enclosure weatherproof horiz

ENCLOSURE WEATHERPROOF HORIZ

Catalogue Number: 223H
enclosure weatherproof horiz
Colour: White Electric
Colour: Per UOM Std.
  • White Electric 1 PCE 1

Specifications

hide show
Range of product
Series 2000
Product brand
Clipsal
Length
127 mm
Width
103 mm
Depth
27 mm
EU RoHS Directive
Compliant
Toxic heavy metal free
Yes
Mercury free
Yes
RoHS exemption information
Yes
China RoHS Regulation
 Pro-active China RoHS declaration (out of China RoHS legal scope)

Documents & downloads

hide show
Filter items
  • All

  • CAD Files and Packs

  • Installation Instruction

  • Product Environmental

  • Operating Manuals

  • Specifications

  • Certificates (MSDS)

Frequently Asked Questions

hide show

Does the 223H weather protected Enclosure fit the 600 series plates?

Yes, the 223H can fit the PDL 600 series plates.   
https://www.clipsal.com/Trade/Products/ProductDetail?catno=223H

Will Zen switch plate fit in 223H and 255 enclosures?

Yes, Zen switch plates will fit in 255 as it has a depth of 77mm. It will not fit in 233H as it has a depth of 29mm only.

For further information, please visit 
https://www.clipsal.com/Trade/Products/ProductDetail?catno=223H

https://www.clipsal.com/Trade/Products/ProductDetail?catno=255

 

Does part number 223H come with plastic flap?

Yes part number 223H is supplied complete with plastic Flap

for more information on this part please refer to https://www.clipsal.com/Trade/Products/ProductDetail?catno=223H

User-added image

Will a dimmer fit in the 223H weather proof enclosure?

No. Unfortunately, it will not fit. The lid will sit about 10mm open which will then void its IP rating.
 

What is the dimensions for a PDL DBF15

DBF15 D Board Flush 15 Way 1.7Kgs
Board size 376w x 258h x 100d
Hole size335w x 223h x 80d inc wallboard

What are the dimensions for a PDL DBF10?

Board Size - 286w x 258h x 100d
Hole Size - 246w x 223h x 80d inc wallboard

 

What is the dimension and IP rating of 223H weather protected enclosure?

 The dimension of 223H is 127mm(L) x 103mm(W) x 27mm(D). Mounting centres are 84mm apart (94mm x 50mm). The IP rating is IP23.
For further information, please visit https://www.clipsal.com/Trade/Products/ProductDetail?catno=223H
 

What are the dimensions of the 3100E50IDFIP?

190W x 220H x 110D mm

What would be the dimensions for a DBF60, DBF45, DBF30 and DBF15.



335W x 625H x 80D. dbf60
335W x 491H x 80D. dbf45
335W x 357H x 80D. dbf30
335W x 223H x 80D. dbf15
These are flush mount boards in the PDL range in 15, 30, 45 and 60 module.
Please see following link for more product detail under the documents tab.
https://www.clipsal.com/Trade/Products/ProductDetail?catno=DBF15

Is it possible to source a C-Bus switch which is weatherproof?

There are no C-Bus switches made as weatherproof. There are 2 options for solutions.

1 - Install a product such as a cover, flap or shroud that protects a C-Bus switch better. E.g. 255, 223H, WS226.
2 - Any general electrical switch can be 'coupled' to C-Bus so it can act as a C-Bus switch on the network.
The C-Bus Bus Coupler part name is as follows 5102BCLEDL or 5104BCL.

Can you arm a NESS alarm panel with MiniCentral from a C-Bus Switch?

Yes, it is possible to arm the system from a C-Bus wall switch, but you are not able to disarm from a single C-Bus Group address as this is a security vulnerability

You will require the Ness MiniCentral Software
- Connect a 9pin Serial cable from your PC to Com1 on the MiniCentral
- Open the NESS MiniCentral Software
- You will see 'Area Application' - this relates to the C-Bus Application for Lighting and needs to match the Application that the Group command will be received from
- You will also see 'Area Identity' - this is the 3 digit number that relates to the Group Address, (Example: Group 'Security Arm' = Group Address: 223)
Enter 223 in this field as this is what the NESS MiniCentral will respond to, to arm the system.

On the NESS Alarm Keypad:
- Enter Program Mode
- Press P202E or any memory location that is not currently used for a user code (P202E - P255E)
- For this example press P202E enter 223 then enter, then repeat to confirm, once confirmed this will flash back 223 on the keypad screen.
- Press P and E to exit

In Toolkit:
- Open a Key input unit (Switch)
- on a free key Select the group 'Security Arm' if not created, create a new group address and select for this example the 223 address that was entered in the alarm system.
- Save to unit.

