DNP, 670 Series: Communication Protocol Manual
DNP, 670 Series: Communication Protocol Manual
DNP, 670 Series: Communication Protocol Manual
The software and hardware described in this document is furnished under a license and may be
used or disclosed only in accordance with the terms of such license.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit.
(http://www.openssl.org/) This product includes cryptographic software written/developed by:
Eric Young ([email protected]) and Tim Hudson ([email protected]).
Trademarks
ABB and Relion are registered trademarks of the ABB Group. All other brand or product names
mentioned in this document may be trademarks or registered trademarks of their respective
holders.
Warranty
Please inquire about the terms of warranty from your nearest ABB representative.
Disclaimer
The data, examples and diagrams in this manual are included solely for the concept or product
description and are not to be deemed as a statement of guaranteed properties. All persons
responsible for applying the equipment addressed in this manual must satisfy themselves that
each intended application is suitable and acceptable, including that any applicable safety or other
operational requirements are complied with. In particular, any risks in applications where a system
failure and/or product failure would create a risk for harm to property or persons (including but
not limited to personal injuries or death) shall be the sole responsibility of the person or entity
applying the equipment, and those so responsible are hereby requested to ensure that all
measures are taken to exclude or mitigate such risks.
This document has been carefully checked by ABB but deviations cannot be completely ruled out.
In case any errors are detected, the reader is kindly requested to notify the manufacturer. Other
than under explicit contractual commitments, in no event shall ABB be responsible or liable for any
loss or damage resulting from the use of this manual or the application of the equipment.
Conformity
This product complies with the directive of the Council of the European Communities on the
approximation of the laws of the Member States relating to electromagnetic compatibility (EMC
Directive 2004/108/EC) and concerning electrical equipment for use within specified voltage
limits (Low-voltage directive 2006/95/EC). This conformity is the result of tests conducted by ABB
in accordance with the product standard EN 60255-26 for the EMC directive, and with the product
standards EN 60255-1 and EN 60255-27 for the low voltage directive. The product is designed in
accordance with the international standards of the IEC 60255 series and ANSI C37.90. The DNP
protocol implementation in the IED conforms to "DNP3 Intelligent Electronic Device (IED)
Certification Procedure Subset Level 2", available at www.dnp.org.
Table of contents
Table of contents
Section 1 Introduction..............................................................................................................3
1.1 This manual................................................................................................................................................ 3
1.2 Intended audience.................................................................................................................................... 3
1.3 Product documentation.......................................................................................................................... 4
1.3.1 Product documentation set...............................................................................................................4
1.3.2 Document revision history................................................................................................................. 5
1.3.3 Related documents.............................................................................................................................. 6
1.4 Document symbols and conventions....................................................................................................7
1.4.1 Symbols.................................................................................................................................................. 7
1.4.2 Document conventions....................................................................................................................... 8
Section 5 Glossary.................................................................................................................. 45
5.1 Glossary.................................................................................................................................................... 45
Section 1 Introduction
1.1 This manual GUID-AB423A30-13C2-46AF-B7FE-A73BB425EB5F v19
The communication protocol manual describes the communication protocols supported by the
IED. The manual concentrates on the vendor-specific implementations.
This manual is intended for the communication system engineer or system integrator responsible
for pre-engineering and engineering the communication setup in a substation from an IED
perspective.
The system engineer or system integrator must have a basic knowledge of communication in
protection and control systems and thorough knowledge of the specific communication protocol.
Decommissioning
Commissioning
Maintenance
Engineering
Operation
Installing
Engineering manual
Installation manual
Commissioning manual
Operation manual
Application manual
Technical manual
Communication
protocol manual
Cyber security
deployment guideline
IEC07000220-4-en.vsd
IEC07000220 V4 EN-US
The installation manual contains instructions on how to install the IED. The manual provides
procedures for mechanical and electrical installation. The chapters are organized in the
chronological order in which the IED should be installed.
The commissioning manual contains instructions on how to commission the IED. The manual can
also be used by system engineers and maintenance personnel for assistance during the testing
phase. The manual provides procedures for the checking of external circuitry and energizing the
IED, parameter setting and configuration as well as verifying settings by secondary injection. The
manual describes the process of testing an IED in a substation which is not in service. The
chapters are organized in the chronological order in which the IED should be commissioned. The
relevant procedures may be followed also during the service and maintenance activities.
