
Phase
offset
The offset correction has to be re-evaluate in real time and not in static way.
So the offset correction is made by a low pass filter (0.5Hz ). So the offset parameter stored
in EEPROM is not used.
The amplitude offset is used at each acquisition cycle.
Frequencies:
Frequency tracking
The frequency tracking is made by calculating the frequency of a voltage or current channel.
For each channel a minimum threshold is used to validate the signal (1 volt for VT, 0.1A pour
CT).
If a tracking is done on a channel, there is no change until the value of this channel becomes
lower than the threshold. There is no hysteresis on them. The channel changing respects the
following list:
V1 (first)
V2
V3
I1
I2
I3 (last)
Frequency computation
The first phase voltage channel over minimum threshold (Umin_F_enable) is selected, then
a filter FIR is applied to reject harmonic. On result, we calculate period by cross zero
method, on leading edge and on trailing edge, average result of this both measurement
generated frequency used.
Between 2 computations of the frequency, if the frequency change is more than 20Hz/s
(equals to a brutal step 400mHz at 50Hz), then the frequency calculation will be frozen and
INVALID during 7 cycles (for example, at 50Hz the frequency will be frozen during 120ms)
C264/EN FT/D31 Functional Description
1 31
Vrms Vi ²
32 i0
Fundamental measurements:
General
The instantaneous direct effective fundamental measurement, to be utilised by the
protections, is supplied every samples reception frame, in terms of both module and phase
as well as that for the real part and the imaginary part of the current vector. This is calculated
using the Fourier transform (DFT), applied to the samples of the last period recorded (32
samples) and expressed in ADC points.
So a multiplier coefficient is necessary to scale them in the appropriated unit.
Mod_IA Direct
Mod IB Direct
Mod IC Direct
Mod Io Direct
Mod _UB Direct Direct Direct Derived Derived Direct Not valid
Mod _UC Direct Direct Derived Derived Derived Direct Not valid
Mod _Uo Derived Direct Direct Direct Direct Derived Not valid
Mod _U_busbar Not valid Not valid Not valid Not valid Not valid Direct Direct
Mod_I1 Derived
Mod_I2 Derived
Mod_V1 Derived
Mod_V2 Derived
Ioc Derived
Conversion
Io
Io" * CT _ Ion
KIo ADC
U xy
U xy " *VT _ Un
KU ADC Un
Uo
Uo" *VT _ Uon
KUo ADC Uon
C264/EN FT/D31 Functional Description
Direct measurements
The real and the imaginary part are determined using the DFT method.
N
2 * i
Re(G ) sample * cos
i 1
i
N
N
2 * i
Im( G ) sample * sin
i 1
i
N
The real part and the imaginary part of every received valid sample are calculated.
Derived measurements
Voltages
k The earth to phase adaptation coefficient - (necessary for expressing the earth ADC
points in phase ADC points) amounting to:
Un KUADC VT _Uon
k
Uon KUoADC VT _Un
Positive and negative sequence current
The definition of positive sequence current, I1, indicates the current vector obtained by the
sum of the phase A vector, plus the phase B vector rotated by 120 in advance plus the
phase C vector rotated by a lag of 120.
The definition of the negative sequence current, I2, indicates the current vector obtained by
the sum of the phase A vector, plus the phase B vector rotated by a lag of 120 plus the
phase C vector rotated by 120 in advance.
Derived vectors:
Where the writing <IB/C+/-120°> points out that the vector is considered rotated of +/- 120°
Functional Description C264/EN FT/D31
Where the writing <UB/C+/-alfa> points out that the vector is considered rotated of +/- alfa
Computed Homopolar current
In order to use the protective function 67N in several specific conditions, the Homopolar
current must be computed from the values of the 3 phase currents:
I The generic current vector
Re(…) The operator that returns the real part of a generic vector;
Im(…) The operator that returns the imaginary part of a generic vector;
k The earth to phase adaptation coefficient - (necessary for expressing the earth
ADC points in phase ADC points) amounting to:
In KIADC CT _ Ion
k
Ion KIoADC CT _ In
The real and imaginary part of the derived current vectors, expressed in ADC points, will be
given by:
1
Re( I OC ) Re( I A ) Re( I B ) Re( I C )
k
Ioc
1
Im( I OC ) Im( I A ) Im( I B ) Im( I C )
k
Where:
Po The active earth power expressed in ADC points.
Active three-phase power
With any type of phase voltage insertion it is always possible to derive the vectors of the
phase-phase voltage’s fundamental.
Therefore, it is quite easy to calculate the three phase active power by using the Aaron
method; the formulas are:
P Re ( I A ) Re (U AB ) Im(I A ) Im(U AB ) Re ( I C ) Re (U BC ) Im(I C ) Im(U BC )
P
P"
3 KI ADC KU ADC Un
CT _ In VT _ Un
P ' In TA Un TV P" P
3 KI ADC KU ADC Un
Where:
P is the active three phase power expressed in ADC points;
Pn is the nominal three phase power to the secondary side, amounting to: Pn 3 In Un
Since In and Un are respectively the nominal current and the voltage to the secondary side;
P” is the active three phase power to the secondary side, expressed in Watt;
P’ is the active three phase power to the primary side expressed in Watt;
Reactive three-phase power
With whatever type of phase voltage insertion, it is always possible to draw the vectors of the
phase-phase voltage’s fundamental.
Therefore, it is easy to calculate the reactive three-phase power by using the Aaron method;
the formulas are:
Q Im(I A ) Re( U AB ) Re( I A ) Im(U AB ) Im(I C ) Re( U BC ) Re( I C ) Im(U BC )
Q
Q"
3 KI ADC KU ADC Un
InTA UnTV
Q' InTA UnTV Q" Q
3 KI ADC KU ADC Un
Where:
Q is the three phase reactive power expressed in ADC points;
Qn is the nominal three phase active power to the secondary side, amounting
to: Qn 3 In Un
Since In and Un are respectively the nominal current and the voltage to the secondary side;
Q” is the active three phase power to the secondary side, expressed in Qn;
Q’ is the active three phase power to the primary side expressed in VAR;
Functional Description C264/EN FT/D31
Power factor
The power factor is an instantaneous value, used only for visualising purposes. Indicated by:
P the three phase active power expressed in ADC points;
Q the three phase reactive power expressed in ADC points;
The power factor, or three phase cos, is calculated according to the following algebraic
function:
P
cos
P2 Q2
The sign of three phases cos is determined according to the following conventions:
P positive P negative
Q positive +L -C
Q negative +C -L
Thermal status
It can be demonstrated that, for dt=0.02s, the thermal status can be estimated according to
the following equation:
2
IMAX dt dt
(t dt) (t ) (t )
I
Where:
IMAX is the maximum of the three instantaneous values of the three phase RMS
currents.
I is the base current of the device to be protected (ratio between the device’s
nominal current – in other words the current that, at full operation, implies over-
temperature by 100% - and the nominal current of the TA).
I = K * Ith
I2T Measurements
There are 8 measurements dividable in 3 sets:
3 IT phase measurements
2 measurements computer by the sum of the IT phase measurements and I2T phase
measurements.
These measurements are always valid.
IT phase measurements
3 measurements based on the samples of the current phase:
T nb1
( IT _ PhaseA) N ( IT _ PhaseA) N 1 ia [t j ]
32 j 0
T nb1
( IT _ PhaseB) N ( IT _ PhaseB) N 1 ib [t j ]
32 j 0
T nb1
( IT _ PhaseC) N ( IT _ PhaseC) N 1 ic [t j ]
32 j 0
where:
T nb1 2
( I 2T _ PhaseA) N ( I 2T _ PhaseA) N 1 ia [t j ]
32 j 0
T nb1 2
( I 2T _ PhaseB) N ( I 2T _ PhaseB) N 1 ib [t j ]
32 j 0
T nb1 2
( I 2T _ PhaseC) N ( I 2T _ PhaseC) N 1 ic [t j ]
32 j 0
These measurements must reside in a non-volatile variable (SRAM) to allow its recovery in
event of auxiliary voltage loss.
IT and I2T sum measurements
These 2 measurements are computed by the sum of the IT phase measurements and I2T
phase measurements.
State Meaning
VALID Not in one of the following states
SELFCHECK FAULTY AI, DI board fault
SUBSTITUTED Operator action set MV value as valid state
FORCED Automatic valid state and configured value when AI is invalid
SUPPRESSED Operator set MV in this invalid state
UNKNOWN MV is acquired via a transmission link, and the link is
disconnected
SATURATED MV is beyond its nominal input range
UNDEFINED MV is Digital Measurement with invalid coding or computation on
analogue leads to error
OPEN CIRCUIT MV is DC 4-20 mA with input value under 4mA
OVERSHOOT[1..3] One of the 3 overshoot values has been crossed
UNDERSHOOT[1..3] One of the 3 undershoot values has been crossed
Functional Description C264/EN FT/D31
5.2.26 Transmission
The measurement value and state are transmitted on a client-server basis on the Ethernet
IEC-61850 network, using two modes:
Report based mode: the measurement is transmitted to the subscribers with its value,
its status, its time stamping and the reason for change.
Cyclic change: set if the measurement value has changed, without modification of
the resulting state
A Measurement value can be transmitted periodically or upon variation (% of nominal), and
anyway on state change.
V is computed either from the last transmitted value (mode 1) or from the full scale value
(mode 2):
V = (p/1000) * |Vt| where p is a value in the range 0 .. 255 and Vt is the last transmitted
value.
or
V = (p/1000) * |Vmax| where p is a value in the range 0 .. 255 and Vmax is the full scale
value.
C264/EN FT/D31 Functional Description
Decimal
Gray
BCD
5.3.2 Acquisition from Analogue Inputs
The tap position is acquired by measuring a current input.
A minimum value Imin (mA) corresponds to the lowest position 1 of the tap, and a maximum
value Imax corresponds to the highest value N.
The input current should take only discrete values: Ik =Imin + (K -1)(Imax-Imin)/(N-1) , with K
the position of the tap.
However the tap is considered in the position K if the current is in the range [Ik-I/2 ..
Ik+I/2], with I = N% of (Imax – Imin). The N percentage is defined in configuration.
The tap position is considered UNDEFINED outside of this range.
5.3.3 Manual suppression
A TPI can be suppressed by an order issued from an operator. No subsequent change of
value or state on a suppressed TPI can trigger any action: for example, display, alarm,
transmission. The TPI takes the “SUPPRESSED” state. When the operator unsuppresses
the TPI, this one takes its actual state.
5.3.4 Substitution
The value of a TPI can be substitute by an operator (state “SUBSTITUTED”, value defined
by the operator). The TPI stays in this state until he unsubstitutes it.
When a TPI is substituted, no changes of value nor state is transmitted, and computations,
for instance groupings, are made with the substituted state. When the TPI is unsubstituted,
the actual state and value are transmitted to higher control levels and subsequent changes
of state and value are transmitted again.
5.3.5 Forcing an invalid TPI
When a TPI is invalid: that is, SELFCHECK FAULTY, UNDEFINED or UNKNOWN; it can be
manually forced by a user (state “FORCED”, value defined by the operator). This feature is
similar to the substitution but the information is automatically updated when valid information
is available again.
The automatic forcing function is not provided for TPI.
C264/EN FT/D31 Functional Description
State Comment
VALID not in one of the below states
SELFCHECK FAULTY Due to an AI board fault or a DI board fault
SUBSTITUTED See § 4.4
FORCED
SUPPRESSED
UNKNOWN If the tap position is acquired via a transmission link, the
information is unknown when the link is disconnected.
UNDEFINED Due to a wrong encoding for a digital acquisition, or a saturation,
an open-circuit or an out-of-range value for an analogue
acquisition
OVERSHOOT[1..3] It exists 3 “Overshoot” states, one for each upper threshold
violation. Only one could be set at one time
UNDERSHOOT[1..3] It exists 3 “Undershoot” states, one for each lower threshold
violation. Only one could be set at one time
5.3.7 Transmission
The TPI are transmitted on a client-server basis on the IEC-61850 network using the report
mechanism.
During a loss of communication between a client and a server, all server TPI are set to
UNKNOWN on the client.
The TPI is transmitted as soon as a value change or a status change is detected. The TPI
information transmitted in a report are:
The TPI value
Change due to control: set if the state or quality change is due to a control
The TPI information transmitted in a GOOSE is the same than in a report, except for the
"reason for change" and the time-stamping.
Functional Description C264/EN FT/D31
E Ei
( M M i 1 ) ti ti 1
Ei S f * i *
2 3600
With:
E = total Energy counter value (continuous register)
Ei = Integration result at time ti
Sf = Scaling Factor (defined during the configuration phase)
Mi = absolute value of the Measurement at time ti
ti – ti-1 = 1 second
For a given measurement, the integration can be done only after receiving two consecutive
valid values with the same sign of the measurement. The integration result (E i) is added to
the associated export or import counter according to the sign of the measurement.
The integration is stopped as soon as the power measurement becomes invalid or changes
of sign. The integration is restarted as soon as two consecutive valid measurement values
with the same sign are received.
Current values of energy counters are stored in secured memory ( 48h autonomy when
power supply is off). Current values of energy counters can be modified by an operator.
Values of energy counters are transmitted on a client-server basis on the IEC-61850 network
using mechanism through the LN MMTR.
During a loss of communication between a client and a server, all server energy counters are
set to UNKNOWN state on the client.
NOTE: Do not use the energy counter values for the billing application.
C264/EN FT/D31 Functional Description
Open / Reset order => Open state for DPS, Reset state for SPS
Close / Set order => Close state for DPS, Set state for SPS
To leave the Test mode, the user, through the SMT, changes the C264 mode to Operational.
The C264 automatically goes in Maintenance mode (transient) before going in Operational
mode.
The user of the Test Mode owns all responsibility of controls performed during the Test
Mode, and before leaving the Test Mode, he owns all responsibility to restore the system. In
Test Mode, all controls performed may impact Isagraf programs or PSL automatisms.
NOTE 1: Digital and Analogue Setpoint with measurement feedback are not
managed in Test Mode: that is, they are managed as in Operational
mode.
NOTE 2: IEC61850 exchanges (reports, gooses) are not impacted by the C264
Test Mode. That means that a control done in Test Mode, that is sent
to another computer - that is not in test mode - or to an IED (legacy or
not) may be fully and physically executed on the device.
5.6.2 Device order running
An « order running » SPS is managed on a per module basis. The “bay order running” is still
managed.
In event of Direct Execute control, this SPS is:
SET as soon as the C264 accepts the control: that is, after the control checks
SET as soon as the C264 accepts the control selection: that is, after the selection
checks
SET as soon as the execute control is received by the C264: that is, before the checks
SET as soon as the control selection is received by the C264: that is, before the
checks
The FBD output, an SPS on computer A/B, goes to the SET position
FBD output 1, an SPC wired on DO of A/B and looped to DI for feedback, goes to the
SET position
FBD output 2, an SPC wired on DO of A/B and looped to DI for feedback, goes to the
SET position
When Computer B goes into active mode and Computer A goes into standby mode, these
events occur:
The FBD output 1 (SPC) and the FBD output 2 (SPC) stay in the SET position
The FBD Output (SPS) goes to the RESET position for the Timer time (T-ON is equal
to 20 seconds).
After this time, the FBD Output (SPS) goes to the SET position.
When you use Micom S1 to modify the time of the timer, the FBD Output (SPS) goes to the
RESET position. It stays in the RESET position for the modified time and then goes to the
SET position.
When Computer A goes into the Faulty mode and Computer B goes into the active mode,
the FBD Output (SPS) goes to the RESET position for the duration equal to the Timer time.
Then the FBD Output (SPS) goes to the SET position. The FBD Output 1 (SPC) and FBD
Output 2 (SPC) stay in the SET position.
Functional Description C264/EN FT/D31
6. CONTROL SEQUENCES
6.1 Description
A Control Sequence is a basic built-in function on a module (switch, relay, and function). It
receives control order, sending back acknowledgement. After checks, control sequence
sends control (protocol or DO), and check correct execution with feedback from protocol or
from DI.
6.1.1 General
The C264 allows the following functions:
Control of transformers
Control of IEDs
Control of automatisms
These types of controls are allowed:
“Select Before Operate once” mode” (SBO once): usually for circuits breakers and
disconnectors. The device must be selected before allowing the execution. In that
event the device is managed in two phases: selection and execution. Device
unselection is done automatically by the computer.
“Select Before Operate many” (SBO many): usually for transformers. The device
must be selected before execute one or more controls before reaching the expected
position (low/raise). In that event the device is managed in three phases: selection,
execution and unselection. The execution phase is repeated for every new control. To
end the controls sequence, the initiator of the request must send an “unselection”
request.
By configuration, each DPC order (close order or open order) and each SPC can activate
simultaneously two DO contacts.
C264/EN FT/D31 Functional Description
Transformers: They are managed in the three modes: “Direct Execute”, “SBO
once” and “SBO many” mode with optional hardware selection of the device in SBO
mode.
Ancillary devices: they are usually managed in “Direct Execute” mode but can be
managed also in “SBO once” mode.
Controls via Setpoints: are managed in “Direct Execute” mode and in “SBO once”
mode.
6.1.2 Control sequence phase management
According to the configuration of the device control, a control sequence is performed in one,
two, or three phases. Each phase of a control sequence (selection, execution and unselection)
may have a normal or abnormal termination and positive or negative acknowledgement is sent
to the IEC-61850 clients subscribed during the configuration process.
The following figures show the three control modes of the computer:
Inter-control delay
Computer mode
Device selectable
Uniqueness
In event of fail, the initiator of the request may bypass the checks that follow:
Uniqueness
C264/EN FT/D31 Functional Description
Next diagram schematises controls and bypass according the description of the device.
Changing mode:
From “operational” mode to “test” mode: the specific control “test” mode is
refused if at least one control is in progress.
From “test” mode to “operational” mode: the specific control “test” mode is
refused if at least one control is in progress.
The request is accepted only if the device is in the opposite state and valid
The request is accepted only if the device is in the opposite state, jammed or
undefined
The request is refused only if the device is in the same state and valid. In any event, if
the request is refused, a negative acknowledgement is sent back
6.1.6.9 Uniqueness
It is possible by configuration to prevent to have more than one control at a time.
For the whole substation
Inside a bay
The following figure describes the algorithm used between computers.
If a device is under control and another control is sent on this device, the second one is
ignored.
In event of uniqueness of the command at least to one of these levels the selection is
refused, with negative acknowledgement. The user may bypass this control during selection
request.
6.1.7 Selection behaviour
In SBO once mode and SBO many mode, the configuration process allows to describe
optionally, a device selection to control the device.
The following configurations must be considered:
Configuration 1: device with a control for selection and its associated selection
position information.
Inter-control delay
Computer mode
Uniqueness
Execution checks and bypasses are identical to those of the selection phase. Moreover, in
event of ”SBO once” mode or ”SBO many” mode the computer verifies that the device was
previously selected.
The checks of the execution phase in “SBO many” mode are identical as above but they
are repeated for every execution request (low/raise).
In “Direct Execute” mode the device selection is not verified because it is not allowed.
6.1.9 Execution behaviour
On this stage the control request is executed via:
I/O boards
IED communication
Digital Setpoints
Analogue Setpoints
Single Point Control and Double Point Control
However, the execution control sequence depends on the activation mode of the xPC. By
configuration, this activation mode of SPC and DPC may be “transient”, “permanent” or
“permanent until feedback until feedback”.
Transient: the contact is closed and then re-opened automatically after a delay
(defined during the configuration of the xPC). For a DPC, configuration gives two
delays need to be configured, one for open and one for close.
Functional Description C264/EN FT/D31
Permanent: For this type of output control, the contact is held in the requested
position state until the a reverse order is received.
Permanent until feedback: The contact is held in the requested position state until
confirmation of the position of the device or after timeout awaiting the new position of
the device. In this event, the input information of the device status must be configured.
Digital and Analogue Setpoints
Digital Setpoints are executed via Digital Output boards. This type of control is managed in
“Direct Execute mode” only.
Analogue Setpoints are executed via Analogue Output boards. This type of control is
managed in “Direct Execute mode” only.
A C264 can have 256 numbers of Digital or Analogue Setpoints
Device features: selection control wired/not wired, selection position wired/not wired,
device position wired/not wired and so on
The chronogram that follows shows an abnormal termination of Direct Execute sequence.
The device hasn’t taken the expected position in the given delay.
Stage 2: the selection is confirmed by the associated input information in the feedback
delay (0 – 1-sec user selectable)
Stage 3: close the device before the end of the selection timeout delay (0 – 10 MN
user selectable)
Stage 4: the device has taken the expected position (close) in the feedback delay (0–
60 sec user selectable). The computer deselect the device (open selection output
control)
Functional Description C264/EN FT/D31
Stage 5: confirmation of the deselecting of the device in the same given delay than
stage 2.
The chronogram that follows shows controls sequence that is aborted after time-out of the
selection delay.
Stage 2: the selection is confirmed by the associated input information in the feedback
delay.
Stage 2: close the device before the end of the selection timeout delay (0 – 10 MN
user selectable)
Stage 3: The device has taken the expected position (close) in the feedback delay (0–
1-sec user selectable). The computer deselect the device (open selection output
control)
6.1.10.3 SBO many time sequencing
SBO many mode is exclusively used for control of transformers. Refer to associated section.
6.1.11 How an xPS starts a control sequence with following data
Control sequence launched by an xPS
The xPS datapoints permit to launch a device control sequence (operator control from a
hardwired mimic for example). These xPS datapoints activate the control as it is currently
performed when the control comes from the IEC61850 or the local C264 HMI. The sequence
cancel is not allowed. Only Direct Execute (DE) control types are allowed.
The xPS launches xPC (Direct Execute) with "control sequence activating Yes/No”
Value of
Activate control
xPS State xPC state Action
sequence in
SCE
YES SET xPS Open xPS launches xPC
YES RESET xPS Close xPS doesn’t launch xPC
NO SET xPS Open xPS launches xPC
NO RESET xPS Close xPS launches xPC
The state of xPS is SET only after the time delay is obeyed when delay values of
Debouncing, filtering, toggling and toggling end of the C264 is set to its maximum,
minimum and an intermediate value possible within the specified range
The filtering delay is configured in the C264 attributes in SCE.
The xPC Control launched by bay xPS changes control originator field orCat to Bay
Level and orIdent to xPS label
NOTE 1: Usage of order labels in profile for SPC in SCE, "order on" and "order
off" should be "Yes".
NOTE 2: “Control Sequence Activating” attribute for SPC and DPC = "Yes".
C264/EN FT/D31 Functional Description
Control is authorised by computer LCD and not by SPS when Bay L/R is priority 1 and
operates in local mode; and Synoptic L/R is priority 2 with operating mode not taken into
account by C264.
Control is authorised by xPS and not by computer LCD when Bay L/R is priority 1 and
operates in Remote mode; and Synoptic L/R is priority 2 and operating in Local Mode.
Control is authorised by xPS and not by computer LCD when Bay L/R is priority 2 with
operating mode not taken into account by C264 and Synoptic L/R is priority 1and operating
in Local Mode.
Control is authorised by computer LCD and not by xPS when Bay L/R is priority 2 and
operates in local mode; and Synoptic L/R is priority 1 operating in Remote Mode.
Functional Description C264/EN FT/D31
SCE ISaGRAF
Status Status DINT
Quality Quality DINT
GlobalAlarmStatus Alarm SINT
For ISaGRAF details, refer on §6.1.12 Attribute Words definition on Status Table (SPS, DPS,
MPS) and Quality Table (DP quality : xPS / MV).
Status Table
Attribute for Attribute Word Define
SPS Status RESET 1
SUBST_RESET
FORCED_RESET
SET 2
SUBST_SET
FORCED_SET
DPS Status JAMMMED 3
OPEN 4
SUBST_OPEN
FORCED_OPEN
CLOSE 5
SUBST_CLOSE
FORCED_CLOSE
UNDEFINED_STATUS 6
C264/EN FT/D31 Functional Description
Status Table
Attribute for Attribute Word Define
MPS State MPS_STATE1 7
MPS_STATE2 8
MPS_STATE3 9
MPS_STATE4 10
MPS_STATE5 11
MPS_STATE6 12
MPS_STATE7 13
MPS_STATE8 14
MPS_STATE9 15
MPS_STATE10 16
MPS_STATE11 17
MPS_STATE12 18
MPS_STATE13 19
MPS_STATE14 20
MPS_STATE15 21
MPS_STATE16 22
Quality Table
Attribute for Attribute Word Define
DP quality : xPS / MV VALID 0
SELFCHECK_FAULTY 1
UNKNOWN 2
FORCED 4
SUPPRESSED 8
SUBSTITUTED 16
TOGGLING 32
UNDEFINED_QUALITY 128
DP quality : MV SATURATED 64
UNDEFINED_QUALITY 128
OPEN_CIRCUIT 256
L_THRESHOLDVIOLATION 512
LL_THRESHOLDVIOLATION 1024
LLL_THRESHOLDVIOLATION 2048
H_THRESHOLDVIOLATION 4096
HH_THRESHOLDVIOLATION 8192
HHH_THRESHOLDVIOLATION 16384
DP quality : CT OVERRANGE 64
Quality and Ret code TOPO_UNCERTAIN 0
for is_connected_to FORCING
TOPO_UNCONNECTED 1
SUBSTITUTING
TOPO_CONNECTED 2
UNFORCING 3
UNSUBSTITUTING 4
SUPPRESSING 5
UNSUPPRESSING 6
Functional Description C264/EN FT/D31
Order Table
Attribute for Attribute Word Define
SPC ORDER_OFF 0
ORDER_ON 1
SELECT_OFF 4
SELECT_ON 5
DPC ORDER_OPEN 0
ORDER_CLOSE 1
SELECT_OPEN 4
SELECT_CLOSE 5
SPC / DPC ORDER_RAISE 0
ORDER_LOWER 1
SELECT_RAISE 4
SELECT_LOWER 5
BYPASS BYPASS_NONE 0
BYPASS_INTERLOCK 1
BYPASS_LOCKING 2
BYPASS_MODE 4
BYPASS_UNIQUENESS 8
BYPASS_AUTOMATION 16
BYPASS_SYNCHROCHECK 32
BYPASS_ALL 63
Acknowledge Table
Designation Attribute Word Define
Acknowledge Code : Positive
acknowledge ACK_OK 0
Acknowledge Code : Incoherent
command ACK_INCOHERENT_REQUEST 1
Acknowledge Code : Command
sent while computer is being
initialized ACK_COMPUTER_NOT_READY 2
Acknowledge Code : Site or bay
exploitation mode error ACK_BAY_SUBST_MODE_FAULT 3
Acknowledge Code : Computer
or GTW is in maintenance mode
or faulty ACK_CONTROL_MODE_FAULT 4
Acknowledge Code : Device
locked ACK_DEVICE_LOCKED 5
Acknowledge Code : A
command is being processed on
the device, or command
received during command
prohibited delay ACK_REQUEST_IN_PROGRESS 6
Acknowledge Code : Interlock
has refused command ACK_INTERLOCK_NOK 7
Acknowledge Code : Command
does not change device state ACK_DEVICE_ALREADY_IN_POS 8
Acknowledge Code : Board
fault ACK_HW_FAULT 9
Acknowledge Code : Device is
in an invalid position ACK_POS_INVALID 10
Acknowledge Code : Time-out
between selection and
execution or time-out in IED
answer ACK_TIMEOUT_FAILED 11
C264/EN FT/D31 Functional Description
Acknowledge Table
Designation Attribute Word Define
Acknowledge Code : Device is
locked by an automation
function ACK_AUTOMATION_RUNNING 12
Acknowledge Code : Selection
received on an already selected ACK_DEVICE_ALREADY_SELECT
device ED 13
Acknowledge Code : Selection
received on a device configured
as Direct Execute ACK_DEVICE_NOT_SELECTABLE 14
Acknowledge Code : Command ACK_UNIQUENESS_INCOHEREN
uniqueness default CY 15
Acknowledge Code : Execution
command received on a non
selected device ACK_NO_SELECTED 16
Acknowledge Code : Operator
has cancelled command ACK_OPERATOR_CANCEL 17
Acknowledge Code : Time-out
while waiting for feedback TS ACK_EXTERNAL_FAULT 18
Acknowledge Code :
Acknowledgement failed ACK_FAILED_ORDER 19
Acknowledge Code : Time-out
waiting for TS TCIP present ACK_BAD_TCIP 20
Acknowledge Code : Bad tap
position after a command ACK_BAD_TAP 22
Acknowledge Code : Received
command "lower" while tap is
already at min ACK_MIN_TAP 23
Acknowledge Code : Received
command "raise" while tap is
already at max ACK_MAX_TAP 24
Acknowledge Code : Command ACK_DEVICE_FAILED_TO_OPER
to a non connected IED ATE 25
Acknowledge Code :
Synchrocheck has refused
command ACK_SYNCHRO_NOK 26
Acknowledge Code : ATCC is
stopped ACK_GLOBAL_ATCC_OFF 27
ACK_TOO_MANY_TRANSFOR
Acknowledge Code : MER 28
Acknowledge Code : ACK_INVALID_TOPOLOGY 29
Acknowledge Code : ACK_INVALID_TPI 30
ACK_TRANSFORMER_BAY_DI
Acknowledge Code : SCONNECTED 31
Acknowledge Code : ACK_MCB_TRIP 32
ACK_INVALID_TRANSFORME
Acknowledge Code : R_VOLTAGE 33
ACK_INVALID_BUSBAR_VOLT
Acknowledge Code : AGE 34
Acknowledge Code : IEC61850 ACK_PARAMETER_CHANGE_
conformance test add on IN_EXECUTION 35
Acknowledge Code : Non
PACiS IED failed on select ACK_SELECT_FAILED 36
Acknowledge Code : ACK_ICT_OUVERT 37
Acknowledge Code : Time-out
waiting OFF state of TCIP
information ACK_TCIP_TOO_LONG 21
Functional Description C264/EN FT/D31
1. The computed double signal is equal to the physical status if the phase not together
status is equal to “false” else the computed signal is equal to “jammed”.
2. The computed “phases not together” is equal to “false” if all phases are in the same
position else it is equal to “true”.
3. The computed signal is equal to the phase A status if the phase not together status is
equal to “false” else the computed signal is equal to “jammed”.
4. Only the “DPC close “ is known by the other IEC-61850 equipment:
For open the device they send the “DPC close” with “open” request
For close the device they send the “DPC close” with “close” request
6.2.2 Control sequence of non-synchronised circuit breakers
Circuit breakers devices are managed in ”Direct Execute” mode and in “SBO once” mode.
Refer to the generic description above.
C264/EN FT/D31 Functional Description
1. The computed double signal is equal to the physical status if the phase not together
status is equal to “false” else the computed signal is equal to “jammed”.
2. The computed “phases not together” is equal to “false” if all phases are in the same
position else it is equal to “true”.
3. The computed signal is equal to the phase A status if the phase not together status is
equal to “false” else the computed signal is equal to “jammed”.
4. Wired SPC and SPS for external synchrocheck and system SPC and SPS for internal
synchrocheck. If is not configured the external synchrocheck module or the
synchrocheck automatism is considered always “set on”. DPC and DPS are used only
for manual synchrocheck.
Functional Description C264/EN FT/D31
In event of fail of one of these operations, the controls sequence is stopped with a negative
acknowledgement
Execution phase:
6. Close the device using synchrocheck output control
7. Verify the device position become close in the given delay
8. Set off synchrocheck module if it previously set on
9. Deselect the device if it previously selected
The chronogram that follows shows a successful control sequence ”close with
synchrocheck”.
An SBO once sequence to close the CB by the synchrocheck module and put out of
service the synchrocheck module
Three sequences:
A “direct execute” sequence to put out service the external synchrocheck module
The scheme that follows shows a close control request where an operator at the HMI or
gateway manually manages the external synchrocheck module.
Execution phase:
5. Close the device via the “close with synchrocheck” control
6. Verify the device position become close in the given delay
7. Set off the synchrocheck module if is configured to be set off automatically
8. Deselect the device if it previously selected
Third sequence (DIRECT EXECUTE): set off the external synchrocheck module
This sequence takes place only if the setting off of the synchrocheck module is configured
“manual”
1. Open “set on/setoff” output control of the synchrocheck module
2. Verify that the synchrocheck module is set on (if on/off synchrocheck input information
is configured)
The chronogram that follows shows a successful control sequence ”close with
synchrocheck” performed in three sequences. In event of automatic “setting off” of the
synchrocheck module the chronogram remain identical. It is performed at the end of the SBO
sequence.
NOTE: During SBO sequence after step 5 the initiator of the request may
force the closing of the device.
C264/EN FT/D31 Functional Description
Selection phase:
1. Close device selection output to select the device (if is configured)
2. Verify selection device input information associated to the output (if is configured)
3. Wait for the execution close request or timeout selection
In event of fail of one of these operations, the device is deselected and the controls
sequence is aborted with a negative acknowledgement.
Execution phase:
4. Active the associated internal synchrocheck automatism for authorisation to close the
device
5. Wait authorisation to close
Event 1: Synchrocheck automatism respond OK before the time-out of the given delay
The chronogram that follows shows an abnormal termination of control sequence ”close with
internal synchrocheck”.
Earthing switch
DISCONNECTORS SWITCHES
OUTPUTS TYPE A INPUTS ALL TYPES
DEVICE DPC control for open/close of device DPS physical position of the device
CONTROL
DEVICE SPC (optional) control of device SPS (optional) device selection
SELECTION selection position information
OUTPUTS INPUTS
TRANFORMER DPC: raise/lower TPI value
CONTROL
SPS (optional) tap change in progress
(TCIP)
TRANSFORMER SPC (optional) transformer SPS (optional) selection position
SELECTION selection information
TRANFORMER Double wound or Auto-wound
TYPE NOTE 1
A “raise” control is refused if the current tap position value corresponds to the
maximum position of the tap.
A “lower” control is refused if the current tap position value corresponds to the
minimum position of the tap.
TCIP apparition delay: The TCIP information must appear before the time-out of this
delay.
TCIP disappearance delay: The TCIP information must disappear before the time-out
of this delay.
TPI feature: Because the TCIP input information is not always configured, the tap control is
performed using only the Tap Position Indication (TPI) value to verify the right execution of
the request. The TPI value must change in the given delay.
The following examples are given in “SBO many” mode that is the more complex. The main
difference with the “SBO once” mode remains to the possibility to execute many “raise” or
C264/EN FT/D31 Functional Description
“low” controls before ending the sequence. Moreover, the device is not deselected
automatically but only after an unselect order sent by the initiator of the control request.
6.5.2.1 Control of transformer with TCIP
In this mode, when the TCIP input information is configured, the selection and execution
phase are performed as follows: It is possible by configuration to prevent to have more than
one control at a time.
Selection phase:
1. Close device selection output to select the device (if configured)
2. Verify selection device input information associated to the output (if is
configured)
3. Wait for the execution request (low/raise) or timeout selection
In event of fail of one of these operations, the device is deselected, the controls
sequence is aborted with a negative acknowledgement.
Execution phase:
4. In agreement with the request “raise or lower” and the type of device, execute
the associate control
5. Wait for the TCIP data and TIP value to confirm execution. Two events:
Event 1: The TCIP information appears and is disappears in the given
delays, the TPI takes the expected value: The computer sends a positive
acknowledgement and waits a new request (execution or unselection).
NOTE (1) The TPI value must take the expected value at least at the end of TCIP
disappearance.
The chronogram that follows shows an abnormal termination of tap changer control
sequence due to absence TCIP confirmation. In this event the device is automatically
deselected and the sequence ends with a negative acknowledgement
In event the TCIP input information is not configured the selection and execution phase are
performed as follows:
Selection phase:
1. Close the device selection output to select the device (if configured)
2. Verify selection device input information associated to the output (if configured)
3. Wait for the execution close request or timeout selection
In event of fail of one of these operations, the device is deselected, the controls
sequence is aborted with a negative acknowledgement.
Execution phase:
4. In agreement with the request “raise or lower” and the type of device, execute
the related control
5. Wait for the TPI data and compare with the previous value. The difference must
confirm the “low” or “raise” execution. Two events:
Event 1: The TPI value confirms in the given delay the execution request: The
computer sends a positive acknowledgement and waits a new request
(execution or unselection) from the initiator.
Event 2: Timeout awaiting the TPI value or unexpected TPI value: The device is
deselected (if it was previously selected), and the sequence is aborted with a
negative acknowledgement.
6. Wait for the new execution request or unselection request to deselect the device
In event of new request the computer repeat the steps 4 and 5.
In event of unselection request the computer deselects the device (if it was
previously selected), and ends the sequence with a positive acknowledgement.
Functional Description C264/EN FT/D31
The chronogram that follows shows a successful sequence with device selection, a raise
control and device unselection
The chronogram that follows shows an abnormal termination due to the absence of change
of the TPI value in the given delay. The device is automatically deselected, and the
sequence is aborted with negative acknowledgement.
IED connected,
SBMC mode,
Lock condition,
Inside a bay
If a device is under control and another control is sent on this device, the second one is
ignored.
In event of uniqueness of the command at least to one of these levels the selection is
refused, with negative acknowledgement. The user may bypass this control during selection
request.
6.10.5 Inter-control delay
It is possible by configuration to define an inter-control delay that is a minimum delay
between two consecutive controls on the same device.
6.10.6 Status of the device
If the status of the device is not valid, it is possible by configuration to prevent control.
6.10.7 Lock device
Controls are not allowed on a lock device.
6.10.8 Running Automation
If there is a related automation in operation, controls are not allowed on a device.
For example controls issued from PACiS HMI or gateway are not allowed on a transformer
controlled by voltage regulation.
6.10.9 Interlocking
The operation of a switching device, such as circuit breakers; traditional disconnecting
switches; disconnecting switches with abrupt rupture; and ground disconnecting switches; is
directly related to the nature of the switch and to its environment.
To operate these devices you must respect some conditions. These conditions, called
interlocking, are managed by logical equations within the C264.
Interlocking prohibits a control sequence that may violate the device operating condition: for
example, break capability, isolation, and so on; or plant operating condition.
