EMR Software-Version: 2.5.b. Protocol Implementation Extra Information for Testing (PIXIT) UCA International Users Group Testing Sub Committee

Size: px
Start display at page:

Download "EMR-5000. Software-Version: 2.5.b. Protocol Implementation Extra Information for Testing (PIXIT) UCA International Users Group Testing Sub Committee"

Transcription

1 EMR-5000 Software-Version: 2.5.b Protocol Implementation Extra Information for Testing (PIXIT) UCA International Users Group Testing Sub Committee

2 Contents of this document This document is applicable for EMR-5000 Version 2.5.b (Firmware-Build 23789). Each chapter specifies the PIXIT for each applicable ACSI service model as structured in IEC

3 PIXIT for Association model Description Maximum number of clients that can set-up 4 an association simultaneously TCP_KEEPALIVE value Lost connection detection time Is authentication supported? What association parameters are necessary 720 seconds, before keep-alive messages are sent 4 * 15 seconds (a lost connection is detected after 720 sec + 4*15 sec = 780 sec) Transport selector for successful association? Session selector Presentation selector AP Title If association parameters are necessary for association, describe the correct values e.g. AE Qualifier Transport selector 0001 Session selector 0001 Presentation selector What is the maximum and minimum MMS AP Title AE Qualifier Max MMS PDU size any any 64kB PDU size? What is the maximum startup time after a power supply interrupt? Min MMS PDU size 4000 max 300 seconds until HMI is operable max 30 seconds until protection and IEC61850 is operable 3

4 PIXIT for Server model Description Which analogue value (MX) quality bits are Validity: supported (can be set by server)? Good, Invalid, Reserved, Questionable Overflow OutofRange BadReference Oscillatory Failure OldData Inconsistent Inaccurate Source: Process Substituted Test Which status value (ST) quality bits are Validity: OperatorBlocked supported (can be set by server)? Good Invalid Reserved Questionable BadReference Oscillatory Failure 4

5 Description OldData Inconsistent Inaccurate Source: Process Substituted Test What is the maximum number of data values OperatorBlocked ot restricted; MMS PDU is the limit. in one GetDataValues request? What is the maximum number of data values ot restricted; MMS PDU is the limit. in one SetDataValues request? 5

6 PIXIT for Data set model Description What is the maximum number of data 60 elements in one data set (compare ICD setting)? How many persistent data sets can be created by one or more clients? How many non-persistent data sets can be 15 (If there are datasets defined in the SCL file, only the remaining amount can be created by the clients during run-time.) 15 created by one or more clients? 6

7 PIXIT for Reporting model Description The supported trigger conditions are (compare PICS) integrity data change quality change data update general interrogation The supported optional fields are sequence-number report-time-stamp reason-for-inclusion data-set-name data-reference buffer-overflow entryid conf-rev Can the server send segmented reports? Mechanism on second internal data change segmentation The last data value within buffer period will be reported. notification of the same analogue data value within buffer period (Compare IEC $ ) Multi client URCB approach Each URCB is visible to all clients (compare IEC $14.2.1) What is the format of EntryID? What is the buffer size for each BRCB or how Octet string, the last 4 bytes are used as counter bytes for each BRCB many reports can be buffered? Pre-configured RCB attributes that cannot be All RCB attributes can be changed online. changed online when RptEna = FALSE (see also the ICD report settings) 7

8 Description May the reported data set contain: - structured data objects? - data attributes? - timestamp data attributes? What is the scan cycle for binary events? Is this fixed, configurable? There is no scan cycle for binary events. Reporting works event driven Fixed 8

9 PIXIT for Generic substation events model Description What elements of a subscribed GOOSE source MAC address header are checked to decide the message is valid and the alldata values are accepted? If yes, describe the conditions. ote: the VLA tag may be removed by a ethernet switch and should not be checked destination MAC address Ethertype = 0x88B8 APPID gocbref timeallowedtolive datset goid t stum squm test confrev ndscom numdatsetentries 9