Group Address 223 is used as an example, but you are limited to 3 digits that are in the C-Bus lighting group address range (000-254)

Once this has been completed you will be able to press the button on the keyinput and this will arm the Alarm System.

What does the Counters 22, 2C, 2E, 2F depict in FIPIO Communication.

Counter 2Eh (Number of Pierced Frame Fault): 

This counter allows diagnoses of the receipt of a silent inside a frame i.e. between the identification of the frame beginning and the frame ending. This counter can increment either if cable is failed (physical layer) or with a dysfunction of a station.
 
Counter 22h (Hyper Current fault):
 
This fault counter increments if short-circuit is detected or more than two terminal links (ACC7) are connected.
 
Counter 2Ch (Frame Check Sequence Fault) & Counter 2Fh (Coding Fault):
 
These fault counters increments when there is an issue of EMC.
 
The probable reasons for the fault to occur are:
 
1 Wiring problem.
2 Too many devices on one segment.
3 Segment too long.
4 Grounding is bad.
 
To check this network, TSXFPACC9 module can be used.

Why M238 plc not in RUN after power off/on ?

If you do not have external battery or external battery is depleted, sio only internal battery is in M238. You need to let in charge at least 22h before doing a power off. The full chardged internal battery can support a poweroff of the PLC only 3 days duration without losinf any datas. With more than 3 days without power (and without external battery), the PLC will stay in STOP at the next powerON because the internal state of the PLC( Stop or RUNNING) is included into the "few system internal variables" saved into the 'RAM saved area' during PowerOff procedure.
Recommandations: 1)Use the external battery or; 2) Configure the External input as STOP/RUN input; 3) Change the Starting mode options in SoMachine software to "Start in Run".

Change default WebX ports in ClearSCADA

This article explains how the default WebX ports can be changed for the redesigned WebX interface in ClearSCADA 2015 R1 and later versions. The default ports are set to 85 for HTTP (non-secure) and 453 for HTTPS (secure) connections. This configuration can be altered from Microsoft Internet Information Services (IIS) Manager.

To change the default ports do the following:

1. Launch Internet Information Services (IIS) Manager on the machine hosting ClearSCADA Server.
2. Locate the ClearSCADA site and click on Bindings.
3. Select the connection you would like to edit and hit the Edit button.
4. Type the desired port number and hit OK. Make sure the new port is vacant and can be accessed by the clients. Please do not set the same ports for WebX and the Original WebX. The appropriate SSL Certificate can also be selected for the secure port (HTTPS) at this stage.
5. Restart the ClearSCADA site by clicking on Restart located in the Manage Website section.

Keep in mind that the secure WebX port in ClearSCADA 2015 R1 is also being used by ClearSCADA Mobile if it is installed on the same machine. ClearSCADA Mobile uses port 443 by default in all ClearSCADA versions prior to 2015 R1 and in newer.

Performance Effects of 10Mb/s vs. 100 Mb/s on Ethernet cable from a NOE Module to the Switch

Goals and Symptoms

This document will outline factors related to performance including, PLC CPU scan time, Modbus data types and Ethernet Line bandwidth. It will become apparent that in an automation network the speed of the wire is not the hindering factor when it comes to performance.

Facts and Changes

Quantum Platform, SCADA system, 10/100 MB Ethernet cables, Unity Pro, Concept, Proworx NxT, Proworx 32

Causes and Fixes

The number of Modbus requests serviced by the NOE module will vary by the NOE module Exec version and the CPU that it is attached to. But in a maximum case the module can service 12 Modbus requests per PLC scan.
In the example below, we calculate the time it takes to send 1 Modbus query to read 100 holding registers (4x) and receive 1 Modbus response to that query on a 10 Mbs Ethernet link.

As a reminder, in this resolution the actual Ethernet cables speed is
At 10 Mb/s transfer rate it can carry 10 * 1,000,000 = 10,000,000 bits/second
At 100 Mb/s data transfer rate, it can carry 100 * 1,000,000 = 100,000,000 bits/second


Modbus query of reading 100 4x holding registers is 82 bytes
MAC 18 bytes (6 Destination MAC, 6 Source MAC, 2 Ether type, 4 FCS)
IP Header 20 bytes
TCP Header 20 bytes
MB Header 7 bytes (2 XID, 2 Protocol version, 2 length, 1 unit ID,)
MB PDU 5 bytes (1 byte function code, 2 start reference, 2 no of words to read)
IPG 12 bytes
Query Total 82 bytes
656 bits of data

On a 10 Mb/s link 656 bits/10,000,000 bits/s = 0.0656 ms
On a 100 Mb/s link 656 bits/100,000,000 bits/s = 0.00656 ms

Sending 12 of such messages on a 10 Mb/s link will only take about 0.7872 ms and the same message sent on a 100 Mb link will take 0.07872 ms. As you can see the time difference is insignificant when compared to the actual CPU scan.

Modbus response to that query is 279 bytes
MAC 18 bytes (6 Destination MAC, 6 Source MAC, 2 Ether type, 4 FCS)
IP 20 bytes
TCP 20 bytes
MB Header 7 bytes (2 XID, 2 Protocol version, 2 length, 1 unit ID,)
MB PDU 202 bytes (1 function code, 1 byte count, 100 words response data)
IPG 12 bytes
Response Total 279 bytes
2232 bits

On a 10 Mb/s link 2232 bits/10,000,000 = 0.2232 ms
On a 100 Mb/s link 2232 bits/100,000,000 = 0.02232 ms

Note: Message size does have bearing on overall transmission time and it takes longer to transmit the response than to send a query.

Sending 12 of such message on a 10 Mb/s link will take 2.6784 ms and the same message sent on a 100 Mb/s link will take 0.26784 ms.

For an average CPU you will have a 35 ms scan time. Therefore any delay to link speed being either 10 MB or 100 MB is reasonably insignificant compare to CPU scan.

Application Example for Network utilization:

In this example the CPU is executing 10 Modbus Query/Response transactions as outlined above to simulate IO Scanning 100 registers at a 100ms Repetition Rate.

0.000656 % TX Load @ 10 Mbs
0.002232 % RX Load @ 10 Mbs

0.0000656 % TX Load @ 100 Mbs
0.0002232 % RX Load @ 100 Mbs

The link speed comparison is insignificant on Application Response Time compared to other factors:

o CPU scan
o Datatypes requested (4x register vs. none 4x)
o Half duplex operation
o Slave device response time delay

Note: Half duplex can be a significant factor at either 10 or 100 Mb/s due to collisions which will result in communication delays. Typically devices operating at 10 Mb are usually operating at half duplex and therefore subject to collision.



I/O Scanner
I/O Scanner messages are serviced at the end of CPU scan. Each IO Scanner entry requires 0.3 ms to process. IO Scanners response time also depends on the response time of the remote device being IO Scanned.

For example one I/O scanner entry that reads/writes 10 words (~115 bytes or 920 bits) takes approximately 0.092 ms to send on 10 Mbs link, versus 0.0092 ms to process on a 100 Mbs link. The actual time difference related to the connection speed in this example is less than 1 millisecond at 0.0828 ms.

In summary the CPU scan and remote devices response time have more impact on I/O Scanner response time than the link speed. Regardless of the link speed the difference is minute.


Legacy KB System (APS) Data: RESL181788 V2.0, Originally authored by BeCh on 01/27/2007, Last Edited by BeCh on 02/06/2007
Related ranges: Modicon Quantum NOE - TR

When using the 140 EHC202 00 High Speed Counter, how do I reset my counter value(s) to zero, or maximum value?

Using the "Parameter" screens the module is configured for its set points,max value
and mode of operation. To reset the count is a simple matter of sending a command
to the first 4x register of the module's I/O map reference. Prior to doing anything you
should be aware of the terminology involving this module.

Reset: Turning off the output coils associated with the card. Reset has nothing to do
with your count values being set to 0 or max value.
Preset: This can be a hardware input or software command. Preset will set your current
count to zero if your counting up, or to max value if your counting down.

To Preset and Enable counters 1 and 2... Send the value 233H to the module.
To Preset and Enable counter 1 only..... Send the value 203H
To Preset and Enable counter 2 only......Send the value 230H

A hardware Preset is accomplished by pulsing the Preset input terminal on the EHC 202 for counter 1
or counter 2.



Follow the above mentioned command with a 300H command, which is the Read Counter command.
If you want to know what the last count was prior to Preset,send a 400H command. This command
will buffer the last count seen by the counters just before the Preset command arrived.

Remember, you can Preset the module with hard wired inputs to the Preset input of each counter or
you can use the software Preset described here. It is permissible to use both methods simultaneously
if you wish. Follow the wiring diagrams in the Quantum Hardware Reference Guide, they are accurate and
should be relied upon for proper module operation.
 


Legacy KB System (APS) Data: RESL6011 V2.0, Originally authored by on , Last Edited by on
Related ranges: Modicon Quantum

Connect a remote OPC client to ClearSCADA

Problem

Need to connect a remote OPC client to ClearSCADA and bypass DCOM.