Functional Description C264/EN FT/D31
7. AUTOMATIONS
C264 provides three different ways to perform automation functions:
Programmable Scheme Logic (PSL)
2
Circuit Breaker Condition Monitoring (I t)
xPS/xPC Association
Pole Discrepancy
Synchrocheck
7.1.1 Auto-Recloser (AR)
7.1.1.1 Introduction
80-90% of faults on the electrical network are transient, such as lightning or insulator
flashover. When a fault occurs, the Circuit Breaker is tripped in order to protect the system.
The Auto-Recloser function is then used to close the circuit breaker after a set time, a time
that is long enough to allow the fault to clear. This duration is called cycle delay and is
defined in the database during the configuration phase.
But, as permanent fault can occur, an auto-recloser scheme has to be provided in order to
allow the elimination of a transient fault by an open/close sequence (auto-reclosing cycle)
and the elimination of permanent fault by, after a defined number of auto-reclosing cycle (4
cycles maximum), leaving the circuit breaker in the open state by closing the trip relay.
A transient fault, such as a lightning strike, is one that is cleared by immediate tripping of one
or more CB’s to isolate the fault, and does not recur when the line is re-energised.
This means that in the majority of fault incidents, if the faulty line is immediately tripped out,
and if time is allowed for the arc to de-ionise, reclosure of the CB will result in the line being
successfully re-energised. (A Closed/Open/Closed cycle)
However, some faults will be permanent (such as a line fallen to earth). In this event the
auto-recloser must be able to react to the permanent fault, and on the first reclose and
detection of the permanent fault open the CB’s (and, if required lock out the auto-reclose
functionality). (This is a Closed/Open/Closed/Open, 4 cycle system).
Auto-recloser (AR) schemes are implemented to carry out this duty automatically.
Functional Description C264/EN FT/D31
7.1.1.2 Behaviour
The general diagram of the auto-recloser function follows:
Auto-recloser out
of service
In Service request
Auto-recloser in
service
TRIP /TRIP_1P_X
3 phases
no CB_HEALTHY 1 phase Analysis of the CB_HEALTHY no
Cycle n°=1
= SET ? received trip = SET ?
yes yes
Waiting CB Waiting CB
opening opening
End of 150 ms
End of 150 ms timer
CB open timer CB open
AR locked AR locked
Launch cycle timer Launch cycle timer
(for first single-phase (for 3-phases cycle)
cycle)
TRIP
TRIP_1P_X End of always set
End of always set timer
TRIP
timer
AR locked
AR locked
AR_BLOCKING no
AR_BLOCKING = RESET ?
no = RESET ?
yes
yes
Closing the CB
Closing the CB
New CB
CB closed TRIP closed
TRIP
Launch
recovering timer
End of TRIP
timer
Cycle n°=2
End of
TRIP
timer
no
Last cycle?
yes
AR locked
C0508ENa
The TRIP_1P_X or TRIP signal sent by the protection relay (single-phase trip / 3-
phases trip)
In a single phase cycle, only one phase position is awaited in the OPEN state
(CB_STATE_1P_X)
In a 3-phases cycle, each one phase positions is awaited in the OPEN state
Whatever was the cycle, the 3 phase position is awaited in the OPEN state
(CB_STATE)
For a 3-phase cycle, the DO “AR_TRIP_3P” is closed (if configured) as soon as the CB is
detected as open.
The auto-recloser function is locked if the CB is not opened at the end of the timer.
7.1.1.2.4 Launch cycle timer
As soon as the CB is detected as open, the timer associated to the current auto-recloser
phase is launched.
During the single-phase cycle, the trip signal must disappear: if not, the auto-recloser
function will be locked. Furthermore, a 3-phases trip could appear. In this event, the current
cycle is stopped and the second 3-phases slow cycle is launched.
Functional Description C264/EN FT/D31
A trip during the last auto-recloser cycle (in this event, the AR_STATE signal is set at
the AR_BAR_SHOTS state)
A lock signal through the AR_LOCK Binary Input at the SET state
There is no pole discordance at the end of the single-phase cycle: that is, the three
phases are opened
2 phases are in an opened state at the end of the single-phase cycle without 3-phases
trip signal
If none of these methods are selected, the auto-recloser is automatically unlocked if no lock
condition is set and circuit breaker is closed. In this event, the Reclaimml timer is launched. If
the CB is not closed at the end of this timer, the auto-recloser is locked again.
7.1.1.3 Information and parameters
Trip Circuit Supervision with two Digital Inputs without external resistor: FIGURE 56:
TRIP CIRCUIT SUPERVISION WITH TWO DI.
For the Trip Circuit Supervision with one Digital Input + external resistor, please refer to
FIGURE 55: TRIP CIRCUIT SUPERVISION WITH ONE DI.
The resistor (R) in the trip circuit supervision scheme should have a value in agreement with
2 limits:
1. High enough so that once the CB is open, the tripping coil powered via the resistor
has no magnetic effect anymore so that the tripping mecanism is released (within a
possible delay due to inductive effect of the coil).
2. Low enough so that the C264 input powered via the resistor (and the tripping coil) is
detected active.
Therefore:
1. It is assumed that 10% of nominal voltage applied on the tripping coil makes its
magnetic effect low enough to release the tripping mechanism after activation. Taking
into account normal tolerance on power supply, this leads to a minimum value of R
being approximately 10 to 12 times the resistance of the tripping coil.
2. The input was tested to operate with a series resistor up to 40kOhm, still leaving
voltage across the input above the minimum. Taking into account tolerances, this
defines a maximum value for the resistor of 20kOhm.
We recommend the value in the middle of the range (geometrically). If Rc is the resistance of
the tripping coil, then:
R / 12xRc = 20kOhm / R
The power rating of the resistor must be such that it withstands permanent application of
maximum trip circuit voltage. Therefore:
2
P = (1.2 x Uaux) / R
Functional Description C264/EN FT/D31
+ Uaux
Computer
Protection relay
Vn+
DI-1
Vn-
Vn+
DI-2
Vn- Load Supply
Vn+
DI-3
Vn-
CB
- Uaux
C0138ENc
+ Uaux
Computer
Protection relay
Vn+
DI-1
Vn-
Vn+
DI-2
Vn-
Vn+
DI-3
Vn-
Vn+
DI-4
Vn-
CB
- Uaux C0139ENb
The number of CB operations for the 3 poles (i.e. the highest of the pole values)
The C264 cumulates from the latest reset:
C0461ENa
7.1.3.3 Monitoring
The C264 can monitor each cumulated value with two thresholds settable independently and
display an overrun event on the local mimic or activate a LED.
The information can feed in any local or distributed automation scheme.
7.1.3.4 Inhibition
The function can be disabled through a setting.
To prevent the sums from accruing, for example during a test, use:
The Micom S1
7.1.3.5 Storage
The values are stored in a non-volatile memory to save them in event of auxiliary power
outage.
A dedicated procedure allows you to set the stored values with the CAT on a per
measurement basis.
The switch of any new configuration database does not reset any of the stored values, but a
software download does.
In event of a C264 redundancy, the stored values in the standby computer are exchanged
from Main to Standby after each calculation.
C264/EN FT/D31 Functional Description
Manual (open loop): the operator forcefully issues Raise/Lower commands to the tap
changer from the LHMI
Automatic (closed loop): the AVR algorithm issues Raise/Lower commands to the tap
changer when the voltage is outside limits and tap changer conditions permit; the
operator can still deactivate the algorithm from the LHMI.
The possibilily of other manual controls In automatic mode depends on the parameter
manual controls allowed:
Not allowed
Only when AVR is locked (whether it is due to the External regulation locking or to an
AVR additional features: overcurrent detection, tap changer blocking)
Always
7.1.4.1.4 Interfaces for a single transformer
Optional:
Raise/lower
Analog Inputs
WD
output signals
contacts
Optional:
Analog Outputs
Optional:
VT fuse
Serial Comm.
CB posit. to IEDs
7.1.4.1.5 Hardware
The MiCOM C264 includes in a 40 TE rack:
2 CB positions
1 VT Fuse
+7 customizable DIs (Bay L/R, AVR Auto/Manu, AVR on/off, alarms, external lock,
voltage target selection)
2 Raise/Lower controls
1 AVR ON/OFF
A TMU220 board (4 CTs / 5 VTs) for direct acquisition of currents and voltages
Each transformer is controlled by one computer but the AVR function is only activated on
one computer. The figure exemplifies an architecture that controls two transformers:
AVR function is activated on computer C264-1. This computer gets analogue values through
the station bus from computers C264-2 and C264-3 and issues tap changer commands
through the station bus.
7.1.4.2 Moving a tap changer
In this part, the settings name and values are surrounded with quote marks (“…”), while the
first letters of status labels are capitalized. The former are set, the latter positioned.
7.1.4.2.1 Actual voltage
Depending on the “Regulation types”, the actual (i.e. measured) voltage can be:
At AVR start up, the local target voltage mode is active for a defined delay (end of
local target voltage delay).
If a valid remote target voltage value is received before the end of the delay, the
remote target voltage mode is set at the end of the delay.
If a valid remote target voltage value is received after the end of the delay, the remote
target voltage mode is set immediately.
When the target voltage mode changes from remote to local, the same delay is launched,
and the behavior is identical.
An operator can, with a dedicated control, forcefully put the target voltage mode to local
target voltage. In this event, the mode is set immediately.
Period dependent
For example:
C264/EN FT/D31 Functional Description
7.1.4.2.3 Regulation
The actual voltage is compared to the target voltage.
If the actual voltage remains outside of the “regulation deadband” for an “initial tap time
delay” (TA1), the C264 with AVR commands a tap change.
Any voltage swing that passes through the complete deadband, causes the “initial tap time
delay” to be reset and a new time cycle to be started.
C0463ENa
If more than one tap change is required to bring back the voltage within the deadband, the
second tap changer is activated after TA2 (“inter tap time delay”). Note: TA2 < TA1.
If applicable, the last tap changing is delayed by an “end tap delay”.
The command occurs only if the following conditions prevail:
keep the tap changer on the “current tap” (no tap control performed)
move the tap changer to the “preset tap”
move the tap changer to the “lowest tap”
C0464ENa
The function sets the tap changer on the “defined tap” position, only if the following
conditions prevail:
7.1.4.3.2 Fast Tap Changer move AFTER Voltage Loss and Voltage recovery
When the “Fast tap changer move after voltage loss” function is set, the AVR issues
Lower/Raise commands TA3 after the voltage has overrun the “voltage presence threshold“.
The command occurs only if the following conditions prevail:
C0465ENa
If the “fast tap changer move after voltage loss” function is NOT active, when the voltage is
detected, the first tap control activation is delayed by TA1.
7.1.4.3.3 Abnormal Voltage signalisation
The voltage is considered as “abnormal” if, till the confirmation time expires, the actual
voltage is moving outside the range: [Vtarget x (1- β%) ; Vtarget x (1+ β%)] , β% is the
“abnormal voltage (threshold)“. This range is wider than the deadband. Refer to the
preceding schematic.
In this event, the signalisation is positioned after the “abnormal voltage delay”.
Any return of the voltage into the normal range resets the delay and deactivates the
abnormal voltage signal.
7.1.4.3.4 Tap Changer Failure supervision – Tap Blocking
The Tap Position Indication value may be wired on digital inputs (or optional analog inputs).
If the Current Tap value is not valid, all the functions using this information are locked.
The signalisation indicates the kind of problem on the tap changer.
The signalisation Tap Changer Fault results from one of these conditions:
after the “TCIP time out delay”, the TCIP (Tap Changer In Progress) signalisation is
not positioned (on tap control sequence)
after the “TCIP end time out delay”, the TCIP signalisation input is not reset (on tap
control sequence)
Functional Description C264/EN FT/D31
after the TCIP signalisation reset, the tap has not the expected value
st
after the global sequence delay (start on 1 tap control), the voltage is not normal yet
or, if the “tap changer fault function” is on,
position the Tap Changer Fault signalisation, and reset it when none of the faulty
condition prevail (automatic reset)
position the Tap Changer Fault signalisation, and keep it set until an operator
deactivates the automatic regulation, and activates it again (manual reset).
If the “tap changer blocking activation” is on, a Tap changer Blocked is positioned in event
the Tap command is issued for a time longer than the “tap changer blocking delay”. This
means that the tap position is not reached during this time and this is considered abnormal.
A signalisation Voltage Regulation Fault is positioned with the corresponding status, when:
a VT fuse is detected
an abnormal voltage is detected
a voltage or current acquisition failure is detected
a Tap Changer is blocked
When none of the above problems is detected, the signalisation Voltage Regulation Fault
status is OK.
7.1.4.3.5 Tap Changer Lowest/ Highest position
MiCOM C264 with AVR monitors the pair Tap changer Lowest/Highest reached position.
When the current tap equals the “highest/lowest tap value”, the indication
Highest/Lowest Tap reached is positioned.
If the Tap Position Indication value is not valid, The Lowest / Highest Tap reached
indications are not valid.
7.1.4.3.6 Run away protection
MiCOM C264 with AVR monitors if the Tap changer operates without valid commands or if
tap changer operation causes Tap Changer to move further away from the set values.
If it occurs, after the “runaway tap delay”, an alarm is raised and the AVR can be blocked.
7.1.4.3.7 OverVoltage Detection
The “overvoltage detection activation” is settable; it can also be done by an operator control.
If the value of the voltage is larger than the “overvoltage threshold” for more than the
“overvoltage delay”, the Overvoltage signalisation is positioned.
If the value of the voltage becomes lower than the “overvoltage threshold”, the Overvoltage
signalisation is reset.
The regulation locking information can be positioned/reset depending on the Overvoltage
signalisation.
If the voltage value is not valid, the overvoltage detection is not running.
Depending on the “Overvoltage detection behavior” value, the AVR can:
the partial number of “tap changes”, “raise” and “lower” controls are reset
the partial time of use with voltage present of each tap is reset
on C264 restart
Bus
Supply
Feeder
CT
Load
Tap Changer VT
X R
Voltage Drop
Time Delay
AVC Relay
Voltage Setting
C0466ENa
Vr = Vm - Vcomp
Z = R + jX, R and X are % of Vn/In
R = “Active compounding method parameter A1”, % of Vn/In (nominal voltage and current)
X = “Active compounding method parameter B1”, % of Vn/In (nominal voltage and current)
The reactive “compounding method” is used only when two transformers are in parallel.
C264/EN FT/D31 Functional Description
Frequency
φ
Cosφ
I sinφ, I ² since the latest reset of counters
Active and apparent powers
Circulating current (transformers in parallel)
These calculated measurements can be viewed locally on the Local HMI (LCD Screen).
7.1.4.5.2 Raise/lower control and voltage target from external signals
Depending on “AVR mode”, additional inputs can be used:
Active power
0 T
Time counter
Tconfirm
T
Reverse power
flow detected On On
C0506ENa
7.1.4.5.3.2 Behavior
When reverse power flow is detected, the RPF management mode defines the behavior:
Ignore: nothing specific is done is this case, regulation is still performed in the same
way.
Block operation: no more automatic regulation is performed, only manual raise and
lower control are allowed (if set). The automatic voltage regulation is locked by
reverse power flow, and the signal AVR locked by reverse power flow is positioned.
This signal is reset when the reverse power flow detection ends.
Regulate in reverse: the automatic regulation is running in reverse power flow mode.
The transformer primary side analog measurements (U, and if compounding is used: I and
φ) are needed for automatic regulation. These measurements are received by the AVR, and
not computed from transformer secondary side analog measurements.
The automatic voltage regulation is monitoring the primary voltage, current and phase
difference, and keeps the primary voltage in a deadband within a target voltage by activating
raise/lower controls. The parameters defined for “normal power flow” regulation are not used
in the case of RPF regulation.
The AVR activates the tap changer with a RAISE control, after a first (or next) tap delay, if:
The AVR activates the tap changer with a LOWER control, after a first (or next) tap delay, if:
nominal voltage: the same nominal voltage as for normal regulation (secondary of
transformer)
Overcurrent detection
Overvoltage detection
Undervoltage detection
Usable only with standalone transformer management even when in normal power
flow (not with a transformer in parallel method). Master / follower configuration must
be set to none.
7.1.4.6 Transformers in parallel
Two methods can be used whether the transformers are identical and work together or not.
7.1.4.6.1 Master/Followers method
ROLES:
In a group of transformer bays, one C264 with AVR is appointed “Master”, the others
“followers”. The master transmits its TPI to the followers over the Station Bus and elaborates
the commands for all the transformers. All the operator controls (activation/deactivation), if
any, are put on the master C264, which in turn activates/deactivates the followers.
The followers receive the master’s TPI, offset any discrepancy with their own TPI and
execute the commands coming from the master over the Station Bus.
Functional Description C264/EN FT/D31
T T T
1 2 3
C C C
B B B
BB
1 BB
2
C0467ENa
The Master compares the tap position of the followers with its own tap position and if
deviations are detected, the master put commands to bring them to its own position.
No circulation currents are evaluated; this imposes severe limitations on the network
operation:
on an output contact
on the Station Bus / Scada
and used in PSL/Isagraf automation.
In event of the Master failure (reboot, disconnection, switching to maintenance mode) the
“Master failure management” offers two possible fallback plans:
Current seen by #1 = IL + Ic
Current seen by #2 = IL – Ic
#2
T IL-Ic
2 2IL
Ic
T
1 IL+ Ic
#1
C0468ENa
#2
T IL-Ic
2 Vxl Vr
2IL
Ic
T
1 IL+ Ic
#1
C0469ENa
As Ic is not present in the feeder, another method is needed: compensating the voltage
attenuation due to currents circulating from one transformer to the other.
With reactive compounding, the voltage to be regulated (Vr) is evaluated as follows:
Vr = Vm – Vxl, where:
Vr = actual voltage to regulate
Vm = measured voltage
Vxl = Compounding voltage = Z.I where Z = R – jX
Functional Description C264/EN FT/D31
R = “Reactive compounding method parameter A2”, % of Vn/In (nominal voltage & current),
this the resistive part of the load line
X = “Reactive compounding method parameter B2”, % of Vn/In (nominal voltage & current),
this the reactive part of the transformer impedance (the transformer impedance is mostly a
reactance)
NOTE: For a power factor near 1, this negative reactance compensation has
a good accuracy, but if the power factor is low, this compensation
mode is no more accurate.
7.1.5 Automatic voltage regulation–ATCC
The Automatic Voltage Regulation–ATCC function automatically maintains a correct voltage
at the lower voltage of transformers by controlling the tap changer of transformers.
7.1.5.1 Presentation
7.1.5.1.1 Topologies
A substation includes busbars and transformers.
A group is a set of interconnected busbars. A transformer belongs to a group if it is
electrically connected to a busbar of this group at the low voltage level. The voltage target is
that of the highest priority busbar.
The partition is dynamic: two independent groups may be merged as a result of the closing
of a circuit breaker.
Typical topologies:
one busbar connected to one or several transformers in parallel. Transformers are in
parallel if their secondary poles are interconnected.
several coupled busbars in a group that includes one transformer or several ones in
parallel (see an example further)
Each transformer is controlled by one computer but ATCC function is only activated on
one computer. The figure that follows shows an example of the architecture for the
ATCC function that controls two transformers
ATCC function is activated on computer C264-1. This computer gets analogue values
through the station bus from computers C264-2 and C264-3 and sends tap changer
commands through the station bus.
C264/EN FT/D31 Functional Description
The voltage in one group is far from the Target Voltage. This is the most common
situation.
The voltage is correct, but there is a circulating current between parallel transformers.
This happens when two groups are interconnected.
The voltage is correct, but the Tpi range and patterning may be changed when the
state of any relevant switchgear changes.
7.1.5.1.3 Definitions and main attributes
For a transformer:
Homing (status): if a transformer is disconnected from the busbar (the “homing circuit
breaker” at the LV side of the transformer is open), it can follow the busbar voltage in order
to avoid overvoltage at re-connection. This capability is selected on a global basis.
Hunting (status): if the same transformer has received more change controls than the
opposite max tap changes within a time window, the ATCC is deactivated. These attributes
are set on a global basis.
For a busbar:
Line drop compensation: in case two interconnected busbars are far from each other, to
compensate the resistive and reactive voltage drops across the power line, several
compounding methods are available. The method is selected on a global basis and the
coefficients on a per busbar basis.
Example: the main attributes to set on the various levels are as follows (bracketed)
C0470ENa
7.1.5.1.4 Capacity
A MiCOM C264 is able to manage a maximum of:
7 transformers
4 transformers in parallel
8 busbars
2 voltage levels
7.1.5.1.5 Alarm conditions
The attribute names used in SCE are bracketed if it helps identify the datapoint.
Transformer:
MCB trip. If a transformer is in automatic control and there is an invalid evolution of the
tap changer, the tap changer MCB is tripped
Run away: if the Tap changer operates without valid commands or if tap changer
operation causes Tap Changer to move further away from the set values. This alarm
is reset 30 s after the group is switched to ATCC Off
TCIP signal is too late [TAP bad TCIP] or too long [TAP long TCIP]
The tap is invalid [TAP invalid]: tap number is not the required tap; you may have
this problem after a tap operation if the tap number is not the expected one.
This TAP bad TCIP alarm is reset 30 s after the group is switched to ATCC Off
ATCC hunting: this alarm is reset 30 s after the group is switched to ATCC Off.
Overcurrent, overvoltage
Busbar:
Invalid voltage (when different values for parallel transformers) [inv voltage]
Target unreached
ATCC defect: raised if one of these alarms is raised, and is reset if all of them are
reset
Error Log Indication: raised if one of the input is raised and is reset if the operator
selects the "Clear ATCC Faults" command.
DBI override
C264/EN FT/D31 Functional Description
Substation control mode Control from the RCP Control from the SCP
(SCADA) (HMI)
Local inhibited allowed
Remote allowed inhibited
It is up to the operator to choose, on a global basis, how the mode (that is, the ATCC status)
is changed:
The Circuit Breaker at the other side of the transformer (primary) is closed
No “regulation locking” information (AVR defect alarm, external lock, run away,
overcurrent on a transformer)
For ATCC/homing to take place:
the measured voltage must be within tolerances set as ratios of the nominal voltage:
No “tap in progress“
Transformer connection
Homing
Busbar voltage Transformer is off
C0471ENa
Functional Description C264/EN FT/D31
one of the voltage differs by more than “max voltage difference” (ratio) from the
average voltage
OR
A busbar in
the group &
Mode on
group inter-
connection are
Off
More than 4
Global ATCC transformers
status is Off in the group
Group Status
= Off
Invalid Invalid
average disconnector/
voltage circuit breaker
in the group
C0472ENa
2 deadbands, one is coarse (DB1, to initiate tapping), the other is fine (DB2, to end
tapping)
a max tap change rate of change that cannot be exceeded when moving the tap.
Each busbar voltage target is selected among the 5 through controls, in accordance with the
voltage target ramping rate.
If the busbar is part of a group, the target in force is the one of the highest priority busbar. A
single tap is changed at a time within a group but several groups may be active
simultaneously.
Each group has to reach the target voltage.
If the voltage is outside DB1, then an initial timer T1 is set and the tap control is issued once
the timer has elapsed.
More tap changing may be necessary in order to enter DB2: they are actuated when the
second timer T2 has elapsed; the changing is subjected to the max tap change rate.
+ DB1
+ DB2
Vtarge
t
-DB2
-DB1
Time
T1 T2
C0473ENa
REMOTE BUSBAR:
The voltage target may be set for a point far from the LV transformer side.
Reference_ULV = (Target_ ULV + Drop_U) x set point ponderation (0.9 …1)
ULV is the actual measured value
Compounding methods:
C0474ENa
NOTE: If line drop compensation is not used, set the resistive and reactive
coefficients to the minimum.
example 1 example 2
Group with 1 transformer 1 1
Group with 2 transformers 1 1
Group with 3 transformers 1 2/3
Group with 4 transformers 1 1/2
Voltage < Target Voltage - Voltage Deadband x Nominal Voltage for more than the
time-out T1.
Dual deadbands are used to ensure that the post tapping voltage is sufficiently closed to the
selected target voltage. DB1 is used to initiate tapping and DB2 is used to end tapping.
7.1.5.3.3 Timeouts
Moving the taps of the transformers is achieved with respect to some time-outs:
The "Initial tap" of a transformer is delayed by a time out T1, the next ones by a time out T2.
Several taps are used if one is not enough to reach the voltage target or the optimisation of
the circulating current. T2 begins after the end of the TCIP.
When the voltage drifts in and out of the deadbands, the system counts up to T1 when the
voltage is outside of the deadband1. If the voltage returns within the deadband2 before T1 is
reached, then the system counts down to 0.
C264/EN FT/D31 Functional Description
Any voltage swing that passes from through the complete deadband from one side to the
other, causes the “initial tap time delay” to be reset and a new time cycle to be started.
After an auto-recloser operation, the group (or the two new groups) keeps the same ATCC
modes; however the count is reset to zero and the new time delay is T1.
To ensure that transient voltage fluctuations do not cause unnecessary tap change, the
voltage must remain outside of the deadband for an “initial Tap Time Delay” (settable T1).
Any voltage swing that passes from through the complete deadband from one side to the
other, causes the “initial tap time delay” to be reset and a new time cycle to be started.
If a tap changing is required after a previous tap control:
C0475ENa
When a transformer belongs to a group of several transformers, the time out is applied to the
group. 2 different groups have separate timeout references, thus allowing simultaneous taps.
The tap is defined as the "first one" when (logical OR):
When the voltage crosses from one side of the deadband to the other side.
C264/EN FT/D31 Functional Description
7.1.5.3.4 Homing
When the mode of the busbar is in automatic control, homing taps transformers such that
their open circuit terminal volts follows the volts on the busbars that they are selected to
within 3% of the busbar voltage.
Homing is active:
The number of taps and tapping ranges of the transformers are identical
Then the maximum Tpi range between the transformers will be 1 and there will be a
balanced control of them when the voltage is changing.
Calculation is as follows:
under the deadband -> action is raise on the transformer with the lowest Tap
over the deadband -> action is lower on the transformer with the highest Tap
if voltage is IN the deadband, the system sets the transformer within one tap
Functional Description C264/EN FT/D31
SGT1 SGT2
I1 I2
Sn (power value)
x (% impedance at Sbase = 100 MVA), in other words X (reactance) = x . Un² / Sbase
U, I, P, Q
Current tap
Un (nominal secondary voltage)
C264/EN FT/D31 Functional Description
I
Ic
X1
X2
U
I1 I2
E1 E2
U1 = U2
I
I2
φ1
I1
Functional Description C264/EN FT/D31
If the voltage is out of the deadband and active power > 0 (|| < /2) then:
If the voltage is under the target then transformer with highest || is tapped UP
If the voltage is over the target then transformer with lowest || is tapped DOWN
If the voltage is out of the deadband and active power < 0 (|| > /2) then:
If the voltage is under the target then transformer with lowest || is tapped UP
If the voltage is over the target then transformer with highest || is tapped DOWN
For three or four transformers, the same algorithm is used.
Voltage into the deadband
If the voltage is into the deadband then the circulating current must be checked to know if it
is possible to reduce it.
∆U = E1 – E2 = |X1*I1 - X2*I2|
∆U is compared to the voltage step corresponding to one tap (∆U1tap).
Tpi range: tap span for the transformer
NbTap: number of taps for the transformer
Un: nominal secondary voltage
∆U1tap = (Tpi range/(NbTap -1)) x Un
If the voltage is out of the deadband and active power > 0 (|| < /2) then:
If the voltage is under the target then transformer with highest || is tapped UP
If the voltage is over the target then transformer with lowest || is tapped DOWN
If the voltage is out of the deadband and active power < 0 (|| > /2) then:
If the voltage is under the target then transformer with lowest || is tapped UP
If the voltage is over the target then transformer with highest || is tapped DOWN
7.2 Synchrocheck
To deliver current and voltage data that gives a reliable picture of what happens in the
high voltage part of an electrical substation
To make the galvanic insulation between the high voltage part and the measurement
and protection circuits,
To protect the measurement circuits against damage when a fault comes onto the
high voltage network.
These measurements are used for the protection function and for the Internal Synchrocheck,
Type 1 and 2
The synchrocheck device allows you to couple together 2 electrical networks.
These networks can be connected to different sources (generator), so they are not
synchronised with each other.
The Synchrocheck function measures two voltages with respect to phase angle, frequency
and magnitude to protect against the connection of two systems that are not synchronized
with each other.
In a computer, you can use the synchrocheck function for as many as 2 circuit breakers. You
can control only one circuit breaker at one time. The set of parameters defined for the
synchrocheck applies for both circuit breakers.
There are 2 types of internal synchrochecks:
Line
SYNCHROCHECK
SYNCHRO
L CHECK
L
L
CB B1 B2
Bus Bar 1
Bus Bar 2
C0476ENa
The busbar used phase isn’t always the first one. It is defined by configuration.
In event that you have two busbars, the used phase must be the same.
BI Busbar Absence/presence
choice voltage
Close request
Voltage control Schemes control BI bypass
CT/VT
Possible closing
C0477ENa
C264/EN FT/D31 Functional Description
Manual Close Close request without synchrocheck or when the synchrocheck is out
of service.
When the CB is wired on the DSPIO board, the DSPIO directly manages the close/open
contacts.
Otherwise, the PPC manages the contacts using a CCU or a DOU board.
Both contacts must be wired on the same kind of board: 2 on DOU/CCU or 2 on DSPIO. One
contact wired on the DOU, and one contact wired on the DSPIO is not allowed.
V is calculated through the RMS value of the voltages on both bus bar and line side.
time_synchro = 2 * pi *F /
For more details, please refer to the topic Focus 3: TMU2XX: CT / VT measurement
processing as far as Threshold Detection.
7.2.9 Synchrocheck Introduction to Harmonics
The use of power electronics distorts what would ideally be a perfect sine wave. These
distortions are called harmonics. Each individual harmonic has a sine wave shape. The order
of the harmonic is defined by the frequency of the harmonic divided by basic frequency (50 /
60 Hz). The total harmonic distortion (THD) represents the sum of all voltage harmonics. The
total demand distortion (TDD) is similar to the THD but applied to currents and with a rated
current (In) as reference.
It is performed if the F value is less than a user configured value (generally less than 0.1
Hz). If so, the CT-VT module computes V and . If these values are less than a user
configured threshold, the system closes the breaker. In the other hand, the CT-VT module
prevents the closure of the breaker if the system synchronising has not been activated and
one of the previous conditions is not achieved.
7.2.12 Synchrocheck: Scheme LL: Live Line, Live Bus: Real Time Sequences
Locking Conditions
Confirmation
Time
1 2 3
T1 T2
C0478ENa
Locking Conditions
Confirmation
Time
1 2 3 4
T1 T2 T3 T4
C0479ENa
1. If a close order comes before T1, it is sent to the DSP board, and the control is
executed at T2 coming from DSP board.
2. If a close order comes between T1 and T2, it is buffered until T2 if the locking
conditions are not lost. If the locking conditions are lost before T2 then the command
is rejected.
3. If a close order comes after T2, it is accepted.
Example 2
Anticipation Time
Coupling Conditions
Locking Conditions
Confirmation
Time
1 2 3 4 5
T1 T2 T3 T4
C0480ENa
1. If a close order comes before T1, it is sent to the DSP board, and the control is
executed at T4 coming from DSP board.
2. If a close order comes between T1 and T2, it is buffered. As the locking conditions are
lost then the order is sent to the DSP and executed at T4.
3, 4. If a close order comes between T2 and T4, it is sent to the DSP board, and the control
is executed at T4 coming from DSP board.
5. If a close order comes after T4, it is sent to the DSP board, and the control is executed
immediately from DSP board.
C264/EN FT/D31 Functional Description
Example 3
Anticipation Time
Coupling Conditions
Locking Conditions
Confirmation
Time
1 2 3 4 5 6
T1 T2 T3 T4 T5
C0481ENa
1. If a close order comes before T1, it is sent to the DSP board, and the control is
executed at T4 coming from DSP board.
2. If a close order comes between T1 and T2, it is buffered. As the locking conditions are
lost then the order is sent to the DSP and executed at T4.
3, 4. If a close order comes between T2 and T4, it is sent to the DSP board, and the control
is executed at T4 coming from DSP board.
5. If a close order comes between T4 and T5, it is sent to the DSP board, and the control
is executed immediately from DSP board.
6. If a close order comes after T5, it is sent to the DSP board, and the control is rejected
after the synchrocheck waiting time (not illustrated on the above drawing).
7.2.13 Synchrocheck Schemes that use VLINE and not(VBUSBAR) or not(Vline) and VBUSBAR
voltage controls
In event of the absence of one of the two voltages, at the end of a settable delay T2, the
authorisation to close is given:
Vline
0
and Closing authorization
Not(Vbusbar)
r
C0482ENa
Vbusbar
0
and Closing authorization
Not(Vline)
C0483ENa
7.2.14 Synchrocheck Schemes that use not(Vline) and not(VBUSBAR) voltage control
In event of the absence of both voltages, at the end of a settable delay T3, the authorisation
to cllose is given:
Not(Vline)
and 0
Closing authorization
Not(Vbusbar)
C0484ENa
The difference in amplitude (algebraic) between the two voltages (V) is lower than
the configurable / settable threshold (Evect) AND
The phase difference between the two voltages () is lower than the configurable /
settable threshold (Ephase) AND
For type 1:
The frequencies are as Fline and Fbusbar are such Fmin<F<Fmax where Fmin
and Fmax are the extreme acceptable frequencies AND
The difference between the two frequencies (F) is lower than the configurable /
settable threshold (Efreq)
For type 2:
The frequency shift between signals (S) is lower than the configurable / settable
threshold (Sfreq)
These conditions must be still met before the time-out of a delay T1 started on the
appearance of the conditions else the synchrocheck function will not authorise the CB
closing.
If during the delay time T1 one of these conditions is lost, T1 is reinitialised and is re-
launched on reappearance of all the conditions.
Vline
Vbusbar
and T1 0 Reclosing authorization
F < Efreq
< Ephase
V < Evect
C0485ENa
Vline
Vbusbar
and T1 0 Reclosing authorization
S < Sfreq
< Ephase
V < Evec t
C0486ENa
In the coupling scheme, the CB can be closed only when the is equal to 0.
To authorise the closing, these conditions must exist:
The difference in amplitude (algebraic) between the two voltages (V) is lower than
the configurable / settable threshold (Evect) AND
For type 1
The frequencies are as Fline and Fbusbar are such Fmin<F<Fmax where Fmin
and Fmax are the extreme acceptable frequencies AND
The difference between the two frequencies (F) is lower than the configurable /
settable threshold (Efreq)
For type 2
The shift between signals (S) is lower than the configurable / settable threshold
(Sfreq) AND
The shift acceleration (accShift) is lower than the configurable / settable threshold
(accSfreq)
These conditions must be still met before the time-out of a delay T4 started on the
appearance of the conditions else the synchrocheck function will not authorise the CB
closing.
If during the delay time T4 one of these conditions is lost, T4 is reinitialised and is relaunched
on reappearance of all the conditions.
Vline T4 0
and Authorisation to check
Vbusbar
F < Efreq
V < Evec t
C0487ENa
Vline
Vbusbar
and T4 0 Authorisation to check
S < Sfreq
accShift< assSfreq
V < Evec t
C0488ENa
When = F*360*Ta ± (), where Ta is the anticipation time or response time of the
circuit breaker and () is the acceptable mistake on , then the closing authorisation will
be sent.
7.2.16 Synchrocheck Type 1 - Logic of Interlock Authorisation
The voltage control depends on the synchrocheck type. The absolute values of the two
voltages (VLINE and VBUSBAR) must be above or below settable thresholds, to allow the
circuit breaker closing. VLINE is one of the phase voltages you define in the configuration.
The voltage controls include:
If the measured voltage is above the threshold V>, then VLINE and VBUSBAR TRUE
If the measured voltage is below the dropout value defined by a configurable parameter,
then not(VLINE) and not(VBUSBAR) TRUE. The configurable parameter is a percent of the
threshold V> (95% for presence condition and 105% for absent condition).
The selection of the voltage control is made during the configuration phase.
CAUTION: BE CAREFUL: FOR THE EVENT THAT FOLLOWS, THE COMPUTER DOES
NOT MANAGE THE VOLTAGE SWITCHING.
By configuration, a single synchrocheck can manage two circuit breakers.
Coupling scheme BI
Locking scheme BI
When the BI bypass state is SET, the Bypass BI enables the closing.
If the Flag Yes/No is set to NO for one type of voltage check, the close request is refused
(acknowledge: Synchro NOK).
Functional Description C264/EN FT/D31
The table that follows shows 1. the different voltage checks; 2. the state; 3. the close
requests; and 4. the synchrocheck aknowledge:
When the synchrocheck process sends the positive acknowledge to the “Conduite” process,
perform a new interlock check, before you close the Circuit Breaker. If the interlock condition
is True, the Circuit Breaker closes immediately, else the synchrocheck process sends a
negative acknowledge (Interlock NOK) to the control sender.
C264/EN FT/D31 Functional Description
TMU210 TMU220
Type-of-connection Electrical-network-topology
parameters parameters
SC PN SC PP
Mounting (wiring) Star Delta
Type of connection 3Vpn + Vb (star) 3Vpp + Vb (delta)
Reference phase Va, Vb, Vc Vab, Vbc, Vca
On close request, the schemes are tested and the close order is sent with the answer:
Define the authorized schemes that follow during the configuration phase. The synchrocheck
function operates for these schemes:
Network frequency
Reference phase: A, B or C
Nominal voltage
This function computes the BI’s presence/absence voltage of the line and the busbar.
In agreement with the configuration:
In event of manual override, the close request is allowed and there is no check.
When coupling is configured, locking is mandatory.
In coupling conditions, a manual or automatic close is always refused: LL and locking
conditions not met.
The parameters for the TMU220 are the same as for the TMU210:
5% on voltages thresholds
Transient
Circuit breakers
Digital inputs from the systems digital input boards, from other system computers,
from protection relays and other IED’s via communication network (single and double
point, digital groups),
Internal indications: for example, system failures, equipment operation modes and so
on.
Limits derived from measured values from the systems analog input boards (CT, VT,
transducers), from other system computers, from protection relays and other IED’s via
communication network.
7.3.2 Interlocking:Outputs
Result of the interlocking equation is transmitted through a system binary output and saved,
locally in RAM, by the function managing interlocking logical equations.
And, a service is available for any task to get the result of the computation.