10 Description What is the behavior when one or more Reaction to received incorrect or missing GOOSE message: subscribed GOOSE messages aren t received or are syntactically incorrect (missing GOOSE)? wrong destination MAC address (1) Ethertype!= 0x88B8 (1) wrong gocbref (1) device reaction: 1. Messages will be ignored. 2. Status change will be ignored by the DUT and the quality is set as IVALID 3. Status change will be accepted by the DUT and the quality is set as QUESTIOABLE 4. Status change will be accepted by the DUT and the quality is set as GOOD timeallowedtolive exceeded (3) wrong datset (2) wrong goid (2) unexpected stum (3) unexpected squm (3) test flag set (1) wrong confrev (2) ndscom flag set (2) numdatsetentries!= data entries in received message (1) unexpected datatype in received message (2) numdatsetentries < expected (2) Remark: A quality change from invalid to numdatsetentries > expected (4) good (or questionable) is only done when receiving a new goose message (stum change) Can the test flag in the published GOOSE be turned on / off? What is the behavior when the GOOSE publish configuration is incorrect? Wrong GOOSE configuration in SCD-File is not possible, because it is checked when downloading it to the device. Changing the GOOSE configuration during runtime is not supported. 10

11 Description When is a subscribed GOOSE marked as message does not arrive prior to TAL lost? (TAL = time allowed to live value from the last received GOOSE message) What is the behavior when a subscribed GOOSE message is out-of-order? What is the behavior when a subscribed GOOSE message is duplicated? Does the device subscribe to GOOSE messages with/without the VLA tag? May the GOOSE data set contain: This means that the DUT receives unexpected squm and/ or stum. DUT reaction see item above. This means that the DUT receives unexpected squm and stum. DUT reaction see item above. with the VLA tag without the VLA tag Subscribed Published - structured data objects? - data attributes? - timestamp data attributes? What is the slow retransmission time? Is it fixed or configurable? What is the fast retransmission scheme? Is it fixed or configurable? 33 sec with TAL = 66 sec Fixed Fixed scheme retrans: retrans time before next message squm retrans TAL 0 32 msec 64 msec 1 32 msec 64 msec 2 64 msec 128 msec msec 256 msec msec 512 msec Can the Goose publish be turned on / off by using SetGoCBValues(GoEna)? TAL = Time Allowed to Live until 33 sec 66 sec 11

12 PIXIT for Control model Description What control modes are supported (compare PICS)? status-only direct-with-normal-security sbo-with-normal-security direct-with-enhanced-security sbo-with-enhanced-security Is the control model fixed, configurable and/or Fixed online changeable? Is Time activated operate (opertm) supported? Is operate-many supported? What is the behavior of the DUT when the test attribute is set in the SelectWithValue and/or Operate request? What are the conditions for the time (T) attribute in the SelectWithValue and/or DUT ignores the test value and execute the command as usual DUT ignores the time value and execute the command as usual Operate request? Is pulse configuration supported? What is the behavior of the DUT when the check conditions are set Is this behavior fixed, configurable, online DUT ignores the check value transmitted by IEC61850 and performs the check depending on the device settings. Behaviour is fixed changeable? What additional cause diagnosis are supported? Blocked-by-switching-hierarchy Select-failed Invalid-position Position-reached Parameter-change-in-execution Step-limit Blocked-by-Mode Blocked-by-process Blocked-by-interlocking 12

13 Description How to force a test-not-ok respond with Blocked-by-synchrocheck Command-already-in-execution Blocked-by-health 1-of-n-control Abortion-by-cancel Time-limit-over Abortion-by-trip Double select of the same object. SelectWithValue request? How to force a test-not-ok respond with Select request? How to force a test-not-ok respond with Operate request? DOns: SBOns: DOes: SBOes: Send an Operate with actual value to an unselected SBOes object. Which origin categories are supported? Values 0 8 are supported What happens if the orcat is not supported? DOns: SBOns: DOes: SBOes: Error message not supported Does the IED accept an selectwithvalue/operate with the same ctlval as the current status value? DOns: SBOns: DOes: SBOes: The DUT performs the check during the SelectWithValue phase. Does the IED accept a select/operate on the same control object from 2 different clients at the same time? DOns: SBOns: DOes: SBOes: 13

