Here Is the Hardware/System Configuration for 7028-6E4 Sn# 10-A313C Also AIX 6.1 and Software Support Required

Total Page:16

File Type:pdf, Size:1020Kb

Here Is the Hardware/System Configuration for 7028-6E4 Sn# 10-A313C Also AIX 6.1 and Software Support Required Here is the hardware/system configuration for 7028-6E4 sn# 10-A313C Also AIX 6.1 and software support required.. ========== list general configuration with vital program data (lscfg -v) INSTALLED RESOURCE LIST WITH VPD The following resources are installed on your machine. Model Architecture: chrp Model Implementation: Multiple Processor, PCI bus sys0 System Object sysplanar0 System Planar L2cache0 L2 Cache mem0 Memory pci2 U0.1-P1 PCI Bus Hardware Location Code......U0.1-P1 pci11 U0.1-P2 PCI Bus Hardware Location Code......U0.1-P2 pci12 U0.1-P2 PCI Bus Hardware Location Code......U0.1-P2 ent1 U0.1-P1/E1 10/100 Mbps Ethernet PCI Adapter II (1410ff01) 10/100 Mbps Ethernet PCI Adapter II: Network Address.............0002554F3B2E ROM Level.(alterable).......SCU015 Product Specific.(Z0).......A5204205 Hardware Location Code......U0.1-P1/E1 pci13 U0.1-P2 PCI Bus Hardware Location Code......U0.1-P2 pci1 U0.1-P1 PCI Bus Hardware Location Code......U0.1-P1 pci7 U0.1-P2 PCI Bus Hardware Location Code......U0.1-P2 pci8 U0.1-P2 PCI Bus Hardware Location Code......U0.1-P2 scsi2 U0.1-P2/Z3 Wide/Fast-20 SCSI I/O Controller Hardware Location Code......U0.1-P2/Z3 rmt1 U0.1-P2/Z3-A0 LVD SCSI 8mm Tape Drive (60000 MB) Manufacturer................EXABYTE Machine Type and Model......Mammoth2 Device Specific.(Z1)........07wR Serial Number...............20516338 Load ID.....................A1700295 Part Number.................19P0692 FRU Number..................19P0708 EC Level....................H27309 Device Specific.(Z0)........0180020283000030 Device Specific.(Z3)........ cd0 U0.1-P2/Z3-A6 SCSI DVD-RAM Drive (4700 MB) Manufacturer................IBM Machine Type and Model......DVRM00203 ROS Level and ID............A150 Device Specific.(Z0)........058002028F000010 Part Number.................04N5272 EC Level....................F74471 FRU Number..................04N5967 pci9 U0.1-P2 PCI Bus Hardware Location Code......U0.1-P2 pci10 U0.1-P2-I3 PCI Bus Hardware Location Code......U0.1-P2-I3 lai0 U0.1-P2-I3/G1 GXT135P Graphics Adapter GXT135P A/D 2D Graphics Adapter: EC Level....................H13284 FRU Number..................00P5758 Manufacture ID..............MATROX Part Number.................80P4527 Hardware Location Code......U0.1-P2-I3/G1 pci0 U0.1-P1 PCI Bus Hardware Location Code......U0.1-P1 isa0 U0.1-P1 ISA Bus Hardware Location Code......U0.1-P1 fda0 U0.1-P1/D1 Standard I/O Diskette Adapter Hardware Location Code......U0.1-P1/D1 siokma0 U0.1-P1/K1 Keyboard/Mouse Adapter Hardware Location Code......U0.1-P1/K1 sioka0 U0.1-P1/K1 Keyboard Adapter kbd0 U0.1-P1/K1-K1 PS/2 keyboard sioma0 U0.1-P1/K1 Mouse Adapter mouse0 U0.1-P1/O1-O1 3 button mouse ppa0 U0.1-P1/R1 CHRP IEEE1284 (ECP) Parallel Port Adapter Hardware Location Code......U0.1-P1/R1 sa0 U0.1-P1/S1 Standard I/O Serial Port Hardware Location Code......U0.1-P1/S1 tty0 U0.1-P1/S1-L0 Asynchronous Terminal sa1 U0.1-P1/S2 Standard I/O Serial Port Hardware Location Code......U0.1-P1/S2 tty1 U0.1-P1/S2-L0 Asynchronous Terminal sa2 U0.1-P1/S3 Standard I/O Serial Port Hardware Location Code......U0.1-P1/S3 tty2 U0.1-P1/S3-L0 Asynchronous Terminal ide0 U0.1-P1/Q6 ATA/IDE Controller Device Hardware Location Code......U0.1-P1/Q6 pci3 U0.1-P2 PCI Bus Hardware Location Code......U0.1-P2 pci4 U0.1-P2 PCI Bus Hardware Location Code......U0.1-P2 ent0 U0.1-P1/E2 10/100 Mbps Ethernet PCI Adapter II (1410ff01) 10/100 Mbps Ethernet PCI Adapter II: Network Address.............0002554F3B2F ROM Level.