R8515J Courier Acc

download R8515J Courier Acc

of 40

Transcript of R8515J Courier Acc

  • 7/29/2019 R8515J Courier Acc

    1/40

    User Manual

    Courier Access Software

  • 7/29/2019 R8515J Courier Acc

    2/40

  • 7/29/2019 R8515J Courier Acc

    3/40

    User ManualCourier Access Software

    HANDLING OF ELECTRONIC EQUIPMENT

    A person's normal movements can easily generate electrostatic potentials of several thousand volts.

    Discharge of these voltages into semiconductor devices when handling electronic circuits can cause serious

    damage, which often may not be immediately apparent but the reliability of the circuit will have been

    reduced.

    The electronic circuits of ALSTOM T&D Protection & Control Ltd products are immune to the relevant levels of

    electrostatic discharge when housed in their cases. Do not expose them to the risk of damage by

    withdrawing modules unnecessarily.

    Each module incorporates the highest practicable protection for its semiconductor devices. However, if it

    becomes necessary to withdraw a module, the following precautions should be taken to preserve the high

    reliability and long life for which the equipment has been designed and manufactured.

    1. Before removing a module, ensure that you are at the same electrostatic potential as the equipment by

    touching the case.

    2. Handle the module by its front-plate, frame, or edges of the printed circuit board.

    Avoid touching the electronic components, printed circuit track or connectors.

    3. Do not pass the module to any person without first ensuring that you are both at the same electrostatic

    potential. Shaking hands achieves equipotential.

    4. Place the module on an antistatic surface, or on a conducting surface which is at the same

    potential as yourself.

    5. Store or transport the module in a conductive bag.

    More information on safe working procedures for all electronic equipment can be found in BS5783 and

    IEC60147-0F.

    If you are making measurements on the internal electronic circuitry of an equipment in service, it ispreferable that you are earthed to the case with a conductive wrist strap.

    Wrist straps should have a resistance to ground between 500k 10M ohms. If a wrist strap is not available,

    you should maintain regular contact with the case to prevent the build up of static. Instrumentation which

    may be used for making measurements should be earthed to the case whenever possible.

    ALSTOM T&D Protection & Control Ltd strongly recommends that detailed investigations on the electronic

    circuitry, or modification work, should be carried out in a Special Handling Area such as described in

    BS5783 or IEC60147-0F.

  • 7/29/2019 R8515J Courier Acc

    4/40Page 4

    Software Licence AgreementAll ALSTOM T&D Protection & Control Ltd programmes and textual works are protected by copyright and are supplied onthe condition that the Licencee of every copy of the programmes and text agreed to the Terms and Conditions of this LicenceAgreement. The Licencee (which expression includes a purchaser, or a receiver of the Suppliers software on loan) may beheld legally liable for any use of the programme(s), texts or documentations which is not in accordance with this LicenceAgreement, in certain circumstances this may involve criminal prosecution.

    The Supplier (which expression means ALSTOM T&D Protection & Control Ltd and its successors and assigns), inconsideration of a licence fee paid on its own or as part of a purchase price and the Licencees agreement to the Terms and

    Conditions of their Licence Agreement, agrees to grant, and the Licencee agrees to accept, a personal, non-exclusive, non-transferable licence to use the Suppliers computer programme(s), text and associated documentation, all hereinafter referredto as the Licenced Programme under the following Terms and Conditions:

    1 Scope of Use

    The Licencee is authorised to use the Licenced Programme in accordance with the Terms and Conditions of this LicenceAgreement for the Licencees own purposes on any single computer system that contains no more than one centralprocessing unit (CPU) other than pursuant to Clause 6 hereof. If the Licencee intends to use the Licenced Programmeon more than one CPU at a time, a separate set of Licenced Programme is required for each additional CPU. TheLicencee may make copies of the Licenced Programme in machine readable form for back-up and archive purposesonly, provided that the Licencee has no more than three full or partial copies in existence at any one time and that

    the original copyright notices and/or other legends are reproduced on each copy. No rights are granted to theLicencee other than expressed in this Licence Agreement.

    The Licencee agrees NOT TO:

    1.1 Export or re-export the Licenced Programme without the suppliers approval and the appropriate U.K. or foreigngovernment licences.

    1.2 Make, or permit the making of any copy or copies of the Licenced Programme other than back-up copies permittedunder this Licence Agreement.

    1.3 Reverse compile, reverse engineer, disassemble, modify, adapt, list, print or translate or otherwise tamper with thewhole or any part of the Licenced Programme(s).

    1.4 Transfer, assign, rent, lease, sell or otherwise dispose of, part with, or share the possession of the Licenced

    Programme(s).2. Duration

    This Licence Agreement becomes effective from the date of the acceptance by the Supplier of the order for theLicenced Programme and shall remain in force until terminated by the Licencee. This Licence Agreement will terminatewithout notice if the Licencee fails to observe any of the Terms and Conditions of the Licence Agreement. In the eventof a termination, the Licencee agrees to delete the Licenced Programme from any storage media that are the propertyof the Licencee and to return all complete and partial copies of the Licenced Programme together with all copies oftext and documentation to the Supplier.

    3 Confidentiality

    The Licenced Programme contains confidential information of the Supplier and all copyright, trade marks and other

    intellectual property rights in the Licenced Programme are the exclusive property of the Supplier.The Licencee SHALL NOT:

    3.1 Save as provided in the Licence Agreement copy the whole or any part of the Licenced Programme.

    3.2 Modify merge or combine the whole or any part of the Licenced Programme with any other software ordocumentation.

    3.3 Use the Licenced Programme on behalf of, or make available the same to, any third party.

    The Licencee SHALL:

    3.4 Keep confidential the Licenced Programme and limit users of the same to those of its employees agents and sub-

    contractors who either have a need to know or who are engaged in the use of the Licenced Programme.

    3.5 Maintain an up-to-date written record of the number of copies of the Licenced Programme and their locations andupon request forthwith produce such record to the Supplier, and

    3.6 Without prejudice to the foregoing take all such other steps as shall from time to time be necessary to protect theconfidential information and intellectual property rights of the Supplier in the Licenced Programme.

  • 7/29/2019 R8515J Courier Acc

    5/40Page 5

    3.7 The Licencee shall inform all relevant employees agents and sub-contractors that the Licenced Programme constitutesconfidential information of the Supplier and that all intellectual property rights therein are the property of the Supplierand the Licencee shall take all such steps as shall be necessary to ensure compliance by its employees agents andsub-contractors within the provisions of this clause.

    4 Warranty

    Subject to the exceptions set out in this clause and the limitations upon its liability in clause 5 below

    4.1 The Supplier warrants that the media upon which the Licenced Programme is stored will for a period of 90 days fromthe date the Supplier accepts an order for a Licenced Programme be free from defects in material design and

    workmanship and that the Licenced Programme will conform to the Suppliers specifications.4.2 Subject to clause 4.3 below the Supplier shall remedy any breach of the above warranties by the replacement of

    the Licenced Programme free of charge.

    4.3 The Supplier shall have no liability to remedy a breach of warranty where such breach arises as a result of:

    4.3.1 The improper use, operation, or neglect of the Licenced Programme, or the computer equipment it is used on.

    4.3.2 A modification of the Licenced Programme, or its merging in whole or in part with any other software.

    4.3.3 Any repair, adjustment, alteration or modification of the Licenced Programme by any other person than the Supplier,without the Suppliers prior written consent.

    4.4 Subject to the foregoing, all conditions, warranties, terms and undertakings, express or implied, statutory orotherwise, in respect of the Licenced Programme are hereby excluded.

    5 Limitations of Liability

    The following provisions set out the Suppliers entire liability (including any liability for the acts and omissions of itsemployees, agents and sub-contractors) to the Licencee in respect of any breach of its contractual obligations arisingunder this agreement and any representation, statement or tortious act or omission including negligence arisingunder or in connection with this Licence Agreement.

    5.1 Any act or omission on the part of the Supplier or its employees agents or sub-contractors falling within clause 5 aboveshall for the purposes of this clause be known as an Event of Default.

    5.2 The Suppliers liability to the Licencees for death or injury resulting from its own negligence or that of its employeesagents or sub-contractors, shall not be limited.

    5.3 Subject to the limits set out in clause 5.4 below the Supplier shall accept liability to the Licencee in respect of damageto the tangible property of the Licencee resulting from the negligence of the Company or its employees, agents orsub-contractors.

