CSC-2000(V2)Monitor System –Engineering Maintenance Manual                                                 Chapter III System Configuration
Chapter III System Configuration
Contents
1 LOCAL SETTING.........................................................................................................1
2 SYSTEM CONFIGURATION..................................................................................2
2.1   GRAPHICS PROPERTY.........................................................................................................................................3
2.2   OPERATOR CONFIG............................................................................................................................................3
2.3   LABEL EDITOR...................................................................................................................................................5
2.4   AUTOSTART CONFIG..........................................................................................................................................6
2.5   SUBSTATION PROPERTY......................................................................................................................................7
3 NETNODE MANAGER...........................................................................................8
3.1   NODE MANAGEMENT.........................................................................................................................................9
3.2   NODE APPLICATION CONFIG...............................................................................................................................9
4 USER MANAGER..................................................................................................11
4.1   USER MANAGEMENT.......................................................................................................................................11
4.2   USER GROUP MANAGEMENT...........................................................................................................................13
5 History Configuration..............................................................................................14
                                                                                                                                                     Chapter III 1
CSC-2000(V2)Monitor System –Engineering Maintenance Manual           Chapter III System Configuration
1 Local Setting
      Enter local setting by start menu shown as following figure.
                                                  Fig.1-1
      The interface of local setting is shown as follows. The local configuration is used to start/stop
      some functions of system and test whistle and bell. As the shown in the graphics, the function
      of start/stop here includes whistle and bell, alarm print, alarm voice, VQC Enable. Hook “”
      in front the item of function and after confirmation, the corresponding function can be started,
      otherwise, getting ride of “” means to stop the function.
                                                  Fig. 1-2
Chapter III 1
CSC-2000(V2)Monitor System –Engineering Maintenance Manual          Chapter III System Configuration
    It needs to note that the four items of local setting have direct relation with the start/stop status
    of dinout, printserver, voiceserver, VQC of node application config in netnode manager. Only
    in the working condition of these services in netnode manager, selecting corresponding function
    item in local setting can be effective. If the service in netnode manager is in prohibited status,
    even if the corresponding enable item has been hooked here, the relative service can not be
    acquired.
    No matter whether it is I/O card or sound signal to drive whistle and bell, the premise of bell
    and whistle is that guarantee the pitching on Enable function of bell and whistle here.
    If it needs to play voice file, it needs to guarantee the startup of voiceserver in a set of host in
    the system (refer to 3.2 chapter of node application config). At the same time, the enable
    function of alarm voice here has been pitched on.
2 System Configuration
    System configuration includes the configuration of graphics property, operate config, label
    editor, autostart config and substation property. Shown as following figure. Click
    Applications->System Manager,enter interface of system configuration.
                                                  Fig. 2-3
                                                                                              Chapter III 2
CSC-2000(V2)Monitor System –Engineering Maintenance Manual        Chapter III System Configuration
2.1 Graphics Property
      Open page box of graphics property of interface of system configuration, shown as following
      figure. Set the color of relative items of graphics topology coloring and marking color by
      interface. The purpose of coloring is easy to identify relative parameters by graphics’ colors,
      such as voltage class, whether wire is live or not.
                                                 Fig. 2-4
      If you want to change the color configuration of certain item, click the button of color of
      corresponding item to pop-up color palette, select needed color and confirm.
2.2 Operator Config
      Open page box of operator config of interface of system configuration shown as following
      figure. Set all operations in connection with telecontrol by the interface.
Chapter III 3
CSC-2000(V2)Monitor System –Engineering Maintenance Manual             Chapter III System Configuration
                                                    Fig. 2-5
2.2.1   Operate of Double Seat
     Pitching on the item means the operator and monitor personnel shall complete validation of
     operation of telecontrol authority in different computers. If there is no pitch-on, at this time,
     operator and monitor personnel need to complete validation operation of telecontrol right in
     sequence in one set of computer.
2.2.2   Fail-safe
     If fail-safe enable of full station is selected, system will inquire fail-safe service in telecontrol of
     breaker and switch equipment.