The operation manual contains instructions on how to operate the IED once it has been
commissioned. The manual provides instructions for the monitoring, controlling and setting of the
IED. The manual also describes how to identify disturbances and how to view calculated and
measured power grid data to determine the cause of a fault.
The application manual contains application descriptions and setting guidelines sorted per
function. The manual can be used to find out when and for what purpose a typical protection
function can be used. The manual can also provide assistance for calculating settings.
The technical manual contains operation principle descriptions, and lists function blocks, logic
diagrams, input and output signals, setting parameters and technical data, sorted per function.
The manual can be used as a technical reference during the engineering phase, installation and
commissioning phase, and during normal service.
The communication protocol manual describes the communication protocols supported by the
IED. The manual concentrates on the vendor-specific implementations.
The cyber security deployment guideline describes the process for handling cyber security when
communicating with the IED. Certification, Authorization with role based access control, and
product engineering for cyber security related events are described and sorted by function. The
guideline can be used as a technical reference during the engineering phase, installation and
commissioning phase, and during normal service.
The electrical warning icon indicates the presence of a hazard which could result in
electrical shock.
The warning icon indicates the presence of a hazard which could result in personal
injury.
The information icon alerts the reader of important facts and conditions.
The tip icon indicates advice on, for example, how to design your project or how to
use a certain function.
Although warning hazards are related to personal injury, it is necessary to understand that under
certain operational conditions, operation of damaged equipment may result in degraded process
performance leading to personal injury or death. It is important that the user fully complies with all
warning and cautionary notices.
• Abbreviations and acronyms in this manual are spelled out in the glossary. The glossary also
contains definitions of important terms.
• Parameter names are shown in italics.
For example, the function can be enabled and disabled with the Operation setting.
• Each function block symbol shows the available input/output signal.
• the character ^ in front of an input/output signal name indicates that the signal name
may be customized using the PCM600 software.
• the character * after an input signal name indicates that the signal must be connected
to another function block in the application configuration to achieve a valid application
configuration.
• Dimensions are provided both in inches and millimeters. If it is not specifically mentioned
then the dimension is in millimeters.
DNP3 is a communication protocol used between components in process automation systems. Its
main use is in utilities such as electric and water companies. Usage in other industries is not
common, although technically possible. Specifically, it was developed to facilitate communications
between various types of data acquisition and control equipment. It plays a crucial role in SCADA
systems, where it is used by SCADA master stations (aka Control Centers), RTUs, and IEDs.
GUID-F3F7289C-3344-492F-8779-D63CBF6B469A V1 EN-US
The DNP3 protocol was developed by Westronic based on the early versions of the IEC 60870-5
standard telecontrol protocol specifications. DNP is now governed by IEEE Std 1815-2012 IEEE
Standard for Electric Power Systems Communications - Distributed Network Protocol (DNP3)
www.dnp.org.
The protocol is based on the EPA, a simplified model of the ISO/OSI model. It specifies the data
link layer, the application layer and a transport pseudo-layer. To support advanced RTU functions
and messages larger than the maximum frame length as defined by the IEC document 60870-5-1,
the DNP3 data link is intended to be used with the mentioned transport pseudo-layer. As a
minimum, this transport layer implements message assembly and disassembly services.
Physical layer
Even though the standard does not specify the physical layer, it does however specify how to
operate in a networked environment and also suggests how to avoid collisions between
simultaneously sending devices.
Many implementations use serial communication based on RS-232, RS-485 or even fiber optics.
DNP3 can also be used over packet-oriented networks such as TCP/IP and UDP in which, for
example, Ethernet may be used. In this case DNP3 can be said to be tunneled over TCP/IP or UDP.
Additional information on the DNP3 physical layer is available at the DNP Users
Group at www.dnp.org.
• Exchange of Service data units (SDUs) between peer DNP3 data links
• Error notification to data link user
• Sequencing of SDUs
• SDU delivery quality.