    5.4 Subject to the provisions of clause 5.3 above the Suppliers entire liability in respect of any Event of Default shallbe limited to damages of an amount equal to:

    5.4.1 The case of an Event of Default falling within 5.3 above the purchase price of the Licensed Programme.

    5.4.2 The case of any other Event of Default the licence fee paid in respect of the Licensed Programme.

    5.5 Subject to clause 5.2 above the Supplier shall not be liable to the Licencee in respect of any Event of Default for lossof profits, goodwill or any type of special indirect or consequential loss (including loss or damage suffered by theLicencee as a result of an action brought by a third party) even if such loss was reasonably foreseeable or the Supplier

    had been advised of the possibility of the Licencee incurring the same.6 Multi-User

    The Supplier in consideration of an enhanced licence fee paid on its own or as part of a purchase price may authorisethe Licencee to use the Licenced Programme simultaneously on:

    6.1 Any single computer system that contains up to 5 central processing units (CPUs).

    6.2 Any single computer system that contains up to 10 central processing units (CPUs).

    7 General

    This Licence Agreement overrides all prior written and oral communications regarding the Licenced Programme withthe Licencee, and sets out the entire agreement between the Supplier and the Licencee. In the event of a disputebetween the Supplier and the Licencee relating to this Licence Agreement, the Licencee agrees to submit to thejurisdiction of the English Courts or to the Courts of other legal systems that may from time to time be elected at thesole discretion of the Supplier. If any provision in this Licence Agreement is ruled invalid under any law, such provisionshall be deemed modified or omitted only to the extent necessary to render it valid, and the remainder of this LicenceAgreement shall continue in full force and effect.

  • 7/29/2019 R8515J Courier Acc

    6/40Page 6

    Contents

    1. INTRODUCTION 8

    1.1 Purpose 81.2 System requirements 8

    1.3 Copyright 8

    2. INSTALLATION 9

    2.1 Installation to hard disk 9

    2.2 Executing the program 10

    2.3 Running under Windows NT4 10

    3. ACCESS OPERATION 11

    3.1 Screen layout 113.2 Using menus 11

    3.3 Status bar 12

    3.4 Program operation 13

    3.5 Quitting the program 13

    4. CONFIGURATION 13

    4.1 Communication options 14

    4.2 Screen display options 17

    4.3 Other options 174.4 Making options permanent 19

    4.5 Command line options 19

    4.6 Common communication problems 20

    4.6.1 Communication speed. 21

    5. USING MODEMS 22

    5.1 Modem implications 22

    5.2 Modem settings 22

    5.3 Modem string control codes 24

    5.4 Telephone numbers and dialling 25

    5.5 Special note for Motorola Codex 3265 modem 25

    6. ESTABLISHING NETWORK COMMUNICATION 26

    6.1 Scanning for relays 26

    6.2 Adding a relay manually 27

    6.3 Removing a relay 27

    7. ACCESSING RELAY MENUS 28

    7.1 Selecting a relay 28

    7.2 Viewing column headings 287.3 Viewing and refreshing a column 29

  • 7/29/2019 R8515J Courier Acc

    7/40Page 7

    Preface

    This document is the User Manual for the DOS-based Courier Access Software.The Courier Access Software is intended to be used during commissioning for

    initial configuration of Courier based relays. It allows the user to access andchange relay settings remotely using a PC and keyboard. This document is tobe used in conjunction with the K-Series MIDOS Overcurrent and DirectionalOvercurrent Relays Service Manual.

    8. ALTERING RELAY SETTING 30

    8.1 Reset cell 30

    8.2 Change setting 30

    8.3 Password protected cells 34

    8.4 Extracting setting files 34

    8.5 Printing setting files 34

    8.6 Downloading setting files 35

    9. MISCELLANEOUS 36

    9.1 Loading and saving files 36

    9.2. Viewing files 37

    9.3. Printing files 37

    9.4 Binary File Transfers 38

    10. VERSION HISTORIES 38

  • 7/29/2019 R8515J Courier Acc

    8/40Page 8

    Section 1. INTRODUCTION

    1.1 Purpose

    The Courier Access Software is a dedicated application software packagedesigned to run under DOS on an IBM or IBM compatible personal computer.It provides an interface for remote communication with ALSTOM T&D Protectionand Controls range of relays that implement the Courier CommunicationLanguage. It is intended for use during commissioning to allow initialconfiguration of relays when installing them into a system and for basic settingchanges.

    It utilises a standard RS-232 serial port of the PC to communicate usingIEC60870 and the Courier Language, either directly to IEC60870 based relaysor, via an interposing KITZ 101 protocol converter, to K-BUS based relays.Modems can also be used where the relays are sited remote from the PC. It caninterface to a maximum of 254 relays, although this is normally restricted to 32

    relays at a time (this being the maximum number of relays that can be connectedto one K-BUS spur directly).

    User input is done via the keyboard using the familiar system of pull down menusand windows to select various options and functions.

    1.2 System requirements

    To operate correctly, the Access Software requires:

    IBM PC/XT/AT/PS2 or true compatible.

    640 kB of main memory RAM.

    Graphics adaptor CGA, EGA , VGA or MDA.

    Serial adaptor port configured as COM1 or COM2 (for communication).

    Floppy disc drive 3.5".

    MS-DOS 3.2 or later/IBM PC-DOS 3.2 or later.

    Parallel printer port for optional printer.

    Additional equipment:

    Printer.

    RS-232 link.

    KITZ 101 K-Bus/RS232 communication interface.

    Modem

    1.3 Copyright

    Apart from back up purposes, this software may not be copied or otherwisereproduced without the express and written permission of the copyright holder,ALSTOM T&D Protection and Control Ltd. Any unauthorised copying orreproduction is illegal.

  • 7/29/2019 R8515J Courier Acc

    9/40Page 9

    Section 2. INSTALLATION

    2.1 Installation to hard disk

    The software is supplied ready to run from the installation disk in the \PROGRAMsub-directory with a default configuration under the MS-DOS operating system.For other configurations, and for use under the MS Windows operating system,it is recommended that the software is installed onto a hard disk using theinstallation programs provided.

    2.1.1 Installation under Windows or Windows NT

    If you have the Windows operating system installed, please use theWindows installation program to install the software.

    1. Insert disk 1 into drive A:

    2. From File Manager, select Run from the File menu and enter A:\SETUP.EXE asthe command line to be executed.

    3. The installation wizard will prompt you for a sub-directory to install thesoftware into. By default, this will be C:\COURIER, but you may change it toany other sub-directory as required.

    4. The installation will automatically create a program group in programmanager to allow access to the programs.

    5. You will be required to re-boot Windows after installation before theprogram can be used.

    2.1.2 Installation under MS-DOS

    Only use this installation method if you do not have Windows installed.1. Insert disk 1 into drive A:

    2. Make the installation drive active by typing the drive letter followed by acolon (:), and press ENTER, e.g. A:

    3. Type DOSSETUP and press ENTER.

    4. When asked for the drive to install the software onto (A-H), type the requiredletter and press ENTER.

    The installation program will create a sub-directory on the specified drive called

    \COURIER and copy the programs files into it.

    5. When prompted, insert disk 2 into drive A:

    6. Refer to the following section on Running under MS Windows.

    2.1.3 Modem Configuration

    The software can be used with or without a modem. It supports different modemsby allowing the modem control strings to be specified and customised fromwithin the program. During the installation process you may choose from severalpre-defined modem control strings for several popular modems. If your modemdoes not match any of those listed, select the 'Hayes compatible modem' option.The modem control strings can be later customised to your particular modemmodel with reference to section 5 of the User Manual.

  • 7/29/2019 R8515J Courier Acc

    10/40Page 10

    2.1.4 Printer Configuration

    The software can be used with or without a printer. It supports different printersby allowing the printer control strings to be specified and customised from withinthe program. During the installation process you may choose from several pre-defined printer control strings for some popular printers. If your printer does notmatch any of those listed, select the 'EPSON-compatible' option. The printercontrol strings can be later customised to your particular printer model with

    reference to section 4.3.3 of the User Manual.

    2.2 Executing the program

    The Courier Access Software is executed by typing ACCESS. The program willneed configuring before it can be used properly since it will need to know whichserial port you are using and if you are using a modem, amongst other things.For this reason, the background scanning for relays is initially turned off. Pleaserefer to Section 4 for configuration information. Once the software has beenconfigured, it will remember these settings the next time the program is used.

    2.3 Running under Windows NT4

    The Protection Access Software & Toolkit will run under Windows NT4 with thehelp of a file called KSERIAL.DLL. This file is installed automatically in the defaultdirectory (C:\COURIER) during the installation process. If this file cannot befound, or is of the incorrect version number, the Protection Access Software &Toolkit program will not load. There should be only one instance of KSERIAL.DLLlocatable in the search path, otherwise the first instance of KSERIAL.DLL foundwill be loaded, which will not necessarily be the correct version.

  • 7/29/2019 R8515J Courier Acc

    11/40Page 11

    Section 3. ACCESS OPERATION

    3.1 Screen layout

    The Courier Access programs screen is divided into 4 main areas, as depictedin the following screen shot:

    ALSTOM T&D Protection & Control Ltd

    Access

    Courier Access Software

    Help

    Num. Units = 0 0 BGND OFF

    Setting Units Options Quit

    TAEOD ONLINE

    About Program

    ALSTOM T&D Protection & Control Ltd

    Courier Access Software

    Change of Company name NT compatible

    (C) Copyright ALSTOM T&D Protection & Control Ltd

    Running under NT

    OK

    Figure 1. Main screen

    The top line of the screen is the title bar and displays the name and version of thesoftware program.