Thus , the function managing “control of sequence” uses this service to know whether control
can be executed.
Then, a simple transient binary input can be set if defined in configuration. The same SPS is
used for the commands “open” and “close” of a xPC
7.3.4.1 Principle
In computer, a logical interlocking equation is defined as a sum of product (AB+CDE+F for
example).
Functional Description C264/EN FT/D31
7.3.4.1.1 Introduction
Interlocking function uses as many as two interlocking equations per switching device on
bay-level and on substation-level. During configuration process the definition of the switching
devices can be:
With only one interlocking equation: for example, for opening, closing being not
checked or vice-versa,
With two interlocking equations (for opening and closing). The interlocking equations
can be different but can also be identical.
The equation is composed of Boolean information mainly representing the position of other
switching devices.
The interlocking for a switching device may be composed of substation interlocking
equations and local interlocking equations.
Both interlocking are managed by the computer that controls the switching device.
The local equation is made up of information obtained from its own digital inputs and IEDs
connected to this computer.
Substation interlocking is made up information obtained from its digital inputs and inputs
provided by the communication network from other computers, from bay computers and from
IED’s (protection relays, etc.). Substation interlocking can also be managed by the
topological interlocking function. Refer to Topological interlocking for more details.
7.3.4.1.2 Local interlocking
The local interlocking is done by calculation of a logical equation. You can have as many as
one equation for each switching device and for each direction (open and close). If there is no
equation for a switching device for a direction, the related variable is true.
7.3.4.1.3 Substation interlocking
The substation interlocking analyses the position of all switching devices in the substation
and calculates the substation interlocking equation to authorise control of a switching device
according to the mechanical and electrical capabilities of the switching device. If there is no
equation for a switching device for a direction, the corresponding variable is true.
7.3.4.1.4 Interlocking: Validity of data
The interlocking equation does not only use the value of the information but also the validity
of the information (invalid, ...).
Thus the result, saved in RAM, of a logical equation is only TRUE or FALSE, An Interlocking
equation in the INVALID state will be considered as FALSE .
But, the system binary input also generated can be valid (SET or RESET) or invalid.
C264/EN FT/D31 Functional Description
The evaluation of the result of basic logical function such as NOT, AND or OR is defined as
follows:
NOT
True False
False True
Invalid Invalid
(C is in the lower state) AND (D is in the higher state) AND (E is in the lower state)
The terms of these equations can be issued from:
Single point status (BI)
1 among N BI (SIG)
Measurement (MEAS)
At configuration time, operator has to define the “interlocking profile” of each data included in
an interlocking equation. It means that operator must select for each state or validity of a
data a logical state: TRUE, FALSE or INVALID.
Interlocking computation
An interlocking equation:
Is computed each time that one of its element changes of quality or state and
Get logical state related to the received state and validity of the data
Send the new state of the system binary input (BI) that represents the result of the
interlock. BI can be: SET, RESET or INVALID
Interlocking consultation
On reception of open or close request, if the logical equation related to with the switching
device exists, the “control of sequence” function used the service offered by the interlocking
function to get the result of the interlocking associated to the received request.
If result of the interlocking is TRUE, the check is considered as achieved, else request must
be refused and a negative acknowledgement sent to the origin of the request.
Simulation and test of interlocking equations
The interlocking system is checked during the in house test of the substation control system.
Each interlocking equation may be checked by issuing a control to the corresponding
switching device.
For checking the interlocking on site a “SIMULATION mode“ is implemented in the computer.
In this operating mode, a valid control is sent to the output, but closing the contact is not
performed and a positive acknowledgement message is generated.
7.3.4.3 Limits and performance
You can use as many as 256 operands for each equation.
You can define as many as 256 equations in a computer.
You can use a datapoint in as many as 255 interlocking equations.
C264/EN FT/D31 Functional Description
Generate code
Simulate
Debug
Project management.
The software logic package supports standard programming languages of the IEC 1131-3:
Sequential Function Chart, SFC (GRAFCET)
For action and transition description, you can use this language with Function Block Diagram
(FBD), Ladder Diagram (LD) or Instruction List (IL).
Structured Text, ST
The logic development workbench generates code. The code is uploaded to the computer
target system that operates the code.
7.4.1 Inputs
All the datapoints of the C264 can be used as an input of a PLC.
MEAS
CT
Generate an MEAS
Generate a CT
Generate an SPI
Generate an SIG
7.4.4 Behaviour
The computer has a software execution engine that interprets the automation application
code as shown in the cycle that follows:
The cycle duration depends on the number of I/O to be scanned and the complexity of the
operations to be performed. Set the cycle during the configuration process.
The two different time cycles of a PLC-program can be set from 10 ms up to several
seconds. For some specific equations a cycle less or equal to 10ms and a cycle less
or equal to 100ms for the other logic equations. The time cycle for the automatic
functions shall be less than 100ms.
Routing of the automatism applications to the memory must be in agreement with the
memory and hardware design.
To debug the applications, you can connect a PC to the front face. The hardware
design separates the debug function and the application download function.
Functional Description C264/EN FT/D31
The ISAGRAF automation that allows you to define the FLS preselections
Automations (ISAGRAF and/or PSL) that allow you to test or simulate the FLS.
7.6.2 C264Fi
As many as 48 C264Fi (feeder) computers support the FLS Function. You can create as
many as 300 output breaker commands.
7.7 Load Shedding – C264 Standalone
NOTE: The Load Shedding function is available only on the C264 Standalone.
7.7.1 Inputs
f1<, f2<, f3<, f4<: digital inputs, coming from frequency relay. Each input is a
frequency threshold and is associated to a group.
List1, List2, List3, List4 control: each “list” input is a set of three setpoints associated
to a group. These setpoints give the list of Circuit Breaker attached to a group. They
can be only received from the SCADA interface. ASDU 48 (setpoint normalised value)
is used for these setpoints.
LS On/Off Control: control (DPC type) that allows you to set On or Off the Load
Shedding automation. This control can be received from the SCADA interface or from
the C264 local HMI.
Blocking condition x setting (1≤x≤6): each blocking condition setting is a set of three
setpoints. These setpoints give the list of Circuit Breaker blocked by the condition x. It
can be only received from the SCADA interface. ASDU 48 (setpoint normalised value)
is used for these setpoints.
Blocking condition data: digital inputs that blocks the CB trip is set, according to the
CBx blocking condition setting. A maximum of 6 SPS / DPS can be defined as
blocking condition information.
CBx status: status of each circuit breaker (Feedback of the CBx control).
Functional Description C264/EN FT/D31
Inter-group delay: delay between each group when several group are activated: that
is, when CB of a group have to be tripped. This delay is defined in configuration and
settable through a setpoint (ASDU 48) that can be only received from the SCADA
interface. The delay is stored in flash memory, but set to the value defined in
configuration in event of database switch.
CBx control time-out: one time-out per circuit breaker. For a circuit breaker, this time-
out defines the authorized delay between the CB control activation and the CB
position change. These time-out are defined in configuration – thru PACiS SCE – as
the CB control’s Feedback time-out.
Breaker Number / / 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1
setpoint 1
Breaker Number / / 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16
setpoint 2
Breaker Number / / / / / / / 40 39 38 37 36 35 34 33 32 31
setpoint 3
Bit 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1
Value 16384 8192 4096 2048 1024 512 256 128 64 32 16 8 4 2 1
Blocking conditions
You can define as many as 6 SPS / DPS as blocking condition: they are numbered from 1 to 6.
At configuration time (with PACiS SCE), the operator defines the list of blocking conditions
activated for each Circuit Breaker.
When the database is downloaded and switched, the load shedding automation takes into
account information described in the database (last setting sent by the SCADA is lost).
The use of blocking condition is also performed through the SCADA interface, whatever was
the status of the automation (On or Off). Three setpoints are defined on a per blocking
condition basis; each value combination gives the association between the CB and the
blocking condition (refer to the table of group definition).
The usage of blocking conditions is saved in flash memory and restored after a computer
reboot. It is erased in event of database switch.
After assignment, the Blocking condition x status information for blocking condition(s) that
has(have) been modified is sent to the SCADA.
Automation
The automation is activated only if it is On. The On / Off control (DPC) is performed through
the SCADA interface or the computer local HMI. The automation status is provided through a
DPS.
As soon as a fx< SPS is detected in a SET state, the CB belonging to the group x are
tripped, with the following constraints:
The order to trip the first CB will be sent in less than 100ms after the fx< detection
whatever was the number of CB in the group
th
If the group contains as many as 20 CB, the order to trip the 20 CB will be sent in
less than 500 ms after the fx< detection
th
If the group contains as many as 40 CB, the order to trip the 20 CB will be sent in
less than 500 ms after the fx< detection and the order to trip the last CB will be sent in
less than 1 second after the fx< detection
No other information than the blocking condition can prevent the CB trip, such as
interlocking, control uniqueness, bad CB state (already open, jammed, and so on….)
NOTE: Time constraints are given from fx< transition detection to Digital
Output closure.
Any invalid state of the fx< SPS (Selfcheck faulty, toggling) will be not taken into account to
trig the automation.
In event of simultaneous fx< detection: that is, multiple fx< detection with the same time tag,
the groups will be activated in the order of trigger detection:
If the « inter-group delay » is null, the time constraints given above will be respected
for each group ;
If the « inter-group delay » is not null, all CB of one group will be tripped before
beginning to trip all CB of the following group.
In event of multiple fx< detection: that is, fx detection during activation of an other group, the
groups will be activated in the order of trigger detection. So, all CB of the first group will be
tripped before beginning to trip all CB of the following group.
Functional Description C264/EN FT/D31
7.7.3 Outputs
Furthermore, all datapoints described above are configured using the PACiS SCE and must
be provided by the S9R file.
Functional Description C264/EN FT/D31
7.8.1 Inputs
List1, List2, List3, List4 control: each “list” input is a set of two setpoints associated to
a group. These setpoints give the list of Circuit Breaker attached to a group. They can
be only received from the SCADA interface. ASDU 48 (setpoint normalised value) is
used for these setpoints.
Gx activation: SPC, for each group, that allows you to activate the Load Curtailment
function for the Group x when a SET control is received (the RESET control has no
effect).
LC On/Off Control: control (DPC type) that allows you to set On or Off the Load
Curtailment automation. This control can be received from the SCADA interface or
from the C264 local HMI.
Blocking condition information: digital inputs that block the CB trip is set, according to
the CBx blocking condition setting. A maximum of 6 SPS / DPS can be defined as
blocking condition information.
CBx status: status of each circuit breaker (Feedback of the CBx control).
CBx control time-out: one time-out per circuit breaker. For a circuit breaker, this time-
out defines the authorized delay between the CB control activation and the CB
position change. These time-outs are defined in configuration – thru PACiS SCE – as
the CB control’s Feedback time-out.
The assignment of CB to the groups is performed on-line through the SCADA interface,
whatever was the status of the automation (On or Off). Two setpoints are defined per group,
each value combination gives the allocation of a CB to the group as defined in the table
below:
Breaker Number / / 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1
setpoint 1
Breaker Number / / / / / / / / / / / / 20 19 18 17 16
setpoint 2
Bit 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1
Value 16384 8192 4096 2048 1024 512 256 128 64 32 16 8 4 2 1
7.8.3 Outputs
LC Group x status (SPS permanent type, 1≤x≤4): set as soon as a group is activated:
that is, one Gx Activation control received and automation status is On. Reset when
the last CB control has been performed, whatever was the control result
LC CB x rejected for blocking condition (SPS transient type, 1≤x≤20): one information
on a per circuit breaker basis. Set during 100 ms if the control is refused due to a
blocking condition
LC CB x failed (SPS transient type, 1≤x≤20): one information on a per circuit breaker
basis. Set during 100 ms if the CB is not opened at the end of the control time-out
Blocking condition x Status (1≤x≤6): list of CBs for which the blocking condition is set,
transmitted to the SCADA through an analogue value (ASDU 09 or 10)
All DOU or CCU board used for CB controls must be in the same rack
All configurable information used for Load Curtailment function are configured using
the PACiS SCE
Furthermore, all datapoints described above are configured using the PACiS SCE and must
be provided by the S9R file.
Functional Description C264/EN FT/D31
7.9.1 General
In a power system, synchronization is the process of connecting two sources (single generator or
running network) by eliminating the risk of damage for the devices composing each side. For this, it is
necessary to match the frequency, the voltage level between each source and the phase angle of the
two voltages. An AC generator cannot deliver power to an electrical grid unless it is synchronized to it.
There are some conditions that must be met before the synchronization process takes place. The
source (generator or sub-network) and the running network must have equal voltage, frequency and
phase angle. In other words,
i. |ΔF| < ΔFmax,
ii. |ΔV| < ΔVmax
iii. |Δφ| < Δφmax
A power synchronizer is a device monitoring and controlling the parts to be synchronized in order to
make them meet the required conditions with the purpose of connecting them.
The following figure schematizes how the power synchronizer interacts with the monitored and
controlled elements to be connected.
Power
Power
Synchronizer
Synchronizer
AGC
AGC
7.9.1.1 Monitoring
The Power Synchronizer monitors two islands (usually designated by Line and Bar) to be
interconnected. It displays the values measured on both sides of the CB: VL, VB, FL and FB (Voltage
and Frequency on Line and on Bar sides). It also displays the differences (Deltas) between measured
Frequency, Voltage and Phase angle, respectively ∆F, ∆V and ∆φ.
7.9.1.2 Convergence
The power synchronizer also provides the mechanisms necessary to control one or both islands in
order to modify their provided phase angle, frequency or voltage so the connection between them can
be performed with no damage to their primary devices. This process is also known as Convergence.
The Convergence process can be executed in Manual or in Automatic mode. In Manual mode, the
operator selects one of the CB’s side to control, then manually modifies the frequency and voltage
level by sending +/-F and/or +/-V controls in order to meet the synchronization conditions. In
Automatic mode, the Power Synchronizer sends the control signals. This automatic convergence
process is performed through a built-in automation.
7.9.1.3 Closing
The power synchronizer provides the necessary mechanisms controlling the CB interconnecting the
involved islands (Closing process). The Closure process can be executed in two different manners:
Manual or Automatic. In Manual mode, the operator decides at which moment to close the CB
(Synchrocheck with Locking scheme); while in Automatic mode, this is the Power Synchronizer itself
who closes the CB when the synchronization conditions are met (Synchrocheck with Synchro-coupling
scheme). This automatic closing signal is sent through a built-in automation.
1. ΔV < ΔVmax
2. ΔF ≈ 0 (< εFmax)
It means that ΔφV constant
3. ΔφV < Δφmax
If conditions 1, 2 and 3 are true, check is OK and close
control will be accepted.
FIGURE 80: LOCKING: CONSTANT PHASE AND FREQUENCY DELTA OVER TIME
Functional Description C264/EN FT/D31
These different execution modes (Automatic or Manual) of the precedent processes lead to the
following combinations selectable by the operator.
The following figure schematizes the power synchronizer’s internal components and their connections
to the CB and the elements to be synchronized.
C264/EN FT/D31 Functional Description
7.9.2 HMI
7.9.2.1 C264’s Screens
The following figure shows the Power Synchronizer’s HMI on the C264.
The mode selection panel is shown in the left while the Synchroscope feature is shown in the right.
Functional Description C264/EN FT/D31
The following two figures describe the distribution of the information displayed in the synchroscope
panel shown in the previous figure.
C264/EN FT/D31 Functional Description
FIGURE 85: GENERAL DATA DISPLAYED FOR THE POWER SYNCHRONIZER FEATURE (1/2)
FIGURE 86: GENERAL DATA DISPLAYED FOR THE POWER SYNCHRONIZER FEATURE (2/2)
A side (Line or Bar) is considered as controllable if at least one control command is defined on it within
the configuration.
When the operator manually sends a control (+-F/ +-V) through the panel, the executed control will be
indicated to the operator by temporarily reversing the display corresponding to the control sent. For
example, if the operator sends a +F control to the Line side, then the Frequency measurements for the
Line side will be temporarily displayed in reverse mode. Similarly, when the Operator manually closes
the CB, the CB’s state label will be displayed in reverse mode until the end of the command.
The control (+-F/ +-V) sent by the operator through the panel will be ignored in any of the two modes
concerning the Automatic Convergence.
When running in Automatic Closing mode, any close CB command from the operator will be ignored.
During the execution of a Manual Closing command, the Power Synchronizer will ignore any other
command sent by the operator; i.e. no other action from the user can be executed until the conclusion
(successful or not) of the Manual Close command.
When leaving the synchroscope panel, the synchronizer process is set to off; i.e. any automatic
process is stopped.
If the Synchroscope is launched for a closed CB, then the control commands (Open, Close, +-F/ +-V)
will be ignored.
Whenever a measurement is invalid, the Synchroscope is stopped. Moreover, the label “Invalid” will be
displayed in the corresponding measurement place.
C264/EN FT/D31 Functional Description
The convergence automation and the Synchrocheck mode.are reset when the synchroscope is
closed,
7.9.5 Performances
The Synchroscope displays measurements changes at a frequency of 100ms.
Functional Description C264/EN FT/D31
8. USER INTERFACE
Please refer to the chapter Human Interface (HI).
C264/EN FT/D31 Functional Description
9. RECORDS
Several kinds of records are stored in the C264.
Slow scan triggered recording (SST) referred to as Slow Waveform recording that
gives access to RMS values. This record is useful to define load profile or power
regulation.
9.1.3 Events
All data change or events declared in the C264 configuration database “To be logged” are
stored in a circular queue.
The event records are available for viewing either via the front panel LCD, via slave protocol
at SCADA level or on CAT equipment. They also can be printed.
Events, following the C264 configuration, may typically contain the C264 description, the
date of the event and the time of the event with an accuracy of 1 ms, plus specific
information regarding the causes of the events.
The C264 under the following circumstances may create events:
Changes of state of Binary Inputs (SP, DP, MP, SI, Groups)
Alarm acknowledgement.
The size of the queue is:
INPUTS
TMU BOARD CT: VT: DSP DSPIO Digital Analogue
as many as as many as Inputs and Inputs and
Outputs Outputs
TMU210 4 4 NO DSPIO YES YES
TMU220 4 5 DSP NO NO YES
You can capture as many as 128 digital channels. The choice of selected inputs/outputs is
defined in configuration.
The waveform recorder provides as many as 8 analogue measurements and as many as
128 digital channels for extraction by a remote device.
A maximum of 480 cycles ( 9,6 seconds at 50 Hz) of measurements samples, with 32
samples per cycle, can be stored, divided in 1, 2, 4 or 8 files saved in flash disk.
A timer channel is also required to provide accurate timing information for each sample. The
delay between each sample is assumed constant over a single cycle.
The waveform recorder can be triggered by the following events, each of which is user
configurable:
Changes in state of binary inputs (SP, DP, MP, SI or Groups). Fast Waveform
Recorder is triggered by the valid change in state of events (like SPS ->SET /RESET,
DPS -> OPEN >CLOSE). It changes the only with VALID quality (ex SET/RESET;
OPEN/CLOSE) to a state/value with VALID Quality
Operator request
Only one re-trig is allowed: it means that a new trigger can only be accepted after the end of
recording of the current waveform.
Waveform records are available in COMTRADE 2001 format.
NOTE: The triggering is available only from a state/value with VALID quality
(ex: SET/REST; OPEN/CLOSE) to a state/value with VALID quality.
9.1.5 Slow Waveform Recording
The inputs for the slow waveform records are:
Analogue values coming from CT VT calculation (RMS values)
Digital inputs
Digital outputs
The slow waveform manages as many as 24 analogue and 48 digital values.
C264/EN FT/D31 Functional Description
Active Power
Reactive Power
Apparent Power
Frequency
Harmonics levels
The C264 stores at maximum 5000 integrated values as follows:
Operator request
1) Digital inputs will be not recorded if the integration delay is superior to 100 ms
2) A digital input is recorded to “1” if it remains at “1” during x% of the integration delay (x
between 10 and 90%, with a 1% step)
4) The measurements issued from analogue inputs boards are processed as follows:
If the integration period is less or equal to 1 second, the recorded value is the
current measurement value
- pre time
- total time
PPC convert this buffer in fast wave form adding binary inputs/output defined in
configuration.
trigger
pre
post time
time
total time
C0489ENa
The maximum length of a disturbance buffer from the DSP is: 2 * total time.
One record contains at least one trigger and maximum 2 trigger.
If a second trigger appears during the post time of the first trigger, only one record is
generated.
C264/EN FT/D31 Functional Description
2° trigger
1° trigger
pre
time
pre
time
C0490ENa
If a second trigger appears after the post time of the first trigger, a second record is
generated.
1° trigger 2° trigger
post time
pre
time
post time
pre
1° disturbance time
buffer
2° disturbance
buffer
C0491ENa
If a third trigger appears, it is ignored if the previous buffer are not downloaded by the PPC.
Functional Description C264/EN FT/D31
Each Binary Input (SP, DP, MP, SI, IED input, Groups) state related to “the reason for
change” of these events
Each Measurement state related to “the reason for change” of these events
Each TPI state or value related to “the reason for change” of these events
Each metering state related to “the reason for change” of these events
.For example, the OPEN state of a circuit breaker can be un-alarmed if the change is due to
a control, and alarmed if the change is due to an other reason.
An alarm can be related to a control acknowledgement. In this event, the alarm is considered
as “spurious”.
9.2.1.1.3 Alarm states definition
An alarm is generated by an event: for example, a particular datapoint in a state defined
during the configuration phase as “to be alarmed”.
While this event is still present: for example, the previous particular datapoint is still in the
same state, the alarm is “active”.
When this event disappears: for example, the previous particular datapoint is now in another
not alarmed state; the previous alarm is “inactive”.
An existing alarm (active or inactive), can be acknowledged by an operator from the FP.
An alarm can have the following states:
Active-acknowledged: the cause is still present but the active state has been taken
into account by the operator
Active-unacknowledged: the cause is still present and the active state has not been
taken into account by the operator
Inactive-unacknowledged: the cause has disappeared but the inactive state has not
been taken into account by the operator (only available for events alarmed on
appearance and disappearance)
Inactive-acknowledged: the cause has disappeared and the inactive state has been
taken into account by the operator
Immediate or differed:
Alarm generated:
manual: the alarm is cleared only on an operator request; this clearing command
is only allowed on inactive-acknowledged alarms.
automatic: an alarm is automatically cleared when it reaches the appropriate state.
gravity basis
Audible or not when detected.
Functional Description C264/EN FT/D31
The alarm state transitions "1 1" and "2 1" are crossed when the state of the data
associated with the alarm goes from a state that is flagged to be alarmed with any gravity
level to another state that is also flagged to be alarmed with any gravity level (AL+). In this
event the active alarm stays active but the time tagging of the alarm is changed. The new
alarm time stamp corresponds to the last associated data state change. The alarm becomes
unacknowledged if not already unacknowledged.
Functional Description C264/EN FT/D31
The alarm state transitions "1 2", "3 4" and “5 3” are crossed on operator
acknowledge action. The time stamp of the alarm is unchanged.
The alarm state transitions "1 3" and “1 5” are crossed when the alarmed event
disappears (AL-). The time stamp of the alarm is modified.
The alarm state transition "2 4" is crossed when the event disappears (AL-) the alarm
being configured to be activated only "on appearance of the event". The time stamp of the
alarm is modified.
The alarm state transition "2 3" is crossed when the event disappears (AL-) the alarm
being configured to be activated "on appearance and disappearance of the event". The time
stamp of the alarm is modified and the alarm will have to be acknowledged again.
The alarm state transitions "3 1", "4 1" and “5 1” are crossed when the previous
alarmed event appears again or when another state that is also flagged to be alarmed with
any gravity level appears (AL+). The alarm becomes active-unacknowledged. The time
stamp of the alarm is modified.
The alarm state transition "2 0" is crossed when the event disappears (AL-) the alarm
being configured to be activated only "on appearance of the event" and «to be cleared
automatically». The alarm is suppressed from the alarm list.
The alarm state transition "3 0" is crossed on operator acknowledgement only if the alarm
associated with the event is configured as «to be cleared automatically». The alarm is
suppressed from the alarm list.
The alarm state transition "4 0" is crossed on operator clearing action. The alarm is
suppressed from the alarm list.
9.2.1.2.1 Acknowledgement
Acknowledgement of an alarm can be done by two ways:
On operator request: an operator can acknowledge an existing alarm from the front
panel to signify that it has been taken into account.
Globally: at substation level it is possible to use an SPS (named Global alarm ack)
specially dedicated to a global acknowledgement of alarms: When this SPS is set to
the SET state all alarms present in the computer are acknowledged. As long as this
SPS remains in the SET state, any new alarm is inserted in the alarm list with the
ACKLOWLEDGED status.
In addition to the Global Alarm Acknowledgement SPS, a Local Alarm
Acknowledgement SPS can be defined on a per C264 basis: that is, one for each
C264.
This SPS can be wired or managed by an automation. When this SPS is configured in
a C264, the “Global Alarm Acknowledgement” SPS is no more taken into account by
this C264.
When this SPS is SET, all C264 alarms are immediately acknowledged.
This SPS cannot be transmitted on the Station Bus network: that is, it remains local to
the C264, so it cannot be associated to a remote – HMI or SCADA - control.
C264/EN FT/D31 Functional Description
9.2.1.2.2 Clearing
Whatever the clearing mode is, the clearing of an alarm is immediately taken into account:
suppression from the alarm list.
Automatic clearing
An alarm can be configured as “to be cleared automatically”. It means that when this alarm
reaches the appropriate state, it is cleared automatically without any operator action. The
events of “automatic clearing” are:
the alarm is in the active-acknowledged state and the alarm disappears (for event
alarmed on appearance only)
MiCOM C264/C264C
HARDWARE DESCRIPTION
Hardware Description C264/EN HW/D30
CONTENTS
2. HARDWARE DESCRIPTION
2.1 Components
The MiCOM C264/C264C is based on a modular and scalable architecture to support
dedicated hardware modules adapted to the plant data interfaces.
Each MiCOM C264/C264C rack can be equipped with the following modules:
BIU241: Basic Interface Unit. This board includes the auxiliary power supply
converter, the watchdog relay, 2 digital outputs/2 digital inputs for C264 redundancy
and 2 isolated RS485/RS232 interfaces
BIU 261: Basic Interface Unit. This board includes the dual source power supply for
C264 power supply redundancy, the watchdog relay, 2 digital outputs/2 digital inputs
for C264 redundancy and 1 isolated RS232/RS422RS485 interfaces
CPU260 (also named CPU2) or CPU270 (also named CPU3): Central Processing
Unit and communications board based on PowerPC processor
FBP28x: Front BackPlane: bus for 80TE case
FPB26x: Front BackPlane: bus for 60TE case
FBP24x: Front BackPlane: bus for 40TE case
CCU200: Circuit breaker Control Unit each with 8 digital inputs and 4 digital outputs
CCU211: Circuit breaker Control Unit each with 8 digital inputs and 4 digital outputs
(versions are jumper-selected)
DIU200: Digital Inputs Unit each with 16 digital inputs
DIU211: Digital Inputs Unit each with 16 digital inputs for voltages from 24 to 220Vdc
(versions are jumper-selected)
DOU201: Digital Outputs Unit each with 10 digital outputs
AIU201: Analogue Input Unit each with 4 analogue inputs direct current or voltage
AIU211: Analogue Input Unit each with 8 analogue inputs direct current
TMU2xx: Transducerless Measurements Unit board for direct CT/VT measurement
used together with DSPxxx: Digital Signal Processing board.
AOU200: Analogue Output Unit each with 4 current analogue outputs
SWU20x: Ethernet SWitch Unit board with 4 electrical links and x= 0 or x=2 optical links
SWR2xx: Ethernet SWitch board for Redundant Ethernet ring with 4 electrical links
and 2 optical links for the Dual ring.
SWD2xx: Ethernet SWitch board for Dual Homing Ethernet star, with 4 electrical links
and 2 optical links for a Dual star.
ECU200: Extended Communication Unit board to convert non isolated RS232 into
optical signal
ECU201: Extended Communication Unit board to convert non isolated RS232 into
isolated RS485 signal
GHU201 (for C264) or GHU200 (for C264C): Graphical Human machine interface
Unit: Front Panel including 17 LEDs (13 are user-configurable) + 7 pushbuttons (L/R,
Open, Close, etc) + LCD (resolution of 128 x 128 pixels /16 lines of 21 characters
each) and a keypad at the front plate for local HMI management
GHU211 (for C264) or GHU210 (for C264C): Front Panel including 17 LEDs (12 are
user-configurable) + 1 pushbutton (L/R)
GHU221 (for C264) or GHU220 (for C264C): Front Face used to connect a
detachable HMI (GHU20x or GHU21x)
Hardware Description C264/EN HW/D30
Watchdog
FBP 28x BIU 241/261
or FBP 24x (1) Redundancy RS 232 / RS 485 / RS 422
Ethernet
CPU 260/270 Optical link (CPU260) or Electrical link (CPU270)
(1)
COM 1 / COM 2
RS 232 ECU 20x RS 485
DSP200 for RS 422
CPU260 IRIG -B RS 232 ECU 20x Optical
GHU200/201
OR
GHU210/211
OR
GHU220/221 GHU 20X/21X
Electrical 1 to 4
AIU2x1
(up to 6 ) 4 digital inputs (AIU201)
8 digital inputs (AIU211)
DOU201
(up to 15) 10 digital outputs
CCU 200/211
(up to 15) 8 digital intputs
4 digital outputs
AOU 200
4 analogue outputs
(up to 4)
Metallic case
Hardware Description C264/EN HW/D30
a keypad at the front plate for local HMI management with 5 pushbuttons
2.2.1.2.2 GHU210
The GHU210 is the front panel with LEDs used for the MiCOM C264C:
1 pushbutton (L/R)
2.2.1.2.3 GHU220
The GHU220 is the front panel used for the MiCOM C264C. This includes only an RJ11
coupler in order to connect a remote GHU20x or GHU21x.
2.2.1.3 Sockets
The FBP242 board is the front backplane of MiCOM C264C equipped with the CPU260.
FIGURE 8: MiCOM C264C – REAR PANEL EQUIPPED WITH A CT/VT BOARD (TMU2XX)
C264/EN HW/D30 Hardware Description
The FBP243 board is the front backplane of the MiCOM C264C equipped with the CPU270:
FIGURE 10: MiCOM C264C – REAR PANEL OVERVIEW WITHOUT CT/VT BOARD
Hardware Description C264/EN HW/D30
Front Panel degree of protection: IP52 (for front panel with LEds or LCD)
Metallic case
C264/EN HW/D30 Hardware Description
a keypad at the front plate for local HMI management with 5 pushbuttons
The GHU202 is the front panel with LCD and LEDs used for the MiCOM C264 60TE
A keypad at the front plate for local HMI management with 5 pushbuttons
2.2.2.2.3 GHU211
The GHU211 is the front panel with LEDs used for the MiCOM C264:
1 pushbutton (L/R)
FIGURE 18: MiCOM C264M – REAR PANEL OVERVIEW WITH CT/VT CONNECTOR
The FBP283 board is the front backplane of the MiCOM C264 equipped with the CPU270.
FIGURE 20: MiCOM C264 – REAR PANEL OVERVIEW WITHOUT CT/VT CONNECTOR
C264/EN HW/D30 Hardware Description
Jumper
missing => 1
present => 0
Example:
NOTE: Two boards of the same type must not have the same address
In RS232 set the jumpers S14, S16 and between S12.1 and S12.3
In RS485 set the jumpers S13, S15 and between S12.1 and S12.2. It is possible to
end the line with a 124 resistor by setting S17. (See CO chapter to know when the
resistor has to be used).
2.4.1.2 Configurable communication Port 2 - RS232/422/485
The communication link characteristics are:
In RS485 set the jumpers S7, S8, S2. It is possible to end the line with a 124
resistor by setting S11. (See CO chapter to know when the resistor has to be used).
In RS422 set the jumpers S7, S8, S4 and S2. It is possible to end the line with a 124
resistor by setting the jumpers S10 and S11. (See CO chapter to know when the
resistor has to be used).
Hardware Description C264/EN HW/D30
Supply C264 from two power supplies (main and secondary) of the same range.
S6
S7
S3 S8
S2 S9
S4
S5
RS422 set S1, S4, S7, S8 It is possible to end the line with a
120 resistor by setting the jumpers
S10 and S11. (See CO chapter §2.3
to know when the resistor has to be
used).
RS485 set S2, S7, S8 It is possible to end the line with a
120 resistor by setting S11. (See
CO chapter §2.3 to know when the
resistor has to be used).
C264/EN HW/D30 Hardware Description
Two non isolated RS232 links. The transmission rate must be the same on both links
(values from 50 to 56000 bps configurable with the configuration tool or settable via
GHU20x)
An IRIG-B input
Calendar saved
Two non isolated RS232 links. The transmission rate must be the same on both links
(values from 50 to 56000 bps configurable with the configuration tool or settable via
GHU20x)
An IRIG-B input
Calendar saved
The digital inputs can be used for single or double remote signalling, pulse or digital
measurement input on the same module.
The input responds to negative input voltages and they are not self controlled
All voltages between 24V and 220V DC selected using jumpers (with CPU3)
J2-4
J2-3
J2- 2
J2-1
From 24V to 220VDC: a peak current (> 27mA) circulates during a short time (± 2 ms)
to clean external contacts:
For use with CPU 2 board, the address of the board is selected using a four-position
header and jumper.
For use with CPU 3 board, the address of the board can be defined by the location of
the CCU211 in the C264 rack (or by jumper if the board is used as spare of a previous
board). This location is defined using the SCE.
C264/EN HW/D30 Hardware Description
The digital inputs can be used for single or double status, pulse or digital
measurement input on the same module.
The digital inputs can be used for single or double status, pulse or digital
measurement input on the same unit.
J2-4
J2-3
J2- 2
J2-1
From 24Vdc to 220Vdc: a peak current (> 27mA) circulates during a short time
(± 2 ms) to clean external relay’s contacts:
Settings: for use with CPU 3 board, the address of the board can be defined by the location
of the DIU211 in the C264 rack (or by jumper if the board is used as spare of a previous
board). This location is defined using the SCE.
Hardware Description C264/EN HW/D30
Each transformer has one AC voltage ranges (VN): 57.73 Vrms to 130 Vrms
Factory
N° Open Closed
setting
W1 No watching port 5 Fault watching Port 5 (Fx) Open
W3 Enable more aggressive back-off Enable less aggressive back-off Open
W4 Max length is 1536 byte Enable enforce the max frame Open
length for VLAN is 1522
W5 Enable half duplex back pressure Disable half duplex back pressure Open
W6 Continue sending frame regard- Enable to drop frame after 16 Open
less of number of collisions collisions
W7 Enable flow control Disable flow control Closed
W8 No priority reserve Enable 6KB priority buffer reserved Closed
W9 Half duplex for port 5 (Fx) Full duplex for port 5 (Fx) Closed
W10 Unlimited broadcast frames Enable 5% broadcast frame allowed Open
W11 Half duplex for port 6 (Fx) Full duplex for port 6 (Fx) Closed
W12 Enable 802.1p selected by Enable 802.1p field for all port Closed
EEPROM
W13 Share buffers up to 512 buffers Enable equal amount of buffers per Open
on a single port port (113 buffers)
C264/EN HW/D30 Hardware Description
OPEN CLOSE
SWU202 optical links: these 2 optical links are monitored; if one link comes down the default
is announced by the contacts (250V/5A):
Hardware Description C264/EN HW/D30
2.4.17 Ethernet Switch Unit – SWx202/SWx212, SWx204/SWx214 (x=R for dual Ring, x= D for
Dual homing)
These boards include 4 electrical links and 2 optical links for a dual ring/homing.
The SWx21y switches are SNMP-managed.
The SWx202/SWx212 models have a Multi-mode optical interface.
The SWx204/SWx214 models have a Single mode (mono-mode) optical interface.
Switch management:
It is possible to manage the switch with the MDIO bus (J6).
Link budget 12 dB 19 dB
Connector loss (2) 0.8 dB 0.8 dB
Safety Margin 4 dB 4 dB
Allowed link attenuation 6.4 dB 13.4 dB
Typical cable attenuation 1 dB/km 0.4 dB/km
Maximum range 6.4 km 33 km
Link budget 12 dB 19 dB
Connector loss (6) 0.8 dB 0.8 dB
Patch loss (2) 2 dB 1 dB
Safety Margin 4 dB 4 dB
Allowed link attenuation -0.8 dB 8.2 dB
Typical cable attenuation 1 dB/km 0.4 dB/km
Maximum range 0 20 km
The values given above are only approximate ones. Always use cable and connector losses
as specified by the manufacturer.
C264/EN HW/D30 Hardware Description
For IEC870-5-103 standard, the circle must be visible (light is sent for the “0” level)
Otherwise the circle must be hidden (light is sent for the “1” level).
Optical characteristics:
Connector type: ST
Wavelength: 820 nm
RS422 (4 wires): TA (+), TB(-), RA (+) and RA (-) are used. The circle must be hidden
RS485 (2 wires): only TA (+), TB (-) are used. The circle must be visible
The indication on the module from bottom to top is as follows:
TA (+)
TB (-)
Ground
RA (+)
RB (-)
NOTE : There is no resistor to polarize the line
Connections C264/EN CO/D30
MiCOM C264/C264C
CONNECTIONS
Connections C264/EN CO/D30
CONTENTS
2. CONNECTOR BLOCKS
2.1 I/O Connector Block
All the I/O connection uses a standard type of connector block with a 24-pin and 5.08 mm
pitch.
The I/O connector block characteristics are the following:
Parameter Value
Continuous rating 10 A
Connection method Screw M3
2
Cable size 1.0 - 2.5 mm
Connection pitch 5,08 mm
Isolation to other terminal and to earth 300 V basic insulation
Standards UL, CSA
Parameter Value
VT connection
Continuous rating 10 A
3 second rating 30 A
30 ms rating 250 A
Connection method Screw M4
2
Cable size 2 off 2.5 mm
Isolation to other terminal and to earth 500 V basic insulation
CT connection
Continuous rating 20 A
10 second rating 150 A
1 second rating 500 A
Connection method Screw M4
2 2
Cable size 2 off 2.5 mm / 1 off 4 mm
Isolation to other terminal and to earth 300 V basic insulation
Cable crimp
Copper cable
minimum section: 2.5mm²
C0047ENb
Screened multi-strand cable has to be used for digital input-output signals. For cables
within the cubicle the cable screen can be connected to the earth at both ends of the
cable. If the cable is taken beyond the system cubicle the cable screen should be
earthed at one end only to prevent current flowing in the screen due any differences in
ground potential.