Link-layer confirm usage is not recommended and the implementation is optional. The IED does
not request data-link layer confirmations for TCP/IP communication.
See the DNP technical bulletin TB1998-0402, section 3 for details at www.dnp.org.
Transport pseudo-layer
To support advanced RTU functions and messages exceeding the maximum data link frame
length, a transport pseudo-layer which implements message assembly and disassembly services
was adopted.
Transport functions:
• Fragmenting user data into one or more data link frames and transmitting the data to the
data link layer
• Assembling the data link frames received from the data link layer into user data
• Controlling all aspects of the data link excluding data link configuration
Transport responsibilities:
Application layer
The application layer is responsible for performing operations on data objects defined by the
device or on the device itself. These operations include returning actual values (read function),
assigning new values (write function) if the object represents control points, arming and
energizing the output point (select, operate or direct operate functions) and if counters are used,
reading actual values and clearing the counters. DNP3 uses the term point to identify an entity,
and these entities can be categorized into point-types, such as analogs or binaries. Points are
addressed by giving them an index number and an object is a formatted representation of data
from a point. These objects can be assigned to classes in order to organize events and current
values into categories. The DNP3 protocol defines four data classes to organize data reporting.
Communication modes
The IED supports four DNP3 communication modes.
• Quiescent operation
• Unsolicited report-by-exception operation
• Polled report-by-exception operation
• Polled static operation
This implementation of DNP3 is fully compliant with DNP3 Subset Definition Level 2, and contains
significant functionality beyond Subset Level 2. See the device profile for further information.
DNP3 TCP/IP link mode is supported by the IED. This implementation supports up to four different
masters communicating simultaneously with the IED. The IED is a listening endpoint
implementation and listens for connections from DNP3 masters on a configurable port,
TCPIPLisPort. The IED does not connect to masters, meaning that it is not a dual-endpoint
implementation.
It is possible to use both the connection establishment method based on the master IP address,
and the connection establishment method based on the port number. The identification and
association of the master is based both on the IP address of the master and the port number it
connects to. It is essential to make sure that the parameters TCPIPLisPort, MasterIP-Addr,
MasterIPNetMask, SlaveAddress and MasterAddress uniquely identifies one master from the other
masters.
The above is an important concept to grasp during commissioning so that no conflicts occur.
Therefore, it is strongly recommended not to change the MasterIPNetMask parameter to anything
else than its default 255.255.255.255 unless necessary. The parameter should not be mixed up with
the subnet mask of the IP configuration. The MasterIPNetMask can be used to allow to accept
connections from masters that do have dynamic IP addresses within a known range.
For example, if a master changes its IP address dynamically in the range of 10.10.10.1 and
10.10.10.254, the MasterIPNetMask could be set to 255.255.255.0 to allow for connections from
this range. If two masters share this dynamic range or share the same IP address, it is necessary to
separate them by having them connect to separate ports, for example, 20000 and 20001
respectively.
Also, SlaveAddress and MasterAddress must be correctly configured for each master. Otherwise,
the previously accepted connection is closed upon the reception of the first DNP3 message.
The IED supports the requirements of the standard to receive UDP broadcast messages on the
ports configured by UDPPortAccData.
As a default, the IED sends a keep-alive message in every 10 seconds according to the value of the
tKeepAliveT parameter. The time can be changed, and setting it to zero means that no keep-alive
messages are sent. It is important to know the hazards of disabling the keep-alive, and it is not
recommended to do so unless necessary. If the keep-alive messages are unwanted, it is better to
increase the value of tKeepAliveT so that it exceeds the master's poll rate.
If a master crashes or the communication links are broken and the master restarts, the TCP/IP
makes the IED believe that the connection still exists. Since the IED conforms to the
recommendations of the standard not to accept new connections when a connection already
exists to the particular master, the master will never be allowed to connect again. Another
parameter that concerns the TCP/IP connection status is tBrokenConTout. It determines how long
a session is active after a TCP/IP connection has been broken. After the time period, the session
becomes inactive and events are not stored. If the parameter is set to 0, events are stored until
the sequential buffers overflow. Note that if the parameter is set to zero, all events from start-up
until the sequential buffers overflow are saved even though no connection would have been
established.