    Beneath this is a menu bar which is used to select the various options andfunctions available within the program. Each option in the menu will result infurther windows being displayed which will appear in the main area of thescreen.

    The bottom line of the screen comprises the status bar which indicates usefulinformation to the user about the status of the program and the network of relayswith which it is communicating.

    3.2 Using menus

    Menus are the main way of selecting options and functions from within theprogram as they are easy to use and present all available options to the user forselection.

    One option in each menu will be highlighted in a different colour to the restwhen it is selected. This highlight can be moved forwards from option to optionby using the RIGHT or DOWN cursor keys, and backwards by using the LEFT orUP cursor keys.

    A highlighted option can be selected by pressing the RETURN key. Options onthe main menu can be selected quickly by pressing the first letter of the optionsname. Most options on pull down menus can also be selected quickly by

    pressing the letter at the right-hand side of the menu against each option.The ESCAPE key is used to exit most menus and other dialog-type windows andwill abort any settings in a dialog box.

  • 7/29/2019 R8515J Courier Acc

    12/40Page 12

    Some dialog boxes use the TAB and shift-TAB keys to move from control tocontrol. A highlighted letter indicates a shortcut key to move directly to a control.Hold down the ALT key and press the highlighted letter at the same time to selectthe control.

    3.3 Status bar

    The status bar has four main areas as shown in the diagram below. Each area is

    explained in the following sections.

    Num. Units = 0 0 BGND OFF ONLINETAEOD

    Figure 2. Status bar

    3.3.1 Relay status

    At the left hand end of the status bar is an indication of the number of relays thatthe Access program is aware of being connected to the communication network.

    This is followed by a pair of square brackets surrounding the address of the relaywhich is currently being scanned in the background. Either a tick () a cross (X)or a letter E following these brackets will indicate whether the relay at thisaddress is communicating, not present, or in error, respectively.

    3.3.2 Status byte indicators

    The status byte indicators come next in the status bar which comprise the lettersTAEOD and are initially greyed out. These represent the logical-OR of some ofthe flags in the status bytes of all the relays currently being scanned on thenetwork, as depicted here:

    T Trip flag set

    A Alarm flag set

    E Event flag set

    O Out of service flag set

    D Disturbance record flag set

    For example, if any relay currently being scanned has any events ready to send,the E flag will be lit. (Event and disturbance record extraction are features of the

    Protection Access Software & Toolkit).3.3.3 Modem status

    The modem status indication is initially greyed-out. When the modem hassuccessfully established a connection it will show ONLINE in highlighted text.If the connection becomes broken, this indication will become greyed out again.

    3.3.4 Task state

    The last items on the status bar show the state of the arbitration logic whichmanages the contention on the communication network between the foregroundtask and the background task within the Courier Access program.This is explained in the following section.

  • 7/29/2019 R8515J Courier Acc

    13/40Page 13

    3.4 Program operation

    The Courier Access Software is a generic program designed to work with anytype of relay which supports the Courier communication language. As such, itinitially knows nothing about the communication network it is connected to andmust gather all necessary information by interrogating the relays attached to thenetwork.

    In order to do this, it is split into 2 tasks: a background task, which is responsiblefor identifying relays connected to the network, and a foreground task whichperforms all other communication functions manually requested by the operator.Only one task may have control of the communications at a time and this isindicated at the far right of the status bar by the words BACKGROUND orFOREGROUND. The background task normally has control of thecommunications, so the foreground task must request the use of thecommunications from the background task. This condition is indicated by theword REQUESTING in the status bar, followed by FOREGROUND when the

    background task has released the communications. The background task may bestopped and started from the menu. When it has control of the communications,but is currently stopped, the task state will be indicated as BGND OFF.

    The background task is partitioned into various tasks with the currently active tasknumber being shown preceding the word BACKGROUND in the status bar.This enables the program to time slice between background and foregroundtasks easily and keeps the response time to user input to a minimum.

    3.5 Quitting the program

    When quitting the program, there is a prompt to reset the password of allconnected relays before the program terminates. This ensures that no relay isunintentionally left in an unprotected state.

    The program will ensure any communication transaction is complete and anymodem connection is dropped before it finally exits.

    Section 4. CONFIGURATION

    The default configuration of the Courier Access program is set up with the correctparameters to communicate with the network of connected relays, under mostcircumstances. However, the background task is not initially enabled since thesoftware does not know whether a modem is connected. If there is no modembeing used, the background can be turned on and communication should startbetween the program and the relays. If modems are being used or relays cannotbe identified, the program will require further configuration.

    This section describes the configurable options available within the program tosuit various different network, PC and user requirements. These options (with 2

    exceptions) can all be found in the Units or Options menus.This section also provides some help on communication problem solving.

  • 7/29/2019 R8515J Courier Acc

    14/40Page 14

    4.1 Communication options

    The communication options are accessible by selecting the Comms... item in theOptions menu. This opens up a pop-up menu with the following options:

    COMMS

    S c a n T i m e S

    M a x R e t r i e s R M a x B usi e s BM a x E r r o r s EC o n n e c t i o n O1 0 / 1 1 b i t m o d e MB a u d R a t e A K I T Z s e t t i n g s KC o m m P o r t PC a n c e l ESC

    Timeout T

    Figure 3. Communication options menu

    4.1.1 Timeout

    {Default value = 10}

    The K-BUS communication network, for which the Courier Communicationlanguage was initially designed, uses the same pair of wires for bothtransmission and reception of messages. Courier, therefore, uses a master-slaveprotocol to prevent both a transmission and a reception occurring at the sametime and causing contention.

    Courier specifies that a slave device should reply to a request message within5 milliseconds of receiving it so that the network is not idle for long periods.The timeout setting specifies the length of time that the Access program will waitfor a reply to be returned from a relay before it assumes the relay is notresponding and can then issue a further transmission. This setting must accountfor the 5ms response time of the relay plus the total round-trip propagation delaytime of the network. This latter time is dependent upon the baud rate and anyintermediary communication routing such as microwave/satellite links or modemsand the telephone system.

    The consequence of setting this value too low is to cause message collisions onthe network, resulting in the Courier Access program receiving no replies fromany relay. Setting this value too high will only show an effect when a relay doesnot respond to a request as the program will wait longer than it needs to indetermining whether a response has been returned. It is therefore better to set thisvalue higher than lower. This is in multiples of 55ms periods, therefore thedefault value of 10 specifies 550ms.

    4.1.2 Scan time

    {Default value = 3}

    The Courier Access program scans each free address to determine if a relay ispresent by issuing a Reset Remote Link command and waiting for a response.

  • 7/29/2019 R8515J Courier Acc

    15/40Page 15

    This response is returned immediately from a relay if one is present and thereforethe program need not wait quite so long for the reply. This setting specifies thelength of time that the program will wait for a reply to be returned from a relaybefore it assumes there is no relay present. This setting may be reduced ifcommunicating only with fast response K-BUS relays, but may have to beincreased for slower relays operating over IEC60870 or modems. As a guide,the default value is typical for a baud rate of 19200. When using 1200 baud, a

    value of 7-8 is more appropriate. This setting is in multiples of 55ms, thereforethe default value of 3 specifies 165ms.

    4.1.3 Max retries

    {Default value = 10}

    If the Courier Access program does not receive a reply to a request within thegiven time-out period, it will try to send the message again up to the number oftimes stated.

    4.1.4 Max busies

    {Default value = 99}

    If a relay cannot formulate a reply to a request within the allotted 5 millisecondsresponse time, it will respond with a busy message. On detection of a busymessage, the Courier Access program will immediately poll the relay todetermine when the data is available. This setting governs the maximum numberof consecutive busy messages that the program will allow from a relay before atime-out warning message is issued. If busies are still being received after aboutthe first 5 responses, the program will slow down its polling of the relay to allow

    it a longer time to respond.4.1.5 Max errors

    {Default value = 10}

    This setting governs the maximum consecutive number of received messages inerror that the Courier Access program will accept and retry before it gives upand issues a time-out warning message.

    4.1.6 Connection

    {Default mode = LOCAL}This setting informs the Courier Access software of the presence of a modem.When set to LOCAL, it assumes a direct connection to the relay(s) and when setto MODEM it assumes there is a modem link between the Access program andthe relay(s).

    When set to MODEM, the background scanning will be disabled and theModem option will appear on the main menu. Selecting the Access option willautomatically initiate the modem dialling sequence if no prior connection hasbeen made.

    Changing this setting also adds or removes the Modem Menu from the mainmenu bar. Note that this change does not take effect until all the pop-up menusare closed.

  • 7/29/2019 R8515J Courier Acc

    16/40Page 16

    4.1.7 10/11 bit mode

    {Default mode = 11 bit Even parity for IEC60870}

    The IEC60870-5 ft1.2 specification calls for an 11-bit frame format consisting of1 start bit, 8 data bits, 1 even parity bit and 1 stop bit and should be used whenin LOCAL connection mode to increase the security of the communications.