Screened and twisted pair has to be used for analogue input-output signals. The
screen is connected to the earth by the end of Bay Module side.
One or two screened and twisted pairs have to be used for lower communication
signals. The screen is connected to the earth by two cable ends.
It is recommended to group cables and fit them as near as possible to an earth plane or to
an element of an earth wire-mesh.
C264/EN CO/D30 Connections
Protective
Functional earth Conductor (earth)
Terminal
Second example: MiCOM C264/C264C fitted in a metallic cubicle with other devices.
Metallic cubicle
other device
Earth
Protective Conductor
(earth)
Pin n° Signal
1 Redundancy relay 2 - NO contact
2 Redundancy relay - common 1-2
3 Redundancy relay 1 - NO contact
4 Watchdog relay - NO contact
5 Watchdog relay - NC contact
6 Watchdog relay - common
7 Redundancy input - 1+
8 Redundancy input - common 1 / 2
9 Redundancy input - 2+
10
11
12 RS232: RxD RS485: B - Port 1
13 RS232: SG (0 V) - Port 1
14 RS232: TxD RS485: A - Port 1
15 RS232: SG (0 V) - Port 2
16 RS232: CTS - Port 2
17 RS232: RxD RS485 B RS422: TB - Port 2
18 RS232: TxD RS485 A RS422: TA - Port 2
19 RS232: RTS RS422: RB - Port 2
20 RS422: RA - Port 2
21 RS232: DCD - Port 2
22 Voltage input: Gnd Gnd
23 Voltage input: AC/DC (+)
24 Voltage input: AC/DC (─)
PIN
Output relays
1 O2
2
3 O1
4 Watchdog
5
6
7 V IN VIN
+ +
- DI1 - DI2
8 - -
10
11 RS232/
12 RXD / TB RS485 Serial
link 1
13 SG (0 V)
14 TXD / TA
#
15
SG (0 V)
16 RS232/
CTS RS422
17
RXD / TB RS485 Serial
18 TXD / TA
RTS / RB
link 2
19
RA #
20
DCD
21
22
V aux
23 + Power
supply
24 -
-
C0050ENf
Supply C264 from two power supplies (Main and secondary) of the same range.
Pin n° Signal
1 Redundancy relay 2 NO contact
2 Redundancy relay common 1-2
3 Redundancy relay 1 NO contact
4 Watchdog relay NO contact
5 Watchdog relay NC contact
6 Watchdog relay common
7 Redundancy input 1+
8 Redundancy input common 1-2
9 Redundancy input 2+
10 Voltage source 2 : Secondary power supply DC( + )
11 Voltage source 2 : Secondary power supply DC( ─ )
12 Not Used
13 Not Used
14 Not Used
15 RS232: SG (0 V) Port 2
16 RS232: CTS Port 2
17 RS232: RxD RS485 B / RS422: TB Port 2
18 RS232: TxD RS485 A / RS422: TA Port 2
19 RS232: RTS RS422: RB Port 2
20 RS422: RA Port 2
21 RS232: DCD Port 2
22 Voltage source GND GND
23 Voltage source 1 : Main power supply DC( + )
24 Voltage source 1 : Main power supply DC( ─ )
SG (O V) SG (0 V)
SG (O V) SG (0 V)
C0500ENa C0501ENa
1 CD
2 RX
3 TX
4 5V ( for ECU20x supply)
5 SG (0 V)
6 Not used
7 RTS
8 CTS
9 Not used
C264/EN CO/D30 Connections
1 TA (+)
2 TB (-)
3 Ground
4 RA (+)
5 RB (-)
RS422 (4 wires): TA(+), TB(-), RA(+), RB(-) are used. The circle must be hidden.
RS485 (2 wires): only TA(+) and TB(-) are used. The circle must be visible.
The ECU200 module has 2 optical fibre connectors (ST type):
NOTE: The DSPIO210 board is delivered in association with the TMU210 board only.
Below is shown the Wiring diagram and terminal reference diagram of the current DSPIO board
(reference: 2071414 Common Trip Contacts)
The DSPIO 211 board is equipped with a 24-way 5.08 mm pitch connector.
NOTE: The DSPIO 211 board is delivered in association with the TMU210 board only
Below is shown the Wiring diagram and terminal reference diagram of the current DSPIO board
(reference: 2071860 Independent Trip Contacts)
1 Digital Input 1+
2 Digital Input 2+
3 Common Digital Input 1 / 2
4 Digital Input 3+
5 Digital Input 4+
6 Common Digital Input 3 / 4
7 Digital Input 5+
8 Digital Input 6+
9 Common Digital Input 5 / 6
10 Digital Input 7+
11 Digital Input 8+
12 Common Digital Input 7 / 8
13 Digital Output 1 B
14 Digital Output 1 A
15 Common Digital Output 1 - 2 A
16 Digital Output 2 A
17 Digital Output 2 B
18 Common Digital Output 1 - 2 B
19 Digital Output 3 B
20 Digital Output 3 A
21 Common Digital Output 3 – 4 A
22 Digital Output 4 A
23 Digital Output 4 B
24 Common Digital Output 3 - 4 B
1 + U
2 - mA AI 5
#
3 + U
4 - mA AI 1
#
5
6
GND
7 + U
8 - mA AI 6
#
9 + U
10 - mA AI 2
#
11
12
GND
13 + U
14 - mA AI 7
#
15 + U
16 - mA AI 3
#
17
18
GND
19 + U
20 - mA AI 8
#
21 + U
22 - mA AI 4
#
23
24
GND
C0365ENa
Transducerless 1A Transducerless 5A
Current and Voltage TMU 220 Current and Voltage TMU 220
Unit board Unit board
4 Transducerless 4 Transducerless
PIN PIN
current inputs current inputs
N1
1 2 1 2 N2
N1
3 4 N2 3 4
C1
5 6 5 6 C2
C1
7 8 C2 7 8
B1
9 10 9 10 B2
B1
11 12 B2 11 12
A1
13 14 13 14 A2
A1
15 16 A2 15 16
17 18 17 18
X1 X1
19 20 X2 19 20 X2
U1 U1
21 22 U2 21 22 U2
V1 V1
23 24 V2 23 24 V2
W1 W1
25 26 W2 25 26 W2
N1 N1
27 28 N2 27 28 N2
5 Transducerless 5 Transducerless
voltage inputs voltage inputs
C0060ENb_modif
VCC
Sign ISO 2
Current output
1 +3.3V - VCC
5V
Component
power supply
AO1 +
AO1 -
VCC
Read Vaux
Inhibit
AO1 +
CPLD BUS
NO Relay
Sign
Read
Iout
Inhibit /Read Inhibit
AO1 - JTAG CPLD
VCC
Current output Sign JTAG MSP 430 2
2
MSP430 Serial
Comunication
AO2 + RS 232
(Only debug)
AO2 -
Vaux
VCC 2
Read
Inhibit
AO2 +
NO Relay
Reset
SPI
Sign
Read
Inhibit /Read Inhibit Iout
BUS C264- Isolation Group 2
AO2 -
OPTO
VCC
Sign
Current output
3
Reset
SPI
AO3 +
AO3 -
Vaux
VCC MSP430 Serial
Read Comunication
Inhibit RS232
AO3 +
Relais NO 1 (Only debug)
Sign
Read
/Read Inhibit Iout
Inhibit
AO3 -
VCC Sign
Current output Internal power
4 management
DC-DC +48V
Converter
AO4 + 48V / 5V Vaux
1KV Isolation 0V
AO4 -
VCC
Vaux External power supply
Read
Inhibit Isolation group 1
AO4 +
NO Relay +3.3V - VCC
Component
Sign power supply
Read
Inhibit /Read Inhibit Iout
AO4 - +5V
OP-AMP
Power Supply
Vaux WDOG
WDOG+
NO Relay
WDOG- NO Error
ISO 1
C0520ENa
N° Description
1 External power supply +48V
2 NIL
3 External power supply (0V)
4 NIL
5 WDOG+
6 WDOG-
7 NIL
8 READ INHIBIT AO n° 1+
9 READ INHIBIT AO n° 1-
10 READ INHIBIT AO n° 2+
11 READ INHIBIT AO n° 2-
12 READ INHIBIT AO n° 3+
13 READ INHIBIT AO n° 3-
14 READ INHIBIT AO n° 4+
15 READ INHIBIT AO n° 4-
16 NIL
17 AO n° 1+
18 AO n° 1-
19 AO n° 2+
20 AO n° 2-
21 AO n° 3+
22 AO n° 3-
23 AO n° 4+
24 AO n° 4-
Wiring recommendation:
Due to the proximity of the port 4 Ethernet connector, it is strongly recommended that the
“Fault signal connector” connections are visually checked before any hand manipulation of
the Ethernet connectors.
Particular attention is to be paid during the wiring phase, not to damage the cable’s isolation.
Wiring recommendation:
Due to the proximity of the port 4 Ethernet connector, it is strongly recommended that the
“Fault signal connector” connections are visually checked before any hand manipulation of
the Ethernet connectors.
Particular attention is to be paid during the wiring phase, not to damage the cable’s isolation.
Connections C264/EN CO/D30
Wiring recommendation:
Due to the proximity of the port 4 Ethernet connector, it is strongly recommended that the
“Fault signal connector” connections are visually checked before any hand manipulation of
the Ethernet connectors.
Particular attention is to be paid during the wiring phase, not to damage the cable’s isolation.
C264/EN CO/D30 Connections
Data bits: 8
Parity: No
Stop bit: 1
Control Xon/Xoff
Connector description:
MiCOM C264/C264C
INSTALLATION
Installation C264/EN IN/D30
CONTENTS
3. DELIVERY RECEPTION 5
3.1 Packing inspection and opening 5
3.2 Delivery form checking 5
4. MECHANICAL MOUNTING 6
4.1 Rack mounting 6
4.2 Panel mounting 6
5. WIRING INSTALLATION 7
5.1 General wiring 7
5.2 Power supply wiring 7
5.3 I/O board wiring 7
5.4 Networks wiring 7
8. DOWNLOADING DATABASE 86
8.1 Database download with CAT 86
8.1.1 Loading DB under CAT 86
8.1.2 Download DB onto C264 86
8.2 Database download with SMT 87
8.2.1 Loading DB under SMT 87
8.2.2 Download DB onto C264 87
8.2.3 Switch to downloaded data base 87
Delivery reception
Mechanical fixation
Networks wiring
Network setting
2. REQUIREMENTS
MiCOM C264 boot setting and software installation is carried out using a Windows PC with
common utilities and serial/Ethernet link to the computer.
The PACiS CD-ROM System installation is needed to run the C264’s install software on the
Host PC.
2.1 MiCOM C264
The MiCOM C264 needs at least
Computer IP address
3. DELIVERY RECEPTION
Delivery reception is composed of:
Feeling up commissioning
3.1 Packing inspection and opening
On receipt of the unit, inform the delivery agent if there is any sign of damage.
Check the box for documentation, or computer hardware option added in the delivery form
like ribbon, screws, port extension etc.
3.2 Delivery form checking
The delivery form is based on the order form issued from CORTEC. It lists computer type,
boards (with supply, serial numbers and position in the rack) and options.
Verify that the composition of the device is as ordered.
Computer is delivered with the required connectors.
C264/EN IN/D30 Installation
4. MECHANICAL MOUNTING
The chapter C264/EN HW gives the size of MiCOM C264 rack, the fixation diameters and
their position.
If electric screwdriver is used the torque limitation should be set to the small diameters of the
screws.
The MiCOM C264 can be mounted in racks or panel.
4.1 Rack mounting
MiCOM C264 may be rack mounted using single tier rack frames (our part number is
FX0021 001):
These frames have been designed to have dimensions in accordance with IEC60297 and
are supplied pre-assembled ready to use.
The two horizontal rails of the rack frame have holes drilled at approximately 26mm intervals
and C264 cases are attached via their mounting flanges using M4 Taptite self-tapping
screws with captive 3 mm thick washers to ensure a good earth contact (our part number is
ZB5865250).
It is possible to install two C264C side by side on the assembly panel or one C264.
Ensure that the computers are earthed, using the screw terminal on the rear of the unit.
4.2 Panel mounting
MiCOM C264 can be flush mounted into panels using M4 Taptite self-tapping screws with
captive 3 mm thick washers to ensure a good earth contact (our part number is ZB5865250).
Alternatively tapped holes can be used if the panel has a minimum thickness of 2.5 mm.
Where several MiCOM C264 are to be mounted in a single cut-out in the panel, it is advised
that they are mechanically grouped together horizontally and/or vertically to form rigid
assemblies prior to mounting in the panel.
NOTE: It is not advised that MiCOM C264 are fastened using pop rivets as
this will not allow the device to be easily removed from the panel in
the future if repair is necessary.
Installation C264/EN IN/D30
5. WIRING INSTALLATION
Wiring has to be prepared before installation. The MiCOM C264 is delivered with required
connectors for I/O boards and Ethernet switches. The wire diameters stated in chapter
C264/EN CO are mandatory. Tighten the screws in a cross pattern (e.g. top left, then bottom
right etc), take care not to over torque the screws.
5.1 General wiring
Only two wires can be screwed together on any one MiCOM connector. The AC and DC
analogues, digital signal, and communication wires should use separate shielded cable.
From a practical point of view the power supply of each computer should have a switch
(MCB, link, or fuse) to turn off the power during installation and commissioning tests.
The MiCOM C264 description sheet describes the type of board Installed on each slot (C, D
etc.) It is very important to use it to correctly plug the connectors.
Connection diagrams of the C264 are given in chapter C264/EN CO. Wires should be
connected with the connector unplugged. Each wired signal has to be tested before plugging
and fixing the connectors. The connectors have to be fixed on the C264 case with the
screws available at each extremity of the connector.
For connection of the protective (earth) conductor please refer to the section 3.1 of the
Connections chapter (C264/EN CO)
5.2 Power supply wiring
The BIU connector wiring is vital as it provides the power supply. Power voltage should be
tested and checked to BIU reference defined in chapter C264/EN HW to ensure that supply
is compliant to BIU voltage.
The power has to be switched off before plugging in the connector.
5.3 I/O board wiring
Several DIU, CCU, BIU board voltage are available for Digital Input. Check that the DIU
voltage as stated on the delivery form matches with the nominal signal input before plugging
connector to the computer.
DOU and CCU, the board generates Digital Output with a defined inductive characteristic.
On the other side of the wire the inductance should be compliant. To avoid damage to the
DO board connected to inductive circuits it may be necessary to connect an anti-surge
diode.
5.4 Networks wiring
Network wiring can be fibre optic or copper. Fibre optic communication is an option, and
should be ordered as such along with the required mechanical modules. There are specific
rules governing the installation of fibre optics (refer to the chapter C264/EN CO). Specific
care should be taken with the bend radius of the fibres, and the use of optical shunts is not
recommended as these can degrade the transmission path over time.
Never look into the end of a fibre optic due to the risk of causing serious damage to the eye.
Copper networks should follow class recommendation and shielding. When using a Legacy
bus (with IED mounted in daisy chain), the correct resistor, at both ends only, should be
fitted (120 ohms for RS422 and RS485).
Copper Ethernet network have to stay inside a cubicle. Fibre optic has to be used between
cubicles.
C264/EN IN/D30 Installation
For the use of SWR20x or SWD20x, the optical ring has to be connected as follows:
Installation C264/EN IN/D30
7.1 Introduction
This section describes procedures in order to Install, Update and Roll-back MiCOM C264 software
with Cyber Security features or standard installation (without cyber-security).
_________________________________________________________________________________
Limitation: This section describes MiCOM C264 upgrading from release B7.21 or upper.
_________________________________________________________________________________
Installation C264/EN IN/D30
7.2 Prequisites
Device Comment
PC Personal Computer used for connection with MiCOM C264
Operating System Supported:
Windows 7 Pro 32/64 bits with Service Pack 1
Hardware configuration minimum:
CPU Pentium 3 / 700 Mhz
Hard disk 100 Mbytes space free
1 Ethernet port 10 or 100 Mb/s
Components description:
C264 cpu270 is the C264 release package. It contains
VxWorks BOOTROM and C264 Application. VxWorks
BOOTROM is file system boot loader used by embedded
Operating System VxWorks. C264 Application is an image of
Operating System VxWorks and C264 application release.
These files are upgraded to CPU flash memory of C264
device.
FTP Server is a ftp tool.
MiCOM S1 Software is setting software.
CAT Installer CAT Software is a graphical tool and communicates with C264
device via PERMA brick.
C264 device is upgraded to CPU flash memory via the CAT
Software. CAT installer is a separate package delivery.
_________________________________________________________________________________
In case of CPU with a serial number in the Schneider Electric range is boot with a PACiS version
without Schneider Electric Mac support, the C264 doesn’t start the application. Moreover, the C264 is
seen by tool CAT with a bad serial number, which is not possible to be change by CAT.
_________________________________________________________________________________
Installation C264/EN IN/D30
Hardened platform using hardened PC (Cyber-Security use case), software have be installed or
un-install through SAVANT Protection® Ships Enforcer tool.
Note:
The complete Installating MiCOM C264 from Scratch follows several procedures:
Please follow instructions described on next section “CAT Installation” on section “MiCOM C264
Installing from Scratch”.
Step Action
1 CAT Software of the current C264 computer release is installed on PC:
From the Windows start menu folder “PACiS”, find CAT software
_______________________________________________________________________________
Note
Please, verify that CAT version used is compliant with firmware of C264(s). If not compliant,
the C264 will be not displayed at the end of Step 3; in this case, please execute above part B
and below part C with the CAT version compliant with the current C264 firmware.
_______________________________________________________________________________
C264/EN IN/D30 Installation
C. Set computer boot parameter to “Bootprom boot” mode, please follow instructions:
Step Action
1 Choose Expert Functions > Manage boot and network parameters function
Select “Bootprom boot” option
Apply parameters button
2 After computer reboot, connect to the computer (refer to previous table Step 3)
Choose Display status and network parameters function > Tab General (1)
Check Computer mode value is set to BOOT (2)
Step Action
Click Next
Note: For Cyber Security use case, please refer to the above Note for Secured Installation
for Installation with SAVANT tool.
C264/EN IN/D30 Installation
3 Read the End User License Agreement, select “I accept the agreement”
Click Next
4 In the "Select Destination Location" dialog box define the installation folder (the default
installation folder is C:\Program Files\Pacis\Computer)
Click Next
Note: it is recommended to create other default installation folder name, if old MiCOM
Computer is already installed.
5 By default a Full Installation is proposed :
With the check boxes select the components to be installed
Click Next
6 In the "Select Start Menu" dialog box define the Start Menu folder.
Click Next
In the "Select Additional Tasks" dialog box, with the check box select the Additional icons
Create FTPD desktop icon.
Click Next
7
Installation C264/EN IN/D30
19 The transfer of BOOTROM file system bootrom.fhl to CPU flash memory is in progress…
Wait 1 minute
A message box is displayed at the end of transfer
Installation C264/EN IN/D30
Step Action
1 Establish CAT Connection with Computer with CAT Software of new release:
Please follow instructions described on previous procedure “Establish CAT Connection with
Computer, please follow instructions:”
3 The flash memory formatting is indicated by a progress bar Formatting flash memory
displayed
Installation C264/EN IN/D30
Step Action
1 Establish CAT Connection with Computer with CAT Software of new release:
Please follow instructions described on previous procedure “Establish CAT
Connection with Computer, please follow instructions:”
3 Uploading application software files are indicated via the progress bar
Step Action
1 Establish CAT Connection with Computer with CAT Software of new release:
Please follow instructions described on previous procedure “Establish CAT
Connection with Computer, please follow instructions:”
2
1
3 Establish CAT Connection with Computer with CAT Software of new release:
Please follow instructions described on previous procedure “Establish CAT
Connection with Computer, please follow instructions:”
4 Check
C264/EN IN/D30 Installation
Hardened platform using hardened PC, software must be installed or un-install through
SAVANT Protection software.
It is mandatory to update the C264 Computer and CAT softwares through SAVANT Protection® Ships
Enforcer tool.
_________________________________________________________________________________
B Set Computer Boot PC with CAT current release PC with CAT current release is
parameter to “Bootprom is installed installed
boot” mode
Note: CYBER-SECURITY
use case needs SAVANT
tool to install/uninstall
software.
Step Action
1 It is mandatory to update the MiCOM C264 setup release through SAVANT Protection®
Ships Enforcer tool, follow instructions:
Verify SAVANT Protection tool is installed on plateform
if not installed, please refer to documentation « PACiS Hardening Application
Note » on section « MiCOM C264 Hardening » and follow instructions described on
section «Installation SAVANT protection».
2 Check if release is already installed on PC from the start menu folder “PACiS”
Note: If the start menu folder does not contain the folder “PACiS”, please refer to the above
section “Installing MiCOM C264 from Scratch”
Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Establish
CAT Connection with Computer, please follow instructions:” and follow instructions.
Set computer boot parameter to “Bootprom boot” mode, please follow instructions: Please refer to
the above section “Installing MiCOM C264 from Scratch”, procedure “Set computer boot
parameter to “Bootprom boot” mode and follow instructions.
Step Action
Note:
4 Sign in as Administrator account Actions > Switch User
7 Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Update
VxWorks BOOTROM of new release, please follow instructions:”, and follow instructions on
“Install C264 Computer of new release on PC: “ part.
10 Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure
“Update VxWorks BOOTROM of new release, please follow instructions:”, and follow
instructions on “Install CAT software of new release on PC: “ part.
11 Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure
“Update VxWorks BOOTROM of new release, please follow instructions:”, and follow
instructions on “Install Update VxWorks BOOTROM of new release:“ part.
12 Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Update
VxWorks BOOTROM of new release, please follow instructions:”, and follow instructions on
“Reboot computer (MANDATORY): “ part.
Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Update C264
Application of new release:” and follow instructions.
Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Set Computer
Boot parameter to “Flash boot” mode:” and follow instructions.
Installation C264/EN IN/D30
Step Action
1 Login with Windows® User Account (with Administrator right)
2 Check if release is already installed on PC from the start menu folder “PACiS”
Note: If the start menu folder does not contain the folder “PACiS”, please refer to the above
section “Installing MiCOM C264 from Scratch”
Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Establish
CAT Connection with Computer, please follow instructions:” and follow instructions.
B. Set computer boot parameter to “Bootprom boot” mode, please follow instructions:
Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Set computer
boot parameter to “Bootprom boot” mode and follow instructions.
Step Action
1 Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Update
VxWorks BOOTROM of new release, please follow instructions:”, and follow instructions on
“Install C264 Computer of new release on PC: “ part.
2 Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure
“Update VxWorks BOOTROM of new release, please follow instructions:”, and follow
instructions on “Install CAT software of new release on PC: “ part.
3 Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Update
VxWorks BOOTROM of new release, please follow instructions:”, and follow instructions on
“Install Update VxWorks BOOTROM of new release:“ part.
4 Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Update
VxWorks BOOTROM of new release, please follow instructions:”, and follow instructions on
“Reboot computer (MANDATORY): “ part.
C264/EN IN/D30 Installation
Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Update C264
Application of new release:” and follow instructions.
Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Set Computer
Boot parameter to “Flash boot” mode:” and follow instructions.
Installation C264/EN IN/D30
Hardened platform using hardened PC, software must be installed or un-install through
SAVANT Protection software.
It is mandatory to update the C264 Computer and CAT softwares through SAVANT Protection® Ships
Enforcer tool.
_________________________________________________________________________________
Step Action
1 It is mandatory to update the MiCOM C264 setup release through SAVANT Protection®
Ships Enforcer tool, follow instructions:
Verify SAVANT Protection tool is installed on plateform
if not installed, please refer to documentation « PACiS Hardening Application
Note » on section « MiCOM C264 Hardening » and follow instructions
described on section «Installation SAVANT protection».
2 Check if release is already installed on PC from the start menu folder “PACiS”
Note: If the start menu folder does not contain the folder “PACiS”, please refer to the
above section “Installing MiCOM C264 from Scratch”
Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Establish
CAT Connection with Computer, please follow instructions:” and follow instructions.
B. Set computer boot parameter to “Bootprom boot” mode, please follow instructions:
Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Set computer
boot parameter to “Bootprom boot” mode, please follow instructions:” and follow instructions.
Step Action
Note:
7 Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Update
VxWorks BOOTROM of new release, please follow instructions:”, and follow instructions on
“Install C264 Computer of new release on PC: “ part.
10 Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Update
VxWorks BOOTROM of new release, please follow instructions:”, and follow instructions on
“Install CAT software of new release on PC: “ part.
11 Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Update
VxWorks BOOTROM of new release, please follow instructions:”, and follow instructions on
“Install Update VxWorks BOOTROM of new release:“ part.
12 Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Update
VxWorks BOOTROM of new release, please follow instructions:”, and follow instructions on
“Reboot computer (MANDATORY): “ part.
Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Format flash
memory of CPU, please follow instructions:” and follow instructions.
Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Update C264
Application of new release:” and follow instructions.
Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Set Computer
Boot parameter to “Flash boot” mode:” and follow instructions.
Installation C264/EN IN/D30
Step Action
1 Login with Windows® User Account (with Administrator right)
Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Establish
CAT Connection with Computer, please follow instructions:” and follow instructions.
B. Set computer boot parameter to “Bootprom boot” mode, please follow instructions:
Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Set computer
boot parameter to “Bootprom boot” mode, please follow instructions:” and follow instructions.
Step Action
1 Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure
“Update VxWorks BOOTROM of new release, please follow instructions:”, and follow
instructions on “Install C264 Computer of new release on PC: “ part.
2 Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure
“Update VxWorks BOOTROM of new release, please follow instructions:”, and follow
instructions on “Install CAT software of new release on PC: “ part.
3 Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure
“Update VxWorks BOOTROM of new release, please follow instructions:”, and follow
instructions on “Install Update VxWorks BOOTROM of new release:“ part.
4 Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure
“Update VxWorks BOOTROM of new release, please follow instructions:”, and follow
instructions on “Reboot computer (MANDATORY): “ part.
Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Format flash
memory of CPU, please follow instructions:” and follow instructions.
Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Update C264
Application of new release:” and follow instructions.
Please refer to the above section “Installing MiCOM C264 from Scratch”, procedure “Set Computer
Boot parameter to “Flash boot” mode:” and follow instructions.
C264/EN IN/D30 Installation
7.4.1 Introduction
This section describes procedures in order to Install, Update and Roll-back CATsoftware.
7.4.2 Prequisites
The PACiS CAT software needs components:
\System\Delivery\PACiSVa.b.c\TOOLS\WinPcap
Hardened platform using hardened PC (Cyber-Security use case), software have be installed or
un-install through SAVANT Protection® Ships Enforcer tool.
Note:
Step Procedure
Step Action
1 Access with administrator account for CAT Installation.
2 Uninstall previous CAT version before installing the new version (see note)
Note: For lower A1.24 versions, uninstall manually the previous version. For higher
A1.24 versions, un-installation is made automatically by CAT setup. For Cyber Security
use case, please use SAVANT tool for uninstall software.
Step Action
1 Double-click the dotnetfx35_xpsp1.exe to install the Framework NET 3.5 SP1
Note: For Cyber Security use case, please refer to the above Note for Secured
Installation for Installation with SAVANT tool.
Step Action
1 Double-click the WinPcap_4_x_y.exe to install the Driver WinPcap (x.y is the release number).
Note: For Windows 7 the WinPcap version has been 4.1.2 or higher.
2 Click Next in the Wizard.
Click Install.
C264/EN IN/D30 Installation
Step Action
4
Step Action
1 Access to the CAT Software installer package of new release
Note: For Cyber Security use case, please refer to the above Note for Secured Installation
for Installation with SAVANT tool.
Click Next
Installation C264/EN IN/D30
3 In the "Select Installation Folder" dialog box define the installation folder (the default
installation folder is C:\Program Files\PACiS\CAT
Click Next
Note: it is recommended to create other default installation folder name, if old CAT Software is
already installed.
4
5
C264/EN IN/D30 Installation
_________________________________________________________________________________
Hardened platform using hardened PC, software must be installed or un-install through
SAVANT Protection software.
It is mandatory to update the CAT software through SAVANT Protection® Ships Enforcer tool.
_________________________________________________________________________________
Step Action
Note:
C264/EN IN/D30 Installation
Click Ok
7 Please refer to the above section “Installing CAT from Scratch”, procedure “To install
PACIS CAT software, do following:” and follow instructions.
Hardened platform using hardened PC, software must be installed or un-install through
SAVANT Protection software.
It is mandatory to update the CAT software through SAVANT Protection® Ships Enforcer tool.
_________________________________________________________________________________
Step Procedure
A Uninstall the actual CAT software
B Install the previous CAT software
Step Action
1
Installation C264/EN IN/D30
Note:
3 Sign in as Administrator account Actions > Switch User
9 Please refer to the above section “Installing CAT from Scratch” and follow instructions on
“To install PACIS CAT software, do following:” procedure
3 Please refer to the above section “Installing CAT from Scratch” and follow instructions on
“To install PACIS CAT software, do following:” procedure
Installation C264/EN IN/D30
To enlarge the Scan pane, collapse the Filter pane using the horizontal Auto hide toggle
button.
To enlarge the Work pane, collapse the left panes using the vertical Auto hide toggle button.
Select the HMI language among French, English:
<Installation folder>/CAT/Error_Reports is the destination folder for fault report. A fault report
might result from a window popping up, for example:
7.5.3 Settings
In case the PC has several network cards, click Select Network adapter and select the
desired card. Some cards are not fit for the CAT (NdisWan Adapter, MS TCP Loop back
interface…).
The selection is saved in the Registry. All the settings are restored at CAT's next start.
7.5.4 Scan
To carry an inventory of the networked computers, click Refresh; this populates the
computers' directory:
Computer's IP address
red: maintenance
blue: stopped
black: bootprom
green: active
grey: disconnected
To sort the items according to the values in a column, click the column header; this reveals a
clickable sorting sign or .
Installation C264/EN IN/D30
To deny access to computer's information, click the computer's eye icon, the icon looks
crossed off; select Hide selected computers option and the computer selected is off.
To restore access, exit CAT using the upper corner red cross and restart it.
When Computer in maintenance the status shown in the close up line-: MAINT DATA BASE.
However when Computer is in Active state Close up line shows the Banner text if configured
in SCE else the space is blank.
all the extensions with a given number (second drop-down list: 0 for main
computer thru 16)
Any means that the criterion has no effect.
To dim a computer's line, click the eye icon and select the box Hide selected computers.
To take mute computers off the list, click the link Clear disconnected computers.
NOTE: If a distant computer is not detected, download cyberdb_orig.xml on
computer flash/maint directory, using the CMT file explorer.
7.5.5 Connection to a computer
To select a computer, click on it in the directory; this displays the latest computer's name and
data base number (if any) in the close-up line.
To establish a communication with the computer, click Connect to this computer (or click two
times). A login window shows:
Four profiles are defined. Select one as a username and enter the password.
Depending on the security policy, the account might be locked out due to several incorrect
password typed in; in this event, ask the Security administrator to unlock it.
Several sessions cannot be open simultaneously. To change profile, click again Connect to
this computer.
Note for Auto Log Off: when operator's does not place applicative requests for longer than a
timeout, any further action requires a reconnection. To set the time-out, ask the Security
administrator. Default value: 10min.
7.5.6 Work pane
The logon status is reminded in the upper right corner; the computer's information is
reminded in the Work pane upper left corner:
The Stop button is used to suspend all tasks except Synchro and Superv.
Installation C264/EN IN/D30
The Security administrator accesses only a private item (see below). Detail of privileges:
BOOTPROM C264 stopped before the boot (whether a networkboot or flashboot / first count-down),
only the CAT can detect C264
STOPPED C264 stopped before the application launch after the boot (whether a networkboot or
flashboot / second count-down), or after a Stop command
MAINTENANCE Ready to receive a DB
ACTIVE Nominal state
STAND-BY Spare C264 in redundancy architecture
SIMULATION
FAULT DB issue (confirmed by reboot)
HALT The number of faults permitted per day (normally 5) is overrun
INITIALIZATION Transient state, no filter
Installation C264/EN IN/D30
Some operations might require the computer's mode changing. An operation can be
available for the main (or mono) rack (M) or even for an extension (A for All):
Boards is a dashboard:
- status (reflected in the board name: green for present and configured, blue for
missing or not configured, red for configured but faulty)
As the changes of state may be frequent, an auto refresh occurs at each tab opening, and
can be triggered each 5 second for 1 min (box Automatic refresh).
IED Networks shows, for each computer's port, the link status of the IEDs (red for
mute, green for present) and lists the configured IEDs on the legacy bus (name,
connection state). A banner identical to that in LHMI and C264 shows (refer to
C264/EN HI chapter).
NOTE 1: In multirack configuration, extensions are also shown
NOTE 2: Tunnelling requires PatuSpy software and MiCOM S1
7.5.8.2 Manage database (subject to privilege)
A sketch illustrates the present configuration:
both labels include versions number, order of downloading (DB1, DB2 ..), optional
attribute (Modified, Missing …)
Installation C264/EN IN/D30
Missing
Downloading
Standby Active
Switching
Parameter setting
Standby Active
modified modified
Switching
C0308ENb
Parameter setting
The setting can be done in various ways (through the computer LHMI, through
downloading...). For more details, refer to the chapter C264/EN FT.
To download a database:
Browse the disk structure to select a versioned database archive (the USB port is out
of the scope):
C264/EN IN/D30 Installation
Click the button Select the SCE database; wait till a form shows (a maximum of 1 hour
is needed to transfer and store a 20 Mb file):
The drop-down list enrolls all the computers in this session's databases (<network
name in SCE>.adb)
Assign to the computer one C264 in this list
select another data base through the link Select another SCE database
To change the version number, select the box Substitute the database and type a
new Version Number
To download also the mpc file (e.g. in RTU standalone configuration, where no
SMT is available), click Save the SCE database into the computer. In the
<DB_name>.zip, CAT selects and downloads the <BD_name>.mpc file. Only one
.mpc file can be archived (a new download deletes and replaces the previous file).
As VxWorks limits the file name to 8 characters, the downloaded file is renamed
“DB.zip”.
C0511ENa
Installation C264/EN IN/D30
Click the button Start database uploading; this updates the databases sketch and
displays a report of the downloading:
To delete both databases, click clean all databases. This shows a disconnected mode.
7.5.8.3 Edit settings (subject to privilege)
Used to launch MiCOM S1. Refer to the chapter C264/EN ST.
CAT is disconnected for MiCOM S1 to take over.
A setting in MiCOM S1 results in the suffix Modified being appended to the database label.
7.5.8.4 Manage events and states (subject to privilege)
Two kinds of information are displayed: events and latest datapoint values.
EVENTS:
Three tabs are available with a Refresh button and output buttons (Save as text files, Print)
for each of them; CAT reads the event log saved in computer's flash memory and transfers
the log in a file.
the computer's and database's information (in SCE, 'Device name' is called
'Network name' and 'Description' is Short name)
the events that occurred whether automatically or manually driven, in the reverse
chronological order, in a tabular way: <date> <time> <object> <sub-object> <event
label> <state>; the cyber security events are preceded with the character @
C264 objects include #C264, HMILCD, MAINT (flash directory) …
C264/EN IN/D30 Installation
The date and time are provided by C264 not by the CAT machine.
Event Log Parameters and Printer Parameters tabs help you to choose the verbosity
of traces. The parameters are detailed in each information frame:
"Disable event log storage" (default state) disables event log storage mechanism. The state
is updated in function information frame.
Installation C264/EN IN/D30
/null: no printer
"/Smc1/tty": serial port on front panel (setting or shell connector)
"/Scc1/tty": port 1 on BIU
"/Scc2/tty": port 2 on BIU
"/Scc4/tty": port 4 on Cpu3 board (rear side)
Suppress: number of suppressed lines when the buffer is full (typical value: 300)
Buffer size used by the PRINT task to sock lines (typical value: 1000)
Binary inputs
Measurements
Counters
7.5.8.7 Waveforms
The list of disturbance files is displayed in the text area.
To refresh it, press Refresh.
Click the button Transfer waveforms from the computer to this directory. All the files
are uploaded.
The button Clear all waveforms is used to erase the Fast Waveform from MiCOM C264P
flash memory.
7.5.9 Expert Functions
7.5.9.1 Manage date and time (read, and change depending on profile)
Computer total usage duration: number of hours the computer has been running
(located in in /flash/MAINT/ophours)
Installation C264/EN IN/D30
The second section is used to set a time and date value and send it to the computer.
If the box Synchronize with Windows time is checked, the Current computer time cannot be
set: the current date and time are taken from Windows on the PC and displayed.
Set year button: it is useful to set only the Year on a new C264 because the IRIG B signal
does not include the Year data; the new C264 gets the default Year value from Windows.
The third section specifies what defines the seasonal clock shifts:
Make sure that the CAT is connected to the SNTP master server
The first section allows to know and modify the disk the computer boots on:
Network boot, that is using ftp (the IP address is in the second section)
The third section allows to assign addresses to the racks in a multi-rack configuration
A group is a cluster including a main rack and several secondary racks. Main 2 means the
computer serves as a back up to the Main 1 one (redundancy).
The fourth section allows to access the password required to log in WFTD (it is set in
WFTPD/Security/User-rights)
For the new parameters to be effective, click Apply parameters (click anywhere in the pane
first, if the button is dimmed).
7.5.9.3 Manage communication ports
It is possible to disable some communication ports for all users:
a Shell: e.g. HyperTerminal through the serial front port (it applies only to Rx on C264
side; Tx is always active, for debugging purpose)
Telnet: see further; if it has been disabled, restart the C264 after re-enabling Telnet.
Ethernet port No 2: Cpu3 board second port; it can be used to separate IEC61850
flows and Scada flows, reports and gooses, etc. For more details, refer to the chapter
3.5 in C264/EN FT. In Multirack configuration, it must be enabled as it is used for inter-
rack communication.
The files name cannot be changed; only files with DOS name format (8. 3 character format)
can be copied.