DNP3 UDP-only mode is supported by the IED. When operating in UDP-only mode the parameters
UDPPortInitNUL and UDPPortCliMast must be configured.
If the parameter UDPPortCliMast is set to 0 the port number and master IP address is taken from
the previous request. It is important to have in mind when using this functionality that the
parameters MasterIP-Addr and MasterIPNetMsk need to be set to values that match the network
setup.
The system will only consider IP-address included in the range defined by MasterIP-Addr and the
MasterIPNetMsk as valid addresses to use then when responding.
Internal indications give information on certain status and error conditions within the outstation.
They contain 2 octets of data and are found in the application layer on an outstation response.
Each octet has 8 bit fields numbered 0 through 7 where bit 0 is the least significant bit. A code is
used to reference or specify a particular bit:
IINx.b - where x is a 1 for the first octet and x is a 2 for the second. b identifies the bit number.
See the DNP3 Specification Volume 3 Application Layer (Section 5 Detailed IIN Bit Descriptions) for
more detailed descriptions of IIN bits.
The IED supports unsolicited reports. Given the parameters UREvCntThold1, tUREvBufTout1,
UREvCntThold2, tUREvBufTout2, UREvCntThold3 and tUREvBufTout3, the IED can be configured to
report events either after a number of events of a certain class have been generated or when at
least one event of the class has been generated and the configured time-span has elapsed.
The event system has a rate limiter to reduce CPU load. Each channel has a quota of 10 events/
second. If the quota is exceeded the event channel is blocked until the event changes is below the
quota.
Binary input points, double-bit input points, counters and analog input points each have buffer
sizes of 1000 events.
DNP3 allows for operation on binary outputs via CROB. Direct Operate, Direct Operate with No
Acknowledgement as well as Select/Operate pairs are allowed. The protocol requires that a pair of
select and operate messages is completely alike and only one sequence number apart. This in turn
requires masters not to send any requests between the selected message and the operate
message, otherwise the operate request will be denied.
Select and Operate requests may contain multiple objects. The select/control buffer size is large
enough to hold 10 of the largest select requests possible.
Automation bit signals can be used to interpret and execute the count, on-time and off-time
parameters of a CROB. Thereby pulse trains of different characteristics and lengths can be
generated, and the outputs from the automation bits component can be connected to other
function blocks in PCM600.
Apparatuses can be controlled via DNP3. Open and close points to SCSWI are available for
mapping in PCM600. These points can then be written to by as CROBs, thereby opening or closing
the breaker. It is important to note that the control model, ctlModel, of the SCSWI is respected
when set to SBO Enh. If ctlModel is set to SBO Enh, direct operate commands from DNP3 are not
allowed. On the other hand, if ctlModel is set to Dir Norm, SBO commands from DNP3 are allowed.
Furthermore, the select timeout parameter tSelectTimeout in DNP3 should be set so that it
harmonizes with the tSelect parameter of the SCSWI. The shortest of the two parameters dictates
the timing of select/execute.
The output L_CAUSE of SCSWI can be used to get command response feedback. It is limited to
cover the command responses from the function specific command evaluation and keeps it
available until a new command is processed and responded to by the function. The causes that are
not always reflected on the output L_CAUSE, with description of the typical reason, are listed in
Table 2.
3.5.3 Binary output status points and control relay output blocks GUID-226B14A8-63D2-4CE3-9B44-ACB3B1F783B9 v2
While binary outputs status (BOS) points are included here for completeness, they are not often
polled by DNP3 masters. BOS points represent the most recent value from a command operation
for the corresponding control relay output block (CROB) point. BOS points are not recommended
to be included in class 0 polls.
As an alternative, it is recommended that actual status values affected by CROB points should be
mapped as BI or DI. Requesting CROBs on the Open and Close points of SCSWI operate the
breaker. The operation may take several seconds to complete. This means that a success response
from the operate command may have been returned from the CROB even though the operation is
still in progress. Therefore, the mentioned outputs from, for example, SCSWI need to be
monitored as a complement.
This implies that the binary output object should not be assigned to classes 1, 2 or 3. A read of the
binary outputs returns the last value written to that output.