(alterable).......SCU015 Product Specific.(Z0).......A5204205 Hardware Location Code......U0.1-P1/E2 pci5 U0.1-P2 PCI Bus Hardware Location Code......U0.1-P2 scsi0 U0.1-P2/Z1 Wide/Ultra-3 SCSI I/O Controller Hardware Location Code......U0.1-P2/Z1 hdisk0 U0.1-P2/Z1-A8 16 Bit LVD SCSI Disk Drive (73400 MB) Manufacturer................IBM Machine Type and Model......IC35L073UCDY10-0 FRU Number..................00P3833 ROS Level and ID............53323846 Serial Number...............E6W7HNKC EC Level....................H32224 Part Number.................08K0283 Device Specific.(Z0)........000003029F00013A Device Specific.(Z1)........07N4972 Device Specific.(Z2)........0068 Device Specific.(Z3)........04046 Device Specific.(Z4)........0001 Device Specific.(Z5)........22 Device Specific.(Z6)........ hdisk1 U0.1-P2/Z1-A9 16 Bit LVD SCSI Disk Drive (36400 MB) Manufacturer................IBM Machine Type and Model......IC35L036UCDY10-0 FRU Number..................00P3831 ROS Level and ID............53323846 Serial Number...............E3WR3TMC EC Level....................H32224 Part Number.................08K0293 Device Specific.(Z0)........000003029F00013A Device Specific.(Z1)........07N4972 Device Specific.(Z2)........0068 Device Specific.(Z3)........04068 Device Specific.(Z4)........0001 Device Specific.(Z5)........22 Device Specific.(Z6)........ hdisk2 U0.1-P2/Z1-AA 16 Bit LVD SCSI Disk Drive (36400 MB) Manufacturer................IBM Machine Type and Model......IC35L036UCDY10-0 FRU Number..................00P3831 ROS Level and ID............53323846 Serial Number...............E3WR66DC EC Level....................H32224 Part Number.................08K0293 Device Specific.(Z0)........000003029F00013A Device Specific.(Z1)........07N4972 Device Specific.(Z2)........0068 Device Specific.(Z3)........04068 Device Specific.(Z4)........0001 Device Specific.(Z5)........22 Device Specific.(Z6)........ hdisk3 U0.1-P2/Z1-AB 16 Bit LVD SCSI Disk Drive (73400 MB) Manufacturer................IBM Machine Type and Model......IC35L073UCDY10-0 FRU Number..................00P3833 ROS Level and ID............53323846 Serial Number...............E6W7HMYC EC Level....................H32224 Part Number.................08K0283 Device Specific.(Z0)........000003029F00013A Device Specific.(Z1)........07N4972 Device Specific.(Z2)........0068 Device Specific.(Z3)........04046 Device Specific.(Z4)........0001 Device Specific.(Z5)........22 Device Specific.(Z6)........ ses0 U0.1-P2/Z1-AF SCSI Enclosure Services Device Manufacturer................IBM Machine Type and Model......HSBPD4E PU3SCSI ROS Level and ID............0017 Serial Number...............HA3BM06G Device Specific.