CitectSCADA User Guide
CitectSCADA User Guide
40
CitectSCADA User Guide
August 2013
Legal Information
DISCLAIMER
Schneider Electric (Australia) Pty. Ltd. makes no representations or warranties with respect to this manual and, to the maximum
extent permitted by law, expressly limits its liability for breach of any warranty that may be implied to the replacement of this manual
with another. Further, Schneider Electric (Australia) Pty. Ltd. reserves the right to revise this publication at any time without incurring
an obligation to notify any person of the revision.
The Example Projects are provided to you for the purpose of illustrating how the SCADA software v7.40 could be used in an oper-
ational environment ("the Purpose").Schneider Electric grants you a royalty free, non exclusive, non transferable license to use the exam-
ple projects installed with your SCADA software version v7.40 (“the Example Projects”) for the Purpose only.
The Example Projects are provided by Schneider Electric as part of the SCADA software version v7.40 on an "as is" basis and Schneider
Electric does not guarantee the reliability, serviceability or function of the Example Projects.
Should you modify the Example Projects, you bear the risk of any use of such modified Example Projects.
Schneider Electric gives no express warranties, guarantees or conditions and to the extent permitted under applicable laws, Schneider
Electric disclaims all implied warranties, including any implied warranties of merchantability, fitness for a particular purpose or non-
infringement of third parties’ intellectual property rights.
Schneider Electric shall not be liable for any direct, indirect or consequential damages or costs of any type arising out of any action
taken by you or others related to the Example Projects.
COPYRIGHT
© Copyright 2013 Schneider Electric (Australia) Pty. Ltd. All rights reserved.
TRADEMARKS
Schneider Electric (Australia) Pty. Ltd. has made every effort to supply trademark information about company names, products and
services mentioned in this manual.
Citect, CitectHMI,, PowerSCADA Expert and CitectSCADA are either registered trademarks or trademarks of Schneider Electric (Aus-
tralia) Pty. Ltd. .
Pelco, Spectra, Sarix, Endura, are registered trademarks of Pelco, Inc.
IBM, IBM PC and IBM PC AT are registered trademarks of International Business Machines Corporation.
MS-DOS, Windows, Windows NT, Microsoft, and Excel are either registered trademarks or trademarks of Microsoft Corporation in the
United States and/or other countries.
DigiBoard, PC/Xi and Com/Xi are trademarks of Digi International Inc.
Novell, Netware and Netware Lite are either registered trademarks or trademarks of Novell, Inc. in the United States and other
countries.
dBASE is a trademark of dataBased Intelligence, Inc.
All other brands and products referenced in this document are acknowledged to be the trademarks or registered trademarks of their
respective holders.
GENERAL INFORMATION
Some product names used in this manual are used for identification purposes only and may be trademarks of their respective com-
panies.
August 2013 edition for CitectSCADA Version v7.40.
Manual Revision Version v7.40.
PLEASE NOTE
Electrical equipment should be installed, operated, serviced, and maintained only by qualified personnel. No responsibility is assumed
by Schneider Electric (Australia) Pty. Ltd. for any consequences arising out of the use of this material. © 2013 Schneider Electric (Aus-
tralia) Pty. Ltd. . All Rights Reserved.
Validity Note
The present documentation is intended for qualified technical personnel responsible for the implementation, operation and main-
tenance of the products described. It contains information necessary for the proper use of the products. However, those who wish to
make a more "advanced" use of our products may find it necessary to consult our nearest distributor in order to obtain additional infor-
mation.
The contents of this documentation are not contractual and in no way constitute an extension to, or restriction of, the con-
tractual warranty clauses.
Legal Information 1
Contents 3
Getting Started 29
Safety Information 31
3
Contents
4
Contents
Scheduler 98
Citect.ini Parameters in 7.30 98
CtAPI Functions in 7.30 103
Cicode Functions in 7.30 104
What's New in CitectSCADA 7.40 112
Referencing a variable tag using Equipment.Item 113
New Cicode functions to maintain a list of unique Pages "opened" 114
Equipment Editor Interface 114
New StruxureWare Templates 114
OPC Factory Server (OFS) Security Update 115
Citect.ini Parameters in 7.40 115
Cicode Functions in 7.40 116
CtAPI Functions in 7.40 119
5
Contents
6
Contents
7
Contents
8
Contents
9
Contents
10
Contents
11
Contents
12
Contents
13
Contents
14
Contents
15
Contents
16
Contents
17
Contents
18
Contents
19
Contents
20
Contents
21
Contents
Scheduler 1145
22
Contents
23
Contents
24
Contents
25
Contents
26
Contents
27
Contents
28
Getting Started
29
30
Safety Information
Safety Information
Hazard categories and special symbols
The following symbols and special messages may appear in this manual or on the prod-
uct to warn of potential hazards or to call attention to information that clarifies or sim-
plifies a procedure.
Symbol Description
DANGER indicates an imminently hazardous situation, which, if not avoided, will result in
death or serious injury.
WARNING indicates a potentially hazardous situation, which, if not avoided, can result in
death or serious injury.
CAUTION indicates a potentially hazardous situation which, if not avoided, can result in
minor or moderate injury.
NOTICE
NOTICE used without a safety alert symbol, indicates a potentially hazardous situation
which, if not avoided, can result in property or equipment damage.
Please Note
31
Safety Information
Do not use CitectSCADA or other SCADA software as a replacement for PLC-based control
programs. SCADA software is not designed for direct, high-speed system control.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
LOSS OF CONTROL
l The designer of any control scheme must consider the potential failure modes of con-
trol paths and, for certain critical control functions, provide a means to achieve a safe
state during and after a path failure. Examples of critical control functions are emer-
gency stop and overtravel stop, power outage and restart.
l Separate or redundant control paths must be provided for critical control functions.
l System control paths may include communication links. Consideration must be given
to the implications of unanticipated transmission delays or failures of the link.
l Observe all accident prevention regulations and local safety guidelines. 1
l Each implementation of a control system created using CitectSCADA must be individ-
ually and thoroughly tested for proper operation before being placed into service.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
1. For additional information, refer to NEMA ICS 1.1 (latest edition) "Safety Guidelines
for the Application, Installation, and Maintenance of Solid State Control", and to NEMA
ICS 7.1 (latest edition) "Safety Standards for Construction and Guide for Selection, Instal-
lation and Operation of Adjustable-Speed Drive Systems" or their equivalent governing
your particular location.
32
Chapter 1: Getting Technical Support
There are various support options to help you get the most from this product.
l If you have questions about using FullProductNameCitectSCADA, consult the exten-
sive online Help to answer your questions. You can use the Contents list to find the
section you're interested in, enter an item into the Index, or enter an item using the
Search tab.
l If you seek more technical information than is provided in the online Help, check the
knowledge base.
If you cannot find the information you need, you can obtain technical support and Train-
ing. Consulting services are also available upon request.
See Also
Technical Support
Contact information
33
Chapter 1: Getting Technical Support
Training
Various training facilities are also available. Contact your local Citect distributor for
more information.
See Also
Contact information
Contact information
For contact information in your region, consult the support web site at:
www.schneider-electric.com/citectscada
34
Chapter 2: What's New in CitectSCADA 7.x
This section describes new FullProductNameCitectSCADA features and enhancements
for v7.40.
For the purposes of continuity, this section also describes the features that were added
for the CitectSCADA 7.0, 7.10 and 7.20 releases.
Introduced in 7.0
Introduced in 7.10
Introduced in 7.20
Introduced in 7.30
Introduced in 7.40
For details on how to upgrade an existing project to run in v7.40, refer to Upgrading to
7.40.
35
Chapter 2: What's New in CitectSCADA 7.x
Clustering
Clustering allows you to group different sets of the runtime components within a single
project, allowing multiple independent systems to be monitored and controlled.
There are countless variations in how a clustered system can be configured. The most
appropriate configuration will depend on the requirements for the solution to be
deployed and the environment in which it is being deployed. For more information see
Typical system scenarios.
See Also
Included projects
Implementing Clustering
Local Variables
Local variables allow you to store data in memory when you start your runtime system.
They are created each time the system starts, and therefore do not retain their values
when you shut down.
Local variables are useful when you need each process to have a separate copy of the
data. Each process has its own copy of each local variable configured in the project, and
the values in a local variable are available only to the process that wrote them.
36
Chapter 2: What's New in CitectSCADA 7.x
See Also
Configuring Local Variables
See Also
Alarm Server Definitions
Memory Mode
I/O Devices can now be configured to run in memory mode:
l An I/O Device running in memory mode is created in memory and its values stored
in memory at runtime.
l Devices using memory mode are not connected to any hardware, and write their
values to a cache. Memory mode is useful when you are configuring a system for the
first time, as you can design and test your system before connecting a physical I/O
Device.
Note: Memory mode replaces Memory I/O Devices, which are no longer supported.
Devices configured as Memory I/O Devices will be converted to local variables dur-
ing the upgrade to v7.40.
See Also
Using Memory Mode
37
Chapter 2: What's New in CitectSCADA 7.x
Publisher-Subscriber Model
CitectSCADA now uses a Publisher-Subscriber data acquisition model. Client computers
subscribe to configured tags and receive notification when the tag values change. Cicode
functions can also be triggered by the change of a tag, removing the need to poll, and
improving the efficiency of the system.
See Also
TagSubscribe in the Cicode Reference Guide
TagUnsubscribe in the Cicode Reference Guide
38
Chapter 2: What's New in CitectSCADA 7.x
This means that physical computers in the system can easily be changed. As long as the
IP address or computer name of the new machine is the same as the one being replaced,
the new computer will be able to immediately take the same role.
New Parameters
The following parameters are new in version 7.0. For a complete list of the system
parameters, refer to the Parameters help file.
Alarm Parameters:
[Alarm.Clu- The list of events that this Alarm Server process ena-
sterName.ServerName]Events bles
Note: The default alarm property write behavior was to write the new value to
DBF/RDB. This has changed in version 7.0 onwards. Refer to the parameter [Alarm]Use-
ConfigLimits.
Backup Parameters:
39
Chapter 2: What's New in CitectSCADA 7.x
Client Parameters:
[Client]Wait- Specifies that connection to a server will wait until it can estab-
ForConnectAtStartup lish a connection to the server processes before starting up.
CtCicode Parameters:
CtEdit Parameters:
[CtEdit]Logs The directory where the CitectSCADA log files are located.
Dial Parameters:
Driver Parameters:
General Parameters:
40
Chapter 2: What's New in CitectSCADA 7.x
IOServer Parameters:
[IOServer.Clu- Sets the clusters that the I/O Server process will
sterName.ServerName]Clusters connect to at startup
[IOServer.Clu- The list of events that this I/O Server process ena-
sterName.ServerName ]Events bles
Report Parameters:
[Report.Clu- Sets the clusters this Reports Server process will con-
sterName.ServerName]Clusters nect to at startup
Trend Parameters:
[Trend.Clu- Sets the clusters this Trends Server process will con-
sterName.ServerName] nect to at startup
Clusters
41
Chapter 2: What's New in CitectSCADA 7.x
[Trend.Clu- The list of events that this Trends Server process ena-
sterName.ServerName]Events bles
Obsolete Parameters
The following parameters are no longer supported in version 7.0:
Alarm Parameters:
[Alarm]CPU Sets the CPU that the Alarm Server component is assigned to
Client Parameters:
Code Parameters:
42
Chapter 2: What's New in CitectSCADA 7.x
[Code]IOServer- Determines the Cicode function to run when I/O Server com-
Shutdown ponent shuts down
[Code]IOServerStartup Determines the Cicode function to run when I/O Server com-
ponent starts up
DNS Parameters:
[DNS]<Server name> Determines the IP address (or fully qualified host name) of the
primary I/O Server
Event Parameters:
43
Chapter 2: What's New in CitectSCADA 7.x
bled
General Parameters:
IOServer Parameters:
[IOServer]CPU Sets the CPU that the I/O Server component is assigned to
LAN Parameters:
44
Chapter 2: What's New in CitectSCADA 7.x
[LAN]LanA Defines the protocol stack that CitectSCADA uses for NetBIOS
communication
[LAN]RemoteTimeOut The timeout period for remote I/O Device write requests from
a Control Client to the I/O Server
Proxi Parameters:
Report Parameters:
45
Chapter 2: What's New in CitectSCADA 7.x
Server Parameters:
Trend Parameters:
[Trend]Block- Verifies that I/O problems causing gaps for a trend tag do not
ByIODevice cause gaps for every trend tag
[Trend]CPU Sets the CPU that the Trends Server component is assigned
to
New Functions
Miscellaneous Functions
AccumBrowseGetField Gets the field indicated by the cursor position in the browse
session.
46
Chapter 2: What's New in CitectSCADA 7.x
Alarm Functions:
AlmSummaryGetField Gets the field indicated by the cursor position in the browse
session.
47
Chapter 2: What's New in CitectSCADA 7.x
AlmSummaryLast Places the data browse cursor at the latest summary record
from the last cluster of the available browsing cluster list.
AlmSummaryNext Gets the next alarm summary entry in the browse session.
AlmSummaryPrev Gets the previous alarm summary entry in the browse ses-
sion.
Alm- Sets the value of the field indicated by the cursor position in
SummarySetFieldValue the browse session.
AlmTagsClear Clears the alarm tag at the current cursor position in an active
data browse session.
AlmTagsGetField Gets the field indicated by the cursor position in the browse
session.
AlmTagsNext Gets the next alarm tags entry in the browse session.
AlmTagsPrev Gets the previous alarm tags entry in the browse session.
Ass- Gets association information about the current Super Genie from the
GetProperty datasource
AssGetScale Gets scale information about the associations of the current Super
Genie from the datasource
48
Chapter 2: What's New in CitectSCADA 7.x
Cluster Functions
ClusterFirst Allows the user to retrieve the first configured cluster in the project.
ClusterNext Allows the user to retrieve the next configured cluster in the project.
Clus- Allows the user to determine which servers are defined for a given
terServerTypes cluster.
ClusterStatus Allows the user to determine the connection status from the client to
a server on a cluster.
Clus- Allows the user to deactivate an active cluster at the same time as
terSwapActive activating an inactive cluster.
TagGetScale Gets the value of a tag at a specified scale from the data-
source
Tag Functions
49
Chapter 2: What's New in CitectSCADA 7.x
Task Functions
TaskCluster Gets the name of the cluster context in which the current task is execut-
ing
Trend Functions
TrnBrowseGetField Gets the field indicated by the cursor position in the browse ses-
sion.
TrnGetCluster Gets the name of the cluster the trend graph is associated with.
Report Functions
Rep- Retrieves the name of the cluster the report is running on.
GetCluster
ModifiedFunctions
Alarm Functions
50
Chapter 2: What's New in CitectSCADA 7.x
AlarmClear Clears acknowledged, inactive alarms from the active alarm list.
AlarmFirstTagRec Searches for the first occurrence of an alarm tag, name, and
description
AlarmGetDelayRec Gets the delay setting for an alarm via the alarm record number
AlarmGetFieldRec Gets alarm field data from the alarm record number
Alarm- Gets the thresholds of analog alarms by the alarm record number
GetThresholdRec
AlarmNextTagRec Searches for the next occurrence of an alarm tag, name, and
description.
AlarmSumFind Finds an alarm summary index for an alarm record and alarm on
time.
51
Chapter 2: What's New in CitectSCADA 7.x
DriverInfo Provides information about the driver for a particular I/O Device.
Miscellaneous Functions
ServerInfoEx Gets client and server information from a specified process in a mul-
tiprocessor environment.
Report Functions
52
Chapter 2: What's New in CitectSCADA 7.x
SPC Functions
SPCPro- Gets the process mean, range and standard deviation overrides.
cessXRSGet
SPCPro- Sets the process mean, range and standard deviation overrides.
cessXRSSet
SPCSpecLimitGet Gets the specification limits (USL and LSL) for the specified tag.
SPCSpecLimitSet Sets the specification limits (USL and LSL) for the specified tag.
SPCSub- Gets the size of a subgroup for the specified SPC tag.
groupSizeGet
SPCSub- Sets the subgroup size for the specified SPC tag.
groupSizeSet
AssPage Associates up to eight variable tags with a Super Genie and displays the
Super Genie in the current window.
AssPopUp Associates up to eight variable tags with a Super Genie and displays the
Super Genie in a popup window.
AssTag Associates a variable tag with the current Super Genie. The association
will be created for the current Super Genie only, and will only come into
effect after you re-display the Super Genie.
AssVarTags Associates up to eight variable tags with a Super Genie. This asso-
ciation is only made for the next Super Genie you display (either in the
current window or in a new window). You can use this function repeat-
edly to associate more than 8 variable tags to a Super Genie.
AssWin Associates up to eight variable tags with a Super Genie, and displays
the Super Genie in a new window.
Tag Functions
Tag- This function reads a property of a variable tag from the datasource
GetProperty
53
Chapter 2: What's New in CitectSCADA 7.x
TagGetScale Gets the value of a tag at a specified scale from the datasource
TagRamp This function will increment a Tag by the amount defined by iPercentInc
Task Functions
Trend Functions
TrnEventSetTable Sets trend data from a table, for a specified trend tag.
TrnE- Sets event trend data and time data (including milliseconds) for a
ventSetTableMS specified trend tag.
TrnGetDefScale Gets the default engineering zero and full scales of a trend tag.
Window Functions
54
Chapter 2: What's New in CitectSCADA 7.x
Osolete Functions
Cluster Functions
Clus- Returns the names of the primary and standby cluster servers.
terGetName
Display Functions
Task Functions
ReRead Causes CitectSCADA to re-read the I/O Device data associated with the
current Cicode task.
Tags are now subscribed at the start of a function and updated tag
values are sent to the subscribing function.
After removing ReRead from looping code you may need to extend the
period of the Sleep function.
This is to replace the pause ReRead created while it read the tag values.
55
Chapter 2: What's New in CitectSCADA 7.x
Obsolete Functions
Previously available "Point" related functions are now no longer available, and if used
will detect and return an error indicating that they are not supported. In order to obtain
the same result as was previously invoked by those function, replace them with the Tag
based equivalent using the appropriate Tag arguments and conditions.
The "point" functions that are no longer available are listed below along with their
replacement functions:
Function Replacement
ctPointGetProperty ctTagGetProperty
If you are using the point functions on single tags, use the ctTagRead, ctTagWrite func-
tions instead. If you are building up multiple tags into one point, use ctListNew and add
tags to the list through ctListAdd. Then use ctListWrite, ctListRead and ctListData to
write and read from the tags.
The following functions are not relevant to tag based operations. They are obsolete and
there is no replacement function.
l ctPointBitShift
l ctPointClose
l ctPointCopy
l ctPointDataSize
l ctPointToStr
l ctStrToPoint
l ctTagToPoint
56
Chapter 2: What's New in CitectSCADA 7.x
57
Chapter 2: What's New in CitectSCADA 7.x
A set of new configuration parameters have been added to provide control over the
CitectSCADA network interfaces. These parameters help you protect your system by
allowing control over unused features of the product. The following services can be ena-
bled / disabled: DDE, Remote CTAPI, ODBC, OLEDB and FTP.These services are dis-
abled by default.
User login necessary for control actions
A user needs to be configured and logged in to CitectSCADA to allow the display proc-
ess to perform a tag write (control) action. Design CitectSCADA projects to avoid Cicode
task that perform tag writes that are not issued by a user.
We advise that projects be configured to take advantage of the change to provide
increased system security protection. If your system has existing network security pro-
tection in place and does not require the additional security protection, it can be turned
off using the following parameters to avoid the impact of the changes:
Parameter for the client/display node: See [LAN] SecureLogin in the Parameters help file
for more information.
Parameter for the server node: See [LAN] AllowLegacyConnections in the Parameters
help file for more information.[LAN] AllowLegacyConnections. (As part of Citect-
SCADA7.20 this parameter was made obsolete)
These parameters may be necessary during an upgrade process when there is a mix of
old and new version CitectSCADA nodes in a running system.
See Also
Securing Projects
58
Chapter 2: What's New in CitectSCADA 7.x
Using the integrated Windows security feature, the Windows user can logon to Citect-
SCADA runtime with runtime privileges configured within the project.
See Also
Using Windows Security
Multi-Signature Support
CitectSCADA now provides the facility for up to four users to approve an action or tag
write operation using the new Cicode functions MultiSignatureForm and Mul-
tiSignatureTagWrite.
Two further Cicode functions, VerifyPrivilegeForm and VerifyPrivilegeTagWrite, enable
you to restrict access to a specific action or tag write for a user with a specific set of priv-
ileges.
Microsoft Office Excel® 2007 does not allow you to save files in .dbf format though you
may open and edit them using the File > Open command. In order to overcome this lim-
itation CitectSCADA includes an Add-In for Microsoft Excel called ProjectDBFAddIn.
When this Add-In is loaded into Excel, it allows you to browse, open, edit and save
CitectSCADA .dbf files in the correct format.
See Also
59
Chapter 2: What's New in CitectSCADA 7.x
There are certain drivers that the product installation will install that are necessary for
CitectSCADA to function correctly. These will be installed automatically as in previous
releases.
If you are using the Microsoft® Windows Vista™ operating system verify that any driv-
ers which you select to install are identified as being compatible with that operating sys-
tem. If you select any driver that is not yet identified as being compatible, or is
specifically identified as not compatible, the installation process will provide an alert to
that effect, and will allow you to deselect the driver prior to continuing with the instal-
lation.
Note: If you choose to ignore any alert, the driver will be installed but the driver may
not operate correctly.
The communication driver installation can also be invoked individually at any time
after the product installation to install additional drivers.
60
Chapter 2: What's New in CitectSCADA 7.x
See Also
Button Properties - Appearance
61
Chapter 2: What's New in CitectSCADA 7.x
It is now possible to write to the eight custom alarm fields during runtime. In previous
releases these fields could really only be used for alarm filtering.
Alarm Summary Fields can now be used to format an alarm display or alarm log
device. In addition any Alarm Display Field can be used in your alarm summary, apart
from State.
New Alarm Summary Fields
Now any alarm display field can be used for any type of alarm. Where not applicable for
a particular alarm type, zero or an empty string will be displayed.
New Alarm Display Fields
62
Chapter 2: What's New in CitectSCADA 7.x
{TypeNum,n} Alarm type number (use AlarmType to get string value instead).
V
{AlmComment,n} The text entered into the Comment field of the alarm properties
dialog.
Alarm paging
The CitectSCADA alarm facility constantly monitors equipment data and alerts oper-
ators of any equipment error or alarm condition. When an alarm is triggered it is dis-
played on the standard alarm display page. The operator has to be continuously sitting
in front of an HMI monitoring the system. CitectSCADA v7.40 provides the facility to
link alarms with a remote paging system for operators.
Two Alarm Properties have been added to enable CitectSCADA to interface with any
third-party paging system. The Paging property is a flag to indicate that the alarm is
going to be paged, the PagingGroup property is a freeform text field indicating the
sequence of people to notify in the event the alarm occurred.
See your third-party paging system documentation for information on how to interface
with CitectSCADA.
63
Chapter 2: What's New in CitectSCADA 7.x
New Parameters
The following parameters are new in version 7.10 . For an entire list of the system param-
eters, refer to the Parameters documentation.
64
Chapter 2: What's New in CitectSCADA 7.x
Alarm Parameters:
[Alarm]Argyle- Defines the length of time that the alarm server will wait for
TagValueTimeout argyle tag values to become available (without error) before
starting to scan for argyle alarms.
Code Parameters:
[Code]Hal- When enabled will cause the Cicode to halt when any tag read
tOnInvalidTagData returns invalid data.
Client Parameters:
[Client]Auto- Set to enable auto login. Users can select one of seven modes.
LoginMode
CtApi Parameters:
[CtAPI]Allow- When enabled current version of CTAPI server can accept con-
LegacyConnections nections from previous versions of CTAPI client.
[CtAPI]Allow- When enabled the Citect Web Service and the Citect OLEDB Pro-
LegacyServices vider can connect to the CTAPI server.
DDE Parameters:
[DDE]Allow- Allows Cicode to be run on the Citect server via the DDE Execute com-
Cicode mand.
[DDE] Allows tag writes to the Citect server via the DDE Poke command.
AllowWrites
Kernel Parameters:
[Kernel]Error- The total number of error buffers available for logging to the syslog.dat
Buffers file.
Lan Parameters:
[LAN]SecureLogin When set to 0 security measures are disabled and the system
65
Chapter 2: What's New in CitectSCADA 7.x
[LAN]Server- The name of the default identifier to allow data access for a
LoginName server process to another SCADA server process(es).
ODBC Parameters:
Page Parameters:
[Page]AllowH- Defines the default behavior when displaying horizontal scroll bars.
ScrollBar
[Page]AllowV- Defines the default behavior when displaying vertical scroll bars.
ScrollBar
Obsolete Parameters
Win Parameters:
Com Parameters:
[Com]Start- Determines the period to wait for I/O Devices to come online before dis-
Timeout playing any data.
New Functions
66
Chapter 2: What's New in CitectSCADA 7.x
Security Functions
Form- Adds both a password prompt and edit field to the current form.
SecurePassword
MultiSignatureForm Displays a form that allows up for 4 users to have their cre-
dentials verified in order to approve an operation.
Mul- Displays a form that allows up for 4 users to have their cre-
tiSignatureTagWrite dentials verified in order to approve a write of a specific value to
a specific tag.
VerifyPrivilegeForm Displays a form that allows a single user to enter their cre-
dentials.
Ver- Displays a form that allows any single user to enter their cre-
ifyPrivilegeTagWrite dentials in order to approve a write of a specific value to a spe-
cific tag.
Miscellaneous Functions
ServerRestart Restart any alarm, report, trend or I/O server from any Cicode
node in system, without affecting other server processes running
on same machine.
Tag Functions
TagRD- Works in conjunction with the TagInfo function. Reloads the variable
BReload tag database so when TagInfo is called it picks up online changes to the
tag database.
Windows Functions
67
Chapter 2: What's New in CitectSCADA 7.x
WinStyle Switches on and off scrolling and scrollbar features for existing win-
dows.
Modified Functions
None
Obsolete Functions
Window Functions
68
Chapter 2: What's New in CitectSCADA 7.x
69
Chapter 2: What's New in CitectSCADA 7.x
This will also allow use of the re-instated Citect.ini parameter [IOServer]BlockWrites in
order to choose whether to use the Block Writes functionality.
See Also
[IOServer]BlockWrites in the Parameters on line help
Graphic Enhancements
Enhancements have been made to how you can configure graphic pages and the objects
you place on the page. These enhancements can be used in the creation and imple-
mentation of Genies and Super Genies.
In addition, wide screen formats are now natively supported including 16:10 and 16:9
aspect ratios.
70
Chapter 2: What's New in CitectSCADA 7.x
See Also
Metadata
Note: You can also install the CitectSCADA runtime from a single installation file.
This file is on the installation DVD. This allows installation of the software to com-
puters which only need the runtime. The file can be copied to a network location for
remote installation.
71
Chapter 2: What's New in CitectSCADA 7.x
Web-based Help
The wide spread use of the Internet to distribute information has now enabled Schneider
Electric (Australia) Pty. Ltd. to introduce that technology, to bring its users a new rich
and expanded format to deliver its help information.
The traditional on-line help, now referred to in CitectSCADA as PC-based Help, is still
available to provide immediate information which is related to the task at hand. If you
are a registered Technical Support customer you have the option of accessing the new
Web-based Help to provide the very latest information, which will include updates for
help topics to include the improvements to the software application introduced by Serv-
ice Packs.
72
Chapter 2: What's New in CitectSCADA 7.x
Updates will also be included from enhancement to the help topics brought about by
user comments and general internal developments by the Schneider Electric (Australia)
Pty. Ltd. Technical Publications team.
You will also be able to "rate" individual help topics with a star rating, and add your
own comments to any help topics. Your comments and topic ratings will be retained in
our database and we will endeavor to incorporate your contributions in our ongoing
development of the quality of our documentation.
The future development of Web-based help will also include links to technical doc-
umentation in the form of:
l Technical Papers
l White Papers
l Knowledge Base content
l Education and Training material
The Web-based help is planned for release by the end of December 2010. So, please check
on its availability periodically with following the link www.citect.com/webhelp
OFSOPC Driver
The release of CitectSCADA v7.40 coincides with the availability of the OFSOPC Driver
for Schneider Electric's OPC Factory Server (OFS).
OFS Factory Server is a foundation component for communication with Schneider Elec-
tric PLCs. The OFSOPC Driver allows CitectSCADA to tightly integrate with OFS Factory
Server, minimizing the amount of configuration necessary for an end-to-end Schneider
Electric system.
You can install the OFSOPC Driver and its supporting documentation via the Driver
Selection page of the CitectSCADA v7.40 installer.
73
Chapter 2: What's New in CitectSCADA 7.x
Camera Control PTZ (Pan, Tilt and Zoom) - Communicates with DVRs and IP cameras.
Featuring pan zoom and tilt, iris, focus, presets, patterns and adjustable speed.
The button is only enabled if you have installed the Pelco camera software. Refer to the
Pelco camera software documentation for further information.
For details on configuring and using the Pelco Camera ActiveX control, refer to the doc-
umentation installed with the Pelco product.
See Also
Using Objects
Performance Enhancements
The architecture of CitectSCADA Version 7.20 includes a new threading model that
offers significant performance improvements. The new Platform Task Framework (PTF)
defines an explicit threading environment for each subsystem, providing a standard pro-
tocol for work to be created and passed between them.
The performance improvements have been implemented in a way that retains existing
functionality.There is no changes to the configuration or operation of a system, just per-
formance benefits and improved stability.
Note: It is recommended that data assigned to disk I/O devices be migrated to the
new persisted memory I/0 mode. See the topic Persisted I/O Memory Mode for infor-
mation on how to migrate a disk I/O device to a persisted memory I/O device.
See Also
Using Persisted I/O Memory Mode
74
Chapter 2: What's New in CitectSCADA 7.x
75
Chapter 2: What's New in CitectSCADA 7.x
Supportability Enhancements
Supportability Enhancements have been added to CitectSCADA to provide easier access
to the diagnostics functionality of the product. Although the enhancements were pri-
marily introduced to assist Technical Support personnel with system analysis, they have
resulted in many benefits to the end user. These include:
l Easier access to config and project folders.
l Timestamp harmonization across log files.
l Additional [Debug] parameters to support category and severity filtering (see
Citect.ini Parameters in Version 7.20).
l Support for online logging adjustments using the new SetLogging() and GetLogging()
Cicode functions.
l A set of parameters that can be modified while online due to periodic or an on-
demand read of the citect.ini file during runtime.
Additionally, the home page of the Computer Setup Editor now includes a link to the
Logging Parameters page, which provides comprehensive instructions for the con-
figuration of logging.
See Also
Viewing projects
Configuring logging
Adjusting logging during runtime
76
Chapter 2: What's New in CitectSCADA 7.x
Tag Extensions
With the addition of Tag Extensions in CitectSCADA 7.20, the variable tag can now rep-
resent data as a collection of elements, and each of these elements can contain a col-
lection of items.
Each element provides access to a view of the data value for the tag. Each variable tag
can be used on its own or by referencing a particular element. The tag and each element
have items that can be referenced to access the following information:
.v : The value, which will access the data value of the tag or element.
.vt : The value timestamp, which will access the timestamp of when the value last
changed.
.q : The quality, which will access the quality of the value , either GOOD, UNCERTAIN
or BAD. The Quality variable can access further detail using the Cicode Quality func-
tions.
.qt : The quality timestamp, which will access the timestamp of when the quality last
changed.
.t : The timestamp, which will access the timestamp of when the tag or element was last
updated.
See Also
Tag extensions
New Parameters
The following parameters are new in version 7.20 . For an entire list of the system param-
eters, refer to the Parameters documentation.
Alarm Parameters
77
Chapter 2: What's New in CitectSCADA 7.x
Client Parameters
[Client]Auto- When set to 1 the cache is cleared of any client login cre-
LoginClearPassword dentials for consistency with the [Server]Auto-
LoginClearPassword ini parameter.
[Client]DisableDisplay Sets whether to allow the client process to run in the background
without a visible window.
CtAPI Parameters
CtDraw.RSC Parameters
CtEdit Parameters
Debug Parameters
78
Chapter 2: What's New in CitectSCADA 7.x
General Parameters
IOServer Parameters
LAN Parameters
79
Chapter 2: What's New in CitectSCADA 7.x
Page Parameters
80
Chapter 2: What's New in CitectSCADA 7.x
tooltip
81
Chapter 2: What's New in CitectSCADA 7.x
Report Parameters
82
Chapter 2: What's New in CitectSCADA 7.x
Security Parameters
Server Parameters
Trend Parameters
Modified Parameters
CtEdit Parameters
[CtEdit]Copy Supports runtime changes, it enables you to switch the SCADA node to
use a new runtime configuration by pointing to a new location.
Re-instated Parameters
IOServer Parameters
Obsolete Parameters
AnmCursor Parameters
General Parameters
83
Chapter 2: What's New in CitectSCADA 7.x
LAN Parameters
Page Parameters
Time Parameters:
Trend Parameters
84
Chapter 2: What's New in CitectSCADA 7.x
New Functions
ctTagReadEx Performs the same as ctTagRead, but with an additional new argument
Modified Functions
ctTagRead Reads the current value from the given I/O device variable tag element
value.
ctTagWrite Writes the given value to the I/O device variable tag elements which have
read/write access.
ctTagWriteEx Asynchronously writes the given value to the I/O device variable tag ele-
ment value for the tag elements which have read/write access.
Obsolete Functions
None
New Functions
Alarm Functions
AlarmCatGetFormat Returns the display format string of the specified alarm category.
85
Chapter 2: What's New in CitectSCADA 7.x
Display Functions
DspAnSetMetadata Non-blocking function, that sets the value of the specified metadata
entry.
Format Functions
Menu Functions
MenuGetChild Returns the handle to the child node with the specified name.
MenuGetNextChild Returns the next node that shares the same parent.
MenuGetPrevChild Returns the previous node that shares the same parent.
MenuGetWindowNode Returns the handle of the root menu node for a given window.
MenuNodeHasCommand Checks whether the menu node has a valid Cicode command
associated with it.
MenuNodeIsHidden Checks whether the menu node is hidden by evaluating its Hid-
denWhen Cicode expression.
86
Chapter 2: What's New in CitectSCADA 7.x
Miscellaneous Functions
GetLogging Gets the current value for one or more logging parameters.
Page Functions
PageHistoryDspMenu Displays a pop-up menu which lists the page history of current
window.
PagePeekCurrent Return the index in the page stack for the current page.
PageProcessAnalyst Displays a Process Analyst page (in the same window) preloaded
with the pre-defined Process Analyst View (PAV) file.
PageProcessAnalystPens Displays a Process Analyst page (in the same window) preloaded
with the pre-defined Process Analyst View (PAV) file and specified
trend or variable tags.
ProcessAnalystLoadFile Loads the specified PAV file to a Process Analyst object, which is
identified by parameter ObjName.
ProcessAnalystPopup Displays a Process Analyst page (in the same window) preloaded
with the pre-defined Process Analyst View (PAV) file and specified
trend or variable tags.
87
Chapter 2: What's New in CitectSCADA 7.x
Quality Functions
QualityGetPart Extracts a requested part of the Quality value from the QUALITY var-
iable.
QualityIsControlInhibit Returns a value indicating whether the tag is in Control inhibit mode.
Server Functions
ServerBrowseFirst This function places the data browse cursor at the first record.
ServerBrowseGetField This function retrieves the value of the specified field from the
record the data browse cursor is currently referencing.
ServerBrowseNext This function moves the data browse cursor forward one record.
ServerBrowseNumRecords This function returns the number of records that match the filter
criteria.
ServerBrowseOpen This function initiates a new browse session and returns a han-
dle to the new session that can be used in subsequent data
browse function calls.
ServerBrowsePrev This function moves the data browse cursor back one record.
ServerReload This function reloads the server specified by cluster and server
name.
ServerIsOnline This function checks if the given server can be contacted by the
client for giving the online/offline status of the server.
88
Chapter 2: What's New in CitectSCADA 7.x
String Functions
StrTruncFont Returns the truncated string using a particular font (specified by name)
or the specified number of characters.
AssMetadata Performs Super Genie associations using the "Name" and "Value" fields.
AssMetadataPage Uses the metadata information from the current animation point for the
page associations for a new Super Genie page, and displays the new
Super Genie in the current page.
AssMetadataPopup Uses the metadata information from the current animation point for the
associations for a new Super Genie page, and displays the new Super
Genie in a new pop up window.
AssMetadataWin Uses the metadata information from the current animation point for the
associations for a new Super Genie page, and displays the new Super
Genie in a new window.
Tag Functions
TagSetOverrideBad Sets a quality Override element for a specified tag to Bad Non
Specific.
TagSetOverrideGood Sets a quality Override element for a specified tag to Good Non
Specific.
Task Functions
Timestamp Functions
89
Chapter 2: What's New in CitectSCADA 7.x
TimestampGetPart Returns one part (year, month, day, etc) of the timestamp variable.
TimestampCurrent Returns the current system date and time as a TIMESTAMP variable.
Window Functions
Modified Functions
Accumulator Functions
Alarm Functions
Display Functions
Format Functions
90
Chapter 2: What's New in CitectSCADA 7.x
Miscellaneous Functions
Page Functions
Security Functions
Logs an operator into the CitectSCADA system. Not available when logged
Login
in as Windows user.
AssGetProperty Retrieves association information about the current Super Genie from the
datasource.
AssGetScale Gets scale information about the associations of the current Super Genie
from the datasource (that is scale information about a variable tag that has
been substituted into the Super Genie)
AssInfo Gets association information about the current Super Genie (that is infor-
mation about a variable tag that has been substituted into the Super
Genie).
AssInfoEx Retrieves association information about the current Super Genie (that is
information about a variable tag that has been substituted into the Super
Genie).
AssScaleStr Gets scale information about the associations of the current Super Genie
(that is scale information about a variable tag that has been substituted
into the Super Genie).
Tag Functions
91
Chapter 2: What's New in CitectSCADA 7.x
TagWrite Writes a tag element value for the tag elements which have
read/write access.
Window Functions
Reinstated Functions
92
Chapter 2: What's New in CitectSCADA 7.x
For details on how to configure an existing project to run in 7.30 refer to Upgrading to
7.30.
See Also
What's New in CitectSCADA 7.x
Alarm Enhancements
There have been numerous improvements made to alarms in CitectSCADA, the notable
improvement being to the alarm server and database with the implementation of run-
time synchronization. Other improvements include:
l Alarm Server Redundancy
l Handling of event information with the introduction of a new sequence of events
page
l Ability to insert a new event into the event journal
l Ability to archive the event journal
93
Chapter 2: What's New in CitectSCADA 7.x
l Ability to create a Named filter and use it across multiple alarm display lists
l Sorting of alarms and events
l New dynamic alarm count at runtime
l User comments on events
l Can configure more than 65535 alarms for each type of alarm
l New alarm template with equipment tree view
Refer to the section Using the Tab Style Page Templates for more information on the new
alarm pages/ templates .
Refer to the topics Alarm Server Upgrade and Migrating Alarm Event History for infor-
mation you need to know before upgrading.
See Also
Using Alarms in SCADA
Equipment Hierarchy
The concept of "equipment" was introduced in 7.20 as a means of providing logical
groupings of SCADA objects such as tags, alarms etc. In the 7.30 release, it has been
expanded to be hierarchical, and to be more closely integrated with the functioning of
SCADA objects.
Each item in the equipment database can be assigned a place in a hierarchy of equip-
ment. The hierarchy is based on the equipment name, and each item of equipment is spe-
cifically identified to signify it's level in the hierarchy.
This provides the opportunity to browse, find, identify and quantify the values of tags
and other objects assigned to a piece of equipment using a number of new or modified
CtAPI and Cicode functions.
See Also
Defining an Equipment Hierarchy
GUI Enhancements
As part of CitectSCADA v7.40 the following enhancements have been made to the GUI:
l The tab style page templates include a new type of alarm page called the sequence of
events page in standard layout or incorporating the equipment tree view. You can
now create active, summary, and disabled pages in standard layout or with the equip-
ment tree-view.
l New library_controls include project. This project contains a series of genies you can
use in your graphic pages, such as tables, equipment tree-view panel, horizontal and
vertical scroll bars.
94
Chapter 2: What's New in CitectSCADA 7.x
Importing Equipment
The concept of creating hierarchies of equipment has been introduced in 7.30 to provide
a way of browsing, finding, identifying and quantifying the values of tags and other
objects assigned to a piece of equipment.
In addition, equipment tags can be created by importing them in much the same way as
tags can be imported using TagGen. An XML template is used to specify the fields of
input and output databases, and define filters and transformation rules that create tags
from existing database fields.
The Update Equipment tool is used to update the equipment configuration based on
predefined templates.
See Also
Importing Equipment Using XML Templates
Software Protection
CitectSCADA now supports two different software licensing models to help maintain
license conformance:
l Sentinel Licensing products which are the legacy methods used by the product.
o Using a SafeNet hardware dongle
l A new licensing method which is introduced with v7.30.
o Using a FLEXERA license locked to PC attributes.
o Using a FLEXERA SafeNet hardware dongle
In both cases the hardware dongle is a physical key that plugs into either the parallel
port or USB port of your computer, and contains details of your user license, such as
type and I/O point count.
You may choose to use either the SafeNet licensing method, or the new FLEXERA
method
95
Chapter 2: What's New in CitectSCADA 7.x
Both the existing SafeNet licensing method and the new FLEXERA method now contain
the following features:
l Separate licensing for drivers used for importing tags, such as SpeedLink and Fas-
Linx is no longer required.
l There is no longer a distinction between Control Client or View-Only Client and their
web counterparts Internet Control Client or Internet View-Only Client.
For further information on the new licensing method, refer to Independent Point Count.
See Also
CiUSAFE dialog properties
Demo mode
Dynamic-point count licensing
Note:
• The OPC DA Server does not fully support WriteVQT functionality, as a Citect-
SCADA I/O server does not allow quality and timestamp changes that are generated
from an external source.
• Connecting a CitectSCADA OPC DA client to an CitectSCADA OPC DA server is
not recommended, as the client was not designed to be used in this way. This mode
of operation has not been validated.
96
Chapter 2: What's New in CitectSCADA 7.x
See also
Configuring the OPC DA Server
Operating the OPC DA Server at runtime
OPC DA Server diagnostics
Reference Information
Supportability Enhancements
Further Supportability Enhancements have been added to CitectSCADA to harmonize
logging features of the product. Although the enhancements were primarily introduced
to assist Technical Support personnel with system analysis, they have resulted in many
benefits to the end user. These include:
l Separation of file logging from Drivers. Drivers will now progressively updated to
log to the SYSLOG.DAT file rather than a separate driver log. This may mean that
your SYSLO.DAT file may require to have its maximum size adjusted.
l A server Cicode function ServerDumpKernel() has been added to allow dumping ker-
nel data on a server process.
l A new column has been added to the CSAtoPSI kernel table indicating the number of
changes on a tag.
97
Chapter 2: What's New in CitectSCADA 7.x
Tag Browsing
You can now browse a list of variable tags owned by data sources at runtime. You can
also browse selected runtime and configuration fields of the tag via Cicode and CtApi,
and while browsing you can apply a filter using a set of predefined field names using
regular expressions.
See Also
Tag Browsing
Scheduler
The Scheduler is a calendar based programming tool that allows you to manipulate tag
values within a CitectSCADA project. It can be used to create a sequence of auto-
matically executed commands, delivering a valuable scheduling tool for applications.
See Also
Using Scheduler
New Parameters
The following parameters are new in version 7.30 . For an entire list of the system param-
eters, refer to the Parameters documentation.
Alarm Parameters
[Alarm]DefaultSOETimeRange Specifies the default time range, in days, for SOE views that
have no other time-based filter.
[AlarmFilterRuleList.Active] Defines the name of rules to appear on the Simple Rule drop-
Rule<n> down list of the active alarm filter form.
98
Chapter 2: What's New in CitectSCADA 7.x
[AlarmFilterRuleList.Disabled] Defines the name of rules to appear on the Simple Rule drop-
Rule<n> down list of disabled alarm filter form.
[AlarmFilterRuleList.SOE] Defines the name of rules to appear on the Simple Rule drop-
Rule<n> down list of alarm summary filter form.
[AlarmFilterRuleList.Summary] Defines the name of rules to appear on the Simple Rule drop-
Rule<n> down list of alarm summary filter form.
AlarmFilterRuleList].Rule<n> Defines the name of the common rules to appear on the Sim-
ple Rule dropdown list of all alarm filter form.
AlarmFilterRules Parameters
[AlarmFilterRuleList.Active] Defines the name of rules to appear on the Simple Rule drop-
Rule<n> down list of the active alarm filter form.
[AlarmFilterRuleList.Disabled] Defines the name of rules to appear on the Simple Rule drop-
Rule<n> down list of disabled alarm filter form.
[AlarmFilterRuleList.SOE] Defines the name of rules to appear on the Simple Rule drop-
Rule<n> down list of alarm summary filter form.
[AlarmFilterRuleList.Summary] Defines the name of rules to appear on the Simple Rule drop-
Rule<n> down list of alarm summary filter form.
AlarmFilterRuleList].Rule<n> Defines the name of the common rules to appear on the Sim-
ple Rule dropdown list of all alarm filter form.
99
Chapter 2: What's New in CitectSCADA 7.x
100
Chapter 2: What's New in CitectSCADA 7.x
BrowseTableView Parameters
ClientParameters
General Parameters
Page Parameters
[Page]SOE- The name of the graphics page to display when you call up an sequence of
Page events (SOE) page via the Cicode function PageSOE().
SQL Parameters
101
Chapter 2: What's New in CitectSCADA 7.x
Scheduler Parameters
[Scheduling]Per- Directs where the configuration data for the scheduler is stored.
sistPath
[Scheduling] Sets the delay from when the Scheduler’s server components are initial-
StartDelay ized to the point when Scheduler begins processing active schedule
entries.
Modified Parameters
Alarm Parameters
[Alarm]SaveP- This parameter is now used only to import alarm history from previous ver-
rimary sions of CitectSCADA.
[Alarm]Save- This parameter is now used only to import alarm history from previous ver-
Secondary sions of CitectSCADA.
[Alarm]Sum- The maximum number of alarm summary entries that can be held in mem-
maryLength ory. The maximum number for this parameter has been modified from
4096000 to 100000.
Language Parameters
SQL Parameters
Re-instated Parameters
None
Obsolete Parameters
[Alarm]Fil- If privilege is not checked, a user with no privilege (0) can browse and
102
Chapter 2: What's New in CitectSCADA 7.x
terViewByPrivilege view trends and alarms that require privilege 1. The v7.40 behavior is
the same as [Alarm]FilterViewByPrivilege = 0 in 7.20.
[Alarm]StartTimeout Sets the timeout period for loading data from the primary Alarms
Server.
Intl Parameters
[Intl]s1159 If a 12 hour clock is set (see [Intl]iTime), this parameter sets the format of
the morning extension.
[Intl]s2359 If a 12 hour clock is set (see [Intl]iTime), this parameter sets the format of
the evening extension.
New Functions
Modified Functions
CtFindFirst Searches for the first object in the specified table, device, trend, tag, or
alarm data which satisfies the filter string. Now accepts "Equipment" as
an argument.
CtFindFirstEX Performs the same as ctFindFirst, but with an additional new argument.
Now accepts "Equipment" as an argument.
Obsolete Functions
None
103
Chapter 2: What's New in CitectSCADA 7.x
New Functions
Alarm Functions
AlarmCount Counts the available alarms for the selected filter criteria.
AlarmCountList Counts the available alarms for the selected alarm list (selected by
its animation).
AlmBrowseDisable Disables the alarm tag at the current cursor position in an active
data browse session.
AlmBrowseEnable Enables the alarm tag at the current cursor position in an active
data browse session.
AlmBrowseGetField Gets the field indicated by the cursor position in the browse ses-
sion.
AlmBrowseNext Gets the next alarm tags entry in the browse session.
AlmBrowsePrev Gets the previous alarm tags entry in the browse session.
AlarmFilterEditAppend Appends the provided expression to the current filter session con-
tent without any validation.
AlarmFilterEditCommit Validates the filter built in this session and, if valid, applies the
filter to the list associated with the session.
104
Chapter 2: What's New in CitectSCADA 7.x
AlarmFilterEditOpen Creates a session for the historical list associated with the provided
animation number (aN).
AlarmFilterForm Displays a form for specifying filtering criteria for either an alarm
list or a named filter.
AlmFilterEditSet Replaces the current filter session content by the provided expres-
sion without any validation.
AlarmGetFilterName Retrieves the name of the linked filter for the supplied AN.
AlarmResetQuery Clears the filter of the specified filter source. Used to reset the filter
set up by the Cicode function AlarmFilterForm().
LibAlarmFilterForm Displays a generic alarm filter pop-up for specifying filtering crite-
ria for either an alarm list or a named filter.
Equipment Functions
EquipStateBrowseNext Places the data browse cursor at the next available record.
EquipStateBrowseNumRecords Returns the number of records that match the current filter
criteria.
Page Functions
PageSOE Displays a category of sequence of events (SOE) entries on the SOE page.
Scheduler Functions
105
Chapter 2: What's New in CitectSCADA 7.x
SchdConfigNext Places the data browse cursor at the next available record.
SchdConfigNumRecords Returns the number of records that match the current filter
criteria.
SchdNext Places the data browse cursor at the next available record.
SchdNumRecords Returns the number of records that match the current filter
criteria.
SchdSpecialItemNext Places the data browse cursor at the next available record.
SchdSpecialItemNumRecords Returns the number of records that match the current filter
criteria.
106
Chapter 2: What's New in CitectSCADA 7.x
SchdSpecialNext Places the data browse cursor at the next available record.
SchdSpecialNumRecords Returns the number of records that match the current filter
criteria.
SchdSpecialOpen Initiates a new session for browsing the special day groups.
SQL Functions
SQLNumFields Gets the number of fields or columns that were returned by the last
SQL statement
107
Chapter 2: What's New in CitectSCADA 7.x
SQLQueryCreate The function creates a new query and returns its handle
SQLQueryDispose The function disposes the query which handle is given as the argu-
ment
Timestamp Functions
Tag Functions
Modified Functions
Alarm Functions
AlarmCatGetFormat Returns the display format string of the specified alarm cat-
egory.Type has been extended to include SOE format.
AlarmDspNext Displays the next page of alarms.Works with new SOE display type.
AlarmDspPrev Displays the previous page of alarms.Works with new SOE display
type.
AlarmFirstTagRec Alarm 'Rec' functions listed are now executed in the client process,
AlarmFirstCatRec with the function MsgRPC no longer required when called remotely
AlarmFirstPriRec to the Alarm Server.
108
Chapter 2: What's New in CitectSCADA 7.x
AlarmFirstQueryRec
AlarmNextTagRec
AlarmNextCatRec
AlarmNextPriRec
AlarmNextQueryRec
AlarmAckRec
AlarmEnableRec
AlarmDisableRec
AlarmGetDelayRec
AlarmSetDelayRec
AlarmGetThresholdRec
AlarmSetThresholdRec
AlarmGetFieldRec
AlarmGetDsp Retrieves field data from the alarm record that is displayed at the
specified AN. Works with new SOE display type.
AlarmGetInfo Retrieves data on the alarm list displayed at a specified AN. New
type 12 added.
AlmSummaryGetField Gets the field indicated by the cursor position in the browse session.
Now supports Equipment field.
AlmTagsGetField Gets the field indicated by the cursor position in the browse session.
Now supports Equipment field.
Accumulator Functions
AccumBrowseGetField Gets the field indicated by the cursor position in the browse session.
Now supports Equipment field.
Equipment Functions
EquipBrowseGetField Gets the field indicated by the cursor position in the browse session.
Now supports Parent and Composite fields.
Format Functions
FmtOpen Opens a format template. mode has been extended to include SOE format.
109
Chapter 2: What's New in CitectSCADA 7.x
Security Functions
Login Logs a user into the CitectSCADA system, using CitectSCADA security and
gives users access to the areas and privileges assigned to them in the
Users database. New sLanguage parameter added.
UserLogin Logs a user into the CitectSCADA system, using either Windows security
or CitectSCADA security and gives users access to the areas and privileges
assigned to them in the Users database. New sLanguage parameter
added.
Server Functions
ServeGetProperty Returns information about a specified server and can be called from any
client.
AssGetProperty Gets association information about the current Super Genie from the data-
source.
SQL Functions
SQLNoFields Gets the number of fields or columns that were returned by the last SQL
statement.
Tag Functions
TagGetProperty Gets a property for a variable tag from the datasource. Now supports
Equipment field.
TagInfo Gets information about a variable tag. Now supports Equipment field.
TagInfoEx Gets information about a variable tag. Now supports Equipment field.
Trend Functions
TrnBrowseGetField Gets the field indicated by the cursor position in the browse session.
Now supports Equipment field.
Reinstated Functions
Deprecated Functions
110
Chapter 2: What's New in CitectSCADA 7.x
AlmTagsEnable Enables the alarm tag at the current cursor position in an active data
browse session.
AlmTagsDisable Disables the alarm tag at the current cursor position in an active data
browse session.
AlmTagsNext Gets the next alarm tags entry in the browse session.
AlmTagsAck Acknowledges the alarm tag at the current cursor position in an active
data browse session.
AlmTagsClear Clears the alarm tag at the current cursor position in an active data
browse session.
AlmTagsGetField Gets the field indicated by the cursor position in the browse session.
AlmTagsOpen Creates a session for the historical list associated with the provided
animation number (aN).
AlmTagsPrev Gets the previous alarm tags entry in the browse session.
Removed Functions
111
Chapter 2: What's New in CitectSCADA 7.x
AlmSummarySetFieldValue Sets the value of the field indicated by the cursor posi-
tion in the browse session. Now obsolete.
Miscellaneous Functions
SetLanguage Sets the language database from which the local translations of native
strings in the project will be drawn, and specifies the character set to be
used. Now obsolete. Use the Login(), UserLogin() and LoginForm() to set
the preferred language.
112
Chapter 2: What's New in CitectSCADA 7.x
Introduced in 7.40:
l Referencing a variable tag using Equipment.Item
l New Cicode functions to maintain a list of unique Pages "opened"
l New Equipment Editor
l New StruxureWare Templates
l OPC Factory Server (OFS) Security Updates
For changes to:
l Citect.ini parameters, see Citect.ini Parameters in Version 7.40.
l Cicode functions, see Cicode Functions in Version 7.40.
l CtAPI functions, see CtAPI Functions in Version 7.40.
For details on how to configure an existing project to run in 7.40 refer to Upgrading to
7.40.
See Also
What's New in CitectSCADA 7.x
113
Chapter 2: What's New in CitectSCADA 7.x
Note: Only variable tags (and not Alarm or trend tags) can be referenced using Equip-
ment.Item syntax.
114
Chapter 2: What's New in CitectSCADA 7.x
See Also
The StruxureWare Interface
New Parameters
The following parameters are new in version 7.40 . For an entire list of the system param-
eters, refer to the Parameters documentation.
115
Chapter 2: What's New in CitectSCADA 7.x
CTEdit Parameters
General Parameters
Page Parameters
Server Parameters
Modified Parameters
Code Parameters
General Parameters
Obsolete Parameters
New Functions
Page Functions
116
Chapter 2: What's New in CitectSCADA 7.x
PageListCount Gets number of pages in the page list of the current window.
PageListCurrent Gets index of the current page in the page list of the current window.
PageListInfo Gets information of a page at the specific index in the page list of current
window.
PageListDisplay Displays a page at the specific index in the page list of the current win-
dow, and moves the current index to the page. When a page is recalled,
the original parameters (such as cluster context, super genie asso-
ciations, PageTask arguments if applicable) used to display the page will
be restored.
PageListDelete Deletes a page at the specific index from the page list of the current win-
dow.
XML Functions
XMLGetAttribute Retrieves the attribute value of the node from an XML doc-
ument in memory
XMLGetChild Retrieves the child node for the specified parent node in
XML document in memory
XMLGetChildCount Retrieves the total number of child nodes for the specified
parent node in an XML document in memory
117
Chapter 2: What's New in CitectSCADA 7.x
document in memory
XMLNodeRemove Removes specified XML node from its parent and XML doc-
ument
XMLSetAttribute Sets the value of specified attribute of the node in the XML
document. If the attribute does not exist, it will be
created.
Modified Functions
Tag Functions
TagGetProperty Gets a property for a variable tag from the datasource. Now sup-
ports Equipment.Item.
TagGetScale Gets the value of a tag at a specified scale from the datasource.
Now supports Equipment.Item.
TagRead Reads a variable from the I/O device. Now supports Equip-
ment.Item.
TagReadEx Reads the value, quality or timestamp of a particular tag from the
I/O device. Now supports Equipment.Item.
TagScaleStr Gets the value of a tag at a specified scale. Now supports Equip-
ment.Item.
TagSetOverrideBad Sets a quality Override element for a specified tag to Bad Non Spe-
cific. Now supports Equipment.Item.
TagSetOverrideGood Sets a quality Override element for a specified tag to Good Non
Specific. Now supports Equipment.Item.
118
Chapter 2: What's New in CitectSCADA 7.x
TagSetOverrideQuality Sets a quality Override element for a specified tag. Now supports
Equipment.Item.
TagSubscribe Subscribes a tag for periodic monitoring and event handling. Now
supports Equipment.Item.
Reinstated Functions
Deprecated Functions
Removed Functions
New Functions
Modified Functions
ctListAddEx Adds a tag to the list with a specified poll period. Now accepts "Equip-
ment.item".
ctTagGetProperty Gets the given property of the tag. Now accepts "Equipment.item".
ctTagRead Reads the current value from the given I/O Device variable tag. Now
accepts "Equipment.item".
ctTagReadEx Performs the same as ctTagRead, but with an additional new argument.
Now accepts "Equipment.item".
ctTagWrite Writes the given value to the I/O Device variable tag. Now accepts "Equip-
ment.item".
Obsolete Functions
119
Chapter 2: What's New in CitectSCADA 7.x
120
Chapter 3: Upgrading to CitectSCADA
Upgrading to v7.40 from v7.30
Equipment.Item
In v7.40 you can reference a variable tag using associated equipment name and item
name (equipment.item syntax). In this release trend tags and alarm tags are not sup-
ported. After upgrading some existing equipment / item names may no longer be
accepted due to new compiler rules, for example, root equipment names cannot be a
reserved word and item names cannot be tag extension keywords.
You can also insert Equipment.item references into expression fields using the insert tag
option available when configuring objects in the graphics builder; however if no equip-
ment has been configured in your system the list will be empty. You will need to con-
figure equipment or deselect the option 'Display equipment items when populating tag
list' in the Project Editor Options Dialog to populate the list with available tags.
StruxureWare Templates
Templates are Wide Screen only. Two resolutions are available in this release:
l 1366 x 768
l 1920 x 1080
Note: The drawing canvas available in the new SxW templates is similar to the
equivalent tab-style templates, thus making it easier for you to upgrade projects to
the new templates.
Due to changes in behavior of existing features in CitectSCADA since v7.20, the fol-
lowing upgrade procedures should be reviewed before continuing.
121
Chapter 3: Upgrading to CitectSCADA
ADO Support
The SQL engine for database query was updated in v7.30, as a result some Cicode func-
tions were removed.
Alarm Enhancements
l [Alarm]SummaryLength
The maximum value of the [Alarm]SummaryLength parameter has been changed.
l Migrating alarm event history
v7.40 introduced an historical alarm storage repository. The existing historical data is
automatically migrated to the new repository, once, on first start of your alarm server.
122
Chapter 3: Upgrading to CitectSCADA
customers must set the trend storage method for blank entries to match the default
from the previous version.
Graphics
l Disable style behavior correction
Disable style behavior has been corrected in v7.40. It is recommended when using a
style other than "embossed" to check the disable style of all groups, genies, and sym-
bols sets at runtime.
Internet Display Client
l IDC
Support for the Internet Display Client (IDC) has been removed from this release. It is
recommended you consider the use of the Web Client or the Single File Runtime-only
Install. The Single File Runtime-only Install should be used in conjunction with the
Run/Copy configuration (INI) settings.
Localization
l Alarm string translation changes
Alarm server records in this release only support a single translation per field. If
translations have been used in a previous version, some changes will be required.
Changes have also been made to the available formatting.
l Using local language as native
Languages need to be explicitly defined in your project before they may be used.
l SetLanguage Cicode Function
Runtime language switching is now achieved using the Login() Cicode function. The
existing SetLanguage cicode function has been removed.
OPC Server
l OPC servers need to be explicitly defined in the server section of the project con-
figuration.
l The Program ID has changed. The OPC DA server, program ID is Schneid-
erElectric.SCADA.OPCDaServer.1. (Old name Citect.OPC.1 and Citect.OPCRemote.1).
The DCOM setting needs to be updated based on the new program ID.
System Migration
l Hardware Requirements
In v7.40 the minimum and recommended hardware requirements have increased.
Load test your system as part of your upgrade procedure to ensure that the hardware
in use is adequate.
l Alarm Server Upgrade
When doing a live migration, older alarm clients will not connect to a new alarm
server process.
123
Chapter 3: Upgrading to CitectSCADA
l Historian
Customers using Historian should upgrade their version to Historian to v4.40 before
upgrading to v7.30.
Security
l Reserved User Names
Additional reserved user names were introduced in v7.40. When adding users to
CitectSCADA these reserved names should not be used.
l User Name Restriction
User Names with a dot in the name are invalid.
To upgrade an existing project to v7.40 from v6.x, perform each of the following pro-
cedures.
124
Chapter 3: Upgrading to CitectSCADA
You are not required to carry out these procedures if you are upgrading from version 7.0
or later to v7.40.
l Upgrade CTAPI Applications
Verify that CTAPI applications are upgraded before upgrading and running any
CitectSCADA 7.x projects.
l Configure I/O Devices
Before upgrading, verify that I/O Devices are configured as necessary to run in the
project.
l Run the Citect Installer
The installer will lead you through a number of steps until the installation is com-
plete.
l Launch CitectSCADA
An automatic upgrade of your projects will occur when you initially start Citect-
SCADA
l Run the Migration Tool
The automatic update that occurs when you initially launch CitectSCADA does not
fully upgrade your projects, as such it needs to be followed by running the Migration
Tool.
l Define Clusters
Clusters can now be defined. The project needs to be configured to use at least one
cluster.
l Configure Network Addresses
The network addresses and ports of the computers to be used as servers are now
defined in the project.
l Configure Servers
The Alarm, Report, Trend, and I/O Servers are now defined in the project.
l Configure Tags to Use Clustering
Alarms, reports, trends, SPC tags, and accumulators can now be configured to run in
a specific cluster.
l Configuring Multiple Monitor Support
You may need to check whether a custom configuration operates correctly in a mul-
tiple-monitor environment.
l Compile the Project
Once you have configured your project, compile it and verify that there are no errors.
l Run the Computer Setup Wizard
Run the Computer Setup Wizard for each computer running the project. At each stage
of the Wizard, configure the appropriate settings for that computer.
Note: If you are running version 5.5, verify that you upgrade your projects to version
125
Chapter 3: Upgrading to CitectSCADA
See Also
What's new in 7.x
126
Chapter 3: Upgrading to CitectSCADA
After upgrading, confirm and adjust the configuration of all I/O devices in your project.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
Before attempting to configure your I/O devices for the changes caused by the upgrade
process, first read the information in Configuring Local Variables and Using Memory
Mode. This provides details about local variables and the other I/O Device options that
replace memory I/O Devices, allowing you to select and configure your project appro-
priately.
Note: Alarm devices with their Protocol property set to "Alarm" are no longer used
and will be removed by the Migration Tool. All Alarm Servers will now publish
Alarm Properties.
The reconfiguration will take place when you run the Migration Tool. For detailed infor-
mation on this tool, refer to Migration Tool.
See Also
Run the Citect Installer
Configuring Local Variables
Using Memory Mode
Note: Uninstall any existing version 6.x or version 7.0 before installing v7.40, as
CitectSCADA does not support different versions running side-by-side. Additionally,
to use the v7.40 Example and CSV_Example projects, it is recommended that you
delete the existing Example and CSV_Example projects using Citect Explorer before
starting the installation.
Launch CitectSCADA
An automatic upgrade of your projects will occur when you initially start CitectSCADA.
127
Chapter 3: Upgrading to CitectSCADA
Migration Tool
The automatic update that occurs when you initially launch CitectSCADA v7.40 does
not fully upgrade your projects, and needs to be followed by the use of the Migration
Tool ( if migrating from v6.x this is particularly noteworthy). The automatic update is a
passive action which updates the database field definition for any database that has
been changed between the two versions and copies new files that are necessary in v7.40.
Prior to the automatic upgrade proceeding you are given the option of canceling the
upgrade. The upgrade can be invoked at a later time by setting the [CtEdit]Upgrade
parameter to 1 (True) in the Citect.ini file.
After the automatic update has completed then prepare your projects prior to running
the Migration Tool.
The Migration Tool is a separate application which has to be manually run after the
automatic upgrade has been executed, and initiated by you after you have prepared the
project for final migration. This tool will accommodate the important changes in project
functionality that are incorporated in 7.0 and v7.40.
It is important that you prepare your existing projects for a successful upgrade using this
tool.
Some of the features introduced in v7.40 of CitectSCADA require changes in the project
data from version 6.x
128
Chapter 3: Upgrading to CitectSCADA
After upgrading, confirm and adjust the configuration of all I/O devices in your project.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
See Also
Memory devices
Alarm devices
Included projects
Using the Migration Tool
Memory Devices
In previous versions of CitectSCADA an I/O Device could be defined as a memory
device by setting the port value to "Memory". This was generally done for one of the fol-
lowing purposes:
l To provide for future devices that were not currently connected to the system, but
their points needed to be configured at this stage of project.
l For virtual devices where there was no corresponding physical I/O Device and you
needed data storage with the entire functionality normally associated with I/O var-
iables such as alarms.
l To act as a variable which was local to the process being used in place of Cicode
global variables.
You can still use I/O Devices for future or virtual devices in version 7.0, but manually
set the Port parameter to an unused value other than Memory, and set the Memory prop-
erty of the device to True to indicate that it is an offline in-memory device before running
the Migration Tool.
You need to review your project to identify which memory I/O Devices are local variable
holders and which ones need to be changed to non-memory so that the Migration tool
does not convert their variables.
The Migration Tool will set any I/O Device's port which is identified as a Memory
device to the new Local Variable, and the original device record will be deleted.
See Also
Configure I/O Devices
Alarm Devices
Converting Memory Variables
129
Chapter 3: Upgrading to CitectSCADA
Alarm Devices
In previous versions of CitectSCADA Alarm devices were defined as devices with their
Protocol property set to "Alarm". In version 7.0 the function of configuring such a device
is now replaced by setting the Publish Alarm Properties property to True on the Alarm
Server.
Alarm devices with their Protocol property set to "Alarm" will be deleted from I/O
Devices table by the Migration Tool.
See Also
Alarm Server Definitions
The Migration tool can delete memory and alarm device records. If you want to delete
the devices at a later time, deselect the "Remove obsolete Memory and Alarm Devices"
option.
Note: Alarm devices with their Protocol property set to "Alarm" are no longer used
and will be removed by the Migration Tool. All Alarm Servers will now publish
Alarm Properties.
See Also
Converting Memory Variables
130
Chapter 3: Upgrading to CitectSCADA
Comment Comment
With the exception of the Array Size, which has been introduced in version 7.0 exclu-
sively for local variables, every field receives it's value from the same or similar field.
See Also
Deleting Variable Tags
Default Scale
The Scale properties in both variable tags and local variables are optional. If a Scale
value is not specified the default value is indicated by a parameter in the Citect.ini file.
The parameter name is "DefaultSliderScale" under the [General] section in the Citect.ini
file. The default values for Scale is 0-32000, unless the default slider scale is true in
which case the default value depends on the type for example Integer, String etcetera.
131
Chapter 3: Upgrading to CitectSCADA
The Migration tool will read this parameter and if it is not set, or set to false, then it will
explicitly set any empty Scale property to a value in to the range of 0 to 32000. This will
be done even if either of the Zero Scale or Full Scale parameters has a value, in which
case the empty Scale parameter will receive the default value.
If the DefaultSliderScale in the Citect.ini file set to True, the Scale parameters will not be
populated with a default value if they are empty, rather they will be interpreted at run-
time.
Included Projects
Each project may contain multiple included projects. Additionally any included project
may contain its own included project so creating a cascading project.
The Migration Tool needs to process the original project and included projects in a sin-
gle step. The reason for this is that variables can be defined in one project that refer to
I/O Devices defined in another included project.
The Migration Tool performs this procedure sequentially on the "master" project then
each included project.
In the case where two master projects share the same project as an included project, it is
important that you do not select the "Remove obsolete Memory and Alarm devices"
check box when you process a project that contains shared included projects. This is
because the removal is performed at the conclusion of the migration process on each
master and included projects sequentially. This could cause the deletion of an I/O Device
in the first master project which is referenced by a tag in a shared included project
which is processed in a later step.
If two separate "master" projects contain the same included project, run the Migration
Tool on each "master" project without selecting to delete obsolete devices.
132
Chapter 3: Upgrading to CitectSCADA
After upgrading, confirm and adjust the configuration of all I/O devices in your project.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
To remove obsolete devices it is recommended that once the Migration Tool has com-
pleted successfully (without the check box being selected), run it a second time with the
check box selected. This will safely remove the devices since every tag conversion were
completed in the first pass of the Migration Tool.
Note: Before you use the Migration Tool is strongly recommended that you famil-
iarize yourself with the process that it performs, and the preparatory steps that you
need to carry out with your existing projects as described under Migration Tool.
133
Chapter 3: Upgrading to CitectSCADA
4. Select the Remove obsolete Memory and Alarm devices check box if you wish to
delete these devices after successful migration.
Note: Do not select this check box if the project contains any included projects
which are shared with more than one master project when you run the tool for
the first time on such projects. Run the tool a second time using this option if the
migration is successful after it is run the first time if you want to delete the
devices.
5. Leave as selected the option 'Create Roles from User security information' if you wish
to migrate the users database from an existing project
6. Check the option 'Copy XP_Style menu into Tab_Style Menu' to convert legacy menu
entries to the format necessary for the new menu configuration system. By default
this option is unchecked, to avoid potential compile errors that may occur after migra-
tion if the legacy menu.dbf contains functions which have been removed.