DNP3 supports time synchronization of the IED via object numbers 50...52. Time synchronization
via DNP3 should only be used if time source with better accuracy is not available, for example, IRIG-
B, GPS or SNTP. For TCP/IP channels, the LAN procedure should be used, in which two separate
messages are transmitted from the master, record current time and write, see DNP3 Specification
Volume 5 for more information.
Parameters have to be set among the system wide time parameters as well as
among the individual DNP3 masters.
Each DNP3 master configuration block has a number of parameters that affect the time
synchronization. Only one master at a time is configured to set the time in the IED. Therefore, only
one master configuration block enables the DNPToSetTime and TSyncReqAfTout parameter. That
is, both parameters must have the same value and should only be set for one master at a time.
The tSyncTimeout parameter defines how long after a successful time synchronization the
NeedTime IIN bit has to be set. The tSyncReqAfTout parameter defines if the tSyncTimeout should
be used or not. Also, the IED supports both the new standard directive of use of UTC and local
time for backward compatibility (ExtTimeFormat). If UTC is selected, the time in the time
synchronization messages is expected to be in UTC, and vice versa.
It is important to note that 16-bit and 32-bit variations of analog inputs are transmitted through
DNP3 as signed numbers. The default analog input event buffer size is set 1000.
The four scaling options associated with analog input data reporting are None, Ratio,
Multiplicative and Divisor.
The ratio, multiplicative and divisor scaling methods use the first two arguments, souceMinVal
and sourceMaxVal, to define the source value range inside which the object is to be used. The
complete value range of the object is usually wanted even though the user could freely define the
source range.
Arguments three and four, destMinVal and destMaxVal, define the destination value range. In ratio
scaling, arguments destMinVal and destMaxVal define the corresponding range of the scaled,
reported DNP3 value.
DNPvalue=
(destMaxVal-destMinV Val)
(sourceValue - sourceMinVal) (sourceMaxVal - sourceMinVal) +destMinVal
GUID-9F985816-2268-412A-AE24-ED90EAC44AD7 V2 EN-US (Equation 1)
sourceValue
DNPvalue =
destMaxVal
GUID-35F9E774-67FF-4257-8BA1-6D2E2CB4EC57 V1 EN-US (Equation 3)
3.7.2 Analog input signal scaling for DNP3 master presentation GUID-CAC9E9AA-B58D-4A9E-9337-914BE52A9AB8 v5
The presentation of an analog value in a telecontrol protocol varies between the different
protocols and also with the age of the used protocol version. The range is from a simple 8 bit
integer up to a double precision floating point. Internally in the IED many calculations are floating
points.
PCM600 supports the re-scaling and the justification to the register presentation given by the
project demands.
Figure 3 presents a typical example of a signal flow in the IED from the CTs, VTs to the DNP3
master. The CT, VT is connected to the IED by the transformer module TRM. The SMAI function
block is a preprocessor to calculate, check the signals for further use in application function blocks
of type MMXU. MMXU calculates the RMS values for the most used analog signals like, V, I, P, Q, for
example. The RMS values are available in floating point presentation as output signals of function
blocks of type MMXU.
DNP3
Equation mode
’DEVICE PROFILE’
Reg. justification
Analog Input Points
TRM
or other
SMAI application DNP3 Comm.
master
functions demands Interface
DNP3
Source values Register length Destination Values
(Float, 32, 16, 12, 8 bit)
ANSI13000288-1-en.vsd
ANSI13000288 V1 EN-US
The IED supports all 32-bit and floating point variants without any additional scaling
configuration. This is given as long as the MaxSourceVal (as it is given in the IED as floating point)
is in the range of a 32-bit signed integer value (max. 32-bit = 2 147 483 648).
DNP3 AI scaling
DNP3 = YES
Float or
32 bit DNP3-Register =
16, 12 or 8 bit
Do AI scaling in
’DNP3 Value NO
for all AI types and variants = angle
Get MinDestValue and + 32 bit
MaxDestValue for CMT AI scaling
Configure A
’Configuration Table’
in CMT for all AI values
NO All
DNP3 clients
done
END
IEC08000407.vsd
IEC08000407 V2 EN-US
See the engineering manual for instructions on how to configure DNP3 with
PCM600.