(Z0)........0D00020232004000 FRU Number..................00P6402 scsi1 U0.1-P2/Z2 Wide/Ultra-3 SCSI I/O Controller Hardware Location Code......U0.1-P2/Z2 pci6 U0.1-P2 PCI Bus Hardware Location Code......U0.1-P2 proc0 U0.1-P1-C1 Processor Hardware Location Code......U0.1-P1-C1 proc1 U0.1-P1-C1 Processor Hardware Location Code......U0.1-P1-C1 proc2 U0.1-P1-C2 Processor Hardware Location Code......U0.1-P1-C2 proc3 U0.1-P1-C2 Processor Hardware Location Code......U0.1-P1-C2 ========== list of all system resources (lssrc -a) Subsystem Group PID Status syslogd ras 49314 active gated tcpip 131224 active sendmail mail 139402 active portmap portmap 86420 active inetd tcpip 106920 active xntpd tcpip 127140 active snmpmibd tcpip 114802 active aixmibd tcpip 118908 active biod nfs 110998 active rpc.statd nfs 106616 active rpc.lockd nfs 98702 active qdaemon spooler 94618 active ctrmc rsct 155894 active IBM.CSMAgentRM rsct_rm 156114 active IBM.ServiceRM rsct_rm 164272 active writesrv spooler inoperative lpd spooler inoperative clvmd inoperative rwhod tcpip inoperative snmpd tcpip inoperative hostmibd tcpip inoperative dpid2 tcpip inoperative dhcpcd tcpip inoperative ndpd-host tcpip inoperative ndpd-router tcpip inoperative tftpd tcpip inoperative ctcas rsct inoperative named tcpip inoperative routed tcpip inoperative iptrace tcpip inoperative timed tcpip inoperative dhcpsd tcpip inoperative dhcprd tcpip inoperative mrouted tcpip inoperative rsvpd qos inoperative policyd qos inoperative pxed tcpip inoperative binld tcpip inoperative dfpd tcpip inoperative dhcpcd6 tcpip inoperative dhcpsdv6 tcpip inoperative ypserv yp inoperative ypupdated yp inoperative yppasswdd yp inoperative keyserv keyserv inoperative llbd iforncs inoperative glbd iforncs inoperative cpsd ike inoperative tmd ike inoperative isakmpd inoperative i4lmd iforls inoperative i4glbcd iforncs inoperative i4gdb iforls inoperative i4llmd iforls inoperative wsmrefserver inoperative ypbind yp inoperative netcd netcd inoperative IBM.AuditRM rsct_rm inoperative IBM.ERRM rsct_rm inoperative dtsrc inoperative nfsd nfs inoperative rpc.mountd nfs inoperative automountd autofs inoperative nfsrgyd nfs inoperative cdromd inoperative muxatmd tcpip inoperative nimsh nimclient inoperative vert_serv nrd inoperative LUMlmd lumls inoperative LUMgdb lumls inoperative gssd nfs inoperative ikev2d inoperative iked ike inoperative http4websm websm inoperative ========== root volume group information rootvg infx01vg infx02vg lhu01vg ---------- rootvg VOLUME GROUP: rootvg VG IDENTIFIER: 000a313c00004c00000000fc703d819b VG STATE: active PP SIZE: 128 megabyte(s) VG PERMISSION: read/write TOTAL PPs: 546 (69888 megabytes) MAX LVs: 256 FREE PPs: 434 (55552 megabytes) LVs: 13 USED PPs: 112 (14336 megabytes) OPEN LVs: 12 QUORUM: 2 (Enabled) TOTAL PVs: 1 VG DESCRIPTORS: 2 STALE PVs: 0 STALE PPs: 0 ACTIVE PVs: 1 AUTO ON: yes MAX PPs per VG: 32512 MAX PPs per PV: 1016 MAX PVs: 32 LTG size: 128 kilobyte(s) AUTO SYNC: no HOT SPARE: no BB POLICY: relocatable ---------- rootvg rootvg: PV_NAME PV STATE TOTAL PPs FREE PPs FREE DISTRIBUTION hdisk0 active 546 434 109..65..42..109..109 ---------- rootvg: LV NAME TYPE LPs PPs PVs LV STATE MOUNT POINT hd5 boot 1 1 1 closed/syncd N/A hd6 paging 32 32 1 open/syncd N/A hd8 jfslog 1 1 1 open/syncd N/A hd4 jfs 2 2 1 open/syncd / hd2 jfs 32 32 1 open/syncd /usr hd9var jfs 3 3 1 open/syncd /var hd3 jfs 4 4 1 open/syncd
Recommended publications
  • International Standard IEC 60870-6-802 Has Been Prepared by IEC Technical Committee 57: Power System Control and Associated Communications