14 Description Does the IED accept a select/selectwithvalue SBOns: from the same client when the control object is already selected (tissue 334)? SBOes: Is for SBOes the internal validation performed during the SelectWithValue and/or SelectWithValue or Operate It depends on the performed validation step. Operate step? Can a control operation be blocked by Mod=Off or Blocked? Does the IED support local / remote operation? Is it possible to select more than one switch at the same time? The DUT allows to select only one switch at a time 14

15 PIXIT for Time and time synchronisation model Description What quality bits are supported? LeapSecondsKnown ClockFailure ClockotSynchronized Describe the behavior when the time synchronization signal/messages are lost When is the time quality bit "Clock failure" The quality bit ClockotSynchronized is set to TRUE after a fixed time period. ot supported set? When is the time quality bit "Clock not synchronised set? Is the timestamp of a binary event adjusted to the configured scan cycle? 90 seconds after receiving the last synchronization signal/messages (Timestamps of binary events lying in the past are not adjusted when the system clock is updated.) Does the device support time zone and daylight saving? Which attibutes of the STP response packet Leap indicator not equal to 3? are validated? Mode is equal to SERVER OriginateTimestamp is equal to value sent by the STP client as Transmit Timestamp RX/TX timestamp fields are checked for reasonableness STP version (3 and 4 accepted) 15

IEC 61850: Communication Networks and Systems in Substations

IEC 61850: Communication Networks and Systems in Substations IEC 61850: Communication Networks and Systems in Substations Sistemi e strumenti per l'automazione, A. Flammini, AA2011-2012 Background I: Power Grid Sistemi e strumenti per l'automazione A. Flammini,

More information

Verifying the IEC 61850 Configuration and Assessing the Communication Network during Commissioning

Verifying the IEC 61850 Configuration and Assessing the Communication Network during Commissioning 1 Verifying the IEC 61850 Configuration and Assessing the Communication Network during Commissioning Dr. Fred Steinhauser, OMICRON, Austria Abstract Although IEC 61850 is sometimes just called the "new

More information

DNP Master Ethernet Driver Help. 2015 Kepware Technologies

DNP Master Ethernet Driver Help. 2015 Kepware Technologies 2015 Kepware Technologies 2 Table of Contents Table of Contents 2 8 Overview 8 Channel Setup 9 Communications General 9 Timing 10 Device Setup 11 Communications 12 Polling 14 Unsolicited Messaging 16 Event

More information

IEC 61850 Communication Networks and Systems In Substations: An Overview for Users

IEC 61850 Communication Networks and Systems In Substations: An Overview for Users IEC 61850 Communication Networks and Systems In Substations: An Overview for Users Mark Adamiak, Drew Baigent GE Digital Energy Ralph Mackiewicz SISCO 1. Abstract Over the last decade, the digitization

More information

CONTROL MICROSYSTEMS DNP3. User and Reference Manual

CONTROL MICROSYSTEMS DNP3. User and Reference Manual DNP3 User and Reference Manual CONTROL MICROSYSTEMS SCADA products... for the distance 48 Steacie Drive Telephone: 613-591-1943 Kanata, Ontario Facsimile: 613-591-1022 K2K 2A9 Technical Support: 888-226-6876

More information

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying

More information

Exam 1 Review Questions

Exam 1 Review Questions CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

TOP Server DNP 3.0 Suite. Background & Best Practices

TOP Server DNP 3.0 Suite. Background & Best Practices TOP Server DNP 3.0 Suite Background & Best Practices Page 2 of 31 Table of Contents OVERVIEW 4 BACKGROUND 5 TECHNICAL DNP PROTOCOL INFORMATION 6 Master and Outstation Databases 6 Layering 7 Device Addressing