    However, most modems cannot support this 11-bit frame format, so a relaxed 10-

    bit frame format is supported by the Courier Access program and by the KITZ101 consisting of 1 start bit, 8 data bits, no parity and 1 stop bit. This formatcan be used in these situations, but is non-preferred as it reduces the security ofthe communications. Where possible, modems should be used which support 11-bit frames.

    4.1.8 Baud rate

    {Default value = 19200}

    The baud rate specifies the speed of the communications between the Courier

    Access program and the KITZ 101 protocol converter (or directly connectedIEC60870 relay). 19200 baud is optimal but this can be set higher if possibleto increase the data bandwidth. This setting may be limited where modems arefitted, by the type and specification of modem. It should be noted that most PCsonly specify their serial ports up to 9600 or 19200 baud.

    Be aware that some PCs cannot handle communication speeds in excess of 9600baud, particularly 286 based PCs. If Communications cannot be established, trylowering the baud rate to 9600 or below, remembering to change the KITZoptions accordingly.

    4.1.9 Comm port

    The Access software can only communicate from one serial port at a time.This can be set to either COM1: or COM2:. No other serial ports are supported.

    4.1.10 KITZ settings

    It is important that the above configuration settings match those of the KITZ 101protocol converter (or IEC60870 relay) that is directly connected to the CourierAccess program. To help with this setup, this option shows a diagram of therequired switch settings on the front of the KITZ 101 for the current configuration.Note that these switches are only read by the protocol converter when the poweris applied to it. Please refer to the KITZ 101 User Manual for further informationon switch settings.

    4.1.11 Duplex mode

    When operating the program in local mode or via a modem, full duplex mode isnormally selected for the fastest response times. However, some modems, such asradio modems, can only support half-duplex links. For these devices the halfduplex mode should be selected.

    Whilst in half duplex mode, the program will raise RTS and wait for CTS to beraised before transmitting a message. RTS is lowered at the end of thetransmission. A remote KITZ 101/102 should be configured to enable its modem

  • 7/29/2019 R8515J Courier Acc

    17/40Page 17

    control lines by setting switch 5, when using half duplex mode. In this mode,CTS must be high in order for the KITZ to transmit, whilst DSR and DCD must behigh for the KITZ to receive.

    4.2 Screen display options

    The Courier Access program operates in text mode and will therefore work withall types of monitor. However, even in text mode, certain settings may need to

    be altered to improve the display. These can all be found in the Screen...option of the Options menu.

    SCREEN

    2 5 r o w s4 3 r o w s5 0 r o w sC o l o u rM o n o c h r o m eL c dC a n c e l E S C

    Figure 4. Screen options menu

    The default option is 25 lines in colour mode. If you have a monochromemonitor, you can choose between the Mono and LCD options which use 2slightly different colour schemes to ensure that all highlighted and reversecolours are distinguishable.

    43 line mode is available if you are using an EGA or VGA display card, while50 line mode is only available to VGA display users.

    4.3 Other options

    There are 4 more options in the Options menu that have not yet been covered.

    4.3.1 Start/stop background

    {Default value = STOPPED}

    Selecting this option will alternately enable and disable the background taskwhich performs the scanning for new relays. Detection of event, fault anddisturbance records in relays is faster if this mode is active, since the relays are

    polled on a regular basis. These will be indicated in the status bar, but themaster station software is required to access this information. When thebackground task is turned off, detection of these records will only occur whenan individual relay is accessed via browsing the menu.

    If a modem is connected, scanning will not occur unless the modem has made asuccessful connection, indicated by the word ONLINE being highlighted in thestatus bar.

    4.3.2 Scan mode

    {Default value = Scan All Relays}Selecting this option will allow switching between scanning all relays betweenthe Min Unit address and the Max Unit address and scanning only the relaysthat are currently shown in the Unit List.

  • 7/29/2019 R8515J Courier Acc

    18/40Page 18

    Selecting Scan Known after all relays have been identified will improve theoverall response times as the Access program will not be scanning freeaddresses that have no relays connected. Scan All should be used when newrelays are added to the system and when the Access program is loaded so that itcan identify all relays on the network.

    4.3.3 Printer codes

    The printer codes option allows editing of the codes sent to the printer to controlthe display of printed output. The Access program requires little in the way ofprinter controls and only the following 5 control codes are required:

    Begin Printing

    This control is sent whenever new data is sent to the printer, such as whenprinting a setting file. The codes here should set up the printer to display in therequired font, and set up any initialisation required.

    End Printing

    This control is sent at the end of printing. For laser printers these codes arerequired to eject the page from the printer.

    Start Condensed

    Setting files require 132 columns to display properly on a printer. These codesshould put the printer into a suitable mode to display 132 columns across thewidth of the paper, normally condensed mode.

    End Condensed

    These codes are sent after condensed printing to return the printer to the standard

    80 columns mode.End of Line

    These codes are sent at the end of every line. Some printers require just acarriage return character (13) whilst others also require a line feed character(10).

    Edit Printer Codes

    Begin Printing [27 69 27 38 107 50 71 27 38 115 48 67 27 40 49 4End Printing [27 69 13 10 ]Start Condensed [27 40 115 48 112 49 54 46 54 55 104 56 46 53 118End Condensed [27 40 51 64 ]End of Line [13 10 ]

    Figure 5. Printer codes editing screen

    Entering printer codes.

    A printer control may contain up to 50 codes, each separated by at least one

    space. Each code can be entered in either ASCII, octal, decimal or hexadecimalformat, but they will all be subsequently displayed in decimal format.

    ASCII characters should be preceded by an apostrophe, e.g. E

  • 7/29/2019 R8515J Courier Acc

    19/40Page 19

    Hexadecimal codes should begin with 0x e.g. 0x45*

    Octal codes begin with a leading zero e.g. 0105*

    Any other number is assumed to be decimal e.g. 69

    * (note leading zero is a number not a letter)

    Use the Up and Down cursor keys or TAB keys to cycle around the printercontrols. It may not be possible to see all of the controls at once, so they willscroll when necessary. Additional off-screen characters are indicated by anarrow at either end of the edit control. Cut and paste editing facilities areprovided between these edit controls and a clipboard. Text can be selected byusing the shift keys in combination with the Left, Right, Home and End keys.The following controls are available to cut and paste selected text to and from theclipboard.

    DEL clear selected text.

    Shift-DEL cut text to clipboard

    Ctrl-Ins copy text to clipboard

    Shift-Ins paste clipboard over any selected text

    4.3.5 Setting Datapath

    The datapath option enables you to change the default drive and directory wheredata files are loaded from or stored to. This includes disturbance records, eventfiles, polling tables and so no. Select the required default directory as describedin section 9 by selecting ANY file within that sub-directory. If the directory isempty, simply type in any valid filename. Pressing the ESCAPE key will abort theoperation.

    4.4 Making options permanent

    While most of the configuration options will take effect immediately, some onlytake full effect on program startup. To make these settings effective it is necessaryto save the options to a configuration file by selecting the 'Write Options' itemfrom either the Options menu or the Modem menu and then quitting andrestarting the program if required.

    All configuration and modem setting options are stored in the configuration filewhen the Write Options item is selected. The default configuration file is called

    'COURIER.INI' and is loaded from the current working directory when theprogram starts. However, the configuration file to be used can be specified onthe command line using the/i command line switch. Alternative configurationfiles can be created by saving the options in a different configuration file.

    Settings in the configuration file are overridden by any command line optionsspecified when the program is started.

    If the Courier Access program and the Protection Access Software & Toolkit arestored in the same sub-directory, they will share the same COURIER.INI

    configuration file unless this is overridden on the command line.4.5 Command line options

    The Courier Access software will respond to the following command line optionson startup which will override any default settings and settings stored in the

  • 7/29/2019 R8515J Courier Acc

    20/40Page 20

    COURIER.INI file. Each command line option must be preceded by a forwardslash / and separated from subsequent options by at least one space.

    /c 25 line display (CGA or better required)/e 43 line display (EGA or better required)/v 50 line display (VGA or better required)

    /b Black and white monitor

    /l LCD monochrome monitor/n Colour monitor

    /g Turns background polling off

    /com1 Use com1: serial port/com2 Use com2: serial port

    /0 Baud rate = 1200/2 Baud rate = 2400/4 Baud rate = 4800/9 Baud rate = 9600/1 Baud rate = 19200/3 Baud rate = 38400

    /ifilename Initial configuration file (can include complete path)

    4.6 Common communication problems

    The most common communication problem is establishing communicationbetween the Courier Access software and the KITZ as the RS-232 standard has

    many possible combinations. The following procedure should be followed toensure correct set up for a directly connected KITZ. (See also the next section ifmodems are involved).