7. Check 'Migrate Included Projects' to migrate the included projects that are in the
project you previously selected.
Note: If 'Copy XP Syle menu into Tab_Style Menu' and 'Migrate Included Projects'
are both selected when the migration tool runs the following message will be dis-
played "Copying menus of included projects may lead to conflicts. Any conflicts
will need to be manually corrected". To avoid this from occurring it is rec-
ommended you run the migration tool twice. In the first instance just select the
option 'Copy XP_Style menu into Tab_Style Menu', and in the second instance
just select the option 'Migrate Included Projects'.
8. Check the "Migrate equipment database" if you have an existing database that you
want to migrate into this version. When upgrading from an earlier version, and the
"PARENT" field of the equipment table was used, you should select this check box.
Otherwise existing data from the PARENT field will be ignored. If runtime browsing
is used, the PARENT field will return the equipment parent (the substring of the
equipment name without the last '.' and anything after that). To retrieve information
that was stored in the previous "PARENT" field the "COMPOSITE" field should be
used.
9. Click Migrate to begin the migration process, or click Close to exit without per-
forming the migration.
10. The migration process will begin and display a progress dialog indicating the stage
of the conversion and the name of the project being migrated. If you wish to cancel
the migration at this point click the Abort button.
134
Chapter 3: Upgrading to CitectSCADA
Note: Aborting a migration will stop the migration process, and any changes
already completed will not be rolled back. You will have to restore your project
from the backup created in the first step.
11. When the migration process is concluded a confirmation dialog box will display indi-
cating the number of variables converted and the number of I/O Devices deleted (if
device deletion was selected at the start of migration)
12. Click the Close button to close the dialog.
Define Clusters
Even if you do not intend to use clusters in your project, you need to define at least one.
Tags and servers will default to run in the defined cluster.
1. In the Project Editor, select Servers | Clusters. The Cluster dialog box displays:
2. In the ClusterName field, enter the name of the cluster. The name needs to be unique
to the project and not contain spaces.
3. In the Comment field, enter any useful comment. This property is optional and is not
used at runtime.
4. Click Add.
See Also
Configure Network Addresses
135
Chapter 3: Upgrading to CitectSCADA
Configure Servers
Primary and Standby Alarms, Reports, Trends, and I/O Servers are now defined using
the Project Editor. This involves specifying a network address and a cluster for each
server.
Default Ports
Each server has a unique default port assigned to it. This default port may only be used
with that type of server. Attempting to use a default port on another type of server will
result in a compilation error of:
"Invalid port number (2073-2082,20222,21) are reserved"
The following table lists the default port numbers and their associated server type.
136
Chapter 3: Upgrading to CitectSCADA
137
Chapter 3: Upgrading to CitectSCADA
See Also
Configure Trend Tags to use Clustering
138
Chapter 3: Upgrading to CitectSCADA
MultiMonitors Parameters
Note:If updating projects created using previous versions of CitectSCADA, check that
the Computer Role Setup Page has the correct process mode selected.
See Also
Running the Computer Setup Wizard
139
Chapter 3: Upgrading to CitectSCADA
See Also
Note:When backing up your project, if you modify the name of the project you will
need to manually update the project name within the .Dat files so that the <Cur-
rentProjectName> portion of the .Dat files match the modified project name (<Cur-
rentProjectName>_<Cluster>_ALMSAVE.DAT and <CurrentProjectName>_
<Cluster>_ALMINDEXSAVE.DAT ).
To undo the migration of the alarm event history you can manually delete the database.
To delete the database, delete the directory located in the CitectSCADA data directory
that has the same name as the project. The CitectSCADA data directory is defined in INI
parameter [CtEdit]Data.
For instance, if the project name is Example and data directory defined in the INI param-
eter is:
[CtEdit] Data=C:\ProgramData\Schneider Electric\CitectSCADA 7.30\Data
The alarm database directory would be C:\ProgramData\Schneider Elec-
tric\CitectSCADA 7.30\Data\Example.
See Also
Memory devices
140
Chapter 3: Upgrading to CitectSCADA
141
Chapter 3: Upgrading to CitectSCADA
Troubleshooting
Carefully consider the following results when upgrading to CitectSCADAv7.40:
l Compiler Errors
l Upgrading a Project that uses Distributed Servers
Compiler Errors
Before you configure your project to run in version 7.x, compiling the project will gen-
erate a number of compiler errors. These may include messages concerning deprecated
and deleted functions, as well as the detected error "No Clusters defined". This detected
error will be resolved once you define a cluster in the project.
See Also
Troubleshooting
142
Chapter 3: Upgrading to CitectSCADA
Note: Defining a separate communications project means that when the Global
Display Project compiles, it has the communications information without needing
to load the data from the Cluster Projects.
l In each Cluster Project, specify the appropriate cluster for alarms, trends, reports, SPC
tags, and accumulators.
l You may need to modify the buttons and pages in the Global Display Project, par-
ticularly if they are using Cluster functions which have been modified or deprecated.
143
Chapter 3: Upgrading to CitectSCADA
144
Chapter 4: About CitectSCADA
CitectSCADA is a Supervisory Control and Data Acquisition (SCADA) solution that is
used to manage and monitor processes in manufacturing, primary production, utilities
delivery and facilities management.
The graphics, controls, configuration data and programming associated with a Citect-
SCADA installation is configured and implemented through projects. A project acts as a
digital representation of your production facility that is deployed in tandem with your
plant infrastructure, allowing the entire system to be monitored and controlled in real-
time.
Software Protection
CitectSCADA now supports two different software licensing models to help maintain
license conformance:
l Sentinel Licensing products which are the legacy methods used by the product.
o Using a SafeNet hardware dongle
l A new licensing method which is introduced with v7.30.
o Using a FLEXERA license locked to PC attributes.
o Using a FLEXERA SafeNet hardware dongle
In both cases the hardware dongle is a physical key that plugs into either the parallel
port or USB port of your computer, and contains details of your user license, such as
type and I/O point count.
You may choose to use either the SafeNet licensing method, or the new FLEXERA
method
Both the existing SafeNet licensing method and the new FLEXERA method now contain
the following features:
l Separate licensing for drivers used for importing tags, such as SpeedLink and Fas-
Linx is no longer required.
l There is no longer a distinction between Control Client or View-Only Client and their
web counterparts Internet Control Client or Internet View-Only Client.
For further information on the new licensing method, refer to Independent Point Count.
145
Chapter 4: About CitectSCADA
See Also
CiUSAFE dialog properties
Demo mode
Dynamic-point count licensing
146
Chapter 4: About CitectSCADA
l A vendor daemon, one process for each vendor who has a licensed product on the
network. The vendor daemons keep track of how many licenses are checked out, and
who has them. Licensed applications communicate with the vendor daemons
through TCP/IP network communications.
l A source for license rights, a license file installed by the license administrator. This
source contains information about the server machines and vendor daemons and has
at least one entry for each licensed product, specifying that product’s license details.
See Also
CiUSAFE dialog properties
Dynamic-point count licensing
Software Protection
Floating Point License Manager
147
Chapter 4: About CitectSCADA
Another remote client connects to it, requesting Full License with 10000 points or
with no point count specified (i.e. that remote client has no [Client]Point-
CountRequired in its INI file). It gets served the second available Full license.
Another remote client connects to it, requesting View-Only License with no point
count specified. It gets served one of the View-Only licenses with 500 points.
When any of the remote clients disconnect, the corresponding licenses served to them
earlier are reclaimed.
With the Sentinel licensing, each license has the same point count and a Sentinel key
will map to the new licensing as shown below.
view only users – 2 key 2 View-Only Client License – 5000 points each
A display client running in Full License mode (Client+Server or Control Client with Full
License) has a special rule for point count limits; if its full license entitlement is >= 500,
its client point count component is treated as unlimited.
Taking this special rule into account, the following describes the licensing scenario:
Assume a client with a dongle attached (acting as a local licensing server), the runtime
point count is calculated on the basis of:
l Server component (consolidated point count from Alarm, Report, & Trend servers)
l Client component (consolidated point count from OPC Server, CtAPI, and page dis-
plays, i.e. subscriptions)
Normally the overall runtime point count is calculated by taking the maximum of the
above two components; client and server. However, if the client is fully-licensed and the
point limit specified on the license is greater than 500 points, when calculating the over-
all runtime point count, the client component is disregarded and only the server com-
ponent is considered.
For Example:
l Alarm, Report, and Trend servers report 100 points (server component)
l CtAPI, OPC Server, and display pages use 200 points (client component)
l If the license entitlement is 499 points, the overall point count reported is 200 points
(maximum between 100 & 200)
l If the licenseentitlement is 500 points, the overall point count reported is 100 points
(since client component is disregarded)
148
Chapter 4: About CitectSCADA
See Also
CiUSAFE dialog properties
Demo mode
Dynamic-point count licensing
FlexNet license server
Floating Point License Manager
1,3 Either the KeyID or the Authorization code you entered is invalid.
2 Either the KeyID or the Authorization code you entered has been corrupted.
149
Chapter 4: About CitectSCADA
Demo mode
You can run CitectSCADA without the hardware key in demonstration (Demo) mode.
Demonstration mode lets you use every CitectSCADA feature normally, but with
restricted runtime and I/O.
In demonstration mode you can work in multi-process (with the networking model
selected as Stand alone) or single process mode.
The following demonstration modes are available:
l 15 minutes with a maximum of 50,000 real I/O.
l 10 hours with a maximum of 1 dynamic real I/O. This is useful for demonstrations
using memory and disk I/O. CitectSCADA starts in this mode if no hardware key is
available. If the system detects that you are using more than 1 real I/O point at run-
time then it will swap to the 15 minutes demo mode.
Note: Writing to any tag through DDE, CTAPI, or ODBC will cause that tag to con-
tribute to the dynamic point count even if it is a memory or disk I/O point. So if you
write to more than 1 point through these interfaces it will swap to the 15 minute
demo mode.
l 8 hours with a maximum of 42,000 real I/O. This is only available through special
CitectSCADA Integration Partners (CIP) keys.
However, from CitectSCADA 7.0 the compiler does not generate any static point count
any more. CitectSCADA counts I/O device addresses dynamically at runtime. This
includes tags used by alarms, trends, reports, events, pages, in Super Genies, use of the
TagRead() and TagWrite() Cicode functions, or read or written to using DDE, ODBC, or
the CTAPI. A particular variable tag is only counted towards your point count the first
150
Chapter 4: About CitectSCADA
time it is requested. That is, even though you may have configured a certain tag on a par-
ticular page in your project, unless you navigate to that page and request the data, the
variable tag will not be counted towards your point count.
In addition to this, there have been a number of other changes that have been made to
the licensing structure from CitectSCADA 7.0. These are listed below:
l I/O point count is now tag based not address based. For example, two tags that use
the same PLC address will be counted twice. If two trend tags use the same variable
tag, it will be counted once. The same applies to alarms.
l For the multi-process mode, each server component will accumulate its own point
count. The server component point count is the count added up from each server
component - if two server components use the same tags, say alarm and trend, the
tags will not be counted twice when the point count gets totaled, each unique point is
counted once only.
l For the multi-process mode, the client component will also accumulate its own point
count including super genie and CTAPI tags.
l For the multi-process mode, the machine point count will be the point count on the
client component or the point count added up from each server component, which-
ever is bigger. For example, if the total point count for each server component is 100,
and the client component point count including CTAPI and super genies is 95, the
kernel "General" window will show 100. If the client component point count reaches
120 later and the server component point count still remains 100, the kernel "Gen-
eral" window will show 120. In CitectSCADA 7.30 a special case has been intro-
duced; if the server point count is greater than 500, the client component point count
is disregarded
l Reading properties of a tag with TagGetProperty() will cause that tag to be included
in the point count, even if the value is not read.
l Writing to local variables or disk IO variable tags via OPC etc will also increase the
point count. For example, if you use an OPC client to write to a local variable, each
local variable will be counted once, the first time it is used.
With the release of 7.30 further changes to licensing point count have been included,
with the introduction of the “One License” product licensing method.
These are listed below:
l If a given tag is used by both, say, trend and alarm servers each server reports actual
tags used (Cluster.TagName), so the same tag is not counted twice.
l A new INI parameter has been added to control IP addresses aging. It is used to indi-
cate how long to reserve a license for a given IP address in cases when a remote
client connection is lost. This does not apply to FULL licenses. The parameter is [Gen-
eral]LicenseReservationTimeout.
151
Chapter 4: About CitectSCADA
l In previous versions there was a single point count within the licensing model, now
there are multiple point counts as a pair of values: License Type – Point Limit.
See Also
Software Protection
CiUSAFE dialog properties
FlexNet license server
Floating Point License Manager
Demo mode
Deploying CitectSCADA
The project is then deployed across a client-server network architecture. The servers are
used to manage communication with plant equipment and collate production data,
while the clients provide the interface for operators and managers to assess and interact
with the system.
This architecture allows the flexibility to adapt CitectSCADA to any production scenario,
with support for scalability, server clustering, and system redundancy.
152
Chapter 4: About CitectSCADA
Running a project
When a project is eventually compiled and implemented in runtime, your production
staff can visually monitor the system, initiate production processes and respond to
alarm conditions.
Historical and trend data can also be collated and distributed to assess operational per-
formance metrics such as production volume, efficiency, and maintenance requirements.
153
Chapter 4: About CitectSCADA
154
Chapter 5: Tools
CitectSCADA's architecture can be divided into three distinct areas of functionality:
l Configuration
l Runtime
l Drivers
Configuration involves the tasks necessary to prepare and build a project, while runtime
is the implementation of a project in a live production environment.
Drivers enable communication with devices via a number of communication protocols.
The driver defines the specific project settings necessary for CitectSCADA to com-
municate with a particular device.
When considering the tools included with CitectSCADA, it is easiest to look at their roles
in either configuration or runtime.
See Also
Configuration Tools
Runtime Tools
Drivers
Configuration Tools
The following tools enable you to configure a project and its components, and set up
computers to use CitectSCADA:
155
Chapter 5: Tools
Runtime Tools
The following tools enable you to run, monitor, and control projects during runtime:.
156
Chapter 5: Tools
Drivers
CitectSCADA can communicate with an array of I/O Devices, including PLCs (Pro-
grammable Logic Controllers), loop controllers, and distributed control systems (DCS).
The I/O Devices may be local (directly connected to an I/O Server) or remote (connected
to CitectSCADA via an intermediate communications means like a phone line).
Drivers enable communication with devices via a number of communication protocols
(including Ethernet, TCP/IP, and Serial). The driver defines the specific project settings
necessary for CitectSCADA to communicate with a particular device. This includes infor-
mation about:
l Boards
l Ports
l Devices
l Tag addressing
For detailed information on drivers and how to use them in your system, see Com-
municating with I/O Devices
157
Chapter 5: Tools
158
Chapter 6: Components of a project
The components you can incorporate in a project are logically divided across the fol-
lowing categories:
l Graphics components
l Tags
l Alarms
l System components
l Communications components
l I/OServer components
l Cicode / CitectVBA
These categories are represented in Citect Explorer through the set of folders associated
with each project.
As you build a project, the components you include are listed in the relevant project
folder. Selecting an item from one of these folders launches the selected component in
the tool necessary to edit its properties.
See Also
Graphics components
Tags
Alarms
System components
Communications components
I/OServer components
Cicode / CitectVBA
Graphics components
The graphical components of a project represent the content used to create the screens
presented on clients. They include:
159
Chapter 6: Components of a project
Genies Objects that group multiple graphical and functional elements for
easy duplication
As you create project pages in Graphics Builder, the included components are added to
the relevant subdirectory in the current project's Graphics folder.
Tags
Tags are used to identify the end points in the infrastructure you are using CitectSCADA
to monitor and control. The name you give to a tag becomes a label for a register
address, allowing it to be intuitively applied across graphics pages and in alarm noti-
fications.
Three tag types are included in a project's Tags folder in Citect Explorer:
SPC tags used to label tags according to Statistical Process Control prin-
ciples
Selecting one of these tag types in Citect Explorer calls up the associated configuration
dialog in Project Editor.
160
Chapter 6: Components of a project
Alarms
Alarms are used to identify conditions in a system that require attention. CitectSCADA
supports seven different alarm types:
Digital Alarms
Analog Alarms
Time-stamped Alarms
Advanced Alarms
Multi-Digital Alarms
Refer to Adding a new alarm for information about each Alarm type.
You can also use alarm categories within your project to help identify and manage
alarms.
System components
The system components of a project allow you to customize, manage, and track your run-
time system. They include:
161
Chapter 6: Components of a project
Users User profiles to restrict and grant access to the runtime system
Param- Built-in operating settings for fine tuning the runtime system
eters
See "Citect.ini File Parameters" in the CitectSCADA Technical Ref-
erence
162
Chapter 6: Components of a project
Communications components
The communications components of a project are the configured representation of the
communications hardware in your system. They include:
Port The physical connection between the board and the I/O Device
Server components
The server components of a project are the configured representation of the server com-
puters in your system. They include:
163
Chapter 6: Components of a project
Alarms Servers that monitor alarms and display them on the appropriate
servers client(s)
Trends Servers that control the accumulation and logging of trend infor-
servers mation
Cicode / CitectVBA
CitectSCADA offers two programming languages with which you can control and
manipulate CitectSCADA components:
164
Chapter 7: Typical system scenarios
The scenarios described in this chapter demonstrate how CitectSCADA can be used to
support typical processes found in primary production, utilities delivery, and man-
ufacturing.
In reality, a project will incorporate a combination of the scenarios described here, with a
high degree of customization and scalability. However, these examples have been sim-
plified to demonstrate how CitectSCADA can be configured and deployed to meet the
specific requirements of a production system.
Standalone system
Every component of a system runs on a single computer. See Standalone system.
Distributed I/O system
CitectSCADA is used to monitor and manage distributed devices that are each connected
to remote I/O Servers. See Distributed I/O system.
Redundant server system
One or more of the servers associated with a system are duplicated and defined as pri-
mary and standby units, allowing the system to keep running in the event one of the
servers becomes inoperative. See Redundant server system.
Client-server system
The servers and clients associated with a system are independently distributed across a
number of computers on a network, offering greater accessibility and performance ben-
efits. See Client-Server system
Redundant and distributed control system
Remote or geographically separate sections of a production system have fully oper-
ational sub-systems in place that are monitored and controlled locally. If such a sub-sys-
tem becomes partially or wholly inoperative in a manner preventing local control, this
arrangement allows remote Control Clients to take control of the affected sub-system. See
Redundant and distributed control system.
Cluster controlled system
A production system is organized into discrete areas being monitored by operators
within each area. However, there is also a level of control that supervises every area of
the system. See Clustered control system.
Load sharing system
165
Chapter 7: Typical system scenarios
The system splits the load of an otherwise stressed system across multiple machines,
better utilizing the available infrastructure. See Load sharing system.
See Also
Cluster Connections Configuration
Standalone system
A standalone installation of CitectSCADA runs every server and client component of a
system on a single computer. These include:
l I/O Server
l Alarm Server
l Trends Server
l Reports Server
l Control Client
This allows CitectSCADA to be run as a small, self contained system.
Note: You can run the server and client components of a standalone system as a sin-
gle-process or multi-process system. It is recommended that a single- process setup
only be used as a short term solution for your control system, or to run dem-
onstrations and test projects. Adding redundancy to your system will make it more
reliable and more efficient.
166
Chapter 7: Typical system scenarios
This model is also useful in plants that contain devices with a serial port or limited com-
munications capabilities. By placing I/O Servers on the factory floor to interface with
these devices, you can optimize communications on slow or low-bandwidth networks
and improve overall performance.
Despite the geographical distribution of I/O Servers across many sites, this type of sys-
tem can be configured as a single cluster system, as a cluster is able to support many I/O
Servers.
The diagram below demonstrates how to approach the deployment of this type of sys-
tem across the server machines using a single cluster.
A second cluster will only become necessary if your project requirements call for more
than one redundant pair of alarms, trends or reports servers.
167
Chapter 7: Typical system scenarios
Client-Server system
CitectSCADA's client-server architecture allows the components of a system to be dis-
tributed across a number of computers on a LAN, creating a system that offers geo-
graphical flexibility and performance benefits.
Each component is simply identified within the project by an address, allowing the loca-
tion and hardware requirements for each to be considered independently.
The diagram below demonstrates how this example can still be configured within a sin-
gle cluster.
Each server also acts as a Control Client across the system architecture.
168
Chapter 7: Typical system scenarios
In the case of I/O Server redundancy, a standby server is maintained in parallel to the
primary server. If a hardware error is detected, the standby server can assume control of
device communication with minimal interruption to the system. You can also use redun-
dant I/O Servers to split the processing load.
Alarm, report and Trends Servers can also be implemented as redundant servers. This
improves the likelihood that clients will continue to have access to data from a standby
server in the case a primary server becomes inoperative. CitectSCADA maintains iden-
tical data on both servers.
In the diagram below, the primary and standby I/O Servers are deployed independently,
while the alarms, trends and reports servers are run as separate processes on common
primary and standby computers. In this case, the entire system can be configured as a
single cluster.
169
Chapter 7: Typical system scenarios
Each site is represented in the project with a separate cluster, grouping its primary and
standby servers. Clients at each site are only interested in the local cluster, whereas
clients at the central control room are able to view every cluster.
170
Chapter 7: Typical system scenarios
The deployment of a control room scenario is fairly straightforward, as each site can be
addressed independently within its own cluster. The control room itself only needs Con-
trol Clients.
The deployment of servers could be mapped out as follows:
CitectSCADA's support for dynamic clustering means each site can be monitored and
controlled from the central control room if necessary. For example, if an operator at a par-
ticular site only works during regular business hours, then the monitoring can be
switched to the central control room after hours.
171
Chapter 7: Typical system scenarios
The example above would require the creation of two clusters, so that the project can
include two sets of primary and standby servers. The clusters represent the redundant
pairs of servers, and would be deployed across the two sites as follows:
The clusters offer the benefit of keeping a logical structure to the project during con-
figuration, despite the unusual distribution of redundant server pairs.
172
Chapter 7: Typical system scenarios
Both machines have an even balance of Trends and Alarm Servers, making effective use
of the CPU and disk space. By distributing the servers across two clusters, the servers
are also able to act as redundant units to each other. This has reduced the necessary
number of computers from a maximum of eight down to just two.
173
Chapter 7: Typical system scenarios
174
Using CitectSCADA
175
Using the Communications Express Wizard
Building Your Project
176
Chapter 8: Planning a Project
This chapter describes the planning phase of a CitectSCADA system.
A planned approach to the design and configuration of your system allows you to make
optimal use of the product's features and performance capabilities, and helps you meet
the requirements of your production facility. It also helps avoid unnecessary rework dur-
ing the configuration of your project.
It is important to consider the following when planning a system:
1. The Physical Layout of a Plant
2. Operational Requirements
3. Project Design
4. Building Your Project
5. Setting up Your Computers
Geography
The physical layout of your facility, including whether the plant is spread across mul-
tiple geographical locations or specific areas of functionality, such as a number of pro-
duction lines running in parallel.
Machinery
The equipment (machines, physical connections, and devices) in your plant that will be
monitored and controlled by your system.
177
Chapter 8: Planning a Project
The computers that currently exist within your facility to support CitectSCADA's client-
server architecture. The specifications and limitations of the existing equipment will
have to be considered to determine if the operational requirements of your system can be
supported.
Network configuration
The current configuration of the network that will support your system and its com-
munication with plant equipment. This will include the protocols used, the performance
capabilities of the system, and security.
See Also
Operational Requirements
Operational Requirements
By developing a set of operational requirements for your project, you'll define a com-
prehensive list of needs and objectives that your system needs to support to effectively
monitor and control production.
The things consider to determine the operational requirements include:
Architecture
Security
Reliability
Monitoring
Data collection
Architecture
Production Processes
The operating processes within your production facility need to be considered to deter-
mine how they can be logically represented and supported within your project. If the
processes are dependent on each other, you also need to consider how the interaction
between them will be managed, particularly if unexpected circumstances occur.
Security
When planning a project you need to consider who will be using the system, and which
parts of a project they will need to have access to. To effectively do this you will need to
understand how roles, privileges and areas work together to enable you to develop a
secure CitectSCADA system.
178
Chapter 8: Planning a Project
See Also
Users and Areas
Reliability
The nature of your production processes will determine the importance of system relia-
bility. Consider issues such as:
l The need for uninterrupted operation
l the impact and cost of down-time
l the need to collect and protect system data
l the severity of alarm conditions.
This will help determine if your project needs to include redundancy, the type of redun-
dancy necessary, and the most appropriate way to implement it.
For more information, refer to Redundancy.
Monitoring
System monitoring is a key function of a SCADA system and needs to be considered in
terms of the necessary interaction between personnel and production processes.
You need to consider if the delivery of data is time-critical. For example, alarm con-
ditions need to be presented in real time, trend data may be delivered with a slight
delay, while maintenance data can be accumulated and viewed as necessary.
The system may also need to be monitored at different levels, from machinery operators
to control room personnel managing plant-wide processes. For each level of monitoring,
consider the data that needs to be presented, and the specific performance and diag-
nostic conditions that need to be flagged.
Data collection
Consider the kind of data you need to collect from the production process, and how it
will be used. Depending on your requirements, CitectSCADA can collect:
l Production data
l Purchasing requirements
l Batch processing statistics
l Equipment status and performance data
l Maintenance scheduling information
179
Chapter 8: Planning a Project
Project Design
Once you have developed a clear set of operational requirements, you need to plan how
to design your project to best meet these requirements. When designing your project, con-
sider the following issues:
Naming Standards
Page Templates
Genies and Super Genies
Clustering
Included projects
Redundancy
Naming Standards
By adopting naming standards, you can configure project components with meaningful
names that convey useful information, such as the location or type of component. The
standard that you use depends on the type of information that will be useful to system
operators. A naming standard helps promote consistency throughout the project, making
it easier to quickly identify components, and reducing duplication and user training.
Naming standards may be useful for devices, variable tags, reports, graphics objects,
and pages.
Reserved names
Some names such as IO_Server, Report_Server, Alarm_Server, Trend_Server, and Client
are reserved for use in the include project. Using one of these names for your server will
result in a compilation error. It is better to use names in your project that are meaningful
to your installation.
180
Chapter 8: Planning a Project
Page Templates
Page templates are predefined page layouts that you can use to build the display screens
(graphics pages) for your project. Templates allow you to create new pages quickly, and
allow your runtime system to have a consistent look and feel. They can incorporate
standard navigational and support tools that are common to every page. CitectSCADA
includes a number of standard templates, and you can also design new templates to suit
the requirements of your system.
See Also
Using Page Templates
Clustering
Clustering allows you to group independent sets of CitectSCADA's server components
within a single project, allowing multiple systems to be monitored and controlled simul-
taneously.
The most appropriate configuration will depend on the requirements for the solution to
be deployed and the environment in which it is being deployed.
Some typical clustering configurations include:
l Standalone system
l Distributed I/O system
l Client-Server system
l Redundant server system
l Clustered control system
181
Chapter 8: Planning a Project
Included projects
If you have a large production environment, you can simplify the configuration and
management of your system by designing your project as a collection of smaller
"included" projects.
182
Chapter 8: Planning a Project
Included projects can operate independently, however, they share resources and operate
interdependently during runtime. This means you can create and test projects rep-
resenting functional or physical sections of a plant, and then gradually bring them
online. Ongoing maintenance can then be managed with a minimal impact on pro-
duction.
For more information, refer to Including projects.
Redundancy
Redundancy can be implemented at different levels of your system, depending on the
reliability requirements of your project. The following types of redundancy are available:
Device Redundancy
Multiple data paths to a device can be configured within CitectSCADA. Therefore, if the
primary path becomes unavailable, data can still be monitored over the secondary path.
Server Redundancy
Primary and Standby Alarms, Reports, and Trends Servers can be configured so that if a
primary server becomes unavailable to process a client's request, the request can be chan-
nelled to a standby server for processing.
LAN Redundancy
To avoid service interruptions when the primary network isn't operating, a redundant
LAN can be implemented that will provide an alternative path to a server if necessary.
See Also
Building Redundancy Into Your System
183
Chapter 8: Planning a Project
Projects
Setting up I/O Device Communication
Graphics components
Alarms
Data Collection
Users and Areas
System Components
Anti-virus software setup
Projects
You will first need to create a new project, and familiarize yourself with tasks like stor-
ing, including, and archiving it.
Before running the project, the process of compiling it will alert you to any errors in the
configuration.
See Also
Building Your CitectSCADA Project
Administering Projects
Compiling the Project
184
Chapter 8: Planning a Project
Graphics Components
Graphics components are the means through which operators view and interact with
the runtime system. Graphics pages can be designed to provide operators at different sys-
tem areas or levels with relevant monitoring and control options.
To create graphics components that meet your operational requirements, be familiar with
how to create graphics pages, use page templates, and configure graphical objects like
Genies and Super Genies.
See Also
Defining and Drawing Graphics Pages
Using Genies and Super Genies
Using Objects
Defining Common Object Properties.
Understanding Object Types
Alarms
The CitectSCADA alarm system monitors your production processes and alerts operators
to unexpected events that may require attention.
There are two types of alarms that you may need to configure:
l Hardware alarms - alert you to inoperative or partially operative equipment
l Configured alarms - allowyou to specify relevant alarm conditions for your facility
(for example, the value of a variable tag monitoring the level, temperature, or status
of a specific piece of equipment). There are seven types of configured alarms, depend-
ing on the type of alarm condition you need to set up.
To help operators process alarms, you can create graphics pages that provide alarm
information (such as the action an operator needs to perform to correct the situation).
See Also
Using Alarms in SCADA
Configuring alarms
Formatting an Alarm Display
Data Collection
Data collection in CitectSCADA incorporates two main aspects:
l Trends - The trends system allows you to collect and monitor plant data. Depending
on your requirements, data can be collected on a periodic basis, or when a specific
event occurs. The data can then be saved to disk for analysis or displayed on a graph
or report. To use trends in your system, you will need to be familiar with how to
185
Chapter 8: Planning a Project
System Components
CitectSCADA includes the following system components, which provide further options
for monitoring, control, and user interaction:
l Commands and Controls - Configurable keyboard commands and slider controls
allow operators to interact with the runtime system.
l Events - Events (such as variable tags or expressions) can be configured that trigger a
specific action, like a command.
l Accumulators - Accumulators track incremental runtime data. The data is stored as
variable tags in an I/O Device, and updated regularly while the trigger is active.
l Statistical Process Control - SPC allows to you to track quality by collecting and inter-
preting process variables associated with a product.
186
Chapter 8: Planning a Project
l Labels - System wide substitutions can be configured for commonly executed com-
mands and expressions.
l Devices - High-level CitectSCADA data (including reports and logs) can be trans-
ferred to other system elements such as printers, databases, or files.
l Equipment - Project Editor form allows access to the equipment database which aids
in automated configuration.
l Remote Access - A project can be accessed remotely or wirelessly in the following
ways:
l CitectSCADA Web Client - The CitectSCADA Web Client allows you to view
a live project within a Web browser.
l Internet Display Client - An Internet Display Client can be used to run a run-
time-only version of a project over the Internet from a remote location.
See Also
Defining Commands and Controls
Configuring Events
Using Accumulators
Understanding Statistical Process Control
Using Labels
Using Equipment
Using Devices
CitectSCADA Web Client
Running Your System Over the Internet
Exchanging Data with Other Applications
The "on access" scan in anti-virus products can lock files used by CitectSCADA, usually hav-
ing the effect of slowing CitectSCADA down whilst it waits for the scan of that file to finish.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
187
Chapter 8: Planning a Project
In some extreme cases, anti-virus software may (incorrectly) detect certain patterns within
data files as being viruses. Depending on the anti-virus configuration, this may result in
files being relocated or deleted, resulting in data being lost or the system being inoperable.
It is recommended that the following directories are excluded from scanning by any anti-
virus products:
l Program Files installation directory (including files and sub directories)
l Data and Logs directories
l Any alarm server archive paths
The above exclusions are recommended for "on access" or "real time" scans that run con-
tinuously and scan each file that is read from or written to. Scheduled scans, which are
usually daily or once a week, should also have these exclusions added with the excep-
tion of the Program Files exclusion.
See Also
Building Your project
188
Chapter 8: Planning a Project
189
Chapter 8: Planning a Project
190
Chapter 9: Administering Projects
CitectSCADA is a project-based application. This section of the help looks at the admin-
istrative tasks associated with creating, storing and maintaining your projects. It
includes:
l Managing your projects
l Archiving projects
l Including projects
l Working with the Project Editor
l Using Find and Replace in a project
191
Chapter 9: Administering Projects
In using either the ’include’ or starter projects you are able to set up a project more
quickly. The ‘include ‘and Starter Projects have distinct differences which are outlined
below.
Include Projects
Include projects contain pre-defined database records and graphics libraries that can be
used within your project.
Some examples of what is included in an Include project are page templates, symbols,
genies, and generic Cicode functions.
Note: If you modify the include projects for use as a runtime project, they will not
compile successfully. CitectSCADA upgrades install a new version of the CSV_
Include project, which will overwrite any changes you make to the project when this
happens.
Starter Projects
Starter projects contain pages, roles and other features, which vary depending on the tem-
plate you base your project on. You can select a starter project either based on the tab
style templates or based on the StruxureWare style templates. There are six pre-defined
starter projects with each of the starter projects containing:
l A cluster named "Cluster1".
l A role named "Administrators" which is linked to the "BUILTIN\Administrators"
Windows group and have global privilege of 8.
l Pages of Alarm, SOE (Sequence of events), Disabled, Hardware based on the alarm
equipment tree-view templates in the tab style include project
l Process Analyst and !ProcessAnalystPopup based on the relevant templates found in
the Tab_Style_Include project.
l Manual Override and Control Inhibit pages based on the new templates in the tab
style include project
l The following Menu configuration defined:
@(Pages)
<the pages are automatically populated via project parameter [PAGE]AddDefaultMenu = 2>
@(Alarms)
@(Active Alarms)
@(Historical Events)
@(Disabled Alarms)
@(Hardware Alarms)
@(Trends)
@(Process Analyst)
192
Chapter 9: Administering Projects
The newly created project is compilable, and contains a basic level of built-in functions
such as viewing alarms and trends.
Type
Name of Description
project
Library_Con- Include Contains a series of genies that are common UI controls such as
trols a tree-view, data table and scroll bars. Cannot be compiled.
Include Include Template project with trending and alarm pages Cannot be com-
piled.
SxW_Style_1_ Starter Screen resolution 1080 HD (Full HD). Wide screen only. Includes
HD1080_title- the SxW_Include project. Can be compiled.
bar
SxW_Style_1_ Starter Screen resolution 768 HD (Full HD). Wide screen only. Includes
HD768_titlebar the SxW_Include project. Can be compiled.
Tab-Style Include Includes a set of templates styled for the Windows 7 envi-
Include ronment. Cannot be compiled.
Tab_Style_1_ Starter Screen resolution 1080 HD (Full HD). Includes the Tab style
HD1080_title- Include Project. Can be compiled.
bar
Tab_Style_1_ Starter Screen resolution SXGA Includes the Tab style Include Project
SXGA_titlebar Can be compiled.
Tab_Style_1_ Starter Screen resolution WUXGA Includes the Tab style Include Project
WUXGA_title- Can be compiled
bar
Tab_Style_1_ Starter Screen resolution XGA. Includes the Tab style Include Project
XGA_titlebar Can be compiled
The include projects are hidden from the project tree in Citect Explorer by default.
To show/hide an Include project:
193
Chapter 9: Administering Projects
Creating a project
You can create a new project using an existing starter project or from scratch.
To base a project on an existing starter project:
194
Chapter 9: Administering Projects
See Also
New Project dialog
Creating a New Tab Template Project
Understanding Projects within CitectSCADA
Using the Library_Controls Include Project
Using the StruxureWare Templates
Using the CSV_Include Project
195
Chapter 9: Administering Projects
Most users prefer the Standard style. You can view the pre-defined styles by looking in
the Include project under Graphics, Templates.
[Page defaults] Template resolution
The default screen resolution of the standard graphics pages (such as alarms pages and
standard trend pages):
Viewing projects
To make locating and viewing project and configuration folders easier, CitectSCADA
now features a set of menu commands to open these folders directly from Citect
Explorer.
To open the Config folder:
196
Chapter 9: Administering Projects
197
Chapter 9: Administering Projects
CitectSCADA sets this property to one (1) when the project is first created. You can use
this field to track major changes to the project. You can use an incremental revision his-
tory (for example 1, 2, 3, . . . or A, B, C, . . .). Maximum length is 4 characters.
(General) Minor revision
CitectSCADA sets this property to zero (0) when the project is first created. You can use
this field in conjunction with the Major Revision to track your project's development.
Maximum length is 4 characters.
(General) Date and Time
CitectSCADA will initially set these fields to the date and times at when the project was
created. These fields are useful when used in conjunction with the Revision fields. Max-
imum length is 20 characters each.
(General) Project ID
A unique number for the project. The project number can be between 1 and 1022.
If you enter an ID that has already been used for another project, CitectSCADAwill detect
this when it compiles the project if the projects are part of the same include structure.
The project number is part of the unique identifier (object ID (OID)) used by OPC drivers
when reading from and writing to tags.
If you do not specify a project number, CitectSCADA will automatically generate one the
next time you select this project in the Citect Explorer, or the next time you compile. Max-
imum length is 4 characters.
Note: If you enter 0, your project ID is automatically set after closing the project's
"Properties" page.
(General) Read-only
Specifies that no changes can be made to the project. If an attempt is made to modify the
project with this option selected, a message will prompt the user to disable the option
before continuing.
Note: If you change any properties, you need to click OK to save the changes to the
project.
198
Chapter 9: Administering Projects
Note: You can override this default for your own pages at the time when you create
them or any time afterward.
Note: You can override this default for your own pages at the time when you create
them, or any time afterward.
Note: You can override this default for your own pages at the time when you create
them, or any time afterward.
199
Chapter 9: Administering Projects
The color that will display in the background of new graphics pages.
Copying projects
You can copy the contents of one project into an existing or a new project.
To copy a project:
200
Chapter 9: Administering Projects
When copying to a new project, you need to create a new and unique name for the
project. The project name is restricted to 64 characters, and can contain any characters
other than the semi-colon (;) or single quote ('). Since the project name is a unique iden-
tifier, CitectSCADA will not permit you to create or copy to a project with an existing
same name.
After the new project is created, you can change the Name through the Project Properties.
When copying to an existing project location, you can choose to delete the existing con-
tents of the destination project, including subdirectories, before the source project is cop-
ied, by checking both the Clear location before copying, and the Clear subdirectories check
boxes. This removes many files that may be left behind to interfere with the copied
project. If you do not clear the project location before copying, only common files in the
destination project are overwritten.
[To] Clear location before copying
Specifies to delete the contents of the existing destination project before copying the
source project to the destination location. This removes many files that may be left
behind to interfere with the copied project.
[To] Clear subdirectories
Specifies to delete the contents of the sub directories of the existing destination project
before copying the source project to the destination location. This removes many files
that may be left behind to interfere with the copied project.
Location
The directory path where the destination project files are stored. As the Name field is
entered, the directory is automatically generated in the Location field. You might override
this by manually entering the location or clicking Browse.
Check that the project names and location are correct in the confirmation dialog box.
Click Yes to copy the project, or No to cancel.
201
Chapter 9: Administering Projects
Before printing your database, print a small portion to test the results. You can change
the default font, font size, and page size by choosing Options from the Tools menu. For
other print options, refer to your Windows documentation.
See Also
Print (project details) dialog
You can only print the contents of the current project. Included projects will not be
printed. You can specify the print font, font size, and page size in the Options for the
Project Editor (in the Tools menu).
Deleting a project
To delete an existing project:
202
Chapter 9: Administering Projects
Note: You cannot recover a deleted project that hasn't been backed up.
See Also
Linking projects
Linking projects
CitectSCADA installations on different computers over the same network can share the
same project. After a project has been created on one computer, other computers on the
same network can link to the same project, but only if the project location is on a shared
or network drive. Once linked, the remote project is visible in the local Citect Explorer,
and can be edited and compiled over the network. Only one version of a project ever
exists, and this version has to be kept on the computer it was created upon.
Note: Linking to a project provides the developer with normal access and control to
the project, even though it might be on a remote machine over the network.
Linked projects will not be included into the compile of any other project unless they
have specifically been Included into that project from within Project Editor.
For details, see Including projects.
Restart the client process if the hardware alarm "Cicode library timestamp differs" is raised
after a page is opened.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
Note: A hardware alarm of "Cicode library timestamp differs" will be raised if the
Cicode library used by a page has a different timestamp from the one in memory.
The timestamps will be different if the project has been fully recompiled, the project
has been incrementally recompiled after the page has been modified, or if the project
has been incrementally recompiled after any Cicode has been modified.
203
Chapter 9: Administering Projects
To link to a project:
Time Synchronization
Previous versions of CitectSCADA employed a message-based time Synchronization
server to verify clocks on computers running a CitectSCADA project maintained time
synchronization. To support CitectSCADA running under standard user rights with User
Access Control (UAC) switched on in Windows Vista, our existing Time Server func-
tionality needed to be replaced.
Note: This has also made the Cicode function TimeSet obsolete, and any usage of it
is recommended to be removed from your existing code.
204
Chapter 9: Administering Projects
configuration data and to change any setting you only need to change it on one
machine.
To display the Time Synchronization dialog, open Citect Explorer and from the Tools
menu select the Time Synchronization menu item.
See Also
Field Description
TCP/IP Port The network port the service will use to listen for
connections from clients.
Current local time Displays the current time on the local computer,
updating every 1 second.
Log information events Controls whether the service writes events of type
'Information' to the event log. The default is
unchecked so that only alerts (called "warnings" in
the software) and errors are recorded.
Keep this computer's time synchronized Select this check box to enable the computer to be
a time client. This allows you to enter the poll time
and list of time servers against which to syn-
chronize.
205
Chapter 9: Administering Projects
Field Description
Synchronize with first available Displays a list of computers, and the current time
on those computers if available. The display is
updated every 1 second
Note: When you add a time source to the list, the current time on that machine will
be displayed, provided the service is running on that remote machine and listening
on the same port number. If "Not available" then the service is not running, or is run-
ning and using a different port number, or that port number is being blocked by a
firewall. The column in the list box is provided as a diagnostics function to confirm
that the machine names entered can be synchronized against. The time displayed in
this box is an approximate only.
See Also
Time Synchronization
Archiving projects
Once you have configured your system, back up (or archive) the project. This will avoid
the loss of any configuration data in the event your primary storage becomes inoperative
or inaccessible.
Note: When you are developing a project, adopt a regular backup strategy. Before per-
forming a backup, verify that you have refreshed any linked tags in your project.
CitectSCADA lets you back up a project to a local drive (hard drive), network location, or
removable media (floppy drive, memory stick).
This section of the help includes information on the following archiving tasks:
l Backing up a project
l Backing up INI files
l Configuring a backup with password encryption
206
Chapter 9: Administering Projects
Backing up a project
The CitectSCADA Backup program archives files using a standard compression routine,
producing PKZip® v2.04g compatible files. The default extension for CitectSCADA
backup files is .CTZ, though any extension (including .ZIP) can be used. This means you
can also use the PKZip utility to extract files from a compressed CitectSCADA backup.
Note: Files produced with this backup program cannot be restored by product ver-
sions earlier than 5.10.
To back up a project:
2. Click the Backup button, or select Tools | Backup. The Backup Project dialog
box displays:
3. In the Name field, select the name of the project to back up.
4. In the Backup file field, enter the path to the backup file location, including the file
name. You can either type the path in directly or use the Browse button.
The backup file name defaults to <project>.CTZ. If the extension is omitted then
.CTZ is used.
When you back up a project to a floppy disk, the backup program will ask you if
you wish to delete the files on the floppy disk before starting the backup.
If the destination drive is configured as A: or B: and is detected as removable, you
will have the option to delete any existing files on the disk.
5. Under Options, select the necessary options from the following list:
l Use compression: You can use data compression when you are backing up a
project to save space.
l Save compiled: By default, CitectSCADA backs up the project in uncompiled
mode. If you select this option, CitectSCADA backs up both the compiled and
uncompiled projects, resulting in a larger backup file.
l Save sub-directories: If you select this option, CitectSCADA also backs up data
in any sub-directories within the project directory. The directory structure is
maintained in the backup, and you can choose to restore the sub-directories
when restoring the project. For example, if you wish to back up your Process
Analyst Views, save them in a sub-directory of the project and select this option.
207
Chapter 9: Administering Projects
When you restore the project, you will have the option to also restore the Process
Analyst Views directory.
l Use encryption: As an added security measure, you can back up your project
in an encrypted format. If you select this option, CitectSCADA requests a pass-
word. CitectSCADA writes the project to disk in a format that encodes the pass-
word along with the protected project. The project can only be restored if the
password is entered.
l Save configuration files: Select this option to back up *.ini files from the Config
folder. This will also backup the TimeSyncConfig.xml file used to store the time
synchronization settings configured in the Time Synchronization utility.
6. Click OK.
See Also
Backing up INI files
Note: You can define a non-default INI file for CitectSCADA by passing a parameter
through to the Project Explorer from the Project Explorer Properties dialog box on the
Shortcut tab. See Using an Alternative INI File for further information on how to do
this.
If you run the backup program from the command line, and you specify an INI file as a
parameter, the specified INI file will be backed up instead of Citect.ini.
See Also
Configuring a backup with password encryption
208
Chapter 9: Administering Projects
1. Select the "Use encryption" option on the Backup Project dialog box.
2. Click OK. The Backup/Restore-Encryption dialog displays:
3. In the Enter Password field, enter your password. Asterisks will display in place of
the characters.
4. In the Re-Enter Password field, re-enter your password. CitectSCADA checks that
you have typed the same password both times.
5. Click OK. The project will be backed up.
See Also
Running a backup from the command line
Option Description
- database name
d<name>
209
Chapter 9: Administering Projects
word>
-f<level> format level, 0 only format if necessary, 2 always format disk. [obsolete
since version 3.xx, 4.xx]
Examples
l To back up (in version 3) c:\data use the following command:
CTBACK32 -g -rc:\data
[BACKUP]
Database= ! database to backup or restore
210
Chapter 9: Administering Projects
Restoring a project
You can restore backed up and archived projects using the Restore Project program. This
program allows you to overwrite any current project with a backed up version, or restore
a backed up project as a new project.
Note: Be careful when restoring files as every file in the destination and sub-direc-
tories will be deleted before restoring. If you accidentally set your restore path to the
root directory of the drive, the program will delete your entire disk drive.
NOTICE
HARD DISK DRIVE ERASURE
Do not set the Restore Project path to the root directory of your drive (usually c:\).
To restore a project:
211
Chapter 9: Administering Projects
or select Tools | Restore. The Restore Project dialog box will display.
3. In the Backup file field, enter the name of the project to restore.
4. Under To, select `Current project', to overwrite a project with the backed up one, or
`New project' to restore a backed up project as a new one.
5. In the Name field, enter a name for the restored project.
6. In the Location field, enter the location of the project to restore, including the file
name. You can either type in the path directly, or use the Browse button.
7. Under Options, select `Configuration files' to restore backed up INI files, and the
TimeSyncConfig.xml file used to store the time synchronization settings configured in
the Time Synchronization utility. To make these files active, and to update the current
Wizard or Time Synchronisation settings with the restored settings, copy the restored
files to the Config folder, replacing the currently used corresponding configuration
files.
8. If you backed up the sub-directories under the project, the directories will be listed
under `Select sub-directories to restore'. You can choose to restore every or no sub-
directories, or you can select specific sub-directories to restore.
9. Click OK.
See Also
Archiving projects
Including projects
With large systems, it might be more convenient to develop the application using a
series of smaller projects, instead of one large project. For example, you could use a sep-
arate project for each section of the plant, or for each main process. This way, you can
develop and test each of the smaller projects before including them in the main project.
CitectSCADA projects will not be included into the compile of any other project unless
they have specifically been included into that project from within the Citect Project
Editor.
Note: If a project exists remotely on the same network as the local installation and it
is on a shared or network drive, it can be linked to the local Citect Explorer. This is
different to including a project. Linking makes a project visible in the local Citect
Explorer. Once linked, it can be selected as the current project for editing over the net-
work.
212
Chapter 9: Administering Projects
Any linked project (visible in Citect Explorer) can be included within a local project, and
is subsequently included in the compile of the local Project.
Be careful not to confuse include files with included projects:
l Include Files contain CitectSCADA commands and/or expressions and are used as
substitutions in a CitectSCADA command or expression property field.
l Included Projects are separate and (usually smaller) projects that can be included in
another CitectSCADA project so that they appear together as one project.
Each CitectSCADA system is supplied with a number of include projects. These projects
contains pre-defined database records.
Recommended implementation structures
There are many ways of implementing included projects. However, there are a few pre-
ferred rules for locating projects so that servers and clients function correctly on deploy-
ment. These are listed in the table below:
Deployment
Rec-
Development Com-
ommen- Server / Display Client WebClient
puter
dation
213
Chapter 9: Administering Projects
Deployment
Rec-
Development Com-
ommen- Server / Display Client WebClient
puter
dation
* For these implementations, the client/server machine needs to already have project con-
tents at the c:\user\Include location and the implementations won't work with the
RUN/COPY features.
Note: Do not define circular references. That is, if project A includes project B, do not
include project A in project B. This will exit without completing at compile time with
a "Cannot open file" error. Instead, create another project and include both A and B
into this.
See Also
Included Projects dialog
214
Chapter 9: Administering Projects
Note: Each system automatically has an include project, which contains predefined
database records and graphics libraries.
Project Name
The name of the project to include in this project (64 characters maximum).
Comment
Any useful comment (48 characters maximum).
215
Chapter 9: Administering Projects
Enables the display of deleted records in the databases. When enabled, a check box at
the bottom of the database form indicates if a record is deleted.
Incremental compile
Enables the incremental compilation of the project.
Extended forms
Enables the display of extended database forms. You can also use the F2 key on the key-
board to display extended forms.
Inform record changed
Enables the "Record has been changed" message window to appear when you add (or
change) data in a database form and then try to close the form - before you add or
replace the record.
Note: If you disable this option, you will lose data if you change a database record
and forget to add or replace the record.
216
Chapter 9: Administering Projects
Automatically runs the Web Deployment Preparation tool every time you compile a
project. Please be aware that this dramatically increases the amount of time taken for
each compile, particularly for large projects.
Log deprecated warnings during compile
If you select this option, the compiler will generate an alert message to identify any dep-
recated elements it detects in a project, that is any functions, parameters, or Kernel com-
mands that are no longer supported.
By deselecting this option, the alert messages are still included in the displayed alert
count, but they are not added to the error log.
Info popup time
The delay (in seconds) from the beginning of a database search until a search infor-
mation window displays. The search information window displays the number of the
traced records and allows you to cancel the search. You can cancel the search by select-
ing the Cancel button in the information window.
Cicode Editor
The text editor that is used for editing Cicode function libraries and report format files.
You need to enter the name of the executable file in this field. The default editor is the
Cicode Editor (ctCicode.exe) supplied with CitectSCADA.
Report Editor
The editor that is used for editing Report Format Files. You need to enter the name of the
executable file in this field. The default editor is Write (write.exe). If you are using Rich
Text Format (RTF) reports, verify that your editor is RTF capable.
Print page size
The number of lines (1 to 66) printed on each page when printing database records.
Print font point
The font size used when printing database records.
Print font name
The name of the font used when printing database records.
Maximum list box items
The maximum number of records that are displayed in drop-down combo boxes.
Warn about unused tags during full compile
Enables the generation of alert entries for unused tags that are not used directly in a
project. The alert entries are included in the Project Editor's Compile Errors form when a
full compile is run. By default this option is not selected.
217
Chapter 9: Administering Projects
Note: For this option Alert entries are generated only for a full compile, not an incre-
mental compile.
Note: If this option is selected and no equipment has been configured, the list will be
empty.
Note:You can also insert Equipment.item references into expression fields using the
insert tag option; however if no equipment has been configured in your system the
list will be empty. You will need to configure equipment or deselect the option 'Dis-
play equipment items when populating tag list' in the Project Editor Options Dialog
to populate the list with available tags.
1. Select the location you wish to insert a tag in to such as an expression field in a form.
2. Select Paste Tag from the Edit menu to display the Insert Tag dialog box.
3. Select the tag name, and click OK or click Cancel.
The tag will be inserted in the tag or expression field at the location of the cursor.
218
Chapter 9: Administering Projects
Note: If the total length of the function and its parameters is greater than 254 char-
acters, it won't appear in this dialog box. Instead, the message "Text Too Big" is dis-
played.
Note: If you leave the Find field empty and click OK, a full list of functions appear in
the list.
1. Select the function name from the list that appears when searching for the function
(see above) and click Edit or click Cancel.
The file containing the selected function will be opened in the Cicode Editor.
219
Chapter 9: Administering Projects
l From the Project Editor or Graphics Builder, click Edit | Find or Edit | Replace. The
dialog box appears with either the Find tab or Replace tab selected, depending on
which command you selected.
To search text:
1. On the Edit menu in the Project Editor or Graphics Builder, click Find.
2. In the Find box, type the text string you want to search for. The search is not case-sen-
sitive, so it doesn't matter whether you enter lower- or uppercase letters.
220
Chapter 9: Administering Projects
You can enter an entire string or a portion of the string you want to find. For exam-
ple, typing BIT will return any string containing BIT, such as BIT_1, BITE, HABIT,
HABITS, and so on. You cannot enter wildcard characters, but you can include
special characters, as well as spaces if you want.
3. Specify your search coverage using the Look in and Search options lists.
4. Click Find. Search results appear in the results list when the search completes. The
status text under the results list indicates the progress of the search.
Note: When you start a search, the Find button changes to a Stop button you can
use to exit the search. If you stop a search, a partial list of the results is displayed.
To replace text:
1. On the Edit menu in the Project Editor or Graphics Builder, click Replace.
2. In the Find box, type the text you want to search for.
3. In the Replace with box, enter the replacement text.
4. Specify your search coverage.
5. Click Find.
6. View the search results.
7. Make your replacements using Replace or Replace All.
221
Chapter 9: Administering Projects
Column Description
Project The name of the project in which the found text occurs.
Item Depends on the type of document in which the item occurs. If the doc-
ument type is a:
Field Identifies that portion of the document/database in which the found item
occurs in. For example, if the found item appears in a database, this refers
to the column name in the database. Be aware that the search covers both
expression/command as well as numeric properties.
Location Shows the specific record number, AN, or line number on which the found
item occurs within the document/database.
Context An example of the context in which the found item occurs within the
project. For example, if the document type is a:
222
Chapter 9: Administering Projects
Column Description
If the number of results returned exceeds 200 items, use the First, Previous, Next, and
Last buttons to navigate your results in groups of 200 results.
You can toggle between the Find and Replace functionality without losing the search
results, but if you close the Results page, your search results are lost.
Note: You can resize list columns by moving your mouse cursor onto the separator
between the list columns. When the mouse cursor changes shape to a black bar with
arrows, drag the column to the new size. You can also double-click the vertical bar
between fields to resize that field to fit the widest item.
Removing results
You can remove a search result from the Results window. Results that are removed are
not included in exports or in replacement operations. Removing a result does not delete
it, but merely removes it from the Results window.
To remove a result:
l With the result you want to remove highlighted, click Remove. The result is removed
from the Results window.
Exporting results
You can export search results in a tab-delimited format to a specified location. Results
are exported in the format
If the Results window contains more than 200 results, every result is exported, not just
the ones currently displayed. If you remove an item from the results list, it will not be
exported. (For details on removing results, see Removing results.)
223
Chapter 9: Administering Projects
If you export an item that has a context, the context string is stripped of tabs and new
line characters.
Results exported are in Unicode format. Because of this, two leading characters and two
trailing characters are added to the file, but in most cases will remain hidden. When
exporting results, use Excel 2000 and later, which support the Unicode format.
To export results:
1. With the search results you want to export listed in the Results window, click Export.
2. Specify the location in the dialog box and then click Save. If the file already exists,
you're given the option to overwrite the file. Status text under the results list indicates
the progress of the export.
Note: If you want to stop the export, click Stop. You cannot perform a partial
export, so clicking Stop cancels the export entirely.
l With the search result you want to jump to highlighted in the Results window, click
Go To. The document or form containing the occurrence opens.
See Also
Replacing results
224
Chapter 9: Administering Projects
Replacing results
You can replace single results or multiple results with the replacement text string you
specified. You can also test a single result before replacing it. Depending on the type of
document that contains the search result, the following occurs when a replacement is
made:
l Database: The result is replaced with the replacement text and the database record
updated. The form containing the search result is not opened; to see the location of
the search result before or after the replacement is made, use the Go To command.
l Cicode/VBA: The Cicode file containing the matched text loads (if it is not loaded
already), the replacement is made, and the file saved.
l Graphic: The page opens in the Graphics Builder (if it is not already) and the replace-
ment made. If the page is open and contains unsaved changes, you're instructed to
save or discard the changes before making the replacement. If there are multiple
changes to be made to the same graphics page, the page remains open until every
change has been made.
l Report: The found text is replaced with the replacement text and the file is saved.
Note: Replacements cannot be undone once performed. take care to check your
replacements before making them, especially when working with multiple replace-
ments.
To test a result:
1. With the result you want to test highlighted, click Test. A dialog box appears show-
ing the result of the text replace.
2. Click Accept to accept the text replacement, or click Cancel.
To replace a single result:
l With the result you want to replace highlighted, click Replace. The replacement is
made and the result removed from the Results window. The next result in the list is
then selected.
To replace multiple results:
1. With the search results you want to replace listed in the Results window, click
Replace All. A confirmation dialog appears.
2. The replacements are made and removed from the Results window. (Replacements
that are not made remain in the results list. This will occur if, for example, you try to
replace a property that is read-only.)
225
Chapter 9: Administering Projects
Note: Clicking Stop during this process does not undo any replacements already
made.
When attempting to make a replacement, you might encounter an alert message that
alerts you of project-related issues be aware of before making a replacement. For details,
see Find and Replace alert messages.
File in use
This alert message appears if the database or file that is necessary for writing to has
become unavailable. This may be the case if the database/file is being used by a third-
party application.
Do one of the following:
l Click Try Again (Default) to repeat the operation on the database/file.
l Click Ignore to skip the operation on this file.
l Click Ignore All button to skip any operations on files that are currently in use; this
option causes this message not to reappear.
226
Chapter 9: Administering Projects
l Click Yes to commit the truncated text to the database. Usually this will generate a
compilation alert message when the project is compiled.
l Click Yes to All to commit every change to fields regardless if truncation exists with-
out displaying the alert again.
l Click No (default) to leave the text as is.
l Click No to All button to leave truncated fields as is.
227
Chapter 9: Administering Projects
Field is read-only
This alert message appears when replacing an item on the current graphics page when
the field being replaced is part of a linked object like a Genie or template.
In the example below, the Expression field was part of an object that was part of a genie.
Undetermined error
This alert message appears when carrying out a replacement on the current graphics
page when a general error is detected, and not happen in normal operation.
Do one of the following:
l Click Ignore to skip this operation, leave the entry in the list, and move on to the
next replacement if it exists.
l Clicking Ignore All acts like the Ignore button, except that it skips any undetermined
errors that occur during this replacement.
l Click Stop to stop the replacement at the current record.
228
Chapter 9: Administering Projects
Troubleshooting Searches
If you don't find a result that you expected to find, check the following points, and then
perform your search again:
l Did you spell the text string correctly?
l Did you include the correct number of spaces?
l Are you using the appropriate Look in option?
l Are you using the appropriate Search options?
l Are you searching in the correct project?
l Are you using the correct graphics search?
l If you are using the graphics page search, do you have the correct graphics page
open?
229
Chapter 9: Administering Projects
230
Chapter 10: Securing Projects
CitectSCADA projects represent a considerable investment. Once a commissioned project
has been delivered, it usually needs to remain in the delivered state until modifications
are performed by an authorized person. In order to help protect projects from mod-
ification by unauthorized personnel, CitectSCADA allows projects to be secured by an
administrator as "read-only."
For large applications, or applications where access to certain processes or machinery
needs to be restricted, you can build security into your system. You can then restrict
access to commands that you do not want to be available to evry one of your operators;
for example, commands that operate specialized machinery, acknowledge critical
alarms, or print sensitive reports. There are 2 options available to you to configure secu-
rity for your system.
These options are to use CitectSCADA native security or CitectSCADA integrated with
Windows Security .
This section describes the following:
l Characteristics of read-write and read-only projects (see Overview).
l Scenarios that describe Securing a Top-level Project and Securing an Include Project.
l How to secure projects as read-only (see Making a Project Read-Only).
l The consequences of securing projects (see Read-Only Privileges on Projects).
l Using CitectSCADA native security.
l Using CitectSCADA integrated with Windows security
Overview
CitectSCADA has two types of project:
l Read-write: allows write and delete privileges to the project folder (or for any project
file) for the current user.
l Read-only: projects that deny write and delete privileges to the project folder for the
current user.
The table below shows the different characteristics of read-only and read-write projects:
231
Chapter 10: Securing Projects
Delete project x
Read-only projects cannot be compiled as top-level projects (i.e., projects that are the
main (root) project as opposed to an included project) and online changes are not sup-
ported.
Note: If the project folder is read-only for the current user, but one or more files in the
project have read-write access for the current user, the project is considered to be a
hybrid read-only/read-write project. CitectSCADA does not support this type of
project. Running a hybrid project may result in your system becoming unresponsive.
(This note does not include those folders or files that require read-write access in
order to operate at runtime; see Using CitectSCADA with Windows Security for
details.)
The security model used in enabling read-only projects does not replace the existing
CitectSCADA user accounts; instead, it works in conjunction with user accounts like this:
Note: Before securing a top-level project, read the section Read-Only Privileges on
Projects for details on operational constraints. Pay particular attention to the section
Read-only on top-level projects.
In this scenario, several onsite engineers are responsible for maintaining a top-level
project, ProjectXYZ. Consequently they require read-write privileges for every project
folder.
232
Chapter 10: Securing Projects
The operators responsible for monitoring plant operations will use the project at runtime
only; consequently operators only have read-only access to the project.
The system administrator on site first identifies those employees who will use the
project, and then divides this pool of users into two user groups:
l Project Engineers - responsible for project configuration.
l Operators - responsible for the project's runtime operations.
This is shown in the illustration below.
The administrator creates two user groups to make administering users easier: Pro-
jectXYZEngineers and ProjectXYZOperators, and assigns engineers to the first group,
operators to the second.
Note: Creating user groups is optional and makes it easier to handle privileges for
multiple users. Creating user groups may be unnecessary if you only have a few
users.
The administrator then assigns engineers read-write privileges to the top-level project
folder, and operators read-only privileges, like this.
1. Select the project folder of the top-level project and display its properties.
2. Select the ProjectXYZEngineers user group and allow read-write privileges.
(Remember that in order to use read-write projects, read, write, and delete privileges
needs to be assigned.)
233
Chapter 10: Securing Projects
3. Select the ProjectXYZOperators user group and deny write privileges. See the section
Making a Project Read-Only for the specific privileges assign.
4. Apply and save the changes.
5. Review the changes to verify that engineers and operators have the correct privileges
for their roles.
See Also
Securing an Include Project
Note: Before securing an include project, read the section Read-Only Privileges on
Projects for details on operational constraints. Pay particular attention to the section
Read-only on include projects.
In this situation, an OEM has configured and delivered an include project that is part of
a larger (top-level) project. Because the OEM engineer is solely responsible for main-
taining the include (and only the include) project, the site administrator assigns the OEM
engineer read-write access to the include project, but read-only access to the top-level
project. Conversely, the site's regular engineers can access the top-level project but not
the include project.
This scenario is shown here:
234
Chapter 10: Securing Projects
Note: Because there is only one OEM engineer, the administrator did not create a
user group for this single user.
2. Selects the project folder of the top-level project and displays its properties.
3. Selects the AcmeTopEngineers user group and allows read-write privileges for this
folder. (Remember that in order to use read-write projects, read, write, and delete priv-
ileges needs to be assigned.)
4. Applies and saves the changes.
5. Selects the include project.
6. Selects the user name of the OEM engineer and allows read-write privileges for this
folder.
7. Applies and saves the changes.
8. Reviews the changes made to verify the correct privileges have been assigned. In par-
ticular, the administrator has to confirm that the privileges assigned to the AcmeT-
opEngineers user group deny read-write access to the include project.
See Also
Securing a Top-level Project
235
Chapter 10: Securing Projects
1. In Windows Explorer, select the project folder you want to make read-only. By default
project folders are located in the folder
C:\ProgramData\Citect\CitectSCADA 7.30C:\ProgramData\Schneider Electric\PowerSCADA
Expert 7.30
2. Right-click the folder and choose Properties from the context menu. The Properties
dialog appears.
3. Select the Security tab.
4. Select the user and/or user group you want to modify security settings for.
5. Click Advanced. The Advanced Security Settings dialog appears for the selected
user/user group for the project folder.
Verify that the user or user group you want to modify permissions settings for is
selected.
6. Click Edit to display the Permission Entry dialog box.
7. Click Clear All to clear the current selections and then select the Allow check box for
the following options:
l Traverse Folder/Execute File
l List Folder/Read Data
l Read Attributes
l Read Extended Attributes
l Read Permissions
8. Click OK.
9. Click Apply to apply the permissions to the selected user/user group, and then click
OK to dismiss the Advanced Security Settings dialog.
10. Click OK to close the Properties dialog box.
The project folder has now been specified as read-only for the selected user(s) and/or
user group(s).
See Also
Securing a Top-level Project
Securing an Include Project
Note: Before Making a Project Read-Only, make sure you're familiar with the issues
236
Chapter 10: Securing Projects
described here. Also make sure that the correct privileges have been set in order for
the configuration and runtime environments to operate; for details, see Using Citect-
SCADA with Windows Security.
l Startup
l General
l Graphics and pages
l Backup and restore
l Project upgrades
l Debugging
l Web deployment
l Runtime issues
Most of the issues discussed above are common to both top-level projects and include
projects. The sections listed below discuss issues specific to these types of projects:
l Read-only on top-level projects
l Read-only on include projects
Startup
A project is determined to be read-only when Citect Explorer starts up. If the security per-
missions on the project folder are modified after Citect Explorer has started, the Citect-
SCADA configuration applications may not be able to determine accurately that the
project is read-only.
See Also
Using CitectSCADA with Windows Security
General
When a read-only project is opened using the Graphics Builder, Project Editor, or Citect
Explorer. the title bar shows the name of the project and a Read-Only message to indi-
cate the project is read-only.
Opening the Express Wizard for a read-only project displays a message on the first page
indicating the project is read-only:
In addition, any menu commands, toolbar buttons, and other operations that perform a
write function are grayed out and/or unavailable. For example, the Copy command is
available in the Project Editor for a read-only project, but the Cut and Paste commands
are not.
237
Chapter 10: Securing Projects
When using the Process Analyst, you cannot create views to a project folder that is read-
only and an alert message is displayed.
Project upgrades
A project upgrade occurs when any of the following occurs:
l [CtEdit]Upgrade=1 is added to the citect.ini file.
l A project link is added via Citect Explorer.
l When a project is restored.
When CitectSCADA detects that the include, system, or CSV_Include project is read-only
and the version of CitectSCADA that the project was created under does not match the
current version of CitectSCADA, a message box is displayed to advise you of this.
In addition, when CitectSCADA detects that a user project is read-only and the version
of CitectSCADA that the project was created under does not match the current version of
CitectSCADA, a message box is displayed to advise you of this.
Any links to the project will be removed and the project tree in Citect Explorer will be
updated to indicate this.
238
Chapter 10: Securing Projects
If you plan to upgrade a top-level project, you need to log on as a user with the appro-
priate read-write security privileges for this project, add a link to the project in Citect
Explorer, and then perform the project upgrade again.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
Debugging
In read-only projects you can set breakpoints when debugging code, but these break-
points aren't saved when you exit the Cicode Editor.
Web deployment
You cannot perform Web deployment with read-only projects.
Runtime issues
By default most output operations during runtime occur in the [DATA] or [RUN] location
(see below for details). By default CitectSCADA configures the [RUN] location to the
project directory. If you intend on making the project directory read-only, you need to
modify the path(s) to a suitable read-write location.
l almsav.dat - Alarm data by default is saved in the [RUN] location, which is usually
the project folder. You need to change this location if you intend on making the
project folder read-only. Alternatively use the [Alarm]SavePrimary and [Alarm]Save-
Secondary options in the citect.ini file to control the location of the output.
l Disk PLCs - If a user does not have the correct privileges for the [RUN] path, com-
munications will be offline for disk PLCs. You need to change this location if intend-
ing to make the project folder read-only.
l User Cicode functions - Making a project read-only prevents the use of the following
user functions: UserCreate, UserDelete, UserEditForm, UsetrSetPassword, User-
SetPasswordForm. Attempting to use these functions results in an error code 262
(0x0106) ("Cannot open file").
239
Chapter 10: Securing Projects
l Alarm Cicode functions - Making a project read-only prevents the use of the fol-
lowing alarm functions: AlarmSetDelay, AlarmSetDelayRec, AlarmSetThreshold, Alarm-
SetThresholdRec. Attempting to use these functions results in a hardware alarm 400
(0x0190) ("Project or file is read-only"). You also cannot modify alarm properties such
as threshold or delay.
Any files in your top-level project that require runtime read-write access have to be
located outside of the project folder.
Note: Any files in your top-level project that require runtime read-write access
have to be located outside of the project folder.
l Projects that are read-write that have read-only include projects as a component can
be compiled as usual.
l You can only run a read-only project if it is a top-level project.
l Applying read-only to top-level projects prevents online changes being made to
alarms, users, trends, and pages.
See Also
Making a Project Read-Only
Securing a Top-level Project
240
Chapter 10: Securing Projects
See Also
Making a Project Read-Only
Securing an Include Project
Note: View-only mode is applied to the whole control client process, including any
Cicode task that is running.
Write only access is available after a user has successfully logged in. Once the user logs
out it returns to view-only mode.
Users can configure login by modifying the [Client]AutoLoginMode parameter.
See Also
241
Chapter 10: Securing Projects
242
Chapter 10: Securing Projects
box with the Computer Setup Wizard, so that there will not be an unintentional can-
cellation of system startup.
