beautypg.com

ProSoft Technology 5201-DFNT-DNPM User Manual

Page 23

background image

DNPM Protocol Configuration

DNPM ♦ ProLinx Gateway

Driver Manual

DNP 3.0 Master


ProSoft Technology, Inc.

Page 23 of 56

September 30, 2009

Besides issuing commands to slave devices, the command list is also used to
map data received in event messages to the proper database locations. For
example, Slave 1 and Slave 1 both possess binary point 0. When an event from
each slave is received, the data entered into the command list is utilized to place
the data for the two events in the correct database location. When the command
list is read by the module is forms lists for each slave relating the address in the
device to that in internal database of the module. The following illustration shows
how the module stores this data:

SLAVE LIST

Address

Address

Address

DNP Data

DNP Data

DNP Data

Comm Data

Comm Data

Comm Data

Next Ptr

Next Ptr

Next Ptr

Null

DI | AI | C

DI | AI | C

DI | AI | C

DI Pnts

Null

Cntr Pnts

DI Pnts

Null

Cntr Pnts

DI Pnts

AI Pnts

Null

DI Pnts

Cntr Pnts

DI Pnts

Null

DI Pnts

AI Pnts

Null

Cntr Pnts

DI Pnts

Null

AI Pnts

Null

Null

Null

DI Pnts are generated for each command with an object type of 1.
AI Pnts are generated for each command with an object type of 30.
Cntr Pnts are generated for each command with an object type of 20 or 21.

The point lists are used by the module to determine the destination of all data
read by the module from the IED's. When the master receives a poll response or
an unsolicited response message, the points in the message are mapped to the
IED database using the point lists. For example, when the master receives a
value for binary input point 10 from slave unit 14, the following steps are
performed by the module:

1 First the module searches the slave list to make sure slave 14 is valid for the

module. If the slave not found the message is ignored. If the slave is found,
the module saves the pointer to the binary input point list.

2 Point number 10 is searched for in the binary input point list. If the point is

found in the DNP point list, the new value is stored at the correct offset in the
BI database. If the point is found in the IED point list, the new value is stored
at the correct offset in the IED database. If the point is not found in either
point list, it is ignored.

Each node in the point lists contain the start-stop IED point ranges and the IED
database offset values. These values are read by the module from the command
list each time the module performs the restart operation. If the database address
value is set to -1, the database is not used for the specified point range.

When the lists are formed by the module, the enable/flag field is ignored.
Therefore, you can place commands that will not be executed in the command
list and are only used for data mapping.

This manual is related to the following products: