Reclosers Kyle®Form 5 Microprocessor-based Electronic Recloser ControlSerial Communications R280-90-14 Communications Point Data Base
●Introduction:
■The F5 Recloser Control is available with the DNP3 communication protocol on any of the serial ports. This document provides details for users that need to interface to the control using this protocol.
■The document is divided into sections that give an overview of the data dictionary for the control, describe configuration parameters to get started communicating, error indication definitions, and reference documents. Appendices provide the DNP3 Device Profile Template filled out for the F5 control and the data dictionary for accessing the control.
■Class 0 data polls consist of Binary Inputs (Object 1 Variation 0), Binary Counters(Object 20 Variation 0), Analog Inputs (Object 30 Variation 0) and Binary Output Status(Object 10 Variation 2).
■Report by Exception is supported. Event Classes are configurable using the Assign Class function. On device restart, the factory defined defaults are used for the event class content definitions until modified by the Assign Class function. See the data dictionary for factory class definitions. Configuration parameters are provided for future selection of the default object type for reporting counter and analog events.
■Unsolicited Report by Exception is also supported as an extension to the report by exception capability. The implementation follows the rules defined for Unsolicited Report by Exception, i.e., it is enabled or disabled by a configuration parameter, and upon device reset, an unsolicited message will be sent without data. After confirmation no further messages will be sent until DNP messages to enable unsolicited operation are received by the control. Media access contention avoidance (collision avoidance) is performed according to the methods recommended in Chapter 7 of the DNP3 Data Link Layer document for full and half duplex operation. For half duplex operation, the random delay method is employed.
■Data link and Unsolicited Application retries and timeouts are configurable.
|
|
Datasheet |
|
|
|
Please see the document for details |
|
|
|
|
|
|
|
English Chinese Chinese and English Japanese |
|
February 2002 |
|
|
|
R280-90-14 |
|
2.4 MB |
- +1 Like
- Add to Favorites
Recommend
All reproduced articles on this site are for the purpose of conveying more information and clearly indicate the source. If media or individuals who do not want to be reproduced can contact us, which will be deleted.