More information

ISIO 200. Binary Input/Output (I/O) Terminal with IEC 61850 Interface

ISIO 200. Binary Input/Output (I/O) Terminal with IEC 61850 Interface ISIO 200 Binary Input/Output (I/O) Terminal with IEC 61850 Interface Compact and Easy ISIO 200 Put your Binary I/Os where you need them ISIO 200 is a simple and versatile binary I/O terminal with IEC 61850

More information

MBP_MSTR: Modbus Plus Master 12

MBP_MSTR: Modbus Plus Master 12 Unity Pro MBP_MSTR 33002527 07/2011 MBP_MSTR: Modbus Plus Master 12 Introduction This chapter describes the MBP_MSTR block. What s in this Chapter? This chapter contains the following topics: Topic Page

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

How To Configure An Iec 60870-5 (Runtu) For A Testnet (Rntu)

How To Configure An Iec 60870-5 (Runtu) For A Testnet (Rntu) SCADAPack E IEC 60870-5-101/104 Slave Technical Manual 2 SCADAPack E IEC 60870-5-101/104 Slave Technical Manual Table of Contents Part I IEC 60870-5-101/104 Slave Technical 4 1 Technical... Support 4 2

More information

Internet Packets. Forwarding Datagrams

Internet Packets. Forwarding Datagrams Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed

More information

CPUs - CPU 315-2 PN/DP

CPUs - CPU 315-2 PN/DP Overview The CPU with a medium program memory and quantity framework High processing performance in binary and floating-point arithmetic Used as a central controller on production lines with central and

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

TSX ETY 110 Module 8

TSX ETY 110 Module 8 Module 8 Introduction Subject of this chapter What s in this Chapter? This chapter describes the implementation of a TSX ETY 110 module. This chapter contains the following sections: Section Topic Page

More information

Lab 11.5.6.1 Configure Syslog on AP

Lab 11.5.6.1 Configure Syslog on AP Lab 11.5.6.1 Configure Syslog on AP Estimated Time: 25 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, students will configure and use syslog logging to monitor

More information

Tutorial: Configuring GOOSE in MiCOM S1 Studio 1. Requirements

Tutorial: Configuring GOOSE in MiCOM S1 Studio 1. Requirements Tutorial: Configuring GOOSE in MiCOM S1 Studio 1. Requirements - Two (2) MiCOM Px4x IEDs with Version 2 implementation of IEC 61850 - Two (2) Cat 5E Ethernet cable - An Ethernet switch 10/100 Mbps - MiCOM

More information

Chapter 9 Monitoring System Performance

Chapter 9 Monitoring System Performance Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important

More information

IEC 61850 TRAINING PROGRAM

IEC 61850 TRAINING PROGRAM IEC 61850 TRAINING PROGRAM A True Hands-On Experience... Ver. 2.0 Date: January 2013 TRAINING OVERVIEW GridSoftware IEC 61850 Training Program is specifically built for conventional protection and control

More information

Time Synchronization & Timekeeping

Time Synchronization & Timekeeping 70072-0111-14 TECHNICAL NOTE 06/2009 Time Synchronization & Timekeeping Time synchronization lets you synchronize the internal clocks of all networked PowerLogic ION meters and devices. Once synchronized,

More information

SCADAPack E DNP3 Technical Reference

SCADAPack E DNP3 Technical Reference SCADAPack E DNP3 Technical Reference 2 SCADAPack E DNP3 Technical Reference Table of Contents Part I DNP3 Technical 4 1 Technical... Support 4 2 Safety... Information 5 3 Preface... 7 4 Introduction...

More information

OCS Training Workshop LAB14. Email Setup

OCS Training Workshop LAB14. Email Setup OCS Training Workshop LAB14 Email Setup Introduction The objective of this lab is to provide the skills to develop and trouble shoot email messaging. Overview Electronic mail (email) is a method of exchanging

More information

LAN Performance Measurements Lab

LAN Performance Measurements Lab LAN Performance Measurements Lab Token Ring and Ethernet Name: Date Experiment Performed: Group Members: Lan Performance Lab Ver 1.4, February 2004. - 1 - Introduction: The goal of this laboratory is for