Solution

This can be achieved by installing the Data Access component of ClearSCADA on the remote machine that hosts the OPC client. To install and configure the Data Access component follow the steps below:

1. Run the ClearSCADA Installer on the remote machine hosting the OPC client and select "Install ClearSCADA".

2. Select Custom installation and only install the Data Access component:

3. You should now see the Configure Connections program if you click on the Windows Start button. If the program cannot be located in Windows Start menu, the program can be run directly from: C:\Program Files (x86)\Schneider Electric\ClearSCADA\ClientConfig.exe (on 64-bit machines) or C:\Program Files\Schneider Electric\ClearSCADA\ClientConfig.exe (on 32-bit machines)

4. Run the Configure Connections program and create a connection to the ClearSCADA server by specifying the IP address (or server name) of the ClearSCADA server in the Node Name field of the Node A tab and select OK to apply the changes: 

5. Your OPC Client should now see ClearSCADA OPC Server among its local OPC servers as below:

The OPC service name appears in the following formart based on the information defined within the Configure Connections program:

    Serck.ScxV6OPC[OPC type].[System name].[Host address or IP address]

The Data Access component uses TCP port 5481 (default) to communicate to the ClearSCADA server and the server connects
back to the client on TCP ports 5500-5509. Make sure these ports are not being blocked on either machine hosting the OPC
client or the ClearSCADA server. It is possible that your application might have different ports allocated for client-server communication. 

For more information refer to the article Firewall Configuration to Allow Client - Server Comms

When using the 140 EHC202 00 High Speed Counter, how do I reset my counter value(s) to zero, or maximum value?

Using the "Parameter" screens the module is configured for its set points,max value
and mode of operation. To reset the count is a simple matter of sending a command
to the first 4x register of the module's I/O map reference. Prior to doing anything you
should be aware of the terminology involving this module.

Reset: Turning off the output coils associated with the card. Reset has nothing to do
with your count values being set to 0 or max value.
Preset: This can be a hardware input or software command. Preset will set your current
count to zero if your counting up, or to max value if your counting down.

 To perform the initial start up of the module you can send any of the following commands
 based upon the number of counters being used. The value should be sent to the 1st
 4xxxxx or %MW assigned to the module in the IO Map.

Startup
To Preset and Enable counters 1 and 2... Send the value 233H to the module.
To Preset and Enable counter 1 only......... Send the value 203H
To Preset and Enable counter 2 only..........Send the value 230H

 Following the Preset and Enable command you will send the Read command to the 1st
4xxxxx or %MW reference assigned to the module in the IO Map

 Read Counters  1 & 2  ...............................Send the value 300H


Run Time
  Once the PLC application is running and you wish to Preset and Enable counters 1 & 2
 send the following commands to the EHC202.

To Preset and Enable counters 1 and 2... Send the value  0033H to the module.
To Preset and Enable counter 1 only......... Send the value  0003H
To Preset and Enable counter 2 only..........Send the value  0030H


If you want to know what the last count was prior to Preset send a 400H command. This command
will buffer the last count seen by the counters just before the Preset command arrived.

Remember, you can Preset the module with hard wired inputs to the Preset input of each counter or
you can use the software Preset described here. A hardware Preset is accomplished by pulsing the
Preset input terminal on the EHC 202 for counter 1or counter 2. It is permissible to use both methods
simultaneouslyif you wish. Follow the wiring diagrams in the Quantum Hardware Reference Guide
they are accurate and should be relied upon for proper module operation.
 


Legacy KB System (APS) Data: RESL6011 V2.0, Originally authored by on , Last Edited by on
Related ranges: Modicon Quantum

Setting Up IPMI on StruxureWare Data Center Expert Enterprise

Issue:

Setting Up IPMI on NetBotz Central Enterprises

Product Line:

NetBotz Central
StruxureWare Data Center Expert
InfraStruxure Central

Environment:

Only NetBotz Central Enterprise Revision D (or later)

Cause:

Optional Bios Configurations.

Resolution:

Note: Only NetBotz Central Enterprise Revision D (or later) systems support IPMI. Revision D systems start with the serial number / MAC address
of: "00:11:43:xx:xx:xx".

The IPMI interface is NOT configured by default on NetBotz Central Enterprise. To enable and configure IPMI administrators must use the "IPMI Server Management Configuration Utility". To access this utility a keyboard and monitor must be attached to the NetBotz Central Enterprise system. While the system is booting, press "Control + E" to enter the "IPMI Server Configuration Utility". In some newer systems, this may be listed as BMC.