243
Chapter 10: Securing Projects
244
Chapter 11: Using CitectSCADA Security
To set up security in CitectSCADA you need to consider the following:
l Areas - An area is a section of the plant. It can be defined geographically or logically.
l Privileges - Level of access applied to system elements within your project. A user
assigned a role that possesses the matching privilege can control it.
l Roles - A defined set of permissions (privileges and areas) that are assigned to users.
l Users - A person or group of persons that need to access to the runtime system.
Before configuring security within your project you will need to have a thorough under-
standing of these four aspects, and how they work together.
See Also
Areas
Privileges
Roles
Users
Using CitectSCADA integrated with Windows Security
Areas
When implementing CitectSCADA for a large application, you can visualize the plant as
a series of discrete sections or areas. You can define areas geographically (especially
where parts of the plant are separated by vast distances or physical barriers) or logically
(as discrete processes or individual tasks).
Small plants, for example a simple manufacturing plant can be divided into just three
areas - raw product arrives in the receivables area, is transported to an area for proc-
essing, and is then transported to a packaging or despatch area.
245
Chapter 11: Using CitectSCADA Security
However, with larger or more complex plants you might need to define several areas,
like this:
When defining an area, you would usually encompass a section of the plant that is con-
trolled by one operator (or controlled from one CitectSCADAControl Client).
You can also define smaller areas that are collectively controlled by an operator or Con-
trol Client. This method can increase flexibility, but can introduce a higher level of com-
plexity to your system.
246
Chapter 11: Using CitectSCADA Security
You can define up to 255 separate areas. You can then refer to these areas by number (1
to 255) or use a label to assign a meaningful name to the area (for example receivables,
pre-process, conveying, etc).
After you have defined your areas, you then configure the system elements (commands,
objects, alarms, reports, etc). your operators will use in those areas. For example:
For example:
Command CONVEYOR = 1;
Area 8
In this example, an operator without access to Area 8 will not be able to send the com-
mand. Refer to Roles for more information on how areas and roles work together.
Note: Any system element that is not assigned to an area between 1 and 255 is auto-
matically placed in a default area known as Area 0. Every user can view the system
elements in Area 0, but without the matching privilege will be unable to control
them.
See Also
Configuring Areas
Privileges
Roles
Users
Privileges
CitectSCADA provides eight privileges, numbered 1 to 8, that are used to restrict access
to parts of the project. To implement privileges into your project:
l Assign a privilege to a particular system element (command, object, report, alarm etc)
l Assign the privilege or privileges to the role or roles that will need to control that sys-
tem element.
You can allocate different privileges to different types of operation, as in the following
example:
247
Chapter 11: Using CitectSCADA Security
Privilege Command
4 Acknowledge alarms
5 Print reports
To allow a user to operate the conveyors, you assign privilege 1 to the role associated to
that user, for example:
Global Privilege 1
To allow a user to acknowledge alarms, you assign privilege 4 to the role associated to
that user, for example:
Global Privilege 4
To allow a user to acknowledge alarms and operate the conveyors, you assign both priv-
ilege 1 and privilege 4 to the role associated to that user record:
Global Privilege 1, 2, 3, 4, 5
Note: In assigning a role a global privilege, that role is granted view access to every
area automatically. Any user assigned that role will then be able to view every area
of the plant.
After you have allocated privileges, you can define the privilege requirements of your
system elements (commands, reports, objects, alarms, etc.):
Com- CONVEYOR = 1;
mand
248
Chapter 11: Using CitectSCADA Security
Privilege 1
Com- Report("Shift");
mand
Privilege 5
Not every system element needs a privilege classification. At least one command needs
to be issued by users, a command to log in to the system:
Com- LoginForm();
mand
Priv-
ilege
Com- A blank Privilege (or Privilege 0) means that the command has no classification
ment - it is available to every user who performs this role.
See Also
Roles
Users
Roles
When creating a role, consider the tasks the users who are assigned this role will be
expected to perform within the project, and what system elements that user will need to
have access to, or be restricted from. Using the areas and privileges defined previously, a
number of example roles are outlined below.
Note: Area 0 is assigned by default to every role. This means users can view any sys-
tem element in Area 0.
249
Chapter 11: Using CitectSCADA Security
See Also
Users
Adding Roles
Users
A user can be a Windows or CitectSCADA user. Each user is assigned zero or more roles
depending on the activities and processes they will have to operate and monitor. If zero
roles are allocated to the user, this is the same as configuring the user with no privileges.
250
Chapter 11: Using CitectSCADA Security
Name Role
See Also
Configuring CitectSCADA Security
Adding Roles
Configuring Areas
When configuring areas within a plant you have the option of labeling areas, grouping
areas and naming the group, and granting users view-only access to particular areas.
l Using labels to name areas
l Using groups of areas
l Viewing areas of the plant
Expression 10
251
Chapter 11: Using CitectSCADA Security
In this case, "DespatchAccum" could be used whenever area 10 is referred to, for exam-
ple:
Command CONVEYOR = 1;
Area DespatchAccum
Note: If you leave the Area field blank on a form, the command does not belong to
any particular area - it is assigned to every area of the plant.
To label an area:
Association 1 DespatchAccum
Association 2 11
Association 3 12
In the above example, areas 10, 11, and 12 are associated with the name "Despatch".
Any command assigned to "Despatch" belongs to areas 10, 11, and 12.
Command CONVEYOR = 1;
252
Chapter 11: Using CitectSCADA Security
Area Despatch
Association 1 Receivals
Association 2 Process
Association 3 Despatch
In this example, the name "Plantwide" refers to every area defined in the "Receivals",
"Process", and "Despatch" groups.
To define a group of areas:
Groups properties
Use the Groups dialog box to configure properties of groups:
Group Name
The name of the group. You can use this facility, for example, to define multiple areas or
multiple devices. Enter a value of 15 characters or less.
After you have defined a group, it can be used anywhere that an individual entity can
be used. You can also specify complex groups by defining a group of groups.
Association 1 . . . Association 10
A list of the entities associated with the Group Name. Enter a value of 16 characters or
less. An Association can be a number, a name, or another group. You can also specify a
range of numbers in the format <n1..n2> for example:
253
Chapter 11: Using CitectSCADA Security
Association 1 4..10
Association 1 AlarmPrint
Association 2 AlarmLog
Association 3 AlarmDBF
In this case, when the group name (AlarmInfo) is used as a device, the information is
sent to three devices - AlarmPrint, AlarmLog, and AlarmDBF.
Comment
Any useful comment. Enter a value of 48 characters or less.
Global Privilege
254
Chapter 11: Using CitectSCADA Security
Alternatively, you could restrict users access to a group of areas (for example, "Recei-
vals") or to a single area (for example, 12).
Adding Roles
Create a role for those people or groups of people you want to use your system. When
creating a role you determine what permissions (privileges and areas) to set for each
based on the tasks the user assigned that role needs to be able to perform within the
project and plant.
To add a Role record:
255
Chapter 11: Using CitectSCADA Security
The Windows group name can include a domain name or a local computer name in the
format of "domainname\operator", or "localcomputername\operator". If either are spec-
ified in the group name CitectSCADA runtime will only validate for the groups on the
server specified in the name or the local computer.
Privileges
The privilege assigned globally to the role. Enter a value of 16 characters or less.
In the privilege field you can separate numbers with commas or you can enter a range
separated by two periods le.g. 1..8
As you configure your system, you can assign privileges to the various elements, such
as graphics objects, alarms, accumulators, commands, and so on. For example, a role
with a Global Privilege of 3 will be able to send any command that is assigned a priv-
ilege of 3, or action any alarm with a privilege of 3, or click any button that is assigned a
privilege of 3, etc. Unless you are using areas, if you do not specify a global privilege, the
role cannot access any command with a privilege assigned.
Note: (For users using windows authentication) When you have completed the fields
in this dialog and if you have not already done so, add the users to the group in Win-
dows security that you want to have the privileges of this role.
Comment
Any useful comment. Enter a value of 48 characters or less.
Entry Command
A Cicode command that is executed when the user assigned this role logs in. You can
use any Cicode command or function. Enter a value of 254 characters or less.
The following fields are implemented with extended forms (press F2). Note that some of
the fields listed below may be displayed in the previous section of the form.
View Areas
The areas the user assigned the associated role is permitted to view. Enter a value of 16
characters or less.
Note: Do not set Viewable Areas in conjunction with Global privileges, as global
privileges give roles view access to areas automatically.
256
Chapter 11: Using CitectSCADA Security
Remember, you need to still assign privileges to the elements in these viewable areas,
such as graphics objects, alarms, accumulators, commands, etc. If you do not, the user
will have full access to them. For example, if you do not assign a privilege to a com-
mand in one of these areas, the user will be able to send it regardless of whether you
want them to or not.
To make an element (such as a button on a expression) view only for a particular user,
assign it an expression and a privilege. Add the area to the user's list of Viewable Areas,
but don't give the user the necessary privileges in that area (or the necessary global priv-
ilege).
Multiple areas can be defined using groups.
If you do not specify “Viewable Areas”, the user will have viewable access to area 0. See
Privilege and Area combinations for more information.
Exit Command
A Cicode command that is executed when the user assigned this role logs out. You can
use any Cicode command or function. Enter a value of 254 characters or less.
Priv1 Areas. . . Priv8 Areas
The privileges (by area) assigned to the user. Enter a value of 16 characters or less. Using
this combination of areas and privileges, you can assign a user different privileges for
different areas. For example, users assigned a role with privilege class 6 in areas 29 and
30 will only have access to commands in those areas that require privilege class 6.
In the privilege field you can separate numbers with commas or you can enter a range
separated by two periods le.g. 1..8
Note: In assigning a privilege to an area, you are making that area viewable to users
assigned that role.
If you do not specify areas with associated privileges, access is defined by Viewable
Areas or Global Privileges only
See Also
Adding groups and users in Windows security.
Configuring Privileges
When configuring privileges you have the option of changing the default from non-hier-
archical to hierarchical. You may also need to assign privileges to a specific area or mul-
tiple areas and as such need to have an understanding of how certain combinations of
privileges and areas will affect the security of your project.
257
Chapter 11: Using CitectSCADA Security
Global Privilege 8
Command CONVEYOR = 1;
Privilege 1
Area 8
In this simple example, an operator without privilege 1 in Area 8 will not be able to
issue the command.
See Also
Viewing areas of the plant
258
Chapter 11: Using CitectSCADA Security
259
Chapter 11: Using CitectSCADA Security
set.
Yes Yes Con- Yes (match- Yes (not Can view the system
veyor ing) match- element in the rel-
Oper- ing) evant area but cannot
ator operate it as role does
not have the nec-
essary associated
privilege.
See Also
Using multiple areas and privileges
Viewable Areas
260
Chapter 11: Using CitectSCADA Security
In this first example, John Smith has been assigned the role of Despatch Handler. This
role has global privileges 1 and 2. Privilege 3 in the "Despatch" areas (10, 11, and 12),
privilege 4 in the "DespatchAccum" area (10) and privilege 5 in areas 10 and 11. This
means he can:
l Due to rule 1 and 2, view evry area of the plant.
l Due to rule 1 control every system element in the plant with a value of 1 and 2.
l In area 10, control system elements with a privilege level 1, 2, 3, 4 or 5.
l In area 11, control system elements with privilege level 1, 2, 3 or 5.
Also, in this example, Groups and Labels have been used to make the security con-
figuration intuitive.
Example 2:
Global Privilege
261
Chapter 11: Using CitectSCADA Security
In this second example John Smith has been assigned the role of Despatch Handler. This
role has no global privileges. Viewable areas, (7,8,9). Privilege 3 in the "Despatch" areas
(10, 11, and 12), privilege 4 in the "DespatchAccum" area (10) and privilege 5 in areas 10
and 11. This means he can:
l View areas 7,8,9,10,11,12
l In area 10, control system elements with a privilege level 3, 4 or 5.
l In area 11, control system elements with privilege level 3 or 5.
l In area 12, control system elements with privilege level 3.
l Due to rules 3 and 4, control system elements with privilege level 3,4,5 in Area 0
See Also
Adding Users
Adding users
For each person you want to have access to your project you need to add their user infor-
mation into the system.
Before adding a new user check the Reserved User Name list. This list details built-in
users included in CitectSCADA.
To add a user:
Each operator needs to enter the User Name and Password to use the system.
262
Chapter 11: Using CitectSCADA Security
User Names are restricted to using the same syntax as Tag names. See Tag name syntax.
Full Name
The full name of the user or class of user. Enter a value of 32 characters or less. This
name is used as a comment and for display in alarm logs and command logs.
Password
The user's password. Enter a value of 36 characters or less. When you enter the pass-
word, an asterisk (*) will display for each character entered. When you save the user rec-
ord, the password will be encrypted before it is saved to the Users.dbf.
Each operator needs to enter the User Name and Password to use the system.
Use the [General]PasswordExpiry parameter to specify when the password will expire.
Confirm Password
Re-enter the user's password to confirm the text entered in the Password field. Enter a
value of 36 characters or less. If the contents of the Password and Confirm Password
fields are different when the record is saved, a message will be displayed that indicates
a mismatch and invites you to try again.
Type
The generic type of user. Enter a value of 16 characters or less. For example:
Type Operator
Type Supervisor
Type Manager
The Type field is used in configuration only to specify a class of user that can then be
used as the basis for creating new users in runtime via the UserCreate() Cicode function.
When this function is run it displays a form where you can select the user Type. When
you do this, your new user will inherit the properties of the chosen user class record that
you have already created. In doing this it uses the first user record with a matching Type
value.
In configuration, decide what user classes you need. Each class (or Type) would contain
any specific Global Privilege, Viewable Areas and Areas for Privilege and Entry and Exit
Commands values . Maintain just one user record for each class and then base other
individual users on this. If you create new users in configuration in the usual way by
using Add, Replace technique, then you will get multiple user records with the same
Type field value. Whilst this will not directly cause a problem for individual records it
could confuse development or provide scope for inconsistencies and unexpected
263
Chapter 11: Using CitectSCADA Security
behavior if other field values are changed. When adding records in configuration, it is
therefore recommended that you remove duplicate Type values from additional user rec-
ords.
Roles
Each user is assigned roles. The Roles field will accept zero or more comma-separated
role names. If zero roles are specified for the user, this is the same as configuring the
user with no privileges.
Note: When a Windows or CitectSCADA user who is linked to multiple roles logs
onto runtime the privileges and areas that the user will be assigned are the com-
bined privileges of the linked roles.
Comment
Any useful comment. Enter a value of 48 characters or less.
Notes:To login a user, you need to use the Login() or LoginForm() Cicode functions.
See Also
Note: Avoid using these reserved user names for windows users. Attempting to
login with one will result in a hardware alarm being generated and the login will be
unsuccessful.
See Also
Adding users
264
Chapter 11: Using CitectSCADA Security
Note: Online changes arising from user creations and modifications are reflected
only in the local _Users.rdb and Users.dbf files. Perform user administration activities
on a central node so that user records remain synchronized across a distributed net-
work. Other nodes will use the Copy= functionality in CitectSCADA or custom engi-
neered database replication.
See Also
Adding users
265
Chapter 11: Using CitectSCADA Security
A CitectSCADA user will always take priority over a Windows user when logging in at
runtime if the user is also included as a Windows user. However if a valid CitectSCADA
user login does not succeed for some reason, the Windows user credentials will not be
checked and an alert will be generated to advise that the login was not effective.
Conceptual diagram of CitectSCADA security and Windows security
266
Chapter 11: Using CitectSCADA Security
Domain groups and users are defined or created on the domain server by the domain
administrator. Local groups and users are defined or created on the local computer by
the local administrator. To link a Windows user to a CitectSCADA role the user needs to
be a member of the Windows group and the name of the group has to be same as the
Windows group name specified in the CitectSCADA role.
For information on how to add groups and users to Window security, refer to the Win-
dows documentation appropriate to your operating system.
A Windows user need not be a CitectSCADA user. However if a Windows user is added
to the Windows group that is linked to a CitectSCADA role, then that Windows user will
have the privileges as are assigned to the role.
The Windows administrator can control which Windows user can or cannot login to run-
time by choosing whether to add the user to the linked Windows groups.
See also
Adding Roles
267
Chapter 11: Using CitectSCADA Security
268
Chapter 11: Using CitectSCADA Security
269
Chapter 11: Using CitectSCADA Security
270
Chapter 12: Configuring Your System
Before you run your project you will need to configure each computer in your Citect-
SCADA system. Configuration information is stored on each machine in a Citect.ini file
based on your installation, database configuration and compiled project. Configuration
is done with the Computer Setup Wizard.
The Computer Setup Wizard contains a series of pages allowing configuration of the
computer specific settings including:
l The role the computer has in the system network
l The project being run
l The CPU Configuration
l The CitectSCADA Events enabled for each component
l The Cicode run for each component on startup
l The cluster configuration
l The security settings applied
The wizard uses the configuration stored in the project databases to provide information
to you. Selected options are written to the Citect.ini file.
The wizard needs to be run on each computer in your system to appropriately configure
CitectSCADA for each particular machine. Run after compiling your project and as the
last step before running the system.
See Also
Running the Computer Setup Wizard
Launching runtime for the first time
271
Chapter 12: Configuring Your System
The pages that are displayed depend on the configuration of the machine and include:
l Project Configuration
l Computer Role Configuration
l Network Model
l Server Password Configuration
l Server User Configuration
l Reports Configuration
l Trends Configuration
l CPU Configuration
l Events Configuration
l Startup Functions Configuration
l Cluster Connections Configuration *
l Control Menu Security Configuration *
l Keyboard Security Configuration *
l Miscellaneous Security Configuration *
l EcoStruxure Web Services Server Setup *
l EcoStruxure Web Services Server User Setup *
l General Options Setup *
* Only available in Custom Setup mode.
Each screen of the wizard is described in the sections that follow.
See Also
Project Configuration
Project Configuration
The dialog box for project configuration will vary depending on whether you are con-
figuring a project from a development and configuration environment, or from a runtime
only environment.
Development and configuration environment
Select the project to run on this CitectSCADA computer. The Computer Setup Wizard
will show you the compiled projects defined in the project list, apart from the include
projects.
272
Chapter 12: Configuring Your System
If there is only one compiled project present, it will be automatically selected. If there are
no compiled projects present, an alert message is displayed and the wizard will ter-
minate. If this occurs, return to Citect Explorer and confirm that the necessary project is
saved locally and has compiled without errors.
See Also
Computer Role Configuration
273
Chapter 12: Configuring Your System
Note: The Run/Copy mechanism does not transfer custom files such as meta-data,
icons, images or runtime DBF files. Therefore, it is recommended deploying a project
before Run/Copy to help ensure that those files at least exist. You will still need to re-
deploy a project, when you want to update the custom files.
See Also
Computer Role Configuration
Option Description
Server This computer will be a standalone or networked I/O Server and Control
and Con- Client. This option is disabled if this computer has no Server components
trolClient assigned to it to run. Selecting this option enables the Multi-Process
check box.
Select the Multi-Process check box to separate your client and server com-
ponents into individual processes. This option can be used for distributing
the components across multiple CPUs.
If you leave the Multi-Process check box unselected, CitectSCADA will run
the client and server components in one process.
Control This computer will only be a Control Client. This option is disabled if this
Client computer has been assigned a Server component to run. Selecting this
option enables the Full License check box.
Select the Full License check box if you want this Control Client to use a full
(server) license, as opposed to a client license. This sets the [Client]Full-
License parameter in the Citect.ini file to 1 (the default value is 0). Gen-
erally, you would not allocate a full server license to a client as there is no
difference in functionality between the two licenses. Allocate a full server
license if you have insufficient client licenses available, or for some other
specific need.
274
Chapter 12: Configuring Your System
View-only This computer will only be a View-only Client. This read only option is dis-
Client abled if this computer has been assigned a Server component to run.
Some of these options may be disabled depending on what servers have been configured
to run on this computer. The Computer Setup Wizard cross-references your computer's
network identification with the network addresses configured for each server in your
project configuration.
See Also
Network Model
CPU Configuration
Network Model
Select the network model to be applied to this CitectSCADA computer. Options include:
l Stand alone (no other SCADA computers))
l Networked (connect to other SCADA computers)
From Version 7.0 CitectSCADA uses TCP/IP to facilitate communications across a net-
work.
Note: TCP/IP address information for Citect servers is configured within the Citect
project itself. See Network Address Definitions for more information.
When you complete the Computer Setup Wizard, the chosen network model is written to
the [LAN] section in the citect.ini file; for example:
...
[LAN]
TCPIP=1
...
See Also
Internet Server Configuration
275
Chapter 12: Configuring Your System
Note: If a server password has already been configured for the machine, the ‘Pass-
word’ and “Confirm Password” fields will be pre-filled.
See Also
Configure Server User
Note: To determine the TCP/IP address of the Internet Server computer, choose
Start | Run. Type CMD and press Enter. Then at the DOS prompt type IPCON-
FIG and press Enter.
276
Chapter 12: Configuring Your System
Note: that this can only happen automatically if an initial connection has previously
been made to the primary Internet Server.
See Also
Reports Configuration
The Reports Configuration page will only be displayed if this machine is configured as a
Reports Server in the Project Editor.
Note: For a networked computer to be a Reports Server it needs to also be the I/O
Server or needs to be able to communicate with the I/O Server on the network.
Option Description
Startup Defines the name of the report to run when CitectSCADA starts up.
report
Inhibit trig- For example, you might have a report that is triggered off the rising edge
gered of a bit on startup. The Reports Server detects the bit come on, and runs
reports on the report. If this option is checked, the Reports Server does not run this
startup report until it has read the I/O Devices a second time.
277
Chapter 12: Configuring Your System
See Also
Trends Configuration
Trends Configuration
The Trends Configuration page will only be displayed if this machine is configured as a
Trends Server in the Project Editor.
Note: For a networked computer to be a Trends Server it needs to also be the I/O
Server or needs to be able to communicate with the I/O Server on the network.
Option Description
Inhibit triggered trends on You might have a trend that is triggered off the rising
startup edge of a bit on startup. If this option is enabled, the
trends server does not display the trend until it has read
the I/O Devices a second time.
See Also
CPU Configuration
CPU Configuration
The CPU Setup page is used to assign client and server components to specific proc-
essors in a multi-processor machine.
This page lists each component's full name, including the cluster to which it belongs, the
priority and the CPU assignment. If the Multi-process option was not selected on the
Computer Role Configuration page there will only be one entry listed, either Client or
Client and Servers. If the Multi-process option was selected, you have the option of select-
ing specific CPUs for the Client, I/O Server, Alarm Server, Trends Server and Reports
Server.
To assign a CPU to a component:
1. Select one or more components from the list (hold the Ctrl key down to select mul-
tiple components).
278
Chapter 12: Configuring Your System
Note: In some situations, when 'All' processes is selected under "Modify CPU Con-
figuration" windows in the computer setup wizard, be aware that performance
issues may still occur when your CPU usage is less than 100%. You can detect these
issues when your CPU usage for a process is fixed at 100 divided by your number of
processors.
When you complete the Computer Setup Wizard, the CPU assignations are written to
each component section in the Citect.ini file; for example:
...
[Alarm.Cluster1.AlarmServer1]
CPU=1
Clusters=Cluster1
...
[Trend.Cluster1.TrendServer1]
CPU=2
Clusters=Cluster1
...
See Also
Events Configuration
Events Configuration
Events are used to trigger actions, such as a command or set of commands. For example,
an operator can be notified when a process is complete, or a series of instructions can be
executed when a process reaches a certain stage. Select the Enable Events on this com-
puter check box if events are to be enabled on this CitectSCADA computer.
The Events Setup page lists each component's full name, including the cluster to which
it belongs, alongside a list of events that can be enabled for each component. If the
Multi-process option was not selected on the Computer Role Configuration page there
will only be one entry listed, either Client or Client and Servers. If the Multi-process
option was selected, you have the option of enabling events for each component on this
computer.
Note: The Computer Setup Wizard only displays named events from the selected
project. If you are using events in included projects you will need to edit your
Citect.ini file to add these under the [Events] section header.
Note: Events named 'Global' or events with no title will not appear as these are
279
Chapter 12: Configuring Your System
global events. These events will run on computers that have events enabled. These
events will run in the client process.
...
[Alarm.Cluster1.AlarmServer1]
CPU=1
Clusters=Cluster1
Events=CSV_AlarmClient
...
[Trend.Cluster1.TrendServer1]
CPU=2
Clusters=Cluster1
Events=CSV_TrendXClient,CSV_TrendXServer
...
See Also
Startup Functions Configuration
1. Select the component from the list. To select multiple components, hold down the
Ctrl key as you select each item.
280
Chapter 12: Configuring Your System
2. Click Modify.
3. Type the name of the Cicode function you want to call on startup for that component.
4. Click OK.
When you complete the Computer Setup Wizard, the events are written to each com-
ponent section in the citect.ini file; for example:
...
[Alarm.Cluster1.AlarmServer1]
CPU=1
StartupCode=alarmServerStartup
...
[Trend.Cluster1.TrendServer1]
CPU=2
StartupCode=trendServerStartup
...
See Also
CPU Configuration
Cluster Connections Configuration
1. Select the component from the list. To select multiple components, hold down the
Ctrl key as you select each item.
2. Click Modify.
3. Select the clusters you want the component to connect to on startup.
4. Click OK.
281
Chapter 12: Configuring Your System
When you complete the Computer Setup Wizard, the clusters are written to each com-
ponent section in the Citect.ini file; for example:
...
[Alarm.Cluster1.AlarmServer1]
CPU=1
Clusters=Sydney
...
[Trend.Cluster1.TrendServer1]
CPU=2
Clusters=Sydney,Tokyo
...
See Also
Implementing Clustering
Option Description
Citect- Allows the operator to use the control menu (top left-hand icon) to access
SCADA the Citect Editor, Project Editor, Graphics Builder, and Cicode Editor from
con- CitectSCADA at run time. Disabling this provides better security.
figuration
envi-
ronment
on menu
FullScreen Allows the operator to set whether pages will be displayed in fullscreen or
restored state. When checked “FullScreen” will set the ini parameter
[Animator]FullScreen to 1. If “FullScreen” is set.
Show title Allows the operator to set whether pages will be displayed in fullscreen mode
bar with the title bar. The [Animator]FullScreen ini parameter is set as follows: 0
if “Fullscreen” is unchecked; 1 if “Fullscreen” is checked and “Show title bar”
is unchecked; 2 if both “Fullscreen” and “Show title bar” are checked.
“Show title bar” cannot be modified if the option“Fullscreen” is unselected.
Shutdown Allows the operator to use the control menu (top-left icon) to shut down
on menu CitectSCADA at runtime. The shutdown is not password- or privilege-pro-
tected. Disabling this provides better security.
Kernel on Allows the operator to use the control menu (top left icon) to display the
menu CitectSCADA Kernel at run time. Disabling this provides better security.
282
Chapter 12: Configuring Your System
See Also
Keyboard Security Configuration
Note: The ability to disable Alt-Escape, Ctrl-Escape and Alt-Tab is not currently avail-
able.
See Also
Miscellaneous Security Configuration
Option Description
Inhibit screen saver while CitectSCADA is Stops the screen saver from blanking out
running important screens that have to be always
visible. Alternatively the screen saver pass-
word can add additional security features
See Also
General Options Setup
283
Chapter 12: Configuring Your System
Note: This screen is only available if an EcoStruxure Web Services Server has been
configured in your project. Configuration of this feature requires Windows admin-
istrative privileges. If logged on as an administrator you will need to register with
elevated privileges. In the Windows User Account Control prompt, click OK to pro-
ceed. If logged on as a non-administrator, you will be prompted to enter an admin
password.
To service requests from web service clients use this setup dialog to reserve the URL of
the EcoStruxure Web Service on the computer.
Click on the Register button.This will reserve the URL for all users on the computer. You
need to register the URL once. If the URL is not registered, EcoStruxure Web Services
Server will need to be run as administrator on the computer.
If the URL is successfully registered, the message "URL reservation successfully added"
will be displayed. If the message "URL reservation add failed, Error: 183. Cannot create a
file when that file already exists." is displayed, the URL has already been registered.
Note: This will register the EWS for all users. If you do not want the URL available
to all users you can manually control access by using the Windows utility netsh.exe.
Only users for whom the URL has been reserved will be able to start the web service.
For more information refer to Modifying the URL Reservation.
See Also
General Options Setup
Note: For registration information refer to the topic EcoStruxure Web Services Server
Setup.
1. Click Start, point to All Programs, click Accessories, right-click Command Prompt
and click Run as Administrator on the context menu that comes up. Click Continue
284
Chapter 12: Configuring Your System
on the User Account Control (UAC) window that might ask permissions to continue.
2. Type in netsh http delete urlacl url=<urlNamespace> in the command prompt win-
dow. Where <urlNameSpace> = https://-
<ewsServerAddress>:<ewsServerPort>/DataExchange e.g.
http://localhost:2086/DataExchange.
3. If the reservation is deleted successfully, the following message is displayed, 'URL res-
ervation successfully deleted'.
To display URL reservations
1. Click Start, point to All Programs, click Accessories, right-click Command Prompt
and click Run as Administrator on the context menu that comes up. Click Continue
on the User Account Control (UAC) window that might ask permissions to continue.
2. Type in netsh http show urlacl in the command prompt window.
3. URL reservation list should be displayed.
To add a URL reservation
1. Click Start, point to All Programs, click Accessories, right-click Command Prompt
and click Run as Administrator on the context menu that comes up. Click Continue
on the User Account Control (UAC) window that might ask permissions to continue.
2. Type in netsh http add urlacl url=<urlNamespace> user=<machine name>\<security
group name> in the command prompt window. Replace <machine name> with the
computer name or Windows domain on which the group is created and <security
group name> with the name of the security group.
3. If the reservation is created successfully, the following message is displayed, 'URL res-
ervation successfully added'.
See Also
General Options Setup
Note: This screen (in the computer setup wizard) is only available if the EcoStruxure
Web Services Server has been configured in your project.
NOTICE
NOTICE It is recommended that you do not set the [Server]EWSAllowAnonymousAccess
INI parameter to 1.If set unauthorized access to tag data may occur. Enable access only if
your EWS Client supports Anonymous authentication and no other.
285
Chapter 12: Configuring Your System
Use this dialog to enable/disable anonymous access. If enabled an EWS Client can
retrieve data from the EWS Server without supplying user credentials.
Select the option Allow Anonymous Access. When enabled the [Server]EWSAl-
lowAnonymousAccess INI parameter will be set to 1.
When selected the CtApi User Credentials box will become active. Enter a user name
and password. The user name and password will be used by the EWS Server to connect
to CtApi.
Note: Anonymous requests from EWS client will have read only access to the data.
The EWS method SetValue will not be supported for anonymous requests.
See Also
General Options Setup
Option Description
Data Directory The directory where the CitectSCADA data files are located. The
data files are the files that are generated at run time: trend files,
disk PLC etc.
Backup project The backup directory that is used if a runtime database cannot be
path located (due to inoperative hardware or a file that has been moved,
corrupted, or deleted).
Startup page The Page Name of the graphics page to display when CitectSCADA
starts up.
Page scan time The delay (in milliseconds) between updating a graphics page and
starting the next communications cycle. The Page Scan Time sets
the default for how often your graphics pages are updated. When a
page is updated, relevant data (variable tags etc. represented on
the graphics page) is scanned to determine if field conditions have
changed. This setting is overridden by the Scan Time value spec-
ified in Page Properties (if applied).
A value of 250 (the default value) indicates that CitectSCADA will try
to update the page every 250 ms. However, if CitectSCADA cannot
read the entire data from the I/O Device within 250 ms, the page is
processed at a slower rate. For example, if it takes 800 ms to read
the data from the relevant I/O Device, CitectSCADA processes the
page every 800 ms.
286
Chapter 12: Configuring Your System
Under some conditions, you might want to slow the update of your
pages to reduce the load on the I/O Servers. By reducing the page
scan time, you allow more communication bandwidth to other Citect-
SCADA tasks or Clients. For example, you might want fast response
on your main operator computers, while slowing the response time
on manager computers. You can enter any value from 0 to 60000
(milliseconds).
OPC Alarms and Click the Register button to register alarm servers defined in a
Events project to be accessed via a third party OPC client.
Note: This registration requires administrative privileges. If already
logged on as an administrator you will be asked to allow the program
to run with elevated privileges. Click OK to proceed. If logged on as a
non-administrator, you will need to provide an admin password before
being asked to allow program to run with elevated privileges.
On Windows XP, deselect the option "Protect my computer and data
from unauthorized program activity" if the "Run As" message box is
displayed then click OK.
See Also
Finish
Finish
Click Finish to save the setup to the Citect.ini file, Cancel to quit the wizard without
saving, or Back to navigate to a page that requires adjusting.
287
Chapter 12: Configuring Your System
See Also
Computer Role Configuration
288
Chapter 13: Implementing Clustering
Once you have designed the clustering for your system, including the configurations of
servers you need, you can proceed to implement that design. You will need to configure:
l Cluster Definitions
Each cluster needs to be defined by giving it a unique name in the project.
l Network Address Definitions
Each physical server in your system needs to be identified with a unique name
and IP address.
l Alarm Server Definitions
Each Alarm Server needs to be named, and assigned to a cluster and physical
server. Identify each server as Primary or Standby.
l Reports Server Definitions
Each Reports Server needs to be named, and assigned to a cluster and physical
server. Identify each server as Primary or Standby.
l Trends Server Definitions
Each Trends Server needs to be named, and assigned to a cluster and physical
server. Identify each server as Primary or Standby.
l I/O Server Definitions
Each I/O Server needs to be named, and assigned to a cluster and physical server.
Identify each server as Primary or Standby.
CitectSCADA's implementation of clustering allows for the flexible deployment of graph-
ics pages that can access data from different clusters dynamically. A page can be allo-
cated a cluster context when it is called, and any elements on that page will be assigned
the same cluster, unless they have a cluster explicitly specified. See About cluster
context.
See Also
Rules of Clustering
Assigning graphics page objects to a cluster at Runtime
289
Chapter 13: Implementing Clustering
Note: CitectSCADA will automatically resolve tags without a cluster context spec-
ified if every tag name in the project is unique. See Resolving cluster context with
unique tag names.
See Also
Assigning graphics page objects to a cluster at Runtime
290
Chapter 13: Implementing Clustering
See Also
Assigning graphics page objects to a cluster at Runtime
Rules of Clustering
When configuring CitectSCADA the following clustering rules apply:
l Each cluster to have a unique name.
l Each server component to have a unique name.
l Each server component needs to belong to one cluster.
l Each cluster can contain only one pair of redundant Alarm Servers. They need to
reside on different machines.
l Each cluster can contain only one pair of redundant Reports Servers. They need to
reside on different machines.
l Each cluster can contain only one pair of redundant Trends Servers. They need to
reside on different machines.
l Each cluster can contain an unlimited number of I/O Servers.
There are countless variations in how a clustered system can be configured. The most
appropriate configuration will depend on the requirements for the solution to be
deployed and the environment in which it is being deployed. For more information, refer
to Typical system scenarios.
The diagram below is an example of a system running with two clusters across three
machines. Every server and client component have been deployed in accordance with
the clustering rules.
291
Chapter 13: Implementing Clustering
The next diagram demonstrates circumstances which do not correctly follow the clus-
tering rules.
292
Chapter 13: Implementing Clustering
The CitectSCADA compiler or the CitectSCADA Runtime Manager detects when the
rules of clustering are not being observed and advises the user accordingly.
See Also
About cluster context
Cluster Definitions
See Rules of Clustering for additional information.
To define a cluster:
Option Description
Cluster Name The name of the cluster. The name needs to be unique to the project and
not contain spaces.
Comment Any useful comment. This property is optional and is not used at run-
time.
293
Chapter 13: Implementing Clustering
3. Click the Add button to append a new record, or Replace if you have modified a rec-
ord.
See Also
Network Address Definitions
Option Description
Name The name of the machine at the network address being configured. The
name needs to be unique to the project and not contain spaces.
Address The IP address or computer name of the machine or network card being
configured. For machines with dual network cards, add a network
address for each card in each machine to which you want to com-
municate. See Network Redundancy for information.
Any useful comment. This property is optional and is not used at run-
Comment
time.
3. Click the Add button to append a new record, or Replace if you have modified a rec-
ord.
See Also
Alarm Server Definitions
Note: The Alarm server reuses the Alarm Properties port. As a result alarm prop-
erties are now published for configured alarm servers.
294
Chapter 13: Implementing Clustering
Option Description
Cluster Name The name of the cluster to which this Alarm Server will belong. If there
is only one cluster defined in the project, you can leave this field blank.
The Alarm Server will default to the defined cluster
Server Name The name of the server. The name needs to be unique to the project
and any included projects, and not contain spaces.
Mode The mode for this server, either Primary or Standby. If this property is
left blank, the default value will be Primary. The Primary and Standby
servers need to run on different computers, and only one Primary and
one Standby can be defined per cluster. Mode determines which server
will be assigned the highest arbitration priority. The arbitration priority
is used to work out which server will continue to be 'main' after a 'main-
main' situation has occurred.
Port The port this server will listen on. You can leave this field blank if you
are running only one Alarm Server on the machine, in which case the
default port number will be used.
Comment Any useful comment. This property is optional and is not used at run-
time.
The following fields are implemented with extended forms (press F2).
Note: Servers listen on legacy ports only if the INI parameter [LAN]Ear-
liestLegacyVersion has been enabled.
Option Description
Archive Schedules archiving to occur every ' number' of days. If set, archiving will
every occur automatically, after the alarm server has started.
Database The port the server database will listen on. You can leave this field blank if you
Port are running only one Alarm Server on the machine, in which case the default
port number will be used.
295
Chapter 13: Implementing Clustering
3. Click the Add button to append a new record, or Replace if you have modified a rec-
ord.
See Also
Alarm Server Side Synchronization
Reports Server Definitions
Note: Synchronization occurs only if the primary and standby alarm servers are run-
ning and connected.
To configure synchronization between the primary and standby alarm server refer to the
[Alarm.<ClusterName>.<ServerName>] parameters [Alarm.<Cl-
usterName>.<ServerName>] parameters in the CSE help reference.
See Also
Alarm Server Definitions
Main-Main Scenario
If the standby alarm server loses its connection with the primary alarm server, a 'main-
main' situation may occur, where both servers communicate and process data from the
I/O server. On reconnection the data on both servers will need to be synchronized. With
duty mode enabled by default, the servers determine what data to merge. In most
instances the data with the latest timestamp is kept while the other is discarded.
296
Chapter 13: Implementing Clustering
In a 'main-main' situation do not make any configuration changes to your system until the
primary and standby server is reconnected. Configuration changes made to the system dur-
ing a 'main-main' situation may cause the system to become inoperative.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
When the connection between the servers is restored, the servers arbitrate to determine
which server continues as main and which server becomes the standby.
In CitectSCADA, when configuring the alarm server you select which server is primary
and which is standby. By default the server configured as primary is given the highest
priority, thus when the servers arbitrate to determine which becomes main, the primary
server will revert to being the main server.
See Also
Duty Mode
Alarm Server Side Synchronization
Alarm Server Definitions
Duty Mode
Duty mode enables a standby server to transfer data to a primary server following a
'main-main' situation.
When the connection between the servers is restored, the servers arbitrate to determine
which server switches to standby.
In CitectSCADA duty mode is enabled by default, and helps prevent the data on the
server that is deemed to be the standby (after the arbitration process) from not being
accessible. In duty mode the timestamps of the data on the servers are compared. The
data with the recent timestamp is kept and is merged into the data on the primary
server and the remainder of the data is discarded.
When the primary server receives the more recent data, from the standby server, it
merges the data with its own data and then sends an update to the standby server. This
allows for primary and standby server to operate with synchronized data sets.
See Also
Duty Mode
Alarm Server Side Synchronization
297
Chapter 13: Implementing Clustering
Option Description
Cluster The name of the cluster to which this Reports Server will belong. If there is
Name only one cluster defined in the project, you can leave this field blank. The
Reports Server will default to the defined cluster
Server The name of the server. The name needs to be unique to the project and
Name not contain spaces.
Mode The mode for this server, either Primary or Standby. If this property is left
blank, the default value will be Primary. The Primary and Standby servers
need to run on different computers, and only one Primary and one Standby
can be defined per cluster.
Network The network address(es) of the server being configured. To specify dual
Addresse- network connections to the server, use a comma delimited list. See Network
s Redundancy.
Port The port this server will listen on. You can leave this field blank if you are
running only one Reports Server on the machine, in which case the default
port number will be used.
Comment Any useful comment. This property is optional and is not used at runtime.
The following fields are implemented with extended forms (press F2).
Note: Servers listen on legacy ports only if the INI parameter [LAN]Ear-
liestLegacyVersion has been enabled.
Option Description
298
Chapter 13: Implementing Clustering
3. Click the Add button to append a new record, or Replace if you have modified a rec-
ord.
See Also
Trends Server Definitions
Option Description
Cluster Name The name of the cluster to which this Trends Server will belong. If there
is only one cluster defined in the project, you can leave this field blank.
The Trends Server will default to the defined cluster.
Server Name The name of the server. The name needs to be unique to the project and
not contain spaces.
Mode The mode for this server, either Primary or Standby. If this property is
left blank, the default value will be Primary. The Primary and Standby
servers need to run on different computers, and only one Primary and
one Standby can be defined per cluster.
Port The port this server will listen on. You can leave this field blank if you
are running only one Trends Server on the machine, in which case the
default port number will be used.
Comment Any useful comment. This property is optional and is not used at run-
time.
The following fields are implemented with extended forms (press F2).
Note: Servers listen on legacy ports only if the INI parameter [LAN] Ear-
liestLegacyVersion has been enabled.
299
Chapter 13: Implementing Clustering
Option Description
3. Click the Add button to append a new record, or Replace if you have modified a rec-
ord.
See Also
I/O Server Definitions
Option Description
Cluster Name The name of the cluster to which this I/O Server will belong. If there is
only one cluster defined in the project, you can leave this field blank.
The I/O Server will default to the defined cluster. 16 characters max-
imum.
Server Name The name of the server. The name needs to be unique to the project and
any included projects, and not contain spaces. 16 characters max-
imum.
Port The port this server will listen on. You may leave this blank in which
case the default port number will be used. 16 characters maximum.
Comment Any useful comment. This property is optional and is not used at run-
time. 48 characters maximum.
The following fields are implemented with extended forms (press F2).
300
Chapter 13: Implementing Clustering
Note: Servers listen on legacy ports only if the INI parameter [LAN]Ear-
liestLegacyVersion has been enabled.
Option Description
1. Click the Add button to append a new record, or Replace if you have modified a rec-
ord.
Note: CitectSCADA will automatically resolve tags without a cluster context spec-
ified if every tag name in the project is unique. See Resolving cluster context with
unique tag names.
For example, a menu page could be created to launch the mimic page for three identical
production lines, each based on the same page called "ProductionLine".
To achieve this, you would use the PageDisplay function to configure the following but-
tons on your menu page:
301
Chapter 13: Implementing Clustering
Com- PageDisplay("ProductionLine","Cluster_A")
mand
Com- PageDisplay("ProductionLine","Cluster_B")
mand
In each case, PageDisplay would pass the name of the host cluster to the page, depend-
ing on which button is selected. As each production line shares a common architecture,
any tags that do not have a cluster explicitly defined will be assigned to the specified
cluster as the page is opened.
This functionality is supported by the following Cicode functions:
l PageDisplay
l PageGoto
l WinNew
l WinNewAt
You can also use the PageInfo function to determine the cluster context that has been set
for a page.
This functionality extends to any Cicode that may be called from a graphics page. You
can write Cicode that only specifies variable tag names, allowing the cluster to be
defined by the current context of the page from which it is launched.
If the Cicode is executed by the function TaskNew, you have the option to specify a
cluster by setting the ClusterName parameter.
Note: The cluster context for Cicode cannot be changed once the code is running.
302
Chapter 14: Building Redundancy Into Your Sys-
tem
Redundancy in CitectSCADA can be defined at many different levels. When building
redundancy for your system, it is important to consider the degree of protection nec-
essary to meet your requirements, by:
l Defining how important your processes are;
l Determining the overall likelihood of system downtime, and the important processes
and equipment that will take the longest to restore to service;
l Deciding which components you would like to implement redundancy for; and
l Considering design and maintenance consequences of redundancy.
The section covers the following redundancy concepts:
l I/O Server Redundancy
l I/O Device promotion
l Redundancy and Persistence
l Data Path Redundancy
l Network Redundancy
l Reports, and Trends Server Redundancy
l Alarm Server Redundancy
Note: Using the Computer Setup Wizard will allow you to define the level of redun-
dancy you require by defining the function of each computer (See Running the Com-
puter Setup Wizard).
See Also
Reports, and Trends Server Redundancy
How CitectSCADA handles file server redundancy
How CitectSCADA handles FTP server redundancy
Redundancy of Standalone Systems
303
Chapter 14: Building Redundancy Into Your System
Note: Although both I/O Servers are identical, it is important to recognize that the
standby server is not duplicating the primary server's functions. If it were, the load
on the PLC portion of the network would be double and would significantly reduce
performance. Therefore, only the primary server communicates with the PLCs at any
given time.
304
Chapter 14: Building Redundancy Into Your System
l When the primary server is brought back online, the system returns control of the I/O
Devices back to the primary server. This is done by copying the disk image from the
standby server to the primary, allowing the clients to reconnect to it, and thereby
resuming control of the system.
When the system is running, you can also use redundant I/O Servers to split the proc-
essing load. This would result in higher performance as every I/O Server would be run-
ning in parallel when servicing the I/O Devices.
See Also
I/O Device promotion
Example
The following diagram shows four I/O Devices connected to two I/O Servers, with just
one primary device configured.
305
Chapter 14: Building Redundancy Into Your System
If no priorities were set for the standby devices, the compiler would allocate the fol-
lowing:
l I/O Device1 is allocated Priority 1 by default (no compiler alert)
l I/O Device2 is allocated Priority 2 (compiler warning alert)
l I/O Device3 is allocated Priority 3 (compiler warning alert)
l I/O Device4 is allocated Priority 4 (compiler warning alert)
This presumes the devices were configured in numerical order.
If I/O Device3 has been manually set to priority 2, the compiler would allocate the fol-
lowing:
l I/O Device1 is allocated Priority 1 by default (no compiler alert)
l I/O Device2 is allocated Priority 3 (compiler alert generated)
l I/O Device3 is allocated Priority 2 (no alert generated)
l I/O Device4 is allocated Priority 4 (compiler alert generated)
In this case, the setting for I/O Device3 has taken precedence. The remaining standby
devices are set for promotion based on the order they were configured.
Note: The automated priorities work on an n+1 equation; if I/O Device3 has been set
to Priority 5, the remaining devices would have been allocated priority 6 and 7.
See Also
Redundancy and Persistence
Data Path Redundancy
306
Chapter 14: Building Redundancy Into Your System
The diagram shows that there are two I/O Servers, namely IOServer1 (primary) and
IOServer2 (standby). Each connects to the public switched telephone network (PSTN) via
a modem, which is in turn connects to the I/O Devices, also over a modem. Persistence
Caches work as follows:
1. Every IODevices->Cache Time period, data from an I/O Device is stored temporarily
in the memory of the I/O Server (I/O Server cache).
2. For every [IOServer]SavePeriod, IOServer1 saves its in-memory cache to disk.
3. The cache is saved in Persistence Caches -one for each cached device.
4. IOServer1 broadcasts to other I/O Servers the UNC path of the Persistence Caches (set
with [IOServer]SaveNetwork).
307
Chapter 14: Building Redundancy Into Your System
5. From these Persistence Caches, IOServer2 updates its in-memory cache for its I/O
Devices.
6. Depending on the value of the I/O Server parameter of `[IOServer]SavePeriod' (deter-
mines how often the Persistence Cache is saved to the hard disk in seconds),
IOServer1 saves its in-memory cache to the hard disk every x amount of seconds.
Note: You can define an I/O Device on an I/O Server using the Express Com-
munications Wizard, or by adding a device in the I/O Devices form in Citect-
SCADA's Project Editor.
You are not limited to just one Standby Server, since the UNC path name set in
[IOServer]SaveNetwork is broadcast to I/O Servers. Each I/O Server updates its cache
from the Persistence Caches only for the I/O Devices defined on that server. It is then pos-
sible, therefore, set up several I/O Servers which update their in-memory caches with the
most recently read data.
For example, we set the [IOServer]SaveFile and [IOServer]SaveNetwork parameters as fol-
lows:
On IOServer1 On IOServer2
[IOServer] [IOServer]
SaveFile=C:\Data\IOServer1.dat SaveFile=C:\Data\IOServer2.dat
Save- Save-
Network=\\IOServer1\Data\IOServer1.dat Network=\\IOServer2\Data\IOServer2.dat
IOServer1 would broadcast the following UNC path of the Persistence Cache to other I/O
Servers: '\\IOServer1\Data\IOServer1.dat'. IOServer2 would then use the Persistence
Caches to update its in-memory cache with the device data most recently read by
IOServer1.
See Also
Data Path Redundancy
308
Chapter 14: Building Redundancy Into Your System
Most brands of PLCs have the facility to allow you to install a parallel data path from
the I/O Server to the I/O Device.
The diagram above shows that an additional data path (running in parallel) has been
defined. The redundancy is provided as follows:
l When you start your runtime system, CitectSCADA connects to the I/O Device using
the primary data path.
l If communications with the I/O Device is lost at any time (for example if the com-
munications cable is disconnected), CitectSCADA will switch to the standby data
path with minimal or no interruption to the system.
l CitectSCADA reconnects through the primary data path when it is returned in to serv-
ice.
On a larger system (such as one running on a network), you can also use data path
redundancy to maintain device communications with multiple I/O Server redundancy,
as shown in the following diagram.
309
Chapter 14: Building Redundancy Into Your System
l If communications with either the primary I/O Server or standby I/O Server be dis-
connected, the I/O Device is still accessible.
See Also
Multiple Device Redundancy (Standby Data Paths)
Note: Although I/O Servers are not assigned the Primary or Standby role based on
the I/O devices to which they are connected, it is common practice in redundant I/O
systems to connect the Primary I/O Devices to the Primary I/O Server and the
Standby I/O Devices to the Standby I/O Server. One I/O Server can connect to a mix-
ture of Primary and Standby I/O Devices. The I/O Server can support any number of
Standby Data Paths.
The following diagram demonstrates multiple device redundancy and Standby Data
Paths:
In this scenario, we have three I/O Servers connected to three I/O Devices in the fol-
lowing manner:
310
Chapter 14: Building Redundancy Into Your System
311
Chapter 14: Building Redundancy Into Your System
See Also
Alarms, Reports, and Trends Server Redundancy
Network Redundancy
You can use the dual NIC (or multiple network interface) capabilities of each client or
server, enabling you to specify a complete and unique network connection from a client
to a server.
Consider the following diagram:
Network Redundancy
Each of the system components in the cluster are connected to a second network (LAN
2). This is achieved by using the dual end points of each server. This provides con-
nection to two separate LANs to provide for LAN redundancy as follows:
l If LAN 1 is suddenly inoperative, each component in the cluster can easily maintain
connection by using LAN 2.
312
Chapter 14: Building Redundancy Into Your System
Server Redundancy
For information about server redundancy, see Reports and Trends Server Redundancy
and Alarm Server Redundancy.
See Also
Configuring network redundancy
313
Chapter 14: Building Redundancy Into Your System
314
Chapter 14: Building Redundancy Into Your System
Connectivity Parameters
The client sub system runs in every SCADA client or server process. It connects to all
servers within all clusters that are enabled, allowing any process to send data requests
to any other server, either through internal systems or Cicode function calls.
Two Citect.ini parameters allow you to configure how the client sub system will manage
its connections to redundant pairs of Reports or Trends servers.
These parameters are [Type.ClusterName.ServerName]Priority and [Type.Clu-
sterName.ServerName]DisableConnection, where Type is the relevant server type (Report
orTrend). The default setting for these parameters provides behavior as described above,
in that if the client sub system is redirected to a standby server it will retain a connection
to that server, providing that it is operable, even when the primary server is restored.
This is also the behavior that will occur if you do not add these parameters for a given
server type.
The connectivity parameters can be set at the system level using the Parameters form of
the project, or specifically for each pc in the local Citect.ini file.
For a detailed explanation of these parameters see:
[Report.ClusterName.ServerName]Priority
[Trend.ClusterName.ServerName]Priority
[Report.ClusterName.ServerName]DisableConnection
[Trend.ClusterName.ServerName]DisableConnection
315
Chapter 14: Building Redundancy Into Your System
With a primary/standby pair only one server (the primary) updates the database. How-
ever, the display client is able to communicate with both the primary and standby
servers.
On starting up the display client will always attempt to connect to the ‘main’ (primary)
server. By default the alarm server which starts first will become ‘main ‘.
In the event the primary server becomes inoperative (including loss of communication
with the IO Server), the standby server takes over the duties of the primary server and
will process Alarm data and update the database. When the inoperative server resumes
operations, it will communicate with the other alarm server (which is now the main)
and become the standby server.
316
Chapter 14: Building Redundancy Into Your System
During synchronization, the primary server updates the standby server. This ensures
that the standby server contains data that accurately represents the data on the primary
server.
Note: Before starting your system for the first time (i.e. the database is empty) the pri-
mary and standby server should be connected. If not connected when the system
starts, the primary and standby servers may create distinct ids for the same objects.
If you want to choose which server the display client will communicate with use the
[Alarm.<ClusterName>.<ServerName>]Priority. This parameter assigns a higher priority
to either the primary or standby server. In this instance the client on starting up will
communicate with the server assigned the highest priority, regardless if the other server
started first and is therefore the main.
See Also
Reports Server Redundancy
Alarm Server Side Synchronization
317
Chapter 14: Building Redundancy Into Your System
When both Reports Servers are in operation, the scheduled reports only run on the pri-
mary Reports Server. If the primary Reports Server becomes inoperative, the scheduled
reports run on the standby Reports Server (you can also configure the standby Reports
Server so that is also runs the scheduled reports in parallel with the primary Reports
Server). Please be aware that no report data is transferred between the primary and
standby Reports Servers (CitectSCADA does not synchronize the report data because
reports can write their data to any type of device.
See Also
Trends Server Redundancy
318
Chapter 14: Building Redundancy Into Your System
when the File Server becomes inoperative. Therefore, CitectSCADA File Server redun-
dancy will operate correctly with these networks.
Note: Only CitectSCADA switches to a backup path. Any other applications that are
using files on the File Server will become inoperative when the File Server becomes
inoperative. This may cause the computer to wait for long periods for the File Server
(or to itself become inoperative). This includes Windows itself, so install Windows
on a local drive.
To enable File Server redundancy, set the [CTEDIT]Backup parameter to a backup data-
base path. For example, if your primary path is F:\CITECT\USER\DB, set the backup
path to another File Server or a local drive, such as C:\Documents and Settings/All
Users/Application Data/Schneider Electric/CitectSCADA v7.40/User
(Vista and later C:\ProgramData/Schneider Electric/CitectSCADA v7.40/User).
You will want to verify that the project in the Backup path is the same as the one in the
Run directory - each time you compile the project in the run directory copy it into the
backup directory.
Before placing your CitectSCADA system into service, confirm that the Standby File Server
has an identical copy of the current project, and that the [CTEDIT]Backup parameter is cor-
rectly set.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
See Also
[CtEdit]Copy
[CtEdit]Run
319
Chapter 14: Building Redundancy Into Your System
FTP Server redundancy is configured by setting parameters in the [CLIENT] and [DNS]
sections of the Primary FTP Server's Citect.ini file. These parameters are downloaded by
the Internet Display Client (IDC) to its own Citect.ini file if the Primary FTP Server
becomes inoperative, provided the [INTERNET]Redundancy parameter has not been set
to 0 (zero). The IDC then uses the downloaded redundancy information to connect to the
standby FTP Server.
Note: Standby FTP Servers need not be Internet Servers. The Standby FTP Server can
be any server using TCP/IP that the IDC can connect to, provided there are IDC
licenses present in the network.
See Also
Redundancy of Standalone Systems
320
Chapter 15: Communicating with I/O Devices
CitectSCADA can communicate with any control or monitoring I/O Device that has a
communication port or data exchange interface, including PLCs (programmable logic
controllers), loop controllers, bar code readers, scientific analyzers, remote terminal units
(RTUs), and distributed control systems (DCS).
Typical CitectSCADA communications consists of four key parts:
1. A CitectSCADA I/O Server;
2. A target I/O Device;
3. A physical means for transporting messages between them (transport);
4. The messages exchanged between them (protocol).
These components work in unison to expose the inputs and outputs of an I/O Device to
a CitectSCADA system.
l Inputs to the I/O Device provide information about your plant, such as the speed of a
machine, status of a conveyor, or the temperature of an oven.
l Outputs from the I/O Device usually initiate tasks that control the operation of your
plant, such as starting electric motors, varying their speed, or switching valves and
indication lamps.
321
Chapter 15: Communicating with I/O Devices
The transport medium does not need to be a direct cable as shown in the diagram; it can
be any means of carrying the message – such as a high-speed wireless link or an FDDI
network. Similarly, the protocol-specific message could be a simple ASCII message or a
complex object-based message such as DNP 3. Engineers are free to assemble different
combinations of I/O Devices, transports, and protocols.
See Also
The Role of the I/O Server
322
Chapter 15: Communicating with I/O Devices
You usually don't need to read (or write) to every register in the I/O Device: Citect-
SCADA lets you specify which inputs and outputs you want to monitor or control. After
defining these register addresses, you can use them for system control, operator displays,
trend analysis, data logging and alarm indication.
The choice of I/O Device is typically not open to the person engineering the com-
munications system. In most cases, the I/O Device hardware is purchased in advance of
the integration effort, or it is legacy equipment. However, if you have the luxury of
influencing the choice of I/O Devices, communications capability is recommended to be
one of the factors you consider.
Note: I/O devices such as programmable logic controllers (PLCs) usually have an
internal program that controls the low-level processes within your plant. A PLC pro-
gram continually scans the input registers of the PLC, and sets the output registers to
values determined by the PLC program logic. While CitectSCADA can replace any
PLC program, this is not recommended. PLCs are designed for high-speed response
(typically 1 to 100 ms) and replacing this functionality with CitectSCADA could neg-
atively affect your control system’s performance. Only use CitectSCADA to com-
plement your PLC program (that is, for high level control and system monitoring).
Do not use CitectSCADA or other SCADA software as a replacement for PLC-based control
programs. SCADA software is not designed for direct, high-speed system control.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
See Also
The Role of the Transport Medium
323
Chapter 15: Communicating with I/O Devices
Note: Modems are treated as a special case in CitectSCADA since they are rec-
ognized as logical devices by Windows. Refer to the specific online help on setting
up modems.
CitectSCADA uses the ‘COMx’ driver to implement simple serial transports. Similarly,
the ‘TCPIP’ driver implements the Ethernet transport. These are commonly used trans-
port drivers, and both have a range of tuneable options and settings. Each proprietary
board has its own specific transport driver – which is typically integrated with the pro-
tocol driver.
See Also
The Role of the Protocol
Working With Device Drivers
324
Chapter 15: Communicating with I/O Devices
Communication Configuration
CitectSCADA uses a logical and structured communications configuration, that maps
closely to the elements shown in the diagram below.
It requires the engineer to:
1. Define an I/O Server in the I/O Server form;
2. Define the transport type in the Boards form (COMx, TCPIP, PROFI…);
325
Chapter 15: Communicating with I/O Devices
Note: Each of these steps is simplified in order to illustrate the mapping of necessary
elements to the basic communication architecture. In reality, some other tasks need to
be performed to setup communications.
The following diagram shows how the elements in the configuration environment map
to the software components in the runtime system.
Although this is not essential to know, it does help understand how drivers fit into the
system.
326
Chapter 15: Communicating with I/O Devices
Note: This example omits many logical runtime components for clarity (such as
clients). In addition, the runtime components shown are not visible to the user at run-
time. However, driver information can be accessed at runtime via the CitectSCADA
Kernel.
327
Chapter 15: Communicating with I/O Devices
A good place to start when setting up simple communications is with the Express I/O
Device Setup wizard. Once you understand how the setup works, you can manually con-
figure arrangements that are more complex. Much of the functionality of the protocols
and transports can be modified using the driver options and parameters. Each driver
has its own specific section in the online help that will guide you through configuration
options.
See Also
Setting up communications
Working With Device Drivers
Note: Check with Technical Support if new drivers are available that support the
DRI.
The DRI allows a driver to push time-stamped data from field devices into a Citect-
SCADA system. This means time-stamped digital alarms, time-stamped analog alarms
and event-based trends can be updated directly from devices.
No configuration is necessary, as when these drivers start up they scan the system for
time-stamped digital alarms, time-stamped analog alarms and event-based trends. If the
driver receives updated information for any detected tags, it will pass it directly on. Reg-
ular I/O server polling is no longer used.
This mechanism can work in tandem with the tag extension feature (also introduced in
version 7.20) to enable access to field-generated timestamp and quality tag values (see
Tag Extensions).
Note: Prior to version 7.20, time-stamped data was manually pushed into Citect-
SCADA using the Cicode functions AlarmNotifyVarChange and TrnSetTable. If you
are upgrading a project to a version 7.20 system with a driver that uses the new DRI
push mechanism, you will no longer need to use these functions.
IO Server parameters
328
Chapter 15: Communicating with I/O Devices
Events pushed from a DRI-supported driver can be buffered on an I/O server while an
alarm or trend server is offline. The way this mechanism operates can be configured via
the following parameters:
l [IOServer]MaxEventsQueued
l [IOServer]MaxEventsDrop
l [IOServer]MaxTimeInQueueMs
For more information, see IO Server Parameters.
See Also
Communications Configuration
Working With Device Drivers
Setting Up Communications
Setting up communications between a device and a CitectSCADA I/O Server typically
involves a process that includes the following steps:
1. Choose the Method of Communication
By examining the capabilities of your I/O Devices and control systems networks,
select an appropriate communication mechanism. This mechanism will usually
imply the transport and protocol drivers that needs to be con figured in Citect-
SCADA.
See The Role of the Transport Medium and The Role of the Protocol for more infor-
mation.
2. Prepare the Device
Confirm that your device meets the hardware and software requirements needed
to communicate with CitectSCADA. The Driver Reference Help provides hardware
setup information specific to each supported device.
3. Prepare the I/O Server for Communication
This involves preparing the I/O Server to communicate with a device. This
includes setting up a COM port, a serial board, or a proprietary board in an I/O
Server.
4. Create a Test Project
Before configuring your CitectSCADA project, confirm communications between
CitectSCADA and your system devices. Creating a test project allows you to test
the communication path in isolation, and verifies that CitectSCADA can bring
your devices online.
5. Configure communications using the Communications Express Wizard
329
Chapter 15: Communicating with I/O Devices
The Express Communications Wizard provides default values and a setup tai-
lored to the communications requirements of a selected I/O Device.
OR
You can manually configure the communications to your I/O Device using the
Boards, Ports and I/O Devices forms in the CitectSCADA Project Editor. This often
gives more flexibility, but requires a more detailed knowledge of the driver settings
and parameters.
Once you have performed these steps, you are ready to run and verify your com-
munications.
See Also
Customizing a Project Using Citect.ini Parameters
Using a Disk I/O Device
Preparing a Device
You need to verify your system meets the hardware and software requirements needed
to establish communication between a device and CitectSCADA.
This may include a variety of possibilities, including:
l the installation of a proprietary communications card
l the establishment of a device server
l the installation of configuration software, etc.
The Driver Reference Help provides the hardware and software requirements for each
device, and includes any additional information you need to know about setting up spe-
cific devices. To access this help, select Driver Help from the Help menu in Citect
Explorer and Project Editor.
See also
Preparing the I/O Server for communication
330
Chapter 15: Communicating with I/O Devices
1. Verify that the Boards configuration has COMx as theType, and the Address set to
0. The I/O Port, Interruptand Special Opt can be left blank.
2. Enter the Port Number in the Ports configuration. The COM port number will
usually be either 1 or 2, and is set in the Ports section of the Control Panel. Use the
Special Opt field to modify the behaviour of the COMx driver. (See COMx driver spe-
cial options reference for more information).
Note: You only need to define the COMx board once. You can then add several ports
that use the same CitectSCADA board. For example, a COM port and two serial
boards could be defined as one COMx board in CitectSCADA, with multiple ports.
See Also
Debugging a COMx Driver
Using a Serial Board
331
Chapter 15: Communicating with I/O Devices
You can use identical I/O Devices or I/O Devices supplied by different manufacturers;
CitectSCADA supports most popular I/O Devices. You can connect any number of I/O
Devices; the only limitation is the size of your computer. High-speed serial boards are
available for RS-232, RS-422, or RS-485 communication.
If you have several I/O Devices from the same manufacturer and these I/O Devices sup-
port multi-drop communication, you can connect them to an RS-422 or RS-485 high-
speed serial board installed in your computer. (The RS-232 standard does not support
multi-drop communication.)
Not every high-speed serial board supports RS-422. You can use an RS-232/RS-422 or
RS-232/RS-485 converter to achieve the same arrangement.
1. Install the board in your computer and set it up under Windows as per the accom-
panying instructions. Use the latest driver from the board manufacturer.
2. Make sure that the boards configuration has COMx as the Type, and the Address set
to 0. The I/O Port, Interrupt, and Special Opt can be left blank.
3. Enter the Port Number in the Ports configuration. The COM port number is usually
greater than 2 and set in the Ports section of the Control Panel. Use the Special
332
Chapter 15: Communicating with I/O Devices
Options field to modify the behavior of the COMx driver. (See COMx driver special
options reference for more information).
Notes
l If using your computer's COM port, you don't need to install additional software.
l You only need to define the COMx board once. You can then add several ports that
use the same CitectSCADA board. For example, a COM port and two serial boards
could be defined as one COMx board in CitectSCADA, with multiple ports.
See Also
Using Proprietary Boards
333
Chapter 15: Communicating with I/O Devices
Examples:
Note: This option is not available for dialable devices (i.e. when the port number is -1).
l -nt: With some serial interfaces, line interruptions can cause the COMx read thread to
shutdown. If this happens, the driver does not recover after the interruption. How-
ever, with the -nt (no terminate) option set, the thread is not shutdown, allowing the
system to recover when the interruption is rectified.
l -nts: If errors occur when the COMx driver is starting up, it will not terminate, but
will continue attempts to open the COMx port.
l -r: Driver will raise DTR only when transmitting.
l -ri: DTR is raised when there is enough room in the input buffer to receive incoming
characters and drop DTR when there is not enough room in the input buffer.
l -rPRE,POST: When transmitting a message the driver will raise DTR for PRE mil-
liseconds, transmit message, wait for POST milliseconds then drop DTR.
l -sc: Activates software flow control using XON and XOFF
XonLim: A number in bytes. This represents the level reached in the input buffer before the XON character
is sent (30 bytes)
. XoffLim: The maximum number of bytes accepted in the input buffer before the XOFF character is sent.
This is calculated by subtracting (in bytes) 100 from the size of the input buffer
334
Chapter 15: Communicating with I/O Devices
See Also
Using a Com Port
Debugging a COMx Driver
Using a Serial Board
1. Make sure that your Ethernet card is installed correctly and working under Win-
dows.
2. Make sure that the Boards configuration has TCP/IP as the Type, and the Address
set to 0. The I/O Port, Interruptand Special Opt can be left blank.
3. In the Ports form, use the Special Opt field to enter the destination IP address using
the following format:
-Ia -Pn -T
where:
a = the destination IP address in standard Internet dot format. (For example
192.9.2.60)
n = the destination Port number. Often one physical port has several virtual ports,
used for different purposes. Use this option only if you want to override the
default of 2222.
T = forces the driver to use TCP (the default), rather than UDP (-U).
(See TCP/IP driver special options reference for more information)
Leave other fields blank. You can now define your I/O Device units.
335
Chapter 15: Communicating with I/O Devices
Note: You only need to define the TCP/IP board once. You can then add several ports
that use the same CitectSCADA board.
See Also
Using a Serial Board
336
Chapter 15: Communicating with I/O Devices
Note: With some PLCs, a high-speed serial board provides better performance than a
PLC interface board when the system is connected to more than one PLC.
You can mix both PLC interface boards and high-speed serial boards in a single com-
puter. You can, for example, connect a PLC network to a PLC interface board, and
individual I/O Devices to a high-speed serial board.
There are many possible hardware arrangements for a CitectSCADA application. Citect-
SCADA is a flexible system and imposes few restraints on the type (or manufacturer) of
I/O Devices that you can use, or on the way you connect them to the computer.
To set up CitectSCADA to use a proprietary board/software:
If you are using a proprietary board/software (that is, supplied by the PLC man-
ufacturer):
1. Install the board/software in your computer and set it up under Windows as per the
accompanying instructions. Use the latest driver from the manufacturer.
2. If possible, run diagnostics on the board before configuring CitectSCADA to check
that the board works correctly.
3. Check that the I/O Port and Interrupt settings are correct.
4. Configure the Boards and Ports as instructed by the PLC-specific help.
337
Chapter 15: Communicating with I/O Devices
338
Chapter 15: Communicating with I/O Devices
Start the project running. When the kernel appears, double-click the title bar in the Main
window, then double-click the title bar of the kernel. Doing this in order is important, as
it will maximize the Main window, then Maximize the whole kernel. If you don't do this
then you will not see what is happening as the information in the Kernel cannot be
scrolled, and once it is off the screen it is gone. This might require a bit of practice as the
startup procedure might only take 1-2 seconds or less on a fast machine.
Once you have the project running (and assuming that everything worked) the last line
in the Main window in the Kernel will tell you that your I/O Devices are online. Do not
confuse this with the message telling you that your Port channels are online. Citect-
SCADA will first report that it can communicate through the port you have setup, then
report that it can communicate with the I/O Device.
See Also
339
Chapter 15: Communicating with I/O Devices
Note: Each I/O Device/protocol combination requires a unique setup for the boards,
ports, and I/O Devices forms. See the specific Help for each device.
See Also
Express Communications Wizard - introduction
When you create a new I/O Server, CitectSCADA automatically suggests the name
IOServer1. You can enter a different name if you want. The name you specify needs to
be 16 characters or less and use alphanumeric characters (A-Z, a-z, 0-9). You can also
use the underscore character ( _ ).