The DNP3 point map is configurable in PCM600. All points in the IED may be remapped. In
PCM600, the unmapped points in the variables list on the left may be inserted to the active point
list on the right.
Point gaps may be inserted if wanted. However, too many and too big gaps are not recommended.
Point gaps cannot be read by the client.
Class assignment allows the events generated in the IED to be reported as DNP3 events. Some
configurations exceed the class assignment possibilities defined by the standard.
Binary outputs status (BOS) points exist only if the corresponding control relay output block
(CROB) point has been inserted in the active point list.
Fault record contains signals that provide information on the current disturbance that the user of
the FaultRecord has selected. It provides signals that help the user to iterate and browse through
the existing disturbances. All the signals that can be used to iterate the fault records can be
mapped as binary outputs in PCM600 and operated on with CROBs. All signals that provide
information on the current disturbance can be mapped as analog inputs and read by the master.
The DNP3 master navigates through the FaultRecord using the three signals:
When a new disturbance is recorded, and the outputs are mapped to one of the event classes,
events are generated, but the navigation in the FaultRecord is not affected. Hence, when the next
command is sent from the DNP3 master, the fetched position is relative to the last fetch done; the
position in the FaultRecord before the new disturbance occurred.
The output signals provide the fault record number, which is the number of the disturbance in the
LHMI or PCM600, the number of faults in the IED, the active setting group at the time of the
disturbance recording, the trigger signal identity, the time stamp at the trigger time as well as the
fault location and the fault type. In addition, the magnitude, angle, fault magnitude and fault angle
are provided for up to 30 of the analog channels connected to the disturbance recorder, and for
the last 10 analog channels, the calculated value at the trigger time is provided.
The DNP3 parameters for a specific IED can be accessed with PCM600 via Configuration/
Communication/Station Communication/DNP3.0. There is one general setting for DNP3
(Disabled/Enabled), available in function DNPGEN:1. This parameter must be Enabled for the other
parameters to have effect. Each communication channel has specific settings.
There are specific settings for the serial channel depending on if the serial optical or RS485
interface is used. Communication specific settings for the serial optical interface are available in
function OPTICALDNP:1 and communication specific settings for the RS485 interface are available
in function RS485DNP:1. There are specific settings for the master sessions, available in function
MSTSERIAL:1, when a master session occurs on the serial channel.
In function DNPGENTCP:1 the selection of physical ports for the protocol is configured. There are
specific settings for the TCP/IP channel, available in functions CH1TCP to CH4TCP and MST1TCP
to MS4TCP.
The channel blocks and the master blocks are separate but should be treated as pairs grouped
together with a number. For example, CH1TCP and MST1TCP should be treated as an entity during
engineering. The reason for this division is that it is conceptually possible to have multiple
masters talking on the same channel, for example, a serial link, and it is also possible to imagine a
single master switching between different channels, for example, different serial links.
UDPPortAccData defines the port on which the UDP datagrams should be accepted if the channel
is configured for networking. Default is 20000.
UDPPortInitNUL defines the master's destination port to which the initial NULL response should
be sent if the channel is configured for networking. Default is 20000.
UDPPortCliMast defines the master's destination port to which responses should be sent if the
channel is configured for networking. If the parameter is set to 0, the port number and master IP
address is taken from the previous request. Default is 0. There are specific settings for the master
sessions if the master session occurs on the serial channel or on the TCP/IP channels.
MasterAddress defines the DNP3 address that this master session uses for communication.
ValMasterAddr determines if the stack should validate the source address in receive frames. DNP3
frames contain both a source address field and a destination address field. If this parameter is set
to 0, the stack does not validate the source address and thus the frames whose destination
address matches the configured slave session are accepted. If this parameter is set to 1, both the
source and the destination addresses have to match before the frame is accepted.
When going down in baudrate, the size of the configuration on DNP must be
considered.
MasterIPNetMsk determines the subnet mask that should be used to mask with the IP address.
Obj2DefVar determines the default variation for Object 2, Binary Input Change Events.