    INTERNATIONAL IEC STANDARD 60870-6-802 Second edition 2002-04 Telecontrol equipment and systems – Part 6-802: Telecontrol protocols compatible with ISO standards and ITU-T recommendations – TASE.2 Object models Matériels et systèmes de téléconduite – Partie 6-802: Protocoles de téléconduite compatibles avec les normes ISO et les recommandations de l'UIT-T – Modèles d'objets TASE.2 This is a free 10 page sample. Access the full version online. Reference number IEC 60870-6-802:2002(E) Publication numbering As from 1 January 1997 all IEC publications are issued with a designation in the 60000 series. For example, IEC 34-1 is now referred to as IEC 60034-1. Consolidated editions The IEC is now publishing consolidated versions of its publications. For example, edition numbers 1.0, 1.1 and 1.2 refer, respectively, to the base publication, the base publication incorporating amendment 1 and the base publication incorporating amendments 1 and 2. Further information on IEC publications The technical content of IEC publications is kept under constant review by the IEC, thus ensuring that the content reflects current technology. Information relating to this publication, including its validity, is available in the IEC Catalogue of publications (see below) in addition to new editions, amendments and corrigenda. Information on the subjects under consideration and work in progress undertaken by the technical committee which has prepared this publication, as well as the list of publications issued, is also available from the following: • IEC Web Site (www.iec.ch) • Catalogue of IEC publications The on-line catalogue on the IEC web site (www.iec.ch/catlg-e.htm) enables you to search by a variety of criteria including text searches, technical committees and date of publication.
    [Show full text]
  • Smart Reconfiguration of Distribution Grids Using Agent-Based Technology
    FACULDADE DE ENGENHARIA DA UNIVERSIDADE DO PORTO Smart Reconfiguration of Distribution Grids using Agent-based Technology Matheus Macedo Lopes Dissertation conducted under the Master’s in Electrical and Computers Engineering Program - Major Energy Supervisor: Prof. Vladimiro Miranda , Ph.D. Co-Supervisor: Prof. Diego Issicaba , Ph.D. July 28, 2016 © Matheus Macedo Lopes, 2016 Resumo As manobras de isolamento para reconfiguração em redes de distribuição de média tensão são tradicionalmente manuais ou dependem de decisões tomadas pelos operadores de rede. A abor- dagem proposta assume uma arquitetura onde os agentes interagem em um ambiente de rede de distribuição simulado a partir do estabelecimento de metas projetadas seguindo o paradigma de orientação mulit-agente. A aplicação é implementada de tal forma que agentes AgentSpeak in- teragem entre eles através de uma comunicação baseada em ato de fala/comunicação, bem como com um ambiente desenvolvido em linguagem JAVA. Neste contexto, esta tese propõe a modelagem e verificação de soluções baseadas em agentes para apoiar as operações de reconfiguração em redes de distribuição em nível de média tensão. A metodologia foi utilizada para apoiar as actividades dos operadores de redes de distribuição por meio de planos de restabelecimento de energia para ajudar em casos de falhas permanentes. As abordagens empregadas para arquitetura de agentes para a reconfiguração foram baseadas em modelo hierárquico e uma abordagem totalmente descentralizada. A capabilidade dos agentes foram desenvolvidas prevendo as possiveis aplicações do sistema de distribuição com foco em procedimentos de gestão des interrupções de service. As abordagens foram testadas em um ali- mentador teste trifásico do IEEE de 123 nós.