    1. Set all communication options in the Courier Access software to appropriatevalues. Ensure you have set the baud rate, communication port and parity(10/11 bit mode) correctly and that the connection is set to LOCAL. Ensurethe background scanning routine is on by observing the changing values inthe bottom right of the screen. Write these options to disk, then quit andreload the program (without any command line options) to ensure that they

    have all taken effect.2. Display the KITZ switch setting screen (under the communication options) and

    verify that the KITZ has its switches set accordingly. (ALWAYS CHANGE THEKITZ SWITCH SETTINGS WITH THE POWER DISCONNECTED, THENRECONNECT THE POWER AFTER THE CHANGES HAVE BEEN MADE).Ensure the green LED on the KITZ 101 front panel is lit to indicate that theyhave all taken effect.

    3. Connect the KITZ to the PC using an appropriate RS-232 serial cable (only 3

    wires are required: TxD, RxD and Gnd - Refer to KITZ 101 User ManualR8521).

    4. Ensure that at least one LED is flashing on the KITZ. The IEC60870 Rx LEDwill light when it receives a valid message from the PC. The KBUS Tx LED

  • 7/29/2019 R8515J Courier Acc

    21/40Page 21

    should also light to indicate the message has been converted and output to theKBUS. If no LEDs are flashing, either:

    a. The Access software and KITZ do not have the same settings; refer to step 2above.

    b. The cable is wrong and requires pins 2 and 3 to be crossed over.Use a NULL MODEM device in the cable to swap these lines over.

    5. Ensure the KBUS cable is connected to the relays and the relays are switchedon. The Access program should be identifying the relays and will indicate thenumber it has detected in the lower left of the screen as Num Units = ?. If thisis still zero, check that the settings for the Min Unit and Max Unit addressescover the range of addresses of the connected relays and that the Scan Modeoption is set to All Relays. Also check each relay to ensure that each addressis within the range of the Min Unit and Max Unit addresses, that no relay hasthe address of 0 or 255 and that no two relays have the same address.

    6. If the relays are still not being identified, but the KITZ LEDs indicate replies are

    being received from the relays, check the communication options for timeoutsand scan time. Increase these values if necessary. Check the RS232 cable forbroken wires.

    4.6.1 Communication speed.

    It has been identified that some computers have problems communicating at thedefault baud rate of 19200 or higher. Indeed, some PCs serial ports are onlyspecified to work up to 9600 baud. This was particularly true when usingversions of the program prior to v3.1, which features a modification to improve

    the efficiency of the communication. If erratic communication or occasionalsoftware lock-up does occur, the following solutions are suggested:

    Progressively reducing the baud rate will in most cases eliminate thecommunication problems altogether. The following table shows suggestedbaud rate settings for some typical laptop computers. Similar settings shouldbe used for other similar types of computer.

    Machine Type Max. Baud Rate

    Toshiba T1950 CT 486 DX 19200

    T1900 486 SX 9600T1850 386 SX 4800

    Note that any changes to KITZ switch settings should be performed with thesupply removed in order for the changes to be effective the next time thesupply is restored.

    The program re-times the computers internal system clock interrupt rate inorder to perform higher resolution time tagging than is available with thestandard PC setup. By default, this provides a time-tagging accuracy of 10ms,

    but may be altered within the range of 550ms by manually editing theinitialisation file COURIER.INI. This can be edited using any suitable texteditor, such as the MS-DOS EDIT program. (Do not use a word-processingtype program as the file must be pure ASCII text with no extraneous control

  • 7/29/2019 R8515J Courier Acc

    22/40Page 22

    characters in it). Search for a line beginning timer_period and change thefollowing number to the required time tagging resolution. A value of 50should help reduce the number of communication problems. The program willneed to be restarted for this setting change to take effect.

    Section 5. USING MODEMS

    5.1 Modem implications

    ALSTOM T&D Protection & Control Ltd have adopted the IEC60870-5 ft1.2frame format for transmitting the Courier Communication language over RS-232based systems, which includes transmission over modems.

    The IEC60870-5 ft1.2 specification calls for an 11-bit frame format consisting of1 start bit, 8 data bits, 1 even parity bit and 1 stop bit. However, most modemscannot support this 11-bit frame format, so a relaxed 10-bit frame format issupported by the Access program and by the KITZ 101, consisting of 1 start bit,8 data bits, no parity and 1 stop bit.

    Although Courier and IEC60870 both have inherent error detection, the paritychecking on each individual character in the 11-bit frame provides additionalsecurity and is a requirement of IEC60870 in order to meet the error-rate levelsit guarantees. It is therefore recommended that modems should be used whichsupport these 11-bit frames. The following modems have been evaluated for usewith the full IEC60870 ft1.2 protocol and are recommended for use:

    1. Dowty Quattro (SB2422)

    2. Motorola Codex 3265 or 3265 Fast

    Other modems may be used provided that the following features are available,(refer to the modem documentation for details on setting these features):

    1. Must support an 11 bit frame (one start bit, eight data bits, even parity andone stop bit). This feature is not required if the 10-bit frame format is chosen.

    2. Must be possible to disable all error correction, data compression, speedbuffering or automatic speed changes.

    3. Must save all the settings required to achieve a connection in non-volatilememory. This feature is only required for modems at the outstation end of thelink.

    Notes 1. The V23 asymmetric data rate (1200/75bps) is not supported.

    2. Modems made by Hayes do not support 11 bit characters.

    5.2 Modem settings

    Many different makes of modem are available, each one having its own uniqueset of features and unique commands to control these features. The Hayes AT

    command set is probably the most widely used set of commands that is beingstandardised upon, although other command sets are also in use.

    To cope with all these standards, the Courier Access software provides 4 control

  • 7/29/2019 R8515J Courier Acc

    23/40Page 23

    strings which are set up for each individual modem and sent at appropriate timesin the dialog with the modem.

    I ni ti al is at io n st ri ng [ [d10 ]AT&F : [?OK] ]S tart string [ [D10] ]D ialling string [ [+DTR][+RTS]ATDT[#]:[?CON] ]Hang-up string [ [rts][?1]+++[?1][?OK]ATH0:[DTR][?OK] ]

    Modem Settings

    Press F1 for help on modem control codes

    Figure 6. Modem control code settings.

    Use the Up and Down cursor keys or TAB keys to cycle around the strings.It may not be possible to see all of the modem strings at once, so the strings willscroll when necessary. Additional off-screen characters are indicated by anarrow at either end of the edit control. Cut and paste editing facilities areprovided between these edit controls and a clipboard. Text can be selected byusing the shift keys in combination with the Left, Right, Home and End keys.The following controls are available to cut and paste selected text to and from theclipboard.

    DEL clear selected text.

    Shift-DEL cut text to clipboard

    Ctrl-Ins copy text to clipboard

    Shift-Ins paste clipboard over any selected text

    5.2.1 Initialisation string

    The Access program does not send this string except when manually told to doso by selecting the Initialise option in the Modem menu. This string is providedto set the modem up to operate in the required communications mode. It shouldassume nothing about the state of the modem and hence should start bydisconnecting the modem and then restoring the factory settings. Normally itwould end by saving the new settings to non-volatile memory in the modem.

    5.2.2 Start stringThis string is issued at the start of each modem transaction. It should assume themodem is disconnected and in the command state. It will typically restore thesettings saved by the initialisation string.

    5.2.3 Dialling string

    This string is used in conjunction with the appropriate telephone number to causethe modem to dial. A place marker [#] is inserted in the middle of the string toindicate where the telephone number should be inserted.

    5.2.4 Disconnection (Hang-Up) stringThis string is used to terminate a modem session. It should ensure that the modemhas hung-up and is in the command state.

  • 7/29/2019 R8515J Courier Acc

    24/40Page 24

    5.3 Modem string control codes

    In the Hayes AT command set, commands are sent by prefixing the charactersAT and terminating the command(s) with a carriage return. These can beentered directly into the modem string with a vertical bar | being used torepresent a carriage return. However, it is sometimes necessary to wait for themodem to perform the command and ensure the modem responds correctly.To perform these additional functions, modem controls can be inserted into the

    strings which are surrounded by square brackets.

    When editing modem setting strings, pressing the F1 key will present a list ofpossible control codes that can be used and their purpose. These are alsopresented below:

    [?1] Wait for 1 second

    [?2] Wait for 2 seconds

    [?5] Wait for 5 seconds

    [?10] Wait for 10 seconds

    [?OK] Wait for OK response

    [?CON] Wait for CONNECT ???? response

    [?] Wait for and discard any response

    [D0] No delay between control characters

    [D10] Delay 10ms between control characters

    [D20] Delay 20ms between control characters

    [D50] Delay 50ms between control characters

    [D100] Delay 100ms between control characters

    [+DTR] Activate DTR

    [-DTR] Deactivate DTR

    [+RTS] Activate RTS

    [-RTS] Deactivate RTS

    [P10] Select 10 bit mode (8 data, no parity)

    [P11] Select 11 bit mode (8 data,even parity)

    [#] Place holder for telephone number

    | Insert a carriage return

    The modem strings should be saved by selecting the Write Options menu item.

    The [?OK] and [?CON] commands will fail the commands if an invalid responseis returned from the modem. In the case of dialling, this will force the hang-upstring to be issued.