Note: If you add a new I/O server, you will need to run the Computer Setup Wizard
on the designated computer before you attempt to run the project. This is necessary
to enable the computer to function as an I/O Server.
See Also
Express Communications Wizard - Device selection
340
Chapter 15: Communicating with I/O Devices
See Also
Express Communications Wizard - I/O Device type
See Also
Express Communications Wizard - I/O Device communications selection
341
Chapter 15: Communicating with I/O Devices
Options Description
Connect I/O Device to Check this box to indicate that the I/O Device is a dial-up
PSTN I/O Device (connected to a PSTN - Public Switched Tel-
ephone Network).
Once you have completed your I/O Device setup using this
Wizard, you need to go to the Ports form and change the
Port number to the actual number of the COM port.
Synchronize at The I/O Server will attempt to communicate with the I/O
Device at this time, and then at intervals as defined below.
This time is merely a marker for CitectSCADA. If you run
up your project after this time, the I/O Server won't wait
until the next day to begin communicating. It will operate
as if your project had been running since before the start
time.
342
Chapter 15: Communicating with I/O Devices
Options Description
Phone number to dial The telephone number that needs to be dialed to initiate
contact with the I/O Device.
Note: These values can also be set using the I/O Devices form in the Project Editor.
Examples
343
Chapter 15: Communicating with I/O Devices
Note: If you are multi-dropping off a single modem, use your I/O Devices to issue the
caller ID, not the modem. This is because using the modem to issue the ID will send
the same ID no matter which I/O Device the call is relevant to, which makes it dif-
ficult to identify the I/O Device that triggered the call.
By using the I/O Device to issue the ID, the I/O Server will receive a unique caller ID for
each I/O Device. However, not every I/O Devices are capable of issuing caller IDs. If you
are multi-dropping, use I/O Devices that can issue caller IDs.
Option Description
[Event Com- Cicode to be executed once the modem is connected and the I/O
mands] On Device has come online (that is, before any read or write requests are
connect processed).
[Event Com- Cicode to be executed before the connection to the I/O Device is ter-
mands] On minated (and after read and write requests are processed).
disconnect
Note: These values can also be set using the I/O Devices form in the Project Editor.
See Also
Express Communications Wizard - Link to external database
Option Description
Link I/O Device to an Determines whether or not you want to link the I/O
external tag database Device to an external data source. If you link to an exter-
nal data source, CitectSCADA is updated with any
changes made to the external data source when a refresh
is performed.
Database type The format of the data referenced by the external data
source.
344
Chapter 15: Communicating with I/O Devices
Option Description
External tag database Specify the location of the external database. This could
either be a path and filename of the external data source
for the I/O Device, or the IP address/directory, computer
name, or URL of a data server, etc. (for example
"Work.CSV" or "127.0.0.1", "139.2.4.41\HMI_SCADA"
or "http://www.abicom.com.au/main/scada" or
"\\coms\data\scada").
or
ServerNode=111.2.3.44; Branch=XXX
Add prefix to externally Check this box if you want to insert a prefix in front of the
linked tags names of linked tags in your Variable.DBF.
Tag prefix The prefix that will be inserted in front of the names of
linked tags in your Variable.DBF (for this I/O Device
only). To change the prefix, delete it first, perform a man-
ual refresh, then add the new prefix.
345
Chapter 15: Communicating with I/O Devices
Option Description
Live Update This field is only available if you have installed one of the
CitectSCADAFastLinx products. It controls whether or not
the linked tags in CitectSCADA and an external tag data-
base will be synchronized if either database is changed.
To enable live linking, choose Yes from the Live Update
menu, and verify that the Automatic refresh check box
is not selected. (Live Update and Automatic Refresh are
mutually exclusive.)
See Also
Express Communications Wizard - Serial device
346
Chapter 15: Communicating with I/O Devices
Note: If there is no data to read or write, CitectSCADA will not communicate with an
I/O Device regardless of whether it is defined or not. You need to create a variable
tag and use it before CitectSCADA will do a read request. For example, use an integer
variable to display a number on a page.
347
Chapter 15: Communicating with I/O Devices
Note: You need to add the record to the project database (use the Add Button at the
bottom of the form) or replace the record (use the Replace Button at the bottom of the
form) if you have changed the record.
Boards Properties
The properties of a board depend on the type of board installed in the I/O Server com-
puter.
Note: The term "Board" is a legacy term from the time when most ports on a com-
puter were provided by additional boards. For example, an Ethernet card. The logical
board concept is still useful even though a physical board may not exist (it may be
software).
348
Chapter 15: Communicating with I/O Devices
Note: If more than one board is installed in the same computer, use a different mem-
ory address for each board.
I/O Port
The I/O port address of the Board. 8 characters maximum.
You need to specify the address to match the switch settings on the board when it was
installed in your computer.
Note: If you are using your computer's COM port not enter the port address here.
specify the port number in the Ports form.
Interrupt
The interrupt number used by the Board. This is not necessary if using your computer's
COM port.
Special Opt
Any special options supported by the board. 32 characters maximum. Please check the
Hardware Arrangements Help Topic for your specific I/O Device to see if specific options
are necessary.
Comment
Any useful comment. 48 characters maximum.
Ports Properties
The properties of a port depend on the type of board installed in the I/O Server, and on
the I/O Device connected to the port. Ports have the following properties:
Port Name
A name for the port connected to your I/O Device(s). 31 characters maximum. Each port
needs to have a unique name (i.e. you cannot assign the same Port Name to two ports in
your system). You can use any name, for example: Board1_Port1
If you have more than one board in your computer, you can use the port name to iden-
tify the board, for example: Board2_Port1
Port Number
The port number that the I/O Device is connected to. 4 characters maximum. Do not
assign the same Port Number to two ports on a board, unless connecting to a dial-up
remote I/O Device via a modem (see the note below). Ports on different boards can be
assigned the same number.
349
Chapter 15: Communicating with I/O Devices
If you are using your computer's COM port enter the port number here - the port number
is defined in the Ports section of the Windows Control Panel.
Note: If you are connecting to a dial-up remote I/O Device (via a modem), you need
to define a unique port name on the I/O Server for each dial-up remote I/O Device,
and the port number needs to be -1 for each.
Board Name
The name you used for the board. 16 characters maximum. This is necessary to link the
port to the board. For example Server1_Board1
Baud Rate
The baud rate of the communication channel (between the CitectSCADA I/O Server and
the I/O Device). 16 characters maximum.
Note: The I/O Device hardware and serial board may support other baud rates. If
you do choose an alternative baud rate, verify that both the I/O Device and serial
board support the new baud rate.
Data Bits
The number of data bits used in data transmission. You need to set your I/O Device to
the same value or a communication link cannot be established.
Stop Bits
The number of stop bits used to signify the completion of the communication. You need
to set your I/O Device to the same value.
Parity
The data parity used in data transmission.
Special Opt
Any special options supported by the port. 32 characters maximum. Please check the
Hardware Setup Help Topic for your specific I/O Device to see if specific options are nec-
essary.
Comment
Any useful comment. 48 characters maximum.
350
Chapter 15: Communicating with I/O Devices
1. In the Project Editor, select Communication | I/O Devices. The I/O Devices dialog dis-
plays.
2. In the Name field, type in a name for your I/O Device (PLC). The name needs to be
unique in the CitectSCADA system, unless the I/O Device is defined in other I/O
Servers (to provide redundancy). If redundancy is used, the I/O Device needs to then
have the same I/O Device number and address for each I/O Server. use different I/O
Device names for your primary and standby I/O Devices, otherwise I/O Device
Cicode functions cannot differentiate between them. 31 characters maximum.
3. In the Number field, enter a unique number for the I/O Device (0-16383). 8 characters
maximum. The number needs to be unique in the CitectSCADA system, unless the
I/O Device is defined in other I/O Servers (to provide redundancy). If redundancy is
used, the I/O Device needs to then have the same I/O Device number and address for
each I/O Server. You may use the same device name, but if you want to use I/O
Device Cicode functions, it is easier to have different I/O Device names.
Note: For Numbers, Protocol and Port Type - The same network number is used
for redundancy (as stated above), however this implies that the Protocol is
usually the same (though there maybe some special circumstances where devices
support multiple protocols) and the Port modes are similar. i.e. a real world port
reference, DISKDRV or MEMORY . If DISKDRV is being used, then redundant
units (i.e. the same NUMBER) needs to be DISKDRV. This also applies for MEM-
ORY mode.
4. In the Address field, enter the address of the I/O Device. 64 characters maximum.
What you enter in this field is determined by the type of I/O Device (and protocol)
used, as each has a different addressing strategy.
5. In the Protocol field, select the protocol you are using to communicate to the I/O
Device. 16 characters maximum. Many I/O Devices support multiple protocols,
dependent on the communication method chosen.
6. In the Port Name field, specify the port on the board to which the I/O Device is con-
nected. 31 characters maximum. This is necessary to link the I/O Device to the port.
For example Board1_Port1.
Note: There is a limit of 255 COMx ports on a server. To avoid this limitation
restricting your number of remote I/O Devices, you can connect multiple remote
I/O Devices to the same port as long as communication details (Telephone
number, baud rate, data bits, stop bits, and parity) are identical.
351
Chapter 15: Communicating with I/O Devices
7. In the Startup mode field select the type of I/O Device redundancy:
Standby This channel will remain unused until the I/O Device
configured with the primary channel becomes
inoperative.
Stand- This channel will remain unused until the I/O Device
byWrite configured with the primary channel becomes
inoperative. Write requests sent to the primary chan-
nel are also sent to this channel.
8. In the Priority field type the order standby devices are promoted in if a primary I/O
Device becomes inoperative during runtime. 8 characters maximum.
If there is more than one standby I/O Device configured for a cluster, you can use
this field to give precedence to a particular standby device. If this field is left
blank, priority will be automatically allocated to the device during project com-
pilation, based on the priority settings of other standby devices and/or the order
the devices were configured in.
See I/O Device promotion.
9. In the Memory field, specify whether the I/O Device runs in Memory mode. 8 char-
acters maximum. The default value is FALSE. If you select TRUE, the I/O Device will
be created in memory and its values stored in memory at runtime. This may be
352
Chapter 15: Communicating with I/O Devices
useful if you are testing your system, before connecting physical I/O Devices, as mem-
ory mode stops CitectSCADA from communicating with physical I/O Devices. See
Using Memory Mode.
Note: If a device is configured with Memory set to TRUE, the Port Name and
Address fields can be left blank as they will not be used by the compiler or the I/O
server at runtime.
10. In the Comment field, type in any useful comment. This field is optional and is not
used at runtime.
11. Click Add to add a new record, or Replace to replace an existing one.
See Also
The following fields are implemented with extended forms (press F2).
Linked
Determines whether or not the I/O Device is linked to an external data source. If you link
to an external data source, CitectSCADA is updated with any changes made to the exter-
nal data source when a refresh is performed.
If you disconnect an existing link, you can choose to make a local copy of the tags in the
database or you can delete them from CitectSCADA's variable tags database altogether.
If an I/O Device is linked to an external data source the Database Type, External Data-
base, Connection String, Tag Prefix and Live Update fields will be greyed out.
Database Type
The format of the data referenced by the external data source.
External Database
The path and filename of the external data source for the I/O Device. Alternatively, you
can enter the IP address/directory, computer name, or URL of a data server, etc. (for
example "C:\Work.CSV" or "127.0.0.1", "139.2.4.41\HMI_SCADA" or "http://www-
.abicom.com.au/main/scada" or "\\coms\data\scada").
Click Browse to select a path and filename.
Connection String
353
Chapter 15: Communicating with I/O Devices
Enter a connection string to provide connection details for the data source. This is sim-
ilar to an ODBC connection string. For example:
or
ServerNode=111.2.3.44; Branch=XXX
Note: This field is only available if you have installed one of the CitectSCADA Fast-
Linx products.
Controls whether or not the linked tags in CitectSCADA and an external tag database
will be synchronized if either database is changed. To enable live linking, choose Yes
from the Live Update menu.
When Live Update is enabled and the variable tag database is accessed (for example,
during project compilation or when a drop-down list is populated), CitectSCADA queries
the external tag database to determine if it has been modified. If so, CitectSCADA merges
the changes into the local variable tag database. Conversely, any changes made to the
local tag variable database will be incorporated automatically into the external tag data-
base.
Log Write
354
Chapter 15: Communicating with I/O Devices
Enables/disables the logging of writes to the I/O Device. When enabled, writes are logged
to the SYSLOG.DAT file in the logs folder of the CitectSCADAUser and Data folder
selected during installation, also specified in the INI file as [CtEdit]Logs. See Tag Func-
tions for information about TagWriteEventQue and logging tag data.
Note: Logging writes to every I/O Device may slow communications as the Citect-
SCADA system will be writing large amounts of data to disk. However, logging of
writes is useful when debugging a system.
Log Read
Enables/disables the logging of reads from the I/O Device. When enabled, reads are
logged in the CitectSCADA SYSLOG.DAT file.
Note: Logging reads to every I/O Device may slow communications as the Citect-
SCADA system will be writing large amounts of data to disk. However, logging of
reads is useful when debugging a system.
Cache
Enables/disables data caching. When enabled, a cache of the I/O Device's memory is
retained at the I/O Server, thus improving communications turn-around time.
Note: Data caching has to be enabled for scheduled I/O Devices, but disabled for
memory or disk I/O Devices.
Cache Time
The cache time specified in milliseconds. When caching is enabled, data that is read
from a I/O Device is stored temporarily in the memory of the I/O Server. If another
request is made (from the same or another client) for the same data within the cache
time, the CitectSCADA I/O Server returns the value in its memory - rather than read the
I/O Device a second time. Data caching results in faster overall response when the same
data is needed by many clients.
A cache time of 300 milliseconds is recommended.
The Cache Time for a scheduled I/O Device is automatically calculated. You can view a
scheduled I/O Device's cache time using the Kernel Page Unit command.
Background Poll
Specifies that tags for a particular device are continuously polled at a minimum back-
ground poll rate. The options are True or False. Set this field to True if you are operating
on a slow network, with a slow device, or where tags may normally only be polled
infrequently.
355
Chapter 15: Communicating with I/O Devices
Background Rate
When Background Poll is set to True, specifies the minimum rate by which the device
will be polled. You may select any predefined value from the drop-down list, or enter
your own in the format of HH:MM:SS. If you do not enter a value, the default value of
30 seconds will be used.
Min Update Rate
The DataSource will send tag update value notifications to subscription clients after a
pre-defined period of time expires. You may select any predefined value from the drop-
down list, or enter your own in the format of HH:MM:SS. If you do not enter a value, the
default value of 0 seconds will be used and no update value notifications will be sent.
Staleness Period
Staleness period represents total number of seconds that will elapse after the last update
before extended quality of the tag element is set to "Stale". You may select any predefined
value from the drop-down list, or enter your own in the format of HH:MM:SS. If you do
not enter a value, the default value of 0 seconds will be used and tag elements will not
be set to "Stale".
Note: For further information on Minimum Update Rate and Staleness Period refer to
Reading and Writing Tags.
Scheduled
Determines whether the I/O Device is configured for scheduled communications. This is
normally set using the Express Communications Wizard.
Note: If you do not specify a schedule for a dial-up remote I/O Device, the connection
will be established at startup and will remain connected until shut-down.
356
Chapter 15: Communicating with I/O Devices
The time between successive communication attempts. The period needs to be long rel-
ative to the driver's watchtime and the [Dial]WatchTime. If necessary, decrease these
watchtimes or increase Period to help ensure that Period is more than double the watch-
times.
Examples (based on a Synchronize at time of 10:00:00):
1. If you enter 12:00:00 in the Repeat every field, and start your project at 9 a.m., the I/O
Server will communicate with the I/O Device at 10 a.m., then once every 12 hours
after that, i.e. 10 p.m., then again at 10 a.m. of the following day, etc.
2. If you enter 12:00:00, and start your project at 4 p.m., the I/O Server will communicate
with the I/O Server at 10 p.m., then again at 10 a.m. of the following day, and so on.
The I/O Server will assume that communications were established at 10 a.m., so it
continue as if they had been - communicating once every 12 hours after 10 a.m.
3. If you enter 3 days, and start your project at 9 a.m. on a Wednesday, the I/O Server
will communicate with the I/O Device at 10 a.m., then once every 3 days after that,
i.e. 10 a.m. on the following Saturday, then at 10 a.m. on the following Tuesday, etc.
4. If you enter the 6th of December in the Repeat every, and start your project during
November, the I/O Server will communicate with the I/O Device at 10 a.m. on
December 6, then again on December 6 of the following year, etc.
Select On Startup for a persistent connection. To disconnect a persistent connection, you
need to call the IODeviceControl() function with type 8.
Disconnect Action (254 Chars.)
Cicode to be executed once communication with the I/O Device has been terminated
(and after read and write requests are processed).
Phone Number (64 Chars.)
The telephone number that needs to be dialed to initiate contact with the I/O Device. (i.e.
for dial-up remote I/O Devices)
Caller ID (32 Chars.)
A unique identifier which identifies a remote I/O Device when it dials back to the I/O
Server. The caller ID can be any combination of alpha-numeric characters and/or the
character '_' (underscore).
This ID will only be used if the I/O Device initiates the call to the I/O Server. If the
modem initiates the call, you need to set the caller ID on the modem.
Note: If you are multi-dropping off a single modem, use your I/O Devices to send the
caller ID, not the modem. This is because using the modem to send the ID will send
the same ID no matter which I/O Device the call is relevant to. This makes it difficult
357
Chapter 15: Communicating with I/O Devices
for you to identify the I/O Device that triggered the call.
By using the I/O Device to send the ID, the I/O Server will receive a unique caller ID for
each I/O Device. However, some I/O Devices are not capable of sending caller IDs. If you
are multi-dropping, use I/O Devices that can send caller IDs.
Persist
Set to TRUE or FALSE to indicate if the persistence of the tag cache file is on or off.
Default is TRUE and the data will be written to the XML file as described in "File Name"
below. If one of the primary/standby I/O devices (identified by the same network
number) has persistence set to FALSE, then every device has it turned off.
Persist Period
Indicates how often to persist the XML cache file to disk. Default is 10 minutes
(00:10:00). Normally, the period used is the highest value specified for one of the pri-
mary/standby I/O devices (identified by the same network number).
File Name
Indicates the path to the file on disk where the XML cache will be stored. You can spec-
ify just the path or the path with the actual file name. The default is Data directory using
the format <ClusterName>.<IOServerName><ClusterName>.<IODeviceName>.cache. If
the location cannot be created, then either the default path, default file name or both is
used. Normally, the path used is the first non-empty path specified for one of the pri-
mary/standby I/O devices (identified by the same network number).
See Also
Communicating with Dial-up Remote I/O Devices
358
Chapter 15: Communicating with I/O Devices
l the communication channel used to connect the device to the CitectSCADA I/O
Server.
To add a particular device to your CitectSCADA project, you will need to determine the
driver necessary to support it. If the particular driver is not installed with your current
version of CitectSCADA, you will have to obtain a driver pack and install it separately.
Note: The word ‘driver’ is often used when referring to communications. A driver is
a component piece of software that implements a protocol or transport (or both). Driv-
ers are modular, such that new drivers can be easily ‘plugged-in’ to existing systems.
See Also
Determining Which Driver To Use
Installing a Driver Pack
359
Chapter 15: Communicating with I/O Devices
See Also
Installing a Driver Pack
1. Save the driver pack to an appropriate location on the I/O Server PC.
2. Double-click the EXE file to launch the installation.
3. Follow the instructions provided by the installation Wizard.
4. You are prompted to select the CitectSCADA installation folder. If you installed Citect-
SCADA in a different folder to the default, browse to that location. An alert message
will alert you if you have selected the wrong folder.
5. Click Finish to complete the installation.
After you have installed a Driver Pack, the associated help will be automatically merged
into the Driver Reference Help.
Note: If you are installing a driver pack on an older version of CitectSCADA that pre-
cedes the initial release of the driver, the supporting help may not appear auto-
matically in the Driver Reference Help. If this is the case, you can locate the driver
help in the CitectSCADA bin directory. The help file will be named <driv-
ername>.chm.
See Also
The Driver Update Utility
360
Chapter 15: Communicating with I/O Devices
Note: The Driver Update Utility needs an Internet connection to operate successfully.
It uses a secure 128-connection when connecting to the DriverWeb.
See Also
Installing a driver pack
361
Chapter 15: Communicating with I/O Devices
Note: Always seek the advice of Technical Support personnel regarding undoc-
umented features.
Citect.ini parameters can be used to tune the performance of a CitectSCADA driver and
perform runtime maintenance diagnostics.
You can customize the way CitectSCADA communicates with the a driver (and even
individual PLCs) by creating or editing the section of the Citect.ini file named after a spe-
cific driver, for example, [MODBUS].
There are some ini parameters that are common to every CitectSCADA driver, as well as
custom parameters unique to each driver.
362
Chapter 15: Communicating with I/O Devices
See the Driver Reference Help (Help menu | Driver Help) for the ini parameters related
to each driver, and their default values.
When CitectSCADA starts at runtime, it reads configuration values from the Citect.ini
file that is stored locally. Therefore, any configuration settings needs to be included in
the Citect.ini file located on the computer acting as the I/O Server to the devices in the
system.
By default, CitectSCADA looks for the Citect.ini file in the CitectSCADA project\bin direc-
tory. If it can't find the file there, it searches the default Windows directory.
Note: With the release of version 7.20, a feature called persistence can be applied to
I/O devices in memory mode. Using a Persisted Memory I/O device is recommended
as an alternative to using a disk I/O device, as full synchronization is supported if a
server becomes unavailable for a period of time. See Persisted I/O Memory Mode for
more information.
Once configured, disk I/O devices appear exactly as any other I/O device in your system,
but are not connected to any field equipment. Disk I/O devices can contain any type of
variable supported by CitectSCADA, and you can configure them to emulate any sup-
ported I/O device. You can also specify a generic protocol for a disk I/O device.
A disk I/O device is useful when the status of your plant needs to be restored after a
planned or unplanned system shutdown. You can configure your system to continually
update a disk I/O device with the subset of variables that defines the status of your
plant. When you restart your system after a shutdown, CitectSCADA can restore this
status immediately.
You can also use disk I/O devices for storing predefined data that needs to be recalled
immediately when a process is necessary (for example, in a simple recipe system).
Note: If you create a RAM disk in the computer for the disk I/O device, you are not
required to create or copy the disk file to the RAM disk. CitectSCADA automatically
creates a disk file on startup. Do not set up your Disk I/O device on a RAM disk if
you want the data written to it to survive a power cycle of the Servers.
See Also
Disk I/O Device setup
363
Chapter 15: Communicating with I/O Devices
I/O Device A name or your Disk I/O Device, for example: DISK_PLC. Each I/O
name Device needs to have a unique name in the CitectSCADA system.
I/O Device A unique number for the disk I/O Device (1-4095). Each I/O Device
number needs to have a unique number in the CitectSCADA system.
I/O Device The path and filename of the disk file, for example:
address
[RUN]:DSKDRV.DSK
If you are using redundant disk I/O Devices, specify the path to both
the primary file and the Standby file in the configuration of both disk
I/O Devices.
Primary_File, Standby_File
Primary_File is the name (and path) of the primary disk I/O Device
file. You may use path substitution in this part of the field.
Standby_File is the name (and path) of the Standby Disk I/O Device
file. You may use path substitution in this part of the field.
Notes:
364
Chapter 15: Communicating with I/O Devices
I/O Device If not using redundant disk I/O Devices, leave this property blank.
startup
mode If you are using redundant disk I/O Devices, use either:
StandbyWrite: This disk I/O Device will remain unused until the com-
puter with the primary disk I/O device configured becomes inoperative.
Every write request sent to the primary disk I/O Device is also sent to
this disk I/O Device.
See Also
Redundant Disk I/O Devices
Disk I/O Device Errors
365
Chapter 15: Communicating with I/O Devices
When the system is operating, CitectSCADA reads and writes runtime data to the disk
I/O Device configured in the primary server. It also writes runtime data to the disk I/O
Device configured in the standby server. (CitectSCADA maintains both disk I/O Devices
identically.)
If the primary server becomes inoperative, the Disk I/O Device in the standby server is
activated without interrupting the system. When the primary server becomes active,
CitectSCADA automatically returns control to the primary server, and copies the Disk
I/O Device from the standby server to the primary server. The Disk I/O Device in the
standby server reverts to its standby role.
To define a redundant disk I/O Device:
366
Chapter 15: Communicating with I/O Devices
Errors Message
See Also
Disk I/O Device Setup
Redundant Disk I/O Devices
367
Chapter 15: Communicating with I/O Devices
When applied to I/O Devices in memory mode, persistence provides an improved alter-
native to a disk I/O device, as synchronization is supported in scenarios where a server
becomes unavailable for a period of time.
Many customers use disk I/O devices to provide system-wide global variable tags that
are managed by I/O servers and are persisted to disk to maintain their latest values.
Disk I/O devices take advantage of the standard I/O system redundancy features, such
that, if one I/O server is unavailable, another can provide client(s) with tag values. They
also perform a level of synchronization by using features such as standby write and by
providing redundant paths to the persisted binary data files, so that, at startup of an I/O
server, the latest value can be read into the system from the latest modified data file.
368
Chapter 15: Communicating with I/O Devices
369
Chapter 15: Communicating with I/O Devices
Hardware Alarms
CitectSCADA supports a number of log files that track operational status during run-
time.
The primary log file, syslog.dat, contains a log of system information; from low-level
driver traffic and Kernel messages, to user-defined messages.
The Log Read and Log Write fields in the I/O Devices Properties dialog determine if log-
ging is enabled for each I/O device.
Driver logs are also available. These relate to the operation of a particular driver and are
named accordingly. For example, the ABCLX driver is logged in 'ABCLX.dat'. However
some driver logs may be in differing locations, refer to the help for a particular driver to
confirm the location.
For a description of the available log files and where they are stored, see Log files.
Driver errors
There are two types of driver errors that are logged to syslog.dat:
l generic
l driver-specific
370
Chapter 15: Communicating with I/O Devices
Generic errors are common to many drivers, and are mapped to general hardware
errors.
Driver-specific errors are unique to a particular driver. A driver will convert a specific
error into a generic error so that it can be recognized by the hardware alarm system.
However, if further investigation is necessary, you can refer to a description of the orig-
inal error in the Driver Reference Help. This includes a description of the errors asso-
ciated with each driver.
See the Driver Error Messages in the CitectSCADA Technical Reference Guide.
Citect Kernel
The Citect Kernel is a gateway into the internal workings of CitectSCADA at runtime,
and is provided for diagnostics and debugging purposes.
The Kernel can display several different diagnostic windows each providing an active
view of the CitectSCADA runtime system.
The Citect Kernel Driver window, launched via the Page Driver Kernel command, dis-
plays information about each driver in the CitectSCADA system. The statistics it
presents include read requests, physical reads, digital reads per second, register reads,
cache reads, error count, timeouts, and so on.
See Using the Citect Kernel.
See also
Debugging communications
371
Chapter 15: Communicating with I/O Devices
Example
[COMx]
WritePortName=PORT_1,PORT_2
WriteDebugLevel=1
WriteFileSize=2000
ReadPortName=PORT_1
ReadDebugLevel=1
ReadFileSize=1000
StatusPortName=PORT_2
StatusDebugLevel=1
372
Chapter 15: Communicating with I/O Devices
StatusFileSize=10
File formats
The Write file will adopt the following format:
LINE 1 WRITE Debug file Started PORTNAME Debug Level 1 DOW MONTH DOM
HH:MM:SS.sss
LINE 2 HH:MM:SS.sss
LINES AA BB CC ..
4...
where:
Example:
373
Chapter 15: Communicating with I/O Devices
LINE 1 READ Debug file Started PORTNAME Debug Level 1 DOW MONTH DOM
HH:MM:SS.sss
LINE 2 HH:MM:SS.sss
LINES AA BB CC ..
4...
where:
Example
STATUS Debug file Started PORTNAME Debug Level 1 DOW MONTH DOM
LIN- HH:MM:SS.sss
E1
374
Chapter 15: Communicating with I/O Devices
HH:MM:SS.sss
LIN-
E2
modemStatus X
LIN-
E3
Example
More parameters might be added later, so check the COMx information and the Citect
Knowledge Base regularly.
See Also
Debugging a TCP/IP driver
375
Chapter 15: Communicating with I/O Devices
l [TCPIP]LogTxRx
Log actual data Tx & Rxs besides setup info.
Allowable Values:
1- Enables logging of Tx & Rx
0 - Disables logging
Default value -= 0
l [TCPIP]NoBufferSleepTime
Sleep time in ms to wait AFTER getting a WSAENOBUFS (no system buffers mes-
sage) before reading another buffer. There is no need to adjust this.
Default value: 0
l [TCPIP]PortName
PortName to log.
Default value: * (by default every port is traced)
l [TCPIP]Timeout
Defines the timeout period between connection retries.
Default value: 1000 (ms)
l [TCPIP]PortName.MulticastAddress
This parameter allows you to implement the TCPIP driver option "-
Maa.bb.cc.dd"in the Citect.ini file. This may be necessary if you have run out of
characters in the Special Options field of the Ports Form, which is limited to 16
characters.
You need to specify the following in the Citect.ini file:
[TCPIP]PortName.MulticastAdress = aaa.bbb.ccc.ddd
where:
PortName = the name of the port as entered in the Ports Form
aaa.bbb.ccc.ddd = the multicast Class D IP address
See TCP/IP driver special options reference.
376
Chapter 15: Communicating with I/O Devices
not work, you need to go back to your Windows Networking and fix that.
2. Keep using your Simple As Possible Project (SAPP).
3. Delete any old tcpip.dat files.
4. Set the Debug=1 and Log=1 parameters in your Citect.ini file.
5. Start the project. From the information in the maximized Main window of the Kernel
and the TCP/IP Debug window, you can see if CitectSCADA is sending requests to
your I/O Device to initialize communications with it.
If there are no requests being sent, your software is improperly configured, and check
that there were no errors on startup of CitectSCADA. If there were errors on startup, look
them up in the Help. Also check that your computer is an I/O Server (and that it
matches the one in your project). To do this run the Computer Setup Wizard, and con-
figure the computer for a standalone configuration.
If there are requests, you can see communications between CitectSCADA and Winsock in
a separate window, which displays the requests made by CitectSCADA to connect to the
I/O Device and the corresponding response from the I/O Device. Any errors have a Win-
sock Error code that you can look up in the Microsoft Knowledge Base. If you see a Con-
nection OK message, CitectSCADA will be able to come online.
See Also
Debugging a protocol driver using serial communications
377
Chapter 15: Communicating with I/O Devices
l The request CitectSCADA is sending is not getting to the I/O Device - Check the
Address field in the I/O Devices form, and verify that it is correct. If the I/O Device is
one that needs a unique identifier (such as a node address), or you need some type of
routing path, then verify that it is correct.
Check that you have the same parameters in the Ports form that the I/O Device is
using. If you have 8 data bits and the I/O Device uses 7 data bits, communications
will not work.
Check that your cable is OK. The easiest way to do this is to create a new project
and use the Loopback protocol. You can use this to verify the Tx and Rx lines'
integrity by placing a jumper on these lines. Initially test this with a jumper
between pins 2 and 3 on your PC. Then plug in your cable and test again with the
jumper between the Tx and Rx lines. Keep moving the jumper until it is at the
end of your communications bus. You can find more information on using the
Loopback protocol in the Citect Knowledge Base.
Even if the Loopback protocol shows no errors, your cable might still be respon-
sible for the loss of communications. CitectSCADA usually places a far higher con-
stant load on serial communications than programming software does, this
usually means that CitectSCADA will require much more stringent handshaking
than the programming software. So it is possible that the cable you use to program
your I/O Device works fine for programming, but not for CitectSCADA. Check the
Wiring Diagram for your Protocol in the help.
Another major cause of improper cable connections is 9-pin to 25-pin converters.
Many of these converters are made specifically for serial mice. These typically
only use the Tx, Rx and Ground signals. If you use one of these converters they
do not support any handshaking and will most likely not work for your Protocol.
If the above checks OK, use the parameters for COMx (as mentioned above) to
create log files. Examine these log files and verify that what CitectSCADA thinks it
is sending is actually what it is sending. The log files produced by using these
parameters get their information from a lower level than CitectSCADA and show
you exactly what is going through the COMx driver.
l The Response from the I/O Device is not getting to CitectSCADA - This is unlikely
and usually caused by cabling that is damaged, has insufficient bandwidth, or is con-
nected improperly.. Check your cabling as above. Also, check that you are specifying
everything you need within CitectSCADA. Many protocols require CitectSCADA to
send a unique identifier in its request packet. If this identifier is incorrect then the
response cannot get back to CitectSCADA.
l The I/O Device does not understand the Request - Every CitectSCADA protocol can
check if an I/O Device is running. Typically the protocol attempts to read data from
the I/O Device, usually a status register or other register that is there. However, many
pseudo-standard protocols, such as Modbus, do not conform to the exact
378
Chapter 15: Communicating with I/O Devices
specification for that protocol. Many protocols supplied with CitectSCADA have
some extra parameters to allow you to choose the specific initialization request from
CitectSCADA. These can be found in either the Online Help or the Knowledge Base.
Check with the manufacturer of your I/O Device to confirm that it will respond to the
request that CitectSCADA sends. If you are unsure of the request being sent for initial-
ization, use DebugStr=* to get the actual variable address that CitectSCADA is asking
for in its initialization.
Check the protocol you are using. CitectSCADA may have many different pro-
tocols for communicating to an I/O Device. PLCs such as the AB PLC5 can use dif-
ferent serial protocols, depending on the method you are trying to use. Make sure
you are using the correct one. If you are unsure, try the other possible protocols.
l The I/O Device is not functioning properly - There is usually some sort of software
from the I/O Device manufacturer that can be used to diagnose any problems with
the I/O Device.
See Also
Debugging proprietary board drivers
Test Setup
379
Chapter 15: Communicating with I/O Devices
Test setup
1. Do not configure any other protocols. Temporarily delete other boards and units
while performing this test.
2. Configure a unit for each port to be tested. Make the I/O Devices form look as follows:
l Name: <unique name for the I/O Device>
l Number: <unique network number for the I/O Device>
l Address: NA
l Protocol: LOOPBACK
l Port Name: <the "Port Name" in the Ports form>
3. The following Citect.ini options are supported:
l [LOOPBACK]
LoopBack - Set this to 1 if internal loop-back is to be performed (make sure this is
deleted after running the test). When set to 0, a loop-back connector which ties
pins 2 and 3 together is necessary at each port.
Note: The COMx driver does not support internal loop-back. The external loop-
back is the default mode.
Size - Sets the maximum frame size. The length of each frame transmitted is ran-
dom between 1 to 'Size'-1. The default size is 512.
4. Start up CitectSCADA. Each port will transmit a frame of random length. This proc-
ess is repeated when the entire frame is received.
5. Open the kernel, type "page driver" and press Enter. Type V to set the display mode
to 'verbose'. The following statistics appear:
l Number of characters transmitted.
l Number of frames transmitted.
l Number of characters received.
l Elapsed time in milliseconds.
l Characters received per second.
l Start time in milliseconds.
l Total number of errors.
l Error code of last detected error.
Note: The total number of errors should be 0. If the number of errors reported is
not zero, your serial hardware is not operating properly.
380
Chapter 15: Communicating with I/O Devices
The diagram below shows the loop-back connections to use with RS-422 or RS-485.
381
Chapter 15: Communicating with I/O Devices
Performance Considerations
Many external factors influence the performance of control and monitoring systems. The
capabilities of the computer, the I/O Device(s), and the communication pathway between
them are obvious factors. The faster they can transfer data, the faster your system oper-
ates. (CitectSCADA always attempts to maintain a data transfer rate as fast as the I/O
Device hardware can support.) The data transfer rate is hardware dependent: once you
have installed the hardware, your ability to influence this characteristic is limited.
However, there is one area where you can directly affect the performance of your run-
time system: the arrangement of data registers in the I/O Device(s).
See Also
Caching data
Grouping registers
Remapping variables in an I/O Device
Caching data
On large networked systems with many clients, you can improve communications turn-
around time by using memory caching.
When caching is enabled, data that is read from an I/O Device is stored temporarily in
the memory of the I/O Server. If another request is made (from the same or another
client) for the same data within the cache time, the CitectSCADA I/O Server returns the
value in its memory, rather than rereading the I/O Device. Data caching results in faster
overall response when the same data is necessary by many clients.
A cache time of 300 milliseconds is recommended. Avoid using long cache times (in
excess of 1000 milliseconds), as this may negatively impact the timely delivery of infor-
mation to the system.
Note: Do not use data caching for disk I/O devices as they implement a cache them-
selves.
382
Chapter 15: Communicating with I/O Devices
Normally, upon request from a client, an I/O Server reads status data from an I/O
Device, and passes it back to the requesting client.
If the server receives subsequent requests from other clients before the original data is
returned to the first client, it optimizes the read by automatically sending the original
data back to requesting clients. (Page General Blocked Reads shows this count).
If a client requests the same data immediately after the server returned the data to a
client, the server rereads the device unnecessarily.
Setting the data cache time to 300 ms (or similar) prevents identical repetitive reads
within that cached time frame. If further clients request the identical data from the same
server up to 300 ms after the server has sent that data to an earlier client, the cached
data on the server is sent immediately in response to the subsequent requests.
CitectSCADA also uses read-ahead caching. When the data in the cache is getting old
(close to the cache time), the I/O Server will re-request it from the I/O Device. This opti-
mizes read speed for data that is about to be re-used (frequent). To give higher priority to
other read requests, the I/O Server requests this data only if the communication channel
to the I/O Device is idle.
Note: When read-through caching is enabled for a remote or scheduled I/O Device,
the persistence cache for that device is saved to disk when the active I/O Server dis-
connects from the device. This occurs regardless of the value set in [IOServer]SavePe-
riod. You can enable read-through caching by setting the parameter [Dial]
ReadThroughCache.
See Also
Grouping registers
383
Chapter 15: Communicating with I/O Devices
Grouping registers
When you configure a CitectSCADA system, you need to define each variable (register
address) that CitectSCADA will read when your system is running. When your runtime
system is operating, CitectSCADA calculates the most efficient method of reading reg-
isters. CitectSCADA optimizes communication based on the type of I/O Device and the
register addresses.
When CitectSCADA requests data from an I/O Device, the value of the register is not
returned immediately; an overhead is incurred. This overhead (associated with protocol
headers, checksum, device latency, and so on) depends on the brand of I/O Device, and
is usually several times greater than the time necessary to read a single register. It is
therefore inefficient to read registers individually, and CitectSCADA usually reads a con-
tiguous block of registers. Because the overhead is only incurred once (when the initial
request is made), the overhead is shared across every register in the block, increasing the
overall efficiency of the data transfer.
However, reading a block of registers where only a small percentage of the block is actu-
ally used is also inefficient. If the registers that your CitectSCADA system will read are
scattered throughout the memory of your I/O Device, excessive communication will be
necessary. CitectSCADA needs to either read many contiguous blocks (and discard the
unused registers), or read registers individually, degrading system performance. You can
avoid this by grouping the registers that CitectSCADA will read.
CitectSCADA continually reads registers associated with alarms. (If an alarm condition
occurs, CitectSCADA can display the alarm immediately.) therefore group registers that
indicate alarm conditions.
Registers associated with status displays (objects, trends, and so on) are only read as
they are necessary (that is, when the associated graphics page is displayed) and are
appropriately grouped according to the pages on which they are displayed.
Registers used for data logging are read at a frequency that you define. They are grouped
according to the frequency at which they are read.
The following table shows an ideal register grouping for a CitectSCADA system:
Digital Alarms
Digital status unique to Graphics Page 1 Analog status unique to Graphics Page n
384
Chapter 15: Communicating with I/O Devices
Digital status common to more than one Graph- Analog trends (for data logging) on smallest
ics Page timebase (for example 1 sec)
All other digital status, for example for logging. Analog alarms
While memory constraints and the existing PLC program might impose limitations,
grouping registers into discrete blocks, even if they are not consecutive blocks, will
improve system performance.
When designing your system, allow several spare registers at the end of each block for
future enhancements.
See Also
Remapping variables in an I/O Device
385
Chapter 15: Communicating with I/O Devices
You can also reassign one type of variable (for example, an integer) to another type of
variable (for example, a digital variable).
386
Chapter 15: Communicating with I/O Devices
To remap in CitectSCADA, first create the variables in your project as you would nor-
mally. Then you can set up the remapping, specifying that any variable with an address
in the desired range will be remapped. The I/O Server will redirect the addresses at run-
time as per the remapping instruction.
Note: Not every PLC and/or CitectSCADA driver supports remapping. It is not rec-
ommend unless necessary. Contact Schneider Electric (Australia) Pty. Ltd. Support if
you need to evaluate whether the PLC and/or driver support remapping.
Option Description
CitectSCADA variable The first remapped (CitectSCADA) variable defined in the var-
iable tags database (using the Tags dialog box); for example:
Motor_1_Run.
387
Chapter 15: Communicating with I/O Devices
Option Description
Physical Variable The first physical variable in the PLC, for example: ReMa-
pIntV7. (79 characters maximum).
Remap Read Determines whether to perform the remapping for reads. Set
to TRUE or FALSE.
Note: To determine if the device supports remapped reads or writes, see the I/O
Device data type Help.
388
Chapter 15: Communicating with I/O Devices
See Also
Remapping example
Remapping example
Using the CCM protocol with a GE 9030 PLC, the following remapping could be used to
optimize communication when reading some digital register values. This example is
based on the assumption that the PLC is set up correctly for remapping.
Variable tags database
The digital register values are defined as follows.
Address M1
Address M3
Address M4
389
Chapter 15: Communicating with I/O Devices
Address M16
The address M2 is not used. Skipping addresses does not affect performance.
Remapping database
The remapping is defined as follows.
Length 16
The physical variable is an integer data type; it does not need to be defined in the var-
iable tags database (but it can be).
390
Chapter 15: Communicating with I/O Devices
In this case, reading individual bits within these larger data types is done by reading the
designated data type and getting the CitectSCADA driver to sub-divide it into individual
bits. Writing to bits within the larger data types is more complicated, as writing to one
bit within the larger data type will at the same time overwrite the other bits within that
same data type. To prevent overwriting existing bits when writing a new bit value, a
'read-modify-write' scenario can be used to write to a bit within the larger data type.
Using this approach, the CitectSCADA driver will read the larger data type, modify the
appropriate bit within the larger data type, and then write the larger data type back to
the device.
While the 'read-modify-write' approach is necessary to avoid overwriting existing bits in
the registers of larger data types, it can create an issue if the device being written to is
also configured or programmed to modify these same registers. For example, if a PLC
device modifies the registers of one of its larger data types after the CitectSCADA driver
has read these same registers, but before CitectSCADA has written the modified value,
the changes made by the PLC will be overwritten. This outcome can be avoided if Citect-
SCADA and any devices using these data types are configured so that only one or the
other has write access at any given time.
This 'read-modify-write' method has a serious operational concern: if the device modifies
the larger data type after the CitectSCADA driver has read it, but before CitectSCADA
has written the new value, any changes made by the device are overwritten. This issue
could be serious in a control system, and it is recommended that the device and Citect-
SCADA be configured so that only one of these systems writes to the data types of this
kind.
When the read-modify-write method will be used to alter a data type's bit values, configure
your system so that Citect and the host device do not have simultaneous write access to the
affected memory ranges.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
391
Chapter 15: Communicating with I/O Devices
4. The CitectSCADA driver then changes bit 3 of its copy of the register to 0x0Ah. When
it writes to the PLC, it overwrites the PLC's copy of the whole register (not just the
changed bit). Because the PLC code modified bits 0 and 4 in the interval between
CitectSCADA's read and write, these changes are overwritten.
392
Chapter 15: Communicating with I/O Devices
PLC_VAR = 1234;
Prompt("Variable is " + PLC_VAR : ####);
FUNCTION
TestFunc(INT nValue)
PLC_VAR = nValue;
END
Another side effect of the delays inherent in asynchronous writes to I/O devices is that
you might assume that CitectSCADA has successfully written to the I/O Device, when in
fact the write operation might not yet have been completed or even attempted. In such
cases, it is still possible that a hardware- or configuration-based error will prevent the
success of the write operation. While such an unsuccessful write operation will generate
an error, your Cicode cannot be notified or use the IsError() function because the Cicode
has continued to execute past the initial I/O device write command. Therefore, when it is
important to check the success of a write operation before allowing code execution to con-
tinue, you might insert the function TagRead() after the write and then verify the value of
393
Chapter 15: Communicating with I/O Devices
the variable. TagRead() forces Cicode to re-read the I/O Device variable so that you can
check the new value. TagRead() is a blocking function. It blocks the calling Cicode task
until the operation is complete.
PLC_VAR = 1234;
sTestStr = TagRead("PLC_VAR");
IF sTestStr <> 1234 THEN
Prompt("Write not completed");
END
Here the data will be read from the physical PLC, not from the I/O Server cache, as the
I/O Server will invalidate any cached data associated with a PLC write. This will allow
you to test for a completed write. Please be aware that other Cicode tasks running at the
same time will not be waiting on the TagRead, so they might see the old or new value,
depending on if they are using the same copy of the PLC variable. You can also stop
CitectSCADA from writing to the local copy of the variable by using the function Code-
SetMode(0, 0).
394
Chapter 15: Communicating with I/O Devices
You need to have at least one modem at the I/O Server end, and at least one at the I/O
Device end.
See Also
Modems at the I/O Server
Modems at the I/O Device
I/O Device constraints for multi-dropping
Configuring multidrop remote I/O Devices
I/O Server redundancy for dial-up remote I/O Devices
Troubleshooting dial-up remote I/O Device communications
Dial- Makes calls to remote I/O Devices in response to a CitectSCADA request; for
out example, scheduled, event-based, operator request, and so on. Also returns
calls from remote I/O Devices.
Dial- Only receives calls from remote I/O Devices, identifies the caller, then hangs up
in immediately so it can receive other calls. CitectSCADA then returns the call
using a dial-back or dial-out modem.
Dial- Receives calls from remote I/O Devices and makes scheduled calls to remote I/O
in Devices.
and
dial-
out
Your modem setup depends on your system requirements. When making your decision,
consider the following guidelines:
l If you need to communicate with multiple remote I/O Devices at once, you will need
a separate modem for each I/O Device. Otherwise you'll have to wait as I/O Devices
are contacted one after the other, and incoming calls may be held up.
l If you have scheduled requests to I/O Devices and you also need to urgently return
calls from remote I/O Devices that dial in, you will need at least one modem for each
395
Chapter 15: Communicating with I/O Devices
of these functions. For example, if you have a large number of remote I/O Devices
and you require fast responses by CitectSCADA, provide an additional modem at the
I/O Server. This would reduce the chances of it being engaged when an I/O Device
dials in (say, with an urgent alarm).
l In a big system with many remote I/O Devices or a system where calls from remote
I/O Devices can be time sensitive, it's a good idea to dedicate at least one modem to
Dial-Back. This will give you quick responses to Dial-In calls (from remote I/O
Devices). It also means your dial-out schedules won't be disrupted (if you use the
same modem for returning calls and scheduled calls, the scheduled calls are forced to
wait until the dial-back call is complete).
See Also
Modems at the I/O Device
Example configurations for modems at the I/O Server
Note: Wherever your modem is, you need to verify that its Data bits, Parity, Stop
bits, and Serial Port Speed settings are compatible with the remote I/O Device as
defined by the device's manufacturer or your communications link will not work.
See Also
Modems at the I/O Server
396
Chapter 15: Communicating with I/O Devices
All your remote I/O Devices have the same communication requirements (data bits, stop
bits, parity, and baud rate) - 19200 8 E 1.
You don't expect any important calls from your I/O Devices, or you only have a few
remote I/O Devices. This means you can use a single modem at the I/O Server end. This
modem would be set up to answer and return incoming calls and make scheduled and
other CitectSCADA initiated calls.
To configure your modem, define it in Windows. Assuming that the logical modem is
called 'Standard Modem', configure it as follows:
You would then configure it in CitectSCADA as a dial-out modem and dial-in modem:
Example 2
In this example, your I/O Devices use a total of two different communication spec-
ifications - 9600 7 O 1 and 19200 8 E 1.
You don't expect important calls from I/O Devices or you have only a few I/O Devices.
This means you can get by with a single modem at the I/O Server end. This modem has
to receive and return calls from I/O Devices as well as initiate calls (dial out) to I/O
Devices.
To configure your modem, you need to first define it in Windows (through the Windows
Control Panel). Remember, you're not just defining the physical modem here. You have
to define a separate Windows (virtual) modem for each communication specification.
So far, this gives you two virtual modems - one for 9600 7 O 1 and one for 19200 8 E 1.
However, Windows won't let you define both of these modems as dial-in. It only lets you
define one dial-in modem per port. If you choose the first, it won't be able to receive calls
with the second, and vice versa.
This means you have to set up a separate virtual modem that can answer calls no
matter which communication specification is used. This modem would be set with a
generic communication specification of 9600 8 N 1.
397
Chapter 15: Communicating with I/O Devices
So in Windows, you'll end up with three logical modems (two for Dial-Out and one for
Dial-In). Assuming that the logical modems are called 'Standard Modem' to 'Standard
Modem #3', you would configure them as follows:
Example 3
In this example, there are five different communications frameworks - 9600 7 O 1, 19200
8 E 1, 4800 8 N 1, 9600 8 N 1, and 19200 8 N 1.
If you expect important calls from I/O Devices or you have many I/O Devices, you
would set up three modems at the I/O Server end:
l One on COM3 dedicated to receiving calls from 9600 7 O 1 I/O Devices.
l One on COM2 for dialing out to 4800 8 N 1, 9600 8 N 1, and 19200 8 N 1 I/O
Devices.
l One on COM1 for dialing out to 9600 7 O 1 and 19200 8 E 1 I/O Devices.
The two dial-out modems would return calls as well as initiate calls in response to
scheduled requests, and so on.
398
Chapter 15: Communicating with I/O Devices
To configure your modems, you need to first define them in Windows (through the Win-
dows Control Panel). Remember, you're not just defining the physical modem here. You
have to define a separate Windows (virtual) modem for each communication frame-
work.
Assuming that the logical modems are called 'Standard Modem' to 'Standard Modem
#6', you would configure them as follows:
399
Chapter 15: Communicating with I/O Devices
Example 4
In this example, your I/O Devices use three different communication frameworks: 9600 7
O 1, 19200 8 E 1, and 9600 8 N 1. However, in this example, you are expecting impor-
tant calls from I/O Devices, so you need a modem dedicated to returning calls.
Here you need to configure your modems like this:
l One modem on COM1 to dial remote I/O Devices (for scheduled calls, and so on).
l One modem on COM2 to receive calls from remote I/O Devices.
l One dedicated modem on COM3 to return these calls.
To configure your modems, first define them in Windows (through the Windows Control
Panel). Remember, you're not just defining the physical modem here: you need to define
a separate Windows (virtual) modem for each communication framework. This means
you have to configure:
l Three logical modems on the port to which the physical dial-out modem is attached.
l One logical modem on the port to which the physical dial-in modem is attached.
l Three logical modems on the port to which the physical dial-back modem is
attached.
Assuming that the necessary total of seven logical modems are called 'Standard Modem'
through to 'Standard Modem #7', configure these modems as follows:
400
Chapter 15: Communicating with I/O Devices
401
Chapter 15: Communicating with I/O Devices
402
Chapter 15: Communicating with I/O Devices
Note: If you are multi-dropping and you want to be able to dial in to the I/O
Server, use your I/O Devices to issue the caller ID, not the modem. This is because
using the modem to issue the ID will send the same ID no matter which I/O
Device the call is relevant to. This makes it difficult to identify the I/O Device that
triggered the call.
By using the I/O Device to issue the ID, the I/O Server will receive a unique caller ID for
each I/O Device. However, not every I/O Device are capable of issuing caller IDs. If
multi-dropping, use I/O Devices that can issue caller IDs.
To set up a modem connected to your dial-up remote I/O Devices:
You can connect multiple I/O Devices to the same modem. This means CitectSCADA
can communicate with these I/O Devices one after the other using the same phone con-
nection, rather than hanging up and re-dialing. This will reduce the number of necessary
telephone calls and increase the speed and efficiency of communications.
1. Connect the modem to a PC with a telephony program installed (for example Hyper-
Terminal or PhoneDialer). This is where you will configure the modem to answer
calls from CitectSCADA and/or initiate calls.
2. If the modem is necessary to make calls to CitectSCADA, configure it to initiate the
phone call to a pre-determined CitectSCADA I/O Server Dial-In type modem (fol-
lowing manufacturer instructions).
403
Chapter 15: Communicating with I/O Devices
3. Depending on your hardware either the modem or an intelligent PLC can be respon-
sible for initiating calls to CitectSCADA and identifying the caller. Whichever is
responsible needs to have a caller ID set. The caller ID can be any combination of
alpha-numeric characters and/or the character '_' (underscore).
Some modems have dip-switch settings, and some have initiation strings which
can include auto-dial-up numbers that are stored within the modem's non-volatile
memory. Consult the manual provided with the modem for exact details.
You can use either the Express Communications Wizard or the I/O Devices form
to set the caller ID for an I/O Device.
If multi-dropping off a single modem, use your I/O Devices to issue the caller ID,
not the modem. This is because using the modem to issue the ID will send the
same ID no matter which I/O Device the call is relevant to, making it difficult to
identify which I/O Device triggered the call.
By using the I/O Device to issue the ID, the I/O Server will receive a unique caller
ID for each I/O Device. However, not every I/O Device is capable of issuing caller
IDs. If you are multi-dropping, use I/O Devices that can issue caller IDs.
4. Set the modem's Data bits, Parity, Stop bits, and Serial-Rate to match manufacturer
specifications for communication with the I/O Devices.
Some modems do not allow you to manipulate their communications settings via
methods such as extended AT commands or dip switches. If this is the case, the
only way of setting the necessary values is to communicate with the modem using
the values (for example, via HyperTerminal). Once this is done, the modem
remembers the last values used to communicate with its serial port.
5. Connect the modem to the I/O Devices.
To configure a modem at the I/O Server you need to set it up in Windows and then set it
up in CitectSCADA.
If every one of your I/O Devices are the same, you only have to do this once for each
modem. However, if your I/O Devices talk using different communication specifications
(data bits, parity, stop bits, and serial-rate), your modem has to be able to talk using each
of these details as well. To set this up, you have to create a modem in Windows and
CitectSCADA for each specification. (See Example configurations for modems at the I/O
Server)
To set up a modem in Windows
404
Chapter 15: Communicating with I/O Devices
3. Check the box labeled Don't detect my modem; I will select it from a list, then click
Next.
4. Select Standard Modem Types in the list of manufacturers.
Note: Do not select a brand name modem from the Manufacturers list, even if the
name of the modem you're installing is included in the list. Do not click Have
Disk.
5. Select the Standard xxxx bps modem rate from the list of models to exactly match
the bit per second rate of the I/O Device that is going to be communicating via this
modem. Check the device to determine the device communication rate. If you are still
unsure, select the 9600 bps model. This can be changed later if necessary.
6. Do not click Have Disk. Click Next.
7. Select the COMx Port that the modem is connected to. Click Next.
8. Click Finish. Windows displays the modem in the list of modems on the Modems
Properties form.
9. No option was given for the selection and setting of the Data bits, Parity, or Stop bits
information. The Modems wizard automatically defaults to 8-none-1 for Standard
Modem types. To change these settings to match the Data bits, Parity, Stop bits
requirements of the remote I/O Device, select a modem in the list, then click the Prop-
erties button.
10. Click the Advanced tab and click Change Default Preferences.
11. Click the Advanced tab at the next dialog to gain access to the Data bits, Parity, Stop
bits settings for the modem.
12. Change the Data bits, Parity, and Stop bits settings using the drop-down options, so
that they exactly match those being used by the remote I/O Device and its remote
modem. Don't change any advanced settings. (The default is Hardware flow control.)
13. Click OK. If a modem of the same rate is installed to the same port as an existing
modem, Windows asks for confirmation that you want to install the same thing more
than once. Click Yes to install a duplicate copy of the modem.
14. Preconfigure the modem(s) to be used at the remote dial-up I/O Device(s). These will
be used to test modem configuration settings in the next step.
15. With CitectSCADA not running, confirm that the local and remote modems will prop-
erly communicate with each other by using a terminal communications program
such HyperTerminal or PhoneDialer (both supplied with Windows).
Once the modem(s) are set up and tested with proven communications in Windows,
they can then be set up in CitectSCADA.
To set up a modem in CitectSCADA:
405
Chapter 15: Communicating with I/O Devices
Before completing this procedure, verify that you have set up your modem in Windows
(as described above).
1. Open the Citect Project Editor.
2. Select Communications | I/O Server and scroll to the I/O Server the modem is
attached to.
3. Select Communications | Modems. The Modem Properties dialog will appear.
Option Description
Server Name (16 The name of the I/O Server to which the modem is attached.
Chars.)
Modem Name (64 The name of the modem you are configuring (as it appears in the
chars.) Windows Control Panel | Phone and Modem Options).
Use this modem to Determines whether this modem will be used to initiate calls from
make outgoing calls the I/O Server to a dial-up remote I/O Device. (Dial-Out)
Use this modem to Determines whether this modem will be used to receive calls from
answer incoming a dial-up remote I/O Device. (Dial-In)
calls
The following fields are implemented with extended forms (press F2).
Use this Determines whether this modem will be used to initiate calls from the
modem to I/O Server to a dial-up remote I/O Device in response to a call received
call back I/O from the I/O Device. (Dial-Back)
Devices
Note: CitectSCADA allows you to set up a maximum of 256 modems on the I/O
Server for communication with remote dial-up I/O Devices. Before it can suc-
cessfully establish communication, any targeted remote I/O Devices need to also
be properly configured within CitectSCADA on the I/O Server.
406
Chapter 15: Communicating with I/O Devices
If you set the ring count to 3 on IOServer1 and 4 on IOServer2, IODev_1 will attempt to
call IOServer1. If IOServer1 has not answered the call after 3 rings, IOServer2 will
answer it.
See Also
Troubleshooting dial-up remote I/O Device communications
407
Chapter 15: Communicating with I/O Devices
If the modem at the PC end is configured so that calls are automatically answered even
when your CitectSCADA project is off, data being reported from the I/O devices may be
lost. Therefore, it is recommended that you turn off the PC modem's auto-answer feature
before taking your project offline. To do this, set the following parameter to zero:
Be aware, however, this will also impact applications that might use the modem other
than CitectSCADA, as the modem cannot answer a call while CitectSCADA is not driv-
ing its functionality.
On the modem at the I/O Device end
408
Chapter 15: Communicating with I/O Devices
Scheduled Communications
CitectSCADA allows you to schedule communications with your I/O Devices (regardless
of the type of connection: modem, radio link, etc.). For example, if you have multiple I/O
Devices on a single network or line, you can schedule reads so that the important I/O
Devices are read more often than less important I/O Devices. Alternatively, a water sup-
plier with radio link connections to dam level monitors might schedule hourly level
reads from CitectSCADA in order to conserve band-width.
See Also
Specifying a schedule
Writing to the scheduled I/O Device
Reading from the scheduled I/O Device
Specifying a schedule
To configure scheduled communications with an I/O Device, you need to flag it as a
"Scheduled" device. This is done using the Express Communications Wizard. If your I/O
Device is not capable of scheduled communications, the scheduling options will not be
presented by the wizard.
Note: Scheduled communications will not work for drivers that are designed to han-
dle Report-By-Exception protocols. For communicating with your I/O Device outside
of schedule use the IODeviceControl function.
1. Select the Project Editor (or press the Project Editor icon).
2. Choose Communication | Express Wizard or open Citect Explorer.
3. Double-click the Express I/O Device Setup icon in the Communications folder of the
current project.
4. Follow the instructions to work through the screens, selecting the relevant I/O Device,
and so on. When the scheduling screen displays, check the Connect I/O Device to
PSTN box, even if your I/O Device is not connected via a modem (but leave the
Phone number to dial and Caller ID fields blank).
5. Fill out the schedule fields to achieve the desired schedule. For example (all based on
a Synchronize at time of 10:00:00).
If you enter 12:00:00 in the Repeat every field, and start your project at 9 a.m., the I/O
Server will communicate with the I/O Device at 10 a.m., then once every 12 hours after
that, i.e. 10 p.m., then again at 10 a.m. of the following day, etc.
409
Chapter 15: Communicating with I/O Devices
l If you enter 12:00:00, and start your project at 4 p.m., the I/O Server will com-
municate with the I/O Server at 10 p.m., then again at 10 a.m. of the following
day, etc. i.e. it will assume that communications were established at 10 a.m., so
it continues as if they had been, communicating once every 12 hours after 10
a.m.
l If you enter 3 days, and start your project at 9 a.m. on a Wednesday, the I/O
Server will communicate with the I/O Device at 10 a.m., then once every 3 days
after that, i.e. 10 a.m. on the following Saturday, then at 10 a.m. on the following
Tuesday, etc.
l If you enter the 6th of December in the Repeat every, and start your project dur-
ing November, the I/O Server will communicate with the I/O Device at 10 a.m.
on December 6, then again on December 6 of the following year, and so on.
6. Select On Startup for a persistent connection. To disconnect a persistent connection,
you need to call the IODeviceControl() function with type 8.
7. If your I/O Device is not connected via a modem, you need to go to the Ports form
(select Ports from the Communication menu) and change the Port number to the
actual number of the COM port.
See Also
Writing to the scheduled I/O Device
Note: Don't control hardware using a scheduled I/O Device, as the exact state of the
hardware may not be known. Although you can read the state from the cache, it may
have changed since the cache was created.
410
Chapter 15: Communicating with I/O Devices
Do not use a scheduled I/O device to control hardware in a system managed by Citect-
SCADA.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
See Also
Reading from the scheduled I/O Device
Note: Because the I/O Server reads tags on initiation of communication, the license
point count is increased, even though some of the tags read may not actually be
used.
INT hTask;
// Initiate communications and read tags.
// Sleep time will depend on how fast your
// modems connect.
FUNCTION
DialDevice(STRING sDevice)
INT bConnected = 0;
INT nRetry = 5;
411
Chapter 15: Communicating with I/O Devices
hTask = TaskHnd("");
IODeviceControl(sDevice, 7, 0);
Sleep(20);
WHILE bConnected <> 1 AND nRetry > 0 DO
bConnected = IODeviceInfo(sDevice, 18);
nRetry = nRetry - 1;
Sleep(10);
END
IF bConnected = 1 THEN
WHILE TRUE DO
Sleep(2);
IODeviceControl(sDevice, 16, 0);
END
END
END
// Kill the read task and terminate the connection.
FUNCTION
HangupDevice(STRING sDevice)
TaskKill(hTask);
IODeviceControl(sDevice, 8, 0);
END
You can also force the I/O Server to read data directly from an I/O Device by enabling
Read-Through Caching. With [Dial]ReadThroughCache set, while the I/O Server is con-
nected to a device it will supply data to requesting clients directly from the device. The
cache is not updated during this time, but is refreshed with the most recent device data
just before the server disconnects.
Note: If using modems, you might need to adjust or deactivate the inactivity timer in
your modems to stop them from disconnecting while no data is being read. The inac-
tivity timer is controlled by the S30 register. If your modem doesn't support this reg-
ister, please consult your modem's manual.
412
Chapter 16: Tagging Process Variables
You need to assign a variable tag to each I/O Device variable that CitectSCADA uses in
your runtime system. To define your variable tags, you declare them in the variable tag
database. The variable tag becomes a label, used to reference the data value of the I/O
Device register at the specified address. Using labels has several benefits:
l You do not have to remember the address every time you want to use the variable.
You use the tag name, which has to be logical and descriptive, and therefore less con-
fusing.
l The address in the I/O Device is defined only once. If you change the address, you
only need to update the variable tag definition, not every instance in your con-
figuration.
l You can scale the raw data to an appropriate range in the same declaration.
l You can access extended data value, quality and timestamp information.
You need to define your variables as a specific data type. The most common variables
supported by I/O Devices are digital and integer. CitectSCADA also supports real, string,
byte, bcd, long, and longbcd data types.
After you have defined your variable tags, you can use them to:
l Display objects on a graphics page.
l Store data for trending and analysis. (See Trending Data.)
l Monitor Alarms. (See Using Alarms in SCADA.)
l Control equipment and processes. (See Defining Commands and Controls.)
l Store data in memory (See Configuring Local Variables.)
The most common variables supported by I/O Devices are digital and integer variables,
although some I/O Devices support other numeric variables and strings.
See Also
Tag name syntax
Tag Extensions
Tag Data Types
Tag Browsing
Using structured tag names
Configuring Local Variables
Configuring Variable Tags
Formatting numeric variables
Using arrays
413
Chapter 16: Tagging Process Variables
Tag Naming
CitectSCADA puts a couple of restrictions on the names of variable tags:
l Tags are restricted to using a specific syntax. See Tag name syntax.
l Do not give Tags the same name as Cicode functions within the project or within any
included projects. An error will result during compilation if a tag has the same name
as a Cicode function and is placed on a graphic page. See Defining Variable Tag
Names for a list of restrictions on naming.
In addition, using a tag naming convention will make your project easier and faster to
design, configure, commission, and maintain. See Using structured tag names for rec-
ommendations about naming conventions.
That is, the tag name needs to begin with either an alpha character (A-Z or a-z) or the
underscore character (_). Any following characters needs to be either alpha characters
(A-Z or a-z), digit characters (0 - 9), backslash characters (\), or underscore characters (_).
The use of any other characters will result in a compiler error.
For example, '_MyTag123' and 'my\New\Tag' are both valid tag names, whereas '\Ne-
wTag\' is invalid.
Tag names that begin with a numeric character, such as '12TagName', are only valid if
the INI parameter [General]TagStartDigit is set to 1 (the default value is zero).
Note: The name of an Alarm Tag needs to follow this syntax but the Alarm Name
does not.
414
Chapter 16: Tagging Process Variables
Area_Type_Occurrence_Attribute
Area
The Area section identifies a plant area, number, or name. If you use a prefix that iden-
tifies tags within a particular area, you can easily duplicate CitectSCADA functions
within the area. For example, if you have three boilers with the same controls on each
boiler, you can configure the tags for boiler number one, and copy the tags to boilers two
and three. You then only need to change the area section in the tag names to the area of
the second and third boiler. The remainder of the tags remain unchanged, for example:
If you do not require this facility, you can omit the Area section of the Tag Name to
reduce the number of characters in the tag.
Type
The Type section identifies the Type of parameter, process equipment, or control hard-
ware. The ISA standard naming system is recommended.
415
Chapter 16: Tagging Process Variables
B1_PUMP_101_PV Pump
B1_VALVE_101_PV Valve
Occurrence
The Occurrence section identifies the loop number.
Attribute
The Attribute section identifies the attribute or particular parameter that is associated
with the loop.
B1_TIC_101_SP Setpoint
B1_TIC_101_OP Output
B1_TIC_101_I Integral
416
Chapter 16: Tagging Process Variables
Recommended Attributes
Genies and Super Genies supplied with CitectSCADA use the following attribute con-
vention. If you follow this convention, you can use the Genies without having to modify
them.
417
Chapter 16: Tagging Process Variables
418
Chapter 16: Tagging Process Variables
_DEV Deviation
419
Chapter 16: Tagging Process Variables
Note: To keep the tag names shorter you can omit the underscore, but you would sac-
rifice readability; for example: B1TIC101PV instead of B1_TIC_101_PV.
Tag values can be used with the Cicode Variable data types.
A Cicode variable of INT data type can be used to store Tag data types: BCD, BYTE, DIG-
ITAL, INT, UINT, LONG, ULONG and LONGBCD.
420
Chapter 16: Tagging Process Variables
A Cicode variable of the QUALITY or TIMESTAMP data type can be used to store the
Tag quality and timestamp items.
See Also
Cicode Variable Data Types
421
Chapter 16: Tagging Process Variables
3. Enter the properties, using INT (or Real, BCD, Long, LongBCD) as the Data Type.
4. Click Add to append a new record, or Replace to modify a record.
You need to at least enter the Variable Tag Name, I/O Device Name, Data Type, and
Address fields.
See Also
Variable Tag Properties
Formatting numeric variables
Note: When modifying a variable tag, be aware that if the variable tag was created
using the equipment editor - equipment type workspace, the fields configured will be
grayed out in the variable tag properties form.
Used as part of the equipment hierarchy an item name will help with future migration
of your system and the step towards an object oriented model.
422
Chapter 16: Tagging Process Variables
This field is optional. If not configured, the last 63 characters of the “Variable Tag” field
will be used for the item name. The Variable Tag name allows 79 characters, while item
name has a maximum of 63 characters. This may result in the compiler generating an
alert message if the 'Equipment.Item' name is not unique.
When defining an equipment name and item name the following rules apply:
l There is a limit of 254 characters on the combination of Equipment and Items, includ-
ing the period '.', for example “Equipment.Item” should be 254 characters or less.
l Equipment name needs to exist in the same cluster as the tag.
l Item name needs to follow tag name syntax. E.g. '%', '?', '/', etc. characters are not
allowed as part of the name.
l Equipment and Item path of a tag may not be the same as that of another equipment.
E.g. Equipment1 = part1, Equipment2 = part1.part2, a tag cannot have equipment =
part1 and item = part2 as it will clash with the name of Equipment2.
l Item name may not be the same as tag extension keywords, i.e. Field, Valid, Override,
OverrideMode, ControlMode, Status, V, VT, Q, QT, T.
See also Scenarios of Item Name for additional information regarding this field.
Cluster Name
The name of the cluster to which the tag applies (16 characters). Select a cluster name
from the list of available clusters as defined under Cluster Definitions.
Comment
Any useful comment (254 characters).
Tag Name
You can use any name for a tag (79 characters) provided it follows the Tag name syntax
and isn't the same as the name of a Cicode function within the project or any included
projects (see Defining Variable Tag Names for a list of restrictions on naming). If you
have many tags, use a naming convention (see Using structured tag names). This makes
it easier to find and debug your tags.When the tag name is referenced on a graphics
page, Cicode, etc., it can be used with or without a specific tag element or item.
If you are using distributed servers, the name needs to be unique to the cluster (for exam-
ple, you cannot have the same variable tag name in more than one cluster).
I/O Device
423
Chapter 16: Tagging Process Variables
The name of the I/O Device where the variable is stored (31 characters). If using I/O
Device redundancy, you need to specify the primary I/O Device name here, not the
standby.
