Signal/Control port with control pilot Sample Clauses

Signal/Control port with control pilot. Some communication systems use the control pilot line (versus PE). On one hand the communication lines are operated unsymmetrically, on the other hand two different communication systems operate on the same line. Therefore, a special AAN must be used as defined in Figure 11. It provides a common mode impedance of 150   20  (150 kHz to 30 MHz) on the control pilot line (between A and B/D). Therefore, typically a communication simulation is used in combination with this network. The values of inductance and capacitance in the networks on control pilot shown in Figure 11 shall not induce any malfunction of communication between vehicle and charging station. It may therefore be necessary to adapt these values to ensure proper communication. If Control pilot communication is emulated and if the presence of the AAN prevents proper Control pilot communication then no AAN should be used. Figure 11 Example of AAN circuit for pilot line
AutoNDA by SimpleDocs

Related to Signal/Control port with control pilot

  • Supervisory Control and Data Acquisition (SCADA) Capability The wind plant shall provide SCADA capability to transmit data and receive instructions from the ISO and/or the Connecting Transmission Owner for the Transmission District to which the wind generating plant will be interconnected, as applicable, to protect system reliability. The Connecting Transmission Owner for the Transmission District to which the wind generating plant will be interconnected and the wind plant Developer shall determine what SCADA information is essential for the proposed wind plant, taking into account the size of the plant and its characteristics, location, and importance in maintaining generation resource adequacy and transmission system reliability in its area.

  • Data Input Control It will be possible to retrospectively examine and establish whether and by whom Personal Data have been entered, modified or removed from SAP data processing systems. Measures: • SAP only allows authorized personnel to access Personal Data as required in the course of their duty. • SAP has implemented a logging system for input, modification and deletion, or blocking of Personal Data by SAP or its subprocessors within the Cloud Service to the extent technically possible.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Local Control Center, Metering and Telemetry The NTO shall operate, pursuant to ISO Tariffs, ISO Procedures, Reliability Rules and all other applicable reliability rules, standards and criteria on a twenty-four (24) hour basis, a suitable local control center(s) with all equipment and facilities reasonably required for the ISO to exercise ISO Operational Control over NTO Transmission Facilities Under ISO Operational Control, and for the NTO to fulfill its responsibilities under this Agreement. Operation of the NYS Power System is a cooperative effort coordinated by the ISO control center in conjunction with local control centers and will require the exchange of all reasonably necessary information. The NTO shall provide the ISO with Supervisory Control and Data Acquisition (“SCADA”) information on facilities listed in Appendices A-1 and A-2 herein as well as on generation and merchant transmission resources interconnected to the NTO’s transmission facilities pursuant to the ISO OATT. The NTO shall provide metering data for its transmission facilities to the ISO, unless other parties are authorized by the appropriate regulatory authority to provide metering data. The NTO shall collect and submit to the ISO billing quality metering data and any other information for its transmission facilities required by the ISO for billing purposes. The NTO shall provide to the ISO the telemetry and other operating data from generation and merchant transmission resources interconnected to its transmission facilities that the ISO requires for the operation of the NYS Power System. The NTO will establish and maintain a strict code of conduct to prevent such information from reaching any unauthorized person or entity.

  • Traffic Measurement and Billing over Interconnection Trunks 6.1 For billing purposes, each Party shall pass Calling Party Number (CPN) information on at least ninety-five percent (95%) of calls carried over the Interconnection Trunks.

  • Input Control The possibility to subsequently verify and determine whether, and by whom, personal data was entered into, changed or removed from data processing systems must be ensured. • Definition of entry authorisation • Logging of logins

  • Erosion and Sediment Control The Contractor shall install and maintain erosion and sediment control devices to prevent adjacent streets, storm drains and property from accumulations of soil, sediment, or dust which result from his work. Devices installed to control sediment and prevent erosion shall comply with the requirements of the Georgia Tech Project Superintendent. The Contractor is responsible for monitoring downstream conditions throughout the construction period and clearing any debris, sediment, and dust caused by the progress of the Work. The Contractor shall inspect, maintain, and clear erosion and sediment control devices at least weekly unless otherwise directed by the Georgia Institute of Technology Construction Manager. At the conclusion of the Work, the Contractor shall remove all installed devices and restoring the site to the satisfaction of the Georgia Tech Construction Manager.

  • Agreement Amount The Grantee acknowledges and agrees that, notwithstanding any other provision of this Agreement, the maximum amount payable by the City under this Agreement for the initial ## month term shall not exceed the amount approved by City Council, which is $ (dollar amount), and $ (dollar amount) per ## month extension option, for a total Agreement amount of $ . Continuation of the Agreement beyond the initial ## months is specifically contingent upon the availability and allocation of funding, and authorization by City Council.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Control Area Notification At least three months before Initial Synchronization Date, Interconnection Customer shall notify Distribution Provider in writing of the Control Area in which the Generating Facility will be located. If Interconnection Customer elects to locate the Generating Facility in a Control Area other than the Control Area in which the Generating Facility is physically located, and if permitted to do so by the relevant transmission tariffs, all necessary arrangements, including but not limited to those set forth in Article 7 and Article 8 of this GIA, and remote Control Area generator interchange agreements, if applicable, and the appropriate measures under such agreements, shall be executed and implemented prior to the placement of the Generating Facility in the other Control Area.

Time is Money Join Law Insider Premium to draft better contracts faster.