Obj3DefVar determines the default variation for Object 3, Double Bit Inputs.
Obj4DefVar determines the default variation for Object 4, Double Bit Input Change Events.
Obj10DefVar determines the default variation for Object 10, Binary Output Status.
Obj20DefVar determines the default variation for Object 20, Binary Counters.
Obj22DefVar determines the default variation for Object 22, Binary Counter Change Events.
Obj30DefVar determines the default variation for Object 30, Analog Inputs.
Obj32DefVar determines the default variation for Object 32, Analog Change Events.
tApplConfTout specifies how long the slave waits for the application layer confirmation from the
master. This in combination with unsolRetryDelay or unsolOfflineRetryDelay determines how
frequently an unsolicited response is resent.
ApplMultFrgRes determines if the application layer of this master session in the slave is allowed to
send multi fragment responses.
ConfMultFrag determines if application layer confirmations are requested for non-final fragments
of a multi-fragment response. Application layer confirmations are always requested for responses
that contain events.
UREnable determines if unsolicited responses are allowed. If set to 0, no unsolicited responses are
generated and requests to enable or disable unsolicited responses fail.
UREvClassMask specifies the initial or new state of the unsolicited event mask. This mask is used
to determine which event class or classes generate unsolicited responses. According to the DNP3
specification, unsolicited responses should be disabled until an Enable Unsolicited Response
request is received from the master. Thus, this value should generally be 0. However, some
masters do not generate the Enable Unsolicited Response message, in which case they must be
enabled here. Keep the value to 0 for all other purposes.
UROfflineRetry specifies the maximum number of unsolicited retries before changing to the
offline retry period. Up to 65535 retries can be specified. Set UROfflRetryDel to the same value as
URRetryDelay to define an infinite number of retries.
tURRetryDelay specifies in seconds the time to delay after an unsolicited confirm timeout before
retrying the unsolicited response.
tUROfflRtryDel specifies in seconds the time to delay after an unsolicited timeout before retrying
the unsolicited response if UROfflineRetry has been attempted. To disable retries after
UROfflineRetry, set this value to the maximum value of a stack timer: 31 days. This limits the
retries to one in every 31 days.
UREvCntThold1 If unsolicited responses are enabled, this parameter specifies the maximum
number of events in class 1 to be allowed before an unsolicited response is generated.
tUREvBufTout1 If unsolicited responses are enabled (UREnable), this parameter specifies the
maximum amount of time in seconds before an unsolicited response is generated after an event in
class 1 has been received.
UREvCntThold2 If unsolicited responses are enabled (UREnable), this parameter specifies the
maximum number of allowed class 2 events before an unsolicited response is generated.
tUREvBufTout2 If unsolicited responses are enabled (UREnable), this parameter specifies the
maximum amount of time in seconds before an unsolicited response is generated after an event in
class 2 has been received.
UREvCntThold3 If unsolicited responses are enabled (UREnable), this parameter specifies the
maximum number of allowed class 3 events before an unsolicited response will be generated.
tUREvBufTout3 If unsolicited responses are enabled (UREnable), this parameter specifies the
maximum amount of time in seconds before an unsolicited response is generated after an event in
class 3 has been received .
DelOldBufFull If this parameter is set to 1, the event with the earliest timeStamp is deleted when a
new event is added to the full event queue.
DNPToSetTime determines if time synch messages received for this master session (slave) are
allowed to set the local time in the IED.
tSynchTimeout sets the periodicity for time requests. That is, it defines how long after a
succeeded time synch message from the master, the IIN.4 bit should be set.
TsyncReqAfTout determines if the stack should start with the IIN.4 bit set.
Averag3TimeReq determines if the IED needs three time synch messages to set the time. If set, the
IIN.4 bit is high until three time synch messages are received. The average of the two best
messages are used to set the time.
PairedPoint enables the Object12 Close request on an even-index point to access the next-index
point.
tSelectTimeout specifies the maximum amount of time that a select remains valid before the
corresponding operate is received.