To format the flash memory:
Click the Format flash memory button and wait till the end.
NOTE: The passwords and logoff time-outs are spared by this operation.
Installation C264/EN IN/D30
The "logout" command or the windows close can be used to terminate the session.
As Telnet is launched independently of CAT, multi sessions on two or more computers are
possible.
As Telnet used TCP/IP stack, the computer has to be accessible from the PC in this mode.
7.5.10 Security administrator functions
At installation, no account might be locked and no password is in force (keep the field blank).
The security tasks include:
Management: all the parameters are profile-specific, but valid for all of the three clients
(LHMI, CAT, MiCOM S1): a strong password is desirable (refer to PACiS/EN CS
chapter), 8 characters are indispensable
To unlock an account (observer/system engineer/ system administrator):
Settings:
Setting cycle: select account, fill up the form, press Apply Settings, wait for the report, cycle.
Security log reading: it is a subset of event logs: the events that occurred whether
automatically or manually driven, in the reverse chronological order, in a tabular way:
<date> <time> < HMI where event occurred > <profile><event type>
<state><description> the HMI field is empty if the log entry is generated at C264 init
for status of port:
Event types:
Login/Log off
Antivirus status
Telnet de-/activated
\System\Delivery\PACiSVa.b.c\TOOLS\WinPcap
Before beginning the CGAT installation, do the following:
Step Action
1 Access with administrator account for Installation
2 Uninstall previous CGAT version before installing the new version
Hardened platform using hardened PC (Cyber-Security use case), software have be installed or
un-install through SAVANT Protection® Ships Enforcer tool.
Note:
Step Action
1 Install Framework NET 3.5 SP1 (if not installed)
2 Install Driver WinPcap 4.1 (if not installed)
3 Install PACiS CGAT
4 Post-Install PACiS CGAT
Step Action
1 Double-click the dotnetfx35_xpsp1.exe to install the Framework NET 3.5 SP1
Note: For Cyber Security use case, please refer to the above Note for Secured
Installation.
Step Action
1 Double-click the WinPcap_4_x_y.exe to install the Driver Winpcap (x.y is the
release number).
Note1 : For Windows 7 the WinPcap version has been 4.1.2 or higher.
Note2 : For Cyber Security use case, please refer to the above Note for
Secured Installation for Installation with SAVANT tool.
Click Install.
4
Installation C264/EN IN/D30
Step Action
Step Action
1 Double-click the CGAT Installer Ax.y .exe to install the Software (x.y is the release
number).
Note: For Cyber Security use case, please refer to the above Note for Secured
Installation for Installation with SAVANT tool.
C264/EN IN/D30 Installation
Step Action
2 In the "Select Installation Folder" dialog box define the installation folder (the default
installation folder is C:\Program Files\Pacis\CGAT).
Click Next
3
Step Action
1 Select PACIS CGAT Shortcut
Click Right
Choose Properties
Installation C264/EN IN/D30
Step Action
Choose Compatibility
Validate option Run this program in compatibility mode for :
Choose Windows Vista (Service Pack2)
Validate option Run this program as an administrator
Click Apply
C264/EN IN/D30 Installation
Step Action
1
Check the starting by a click on PACiS CGAT application shortcut on the Windows
desktop.
2 For the first startup, a list of network adapters is displayed (see Note)
Choose network adapter
Click "Select this adapter"
Step Action
8. DOWNLOADING DATABASE
MiCOM C264 requires a database to operate. It stores up to two databases, named “current”
and “stand-by”. Only the current database is used for operation. The second database can
be downloaded when the computer is in operational or maintenance mode. A specific control
allows switching between the two stored databases.
PACiS SCE (System Configuration Editor) is used to generate the databases. SMT (System
Management Tool) or CAT (Computer Administration Tool) is used to download and switch
the databases.
The use of SMT or CAT depends on the number of computers. For several computers on the
same Ethernet network, it is recommended to use SMT in order to insure database
coherency between computers.
8.1 Database download with CAT
8.1.1 Loading DB under CAT
First action is to copy the .zip database issued from SCE on your PC.
8.1.2 Download DB onto C264
On the CAT application:
Click the “Select a Data base version” button, choose the bd.x.xx.zip file
corresponding to the database you want to use and click on “OK”; as a result, the .adb
files in the archive are transferred in the folder <installation folder>/computer/cat/db
In the “Choose your Download” list, choose the “Database Only” item; this
opens a dialog box where you choose one “.adb” file of your computer and click on
“OK”
When it is done, click on “Switch data bases” button; the MiCOM C264 computer
restarts on the database you have downloaded. It starts in operational mode.
Remark: On standalone C264 application (C264 not associated to any other
PACiS IEC61850 equipment), the source database (MPC file) can be
stored on the CPU270 (up to 20MB file size); this will be possible by
selecting “DATABASE + MPC, on the download list box:
NOTE: Do not put your archive on the desktop nor in the MyDocuments
folder (the path must no include blanks).
Installation C264/EN IN/D30
IRIG B connection
Printer
10.1 External master clock connection
With the option of the CPU board, an external standard BNC connection is used to receive
external master clock synchronisation. The recommended external master clock is the hopf
6870 radio clock.
Installation should follow the standard rules of BNC cable installation including length limit
and optional 50 ohms termination.
For installation of the external master clock, refer to its documentation and to the summary in
PACiS system/EN IN chapter.
External IRIG B synchronisation should be configured in the computer database.
10.2 Printer installation
A printer can be installed permanently for the SOE, or temporally for
commissioning/maintenance use. Data labelling is defined with PACiS SCE.
The printer should be connected to either port 1, 2, 3 or port 4 of the computer.
If the port is on the BIU board, the board has to be configured for RS232 by using the correct
jumper configuration.
Furthermore, a configuration file (included in database) has to be installed onto the computer
with the printer communication parameters.
Settings C264/EN ST/D30
MiCOM C264/C264C
SETTINGS
Settings C264/EN ST/D30
CONTENTS
Tree panel is accessible from bay panels by selecting the following key:
All data points are grouped into features and folders. To access a given feature the operator
should navigate the panels using the arrow keys. The folders hierarchy is displayed in each
panel.
go up to father folder
At the bottom of the hierarchy, the folder is the single point of information, control or
parameter. Edit mode allows the operator to change values.
Enter into Edit mode. It then asks to enter the system engineer password.
Available Values or
MENU TREE Parameter signification
[min;max](step)(unit)
- THRES PRES LINE [0.5;1.1](0.01)(V) Multiplier of nominal
voltage above which the
line is LIVE.
- THRES ABS LINE [0.1;0.6](0.01)(V) Multiplier of nominal
voltage below which the
line is DEAD.
- THRES PRES BUS [0.5;1.1](0.01)(V) Multiplier of nominal
voltage above which the
bus is LIVE.
- THRES ABS BUS [0.1;0.6](0.01)(V) Multiplier of nominal
voltage below which the
bus is DEAD.
- DELTA VOLT LOCK [0.02;0.5](0.01)(V) Voltage difference
between bus and line
above which locking
close is not possible.
- DELTA FREQ LOCK [0;1](0.01)(hz) Frequency difference
between bus and line
above which locking
close is not possible.
- DELTA PHASE LOCK [0;30](1)(deg) Phase difference
between bus and line
above which locking
close is not possible.
- FMIN LOCK [45;65](0.01)(hz) Minimum acceptable
frequency for locking
close.
- FMAX LOCK [45;65](0.01)(hz) Maximum acceptable
frequency for locking
close.
- DELTA VOLT COUPL [0.02;0.5](0.01)(V) Voltage difference
between bus and line
above which coupling
close is not possible.
- DELTA FREQ COUPL [0;1](0.01)(hz) Frequency difference
between bus and line
above which coupling
close is not possible.
- DELTA PHASE COUPL [0;30](1)(deg) Phase difference
between bus and line
above which coupling
close is not possible.
- FMIN COUPL [45;65](0.01)(hz) Minimum acceptable
frequency for coupling
close.
- FMAX COUPL [45;65](0.01)(hz) Maximum acceptable
frequency for coupling
close.
Settings C264/EN ST/D30
Available Values or
MENU TREE Parameter signification
[min;max](step)(unit)
- REAC TIME [0; 1000](10)(ms) Circuit breaker close
time in order to
anticipate the close
order for the coupling.
- ABS V CONF TIME [200;10000](20)(ms) Time after which the line
and the bus are
considered dead.
- ONLY V CONF TIME [200;10000](20)(ms) Time after which only
one voltage among the
line or the bus is
considered live.
- PRES V CONF TIME [200;10000](20)(ms) Time after which the line
and the bus are
considered live.
- CLOSE TO MAN SYN [200;10000](20)(ms) Time waited for having
locking conditions.
- CLOSE TO MAN SY C [1; 3600](20)(s) Time waited for having
coupling conditions.
- CLOSE TO MANUAL [200;10000](20)(ms) Time waited for having
dead-dead or dead-live
conditions.
- CLOSE TO AUTO [200;10000](20)(ms) Time waited for closing
conditions in case of
auto-recloser control.
- MAN SYN CLO COUPL YES, NO Flag to permit or not the
coupling for a “close with
synchrccheck” operator
control.
- MAN SYN CLO LCK YES, NO Flag to permit or not the
locking for a “close with
synchrccheck” operator
control.
- MAN SYN CLO LDBL YES, NO Flag to permit or not a
control with a dead line
and a live bus for a
“close with
synchrocheck” operator
control.
- MAN SYN CLO LLBD YES, NO Flag to permit or not a
control with a live line
and a dead bus for a
“close with
synchrocheck” operator
control.
- MAN SYN CLO LDBD YES, NO Flag to permit or not a
control with a dead line
and a dead bus. for a
“close with
synchrocheck” operator
control.
C264/EN ST/D30 Settings
Available Values or
MENU TREE Parameter signification
[min;max](step)(unit)
- MAN CLO LCK YES, NO Flag to permit or not the
locking for a “normal
close” operator control.
- MAN CLO LDBL YES, NO Flag to permit or not a
control with a dead line
and a live bus for a
“normal close” operator
control.
- MAN CLO LLBD YES, NO Flag to permit or not a
control with a live line
and a dead bus for a
“normal close” operator
control.
- MAN CLO LDBD YES, NO Flag to permit or not a
control with a dead line
and a dead bus. for a
“normal close” operator
control.
- AUTO CLO LCK YES, NO Flag to permit or not the
locking in case of auto-
recloser control.
- AUTO CLO LDBL YES, NO Flag to permit or not a
control with a dead line
and a live bus in case of
auto-recloser control.
- AUTO CLO LLBD YES, NO Flag to permit or not a
control with a live line
and a dead bus in case
of auto-recloser control.
- AUTO CLO LDBD YES, NO Flag to permit or not a
control with a dead line
and a dead bus. in case
of auto-recloser control.
AR
Circuit breaker name
- FIRST CYCLE MONO [100;5000](10)(ms) Time between the first
protection trip and the
Circuit Breaker close
order for a 1 phase trip.
- FIRST CYCLE TRI [100;60000](10)(ms) Time between the first
protection trip and the
Circuit Breaker close
order for a 3 phases trip.
Settings C264/EN ST/D30
Available Values or
MENU TREE Parameter signification
[min;max](step)(unit)
- SECOND CYCLE [1000;3600000](1000)(ms Time between the
) second protection trip
and the Circuit Breaker
close order.
- THIRD CYCLE [1000;3600000](1000)(ms Time between the third
) protection trip and the
Circuit Breaker close
order.
- FOURTH CYCLE [1000;3600000](1000)(ms Time between the fourth
) protection trip and the
Circuit Breaker close
order.
- RECLAIM TIME [1000;600000](1000)(ms) Time during which the
Circuit Breaker must
remain closed to
consider that the reclose
has succeeded.
- UNLOCK TIME [1000;600000](1000)(ms) Time during which the
Circuit Breaker must
remain closed after a
manual close or reinit
message in the lock
state to consider that the
unlocked has
succeeded
- MAN CLOSE TIME [1000;600000](1000)(ms) Time during which the
Circuit Breaker must
remain closed after a
manual close in clear
state to consider that the
closure has succeeded
and to avoid locking
definitively in case of
trip.
- 1PH TRIP SCHEME 0 to 4 Indicates how to use the
autorecloser with 1
phase trip:
0: AR_NOT_USED
1: AR_1P
2: AR_1P3P
3: AR_1P3P3P
4: AR_1P3P3P3P
- 3PH TRIP SCHEME 0 to 4 Indicates how to use the
autorecloser with 3
phases trip:
0: AR_NOT_USED,
1: AR_3P,
2: AR_3P3P,
3: AR_3P3P3P,
4: AR_3P3P3P3P
C264/EN ST/D30 Settings
Available Values or
MENU TREE Parameter signification
[min;max](step)(unit)
DEVICE
short name 1
…
short name N
- TIME OPEN [0;1000](1)(ms) Time duration for the
open contact.
- TIME CLOSE [0;1000](1)(ms) Time duration for the
close contact.
BI
Bi 1
…
Bi N
- MOTION00 FILT [0;600](100)(ms) Time of non
complementarity filtering
in the state 00: only use
for double digital input.
- MOTION11 FILT [0;600](100)(ms) Time of non
complementarity filtering
in the state 11: only use
for double digital input.
- PERS OPEN FILT [0;1200](100)(ms) Time of persistence
filtering in the state
Open or 0
- PERS CLOSE FILT [0;1200](100)(ms) Time of persistence
filtering in the state
Close or 1
- TOGGLING OPTION YES, NO Flag to validate or inhibit
the The toggling option.
MV
Mv 1
…
Mv N
- HYSTERESIS [1;50](1)(%) % of hysteresis applied
on thresholds.
- DEADBAND [1;50](1)(%) % of variation within the
Analogue Input is not
transmitted.
- THRESHOLD 1 [Min;Max](0.01)(XXX) Low low low threshold
(Lowest threshold of the
analogue input)
- THRESHOLD 2 [Min;Max](0.01)(XXX) Low low threshold
- THRESHOLD 3 [Min;Max](0.01)(XXX) Low threshold
- THRESHOLD 4 [Min;Max](0.01)(XXX) High threshold
- THRESHOLD 5 [Min;Max](0.01)(XXX) High high threshold
Settings C264/EN ST/D30
Available Values or
MENU TREE Parameter signification
[min;max](step)(unit)
- THRESHOLD 6 [Min;Max](0.01)(XXX) High high high threshold
(highest threshold of the
analogue input)
COMM. PORT
Com 1
…
Com 4
- BAUDRATE baudrate * Baudrate of the
communication port
among:
50,100,200,300,600,120
0,2400,4800,9600,1920
0,38400, 56000.
- NB STOP BIT 1, 2 Number of stop bits
- NB BIT PER CHAR 7, 8 Number of bits per
character
- PARITY odd, even, none Parity
HMI
MAIN
- EXIT MT TIME [5;300](1)(s) Time after which the
Menu tree is
automatically left if there
is no pressed button.
- BACK LIGHT DELAY [5;300](1)(s) Time after which the
back light disappears if
there is no pressed
button.
- SELECT EXIT TIME [5;300](1)(s) Maximum time between
selection and execution
orders.
- BYPASS DELAY [20;120](1)(s) Time after which a
bypass is automatically
deselected.
BAY
Bay 0
…
Bay N
- SBMC DISPLAY YES, NO Flag to validate or inhibit
the display of the SBMC
mode
- DISPLAY DEV NAME YES, NO Flag to validate or inhibit
the display of the Name
od Devices in the Bay
Panel.
C264/EN ST/D30 Settings
4. MiCOM S1 (MS1)
It describes the Settings -or on-line- parameters, which can be modified in runtime on
MiCOM C264 computers. Micom S1 application provides the facility to online view and edit
the parameters of C264.
The setting for the C264 parameters will be performed using a file transfer mechanism. The
setting is allowed only if the C264 is in Operational mode. In case of C264 redundancy, the
setting can be performed only on the Active computer (to avoid discrepancy between both
computers parameters, a manual load of settings is to be realised on the backup C264).
PC minimum configuration:
A CD-ROM drive
Operating System: Windows Seven Pro SP1 or Windows XP SP2 or SP3 32bits
SBus agency
WinPcap 4
Antivirus Avira Antivir Professional Version 9.0 or later (that is recommended for
PERMA A2.15 architecture).
Install the CAT software. Go to Program -> Pacis -> Computer ->MicomS1 and click
settings.
At MiCOM S1 launch, the application requests the Microsoft security center to check that the
antivirus is present and up-to-date. If antivirus is not present or not up-to-date, MiCOM S1
can still be launched, but the user is warned that antivirus is not present or outdated.
Go to Program -> Pacis -> Computer -> FTPD and click wftpd32.
AUTOMAT.CONTROL
Synchrocheck
AVR
Auto-recloser bay 1
Auto-recloser bay N
ISaGRAF Automatism 1
…
ISaGRAF Automatism N
PSL Automatism 1
…
PSL Automatism M
The description of each parameter can be seen in below figure.
Built in functions like ISaGRAF, PSL automatism, AVR and Auto-Recloser are configured in
SCE. Only parameters of configured functions are visible and editable in MiCOM S1.
It is possible to set the following functions:
Two kinds of parameters in FBD: The timeout used for (Ton / Toff) and the parameter
(Boolean) validation
The file .set can be found in the Settings folder of the database (.zip).
C264/EN ST/D30 Settings
Schneider Electric
The MiCOM S1 application indicates that a file .VAL is available. The “VAL” file is transferred
via FTP. C264 is the FTP client. An FTP server is mandatory on the MiCOM S1 host PC.
MiCOM S1 application transfers “VAL” file to a computer defined by its IP address. Computer
checks the coherency of this file and acknowledges it positively or negatively.
MiCOM S1 uploads values to C264 using the function “Set Settings”
.val .val
The transfer operation needs MiCOM S1 and CAT applications. The CAT transfers the settings file.
A Export settings file with MiCOM S1 The settings file (.set) is open with MiCOM S1 and
parameters are updated. Parameters are exported
to generate settings file (.val).
B Computer connection with CAT Start CAT and establish the computer connection
C Transfer settings file with CAT Transfer settings file with CAT
Settings C264/EN ST/D30
Step Action
1 Export settings file (.val) with MiCOM S1:
Select Convert > Set Settings (.set => .val)
After generation, press OK
Step Action
1 Check CAT Software of the current C264 computer release is already installed on PC:
From the Windows start menu folder “PACiS”, find CAT software
WARNING
UNEXPECTED SYSTEM BEHAVIOR
Ensure that the targeted MiCOM C264 selected by user to upload its
settings file, is the right device.
Step Action
1 Select « Edit settings » function (1)
Select the settings file (.val) generated by MiCOM S1 (2)
Click “Send this settings file” button (3)
Numbers of fast cycle for earth fault min = 0 , max = 1 step = 1 cycle step
Numbers of slow cycle for earth fault min = 0 , max = 2 , step = 1 cycle step
Numbers of fast cycle for phase fault min = 0 , max = 1 , step = 1 cycle step
Numbers of slow cycle for phase fault min = 0, max = 2, step = 1 cycle step
Reclaim time fast cycle, min = 10000 , max = 15000 , step = 1000
Reclaim time slow cycle, min = 3000 , max = 10000 , step = 1000
Reclaim time manual close , min = 10000, max = 20000 , step =1000
Timer cycle slow1 earth , min = 10000, max = 30000 , step =1000
Timer cycle slow2 earth , min = 10000, max = 30000 , step =1000
Timer cycle slow1 phase , min = 10000 , max = 30000 , step =1000
Timer cycle slow2 phase , min = 10000 , max = 30000 , step =1000
C264/EN ST/D30 Settings
To view the range allowed for each parameter, refer to the chapter AP.
C264/EN ST/D30 Settings
nd
2 period triphased time min = 1000, max = 3600000, step = 10
3rd period triphased time min = 1000, max = 3600000, step = 1000
TIMINGS
Parameters T1 : Presence deltas test duration : min = 200, max =10000 ,step = 20
Parameters T2 : Presence test duration : min = 200, max =10000 ,step = 20
Parameters T3 : absence deltas test duration : min = 200, max =10000 ,step = 20
Parameters Ta : close time of circuit breaker : min = 0, max = 1000,step = 10
Close with synchro scheme delay : min = 1, max =3600 , step = 1
C264/EN ST/D30 Settings
THRESHOLDS
Line voltage over threshold: min= 0, max = 100,step = 1
Line voltage under threshold: min= 0, max = 100,step = 1
Bus voltage overthreshold: min= 0, max = 100,step = 1
Bus voltage underthreshold: min= 0, max = 100,step = 1
Voltage delta threshold for locking: min= 0, max = 100,step = 1
Minimum frequency for locking: min= 45.5, max = 59.5,step = 0.1
Maximum frequency for locking: min= 50.5, max = 66, step = 0.1
Frequency delta threshold for locking: min= 0.02, max = 0.1,step = 0.01
Phase delta threshold for locking: min= 0, max = 90,step = 1
.val .val
The transfer operation needs both MiCOM S1 and CAT applications. The CAT is used to transfer
settings file.
A Computer connection with CAT Start CAT and establish the computer connection
B Transfer settings file with CAT Transfer settings file (.val) with CAT
C Import settings file with MiCOM S1 Settings file (.val) is imported with MiCOM S1
C264/EN ST/D30 Settings
Step Action
1 Check CAT Software of the current C264 computer release is already installed on PC:
From the Windows start menu folder “PACiS”, find CAT software
B. Transfer settings file with CAT from MiCOM C264, follow instructions:
Step Action
1 Select « Edit settings » function (1)
Select the location for the settings file (.val) (2)
Click “Receive settings file” button (3)
Step Action
1 Import settings file (.val) with MiCOM S1:
MiCOM C264/C264C
COMMUNICATION
Communication C264/EN CT/D30
CONTENTS
3. INTER-RACK COMMUNICATION 6
3.1 Overview 6
3.2 Main1-Main2 communication 6
3.3 Main-Extension communication 6
4. SCADA COMMUNICATION 7
4.1 Overview 7
4.2 SCADA common functionality 7
4.2.1 Interface to SCADA 7
4.2.2 BCU 8
4.2.3 RTU standalone 8
4.2.4 Behaviour and specific treatments 9
4.2.5 Data sent to SCADA 11
4.2.6 Data sent to MiCOM C264 12
4.3 Slave DNP3 profile (serial or over IP) 13
4.4 Slave IEC 60870-5-101 profile 13
4.5 Slave IEC 60870-5-104 Server profile 13
4.6 Slave Modbus (MODICON) profile 13
4.7 HNZ (Yemen) communication 14
4.7.1 Finality 14
4.7.2 Data sent to SCADA 14
4.7.3 Data sent to computer 17
4.7.4 Synchronisation 18
4.7.5 Transmission 19
4.7.6 Structures of frames 21
4.7.7 Detailled list of messages of application 22
4.7.8 Sequence of dialogue 27
4.7.9 Summary of function code messages 31
4.7.10 Configuration 31
4.7.11 Cable 31
4.8 HNZ (Elenas) communication 32
4.8.1 Functional specifications 32
C264/EN CT/D30 Communication
5. IED COMMUNICATION 65
5.1 Overview 65
5.2 IED Common functionality 65
5.2.1 Interface to IEDs 65
5.2.2 Behaviour 66
5.2.3 Data received from IEDs 70
5.2.4 Data sent to IEDs 70
5.2.5 Tunnelling 71
5.2.6 Limits and specifications 73
5.3 MODBUS communication 74
5.3.1 Scope of this section 74
5.3.2 Generic MODBUS Communication 74
5.3.3 Schneider Electric MODBUS COMMUNICATION 77
5.3.4 IED SPECIFIC MODBUS 108
5.4 DNP 3.0 Communication 113
5.4.1 Scope of this section 113
5.4.2 Interface to IEDs 113
5.4.3 Behaviour 114
5.4.4 Data received from IEDs 115
5.4.5 Data sent to IEDs 115
5.4.6 Master DNP3.0 Profile 115
5.4.7 DNP.3 Level 3 Implementation Table 116
5.5 IEC 60870-5-103 Communication 122
5.5.1 Scope of this section 122
5.5.2 Interface to IEDs 122
5.5.3 Behaviour 123
5.5.4 Data received from IEDs 124
5.5.5 Data sent to IEDs 126
5.6 IEC 60870-5-101 Communication 128
5.6.1 Purpose 128
5.6.2 Master IEC 60870-5-101 profile 128
Communication C264/EN CT/D30
2. SCP COMMUNICATION
2.1 Communication on Station bus
2.1.1 Finality
This item describes IEC61850-8-1 implementation inside MiCOM C264.
2.1.2 Inputs
2.1.2.1 Information: MiCOM C264 application SCP
The type of information that can be transmitted are:
Counters
Controls
Control acknowledgements
MiCOM C264 information (Init. report, Operating mode, control mode, Date)
2.1.2.2 Information SCP MiCOM C264 application
The type of information that can be transmitted are:
Counters
Controls
Control acknowledgements
Database downloading
2.1.3 Supported services
Services supported by the IEC61850 agency integrated in the MiCOM C264 are listed in the
ACSI service conformance statement defined in Table A.3 of document
MiCOM C264/C264P PICS.
Communication C264/EN CT/D30
Client Server
Common Class Comment
support support
Status
SPS Single input status YES YES
DPS Double input status YES YES
INS Integer input status YES YES
ACT Protection activation information YES YES
ACD Directional protection activation YES YES
information
Measurements
MV Measurement value YES YES
CMV Complex measurement value YES YES
WYE 3 phase + N measurement YES YES
DELTA Phase to phase measurement YES YES
Counters
BCR Binary counter YES YES
Control
SPC Single point control YES YES
DPC Double control output YES YES
BSC Binary step control YES YES
APC Analogue output YES YES
INC Integer control output YES YES
ISC Integer step control output YES YES
Description
LPL Logical node name plate YES YES
DPL Device name plate YES YES
Report Control Block
URCB Unbuffered report control block YES YES
BRCB Buffered report control block NO YES
C264/EN CT/D30 Communication
3. INTER-RACK COMMUNICATION
3.1 Overview
A C264 is used as a main rack connected to a cluster of C264 extensions over an Ethernet
IEC61850 network.
Tunnelling is not possible in this architecture, and connecting IEDs directly on any C264
either.
No CT/VT connected on extensions.
A similar branch can be installed for redundancy purpose. In this case, no AOU board is
allowed.
4. SCADA COMMUNICATION
4.1 Overview
This Chapter describes protocols implementation inside C264 for communication via
Telecontrol network.
SCADA System is connected to a C264 through networks using various Slave protocols:
Four (4) different SCADA protocols can run simultaneously. Four (4) on Ethernet and
two (2) on Serial. Each protocol has an independant configuration and may have
same data.
In T104 protocol, from the SCADA side, up to four (4) ports can be defined,
corresponding to one active port and three backup ports. IP addresses are configured
for each T104 client. Each T104 protocol can manage up to four (4) clients
simultaneously.
In DNP3 over IP protocol is supported over two (2) Ethernet ports. Each DNP3
protocol can manage one (1) client only. All DNP3 on IP features are the same than
DNP3 serial features.
Redundancy (C264 only):
The C264 RTU standalone redundancy (link and protocol) is supported by T101
protocol only. So the redundancy is not available for other protocols (DNP3, MODBUS,
T104, HNZ) and all protocols with the C264 BCU.
Common features to all SCADA communication and all protocols are specified below.
Specific features to each protocol are specified in subsequent paragraphs.
4.2 SCADA common functionality
4.2.1 Interface to SCADA
This paragraph describes the exchange of data between the “SCADA communication”
function and the Master SCADA. It includes two sub-paragraphs:
4.2.2 BCU
4.2.2.1 Input
4.2.2.2 Output
NOTE: The “Reboot Computer” function is restricted and only accessible after
the “database download”.
Communication C264/EN CT/D30
4.2.3.2 Output
At a given time, only one SCADA can send controls to the substation (the one which
has the control).
Reset the “Taking Control Binary input” of the SCADA which had previously the
control
Set the “Taking Control Binary input” of the SCADA which asks the control
If the take control command is set for a SCADA, MiCOM C264 should refuse all commands
from other SCADAs.
4.2.4.7 SBMC mode
This mode is used to test a substation while it is in Remote mode. As this mode is a test
mode, MiCOM C264 won’t send all changes of state to SCADA.
When bay turns to SBMC mode, MiCOM C264 will send to SCADA all concerned data
(configured Bay Based in the SCE) at specific states defined in the SCE for the management
of SBMC.
For those data, change of state won’t be transmitted, but will be memorised by MiCOM C264
while the Bay is in SBMC mode.
When the Bay returns to Non SBMC mode, MiCOM C264 will send the current state of any
data that has changed whilst the Bay has been in SBMC mode.
4.2.4.8 Redundancy
Serial links can be configured as redundant. In this case, SCADA can send requests on both
serial links: “main link “or “redundant link”.
MiCOM C264 always responds on the link used by SCADA for requesting the slave
4.2.4.9 Automatic synchrocheck
SCADA can send control to synchronised circuit breakers with a facility to bypass the
synchrocheck.
Communication C264/EN CT/D30
The percentage of filling from which the MiCOM C264 will try to transmit the SOE
file
C264/EN CT/D30 Communication
When the SOE is full, the oldest Event is deleted and the new one is added
Once a SOE file has been successfully up-loaded, all Event sent are deleted from
SOE
4.2.5.7 Synchronisation status
MiCOM C264 can inform the controlling station about its synchronisation status.
According to the protocol, this may be done by a specific message or by a binary input.
4.2.6 Data sent to MiCOM C264
SCADA can send data to MiCOM C264. The type of data is described in subsequent
paragraphs.
4.2.6.1 Digital Controls or setpoints
A control is transmitted to the handling of control sequences function.
At the end of the control sequence an acknowledgement is sent to SCADA if protocol allows
it.
4.2.6.2 Counter commands
The commands allowed on counters are:
The adaptations brought to the software of the RTU C264 to include transmission HNZ
“Yemen” allowing to connect the RTU C264 to Centre SCC “SANA’A” as a Master-
Slave mode via a Concentrator (FEC)
4.7.2.1.2 Messages
Message treated in the Concentrating direction (Centre) towards RTU:
4.7.2.5.2 Resolution
The RM of the RTU are received by the Protocol on float 32 bits for the ARM and integer 32
bits for the DRM. The protocol applies a conversion of the computed value to acquired value
on signed integer 16 bits. An adaptation for the transmission is done by extension of the sign
for the values acquired on 12 bits and by truncation of the lower bits for the values acquired
on 16 bits.
Truncation is done with round up/down the approximate value.
When a RM is invalid, the bit of invalidity and the bit of sign are positioned to «1», the
transmitted value is fixed at $7FF.
4.7.2.5.3 Frequency of acquisition and transmission
RM can be transmitted periodically towards the higher level, each RM can be affected in
database to a cycle among four possible.
As the message of cyclic transmission of RM contents two contiguous entities, a certain
constraint on the level of the choice of the cycle, number and addresses of transmission will
be necessary to apply at the time of the realization of the database.
At the time of a request for RS Overall Check, the RTU C264 will return towards the centre
the whole of RM having an address of transmission, in the form of RM message cyclic, that
these ones are declared cyclic or not in database. This choice is necessary for the update of
RM, at level of the centre, following the sending of a message «loss information» .
4.7.2.5.4 Messages
RM are transmitted « periodically or on variation » to the Control Centre
The messages treated in the direction Concentrator (Control Centre ) towards RTU are:
Not message
In direction RTU towards Concentrator (Control Centre ), we have:
4.7.3.2 Setpoints
4.7.3.2.1 Addressing in transmission
The SP can be classified in two types:
Analogue SP
Digital SP
There is no specific zone of addressing for the two types of SP.
These dispositions will have to be respected by the operator having charges the typing of the
databases of C264 “YEMEN. ”
By analogy with the RTU S80 and for reasons of identification of the frames, the field of
addressing in transmission of a Set Point is represented by an address contained on 5 bits in
a byte.
The maximun number of SP is 32.
4.7.3.2.2 Catch of activity
The concept of catch of activity by the centre does not exist in the transmission S80 YEMEN.
To get around it, S900 generates an internal catch of activity automatically when it receives a
message of Set Point.
4.7.3.2.3 Bay / Substation Dependence
The concept of bay and substation does not appear in the specification for S80 YEMEN. In
C264 it is possible to decide SP by SP if they are dependent or not on the bay and the
substation.
When the substation or the bay is local mode, the dependent Set Points, sent from the
centre, are refused.
4.7.3.2.4 Messages
The messages treated in the direction Concentrator (Control Centre) towards RTU are:
4.7.4.2 Modulo
The RTU C264 does not send periodically a change of modulo 10 mn.
The modulo 10mn is sent before a change of state if this is not in same that the last
transmitted modulo 10mn
4.7.4.3 Messages
The messages treated in the direction Concentrator (Control Centre) towards RTU are used
to date the RS, the messages of changes of state RS are dated with only the number of
10ms top inside the last transmitted modulo.
The messages treated in the direction Concentrator (Control Centre) towards RTU are:
direction Centre (FEC) towards RTU bit positioned to «1» at the time of sending of
message of the type SARM, RR, RES, or of applicative information. In the other cases
it is to «0 ».
direction RTU towards Centre (FEC) positioned bit with «1» at the time of sending
of the message of the type UA. In all the other cases it is to «0».
Bits 2 to 7 contain the address of the RTU in transmission limited from 0 to 63.
4.7.5.3 Length of frame
The length of the frame is variable because it is possible to make concatenation of
information.
The number of characters of the frame is calculated on totality of the frame from the field
«address» to the field «checksum». Its value should not exceed 40 characters .
4.7.5.4 Field «control » in the frame.
This field is in conformity with the standard HNZ (HNZ 66-S-15) except in the use of «the bit
P/F» which in the two directions of transmission is to «0» except when there is a repetition.
4.7.5.5 Byte of checksum
This field is in conformity with the standard HNZ (HNZ 66-S-15).
C264/EN CT/D30 Communication
NOTE: CTS wired and CD wired are forced if “delimitation of the frames” is
Data Carrier Detect in two directions
4.7.5.8 Dimensioning
A pool of buffers is reserved for the system of transmission. The number of buffers available
is sufficient to ensure the management of all queues of the system.
Queues for sending can store 200 changes of RS before saturation, the dimensioning of
these queues is carried out dynamically, at the time of the initialization of the RTU, according
to the maximal length of frames defined in the database.
4.7.5.9 Concatenation of the messages
If the parameter «concatened message» defined in database in the level of «information
networks: station» was validated, the transmitted messages can be grouped until not to
exceed the maximum length of the frame.
4.7.5.10 Characteristics of the messages of information
By analogy with RTU ECP80, when the Centre or the Concentrator FEC sends frames of the
«Information type » , there is no response from the RTU C264 (neither ES nor RR).
The dialogue resumes only following one request for end of session «RES» which the RTU
answers end of session «ES». That seems to be related to the judicious choice of the values
of temporization defined to the FEC.
In addition the RTU never sends message of the type « RR» but always «ES». The
acknowledgements of the received frame from the FEC are done only on sending of frame of
information.
Communication C264/EN CT/D30
7 0
Transmission Address 1 1 Field Address
RTU
Frame I I: Information NR P NS 0
DM: connection 0 0 0 F 1 1 1 1
Unnumbered
frames SNRM: connection 1 0 0 P 0 0 1 1
DISC: disconnection 0 1 0 P 0 0 1 1
UA: Unnumbered 0 1 1 F 0 0 1 1
Acknowledgement
RES: Request to end of 1 0 0 P 0 1 1 1
session
ES: End of session 0 1 0 P 0 1 1 1
CMDR: refusal of 0 0 1 F 1 1 1 1
command
C264/EN CT/D30 Communication
4.7.6.2 Protocol
The protocol is of the type Master–Slave. The centre is a Master of the connection, the RTU
makes only answer the interrogations of the Centre. If the Centre stops the polling of the
RTU, no alarm is generated. Only the loss of information could be sent in the form of an
indication of defect, with the resume of the polling and if the internal file of events is
saturated.
Transmission HNZ YEMEN is not designed to function in doubled lines.
4.7.7 Detailled list of messages of application
4.7.7.1 RQ-RS-OC: Request for RS Overall Check - origin: Centre
7 0
Function code FC : $ 13
The value T=0 relates to all the other requests other than for the RTU
7 0
Function code FC : $ 16
7 0
Function code FC : $ 0B
When a change of hour appends on C264, all information are flushed from the Chronology
fifo and are sent with the bit HV set to 1 (invalid hour possible)
If an information is received with a timestamp newer than the current time plus the depth of
the Chronology fifo, the bit HV is set to 1 to prevent the SCADA that this information did not
be inserted in the Chronology fifo because it is too newer
If an information is received with a timestamp older than the current time minus the depth of
the Chronology fifo, the bit C is set to 1 to prevent the SCADA that this information did not be
inserted in the Chronology fifo because it is too older
The bits HV,C and Sy are transmitted without treatment by the FEC to the SCADA
7 0
Function code FC : $ 02
7 0
Function code FC : $ 05
7 0
Function code FC : $ 19
7 0
Function code FC : $ 09
7 0
FC : $ 1A
Function code
7 0
Function code FC : $ 0A
7 0
Function code FC : $ 1C
7 0
Function code FC : $ 7F
NU NU : Not used
(high byte)
HS : Modulus of time of start
modulus modulus
=> Value : $0…….$EA5F
(low byte)
or 60000 tops 10 mS
HS
null byte => Value : 0
nul byte
M10M Modulus 10 minutes
=> Value : $0 …… $8F
M10M or 144 moduli day
(high byte)
TCT : time compensation
TCT Time compensation in transmission
in transmission
(low byte) => Value : $0…….$FFFF
or 65536 tops 10 ms
C0377ENa
NOTE: Attention for the messages related to the hour the high byte are in the
first place.
The time compensation in transmission corresponds to the delta of time that puts to forward
a message between the Concentrator (Control Centre) and the RTU S900 or reciprocally.