2.2.3   Station Lock
     Station lock is the judgment of digital input of telecontrol lock. If station lock is pitched on,
     when digital input prohibited telecontrol, system prohibits to telecontrol unconditionally. If
     there is no pitched-on station lock, when digital input prohibited telecontrol, system will
     automatically prompt operator “the current telecontrol is locked, continue telecontrol?” Of
     course, to realize above-mentioned function, require system have digital information points
     corresponding to digital inputs. The name of several digital information points has requirement.
     It is only “full station general block” or node name (node ID of node manager) + “lock”. The
     node name of computer distinguishes upper/lower case.
2.2.4   Don’t operate on SLD
     If pitching on this function, prohibiting telecontrol in the graphics whose type is Single-line
                                                                                                  Chapter III 4
CSC-2000(V2)Monitor System –Engineering Maintenance Manual             Chapter III System Configuration
      diagram and established in graphics edit (not only the established “Single-line diagram .graph”)
2.2.5    Password Valid Time
      It is the valid period of once inputting password by operator and monitor personnel in
      telecontrol operation, and in the period, it do not need to input again.
2.2.6    Configuration of Telecontrol Validation
      As to the equipment requiring telecontrol operation, such as breaker, isalotar, strap, tap raising,
      tap lowering, tap stop and general control, you can set validation of operate code, operator,
      guardian and operate select respectively according to the requirement. The validation of operate
      code is the validation of additional tag set in set box of operate property in real-time database
      configuration. If operate select validation is not pitch-on, that is, operate select button of
      operate page turns grey when executing telecontrol operation, and operate select automatically
      executes without manual operation. If the operate select returns successfully, the executive
      button of operate lightens and can be operated, otherwise, it reports timeout. If it needs operate
      select validation, the operate select button of operate page is available. It must to click the select
      button to make operate select.
2.3 Label Editor
      Open page box of label editor (in running SCADA, label is also called hanging board)of
      interface of system config shown as the following figure.
                                                    Fig. 2-6
      In order to meet different requirement of user in different places, system opens hanging board
      in electricity system. It can be defined by users themselves. Offer two configurations of “IED
      information can’t be received” and “Don’t operate”.
      Besides the requirement of defining name of board, it need to define corresponding graphics
      element of board . Click “Select Element”, select suitable mark graphics element for hanging
      board. (Make in element editor). When hanging board in running condition, it will display the
      content of mark graphics element for hanging board. The size of board can adjust the default
      size in graphics edit component.
Chapter III 5
CSC-2000(V2)Monitor System –Engineering Maintenance Manual        Chapter III System Configuration
    “IED information can’t be received” aims to interval. When the board hung in certain
    equipment pitches on the configuration, the report of the bay which this equipment belongs to
    will not be disposed. The function mainly avoid that the large quantity of alarming in interval
    debugging phase influences the normal work of system. “Don’t operate” aims to equipment.
    When the board hung in certain equipment pitches on the configuration, the equipment here
    main means the breaker, switch, the system prohibits having operation of telecontrol to the
    equipment.
2.4 Autostart Config
    Open page box of autostart of interface of system config shown as following figure.
                                                Fig. 2-7
    Autostart means it can automatically start some applications and among them the “real-time
    alarming window” is default after the completion of user login.
    Here, the item of “QuickLauch” is a group of conventional shortcut collection defined
    according to the requirement of users. It can to open the relative applications expediently in
    required occasion by the interface of “QuickLauch”.
    The configuration of autostart is saved in local host, so the configuration of autostart each main
    station can be different.
    The common method is to configure monitor running window as autostart, thus, user can
    automatically enter single-line diagram after login.
                                                                                            Chapter III 6
CSC-2000(V2)Monitor System –Engineering Maintenance Manual           Chapter III System Configuration
2.5 Substation Property
      Open the page box of substation property of system configuration interface shown as the
      following figure.
                                                   Fig. 2-8
2.5.1    SafeDay
      The content here is the information of number of days of running in security in information bay
      in the left upper corner of the screen. If the system is secure without any fault, the value is
      increasing daily until the happen of fault and begins to count again after manually modify
      initialized value.