The following settings should be configured:

  • Ensure that ""IPMI Over LAN"" is set to ""On"" as shown below in the figure below.
  • If not using DHCP, supply an appropriate IP address, subnet, and gateway as shown in figure 2 below. Also ensure that ""VLAN Enable"" is set to ""Off"". The IP Address supplied is NOT the same IP address used by the main NIC on the server operating system.
  • Ensure that the ""Administrator Account"" is set to ""Enable"" and specify an administrator account and password as in figure 3 below.
  • Upon completing the configuration tasks above, press the Esc key. The utility will save the settings and continue the boot process.
Please note that most versions of StruxureWare DCE hardware has the IPMI option and there may be different options to get to them. Check the Dell web site using your Dell service tag to verify hardware version.

Configure Sufficient ClearSCADA Logging

This article is a brief summary of several detailed articles about configuring ClearSCADA logging that can be found in the Logging and Log File Analysis section. It should be understood that in most cases the default logging settings in ClearSCADA are only sufficient to capture a time window of a few minutes. One should always make sure that ClearSCADA logging is configured to capture events over a sufficient time window in order for log files be useful when troubleshooting issues.

The information provided below will explain how to increase the number of log files for ClearSCADA server, drivers and clients.

For more information about each type of ClearSCADA logging please go over the dedicated articles in the Logging and Log File Analysis section.

This article covers the following topics:

  • Setting up Server Logging
  • Setting up Driver Logging
  • Setting up Snapshot Logging
  • Setting up DBClient Logging
  • Setting up ViewX Logging (for ClearSCADA 2014 R1 onwards)
  • How Much Logging is Sufficient?


Setting up Server Logging


To configure server logging, please right click on the ClearSCADA Server Icon and select Configuration. Once the Server Configuration dialog is displayed, navigate to the page shown in the screen capture below and change Maximum Size Of Each FileMaximum Number of Files and Number of Old Files to Keep to sufficient values. The location of the server log files is shown in File Base.



Sometimes a Schneider Electric engineer might ask you to enable/disable certain server logging options. To do such, please right click on the ClearSCADA Server Icon and select Status for the Status dialog to get displayed. Once the dialog is displayed, navigate to the section below for a list of all server side logging options available in ClearSCADA. To enabled/disable an option, right click on the option and select Enable/Disable respectively.



 

Setting up Driver Logging


To configure driver logging, please right click on the ClearSCADA Server Icon and select Status. In the Status dialog, navigate to the section below for a list of all ClearSCADA drivers installed on the server. Right click on the particular driver and select "Logging...". Under the Configuration tab, increase Maximum Size of Each FileMaximum Number of Files and Number of Old Files to keep to sufficient values. File Base shows the location of the driver log files.



Sometimes a Schneider Electric engineer might ask you to enable/disable certain driver logging options. To do such, navigate to the Current Options tab in the Driver Logging dialog as per the screen capture below. To enable (disable) additional logging options, select (deselect) the required option from the Options list and apply the change.



 

Setting up Snapshot Logging


On some occasions a Schneider Electric engineer might ask you to increase the amount of ClearSCADA snapshot log files. To do that please right click on the ClearSCADA Server Icon and select Configuration. Navigate to the Registry section (shown in the screen shot below) and increase LogMaxFileLogMaxSize and LogOldFiles to the requested amount. The location of the DBSnapshot log files is shown in LogFileBase.



 

Setting up DBClient Logging


To configure DBClient logging, open up Windows Registry and navigate to \HKEY_CURRENT_USER\Software\Schneider Electric\ClearSCADA\DBClientNamed. Make sure the logging is enabled and increase LogMaxFilesLogMaxSize and LogOldFiles values. The location of the DBClientNamed log files is shown in LogFileBase.




 

Setting up ViewX Logging (for ClearSCADA 2014 R1 onwards)

ViewX in CS2014 R1 onwards uses WPF and .NET technologies. The configuration of this new ViewX application uses SE.Scada.ViewX.exe.config XML files located adjacent to the SE.Scada.ViewX.exe application itself (%ProgramFiles(x86)%\Schneider Electric\ClearSCADA\ SE.Scada.ViewX.exe.config).

In File Browser, with no visible extensions:
 


 

In command line or with file extensions visible:
 


 

And the SchneiderElectric.Scada.ViewX.Properties.Settings element defines its configuration. Specifically, to control logging, the following elements’ values need changing:
 


 

It is likely that the SE.Scada.ViewX.exe.config file will require administrator permissions to edit the settings.
To edit settings, open the editor (e.g. Notepad) as administrator and then open the XML configuration file from within the editor.
 