Note: Avoid changing the tag's I/O device name from this FORM as the variable.dbf will not be updated.If you
do change the tag's I/O device name you will need to clear the tag's reference fields.
Address
The register address in the I/O Device where the variable is stored (254 characters). The
format and prefix of an address will depend on the protocol configured for the I/O
Device, which can be determined by checking the Protocol field on the I/O Devices form
in Project Editor.
Data Type
The type of I/O Device variable (16 characters). I/O Devices support several data types
that are used to exchange data with CitectSCADA. Because of the lack of an industry
standard, many I/O Device manufacturers use individual naming conventions for their
I/O Device variables. However, every variable corresponds to one of the Tag data types.
Note: If you do not specify a range for your tag, then an out of range alert message
will be generated if you write a value which is outside the range of the type.
You need to specify the correct data type that corresponds to the data type of the I/O
Device variable you are configuring. Each data type has a unique address format. You
need to use this format when you are specifying the address of the variable (as the
Address property).
You will want to verify that you only use data types that are valid for your I/O Device. If
you do not specify a data type, the variable will be treated as 16-bit integer.
CitectSCADA supports concatenation of I/O Device registers. For example, you can
define a real data type (in CitectSCADA) as two contiguous int data types (in the I/O
Device). CitectSCADA reads across the boundary of the two ints and returns a real.
If you use concatenation of registers, the address of the variables needs to be on odd
boundaries or even boundaries. You cannot mix address boundaries. For example, V1,
V3, V5 are valid addresses.
Be careful when using this feature: the I/O Device needs to maintain the integrity of the
second register. (If the I/O Device writes to the second int, the value of the real could be
corrupted.) The structure of some I/O Devices might not support this feature, and might
therefore behave unpredictably.
424
Chapter 16: Tagging Process Variables
Do not mix the use of odd and even variable addresses as boundaries when you are con-
catenating registers.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
The scaled value of the variable (engineering value), not its raw value, is used through-
out the system.
The scaling properties are optional. If you do not specify scaling, Eng Zero Scale defaults
to Raw Zero Scale, and Eng Full Scale defaults to Raw Full Scale; that is, no scaling
occurs.
425
Chapter 16: Tagging Process Variables
A value that is below the specified Raw Zero Scale or above the specified Raw Full Scale
causes an "Out of Range" alert message in your runtime system.
String variables
While numeric variables are more common, some I/O Devices also support ASCII
strings. You can use strings to store text data (for example, from a bar code reader).
All strings needs to be NULL-terminated in the I/O Device. CitectSCADA uses the NULL
character to check for the end of a string, and if no NULL character is present, Citect-
SCADA reads (and displays) any extra characters in memory, after the end of the string.
When you are using a disk I/O Device, you can also specify a string data type for storage
of recipes, or for operator display information.
Not every I/O Device supports strings. However, if your I/O Device does support integer
data types, CitectSCADA can use these integer registers to store ASCII strings in your I/O
Device. CitectSCADA strings can only be stored in contiguous blocks (consecutive reg-
isters), and are stored as an array.
Note: Non printable characters within string tag values will be substituted with
spaces e.g. string [ 0x01, 0x41, 0x10, 0x42 ] will appear as " A B", so cache loading
continues to operate.
To display the data types for an I/O Device, double-click the I/O Devices book from the
Help, select your I/O Device from the list, and then select the Data Types topic.
Linked
The Linked field in the status line of the Variable Tags form reads either Yes or No and
indicates whether or not the variable tag is linked to an external data source. When you
program an I/O Device using software other than CitectSCADA, an external data source
is used to store tag data. Linked variable tags are updated whenever external tag data
changes, meaning you are not required to enter the information again in CitectSCADA.
The following fields are implemented with extended forms (press F2). Note that some of
the fields listed below may be displayed in the previous section of the form.
Raw Zero Scale / Raw Full Scale
The unscaled (raw) values (of the variable) that represent the zero point and full scale
point for the data (11 characters). The raw values are the values that CitectSCADA reads
from the I/O Device.
Eng Units
426
Chapter 16: Tagging Process Variables
(8 characters.) The engineering units that the value represents (for example %, deg,
mm/sec, etc.). This property is optional. If you do not specify engineering units, no engi-
neering units are used.
Format
(11 characters). The display format of the value (of the variable) when it is displayed on
a graphics page, written to a file, or passed to a function (that expects a string). This
property is optional. If you do not specify a format, the format defaults to ####.##.
Deadband
(11 characters). A deadband allows the value of a variable tag to fluctuate within a
defined threshold without updates being sent through the system. This may be useful if
a tag produces many small, insignificant value changes. The threshold is represented as
a percentage of the tag's engineering range. The default value is 0 (zero), which captures
every value change.
For example, if a variable tag has an engineering range of zero to 10000, a deadband of 1
would mean a change in value would have to be greater than 100 (or 1 percent of the
range) to be recognized. If the current value was 5600, the tag in the PLC would have to
change to a value greater than 5700 or less than 5500 before an update would be sent
through the system.
The deadband setting for a variable tag will not apply to an associated trend tag. If a
trend tag requires a deadband setting, it should be configured independently in the trend
tag properties.
Historize
This field enables you to automatically historize and publish the specified variable tag
in Schneider Electric's Historian application.
If you set this field to "TRUE", the variable will be included in an automated con-
figuration process within the Historian environment. If you set the field to "FALSE" (or
leave it blank), the variable will not be included.
Custom 1...Custom 8
A user-defined string can be used for storage of static information. Information contained
within custom1..8 can be used for categorization purposes, as such, it does not usually
change during runtime.
See Integration with Historian.
427
Chapter 16: Tagging Process Variables
& * ** -
/ + < <=
NOT OF OR PROGRAM
l Cicode function names. See Functions Reference for an entire list of Cicode functions.
Using reserved words or Cicode function names may cause a syntax error.
428
Chapter 16: Tagging Process Variables
Note: If the tag name exceeds the length limit of 254 characters the hardware alarm
"Tag name exceed length limit" will be raised.
See also
Variable Tag Properties
CtAPI Functions
Format specifiers
Format specifiers are keyboard characters that you use to define the format for the
numeric variable. The specifiers that you can use are:
0 Zero Padding
- Minus Justification
EU Engineering units
S Exponential notation
429
Chapter 16: Tagging Process Variables
430
Chapter 16: Tagging Process Variables
Changing justification
By default, numeric variables are right-justified (within their field). You can change the
default justification by using a minus (-) sign as the second character in the format
string, for example:
Format: #-###
This format string displays:
Note: If you do not specify an engineering unit for the variable, only the number is
displayed (or logged).
431
Chapter 16: Tagging Process Variables
In this example, CitectSCADA displays the number in exponential notation format, for
example: 1.234e+012.
See Also
Using arrays
Using arrays
An array is a collection of variables (all of the same data type) that are stored in con-
secutive memory registers in your I/O Device. Numeric arrays are useful when you have
separate devices (or processes) performing similar functions. You can program the I/O
Device to store, in consecutive memory registers, variables that relate to each of these
processes, for example:
432
Chapter 16: Tagging Process Variables
Here, five consecutive variables (V500, V501, V502, V503, and V504) store the conveyor
speed of five conveyors (1 to 5). Instead of configuring five separate variable tags (one
for each conveyor), you can configure a single tag, as an array.
To specify a single variable tag for an array, define the first address and add the size of
the array (the number of consecutive addresses) to the register address, for example:
Address V500[5]
Here, five register addresses are referred to by the variable tag Conveyor_Speed.
<Tag Name>[Index]
For example, to refer to the third variable of the array in the above example (Conveyor
3), use the following syntax:
The index of the first entry of an array is always 0 (zero). In this example, Conveyor_
Speed[0] is the first entry of the array (Conveyor 1), and Conveyor_Speed[4] is the last
entry (Conveyor 5).
Note the following when using arrays:
433
Chapter 16: Tagging Process Variables
l Do not define large arrays, because each time an individual array entry is requested,
CitectSCADA reads the entire array from the I/O Device. With large arrays, system
performance could be reduced.
l The size of the array needs to be less than the maximum request length of the pro-
tocol. The I/O Device description help topic (for your I/O Device) displays the max-
imum request length of the protocol.
l declare digital arrays on a 16 bit boundary. CitectSCADA rounds each digital array
down to the nearest 16 bit boundary. Consequently, digitals in the array are changed.
For example, if you declare an array Test to start at bit 35, and CitectSCADA starts
the array at bit 32. The index to the array also starts at bit 32; Test[0] refers to bit 32,
not bit 35.
l Each individual array entry has its own data value for the field, valid and override
elements, but the entries within an array share the override and control mode ele-
ments, quality and timestamps. Reading the quality or timestamp for an indexed
array entry will return the quality or timestamp for the entire array. Writing to the
value for an indexed array entry will change the timestamps and quality for the
entire array. Changing the override mode and the control mode for an array entry
will change it for the entire array.
See Also
Tag Extensions
String arrays
If you are using a CitectSCADA string data type, you need to specify an array of integer
data types. One int register stores two string characters.
To calculate the size of an array (for string data types), use the following formula:
The last element of the array is always used to store the null character '\0'. This char-
acter marks the end of the string.
To store the word "Recipe", you need to specify an array with 4 elements, for example:
Address V500[4]
434
Chapter 16: Tagging Process Variables
You can then refer to the entire string by specifying the tag:
<Tag Name>
For example:
To store the word "Recipes", you would also specify an array with 4 elements. The char-
acters are stored as follows:
Note: If your I/O Device supports string data types, you need to specify the address
in the format determined by the I/O Device you are using.
See Also
Using structured tag names
435
Chapter 16: Tagging Process Variables
1. In Project Editor, select Tags | Local Variables. The Local Variables dialog displays.
2. In the Name field, enter a name for the local variable. Variable names cannot include
the '-', '/', '%' or <space> characters.
3. In the Data Type field (16 characters), select one of the following supported data
types:
436
Chapter 16: Tagging Process Variables
bytes 1.7e308
Numeric and digital variables have a default value of 0 and string variables default to ""
(empty string). If you do not specify a data type, the local variable will be treated as 16-
bit integer.
4. In the Array Size field (8 characters), enter the size of the array (number of elements)
used to store the local variable. The array will be of the data type specified in the
Data Type field. The array can be one or two-dimensional. Up to 32766 elements can
be used, which, for a two dimensional array, means that the size of the first dimen-
sion multiplied by the size of the second is less than or equal to 32766. When spec-
ifying a multi-dimensional array, separate the dimensions with a comma, for
example "20,30"."
5. In the Zero Scale field (11 characters), enter the value of the local variable that rep-
resents the zero point for the data. The zero scale value is used as the lower limit for
trend and bar graphs, and values below the zero scale value will cause an "Out of
Range" alert message in the runtime system.
6. In the Full Scale field (11 characters), enter the value of the local variable that rep-
resents the full scale point of the data. The full scale value is used as the upper limit
for trend and bar graphs, and values above the full scale value will cause an "Out of
Range" alert message in the runtime system.
7. In the EngUnit field, enter the engineering units that the value represents (for exam-
ple %, deg, mm/sec, etc.). This property is optional. If you do not specify engineering
units, no engineering units are used.
8. In the Format field, Enter the display format of the value (of the variable) when it is
displayed on a graphics page, written to a file, or passed to a function (that expects a
string). This property is optional. If you do not specify a format, the format defaults to
####.#.
9. In the Comment field, enter any useful comment. This property is optional and is not
used at runtime.
10. Click Add.
See Also
Configuring Variable Tags
437
Chapter 16: Tagging Process Variables
Tag Browsing
Tag browsing enables you to browse a list of variable tags owned by a data source at
runtime, in the same way that you can with alarm and trend browsing. Once a tag
browsing page has been created in the Graphics Editor during development it will be
available to the runtime operator. The tag browsing page can present any of the fol-
lowing information to the operator:
l Any configuration field available on the Variable Tag form and including a newly
added Equipment Field.
l Some fields available from the Cicode functions of TagInfo and TagInfoEx.
l Tags which are in Override Mode.
l Tags which are in Control Inhibit Mode.
l The Number of current subscriptions.
Tag browsing enables you to browse to the tag element level only, for example, '.field'.
Refer to the TagBrowseOpen Cicode function for a list of supported fields.
For more details on the above Value, Quality, Timestamp tag elements and sub elements
refer to the Tag Extension topic.
See also
The Browsing Session
Opening a Browsing Session
438
Chapter 16: Tagging Process Variables
l Data Source priority (higher priority is picked over a lower one, with highest being 1
– for primary I/O device)
If records from different I/O servers fully match on “best device status” the browsing rec-
ords are taken on the first-come basis. Be aware that there may be project inconsistencies
(on different machines) which can affect tag browsing functionality. This can occur if a
project is being updated across a number of servers, but only gradually, so there may
exist several versions of the project across the network. Tag Browsing will try to rec-
oncile the conflicting data the best way possible, but in such cases check that the
returned data is correct.
For each server session the client keeps track of how many records are expected, and
what the last record received was. The TagBrowseNext Cicode function will either cause
the client to look at the next cached record which was received earlier and fully rec-
onciled, or request the next batch of records from the I/O servers.
If a a communication disruption occurs during the browsing process, or when the client
explicitly closes the browsing session, the session will be terminated.
See also
Tag Browsing
Opening a Browsing Session
439
Chapter 16: Tagging Process Variables
Sort Order
Browsing Filter
A browsing filter can be used to specify the records to return during the browsing ses-
sion, using a set of predefined field names, shown below, within a regular expressions
separated by a semicolon. For example, the filter “NAME=Tag_IO_*;TYPE<2” would
result in requesting all tags from all clusters where the tag name matches the pattern
“Tag_IO_*” and tag type is 0 (DIGITAL) or 1 (INTEGER). 1). If you do not specify a filter
string then all tag records will be displayed.
If any of the filter names are invalid, opening a browsing session will not succeed and
will return an invalid handle.
See also
The Browsing Session
Opening a Browsing Session
Browsing Field
Clusters
Sort Order
Browsing Field
Fields are specified using a set of predefined field names, separated by a comma. For
example, “TAG,TYPE,ENG_UNITS”. Each browsing record arriving from the server in
response to the request will be represented as a list of key-value pairs. At least one field
should be specified. If any of the fields are invalid, opening a browsing session does not
succeed.
Only the fields explicitly asked for will be available for the TagBrowseGetField function.
The only exception to this are the fields mentioned within the sort order since record sort-
ing takes place on both the server and the client and sorting cannot be done on a field
which is not available on the client.
See also
The Browsing Session
Opening a Browsing Session
Browsing Filter
Browsing Clusters
Sort Order
440
Chapter 16: Tagging Process Variables
Sort Order
You can optionally include a preferred sort order for the fields returned in the browsing
session, each field being indicating if A – ascending or D – descending). For example
"TYPE:D". By default tag browsing records are sorted by the tag primary key which is
Cluster.TagName. which is implicitly appended to the list of sorting fields, since the
other fields may end up not being unique.
Tag records are sorted on the server, and arrive at the client in the order specified by the
sort order parameter, or the default sorting order.
See also
The Browsing Session
Opening a Browsing Session
Browsing Filter
Browsing Clusters
Browsing Field
Browsing Clusters
An optional parameter can be included using a comma delimited string that specifies
the clusters containing tags to be included in the browse session. An empty string indi-
cates that the all clusters will be browsed.
See also
The Browsing Session
Opening a Browsing Session
Browsing Filter
Browsing Field
Sort Order
Tag Extensions
A variable tag is a representation of data elements. Each element provides access to a
view of the data value for the tag.
Each variable tag can be used on its own or by referencing a particular element to access
the following information:
Element Description
.field The field element, which represents the latest field data received from
the device (see Reading Tag Values).
.valid The valid element, which represents the last field data which had
441
Chapter 16: Tagging Process Variables
Element Description
.override The override element, which represents the overridden tag value (see
Controlling and Overriding Tag Values).
.overridemode The override mode, which is used to set the override behavior of the
tag (see Override Mode).
.controlmode The control mode, which is used to set the control inhibit mode of the
tag (see Control Inhibit Mode).
.status The tag status element, which is used to represent the current status
of the tag (see Tag Status).
The tag and each element have items that can be referenced to access the following infor-
mation:
Item Description
v The value, which will access the data value of the tag or element.
vt The value timestamp, which will access the timestampof when the
value last changed.
q The quality, which will access the quality quality of the value, either
GOOD, UNCERTAIN or BAD. You can access further detail from the qual-
ity using the Cicode Quality functions.
qt The quality timestamp, which will access the timestamp of when the
quality last changed.
The timestamp, which will access the timestamp of when the tag or ele-
t
ment was last updated.
Element The optional element name. If the element name is not specified, the
requested element will be determined at runtime.
Item The optional item name. If the item name is not specified, the whole ele-
ment is referenced.
The array index is at the end of the reference (MyArray.v[n], MyArray.Field[n], MyAr-
ray.Field.v[n]). There is only a single quality and timestamp for each array, each member
will return the same quality and timestamp.
442
Chapter 16: Tagging Process Variables
Note: Consider the impact on network traffic when configuring tag extensions, as the
distribution of quality and value timestamps increases the amount of data being sent
between servers.
1. Reference the tag data by using only the tag name, for example ‘MyTag’ (unqualified
tag reference). This will provide default access to the Field element information, unless
the tag is in one of the override modes.
2. Reference the tag data by using the tag name and the item name, for example
‘MyTag.q (unqualified tag reference). This will provide access to the item information for
the tag, either default from Field or Override element.
3. Reference the tag data by using the tag name and the element name, for example
‘MyTag.Field’ (qualified tag reference). This reference will provide access to the specific
tag element information.
4. Reference the tag data by using the tag name, element name and the item name, for
example ‘MyTag.Field.vt’. This reference will provide access to the specific tag element
item (qualified tag reference).
You can also access alarm data similar to tag data. See Using Alarm Properties as Tags.
Controlling Tag Extension behavior
By default, the tag data referenced without an element will provide access to the data
value when the value is of quality is good and an error (#BAD, #COM, etc) when the
quality is bad. The configuration parameter PageIgnoreValueQuality can be used to
change this behavior, including automatically changing the background color of text and
number graphics objects on a page with changes in quality of the tag.
The Tag Extensions behavior is controlled by several citect.ini file settings which are
described in the Parameter Help file. For each of these settings there is a corresponding
setting in the parameters database (param.dbf). A citect.ini file setting specifies behavior
for a particular machine and a parameter database setting is applied system-wide. The
citect.ini file setting can be entered using the Computer Setup Editor, the parameter data-
base settings are configured in the CitectSCADA Project Editor from the System, Param-
eter menu.
Note: By default, the TagSubscribe Cicode function is set to retrieve "lightweight" tag
values that exclude quality and value timestamps. If you need a subscription to
retrieve timestamp data, you need to set the "bLightweight" argument to 0 (false).
See Also
The Quality Tag Element
Reading and Writing Tags
443
Chapter 16: Tagging Process Variables
Cicode label
Value Description
name
QUAL_BAD 0x00 Value is not useful for reasons indicated by the Substatus Bit
Field.
QUAL_UNCR 0x01 The Quality of the value is uncertain for reasons indicated by the
Substatus Bit Field.
These can be accessed from a text object on a graphics page at runtime or with Cicode
using the QualityGetPart Cicode function and the necessary Part parameter.
Within each of these quality values is a second, substatus layer, and a third extended
substatus layer. These layers of information listed below can also be accessed using the
QualityGetPart Cicode function.
l QUAL_BAD Substatus Values
l QUAL_UNCR Substatus Values
l QUAL_GOOD Substatus values
There is also the additional informational value of "Quality Limit" and "Tag Status"
accessed using the QualityGetPart Cicode function or the appropriate function shown
below.
Quality Limit
Cicode label
Value Description
name
444
Chapter 16: Tagging Process Variables
Cicode label
Value Description
name
HIGH
Cicode label
Value Description
name
Cicode label
Value Description
name
QUAL_BAD_SEN- 0x04 An inoperative sensor has been detected (the ‘Limits’ field can
SOR_FAILURE provide additional diagnostic information in some situations).
QUAL_BAD_ 0x05 Communication has been lost, however, the last known value is
LAST_KNOWN_ available. The age of the value may be determined from the
VALUE TIMESTAMP in the OPCITEMSTATE.
QUAL_BAD_ 0x06 Communication has been lost. There is no last known value
COMM_FAILURE available.
QUAL_BAD_OUT_ 0x07 The block is off scan or otherwise locked. This quality is also
OF_SERVICE used when the active state of the item or the group containing
the item is InActive.
445
Chapter 16: Tagging Process Variables
Cicode label
Value Description
name
QUAL_BAD_WAIT- 0x08 After items are added to a group, it may take some time for the
ING_FOR_INI_ server to actually obtain values for these items. In such cases,
DATA the client might perform a read (from cache), or establish a
ConnectionPoint based subscription and/or execute a refresh
on such a subscription before the values are available. This
substatus is only available from OPC DA 3.0 or newer servers.
See Also
QUAL_EXT Substatus Values
QUAL_GOOD Substatus Values
QUAL_UNCR Substatus Values
The Quality Tag Element
Cicode label
Value Description
name
QUAL_UNCR_ 0x01 Whatever was writing this value has stopped doing so. Regard
LAST_USABLE_ the returned value as ‘stale’. This differs from a BAD value with
VALUE Substatus 5 (0x14) (Last Known Value). This status is asso-
ciated specifically with a detectable communication error on a
‘fetched’ value and indicates the failure of some external source
to ‘put’ something into the value within an acceptable period of
time. The age of the value can be determined from the TIMES-
TAMP in OPCITEMSTATE.
QUAL_UNCR_ 0x04 Either the value has ‘pegged’ at one of the sensor limits (in
SENSOR_NOT_ which case, set the limit field to 1 or 2) or the sensor is other-
ACCURATE wise known to be out of calibration via some form of internal diag-
nostics (in which case,set the limit field to 0).
QUAL_UNCR_ 0x05 The returned value is outside the limits defined for this param-
ENG_UNIT_ eter. In this case the Limits field indicates which limit has been
EXCEEDED exceeded but does NOT necessarily imply that the value cannot
move farther out of range.
QUAL_UNCR_ 0x06 The value is derived from multiple sources and has less than the
SUBNORMAL necessary number of Good sources.
See Also
QUAL_EXT Substatus Values
446
Chapter 16: Tagging Process Variables
Cicode label
Value Description
name
QUAL_GOOD_ 0x06 The value has been Overridden. Typically this is means the input
LOCAL_OVER- has been disconnected and a manually entered value has been
RIDE "forced".
See Also
QUAL_EXT Substatus Values
QUAL_BAD Substatus Values
QUAL_UNCR Substatus Values
The Quality Tag Element
Cicode label
Value Description
name
QUAL_EXT_ 0x01 The device is a scheduled device that is offline and no cache
SCHEDULED_ value is available.
OFFLINE
447
Chapter 16: Tagging Process Variables
Cicode label
Value Description
name
QUAL_EXT_ 0x0C The requested cluster is not known or no clusters are available.
CLUSTER_NOT_
FOUND
QUAL_EXT_ 0x10 Tag element value not replicated to every redundant DataSource.
VALUE_NOT_
REPLICATED
QUAL_EXT_ 0x12 Waiting for initial tag value from the DataSource.
WAITING_FOR_
INI_DATA
448
Chapter 16: Tagging Process Variables
Cicode label
Value Description
name
See Also
QUAL_BAD Substatus Values
QUAL_GOOD Substatus Values
QUAL_UNCR Substatus Values
The Quality Tag Element
449
Chapter 16: Tagging Process Variables
Tag data from the DataSource cache is periodically saved to disk. When the time comes
to save the file, a temporary file is used, which after it is written simply gets renamed to
the original file name. This is done to avoid partial master file updates or corruption. If
the DataSource is shutdown abruptly, some tag value changes that are waiting to be per-
sisted to disk may get lost. The Field data are currently saved to disk.
The Tag cache file is saved in an XML format, as shown here, preserving the necessary
information about each tag’s value, quality, and timestamp. On load the original per-
sisted quality is substituted by BadLastKnown quality value. The file is saved in the
CitectSCADA Data directory using the name format of:
<ClusterName>.<IOServerName>.<IODeviceName>.cache
If during the file load the schema validation is unsuccessful, the entire file is considered
invalid and the tags LKVs are lost. If during the file load a particular tag’s value, qual-
ity, or timestamp is invalid, the corresponding invalid entry is simply ignored (and
logged as such). Persistence is configurable within the extended section of the Citect-
SCADA I/O Devices properties dialog.
The DataSource will send tag update value notifications to subscription clients after a
pre-defined period of time expires. The configuration of the minimum update rate period
is performed via the IODevice configuration dialog. Devices that are configured for
redundant operation needs to have minimum update rate set according to the rules spec-
ified in the table below.
When an I/O Data Consumer does not get a tag element value update from the Data-
Source for a specific period of time, as specified by the Staleness period, the tag element
value is considered to be “stale”. The Extended Quality Substatus QUAL_EXT_STALE
will indicate this condition. Processing of staleness period for tags is performed on the
client side of the connection.
450
Chapter 16: Tagging Process Variables
Configuration can be performed on the server using the IODevice properties dialog, or
on the client using Citect.ini parameters.
Staleness Period
The Staleness Period represents the total number of seconds that will elapse after the last
update before extended quality of the tag element is set to “Stale”. It can be configured
on both the server and client. The server configuration is specified in the table above. For
client configuration details refer to the ClientStalenessPeriod parameter.
Staleness Period Tolerance
Staleness Period Tolerance represents the percentage of the staleness period within a
total of which time a check or stale client tag elements will be performed. The default
value is 10%, which caters for a large number of configuration scenarios. You can reduce
or increase the tolerance as necessary by your particular scenario by configuring this
value in the client machine’s using the ClientStalenessPeriodTolerance parameter. This
parameter is not available for server configuration.
Example:
In order to reduce CPU load on the client machine,the default Staleness Period Tolerance
is 10%. This means that if staleness period is set to 600 seconds, a check for stale client
tag elements will be performed every 60 seconds.
<xs:simpleType name="DataType">
<xs:restriction base="xs:string">
<xs:enumeration value="Boolean" />
<xs:enumeration value="SByte" />
<xs:enumeration value="Byte" />
<xs:enumeration value="Char" />
<xs:enumeration value="Double" />
<xs:enumeration value="Int16" />
<xs:enumeration value="Int32" />
451
Chapter 16: Tagging Process Variables
<xs:simpleType name="ElementName"
<xs:restriction base="xs:string">
<xs:enumeration value="" />
<xs:enumeration value="Field" />
<xs:enumeration value="Valid" />
<xs:enumeration value="Override" />
<xs:enumeration value="OverrideMode" />
<xs:enumeration value="ControlMode" />
<xs:enumeration value="Status" />
</xs:restriction>
</xs:simpleType>
<xs:complexType name="DataSource">
<xs:sequence minOccurs="1" maxOccurs="1">
<xs:element name="properties" type="PropertyCollection">
<xs:unique name="UniquePropertyName">
<xs:selector xpath="dsps:property" />
<xs:field xpath="@name" />
</xs:unique>
</xs:element>
<xs:element name="tags" type="TagCollection">
<xs:unique name="UniqueTagName">
<xs:selector xpath="dsps:tag" />
<xs:field xpath="@name" />
</xs:unique>
</xs:element>
</xs:sequence>
</xs:complexType>
<xs:complexType name="PropertyCollection">
<xs:sequence minOccurs="0" maxOccurs="unbounded">
<xs:element name="property" type="Property" />
</xs:sequence>
</xs:complexType>
<xs:complexType name="TagCollection">
<xs:sequence minOccurs="0" maxOccurs="unbounded">
<xs:element name="tag" type="Tag" />
</xs:sequence>
</xs:complexType>
<xs:complexType name="Property">
<xs:simpleContent>
<xs:extension base="xs:string">
<xs:attribute name="name" type="xs:string" use="necessary" />
452
Chapter 16: Tagging Process Variables
<xs:complexType name="TagElement">
<xs:sequence minOccurs="1" maxOccurs="1">
<xs:element name="v" type="Value" />
<xs:element name="q" type="Quality" />
<xs:element name="t" type="xs:dateTime" />
<xs:element name="qt" type="xs:dateTime" />
<xs:element name="vt" type="xs:dateTime" />
</xs:sequence>
<xs:attribute name="name" type="ElementName" use="necessary" />
</xs:complexType>
<xs:complexType name="Value">
<xs:sequence minOccurs="1" maxOccurs="unbounded">
<xs:element name="item" type="xs:string" />
</xs:sequence>
<xs:attribute name="type" type="DataType" use="necessary" />
<xs:attribute name="size" type="xs:positiveInteger" use="necessary" />
</xs:complexType>
<xs:complexType name="Quality">
<xs:sequence minOccurs="1" maxOccurs="1">
<xs:element name="generic" type="xs:integer" />
<xs:element name="specific" type="xs:integer" />
</xs:sequence>
</xs:complexType>
The data received from the field is represented by the Field and Valid tag elements.
l The Field element represents the latest tag field data received from the device.
l The Valid element represents the last field data which had “Good” quality.
453
Chapter 16: Tagging Process Variables
Note:The Valid tag element initially has bad quality. The quality will only become
good when the first read request is successfully finished for the tag, which will only
occur when the IO device is online and either background polling is enabled, the tag
has been subscribed to, or a TagRead has been initiated.
You can access these elements by using a qualified tag reference (a tag referenced by the
tag name and the element name, for example ‘MyTag.Field’).. The following tables
describe each of these elements.
Field tag element
CitectSCADA
Reference Syntax Description
Data type
CitectSCADA
Reference Syntax Description
Data type
454
Chapter 16: Tagging Process Variables
CitectSCADA
Reference Syntax Description
Data type
If you determine that the tag value is incorrect because of a sensor or communication
becoming inoperative, the tag value may need to be overridden. The Override tag ele-
ment is used to store the overridden tag value. For further information refer to Con-
trolling and Overriding Tag Values.
Not specified (unqualified Yes Write to the Field element and propagate
tag reference) the value to the I/O Device.
455
Chapter 16: Tagging Process Variables
If you determine that the tag value is incorrect because of a sensor or communication
interuption, the tag value may need to be overridden. The Override element tag element
is used to store the overridden tag value. For further information refer to Controlling and
Overriding Tag Values.
When the tag is put into the control inhibit mode, writing to the Field element value is pro-
hibited. If the system is configured in such a way that it does not give the operator any indi-
cation that the tag is in the control inhibit mode, the operator may assume that he is
performing a control operation which does not, in fact, occur.
Configure the system in such a way that it provides a visual indication to the operator that a
tag is in the control inhibit mode.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
To provide a visual indication to the operator that a tag is in the control inhibit mode
the following can be done:
Set any of the following Citect.ini parameters in such a way that control inhibit mode
will be indicated by changing the background color or overlaying the numeric or text
graphics objects and symbol set objects with a dithered pattern:
[Page]ControlInhibitDitheringColor
[Page]ControlInhibitDitheringDensity
[Page]ControlInhibitTextBackgroundColor
and set [Page]IgnoreValueQuality parameter to a value of 0 or 2.
456
Chapter 16: Tagging Process Variables
or
Use the Control Mode element value (0 if the tag is not in the control inhibit mode or 1
otherwise)
or
Use the Field element quality Tag Status ControlInhibit bit (1 if the tag is in the control
inhibit mode or 0 otherwise)
Control Mode
Control inhibit mode allows you to prohibit writing to the Field tag element. Setting a tag
in Control inhibit mode is applied system wide. Writing to the Field element will be pro-
hibited for each of the I/O Data Consumers.
Control inhibit mode is controlled by the “Control Mode” element which is described in
the following table.
CitectSCADAData
Reference Syntax Description
type
457
Chapter 16: Tagging Process Variables
Note: The quality of tags referenced by items, ex. Tag1.v or Tag1.Field.t, is GOOD
and its timestamps are 0 (INVALID TIMESTAMP). Therefore they give no visual
indication of any not good quality, error or change in handling state such as control
inhibit or override mode regardless of the setting used for the [Page] Ignore-
ValueQuality parameter.
Override Mode
When the tag is put into the override mode, the default tag element value will be equal to
the Override element value instead of the Field element value. If the system is configured in
such a way that it does not give the operator any indication that the tag is in override mode,
the operator may assume that he is seeing the Field element value (live data) and con-
sequently may operate the plant inappropriately.
Configure the system in such a way that it provides a visual indication to the operator that a
tag is in override mode.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
To provide a visual indication to the operator that a tag is in the override mode the fol-
lowing can be done:
Set any of the following citect.ini parameters in such a way that override mode will be
indicated by changing the background color or overlaying the numeric or text graphics
objects and symbol set objects with a dithered pattern:
[Page]OverrideDitheringColor
[Page]OverrideDitheringDensity
[Page]OverrideTextBackgroundColor`
and set [Page]IgnoreValueQuality parameter to a value of 0 or 2.
or
Use the Override Mode element value (0 if the tag is not in the Override Mode or 1,2,3,4
otherwise)
or
Use the default or override element quality Tag Status Override bit (1 if the tag is in the
override mode or 0 otherwise)
Using Override Mode
458
Chapter 16: Tagging Process Variables
If you determine that the tag value is incorrect because of a sensor or communication
interuption, the tag value may need to be overridden. The Override tag element is used
to store the overridden tag value.
You can put the tag into the Override Mode which will cause each unqualified tag ref-
erence (a tag referenced only by the tag name, for example ‘MyTag’).in every I/O Data
Consumer (Control Client, Trend Server, Alarm server, etc) to return the Override ele-
ment.The quality of the tag will indicate that the tag is in override mode.
Tag override is controlled by the Override and Override Mode tag elements. The Over-
ride element contains the override value and the Override Mode tag element is used to
set the specific override mode.
The following tables describe each of these elements:
Override tag element
CitectSCADA
Reference Syntax Description
Data type
Note: The quality of tags referenced by items, ex. Tag1.v or Tag1.Field.t, is constantly
GOOD and its timestamps are constantly 0 (INVALID TIMESTAMP). Therefore they
give no visual indication of any not good quality, error or change in handling state
such as control inhibit or override mode regardless of the setting used for the [Page]
IgnoreValueQuality parameter.
459
Chapter 16: Tagging Process Variables
CitectSCADA
Reference Syntax Description
Data type
TagName.OverrideMode.T TIMESTAMP Time when the tag was put in or out of Over-
ride mode. (equal to 0 at start up)
Override Modes
Override
Mode Description
Value
1 The tag is in Static Override Mode and the Override value is initially set to the
value of the tag’s Field element.
2 The tag is in Static Override Mode and the Override value is initially set to the
value of the tag’s Valid element.
3 The tag is in Static Override Mode and the Override will remain at the previously
set value of the tag's Override element.
4 The tag is in the Dynamic Override Mode and the Override value will continually
track the value of the tag's Valid element. The ability to write to the value of the
tag’s Override element is disabled in this mode.
460
Chapter 16: Tagging Process Variables
Tag Status
The Tag Status element is used to represent the current status of the tag. The value of
this element is affected only for those tag operations that involve a physical device (for
example, writing to the Field element will affect the status element, but writing to the
Control Mode will not). Tag Status element is reset after I/O Server restart. The element
value contains a set of bit flags.
The following table describes the Tag Status element:
CitectSCADA
Reference Syntax Description
Data type
461
Chapter 16: Tagging Process Variables
462
Chapter 17: Linking, Importing, and Exporting Tags
Because I/O Devices are often programmed independently of CitectSCADA, you can
import, or link to, every the tag in an external data source. This means that you only
have to define tag information once when you program your I/O Devices. You do not
have to re-enter the same information again in CitectSCADA. Because the necessary infor-
mation is already saved in an external data source, you can just import it or link to it.
There are two types of tags in the CitectSCADA variable database - linked tags and non-
linked tags. When performing a tag import from Citect Explorer, only non-linked tags are
updated. Linked tags remain unchanged. When performing a refresh or auto-refresh,
only linked tags are updated. Non-linked tags remain unchanged. When performing a
synchronization (Live Update), every tag for the I/O device are updated and linked.
CitectSCADA also lets you export tags to an external file, specifying the destination and
format of your choice. You might then import this file into a third-party I/O Device pro-
gramming package database, or simply use it as a backup.
Note: The simultaneous update of a tag name and its fields is only supported when
importing via OFS. In every other case, if you attempt to simultaneously update a
tag's name and fields, only the name will be updated. In this case update a tag name
in a separate operation from updating its fields.
See Also
Linking tags
Importing tags
Exporting tags
Unity Support Matrixes
Linking tags
Linking is an I/O Device specific operation. When you add an I/O Device record in Citect-
SCADA (using the Express Communications Wizard), you can choose to link it to an
external data source. The external data source is where the tag data was saved when the
actual I/O Device was programmed. If you link to the external data source, CitectSCADA
automatically creates variable tag records for every tag in the I/O Device.
463
Chapter 17: Linking, Importing, and Exporting Tags
These variable tag records are dynamically linked to the tags in the external data source.
CitectSCADA is updated whenever one of the external tags is changed. For example, you
might program your I/O Devices, configure your project, then add some new tags or edit
existing tags. In this situation, CitectSCADA is automatically updated with your
changes.
This update occurs when you attempt to read the changed tags in CitectSCADA (for
example you compile your project, display the tag using the Variable Tags dialog box,
modify or paste the tag, or perform a manual refresh, etc.). For example, if you change
the address of a tag using a third party I/O Device programming package, the external
data source is changed. Then, when you display the variable tag record or compile your
project in CitectSCADA, the change is copied from the external database to Citect-
SCADA's variable tags database.
You can tell if a tag is linked because the status line at the bottom of the Variable Tags
form will read Linked: Yes. If it is linked and you change a field, your change will not
be overwritten when the link is next refreshed. Generally, however, any field which takes
its value from the external data source is disabled.
Note: Some properties defined for the external tags will not be relevant to Citect-
SCADA. Also, some will not be in a format that CitectSCADA can read. Each I/O
Device has an associated format file in CitectSCADA. It is this file that determines
what information is copied to CitectSCADA's variable tags database and how this
information is to be converted. In most cases, you will not have to edit this file.
464
Chapter 17: Linking, Importing, and Exporting Tags
1. Start the Project Editor and choose Communication | Express Wizard. (Alternatively,
you can open Citect Explorer, and then click Express I/O Device Setup in the Com-
munications folder of the current project.)
2. Complete the wizard screens one by one, selecting the relevant I/O Device, and so on.
When the Link to External Database screen appears, select the Link I/O Device to an
external tag database check box and complete the remaining details.
To manually refresh linked tags:
465
Chapter 17: Linking, Importing, and Exporting Tags
Importing tags
Importing tags from an external data source lets you halve your data entry time. Instead
of entering your tag information once when you program your I/O Device and once
when you configure your project, you can program your I/O Device, then import the tags
straight into CitectSCADA, where they are treated as regular tags. (CitectSCADA auto-
matically creates variable tag records for every tag in the I/O Device.)
Like linking, the importing of tags is an I/O Device specific operation: you import the
tags for a particular I/O Device. Unlike linking, however, imported tag records are not
linked in any way to the tags in the external data source. Therefore, importing is typ-
ically a one-time operation. To update imported tags, you need to import them again.
Note: Tags will be imported into the project in which the selected I/O Device is
defined. This could be either the project selected in the Explorer, or in one of its
included projects.
For most external data sources, the import process involves two steps. First you export
the data from the I/O Device to a format that CitectSCADA can read, then you import the
database into CitectSCADA. However, tag data saved using Mitsubishi or Unity Fast-
Linx can be read directly by CitectSCADA. This means that no export is necessary.
Some characteristics of the import are defined in the format files in the Config directory
(with the extension .fmt). There is one format file for each database type, and each file
specifies how external data is converted to CitectSCADA variable data. In general,
imported tags are either added to the CitectSCADA variable database if the tag does not
already exist, or updated if the tag exists. However, if a field is listed in the [Edi-
tableFields] section of the format file corresponding to the import database type:
466
Chapter 17: Linking, Importing, and Exporting Tags
l If the tag already exists, the CitectSCADA field for the tag will not be updated with
the external value.
l If the tag does not yet exist, the CitectSCADA field for the tag will be updated with
the external value.
For example, if a tag has 10 fields to be imported and 5 of them are listed in the [Edi-
tableFields] section of the format file, then if the tag already exists in CitectSCADA the
tag will be updated with the external values for the 5 fields that are listed in [Edi-
tableFields]. If the tag does not already exist then the tag will be created with the external
values for every 10 fields.
Fields marked as editable in this way can be changed by CitectSCADA. To prevent inter-
nal changes being lost, changes to these fields in the external database are ignored.
Note: If the external database supports to LiveUpdate and the LiveUpdate Link has
been selected for the I/O Device, existing CitectSCADA tags will be synchronized
with the external database and the tags will be updated for the imported fields
regardless of whether it is marked as an editable field. An I/O Device configured as
Linked or Auto-refreshed Linked will behave as in a normal import and will not
update fields marked as editable.
When you import tags into CitectSCADA, you have two options for dealing with existing
tags:
l Delete tags associated with that I/O Device prior to the import.
l Update existing tags on import. Tags found in CitectSCADA and in the external data
source are updated in CitectSCADA. Tags found in CitectSCADA but not in the exter-
nal data source will remain untouched. New tags are appended.
If you import a data source that is already linked, every tag in the data source are dupli-
cated. That is, you will have two copies of each tag: one local and one linked.
See Imported Tags for information about levels of support between Unity and Citect-
SCADA.
Some properties defined for the external tags will not be relevant to CitectSCADA. Also,
some will not be in a format that CitectSCADA can read. To define what information is
copied to CitectSCADA's variable tags database and how this information is to be con-
verted, you need to edit the I/O Device's format file.
To import variable tags from an external database:
467
Chapter 17: Linking, Importing, and Exporting Tags
See Also
Import variable tags properties
Note: If an I/O Device is linked to an external data source the Database Type, Exter-
nal Database, Connection String, and Tag Prefix fields will be greyed out.
Note: Tags will be imported into the project in which the selected I/O Device is
defined. This could be either the project selected in the Explorer, or in one of its
included projects.
Database type
The format of the data referenced by the external data source.
External database (128 Chars.)
References the source for the external database. Click the Browse button to either navi-
gate to the file or to specify configuration options. The external database can be:
l An explicit path and file (for example, C:\Data\Tags.csv)
l An IP address and node (for example, 127.0.0.1\HMI_Scada)
l A URL (for example http://www.abicom.com.au/main/scada)
l A computer name (for example \\coms\data\scada)
Tag data can be read directly from a Unity SpeedLink or OPC Factory Server data-
sources. Click the browse button to specify configuration options. See OPC Factory Server
Tag Import or Unity Link Tag Import.
Connection string (128 Chars.)
Connection details for the data source. This is similar to an ODBC connection string. For
example:
or
468
Chapter 17: Linking, Importing, and Exporting Tags
ServerNode=111.2.3.44; Branch=XXX
469
Chapter 17: Linking, Importing, and Exporting Tags
Shows a hierarchical display of the MxChange servers (both local and networked), their
Fastlinx databases, and associated nodes. To expand or collapse a tree entry, click the
add [+] or minus [-] symbol, respectively, to the left of the entry.
When you open the browser, the information displayed depends on whether or not there
is an existing FastLinx database with the same name as the current CitectSCADA
project:
l If an FastLinx database exists with the same name as the CitectSCADA project and
the database contains a GID node with the same name as the CitectSCADA I/O
Device, the browse dialog highlights the GID node of that name. You can then click
Open to generate connection strings or server parameters.
l If no FastLinx database exists with the same name as the CitectSCADA project, the
Create a new database node is highlighted. Click Open to generate the connection
strings, or click the highlighted node to create a new database.
Server
Displays the server name on which the database, if present, exists. If no database is
found, this box displays defaults to the name of the local PC. (Read-only)
Database
Displays the database name (i.e., name of the current CitectSCADA project). (Read-only)
IO Device
Displays the name of the GID node (i.e., CitectSCADA I/O Device). (Read-only)
PLC Class
Indicates the type of project configured in the MxChange server.
PLC Type
Indicates the PLC type corresponding to the selected PLC class.
Password
Enter the password for the selected database to allow CitectSCADA to access the data-
base for data retrieval. The password needs to be valid for read/write access as assigned
by your database administrator.
See Also
Defining Variable Tag Names for Mitsubishi FastLinx
Note: The functionality described in this topic relates only to FastLinx for Mitsubishi.
470
Chapter 17: Linking, Importing, and Exporting Tags
You need to have purchased an appropriate CitectSCADA license for this func-
tionality to be supported.
If you are using Mitsubishi FastLinx, you cannot use certain reserved words when defin-
ing your tag name variables. You cannot use:
471
Chapter 17: Linking, Importing, and Exporting Tags
& * ** -
/ + < <=
NOT OF OR PROGRAM
l Cicode function names. See Functions Reference for a complete list of Cicode func-
tions.
Using reserved words or Cicode function names may cause a syntax error in Mitsubishi
FastLinx when you export tags to the FastLinx tag name database.
472
Chapter 17: Linking, Importing, and Exporting Tags
See Also
FastLinx for Mitsubishi Tag Import
473
Chapter 17: Linking, Importing, and Exporting Tags
Note: When you return to this dialog, the pathname will point to the location of
the template in the project, rather than the path of the original template file.
474
Chapter 17: Linking, Importing, and Exporting Tags
Note: The authentication values needs to be valid for read/write access, as assigned
by the appropriate database administrator.
Note: There are two modes that can be used on the OPC Factory Server when import-
ing tags; device mode and OFS simulator mode. If device mode is used, the time
taken to import tags is increased significantly. This is because for each tag requested
by Vijeo Citect the OPC Factory Server needs to verify the item from the device. OFS
simulator mode is highly recommended to avoid these performance issues.
Machine Name
The location of the OPC Factory Server which can be an IP address or a UNC path.
Leave blank to select the local machine.
Select server and branch to Import
Displays the OPC Factory Servers on the network that are running the OPC Factory
Server application, and the hierarchical database node structure for each.
Select a group of tags to import from an available database. OPC data can be either a
tree (hierarchical) or a flat structure. The Vijeo Citect OPC driver supports access to both
types of storage. If the data is in a tree structure, it can be accessed to the first branch
level down from the root node. Deeper levels of branching may be supported in the
future.
Note: The authentication values needs to be valid for read/write access, as assigned
by the appropriate database administrator.
475
Chapter 17: Linking, Importing, and Exporting Tags
Please be aware of the following limitations when importing tags from an OFS database.
l For each imported tag, the CitectSCADA tag name will be the same as the name of
the tag defined on the OFS except "." characters will be replaced by "_" characters.
l Using OFS tag import to import tags from an OFS database may not succeed on Win-
dows Vista if User Account Control (UAC) is enabled. UAC prevents access to the
external database. If importing via OFS on Windows Vista, either turn off UAC, or
right click on the OFS and Unity Pro Windows shortcuts and select "Run as Admin-
istrator".
l To generate Alarm and Trend tags, a unique identifier can be set in the Custom and
Comment field for Elementary Data Type (EDT) tags. For example, the string "VJA" is
used to identify a tag that the user wants to use to generate a corresponding Digital
Alarm Tag. Only the Comment field can be used for this feature on Derived Data
Types (DDT) and Derived Function Block (DFB) tags.
l OFS built-in tags are not imported. They can be added in CitectSCADA manually.
l The length of the comment field in the CitectSCADA tag form is limited to 48
chaacters.
l CitectSCADA does not support DDT or DFB structure types. The OFS import will enu-
merate each element of this type of tag and import them as elementary tags.
l OFS tag import is only supported when the OFS links to the .STU and .XVM files.
476
Chapter 17: Linking, Importing, and Exporting Tags
l DFB components of type "ANY_ARRAY_xxxx" are not imported when the OFS links
to a *.xvm file. When a data dictionary is used, the data dictionary ignores comment
and custom fields and therefore taggen cannot generate alarm and trend tags. If there
are DFB components of type "ANY_ARRAY_xxxx", the whole DFB is not imported.
l The following table shows data types supported by the tag import and TagGen when
the OFS links to *.stu or *.xvm file.
477
Chapter 17: Linking, Importing, and Exporting Tags
Arrays
Synchronization
Live Update No No No No No
1. Only the BOOL type tags in the DDT can be used to generate Alarm and Trend tags
when the OFS links to the *.xvm file.
2. When OFS links to the stu file, the comment string defined in the tag instance will be
taken, the comment string defined in the DDT/DFB definition will be ignored.
3. When OFS links to the xvm file, the comment string defined in the DDT/DFB def-
inition will be taken and the comment defined in the tag instance will be ignored.
4. Array with negative index is not supported.
478
Chapter 17: Linking, Importing, and Exporting Tags
<?xml version="1.0"?>
<template>
<param name="parameter">
</param>
<input name="variable" file="variable.dbf">
</input>
<output name="trend" file="trend.dbf" filter="">
</output>
</template>
This outline template specifies no parameters, takes input from the variable.dbf database
and outputs the results to the trend.dbf database. The <template> tag is the root tag of the
template document and need to be present.
Within the <template> tag are three sections:
l <param>
This is an optional section you can use to specify string constants that can be referred to
in other sections of the template. For example:
<param name="parameters">
<string name="MyIODevice">DISK_PLC</string>
</param>
The <input> section specifies the name of the database and the fields that are used for
processing into tags. There needs to be only one input section in the XML file. For exam-
ple:
479
Chapter 17: Linking, Importing, and Exporting Tags
</input>
This example identifies four fields from the variable.dbf database: name, type, unit and
custom. These fields are used later in the file. The input section loads only rows where
the unit field matches the value of the IODevice variable in the parameter section. This
helps improve performance by avoiding the processing of irrelevant rows.
An array is created called taginfo that contains key value pairs based on the value of the
custom field. If the custom field value was "VJA=Alarm;VJT=Trend", then an array is
created containing the values taginfo[VJA] = "Alarm" and taginfo[VJT] = "Trend".
Two string variables are created based on the values of the taginfo array.
l <output>
The <output> section defines the output database, the processing to be done on the input
fields and the respective output fields to be generated. There can be many output sec-
tions in the XML file. The output section can specify the same database file as the input
section if necessary. For example:
In this example, fields are written to the digalm.dbf database. Output processing only
occurs for the current row if the input row relates to a digital alarm. That is, if the alarm-
info variable from the input section has the value of "VJA" and the type field from the
input database is "DIGITAL. The tag and name fields are given the value name_ALARM.
Curly braces are usually used for substitutions to replace pre-defined texts with tag prop-
erties. To use curly brace characters as normal characters, use double curly braces which
will be exceptionally converted to singular ones to express curly braces. Round brackets
are not regarded as special characters when used in tags other than <calculator> tag.
Example
<field name="tag">{variable.name}_ALARM</field>
480
Chapter 17: Linking, Importing, and Exporting Tags
<field name="name">{variable.name}_ALARM</field>
<field name="comment">{{Testing1}}</field>
</output>
Proprietary tags used in the template are described in XML template tags. See Sample
XML Templates for more comprehensive examples.
Referencing variables
Variables can be used to temporarily store information. Variables can be defined either
globally in the <param> section of the XML file or locally in an <input> or <output> section.
Variables are defined using the <string> tag as shown in XML template tags. For exam-
ple:
<string name="MyIODevice">DISK_PLC</string>
{SectionName.VariableName}
{parameters.MyIODevice}
The SectionName can be omitted if you are referencing a variable defined in the same sec-
tion.
Variables are evaluated sequentially in the XML file. Variables in the <param> section are
assigned first, followed by those in the <input> section, followed by variables in each <out-
put> section in sequence. This means that:
l Variables in the <param> section can be referenced by the <input> section and every
<output>section in the same template.
l Variables in the <input> section can be referenced by every <output> section.
481
Chapter 17: Linking, Importing, and Exporting Tags
l Variables in each <output> section can only be referenced by subsequent <output> sec-
tions.
Referencing arrays
To reference a member of an array by member name use:
{SectionName.ArrayName[MemberName]}
{SectionName.ArrayName(PatternString)}
<template>
This is the root tag in the XML file. Only have one <template> tag in each XML file.
Can contain:
<param>, <input>, <output>
Attributes:
desc
Description of the template section.
<param>
This optional tag defines global parameters for the XML file. Here you can specify string
constants to be used in the rest of the file.
Can contain:
<string>
Attributes:
name
Name of the parameter section.
desc
Description of the parameter section.
<input>
This defines the source database of the XML file, the fields to be imported and any input
filtering that might be necessary. There needs to be only one input section defined.
482
Chapter 17: Linking, Importing, and Exporting Tags
Can contain:
<field>, <string>, <array>, <calculator>
Attributes:
name
Name of the input section.
file
Input database file name.
desc
Description of the input section.
<output>
This defines the output database of the XML file, the tags to be generated and any trans-
formations necessary to generate tag data from input variable data. A template needs to
have at least one output section defined.
Can contain:
<field>, <string>, <array>, <calculator>
Attributes:
name
Name of an output section
file
Output database file name
filter
Output section filter, syntax:
filter="variable=FilterString "
<field>
This tag specifies the database fields that will be processed in <input> and <output> sec-
tions.
When used in the input section it specifies the named fields for each record loaded from
the input database. It is read only.
483
Chapter 17: Linking, Importing, and Exporting Tags
When used in an output section it specifies the named fields to write to for each gen-
erated tag record in the output database.
Attributes:
name
Case insensitive name of a database field.
key
Valid for output sections only, this boolean flag indicates whether this is a key field.
This is useful for special handling in the output section. For example, you can syn-
chronize between a new record set and an old record set by matching the key fields.
load
Valid for both input and output sections, this boolean flag indicates whether this is a
load filter field. Load filter fields are used to filter records when loading data from the
input database and output database.
desc
Description of the field element.
Note: Key and Load string expressions can contain a regular string, a variable ref-
erence, wild card operators, or a mixture of these. See Pattern matching for a list of
wildcard operators.
<string>
This tag defines a string constant that can be used in <param>, <input> and <output> sec-
tions.
Attributes:
name
Name of a variable string.
desc
Description of the string element.
Note: For Unity SpeedLink, the string "IODevice", when defined in the <param> sec-
tion, refers to the project's IO Device. Do not assign it another value.
<array>
This tag defines a dynamic array of strings in <input> and <output> sections.
The set of strings depends on the fields of the record being processed and those strings
that are generated by the ToProperty() and Split() commands. See Built-In Functions for
more information.
Attributes:
484
Chapter 17: Linking, Importing, and Exporting Tags
name
Name of a variable string array.
desc
Description of the array element.
<calculator>
Attributes:
name
Name of a calculator.
initial
Initial value of the calculator, zero by default.
desc
Description of the calculator element.
Pattern matching
The following wildcards can be used in strings
Character Description
%d Matches any decimal integer (nnn... where n is 0-9) in the data stream
%e Matches any octal number (0onnn... where n is 0-7) in the data stream
485
Chapter 17: Linking, Importing, and Exporting Tags
{ Begin a token string. The characters between { and } in the Input Pattern
(including regular and special characters) represent a "token string".
The characters in the data stream that match this token string are a
token, and can be referenced by the Output Data String, and written
directly to the output database as a group
\ Treat the following character as a literal. For example, if a literal `*' char-
acter was expected in the input data stream, you would use \* to denote
this. If a literal backslash \ is expected, use \\.
Built-In Functions
There are three built-in functions that can be used to manipulate strings in the XML tem-
plate. The syntax to call a built-in function as follows:
{<FunctionName>(<arg1>, <arg2>,...)}
<array name="tagid">
{split('VJA;VJT', ';')}
</array>
<array name="taginfo">
{ToProperty('VJA=Alarm;VJT=Trend', '=', ';')}
</array>
486
Chapter 17: Linking, Importing, and Exporting Tags
Note: You will need to modify this template to suit your particular requirements.
Refer to TagGen XML Template for more information.
For each Unity Database variable tag with the text "VJA" in the custom field imported in
to Vijeo Citect of type "DIGITAL", this file will generate a linked Digital Alarm Tag
within Vijeo Citect (digalm.dbf) with the name <variablename>_ALARM.
For each Unity Database variable tag with the text "VJA" in the custom field imported in
to Vijeo Citect not of type "DIGITAL" and not of type "STRING", this file will generate a
linked Analogue Alarm Tag within Vijeo Citect (anaalm.dbf) with the name <var-
iablename>_ALARM.
For each Unity Database variable tag with the text "VJT" in the custom field imported in
to Vijeo Citect, this file will generate a linked Trend Tag within Vijeo Citect (trend.dbf)
with the name <variablename>_TREND. This example file does not enter values for any
of the other Trend tag properties.
<?xml version="1.0"?>
<template desc="Default SpeedLink Unity Pro TagGen template">
<param name="parameter">
<string name="IODevice" desc="SpeedLink necessary parameter, it will be set to the
given I/O Device name by the system."></string>
</param>
<string name="alarminfo">{variable.taginfo[VJA]}</string>
<string name="trendinfo">{variable.taginfo[VJT]}</string>
</input>
487
Chapter 17: Linking, Importing, and Exporting Tags
variable
tags">
<field name="tag">{variable.name}_ALARM</field>
<field name="name">{variable.name}_ALARM</field>
<field name="var_a" key="true">{variable.name}</field>
<field name="taggenlink" load="true">{parameter.IODevice}</field>
</output>
</template>
488
Chapter 17: Linking, Importing, and Exporting Tags
l high-high limit based on the variable tag's full and zero engineering scale properties
and a user specified fraction "Divisor".
In this example, only analog alarms for integer variables will have the limit set.
<param name="parameter">
<string name="IODevice"></string>
<string name="Divisor"></string>
</param>
</template>
Exporting tags
The Export feature allows you to export I/O Device data to an external data source, spec-
ifying the destination and format of your choice (for example RSLOGIX driver). This file
might then be imported into a third-party I/O Device programming package database.
Alternatively, you might use it as a backup.
489
Chapter 17: Linking, Importing, and Exporting Tags
The file to which you are exporting needs to already exist; otherwise the export will not
work. You can choose to delete its contents before exporting, or you can leave it and
create duplicate tags.
Note: The export tags feature is not yet supported by every database type. If you have
existing links to any external data source, the linked tags will also be exported. As
the structure of each type of external data source differs, some tag data might not be
exported. This is determined by the format file for the I/O Device.
See Exported Tags for information about levels of support between Unity and Citect-
SCADA.
Note: This data source needs to exist before the export can be performed.
Database type
The format of the data referenced by the external data source.
490
Chapter 17: Linking, Importing, and Exporting Tags
Connection string
Enter a connection string to provide connection details for the data source. This is sim-
ilar to an ODBC connection string. For example:
Note: For the Unity driver existing tags are not deleted, even if you select this check
box.
491
Chapter 17: Linking, Importing, and Exporting Tags
l Mitsubishi FastLinx (a specialized driver which allows you to connect directly to the
PLC programming software)
To configure the external data source as a file
The example uses a CSV file, in this case an RSLOGIX database driver
In the Import/Export or Links dialog box, enter details as follows:
l External database C:\Data\Tags.csv
l Database type RSLOGIX Driver
l Connection string (leave blank)
To configure the external data source using a specialized driver
492
Chapter 17: Linking, Importing, and Exporting Tags
The Connection String needs to be in the format which the specialized driver (in
this case Mitsubishi FastLinx) expects; otherwise it might be ignored.
Note: Tags in your external data source need to conform to the CitectSCADA
standard. Tag names that are longer than 79 characters are truncated. If this trun-
cation results in duplicate tags, you are informed when you compile your project.
Characters other than (a to z, A to Z, and 0 to 9) and the underscore character "_",
are removed on import/link (and before any truncation).
See Also
Format file
Format file
The format file defines the import/export/linking rules. The file maps columns from the
external data source format to the internal CitectSCADA database format. In other words,
it determines what information is imported/exported/linked and how this information is
modified during the operation.
The format file also provides the information to allow CitectSCADA to use the correct
driver for accessing the external data source.
Some format files are provided with CitectSCADA; however, sometimes you might need
to write or modify a format file using an editor such as Microsoft Notepad.
Following is an example of how format file rules work. (For more information, see For-
mat file layout.)
1. Column 3 in the external data source needs to be copied into the "Name" column in
the CitectSCADA's tag database. (CitectSCADA names are restricted to alphanumeric
characters (a to z, A to Z, and 0 to 9) and the underscore character "_", but this is not
typically a consideration in the format file; CitectSCADA does the conversion auto-
matically). However, if Column 3 in the external data source happens to be blank,
there is no need to copy this record across (it needs to be rejected).
2. Column 1 in the external data source needs to be copied straight into the "Addr" col-
umn in CitectSCADA's tag database, because they both mean exactly the same thing.
3. Columns 4, 5, 6, and 7 in the external data source need to be copied into the "Com-
ment" column in Variable.DBF. (It is not uncommon for external data sources to split
the comments across several fields). The fields need to be copied in that order, so that
if the data in Column 4 in the external data source is "Loop", Column 5 is "1", Col-
umn 6 is "Process", and Column 7 is "variable", these fields are copied across in
order, so that the "Comment" column in Variable.DBF reads "Loop 1 Process
variable". This process is called 'concatenation'. (For the "Comment" column, Citect-
SCADA automatically adds a space between each field from the external data source.)
493
Chapter 17: Linking, Importing, and Exporting Tags
4. The data in Column 1 in the external data source determines what CitectSCADA
needs to write in the "Type" column. However the data cannot be copied across
directly, because it would not make sense to CitectSCADA. Instead, it needs to go
through a conversion (or filtering) process. This conversion needs its own set of rules,
such as:
5. If Column 1 in the external data source is "BT%d:%d.%d" (where%d means "any dec-
imal number"), CitectSCADA needs to write the string "DIGITAL" in the "Type" col-
umn.
6. If Column 1 in the external data source is "F%d:%d/%d" (where %d means "any dec-
imal number"), CitectSCADA needs to write the string "DIGITAL" in the "Type" col-
umn.
7. If Column 1 in the external data source is "O:%e" (where %e means "any octal
number"; that is, every digit from 0 to 7), CitectSCADA needs to leave the "Type" col-
umn blank. It still accepts the record (provided other columns pass any filtering tests)
but it does not write anything in the "Type" column. The assumption is that Citect-
SCADA currently does not have (or does not need) a suitable corresponding type.
8. If Column 1 in the external data source is "PD%d:%d.%d", CitectSCADA needs to
write the string "REAL" in the "Type" column.
9. If Column 1 in the external data source is "ST%d:%d", CitectSCADA needs to write
the string "STRING" in the "Type" column.
10. If there are no rules covering the contents of Column 1 in the external data source,
CitectSCADA needs to reject the whole record and not copy it into the CitectSCADA
database.
See Also
Format file layout
494
Chapter 17: Linking, Importing, and Exporting Tags
Any white space (or none at all) is acceptable around the "=" and the "->", but the whole
statement needs to be on one line. Most statements within a format file follow this pat-
tern, but in many cases there might be no "->" (the converter), or there might just be a
converter without anything following it.
The following sections are necessary in every format file:
[General]
[Columns]
[ImportFilterMap]
[ExportFilterMap]
[General] section
The General section consists of 4 lines:
[General]
Name=name
Description= description
DriverName= driver name
DriverInst="a special string"
The name and the description are not currently used by CitectSCADA. CitectSCADA uses
the driver name to load the correct driver for accessing the external data source. This
driver might be one that is part of the CitectSCADA installation, or it might be a cus-
tomized driver (including a driver that you have written yourself), for accessing a par-
ticular data source (which could be a protocol, type of hardware, server or file type). The
driver needs to be an OLE DB-compliant driver.
The special string allows extra information to be passed to the driver. It is added to the
connection string (in Citect Explorer and the Project Editor). So the connection string can
be used for information that is likely to change often, and this special string can be used
for more persistent information (such as the comma "," delimiter for a .CSV file). The
main use of this string is as a delimiter for an input file. To specify that a comma "," is
used by an input file as the delimiter, the following syntax would be used:
495
Chapter 17: Linking, Importing, and Exporting Tags
DriverInst="delimiter=,"
[Columns] section
The Columns section defines the format of the columns in the external data source. It is
structured as follows:
[Columns]
External column name 1 = column width -> data type
External column name 2 = column width -> data type
..
External column name n = column width -> data type
The only restriction that CitectSCADA places on the data for External Column name n is
that it needs to be unique within the section. For convenience, you can use the names
that the external data source uses (such as "Description", "PLC_id", "Iotype") or you can
just make up names like "Column1", "Column2", etc. The order in which these entries
appear needs to be the same as the order of the fields in the external data source. The
names used for the External Data Source columns in the [ImportFilterMap] and [Export-
FilterMap] sections needs to come from this list.
Column width is the number of characters in the field, and data type is the type of data for
that column. Currently the only acceptable data type is "STRING".
These are the most complex sections in the format file. (The rest of the text will just focus
on the [ImportFilterMap], as the [ExportFilterMap] follows basically the same logic.)
The [ImportFilterMap] is structured as follows:
[ImportFilterMap]
Import Rule 1 = External column name l -> Citect Column i
Import Rule 2 = External column name m -> Citect Column j
..
Import Rule nn = External column name n -> Citect Column k
496
Chapter 17: Linking, Importing, and Exporting Tags
The values in Import Rule nn can be any name strings, but they needs to be unique
within the section. Therefore, for convenience, you might want to use names like "Impor-
tRule1", "ImportRule2", "Mapping1", "Filter1" etc., or you might want something that is
descriptive of the conversion involved, such as "Description_to_comment".
The name used for External column name n needs to be identical to a name that appears
in External column name n in the [Columns] section above.
The name used for Citect Column k needs to be the same as one of the columns in the
CitectSCADA internal tags database, such as "Name", "Type", "Addr", "Comment" etc.
Thus the values for the external column and the CitectSCADA column provide infor-
mation on how to transfer data from the external column to the Citect column during
import.
For example:
This indicates that there is a relationship between the data in the "Description" field in
the external data source and the data that needs to go into the "Comment" field in the
CitectSCADA database.
The name that you use for Import Rule nn might be the same as the name of another
optional section in the format file: here, the extra section provides CitectSCADA with
more information. In the simplest case, if there is no section with that name in the for-
mat file, the rule simply states that the data in External column name n is to be copied
directly into Citect Column k without modification or filtering.
So if the "Description" column in the external database contains "Truck Position 1" and
the above entry appears in the [ImportFilterMap] section, and there is no section called
[ImportRule1], then after the import, the "Comment" column in the CitectSCADA data-
base will contain the string "Truck Position 1".
Concatenation
To concatenate fields from the external database into one field in the CitectSCADA data-
base, add separate entries to the [ImportFilterMap] section. Each section needs to contain
the name of a relevant external column and the name of the destination column in Citect-
SCADA. The entries needs to appear in the order in which the fields are to be con-
catenated.
So, if the external data source has a field called "IOdev" containing the value "M", and
another field called "IOaddr" containing the value "61", and you want to join them
together so that the value "M61" is imported into the CitectSCADA "Addr" field, this is
how it would be done:
497
Chapter 17: Linking, Importing, and Exporting Tags
[ImportFilterMap]
Addr1= IOdev -> Addr
Addr2= IOaddr -> Addr
Here, you need to verify that there are no sections in the format file called [Addr1] or
[Addr2], unless you need some filtering or conversion.
See Also
Field conversion
Field conversion
To modify mapped data or to apply filtering (to reject certain records), create a new sec-
tion using the name of the relevant line from the mapping section. For example, if you
have the following mapping section:
[ImportFilterMap]
Test1_to_type = Test1 -> Type
and you want to convert the data from the Test1 column before importing it, somewhere
in the file you need to have a section called [Test1_to_type]:
Test1_to_type]
Note: The name needs to be from the import mapping section, not from the export
mapping section. If you use a name from the export mapping section, the conversion
applies to the export, not the import.
The name used for Filtering Rule n has no intrinsic significance to CitectSCADA (except
that it uses it as a key to locate the entry). The only restriction is that it needs to be
unique within the section, so you can use whatever is convenient.
498
Chapter 17: Linking, Importing, and Exporting Tags
* Any string.
%s Any string.
499
Chapter 17: Linking, Importing, and Exporting Tags
!REJECT! This sequence needs to appear by itself in the output data pattern.
The whole record is rejected. As the record had already been
matched to the input pattern, no further rules are checked.
\ (at end of line) Insert a literal space ` ' character at the end of the output line.
Without this provision, the system could not distinguish between
the end of the input line (which is likely to be followed by char-
acters, such as spaces, that Windows will ignore) and a space
being necessary at the end of the output line.
[ImportFilterMap]
Test1_to_type = Test1 -> Type
..
[Test1_to_type]
Rule1 = FLOAT -> DIGITAL
..
For a more complex example, let us assume that the external data source has a column
called "Tag" which is equivalent to the "Name" field in CitectSCADA. Let us also assume
that the external database has no direct equivalent of CitectSCADA's "Type" field, yet
CitectSCADA needs this field to be filled in. We need to use the "Tag" field to decide
what goes into the "Type" field of the CitectSCADA database.
If the "Tag" column in the external data source has the value "I:060/07", we have deter-
mined that we write the string "DIGITAL" into CitectSCADA's "Type" field. In fact, if that
field has "I:" followed by any octal value, followed by a slash "/", followed by any octal
value, we want the string "DIGITAL" to appear in our "Type" field. How do we express
this in the format file?
Firstly, there are two sets of relationships to consider, one connecting the "Tag" field in
the external data source to the "Name" field in CitectSCADA, and the other connecting it
to the "Type" field in CitectSCADA. So we need two "mappings" (entries) in the [Import-
FilterMap] section:
500
Chapter 17: Linking, Importing, and Exporting Tags
[ImportFilterMap]
Tag_to_Name = Tag -> Name
Tag_to_Type = Tag -> Type
..
As we want the data in the "Tag" field to be copied directly into the "Name" field, we do
this by not having a [Tag_to_Name] section anywhere in the format file.
But because we are not copying directly from the "Tag" field to the "Type" field, but are
just using the data to decide what goes into the "Type" field, we need a [Tag_to_Type] sec-
tion.
Recall the desired outcome: If the "tag" field has "I:" followed by any octal value, fol-
lowed by a slash "/", followed by any octal value, we want the string "DIGITAL" to
appear in our "Type" field.
We express this in the format file as follows:
[Tag_to_Type]
Rule1 = I:%e/%e -> DIGITAL
..
This will match "I:060/07" or "I:0453/02343445602" (and cause the string "DIGITAL" to be
written to CitectSCADA's Type field), but will not match "I:060/98" or "I:054".
To give a few examples of how the wild-card characters (%s, * and ?) might be used, the
pattern "HE%sLD" or "HE*LD" in the format file would match "HELLO WORLD" or "HE
IS VERY BOLD" in the external data source. The pattern "HE???????LD" would match
"HELLO WORLD" but not "HE IS BALD", as each question mark "?" needs to match
exactly one character.
CitectSCADA will also handle multiple wildcard patterns, such as "%s/%s:%s".
For an example more useful than "Hello World", imagine that we need to copy the data
straight across without modification, but we want to verify that no blank fields are cop-
ied across. The pattern "?%s" or "?*" will match any string that has at least one character,
but will not match a blank.
Sometimes only part of the input stream is necessary in the output, or the input might
need to be split up into different output columns. In these situations "tokens" are useful.
In this example of an export situation, the "Addr" field in the CitectSCADA database
needs to be split among two fields in the external database: the "IOdev" (whose value is
always "D" or "M"); and "IOaddr" (whose value is a decimal integer of no more than 3
digits). Values in the "Addr" field of the CitectSCADA database are strings such as
"D62", "M546", etc.
501
Chapter 17: Linking, Importing, and Exporting Tags
This situation could be solved by concatenation, i.e. using one mapping to write to the
IOdev field, and three other separate mappings to copy each digit separately into the
IOaddr field of the external database. But this would be complex and in some situations
would not work.
It is better to use a token to address the situation:
[ExportFilterMap]
..
Addr2IOdev = Addr -> IOdev
Addr2IOaddr = Addr -> IOaddr
..
[Addr2IOdev]
D = D* -> D
M = M* -> M
AnythingElse = * ->
..
[Addr2IOaddr]
Rule = ?{%d} -> $1
In the [Addr2IOaddr] section, the {%d} is the token string, and as it is the first (and only)
token appearing in the rule, $1 is used to reference it on the output stream side. So if the
"Addr" field of the CitectSCADA database contains "D483", "D" is written to the "IOdev"
field of the external data sink, and "483" (the token) to the "IOaddr" field.
Here is another example illustrating the use of multiple tokens. Suppose we need to: con-
vert period characters (.) to colons (:); remove the first two characters (which are blank);
and remove any unnecessary characters from the data we are expecting; that is, convert
"..BJ6452.78......" to "BJ6542:78". This can be achieved by using the following rule:
At this point, we introduce another feature of the format file. If you use the following
rule:
i.e., without "-> Citect String" included, CitectSCADA interprets this as "check that the
string matches the External Pattern, if it does, copy it across unchanged".
If this rule is used:
i.e., without "Citect String", it would mean: "If the string pattern matches then accept the
record but copy a NULL string to the CitectSCADA database."
502
Chapter 17: Linking, Importing, and Exporting Tags
Using the above example again, we can add the restriction that any records with no data
(i.e. a blank or NULL string) in the Tag field of the external data source will not be
imported into CitectSCADA. We would add a [Tag_to_Name] section, and would have
just one rule: that we accept everything except for a blank.
[Tag_to_Name]
RejectBlanks = ?*
..
Recall that CitectSCADA checks the pattern in each filter rule sequentially until a pattern
that matches the string is found in the external data source. With this in mind, a huge
range of conversions and filterings are possible by ordering the rules correctly and, in
some cases, by making use of concatenation.
For instance, if certain string types need to be converted but others need to be copied
unmodified to CitectSCADA, you could have a section with a set of rules at the top, fol-
lowed by a final rule to let everything else through unmodified.
[Tag_to_Name]
Rule n = ...... -> ......
..
LetEverythingElseThru = %s
[Tag_to_Name]
Rule1 = DFILE* -> !REJECT!
..
LetEverythingElseThru = %s
Clearly, it is pointless having the !REJECT! rule not followed by other rules concerning
patterns that you do want to accept, as anything that does not match an input pattern is
rejected. The logic behind the order that the rules appear can become particularly impor-
tant when using a !REJECT! rule. You would typically have any reject rule(s) as the first
rule(s) in the mapping. There would not be any point in putting a !REJECT! rule as the
last rule in the mapping.
!REJECT! rules can also be useful where some text file generated by another system con-
tains some sort of header lines that are not wanted, but the rest of the data is necessary.
See Also
Having CitectSCADA recognize format files
503
Chapter 17: Linking, Importing, and Exporting Tags
Each entry in this section refers to a combination of format file and driver necessary for
a particular import, export, or link operation.
The text on the left of the "=" sign needs to refer to the name of another section which
needs to appear in tagdriv.ini.
The text on the right of the "=" sign is exactly what will appear in the menu under "Data-
base type" for importing, exporting or refreshing variable tags.
The other sections each refer to a type of import or export described in the [External data
sources] section, and give details about the format file and driver pair. The general lay-
out of these sections is as follows:
So if we assume that the version of CitectSCADA you are installing contains 45 format
files, there would be 45 sections in tagdriv.ini, as shown in the following example:
504
Chapter 17: Linking, Importing, and Exporting Tags
; This file contains the driver name, driver prog id, and format file mappings
; The format file needs to reside in the BIN directory
[CSV]
driverid = CiTrans
datastring = csv.fmt
[RSLOGIX]
driverid = CiTrans
datastring = rslogic.fmt
[MxChange]
driverid = CiTrans
datastring = MxChange.fmt
; This file contains the driver name, driver prog id, and format file mappings
; The format file needs to reside in the BIN directory
[CSV]
driverid = CiTrans
datastring = csv.fmt
[OPC]
driverid = CiTrans
datastring = OPC.fmt
[UnityProDynamic]
driverid = CiTrans
datastring = UnityProDynamic.fmt
LiveUpdate = TRUE
[UnityProStatic]
driverid = CiTrans
505
Chapter 17: Linking, Importing, and Exporting Tags
datastring = UnityProStatic.fmt
LiveUpdate = FALSE
This adds 45 entries to the database type drop down menu: CSV, RSLOGIX, ASCII and
Mitsubishi FastLinxCSV, ASCII, OPC, Unity Pro Dynamic and Unity Pro Static.
The 45 entries in the menu match the strings on the right of the "=" sign in the [External
data sources] section.
If you add another format file, you will also need to add a matching entry to tagdriv.ini.
For example, if you add a new format file for a Simatic data source, you need to add a
line similar to this to the [External data sources] section:
You need to also add the following section to the bottom of the file:
[SIMATIC]
driverid = CiTrans
datastring = SIMATIC.fmt
Save the file, restart Citect Explorer, and "Siemens SIMATIC Driver " appears in the
menu.
Selecting this entry causes the format file in the datastring entry under the [SIMATIC] sec-
tion to be used for the import, export, or link; that is, simatic.fmt.
Imported Tags
For Unity Fastlinx Dynamic and Static:
506
Chapter 17: Linking, Importing, and Exporting Tags
Note: Citect recommends that you use the Unity Fastlinx Dynamic driver when
importing tags from Unity Pro into a Citect project.
507
Chapter 17: Linking, Importing, and Exporting Tags
Note: Arrays are supported for every data type except DATE, TOD, DT and STRING
data types. For Unity data types marked with *, Citect does not have data types that
directly match the Unity types. Instead use supported data types and Cicode to con-
vert and simulate those data types.
Exported Tags
For Fastlinx Static:
508
Chapter 17: Linking, Importing, and Exporting Tags
Note: Arrays are supported for data types except DATE, TOD, DT and STRING data
types. For Unity data types marked with *, Citect does not have data types that
directly match the Unity types. Instead use Technical supported data types and
Cicode to convert and simulate those data types.
Linked Tags
Linked I/O Device Live Update
For Unity Fastlinx Dynamic:
509
Chapter 17: Linking, Importing, and Exporting Tags
Note: Arrays are supported for data types except DATE, TOD, DT and STRING data
510
Chapter 17: Linking, Importing, and Exporting Tags
types. For Unity data types marked with *, Citect does not have data types that
directly match the Unity types. Instead use supported data types and Cicode to con-
vert and simulate those data types.
511
Chapter 17: Linking, Importing, and Exporting Tags
512
Chapter 18: Defining and Drawing Graphics Pages
A runtime system usually comprises a series of graphics pages that display on your com-
puter screen(s) and provide a "window into the process." You can design your pages to
provide your operators with control of an area (or all) of your plant. Your graphics pages
can also display the status of your plant by using various graphical items known as
objects.
See Also
Creating a New Graphics Page
Using Page Templates
Using a Browse Sequence
Specifying a Startup Page
Sizing the Page
Defining Page Properties
Setting Default Page Settings
Understanding the Drawing Environment
Using Find and Replace in a project
Note: If you create a new page using the Graphics Builder, you need to edit the page
record (with the Project Editor) to define a browse sequence.
513
Chapter 18: Defining and Drawing Graphics Pages
See Also
New Dialog Box
Animation points
Each point on a graphics page where an object is displayed is called an animation point.
When you add an object (text, symbols, pipes, etc.) to your page, it is automatically allo-
cated a number (termed an AN) to the animation point. ANs can be linked to static
items (a bitmap or an object without an animation expression), or animated items
(where there is an animation expression defined); however only those ANs that belong
to an animated item are available for reference at runtime.
The number of objects that you can use is limited by the performance of your computer,
though this is unlikely to be a consideration on modern computers. A good rule of
thumb is to try and keep the number of objects (and hence ANs) less than 3000.
The first 2 ANs are used for automatically displaying system information such as mes-
sages, alarm information and page details. In some applications, such as trend pages,
some other ANs are reserved.
Genies are a combined set of one or more graphic objects.Each graphic results in one or
more ANs and animation records being saved to the project configuration. The total
number of genies that can be used on a single page is determined by what graphic
objects are defined within each genie, and the total number of ANs and animation rec-
ords.
You can add individual animation points to a graphics page by using the Cicode
Object tool (add a Cicode Object without a command).
Note: You can locate any object on a page by referencing its AN. To locate an object
by its AN use the Goto Object tool in the Tools menu.
514
Chapter 18: Defining and Drawing Graphics Pages
Note: To delete a page from the project, select the page name and click Delete.
l Choose File | Save All. (The first eight characters of each page name needs to be dif-
ferent.)
See Also
Use Template (new page/template) dialog box
Open/Save As dialog box
To locate a graphics page:
515
Chapter 18: Defining and Drawing Graphics Pages
Style
The style of the page. CitectSCADA templates are grouped into several styles and are
available in various page resolutions. When you create a new project, you can choose
the style that most suits your taste and application. For details of each style, refer to the
"Presenting CitectSCADA " booklet, supplied with your CitectSCADA system.
Linked
To maintain the link with the original template, select this check box. A page or template
that is linked with its original template is automatically updated if the template is
changed.
Note: You can cut the link to the template at any time with the Cut Link command
from the Edit menu, but you cannot re-link a page or template with its original tem-
plate after the link has been cut.
Title bar
Determines whether to display the Windows title bar (at the top of each graphics page).
The title bar contains the title of the window, maximize, minimize and close buttons (at
the right hand end of the title bar), and the control menu button (at the left hand end of
the title bar). To display a page in fullscreen (without a title bar), the size of the page
needs to be the same size as the display (or larger). If the page is smaller than the dis-
play, the title bar still displays, even if fullscreen mode is enabled. Standard templates
styles are available for both page sizes.
Resolution
The screen resolution of the page or template:
516
Chapter 18: Defining and Drawing Graphics Pages
Screen
Width (pixels) Height (pixels)
Type
Defaul- Width of the screen on the computer Height of the screen on the com-
t currently in use puter currently in use
Note: If you are using distributed servers, the name needs to be unique to the cluster
(for example you cannot have the same page name in more than one cluster).
Project
The project in which to save the graphics page, template, symbol, Genie, or Super Genie.
Library
(For symbols, Genies, and Super Genies only.) The library in which to save the symbol,
Genie, or Super Genie. To create a new library, click New.
Style
(For templates only.) The style of the template. To create a new style, click New.
Preview Enable
517
Chapter 18: Defining and Drawing Graphics Pages
Displays a thumbnail image of the page, template, symbol, Genie, or Super Genie.
Title bar
(For templates only.) Specifies whether to include a space for the title bar. If you use a
title bar, you will have slightly less display space on screen.
Resolution
(For templates only.) The screen resolution of the template:
To delete a page, template, symbol, Genie, or Super Genie, select it and click Delete.
Note: You need to create default pages for your alarms (including alarm summary
and hardware alarms pages).
To enable you to create your graphics pages quickly, there are templates for common
page types. Templates help you create project pages that have a consistent 'look-and-
feel'. (Consistency in your project reduces the time your operators need to learn how to
use your runtime system.)
518
Chapter 18: Defining and Drawing Graphics Pages
See Also
Choosing a page style
Linking templates
Creating your own templates
Linking templates
When using a template to create a new page, a link can be kept to the template. A page
(or template) that is linked with its original template is automatically updated if the tem-
plate is changed.
When a page is linked to a template, the objects that form the template cannot be
accessed from the page by the usual double-click. To display the properties of these
objects, hold the Control (CTRL) key down and double-click the object you want to view
properties for. Alternatively, choose Tools | Goto Object, select the group, and click OK.
However, most of these properties are read-only.
Note: You can cut the link to the template at any time using Edit | Cut Link, but you
cannot re-link a page or template with its original template after the link has been
cut.
See Also
Creating your own templates
519
Chapter 18: Defining and Drawing Graphics Pages
Note: When you create a template, save it in the project directory. It is then backed
up when you back up the project. Don't modify the supplied standard templates.
When you edit a template, you need to use the Update Pages command (from the
Tools menu) to update each page based on the template. The properties of the tem-
plate are not updated automatically.
Note: To delete a template from the project, select the template name and click
Delete.
Note: To create a new style for the template, click New. You create a new template
520
Chapter 18: Defining and Drawing Graphics Pages
See Also
New Style dialog box
521
Chapter 18: Defining and Drawing Graphics Pages
You do not have to use a display sequence. You can define several Page GoTo com-
mands that display specific pages in an hierarchical structure.
See Also
Specifying a Startup Page
522
Chapter 18: Defining and Drawing Graphics Pages
The example project makes use of the new splash screen parameters to specify a page to
be displayed as splash screen, and the new Cicode functions to display product and
project information on the splash screen.
The following parameters are used to set up the splash screen in the example project:
[Page]
Splash = !Splash
SplashWinName = Splash
SplashTimeout = 5000
Startup = Menu
StartupWinName = Main
StartupDelay = 5100
HomePage = Menu
See Also
Sizing the Page
523
Chapter 18: Defining and Drawing Graphics Pages
Conversely, if a page displays on a screen with a resolution which is lower than the
page's resolution, the page will be larger than the display area. For example, if you draw
a page on a XGA screen and then display it on a VGA screen, it occupies more than the
entire screen; use the scroll bars to scroll to the area of the page that is not displayed.
See Screen examples for some examples of parameter settings and how the screen is dis-
played on screen.
See Also
Page size at runtime
Screen examples
When you draw a graphics page, determine the resolution of the computer you are using
to draw the page, and the resolution of the screen that will display the page in your run-
time system.
524
Chapter 18: Defining and Drawing Graphics Pages
[Animator]Full-
Screen = 0
[Animator]Max-
imizedWindow =
0
[Page]Dynam-
icSizing = 1
[Page]Main-
tainAspectRatio
=0
[Animator]Full-
Screen = 0
[Animator]Max-
imizedWindow =
0
[Page]Dynam-
icSizing = 1
[Page]Main-
tainAspectRatio
=1
525
Chapter 18: Defining and Drawing Graphics Pages
[Animator]Full-
Screen = 0
[Animator]Max-
imizedWindow =
0
[Page]Star-
tupMode = 4
[Animator]Full-
Screen = 0
[Animator]Max-
imizedWindow =
0
[Page]Star-
tupMode = 16
or
Aspect ratio =
monitor - titlebar
- taskbar
[Animator]Full-
Screen = 0
[Animator]Max-
imizedWindow =
1
[Page]Dynam-
icSizing = 1
526
Chapter 18: Defining and Drawing Graphics Pages
[Page]Main-
tainAspectRatio
=1
or
[Animator]Full-
Screen = 0
[Animator]Max-
imizedWindow =
1
[Page]Dynam-
icSizing = 1
[Page]Main-
tainAspectRatio
=0
[Page]Star-
tupMode = 16
or
Aspect ratio =
monitor - taskbar
[Animator]Full-
Screen = 0
[Animator]Max-
imizedWindow =
1
[Page]Dynam-
icSizing = 1
[Page]Main-
tainAspectRatio
=1
[Page]Star-
tupMode = 16
or
527
Chapter 18: Defining and Drawing Graphics Pages
[Page]Star-
tupMode = 16
528
Chapter 18: Defining and Drawing Graphics Pages
[Animator]Full-
Screen = 1
[Page]Dynam-
icSizing=1
[Page]Main-
tainAspectRatio
=0
or
Aspect ratio =
monitor
[Animator]Full-
Screen = 1
[Page]Dynam-
icSizing = 1
[Page]Main-
tainAspectRatio
=1
or
529
Chapter 18: Defining and Drawing Graphics Pages
or
Aspect ratio =
monitor - titlebar
[Animator]Full-
Screen = 2
[Page]Dynam-
icSizing = 1
[Page]Main-
tainAspectRatio
=1
or
or
530
Chapter 18: Defining and Drawing Graphics Pages
or
or
or
531
Chapter 18: Defining and Drawing Graphics Pages
monitor - titlebar
[Animator]Full-
Screen = 1
[Page]Dynam-
icSizing=0
See Also
Page size at runtime
532
Chapter 18: Defining and Drawing Graphics Pages
533
Chapter 18: Defining and Drawing Graphics Pages
This property is optional. If you do not specify a Next page, the Page Next command is
inoperative while this page is displayed.
[Security] All areas
Select the check box if you want the page to belong to every area (the page can be seen
by any operator with view access to at least one area; see Adding user records).
[Security] Area
Enter the area to which this page belongs. Only users with access to this area can view
this page. Click the menu to select an area, or type in an area number directly. If you do
not specify an area, the page is accessible to every user.
[Page scan time] Default
The Page scan time defines how often this graphics page is updated at runtime. The
Page scan time also determines the rate of execution of the While page shown events (i.e.
the command(s) which are executed while the page is displayed at runtime).
Select this check box to use the default page scan time (as set using the [Page]ScanTime
parameter); otherwise, leave it blank, and enter (or select) another value in the field
below. For example, if you enter a page scan time of 200 milliseconds, there will be an
attempt to update the page every 200 milliseconds, and any While page shown events
are executed every 200 milliseconds.
Note: You can set the default page scan time using the Computer Setup Wizard.
Note: You need to include the MsgLog field in the format of the log device for the
message to be sent.
534
Chapter 18: Defining and Drawing Graphics Pages
See Also
Defining Page Properties
[Template] Name
The name of the template on which the page is based. Choose a template name from the
menu.
Note: If you are looking for a template that you created yourself, check that you
entered the correct Style and Resolution above.
535
Chapter 18: Defining and Drawing Graphics Pages
Determines whether the Windows title bar displays (at the top of the page). The title bar
contains the title of the window, maximize, minimize and close buttons (at the right
hand end of the title bar), and the control menu button (at the left hand end of the title
bar).
To display a page in full screen (without a title bar), the size of the page needs to be the
same size as the display (or larger). If the page is smaller than the display, the title bar
still displays, even if full screen mode is enabled. Standard templates styles are available
for both page sizes.
[View area] Width
The width (in pixels) of the area that the operator can view at runtime. Click the up and
down arrows to increase and decrease the width, or type in another value directly.
[View area] Height
The height (in pixels) of the area that the operator can view at runtime. Click the up and
down arrows to increase and decrease the height, or type in another value directly.
Page color
The color that will display in the background of the graphics page.
The preview field to the right of this dialog displays a picture of the selected template.
Click Apply, then click OK. To define further properties for the page, click the relevant
tabs.
Ignore Quality
This field allows you to override the global [Page]IgnoreValueQuality parameter setting
in the Citect.ini file for a particular page.
The options are:
l Default Indication - use the current setting for the [Page]IgnorevalueQuality param-
eter setting in the Citect.ini file.
l #COM Indication - change the setting to the equivalent of 0 for the [Page]Ignore-
valueQuality parameter setting in the Citect.ini file.
l No Indication - change the setting to the equivalent of 1 for the [Page]Ignore-
valueQuality parameter setting in the Citect.ini file.
l Background Indication - change the setting to the equivalent of 2 for the [Page]Ignore-
valueQuality parameter setting in the Citect.ini file.
See Also
Defining Page Properties
536
Chapter 18: Defining and Drawing Graphics Pages
537
Chapter 18: Defining and Drawing Graphics Pages
The result of not assigning a privilege restriction differ according to whether you have
used areas in your security setup:
l No Areas: Every operator has full control of the page.
l Areas: An operator will only need view access to the area assigned to this page to
have full control over the page (see Adding user records).
[Security] Privilege level
Enter the privilege level that a user needs to possess to issue this command or log the
message. For example, if you enter Privilege Level 1 here, operators need to possess Priv-
ilege Level 1 to issue this command. You can also combine this restriction with area
restrictions (see above). For example, if you assign the keyboard command to Area 5,
with Privilege Level 2, the user needs to be set up with Privilege 2 for Area 5 (see Add-
ing user records).
Choose a privilege from the menu or type in an area number.
[Logging] Log Message
A text message sent to the MsgLog field of the Log Device when the selected action is per-
formed by the operator at runtime (32 characters maximum). The message can be plain
text, Super Genie syntax, or a combination of the two.
If you want to include field data as part of a logged message, you need to insert the field
name as part of the device format when you configure the device. For instance, in the
Format field of the Devices form, you could enter {MsgLog,20} {FullName,15}. This
would accommodate the logging of messages such as P2 started by John Smith.
The log device to which the message is sent is specified through the General page prop-
erties.
Click Apply, and then click OK. Click Clear Property to clear property details, and dis-
able the property. To define further properties for the page, click the relevant tabs.
See Also
Defining Page Properties
538
Chapter 18: Defining and Drawing Graphics Pages
There are three events to which commands can be attached. You can select more than
one type of event. Unique commands can be attached to each (i.e., you can perform one
task when the page is opened, and another when it is closed).
[Event] On page entry
Select this option if you want a command to be executed when the page is initializing.
For example, you could execute a command to extract recipe data from a database into a
Cicode variable, to be displayed on the page.
Note: Use the "On Page Shown" event if your command uses ActiveX controls. The
"On page entry" event may not properly initialize ActiveX controls. The resulting
value from a tag write that is perfomed using the "On page entry" event may not be
displayed and accessed correctly if the tag is used directly within the page. The "On
page shown" event can be used for initializing tags that are to be accessed on the
page.
Note: If you shut down the system, "On page exit" functions for the currently open
pages do not execute. If a particular page exit code needs to run, call the code before
calling the Shutdown() function.
539
Chapter 18: Defining and Drawing Graphics Pages
Notes:
1. Use the "On Page Shown" event if your command uses ActiveX controls. The "On
page entry" event may occur before the ActiveX controls have been initialized.
2. Use the "On Page Shown" event if your command requires access to the latest var-
iable tag value. The "On page entry" event may occur before the tag has been
resolved.
540
Chapter 18: Defining and Drawing Graphics Pages
For new associations enter the name or number of the association directly in the field
provided, or select the name or number of the association from the drop-down box. Only
those associations that are ‘in-use’ as part of a Super Genie substitution are listed.For
example, if the substitution in the expression field of a button was‘?Speed?’ then the
association name is Speed.
Name Associations:
l To start with an alphanumeric or “_” character
l To contain only those characters that are allowed in variable tag names (excluding
the period character ‘.’), and not contain any white space.
l Be no more than 253 characters in length
Default (optional)
Enter the default value to be used if the page association has not been performed using
one of the Ass() Cicode functions at runtime. The default value needs to be either a literal
string constant enclosed in single quotes (e.g. <'a literal value'> or <'1.23'>) or a valid tag
name.
Value on Error (optional):
541
Chapter 18: Defining and Drawing Graphics Pages
Enter the text to be used if no default value is defined and the association is not per-
formed, or if the defined association did not resolve to a valid tag name. Since the value
on error cannot be a variable tag, it is not necessary to enclose the text in quotation
marks.
If the substitution on the page is specified in a typed format, the value will be converted
to the specified type. If the value cannot be converted a hardware alarm will be raised.
For example, if the substitution is specified as ?INT AlmDesc? and the value on error is
set to <LowLevel>, the animation will display zero (0) and a hardware alarm will be
raised. Typeless substitutions such as ?AlmDesc? will display the value on error as spec-
ified.
Description (optional):
Enter a description of the page association. The description is useful when maintaining
associations.
In Use:
This column can not be edited and simply indicates if the association is in use on the
current page in a Super Genie substitution.
When finished click Add, the association is then added to the table.
To edit an association select an item and click Edit or double-click on the row to make it
editable. You can not edit the name of an existing association that is in use. However
you can select a new name in an existing row, and when this name is <ENTERED>, a
new row of information will be displayed and the existing row of data will disappear.
To delete an association select the row in the table and click Delete. You can delete asso-
ciations in use or not in use. If you delete the object from the page, the status of the asso-
ciation used in the Super Genie substitution will be updated to not in-use.
Click Ok or Apply to save the association table or click Cancel to discard any changes
you may have made.
See Also
Defining Page Properties
Passing Metadata as Super Genie Assoications
Defining Associations for Super Genies
Defining Substitutions for Super Genies
Constants
542
Chapter 18: Defining and Drawing Graphics Pages
Page defaults
You use the Page Defaults dialog box to define the screen resolution and style that graph-
ics pages will use.
You can override these defaults for your pages when you create them or edit them.
[Template] Resolution
Default screen resolution of the standard graphics pages (for example, alarms pages and
standard trend pages):
[Template] Style
The style (appearance) of the graphics pages in the runtime system. The style you select
is the default style for new pages you add to the project. You can change the style of
existing pages and templates using the Page Properties.
Most users prefer the Standard style. You can view the pre-defined styles by looking in
the Include project under Graphics, Templates.
[Template] Show title bar
Determines whether the Windows title bar displays at the top of each graphics page. The
title bar contains the title of the window, maximize, minimize and close buttons (at the
right hand end of the title bar), and the control menu button (at the left hand end of the
title bar).
543
Chapter 18: Defining and Drawing Graphics Pages
To display a page in full screen (without a title bar), the size of the page needs to be the
same size as the display (or larger). If the page is smaller than the display, the title bar
still displays, even if full screen mode is enabled. Standard templates styles are available
for both page sizes
You can override this default for your own pages at the time you create them, or later.
Background color
The color that will display in the background of new graphics pages.
Preview
This dialog also displays a preview of your page with the defaults applied.
Grids
You can use a grid to align and place objects with precision. When the grid is active,
any objects or groups of objects that you create, move, or re-size snap to the nearest grid
intersection.
To display the grid:
l Choose View | Grid Setup. The Grid Setup dialog box appears.
544
Chapter 18: Defining and Drawing Graphics Pages
See Also
Grid Setup dialog box
Guidelines
You can use horizontal and vertical guides as a straight-edge, to align and place objects
precisely. When an edge or the center of an object gets close to a guide, that edge or
center automatically snaps to the guide.
To set up guidelines:
545
Chapter 18: Defining and Drawing Graphics Pages
To move a guideline:
Options
You can define general options for your drawing environment.
To define general options for the drawing environment:
546
Chapter 18: Defining and Drawing Graphics Pages
Option Description
Display Enables the automatic display of the relevant properties dialog when you
Prop- add an object to the page.
erties on
New
Display Enables the automatic display of the relevant properties dialog when you
Prop- copy an existing object on the page.
erties on
Copy
Save Tem- Enables the display of an alert message when you modify and then save an
plate existing template. When you modify an existing template, any graphics
Warning pages that are associated with the template are not updated until you per-
form an Update Pages to update each page based on the template.
Modify Allows you to modify the number of the animation point (AN) of any object.
AN Field You cannot change an AN to the same number as an existing AN on the
graphics page.
Disable Disables the display of Genie forms when a new Genie is added to the page
Genie or an existing Genie is edited. With Genie forms disabled, a form for each
Forms native object in the Genie displays.
Display Enables the display of a group button on a Genie dialog. The group button
Group displays a form for each native object in the Genie.
Button
Compile Enables the "Do you want to compile?" message window when the project
Enquiry has been modified and Run is selected. Normally the project is compiled
Message automatically (if the project has been modified) when Run is selected.
Fast Run- Enables the fast display of graphics pages in the runtime system.
time Dis-
play
Show ver- Enables the old (version 3 and version 4) toolbox. This toolbox contains old
sion tools (such as Slider and Bar Graph), which are no longer necessary, as
547
Chapter 18: Defining and Drawing Graphics Pages
Option Description
Fast Affects the operation of Graphic Builder's "Update Pages" tool. If Fast
Update Update Pages is checked, Graphics Builder only updates modified pages. If
Pages not checked, every project page is updated.
Trans- Allows you to specify a color that becomes transparent when a bitmap is
parent pasted on a graphics page. This applies to bitmaps that are pasted from the
Paste clipboard, or imported from another application.
Note: Transparent data bits are not natively supported by other appli-
cations. If pasting a bitmap into an external application, transparent bits
will appear as the transparent paste color.
ActiveX Lets you save graphics pages before inserting an ActiveX control. This
Auto- guards against the loss of data if you insert custom-built ActiveX controls
matic which cause the Graphics Builder to stop operating normally. With Auto-
Page Sav- matic Page Saving enabled, if inserting an unstable ActiveX control causes
ing such an event, you minimize the likelihood of losing work. When you reopen
the Graphics Builder, you can normally recover the saved page.
3. Click OK.
See Also
Options
Colors
True Color (16.7 million colors) is supported for static and animated objects, including
page backgrounds, imported images, symbols, metafiles and bitmaps.
Wherever a particular page or object property has a color value, a current color button
will appear.
To choose a different color to the one currently displayed on the button, click on the
small black arrow to the right. This launches the Color Picker.
548
Chapter 18: Defining and Drawing Graphics Pages
Color Picker
The first 11 rows of the Color Picker show a set of standard colors, including transparent
(marked with a black cross). The remaining rows display any user defined colors,
referred to as Color Favorites. This includes flashing colors, represented by a two color
block, divided diagonally.
To select one of the colors displayed on the color picker, click on it.
If the necessary color does not appear, you have the option to create a custom color, or
match an existing color from one of your graphics pages.
To match an existing color on a graphics page:
1. Verify that the color you would like to match is present on the page currently dis-
played in Graphics Builder.
2. From the Color Picker, choose the Color Selector tool (looks like an eyedropper).
3. Use the Color Selector to click on the color you would like to match.
4. The color you have chosen will now appear in the Color Value Display button.
To create a customized color:
1. From the Color Picker, click on the Edit button. This will make the Edit Favorite Color
dialog appear.
2. Use the Edit Favorite Color dialog to create the color you would like to use (See Edit
Favorite Colors dialog box for details).
3. Name the color if necessary.
4. Use the Add button to include the color with the Color Favorites displayed on the
Color Picker.
5. Click OK. The color you have just created will now be selected.
See Also
Edit Favorite Colors dialog box
Swap Color dialog box
Adjust colors dialog box
549
Chapter 18: Defining and Drawing Graphics Pages
550
Chapter 18: Defining and Drawing Graphics Pages
Clear
Removes the selected color, leaving an "unused" position on the color grid.
Name
Allows you to associate a name with a predefined color. The name can be viewed as a
tool tip in the Color Picker, making it easy to distinguish a specific color among similar
shades.
You can associate a name with a newly created color by typing in a name before clicking
the Add button. You can also apply a name to an existing color by selecting the color,
keying in a name and clicking the Replace button.
Note: The pre-defined color labels are already defined as color names.
Color
The Color panel displays the color created by the current settings applied to the Edit
Favorite Color dialog.
The values displayed on the Edit Favorite Color dialog automatically adjust to correctly
represent the color currently displayed in this panel. The values in each field are not
independent.
Color wheel
The color wheel allows you to visually select a color. It represents the full spectrum of
colors in a cyclic layout, with color saturation increasing towards the outside edge.
Simply click on the wheel to select a color.
Brightness bar
Allows you to visually select the brightness you would like applied to a color. Click on
the bar in the appropriate location to apply a brightness level. The bar represents lumi-
nance, as the colors move away from pure black as they progress up the bar to pure
white.
Hue
Specifies the hue value for the color currently displayed in the Color panel. Hue pri-
marily distinguishes one color from another. The value can be between 0 (zero) and 359,
representing degrees around the color wheel. For example, zero is a pure red to the right,
180 is pure cyan on the left.
Sat
Specifies the saturation level for the color currently displayed in the Color panel. Sat-
uration level increases the further the selected color moves away from gray scale to a
pure primary color. The value can be between 0 (zero) and 255.
Lum
551
Chapter 18: Defining and Drawing Graphics Pages
Specifies the luminance of the color currently displayed in the Color panel. Luminance
represents the brightness of a color, the value increasing the further the color moves
away from black towards pure white. The value can be between 0 (zero) and 255.
Note: When you create a color by using HLS values, you may find that the HLS
values you specified for a color have changed when you reopen the dialog box. This
happens because RGB values are less precise than HLS values, sometimes resulting
in several HLS values being assigned the same RGB value. As a result, when the
HLS values are generated from the RGB values, some values may change.
Red
Indicates the amount of red used to create the color currently displayed in the Color
panel. The value can be between 0 (zero) and 255. Adjust this setting if you want to
create a color using RGB values.
Green
Indicates the amount of green used to create the color currently displayed in the Color
panel. The value can be between 0 (zero) and 255. Adjust this setting if you want to
create a color using RGB values.
Blue
Indicates the amount of blue used to create the color currently displayed in the Color
panel. The value can be between 0 (zero) and 255. Adjust this setting if you want to
create a color using RGB values.
Transparent
Click this button to select transparent. Wherever transparent is used as a color, the back-
ground color, or color behind the transparent object, will be displayed.
Flashing
Check this box if you want to create a flashing color. A flashing color appears as a dia-
gonally divided panel in the color grid. To create a flashing color, you will have to select
an On State and Off State color.
Note: You may find that you get unexpected results when swapping colors in your
bitmaps if they contain areas that have either very high or very low luminance
552
Chapter 18: Defining and Drawing Graphics Pages
values (that is, white or black areas). This is due to the fact that these areas contain
almost no color, only luminance. For example, areas that represent specular high-
lights (the shine on a brightly illuminated steel conveyor belt, for example) will
remain colorless no matter how the color for the rest of the bitmap is adjusted. Con-
sequently, before working with the Swap Color dialog box and other color tools,
familiarize yourself with the concepts of hue, luminance, and saturation in order to
avoid unexpected results with the images on your graphics pages.
From
The current color of the object. If you click the Swap range check box, it presents a range
of colors in varying degrees of brightness ranging from white to black. Any colors in this
range that exist in the object are replaced by the corresponding colors from the To range
as follows:
To
The color the original object color will be changed to. If you click the Swaprange check
box, it presents a range of colors in varying degrees of brightness from white to black.
This allows you to swap a whole range of colors at once.
From any color
Specifies to change every color in the object to the new color.
Swap range
Specifies to swap a range of colors. The From and To boxes indicate the starting colors
in the ranges.
Note: You cannot invert colors with Swap Range selected. This means, for example,
that you could not swap dark red for light green and light red for dark green in one
go.
553
Chapter 18: Defining and Drawing Graphics Pages
554
Chapter 18: Defining and Drawing Graphics Pages
Zooming
Use the Zoom command to view an enlarged view of your drawing. The Zoom com-
mand displays a zoom box on screen that magnifies the area around your cursor, ena-
bling you to position or draw objects precisely.
Procedure Description
To hide the Zoom Double-click the control menu box (on the Zoom box) or choose
box View | Show Zoom.
You can change the cursor into crosshairs that extend the full width and length of the
drawing area. When you move away from the drawing area, the normal pointer reap-
pears, allowing you to select commands and tools.
Procedure Description
To toggle the cursor between a crosshair Choose View | Cross Hair Cursor.
cursor and a pointer
To hide the Toolbox Double-click the control menu box (on the
Toolbox) or choose View | Show Tools.
Choose the command again to redisplay
the Toolbox.
To change the speed of the cursor when Choose View | Mouse Slow Speed.
using the mouse
To change the speed of the cursor when Choose View | Cursor Keys Slow
using the cursor keys Speed.
555
Chapter 18: Defining and Drawing Graphics Pages
Using libraries
You can store frequently used objects or groups of objects (including bitmap objects) in a
library as symbols. You can then paste these symbols onto your page.
After you paste a symbol from the library onto a graphics page, it can be moved, re-
sized, re-shaped, brought to the front, and its properties can be edited, just like any other
type of object.
You can define Metadata for a pasted symbol and on the separate animation points that
make up that symbol. Each of these animation points will have different ANs. Access to
this metadata is obtained through its corresponding AN.
You can paste a symbol from the library to the page:
l As an unlinked symbol; the pasted symbol is not updated with changes to the sym-
bol in the library.
l As a linked symbol; the symbol on the page is updated when the symbol in the
library is changed (to alter the properties of a symbol in the library, open the library
and edit it in the library). If you edit the symbol from the page and then change the
source symbol in the library, the pasted symbol changes. For example, if you double
the size of a pasted symbol, then double the size of the symbol in the library, the
pasted symbol doubles again. You can cut the link to the library by using the Edit |
Cut Link command.
When you save an object in a library, the current properties of that object are saved with
it. When you paste it as a symbol to a graphics page, they are used as defaults for the
symbol. Pasted symbols have different Appearance properties to those of normal objects:
you can only specify a visibility property.
When a symbol is pasted onto a page, the objects that form the symbol cannot be
accessed from the page by double-clicking the symbol. To display the properties of these
objects, hold the Control (CTRL) key down and double-click the specific object. Alter-
natively, you can select Goto Object from the Tools | the group, and click OK. However,
if the link to the library is retained, most of these properties are read-only.
A symbol would be useful, for example, if you have defined a command button with a
particular security classification, and you need to use it on quite a few graphics pages.
You could save it as a symbol, and each time you want to use the button, paste it from
the library. Each time it is pasted, it will have the same properties.
Note: There is a comprehensive range of symbols that you can use in your project(s).
These symbols are stored in several libraries in the "Include" project. When a library
is saved, the first eight characters of the library name needs to be unique to that
556
Chapter 18: Defining and Drawing Graphics Pages
library.
1. Click Select.
2. Select the object (or group of objects).
3. Choose Edit | Copy to Library. The Copy To dialog box appears.
Copy To dialog box
This dialog box lets you copy an object (or group of objects) to the library as a symbol.
Feature Description
Note: To edit the symbol, select it and click Edit. To create a new symbol, click New.
Using symbols
You can create symbols to use on your graphics pages.
To create a new symbol:
557
Chapter 18: Defining and Drawing Graphics Pages
Note: You can also create an object (or group of objects on the page) and then choose
Edit | Copy to Library.
Note: To delete a symbol from the library, select the symbol name and click Delete.
Bitmaps
A bitmap image is a drawing object represented as an array of pixels (or dots), rather
than as individual entities. A bitmap is treated as a single object that you can move,
copy, and reshape. Because you can edit individual pixels in a bitmap, you can use bit-
maps for vignettes and image blending.
You can create bitmaps with the Bitmap Editor, or import bitmaps from any other Win-
dows-based bitmap editor.
In a runtime system, bitmaps are displayed differently to other objects. Bitmaps are
mapped directly to the screen (that is, each pixel in the image corresponds to a pixel on
the screen). Objects are stored as a series of instructions, and are drawn on the screen in
the same order as they were drawn on the graphics page.
558
Chapter 18: Defining and Drawing Graphics Pages
Selects a color from the image to set as the current color (keyboard shortcut is
Shift+P). You can also select the current color from the color swatch.
Displays the Bitmap Size dialog box where you can view the image's current
dimensions and edit the image's edge.
To resize a bitmap:
559
Chapter 18: Defining and Drawing Graphics Pages
Note: The Convert to Bitmap operation is only supported in 8-bit (256) color mode.
1. Choose File | Import as Flashing. The Primary Import dialog box appears.
2. Select the first file you want to use for your flashing image.
3. Click OK. The Flashing Import dialog box appears.
4. Select the second file you want to use for your flashing image.
560
Chapter 18: Defining and Drawing Graphics Pages
561
Chapter 18: Defining and Drawing Graphics Pages
562
Chapter 19: Using Objects
Objects are basic drawing entities that you add to your graphics pages. Objects are
drawn using the tools in the drawing toolbox, and can be moved, reshaped, or copied
after they are drawn. Objects are defined by a set of properties, which are assigned when
the object is drawn, or afterwards, by double-clicking (these properties will override any
conflicting Cicode Display functions).
Most objects can be assigned keyboard commands and access rights, and can be con-
figured in such a way that they change dynamically at runtime when an expression
returns a certain value, or a variable tag changes state. They can even be used as sliders
to change the state of a variable.
Note: If an object is part of a group, part of a pasted Genie or symbol, or part of the
page's template, you can still access its properties. Simply hold down the Control
(CTRL) key and double-click the object. Alternatively, choose Tools | Goto Object,
click the object, and then click OK. However, if there is still a link to the original
Genie/symbol/page template, the object properties are mostly read-only.
563
Chapter 19: Using Objects
See Also
Using groups
Reshaping objects
Using bitmaps
Importing graphics
Using groups
You can group multiple objects. A group has a unique set of properties (much the same
set as an object) which determine the runtime behavior of the group as a whole. (The
properties of the individual objects in the group remain unchanged.) By defining group
properties, you can specify that the entire group changes dynamically under specific run-
time conditions (for example, when an expression returns a certain value, or a variable
tag changes state).
To edit or view the properties of a group, double-click it. If there are several groups on
your page, choose Tools | Goto Object. This allows you to see which groups and objects
are on your page, making it easier for you to select the object you want to edit. It also
allows you to display the properties of the objects (or groups) that make up the group.
(You can also edit the properties of an object in the group by holding down the Control
(CTRL) key and double-clicking the object. Alternatively, select Goto Object from the
Tools menu, select the object, then click OK.) This is useful if your page has groups
within groups.
A group can be a mix of objects and other groups.
Note: With the release of CitectSCADA 7.30 objects in hidden groups are no longer
visible. For further details, refer to Object Properties - Access (Disable).
See Also
Reshaping objects
564
Chapter 19: Using Objects
Reshaping objects
Pipe, Polyline, or Polygon objects can be edited to change their shape. Each of these
objects consist of a continuous series of lines drawn between structural anchor points
called nodes. Nodes are visible when an object is selected. Each node appears as a small
square located at specific anchor points along the object. There will be a node located at
the start and end of a polyline or pipe, and at every change of direction in an object's
shape.
Pipe, Polyline, and Polygon objects can have their shapes changed in many ways. Their
nodes can be selected individually or by group and moved to a different position, thus
changing the shape of the object. The Pipe, Polyline, and Polygon objects also support
node adding and deleting.
Using bitmaps
A bitmap image is a special object, represented as an array of pixels or dots, rather than
as individual entities. Bitmaps are treated as single objects that you can move, copy, and
reshape. You can create and edit bitmaps with the Citect Bitmap Editor. Because you can
edit the individual pixels in a bitmap, you can use bitmaps for more 'artistic' images,
such as vignettes and image blending.
See Also
Importing graphics
565
Chapter 19: Using Objects
Importing graphics
The Graphics Builder has several file format filters to allow you to import graphics from
other applications, such as drafting programs, illustration programs, presentation pack-
ages, scanners, etc. After a graphic is imported, you can use the graphics builder to edit
the image.
Graphics files can be dragged from a third-party application (such as Windows
Explorer), and dropped onto a page in the Graphics Builder.
Object Properties
The properties of an object are defined in the Properties dialog box. When you draw an
object, the properties dialog appear, allowing you to define the attributes.
You can also double-click the object (or choose Edit | Properties) to display the prop-
erties dialog.
If an object is part of a group, part of a pasted Genie or symbol, or part of the page's tem-
plate, you can access the object's properties by pressing CTRL and double-clicking the
object. Alternatively, choose Tools | Goto Object, click the object, and then click OK.
See Also
Appearance
Movement
Scaling
Fill
Input
Slider
Access
Metadata
Appearance
Click the Appearance tab to define the appearance of the object, such as line style, and
shadowing. You can also specify when the object will be hidden from the operator (for
example when DIGITAL_TAG is OFF).
The check mark to the left of the Appearance tab tells you when an appearance property
has been configured. The check marks in the tabs down the right of the dialog indicate
which property is configured.
566
Chapter 19: Using Objects
Click the other tabs to define more properties for the object. Most properties work
together; for example, an object could possess color fill, movement, and scaling prop-
erties simultaneously.
See Also
Object Properties
Movement
Movement
Click the Movement tab to move the object vertically or horizontally, or to rotate it,
depending on the return of an expression, or the state of a tag.
The check mark to the left of the Movement tab tells you when a Movement property
has been configured. The check marks in the tabs down the right of the dialog tell you
which property is configured.
Click the other tabs to define more properties for the object. Most properties work
together; for example, an object could possess color fill, movement, and scaling prop-
erties simultaneously.
See Also
Object Properties
Scaling
Scaling
Click the Scaling tab to scale the object both vertically or horizontally, depending on the
return of an expression, or the state of a tag.
The check mark to the left of the Scaling tab tells you when a Scaling property has been
configured. The check marks in the tabs down the right of the dialog indicate which
property is configured.
Click the other tabs to define more properties for the object. Most properties work
together, for example, an object could possess color fill, movement, and scaling prop-
erties simultaneously.
See Also
Object Properties
Fill
567
Chapter 19: Using Objects
Fill
Click the Fill tab to specify the color which is to fill the object, and the level to which the
object will be filled. The fill properties can change dynamically, depending on the return
of an expression, or the state of a tag etc. (for instance, you could use this tab to visually
reflect tank levels).
The check mark to the left of the Fill tab tells you when a Fill property has been con-
figured. The check marks in the tabs down the right of the dialog indicate which prop-
erty is configured.
Click the other tabs to define more properties for the object. Most properties work
together, for example, an object could possess color fill, movement, and scaling prop-
erties simultaneously.
See Also
Object Properties
Input
Input
Click the Input tab to specify the command to be executed, and the message to be logged
when an operator clicks on the object. You can also define keyboard commands for the
object, and limit their scope with area and privilege security.
The check mark to the left of the Input tab tells you when an Input property has been
configured. The check marks in the tabs down the right of the dialog indicate which
property is configured.
Click the other tabs to define other object properties. Most properties work together; for
example, an object could possess color fill, movement, and scaling properties simul-
taneously.
See Also
Object Properties
Slider
Slider
Click the Slider tab to use the object as a slider. A variable can be associated with the
object, and when the operator moves the object, the value of the variable will change.
Objects can be set up to slide vertically and/or horizontally, or they can be rotated.
568
Chapter 19: Using Objects
The check mark to the left of the Slider tab tells you when an Slider property has been
configured. The check marks in the tabs down the right of the dialog indicate which
property is configured.
Click the other tabs to define other object properties. Most properties work together; for
example, an object could possess color fill, movement, and scaling properties simul-
taneously.
See Also
Object Properties
Access
Access
Click the Access tab to assign an area or privilege to the object. Operators without appro-
priate access rights will not be able to use sliders, object specific keyboard commands
etc. It also allows you to disable the object under certain runtime circumstances. This
means that the object can be embossed, grayed, or even hidden.
The check mark to the left of the Access tab tells you when an Access property has been
configured. The check marks in the tabs down the right of the dialog indicate which
property is configured.
Click the other tabs to define more properties for the object. Most properties work
together; for example, an object could possess color fill, movement, and scaling prop-
erties simultaneously.
Clear Property
Click Clear Property to remove the configuration details for this property.
Apply
Click Apply to bring your changes into effect. Apply allows you to view your changes
without closing the Properties dialog.
See Also
Object Properties
Metadata
Metadata is a list of names with corresponding values. The Metadata is attached to an
objects animation point. When using any of the DspAnGetMetadata Cicode functions
this Metadata is processed, with the field values retrieved, and set at runtime. At run-
time Metadata cannot be added or removed.
569
Chapter 19: Using Objects
Note: Metadata can also be assigned to super genie associations. See Passing
animation point metadata as Super Genie associations for more information.
Note: At runtime Values can be changed, however when the graphics page is closed
the Values will revert to the original configuration.
Click Add to save the row. The next row is highlighted and is now editable. Click on the
ESC key to cancel this row or continue to enter name | value pairs until finished.
To edit a Metadata entry:
Double-click the cell you want to edit, or select a row and click the edit button.
Modify the Name or Value . Click Apply to bring your changes into effect and then OK
to close the graphic object properties dialog.
Refer to Using Metadata for examples on how you can implement metadata in your
project.
570
Chapter 19: Using Objects
See Also
Object Properties
Using Metadata
The following examples provide a guide into how you can implement metadata within
your project. In the first example you will set parameters using metadata, and in the sec-
ond example see how genie substitutions can be used in metadata. The third example
shows you how to use Metadata to define a subset of current objects on your graphics
page and to use Cicode to call, retrieve and set metadata values from an outside source
such as a database.
In the examples a paint factory needs to control the amount of Cyan, Magenta, Yellow,
and Key (Black) (CMYK), which is mixed to create different colors in their color chart.
Example 1: Setting Parameters Using Metadata
1. From the toolbox select the ‘number’ tool and in the Text Properties dialog configure
as below. This is the pump that represents the color Cyan.
3. Create a button object. This button when selected at runtime will set the CMYK
values for a specific color e.g Pine Green
571
Chapter 19: Using Objects
4. At runtime when the ‘Pine green’ button is selected the values of the metadata
defined for Cyan, Magenta, Yellow and Black are retrieved and the relevant pumps
set.
Instead of creating a new button for every color as you did in the previous example, you
can create a genie and save it in the genie library. You can use the genie every time you
need to create a new color button.Only needing to configure the name of the button and
the CMYK values that belong to it.
1. From File New-> Genie
2. Add a button object onto the page
3. Configure the button – the title of the button and the Value of the Metadata have
been defined using genie substitutions e.g %Color% and %Cyan%.
572
Chapter 19: Using Objects
6. At runtime when the ‘Purple Heart’ color button is selected the values of the meta-
data (that were entered in the genie prompt) are retrieved and the relevant pumps set.
Example 3: Defining a subset of Animation points using Metadata
573
Chapter 19: Using Objects
A graphics page could have over four hundred Animation points. Each Animation point
belongs to an object, which raises the question how can you define a subset of these
objects and perform an operation only on that subset. In this example, metadata is used
to define a subset of animation points, and then Cicode is used to operate on this subset
collectively using values stored in an outside source.
Note:For the following example it is assumed you are already using an ODBC data
source.
This example:
l Defines a subset
l Two Cicode functions (created for this example only) – LoadColors(), and Load-
ColorsForButton()
l Cicode to loop through a database table and match, and retrieve values belonging to
the subset defined as “ColorName”.
1. Create four new buttons for the colors – Charcoal, Lime, Olive and Puce.
2. In the graphics editor create a new button. This button will be used to call the values
from the data source using the function LoadColors()
3. At runtime when the LoadColors() button is selected Cicode is triggered that will
search for metadata entries named “ColorName” on the current page. In this example
574
Chapter 19: Using Objects
the “ColorName” is Olive. From the data source it then loads relevant the CMYK
values.
4. When the Olive color button is then selected the values are displayed and the pumps
set.
Cicode used in this example:
nAn = DspGetAnFirst();
WHILE nAn <> -1 DO
// Determine whether the current animation object has a
// metadata entry named "ColorName". If DspAnGetMetadata
// cannot find the named entry, it returns an empty string.
sColorName = DspAnGetMetadata(nAn, "ColorName");
IF sColorName <> "" THEN
LoadColorsForButton(nAn, sColorName);
END
nAn = DspGetAnNext(nAn);
END
END
// This function loads the CMYK metadata values for the specified
// button (nAn) from a database. This demonstrates how metadata values
// can be modified at runtime.
FUNCTION LoadColorsForButton(INT nAn, STRING sColorName)
INT hSQL;
INT nStatus;
STRING sCyan;
STRING sMagenta;
STRING sYellow;
STRING sBlack;
575
Chapter 19: Using Objects
END
SQLEnd(hSQL);
ELSE
Message("Exec Error", SQLErrMsg(), 48);
RETURN;
END
SQLDisconnect(hSQL);
ELSE
Message("Connect Error", SQLErrMsg(), 48);
RETURN;
END
See Also
Object Properties
Animation Point
Associations Display Results at runtime
Metadata Pairs
576
Chapter 19: Using Objects
Animation Point
Associations Display Results at runtime
Metadata Pairs
Y N Y N Y #ASS * *
Y N Y N N #ASS * *
N N N * * #ASS * *
N * Y N Y #ASS * *
N * Y N N #ASS * *
N * N * * #ASS * *
See Also
Page Properties - Associations
Super Genies
Manipulating Objects
Objects can be manipulated in various ways, such as moving, resizing, and grouping.
See Also
Selecting objects
Moving objects
Resizing objects
Deleting objects
Locking/unlocking objects
Grouping objects
Copying and pasting objects
577
Chapter 19: Using Objects
Selecting objects
To select a single object:
Note: To add other objects to the selection, hold the Ctrl key and click each object in
turn. To deselect an object from a group selection, while still holding the Ctrl key,
click the object again. To select every object in the drawing, use Select All from the
Edit menu. To deselect every object, click anywhere other than on an object.
Note: To add other objects to the selection, or remove objects from the selection, hold
the Ctrl key and click each object in turn. To quickly select every object in the draw-
ing, you can use Select All from the Edit menu. To deselect every object, click any-
where other than on an object.
See Also
Manipulating Objects
Moving objects
Moving objects
You can move an object if you want by clicking the object and dragging it to the new
location.
578
Chapter 19: Using Objects
If you move an object as soon as you select it, an outline of the object boundary displays
as you move it on your page. If you hold the mouse stationary for 1 sec or more before
you move the object, the object itself displays as you move it, enabling you to better see
the result for a more accurate placement.
See Also
Manipulating Objects
Resizing objects
Resizing objects
You can resize objects simply.
To re-size an object:
1. Select the object, and then move the cursor over a sizing handle. The cursor changes
to a two-sided arrow showing the directions that you can drag the handle to resize
the object.
2. Click and drag the handle to a new location. The object's bounding box appears as
you drag.
3. Release the mouse button.
Select a sizing handle at a corner of the object to change the height and width at the
same time. If you hold the CTRL key while you move a corner sizing handle, the object
maintains its aspect ratio (that is, a square remains a square).
To select an object's node:
1. Select the object. Node selection is only applicable to a Line, Pipe, Polyline, or Poly-
gon object.
2. Position and hold the mouse pointer over the node. The mouse pointer will change to
a small cross shape.
3. Click the left mouse button. The color of the selected node will change to the inverse
of the background (light on a dark background, dark on a light background).
If you have a node selected and then click another node within the same object, the first
node will deselect. To select multiple nodes, hold down the Ctrl key and click each node
you want to select. (With the Ctrl key held down, you can click a previously selected
node to deselect it.) Clicking the same node again toggles the selection of the node alter-
nately on and off. To deselect every node, click anywhere other than on a node.
To move a node of an object:
579
Chapter 19: Using Objects
3. Click and hold the left mouse button. The cursor changes to a positioning symbol.
4. Drag the selected node(s) to the desired position.
5. Release the mouse button.
Selecting and moving multiple nodes maintains the aspect ratio of the graphic object
between the selected nodes.
To add a node to an object:
Deleting objects
You can delete unwanted objects.
To delete an object (or a group of objects):
580
Chapter 19: Using Objects
Locking/unlocking objects
On complex drawings (with many objects), selecting a discrete group of objects without
including every object (in the selected area) can be difficult (for example when an object
is hidden by another object). To avoid unintentionally selecting an object, you can `lock'
it in position. When an object is `locked', it cannot be selected, deleted, moved, or edited.
Objects are locked only when the Edit menu Break Lock Mode option is not selected.
To lock an object:
Grouping objects
You can group objects to make them easier to manipulate.
To group objects:
1. Click Select.
2. Select the objects to group, and then click Group (or choose Arrange | Group
Objects).
To ungroup objects:
1. Click Select.
2. Select the objects to group, and then click Ungroup (or choose Arrange | Ungroup
Objects).
To change the properties of a group:
1. Click Select.
2. Double-click the group. The Properties dialog box appears.
3. Change the properties as necessary.
4. Alternatively, choose Tools | Goto Object, select the group, and then click OK.
581
Chapter 19: Using Objects
See Also
Manipulating Objects
Copying and pasting objects
1. Click Select.
2. Select the object (or group of objects).
3. Click Copy or choose Edit | Copy.
To paste an object (or group of objects) from the clipboard:
1. Click Select.
2. Select the object (or group of objects).
3. Click Cut or choose Edit | Cut.
To paste an object (or group of objects) from the clipboard:
582
Chapter 19: Using Objects
1. Click Select.
2. Select the object (or group of objects).
3. Click Send to Back or choose Arrange | Send to Back.
An object can be moved backwards and forwards one step at a time (rather than com-
pletely to the back, or completely to the front).
To send an object (or group of objects) one step backwards:
1. Click Select.
2. Select the object (or group of objects).
3. Click Send Backwards or choose Arrange | Send Backwards.
583
Chapter 19: Using Objects
An object can be moved backwards and forwards one step at a time (rather than com-
pletely to the back, or completely to the front).
To bring an object (or group of objects) one step forwards:
1. Click Select.
2. Select the object (or group of objects)
3. Click Bring Forwards or choose Arrange | Bring Forwards.
See Also
Manipulating Objects
Aligning objects
Aligning objects
You can precisely align a group of objects vertically, horizontally, or both.
To align objects:
1. Click Select.
2. Select the objects.
3. Choose Arrange | Align. The Align dialog box appears.
Option Description
584
Chapter 19: Using Objects
Vertically aligns the midpoints of the selected objects with even spac-
Eve- ing
n
See Also
Manipulating Objects
Rotating objects
Rotating objects
You can rotate an object 90° right (clockwise) or 90° left (counter-clockwise).
To rotate an object (or group of objects):
1. Click Select.
2. Select the object(s).
3. Choose Arrange | Rotate.
585
Chapter 19: Using Objects
1. Click Select.
2. Select the object(s).
3. Choose Tools | Convert to Bitmap.
4. Choose Arrange | Rotate.
5. Select the direction to rotate the object (or group of objects).
The object(s) are rotated 90 degrees in the direction you select. To rotate the object(s) 180
degrees, click the direction button twice.
See Also
Mirroring objects
Manipulating Objects
Mirroring objects
You can mirror an object relative to its horizontal or vertical axis.
To mirror an object (or group of objects) relative to its horizontal or vertical axis:
1. Click Select.
2. Select the object(s)
3. Choose Arrange | Mirror.
4. Choose the axis about which to mirror the object (or group of objects).
See Also
Locate an object
Manipulating Objects
Locate an object
You use the Goto Object dialog box to find, select and access the properties of objects on
your current page or on page templates used by the current page. You can select objects,
Genies, symbols, and groups on the page (or template) as well as the graphical elements
that make up those Genies, symbols, and groups.
To locate an object (or a group, Genie, symbol, or page template) on the current page and display
its properties:
586
Chapter 19: Using Objects
plus sign (+) next to them. Click the + sign to see these component objects.
3. Double click the object in the tree structure, or click OK to display its properties.
587
Chapter 19: Using Objects
588
Chapter 20: Understanding Object Types
There are many different object types, each with their own unique set of properties. For
details of properties common to every object type, see Defining Common Object Prop-
erties.
See Also
Free Hand Line Objects
Straight Line Objects
Rectangle Objects
Ellipse Objects
Polygon Objects
Pipe Objects
Text Objects
Number Objects
Button Objects
Symbol Set Objects
Trend Objects
Cicode Objects
Pasted Symbol Objects
Pasted Genie Objects
ActiveX Objects
"Using the Process Analyst" in the Process Analyst User Guide
Database Exchange Control Objects
589
Chapter 20: Understanding Object Types
See Also
Freehand Line Properties - Appearance (General)
Understanding Object Types
To change the style, choose a style from the menu to the right of this field.
[Line] Color
The color of the line.
[Fill] Filled
The Filled check box determines whether the object will be filled with a color. If you
check this box, an invisible line is drawn from one end of your line to the other. Every-
thing between the invisible line and your line will be filled.
[Fill] Color
The color with which the object will be filled. The color that you select as your fill color
here is static.
To specify a fill color that changes with runtime conditions, click the Fill tab.
590
Chapter 20: Understanding Object Types
If you have enabled the Fill (Color) properties, be aware that the color you select here
will override the OFF color for Fill Color (On/Off), the ABC color for Fill Color (Multi-
state), Array Color 0 for Fill Color (Array), and the At minimum color for Fill Color (Gra-
dient).
For help on the remaining properties tabs, see Defining Common Object Properties.
591
Chapter 20: Understanding Object Types
To change the style, choose a style from the menu to the right of this field.
[Line] Color
The color of the line.
For help on the remaining properties tabs, see Defining Common Object Properties.
Rectangle Objects
Use the Rectangle tool to draw rectangles and squares. Rectangles and squares can be
moved, resized, reshaped, brought to the front and so on, and their properties edited just
like other types of object.
To draw a rectangle:
592
Chapter 20: Understanding Object Types
When you release the mouse button, the object properties dialog for the square is
displayed.
See Also
Rectangle Properties - Appearance (General)
Understanding Object Types
To change the style, choose a style from the menu to the right of this field.
[Line] Color
The outline color of the rectangle.
[Fill] Filled
The Filled check box determines whether the rectangle will be filled with a color.
[Fill] Color
The color with which the rectangle will be filled. The color that you select as your fill
color here is static.
593
Chapter 20: Understanding Object Types
To specify a fill color that changes with runtime conditions, click the Fill tab. If you have
enabled the Fill (Color) properties, be aware that the color you select here overrides the
OFF color for Fill Color (On/Off), the ABC color for Fill Color (Multi-state), Array Color 0
for Fill Color (Array), and the At minimum color for Fill Color (Gradient).
[Object type] Extra line
Adds an extra line (1 pixel width) of lowlight color to the rectangle, if the rectangle is
defined as Raised or Lowered (click the 3D Effects tab).
[Gradient] Color
Controls the color of the gradient fill between the fill color and the gradient color. This
option is available only when the Filled and Gradient Fill check boxes are selected. The
gradient is updated at runtime to reflect the gradient between the two colors selected.
Gradient fills support flashing colors.
Gradients do not rotate with an object; for example, if an object contains a left-to-right
gradient fill and is rotated 90 degrees (either at runtime or in Graphics Builder), the gra-
dient is still left to right.
[Gradient] Direction
The direction to be used for the gradient color. Use the table below as a guide to choose
the gradient color direction you want.
Left to Right
Right to Left
594
Chapter 20: Understanding Object Types
Top to Bottom
Bottom to Top
595
Chapter 20: Understanding Object Types
Ellipse Objects
You use the Ellipse tool to draw ellipses, circles, arcs, and pie-slices. Ellipse objects can
be moved, resized, reshaped, brought to the front and so on, and their properties edited
just like other types of object.
To draw an ellipse:
2. Move the cursor to a corner of the bounding rectangle (marquee) and click (and hold)
the mouse button.
3. Drag the cursor to the opposite corner of the bounding rectangle and release the
mouse button. If you hold the Shift key before you start drawing the ellipse, it is
drawn from its center outwards.
When you release the mouse button, the object properties dialog for the ellipse is
displayed.
To draw a circle:
596
Chapter 20: Understanding Object Types
3. Move the cursor to a corner of the bounding rectangle (marquee) and click (and hold)
the mouse button.
4. Drag the cursor to the opposite corner of the bounding rectangle and release the
mouse button. If you hold the Shift key and the Ctrl key before you start drawing the
circle, it is drawn from its center outwards.
When you release the mouse button, the object properties dialog for the circle is dis-
played.
See Also
Ellipse Properties - Appearance (General)
Understanding Object Types
To change the style, choose a style from the menu to the right of this box.
[Line] Color
The outline color of the ellipse.
[Fill] Filled
The Filled check box determines whether the ellipse will be filled with a color.
[Fill] Color
597
Chapter 20: Understanding Object Types
The color with which the ellipse will be filled. The color that you select as your fill color
here is static.
To specify a fill color that changes with runtime conditions, click the Fill tab. If you have
enabled the Fill (Color) properties, be aware that the color you select here will override
the OFF color for Fill Color (On/Off), the ABC color for Fill Color (Multi-state), Array
Color 0 for Fill Color (Array), and the At minimum color for Fill Color (Gradient).
[Gradient] Color
Controls the color of the gradient fill between the fill color and the gradient color. This
option is available only when the Filled and Gradient Fill check boxes are selected. The
gradient is updated at runtime to reflect the gradient between the two colors selected.
Gradient fills support flashing colors.
Gradients do not rotate with an object; for example, if an object contains a left-to-right
gradient fill and is rotated 90 degrees (either at runtime or in Graphics Builder), the gra-
dient is still left to right.
[Gradient] Direction
The direction to be used for the gradient color. Use the table below as a guide to choose
the gradient color direction you want.
Left to Right
Right to Left
598
Chapter 20: Understanding Object Types
Top to Bottom
Bottom to Top
599
Chapter 20: Understanding Object Types
For a full ellipse, you are not required to specify Start and End angles.
[Object type] Pie-slice
Select this radio button if you want to remove a section from your ellipse (i.e., you want
it to resemble a pie-slice).
If you select this option, you can specify a Start angle, and an End angle:
Start angle
The angle (measured clockwise from 0 degrees) of the section to be removed from the
ellipse. For example, if you enter a start angle of 50 degrees, your pie-slice would look
something like this:
End angle
The angle (measuring clockwise from 0 degrees) of the section of the ellipse which is to
remain. For example, if you enter an end angle of 150 degrees, your pie-slice would look
something like this:
Start and End angles can be combined for various effects. For example, a Start angle of
270 degrees, and an End angle of 150 degrees would produce the following pie-slice:
600
Chapter 20: Understanding Object Types
If you select this option, you can specify a Start angle, and an End angle:
Start angle
The angle (measured clockwise from 0 degrees) defining the segment to be removed from
the ellipse, leaving an arc. For example, if you enter a start angle of 50 degrees, your arc
would look something like this:
End angle
The angle (measuring clockwise from 0 degrees) defining the segment of the ellipse
which is to remain. For example, if you enter an end angle of 150 degrees, your pie-slice
would look something like this:
Start and End angles can be combined for various effects. For example, a Start angle of
270 degrees, and an End angle of 150 degrees would produce the following arc:
For help with the other properties, see Defining Common Object Properties.
Polygon Objects
Use the Polygon tool to draw polygons and polylines. Polygons can be moved, resized,
reshaped, brought to the front and so on, and their properties edited just like other types
of object.
To draw a polygon:
2. Move the cursor to where you want the polygon to start and click and hold the
mouse button.
3. At the end of the first line segment, release the mouse button.
4. Move the cursor to each point on the polygon in turn, and click the mouse button
(clicking and dragging is not necessary after the first segment).
601
Chapter 20: Understanding Object Types
To draw horizontally or vertically only, hold the Ctrl key down when you are
drawing the polygon.
5. To complete the polygon, double-click the mouse button.
When you complete the polygon, the object properties dialog is displayed.
To draw a polyline:
602
Chapter 20: Understanding Object Types
To change the style, choose the style you want from the menu to the right of this field.
[Line] Color
The outline color of the polygon.
[Fill] Filled
The Filled check box, determines whether the polygon will be filled with a color.
[Fill] Color
The color with which the polygon will be filled. The color that you select as your fill
color here is static.
To specify a fill color that changes with runtime conditions, click the Fill tab. If you have
enabled the Fill (Color) properties, be aware that the color you select here will override
the OFF color for Fill Color (On/Off), the ABC color for Fill Color (Multi-state), Array
Color 0 for Fill Color (Array), and the At minimum color for Fill Color (Gradient).
[Gradient] Color
Controls the color of the gradient fill between the fill color and the gradient color. This
option is available only when the Filled and Gradient Fill check boxes are selected. The
gradient is updated at runtime to reflect the gradient between the two colors selected.
Gradient fills support flashing colors.
Gradients do not rotate with an object; for example, if an object contains a left-to-right
gradient fill and is rotated 90 degrees (either at runtime or in Graphics Builder), the gra-
dient is still left to right.
[Gradient] Direction
The direction to be used for the gradient color. Use the table below as a guide to choose
the gradient color direction you want.
603
Chapter 20: Understanding Object Types
Left to Right
Right to Left
Top to Bottom
Bottom to Top
604
Chapter 20: Understanding Object Types
Pipe Objects
Use the Pipe tool to draw pipes with automatic three-dimensional shading. Pipes can be
moved, resized, reshaped, brought to the front and so on, and their properties edited just
like other types of object.
To draw a pipe:
605
Chapter 20: Understanding Object Types
2. Move the cursor to where you want the pipe to start, and click and hold the mouse
button.
3. At the end of the first line segment, release the mouse button.
4. Move the cursor to each point on the path in turn and click the mouse button (click-
ing and dragging is not necessary after the first segment).
5. To complete the pipe, double-click the mouse button.
When you complete the pipe, the object properties dialog is displayed.
Hint: To draw horizontally or vertically only, hold the Ctrl key down when drawing
the pipe.
Hint: Use the grid to assist in accurate positioning for each click.
See Also
Pipe Properties - Appearance (General)
Understanding Object Types
606
Chapter 20: Understanding Object Types
The width of the pipe (in pixels). You can change the width by clicking the up and
down arrows to the right of the field, or by entering another value in this field. Every
pipe needs to be at least 1 pixel wide.
[Line] Highlight Color
The color of the pipe where it is "in the light"; that is, the brightest color on the pipe.
[Line] Lowlight Color
The color of the pipe where it is "in shadow"; that is, the dullest color on the pipe.
For help on the remaining properties tabs, see Defining Common Object Properties.
Text Objects
Use the Text tool to type text on the page. Text can be moved, resized, reshaped, brought
to the front and so on, and their properties edited just like other types of object.
To add text:
2. Type your text on the keyboard. (Press Enter to start a new line.)
3. Move the cursor to where you want to position the text and click the left mouse but-
ton.
When you click the mouse button to place the text, the object properties dialog is
displayed.