This compensation is calculated by the Concentrator (Control Centre) following an exchange
«RQ-SET-HOUR» and «RE-SET-HOUR» following calculation below:
TCT = [ (HR - HS) –(TTRTU) ] / 2
TCT: Time compensation in transmission
HR: Hour of reception of the message of answer RE-SET-HOUR
HS: Hour of emission of the message of request RQ-SET-HOUR
TTRTU: Time of transit to the RTU (see following paragraph )
Communication C264/EN CT/D30
7 0
Function code FC : $ 7E
NU NU : Not used
(high byte)
HS : Modulus of time of start
modulus modulus
=> Value : $0…….$EA5F
(low byte)
or 60000 tops 10 mS
HS null byte => Value : 0
null byte
M10M Modulus 10 minutes
=> Value : $0 …… $8F
M10M
or 144 moduluss day
(high byte)
TCT : time compensation
TCT Time compensation in transmission
in transmission
(low byte) => Value : $0…….$FFFF
or 65536 tops 10 ms
(high byte)
TTRTU Time of Transit in RTU TTRTU : Time of transit in RTU
=> Value : $0…….$FFFF
(low byte) or 65536 tops 10 ms
C0378ENa
The time of transit to RTU (TTRTU) corresponds to the delta of time between the reception
of the message of request RQ-SET-HOUR and the emission of its answer RE-RE-HOUR.
7 0
Function code FC : $ 0F
RTU
CENTRE
SARM
SARM
UA
SARM
Connection HNZ
UA
ES
ROS
RR Acknowledgement
ES End of session
C0380ENa
The sequence of connection of the protocol is represented above followed with a change of
state RS .
Communication C264/EN CT/D30
CENTRE RTU
ROS
Start and end of session without
ES information
ROS
Start and end of session with
RQ-SET-DATE setting of the date
ES
Waiting for repetition time-delay
or end of session
RES
ES Request and end of session
ROS
Open of session with setting of
RQ-SET-TIME time to calculate the
ES compensation
ROS
RQ-SET-TIME Start of session with response
of setting time
RR Acknowledgement and end of
Session
ES
ROS
RQ-SET-TIME
Identical sequence for setting
time with compensated time
RR
ES
ROS
ES
C0381ENa
C264/EN CT/D30 Communication
CENTRE RTU
ROS
Start of session with request of
RQ-RS-OC overall check
ES
ROS
RS-OC
RR
RS-OC Responses to overall check
RR
RS-OC
ROS
CY-RM
RR Send cyclic RM
CY-RM
ROS
ES Interrogation at start of session
ROS
ROS
RM-CV Send of change of value of RM
C0382ENa
Communication C264/EN CT/D30
Origin: Centre
4.7.10 Configuration
Refer to chapter AP
4.7.11 Cable
A specific cable must be used for HNZ Yemen Protocol:
101 1 1 101
102 7 5 5 7 102
103 2 3 2 3 104
104 3 2 3 2 103
109 8 1 7 4 105
8 5 106
105 4 7 1 8 109
106 5 8
C264/EN CT/D30 Communication
When invalid SRSs are embedded in GC responses, the following scheme is implemented:
If a SRS byte contains an invalid RS when constructing the SRS GC message (fc 16 h), the
construction process stops, and the message, without the byte, is buffered in the transmit
queue. An INV SRS GC message (17 h) is then constructed and issued. It contains all
invalid SRSs found in the GC block sent by the application program to the code conversion
layer. Normal SRS GC transmission resumes after this byte.
Also, as SRS and DRS addresses are clearly separated in BD, SRS and DRS states are
contained in different messages.
Communication C264/EN CT/D30
Address 03
When one or more DOU couplers fail, the RC function continues with the couplers that
remain valid.
When one or more AIU couplers fail, the RM function continues with the couplers that
remain valid.
When one or more DIU couplers fail, the RS function continues with the couplers that
remain valid.
When one or more AOU couplers fail, the SP function continues with the couplers that
remain valid.
4.8.1.2.1.4 Database Constraints
4.8.1.2.1.4.1 External RSs
To meet EPC 3200 requirements, DRSs must be specified in reverse state in the RTU
database.
4.8.1.2.1.4.2 Internal RSs
ISs sent to ELENAS derive from the C264 fault. The corresponding fault conditions must be
made transferable.
Note: ISs are automatically created in the ELENAS database and labeled identically to those
of the EPC 3200 RTUs. You must always observe this consistency when generating the
database of the C264 RTU.
C264/EN CT/D30 Communication
The operating mode of individual RMs(fc 01 h) is determined by the value of the op-mode
byte:
Upon RTU reset, the transmission of all RMs is disabled until the end-of-RM-GC message is
issued.
Mode 0 of EPC 3200 is made functional by marking the relevant RMs as cyclical in the
RTU’s DB.
Communication C264/EN CT/D30
4.8.1.2.2.4 RM Snapshot
The function is not supported in S900 so it ‘s also not supported in C264.
4.8.1.2.2.5 Supported Messages
The table below lists the RM messages handled:
* When the message is not handled, the RTU returns a Request Reject message (22 h).
4.8.1.2.2.6 Database Constraints
The Prioritized RMs concept does not exist in C264, no cyclical RMs are allowed for HNZ
Elenas.
4.8.1.2.3 Processing Remote Controls
4.8.1.2.3.1 Control Activity
The concept of Control Activity captured by the MS is not supported by the ELENAS HNZ
transmission. As a result, C264 automatically and internally generates an activity capture
upon receipt of a RC message.
4.8.1.2.3.2 Bay/Station Dependency
The Bay/Station concept exists . In C264, you can determine whether individual RCs depend
on the associated bay and station.
When the station or bay is under local control, all station/bay-dependent RCs originating
from the MS are rejected.
C264/EN CT/D30 Communication
The table below shows how the S900 acknowledgements are sent back to the MS.
The table below shows how the S900 acknowledgements are sent back to the MS.
* This message is spontaneously sent by the RTU to signal the RCT transition to invalid.
4.8.1.2.6.5 Database Constraints
In order for the EPC 3200 to operate identically to the C264, complete the fields below as
follows:
Clear counter at the end of cumulative period True
Cumulative period storage capacity 12
Cumulative period 10 minutes
4.8.1.2.7 Processing Tap Changer Positions
4.8.1.2.7.1 Coding inputs
In C264, TPs can be 1 of N-, decimal-, or BCD-coded ….
An offset can be added.It is defined in the Data base.
4.8.1.2.7.2 Supported messages
The table below lists the TP messages handled:
The time processing function of the application performs the time setting with Tcur + Delta
and requests the transmission of a response with Delta.
The base rack then distributes timing to all of the expansion racks.
Remember, the C264 is synchronized only after 2 consecutive times setting with the delta
time between the time in second time setting and the current time C264 less than 200 ms.
The C264 remains synchronized during maximum 30 mn without receive time setting.
The Date concept does not exist in ELENAS HNZ. The date, however, is required for the
local RTU operation (i.e. for date/time-stamping logs, reports, etc.). Consequently, the
operator console and the MS will be able to set the RTU time, but the local operator can only
set the date and time if the MS is not accessible (transmission fault).
4.8.1.2.9.2 Database Constraints
Anyone
4.8.1.2.10 Sending Modulo Message
The Modulo message (fc 0F h) is not sent to the MS every 10 minutes, but sent before each
message sending an information with the time within a new modulo.
4.8.1.2.11 Identifying RTU
The ID Request (fc 20 h) is processed by the RTU which returns a RTU ID response (20 h)
specifying the RCP number and DB revision.
The RTU ID message is spontaneously sent after the RTU reset.
4.8.1.2.12 Resetting RTU Remotely
The RTU Reset request (fc 21 h) from the RTU causes a complete RTU reset, with no
response expected. It is like a computer faulty with cause “from the SCADA protocole”
4.8.1.2.13 Rejecting Request
The Request Reject message (fc 22 h) is returned by the RTU upon receipt of a wrong
message from the MS
4.8.1.2.14 Requesting Initiation General Check
When receiving an Initiation General Check Request (fc 13 h, code 00 h), C264 returns the
following sequence of messages:
If during a GC sequence the transmission queue are full, the RTU transmits the End of RS
(and RM) GC for the interrupted GC.
C264/EN CT/D30 Communication
4.8.1.2.15 Transmission
4.8.1.2.15.1 Queue and buffer size
A buffer pool is dedicated to the transmission system.
The number of available buffer is design to assume the all system queue number.
200 RS status change can be queued before saturating in the transmission queues.
At the RTU initialization, the queues sizing is dinamicaly done, depending on the frame
length defined in the DB.
4.8.1.2.15.2 Queue saturation processing
When a transmission queue is full, it is cleared and an Info Loss message is queued.
If a GC sequence is interrupted, the end of GC messages are sent before the Info Loss
message.
4.8.1.2.15.3 Transmission queue initialization
The transmission and protocol queue are cleared after a link initialization procedure (SNRM -
UA messages exchange).
4.8.2 Data Specifications
4.8.2.1 Scope
The purpose of this chapter is to describe the relationship between S9R and ELENAS’s
transmission addressing schemes.
4.8.2.2 Data Description
Remote Signalings, Remote Controls, and Internal Signalings
In ELENAS, RSs, RCs, and ISs are identified by a byte number (Byte #), and a bit position in
the byte (in the range of 0-7), which is always specified in the same way. The byte number,
however, is determined by the entity processed:
In the S9R database, the description of the ELENAS HNZ transmission addresses is a two-
step procedure. First, each entity type is given a fixed base address, then each entity in the
type, also known as occurrence, is assigned a relative address. The absolute address of an
entity results from the following equation:
Absolute address = Base address + Relative address
The default base addresses for each entity type are listed below:
RS_base_add 176 (B0 h)
RC_base_add 112 (70 h)
IS_base_add 2
RM_base_add 32 (20 h)
SP_base_add 4
TP_base_add 160 (A0 h)
RCT_base_add 100 (64 h)
4.8.2.3 Identifying Remote Signalings in ELENAS and S9R
4.8.2.3.1 Single RSs
In S9R, SRSs are assigned transmission addresses in the range of 0-4096 decimal.
The ELENAS address (Byte #, Bit Position) is converted into the S900 address (X) using the
following equation:
X = (Byte # - RS_base_add) x 08 h + Bit Position + 10 h
The SRS address range used for ELENAS in S9R will therefore be of 16-655. SRS
addresses are shifted 16 bit positions (10 h) to avoid overlapping IS addresses. Note that ISs
and RSs hare the same address space.
The table below shows the ELENAS-to-S900 address conversion for the first and last SRSs.
It corresponds to the RS default base addresses. S9R addresses are entered by the
operator via GBD 900.
NOTE: As shown above, the first ELENAS address within the RS space is B0
hex, 00, and the corresponding DRS address in GBD 900 is 800
decimal. This does not mean that the first DRS must start at this
address, but from this address. Since a typical configuration usually
combine SRSs and DRSs having the same address space (i.e. B0-FF
h), make sure you insert at least one byte between the two blocks
when generating the DB in order to avoid SRS/DRS overlap.
Communication C264/EN CT/D30
NO
00
0
02 ISs 16
ISs
03
04
ASPs
SRs
655
1C 700
1F
DRs
20
ARMs
63 939
64
RCTs
6F
70 0
RCc
SPs
A0
23
TPs
AF
B0
RMs
67
RSs RCTs
11
0
SRCs 95
100
DRCs
147
FF 0
TPs
3
C0383ENa
C264/EN CT/D30 Communication
When the MS communicates with the RTU through a dual line, the MS request is
always received by the RTU on only one of the two lines, and the RTU always
responds to the MS over this single line.
The CRC generation is slightly different from the standard C264 HNZ procedure. The
CRC field contains the address, control byte, data block, and ETX character. Both the
transparent DLE character in the data and the DLE ETX sequence are processed by
the CRC.
DLE
Only the first two bytes are ignored in the CRC generation.
Communication C264/EN CT/D30
4.8.3.3.3.3 Messaging
Refer to section 4.8.5 Detailed Messages List for the description of the messaging
From CC to RTU, information I frame includes:
P = 1, I = 0
DLE = $ 10
STX = $ 02
ETX = $ 83
In the address, control and information fields the transparency is made by repeating the
character when it is the same as the control character DLE: the maximum length of the
frame depends of the values of the 3-field characters.
The information field contains one or more message, each one identified by its function
code. The number of information-bearing characters of a message can be constant for a
given function code, or variable.
data’s
Time of day.
7 0
7 0
7 0
DRS byte
V3 S3 V2 S2 V1 S1 V0 S0 S0-S3 = Status*
V0-V3 = Status*
* Same as RS-SC
Section 3.10.5.1
block #n
C0387ENa
Field Description:
The validity of SRSs is not transmitted in RS-GC; invalid SRSs are transmitted in INV-SRS-
GC (see Section 3.10.5.3).
Nb of blocks depends on the frame length.
NOTE: Unused bits are zeroed.
Communication C264/EN CT/D30
7 0
7 0
7 0
Value
8 unsigned bits:
00 hex => Value => FF hex
8 signed bits:
80 hex => Value => 7F hex
C0391ENa
NOTE: Value is scaled by the C264 following the min and max values of the
Setpoint configured in the database
4.8.5.7 ASP-ACK: ASP Acknowledgement - Source: RTU
7 0
Value
Same as ASP-RS, Section 3.6
ACK ACK: ASP acknowledge code
01 = positive
02 = wrong message
04 = invalid function (e.g. coupler fault)
C0392ENa
Communication C264/EN CT/D30
7 0
Code Request:
00 hex = see "Field description"
01 hex = RS-GC
C0393ENa
Field Description:
Initialization GC code: 00 hex
Upon receipt of a GC-RQ command, the RTU shall return:
RS general checks;
Routine message (18 hex) with code 0C hex indicating the end of RS GCs (see
Section 3.9);
RM general checks;
TP general checks;
Routine message (18 hex) with code 0E hex indicating the end of RM GCs (see
Section 3.9).
4.8.5.9 ROUT: Routine Message - Source: RTU
7 0
Code Information:
05 hex = Information loss
06 hex = End of chronology loss
07 hex = Start of chronology loss
0C hex = End of RS general checks
0E hex = End of RM general checks
C0394ENa
Field Description:
For C264 Nb of blocks is always equal to 1 because the RM is configured in event and is
received one by one from the C264 Scada interface
C264/EN CT/D30 Communication
7 0
Function code 02 hex
C0396ENa
Field Description:
Nb of blocks depends on the frame length.
NOTE: Upon completion of RM general check transmission, the RTU issues a
routine message with code 0E hex (refer back to Section 3.10.5.9).
4.8.5.12 RMA-OM: Operating Mode of All RMs - Source: MS
7 0
Function code 01 hex
Field Description:
Mode 00 hex = Unused;
FF hex = All RMs are disabled;
01 hex = End of disabling; RMs operate in state change mode;
02-FE hex = Unused.
7 0
Function code 01 hex
7 0
Function code 04 hex
7 0
Function code 05 hex
C0400ENa
7 0
Function code 04 hex
Modulus
I 0 b21
block #n
Newest value
C0401ENa
7 0
Function code 03 hex
C0402ENa
7 0
Function code 0D hex
The value + V bit give the transmitted value in à 2’s complement code. It inlcudes the offset,
substracted to the acquired value. For example: TPI with value between 1 to 64, an offset
configured with 32, the values sent into the message will be between E1 hex to 20 hex (-31
to 32)
4.8.5.19 TP-GC: TP General Check - Source: RTU
7 0
Function code 3D hex
See "Field
Number of TPs
Description" below
Transmission address of TP #1 A0-AF hex
block #1 Same as TP-SC
V Value
Section 3.18
Field Description:
Nb of TPs depends on the frame length.
NOTE: There is no special Request for TP general checks message. TP-GC
is one of the RTU responses upon receipt of a GC-RQ command from
the Master (refer back to Section 3.8).
4.8.5.20 MODULO: Change Time Modulo - Source: RTU
7 0
Function code 0F hex
Field Description:
MODULO is issued:
7 0
Function code 1D hex
7 0
Function code 1D hex
Field Description:
Modulo/Fraction time is the difference called ‘delta’ between the time received from the
Master and the current time in the RTU.
S specifies the delta sign as follows:
0 = The RTU internal time is greater than or equal to the time from the Master;
1 = The RTU internal time is less than the time from the Master.
4.8.5.23 ID-RQ: Identification Request - Source: MS
7 0
Function code 20 hex
C0407ENa
Communication C264/EN CT/D30
7 0
Function code 20 hex
b7 RTU ID b0
See "Field
b7 b6 b0 Description" below
Version number
C0408ENa
Field Description:
RTU ID is numRcp (number of the remote control protocol for the C264) as defined in the
Databases. It is a 9-bit value, where the ninth bit b7 is the MSB of the version number.
Version number is a 7-bit value specifying the database revision level, as defined in
Database.
4.8.5.25 RTU-INI: Remote RTU Initialization - Source: MS
7 0
Function code 21 hex
C0409ENa
NOTE: Upon receipt of a RTU-INI command, the RTU shall fully reset. There
is no RTU response.
This message builds a send_soft_signal with code COMM_INF_REBOOT_BY_SCADA
which will be recorded in the error log file read by the CAT error folder.
4.8.5.26 REQ-REJ: Request Reject - Source: RTU
7 0
Function code 22 hex
Function code is
Rejected code
unknown
C0410ENa
C264/EN CT/D30 Communication
MASTER RTU
SNRM
HNZ connection
UA
GC-RQ
STIME
RTU-ID
RS-GC*
RM-GC*
TP-GC*
STIME-R
C0411ENa
The number of GC messages per entity may differ depending on the RTU configuration.
Communication C264/EN CT/D30
Source: MS
4.8.8 Cable
A specific cable must be used for HNZ Elenas Protocol:
The communication function between a Remote Terminal Unit RTU and the Control Centre
CC is performed by data exchange through one link.
101 1 1 101
102 7 5 5 7 102
103 2 3 2 3 104
104 3 2 3 2 103
109 8 1 7 4 105
8 5 106
105 4 7 1 8 109
106 5 8
107 6 6 4 20 108
108 20 4 6 6 107
Communication C264/EN CT/D30
5. IED COMMUNICATION
5.1 Overview
Different types of IEDs are connected to a MiCOM C264 through networks using various
legacy protocols:
1. IEC 60870-5-103 (T103)
2. Modbus
3. DNP3
4. IEC 60870-5-101 (T101)
All these networks use a serial link to communicate with IEDs. The DNP3 protocol can in
addition use the Ethernet/IP network. As there are several links on a MiCOM C264, it is
possible to have:
Request / reply
Master emits a request to a slave of its choice and wait for the response. Between
master and slave, only one transaction can be initiated. Then, in order to transmit the
same request to two different slaves, two transactions are required.
Broadcast
Master transmits a command to all of slaves connected to the network. They perform it
without send any response.
Common features to all IEDs and all protocols are specified hereafter.
Specific features to each protocol are specified in subsequent paragraphs.
5.2 IED Common functionality
5.2.1 Interface to IEDs
5.2.1.1 Input
Data Note
Digital input Treated
Measurement Treated
Default position Depending on the protocol
Counter Treated
Tap position Treated
Control acknowledgement Treated
Setpoint acknowledgement Treated
Alarm Not Treated
Disturbance record Depending on the protocol
Tunnelling Frame response Depending on the protocol
C264/EN CT/D30 Communication
5.2.1.2 Output
Data Note
Control Treated
Setpoint Depending on the protocol
Alarm acknowledgement Not Treated
Tunnelling Frame question Depending on the protocol
Time synchronisation Treated
5.2.2 Behaviour
5.2.2.1 Network supervision
The number of networks and IEDs is known by configuration.
Each network is managed independently of the other networks.
The management of a network consists of:
Repetitions [if an IED doesn’t answer to a request, this request will be repeated the
next cycle]
When an IED is disconnected, it may be questioned only time to time [not all cycles]
When an IED has important data to transmit [DI], it may be questioned successively
several times
Time synchronisation
Synchronisation is done periodically by sending a broadcast frame. After the
synchronisation frame has been sent, the polling starts again.
NOT_INITIALISED: That’s the initial state of an IED. The MiCOM C264 polls the IED
every cycle in order to connect it.
If the IED responds, it becomes CONNECTED 2 .
If after some attempts the IED doesn’t respond, it becomes DISCONNECTED 1 .
DISCONNECTED: The IED is disconnected. The MiCOM C264 polls the IED time to
time in order to connect it.
If the IED responds, it becomes CONNECTED 2 .
C264/EN CT/D30 Communication
CONNECTED: The IED is connected. This state includes several states. When an IED
becomes Connected, it goes to the NOT_SYNCHRONISED state.
OUT_OF_SERVICE: The IED is connected and says it is Out of service. The MiCOM
C264 polls the IED time to time waiting for the IED to become IN_SERVICE 5 .
IN_SERVICE: The IED is connected and it says it is In Service. This state includes
several states. When an IED becomes In Service, it goes to the GI state.
NORMAL: The IED is In Service and the monitoring of DI, AO and DO are performed.
If a disturbance record becomes present and the MiCOM C264 have enough places to
store the file, the IED goes in the DISTURBANCE state 8 .
If a request to open a tunnel for the IED arrives, it is accepted and the IED goes in the
TUNNELING state 10 .
Time to Time, a GI may be done. In this case the IED goes in the GI state 7 .
5 : see 3
8 : A disturbance file is available in the IED and there are enough places to store it in
the MiCOM C264.
A disturbance uploading is activated.
Communication C264/EN CT/D30
at initialisation time
upon reconnection
Cyclically [optional]
Messages received during the initial general interrogation are not sent to the processing
function. Instead the content of the table is sent at the end of the sequence.
Messages received during a general interrogation performed after the initialisation sequence
are sent immediately to the processing function
Some IEDs send a message indicating the end of the response to a general interrogation.
When this message is received, the sequence is considered as finished. If the IED does not
send this message, the MiCOM C264 must check that all data are received.
If all data are not received within a given time another request is sent. This process can be
repeated N times. If the response is still not received after N times a fault message is sent,
however the IED is still polled.
Disturbance File Management
The following rules apply for the management of the Disturbance Files of the IED:
For each IED, there is an information in the configuration indicating if automatic upload
of Disturbance File has to be done. This indication may be overwritten by a command
from the application.
When the MiCOM C264 detects that an IED has a Disturbance File ready to be
uploaded and that automatic upload is enabled, it uploads and stores it. When the
upload is finished, an indication is sent to the Upper transmission management to
inform it that a Disturbance file is ready.
When there isn’t enough places to store a Disturbance File, the oldest file is deleted.
The upper transmission management can only get Disturbance files stored in the
MiCOM C264. Once the upper transmission management has treated a file it is
deleted.
C264/EN CT/D30 Communication
The Double command is referenced only once in the IED Mapping. In this case, if an
OPEN (respectively CLOSE) command is received from the application, the master
send an OFF (respectively ON) order to the IED at the corresponding address.
The double command is referenced by two addresses in the IED Mapping: one refers
to the Open Contact and the other to the Close Contact. In this case, if an OPEN
(respectively CLOSE) command is received from the application, the master sends an
ON order to the IED, at the address corresponding to the Open Contact (respectively
Close Contact).
5.2.4.2 Setpoints
SP controls are priority message. The polling sequence must be interrupted in order to send
the SP control as soon as possible.
Not all IEDs send SP control acknowledgement. If they do not, an acknowledgement is
simulated and sent to the handling of SP control sequences function.
When an IED is disconnected [or out of service] a negative acknowledgement is sent.
If the SP commands are always "direct execute" command (no “select before operate”).
For an IED, only one SP command is possible at a time.
5.2.5 Tunnelling
The serial tunnelling enable to connect a lap top computer – which run an IED setting
software – to a serial (RS232) line of the PACiS computer in order to communicate with an
IED connected to a legacy bus of the PACiS computer.
All serial RS232 lines of the computer – including the port onto the front panel – can be used
for serial tunnelling.
The choice of the serial line to be used for serial tunnelling is done by the computer
configuration.
The cable dedicated to tunnelling must be disconnected from the front panel when
tunnelling is not used.
5.2.5.1 Interface through the tunnelling serial line
The tunnelling serial line gives access to a user dialog.
This dialog enables an user to give commands to the Tunnelling RS232 software.
Commands are ASCII string terminated by ‘’ (code ASCII 13H) and are case sensitive.
A command is executed at the reception of the ‘’ character. An ASCII message is sent in
response, and a prompt message may be sent in order to indicate the computer is ready to
treat a new command.
If a command is unknown, an error message “Unknown command !” is sent.
C264/EN CT/D30 Communication
TunRSIed nl: List the IED of a legacy line and their state [ln = line number].
The first line of the response gives information on the line :
Line <line Number> : <Protocol>
Each following line of the response corresponds to an IED and have the following format :
IED <Address> : <State>
Where <State> can be “available” or “not available”
If the line isn’t available for Tunnelling, the response is “The line nl is not available for serial
tunnelling.”
TunRSStart ln, ad: Start a serial tunnelling session with the specified legacy line
[ln = legacy line number; ad = IED address].
The response is either “Serial Tunnelling started” or an error message explaining why the
command can’t be executed.
If the response is “Serial Tunnelling started”, legacy frames are awaited on the serial
Tunnelling link.
Execute settings actions with the setting Software (that implies exchange of legacy
frames between the setting software and the IED through the computer)
If the questioned IED does not answer, no frame of answer is returned to the setting
Software.
If the setting software sends a new question frame [or repeats the last frame] whereas
the computer is still awaiting the answer from the IED, this new frame is ignored.
5.2.5.6 Serial tunnelling through a modem
If modems are well configured, this operating mode is transparent for the computer and no
specific management is needed in the software.
5.2.5.7 Tunnelling limits and specifications
The legacy protocols supported – protocols for which serial tunnelling is available – include:
MODBUS
T103
The line to be used for serial tunnelling can be set through computer configuration.
If the serial tunnelling line is “frontal RS232”, it is automatically configured to:
19200 Bd, 8 bits data, no parity, 1 stop bit.
For the other ports (COM1 to COM4), it follows the configuration parameters.
Only RS232 mode is supported.
5.2.6 Limits and specifications
The number of serial links available limits the number of legacy network that can be
managed simultaneously by a MiCOM C264.
The maximum number of IED that can be managed for a network is 16.
Specifications depend on the used protocol and on the number of IEDs connected to
each network.
C264/EN CT/D30 Communication
Specific for one relay: M230, Rish Pro M10, ABB-Flexgate, Sepam 40 and 80, WAGO
5.3.2 Generic MODBUS Communication
The generic communication is the common base to most of the IEDs. The following
MODBUS functions are implemented in MiCOM C264:
Function
Sub-code Used to Details
No.
1–2 / Read DIs Read N bits
3–4 / Read AIs /DIs Read N words
5 / Write DO Write 1 bit
15 / Write DOs Write N bits
Restriction: write DOs after one
another
7 / Poll status Read status byte
Used to detect a DI change of state
8 0 Poll presence Echo
Alternative to detect if a device is
connected or not
6 / tunnelling if Write 1 word
needed
16 / tunnelling if Write N words
needed
The disturbance files are not treated. The function 7 cannot be used fully or at all with a
number of IEDs (e.g.Rish Pro M10, Flexgate); they require a specific treatment.
5.3.2.1 Polling and connection test
All the slaves are polled after one another. This means that C264 waits for the answer to
each polling request sent to a device before sending a new request to the same or another
device.
There are 2 types of polling:
the polling for the measurements and the digital inputs (functions 1 thru 4) or the byte
status (function 7)
If an IED does not correctly answer after a user-configurable timeout, C264 repeats the request.
If the IED does not correctly answer after a defined number of retries, it is considered as
disconnected. This status is updated by low-frequency polling.
Depending on configuration, C264 tests the connections with:
function 7
5.3.2.2.2 DIs
A block of DIs is a set of DIs mapped at consecutive addresses. As a result, all of them are
read in one exchange.
By default, the function 1-2 polls for DI blocks. C264 compares each DI state with the latest
state and time stamps the potential change of state.
C264/EN CT/D30 Communication
Each device on a MODBUS network must have the same synchronisation mode.
5.3.3 Schneider Electric MODBUS COMMUNICATION
Three ranges comply with the Schneider Electric rules:
If a bit of this status has no significance for the equipment, this bit is fixed to 0.
Any change of state generates an event. Except for b2 set/reset, b4 and b5 reset, b6 and b7
set/reset.
* Indicates a device failure («SRAM Failure»…) and generates an event.
** 0 indicates that synchronisation was not received or not understood since 1 min,
according to protection criteria (by MODBUS or IRIG-B synchronism). This rule covers
potential drift of 10 ms of non synchronised device. “Loss of synchronisation” has a
major impact in all events treatment. All the events coming from a device that has lost its
synchronisation need special treatment in substation chronological list of events. This
particular event helps determine also any network disconnection in the device history.
5.3.3.1.1 Events buffer management
The IEDs store the events, Fault Records, Disturbance files in a circular buffer of various
sizes.
When C264 acknowledges an event, a FREC or Disturbance file, the IED clears the memory
for future events, FREC …
When all events, FREC, DR have been cleared from buffer, the corresponding bit is reset in
the status byte without generating any event.
If a device is disconnected, the buffering function saves all of history. If one of its buffers gets
filled up then the IED:
sends a saturation reset event when the buffer is not full any more.
replaces the oldest data in the full buffer by the newest ones (event, FREC,
Disturbance file).
Communication C264/EN CT/D30
5.3.3.1.2 M300
The bits have other meanings:
Bit
Value/bit mask Meaning Conform
No
0 0x0001 Presence Status (1 = present / 0 = mute) OK
Minor Self Test Failure (1 = Failure / 0 = No
1 0x0002 OK
failure)
New event available
2 0x0004 OK
(1 = Available / 0 = Not Available)
Clock synchronization (=1 after Modbus sync.
Resets to 0 after 5 minutes unless it is
3 0x0008 OK
synced again. Other time sources do not
affect this bit)
New auto extraction disturbance record
4 0x0010 available OK
(1 = Available / 0 = Not available)
5 0x0020 Fault (Not used - always 0). NOK
6 0x0040 Trip LED status (1 = LED on, 0 = LED off) -
Alarm status summary
7 0x0080 -
(logical OR of all alarm status bits)
8 0x0100 Unused -
9 0x0200 Unused -
10 0x0400 Unused -
11 0x0800 Unused -
12 0x1000 Unused -
13 0x2000 Unused -
14 0x4000 Unused -
15 0x8000 Unused -
Even if the access function (3 or 4 instead of 7) does not comply with the internal MODBUS
rules, the events can still be managed, as far as the bits 2 and 3 are compliant with them.
Communication C264/EN CT/D30
Bytes order
Intel products 1 2 3 4
Motorola products 4 3 2 1
Most common (2 consecutive addresses) 2 1 4 3
Recommended transmission with MODBUS 4 3 2 1
The units of the readings must be identical throughout a range of products. If possible stick
to the list of the recommended units. The format for encoding IEEE makes unit coding easy,
as it makes possible to treat at system level the large or small values without using derived
units (example: tenths of Amperes, tens of Volts, MW).
Description Units
Volts V
Amperes A
Kilowatt kW
Kilo Volt Ampere kVA
Kilo VAR kVAR
Kilo Watt . Hour kWh
Kilo Volt Ampere Hour kVAh
Kilo VAR Hour kVARh
Hertz Hz
Celsius or centigrade Degree °C
Mho 1/
Ohms
Seconds of closing time s
Degree of angle Angular degree
Without unit –
C264/EN CT/D30 Communication
For all the quality descriptors used for the measurements or counters, split quality descriptor
indication (like CP8(i+1) Info + Quality from IEC 870-5-4) from the value in separate address
groups.
Some IEDs encode Valid/Invalid quality statuses with binary values. For such IED, map the
AI Statuses in consecutive words.
5.3.3.2.2 M300
The measurements are periodically polled for. The available formats include:
Scalin
Meas. C264 type g Address Formats
factor
Va UINT32_HW_HB 0.001 0x01C6 T39 (=T11 for the secondary mode)
Vb UINT32_HW_HB 0.001 0x01C8 T39 (=T11 for the secondary mode)
Vc UINT32_HW_HB 0.001 0x01CA T39 (=T11 for the secondary mode)
Uab UINT32_HW_HB 0.001 0x01CC T39 (=T11 for the secondary mode)
Ubc UINT32_HW_HB 0.001 0x01CE T39 (=T11 for the secondary mode)
Uca UINT32_HW_HB 0.001 0x01D0 T39 (=T11 for the secondary mode)
Ia UINT32_HW_HB 0.0001 0x01D2 T40 (=T12 for the secondary mode,
mistaken as T11 in the manual
R8605C2)
Ib UINT32_HW_HB 0.0001 0x01D4 T40 (=T12 for the secondary mode,
mistaken as T11 in the manual
R8605C2)
Ic UINT32_HW_HB 0.0001 0x01D6 T40 (=T12 for the secondary mode,
mistaken as T11 in the manual
R8605C2)
Communication C264/EN CT/D30
Scalin
Meas. C264 type g Address Formats
factor
In UINT32_HW_HB 0.0001 0x01D8 T40 (=T12 for the secondary mode,
mistaken as T11 in the manual
R8605C2)
Freq. UINT32_HW_HB 0.001 0x01DA T11
Power UINT32_HW_HB 0.0001 T21 (=T12 for the secondary mode,
mistaken as T11 in the manual
R8605C2)
Energie UINT32_HW_HB 0.001 T20 (=T11 for the secondary mode)
s
The addresses 0x01DB, 0x01DC, 0x01DE and 0x01DF generate an exception frame with
code number 2.
5.3.3.2.3 MiCOM Px2 series and Px4 series
Measurements are read through the Modbus functions 3 or 4 (read word functions). Select
the correct format for the measurement: 16 or 32 bits.
Notice that the lower word of 32 bit values is generally transmitted first and, in each word,
the higher byte is transmitted first (use formats such as YYYY32_LW_HB for 32 bit values).
A transient DI is in fact an event not associated to a real state but to a transition (e.g. Trip
order). It is only SET never RESET. The practice shows that state approach is more
commonly used than the transition approach and help know the global status at connection.
For this purpose, a transient DI like the trip order is held for a configurable time (300ms), and
results in 2 events (set and reset). The IED translates an inner transient DI to a pulsed
indication over the network (with a configurable time e.g. 100 to 300ms).
M300 read request
The time-stamped events of the M300 are NOT treated (there is no indication on the state of
synchronisation of the M300). In consequence, the C264 acquires the DIs of the M300 by
polling and time stamps them.
The DIs are read through the Modbus function 4 (read words) with the values that follow:
BI0:
Extra address 1: 0
Extra address 2: 4
Extra address 3: /
BI1:
Extra address 1: 1
Extra address 2: 4
Extra address 3: /
1
BI16:
Extra address 2: 4
Extra address 3: /
BI17:
Extra address 1: 1
Extra address 2: 4
Extra address 3: /
BI23:
Extra address 2: 4
Communication C264/EN CT/D30
Extra address 3: /
BI0:
Extra address 2: 4
Extra address 3: /
BI1:
Extra address 1: 1
Extra address 2: 4
Extra address 3: /
BI15:
Extra address 2: 4
Extra address 3: /
To read bit fields in 32-bit values, configure at least one BI in each part of the long value
(lower word and higher word) as described in the previous example.
MiCOM Px2 series and Px4 series read request
C264 acquires the DIs through the function Nr 3 or 4 (read word functions).
conventional disturbance
the file, C264 sends the “Ack.DO” and the device can erase its disturbance file. If another
“disturbance file” is still present, the bit b4 remains set (e.g. EPAC multi disturbance upload).
The date in disturbance file must be the same as in events (for trip indication…). The device
is compliant with:
TRIP-storage disturb
Prepare Block
Poll Index
First disturbance acknowledge => read index
Disturb READED => get index, time, no error
CHECK VALIDITY
5.3.3.2.5.1 M300
There are 2 types of Disturbance record:
selection
Overall information
Number of analogue Number of TOR
Products channels size
channels channels
number Pages 0x38-
0x3C
P120 No disturbance management
P121 No disturbance management
5 ( IA, IB, IC, I0, 1 (3 Inputs,
P122 6 11 Words
Frequency) 7 Outputs)
5 ( IA, IB, IC, I0, 1 (5 Inputs,
P123 6 11 Words
Frequency) 9 Outputs)
5 ( IA, IB, IC, I0, 1 (5 Inputs,
P124D 6 11 Words
Frequency) 9 Outputs)
P124S No disturbance management
P125 No disturbance management
6 (IA, IB, IC, I0, V, 1 (7 Inputs,
P126 7 19 Words
Frequency) 9 Outputs)
8 (IA, IB, IC, I0, VA, VB, 1 (7 Inputs,
P127 9 19 Words
VC, Frequency) 9 Outputs)
5 (IA, IB, IC, I0, 1 (5 Inputs,
P220 6 11 Words
Frequency) 6 Outputs)
6 (IA, IB, IC, I0, UAC, 1 (6 Inputs,
P225 7 19 Words
Frequency) 6 Outputs)
6 (IA, IB, IC, I0, UAC, 1 (6 Inputs,
P226C 7 19 Words
Frequency) 6 Outputs)
C264/EN CT/D30 Communication
selection
Overall information
Number of analogue Number of TOR
Products channels size
channels channels
number Pages 0x38-
0x3C
2 (5 Inputs,
P521 7 ( IA, IB, IC, I0, timing) 9 Outputs, 9 11 Words
9 internal data)
P920 No disturbance management
P921 No disturbance management
1 (5 Inputs,
P922 5 ( Voltage, Frequency) 6 19 Words
9 Outputs)
1 (5 Inputs,
P923 5 (Voltage, Frequency) 6 19 Words
9 Outputs)
P925 No disturbance management
Modbus
@ Mapping Words Format Description
Function
Pages 0x09 thru 0x21: Disturbance Data. Each page contains the samples [250 data
word] of the selected channel
0x0900 3 250 Up to 250 samples
0x09FA
0x0A00 3 250
INT16 Up to 250 samples
0x0AFA
0x2100 3 250
Up to 250 samples
0x21FA
Page 0x22 : Index of the Disturbance
0x2200 3 1 UINT16 Disturbance record Number
0x2201 4 Time
3 Disturbance record finish date
0x2204 Stamp
1 Disturbance record starting
0x2205 3 UINT16
condition
1 Frequency at post-time
0x2206 3 UINT16
beginning
Communication C264/EN CT/D30
Modbus
@ Mapping Words Format Description
Function
Page 0x3D : Number of disturbance records available
UINT16 Number of disturbance records
0x3D00 3 1
[1 .. 5]
Pages 0x38 thru 0x3C: Selection of the Disturbance and channel [Each page correspond to
one out of the 5 Disturbance records]. The second header line is the number of words
uploaded for each access reading:
C264/EN CT/D30 Communication
P122/P123/
@map Modbus Words P124D/P220 P126 P127 P225/P226C P521 P922/P923
-ping function number
11 words 19 words 11 words 19 words
Pages 0x38 thru 0x3C: selection of the Disturbance and channel [Each page correspond to 1
of the 5 Disturbance record]
0x..00 3 1 Ia Ia Ia Ia Ia Ua
0x..01 3 1 Ib Ib Ib Ib Ib Ub
0x..02 3 1 Ic Ic Ic Ic Ic Uc
0x..03 3 1 Io Io Io Io Io Vo
0x..04 3 1 Frequency reserved Ua Frequency Timing Frequency
0x..05 3 1 TOR reserved Ub TOR TOR1 TOR
0x..06 3 1 Uo Uc/Uo Uac TOR2
0x..07 3 1 unavailable frequency frequency unavailable unavailable unavailable
0x..08 3 1 TOR TOR
Communication C264/EN CT/D30
For each register read request, the following information is uploaded. This information
describes the selected channel:
P122/P123/ P225 /
Word P126 P127 P521 P922/P923
P124D/P220 P226C
0 Total samples number
1 Sample number in pre-time
2 Sample number in post-time
3 Primary phase CT ratio
4 Secondary phase CT ratio
5 Earth primary CT ratio
6 Earth secondary CT Ratio
7 Phase internal CT ratio
8 Earth internal CT Ratio
Last page Last Primary phase VT
9 Reserved Primary phase VT Ratio [LB]
Number page nb Ratio [LB]
Last page word Last pg Primary phaseVT
10 Reserved Primary phaseVT Ratio [HB]
number word nb Ratio [HB]
Secondary phase
11 Reserved Secondary phase VT ratio
VT ratio
Earth primary VT ratio Earth primary VT
12 Reserved
[LB] ratio [LB]
Earth primary VT ratio Earth primary VT
13 Reserved
[HB] Un- ratio [HB]
available
Earth secondary
14 Earth secondary VT ratio Reserved
unavailable VT ratio
Internal VT ratio–
15 Internal VT ratio – numerator 100
num. 100
Internal VT Ratio –
16 Internal VT Ratio – denominator
denom.