Note that an upgrade of ClearSCADA will overwrite the existing XML configuration file with the default configuration.
The XML configuration file will need to be re-configured after an upgrade of ClearSCADA takes place.
 


How Much Logging is Sufficient?


When the maximum number of log files that ClearSCADA generates is reached, the oldest log files get overwritten and information they contain gets lost. Therefore one should always make sure the log files of interest get collected before they get overwritten. The number of log files to keep is specific to each application as the amount of information logged depends on the nature of the application, the size of the database, drivers used, logging options enabled etc. Ideally one would want ClearSCADA log files to at least capture a time window of several days to cover weekends, long weekends and other long holidays to make sure the log files do not get overwritten when there is no one is available to collect them. To check how much time is captured by a certain type of ClearSCADA log files, one could simply locate the set of these log files using their File Base and check Date Modified of the first and of the last log file of the same type.


 

Be aware that enabling (disabling) additional server or driver logging options will reduce (increase) the time window captured by ClearSCADA logging. This means that the amount of log files of a particular type that ClearSCADA generates will need to be adjusted accordingly to capture the same time window.
 

Please be mindful of the space available on your hard drive. For example, if Maximum Size Of Each File is set to 5000KB, 
Maximum Number of Files is set to 25 and Number of Old Files to Keep is set to 2, the required space on the hard drive is going to be:

Maximum Size Of Each File x Maximum Number of Files x (1 current set + Number of Old Files to Keep) or

5000KB x 25 x (1 + 2) = 375000KB

Where 375000 / 1024 = 366MB


Planning which disk / partition is going to store log files is important, to avoid impacting other ClearSCADA file-relate operations – e.g. consider using a separate disk for log files. 

Planning and configuring log file collection at the time deployment of the system is planned is important. For instance, reserving insufficient disk space and switching ‘off’ many of the default categories of logging for normal operation of the system will be a problematic position: when a problem is detected and logs are required to investigate the problem, little information will be in the logs and re-dimensioning disks/partitions may be necessary to get the logging required to investigate the problem on a subsequent occurrence. Whereas, well planned and sufficient, default logging, will hopefully provide sufficient information to investigate a single occurrence of a problem.

Understanding common network and internet terminology.

Goals and Symptoms

Internet users may require to know the current TCP/IP network configuration values for setting up their Ethernet devices for TCP/IP connection or sending/receiving Email. In the example below, the ION meter is required to have its own IP address, Subnet mask, Gateway, DNS and SMTP server etc. Some of this information may be found on the network, or a network administrator may have to provide details. This is a document shows how to find common information and also explains the terminology.

Causes and Fixes

Displaying the current TCP/IP network configuration values:
Go to Start > Run > and type cmd and click ok. In the command line type ipconfig/all



Ipconfig is a command line tool used to control the network connections on Windows NT/2000/XP machines. There are three main commands: "all", "release", and "renew". Ipconfig displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Used without parameters, ipconfig displays the IP address, subnet mask, and default gateway for all adapters.

 

 

Understand internet terminology:

DNS server

Short for Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses. Every time a domain name is used, a DNS service must translate the name into the corresponding IP address. For example, the domain name www.example.com might translate to 198.105.232.4.

The DNS system is, in fact, its own network. If one DNS server doesn't know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned.

 

DHCP server

Short for Dynamic Host Configuration Protocol, a protocol for assigning dynamic IP addresses to devices on a network. With dynamic addressing, a device can have a different IP address every time it connects to the network. In some systems, the device's IP address can even change while it is still connected. DHCP also supports a mix of static and dynamic IP addresses.

Dynamic addressing simplifies network administration because the software keeps track of IP addresses rather than requiring an administrator to manage the task. This means that a new computer can be added to a network without the hassle of manually assigning it a unique IP address. Many ISPs use dynamic IP addressing for dial-up users.

 

WINS server

Short for Windows Internet Naming Service, a system that determines the IP address associated with a particular network computer. This is called name resolution. WINS supports network client and server computers running Windows and can provide name resolution for other computers with special arrangements. Determining the IP address for a computer is a complex process when DHCP servers assign IP addresses dynamically. For example, it is possible for DHCP to assign a different IP address to a client each time the machine logs onto the network.

WINS uses a distributed database that is automatically updated with the names of computers currently available and the IP address assigned to each one.

DNS is an alternative system for name resolution suitable for network computers with fixed IP addresses.

 

 

IP Address

An identifier for a computer or device on a TCP/IPnetwork. Networks using the TCP/IP protocol route messages based on the IP address of the destination. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be zero to 255. For example, 1.160.10.240 could be an IP address.

