Version: 1.06 5
11.3.1.
About Redundancy...................................................................................................81
11.4.
NTP Server....................................................................................................... 82
11.4.1.
Time accuracy.........................................................................................................82
11.5.
TCP/IP Debugging ............................................................................................ 83
12. A
LARMS
...................................................................................................86
12.1.
Introduction ..................................................................................................... 86
12.2.
Digital Alarm Condition...................................................................................... 87
12.3.
Analog Alarm Condition..................................................................................... 89
12.4.
Recipients ........................................................................................................ 91
12.5.
Group of Recipients .......................................................................................... 93
12.6.
Messages......................................................................................................... 94
12.7.
Alarms table..................................................................................................... 95
12.7.1.
Columns description.................................................................................................96
13. D
ATALOGGING
...........................................................................................97
13.1.
Introduction ..................................................................................................... 97
13.2.
The chronologies.............................................................................................. 99
13.2.1.
Digital chronologies..................................................................................................99
13.2.2.
Analog chronologies.................................................................................................99
13.3.
The sampling tables.........................................................................................100
14. R
EMOTE
T
AGS
.........................................................................................101
14.1.
Introduction ....................................................................................................101
14.2.
Creating a Remote Device................................................................................102
14.3.
Creating Remote Tag.......................................................................................103
14.4.
Remote Tags through modem ..........................................................................105
14.5.
Timing configuration of Remote Tags................................................................105
15. P
ERIODIC
E
VENTS
....................................................................................106
16. H
IGH
S
PEED
T
AGS
...................................................................................108
16.1.
Processor time for executing High Speed Tag....................................................109
17. A
CCESS SECURITY
....................................................................................110
17.1.
RTU configuration............................................................................................111
17.1.1.
RTU Properties ......................................................................................................111
17.1.2.
Modem and Serial Port Properties............................................................................111
17.2.
Password utility ...............................................................................................112
17.3.
Login/Logout...................................................................................................113
17.3.1.
With TWinSoft.......................................................................................................113
17.3.2.
With Internet Explorer............................................................................................114
17.4.
Deactivating protection ....................................................................................115