      After modification, it immediately reflects. It needs to note that the current host can
      immediately reflect the number of days of security running after modification, but other host
      can reflect modified number of days of running in security on the second day. If wanting other
      hosts to reflect immediately, only restarting the user desk in corresponding host is OK.
2.5.2    Bell and Whistle Using Speaker
      When it is event alarm, it is not by I/O card driving bell and whistle but playing local voice file.
      If the function is enabled to use, it can prohibit I/O process when configuring process in node
      application config.
2.5.3    IC Card
      User identity validation is realized by IC card and need to enable the function;
2.5.4    Fingerprint
      When user identity validation is identified by fingerprint, it needs to enable the function;
Chapter III 7
CSC-2000(V2)Monitor System –Engineering Maintenance Manual            Chapter III System Configuration
2.5.5   Fail-safe Integration.
     If it is pitched on, it is used to start embedded fail-safe function. If it is not pitched on, it means
     the fail-safe system is come from exterior manufacturer. Refer to relative chapters of engineer
     book and user book for the relative specific content of fail-safe integration. After the enable of
     integrated fail-safe function, it needs the enable of function of “fail-safe on using” of
     configuration page of operate of system configuration (2.2 of the chapter). Thus, judge logic
     rule of fail-safe when having telecontrol.
3 NetNode Manager
     Click Applications->System Manager->NetNode Manager,start node manager. Node manager
     is to administrate each host in the same network. It must enter by the identity of super user to
     administrate, and it is the same as latter user manager and process manager.
     The node manager has two pages shown as following figure: node management and node
     application config.
                                                    Fig. 3-9
3.1 Node Management
     Node management page displays some functions of showing node, adding network node,
                                                                                                 Chapter III 8
CSC-2000(V2)Monitor System –Engineering Maintenance Manual           Chapter III System Configuration
      deleting network node, showing node status and saving to database. The showing network node
      shows name, ID, two IP addresses of the node and so on. If adding a new computer into
      network, it can add a network node and then save to database. Editing node is also the same;
      The showing of the status of network node is to display whether the network connection of each
      computer in the network is normal or not.
      The records here are usually added automaticly after installation. If there is special requirement,
      of modifing the content and it needs to note: the ID of node is the name of added and modified
      computer (need to distinguish upper/lower case ,and can be acquired by DOS command
      “hostname”). The name of node is the description of computer and usually the same as node ID.
3.2 Node Application config
      Page of node application config is shown as following figure which is diveided into “Local
      Host App Config” and “Local Host Propetis Config”
                                                Fig. 3-10
3.2.1    Local Host Propetis Config
      Configuration the host whether it is operator and main operator station and refer to the
Chapter III 9
CSC-2000(V2)Monitor System –Engineering Maintenance Manual           Chapter III System Configuration
     explanation in graphics for the relative definition and explanation. Only the node set as operator
     and main operator station can make telecontrol operation. The difference between operator and
     main operator is exist only while the number of nodes of operator in system exceeds three and
     the telecontrol requires that operator and monitor personnel are in different computers. At this
     time, require one operator station to make telecontorl, thus monitor personnel monitors in main
     operator station.
3.2.2   Local Host App Config
     Displaying relative services requiring configuration. the status of service can be set as stop,
     start,wait, and refer to the explanation of graphics for the relative definition and explanation. It
     needs to note: as a rule, system required relative service can only be in work status in one set of
     host and backup in another host. System can only have topology in one node, so the toposerver
     of node can configure in one set of host. After the completion of configuration, it needs to re-
     start the system and then configuration effects.
     FailSafeServer:Start integarted fail-safe service or fail-safe interface of exterior manufacturer
     in the host. Among, configured file of integarated fail-safe service is config\wfserver.ini. The
     fail-safe configured file of exterior manufacturer is config\wfserver.sys ,and there is specific
     introduction to the specific application of fail-safe interface.
