EasyManua.ls Logo

ABB GMS600

ABB GMS600
62 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
2. Ingression protection, according to IEC standard
IP 20 Ingression protection, according to IEC standard, level 20
ISO 9001 Set of standards for quality management.
IT Information technology
LAN Local area network
LED Light-emitting diode
LHMI Local Human Machine Interface, also Local HMI.
MicroSCADA System for supervision, control and data acquisition
NCC National Control Centre
ODBC Open Database Connectivity is a standard for accessing
database management systems (DBMS).
PC Personal Computer
PCI Peripheral component interconnect, a local data bus
PCM600 Protection and control IED manager
PIN Personal Identification Number
PST Parameter setting tool within PCM600
RTU Remote terminal unit
SA Substation Automation
SCADA Supervision, control and data acquisition, see also
MicroSCADA
SCT System configuration tool according to standard IEC 61850
SHA Secure Hash Algorithms. The SHA is one of a number of
cryptographic hash functions. A cryptographic hash is like a
signature for a text or a data file. SHA-256 algorithm generates
an almost-unique, fixed size 256-bit (32-byte) hash. Hash is a
one way function – it cannot be decrypted back.
SMT
Signal matrix tool within PCM600
SNTP Simple network time protocol – is used to synchronize
computer clocks on local area networks. This reduces the
requirement to have accurate hardware clocks in every
embedded system in a network. Each embedded node can
instead synchronize with a remote clock, providing the required
accuracy.
SPA
Strömberg protection acquisition, a serial master/slave protocol
for point-to-point communication
SSL/TLS Transport Layer Security (TLS) and its predecessor, Secure
Sockets Layer (SSL), are cryptographic protocols that provide
communication security over the Internet. TLS and SSL
encrypt the segments of network connections at the Application
1MRK 511 454-UEN A Section 9
Glossary
GMS600 1.3 53
Cyber security deployment guideline

Related product manuals