    [Show full text]
  • Add Ons for Simatic PCS 7
    © Siemens AG 2015 Add-ons for the SIMATIC PCS 7 Process Control System SIMATIC PCS 7 Catalog Edition ST PCS 7 AO 2015 Answers for industry. Umschlag_STPCS7AO_2015_xx.indd 3 20.08.2015 10:51:57 © Siemens AG 2015 Related catalogs SIMATIC ST PCS 7 SITRAIN ITC SIMATIC PCS 7 Training for Industry Process Control System System components Only available in German E86060-K4678-A111-C1-7600 E86060-K6850-A101-C4 SIMATIC ST PCS 7 T Products for Automation and Drives CA 01 SIMATIC PCS 7 Interactive Catalog, DVD Process Control System Technology components E86060-K4678-A141-A2-7600 E86060-D4001-A510-D4-7600 SIMATIC ST 70 Industry Mall Products for Information and Ordering Platform Totally Integrated Automation in the Internet: E86060-K4670-A101-B5-7600 www.siemens.com/industrymall SIMATIC HMI / ST 80/ST PC PC-based Automation Human Machine Interface Systems PC-based Automation E86060-K4680-A101-C2-7600 Industrial Communication IK PI SIMATIC NET E86060-K6710-A101-B8-7600 Process Automation FI 01 Field Instruments for Process Automation PDF (E86060-K6201-A101-B9-7600) Process Automation AP 01 Process Analytical Instruments PDF (E86060-K3501-A101-B2-7600) Weighing Technology WT 10 Products for Weighing Technology E86060-K6410-A101-A4-7600 © Siemens AG 2015 Add-ons for the SIMATIC PCS 7 Process Control System SIMATIC PCS 7 Information and management systems 1 Advanced Process Control 2 Operator control and monitoring 3 Libraries/blocks/tools 4 Catalog ST PCS 7 AO · 2015 Supersedes: Distributed I/O on PROFIBUS 5 Catalog ST PCS 7 AO · 2013 Refer to the Industry Mall for current updates of this catalog: Diagnostics www.siemens.com/industrymall 6 and as PDF at the following address: www.siemens.com/stpcs7ao The products contained in this catalog can also be found in the Interactive Catalog CA 01.
    [Show full text]
  • Common Industrial Protocol) Over Ethernet
    © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKIOT-2112 Securing the Internet of Things Philippe Roggeband, Manager GSSO EMEAR Business Development Cisco Spark Questions? Use Cisco Spark to communicate with the speaker after the session How 1. Find this session in the Cisco Live Mobile App 2. Click “Join the Discussion” 3. Install Spark or go directly to the space 4. Enter messages/questions in the space cs.co/ciscolivebot#BRKIOT-2112 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public The IoT pillars While these pillars represent disparate technology, purposes, and challenges, what they all share are the vulnerabilities that IoT devices introduce. Information Technology Operations Technology Consumer Technology It’s not just about the “things” BRKIOT-2112 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 BRKIOT-2112 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 Agenda • Challenges and Constraints • Specific threats and Protection mechanisms • Cisco best practices and solutions • Q&A • Conclusion Agenda • Challenges and Constraints • Specific threats and Protection mechanisms • Cisco best practices and solutions • Q&A • Conclusion Consumer IoT Characteristics Consumer objects Challenges and constraints • These devices are highly constrained in terms of • Physical size, Inexpensive • CPU power, Memory, Bandwidth • Autonomous operation in the field • Power consumption is critical • If it is battery powered then energy efficiency is paramount, batteries might have to last for years • Some level of remote management is required • Value often linked to a Cloud platform or Service BRKIOT-2112 © 2018 Cisco and/or its affiliates. All rights reserved.
    [Show full text]
  • PM180 IEC 60870-5-104 Port: 1
    expertmeter™ High Performance Analyzer PM180 IEC60870-5-101/104 Communications Protocol Reference Guide BG0593 Rev. A1 Every effort has been made to ensure that the material herein is complete and accurate. However, the manufacturer is not responsible for any mistakes in printing or faulty instructions contained in this book. Notification of any errors or misprints will be received with appreciation. For further information regarding a particular installation, operation or maintenance of equipment, contact the manufacturer or your local representative or distributor. REVISION HISTORY A1 March 2015 Release 2 Table of Contents 1 General .................................................................................................................. 7 2 Protocol Implementation ..................................................................................... 8 2.1 Configuring IEC 60870-5 .......................................................................................... 8 2.2 Communicating via IEC 60870-5 Ports .................................................................... 8 2.3 Device Addressing .................................................................................................... 8 2.4 Information Object Addressing and Mapping .......................................................... 9 2.5 Interrogation ............................................................................................................ 9 2.6 Cyclic Data Transmission .........................................................................................