Within an isolated network, IP addresses can be assigned at random as long as each one is unique. However, connecting a private network to the Internet requires using registered IP addresses (called Internet addresses) to avoid duplicates.

Every computer that communicates over the Internet is assigned an IP address that uniquely identifies the device and distinguishes it from other computers on the Internet. An IP address consists of 32 bits, often shown as 4 octets of numbers from 0-255 represented in decimal form instead of binary form. For example, the IP address

168.212.226.204

in binary form is

10101000.11010100.11100010.11001100.

But it is easier for us to remember decimals than it is to remember binary numbers, so we use decimals to represent the IP addresses when describing them. However, the binary number is important because that will determine which class of network the IP address belongs to. An IP address consists of two parts, one identifying the network and one identifying the node, or host. The Class of the address determines which part belongs to the network address and which part belongs to the node address. All nodes on a given network share the same network prefix but must have a unique host number.

Class A Network -- binary address start with 0, therefore the decimal number can be anywhere from 1 to 126. The first 8 bits (the first octet) identify the network and the remaining 24 bits indicate the host within the network. An example of a Class A IP address is 102.168.212.226, where "102" identifies the network and "168.212.226" identifies the host on that network.

Class B Network -- binary addresses start with 10, therefore the decimal number can be anywhere from 128 to 191. (The number 127 is reserved for loopback and is used for internal testing on the local machine.) The first 16 bits (the first two octets) identify the network and the remaining 16 bits indicate the host within the network. An example of a Class B IP address is 168.212.226.204 where "168.212" identifies the network and "226.204" identifies the host on that network.

Class C Network -- binary addresses start with 110, therefore the decimal number can be anywhere from 192 to 223. The first 24 bits (the first three octets) identify the network and the remaining 8 bits indicate the host within the network. An example of a Class C IP address is 200.168.212.226 where "200.168.212" identifies the network and "226" identifies the host on that network.

Class D Network -- binary addresses start with 1110, therefore the decimal number can be anywhere from 224 to 239. Class D networks are used to support multicasting.

Class E Network -- binary addresses start with 1111, therefore the decimal number can be anywhere from 240 to 255. Class E networks are used for experimentation. They have never been documented or utilized in a standard way.

 

 

Subnet mask

A mask used to determine what subnet an IP address belongs to. An IP address has two components, the network address and the host address. For example, consider the IP address 150.215.017.009. Assuming this is part of a Class B network, the first two numbers (150.215) represent the Class B network address, and the second two numbers (017.009) identify a particular host on this network.

Subnetting enables the network administrator to further divide the host part of the address into two or more subnets. In this case, a part of the host address is reserved to identify the particular subnet. This is easier to see if we show the IP address in binary format. The full address is:

10010110.11010111.00010001.00001001

The Class B network part is:

10010110.11010111

and the host address is

00010001.00001001

If this network is divided into 14 subnets, however, then the first 4 bits of the host address (0001) are reserved for identifying the subnet.

The subnet mask is the network address plus the bits reserved for identifying the subnetwork. (By convention, the bits for the network address are all set to 1, though it would also work if the bits were set exactly as in the network address.) In this case, therefore, the subnet mask would be 11111111.11111111.11110000.00000000. It's called a mask because it can be used to identify the subnet to which an IP address belongs by performing a bitwiseAND operation on the mask and the IP address. The result is the subnetwork address:

Subnet Mask 255.255.240.000 11111111.11111111.11110000.00000000
IP Address 150.215.017.009 10010110.11010111.00010001.00001001
Subnet Address 150.215.016.000 10010110.11010111.00010000.00000000
The subnet address, therefore, is 150.215.016.000.

 

Gateway

Gateway is a node on a network that serves as an entrance to another network. In enterprises, the gateway is the computer that routes the traffic from a workstation to the outside network that is serving the Web pages. In homes, the gateway is the ISP that connects the user to the internet.

In enterprises, the gateway node often acts as a proxy server and a firewall. The gateway is also associated with both a router, which use headers and forwarding tables to determine where packets are sent, and a switch, which provides the actual path for the packet in and out of the gateway.

SMTP

SMTP is short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one server to another; the messages can then be retrieved with an e-mail client using either POP or IMAP. In addition, SMTP is generally used to send messages from a mail client to a mail server. This is why both the POP or IMAP server must be specified and the SMTP server when the e-mail application is configured.

 

POP

POP is short for Post Office Protocol, a protocol used to retrieve e-mail from a mail server. Most e-mail applications (sometimes called an e-mail client) use the POP protocol, although some can use the newer IMAP (Internet Message Access Protocol). There are two versions of POP. The first, called POP2, became a standard in the mid-80's and requires SMTP to send messages. The newer version, POP3, can be used with or without SMTP.