See Also
Text Properties - Appearance (General)
Understanding Object Types
607
Chapter 20: Understanding Object Types
Define the size of the text (point size). Available sizes might vary according to the
selected printer and the selected font.
[Alignment] Left
Select this radio button to align the text to the left of the text box.
[Alignment] Right
Select this radio button to align the text to the right of the text box.
[Alignment] Center
Select this radio button to align the text in the center of the text box.
[Effect] Strikeout
Select this box to make the text will appear with a line through it.
[Effect] Underline
Select this box to underline the text.
Text
This field contains the text that will display on the page. You can enter any keyboard
character(s). You can edit the text here, or directly from the graphics page. It is useful to
edit text at this field, as you can apply text changes at the same time as you apply other
font and color changes.
This text changes automatically depending on the Display Value properties that you
define.
Foreground
The color of the text.
Note: There are several radio buttons in Display Value (On/Off, Multi-state and so
on). When selected, these radio buttons change the appearance of the right hand side
of the dialog.
See Also
Text Properties - Appearance (Display Value)
608
Chapter 20: Understanding Object Types
Changes the text which displays when a particular condition is met, and another when
it is not. For example, you could display an alarm message when a particular variable
tag is in alarm, and a normal message when it is not.
See Text Properties - Appearance Display Value (On/Off).
[Type] Multi-state
This option is useful when you have several possible conditions, occurring together in
different combinations, at different times. Select this option to display different text for
each combination.
For example, three digital variable tags (A,B, and C) can each be ON or OFF at any time.
You can display a different message for each ON/OFF combination. In other words, you
could display a different message for each of the following ON/OFF combinations ABC,
ABC, ABC, ABC, ABC, ABC, ABC, ABC.
Text Properties - Appearance Display Value (Multi-state).
[Type] Array
Allows you to enter an expression which returns an integer. For each integer (from 0-
255), you can display different text. For example, you could display a different message
for each state of an analog tag.
See Text Properties - Appearance Display Value (Array).
[Type] Numeric
Displays the value of a tag or expression in numeric format (you can specify the format).
609
Chapter 20: Understanding Object Types
The text that will display whenever the condition entered above is false. You can use
any keyboard character(s) to a maximum length of 256 characters.
For example, you could display the message Conveyor 110 Normal when CV110_
ERROR.On is false (i.e., there is no alarm at conveyor 110).
ON text
The text that will display whenever the condition entered above is true. You can enter
any keyboard character(s) to a maximum length of 256 characters.
For example, you could display the message Conveyor 110 Alarm when CV110_
ERROR.On is true (i.e. there is no alarm at conveyor 110).
Click Clear Property to clear property details and disable the property.
See Also
Text Properties - Appearance (Display Value)
Text Properties - Appearance Display Value (Multi-state)
Text Properties - Appearance Display Value (Array)
Text Properties - Appearance Display Value (Numeric)
Text Properties - Appearance Display Value (String)
Note:You can also insert Equipment.item references into expression fields using the
insert tag option; however if no equipment has been configured in your system the
list will be empty. You will need to configure equipment or deselect the option 'Dis-
play equipment items when populating tag list' in the Project Editor Options Dialog
to populate the list with available tags.
State text
The text that is to display for each combination of the above conditions. You can enter
any keyboard character(s).
610
Chapter 20: Understanding Object Types
For example:
To display different messages about the status of a valve, you could fill out the Con-
ditions and State text fields as follows:
611
Chapter 20: Understanding Object Types
l Less than 0 (zero), it will be set to 0 (zero), and a runtime hardware alarm will be trig-
gered.
l Greater than 255, it will be set to 255, and a runtime hardware alarm will be trig-
gered.
l A real (non-integer) number, it will be rounded off to the nearest integer.
To insert a tag or a function, click the Wizard button to the right of this field. This button
displays two options: Insert Tag and Insert Function.
Note:You can also insert Equipment.item references into expression fields using the
insert tag option; however if no equipment has been configured in your system the
list will be empty. You will need to configure equipment or deselect the option 'Dis-
play equipment items when populating tag list' in the Project Editor Options Dialog
to populate the list with available tags.
Array text
The text that is to display for each integer returned by the Array expression entered
above. You can enter any keyboard character(s).
For example, to display different messages about the status of a motor, you could fill out
the Array expression and Array text fields as follows:
MOTOR_STATUS 0 Running
1 Starting
2 Stopping
3 Stopped - Normal
4 Stopped - Error
5 Isolated
612
Chapter 20: Understanding Object Types
Note:You can also insert Equipment.item references into expression fields using the
insert tag option; however if no equipment has been configured in your system the
list will be empty. You will need to configure equipment or deselect the option 'Dis-
play equipment items when populating tag list' in the Project Editor Options Dialog
to populate the list with available tags.
Format
The value returned for the expression entered above will be displayed according to the
format you enter here. For example, the analog variable tag MOTOR_STATUS returns
integers 0-5. If you enter this tag as the Numeric expression above, and enter #.## as your
format, the display will alternate between 0.00, 1.00, 2.00, 3.00, 4.00, and 5.00. You can
select a format from the drop-down list, or type in your own. If the numeric expression is
a single variable, its format is overwritten by the format you enter here.
Click Clear Property to clear property details and disable the property.
See Also
Text Properties - Appearance (Display Value)
Text Properties - Appearance Display Value (On/Off)
Text Properties - Appearance Display Value (Multi-state)
Text Properties - Appearance Display Value (Array)
Text Properties - Appearance Display Value (String)
613
Chapter 20: Understanding Object Types
Note:You can also insert Equipment.item references into expression fields using the
insert tag option; however if no equipment has been configured in your system the
list will be empty. You will need to configure equipment or deselect the option 'Dis-
play equipment items when populating tag list' in the Project Editor Options Dialog
to populate the list with available tags.
Click Clear Property to clear property details, and disable the property. To define further
properties for the object, click the relevant tabs.
For help on the remaining properties tabs, see Defining Common Object Properties.
See Also
Text Properties - Appearance (Display Value)
Text Properties - Appearance Display Value (On/Off)
Text Properties - Appearance Display Value (Multi-state)
Text Properties - Appearance Display Value (Array)
Text Properties - Appearance Display Value (Numeric)
Number Objects
Use the Number tool to represent a tag or expression as a number. When you place a
number on your page, simply enter the relevant variable tag or expression. Numbers can
be moved, resized, brought to the front, and so on, and their properties edited just like
other types of object.
(The same functionality is also available through the Text tool.)
To add a number to your graphics page:
2. Move the cursor to where you want the number to display and click the mouse but-
ton. The Text Properties dialog box appears where you enter the relevant variable tag
or expression.
For help on the various Properties tabs, see Text Properties - Appearance (General)
and Defining Common Object Properties.
Button Objects
Use the Button tool to draw buttons on graphics page. You can then assign security
rights and attach commands to it.
614
Chapter 20: Understanding Object Types
Buttons can be moved, resized, reshaped, brought to the front, and so on, and their prop-
erties edited just like other types of object.
To draw a button:
2. Move the mouse to where you want the button to start and press (and hold) the
mouse button.
3. Drag the mouse to where you want the button to finish and release the mouse button.
When you release the mouse button, the object properties dialog is displayed.
See Also
Button Properties - Appearance (General)
Understanding Object Types
[Type] Text
Select this option to display text on the button. If you select this option, the Text and
Font fields will display to the right of the dialog.
If either the Text or Symbol type option is selected, you can use XP style buttons. To con-
figure a button to use the Windows XP style, select the XP Style check box. During run-
time an XP style button has a blue border when it has keyboard focus, and an orange
border when the mouse is on the button. When you place a button on a page, the XP
Style check box is selected by default.
Pressing '^n' or 'Enter' wraps the text onto the next line. For example, Start^nMotor
would display as:
Font
The font used to display the text. Use the scroll bar to the right to view available fonts, or
type part of a font name directly into this field.
615
Chapter 20: Understanding Object Types
Note: The Background Color property is no longer supported for button fonts. Any
imported buttons from a previous version will have the Background Color set to the
default color.
Style
Select whether you would like the text to be Regular, Bold, Bold Italic, or Italic.
Size
Define the size of the text (point size). Available sizes might vary according to the
selected printer and the selected font.
Custom Fill Color
Select this check box to enable the Fill Color Up and Fill Color down boxes.
Fill Color Up
The button color when in the Up state.
Fill Color Down
The button color when in the Down state.
Note: Fill Color Up and Down options available for Text and Symbol Types only.
[Alignment] Left
Select this radio button to left-align multi-line text. The aligned text will remain in the
center of the button. This has no effect on single lines of text.
[Alignment] Right
Select this radio button to right-align multi-line text. The aligned text will remain in the
center of the button. This has no effect on single lines of text.
[Alignment] Center
Select this radio button to center-align multi-line text. The aligned text will remain in the
center of the button. This has no effect on single lines of text.
[Effect] Strikeout
Select this box to make the text appear with a line through it.
[Effect] Underline
Select this box to underline the text.
Text
616
Chapter 20: Understanding Object Types
This field contains the text that will display on the page. You can enter any keyboard
character(s). You can edit the text here, or directly from the graphics page. It is useful to
edit text at this field, as you can apply text changes at the same time as you apply other
font and color changes.
This text changes automatically depending on the Display Value properties that you
define.
Foreground
The color of the text.
[Type] Symbol
Select this option to display a symbol on the button. If you select this option, the Set but-
ton will display to the right of the dialog.
Click Set to choose the symbol which is to display on the button. A picture of the
selected symbol will also display.
[Type] Target
When this option is selected, the button will not have any text or symbols on it, and it
will have a transparent face.
Mode
There are three different modes of transparent buttons:
l BORDER_3D: The button is drawn with only the 3-D border (transparent face).
l BORDER: The button is drawn with only a thin line border.
l TARGET: The button is totally transparent. This constitutes a screen target.
For help on the remaining properties tabs, see Defining Common Object Properties.
617
Chapter 20: Understanding Object Types
2. Move the mouse pointer to the desired position on the page, and click with the left
mouse button.
When you click the mouse button, the object properties dialog is displayed.
3. Fill out the relevant properties for the symbol set, and click OK.
Note: There are several radio buttons in Symbol Sets Appearance (described below).
When selected, these radio buttons change the appearance of the right hand side of
the dialog.
[Type] On / Off
Select this radio button to display one symbol when a particular expression is TRUE,
and another when it is FALSE. For example, you could display a red symbol when a par-
ticular variable tag is in alarm, and a green symbol when it is not.
See Symbol Set Properties - Appearance General (On/Off).
[Type] Multi-state
This option is useful when you have several possible conditions, occurring together in
different combinations, at different times. Select this option to display different symbols
for each combination.
For example, three digital variable tags (A,B, and C) can each be ON or OFF at any time.
You can display a different symbol for each ON/OFF combination. In other words, you
could display a different symbol for each of the following ON/OFF combinations ABC,
ABC, ABC, ABC, ABC, ABC, ABC, ABC.
See Symbol Set Properties - Appearance General (Multi-state).
[Type] Array
The Array option allows you to enter an expression which returns an integer. For each
unique integer (from 0 to 255), you can display a unique symbol. For example, you could
display a different symbol for each threshold of an analog alarm.
See Symbol Set Properties - Appearance General (Array).
[Type] Animated
Select this radio button to display an actual animation (several different symbols in
sequence).
When selected, the radio buttons on the dialog box change the appearance of the right
hand side of the dialog. These radio buttons are only documented once below.
See Symbol Set Properties - Appearance General (Animated).
See Also
Understanding Object Types
618
Chapter 20: Understanding Object Types
619
Chapter 20: Understanding Object Types
To enter a condition, click the relevant line (A, B, C, etc.), and click Edit. You can add
more conditions (to a maximum of 5, providing 32 combinations), using the Add button.
To insert a tag or function, click the Wizard button. This button displays two options;
Insert Tag and Insert Function. You can also delete conditions using the Delete button,
but there needs to always be a condition in this field. Conditions which are left black
(instead of deleted) will be evaluated as false at runtime.
State symbols
The symbols that will display for each combination of the above conditions. Click the
Set button to select a symbol, or Clear to clear the current selection.
For example:
To display different symbols each time the status of a valve changes, you could fill out
the Conditions and State symbols fields as follows:
620
Chapter 20: Understanding Object Types
621
Chapter 20: Understanding Object Types
Click Clear Property to clear property details, and disable the property. To define further
properties for the object, click tabs.
See Also
Symbol Set Objects
Symbol Set Properties - Appearance General (On/Off)
Symbol Set Properties - Appearance General (Multi-state)
Symbol Set Properties - Appearance General (Animated)
Understanding Object Types
622
Chapter 20: Understanding Object Types
In this example, AUGER_RUNNING, is a variable tag which is TRUE when the auger
is running. The symbols in the animation frames (Frame 1 onwards) have been designed
so that when displayed in sequence, they animate a running auger. The symbol in the
Off animation frame will display when AUGER_RUNNING is FALSE.
Click Apply or OK to bring your changes into effect, or Cancel to discard them and exit.
Click Clear Property to clear property details, and disable the property. To define further
properties for the object, click the relevant tabs.
For help on the remaining properties tabs, see Defining Common Object Properties.
See Also
Symbol Set Objects
Symbol Set Properties - Appearance General (On/Off)
Symbol Set Properties - Appearance General (Multi-state)
Symbol Set Properties - Appearance General (Array)
Understanding Object Types
Trend Objects
The Trend tool allows you to add a trend to the graphics page with the mouse (click and
drag).
After a trend object is drawn, it can be moved, re-sized, re-shaped, brought to the front
etc., and its properties can be edited, just like any other type of object.
To add a trend to a page:
623
Chapter 20: Understanding Object Types
Trend properties
Trends have the following general appearance properties:
Cluster Name
The name of the cluster that runs the trends being graphed. Each trend graph can only
communicate with one cluster, so you cannot mix trends from multiple clusters on a sin-
gle trend graph.
Note: To mix trends from different clusters on a single trend graph you will need to
use Process Analyst.
If there is only one cluster, or, the client is connected to only one cluster, this property
can be left blank and the value of the single connected cluster is inferred.
If the client is connected to more than one cluster, then this field needs to be specified.
Pens
The pens (including color) to be displayed on the graph (31 characters maximum). You
can use up to eight pens.
Double-clicking a selected pen or clicking Edit allows you to change the trend tag and
pen color. To insert a trend tag, click Wizard to display theInsert Trend dialog box.
If more than one trend tag is displayed in a trend window and each has a different sam-
ple period, the trend with the smallest sample period is used as the general display
period.
Note: If the trend object is part of a group, part of a pasted Genie or symbol, or part
of the page's template, you can still access its properties: hold down the Control
(CTRL) key and double-click the object. Alternatively, choose Goto Object from the
Tools menu, click the object, then click OK. Be aware, however, that if it is part of a
pasted Genie or symbol, or part of the template, you cannot edit existing pens, only
new ones.
If you are configuring an SPC control chart, you need to add a suffix to the trend tag to
indicate the type of SPC. There are SPC templates that are easily configured through
Genies. Use the Genies rather than defining these trend tags for yourself.The following
table lists available SPC types:
624
Chapter 20: Understanding Object Types
Pen 1 PIC117_PV.XCL
Pen 2 PIC117_PV.XUCL
Pen 3 PIC117_PV.XLCL
Pen 4 PIC117_PV.X
If you are using the PageTrend() function to display this trend page, leave these fields
blank.
Display Trend Types as Periodic
When selected, enables trend pens (both periodic and event) to be displayed as periodic.
Event and periodic trend data can then be displayed on the same graph. If this box is
not selected, event and periodic pens have different styles and needs to be displayed on
separate graphs.
Note: This option is set by default in the predefined templates designed for use with
625
Chapter 20: Understanding Object Types
Note: For a meaningful trend graph, make Pixels per sample x Number of samples
less than the width of the display. For example, an XGA screen has a width of 1024
pixels. If you use 10 pixels per sample, 102 samples can be displayed on the screen
without scrolling.
Cicode Objects
The Cicode Object tool allows you to add a Cicode Object to the graphics page with the
mouse (click and drag).
A Cicode Object can be any command (such as a function and so on). When the graph-
ics page is displayed at runtime, the command is run continually. Cicode objects can
also be assigned a key sequence, allowing you to enter keyboard commands when it is
selected at runtime.
After a Cicode object is added, it can be moved and so on and its properties edited, just
like other types of object.
626
Chapter 20: Understanding Object Types
The command in this example uses the built-in function DspSymAnm(). The function
displays three symbols ("Pumps.Slurry1", "Pumps.Slurry2", "Pumps.Slurry3") continually
(at AN 25).
You can also write generic functions by using the Cicode function DspGetAnCur() to get
the AN number, for example:
627
Chapter 20: Understanding Object Types
After a symbol is pasted using this tool, it can be moved, resized, reshaped, brought to
the front and so on, and its properties edited just like any other type of object.
Pasted [library] symbols can be linked to their source, so that changes made to the orig-
inal are inherited by the pasted symbol.
To display the properties of the objects in the symbol (after pasting), hold the Control
(CTRL) key down and double-click the specific object. Alternatively, choose Tools | Goto
Object, click the object, then click OK.
To learn more about creating symbols, see Using libraries.
To paste a symbol from the library to the page:
628
Chapter 20: Understanding Object Types
Note: If the symbol has a small diamond-shaped badge next to it, it indicates it is a
flashing symbol (see example below.)
Library
The library where the symbol is stored.
Linked
To paste a symbol that maintains the link with its library, check this box. A symbol that
is linked will be automatically updated if the symbol in the library is changed.
You can cut the link at any time with the Cut Link command from the Edit menu, but
you cannot re-link a symbol with the library after the link has been cut.
If you have selected Paste Symbol as Flashing, two dialog boxes appear in sequence,
allowing you to choose two images that you want to implement as a flashing symbol.
The Primary Select Symbol dialog allows you to select the initial image used, the Flash-
ing Select Symbol dialog the second image. If the bitmaps are different in size, the flash-
ing symbol is scaled to the size of the primary image. If one of the symbols is itself a
flashing symbol, only the primary state will be displayed.
629
Chapter 20: Understanding Object Types
After a Genie is pasted using this tool, it can be resized, rotated, moved, copied, dupli-
cated, pasted, brought to the front, and so on.
To display the properties of the objects in the Genie (after pasting), hold the Control
(CTRL) key down and double-click the specific object.
ActiveX Objects
You can incorporate ActiveX objects into your project. This means you can use com-
ponents that have been developed independently of CitectSCADA.
The ActiveX tool can be used to insert ActiveX objects in graphics pages. After you have
selected and positioned an ActiveX object, it can be moved, re-sized, re-shaped, brought
to the front etc., and its properties can be edited, just like any other object.
l Whenever possible, avoid programming the literal paths to data sources in your
project.
l When a project or a data source is relocated to a different computer, examine the pro-
gram and program objects and correct any literal paths before placing the project
back into service.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
630
Chapter 20: Understanding Object Types
One way to avoid having to recreate data sources is to locate any associated data
sources in a central location on a network. For example, if the data source is located on a
SQL server, it will be accessible from every machine on the common network.
To insert an ActiveX Control:
Tag Association
You can create an association between a property of an ActiveX object and a variable
tag.
To create an association between a property of an ActiveX object and a variable tag:
631
Chapter 20: Understanding Object Types
Note: You can only use variable tag names in this field. Functions, expressions and
constants are not supported when defining ActiveX property tag associations.
You can only associate a property with a variable tag if the tag type is compatible with
the property. To display a list of compatible tag types, select the property, and click List
Property Types. A list of compatible data types will display, or a message will inform
you that there are no compatible types.
If there are no types compatible with the property, the Associate Property with tag and
Update association on fields will be disabled.
If you specify a tag which might be inappropriate for the selected ActiveX property, the
Type Evaluation dialog will display an alert. This might happen if:
l The types compatible with the property are different from the tag type.
l The tag type is smaller than the types compatible with the property, meaning that
data could be truncated or lost.
Bindable
632
Chapter 20: Understanding Object Types
633
Chapter 20: Understanding Object Types
The Clear Property button clears the tag associations for each of the ActiveX object prop-
erties. To clear a tag association for a particular object property, clear the check box to the
left of the property.
If you accidentally click Clear Property, you can restore your tag associations by clicking
Cancel and reopening the ActiveX properties dialog.
Object Identification
You can identify your ActiveX object.
To identify your ActiveX object:
1. From Graphics Builder, double-click the ActiveX object. The Properties dialog
appears.
2. Click the Access tab.
3. Click the Identification tab.
4. Assign your ActiveX object a name in the Object Name field.
5. Assign your ActiveX object an Event Class.
6. Click OK.
See Also
Object Properties - Access (Identification)
634
Chapter 20: Understanding Object Types
Select this check box to allow changes made to the control to be persisted between pages.
For example, you can select this check box if you want an ActiveX edit control to keep
the current text in the control, so that next time the page is entered, the same text is dis-
played.
Note: An ActiveX control may or may not implement data persistence in the manner
you expect. Some controls will not persist certain data, and therefore you will not be
able to save and restore that data.
635
Chapter 20: Understanding Object Types
636
Chapter 21: Defining Common Object Properties
This section describes properties that are common to several object types. Some are also
common to object groups.
See Also
3D Effects
Visibility
Movement
Scaling
Fill Color
Fill Level
Touch Commands
Keyboard Commands
Sliders
Access
3D Effects
You can apply 3D effects to objects to make them more realistic.
To apply 3D effects to an object:
1. Draw the object/group (or paste a symbol). The properties tab dialog will auto-
matically display, unless you have turned off the Display properties on new option
in the Graphics Builder. (For a group, the properties dialog will not display auto-
matically; you need to double-click the group).
2. Click the Appearance tab.
3. Click the 3D Effects tab (to the right of the dialog).
4. The dialog will then display several options to enable you to manipulate your object.
To activate any of these options click the option (or the radio bullet to the left of the
option).
5. By selecting certain options additional fields will display to enable you to further
manipulate your object. Enter further details as necessary, using the Help button for
detailed information about each field.
6. Click OK.
See Also
Object Properties - Appearance (3D Effects)
Defining Common Object Properties
637
Chapter 21: Defining Common Object Properties
Depth
The distance (in pixels) that the shadow extends below and to the right of the object.
This option alters the apparent distance between the object and its shadow, for example:
Shadow color
The color of the shadow. The shadow color will not change dynamically with runtime
conditions.
[Effects] Raised
Select this option to display the object as a raised three dimensional solid, for example:
Depth
The distance (in pixels) that the sides of the object extend out from the raised surface.
This option alters the apparent distance from the raised surface down to your graphics
page, for example:
638
Chapter 21: Defining Common Object Properties
Highlight color
The color of the directly illuminated "edges" of the object.
Lowlight color
The color of the "edges" of the object that are in shadow.
[Effects] Lowered
Select this option to display the object as if it is actually lower than your graphics page,
for example:
Depth
The distance (in pixels) that the sides of the object extend out from the lowered surface.
This option alters the apparent distance from the lowered surface up to your graphics
page, for example:
Highlight color
The color of the directly illuminated "edges" of the object.
639
Chapter 21: Defining Common Object Properties
Lowlight color
The color of the "edges" of the object that are in shadow.
[Effects] Embossed
Select this option to display the object as if it has been embossed on your graphics page,
for example:
Depth
The distance (in pixels) that the embossed surface is lowered. This option alters the
apparent distance from the embossed surface up to your graphics page, for example:
Highlight color
The color of the right and lower edges of the object.
Lowlight color
The color of the left and upper edges of the object.
Click Apply or OK to save your changes, or Cancel to exit. To define further properties
for the object, click the relevant tabs.
640
Chapter 21: Defining Common Object Properties
Visibility
You can determine whether an object is visible or not.
To hide/unhide an object:
Note:You can also insert Equipment.item references into expression fields using the
insert tag option; however if no equipment has been configured in your system the
list will be empty. You will need to configure equipment or deselect the option 'Dis-
play equipment items when populating tag list' in the Project Editor Options Dialog
to populate the list with available tags.
641
Chapter 21: Defining Common Object Properties
Note: If a group is hidden, every object (and other groups) in the group will also be
hidden regardless of their individual properties. If the group is visible, its objects will
behave according to their individual properties.
Click Clear Property to clear property details and disable the property.
Movement
You can control the movement of objects.
To configure an object or group that moves:
1. Draw the object/group (or paste a symbol). The properties tab dialog automatically
display, unless you have turned off the Display properties on new option in the
Graphics Builder. (For a group, the properties dialog will not display automatically;
you need to double-click the group.)
2. Click the Movement tab.
3. Click the Horizontal, Vertical or Rotational tab (to the right of the dialog).
4. Enter a Movement expression (the expression that will move the object/group at run-
time).
5. Enter further details as necessary, using the Help button for detailed information
about each field.
6. Click OK.
See Also
Object Properties - Movement (Horizontal)
Object Properties - Movement (Vertical)
Object Properties - Movement (Rotational)
Group and object movement - examples
642
Chapter 21: Defining Common Object Properties
group and its objects can be configured with any movement combination (i.e., a
group can move vertically while one of its objects rotates, and so on).
Note:You can also insert Equipment.item references into expression fields using the
insert tag option; however if no equipment has been configured in your system the
list will be empty. You will need to configure equipment or deselect the option 'Dis-
play equipment items when populating tag list' in the Project Editor Options Dialog
to populate the list with available tags.
643
Chapter 21: Defining Common Object Properties
The distance (number of pixels from the original object/group center) that the
object/group will shift to the left when the Movement expression returns its minimum
value.
You can change the offset value by pressing the up and down arrows to the right of the
field, or by entering another value in this field.
[Offset] At maximum
The distance (number of pixels from the original object/group center) that the
object/group will shift to the right when the Movement expression returns its maximum
value.
You can change the offset value by pressing the up and down arrows to the right of the
field, or by entering another value in this field.
Note: You can shift the object/group right at minimum and left at maximum, by
entering negative distances in the Offset fields, or by swapping the expression limits
(in the Minimum and Maximum fields).
Click Clear Property to clear property details, and disable the property.
See Also
Object Properties - Movement (Vertical)
Object Properties - Movement (Rotational)
Note: Vertical Movement cannot be used if the Vertical Slider is enabled. A group
and its objects can be configured with any movement combination (i.e. a group can
move vertically while one of its objects rotates, and so on).
644
Chapter 21: Defining Common Object Properties
The value of the expression entered in this field (253 characters maximum) will deter-
mine the vertical movement of the object/group. By default, when the expression returns
its minimum value, the object/group will shift down to its lowest position. When the
expression returns its maximum, the object/group will shift up to its highest position.
For intermediate values, the object/group will move to the appropriate position between
the minimum and maximum offset.
To insert a tag or a function, click the Wizard button to the right of this field. This button
displays two options: Insert Tag and Insert Function.
Note:You can also insert Equipment.item references into expression fields using the
insert tag option; however if no equipment has been configured in your system the
list will be empty. You will need to configure equipment or deselect the option 'Dis-
play equipment items when populating tag list' in the Project Editor Options Dialog
to populate the list with available tags.
645
Chapter 21: Defining Common Object Properties
The distance (number of pixels from the original object/group center) that the
object/group will shift down when the Movement expression returns its minimum
value.
You can change the offset value by pressing the up and down arrows to the right of the
field, or by entering another value in this field.
Note: You can shift the object/group up at minimum and down at maximum, by
entering negative distances in the Offset fields, or by swapping the expression limits
(in the Minimum and Maximum fields).
See Also
Object Properties - Movement (Horizontal)
Object Properties - Movement (Rotational)
646
Chapter 21: Defining Common Object Properties
Note:You can also insert Equipment.item references into expression fields using the
insert tag option; however if no equipment has been configured in your system the
list will be empty. You will need to configure equipment or deselect the option 'Dis-
play equipment items when populating tag list' in the Project Editor Options Dialog
to populate the list with available tags.
647
Chapter 21: Defining Common Object Properties
Click this radio button for the quick and easy way of selecting the point about which the
object/group will rotate. The express option gives you the choice of 9 points (Top Left,
Bottom Right and so on), which are displayed in the picture field to the right of the
dialog. To select one, just click it with your mouse.
[Center axis offset] Custom
Click this radio button to define your own center axis. When you select this radio button,
two fields will display to the right, allowing you to plot the position of your center axis.
Specify the distance to the right in the first field, and the distance down in the second.
The Center axis is plotted based on these two values.
For example, if you enter 8 as the horizontal offset, and 13 as the vertical offset, the
Center axis will be 8 pixels to the right, and 13 pixels below the center of the
object/group.
Enter negative values in the offset distance fields to move the Center axis left instead of
right, and up instead of down.
See Also
Object Properties - Movement (Horizontal)
Object Properties - Movement (Vertical)
648
Chapter 21: Defining Common Object Properties
Example 2: Rotating the group and moving the object up and down
If your group is configured to rotate from 0 degrees to 60 degrees, and one of its objects is
configured to move up and down, the object will do both. It will move up and down as
per its own properties, and, at the same time, it will rotate as part of the group.
Remember, however, that 'up' and 'down' are relative to the original orientation of the
group, not the page. As the group rotates, 'vertical' also rotates. When the group has
rotated 15 degrees, 'up' is actually 15 degrees (not 0 degrees), and 'down' is actually 195
degrees (not 180 degrees). When the group has rotated 50 degrees, 'up' is 50 degrees, and
'down' is 230 degrees, and so on.
Original state of group
Example 3: Rotating the group clockwise and rotating the object anticlockwise
649
Chapter 21: Defining Common Object Properties
If your group is configured to rotate from 0 degrees-60 degrees, and one of its objects is
configured to rotate from 90 degrees-0 degrees, the object will do both. It will rotate as
per its own properties, and, at the same time, it will rotate as part of the group.
Remember, however, that the object's rotation is relative to the group, not the page. If the
group rotates 60 degrees to the right, and the object rotates 90 degrees to the left, the
object has only rotated 30 degrees to the left relative to the page.
Original state of group
Note: By moving the ellipse as shown in the above examples, you are actually chang-
ing the overall size of the group. It is important to remember this as it might affect
object fill levels.
See Also
Movement
Defining Common Object Properties
Scaling
You can scale objects to the size you want.
To configure an object or group that changes size:
1. Draw the object (or paste a symbol). The object properties tab dialog will auto-
matically display, unless you have turned off the Display properties on new option
in the Graphics Builder.
650
Chapter 21: Defining Common Object Properties
651
Chapter 21: Defining Common Object Properties
Note:You can also insert Equipment.item references into expression fields using the
insert tag option; however if no equipment has been configured in your system the
list will be empty. You will need to configure equipment or deselect the option 'Dis-
play equipment items when populating tag list' in the Project Editor Options Dialog
to populate the list with available tags.
Note: You can increase the width at minimum, and decrease it at maximum, by
swapping the percentages in the Scaling fields (i.e. put the high percentage in the At
652
Chapter 21: Defining Common Object Properties
minimum field, and the low in the At maximum), or by swapping the expression
limits (in the Minimum and Maximum fields).
If you choose Center, width changes occur equally to both sides. (i.e., the vertical center
axis remains anchored):
If you choose Right, width changes occur to the left of the object. (i.e., the right edge
remains anchored):
653
Chapter 21: Defining Common Object Properties
For example, if you enter 20, the Center axis will be 20 pixels to the right of the object
center.
Enter a negative value to move the center axis left instead of right.
Note: If a group and its objects are configured to change size during runtime, the
group scaling effects will be combined with the object scaling effects. For example, if
a group is configured to double in size at runtime, and one of its objects is con-
figured to halve in size, the object will appear to remain the same size (it halves,
then doubles). Remember, however, that the object's position might change as the
group gets bigger.
See Also
Object Properties - Scaling (Vertical)
654
Chapter 21: Defining Common Object Properties
Note:You can also insert Equipment.item references into expression fields using the
insert tag option; however if no equipment has been configured in your system the
list will be empty. You will need to configure equipment or deselect the option 'Dis-
play equipment items when populating tag list' in the Project Editor Options Dialog
to populate the list with available tags.
Note: You can increase the height at minimum, and decrease it at maximum, by
swapping the percentages in the Scaling fields (i.e. put the high percentage in the At
655
Chapter 21: Defining Common Object Properties
minimum field, and the low in the At maximum), or by swapping the expression
limits (in the Minimum and Maximum fields).
If you choose the middle, height changes will occur equally above and below the axis.
(i.e. the horizontal center axis will remain anchored):
If you choose the bottom, width changes will occur to the top edge of the object. (i.e. the
bottom edge will remain anchored):
656
Chapter 21: Defining Common Object Properties
For example, if you enter 20, the Center axis will be 20 pixels below the object center.
Enter a negative value to move the Center axis up instead of down.
Notes:
l If a group and its objects are configured to change size during runtime, the group
scaling effects will be combined with the object scaling effects. For example, if a group
is configured to double in size at runtime, and one of its object is configured to halve
in size, the object will appear to remain the same size (it halves, then doubles).
Remember, however, that the object's position might change as the group gets bigger.
l When the radio buttons in Object Properties - Fill Color (On/Off, Multi-state and so
on) are selected, they change the appearance of the right-hand side of the dialog.
See Also
Object Properties - Scaling (Horizontal)
Fill Color
You can control the fill color to use for your objects.
To configure an object or group with changing fill color:
1. Draw the object/group (or paste a symbol). The properties tab dialog will auto-
matically display, unless you have turned off the Display properties on new option
in the Graphics Builder. (For a group, the properties dialog will not display auto-
matically; you need to double-click the group.)
2. Click the Fill tab.
3. Click the Color tab (to the right of the dialog).
4. Select the type of color change (On/Off, Multi-state and so on).
5. Enter the expression/conditions that will change the object's fill color at runtime.
6. Enter additional object property details as necessary.
7. Click OK.
See Also
Object Properties - Fill Color (On/Off)
Object Properties - Fill Color (Multi-state)
Object Properties - Fill Color (Array)
Object Properties - Fill Color (Threshold)
Object Properties - Fill Color (Gradient)
657
Chapter 21: Defining Common Object Properties
[Type] On / Off
Select this radio button to fill the object/group with one color when a particular expres-
sion is TRUE, and another when it is FALSE. For example, you could fill an object/group
with red when a particular variable tag is in alarm, and green when it is not.
[Type] Multi-state
This option is useful when you have several possible conditions, occurring together in
different combinations, at different times. Select this option to fill the object/group with a
different color for each combination.
For example, three digital variable tags (A,B, and C) can each be ON or OFF at any time.
You can fill the object/group with a different color for each ON/OFF combination. In
other words, you could use a different fill color for each of the following ON/OFF com-
binations ABC, ABC, ABC, ABC, ABC, ABC, ABC, ABC.
[Type] Array
The Array option allows you to enter an expression which returns an integer. For each
unique integer (from 0 to 255), you can fill the object/group with a different color. For
example, you could use a different fill color for each threshold of an analog alarm.
[Type] Threshold
Select this radio button to dynamically change the fill color when an expression reaches
a specific value (threshold). For example, you might decide that the fill color will change
to red when the speed of a motor is greater than or equal to 4500 rpm, and to white
when less than or equal to 100 rpm, but remains gray for every speed in between.
[Type] Gradient
Select this radio button to dynamically graduate the fill color, displaying a different color
for each unique value returned by a particular expression. This option allows you to
select two colors, to be used as the color limits. The color for each value returned is auto-
matically selected from within the range defined by these limits. The result is a fade
from one color to another.
ON color when
The color selected as the ON color (below) will be used as the fill color whenever the con-
dition entered here (128 characters maximum) is TRUE. The color selected as the OFF
color (below) will be used as the fill color whenever this condition is FALSE. For exam-
ple, you could fill an object/group with blue when MIX_RUNNING is TRUE, and white
when it is FALSE.
To insert a tag or a function, click the Wizard button to the right of this field. This button
displays two options: Insert Tag and Insert Function.
658
Chapter 21: Defining Common Object Properties
Note:You can also insert Equipment.item references into expression fields using the
insert tag option; however if no equipment has been configured in your system the
list will be empty. You will need to configure equipment or deselect the option 'Dis-
play equipment items when populating tag list' in the Project Editor Options Dialog
to populate the list with available tags.
OFF color
The fill color whenever the condition entered above is FALSE. For example, you could
fill the object/group with white when MIX_RUNNING is FALSE.
Note: The color that you select here will change any Fill color specified through
Appearance (General) properties tab.
ON color
The fill color whenever the condition entered above is TRUE. For example, you could fill
the object/group with blue when MIX_RUNNING is TRUE.
Note: Group fill color is only applied if the individual objects in the group do not
have their own fill colors defined.
See Also
Object Properties - Fill Color (Multi-state)
Object Properties - Fill Color (Array)
Object Properties - Fill Color (Threshold)
Object Properties - Fill Color (Gradient)
659
Chapter 21: Defining Common Object Properties
For example, three digital variable tags (A,B, and C) can each be ON or OFF at any time.
You can fill the object/group with a different color for each ON/OFF combination. In
other words, you could use a different fill color for each of the following ON/OFF com-
binations ABC, ABC, ABC, ABC, ABC, ABC, ABC, ABC.
[Type] Array
The Array option allows you to enter an expression which returns an integer. For each
unique integer (from 0-255), you can fill the object/group with a different color. For exam-
ple, you could use a different fill color for each threshold of an analog alarm.
[Type] Threshold
Select this radio button to dynamically change the fill color when an expression reaches
a specific value (threshold). For example, you might decide that the fill color will change
to red when the speed of a motor is greater than or equal to 4500 rpm, and to white
when less than or equal to 100 rpm, but remains gray for every speed in between.
[Type] Gradient
Select this radio button to dynamically graduate the fill color, displaying a different color
for each unique value returned by a particular expression. This option allows you to
select two colors, to be used as the color limits. The color for each value returned is auto-
matically selected from within the range defined by these limits. The result is a fade
from one color to another.
Conditions
The conditions you enter here (using a maximum of 128 characters per condition) will
occur together in different ways, at different times. You can use each unique combination
to force a different fill color for the object/group.
To enter a condition, click the relevant line (A, B, C, and so on), click Edit, and type in
the condition. You can add more conditions (to a maximum of 5, providing 32 com-
binations), using the Add button. To insert a tag or function, click the Wizard button.
This button displays two options: Insert Tag and Insert Function.
Note:You can also insert Equipment.item references into expression fields using the
insert tag option; however if no equipment has been configured in your system the
list will be empty. You will need to configure equipment or deselect the option 'Dis-
play equipment items when populating tag list' in the Project Editor Options Dialog
to populate the list with available tags.
You can also remove conditions by clicking Delete, but you need to always provide at
least one condition in this field. Conditions left blank (instead of deleted) are evaluated
as false at runtime.
State colors
660
Chapter 21: Defining Common Object Properties
The fill colors that will be used for each combination of the above conditions.
Note: The color that you select as ABC (all conditions false) will change any Fill
color specified through Appearance (General) properties tab.
For example:
To fill the object/group with a different color each time the status of a valve changes, you
could fill out the Conditions and State symbols fields as follows:
Note: Group fill color is only applied if the individual objects in the group do not
have their own fill colors defined.
See Also
Object Properties - Fill Color (On/Off)
Object Properties - Fill Color (Array)
Object Properties - Fill Color (Threshold)
Object Properties - Fill Color (Gradient)
661
Chapter 21: Defining Common Object Properties
Select this radio button to fill the object/group with one color when a particular expres-
sion is TRUE, and another when it is FALSE. For example, you could fill an object/group
with red when a particular variable tag is in alarm, and green when it is not.
[Type] Multi-state
This option is useful when you have several possible conditions, occurring together in
different combinations, at different times. Select this option to fill the object/group with a
different color for each combination.
For example, three digital variable tags (A,B, and C) can each be ON or OFF at any time.
You can fill the object/group with a different color for each ON/OFF combination. In
other words, you could use a different fill color for each of the following ON/OFF com-
binations ABC, ABC, ABC, ABC, ABC, ABC, ABC, ABC.
[Type] Array
The Array option allows you to enter an expression which returns an integer. For each
unique integer (from 0-255), you can fill the object/group with a different color. For exam-
ple, you could use a different fill color for each threshold of an analog alarm.
[Type] Threshold
Select this radio button to dynamically change the fill color when an expression reaches
a specific value (threshold). For example, you might decide that the fill color will change
to red when the speed of a motor is greater than or equal to 4500 rpm, and to white
when less than or equal to 100 rpm, but remains gray for every speed in between.
[Type] Gradient
Select this radio button to dynamically graduate the fill color, displaying a different color
for each unique value returned by a particular expression. This option allows you to
select two colors, to be used as the color limits. The color for each value returned is auto-
matically selected from within the range defined by these limits. The result is a fade
from one color to another.
Array expression (128 Chars.)
Enter the expression which is to return an integer. For each value returned, a different
color will fill the object/group.
If the return value is:
l Less than 0 (zero), it will be set to 0 (zero), and a runtime hardware alarm will be trig-
gered.
l Greater than 255, it will be set to 255, and a runtime hardware alarm will be trig-
gered.
l A real (non-integer) number, it will be truncated (for example 8.1 and 8.7 would both
be truncated to 8).
662
Chapter 21: Defining Common Object Properties
To insert a tag or a function, click the Wizard button to the right of this field. This button
displays two options: Insert Tag and Insert Function.
Note:You can also insert Equipment.item references into expression fields using the
insert tag option; however if no equipment has been configured in your system the
list will be empty. You will need to configure equipment or deselect the option 'Dis-
play equipment items when populating tag list' in the Project Editor Options Dialog
to populate the list with available tags.
Array colors
The fill colors that will be used for each integer returned by the Array expression entered
above (color 0 will be used when the expression returns integer 0, color 1 will be used
when integer 1 is returned and so on).
Note: The color that you select for color 0 (zero) will change any Fill color specified
through Appearance - General tab.
For example, to display different symbols illustrating the various states of a motor, you
could fill out the Array expression and Array symbol fields as follows:
Note: Group fill color is only applied if the individual objects in the group do not
have their own fill colors defined.
See Also
Object Properties - Fill Color (On/Off)
Object Properties - Fill Color (Multi-state)
663
Chapter 21: Defining Common Object Properties
664
Chapter 21: Defining Common Object Properties
To insert a tag or a function, click the Wizard button to the right of this field. This button
displays two options: Insert Tag and Insert Function.
Note:You can also insert Equipment.item references into expression fields using the
insert tag option; however if no equipment has been configured in your system the
list will be empty. You will need to configure equipment or deselect the option 'Dis-
play equipment items when populating tag list' in the Project Editor Options Dialog
to populate the list with available tags.
< 5% Bright Blue When the expression returns less than 10, the color fill
will be Bright Blue.
< 15% Blue When the expression returns less than 30, the color fill
will be Blue.
> 85% Red When the expression returns greater than 170, the color
665
Chapter 21: Defining Common Object Properties
> 95% Bright Red When the expression returns greater than 190, the color
fill will be Bright Red.
You can add up to 100 threshold color combinations. To add a combination, click Add
and enter the relevant details. To edit an existing combination, click the relevant line.
You can also remove combinations by clicking Delete.
Any values not included in a range (for example between 15% and 85% in the example
above) produce a static fill color as specified through Appearance - General tab.
Note: Group fill color is only applied if the individual objects in the group do not
have their own fill colors defined.
See Also
Object Properties - Fill Color (On/Off)
Object Properties - Fill Color (Multi-state)
Object Properties - Fill Color (Array)
Object Properties - Fill Color (Gradient)
666
Chapter 21: Defining Common Object Properties
[Type] Threshold
Select this radio button to dynamically change the fill color when an expression reaches
a specific value (threshold). For example, you might decide that the fill color will change
to red when the speed of a motor is greater than or equal to 4500 rpm, and to white
when less than or equal to 100 rpm, but remains gray for every speed in between.
[Type] Gradient
Select this radio button to dynamically graduate the fill color, displaying a different color
for each unique value returned by a particular expression. This option allows you to
select two colors, to be used as the color limits. The color for each value returned is auto-
matically selected from within the range defined by these limits. The result is a fade
from one color to another.
Color expression
The value of the expression entered in this field (128 characters maximum) will deter-
mine the fill color of the object/group. By default, when the expression returns its mini-
mum value, the fill color will be the At minimum color (as defined below). When the
expression returns its maximum value, the fill color will be the At maximum color (as
defined below). When the expression returns a value half-way between its minimum
and maximum, a color will be selected from the half-way point of the range defined by
the At minimum and At maximum colors.
To insert a tag or a function, click the Wizard button to the right of this field. This button
displays two options: Insert Tag and Insert Function.
Note:You can also insert Equipment.item references into expression fields using the
insert tag option; however if no equipment has been configured in your system the
list will be empty. You will need to configure equipment or deselect the option 'Dis-
play equipment items when populating tag list' in the Project Editor Options Dialog
to populate the list with available tags.
667
Chapter 21: Defining Common Object Properties
Enter the minimum value for the expression. When this value is returned by the expres-
sion, the fill color of the object/group will be the At minimum color. You can only enter a
value here if you have selected the Specify range box.
[Color expression] Maximum
Enter the maximum value for the expression. When this value is returned by the expres-
sion, the fill color of the object/group will be the At maximum color. You can only enter
a value here if you have selected the Specify range box.
At minimum
The fill color of the object/group when the Color expression returns its minimum value.
Note: The color that you select here will change any Fill color specified through
Appearance - General tab.
At maximum
The fill color of the object/group when the Color expression returns its maximum value.
Note: Group fill color is only applied if the individual objects in the group do not
have their own fill colors defined.
See Also
Object Properties - Fill Color (On/Off)
Object Properties - Fill Color (Multi-state)
Object Properties - Fill Color (Array)
Object Properties - Fill Color (Threshold)
Fill Level
You can control the fill level shown in your objects.
To configure an object or group with changing fill level:
1. Draw the object/group (or paste a symbol). The properties tab dialog will auto-
matically display, unless you have turned off the Display properties on new option
in the Graphics Builder. (For a group, the properties dialog will not display auto-
matically; you need to double-click the group.)
2. Click the Fill tab.
3. Click the Level tab (to the right of the dialog).
4. Enter a Level expression (the expression that will change the fill level of the
object/group at runtime).
668
Chapter 21: Defining Common Object Properties
Note:You can also insert Equipment.item references into expression fields using the
insert tag option; however if no equipment has been configured in your system the
list will be empty. You will need to configure equipment or deselect the option 'Dis-
play equipment items when populating tag list' in the Project Editor Options Dialog
to populate the list with available tags.
669
Chapter 21: Defining Common Object Properties
Select this box to manually specify Minimum and Maximum values for the Level expres-
sion, rather than using the default values. For an expression containing an analog var-
iable tag, the defaults are the Engineering Zero and Full Scale values from the last
variable tag in the expression. If the analog variable tag does not have Engineering Zero
and Full Scale values, the defaults are 0 (zero) and 32000. For expressions without tags,
the defaults are 0 (zero) and 100.
[Level expression] Minimum
Enter the minimum value for the expression. When this value is returned by the expres-
sion, the object/group will fill to the At minimum level. You can only enter a value here
if you have selected the Specify range box.
[Level expression] Maximum
Enter the maximum value for the expression. When this value is returned by the expres-
sion, the object/group will fill to the At maximum level. You can only enter a value here
if you have selected the Specify range box.
At minimum
The level to which the object/group will be filled when the Level expression returns its
minimum value. For example, if you enter 30, the object/group will be 30% full when the
expression returns its minimum value.
You can change the percentage by pressing the up and down arrows to the right of the
field, or by entering another value in this field.
At maximum
The level to which the object/group will be filled when the Level expression returns its
maximum value. For example, if you enter 90, the object/group will be 90% full when the
expression returns its maximum value.
You can change the percentage by pressing the up and down arrows to the right of the
field, or by entering another value in this field.
Fill Direction
The direction in which the color will spread when increasing. There are four options
(each represented by an arrow): Up, Down, Left, Right. If you choose Up, the
object/group will be filled from the bottom up. If you choose Left, the object/group will be
filled from right to left, and so on
Background color
The color of any unfilled part of the object/group (for example, if the object/group is only
90% full, the unfilled 10% will be display using this color). The background is often
made transparent. Using transparent, you would see the outline of the object/group, and
anything behind the object/group on the page.
670
Chapter 21: Defining Common Object Properties
Note: If an object in a group is a slider, it might change the overall size of the group
when used at runtime. If it does, the fill level of the group will adjust accordingly.
Example 2: Group the objects and configure a fill level for the group as well
671
Chapter 21: Defining Common Object Properties
In this example, the objects' fill levels can still be adjusted normally. The group's fill
level determines how much of the objects you can see (and how much will be obscured
by the groups background color; white, in this case).
Touch Commands
You can assign touch commands to an object or group.
To assign a touch command to an object or group:
1. Draw the object/group (or paste a symbol). The properties tab dialog will auto-
matically display, unless you have turned off the Display properties on new option
in the Graphics Builder. (For a group, the properties dialog will not display auto-
matically; you need to double-click the group.)
2. Click the Input tab.
3. Click the Touch tab (to the right of the dialog).
4. Enter a command in the command field (the command that will be executed when
the object/group is touched at runtime).
5. Enter further details as necessary, using the Help button for detailed information
about each field.
6. Click OK.
672
Chapter 21: Defining Common Object Properties
See Also
Object Properties - Input (Touch)
Defining Common Object Properties
[Action] Repeat
673
Chapter 21: Defining Common Object Properties
Select this option if you want a command to execute continually (and a unique message
to log continually) whenever the operator has the mouse pointer positioned over the
object/group, and is holding the left mouse button depressed. If the operator moves the
mouse pointer away from the object/group without releasing the mouse button, the com-
mand will stop executing, but will start again as soon as the mouse pointer is re-posi-
tioned over the object/group. The only exception is when you also have the Down option
selected, in which case, the command will execute continually even if the mouse pointer
has been moved away from the object/group.
To set the delay which precedes the first execution of the command (and the first log of
the message), and the delay between each repeat.
Up/Down/Repeat command
The commands (set of instructions) to be executed immediately when the selected action
is performed. The command(s) can be a maximum of 253 characters long.
To insert a tag or a function, click the Wizard button to the right of this field. This button
displays two options: Insert Tag and Insert Function.
Note:You can also insert Equipment.item references into expression fields using the
insert tag option; however if no equipment has been configured in your system the
list will be empty. You will need to configure equipment or deselect the option 'Dis-
play equipment items when populating tag list' in the Project Editor Options Dialog
to populate the list with available tags.
To include field data as part of a logged message, insert the field name as part of the
device format when configuring the device. For instance, in the Format field of the
Devices form, you could enter {MsgLog,20} {FullName,15}. This would accommodate the
logging of messages such as P2 started by John Smith.
The log device to which the message is sent is specified through the General Access tab.
Note: If the object is part of a Genie or symbol, this property can be defined after the
674
Chapter 21: Defining Common Object Properties
Genie/symbol is pasted onto a page. (Hold down the Control (CTRL) key and double-
click the object.) If you define it before pasting (i.e. you define it for the original in the
library), you cannot edit it after. Similarly, if the object is part of a template, it can be
defined after a page has been created using that template (again, with Control + dou-
ble-click). If you define it for the actual template, you cannot edit it for pages based
on the template.
Repeat rate
This option sets the delay which precedes the first execution of the command(s), and the
delay between each subsequent repeat of the command(s).
You can change the rate by pressing the up and down arrows to the right of the field, or
by entering another value in this field.
Note: If you define a touch command for an object in a group, the group's touch com-
mand will not work.
Keyboard Commands
You can assign a keyboard command to an object or group.
To assign a keyboard command to an object or group:
1. Draw the object/group (or paste a symbol). The object properties tab dialog will auto-
matically display, unless you have turned off the Display properties on new option
in the Graphics Builder. (For a group, the properties dialog will not display auto-
matically; you need to double-click the group.)
2. Click the Input tab.
3. Click the Keyboard Commands tab (to the right of the dialog).
4. Enter the key sequence.
5. Enter a command in the command field (the command that will be executed when
the key sequence above is entered by the operator at runtime).
6. Enter additional details as necessary.
7. Click OK.
See Also
Object Properties - Input (Keyboard Commands)
Defining Common Object Properties
675
Chapter 21: Defining Common Object Properties
Note:You can also insert Equipment.item references into expression fields using the
insert tag option; however if no equipment has been configured in your system the
list will be empty. You will need to configure equipment or deselect the option 'Dis-
play equipment items when populating tag list' in the Project Editor Options Dialog
to populate the list with available tags.
676
Chapter 21: Defining Common Object Properties
Select this box to assign the keyboard command to the same area as the object/group.
Only users with access to this area (and any necessary privileges) will be able to issue
this command or log the message. If you want to assign this keyboard command to
another area, do not select this box; instead, enter another area below.
[Security] Command area
Enter the area to which this keyboard command belongs. Only users with access to this
area (and any necessary privileges) will be able to issue this command or log the mes-
sage. For example, if you enter Area 1 here, operators need to have access to Area 1 (plus
any necessary privileges) to issue this command.
Click the menu to the right of this field to select an area, or type in an area number
directly.
Note: If the object is part of a Genie or symbol, this property can be defined after the
Genie/symbol is pasted onto a page (Ctrl + double-click). Similarly, if the object is
part of a template, this property can be defined after a page has been created using
that template (Ctrl + double-click).
You can leave this field blank by selecting the Same privilege as object/group box.
[Security] Same privilege as object/group
Select this box to assign the keyboard command the same privilege as the object/group.
Only users with this privilege level will be able to issue this command, or log the mes-
sage. If you want to assign this keyboard command a different privilege, do not select
this box; instead, enter another privilege below.
[Security] Privilege level
Enter the privilege level that a user needs to possess to be able to issue this command or
log the message. For example, if you enter Privilege Level 1 here, operators need to pos-
sess Privilege Level 1 to be able to issue this command. You can also combine this
restriction with area restrictions. For example, if you assign the keyboard command to
Area 5, with Privilege Level 2, the user needs to be set up with Privilege 2 for Area 5.
Click the menu to the right of this field to select a privilege, or type in an area number
directly.
Note: If the object is part of a Genie or symbol, this property can be defined after the
Genie/symbol is pasted onto a page (Ctrl + double-click). Similarly, if the object is
part of a template, this property can be defined after a page has been created using
that template (Ctrl + double-click).
You can leave this field blank by selecting the Same privilege as object/group box.
[Logging] Log Message
677
Chapter 21: Defining Common Object Properties
The text message sent to the MsgLog field of the Log Device when the selected action is
performed by the operator at runtime. The message is plain text, and can include tag
name substitutions using Genie or Super Genie syntax. When using Super Genie syntax,
the data type needs to be specified. The name of the tag will then be included in the text.
The message can be a maximum of 32 characters long.
If you want to include field data as part of a logged message, you need to insert the field
name as part of the device format when you configure the device. For instance, in the
Format field of the Devices form, you could enter {MsgLog,20} {FullName,15}. This
would accommodate the logging of messages such as P2 started by John Smith.
The log device to which the message is sent is specified through the General Access tab.
Note: If a group and one of its objects are both assigned a keyboard command with
the same key sequence, the object's command will take precedence (i.e., the group's
command will not execute).
Sliders
You can create sliders to have on your graphics pages.
To configure a slider:
1. Draw the object/group (or paste a symbol). The properties tab dialog will auto-
matically display, unless you have turned off the Display properties on new option
in the Graphics Builder. (For a group, the properties dialog will not display auto-
matically; you need to double-click the group.)
2. Click the Slider tab.
3. Click the Horizontal, Vertical or Rotational tab (to the right of the dialog).
4. Enter the Tag to link to the slider.
5. Enter any additional details.
6. Click OK.
See Also
Object Properties - Slider (Horizontal)
Object Properties - Slider (Vertical)
Object Properties - Slider (Rotational)
678
Chapter 21: Defining Common Object Properties
Note: The horizontal slider cannot be used if the rotational slider is enabled, or if hor-
izontal movement is enabled.
Note:You can also insert Equipment.item references into expression fields using the
insert tag option; however if no equipment has been configured in your system the
list will be empty. You will need to configure equipment or deselect the option 'Dis-
play equipment items when populating tag list' in the Project Editor Options Dialog
to populate the list with available tags.
679
Chapter 21: Defining Common Object Properties
The distance (number of pixels from the original object/group center) that the
object/group can slide to the right. When it reaches the point defined by this distance, the
tag value changes to its maximum limit.
You can change the offset value by pressing the up and down arrows to the right of the
field, or by entering another value in this field.
You can increase the value of the tag with a left-slide, and decrease it with a right-slide,
by entering negative distances in the Offset fields.
Note: If an object in a group is a slider, it might change the overall size of the group
when used at runtime. If it does, the fill level of the group will adjust accordingly. If
a group and one of its objects are both defined as sliders, and they slide in the same
direction or one is rotational, the object will take precedence (i.e. only the object will
operate as a slider).
See Also
Object Properties - Slider (Vertical)
Object Properties - Slider (Rotational)
Note: The vertical slider cannot be used if the rotational slider is enabled, or if ver-
tical movement is enabled.
680
Chapter 21: Defining Common Object Properties
Note:You can also insert Equipment.item references into expression fields using the
insert tag option; however if no equipment has been configured in your system the
list will be empty. You will need to configure equipment or deselect the option 'Dis-
play equipment items when populating tag list' in the Project Editor Options Dialog
to populate the list with available tags.
Note: If an object in a group is a slider, it might change the overall size of the group
when used at runtime. If it does, the fill level of the group will adjust accordingly. If
a group and one of its objects are both defined as sliders, the object will take prec-
edence (i.e. only the object will operate as a slider).
See Also
Object Properties - Slider (Horizontal)
Object Properties - Slider (Rotational)
681
Chapter 21: Defining Common Object Properties
Note: The rotational slider cannot be used if either of the other sliders is enabled, or
if rotational movement is enabled.
Note:You can also insert Equipment.item references into expression fields using the
insert tag option; however if no equipment has been configured in your system the
list will be empty. You will need to configure equipment or deselect the option 'Dis-
play equipment items when populating tag list' in the Project Editor Options Dialog
to populate the list with available tags.
682
Chapter 21: Defining Common Object Properties
Enter an clockwise angle (in degrees relative to 0 degrees). The slider cannot rotate clock-
wise beyond this limit. When it reaches this limit, the Tag value changes to its max-
imum limit.
You can change the angle value by pressing the up and down arrows to the right of the
field, or by entering another value in this field.
Note:You can increase the value of the tag with an anti-clockwise slide, and decrease
it with a clockwise-slide, by entering negative distances in the Angle fields.
Note:If a group and one of its objects are both defined as sliders, the object will take
precedence (i.e., only the object will operate as a slider).
See Also
Object Properties - Slider (Horizontal)
Object Properties - Slider (Vertical)
Access
You can determine the kind of access you want to have to your objects.
l General Access to Objects
l Disable Access to Objects
683
Chapter 21: Defining Common Object Properties
Note: If the object is part of a Genie or symbol, the following properties can be com-
pleted after the Genie/Symbol is pasted onto a page (Ctrl + double-click). Similarly, if
the object is part of a template, the properties can be defined after a page has been
created using that template (Ctrl + double-click).
[Identification] Description
Enter a description of the object/group, and its various functions and so on. This field is
purely for the entry of information which you consider beneficial to the smooth running
and maintenance of your system. It will not affect the way the system runs, and it will
not display during runtime.
[Identification] Tool tip
Enter a short, meaningful description (48 characters maximum) of the object/group. Dur-
ing runtime, this description appears when the operator moves the cursor onto the
object/group. The message can be plain text, Super Genie syntax or both. When using
Super Genie syntax, the data type needs to be included. The name of the tag will then be
included in the text.
684
Chapter 21: Defining Common Object Properties
If an object in a group has a tool tip, this object's tool tip will be displayed, and not the
group's tool tip. If the object does not have a tool tip, the group tool tip will display. In
this instance, if the object is a member of a group, and that group is part of another
group, the tool tip for the first group will display.
If you place an object behind a group, its tool tip will not display. Remember, however,
that group boundaries are rectangular, no matter what shape is formed by the objects in
the group. This means that 'blank' spaces between objects in a group are actually part of
the group. Even if you can see the individual object, if it is behind the group, its tool tip
will not display.
[Security] Same area as page
Select this box to assign the object/group to the same area as the page on which it has
been drawn; otherwise, leave it blank, and enter another area in the Object/Group area
field (below).
[Security] Object/Group area
Enter the area to which this object/group belongs. Users without access to this area (and
any necessary privileges) will not be able to make full use of the object/group. They will
not be able to use touch command, keyboard commands, movement, sliders and so on.
(In order to avoid confusion for such operators, it is sometimes a good idea to disable
the object/group when it is unavailable due to lack of security rights. Disabled
objects/groups can be grayed, hidden or embossed.) For example, if you enter Area 1
here, operators need to have access to Area 1 (plus any necessary privileges) to make use
of this object/group.
Click the menu to the right of this field to select an area, or type in an area number
directly.
[Security] No privilege restrictions
Select this box to disable privilege restrictions; otherwise, leave it blank, and enter
another privilege below. The implications of not assigning a privilege restriction depend
upon whether you have used areas in your security setup:
l No Areas: Every operator has full control of the object/group.
l Areas: An operator will only need view access to control the object/group if it does
not have privilege restrictions.
[Security] Privilege level
Enter the privilege level necessary for an operator to use this object/group. Operators
without the necessary privileges will not be able to make full use of the object/group.
They will not be able to use touch command, keyboard commands, movement, sliders
and so on. (To avoid confusion for such operators, disable the object/group when it is
unavailable due to lack of security rights. Disabled objects/groups can be grayed, hidden
or embossed.) For example, if you enter Privilege Level 1 here, operators need to possess
685
Chapter 21: Defining Common Object Properties
Privilege Level 1 to use of this object/group. You can also combine this restriction with
area restrictions. For example, if you assign the object/group to Area 5, with Privilege
Level 2, the user needs to have Privilege 2 for Area 5.
Click the menu to the right of this field to select a privilege, or type in an privilege
number directly.
Note: If an object is part of a group, users need to have access to the group in order
to have access to the object.
Note: You need to include the MsgLog field in the format of the log device for the
message to be sent.
See Also
Disable Access to Objects
686
Chapter 21: Defining Common Object Properties
The object/group will be disabled whenever the expression entered here (128 characters
maximum) is true. If the object/group is disabled, the operator will not be able to use any
form of input, such as sliders, touch commands, keyboard commands and so on.
To insert a tag or a function, click the Wizard button to the right of this field. This button
displays two options: Insert Tag and Insert Function.
Note:You can also insert Equipment.item references into expression fields using the
insert tag option; however if no equipment has been configured in your system the
list will be empty. You will need to configure equipment or deselect the option 'Dis-
play equipment items when populating tag list' in the Project Editor Options Dialog
to populate the list with available tags.
There are three ways of indicating a disabled object/group: Embossed, Grayed, and Hid-
den.
[Disable when] Disable on insufficient area or privilege
The object/group will be disabled for operators whose area and privilege rights do not
satisfy the requirements defined in the Access.
Disable style:
l Embossed - When disabled, the object/group will look as if it has been embossed on
the graphics page.
l Grayed - When disabled, the object/group will be grayed out (all color detail will be
removed).
l Hidden - When disabled, the object/group will be entirely hidden from view.
Note: If a group is disabled, objects in that group are also disabled. The disabled
style of the group is applied to all the objects within the group. When the group is
enabled, each object uses the disabled style of itself.
687
Chapter 21: Defining Common Object Properties
688
Chapter 22: Defining Commands and Controls
Commands allow your operators to interact with the runtime system. You can define
three types of direct command controls:
l Touch commands that your operators issue by clicking specific graphics object (dis-
played on a graphics page).
l Keyboard commands that your operators issue by typing instructions on the key-
board.
l Slider controls that your operators use to change the values of analog variables.
You can assign privileges to commands and controls, and send a message to the com-
mand log each time an operator issues a command.
Touch commands
You can assign Touch commands to the objects that you create on your graphics pages.
Touch commands allow the operator to send commands to the runtime system, by click-
ing (with the mouse or similar) on an object on the graphics page. (For buttons, the com-
mand can be executed by highlighting the button with the cursor keys on the keyboard
and pressing Enter.)
You can define several commands for an object, one command to execute when the oper-
ator clicks on the object, another for when the operator releases the mouse button, and
another to operate continuously while the operator holds the mouse button down. For
example, a drive can be jogged by starting it when the mouse button is depressed and
stopping it when the mouse button released; variables can be incremented while the
mouse button is held, and so on.
You can also associate a tool tip (Help text) with an object; if the operator holds the
mouse pointer over the object, the tool tip will display in a pop-up window.
Note: You can define a disable condition for any object on a page (including but-
tons). When the condition is active, the object is grayed and the operator cannot
select it.
See Also
Touch Commands
689
Chapter 22: Defining Commands and Controls
Keyboard commands
Keyboard commands consist of a key sequence that an operator enters on the keyboard,
and an instruction (or series of instructions) that executes when the key sequence is
entered.
You can define keyboard commands that operate:
l For any graphics page displayed on the computer screen (system keyboard com-
mands).
l Only when a specific graphics page is displayed (page-keyboard commands).
l Only when an operator positions the mouse pointer on an object on a graphics page.
You can associate tool tips with any object; if the operator holds the mouse pointer
over the object, the tool tip displays in a pop-up box.
Object keyboard commands have precedence over page keyboard commands (which
have precedence over system (global) keyboard commands). If you define a keyboard
command for an object that is identical to a page keyboard command, the object key-
board command executes when key sequence is entered, but the page keyboard com-
mand is ignored.
See Also
Keyboard Commands
System Keyboard Commands
Keyboard Keys
Keyboards
Defining Key Sequences for Commands
Slider controls
Slider controls allow an operator to change the value of an analog variable by dragging
an object on the graphics page. Sliders also move automatically to reflect the value of the
variable tag.
See Also
Sliders
690
Chapter 22: Defining Commands and Controls
1. If you plan to use any special keys, you need to first define your keys.
2. In the Project Editor, choose System | Keyboard Commands.
3. Complete the properties in the System Keyboard Commands form that appears. You
need to enter a key sequence and a command.
4. Click Add to append a record you have created, or Replace to modify a record.
See Also
System keyboard command properties
Defining Commands and Controls
The following fields are implemented with extended forms (press F2).
Area (16 Chars.)
The area to which the command belongs. Only operators who belong to this area will be
able to issue this command. For example, if you enter Area 1 here, operators need to
have access to Area 1 (plus any necessary privileges) to issue this command.
Message Log (32 Chars.)
A text message sent to the MsgLog field of the Log Device when the selected action is per-
formed by the operator at runtime. The message needs to be plain text:
If you want to include field data as part of a logged message, you need to insert the field
name as part of the device format when you configure the device. For instance, in the
Format field of the Devices form, you could enter {MsgLog,20} {FullName,15}. This
would accommodate the logging of messages such as P2 started by John Smith.
The log device to which the message is sent is specified in the Log Device field below.
691
Chapter 22: Defining Commands and Controls
Note: You need to include the MsgLog field in the format of the log device for the
message to be sent.
Keyboard Keys
You can define keyboard keys to make it easier to issue commands.
To define a keyboard key:
1. Choose System | Keyboard Keys. The Keyboard Keys dialog box appears.
2. Enter the Key Name and Key Code (and Comment if applicable).
3. Click Add to append a new record, or Replace to modify an existing record.
See Also
Keyboard keys properties
Defining Commands and Controls
692
Chapter 22: Defining Commands and Controls
Comment
Any useful comment. Enter a value of 48 characters or less.
The following fields are implemented with extended forms (press F2).
Echo
Determines if the key is echoed on the screen (when the key is used). Enter a value of 8
characters or less.
Echo TRUE
(Display (echo) the Key Name when the key is pressed. The key name is displayed on
the graphics page in the keyboard entry line - AN1)
Echo FALSE
(Do not display (echo) the Key Name when the key is pressed)
This property is optional. If you do not specify Echo, Echo defaults to True.
Keyboard Type (16 Chars.)
The type of keyboard. This field is only necessary if you have more than one type of key-
board on the same system.
If you do have more than one type of keyboard, use Keyboard Type 1 for your first type
of keyboard, use a separate number for each type (1, 2, 3, etc.), and define keys for each
keyboard. You can use the default (Type 0) for common keys.
Keyboards
You can use non-standard keyboards (as well as multiple keyboards) to control Citect-
SCADA. You can also define key names.
Using non-standard keyboards
You can use many types of keyboards with your runtime system. The most common key-
boards are IBM compatible keyboards; this type of keyboard is used as a default. Many
industrial keyboards do not conform with this standard; if you use a non-standard key-
board, you need to define each of the keyboards in the database.
Using multiple keyboards
693
Chapter 22: Defining Commands and Controls
Sometimes you might need to use keyboards of different types; for example, an IBM com-
patible keyboard in your control room and a sealed-membrane keyboard on the plant
floor. If you use more than one type of keyboard, you need to define every key for each
keyboard and assign each keyboard type to the respective computer.
You need to set the keyboard type for each computer, with the [Keyboard]Type parameter.
Note: If you define commands that use mouse buttons, test that a double-click com-
mand cannot be mistaken for a single-click command. A double-click is an extension
of a single click; a single click message will be received before a double-click mes-
sage.
Key Sequence F2
Alternatively, you can specify several keys that needs to be typed in sequence, for exam-
ple, the function key F2 followed by the Enter key:
694
Chapter 22: Defining Commands and Controls
Note: If you use more than one key for the sequence, you need to separate each key
with a space.
You will want to avoid the ambiguity in keyboard commands that can occur if you
define separate commands that use a common key. For example, if you define a key
sequence for one command as F3, and the key sequence for a second command as F3 F4,
then when F3 is pressed, the first command would execute immediately; the second com-
mand could not execute. To avoid overlapping keyboard commands, add a delimiter to
common keyboard commands, for example:
These commands do not execute until the operator types the delimiter (the Enter key).
See Also
Using a hot key
Using variable data input
Passing multiple arguments
Passing keyboard arguments to functions
Command KeyBs()
At run time, this command operates in exactly the same way as the Backspace key on a
standard computer keyboard, to correct typing errors. (Each time the Backspace key is
pressed, the last key in the command line is removed.)
695
Chapter 22: Defining Commands and Controls
Note: You can only define a 'hot' key command as a system (global) command.
See Also
Using variable data input
In this example, an operator can set the variable SP1 to a new value by first pressing the
F3 function key, entering the new value, and pressing the Enter key, for example:
or
or
696
Chapter 22: Defining Commands and Controls
When the command is issued (the operator presses the Enter key), the value is passed to
the command at Arg1.
