104 Protocol ♦ IEC 60870-5-104 Server Contents
Protocol User Manual
ProSoft Technology, Inc. Page 4 of 126
Contents
Your Feedback Please ................................................................................................................ 2
How to Contact Us ....................................................................................................................... 2
Content Disclaimer ...................................................................................................................... 2
Important Installation Instructions ................................................................................................ 3
Agency Approvals and Certifications ........................................................................................... 3
Contents 4
1 About the PLX32 Gateway 6
1.1 Product Specifications ....................................................................................... 6
1.1.1 Internal Database ............................................................................................... 6
1.1.2 Hardware Specifications .................................................................................... 8
1.1.3 Port Physical and Protocol Specifications ......................................................... 9
2 ProSoft Configuration Builder 10
2.1 Setting Up the Project ...................................................................................... 10
2.2 Ethernet Configuration ..................................................................................... 12
2.3 CommonNet Data Map .................................................................................... 14
2.4 Downloading a File from PC to the gateway ................................................... 16
3 IEC-60870-5-104 (104S) Protocol Implementation 18
3.1 IEC 60870-5-104 Server .................................................................................. 19
3.1.1 SNTP CLIENT .................................................................................................. 20
3.1.2 IEC-870-5-104 ................................................................................................. 22
3.1.3 IEC-870-5-104 Priority ..................................................................................... 28
3.1.4 IEC-870-5-104 Database ................................................................................. 30
3.1.5 IEC-870-5-104 IP Addresses ........................................................................... 35
3.1.6 Window Parameters ........................................................................................ 36
3.1.7 Point List .......................................................................................................... 38
3.2 Monitor Direction and Control Direction: Point Definition ................................. 42
3.3 Using Monitor Points ........................................................................................ 44
3.3.1 Monitor Data Transfer ...................................................................................... 45
3.3.2 Monitor Points Addressing ............................................................................... 52
3.4 Using Control (Command) Points .................................................................... 57
3.4.1 Control Data Transfer ...................................................................................... 59
3.4.2 Command Points Addressing .......................................................................... 60
3.4.3 Examples ......................................................................................................... 65
3.5 Data Communication ....................................................................................... 67
3.5.1 Group Communication ..................................................................................... 67
3.5.2 STARTDT & STOPDT ..................................................................................... 69
3.5.3 TESTFR Requests ........................................................................................... 70
3.6 Events .............................................................................................................. 73
3.6.1 Deadbands ....................................................................................................... 74
3.6.2 Controlling the Generation of Events ............................................................... 79
3.6.3 Event Priority.................................................................................................... 81
3.6.4 Invalid Bit Monitoring ........................................................................................ 83
3.6.5 Time Information .............................................................................................. 86