 

IMAP

IMAP is short for Internet Message Access Protocol, a protocol for retrieving e-mail messages. The latest version, IMAP4, is similar to POP3 but supports some additional features. For example, with IMAP4, a search can be done through the e-mail messages for keywords while the messages are still on mail server. The messages found can then be downloaded to the client machine.

Attachments

(Removed Image URL: /PubResEXPORT.nsf/2b87ee90be777fc085257c28006ee4ef/5e9d49715bbdd5fdc12575f900529d0f/fl_block_5/0.1A60?OpenElement&FieldElemFormat=gif)
Date Created: July 9, 2009
Last Revised: July 20, 2009
Public
Original Author: TL
All content © 1992-2009 Schneider Electric


Legacy KB System (APS) Data: RESL199409 V1.0, Originally authored by MiNe on 07/20/2009, Last Edited by MiNe on 07/20/2009
Related ranges: Ethernet and TCP/IP

Setting up Diagnostics for J Series radios

Problem

I'm having trouble getting Diagnostics working with Trio J Series radios. What am I missing?

Solution

Setting up the computer
  • Navigate to the computer’s network port setup and select the TCP/IPv4 dialog. Ensure the computer is set to a Static IP address, similar to that shown below.
Setting up the gateway radio
  • In the Access Point radio, or whichever radio which you are directly connecting your PC to (this is called the eDiags Gateway radio), go into Setup, then eDiag Setup and enable eDiags. Enter the IP address of your computer (must match the address entered above), then click the Activate Changes button.
Ensure you only enable eDiags in ONE radio at a time. It won't break the network if you enable it in more than one, but will cause some extra unnecessary chatter on the radio system which is not desirable. If you later run eDiags using another radio as the entry point, you must disable eDiags in the first radio, enable it in the second, then go into the TView Database entry for each radio and change the IP address to the new radio.
Setting up TView diagnostics database
  • Open TView Management Suite, then select the Diagnostics software package.
  • Click No if asked you whether you want to open a previously-used database. (unless you DO want to open that previously-created database!)
  • Go to the Settings menu then to eDiags Port Settings. Enter the IP address used by the LAN port of your computer again here. Some computers have more than one LAN card, so we must specify the appropriate port. Note the IP port number is 1040, same as in the radio. Leave this as-is. Click Apply Changes then Exit.
  • Go to the File menu, then New. Select a location to save your radio database and give it a name that means something to you and the system being tested. Then click Save.
  • This opens the Database Setup dialog where you enter all your radios.
  • Enter the Access Point first. Type its name and serial number. You MUST know the serial numbers. Each radio’s serial number is printed on the label on its under-side. If the radios are already installed, you can find the serial numbers by opening the saved cfg files with a program such as WordPad or Excel. Each radio's serial number is in there. (you DID save each radio’s config file in a safe place didn’t you?)
  • Specify the radio model and configuration eg J Series Access Point. For other radios it'll be J Series Remote or Bridge. If a Bridge, it may be a single or dual antenna type.
  • Select the eDiags (Ethernet) communication port. Enter the IP address of the radio you're directly connected to, and on which you have enabled the eDiags feature.
  • If desired you may change any of the Alarm limits. For example you may be using a 24 volt power supply, so the range might be 23 to 25 volts.
  • Click the Apply Changes To Database button, then click Add New to add more radios.
  • Change the radio type to Remote or Bridge as needed. Also ensure you leave the eDiags IP address the same for all radios. Do NOT enter each radio's own IP address. In all cases, leave it at the IP address of the radio that has eDiags configured, and to which your computer is directly connected.
  • When done adding radios, click Exit.
Monitoring the diagnostics
  • Click the Group Poll button. (looks like three people standing in a small group) This will poll each radio in the system one after another. Any alarms show up at the bottom. Alarms can be acknowledged/cleared with buttons at the top. To change polling interval, go to the Settings menu, then Polling Setup.
  • Disable Group Polling by de-selecting the same button. Then click Individual Poll. Select a Remote radio to poll. then click Toggle to turn on polling. You'll get a nice bar graph of values. When done, toggle polling off and exit.
  • Go into the Tools menu then Statistical Performance. You'll see the second tab is the packet error test. Select a remote radio and start polling. It will run until you click Finish.
  • You can then click the Commissioning Report button to get a nice report you can print.
  • Go to the Data Logging menu and select View Trend – J and K Series. Select the desired radio. Drag the pointer at the bottom across to see parameters recorded at specific times and dates.