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,

More information

Software Defined Networking (SDN) - Open Flow

Software Defined Networking (SDN) - Open Flow Software Defined Networking (SDN) - Open Flow Introduction Current Internet: egalitarian routing/delivery based on destination address, best effort. Future Internet: criteria based traffic management,

More information

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions

More information

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------ Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------

More information

Computer Networks. Chapter 5 Transport Protocols

Computer Networks. Chapter 5 Transport Protocols Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data

More information

Monitoring Ethernet Links in the First Mile

Monitoring Ethernet Links in the First Mile Monitoring Ethernet Links in the First Mile Roxana Stănică*, Emil Petre** * SC Polystart Security S.R.L., Craiova, Romania (e-mail: [email protected]) ** Department of Automatic Control, University

More information

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:

More information

Hagenberg Linz Steyr Wels. API Application Programming Interface

Hagenberg Linz Steyr Wels. API Application Programming Interface Hagenberg Linz Steyr Wels API Application Programming Interface Version 1.1 October 2015 FH OÖ Forschungs & Entwicklungs GmbH Franz-Fritsch-Strasse 11 / Top 3 4600 Wels Austria Research Center Hagenberg

More information

Lifecycle Service Tool. Operator's manual

Lifecycle Service Tool. Operator's manual REF 542plus 1MRS756725 Issued: 23.12.2008 Version: A/23.12.2008 REF 542plus Contents Copyrights... 5 1. Introduction...7 1.1. This manual... 7 1.2. Use of symbols... 7 1.3. Intended audience... 7 1.4.

More information

UG103.5 EMBER APPLICATION DEVELOPMENT FUNDAMENTALS: SECURITY

UG103.5 EMBER APPLICATION DEVELOPMENT FUNDAMENTALS: SECURITY EMBER APPLICATION DEVELOPMENT FUNDAMENTALS: SECURITY This document introduces some basic security concepts, including network layer security, trust centers, and application support layer security features.

More information

First Midterm for ECE374 03/24/11 Solution!!

First Midterm for ECE374 03/24/11 Solution!! 1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your

More information

Ethernet. Customer Provided Equipment Configuring the Ethernet port.

Ethernet. Customer Provided Equipment Configuring the Ethernet port. Installing the RDSP-3000A-NIST Master Clock. Ethernet Connect the RJ-45 connector to a TCP/IP network. Equipment The following equipment comes with the clock system: RDSP-3000A-NIST Master Clock Module.

More information

Sample Network Analysis Report

Sample Network Analysis Report Sample Network Analysis Report Report Information Report created on 1/9/2014 9:35:19 PM. Analyst Information Name Sample Analysis Report E-mail Address [email protected] Phone Number 408-378-7841 Client

More information

1MRK500-116-GEN June 2016 Integrated Engineering Tool IET600 Ver. 5.3 FP2 Release Note

1MRK500-116-GEN June 2016 Integrated Engineering Tool IET600 Ver. 5.3 FP2 Release Note Dear Reader, We are pleased to announce the release of IET600 Ver. 5.3.FP2. IET600 is allowing system engineers and integrators to define and configure the complete substation automation system according

More information

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

ETHERNET ENCRYPTION MODES TECHNICAL-PAPER

ETHERNET ENCRYPTION MODES TECHNICAL-PAPER 1 ETHERNET ENCRYPTION MODES TECHNICAL-PAPER The CN series encryption platform is designed to secure information transmitted over a number of network protocols. The CN series encryptors secure Ethernet

More information

isco Troubleshooting Input Queue Drops and Output Queue D

isco Troubleshooting Input Queue Drops and Output Queue D isco Troubleshooting Input Queue Drops and Output Queue D Table of Contents Troubleshooting Input Queue Drops and Output Queue Drops..1 Interactive: This document offers customized analysis of your Cisco

More information

UserLock advanced documentation

UserLock advanced documentation UserLock advanced documentation 1. Agent deployment with msi package or with the UserLock deployment module The UserLock deployment module doesn t deploy the msi package. It just transfers the agent file

More information

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol? Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

More information

CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012 CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012 Important: No cheating will be tolerated. No extension. CS 5480 total points = 32 CS 6480 total