17 Last page Number Last page Number
Last page words
18 Last page words number
number
Specific treatments
P126: the channels are not consecutive; the 5th & 6th channels must be skipped.
P127: the mapping address 0x0127 must be read. It gives the voltage wiring of the IED. This
value must be written in the file (but it doesn’t change the uploading process).
P922 &P923: the mapping address 0x0126 must be read. It gives the voltage wiring of the
IED. This value must be written in the file. This value changes the uploading process: in
some cases, the channels must be skipped.
C264/EN CT/D30 Communication
5.3.3.2.6 Events
An event is a time-stamped change of state of a logical data.
When the IED gets connected, C264 reads the current status of logical information, then
manages the status changes from the file of the time-stamped events.
The time-stamped events are gathered in one file. The bit b2 of the status indicates the
presence of at least one event not extracted. Events are stored by IED, and are read one by
one by the master, starting from the oldest event.
C264 reading of one event does not withdraw it from the file. An IED withdraws an event
from its list:
when the file of the events gets saturated (the queue sheds the oldest event)
directly after C264 reading if automatic event retrieval is set on IED. The event can be
read again at address @event +1 (3601h if the latest event address is 3600h). Event
reply is 0 if the events list is empty.
Communication C264/EN CT/D30
C264 reads one event, and then sends “DO ok“ if it correctly receives the event. When
receiving this acknowledgement, the IED deletes its latest event, and updates its
events list (and resets the event bit in status word if applicable: refer to IED
documentation). This makes sure that no event is lost. DO acknowledgement is bit 13
(0400h).
IED and C264 are configured for automatic event retrieval (at start-up C264 checks
the bit b12 at 0400h). C264 reads the latest event.
The IED shifts this event to the next address in the event list. If C264 detects a
transmission error, it reads again the event at address +1.
Any event includes the information that follows:
Date - Time, using inverse order as per IEC 870-5-4 CP56T2a format (no short format,
no CP16, same format as clock synchronisation).
New state value of the transmitted data (new value of the word, stored at the
MODBUS mapping address).
C264 extracts the events meant for upper functions and sends them to the corresponding
service: automation, alarms, textual message converter, event & logging printing….).
Note: all textual information associated to events are not needed by a system master as
customers have their own labels, wording, or writing (Cyrillic, Cantonese …). A separate
device is in charge of textual logging. The text only reduces communication bandwidth.
C264 can manage several changes of state in one event (for changes in same time accuracy
period, to increase transfer…), even if each event has only one change of state. Then, one
change of state is linked to one event and one event is linked to several possible changes of
state (if they are at the same MODBUS address).
MiCOM Px4 series
The command register can be written with Modbus function 6 in register 4x00400 [@ 399].
Each action is activated when a ‘1’ is written to the corresponding bit.
Start
Function 4
@0
Read Status register (3x00001) Timer Nb word 1
Analyse Event Flag (bit 2)
No
Event flag set ?
Yes
Function 6
Select next Event @399
(Write 1 in register 4x00400) Value 1
AnalyseEvent
Analyse the Event
Flag Type
(bit 2)
Yes
Event type = 255 ?
No
Function 6
o
Acknowledge the Event @399
(write 2 in register 4x00400) Value 2
No
0 ≤ Event type ≤ 6
C0446ENa
C264 determines whether the Px4x has any events stored that have not yet been extracted
by reading the Px4x’s status register 3x00001 (G26 data type). If the event bit is set, the
Px4x contains event records that have not yet been extracted.
To select the next event for sequential extraction, C264 writes 1 to the command register
4x00400 (G18 data type). The event data together with any fault/maintenance data can be
read from the registers as specified in the flow chart and table.
Once the data has been read, the event record can be marked as read by writing 2 to
register 4x00400.
Alternatively, since the G18 data type consists of bit fields, it is possible to both marks the
current record as having been read and to automatically select the next unread record by
writing 3 to the register.
When the latest (most recent) record has been accepted, the event flag in the status register
(3x00001) is reset.
If the latest record was accepted by writing 3 to the command register (4x00400), a dummy
record appears in the event record registers, with an “Event Type” value of 255.
Attempting to select another record, when none are available results in a Modbus exception
code 3 – “Invalid value”.
Communication C264/EN CT/D30
Event formats:
According to the Event Type, the Event Index can be used – or not – to analyses the Event.
Two cases have to be considered:
Event of type 0,1,2,3 and 6. In this case, the Event Index can be used.
Bit16 of the Event Index indicates the new Digital Input state (0 or 1)
Bit1-15 of the Event Index [modulo 32] indicate the Bit Number of the Digital Input
in the 32bits register
The 32bits register reference and the Digital Input Bit Number allows finding the
Digital Input in the C264 DB (if configured).
Event of type 4 and 5. In this case, the Event Index is not significant and can't be
used. The C264 DB has to be parsed against the Event Value, looking for a change of
state of all Digital Input of the 32-bit register reference.
C264/EN CT/D30 Communication
The header defines data to transmit and file treatment to trigger by C264 on data reception:
All the data samplings are transmitted after one another without compression.
Algorithm:
TRIP-storage disturb
Answer parameter
Block size =>Get data transmission
Number of blocks parameter
CHECK VALIDITY
Word 7 6 5 4 3 2 1 0 7 6 5 4 3 2 1 0
1 0 0 0 0 0 0 0 0 0 Year: 00…99
2 0 0 0 0 Month: 1...12 DayOfWeek:1..7 DayOfMonth:1..31
3 s 0 0 Hour: 0…23 iv 0 Minutes: 0…59
u
4 Milliseconds (High) Milliseconds (Low)
Su (=0 for Standard, =1 for Summer Time)
iv (=0 for valid, =1 for non valid or out of synchronisation for a system)
First day of the week: Monday
Date and time is set at address 0800h with function 16. No calculation of transmission delay.
If an IED does not have (this) synchronisation, it must be unaware of these synchronisation
messages (no error indication, no failure).
If an IED that does not stick to the rule, C264 supplies out-of-synchronisation devices with its
own time stamp. The time accuracy is deeply degraded.
An IED does not generate any event when receiving the synchronisation, or when missing
one broadcast message.
Synchronisation comes from a specialised clock device like GPS. The first bit is the
reference. C264 transmits time corrected by its treatment delay. It sends a synchronic
message periodically (e.g. 3 times per minutes). The absence of reception within 1 minute
results in a “Loss of synchronisation” event.
A “Loss of synchronisation” event requires a set/reset. Synchronisation information is also
signalled by the IV bit in the event time stamp: 0 means that when the event occurred, the
IED was out of synchronisation.
Any IED with 2 clocks systems (MODBUS synchronization mechanism AND an IRIG B or
other) must have an inner setting to deactivate each clock.
If C264 has lost its own synchronisation, it still time stamps events (but with IV bit set) to still
synchronise the IEDs with a same reference (relative time tagging).
M300
The M300 supports 2 time formats:
The Schneider Electric synchronization format, which is used only to set the Date &
Time
The M300 format which is used to set the Date & Time in the M300 or for time
stamping in the M300 (e.g. Disturbance time stamping)
The synchronisation according to the Modbus Schneider Electric rules is accepted by the
M300 only if the bit “summer” is NOT set.
MiCOM Px2 series
The Px2x support 2 time formats:
the Schneider Electric synchronization format, which is used only to set the Date &
Time in the Px2x
Communication C264/EN CT/D30
the Px2x format which is used for time stamping in the Px2x (e.g. Event & Disturbance
time stamping)
Time stamping format:
Word Description
0 Lower word of Seconds
1 Higher word of Seconds
2 Lower word of MilliSeconds
3 Higher word of MilliSeconds
The number of seconds given in the previous table (32-bit value in word 0 and 1) is the
number of seconds elapsed since 1994 January 1st.
Since the V4C version of the PX2X relays, a private format and the IEC format are both
available. Select the IEC format to obtain a correct event decoding.
Moreover, a PX2X relay goes out of synchronization after a 1 min delay. As a result, select a
synchronization period lesser than 60 seconds.
MiCOM Px4 series
The Px4x support the Schneider Electric format. To keep the Px4x synchronized, C264
sends a synchronization frame at least once every 5 minutes.
It is possible to use both Px2x and Px4x relays on the same communication channel and to
activate the synchronization.
The register 4x00306 is used to configure the time format managed by the relay:
Writing value '0' in this register selects the 'standard IEC' time format (default value).
Writing value '1' in this register selects the 'reverse IEC' time format (Modbus
Schneider Electric time format used by C264).
So, at Px4x connection, value "1" must be written in register @305 [4x00306] to signal the
Px4x to use the Schneider Electric time format.
If the 'Modbus Schneider Electric format' is selected (see above), the time tag format in
events is as show below:
5.3.3.3.2 Commands
Any control sent from C264 to an IED is called a Digital Output:
To simplify Master MODBUS configuration and run time, it is desirable to gather controls at
consecutive addresses.
Communication DOs or controls are transmitted by Modbus writing functions:
Case 1: Switching device may need to be split into synchronised CB and disconnections:
CONTROL * MONITORING
Control Plant State Plant secondary DI
15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
0 0 0 Plant position MOTION
0 0 1 Plant position OPEN
0 1 0 Plant position CLOSE
0 1 1 Error!
1 0 0 Plant
positionINVALID(DBI00)
1 1 1 PlantpositionINVALID(DBI11)
1 0 1 Other INVALID (polarity…)
1 1 0 Reserve other INVALID
0/1 (opt) Plant
inLOCAL/REMOTE
0/1 (opt) Plant LOCKED
(WITHDRAW)
0/1 (opt) DI select in SBO
0/1 (opt) Synchro-check OK
1 Control Fail Abnormal
termination
1 Control Fail mismatch plant
position
1 Control Fail Lock
(pressure…)
1 Control Fail Interlock
1 Control accepted Latch (any
control)
0 0 1 OPEN control
0 1 0 CLOSE control
1 0 0 (opt) CLOSE2 control
(Forced)
1 (opt) SELECT control
* All DOs latched by C264, the front panel cell is reset at the sequence end by IED
C264/EN CT/D30 Communication
CONTROL MONITORING
ControlPlant St Plant secondary DI
15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
0/1 Plant position MOTION / FIXE
0/1 Mini CB OPEN/CLOSE
1 Plant position INVALID
0/1 (opt) AVRegulation ON/OFF
0/1 (opt) Plant LOCKED
x Reserve
1 Low Tap Reach
1 High Tap Reach
1 Control Fail Abnormal
termination
1 Control Fail Lock (oil,..)
1 Control Fail Interlock (unusual)
1 Control accepted Latch (any
control)
0 0 1 Tap RAISE control
0 1 0 Tap CLOSE control
1 0 0 (opt)Regulation ON Control
1 (opt) Regulation OFF Control
* All DOs latched by C264, the front panel cell is reset at the sequence end by IED
Several kinds of control are defined to manage any measurement that can be frozen
(Maintenance counter, metering, or classical measurement). The following “control structure”
byte can be used for each measurement:
CONTROL MONITORING
7 6 5 4 3 2 1 0
0/1 AI Valid/Invalid
0/1 AI not Frozen/Frozen
x Reserve Topical, saturated…
x Reserve
1 Unitary reset
1 Unitary reset & start
1 Unitary restart
1 Unitary freeze
Any IED has kind of alarm management that deeply differs from the one used at system or
SCADA level. An alarm is any indication given to an operator to warn against a non standard
condition, usually by LED indications on IED (2 states ON/OFF), alarm list at upper level
(with 4 states defined by STANDING/RESET, NOT_ACK/ACKNOWLEDGE).
It is asked that IED alarms indication be accessed in one address. A DO can globally
acknowledge/reset alarms (but one alarm is maintained if condition is still present). In the cell
words, a first byte is dedicated to indicating alarm, a byte+8 to resetting each alarm.
Communication C264/EN CT/D30
M300
There is one command register in the M300 [@40047 (0x002F)]. This register is set using
the function 6. Each bit of the register corresponds to a different command:
Basic Address (Mapping Address) 0x002F
Extra Address 1 (bit Number) Bit number to write
Extra Address 2 (Modbus function) 6
Extra Address 3 (Not Used) x
MiCOM Px2 series
There are 3 command registers in the Px2x [@0x0400, @0x0402, 0x0403]. This register is
set using the function 5, 6 or 15. Each bit of the register corresponds to a different command:
@Bit Comment
Set in order to switch to manual acknowledgement mode for Event and
0x400C
Disturbance uploading
0x400D Set in order to acknowledge the latest Event
0x4032 Set in order to acknowledge the latest uploaded Disturbance
5.3.3.3.3 AOs
The analogue control or AO or Set point, or control reference is a value transmitted by C264
to device using the function 6 or 16. They can be used to define a reference (for physical
output in regulation scheme, generator…) or to define a protection parameter (threshold…).
The values to write must comply with formats and units described for Analogues Inputs
(IEEE signed 754, Integer / not signed on 1/2/4 bytes).
When several values at consecutive addresses can be written, IED must support writing to
this block of addresses.
5.3.3.3.4 Settings of the current relays
In order to parameterize the remote relays, a setting software is necessary.
The tool is Modbus connected on the rear (as commonly used by system in run time).
A front connection with the same software and same framing protocol at both customer
validation and after sale phase is recommended.
Setting software requirements:
Interface with at least a DLL for Emission / Acceptance of messages developed by the
supervisor system, in order to use the tool with other link than serial port. Modbus
messages are encapsulated by system sub-station protocol to be used in system
architecture.
Possibility of inhibiting some options of the menu (pooling, disturbance upload …).
In run-time the Modbus master is the only master. The tool should not disturb the
standard polling of events and data.
5.3.3.3.5 Error management
5.3.3.3.5.1 Faults records
The processing of recommended Fault records is as follows:
Creation of a zone dedicated to describing Fault, apart from the Fault proper
TRIP (signalling that a control is sent to a breaker when a particular protective function
is triggered)
Each alarm/trip indication is controlled by a bit in a set of consecutive cells (like Digital
Inputs). Each bit retains that alarm condition has been set (even if the condition is no more
fulfilled). A global Digital Output acknowledgement ‘Alarm/trip’ is used to reset all alarm
indications. If one alarm condition is still fulfilled, the corresponding bit is not changed by the
IED, else it is reset (with an event generation).
When at least one alarm is set in alarm cells (single alarm appearance), the bit 7 of fast
status byte is set.
When at least one Trip function is set in trip cells, the bit 6 of fast status byte is set.
Each bit is reset when all the alarm/trip appearance conditions have disappeared and a
global ACK alarm Digital Output is received.
A global ALARM/TRIP_ACK_DO is mapped (reset bit). IED mapping must explicitly give the
list of cells/bits indicating alarm/trip and effect on bits b6 and b7.
The answer to global ALARM_ACK_DO or global TRIP_ACK_DO (if applicable) to C264 can
never be BUSY (no applicative mechanism, only transport error code).
The bits b6 and b7 are directly linked to LEDs on the front face. The rule manages only 2
states for LED ON or OFF, and no third state is managed. The state ON can be fixed or
blinking. The current mechanism is a global acknowledgement AND clearance of alarm list if
the alarm appearance condition has been reset.
5.3.3.3.6 Limits and specifications
It is mandatory that within the same range, each piece of equipment has the same operation
as others:
Management of Fault records (fault format, base fault addresses, address descriptive
zone, address of acknowledgement DO…).
Format of AI.
Format of Status.
Respect of MODBUS protocol control (correct CRC, parity check, separate message
silence of 3.5-char time, continuous flow in one message i.e. a silence limited to 1.5-
char transmission time).
If it is overbooked, a device must answer BUSY (exception code 06) or at least not
answer (it is reputed disconnected to be reconnected).
An IED can ask to implement a FAR BUSY (code 05) to solve an SRAM access
problem. C264 repeats the request at N times its polling period. After 10 BUSY
answers, the IED is disconnected.
The official number of devices on Modbus is 32, 16 on PSCN3020 and future system.
Typically the application engineers must not include more 8 IEDs to comply with common
customer needs (triggered analogues < 500ms, triggered DI < 100ms, physical ping as
control/Digital Output/bi-stable/Digital Input/alarm < 300ms, network avalanche profiles, …).
C264/EN CT/D30 Communication
No disturbance files.
5.3.4.1 M230
In addition to the generic Modbus, to test IED communication, the function code 4, address
1, length 3 can be used.
5.3.4.1.1 Data received from M230
No DIs.
Analogue Inputs are regularly polled.
C264 supports six 32-bit extra formats of Analogue Inputs:
M230_T6_TYPE decimal
Signed meas. exponent Binary value unsigned
(signed)
Signed:
M230_T7_TYPE signed:
Inductive/ Unsigned value (16
Power factor Import/ Export
capacitive bytes)
(00/FF)
(00/FF)
ION_MODULUS
Reg. High: unsigned Reg. Low: unsigned
_10000_UNSIGN 10000RH+RL
value/10000 value modulus 10000
ED
ION_MODULUS Reg. High: signed Reg. Low: signed
10000RH+RL
_10000_SIGNED value/10000 value modulus 10000
KITZ202_K8 Refer to KITZ202 documentation
Disconnection:
5.3.4.2.2 Polling
The beginning of Digital Inputs and Analogue Inputs polling is delayed by a time-out starting
at the end of the Rish Pro M01 initialization. C264 can send a synchronous frame during the
initialization phase. Depending on the function and the read use in this frame, the M01
answers with a correct frame or an exception frame but does not invalidate the initialization.
C264/EN CT/D30 Communication
Code Description
01h Unsupported function code
02h Invalid memory register address: use of invalid register number or attempt to
write to a memory protected register
03h Invalid data, i.e. an invalid number of registers
06h Device is busy. This code signals that the relay is occupied with functions
performed via the local RS232 interface (changing configuration, simulation
or calibration of analogue outputs..)
0Ah Possible change of rated values. The device configuration has been modified
since the latest request for measurements or this is the first request for
measurements since the relay was switched on. Read the table of
measurements and the scaling factors table.
Error code 06h and 0Ah must be treated as a disconnection of the IED and a new
initialization phase must be completed before reading the Rish Pro M01 data. Other codes
can be treated as usually.
Only errors from initialization sequence or polling DIs and AIs report an error code. Errors
from synchronous frame only generate an error message, but do not cause a new
initialization sequence.
At reception of the message error code 0x6h or 0xAh, if the mode polling is active,
reauthorize future polling. The IED general status goes to INIT and C264 goes to state
"STAND BY" and extracts the event "RISHM01 CNX".
In event of trouble, the IED sends the Modbus exception 'Busy'. The C264 considers the IED
as disconnected (that will force the initialization sequence to be redone) but DOES NOT PUT
the IED information to unknown.
5.3.4.3 Flexgate
5.3.4.3.1 Polling
At C264 start-up, a polling request is sent to determine the status (function 7). A response
means that the Flexgate IED is connected.
No Digital Inputs polling: a DI change is signaled by an event.
C264 polls for fields ‘Internal status bits’ at address 18993 to 19000 with function 2:
51 indicates an overflow events buffer. The event buffer size is 200. The Flexgate
does not allow to add new events until the event 51 is read. At this time, C264
considers that one or more events have been lost. Then it repeats the General
Interrogation, and the cycle continues starting with the internal status bits polling.
If a gap appears in the sequence number, C264 considers that an event has been lost. Then
it repeats the General Interrogation; the cycle continues polling the internal status bits.
5.3.4.3.3 Data sent to Flexgate
C264 sends Date and Time in one request with function 16 at Modbus addresses
49001…49007 (2328h to 232Eh).
The following format is used to write the date: [year/month/day/hour/minutes/milliseconds
since midnight] to two words by data except for milliseconds which takes four words.
C264 periodically sends the date to synchronize the Flexgate. The time must be sent with a
period smaller than 16 minutes.
As they are sent to a specific address, there can be only one Flexgate on the legacy bus.
5.3.4.3.4 Error management
Flexgate generates the error code that follows:
Code Description
03h Illegal data value, i.e. invalid number of register (send a
“Configuration error” message to the application and continue).
Also used to indicate a hardware malfunction like an interlock
condition not ok on a protective relay
5.3.4.4 SEPAM
As for standard Modbus, three modes are available:
‘General Interrogation’: C264 waits for the end of initialization, the disappearance of
data loss signal. Then, it polls for all the DIs.
'Desynchronized': events are NOT managed. The DIs are updated by polling. DIs are
read and decoded group by group. The status is read and decoded when all the
groups have been read.
'Synchronized': events are managed. C264 reads the status word, then the events.
The DIs are updated when the events are decoded.
C264/EN CT/D30 Communication
2. When it receives a data, it decodes the status frame and the DI group frame.
Mode ‘synchronized’:
NOTE: BI, Measurement and Counter are polled with the variation 0. That means
that all variations are required.
All other DNP3 objects are not treated.
5.4.2.2 Output
The DNP3 Master manages both direct control Command and Select before Operate for
digital control only.
When operate command is received from application, the Master checks in database to
know if the command is:
1. An execute command, which belongs to a SBO Control: OPERATE function is used in
this case.
2. A direct control: DIRECT OPERATE function is used is this case
C264/EN CT/D30 Communication
5.4.3 Behaviour
Synchronisation:
The DNP3 object used to synchronise IEDs is “Write Date and Time Request
(Object 50, Variation 01).
Initialisation:
When the response is OK, the Master DNP3 send a message to the application to
tell that connection step is passed.
General Interrogation:
When the IED is connected, the MiCOM C264 ask for static data state and value with
a sequence of:
Read BI,
Read Measurement,
Read TPI,
Read Counter
Polling:
Poll Class 0 or Class 1 or Class 2 or Class 3: this is a poll for all EVENT data
followed in return by all (static) current data.
The polling cycle must be interrupted at minimum in the two following case:
Clock Synchronisation
Remote control
Event acquisition:
Event occurs spontaneously. The slave device waits for being polled by the master.
With unsolicited reporting, Slave devices can send updates as values change, without
having to wait for a poll from the Master.
IED monitoring:
Digital inputs:
Digital inputs which are received as changes of state are identified by the DNP3
object number 02
Digital inputs which are received as static data are identified by the DNP3 object
number 01
Measurements:
Measurements which are received as changes of state are identified by the DNP3
object number 32
Measurements which are received as static data are identified by the DNP3 object
number 30
Counters:
Counters which are received as changes of state are identified by the DNP3
object number 22
Counters which are received as static data are identified by the DNP3 object
number 20
5.4.5 Data sent to IEDs
Controls:
In case of basic control (Set, Reset, Trip, Close), DNP3 object 12 is used with the
Variation 01
5.4.6 Master DNP3.0 Profile
NOTE: Please refer to the interoperability documentation PACiS 5 Master
Protocol Profile (MPP) DNP3.
C264/EN CT/D30 Communication
REQUEST RESPONSE
OBJECT
(slave must parse) (master must parse)
Func Codes Qual Codes Func Code Qual Codes
Obj Var Description
(dec) (hex) (dec) (hex)
1 0 Binary Input – All Variations 1, 22 00,01,06
1 1 Binary Input 1 00,01,06 129 00,01 (start-stop)
1 2 Binary Input with Status 1 00,01,06 129 00,01 (start-stop)
2 0 Binary Input Change - All Variations 1 06,07,08
2 1 Binary Input Change without Time 1 06,07,08 129 17,28 (index)
2 2 Binary Input Change with Time 1 06,07,08 129 17,28 (index)
2 3 Binary Input Change with Relative Time 1 06,07,08 129,130 17,28
10 0 Binary Output - All Variations 1 00,01,06
10 1 Binary Output
10 2 Binary Output Status 1 00,01,06 129 00,01
12 1 Control Relay Output Block (1) 3,4,5,6 17,28 (index) 129 Request echo
20 0 Binary Counter - All Variations 1,7,8,9,10, 00,01,06
22
20 1 32-Bit Binary Counter 1 00,01,06 129 00,01 (start-stop)
20 2 16-Bit Binary Counter 1 00,01,06 129 00,01 (start-stop)
20 5 32-Bit Binary Counter without Flag 1 00,01,06 129 00,01 (start-stop)
20 6 16-Bit Binary Counter without Flag 1 00,01,06 129 00,01 (start-stop)
REQUEST RESPONSE
OBJECT
(slave must parse) (master must parse)
Func Codes Qual Codes Func Code Qual Codes
Obj Var Description
(dec) (hex) (dec) (hex)
21 0 Frozen Counter - All Variations 1 00,01,06
21 1 32-Bit Frozen Counter 1 00,01,06 129 00,01
21 2 16-Bit Frozen Counter 1 00,01,06 129 00,01
21 9 32-Bit Frozen Counter without Flag 1 00,01,06 129 00,01
21 10 16-Bit Frozen Counter without Flag 1 00,01,06 129 00,01
22 0 Counter Change Event - All Variations 1 06,07,08
22 1 32-Bit Counter Change Event without 1 06,07,08 129 17,18 (index)
Time
22 2 16-Bit Counter Change Event without 1 06,07,08 129 17,18 (index)
Time
22 5 32-Bit Counter Change Event with Time 1 06,07,08 129 17,18 (index)
22 6 16-Bit Counter Change Event with Time 1 06,07,08 129 17,18 (index)
Remarks:
Frozen counters (type21) are uploaded during general interrogation, but never polled after this.
C264/EN CT/D30 Communication
REQUEST RESPONSE
OBJECT
(slave must parse) (master must parse)
Func Codes Qual Codes Func Code Qual Codes
Obj Var Description
(dec) (hex) (dec) (hex)
23 0 Frozen Counter Event - All Variations 1 06,07,08
23 1 32-Bit Frozen Counter Event without 1 06,07,08 129,130 17,18 (index)
Time
23 2 16-Bit Frozen Counter Event without 1 06,07,08 129,130 17,18 (index)
Time
23 3 32-Bit Frozen Delta Counter Event 1 06,07,08 129,130 17,18
without Time
23 4 16-Bit Frozen Delta Counter Event 1 06,07,08 129,130 17,18
without Time
30 0 Analogue Input - All Variations 1 00,01,06
30 1 32-Bit Analogue Input 1 00,01,06 129 00,01 (start-stop)
30 2 16-Bit Analogue Input 1 00,01,06 129 00,01 (start-stop)
30 3 32-Bit Analogue Input without Flag 1 00,01,06 129 00,01 (start-stop)
30 4 16-Bit Analogue Input without Flag 1 00,01,06 129 00,01 (start-stop)
32 0 Analogue Change Event - All Variations 1 06,07,08
32 1 32-Bit Analogue Change Event without 1 06,07,08 129 17,18 (index)
Time
32 2 16-Bit Analogue Change Event without 1 06,07,08 129, 17,18 (index)
Time
32 3 32-Bit Analogue Change Event with Time 1 06,07,08 129,130 17,18
32 4 16-Bit Analogue Change Event with Time 1 06,07,08 129,130 17,18
40 0 Analogue Output Status - All Variations 1 00,01,06
40 1 32-Bit Analogue Output Status 1 00,01,06 129 00,01 (start-stop)
40 2 16-Bit Analogue Output Status 1 00,01,06 129 00,01 (start-stop)
41 1 32-Bit Analogue Output Block 5,6 17,28 (index) 129 Request echo
41 2 16-Bit Analogue Output Block 5,6 17,28 (index) 129 Request echo
50 0 Time and Date - All Variations
50 1 Time and Date 1 07 (quantity=1) 129 07 (quantity=1)
50 2 Time and Date with Interval 2 07 (quantity=1)
51 1 Time and Date CTO 129,130 07 (quantity=1)
51 2 Unsynchronized Time and Date CTO 129,130 07 (quantity=1)
52 1 Time Delay Coarse 129, 07 (quantity=1)
52 2 Time Delay Fine 129, 07 (quantity=1)
60 1 Class 0 Data 1 06
60 2 Class 1 Data 1 06,07,08
20,21,22 06
60 3 Class 2 Data 1 06,07,08
20,21,22 06
60 4 Class 3 Data 1 06,07,08
20,21,22 06
IEC 61850
[0x0000]
[0x4100]
VALID
UNKNOWN
SPS Quality
IEC 61850 Associated SPS State V V
IEC 61850
[0x0000]
[0x4100]
[0x6000]
VALID
UNKNOWN
OVERRANGE
MV Quality
DNP3 Measurement status object
IEC MV VALUE V V V
Reserved [7] X X X
Reference error BS1[6] X X X
Over-range BS1[5] 0 0 1
Local Forced BS1[4] X X X
Remote Forced BS1[3] X X X
Comm.lost BS1[2] 0 1 X
RestartBS1[1] X X X
On-line BS1[0] 1 X X
IEC 61850
[0x0000]
[0x4100]
[0x4080]
VALID
UNKNOWN
UNDEFINED
MV Quality
[0x0000]
[0x4200]
[0x4100]
[0x6000]
VALID
SELFCHECK FAULTY
UNKNOWN
OVERRANGE
DNP3 counter status
object
Counter VALUE V V V V
Reserved [7] X X X X
Reserved BS1[6] X X X X
Roll-Over BS1[5] 0 0 0 1
Local Forced BS1[4] X X X X
Remote Forced BS1[3] X X X X
Comm.lost BS1[2] 0 0 1 X
RestartBS1[1] X X X X
On-line BS1[0] 1 0 X X
C264/EN CT/D30 Communication
5.5.2.2 Output
5.5.3 Behaviour
5.5.3.1 Synchronisation
The “Master T103” link is always synchronised by the MiCOM C264. No calculation of the
transmission delay is performed.
5.5.3.2 Polling
To connect an IED, a “Reset CU” frame is sent to the IED.
By default an IED is polled by a “Polling C2” frame, allowing to get “non priority information”.
If an IED signals it has “priority information”, it is polled with a “Polling C1” frame.
5.5.3.3 IED monitoring
The “OUT_OF_SERVICE” state is managed. It corresponds to the “Lock of communication”
[DI 20].
A GI may be done after each end of Tunnelling session.
The MiCOM C264 may regularly look for Disturbance file presence
5.5.3.4 Tunnelling mode
During tunnelling mode, only polling C2 may be done by the MiCOM C264 [Normally, if
“priority information” is present, the remote Master may send a “polling C1 frame”].
The MiCOM C264 must spy the tunnelling exchange in order not to loose information [DI and
AI change].
For security raison, at the end of a tunnelling session, a GI is done.
5.5.3.5 Station Interlocking
This functionality is only available on MiCOM P139 in private T103 range (Schneider Electric
D protocol variant)
After GI, and only if IED is MiCOM Px3x, we send a read on MiCOM Px3x parameter adress
0 which corresponds to Device Type. If MiCOM Px3x responds with analog parameter set to
139, we activate Station Interlocking Management.
Case of local control (front panel of the MiCOM P139) with Station interlock:
As soon as a user will try to control a switchgear by the front panel, the MiCOM P139 will
send an ASDU 72 with FUN/TYP = F8h/74h in order to request to PACiS system the station
interlock conditions. PACiS system should check if the command is allowed (specific
treatment done by CONDUITE of the computer) and respond to the MiCOM P139.
C264/EN CT/D30 Communication
DI which are not transmitted during a GI. For these DI, the IED signals only
change of state from OFF to ON. The MiCOM C264 must generate by itself the
change from ON to OFF.
5.5.4.2 Measurements
A Measurement is identified by:
An ASDU Number [(3,4,9) in public range, (10, 21, 73,77) in private range]
Sum of trips
Communication C264/EN CT/D30
Description TI VSQ COT ADR FUN INF RII NOG GIN KOD
Measurement 15H 81H 2AH CAD FEH F4H x 1 Courier cell number 1
TI = Type identification
VSQ = variable structure qualifier
COT = cause of transmission
ADR = CAD = common address
FUN = function number
INF = information number
RII = Return information identifier
NOG = Number Of Generic identification
GIN = Generic Identification Number
ASDU 10 provides the response.
5.5.4.3 Bitstring 32-bits :
The state of the IED is identify by the ASDU 71 or 72 with couple FUN / TYP = F8h / 70h.
This ASDU describes the status of the IED (Station Interlocking active or not …)
A request to check station interlocking is identify by the ASDU 71 or 72 with couple FUN /
TYP = F8h / 74h. In this request, the couple FUN/TYP of the command to spend is defined.
5.5.4.4 Analog protection signal (ASDU 49) :
Only for MiCOM Px3x, an analogue protection signal is received after GI
Only address 0 is managed. It is used to recognise MiCOM P139 in order to activate station
interlocking management.
5.5.4.5 Energy counter (ASDU 79) :
Only for MiCOM Px3x, four energy counters are available.
Energy counters are identified by:
Description TI VSQ COT ADR FUN INF DB0-DB4 DB5-DB9 DB10-DB14 DB15-DB19
Energy 4FH 04H 01H CAD F8H 6CH Active + Active - Reactive + Reactive -
counter
TI = Type identification
VSQ = variable structure qualifier
COT = cause of transmission
ADR = CAD = common address
FUN = function number
C264/EN CT/D30 Communication
Value
Value
Value
S Value
IV CA CY Sequence number
A DI with the same (Function Type, Information Number) as the control and with a
‘Cause Of Transmission’ equals to ‘positive return’ or ‘negative return’ in public range
A DI (ASDU 1) with the same (Function Type, Information Number) as the control and
with a ‘Cause Of Transmission’ equals to ‘positive return’ or ‘negative return’ in public
range.
ASDU232 ASDU20
Field Value Field Value
ASDU No E8H ASDU No 14H
VSQ 81H VSQ 81H
COT 14H COT 14H
Device address @ied Common Address of @ied
DN2 Cfg ASDU
Function type Cfg
DN3 Cfg Information Number Cfg
DC0 1=OFF; 2=ON DC0 1=OFF; 2=ON
X 0 RII Set by master
ASDU105 ASDU01
Field Value Field Value
ASDU No 69H ASDU No 01H
VSQ 81H VSQ 81H
COT 45H, 46H, 47H, COT 14H, 15H, 0BH
Device address 7FH
@ied Common Address of @ied
DN2 Idem ASDU232 ASDU
Function type Idem ASDU20
DN3 Idem ASDU232 Information Number Idem ASDU20
DPI 1=OFF; 2=ON DPI 1=OFF; 2=ON
X 0 msLow
Four octet
msLow msHigh binary time
msHigh Four octet IV 0 mmmmmm
binary time CP32Time2a
IV 0 mmmmmm SU 00 hhhhhh
SU 00 hhhhhh CP32Time2a SIN Idem RII
ASDU20
Configuration
Management of commands through ASDU 232.
MiCOM C264/C264C
COMMISSIONING
Commissioning C264/EN CM/D30
CONTENTS
2. REQUIREMENTS 5
3. COMMISSIONING TESTS WITH GHU200 OR GHU201 (WITH LCD) 6
3.1 Preparation 6
3.2 Check version & number 7
3.3 Check the boards status 8
3.4 Checking the binary signal inputs 9
3.5 Checking the output relays 10
3.6 Testing the communication with external devices 11
3.7 Testing the control functions 12
3.8 Switching from local to remote control 12
3.8.1 Local control 12
3.8.2 Remote control 12
Commissioning the application (when product has had its database loaded). This
second part is documented and carried out through FAT (Factory Acceptance Tests),
and SAT (Site Acceptance Tests) activities.
The scope of this chapter is the description of commissioning tests that prove that the
MiCOM C264 is suitable for further application tests.
1.3 Commissioning the product
Commissioning the product starts with product reception and is continued through all off the
installation procedures. Activities are divided between: -
The starting point is the delivery form that describes all of the delivered hardware
components that constitute the MiCOM C264/C264C.
1.4 Responsibility
Most commissioning activities involve a power supply that can damage the installation or
cause injury to the operator. The chapter C264/EN SA (Safety) should be read carefully
before any handling.
Before starting commissioning, the contractual and human responsibilities should be clearly
defined.
Only qualified and competent persons should carry out commissioning and the validation
tests.
C264/EN CM/D30 Commissioning
2. REQUIREMENTS
It is essential that all requirements expressed in C264/EN IN (Installation) chapter have been
fulfilled.
The delivery form is the starting document.