The master subnet mask must not be changed unless the master gets its IP-
address dynamically assigned via, for example, DHCP. For details see, DNP3 TCP/IP
mode
tBrokenConTout determines how long a session is active after a TCP/IP connection has been
broken. After that time period the master session becomes inactive and events are not stored. If
the parameter is set to 0, events are stored until the buffers overflow.
tKeepAliveT determines, in seconds, how often the DNP3 master session sends keep-alive
messages. Default is 10s.
• Two-wire
• Four-wire
A two-wire connection uses the same signal for RX and TX, and is a multidrop communication with
no dedicated master or slave. This variant requires however a control of the output. The four-wire
connection has separate signals for RX and TX multidrop communication with a dedicated master
and the rest are slaves. No special control signal is needed in this case.
DLinkConfirm determines when the stack should ask for link layer confirmations. Since DNP3
supports breaking an application layer message into multiple link layer frames, set to the
following based on the desired operation for a specific communication session:
tDLinkTimeout specifies the maximum amount of time to wait for a link level confirm if requested
(that is, if DLinkConfirm is Enabled). Even if DLinkConfirm is set to Never, this will be used for
linktest frame and request link status if they are sent.
DLinkRetries is the maximum number of link layer retries if data-link layer confirms time up.
tRxToTxMinDel is the minimum time (in seconds) after receiving a character, before another
attempt to transmit a character on this channel. This is generally useful when using a modem or
some other communication device that requires a minimum time between receive and transmit.
Stopbit defines the number of stop bits for the serial port.
Parity defines the parity to use for the serial port it can be set to:
tRTSWarmUp configures transmitter warm-up and warm-down delay times (in milliseconds). If
warm-up is configured to non-zero then at start of the send, the transmitter is Enabled. This
means that the line is driven but the data send of the start is delayed by the warm-up delay time.
tRTSWarmDown specifies that if warm-down is configured to non zero then at end of the send,
the transmitter deactivation is delayed by the warm-down time.
tBackOffDelay specifies that if the data send is started, a check is made if data is being received at
that time. If yes, a back-off timer is started and when it times out, a check is made again to see if
line is idle. If no, a new back-off timer is started. This is repeated until the line is idle and send can
start. Line idle is determined when nothing is received for more than a character time. The back-
off time consists of a configurable fixed time and a random time where the maximum random
time is also configurable. The back-off feature is always on.
tMaxRndDelBkOf specifies the configurable RS485 maximum back-off random time delay in
seconds.
The MSTSERIAL function includes the same settings as the MS1TCP to MS4TCP
functions, except the ChToAssociate setting which is used to select either the
serial optical or RS485 communication interface on hardware modules.
PID-6193-SETTINGS v5
PID-3715-SETTINGS v8
PID-6992-SETTINGS v1
PID-4106-SETTINGS v7
PID-4105-SETTINGS v7
PID-4131-SETTINGS v7
PID-4132-SETTINGS v7
PID-4133-SETTINGS v7
PID-6993-SETTINGS v1
PID-4135-SETTINGS v6
PID-4136-SETTINGS v6
PID-4137-SETTINGS v6
Section 5 Glossary
5.1 Glossary M14893-1 v18
AC Alternating current
ACC Actual channel
ACT Application configuration tool within PCM600
A/D converter Analog-to-digital converter
ADBS Amplitude deadband supervision
ADM Analog digital conversion module, with time synchronization
AI Analog input
ANSI American National Standards Institute
AR Autoreclosing
ASCT Auxiliary summation current transformer
ASD Adaptive signal detection
ASDU Application service data unit
AWG American Wire Gauge standard
BBP Busbar protection
BFOC/2,5 Bayonet fiber optic connector
BFP Breaker failure protection
BI Binary input
BIM Binary input module
BOM Binary output module
BOS Binary outputs status
BR External bistable relay
BS British Standards
BSR Binary signal transfer function, receiver blocks
BST Binary signal transfer function, transmit blocks
C37.94 IEEE/ANSI protocol used when sending binary signals between IEDs
CAN Controller Area Network. ISO standard (ISO 11898) for serial
communication
CB Circuit breaker
CBM Combined backplane module
CCITT Consultative Committee for International Telegraph and Telephony. A
United Nations-sponsored standards body within the International
Telecommunications Union.
CCM CAN carrier module