More information

Industry White Paper. Ensuring system availability in RSView Supervisory Edition applications

Industry White Paper. Ensuring system availability in RSView Supervisory Edition applications Industry White Paper Ensuring system availability in RSView Supervisory Edition applications White Paper Ensuring system availability in RSView Supervisory Edition applications Rockwell Software, Visualization

More information

Analyzing Network Servers. Disk Space Utilization Analysis. DiskBoss - Data Management Solution

Analyzing Network Servers. Disk Space Utilization Analysis. DiskBoss - Data Management Solution DiskBoss - Data Management Solution DiskBoss provides a large number of advanced data management and analysis operations including disk space usage analysis, file search, file classification and policy-based

More information

B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com

B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com B-2 Analyzing TCP/IP Networks with Wireshark June 15, 2010 Ray Tompkins Founder of Gearbit www.gearbit.com SHARKFEST 10 Stanford University June 14-17, 2010 TCP In this session we will examine the details

More information

Exploring the Remote Access Configuration Utility

Exploring the Remote Access Configuration Utility Exploring the Remote Access Configuration Utility in Ninth-Generation Dell PowerEdge Servers The Remote Access Configuration Utility supports local and remote server management in ninth-generation Dell

More information

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,

More information

Alarms of Stream MultiScreen monitoring system

Alarms of Stream MultiScreen monitoring system STREAM LABS Alarms of Stream MultiScreen monitoring system Version 1.0, June 2013. Version history Version Author Comments 1.0 Krupkin V. Initial version of document. Alarms for MPEG2 TS, RTMP, HLS, MMS,

More information

Active-Active Servers and Connection Synchronisation for LVS

Active-Active Servers and Connection Synchronisation for LVS Active-Active Servers and Connection Synchronisation for LVS Simon Horman (Horms) [email protected] VA Linux Systems Japan K.K. www.valinux.co.jp with assistance from NTT Commware Coporation www.nttcom.co.jp

More information

Monitoring the NTP Server. eg Enterprise v6.0

Monitoring the NTP Server. eg Enterprise v6.0 Monitoring the NTP Server eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

More information

VOIP-211RS/210RS/220RS/440S. SIP VoIP Router. User s Guide

VOIP-211RS/210RS/220RS/440S. SIP VoIP Router. User s Guide VOIP-211RS/210RS/220RS/440S SIP VoIP Router User s Guide Trademarks Contents are subject to revise without prior notice. All trademarks belong to their respective owners. FCC Warning This equipment has

More information

C-more Remote Access, Data Log, FTP File Transfer, and Email Tutorial

C-more Remote Access, Data Log, FTP File Transfer, and Email Tutorial C-more Remote Access, Data Log, FTP File Transfer, and Email Tutorial P a g e 2 Introduction: This script will walk you through the basic process of setting up the remote access, data logging, FTP file

More information

GSM. Quectel Cellular Engine. GSM TCPIP Application Notes GSM_TCPIP_AN_V1.1

GSM. Quectel Cellular Engine. GSM TCPIP Application Notes GSM_TCPIP_AN_V1.1 GSM Cellular Engine GSM TCPIP Application Notes GSM_TCPIP_AN_V1.1 Document Title GSM TCPIP Application Notes Version 1.1 Date 2011-09-22 Status Document Control ID Release GSM_TCPIP_AN_V1.1 General Notes

More information

ACHILLES CERTIFICATION. SIS Module SLS 1508

ACHILLES CERTIFICATION. SIS Module SLS 1508 ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security

More information

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

McAfee Web Gateway 7.4.1

McAfee Web Gateway 7.4.1 Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this

More information

Local Interconnect Network Training. Local Interconnect Network Training. Overview

Local Interconnect Network Training. Local Interconnect Network Training. Overview Overview Local Interconnect Network Training History and introduction Technical features The ISO/OSI reference model and LIN Frames Message Frames Communication concept of LIN Command Frames and Extended

More information

UNIVERSIDADE DA BEIRA INTERIOR Faculdade de Engenharia Departamento de Informática