    [Show full text]
  • Vulnerability and Impact Analysis of the IEC 61850 GOOSE Protocol in the Smart Grid
    sensors Article Vulnerability and Impact Analysis of the IEC 61850 GOOSE Protocol in the Smart Grid Haftu Tasew Reda 1 , Biplob Ray 2 , Pejman Peidaee 3 , Adnan Anwar 4 , Abdun Mahmood 1 , Akhtar Kalam 3 and Nahina Islam 2,* 1 Department of Computer Science and IT, La Trobe University, Plenty Rd., Bundoora 3086, Australia; [email protected] (H.T.R.); [email protected] (A.M.) 2 Centre for Intelligent Systems (CIS), School of Engineering and Technology, CQUniversity, Rockhampton 4700, Australia; [email protected] 3 Department of Electrical and Electronics Engineering, Victoria University, Ballarat Rd., Footscray 3011, Australia; [email protected] (P.P.); [email protected] (A.K.) 4 School of IT, Deakin University, 75 Pigdons Rd, Waurn Ponds 3216, Australia; [email protected] * Correspondence: [email protected] Abstract: IEC 61850 is one of the most prominent communication standards adopted by the smart grid community due to its high scalability, multi-vendor interoperability, and support for several input/output devices. Generic Object-Oriented Substation Events (GOOSE), which is a widely used communication protocol defined in IEC 61850, provides reliable and fast transmission of events for the electrical substation system. This paper investigates the security vulnerabilities of this protocol and analyzes the potential impact on the smart grid by rigorously analyzing the security of the GOOSE protocol using an automated process and identifying vulnerabilities in the context of smart grid communication. The vulnerabilities are tested using a real-time simulation and industry standard Citation: Reda, H.T.; Ray, B.; Peidaee, hardware-in-the-loop emulation.
    [Show full text]
  • SG-Gateway™ with I/O Interface
    SG-gateway™ with I/O interface Anybus SG-gateways make the Smart Grid possible. They have two main application areas. Firstly, to enable remote control and management of electrical equipment in power grids. Secondly, to enable communication between I/O devices and energy protocols (IEC61850 and IEC60870-5-104). In-short Smart Grid gateways for remote control EXAMPLE: MODBUS TO IEC60870-5-104 EXAMPLE: MODBUS TO IEC61850 and management of electrical systems. Scada Scada Protocols IEC61850 client/server, IEC60870-5-104 IEC60870-5-104 IEC61850 client/server, Modbus RTU master/slave and Modbus TCP client/server. SG-gateway SG-gateway Interfaces Int 1. IEC 104 server Int 1. IEC 61850 server Int 2. Modbus master 3G modem, Ethernet, serial (RS232/ Int 2. Modbus master RS485/RS422), 4 digital inputs, 4 digital outputs. Modbus Modbus Web editor Embedded webserver supporting the following functions among others: • Binary – AND, OR, XOR • Bits & Bytes – Extract, Pack, Put, Pit, Unpack Features and Benefits Device description • Messages – Send, Receive • Easy way to transport I/O data from the field to SCADA The SG-gateway is a remote terminal • Numerical – Counter, Compare systems unit for the energy market with four • Special – Enable/disable, OpenVPN • Several communication protocols are supported (IEC61850 digital inputs and four digital outputs • Storage and edge detection – RS client/server, IEC60870-5-104 client/server, Modbus TCP for monitoring and controlling the Flipflop, Trigger client/server, Modbus RTU master/slave) connected devices. • Timing – TON, TOFF, TP, Timer • Transmission over 3G or Ethernet Additionally the SG-gateway includes • Connecting serial devices over RS232/RS485/RS422 an optional 3G modem, an Ethernet • 4 digital inputs interface and a serial port.