     VQC:          Start VQC process in the host;
     Dinout: If the computer is configured with I/O card and need to start the process; there is a
     configured file config\dinout.sys related to the process.It needs to configure the file after
     configurin this service. Refer to the explanationa and instruction to make corresponding
     modification in file when configuring;When sound signal to drive bell and whistle, the time of
     playing bell and whistle voice file can be configured in the file;
     DRServer: The host starts DR communication process. It is used to dispose the process of DR
     Reprot of Sifang Corporation;
     TopoServer:The process for disposing the coloring of network topology .
     IEC61850: If the system Enable 62850 relative equipments,I it needs to start the process.
     RTUServer : The service process for the Csc2100 system and RTU server, and there is a
     configured file config\trans300e.sys related to the process. After configuring the service, it
     needs to configure the file and refer to instruction and example in file to make corresponding
     modification of file when configuring;
     Cscentry: The service process for external issue of Csc2100 system. When it needs to transfer
     information to the third party, start the process, and there is a configured file config\cscentry.sys
     related to the process. When it is required, make corresponding modification according to the
     explanation and example in the file;
     PrintServer: Needing to start the process when the host is configured with printer;
     VoiceServer:Start the process when it needs to play voice file.
     Formula :        Complete resolution work of formual logic by host which starts formual
     calcualtioon service;
                                                                                              Chapter III 10
CSC-2000(V2)Monitor System –Engineering Maintenance Manual          Chapter III System Configuration
4 User Manager
      Click Applications->System Manager->User Manager , start user manager shown as follows.
      User manager is used administrate user and set the operation authority of each usergroup. The
      operation authority is divided into four classes which are superuser, engineer, opreator and
      viewer. It need to point that it must enter with the identity of superuser to take following user
      manager opeation, such as add, delete user or modify the existed authority of users.
                                                  Fig. 4-11
      Shown as the figure, user administration has two pages of marks: user management and user
      group management.
4.1 User Management
      Shown as above figure, the left is user management menu including four function buttons of
      adding user, deleting user, editing user and save to database; the right is the information of all
      users.
      1) Add user:Click “Add”, shown as following figure.
Chapter III 11
CSC-2000(V2)Monitor System –Engineering Maintenance Manual        Chapter III System Configuration
                                                Fig. 4-12
    Fill new user name in user name textbox and fill password in user password textbox and select
    its authority and then click “OK”, finally it needs to click “Save” to save the result to database
    and its display is shown as below figure.
                                                Fig. 4-13
    2) Delete User
                                                Fig. 4-14
    Click “Delete”, and the interface is popup as upper figure appears. Select deleting user in the
    pull-down list box and then click confirm to delete. Finally, click “Save” to save the result to
    database.
    3) Edit user : Firstly, pitch-on certain user and click “Edit” to modify the user name, user
        authority and its password and then confirm to complete. Finally, click “Save” to save the
        result to database.
                                                                                           Chapter III 12
CSC-2000(V2)Monitor System –Engineering Maintenance Manual           Chapter III System Configuration
4.2 User Group Management
                                                  Fig. 4-15
The left half part of user group management is four user groups and the right half part is the
configuration of authority of each user group shown as upper figure.
Firstly, click the user group which needs to set and then set each item in right side. In the options of
right side, the options of “Scada Running”, “Curve”, “DeviceMan”, ”RealTime Alarm”, “Report” ,
“Port Manager” in italic blue have subordinate options. Click to pitch on the option, all authorities of
subordinate options under the option will be endowed to user. If you want to endow authority of one
subordinate option to user, click the option with the right key of the mouse and appear the
configuration box of operation authority shown as following figure. Pitch-on operated item of user
group and confirm it.
Chapter III 13
CSC-2000(V2)Monitor System –Engineering Maintenance Manual        Chapter III System Configuration
                                                Fig. 4-16
5 History Configuration
    History configuration involves two files: config/config.sys and config/hisconfig.ini. The
    configured file adopts simple format of configuration file, that is format of “Property=value”. In
    the two files, config.sys is used to read the information of master and backup nodes which are
    necessary of dual history service. Hisconfig.ini is used to configure database type, database
    user, command, terminal port of master and backup and so on. Refer to the relative content of
    installation of Chapter II for the content of this part.
                                                                                           Chapter III 14