  • 7/29/2019 R8515J Courier Acc

    25/40Page 25

    5.4 Telephone numbers and dialling

    The program can store 60 telephone numbers, each with its own description.These can be edited under the Modem - Phone Numbers menu. Use the UP,DOWN, PAGE UP and PAGE DOWN cursor keys to select a phone numberentry. Enter the description and phone number for each entry required. The TABkey can be used to swap between the description and the telephone number.The RETURN key will advance to the next field. The list will scroll when necessary

    to view all the telephone numbers.

    It is suggested that the Hayes format for telephone numbers is followed, ie.

    0-9*ABCD Characters to dial (*#ABCD only accepted when tone dialling)P Use pulse diallingT Use tone dialling, Delay - typically 2 seconds! Hook flash - Short hang-up - needed to access some PBX features@ Wait for quiet answer

    W Wait for dial tone (typically) 2 secondsR Reverse dial - call an originate only modem (must be last character)

    When dialling, a telephone directory listing the first 10 stored telephone numberswill be presented; the remaining telephone numbers can be accessed by scrollingthe display using the UP, DOWN, PAGE UP and PAGE DOWN cursor keys.A telephone number can be selected by description using the cursor keys andwill be dialled when the RETURN key is pressed. The first 9 entries can also beselected using the appropriate function keys.The appropriate telephone number is shown in the editing line at the top of the

    window as each number is selected. Alternatively, a new number can be typedinto this window directly.

    The dialling sequence will automatically be entered when selecting the Accessmenu if the connection is set to Modem and the modem connection is not alreadyestablished.

    5.5 Special note for Motorola Codex 3265 modem

    It is not possible to select the 11-bit mode of the Codex modem directly from thePC, this must be done manually via the modem's front panel interface.

    If the software is configured for the Codex modem during the setup operation,the intialisation string should first be sent to it manually. This configures themodem and stores the settings in option group 1.

    To configure the modem for 11-bit operation using the front panel, step down themenu option (5 times) to "ACU OPT'S". Then step across (8 times) to the "CharLength" setting. Alter this to 11 bits and press the Enter key; followed by theReturn key twice to return to the default display.

    This setting should be saved in setting group 1 so that it can be restored by the

    PC next time the start string is used. To do this, step across from the defaultdisplay (4 times) to "Save Changes". Ensure this setting is set to 1 and press theEnter Key, followed by the Return key to return to the default display.

  • 7/29/2019 R8515J Courier Acc

    26/40Page 26

    Section 6. ESTABLISHING NETWORK COMMUNICATION

    The Courier Access software can only communicate to relays which are known toit. However, the communication system has been designed such that the Accessprogram can automatically identify all relays on the network at startup andtherefore it is not necessary to program it with network topology information inorder to start communicating with relays.

    Relays can also be added and deleted manually from the relay list.

    6.1 Scanning for relays

    In order to scan for relays, the background task must be enabled, the Scan Modeshould be set to All Relays and the Min Unit and Max Unit addresses should beset to cover the range of relay addresses that are to be scanned. In this mode,new relays can be detected automatically, interrogated for identification andadded to the known relay list.

    Once all relays have been detected, it is a waste of time to continually scan for

    more, since a network of relays would not normally change. Therefore the Scanmode should be set to Scan Known so that only the known relays will be polledfor data. During operation over modems, the background mode is usually turnedoff as well at this point, to achieve faster response to relay browsing and manualcontrols.

    6.1.1 Unit list window

    A list of all known relays is visible from the Unit - Display Unit List menu itemwhich shows or hides the known Unit List window. This window is updated as

    new relays are detected. A relay which exhibits a communication failure will bemarked with an E at the left hand side, which will disappear when normalcommunication is re-established.

    Relays which support the new Courier SetValue command will be marked withan asterisk '*' to the left of their address. These relays will exhibit fasterdownloading of setting files.

    ALSTOM T&D Protection & Control Ltd Courier Access Software

    Help

    Num. Units = 5[ 5] 1 BACKGROUND

    Setting Units Options Quit

    TAEOD ONLINE

    UNIT LISTAddr Description Plant Reference

    1 Demo Scheme Feed Feeder 12 Demo Scheme Feed Feeder 23 Demo Scheme Feed Feeder 34 Demo Scheme Feed Feeder 4

    5 Demo Scheme Feed Incomer

    Access

    Figure 7. Unit list window

  • 7/29/2019 R8515J Courier Acc

    27/40Page 27

    6.1.2 Changing a relays address

    All relays are supplied from the factory with address 255, since relays with thisaddress do not send any replies to messages and therefore this avoids theproblem of having two relays on the network with the same address. As part ofthe commissioning process, a relay is assigned a unique address. This can bedone manually on the front of the relay, or remotely via the Courier Accessprogram if the serial number of the relay is known.

    The relay can be given a specific address directly if care is taken to ensure theaddress is not already in use. (Automatic address generation is a feature of theProtection Access Software & Toolkit).

    To change the relays address from the Courier Access program, select the NewAddress option from the Unit menu. The serial number of the relay to be changedmust first be entered, followed by the current (old) address of the relay (enter 255if this is not known). Finally enter the new address of the relay.

    Note It is also possible to change a relays address remotely using the system

    data column cell. However, this use is not recommended since the relaysaddress will change before the correct reply code is sent from the relay.Therefore, the Access program will report that the setting was notaccepted when in fact it actually was.

    6.2 Adding a relay manually

    A relay address can be added to the known list of relays by hand which willmark that address as being used. The newly added relay will have nodescription or plant reference until the Access program next gets a valid

    response from the relay at that address, at which time it will automatically extractthis information from the relay.

    6.3 Removing a relay

    Relays that are removed from the network will remain in the known relay list asthe Access program cannot distinguish between a relay communication failure,loss of power to the relay or relay removal. If the relay has been permanentlyremoved, the address should be deleted manually.

  • 7/29/2019 R8515J Courier Acc

    28/40Page 28

    Section 7. ACCESSING RELAY MENUS

    Direct access to the menu of all relays connected is available via the Accessmenu. If the connection mode is set to MODEM the user will first be prompted forthe telephone number to dial before access is allowed to the relays.

    7.1 Selecting a relay

    A scrollable list of connected relays within the Min and Max Unit addresses willbe presented in a window. Each relay will be displayed with its address,description and plant reference for easy identification. A relay can be selectedfrom the list using a common list selection procedure which is used in all otherselection list type windows.

    ALSTOM T&D Protection & Control Ltd Courier Access Software

    Help

    Num. Units = 5[ 2] 1 BACKGROUND

    Setting Units Options Quit

    TAEOD ONLINE

    RELAY LISTAddr Description Plant Reference

    1 Demo Scheme Feed Feeder 12 Demo Scheme Feed Feeder 23 Demo Scheme Feed Feeder 34 Demo Scheme Feed Feeder 45 Demo Scheme Feed Incomer

    Access

    Figure 8. Selecting a relay

    The top relay in the list will be highlighted with a coloured bar.This highlighting bar can be moved up and down over the list of relays using theUP and DOWN cursor keys. If there are more relays than is possible to fit in thewindow, the list will scroll on reaching the bottom. The HOME and END cursorkeys can also be used to quickly move to the top or bottom of the list.

    When the required relay is highlighted, pressing the RETURN key will select itand interrogate the relay for a list of its menu column headings. If this issuccessful, they will be presented as a list in a further window. The ESCAPE keycan be used to return to the previous window.

    7.2 Viewing column headings

    The column headings are presented as a scrollable list in a window in a similarstyle to the list of relays. Selection of an individual column is achieved in thesame manner by moving the highlighting bar with the UP and DOWN cursor

    keys, and pressing the RETURN key on the desired heading. This will cause thetext and values for that column to be extracted from the relay. The ESCAPE keycan be used to return to the previous window.

  • 7/29/2019 R8515J Courier Acc

    29/40Page 29

    ALSTOM T&D Protection & Control Ltd Courier Access Software

    Help

    Num. Units = 5[ 5] 1 BACKGROUND

    Setting Units Options Quit

    TAEOD ONLINE

    RELAY LISTAddr Description Plant Reference

    1 Demo Scheme Feed Feeder 12 Demo Scheme Feed Feeder 23 Demo Scheme Feed Feeder 34 Demo Scheme Feed Feeder 45 Demo Scheme Feed Incomer

    1DemoSchemeFeedFeeder1Page Page Headings0000 SYSTEM DATA0100 FAULT RECORDS0200 MEASUREMENTS0300 MEASUREMENTS0500 EARTH FAULT0600 PHASE FAULT

    0700 EARTH FAULT0800 PHASE FAULT0900 LOGIC FUNCTIONS0A00 INPUT MASKS0B00 RELAY MASKS0C00 RECORDER 9000 DISTURBANCE REC.BF00 COMM SYSTEM DATA

    Access

    Figure 9. Selecting a column

    7.3 Viewing and refreshing a column

    A column of data from a relay is presented as a scrollable list in a window in asimilar style to the list of column headings. Menu cells in the column whichcontain data values will display the data value that was valid when the windowwas created; this list is not refreshed automatically and therefore contains a snapshot of the relays page of data. The column can be refreshed manually bypressing function key F5, or by returning to the previous window with theESCAPE key and then selecting the column again.