    [Show full text]
  • Gerenciador De Ativos De Proteção Em Subestações Baseado Na Iec 61850
    UNIVERSIDADE FEDERAL FLUMINENSE ESCOLA DE ENGENHARIA PROGRAMA DE PÓS-GRADUAÇÃO EM ENGENHARIA ELÉTRICA E DE TELECOMUNICAÇÕES MARCO ANTONIO ABI-RAMIA JUNIOR GERENCIADOR DE ATIVOS DE PROTEÇÃO EM SUBESTAÇÕES BASEADO NA IEC 61850 NITERÓI, RJ 2017 ii MARCO ANTONIO ABI-RAMIA JUNIOR MATRÍCULA: M054.216.008 GERENCIADOR DE ATIVOS DE PROTEÇÃO EM SUBESTAÇÕES BASEADO NA IEC 61850 Dissertação de Mestrado apresentada ao Programa de Pós Graduação em Engenharia Elétrica e Telecomunicações da Universidade Federal Fluminense, como requisito parcial para obtenção do Grau de Mestre em Engenharia Elétrica e de Telecomunicações. Orientadora: Prof. Natália Castro Fernandes, D.Sc. Coorientador: Prof. Márcio Zamboti Fortes, Dr. Niterói, RJ 2017 iii iv MARCO ANTONIO ABI-RAMIA JUNIOR GERENCIADOR DE ATIVOS DE PROTEÇÃO EM SUBESTAÇÕES BASEADO NA IEC 61850 Dissertação de Mestrado apresentada ao Programa de Pós Graduação em Engenharia Elétrica e Telecomunicações da Universidade Federal Fluminense, como requisito parcial para obtenção do Grau de Mestre em Engenharia Elétrica e de Telecomunicações. Aprovado em 20/12/2017. v Este trabalho é dedicado aos meus queridos pais, Marco Antonio Abi-Ramia e Helena Maria Baptista Pereira Abi-Ramia, que muito se esforçaram para me possibilitar boas oportunidades de estudos, e que sempre me apoiaram e incentivaram nas realizações de meus projetos, mesmo os mais inusitados. vi AGRADECIMENTOS A Deus, que está ao meu lado em todo os momentos de minha vida, me dando conforto, alento, coragem e força. À Ana Maria Dore Bastos Abi-Ramia, minha esposa companheira, que nos momentos de sufoco sempre me lembrou de que sou capaz de ultrapassar os obstáculos. Obrigado pelo carinho, a paciência e por sua capacidade de me acalmar na correria da vida entre as obrigações do trabalho, estudo, família e lar.
    [Show full text]
  • Sensors 2012, 12, 10259-10291; Doi:10.3390/S120810259 OPEN ACCESS Sensors ISSN 1424-8220 Article Funblocks
    Sensors 2012, 12, 10259-10291; doi:10.3390/s120810259 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Article FunBlocks. A Modular Framework for AmI System Development Rafael Baquero 1,*, José Rodríguez 1, Sonia Mendoza 1, Dominique Decouchant 2,3 and Alfredo Piero Mateos Papis 2 1 Department of Computer Science, CINVESTAV-IPN, Instituto Politécnico Nacional 2508, San Pedro Zacatenco, Del. Gustavo A. Madero, DF 07360, Mexico; E-Mails: [email protected] (J.R.); [email protected] (S.M.) 2 Department of Information Technologies, UAM Cuajimalpa, Av. Constituyentes 1000 Lomas Altas, Del. Miguel Hidalgo, DF 11950, Mexico; E-Mails: [email protected] (D.D.); [email protected] (A.P.M.P.) 3 Centre National de la Recherche Scientifique, Laboratoire LIG, 681 Rue de la Passerelle, 38400 St Martin d’Hères, France * Author to whom correspondence should be addressed; E-Mail: [email protected]; Tel.: +5255-5747-3800 (ext. 3758); Fax: +5255-5747-3757. Received: 6 June 2012; in revised form: 12 July 2012 / Accepted: 27 July 2012 / Published: 30 July 2012 Abstract: The last decade has seen explosive growth in the technologies required to implement Ambient Intelligence (AmI) systems. Technologies such as facial and speech recognition, home networks, household cleaning robots, to name a few, have become commonplace. However, due to the multidisciplinary nature of AmI systems and the distinct requirements of different user groups, integrating these developments into full-scale systems is not an easy task. In this paper we propose FunBlocks, a minimalist modular framework for the development of AmI systems based on the function module abstraction used in the IEC 61499 standard for distributed control systems.
    [Show full text]
  • Remote Control with the IEC 60870-5 Standard Protocol
    Remote control with the IEC 60870-5 standard protocol Remote control requires devices from different manufacturers to communicate with each other and exchange data. Data traffic is defined by the standardized remote control protocol IEC 60870-5-101 for transmission via serial interfaces and modem and by IEC 60870-5-104 for TCP/IP-networks. The FP Web-Server supports both methods of data transmission, making it possible to integrate our programmable logic controllers (PLCs) into remote stations (RTU) or as a gateway between various network structures/protocols and manufactur- ers. As an RTU (Remote Terminal Unit), the PLC can be easily configured using a Web-based user interface, without requiring programming skills. In addition to the typical station parameters such as link address, AS- DU (Application Service Data Unit), etc., using a drop-down menu you can assign each digital or analog I/O the desired IEC data type, IOA (Information Object Address) as well as the parameters required by each data type. Moreover, the Web-based user interface offers an exhaustive diagnostic page to help commission your project. The IEC-Communicator combines the advantages of a PLC with safe data transmission with the standardized remote control protocol for connecting main stations and process control systems. The FP Web-Server has a serial port for data exchange and modem transfer (IEC 60870-5-101), as well as an External port for TTCP/IP connections (IEC 60870-5- 104). With the help of the GPRS terminal, the FP Web- Server can also communicate via GPRS. The multi-functional Ethernet unit supports many typical network services such as e-mail, time synchronization, HTML display, Modbus-TCP, SNMP and FTP together with IEC 60870 communication.