C264/EN CM/D30 Commissioning
Does the nominal (and measured) voltage of the battery agree with the nominal
auxiliary voltage of the device?
Are the current and voltage transformer (if used) connections, grounding, and phase
sequences correct?
After the wiring work is completed, check the system to make sure it is properly isolated.
Once all checks have been made, the power supply voltage may be turned on.
After the voltage has been applied, the MiCOM C264 starts up.
During start-up, various tests are carried out (see section entitled ‘Diagnose level1’ in
Chapter C264/EN MF (Maintenance)).
The LED indicator labelled ‘HEALTHY’ (Fourth LED) will light up.
After approximately 30 s, the MiCOM C264 is ready for operation.
In initial, factory-set condition or after a cold restart, the front panel displays a message
“Schneider Electric”.
After the settings have been made, the following checks should be carried out before any
interlocks or isolation is cancelled:
Are the software and database versions compatible with the hardware?
Are all communications (S-BUS, T-BUS and L-BUS) correctly configured and
recognised?
S E R V I C E <time>
S E R I A L N B :
S O F T W A R E V E R S I O N :
D B 1 V E R S I O N S T A T E :
D B 2 V E R S I O N S T A T E :
O P E R A T I N G H O U R S :
O P E R A T I N G M O D E :
R E D U N D A N C Y M O D E :
C264/EN CM/D30 Commissioning
Faults
If the first LED is alight, this means that there is something wrong inside the C264.
The FAULT panel gives information about the problem.
F A U L T <time>
The product checks whether the number of installed boards matches with the number of
boards configured, the following messages are generated depending on the results:
B O A R D <time>
<Board Label><Number>
<Board Status>
<Board Label><Number>
<Board Status>
<Board Label><Number>
<Board Status>
<Board Label><Number>
<Board Status>
<Board Label><Number>
<Board Status>
<Board Label><Number>
<Board Status>
N°page/Number of Pages
D I <time>
DIU <Number>
DI 0 <status> DI 8 <status>
DI 1 <status> DI 9 <status>
DI 2 <status> DI 10 <status>
DI 3 <status> DI 11 <status>
DI 4 <status> DI 12 <status>
DI 5 <status> DI 13 <status>
DI 6 <status> DI 14 <status>
DI 7 <status> DI 15 <status>
N°page/Number of Pages
C264/EN CM/D30 Commissioning
D I <time>
CCU <Number>
DI 0 <status>
DI 1 <status>
DI 2 <status>
DI 3 <status>
DI 4 <status>
DI 5 <status>
DI 6 <status>
DI 7 <status>
N°page/Number of Pages
D O <time>
DOU <Number>
DO 0 <status> DO 8 <status>
DO 1 <status> DO 9 <status>
DO 2 <status>
DO 3 <status>
DO 4 <status>
DO 5 <status>
DO 6 <status>
DO 7 <status>
N°page/Number of Pages
Commissioning C264/EN CM/D30
D O <time>
CCU <Number>
DO 0 <status>
DO 1 <status>
DO 2 <status>
DO 3 <status>
N°page/Number of Pages
I E D <time>
IP CLIENT NB:
IP SERVER : <protocol>
<Server 1 Name>
<Server 1 IP address> <connection state>
<Server 2 Name>
<Server 2 IP address> <connection state>
…
LEGACY DEVICE : <protocol>
<IED 1 name>
<IED 1 address> <connection state>
<IED 1 name>
<IED 1 address> <connection state>
…
N°page/Number of Pages
C264/EN CM/D30 Commissioning
Does the nominal (and measured) voltage of the battery agree with the nominal
auxiliary voltage of the device?
Are the current and voltage transformer (if used) connections, grounding, and phase
sequences correct?
After the wiring work is completed, check the system to make sure it is properly isolated.
Once all checks have been made, the power supply voltage may be turned on.
After the voltage has been applied, the MiCOM C264 starts up.
During start-up, various tests are carried out (see section entitled ‘Diagnose level1’ in
Chapter C264/EN MF (Maintenance)).
The LED indicator labelled ‘HEALTHY’ (Fourth LED) will light up.
After approximately 30 s, the MiCOM C264 is ready for operation.
After the settings have been made, it is necessary to check that the software and the
database versions are compatible with the hardware.
The following chapters describe the checks to be performed with CAT to answer these
questions and ensure that the MiCOM C264 is fully operational in its application.
The CAT is fully described in IN chapter.
With the CAT, the “Computer version” button gives access to the current C264 software
version, the active database and the computer operational mode.
For a normal behaviour, the computer mode is “ACTIVE”
Record Sheet C264/EN RS/D30
MiCOM C264/C264C
RECORD SHEET
Record Sheet C264/EN RS/D30
CONTENTS
2. COMMISSIONING RECORD
Commissioning Date:
Engineer:
Station Name:
Circuit Name:
Front Plate Information
Under the top access cover, there is the following type of label:
Fill in the following array according to the label under the top access cover:
Serial number
Cortec number
Auxiliary voltage for power supply
Nominal wetting voltage for digital inputs
*Delete as appropriate
Have all relevant safety instructions been followed? Yes/No*
Product checks
Visual inspection with the computer de-energized
Slot letter in
the rack Previous board New board
DATE Engineer Board type
(between A Serial number Serial number
and Q)
/ /
/ /
/ /
/ /
/ /
/ /
/ /
/ /
/ /
/ /
/ /
/ /
/ /
/ /
/ /
/ /
/ /
/ /
/ /
/ /
/ /
/ /
/ /
/ /
Maintenance C264/EN MF/D30
MiCOM C264/C264C
MAINTENANCE
Maintenance C264/EN MF/D30
CONTENTS
LEDs
The first 5 LEDs indicate the MiCOM C264/C264C status information. With reference to the
C264/EN HI (Human Interface) chapter, the LEDs indicate from top to down:
LED id Colour LED on LED slow blinking LED fast blinking LED off
1 Red There is at least one There is at least one minor Not used No fault
major fault (hardware, fault (I/O board,
database) (1) communication to IEDs)(2)
2 Yellow All the alarms are ac- All alarms displayed in There is at least 1 No alarm
knowledged, but there the alarm panel are not acknowledged
is at least one alarm inactive and alarm displayed in
still active. (3) acknowledged the alarm panel
3 Yellow Computer in operation Computer in maintenance Computer in test Computer in
reboot
4 Green Power on Not used Not used Power off
5 (4) Red All bays managed by Bays managed by the Not used All bays
the computer are in computer are not in the managed by the
LOCAL mode same control mode computer are in
REMOTE
6 Red Global fault (5) Not used Not used No fault at all
(1) Major fault: MiCOM C264 not available due to internal failure (database error, CPU
board failure, …).
(2) A minor fault is a fault causing only the non availability of a part of the functionality.
(3) When the alarm disappears, the LED returns automatically to OFF.
(4) Assigned by computer only for without LCD panel: GHU2x1 or for an extension C264
(5) It may be a board fault, an IED fault, a power off, a watchdog issue (DO#0 of BIU
board), an IED or extension disconnected
C264/EN MF/D30 Maintenance
A minor fault is a fault causing only the non-availability of a part of the functionality:
NOTE: After a reboot using the CAT, the PSL might do not work. Use the
serial link instead and type ‘reboot’ in Hyperterminal.
Pull the backplane board (FBP280 for C264 or FBP242 for C264C) out by holding it by
the two extremities.
Remove the screws and the maintain bar at the bottom of the case.
NOTE: To ensure compatibility, always replace a faulty board with one of an
identical part number and set jumpers in identical position.
All the boards are shown and described in HW chapter.
2.3.2.1 Replacement of the Binary Input Unit (BIU241/261)
The BIU is the power supply board located on the extreme left-hand side (slot A) of MiCOM
C264/C264C.
Pull the power supply module forward, away from the rear terminal blocks and out of the
case. A reasonable amount of force will be required to achieve this due to the friction
between the contacts of the two medium duty terminal blocks. It is then recommended to use
the special tool for extracting board (internal reference is 2070860).
Do not forget to set the jumpers on the new board in the same position as the previous one.
2.3.2.2 Replacement of the main processor board (CPU260/CPU270)
Depending on the model of the MiCOM C264/C264C the processor board carried out the
IRIG-B functionality’s so if you identify an IRIG-B connection problem you will have to
replace the processor board.
After replacement of the main processor board, all the settings required for the application
will need to be re-entered.
The CPU board is located next to the BIU board (slot B).
Do not forget to disconnect the rear cables (RJ45 Ethernet, optical fibres, IRIG-B connector
and serial links) before replacing the board and to reconnect them after.
Do not forget to set the jumpers on the new board in the same position as the previous one.
2.3.2.3 Replacement of the Ethernet switch boards (SWU20x or SWR20x or SWD20x)
The Ethernet switch board is located on slot C.
Do not forget to disconnect the rear cables (RJ45 Ethernet and optical fibres) before
replacing the board and to reconnect them after.
Do not forget to set the jumpers on the new board in the same position as the previous one.
2.3.2.4 Replacement of the I/O boards (DIU200, DIU211, DOU201, CCU200, CCU211, AIU201,
AIU210, AIU211, AOU200 )
The I/O boards can be located in any slot from C to Q.
Do not forget to set the jumpers on the new board in the same position as the previous one.
WARNING: The insert or extraction of the AOU200 board in skew could lead one capacity
(C27) to touch an iron corner. The manipulation of boards is to be done carefully.
2.3.2.5 Replacement of the Transducerless Measurements Unit (TMU)
The measurement unit is on the extreme right-hand side of MiCOM C264/C264C.
Maintenance C264/EN MF/D30
To upload the VAL file to Micom S1, create a new register key. The name of the key is
“VERSION”. It is located under :
HKEY_LOCAL_MACHINE\Software\PACIS\MICOM S1\Settings\ The value of this
key can be 0 or 1. The default value is 1.
Cyber Security C264/EN CS/D30
MiCOM C264/C264C
CYBER SECURITY
Cyber Security C264/EN CS/D30
CONTENTS
2. DOCUMENTATION REFERENCE
Document Title
3. CYBERSECURITY POLICY
3.1 Applicability
The main requirements for C264 inside the cyber security scope are described on this table below.
3.2 Banner
The DHMI C264 banner is an easy-to-read message that plainly identifies the device where the user is
connected / working to prevent him/her from mistaking it for another one.
3.3 Password
A password is required to place a command or set a parameter (whether from the front panel or via a
PC-based application). For this purpose, at some point, the user chooses a profile that depends on the
intended activity.
________________________________________________________________________________
Note
Arrow G
Key
Value 2 4 8 6
_________________________________________________________________________________
Access without a proper password is denied as soon as the security administrator has defined the
passwords.
_________________________________________________________________________________
Note
Please refer to the documentation “SAT User Guide” on chapter HI for password
configuration.
_________________________________________________________________________________
The password must have 8 caracters and in addition contains at least one character from all the
categories that follow:
Upper case characters (A-Z)
Lower case characters (a-z)
Base 10 digits (0-9)
Non-alphanumeric, that is:
! " # $ % & ' ( ) * + , - .
/ : ; < = > ? @ [ \ ] ^ _ `
_________________________________________________________________________________
Note
Please refer to the documentation “PACiS System Cyber Security (SCS) User Guide” on
chapter FT and section APPENDIX / STANDARDS for details”.
_________________________________________________________________________________
Note
Please refer to the documentation “PACiS System Cyber Security (SCS) User Guide” on
chapter FT and section “RBAC Definition with SAT” for overview and the documentation “SAT
User Guide” on chapter HI for password details.
_________________________________________________________________________________
Cyber Security C264/EN CS/D30
IP Address
Syslog server IP address N/A - - -
IP Address
SNMP Client IP Address N/A - - -
Inactivity automatic disconnection Number
15 Minute 1 99
timeout
TABLE 3: SAT SECURITY POLICY PARAMETERS DEFAULT DEFINITION
C264/EN CS/D30 Cyber Security
Security logs produced by application are archived to SAM device. A Security Logs viewer allows
displaying security logs. The viewer allows sorting logs based on several criteria (ID, Security Level
and UTC time).
Note
Please refer to documentations “SAM User Guide” on section Display Substation Security Logs
and “PACiS System Cyber Security (SCS) User Guide” on section Security Log Management for
details.
_________________________________________________________________________________
3.5 Hardening
________________________________________________________________________________
Note
Please refer to the documentation “PACiS HARDENING Application Note” for more details and
help to follow hardening procedures for PACiS System recommendations and the documentation
“PACiS System Cyber Security (SCS) User Guide” on section Device Hardening for more
details.
_________________________________________________________________________________
Cyber Security C264/EN CS/D30
The “Factory mode” is the default configuration (RBAC and security policy) of any IED coming out of
the factory.
A manually operation (reset order) allows to retrieve the factory mode configuration for PACiS
component. This order is available according to role and permissions.
The factory cyber security settings are restored through the DHMI, via the menu tree panel.
This below procedure allows retrieve the C264 RBAC factory mode configuration:
Step Action
Access to the DHMI C264 first page: Press “three page” key and “Return” key
1 The MENU TREE is displayed
From “MENU TREE/CONFIG FACT. CYBER SETTINGS”, choose “YES” option and
3 “Return” button to valid the C264 RBAC factory mode configuration
________________________________________________________________________________
Notes
The “Factory mode” is accessible by Security Administrator only.
Please refer to “PACiS System Cyber Security (SCS) User Guide” on section Back to factory
Mode for details.
_________________________________________________________________________________
Note
Please refer on chapter IN and section “C264 Installation” for details.
_________________________________________________________________________________
Lexicon PACiS/EN LX/D30
PACiS System
LEXICON
Lexicon PACiS/EN LX/D30
CONTENTS
2. LEXICON
AC Alternating Current
AccI Accumulator Input
ACSI Abstract Communication Service Interface
Mapping from the standard IEC 61850 abstract specification of
communication service to a concrete communication infrastructure based
on CORBA.
A/D Analog/Digital
ADC Analog to Digital Converter
AE qualifier Application Entity qualifier
Used internally by IEC 61850 to identify a server application
AI Analog Input (Measurement Value including state attribute)
Commonly Voltage or current DC signals delivered by transducers, and
representing an external value (refer to CT/VT for AC).
AIS Air Insulated Substation
AIU Analog Input Unit ( C264 Bay Computer board name for DC Analog Input)
Alarm An alarm is any event tagged as an alarm during the configuration phase
AO Analog Output
Value corresponding to a desired output current applied to a DAC.
AOU Analog Output Unit ( C264 Bay Computer board name for Analog Output)
API Application Programming Interfaces
AR Auto-Reclose
ARS Auto-Recloser
ASCII American Standard Code for Information Interchange
ASDU Application Specific Data Unit
Name given in the OSI protocol for applicable data (T103, T101..)
ASE Applied System Engineering
ATCC Automatic Tap Change Control
Automation in charge of secondary voltage regulation, more specific than
AVR
AVR Automatic Voltage Regulator
Automatic system used to regulate the secondary voltage by automatic
tap changer control (see ATCC). Set of features can be added, see
chapter C264 FT.
Bay Set of LV, MV or HV equipment (switchgears and transformers) and
devices (Protective, Measurement…) usually encompassing a Circuit
Breaker and ancillary devices, and controlled by a bay computer.
BCD Binary Coded Decimal
One C264 supported coding on a set of Digital Inputs, that determine a
Digital Measurement, then a Measurement value (with specific invalid
code when coding is not valid). Each decimal digit is coded by 4 binary
digits.
BCP Bay Control Point
Name given to the device or part used to control a bay. It can be Mosaic
Panel, C264 LCD, usually associated with Remote/Local control.
BCU Bay Control Unit
Name given to the C264 controlling a bay. Usually in contrast to
Standalone.
Lexicon PACiS/EN LX/D30
FO Fiber-Optic
FP Front Panel
FTP Foil Twisted Pair
FLS Fast Load Shedding
FSS Force Suppress Substitute
GAT Gateway Administration Tool
Gateway Level 6 session of OSI, the gateway is any device transferring data
between different networks and/or protocols. The RTU function of the
C264 gives a gateway behavior to SCADA or RCP level. Gateway (GTW)
is separate PC base device dedicated to this function.
GHU Graphic Human interface Unit
C264 Bay Computer Front Panel digital part (LCD, buttons, Front RS)
GIS Gas Insulated Substation
GLOBE GLOBE Brick
GMT Greenwich Mean Time
Absolute time reference
GPS Global Positioning System
Based on triangulation from satellite signals.
Also transmits absolute GMT time used to synchronize a master clock
GOOSE Generic Object Oriented Substation Event
GPT Generic Protocol Translator software, supplied by ASE
Group Logical combination of BI (i.e. SP, DP, SI or other groups).
GSSE Generic Substation Status Event
Hand Dressing Facility for an operator to set the position of a device manually (position
acquired by other means) from the HMI at SCP level; e.g. from OPEN to
CLOSE (without any impact on the “physical” position of the electrical
switching device).
HELPS Hostable Emulator for Load and Protocol Simulation. HELPS simulates
an Intelligent Electronic Device (IED)
HMGA Horizontal Measurement Graphical Area
HMI Human Machine Interface
Can be EcoSUI OI (Operator Interface) or C264 LCD (Local Control
Display) or set of LEDs, mosaic...
HSR High Speed Auto-Recloser, first cycles of AR
HTML Hyper Text Mark-up Language
Used as standard format for web display
HV High Voltage (for example 30kV to 150kV)
I/O Input/Output
ICD IED Capability Description
IEC International Electro-technical Commission
IED Intelligent Electronic Device
General expression for a whole range of microprocessor based products
for data collection and information processing
IP Internet Protocol
IRIG-B Inter-Range Instrumentation Group standard format B. This is an
international standard for time synchronization based on an analog signal.
Lexicon PACiS/EN LX/D30
TM Analog Measurement
TMU Transducer-Less Measurement Unit
Topological Interlocking algorithm, based on evaluation of topological information of
interlocking the switchgear arrangement in the HV network, the switchgear type and
position, and defined rules for controlling this kind of switch (e.g. continuity
of power supply)
TPI Tap Position Indication (for transformers).
Frequently acquired via a Digital Measurement
TS Logic position
Voltage level Set of bays, whose plants & devices deal with the same voltage (for
example, 275 kV)
VT Voltage Transformer
Electric device connected to process and extract a voltage measurement.
By extension, part of a device (C264) that receives this AC value and
converts it to a numerical measurement value. VTs are wired in parallel.
MiCOM C264/C264C
ANNEX:
COMMUNICATION ETHERNET
SWITCHES
Annex: SW Communication C264/EN AN/D30
CONTENTS
1. INTRODUCTION 5
1.1 MICOM Ethernet Device Series 5
1.2 Ethernet Device naming 5
1.3 C264 Ethernet switch boards 5
1.4 MiCOM Ethernet Redundant REU20x 5
6.10.1 Maintenance 53
6.10.2 Environmental Characteristics 53
6.10.3 IEC 62439-3 MIB Structure 57
Annex: SW Communication C264/EN AN/D30
1. INTRODUCTION
The MiCOM Ethernet boards range is designed to deal with the needs of a wide range of
electric plants. Emphasis has been placed on strong compliance with standards, scalability,
modularity and open architecture.
These features facilitate the use of MiCOM products in several applications, from the most
basic to the most demanding. They also ensure interoperability with existing components.
The Schneider Electric philosophy is to provide a range of Ethernet products such as
devices taking into account the compulsory requirements of electrical substations, including
power supply and immunity to environmental constraints.
It also provides solutions to specific requirements such as network redundancy
management.
Each of these products can be used independently or can be integrated into a Digital Control
System (DCS) such as the PACiS system.
1.1 MICOM Ethernet Device Series
Driven by requests from all over the world for advanced substation applications for
Automation, control and monitoring, Schneider Electric is committed to provide a
comprehensive range of Ethernet-based products that respond to our customers' needs.
Standard Ethernet products rarely meet the constraints of electrical plants: environmental,
power supply, redundancy, etc.
The new MiCOM Ethernet Device series has been specially tailored to respond to all of
these requirements, and is compatible with the PACiS system. The MiCOM Ethernet range
is designed to address different kinds of architectures and installations.
1.2 Ethernet Device naming
Table 1 briefly describes the services provided and the physical layer interface of the
REU20x board.
Description C264
version
Redundant Ethernet Unit designed for Simple Ethernet Star REU20x
architecture with Parallel Redundancy Protocol (PRP)
Table 1: REU20x board description
The Web Server is accessible by connecting the board to a network through its RJ45 port.
Then, the Server can be accessed through its IP address (by default, the IP address is
192.168.0.3. Only HTML 5 web browser can be used (Chrome, Opera, etc). Some examples
can be seen in FIGURE 1, FIGURE 2 and Figure 3. It is highly recommended not to modify
the “Registers” page if you do not master the internal board’s behavior.
Watching the quality of transmission. Each frame (Ethernet packet or checking frame)
is controlled by the SHM. A detection of large error rate will eliminate the faulty link
and start automatically the self healing,
Supervising the link same in the absence of traffic on the primary link (every 5 s
checking frames are sending to test the link). The link is supervised permanently with
the real frame.
C264/EN AN/D30 Annex: SW Communication
When the frame circulates on the ring it does not cross the switch the transit time is only tl.
Annex: SW Communication C264/EN AN/D30
2.1.6 Benefits
Ultra fast ring redundant capability (< 1ms for network reconfiguration)
Fast propagation on the ring (no transfer time (Store and forward mechanism ) with
the switch)
Ring management
2.2 SNMP Management
Simple Network Management Protocol is the network protocol developed to manage devices
on an IP network. With SNMP the available information is defined by Management
Information Bases (MIB). The format of SNMP data takes the form of a tree structure, with
each node in the tree being identified by a numerical Object IDentifier (OID). Each OID
identifies a variable that can be read or set via SNMP with an appropriate software. The
information in the MIBs is standardised.
2.2.1 SWR21x - MIB Structure
The SNMP MIB consists in distinct OIDs; each of them refers to a defined collection of
specific information used to manage devices on the Schneider Electric’ ring. The
Schneider Electric MIB uses three types of OID.
System:
Address Name
0 Ccitt
1 ISO
3 Org
6 DOD
1 Internet
2 mgmt
1 Mib-2
1 sys
1 sysDescr Schneider Electric Switch
2 sysObjectID Optical Link Status :
1 – No Default
2 – Default Rs
3 – Default Rp
4 – No Link
3 sysUpTime The time (in hundredths of a
second) since the switch was last
re-initialized.
4 sysContact
5 sysName SWR21
6 sysLocation
C264/EN AN/D30 Annex: SW Communication
RMON:
Address Name
0 Ccitt
1 ISO
3 Org
6 DOD
1 Internet
2 mgmt
1 Mib-2
16 Rmon
1 stat
1 etherstat
1 Port number (*)
9 etherStatsIndex etherStatsUndersizePkts
10 etherStatsIndex etherStatsOversizePkts
12 etherStatsIndex etherStatsJabbers
13 etherStatsIndex etherStatsCollisions
14 etherStatsIndex etherStatsPkts64Octets
15 etherStatsIndex etherStatsPkts65to127Octets
16 etherStatsIndex etherStatsPkts128to255Octets
17 etherStatsIndex etherStatsPkts256to511Octets
18 etherStatsIndexetherStatsPkts512to1023Octets
19 etherStatsIndexetherStatsPkts1024to1518Octets
*Port number: 1 to 4: standard ports
5 and 6: ports for redundant ring
2.3.1 LEDs
The table below indicates the function of each LED:
Upon power up the SWR21xx will go through a series of self-testing. The 5 “link LED” will
flash a few seconds.
2.4 Settings
2.4.1 Internal Jumpers
OPEN CLOSE
Always 254
123.086.254.045
IP Network Base Repeater number
C0422ENa
FIGURE 8: IP ADDRESS
NOTE: It is important to note that the Schneider Electric_Switch_manager
Software forces the third IP field to “254” value.
2.5 Connections
2.5.1 J14 Fault signal output
The optical ring is monitored. If one link come down the default is announced by the
contacts:
2 Common
Closed if Self-healing
C0121ENc
1 2
Main Links
« Dual Homing » B1
Links A et B A2 B2
A1
SWITCH SWITCH
Network A Network B
Dual Homing
Dual Homing 4
3
Main Links
3
4
6
C0423ENa
Annex: SW Communication C264/EN AN/D30
3.5.1 LEDs
The table below indicates the function of each LED:
Upon power up the SWD21 will go through a series of self-testing. The 5 “link LED” will flash
a few seconds.
3.6 Settings
Report to § 2.4.
C264/EN AN/D30 Annex: SW Communication
3.7 Connections
3.7.1 J14 Fault signal output
The optical health is monitored. If one link come down the default is announced by the
contacts:
2 Common
Closed if Self-healing
C0121ENc
5.2 Capability
5.2.1 Principle
Ethernet redundancy is usually managed by protocols that calculates another path to a
destination (by sending BPDUs) when the main link breaks. This could take from hundreds
of milliseconds to seconds.
5.2.2 Schneider Electric RSTP compatibility
The Spanning Tree Protcocol (STP) is a network protocol that ensures a loop-free topology any
bridged Ethernet local area network. The basic function of STP is to prevent bridge loops and the
broadcast radiation that results from them. Spanning tree also allows a network design to include
spare (redundant) links to provide automatic backup paths if an active link fails, without the
danger of bridge loops, or the need for manual enabling/disabling of these backup links.
RSTP is the Rapid Spanning Tree Protocol (RSTP). RSTP provides significantly faster
spanning tree convergence after a topology change.
5.2.3 Configuration constraints
Better performances are obtained with RSTP ports linked as EDGE ports configuration.
As in RSTP standard, detection of root switch failure is done in 3 “hello” times, which is 6
seconds if default “hello” times have not been changed. With SWS21 “hello” time is
configured at 2 seconds.
Only the simple star architecture is supported, this involves the dual start architecture, daisy
chain architectures and ring architectures are not allowed.
Sytem:
Address Name
0 Ccitt
1 ISO
3 Org
6 DOD
1 Internet
2 mgmt
1 Mib-2
1 sys
1 sysDescr Schneider Electric Switch
2 sysObjectID Optical Link Status :
1 – No Default
2 – Default Link A
3 – Default Link B
4 – No Link
3 sysUpTime xday yh :zm :zzs :yyms
4 sysName SWS21
Annex: SW Communication C264/EN AN/D30
RMON
Address Name
0 Ccitt
1 ISO
3 Org
6 DOD
1 Internet
2 mgmt
1 Mib-2
16 Rmon
1 stat
1 etherstat
1 Port number (*)
9 etherStatsIndex etherStatsUndersizePkts
10 etherStatsIndex etherStatsOversizePkts
12 etherStatsIndex etherStatsJabbers
13 etherStatsIndex etherStatsCollisions
14 etherStatsIndex etherStatsPkts64Octets
15 etherStatsIndex etherStatsPkts65to127Octets
16 etherStatsIndex etherStatsPkts128to255Octets
17 etherStatsIndex etherStatsPkts256to511Octets
18 etherStatsIndex etherStatsPkts512to1023Octets
19 etherStatsIndex
etherStatsPkts1024to1518Octets
*Numbering of ports in the MIB:
Port 1 to 4: RJ45 ports
Port 5 : Internal port
Port 6 : FPGA port
5.6.5.2 5.6.5.2 SNMP Software
Any MIB Browser Software (not provided) performs all the basic SNMP operations, such as
GET, GETNEXT, GETRESPONSE…).
5.7 Technical Data
5.7.1 SWS21 Range
LED FPGA LED Board Address LED Optical LINK A LED Optical LINK B
L 25 L 7 8 9 10 11 12 13 14 L123 L456
J 13 Link A
Link B
L15 L20
L16 L21
L17 L22
L18 L23
L19 L24
J3
J 12
RJ45
Port 4 to 1
J2
J 14
C 0517ENa
Upon power up the SWS21 will go through a series of self-testing.L25 is on during the FPGA
initialization and the 5 “link LED” (L15 to L19) will flash a few seconds.
Annex: SW Communication C264/EN AN/D30
5.9 Connections
5.9.1 Ethernet connection
5.9.1.1 Ethernet cable type
Only the cable insulated category 5 (FTP: Foil Twisted Pair) or insulated (STP – Shielded
Twisted Pairs) with RJ45 connectors must be used.
Pin Signal
A1 +5V
B1 +5V
C1 +5V
A3 GND
A6 GND
A9 GND
A15 GND
B5 GND
C6 GND
C9 GND
C15 GND
Connector N°
J3-1 Tx1
J3-2 Tx2
J3-3 Tx3
J3-4 Tx4
TOP
1 2 3 PIN STATE
1 Link A unhealthy
2 Commun
3 Link B unhealthy
C0518ENa
5.10 Settings
5.10.1 Internal Jumpers
OPEN CLOSE
5.10.1.1 JP1
JP1 is used to define the type of FPGA initialization:
Default configuration :
Initialization by Flash
Initialization by JTAG
Default 254
192.168.254.045
Each board number must be single and included between 1 and 127.
Board J10-1
address
jumper
J10-7
J12
J2
The redundant Ethernet star is based on optical inter-switch connection. The user has the
choice between using Multi-Mode Fiber optic for short distances or Single- Mode Fiber Optic
for long distances.
The table below describes the MICOM REU20x range, detailing the connectivity used.
6.1.2 Capability
6.1.2.1 PRP Architecture
The PRP protocol manages a redundancy network. Parallel Redundancy Protocol (PRP) is
data communication network standardized. Protocol allows systems to overcome any single
network failure without affecting the data transmission. In case of optical fiber connection
between two devices broken, the network continues to run correctly.
PRP protocol can be applied to most Industrial Ethernet applications since it is independent
of the protocols and provides seamless failover. It is implemented in the end devices and two
independent paths are configured to exist between these end devices. The LAN networks
(LAN_A, LAN_B) are completely separated and are assumed to be fail-independent.
Redundancy management interface: MiCOM REU20x (DAN on figure below) allows to track
the health of each LAN, and especially to detect failures early when the error rate increases.
It keeps for each port a counter of received messages and of messages received with an
error. The LAN statuses appear as SNMPv2 objects; this allows using the same tools for
managing the nodes and the bridges (see IEC-62439-3 MIB OID draft description).
Annex: SW Communication C264/EN AN/D30
Source
ETHERNET Link
B-Frame
DAN DAN
A-Frame
SAN
A-Frame B-Frame
DAN RedBox
SAN SAN
Destination
VDAN VDAN
DEVICE DESCRIPTION
The two LANs, named LAN_A and LAN_B are
identical in protocol at the MAC level, but they can
differ in performance and topology (Ring or Star)
LAN
The Dual Attached Node (DAN) is connected to both MiCOM REU20x
LANs. Each DAN has two ports that operate in
parallel.
DAN
RedBox
SAN
LAN Bridge
C264/EN AN/D30 Annex: SW Communication
Board Bus
TIMER FLASH SDRAM
POWER SUPPLY
FPGA
Alarm
RELAYs Port A Fiber Optic Optical Port A
connector Phy A
Transceiver A (100 MBits)
NIOS II
Port B Fiber Optic Optical Port B
Phy B (100 MBits)
Transceiver B
REU20x board implements redundant protocol defined by the IEC 62439-3 (PRP):
PRP for independent LAN attachment like dual star network topology
REU20x is protected from attack, damage or unauthorized access. The security layer
implemented by the Schneider’s Cyber Security is used as security management.
REU20x board has 1 x copper (RJ45) and 2 x optical connections (Multi-Mode or Single-
Mode). Internal LEDs and Alarm Contact are defined in standard to check that product
operates correctly.
Component Usage
TIMER Oscillator Master Clock
FLASH Memory for Saving FPGA firmware and board configuration
SDRAM Memory for Processor program execution
NIOS II 32-bit embedded RISC processor
RJ45 Connector Ethernet non redounded network 1 x MII port for connexion to the
HOST.
Optical Port A and B Ethernet redounded network 2 x MII ports for connexion to the
external redounded network.
LEDs Board and communication link status
Relays Alarm
The board has 2 Ethernet SFP FX ports. Fibber connector is a SFP slot and SFP modules
for LC 1310 nm. Board has one FX port in Single-Mode and one FX port in Multi-Mode.
Note: The two filter mask and filter MAC are configured with the embedded Web Server via
registries. The Accepted MAC (hex) transits into board.
6.1.5.2 SNMP v2
Simple Network Management Protocol (SNMP) is an Internet-standard protocol to manage
devices on IP networks. Devices that typically support SNMP include routers, switches,
servers, workstations, printers, modem racks, and more. SNMP v2 relies on a Management
Information Base (MIB) that contains information about parameters to supervise.
Various “SNMP Client software” tools can be used with the REU20x range.
Schneider Electric does not provide such tools.
Any MIB Browser Software performing the basic SNMP operations (such as GET,
GETNEXT, GETRESPONSE…) can work with the MiCOM range.
Connector type
WIRING RECOMMENDATION:
FOR SAFETY REASONS AND FOR COMPLIANCE WITH THE EUROPEAN
COMMISSION LOW VOLTAGE DIRECTIVE (2006/95/EC), THE AUTHORIZED
VOLTAGE RATING TO BE APPLIED ON THE "FAULT INDICATION RELAY" IS
LIMITED TO 75 VDC OR 50 VAC AND DOES NOT EXCEED 5 A.
6.2.3.3 Ethernet Management
6.2.3.4 Performances
6.2.3.5 Interoperability
The board is compliant with any standardized PRP equipment.
A
L1
L2
L4 L7
HOST L3
IP address
connector LEDs
RJ45 link
Alarm Connector
L5 L6
K1
Board settings Relays
connector
K2
6.3.1 LEDs
The PHY driven LEDs show the status and activity for Ethernet Links (L1,L2,L3)
The FPGA driven LEDS show the status and activity for board and protocol
(L4,L5,L6,L7)
At power up, board goes through a series of self-tests. LEDs will flash for a few seconds.
Note: Please refer on ANNEX Maintenance section for LEDs L1-L7 description and behavior.
The optical redundant links A and B are monitored. If one link comes down the default is
announced by relay contacts. The outputs of the two relays are connected to an alarm
connector. Two alarm contacts (see K1, K2 on Figure above) are used with one common
contact.
Annex: SW Communication C264/EN AN/D30
Note: Alarm connector is compliant with alarm connector on H15/H16 boards. For Connection
refer on section Fault Indication Contact.
6.4 Installation
6.5 Connections
1 2 3
WIRING RECOMMENDATION:
FOR SAFETY REASONS AND FOR COMPLIANCE WITH THE EUROPEAN
COMMISSION LOW VOLTAGE DIRECTIVE (2006/95/EC), THE AUTHORIZED
VOLTAGE RATING TO BE APPLIED ON THE "FAULT INDICATION RELAY" IS
LIMITED TO 75 VDC OR 50 VAC AND DOES NOT EXCEED 5 A.
Recommendation: If the equipment is located at a long distance (>100 m for RJ45) from the
communication equipment or multiplexer, or if the cables run through a noisy area, then
optical communication should be used to interconnect the IEDs and the communication
equipment.
6.5.2.1 RJ45 connector
The host port is dedicated to PC RJ45 link. The RJ45 port supports 100Base TX.
Looking at the RJ45 connector head on, flat side on bottom and side tab on top, then pin 1 is
on the left and pin 8 on the right.
Note: The maximum authorized cable length for 100BaseTx (without using a repeater) is 100
meters. Only the cable insulated category 5 (FTP: Foil Twisted Pair) or insulated (STP –
Shielded Twisted Pair) with RJ45 connector must be used.
FIGURE 28: OPTICAL FIBER - SFP LC SLOT, SFP LC MODULE AND LC FIBBER
6.6 Settings
Board settings (IP Address, Protocol mode, Filters…) are configured with the board
embedded Web Server.
6.7 Maintenance
6.7.1 Scope
This chapter describes the maintenance procedure for the REU20x.
6.7.2 Recommendation before maintenance operations
NOTE 1: BEFORE CARRYING OUT ANY WORK ON THE EQUIPMENT, THE USER
SHOULD BE FAMILIAR WITH THE CONTENTS OF THE SAFETY AND TECHNICAL
DATACHAPTERS (SCHNEIDER ELECTRIC SAFETY GUIDE: SFTY/4L M/C11 OR LATER
ISSUE) AND THE RATINGS ON THE EQUIPMENT'S RATING LABEL.
READING THE “SAFETY AND HANDLING” CHAPTER OF THIS DOCUMENT IS
MANDATORY BEFORE ANY MAINTENANCE OPERATION.
NOTE 2: All power supply connectors must be disconnected from the device prior to
any maintenance operation.
The REU20x has been designed for a life cycle of over 15 years.
REU20x is self-supervising and therefore requires less maintenance than previous products.
Most problems will lead to an alarm so that fast and appropriate action can be taken.
However, some periodic checks should be done to ensure the REU20x is operating correctly
and that the external wiring is in proper condition.
If the customer’s organization has a Preventive Maintenance Policy, then the recommended
product checks should be included in the regular program.
The minimum preparation is to obtain the commissioning Record Sheet of installed device in
order to check the product configuration and its history.
The user should also apply personal experience in addition to this manual.
On a first level, the product provides several methods to identify the context of the fault. The
main ones are provided by:
LEDs indication
6.8 Limitations
6.8.1 Fiber Optic budget calculations
Optical power is expressed in Watts. However, the common unit of power measurement is
the dBm, defined by the following equation: Power (dBm) = 10 log Power (mW) / 1 mW.
The fiber optic budget is the difference between the power emitted into the fiber and the
sensitivity (minimum amount of power required) of the receiver connected through the fiber
optic cable.
Link Power Budget = Transmitter Power (dBm) - Receiver Sensitivity (dBm)
Note: The values given above are only approximate ones. Always use cable and connector
losses as specified by the manufacturer.
6.10.2.2 Insulation
Group B
6.10.2.4 Climatic
6.10.2.5 Mechanical
Note: As the last international standard of IEC 62439-3 is in draft version, implementation of the IEC-
62439-3 MIB may be changed
Customer Care Centre
http://www.schneider-electric.com/CCC
Schneider Electric
35 rue Joseph Monier
92506 Rueil-Malmaison
FRANCE
Phone: +33 (0) 1 41 29 70 00
Fax: +33 (0) 1 41 29 71 00
www.schneider-electric.com Publishing: Schneider Electric
Publication: C264/EN T/D31 02/2016