    ALSTOM T&D Protection & Control Ltd Courier Access Software

    Help

    Num. Units = 5[ 4] 1 BACKGROUND

    Setting Units Options Quit

    TAEOD ONLINE

    RELAY LISTAddr Description Plant Reference

    1 Demo Scheme Feed Feeder 12 Demo Scheme Feed Feeder 23 Demo Scheme Feed Feeder 34 Demo Scheme Feed Feeder 45 Demo Scheme Feed Incomer

    1DemoSchemeFeedFeeder1Page Page Headings0000 SYSTEM DATA0100 FAULT RECORDS0200 MEASUREMENTS0300 MEASUREMENTS0500 EARTH FAULT0600 PHASE FAULT0700 EARTH FAULT0800 PHASE FAULT

    0900 LOGIC FUNCTIONS0A00 INPUT MASKS0B00 RELAY MASKS0C00 RECORDER 9000 DISTURBANCE REC.BF00 COMM SYSTEM DATA

    Access

    ACCESS CELL LIST

    0000 SYSTEM DATA :0002 SYS Password0003 SYS Fn. Links : 00000000111101110004 SYS Description : Demo Scheme Feed0005 SYS Plant Ref. : Feeder 10006 SYS Model No. : KCGG14001D12CE A 0007 SYS Firmware Ref : 17KCGG14001XCE A

    0008 SYS Serial No. : 000001A 0009 SYS Frequency : 55 Hz000A SYS Comms Level : 1000B SYS Rly Address : 1000C SYS Plant Status : 0000000000000010000D SYS Ctrl Status : 0000000000000000000E SYS Setting Grp : 1000F SYS LS Stage : None0010 SYS CB Control : N o Operation0011 SYS Software Ref : 18 KCGG100 XXE C

    Locn Page Data

    Figure 10. Selecting a menu cell

    Selecting an individual menu cell with the return key will present a pop-up menuof possible options as follows:

  • 7/29/2019 R8515J Courier Acc

    30/40Page 30

    CELL MENU

    Change Setting SReset Cell Locn R View Strings VCancel ESC

    Figure 11. Cell menu

    An option can be selected as normal using the UP and DOWN cursor keys andthe RETURN key, or by simply pressing the accelerator key shown at the righthand side.

    The Change Setting and Reset Cell Locn options are described in Section 8.

    The View Strings option is only available on data values of type Indexed Stringor Binary Flag. This will display a scrollable window of the possible settingstrings in the case of Indexed String values, or in the case of binary flag values, itwill display the name of each flag with a check mark if the flag is set.

    Section 8. ALTERING RELAY SETTING

    8.1 Reset cell

    The Reset Cell option can be performed on any menu cell in a relay, but it willonly function on cells which have an operation defined for it. For example,resetting the password cell in the system data column will lock the passwordprotected cells in the relay, requiring the password to be re-entered before they

    can be changed again. The service manual for the particular relay concernedshould be consulted to determine which cells use this command and the effect itwill have on them.

    If the action of resetting the menu cell results in other menu cells altering, theAccess program will automatically re-read the column of data to update itselfwith any changes that occurred.

    8.2 Change setting

    The Change Setting command can be performed on any cell in a relays menu,

    although it is not possible for the user to set all cells. If an attempt to change asetting fails, a message will be displayed to indicate the reason. Passwordprotected cells must have the password entered into the relay before they can beset. Remote setting operations cannot be performed whilst a local operator is insetting mode on the front of the relay and vice-versa. Some relays also have thefacility to disable remote setting changes altogether.

    If a setting can be altered, all information relating to the setting change, such asthe current value, data type and the limits of the setting change, will be extractedfrom the relay and displayed ready for alteration. This approach enables the

    Access program to change any setting of any type in any relay, without initiallyknowing anything about the relay being accessed. Most setting limits consist of aminimum and maximum value for the setting range and a step size to indicatevalid numbers within this range.

  • 7/29/2019 R8515J Courier Acc

    31/40Page 31

    The RETURN key is used to exit setting mode and should be followed byCtrl-F10 to enter the new setting. Alternatively, the ESCAPE key can be used toabandon the setting changes and retain the previous value.

    Change Setting

    Min : 50Max : 60Step : 5

    Value : 55

    Change Signed Setting55

    0009/SYS Frequency : 50Hz

    Figure 12. Changing a setting

    New settings will be validated against the relays setting limits and only valid

    settings will be allowed to be sent to the relay. The Access program may adjustinvalid settings to the closest valid setting and begin to flash the altered value toindicate the error made. Correct acceptance of the new setting will be indicatedby the relays response and the page display will be updated accordingly.

    Note that some relays have a remote setting time limit and will ignore anyattempt to change a setting after a certain time has expired from entering settingmode.

    Most data types are set in a similar manner, however, the following data types

    are sufficiently different to warrant separate explanation.8.2.1 Binary flag settings

    Binary flag settings consist of a binary number of up to 32 bits in length, whereeach bit position represents the state of a flag which can be set (1) or cleared(0). These are normally displayed as a binary number with the bit positionsdisplayed underneath.

    Change Setting

    Mask : 0000000011111111

    Max : 16Step : 1

    Value : 0000000011110111

    Rem ChgSetgChange Binary Setting0000000011110111FEFEDCBA9876543210

    0003/SYS Fn : Links 0000000011110111

    Figure 13. Changing a binary flag setting

    The cursor can be moved over the flags using the LEFT and RIGHT cursor keysand the flags set or cleared by pressing the 1 or 0 key appropriately. As the

  • 7/29/2019 R8515J Courier Acc

    32/40Page 32

    cursor highlights each flag, a textual description may be shown, indicating thepurpose of the flag. This feature is dependent on the relay setting beingchanged.

    The minimum value will also be displayed as a binary value as this indicateswhich flags can be altered. Only flags with a 1 in the corresponding positioncan be altered.

    8.2.2 Indexed string settingsIndexed strings are settings where the relay relies on a numeric quantity for itsoperation, but this value is not necessarily useful to the operator, so each value isreplaced with a textual string description. The string (and hence the value) maybe altered by using the UP and DOWN cursor keys to scroll through the list ofavailable options.

    Change Setting

    Min : 0Max : 2

    Step : 1Value : No Operation

    Change Indexed StringTrip

    0010/SYS CB Control : No Operation

    Figure 14. Changing an indexed string setting.

    8.2.3 Courier number settings

    Courier numbers are used where a large dynamic range using a decimal numberis required and are therefore similar to floating point numbers. However, theyhave a fixed display of 4 significant digits; they do not use exponential format,but also include the units of the setting.

    They are displayed in a fixed format as follows and must be entered in the sameformat:

    Format

    [sign][mantissa][scalar][units]

    where

    [sign] = space for positive numbers, or a minus sign for negative numbers

    [mantissa] = a 4 digit number in the range 0.000 to 999.9. At least one digitmust precede or follow the decimal point when one is entered.

    [scalar] = a single character from the following list, indicating the exponent ofthe number:

  • 7/29/2019 R8515J Courier Acc

    33/40Page 33

    Scalar Exponent

    a 1018

    f 1015

    p 1012

    n 109

    u 106

    m 103

    space 10+0

    k 10+3

    M 10+6

    G 10+9

    T 10+12

    P 10+15

    E 10+18X 10+21

    [units] = A 1-4 character unit description chosen from the following list:

    Physical Quantity Base Unit Display [units]

    Current Amps A

    Voltage Volts V

    Angle Degrees Deg

    Impedance Ohms Ohm

    Power Watts W

    VA VA VA

    VAr VAr wr or VAr

    Length metres m

    Time(interval) Seconds s

    Ratio xxxx:1 xxxx:1

    Temperature C CFrequency (Speed) Hertz (revs/sec) Hz

    Percentage % %

    Per Unit Value Per Units PU

    Square Amps Square Amps A2 or A2

    Reserved decimal, no units decimal, no units

    Energy Watt hours Wh

    Energy VA hours VAh

    Reactive Energy VArh

    Time minutes mins

    Impedance mho mho

  • 7/29/2019 R8515J Courier Acc

    34/40Page 34

    8.2.4 Text settings

    Textual string settings are entered by typing the new string directly from thekeyboard. The string limits correspond to the range of ASCII charactersacceptable for each character in the string. If any character is entered outside ofthis range, it will be converted to the closest value in the range when the RETURNkey is pressed and the display will flash accordingly.

    8.3 Password protected cellsPassword protected cells can only be set if the relays password has beensuccessfully entered. If such a cell is encountered and the password has not beenentered, the program will prompt for the password before it will allow the currentsetting to be changed. If the password is not entered correctly, a PasswordProtected error message will be displayed.