UNIVERSIDADE DA BEIRA INTERIOR Faculdade de Engenharia Departamento de Informática 1 1. This is a frequency evaluation test. 2. Read the questions carefully before answering. 3. Write your answers in the answer sheet provided. 4. Return only the answer sheet with your name, number and

More information

PageR Enterprise Monitored Objects - AS/400-5

PageR Enterprise Monitored Objects - AS/400-5 PageR Enterprise Monitored Objects - AS/400-5 The AS/400 server is widely used by organizations around the world. It is well known for its stability and around the clock availability. PageR can help users

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób) QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than

More information

FWS WiTDM Series KWA-O8800-I User Manual

FWS WiTDM Series KWA-O8800-I User Manual FWS WiTDM Series KWA-O8800-I User Manual Date: 2009 / 04 / 23 Version: 1.0 1 Copyright This user s manual and the software described in it are copyrighted with all rights reserved. No part of this publication

More information

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2 Firewall Server 7.2 Release Notes BorderWare Technologies is pleased to announce the release of version 7.2 of the Firewall Server. This release includes the following new features and improvements. What's

More information

Application Note 132. Introduction. Voice Video and Data Communications using a 2-Port Switch and Generic Bus Interface KSZ8842-16MQL/MVL

Application Note 132. Introduction. Voice Video and Data Communications using a 2-Port Switch and Generic Bus Interface KSZ8842-16MQL/MVL Application Note 132 Voice Video and Data Communications using a 2-Port Switch and Generic Bus Interface KSZ42-16MQL/MVL Introduction The IP-Telephony market is booming, due to the ease of use of the technology

More information

Chapter 6 Congestion Control and Resource Allocation

Chapter 6 Congestion Control and Resource Allocation Chapter 6 Congestion Control and Resource Allocation 6.3 TCP Congestion Control Additive Increase/Multiplicative Decrease (AIMD) o Basic idea: repeatedly increase transmission rate until congestion occurs;

More information

SimpleFTP. User s Guide. On-Core Software, LLC. 893 Sycamore Ave. Tinton Falls, NJ 07724 United States of America

SimpleFTP. User s Guide. On-Core Software, LLC. 893 Sycamore Ave. Tinton Falls, NJ 07724 United States of America SimpleFTP User s Guide On-Core Software, LLC. 893 Sycamore Ave. Tinton Falls, NJ 07724 United States of America Website: http://www.on-core.com Technical Support: [email protected] Information: [email protected]

More information

Quality of Service (QoS) on Netgear switches

Quality of Service (QoS) on Netgear switches Quality of Service (QoS) on Netgear switches Section 1 Principles and Practice of QoS on IP networks Introduction to QoS Why? In a typical modern IT environment, a wide variety of devices are connected

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]

More information

Tutorial on Network Management and Measurements. Tasos Alexandridis [email protected]

Tutorial on Network Management and Measurements. Tasos Alexandridis analexan@csd.uoc.gr Tutorial on Network Management and Measurements Tasos Alexandridis [email protected] Network management Simple Network Management Protocol (SNMP) AP s SYSLOG messages Network Measurements and Analysis

More information

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1 ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled

More information

(Refer Slide Time: 02:17)

(Refer Slide Time: 02:17) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,

More information

Lessons Learned Through Commissioning and Analyzing Data From Ethernet Network Installations

Lessons Learned Through Commissioning and Analyzing Data From Ethernet Network Installations Lessons Learned Through Commissioning and Analyzing Data From Ethernet Network Installations D. Dolezilek and J. Dearien Schweitzer Engineering Laboratories, Inc. Presented at the 5th International Scientific

More information

Device Log Export ENGLISH

Device Log Export ENGLISH Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,

More information

Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan

Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan Application Level Congestion Control Enhancements in High BDP Networks Anupama Sundaresan Organization Introduction Motivation Implementation Experiments and Results Conclusions 2 Developing a Grid service

More information

Configuring NetFlow. Information About NetFlow. Send document comments to [email protected]. CHAPTER

