EasyManua.ls Logo

Techno Trade TBOX MS - Page 5

Techno Trade TBOX MS
192 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Version: 1.06 5
11.3.1.
About Redundancy...................................................................................................81
11.4.
NTP Server....................................................................................................... 82
11.4.1.
Time accuracy.........................................................................................................82
11.5.
TCP/IP Debugging ............................................................................................ 83
12. A
LARMS
...................................................................................................86
12.1.
Introduction ..................................................................................................... 86
12.2.
Digital Alarm Condition...................................................................................... 87
12.3.
Analog Alarm Condition..................................................................................... 89
12.4.
Recipients ........................................................................................................ 91
12.5.
Group of Recipients .......................................................................................... 93
12.6.
Messages......................................................................................................... 94
12.7.
Alarms table..................................................................................................... 95
12.7.1.
Columns description.................................................................................................96
13. D
ATALOGGING
...........................................................................................97
13.1.
Introduction ..................................................................................................... 97
13.2.
The chronologies.............................................................................................. 99
13.2.1.
Digital chronologies..................................................................................................99
13.2.2.
Analog chronologies.................................................................................................99
13.3.
The sampling tables.........................................................................................100
14. R
EMOTE
T
AGS
.........................................................................................101
14.1.
Introduction ....................................................................................................101
14.2.
Creating a Remote Device................................................................................102
14.3.
Creating Remote Tag.......................................................................................103
14.4.
Remote Tags through modem ..........................................................................105
14.5.
Timing configuration of Remote Tags................................................................105
15. P
ERIODIC
E
VENTS
....................................................................................106
16. H
IGH
S
PEED
T
AGS
...................................................................................108
16.1.
Processor time for executing High Speed Tag....................................................109
17. A
CCESS SECURITY
....................................................................................110
17.1.
RTU configuration............................................................................................111
17.1.1.
RTU Properties ......................................................................................................111
17.1.2.
Modem and Serial Port Properties............................................................................111
17.2.
Password utility ...............................................................................................112
17.3.
Login/Logout...................................................................................................113
17.3.1.
With TWinSoft.......................................................................................................113
17.3.2.
With Internet Explorer............................................................................................114
17.4.
Deactivating protection ....................................................................................115

Table of Contents