    [Show full text]
  • Simulation of Industrial Control System Field Devices for Cyber Security
    DEGREE PROJECT IN COMPUTER SCIENCE AND ENGINEERING, SECOND CYCLE, 30 CREDITS STOCKHOLM, SWEDEN 2017 SIMULATION OF INDUSTRIAL CONTROL SYSTEM FIELD DEVICES FOR CYBER SECURITY DOROTHEA ANDERSSON KTH ROYAL INSTITUTE OF TECHNOLOGY SCHOOL OF ELECTRICAL ENGINEERING TRITA EE 2017:001 www.kth.se SIMULATION OF INDUSTRIAL CONTROL SYSTEM FIELD DEVICES FOR CYBER SECURITY Dorothea Andersson A Master Thesis written in collaboration with Department of Information Security and IT Architecture Swedish Defense Research Agency Linköping, Sweden Department of Electric Power and Energy Systems KTH - Royal Institute of Technology Stockholm, Sweden December, 2016 Abstract Industrial Control Systems (ICS) are an integral part of modern society, not least when it comes to controlling and protecting critical infrastructure such as power grids and water supply. There is a need to test these systems for vulnerabilities, but it is often difficult if not impossible to do so in operational real time systems since they have been shown to be sensitive even to disturbances caused by benign diagnostic tools. This thesis explores how ICS field devices can be simulated in order to fool potential antagonists, and how they can be used in virtualized ICS for cyber security research. 8 different field devices were simulated using the honeypot daemon Honeyd, and a generally applicable simulation methodology was developed. It was also explored how these simulations can be further developed in order to function like real field devices in virtualized environments. Keywords ICS field device simulation. Test beds. CRATE. Honeyd. Nmap. Wireshark. QTester104. IEC 60870-5-104. Sammanfattning Industriella informations- och styrsystem utgör en viktig del av vårt moderna samhälle, inte minst när det gäller kontroll och skydd av kritisk infrastruktur som elnät och vattenförsörjning.
    [Show full text]
  • BRKIOT-2111.Pdf
    IoT in Substation and Energy Automation BRKIOT-2111 Paulo Pereira, Consulting Systems Engineer Internet of Things, Europe Agenda • Introduction • Cisco Architectural Approach • IEC 61850 Technical Overview • Fundamental Architectural Design Elements • Security Standards for Energy • Cisco IoT Portfolio for Energy Automation • Conclusion / Key Take Aways BRKIOT-2111 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Introduction Power Utilities Introduction • Many utilities looked this way in most of the 20th century. Regulation has changed this model considerably in most countries… • Most of World Grid is AC (50Hz Alternating Current in EMEA = 20ms full cycle) • Very Important to maintain frequency within very tight limits as rolling blackout may occur • No significant energy storage in the grid => Power must be kept in balance (generation follows load) BRKIOT-2111 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public Power Utilities Infrastructure Primary Power Systems Step-up Transformer 13.8 kV / Transmission voltage level Transmission (220, 345, 500, 765 kV) Generation Station 13.8 kV Sub-transmission Switching Stations/ (161, 115, 69 kV) Transmission Substation Distribution Feeders 3-phase (7, 11, 33 kV) Distribution Substations Sub-transmission voltage level Generation Station 13.8 kV Service Transformers 7 kV to 120/240 V Secondary 120/240 V BRKIOT-2111 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public Power Utilities Infrastructure Distribution Grid Detail • Monitor • Measure • Control • Automation • Protection BRKIOT-2111 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public Cisco Architectural Approach Industry Drivers and Network Impact Changes in the HV Electrical Grid and Communications Electrical Grid Drivers Potential Network Impact (System Control Tier) Evolution from Centralized Generation to Distributed New locations requiring communications, use cases for Wide Area Generation and Storage Measurement and Control.
    [Show full text]