Configuring NetFlow. Information About NetFlow. Send document comments to nexus1k-docfeedback@cisco.com. CHAPTER CHAPTER 11 Use this chapter to configure NetFlow to characterize IP traffic based on its source, destination, timing, and application information, to assess network availability and performance. This chapter

More information

MiCOM S1 Studio V5.0.0 Release note #6

MiCOM S1 Studio V5.0.0 Release note #6 Note #6 02/04/2014 MiCOM S1 Studio V5.0.0 Release note #6 Release V5.0.0 This release provides a full installation of Schneider-Electric MiCOM S1 Studio V5.0.0. - It supersets version V4.0.1. - Please

More information

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) 2.2.2 (Ipam) 2-2.5-2 (Networking) 2 (Ipom) 2(2

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) 2.2.2 (Ipam) 2-2.5-2 (Networking) 2 (Ipom) 2(2 Workshop Presentation Chapter4 Yosuke TANAKA Agenda(Framing in Detail) Data Frames Control Frames type RTS Duration CTS Addressing (!!important!!) Variation on Data Frame Theme Applied Data Framing ACK

More information

Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started

Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started Webmail User Manual Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started Chapter 2 MAILENABLE KEY FEATURES OVERVIEW...

More information

C-more Remote Access with Apple ipad or iphone Tutorial

C-more Remote Access with Apple ipad or iphone Tutorial C-more Remote Access with Apple ipad or iphone Tutorial P a g e 2 Introduction: This script will walk you through the basic process of setting up the remote access with an Apple ipad with the Remote Access

More information

7.7 Ethernet Communication (AFPX-COM5)

7.7 Ethernet Communication (AFPX-COM5) 7.7 Ethernet Communication (AFPX-COM5) 7.7.1 AFPX-COM5 Overview The communication cassette AFPX-COM5 has an Ethernet interface at the COM1 port and a 3-wire RS232C interface at the COM2 port. The Ethernet

More information

Configuring a Leased Line

Configuring a Leased Line CHAPTER 4 Configuring a Leased Line The configuration in this chapter describes how to configure a Cisco 1700 router for IP and IPX over a synchronous serial line. Before You Begin The configuration in

More information

Using Industrial Ethernet Networks for PROFInet

Using Industrial Ethernet Networks for PROFInet Using Industrial Ethernet Networks for PROFInet Can I use ordinary Ethernet Switches for PROFInet? Yes and No Profinet communications use IEEE 802.3 Ethernet packets Profinet can be used for many different

More information

Route Discovery Protocols

Route Discovery Protocols Route Discovery Protocols Columbus, OH 43210 [email protected] http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF

More information

Command Line Interface

Command Line Interface bridge addressdatabase add Adding a Statically Configured Address to an Address Forwarding Database You can add a statically configured address to a forwarding database using the add command on the addressdatabase

More information

Expat kiss_fft gsoap smartgwt Linux Qt md5 zlig log 4cpp sqlite gcc/g++/libc/libc++ gwt

Expat kiss_fft gsoap smartgwt Linux Qt md5 zlig log 4cpp sqlite gcc/g++/libc/libc++ gwt 1 FAG Industrial Services GmbH Kaiserstraße 100 52134 Herzogenrath Germany +49 (0) 2407 9149-66 +49 (0) 2407 9149-59 [email protected] Web www.schaeffler.comservices All rights reserved.

More information

About Firewall Protection

About Firewall Protection 1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

Visualizations and Correlations in Troubleshooting

Visualizations and Correlations in Troubleshooting Visualizations and Correlations in Troubleshooting Kevin Burns Comcast [email protected] 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional

More information

11/22/2013 1. komwut@siit

11/22/2013 1. komwut@siit 11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)

More information

Use Case 29: Data Acquisition from External DMS Network Monitoring Subsystem

Use Case 29: Data Acquisition from External DMS Network Monitoring Subsystem Use Case Description DMS (T. Berry, Data Acquisition)-03 Use Case 29: Data Acquisition from External DMS Network Monitoring Subsystem Summary: This use case describes how an Energy Management System (EMS)

More information