User Manual
1
About This Document
8
Siemens Application Note
Smart Infrastructure
Term Explanation
OPC
The OPC Foundation (OPC formally known as Object Linking and Embedding for
Process Control) is an industry consortium that creates and maintains standards for
open connectivity of industrial automation devices and systems, such as industrial
control systems and process control generally. The OPC standards specify the com-
munication of industrial process data, alarms and events, historical data and batch
process data between sensors, instruments, controllers, software systems, and notifi-
cation devices.
OPC DA
OPC Data Access. This group of standards provides specifications for communicating
real-time data from data acquisition devices such as PLCs to display and interface
devices like Human-Machine Interfaces (HMI). The specifications focus on the contin-
uous communication of data
OPC UA
OPC Unified Architecture. An entirely new set of standards that incorporates all of the
functionality of the above standards (and more), but does so using cross platform web
services and other modern technology.
Personal
Store
The "Local Machine Personal" store contains certificates used either by applications
as client/server certificates and belong to this computer only; whereas the "Current
User Personal" store contains certificates not bound to any particular machine (for
example, you may have a certificate you use to digitally sign documents on several
different machines).
The certificate and its private key must be imported into the Windows certificate store
(in the Local machine\Personal store; its root certificate must be imported in the Local
machine\Trusted Root Certification Authorities (TRCA) store). The private key must be
marked as exportable
https://docs.microsoft.com/en-us/windows-hardware/drivers/install/local-machine-and-
current-user-certificate-stores
PLC
Programmable logic controller or programmable controller is an industrial digital com-
puter which has been ruggedized and adapted for the control of manufacturing pro-
cesses, such as assembly lines, or robotic devices, or any activity that requires high
reliability control and ease of programming and process fault diagnosis.
PMON Process MONitor is an Oracle background process created when you start a database
instance. The PMON process will free up resources if a user process fails (eg. release
database locks).
PMON normally wakes up every 3 seconds to perform its housekeeping activities.
PMON must always be running for an instance. If not, the instance will terminate.
RDP
Remote Desktop Protocol is a proprietary protocol developed by Microsoft, which
provides a user with a graphical interface to connect to another computer over a net-
work connection. The user employs RDP client software for this purpose, while the
other computer must run RDP server software.
RENO
Remote Notification are notification messages that Desigo CC can deliver, for exam-
ple, using email, SMS or pagers—to one or more groups of contacts (recipients). They
can be of two types: Alarm-based remote notifications: Messages preconfigured to be
sent out by the system (or manually by the operator) when certain alarms occur in the
building control site. New remote notifications: Messages composed and sent on the
initiative of the operator. These operator-issued notifications are not tied to any trigger-
ing event.
RSA
RSA (Rivest–Shamir–Adleman) is one of the first public-key cryptosystems and is
widely used for secure data transmission. In such a cryptosystem, the encryption key
is public and it is different from the decryption key which is kept secret (private). In
RSA, this asymmetry is based on the practical difficulty of the factorization of the
product of two large prime numbers, the "factoring problem".
Samba
‘Samba’ is a Linux application to provide shared access to files for Windows platform
computers.
SHA-2
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by
the United States National Security Agency (NSA) They are built using a one-way
compression function built from a (classified) specialized block cipher. Cryptographic
hash functions are mathematical operations run on digital data; by comparing the
computed "hash" (the output from execution of the algorithm) to a known and expected
hash value, a person can determine the data's integrity.