    8.4 Extracting setting files

    Settings can be extracted from a relay and stored to a disk file using the Settings

    Store to File option from the menu. The user is first prompted for the address ofthe relay from which the settings will be extracted, followed by a file name inwhich to store the settings. Two files are created: a binary file with a .SETextension is used to store the actual settings in machine readable form; and anASCII text file with a .LST extension contains a list of the cells extracted inhuman readable form. The latter includes each cells location, text description,current value and setting range.

    Versions of this program from v3.2 onwards store setting files in a new formatusing a .SET extension instead of the former .BIN extension. This format is

    more compact and has the option to store the information from ALL cells in arelays menu database, not just the settable cells. This is provided as an optionbefore the setting extraction takes place.

    Setting range information can only be extracted from cells that are currentlysettable. It is therefore important that all cells that are required to be stored arenot password protected or disabled via function links at the time of theextraction. The program will therefore prompt for the relays password before theextraction starts. If these password protected cells are not required, the F10function key can be pressed to bypass these cells. Pressing the ESCAPE key will

    abort the entire setting extraction operation.

    8.5 Printing setting files

    The ".LST setting file can be printed using the print file option from the RelaySettings menu. As this file is more than 80 columns wide, this print file option willput the printer into condensed mode prior to printing so that the output will beformatted correctly. Printing the setting file from any other Print file menu optionwill print in normal mode, causing the output to be truncated or wrappeddepending on the printer, unless it is a wide-carriage model.

  • 7/29/2019 R8515J Courier Acc

    35/40Page 35

    8.6 Downloading setting files

    Settings previously extracted from a relay can be downloaded to the relay againusing the Records Relay Settings Load from File option from the menu. Theuser is first prompted for the address of the relay to have its settings updated,followed by the filename which holds the new settings.

    Versions of this program from v3.2 onwards prompt for setting files in the newfile format using a .SET extension instead of the former .BIN extension.However, for backwards compatibility, the old .BIN file formats are alsosupported. These can be selected by changing the file type extension to .BINwhich will then show a list of setting files that use the old format.

    After the settings file which contains the relay settings to be downloaded hasbeen selected, the program prompts for an error log file name. (This file will onlybe created if it is not possible to download one or more of the settings). A filename must be entered instead of *.ERR for any errors to be logged to. It canbe any valid DOS file name, but could be chosen the same as the settings file

    name with a .ERR extension. When this file name is selected the procedurecontinues.

    Before downloading takes place, the relays model number (plus serial numberand software number, in the case of the new .SET format files) is checkedagainst the information stored in the setting file. If any of these are different, thisinformation is displayed for verification by the user who can then decide whetherto continue with the download or not.

    This option is provided since there may be occasions where different relaymodels can share the same setting files, or when a setting file is to bedownloaded to many relays with different serial numbers. However, the user iscautioned that downloading inappropriate setting files may cause inappropriateor incomplete settings to be stored to the relay.

    If an error log file produced (with a .ERR extension) to indicate any settingswhich were not possible to download, a message is displayed at the end of thedownload, indicating the number of errors which were encountered. The errorlog should be viewed to determine the cause of the errors.

    Only the cells which are currently able to be set can be downloaded to. It is

    therefore important that all cells that are required to be changed are notpassword protected or disabled via function links at the time of the download.The program will therefore prompt for the relays password before the downloadstarts to enable all the password protected cells to be changed. If this is notrequired, the password protected cells can be bypassed by pressing the F10function key. Pressing the ESCAPE key will abort the entire download operation.Settings which fail because of password protection are NOT logged in the errorfile, as it is assumed that this is the required operation.

  • 7/29/2019 R8515J Courier Acc

    36/40Page 36

    Section 9. MISCELLANEOUS

    9.1 Loading and saving files

    A common file selection window is used whenever data is to be saved to orloaded from disk, as shown below:

    ALSTOM T&D Protection & Control Ltd

    Access

    Courier Access Software

    Help

    Num. Units = 5[ 2] BACKGROUNDTAEOD ONLINE 1

    Setting Units Options Quit

    VIEW

    F :G :I :L :M :N :O :P :

    R :S :

    . .OLD

    TESTTEST1EVENTS

    LSTLSTLST

    102413726

    70

    24-11-9323-11-9303-11-93

    2:36p12:27a4:02p

    Filetype : [*. LST] ASCII listing file of a relays setting fileFilename: [*. LST ]Path: R: \HOME\GENERAL\COURIER\Drives: Dirs: 2 File List: 3 Bytes free: 29720576

    Figure 15. Selecting filenames

    There are five editing windows, consisting of the filetype, filename, drive list,directory list and file list windows. The editing focus is switched from onewindow to the next by using the TAB key or the shift-TAB key to move in the

    reverse direction (on the lower windows, the LEFT and RIGHT cursor keys can besimilarly used). A highlighting bar in the lower three windows can be moved upand down with the cursor keys. Each window will scroll if there is more data thancan be displayed at one time, indicated by the arrows in the border of thewindow. Pressing the ESCAPE key at any time will abort the file selectionprocedure.

    Filetype Window

    The filetype window is initally set to a file extension appropriate to the expected

    file type. This is initially copied to the Filename Window on entry and wheneverit is edited. When the Filetype is set to a known file extension, a description ofthe file type is displayed to the right of this window. This Filetype extension isused as the file specification whenever a new drive or directory is selected.

    Filename Window

    The filename window is just below the Filetype window and is where the usercan enter a full or partial file specification, or an alternative drive or sub-directoryto change to. The window will be exited only when a full and complete filenamehas been entered. Any wild card specifications (eg *.*, *.TXT etc.) will cause

    the lower list windows to alter accordingly. The LEFT and RIGHT cursor keys,HOME, END, INS and DEL keys can be used to edit the file specification.The TAB and Shift-TAB keys will move to other windows in a circular fashion.

  • 7/29/2019 R8515J Courier Acc

    37/40Page 37

    Drive List Window

    The drive list window is a scrollable list of all the drives present in the computer.A drive is selected by moving the highlight bar on to the required drive andpressing the RETURN key. The LEFT and RIGHT cursor keys (or TAB and shift-TABkeys) will move to the other editing windows. The HOME and END keys willmove the highlight bar to the top and bottom of the list.

    Directory List Window

    The directory list window lists all the sub-directories in the current directory on thecurrent drive. A directory is selected by moving the highlight bar on to therequired directory and pressing the RETURN key. Use the .. directory to removea level of sub-directories to get closer to the root directory. The LEFT and RIGHTcursor keys (or TAB and shift-TAB keys) will move to the other editing windows.The HOME and END keys will move the highlight bar to the top and bottom ofthe list.

    Empty directories can be created and deleted by using the INS and DEL keys

    whilst the cursor is in this window.File List Window

    The file list window lists all the files matching the current file specification in thecurrent directory on the current drive. A file is selected by moving the highlightbar on to the required filename and pressing the RETURN key. This will exit thefile selection procedure. The LEFT and RIGHT cursor keys (or TAB and shift-TABkeys) will move to the other editing windows. The HOME and END keys willmove the highlight bar to the top and bottom of the list respectively.

    A file can be deleted by highlighting the file and pressing the DEL key whilst thecursor is in this window.

    If a file of the same name already exists when writing to a file, the user will beprompted to abort, create a backup or overwrite the existing file.

    9.2. Viewing files

    This option allows any text file to be read on screen and appears in severalmenus as it is often required. When prompting for a filename, the filetype will beset to an appropriate value according to the position in the menu of this option,

    although this can be changed as required.Once a file has been selected a window is created in which the user can scrollthrough the contents of the file using the PAGE UP, PAGE DOWN, UP or DOWNcursor keys. Pressing ESCAPE exits the scrolling window.

    9.3. Printing files

    The print file option allows any ASCII text file to be printed. When prompting fora filename, the filetype will be set to an appropriate value according to theposition in the menu of this option, although this can be changed as required.

    Simple support is provided for different printers by providing a facility to alter thecontrol codes sent to the printer.

  • 7/29/2019 R8515J Courier Acc

    38/40Page 38

    9.4 Binary File Transfers

    The program supports the transfer of binary data files to a relay in an applicationindependent manner. The content of these files are relay specific; they maycontain: new protection algorithms, scheme logic, ladder diagrams, menu textetc., depending on the relay. However, the transfer of these files is achievedusing the same procedure.

    Selection of the Download item in the Records menu allows selection of the relayto download the file to. The user is then prompted for the file to be downloaded.This will normally have a ".BIN" file extension. The program will check that thefile is suitable to be downloaded to the relay by verification with the relay itself.

    Section 10. VERSION HISTORIES

    Refer to disk for version histories.

  • 7/29/2019 R8515J Courier Acc

    39/40Page 39

  • 7/29/2019 R8515J Courier Acc

    40/40

    ALSTOM T&D Protection & Control Ltd St Leonards Works, Stafford, ST17 4LX England

    Tel: 44 (0) 1785 223251 Fax: 44 (0) 1785 212232