EasyManua.ls Logo

ABB Relion 670 series - Page 110

ABB Relion 670 series
114 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
SCADA Supervision, control and data acquisition, see also
MicroSCADA
SCT System configuration tool according to standard IEC 61850
SHA The Secure Hash Algorithm is a family of cryptographic hash
functions. The SHA 2 family comprise two similar hash
functions, with different block sizes, known as SHA-256 and
SHA-512.
SMT Signal matrix tool within PCM600
SNTP Simple network time protocol – is used to synchronize
computer clocks on local area networks. This reduces the
requirement to have accurate hardware clocks in every
embedded system in a network. Each embedded node can
instead synchronize with a remote clock, providing the
required accuracy
.
SPA Strömberg protection acquisition, a serial master/slave
protocol for point-to-point communication
TLS Transport Layer Security (TLS) is a cryptographic protocol
that provides communication security over the Internet. TLS
encrypt the segments of network connections at the
Application Layer for the T
ransport Layer
, using asymmetric
cryptography for key exchange, symmetric encryption for
confidentiality, and message authentication codes for message
integrity.
Syslog Syslog is a standard for computer data logging. Syslog can be
used for computer system management and security auditing
as well as generalized informational, analysis, and debugging
messages
TCP Transmission control protocol. The most common transport
layer protocol used on Ethernet and the Internet.
TCP/IP Transmission control protocol over Internet Protocol. The de
facto standard Ethernet protocols incorporated into 4.2BSD
Unix. TCP/IP was developed by DARP
A for Internet working
and encompasses both network layer and transport layer
protocols. While TCP and IP specify two protocols at specific
protocol layers, TCP/IP is often used to refer to the entire US
Department of Defense protocol suite based upon these,
including T
elnet, FTP, UDP and RDP.
UDP The User Datagram Protocol (UDP) is one of the core
members of the Internet protocol suite. With UDP
, computer
applications can send messages, in this case referred to as
datagrams, to other hosts on an Internet Protocol (IP) network
without prior communications to set up special transmission
channels or data paths.
UMT User management tool
Section 9 1MRK 511 399-UEN B
Glossary
104 670 series 2.2 IEC
Cyber security deployment guideline

Table of Contents

Other manuals for ABB Relion 670 series

Related product manuals