Note: If an operator does not enter any data (i.e., the key sequence:
is used), the value of Arg1 is zero, and the variable is set to zero. To prevent this from
happening, use the ArgValue1 label, for example:
The ArgValue1 label checks for invalid input; if the input is invalid, the value of the var-
iable is not changed and the command halts. Any instructions following and invalid
Argvalue1 do not execute. You can also use the StrToValue() function.
See Also
Passing multiple arguments
697
Chapter 22: Defining Commands and Controls
In this case, an operator can set two variables with the same command, for example:
Note: There is no way to check if the input for each argument is valid. If an operator
does not enter any data for one of the arguments (i.e. the key sequence:
is used), the value of Arg2 is zero, and the second variable is set to zero. Do not use mul-
tiple arguments in a command if invalid input might generate undesired behavior in the
project or in the larger system.
Do not use keystroke sequences to pass multiple arguments to Cicode commands unless
possible input combinations have been tested and determined to be safe.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
See Also
Passing keyboard arguments to functions
698
Chapter 22: Defining Commands and Controls
Command PageDisplay(Arg1);
In this example, an operator can select any graphics page (defined in the project) with a
single command, for example:
Note: Keyboard arguments are passed as string values. If the command (or function)
requires a numeric value, Cicode converts the string to a numeric value before it is
used.
If you use variable data, the operator can only enter alphanumeric characters (A - Z, a-z,
and 0 - 9) for the data. Do not use variable data input as the last item in a key sequence,
as ambiguity could occur; always use a delimiter.
699
Chapter 22: Defining Commands and Controls
starter project). They will be displayed on the page automatically at runtime. To view
additional pages in your project at runtime you will need to manually configure the
menu items.
Note: A set of page templates known as Tab Style Templates is provided with the
product. These templates already contain a tabbed menu system. If your pages are
based on these templates, the menu items configured in the menu configuration data-
base will be displayed on the page automatically at runtime. If no menu is defined in
the project, a default menu will be created at runtime to provide access to pages in
the project. The default menu functionality can be changed using [Page]Add-
DefaultMenu parameter.
Note: For existing users of the CSV_Include project, the menu definition would have
been defined in a file called Menu.dbf in your project folder. You can migrate the
menu definition in this file to the built-in menu configuration database using the
migration tool, although the CSV_Include project will continue to use the Menu.dbf
file for its page templates. This step is useful if you plan to migrate your project from
CSV_Include project to the newer set of built-in templates.
To configure menus for Tab Style templates, see Creating Custom Menus for Strux-
ureWare templates.
To configure menus for Tab Style templates, see Creating Custom Menus for Tab Style
templates.
To configure menus for CSV templates, see Creating Custom Menus for CSV templates.
See Also
Menu Configuration Properties
Menu Cicode Functions
700
Chapter 22: Defining Commands and Controls
701
Chapter 22: Defining Commands and Controls
Width
The width of the menu entry on the page. It is up to the user to decide what units to be
used.
Checked
Whether the menu entry is initialized with a checked status.
Privilege
The user privilege of (0-8) necessary to select the menu entry.
Area
The user area (0-255) necessary to select the menu entry.
Note: At runtime, you can use the Menu family of Cicode functions to access the
information entered in the Menu Configuration dialog.
See Also
Defining Page Menus for Tab Templates
Displaying Tags
You can apply visual cues to a tag displayed on a graphics page, providing greater
emphasis to the data presented. For example, you could highlight a bad quality tag
value by presenting it in a different color or style.
This type of activity is enabled using the [Page]IgnoreValueQuality parameter, which
can be used to display a graphical representation of data quality.
[Page]IgnoreValueQuality can be used in tandem with a number of [Page] parameters to
provide different visual outcomes based on the state of a tag. For example, you could
change the text background color for a tag according to its current state using the fol-
lowing parameters:
l [Page]BadTextBackgroundColor
l [Page]ErrorTextBackgroundColor
l [Page]UncertainTextBackgroundColor
l [Page]OverideTextBackgroundColor
l [Page]ControlInhibitTextBackgroundColor
You can also use the parameter [Page]EnableQualityTooltip to enable tool tips that
present quality and timestamp data when the cursor is held over a tag.
The Tag Extension Parameters page in the CitectSCADA Example Project provides an
interactive example of how these parameters can be implemented.
702
Chapter 22: Defining Commands and Controls
See Also
Tag Extensions
703
Chapter 22: Defining Commands and Controls
704
Chapter 23: Using Alarms in SCADA
This section is divided into the following areas:
Alarms - this section links to or includes pre-requisite information you should under-
stand before configuring alarms in your system. The section describes what alarms are,
what events are and how they differ within Vijeo Citect. It also outlines how the alarm
information is retrieved and hence how alarms are triggered.
Configuring Alarms - this section outlines the seven types of alarms, the properties of
each type of alarm, how to add Alarms, and define and assign the alarms to categories.
It also covers creating custom Alarm Filters, and using tags.
Configuring an Alarm Display – this section outlines how to configure your alarm dis-
play at runtime so operators can perform actions on them.
Handling Alarms at Runtime – this section outlines what operators can do to alarms
using the Active, Disabled, Sequence of events, Summary and Hardware pages. It directs
users to the relevant topics within other sections of the Help, including using the task
panel, filtering and interactive options operators can customize.
See Also
Configuring alarms
Formatting an Alarm Display
705
Chapter 23: Using Alarms in SCADA
What is an Alarm?
Note: For the remainder of the Alarming section Configured alarms will be referred
to as Alarms.
To assist operators with alarms, you can then create graphics pages that contain infor-
mation about the alarms (such as the action an operator needs to perform to correct the
situation). Display these pages automatically when the alarm occurs, or only when an
operator uses the Alarm Help keyboard command.
Alarm properties can also be used anywhere a normal variable tag can be used. For
example the status of an alarm could be used to change the color of a symbol on a graph-
ics page.
You can view an example of alarms and some operator actions in the example project.
In the example project (at runtime) you can simulate up to ten alarms and view these
alarms on the active, disabled, alarm summary and sequence of events alarm pages.
Operator actions on alarms will vary according to the alarm page and type of alarm.
What is an Event?
706
Chapter 23: Using Alarms in SCADA
l Condition Events - Condition events are associated with the detection of some con-
dition in the supplier system that generally requires some sort of response or acknowl-
edgement by the user or operator. Example of condition events are all categories of
alarms.
You can view a snapshot of events using the sequence of events page at runtime.
See Also
Digital, Multi-digital and Time stamped alarm conditions can be configured using var-
iable or multiple variable tags only, while analog, and advanced alarms can be con-
figured using a Cicode expression. This Cicode expression can be a single variable tag or
a complex expression.
For alarms dependent on multiple variable tags for their trigger condition (including
Cicode expressions), conditions may occur that could lead to phantom alarms. For exam-
ple, if the tag values transition within close proximity to one another, there may be an
intermediate state that is not expected.
707
Chapter 23: Using Alarms in SCADA
To counter this from occurring, evaluation of each multi-variable tag alarm is delayed
an extra ½ [Alarm]ScanTime from when the first IO update is received by the alarm
server. This Multivariable delay (MVD) is hard coded into the system, with the intention
to wait until all related IO updates are received before evaluating if the alarm condition
has been met. You can increase [Alarm]ScanTime to minimize the chance of phantom
alarms at the cost of a larger propagation delay.
708
Chapter 23: Using Alarms in SCADA
Refer to the topic 'Using alarm delay' for information regarding the alarm property
option 'alarm delay' and how (if set) it works with Multivariable Delay.
See Also
Using Alarm Delay
Configuring alarms
To configure alarms in your project you need to complete the following:
1. Add Alarms - choose one or all of the seven types of alarms to add.
2. Define categories for your Alarms – though this task is optional, if configured you
can assign each of your alarms to separate categories, where they can be prioritized.
You can then display, acknowledge, reset, and log alarms in a particular category.
3. Assign Alarms to categories
4. Configure the Alarm Runtime Display – using the Alarm Category dialog you can
configure how the alarms will be displayed at runtime on the alarm summary and
sequence of events pages using the SummarySort and SummarySort Mode.
See Also
Adding a new alarm
Alarm Categories
709
Chapter 23: Using Alarms in SCADA
710
Chapter 23: Using Alarms in SCADA
711
Chapter 23: Using Alarms in SCADA
Advanced An advanced alarm becomes active when the result of the Cicode expres-
Alarms sion changes. The expression is polled at the rate set by the Citect.ini
parameter [Alarm]ScanTime and tests for a change in outcome. If one
occurs, an alarm state notification will occur.
712
Chapter 23: Using Alarms in SCADA
Alarm Delay
713
Chapter 23: Using Alarms in SCADA
For alarms with multiple variables configured, if you use the Alarm delay property the
delay period will start when the most recent IO update has occurred. This delay can run
concurrently with the internal Multivariable delay (MVD) which starts at the first IO
update. The alarm will not be added to the queue until the period of the longest delay set-
ting has elapsed. The alarm will then be triggered at the following 1/2 alarm scan time.
714
Chapter 23: Using Alarms in SCADA
See Also
Note: When modifying a Digital Alarm tag, be aware that if the tag was created
using the equipment editor - equipment type workspace, the fields configured will be
grayed out in the tag properties form.
Field Description
Equipment Name of the equipment associated with the Digital Alarm. Select or enter a
name of 254 characters or less. You can optionally prefix a cluster name to
the equipment name in order to restrict the reference to a piece of equipment
in only one cluster. The cluster should be configured otherwise the compile
will not be successful. Use this method as an alternative to referencing a
cluster in the equipment properties dialog if the equipment is defined for all
clusters.
Item Name Enter a meaningful name for Tag Item. Used as part of the equipment hier-
archy a meaningful name will help with future migration of your system and
the step towards an object orientated model.
If not configured, the last 63 characters of the “Alarm Tag” field will be used
for the Tag Item name. The Alarm Tag allows 79 characters, while Tag Item
has a maximum of 63 characters. This may result in compiler errors if the
'Equipment.TagItem' name is not unique.
There is a limit of 254 characters on the combination of Equipment and Tag
Items, plus the period '.', for example “Equipment.TagItem” should be 254
characters or less.
See also Scenarios of Tag Item for additional information regarding this field.
Cluster The name of the cluster that runs the alarm. If not set the alarm will run on all
Name clusters. E.g. Cluster1
Alarm Tag The name of the alarm. Needs to be unique to the cluster and adhere to the
Tag name syntax.
If the name is not unique or is not syntactically correct it may not be rec-
ognized. If you have lots of tags, use a naming convention to easily find
and debug your tags (see Using structured tag names).
715
Chapter 23: Using Alarms in SCADA
Field Description
defined clusters.
Alarm Name The name of the physical device associated with the alarm. Used when details
(Optional) of the alarm are displayed on the screen or logged to a device.
Alarm Desc Alarm description. May include variable data and used when details of the
(Optional) alarm are displayed on screen or logged to a device.
Variable Tag Configure digital alarms to activate based on the state of single or multiple
A/Variable digital variable tags. For a single variable tag use field Var Tag A. For multiple
Tag B variable tags use fields Var Tag A and Var Tag B.
(See How alarm information is retrieved for more information)
Example 1. State change for single variable tag
When the state of the variable RFP3_TOL changes to ON (1), the alarm is
triggered.
Alternatively, you can define the alarm to trigger when the state of the var-
iable changes to OFF (0), by preceding the digital address with the logical
operator NOT, for example:
In this case, the alarm is triggered when the state of the variable MCOL304
changes to OFF (0).
You can also configure digital alarms to activate based on the state of two
digital variables, for example:
In this scenario, the alarm is triggered when the state of both variables
changes to the active state: when the state of the variable RFP3_TOL
changes to ON (1), and when the state of the variable MCOL304 changes
to OFF (0).
Note: If you leave Var Tag B blank, Var tag A will trigger the alarm
716
Chapter 23: Using Alarms in SCADA
Field Description
Help The name of the graphics page that displays when the AlarmHelp() function
(Optional) is called by a user-defined command. If not specified no action occurs when
the AlarmHelp() function is called.
Extended form fields The following fields are implemented with extended forms (press F2).
Note that some of the fields listed below may be displayed in the previous section of the form.
Area Area the alarm belongs to. If an operator does not have access to an area, the
alarm is not visible on the alarm display. For example, if you enter Area 1
here, operator need to have access to Area 1 (plus any necessary privileges)
to acknowledge or disable this alarm.
The area and privilege fields defined here needs to be designed to work in
conjunction. A privilege defined on a button (say) will ignore the alarm
defined area.
Paging A read/write property that indicates whether the alarm will be paged. When
the value is 1 (TRUE) the alarm will be paged. The default value is 0 (FALSE).
See Alarm Paging Properties. This property can be read using alarm tag
browsing and read or modified when tag properties are enabled using the tag
name "myCluster.myAlarm.paging".
Paging A read only text string that indicates the paging group to which the alarm
Group belongs. Maximum length is 80 characters. See your third-party paging sys-
tem documentation for information on how to use this Paging Group string.
This property can be read using alarm tag browsing or when tag properties
are enabled read using the tagname "myCluster.myAlarm.paginggroup". For
example, assign the value of PagingGroup to a variable:
myString = myCluster.Alarm_1.paginggroup
Historize This field enables you to automatically historize and publish the specified dig-
ital alarm in Schneider Electric's Historian application.
If you set this field to "TRUE", the variable will be included in an automated
configuration process within the Historian environment. If you set the field to
"FALSE" (or leave it blank), the variable will not be included.
See Integration with Historian.
717
Chapter 23: Using Alarms in SCADA
Field Description
Notes:
l Custom filters are visible only when the Digital Alarms form is open
in Extended mode.
l The fields are not case-sensitive and can contain 'A'..'Z', 'a'..'z',
'0'..'9', and the underscore '_'.
l A custom filter cannot start with a digit.
See Also
Using custom alarm filters
Note: When modifying a time-stamped alarm tag, be aware that if the tag was
created using the equipment editor - equipment type workspace, the fields configured
will be grayed out in the tag properties form.
Field Description
Equipment Name of the equipment associated with the Time-stamped Alarm. Select or
enter a name of 254 characters or less.
You can optionally prefix a cluster name to the equipment name in order to
restrict the reference to a piece of equipment in only one cluster. The cluster
should be configured otherwise the compile will not be successful.
Use this method as an alternative to referencing a cluster in the equipment
properties dialog if the equipment is defined for all clusters.
Item Name Enter a meaningful name for Tag Item. Used as part of the equipment hier-
archy a meaningful name will help with future migration of your system and
the step towards an object oriented model.
If not configured, the last 63 characters of the “Alarm Tag” field will be used
for the Tag Item name. The Alarm Tag allows 79 characters, while Tag Item
has a maximum of 63 characters. This may result in compiler errors if the
'Equipment.TagItem' name is not unique.
There is a limit of 254 characters on the combination of Equipment and Tag
Items, plus the period '.', for example “Equipment.TagItem” should be 254
characters or less.
See also Scenarios of Tag Item for additional information regarding this field.
718
Chapter 23: Using Alarms in SCADA
Field Description
Cluster The name of the cluster that runs the alarm. If not set the alarm will run on all
Name clusters. E.g. Cluster1
Alarm Tag The name of the alarm. Needs to be unique to the cluster and adhere to the
Tag name syntax.
If the name is not unique or is not syntactically correct it may not be rec-
ognized. If you have lots of tags, use a naming convention to easily find
and debug your tags (see Using structured tag names).
Alarm Name The name of the physical device associated with the alarm. Used when details
(Optional) of the alarm are displayed on the screen or logged to a device.
Alarm Desc Alarm description. May include variable data and used when details of the
(Optional) alarm are displayed on screen or logged to a device.
Timer Expr. The variable tag or Cicode expression that represents the counter (or mil-
lisecond timer) configured in the I/O Device. The counter needs to be con-
figured and maintained by the program in the I/O Device; it is read only when
the alarm is triggered.
You can use one of three types of counter or timer to record the triggering
of time-stamped alarms:
LONGBCB timer - Using a LONGBCD timer, you can log the exact time
when a Time-stamped alarm becomes active. This variable is read, along
with the alarm tag when the alarm activates. You need to program the
LONGBCD variable in the following format with the range specified as hex-
adecimal numbers, excluding numbers containing alphabetic characters:
719
Chapter 23: Using Alarms in SCADA
Field Description
Use 'Timer' to handshake with the PLC code: The PLC is informed that it
has read the timer register and now the PLC can overwrite the last value.
For example, with the following code saved in a Cicode file:
INT
FUNCTION
AlarmTimerReset(INT iTimer, STRING sTim-
erTrigger)
TagWrite(sTimerTrigger, 0); //Reset the
trigger
RETURN iTimer; //Return the timer value to the
alarm system
END
Example:
In this example AlmTimer1 is the PLC register that stores the alarm time,
and AlmTrigger1 is the alarm trigger bit.
When AlmTrigger1 is set to 1, the alarm is triggered, and the Cicode func-
tion is called. On calling the function, the AlmTimer1 register is read. The
function resets the trigger bit (handshaking), and the value of AlmTimer1
is returned.
Help The name of the graphics page that displays when the AlarmHelp() function
(Optional) is called by a user-defined command. If not specified no action occurs when
the AlarmHelp() function is called.
Extended form fields The following fields are implemented with extended forms (press F2).
Note that some of the fields listed below may be displayed in the previous section of the form.
Area Area the alarm belongs to. If an operator does not have access to an area, the
alarm is not visible on the alarm display. For example, if you enter Area 1
here, operator need to have access to Area 1 (plus any necessary privileges)
to acknowledge or disable this alarm.
The area and privilege fields defined here needs to be designed to work in
720
Chapter 23: Using Alarms in SCADA
Field Description
Paging A read/write property that indicates whether the alarm will be paged. When
the value is 1 (TRUE) the alarm will be paged. The default value is 0 (FALSE).
See Alarm Paging Properties. This property can be read using alarm tag
browsing and read or modified when tag properties are enabled using the tag
name "myCluster.myAlarm.paging".
Paging A read only text string that indicates the paging group to which the alarm
Group belongs. Maximum length is 80 characters. See your third-party paging sys-
tem documentation for information on how to use this Paging Group string.
This property can be read using alarm tag browsing or when tag properties
are enabled read using the tagname "myCluster.myAlarm.paginggroup". For
example, assign the value of PagingGroup to a variable:
myString = myCluster.Alarm_1.paginggroup
Historize This field enables you to automatically historize and publish the specified dig-
ital alarm in Schneider Electric's Historian application.
If you set this field to "TRUE", the variable will be included in an automated
configuration process within the Historian environment. If you set the field to
"FALSE" (or leave it blank), the variable will not be included.
See Integration with Historian.
Notes:
l Custom filters are visible only when the MultiDigital Alarm form is
open in Extended mode.
l The fields are not case-sensitive and can contain 'A'..'Z', 'a'..'z',
'0'..'9', and the underscore '_'.
l A custom filter cannot start with a digit.
See Also
Using custom alarm filters
721
Chapter 23: Using Alarms in SCADA
Note: When modifying a Multi- digital alarm tag, be aware that if the tag was
created using the equipment editor - equipment type workspace, the fields configured
will be grayed out in the tag properties form.
Do not put a blocking Cicode function in the ON Function field. A blocking function will
affect the polling of alarms, and may result in slow or delayed alarm processing.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
Field Description
Equipment Name of the equipment associated with the Multi-digital Alarm. Select or
enter a name of 254 characters or less. You can optionally prefix a cluster
name to the equipment name in order to restrict the reference to a piece of
equipment in only one cluster. The cluster should be configured otherwise
the compile will not be successful. Use this method as an alternative to ref-
erencing a cluster in the equipment properties dialog if the equipment is
defined for all clusters.
Item Name Enter a meaningful name for Tag Item. Used as part of the equipment hier-
archy a meaningful name will help with future migration of your system and
the step towards an object oriented model.
If not configured, the last 63 characters of the “Alarm Tag” field will be used
for the Tag Item name. The Alarm Tag allows 79 characters, while Tag Item
has a maximum of 63 characters. This may result in compiler errors if the
'Equipment.TagItem' name is not unique.
There is a limit of 254 characters on the combination of Equipment and Tag
Items, plus the period '.', for example “Equipment.TagItem” should be 254
characters or less.
See also Scenarios of Tag Item for additional information regarding this field.
Cluster The name of the cluster that runs the alarm. If not set the alarm will run on all
Name clusters. E.g. Cluster1
Alarm Tag The name of the alarm. Needs to be unique to the cluster and adhere to the
Tag name syntax.
722
Chapter 23: Using Alarms in SCADA
Field Description
If the name is not unique or is not syntactically correct it may not be rec-
ognized. If you have lots of tags, use a naming convention to easily find
and debug your tags (see Using structured tag names).
Alarm Name The name of the physical device associated with the alarm. Used when details
(Optional) of the alarm are displayed on the screen or logged to a device.
Alarm Desc Alarm description. May include variable data and used when details of the
(Optional) alarm are displayed on screen or logged to a device.
Variable Tag The digital variables used to define eight states. Each state represents a dif-
A/Variable ferent combination of tag values. For example,
Tag B/Va-
the digital variables RFP3_TOL, BIT_1, and MCOL304 could be specified for
riable Tag C
Tags A, B, and C respectively
States and The following eight states represent any possible tag value combinations (8
Descriptions characters maximum for description and 1 character for state). The tags are
represented in the order Tag C, Tag B, Tag A.
l State 000 - All 3 tags are false.
l State 00A - Tags C and B are false and Tag A is true.
l State 0B0 - Tags C and A are false and Tag B is true.
l State 0BA - Tag C is false and Tags B and A are true.
l State C00 - Tag C is true and Tags B and A are false.
l State C0A - Tags C and A are true and Tag B is false.
l State CB0 - Tags C and B are true and Tag A is false.
l State CBA - All 3 tags are true.
For each state, there are two fields on the Multi-Digital Alarms dialog. In
the first field enter a description (for example Healthy or Stopped), with a
maximum of eight characters. In the second field, indicate whether the
state will trigger an alarm. A value of 1 indicates an alarm state, and a 0
indicates no alarm will be triggered.
Realarm(1 Indicates what happens when there is a transition from one alarm state to
char) another. A value of 1 in this field causes a new time and State Description
{State_Desc,n} to be recorded when the states change. With a value of 0,
only the time and State Description of the first alarm state is recorded in the
Alarm Summary.
Help The name of the graphics page that displays when the AlarmHelp() function
(Optional) is called by a user-defined command. If not specified no action occurs when
the AlarmHelp() function is called.
Extended form fields The following fields are implemented with extended forms (press F2).
Note that some of the fields listed below may be displayed in the previous section of the form.
On function A Cicode function that is executed when the Multi-Digital Alarm becomes
(254 chars) active, for example
723
Chapter 23: Using Alarms in SCADA
Field Description
OFF func- A Cicode function that is executed when a Multi-Digital Alarm becomes inac-
tion (254 tive. For example,
chars)
where OFF Function is ENABLE_PROCESS = 1;
In this example the digital variable ENABLE_PROCESS is set to ON when an
alarm in this category is reset.
Note: Do not put a blocking Cicode function in this field. The alarm system
executes ON or OFF actions within the polling loop. A blocking function will
affect the polling of alarms, and may result in slow or delayed alarm proc-
essing.
Area Area the alarm belongs to. If an operator does not have access to an area, the
alarm is not visible on the alarm display. For example, if you enter Area 1
here, operator need to have access to Area 1 (plus any necessary privileges)
to acknowledge or disable this alarm.
The area and privilege fields defined here needs to be designed to work in
conjunction. A privilege defined on a button (say) will ignore the alarm
defined area.
Suppression The number of the Suppression Group to which the alarm belongs.
Integer value between 0–32767.
Alarms in the same group display the same value in this field. Use in con-
junction with Suppression Level.
Note: To assign a name to a Suppression Group, define the name as a label
with an integer value.
724
Chapter 23: Using Alarms in SCADA
Field Description
Level The level of an alarm within its Suppression Group (integer value). This is a
value between 0 and 255, where a lower level represents a higher priority.
This property enables an active alarm which is in an ON state (irrespective
of whether it is acknowledged or not) to suppress lower priority alarms
within the same Suppression Group. When this occurs, only the higher prior-
ity (lower level) alarms are displayed. Alarms with lower priorities (higher lev-
els) will only activate and display when the higher priority (lower level)
alarms become inactive.
Paging A read/write property that indicates whether the alarm will be paged. When
the value is 1 (TRUE) the alarm will be paged. The default value is 0 (FALSE).
See Alarm Paging Properties. This property can be read using alarm tag
browsing and read or modified when tag properties are enabled using the tag
name "myCluster.myAlarm.paging".
Paging A read only text string that indicates the paging group to which the alarm
Group belongs. Maximum length is 80 characters. See your third-party paging sys-
tem documentation for information on how to use this Paging Group string.
This property can be read using alarm tag browsing or when tag properties
are enabled read using the tagname "myCluster.myAlarm.paginggroup". For
example, assign the value of PagingGroup to a variable:
myString = myCluster.Alarm_1.paginggroup
Historize This field enables you to automatically historize and publish the specified dig-
ital alarm in Schneider Electric's Historian application.
If you set this field to "TRUE", the variable will be included in an automated
configuration process within the Historian environment. If you set the field to
"FALSE" (or leave it blank), the variable will not be included.
See Integration with Historian.
l Custom filters are visible only when the MultiDigital Alarm form is
open in Extended mode.
l The fields are not case-sensitive and can contain 'A'..'Z', 'a'..'z',
'0'..'9', and the underscore '_'.
l A custom filter cannot start with a digit.
725
Chapter 23: Using Alarms in SCADA
Do not put a blocking Cicode function in the OFF Function field. A blocking function will
affect the polling of alarms, and may result in slow or delayed alarm processing.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
See Also
Using custom alarm filters
Note: When modifying an analog alarm tag, be aware that if the tag was created
using the equipment editor - equipment type workspace, the fields configured will be
grayed out in the tag properties form.
Field Description
Equipment Name of the equipment associated with the Analog Alarm. Select or enter a
name of 254 characters or less. You can optionally prefix a cluster name to the
equipment name in order to restrict the reference to a piece of equipment in
only one cluster. The cluster should be configured otherwise the compile will
not be successful. Use this method as an alternative to referencing a cluster in
the equipment properties dialog if the equipment is defined for all clusters.
Item Enter a meaningful name for Tag Item. Used as part of the equipment hier-
Name archy a meaningful name will help with future migration of your system and the
step towards an object oriented model.
If not configured, the last 63 characters of the “Alarm Tag” field will be used
for the Tag Item name. The Alarm Tag allows 79 characters, while Tag Item has
a maximum of 63 characters. This may result in compiler errors if the 'Equip-
ment.TagItem' name is not unique.
There is a limit of 254 characters on the combination of Equipment and Tag
Items, plus the period '.', for example “Equipment.TagItem” should be 254
characters or less.
See also Scenarios of Tag Item for additional information regarding this field.
726
Chapter 23: Using Alarms in SCADA
Field Description
Cluster The name of the cluster that runs the alarm. If not set the alarm will run on all
Name clusters. E.g. Cluster1
Alarm Tag The name of the alarm. Needs to be unique to the cluster and adhere to the
Tag name syntax.
If the name is not unique or is not syntactically correct it may not be rec-
ognized. If you have lots of tags, use a naming convention to easily find and
debug your tags (see Using structured tag names).
Alarm The name of the physical device associated with the alarm. Used when details
Name of the alarm are displayed on the screen or logged to a device.
(Optional)
Setpoint An analog variable tag or base value that determines if a deviation alarm is to be
triggered. This property is optional. If you do not specify a setpoint, it will
default to 0 (zero).
High High Value used as the triggering condition for a high high alarm. If the value of the
variable tag exceeds this value for the duration of the high high delay period
the alarm will be triggered. The active alarm will have an ON time of when the
tag exceeded the high high value. Because a high alarm needs to precede a
high high alarm, when the high high alarm is triggered it replaces the high
alarm.
To display more than one state on the alarm page at the same time, configure a
separate alarm for each state. (Each alarm would monitor the same tag.)
High High Delay period for High High Alarms. Alarm will activate if its triggering condition
Delay is met for the duration of the delay period.
(Optional)
If you do not set a value, the high high alarm will be activated as soon as the
tag exceeds the high high value.
Note: The delay period needs to be entered in the format HH:MM:SS
(hours:minutes:seconds). The value needs to be between 0 seconds
(00:00:00) and 24 hours (24:00:00).
High The value used as the triggering condition for a high alarm. The high alarm
becomes active when the value of the variable tag exceeds this value for the
duration of the high delay period. The active alarm has an ON time of when the
tag exceeded the high value.
High The delay period for high alarms. Alarm will activate if its triggering condition
Delay is met for the duration of this period. If you do not set a value, the high alarm
(Optional) will be activated as soon as the tag exceeds the high value.
727
Chapter 23: Using Alarms in SCADA
Field Description
Low The value used as the triggering condition for a Low Alarm. Alarm becomes
active when the value of the Variable Tag drops below this value and remains
there for the duration of the Low Delay period. The active alarm has an ON time
of when the tag fell below the Low value.
Low Delay The delay period for Low Alarms. The alarm will only activate if its triggering
(Optional) condition is met for the duration of this period. This property is optional. If you
do not set a value, the Low Alarm is activated as soon as the tag drops below
the Low value.
Note: The delay period needs to be entered in the format HH:MM:SS
(Hours:Minutes:Seconds). The value needs to be between 0 seconds
(00:00:00) and 24 hours (24:00:00).
Low Low The value used as the triggering condition for a Low Low Alarm. A Low Low
Alarm becomes active when the value of the Variable Tag drops below this
value and remains there for the duration of the Low Low Delay period. The
active alarm has an ON time of when the tag fell below the Low Low value.
Because a Low Alarm needs to precede a Low Low Alarm, when the Low Low
Alarm is triggered it replaces the Low Alarm. If you want an analog alarm to dis-
play more than one state on the alarm page at the same time, configure a sep-
arate alarm for each state. (Each alarm would monitor the same tag.)
Low Low The delay period for Low Low Alarms. The alarm will only activate if its trig-
Delay gering condition is met for the duration of this period. If you do not set a value,
(Optional) the Low Low Alarm is activated as soon as the tag drops below the Low Low
value.
Note: The delay period needs to be entered in the format HH:MM:SS
(Hours:Minutes:Seconds). The value needs to be between 0 seconds
(00:00:00) and 24 hours (24:00:00).
Deviation The value used as the triggering condition for a Deviation Alarm. A Deviation
(Optional) Alarm is activated when the value of the Variable Tag remains outside the devi-
ation range (determined by the Setpoint) for the duration of the Deviation Delay
period. This property is optional. If you do not specify a deviation, no Deviation
Alarm is activated.
728
Chapter 23: Using Alarms in SCADA
Field Description
Deviation The delay period for Deviation Alarms. The alarm will only activate if its trig-
Delay gering condition is met for the duration of this period. If you do not set a value,
(Optional) the Deviation Alarm is activated as soon as the Variable Tag falls outside the
deviation range.
Note: The delay period needs to be entered in the format HH:MM:SS
(Hours:Minutes:Seconds). The value needs to be between 0 seconds
(00:00:00) and 24 hours (24:00:00).
Rate By dividing this value by the alarm period, the "maximum rate" at which the
(Optional) value of the variable tag can change is determined. At each Scan Time, the
value of the tag is checked. If its rate of change is greater than the maximum
rate, a Rate of Change Alarm is triggered.
For example, to verify that a tank does not fill too quickly, you might configure a
rate of change alarm, using a Rate of 300 liters, an [Alarm]Period of 60 sec-
onds, and an [Alarm]ScanTime of 1 second. This means that the maximum
allowable rate of change for the tank level is 5 l/sec (300 liters / 60 seconds).
The actual rate of change at each ScanTime is calculated. That is, every sec-
ond, it checks the current level of the tank and compares it to the level
recorded a second earlier. If the actual rate of change is, say, 8 l/sec, a Rate of
Change Alarm is triggered immediately.
The variable tags deadband % needs to be less than the alarms rate divided by
the engineering scale of the variable tag. Otherwise, the rate of change alarm
will only go off when the change in the variable tag exceeds the deadband
value. If you do not specify a value, no Rate of Change Alarm is activated.
Deadband Value the Variable Tag needs to return to before the Alarm becomes inactive.
Format The display format of the value (of the variable) when it is displayed on a graph-
(Optional) ics page, written to a file or passed to a function (that expects a string). If you
do not specify a format, the format defaults to the format specified for Variable
tag.
Help The name of the graphics page that displays when the AlarmHelp() function is
(Optional) called by a user-defined command. If not specified no action occurs when the
AlarmHelp() function is called.
Extended form fields The following fields are implemented with extended forms (press
F2). Note that some of the fields listed below may be displayed in the previous section of the
form.
Area Area the alarm belongs to. If an operator does not have access to an area, the
alarm is not visible on the alarm display. For example, if you enter Area 1 here,
operator need to have access to Area 1 (plus any necessary privileges) to
acknowledge or disable this alarm.
The area and privilege fields defined here needs to be designed to work in con-
junction. A privilege defined on a button (say) will ignore the alarm defined
area.
729
Chapter 23: Using Alarms in SCADA
Field Description
ignored.
Paging A read/write property that indicates whether the alarm will be paged. When the
value is 1 (TRUE) the alarm will be paged. The default value is 0 (FALSE). See
Alarm Paging Properties. This property can be read using alarm tag browsing
and read or modified when tag properties are enabled using the tag name
"myCluster.myAlarm.paging".
Paging A read only text string that indicates the paging group to which the alarm
Group belongs. Maximum length is 80 characters. See your third-party paging sys-
tem documentation for information on how to use this Paging Group string.
This property can be read using alarm tag browsing or when tag properties are
enabled read using the tagname "myCluster.myAlarm.paginggroup". For exam-
ple, assign the value of PagingGroup to a variable:
myString = myCluster.Alarm_1.paginggroup
Historize This field enables you to automatically historize and publish the specified dig-
ital alarm in Schneider Electric's Historian application.
If you set this field to "TRUE", the variable will be included in an automated con-
figuration process within the Historian environment. If you set the field to
"FALSE" (or leave it blank), the variable will not be included.
See Integration with Historian.
Notes:
l Custom filters are visible only when the Digital Alarms form is open in
Extended mode.
l The fields are not case-sensitive and can contain 'A'..'Z', 'a'..'z',
'0'..'9', and the underscore '_'.
l A custom filter cannot start with a digit.
See Also
Using custom alarm filters
730
Chapter 23: Using Alarms in SCADA
Note: For time-stamped digital alarms to function correctly, you need to configure the
Cicode function AlarmNotifyVarChange, as it notifies the alarm server of any value
changes for the associated variable. It also passes the timestamp with the notification
message. The AlarmServer maintains a queue for notification messages and runs a
separate task to check this queue.
Note: When modifying a time-stamped digital alarm tag, be aware that if the tag was
created using the equipment editor - equipment type workspace, the fields configured
will be grayed out in the tag properties form.
Field Description
Equipment Name of the equipment associated with the Time-stamped Digital Alarm.
Select or enter a name of 254 characters or less. You can optionally prefix a
cluster name to the equipment name in order to restrict the reference to a
piece of equipment in only one cluster. The cluster should be configured
otherwise the compile will not be successful. Use this method as an alter-
native to referencing a cluster in the equipment properties dialog if the equip-
ment is defined for all clusters.
Item Name Enter a meaningful name for Tag Item. Used as part of the equipment hier-
archy a meaningful name will help with future migration of your system and
the step towards an object oriented model.
If not configured, the last 63 characters of the “Alarm Tag” field will be used
for the Tag Item name. The Alarm Tag allows 79 characters, while Tag Item
has a maximum of 63 characters. This may result in compiler errors if the
'Equipment.TagItem' name is not unique.
There is a limit of 254 characters on the combination of Equipment and Tag
Items, plus the period '.', for example “Equipment.TagItem” should be 254
characters or less.
See also Scenarios of Tag Item for additional information regarding this field.
Cluster The name of the cluster that runs the alarm. If not set the alarm will run on all
Name clusters. E.g. Cluster1
Alarm Tag The name of the alarm. Needs to be unique to the cluster and adhere to the
Tag name syntax.
If the name is not unique or is not syntactically correct it may not be rec-
ognized. If you have lots of tags, use a naming convention to easily find
and debug your tags (see Using structured tag names).
731
Chapter 23: Using Alarms in SCADA
Field Description
Alarm Name The name of the physical device associated with the alarm. Used when details
(Optional) of the alarm are displayed on the screen or logged to a device.
Alarm Desc Alarm description. May include variable data and used when details of the
(Optional) alarm are displayed on screen or logged to a device.
Variable Tag Configure digital alarms to activate based on the state of single or multiple
A/Variable digital variable tags. For a single variable tag use field Var Tag A. For multiple
Tag B variable tags use fields Var Tag A and Var Tag B.
(See How alarm information is retrieved for more information)
Example 1. State change for single variable tag
When the state of the variable RFP3_TOL changes to ON (1), the alarm is
triggered.
Alternatively, you can define the alarm to trigger when the state of the var-
iable changes to OFF (0), by preceding the digital address with the logical
operator NOT, for example:
In this case, the alarm is triggered when the state of the variable MCOL304
changes to OFF (0).
You can also configure digital alarms to activate based on the state of two
digital variables, for example:
In this scenario, the alarm is triggered when the state of both variables
changes to the active state: when the state of the variable RFP3_TOL
changes to ON (1), and when the state of the variable MCOL304 changes
to OFF (0).
Note: If you leave Var Tag B blank, Var tag A will trigger the alarm
732
Chapter 23: Using Alarms in SCADA
Field Description
Help The name of the graphics page that displays when the AlarmHelp() function
(Optional) is called by a user-defined command. If not specified no action occurs when
the AlarmHelp() function is called.
Extended form fields The following fields are implemented with extended forms (press F2).
Note that some of the fields listed below may be displayed in the previous section of the form.
Area Area the alarm belongs to. If an operator does not have access to an area, the
alarm is not visible on the alarm display. For example, if you enter Area 1
here, operator need to have access to Area 1 (plus any necessary privileges)
to acknowledge or disable this alarm.
The area and privilege fields defined here needs to be designed to work in
conjunction. A privilege defined on a button (say) will ignore the alarm
defined area.
Paging A read/write property that indicates whether the alarm will be paged. When
the value is 1 (TRUE) the alarm will be paged. The default value is 0 (FALSE).
See Alarm Paging Properties. This property can be read using alarm tag
browsing and read or modified when tag properties are enabled using the tag
name "myCluster.myAlarm.paging".
Paging A read only text string that indicates the paging group to which the alarm
Group belongs. Maximum length is 80 characters. See your third-party paging sys-
tem documentation for information on how to use this Paging Group string.
This property can be read using alarm tag browsing or when tag properties
are enabled read using the tagname "myCluster.myAlarm.paginggroup". For
example, assign the value of PagingGroup to a variable:
myString = myCluster.Alarm_1.paginggroup
Historize This field enables you to automatically historize and publish the specified dig-
ital alarm in Schneider Electric's Historian application.
If you set this field to "TRUE", the variable will be included in an automated
configuration process within the Historian environment. If you set the field to
"FALSE" (or leave it blank), the variable will not be included.
See Integration with Historian.
733
Chapter 23: Using Alarms in SCADA
Field Description
alarms.
Notes:
See Also
Using custom alarm filters
Note: When modifying an advanced alarm tag, be aware that if the tag was created
using the equipment editor - equipment type workspace, the fields configured will be
grayed out in the tag properties form.
Field Description
Equipment Name of the equipment associated with the Advanced Alarm. Select or enter a
name of 254 characters or less. You can optionally prefix a cluster name to
the equipment name in order to restrict the reference to a piece of equipment
in only one cluster. The cluster should be configured otherwise the compile
will not be successful. Use this method as an alternative to referencing a
cluster in the equipment properties dialog if the equipment is defined for all
clusters.
Tag Item Enter a meaningful name for Tag Item. Used as part of the equipment hier-
archy a meaningful name will help with future migration of your system and
the step towards an object oriented Cicode blocking model.
If not configured, the last 63 characters of the “Alarm Tag” field will be used
for the Tag Item name. The Alarm Tag allows 79 characters, while Tag Item
has a maximum of 63 characters. This may result in compiler errors if the
'Equipment.TagItem' name is not unique.
There is a limit of 254 characters on the combination of Equipment and Tag
Items, plus the period '.', for example “Equipment.TagItem” should be 254
characters or less.
See also Scenarios of Tag Item for additional information regarding this field.
734
Chapter 23: Using Alarms in SCADA
Field Description
Cluster The name of the cluster that runs the alarm.E.g. Cluster1. If not set the alarm
Name will run on all clusters.
Alarm Tag The name of the alarm. Needs to be unique to the cluster and adhere to the
Tag name syntax.
If the name is not unique or is not syntactically correct it may not be rec-
ognized. If you have lots of tags, use a naming convention to easily find
and debug your tags (see Using structured tag names).
Alarm Name The name of the physical device associated with the alarm. Used when details
(Optional) of the alarm are displayed on the screen or logged to a device.
Alarm Desc Alarm description. May include variable data and used when details of the
(Optional) alarm are displayed on screen or logged to a device.
Expression The Cicode expression that triggers the alarm. Whenever the result of the
expression changes to TRUE, the alarm is triggered.
Help The name of the graphics page that displays when the AlarmHelp() function
(Optional) is called by a user-defined command. If not specified no action occurs when
the AlarmHelp() function is called.
Extended form fields The following fields are implemented with extended forms (press F2).
Note that some of the fields listed below may be displayed in the previous section of the form.
Area Area the alarm belongs to. If an operator does not have access to an area, the
alarm is not visible on the alarm display. For example, if you enter Area 1
here, operator need to have access to Area 1 (plus any necessary privileges)
to acknowledge or disable this alarm.
The area and privilege fields defined here needs to be designed to work in
conjunction. A privilege defined on a button (say) will ignore the alarm
defined area.
735
Chapter 23: Using Alarms in SCADA
Field Description
ilege to the command(s) that acknowledge the alarm. If you assign a different
privilege to the commands, an operator needs to have both privileges to
acknowledge the command. More importantly, the area defined here may be
ignored.
Paging A read/write property that indicates whether the alarm will be paged. When
the value is 1 (TRUE) the alarm will be paged. The default value is 0 (FALSE).
See Alarm Paging Properties. This property can be read using alarm tag
browsing and read or modified when tag properties are enabled using the tag
name "myCluster.myAlarm.paging".
Paging A read only text string that indicates the paging group to which the alarm
Group belongs. Maximum length is 80 characters. See your third-party paging sys-
tem documentation for information on how to use this Paging Group string.
This property can be read using alarm tag browsing or when tag properties
are enabled read using the tagname "myCluster.myAlarm.paginggroup". For
example, assign the value of PagingGroup to a variable:
myString = myCluster.Alarm_1.paginggroup
Historize This field enables you to automatically historize and publish the specified dig-
ital alarm in Schneider Electric's Historian application.
If you set this field to "TRUE", the variable will be included in an automated
configuration process within the Historian environment. If you set the field to
"FALSE" (or leave it blank), the variable will not be included.
See Integration with Historian.
Notes:
l Custom filters are visible only when the Advanced Alarms form is
open in Extended mode.
l The fields are not case-sensitive and can contain 'A'..'Z', 'a'..'z',
'0'..'9', and the underscore '_'.
l A custom filter cannot start with a digit.
See Also
Using custom alarm filters
736
Chapter 23: Using Alarms in SCADA
Note: For time-stamped analog alarms to function correctly, you need to configure
the Cicode function AlarmNotifyVarChange, as it notifies the alarm server of any
value changes for the associated variable. It also passes the timestamp with the noti-
fication message. The AlarmServer maintains a queue for notification messages and
runs a separate task to check this queue.
Note: When modifying a time-stamped analog alarm tag, be aware that if the tag
was created using the equipment editor - equipment type workspace, the fields con-
figured will be grayed out in the tag properties form.
Field Description
Equipment Name of the equipment associated with the Time-stamped Analog Alarm. Select
or enter a name of 254 characters or less. You can optionally prefix a cluster
name to the equipment name in order to restrict the reference to a piece of
equipment in only one cluster. The cluster should be configured otherwise the
compile will not be successful. Use this method as an alternative to referencing
a cluster in the equipment properties dialog if the equipment is defined for all
clusters.
Item Enter a meaningful name for Tag Item. Used as part of the equipment hier-
Name archy a meaningful name will help with future migration of your system and the
step towards an object oriented model.
If not configured, the last 63 characters of the “Alarm Tag” field will be used
for the Tag Item name. The Alarm Tag allows 79 characters, while Tag Item has
a maximum of 63 characters. This may result in compiler errors if the 'Equip-
ment.TagItem' name is not unique.
There is a limit of 254 characters on the combination of Equipment and Tag
Items, plus the period '.', for example “Equipment.TagItem” should be 254
characters or less.
See also Scenarios of Tag Item for additional information regarding this field.
Cluster The name of the cluster that runs the alarm. If not set the alarm will run on all
Name clusters. E.g. Cluster1
Alarm Tag The name of the alarm. Needs to be unique to the cluster and adhere to the
Tag name syntax.
If the name is not unique or is not syntactically correct it may not be rec-
ognized. If you have lots of tags, use a naming convention to easily find and
debug your tags (see Using structured tag names).
737
Chapter 23: Using Alarms in SCADA
Field Description
Alarm The name of the physical device associated with the alarm. Used when details
Name of the alarm are displayed on the screen or logged to a device.
(Optional)
Setpoint An analog variable tag or base value that determines if a deviation alarm is to be
triggered. This property is optional. If you do not specify a setpoint, it will
default to 0 (zero).
High High The value used as the triggering condition for a high high alarm. The high
high alarm becomes active when the value of the variable tag exceeds this
value for the duration of the high high delay period. The active alarm has an
ON time of when the tag exceeded the high high value.
Because a high alarm needs to precede a high high alarm, when the high
high alarm is triggered it replaces the high alarm. If you want an analog
alarm to display more than one state on the alarm page at the same time,
configure a separate alarm for each state. (Each alarm would monitor the
same tag.)
High High Delay period for High High Alarms. Alarm will activate if its triggering condition
Delay is met for the duration of the delay period.
(Optional)
If you do not set a value, the high high alarm will be activated as soon as the
tag exceeds the high high value.
Note: The delay period needs to be entered in the format HH:MM:SS
(hours:minutes:seconds). The value needs to be between 0 seconds
(00:00:00) and 24 hours (24:00:00).
High The value used as the triggering condition for a high alarm. The high alarm
becomes active when the value of the variable tag exceeds this value for the
duration of the high delay period. The active alarm has an ON time of when the
tag exceeded the high value.
High The delay period for high alarms. Alarm will activate if its triggering condition
Delay is met for the duration of this period. If you do not set a value, the high alarm
(Optional) will be activated as soon as the tag exceeds the high value.
Note: The delay period needs to be entered in the format HH:MM:SS
(hours:minutes:seconds). The value needs to be between 0 seconds
(00:00:00) and 24 hours (24:00:00).
When a tag value increases from high to high high within the high delay
period, the delay timer is reset. The high high alarm is only activated if the
value remains in the high high range for the delay period.
When the value increases from high to high high after the high delay period
738
Chapter 23: Using Alarms in SCADA
Field Description
has expired, a high alarm is activated and then the delay period for the high
high alarm begins.
If the tag value exceeds the high high value and then falls below it before the
high high delay period expires, at the time it falls, the high alarm is triggered
immediately.
It has an ON time of when the tag value exceeded the high high value. These
points also apply to tag values traveling between Low and Low Low ranges.
Low The value used as the triggering condition for a Low Alarm. Alarm becomes
active when the value of the Variable Tag drops below this value and remains
there for the duration of the Low Delay period. The active alarm has an ON time
of when the tag fell below the Low value.
Low Delay The delay period for Low Alarms. The alarm will only activate if its triggering
(Optional) condition is met for the duration of this period. This property is optional. If you
do not set a value, the Low Alarm is activated as soon as the tag drops below
the Low value.
Note: The delay period needs to be entered in the format HH:MM:SS
(Hours:Minutes:Seconds). The value needs to be between 0 seconds
(00:00:00) and 24 hours (24:00:00).
Low Low The value used as the triggering condition for a Low Low Alarm. A Low Low
Alarm becomes active when the value of the Variable Tag drops below this
value and remains there for the duration of the Low Low Delay period. The
active alarm has an ON time of when the tag fell below the Low Low value.
Because a Low Alarm needs to precede a Low Low Alarm, when the Low Low
Alarm is triggered it replaces the Low Alarm. If you want an analog alarm to dis-
play more than one state on the alarm page at the same time, configure a sep-
arate alarm for each state. (Each alarm would monitor the same tag.)
Low Low The delay period for Low Low Alarms. The alarm will only activate if its trig-
Delay gering condition is met for the duration of this period. If you do not set a value,
(Optional) the Low Low Alarm is activated as soon as the tag drops below the Low Low
value.
Note: The delay period needs to be entered in the format HH:MM:SS
(Hours:Minutes:Seconds). The value needs to be between 0 seconds
(00:00:00) and 24 hours (24:00:00).
Deviation The value used as the triggering condition for a Deviation Alarm. A Deviation
(Optional) Alarm is activated when the value of the Variable Tag remains outside the devi-
ation range (determined by the Setpoint) for the duration of the Deviation Delay
period. This property is optional. If you do not specify a deviation, no Deviation
Alarm is activated.
Deviation The delay period for Deviation Alarms. The alarm will only activate if its trig-
Delay gering condition is met for the duration of this period. If you do not set a value,
(Optional) the Deviation Alarm is activated as soon as the Variable Tag falls outside the
deviation range.
Note: The delay period needs to be entered in the format HH:MM:SS
(Hours:Minutes:Seconds). The value needs to be between 0 seconds
(00:00:00) and 24 hours (24:00:00).
739
Chapter 23: Using Alarms in SCADA
Field Description
Rate By dividing this value by the alarm period, the "maximum rate" at which the
(Optional) value of the variable tag can change is determined. At each Scan Time, the
value of the tag is checked. If its rate of change is greater than the maximum
rate, a Rate of Change Alarm is triggered.
For example, to verify that a tank does not fill too quickly, you might configure a
rate of change alarm, using a Rate of 300 liters, an [Alarm]Period of 60 sec-
onds, and an [Alarm]ScanTime of 1 second. This means that the maximum
allowable rate of change for the tank level is 5 l/sec (300 liters / 60 seconds).
The actual rate of change at each ScanTime is calculated. That is, every sec-
ond, it checks the current level of the tank and compares it to the level
recorded a second earlier. If the actual rate of change is, say, 8 l/sec, a Rate of
Change Alarm is triggered immediately.
The variable tags deadband % needs to be less than the alarms rate divided by
the engineering scale of the variable tag. Otherwise, the rate of change alarm
will only go off when the change in the variable tag exceeds the deadband
value. If you do not specify a value, no Rate of Change Alarm is activated.
Deadband Value the Variable Tag needs to return to before the Alarm becomes inactive.
Help The name of the graphics page that displays when the AlarmHelp() function is
(Optional) called by a user-defined command. If not specified no action occurs when the
AlarmHelp() function is called.
Format The display format of the value (of the variable) when it is displayed on a graph-
(Optional) ics page, written to a file or passed to a function (that expects a string). If you
do not specify a format, the format defaults to the format specified for Variable
tag.
Extended form fields The following fields are implemented with extended forms (press F2).
Note that some of the fields listed below may be displayed in the previous section of the form.
Area Area the alarm belongs to. If an operator does not have access to an area, the
alarm is not visible on the alarm display. For example, if you enter Area 1 here,
operator need to have access to Area 1 (plus any necessary privileges) to
acknowledge or disable this alarm.
The area and privilege fields defined here needs to be designed to work in con-
junction. A privilege defined on a button (say) will ignore the alarm defined
area.
Paging A read/write property that indicates whether the alarm will be paged. When the
value is 1 (TRUE) the alarm will be paged. The default value is 0 (FALSE). See
Alarm Paging Properties. This property can be read using alarm tag browsing
and read or modified when tag properties are enabled using the tag name
"myCluster.myAlarm.paging".
Paging A read only text string that indicates the paging group to which the alarm
740
Chapter 23: Using Alarms in SCADA
Field Description
Group belongs. Maximum length is 80 characters. See your third-party paging sys-
tem documentation for information on how to use this Paging Group string.
This property can be read using alarm tag browsing or when tag properties are
enabled read using the tagname "myCluster.myAlarm.paginggroup". For exam-
ple, assign the value of PagingGroup to a variable:
myString = myCluster.Alarm_1.paginggroup
Historize This field enables you to automatically historize and publish the specified dig-
ital alarm in Schneider Electric's Historian application.
If you set this field to "TRUE", the variable will be included in an automated con-
figuration process within the Historian environment. If you set the field to
"FALSE" (or leave it blank), the variable will not be included.
See Integration with Historian.
Notes:
l Custom filters are visible only when the Digital Alarms form is open in
Extended mode.
l The fields are not case-sensitive and can contain 'A'..'Z', 'a'..'z',
'0'..'9', and the underscore '_'.
l A custom filter cannot start with a digit.
See Also
Using custom alarm filters
Sce-
Scenario
nario Scenario 3 Scenario 4 Scenario 5
2
1
741
Chapter 23: Using Alarms in SCADA
Sce-
Scenario
nario Scenario 3 Scenario 4 Scenario 5
2
1
Alarm less less than (String more than (String more than (String more than
Tag,) than 63 char- 63 characters) 63 characters) 63 characters)
63 acters)
Max
char-
lengt-
acters)
h-
79
char-
acter-
s
742
Chapter 23: Using Alarms in SCADA
See Also
Configuring Equipment
Defining an Equipment Hierarchy
Equipment Properties
Associating Equipment
….
INT resultAlarmSetQuery=0;
// e.g. fieldName = Category, fieldValue = 10
// or fieldName = Tag, fieldValue = DigitalAlarm1
resultAlarmSetQuery =
AlarmSetQuery(21,"AlarmFilter","^""+fieldName+"^",^""+filterValue+"^"");//Obsolete
in v7.30
…….
PUBLIC
743
Chapter 23: Using Alarms in SCADA
INT
FUNCTION AlarmFilter
(INT iRecId,
INT iInst,
STRING fieldName,
STRING filterValue)
INT resultFilter=0;
STRING getValue="";
RETURN resultFilter;
END
v7.30 code:
….
INT resultAlarmSetQuery=0;
//AlarmSetQuery(21,"AlarmFilter30","^""+fieldName+"^",^""-
+filterValue+"^"");Obsolete in 7.30
....
PUBLIC
INT
FUNCTION AlarmFilter730
(STRING fieldName,
STRING filterValue)
744
Chapter 23: Using Alarms in SCADA
RETURN resultFilter;
END
PUBLIC
INT
FUNCTION AlarmFilter730
(STRING fieldName,
STRING filterValue)
INT hndl;
INT resultFilter=-1;
hndl = AlarmFilterEditOpen(21);
IF hndl <> -1 THEN
resultFilter = AlarmFilterEditSet(hndl, fieldName)
IF resultFilter = 0 THEN
resultFilter = AlarmFilterEditAppend(hndl, "=^"")
END
IF resultFilter = 0 THEN
resultFilter = AlarmFilterEditAppend(hndl, filterValue)
END
IF resultFilter = 0 THEN
resultFilter = AlarmFilterEditAppend(hndl, "^"")
END
IF resultFilter = 0 THEN
resultFilter = AlarmFilterEditCommit(hndl)
END
AlarmFilterEditClose(hndl)
END
745
Chapter 23: Using Alarms in SCADA
RETURN resultFilter;
END
where:
A user defined string to be used to control the logic in the Query function.
sIn-
fo
2. Specify the query function and its arguments in a call to AlarmSetQuery().The query
function should be constructed using the new v7.30 alarm filter functions.
The query function should use the new v7.30 Alarm Filter functions to select alarms
related to a particular type of information.
To filter alarms, call the AlarmFilterEditOpen, AlarmFilterEditSet and Alarm-
FilterEditAppend, AlarmFilterEditCommit, AlarmFilterEditClose functions from within
your query function.
The alarms within any query function can also be filtered via AlarmSetInfo type=12 func-
tion and an edited named filter.
Example
You want to create a query that calls current alarms for the conveyors in your plant.
This could be drawn from the alarm tags you have identified as being associated with a
conveyor, by applying the keyword "conveyor" to the field Custom Filter 1.
The AlarmFilterEditSet (hndl, "Custom1=conveyor") followed by the Alarm-
FilterEditCommit(hndl) function will filter your alarm data for "conveyor" information.
The query function you would create would be as follows:
746
Chapter 23: Using Alarms in SCADA
INT
FUNCTION
FilterCustom1(STRING sValue)
INT iResult=-1, INT iHndl=-1,
STRING sFilter="";
sFilter = "Custom1=" + "^"" + sValue + "^"";
iHndl= AlarmFilterEditOpen(21);
IF iHndl <> -1 THEN
iResult = AlarmFilterEditSet(iHndl,sFilter)
IF iResult = 0 THEN
iResult = AlarmFilterEditCommit(iHndl)
END
AlarmFilterEditClose(iHndl)
END
RETURN iResult;
END
Say you then want to create a button on a graphics page that lists current conveyor
alarms. You would implement this by applying the custom function to the button.
FilterCustom1(“converyor”);
You could also create a reset button that clears the current displayed list by canceling the
query:
hSession = AlarmFilterEditOpen(21);
AlarmFilterEditSet(hSession, “”);
AlarmFilterEditCommit(hSession);
AlarmFilterEditClose(hSession);
You have the choice of calling a specific Cicode function, for example, "Customfield1",
with the argument "pumpcontrol", or using a more generic approach with the function
"Checkfield" with argument "CUSTOM1= pumpcontrol". In this case, the Cicode function
filters the passed string and checks the field specified.
747
Chapter 23: Using Alarms in SCADA
A named filter can be used to filter an alarm list or an alarm count only if that alarm list
or alarm count is associated to the named filter. It is not used to directly filter alarms.
Instead it is used to update the active filter of multiple alarm lists or alarm counts. Once
you create the named filter you then edit it to add the filter criteria you want the named
filter to query.
To associate an alarm list to a named filter, you need to call AlarmSetInfo(AN, 12,
“Named Filter”), where AN is the animation number of the list being associated, 12 is
the mode for associating the named filter to the alarm list, and “NamedFilter” is the
name of the filter that was created by calling the function AlarmFilterOpen() .
To disassociate the named filter from an alarm list set “NamedFilter” to empty text e.g.
AlarmSetInfo(AN, 12, “”). This will remove the association from the named filter, but the
disassociated alarm list will not be refreshed, hence the filter query will still be in place
until a new filter is applied.
In order to associate an alarm count to a named filter, you need to call AlarmCount
(Type, “NamedFilter”, KeepAliveSeconds, CacheMode), where Type, KeepAliveSeconds
and CacheMode are documented in the AlarmCount function, and “NamedFilter” is the
named filter that was previously opened by calling AlarmFilterOpen.
In each of these cases, editing the filter criteria belonging to the named filter will update
all associated alarm lists or alarm counts.
Example
The following examples show how to open, edit (add filter criteria), associate, dis-
associate and close a named filter called “MyFilter”.
// The following examples show how to open, edit, associate, disassociate and close
// a named filter (e.g. "MyFilter").
// These are fictional examples for demonstration purposes only.
// The prompt message is dispplayed in prompt-line for increasing clarity.
// This function returns zero when all examples are successful,
// otherwise error is returned.
INT
FUNCTION
AlarmNamedFilterExamples()
748
Chapter 23: Using Alarms in SCADA
! Count active alarms of this filter and verify against displayed alarms
iAlarmCounted = AlarmCount(0, sNamedFilter, 1,0);
iAlarmDisplayed = AlarmCountList(iAN);
IF iAlarmCounted <> iAlarmDisplayed THEN
Prompt ("Count verification error!");
RETURN iError;
END;
! disassociate "MyFilter"
iError = AlarmSetInfo(iAN, 12, "");
IF iError <> 0 THEN
Prompt ("MyFilter unlink error!");
RETURN iError;
END;
749
Chapter 23: Using Alarms in SCADA
RETURN iError;
END
See Also
Implementing queries that use custom filters
The syntax of the filter will be verified against the following BNF grammar:
1. <filter> ::= <filter_expr> { " ;" <filter_expr> }
2. < filter_expr > ::= { ["("]<filter_expr>[")"] <logical_binary_op> ["("]<filter_expr>[")"]
| <comparison>
| "NOT" "(" <filter_expr>")"}
3. <comparison> ::= <field> <comparison_op> <value>
4. <comparison_op> ::= "="|">"|"<"|">="|"<="
5. <logical_binary_op> ::= "AND" | "OR"
750
Chapter 23: Using Alarms in SCADA
Note:
• (1) The ";" between <filter_expr> is interpreted as AND
• (2) The parenthesis are optional but recommended to obtain the right evaluation
order. If they are present they need to match.
• (7) The "*" is standard wild card. it can be use only once per <string_value>
l Tag=A
l (Tag=A) OR (TAG=B)
l (Tag=A) OR (TAG=B) ; Name=C
l Time > IntToStr(TimestampToTimeInt(yesterday))
l Tag=Dig*
l Message="quoted sentence with blanks"
l (((Tag=A) OR (TAG=B)) AND (category=1))
When using the alarm filter Cicode functions first open a session (AlmFilterOpen) and
then use this session to browse the different parts (AlmFilterFirst/Next/Prev) of the filter
and to update (AlmFilterSet / Append / Commit) the filter. The browse session will be
available until closed (AlmFilterClose).
Multiple sessions can be used on the same list. For multiple sessions modify the same
filter then the current applied filter is the result of the last commit.
Efficiency considerations
Alarms within query functions can be filtered by using edited named filters and Alarm-
SetInfo type=12 function.
751
Chapter 23: Using Alarms in SCADA
For example the AlarmSetInfo(21,12, "MyFilter") will link AN=21 to the filter named
"MyFilter".
See Also
Alarm Categories
Alarm Categories
After adding alarms to your project, you can then create categories to group them, such
as creating a category number ‘23’ to group all your alarms that monitor pumps in your
system into.
For each category, you can set the following:
l alarm display details (fields, font and page type)
l logging details (printer or data file)
l action to be taken when an alarm in the category is triggered (for example, activating
an audible alarm).
l associated priority. The alarm priorities can be used to order alarm displays, pro-
viding useful filtering for the operator.
You can configure up to 16376 alarm categories. If you do not specify a category for an
alarm, the alarm has the same attributes as alarm category 0. If you do not define an
alarm category 0, a default is used for the category.
To define an alarm category:
1. Choose Alarms | Alarm Categories. The Alarm Categories dialog box is displayed.
2. Complete the alarm categories form.
3. Click Add to append a new record, or Replace to modify an existing record.
See Also
Alarm Category Properties
752
Chapter 23: Using Alarms in SCADA
Do not put a blocking Cicode function in the ON Action field. A blocking function will affect
the polling of alarms, and may result in slow or delayed alarm processing.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
Do not put a blocking Cicode function in the OFF Action field. A blocking function will affect
the polling of alarms, and may result in slow or delayed alarm processing.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
Do not put a blocking Cicode function in the ACK Action field. A blocking function will affect
the polling of alarms, and may result in slow or delayed alarm processing.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
Field Description
753
Chapter 23: Using Alarms in SCADA
Field Description
Display on Alarm Page Category displayed on alarm page. True/False drop-down, with
True being the default. Enter a value of 6 characters or less.
Unacknowledged:Alarm The font to display alarms that are no longer active (but have not
Off Font been acknowledged). This property is optional. If you do not
specify a font, the font defaults to 10 pt. BROWN. Enter a value
of 16 characters or less.
Acknowledged: Alarm The font used to display alarms that are no longer active and
Off Font have been acknowledged. This property is optional. If you do not
specify a font, the font defaults to 10 pt. WHITE. Enter a value of
16 characters or less.
Unacknowledged: The font used to display an expression that has not been
Alarm On Font acknowledged. This property is optional. If you do not specify a
font, the font defaults to 10 pt. YELLOW. Enter a value of 16 char-
acters or less.
Acknowledged: Alarm The font used to display an active alarm that has been acknowl-
On Font edged. This property is optional. If you do not specify a font, the
font defaults to 10 pt. CYAN. Enter a value of 16 characters or
less.
Disabled Font The font used to display disabled alarms. This property is
optional. If you do not specify a font, the font defaults to 10 pt.
WHITE. Enter a value of 16 characters or less.
754
Chapter 23: Using Alarms in SCADA
Field Description
OFF Action A Cicode command that is executed when an alarm of this Cat-
egory is reset.
Example:
where Alarm OFF Actionis ENABLE_PROCESS = 1;
In this example the digital variable ENABLE_PROCESS is set to
ON when an alarm in this category is reset.
Note: Do not put a Cicode blocking function in this field. The
alarm system executes ON, OFF, or ACK actions within the polling
loop. A blocking function will affect the polling of alarms, and
may result in slow or delayed alarm processing.
ACK Action A Cicode command that is executed when an alarm of this Cat-
egory is acknowledged .
Note: Do not put a blocking Cicode function in this field. The
alarm system executes ON, OFF, or ACK actions within the polling
loop. A blocking function will affect the polling of alarms, and
may result in slow or delayed alarm processing.
Alarm Format The screen display format for alarms in this category. The
(Optional) Alarm Display format specifies how the data (for alarms in the
category) are displayed on the alarms page (on the screen
only). Each alarm displays on the alarms page in a single line,
for example:
755
Chapter 23: Using Alarms in SCADA
Field Description
See Alarm display fields for the formatting details for each
field type.
l [Format]Alarm parameter
l the Alarm format specified for category 0
l [Alarm]DefDspFmt parameter
l Default Alarm display format if none of the above is spec-
ified
Summary Format The summary display format for alarms in this category. The
(Optional) Summary Display format specifies how the alarm summary
displays on the alarms summary page (on the screen only).
See Alarm summary fields for formatting details for each field
type.
756
Chapter 23: Using Alarms in SCADA
Field Description
l [Format]Summary parameter,
l the Summary format specified for category 0
l {Alarm]DefSumFmt parameter
l Default Summary display format if none of the above is
specified
SOE Format(Optional) The SOE display format for alarms in this category. The SOE dis-
play format specifies how the Sequence of Events view will dis-
play on the alarms SOE page (on the screen only).
The display format is defined exactly as the Alarms Display For-
mat. However, you can also use additional data fields. If you do
not specify an SOE Display format, the format defaults to:
{DATE,16} {TIME,16} {TAG,10} {NAME,15} {MES-
SAGE,64} {STATE,16} {CLASSIFICATION,13} {USER-
NAME,16} {USERLOCATION,16}
See Alarm summary fields and Alarm display fields for for-
matting details for each field type.
l [Format]SOE parameter
757
Chapter 23: Using Alarms in SCADA
Field Description
Alarm Acquisition Error Acquisition error is an error related to acquiring data from I/O
sub-system for the underlying tag and/or expression, for exam-
ple, Device Offline, Tag Unknown, etc. (Integer length 6).
All acquisition errors are stored for each alarm record separately
within the alarm server as a new AcqError field. They are not
logged and no hardware alarm is raised from them.
The AcqError field stores the error as the Citect error code (for
example, NO ERROR). This field is made accessible through the
alarm browse functionality. If there are multiple acquisition
errors for a single alarm record, then the first of these is stored
within the system.
Summary Device The device where the alarm summary is sent. An alarm is logged
(Optional) to the summary device when it has gone off, and has been dis-
played for a longer period than the time specified in the [Alarm]
SummaryTimeout parameter.
When the alarm is logged to the device, it is removed from the
alarm summary page. When the alarm is printed, or written to a
file or device, the format specified in the device overrides the dis-
play format. If not specified, alarm summaries are not logged.
Log Device The device where the alarm state changes are sent. An alarm
entry is made in the log device each time an alarm changes state
(for example, on, off, acknowledged, enabled, and disabled).
When the alarm is printed, or written to a file or device, the for-
mat specified in the device overrides the display format.
If not specified, alarm state changes are not logged.
Log Alarm Transitions Logs the alarm details when the alarm becomes active. The
ON default for this field is TRUE.
Log Alarm Tran- Logs the alarm details when the alarm becomes inactive. The
sitions:OFF default for this field is TRUE.
Log Alarm Transitions: Logs the alarm details when the alarm is acknowledged. The
ACK default for this field is TRUE.
See Also
Formatting the alarm display
758
Chapter 23: Using Alarms in SCADA
[Alarm]Sum-
Type of view Default sorting order
marySortMode
Sequence of 0 {TIME,Descending}
events
Sequence of 1 {TIME,Ascending}
events
Whatever sort order you specify the system will append the following default set of
order by fields:
759
Chapter 23: Using Alarms in SCADA
Active, Disabled, Acknowl- (ASC) Active (DESC) As per [Alarm]Sort and [Alarm]Sort-
edged, Off, On, Unac- Mode
knowledged
Configuration (non-hardware
Tag (ASC)
alarms in system)
For example:
According to the order you specified, if two records result in being equal, the records will
adhere to the default sort orders above. In the example where tags have no equipment
specified (and therefore are ordered equally) the alarms will be ordered according to Ack,
Active,Time.
If you specify Active (ASC), then the resultant order on the active page will be:
Active (ASC), Acknowledged (ASC), [Alarm]Sort / [Alarm]SortMode.
For example:
In this case, data displays in two fields: Tag, with 8 characters; and Name, with 32 char-
acters. The width specifier is optional; if you do not use it, the width of the field is deter-
mined by the number of characters between the braces.
In this case, Name is followed by four spaces; the data {Name} displays with 8 char-
acters.
Note: The screen resolution of your computer determines the total number of char-
acters (and therefore the number of fields) that can be displayed on the alarms page.
760
Chapter 23: Using Alarms in SCADA
See Also
Including fixed text
Any spaces that you use in a text string are also included in the display.
See Also
Displaying lists and tables
The justification specifier is optional; if it is omitted, the field is left justified. If you use a
justification specifier, you need to also use the width specifier.
To display field text in columns, use the tab character (^t); for example:
Format {Tag,8}^t{Name,32}^t{Desc,8}
This format aligns the tag, name and description fields of the alarm when using a pro-
portional font to display the alarms.
See Also
Variable data in alarm messages
761
Chapter 23: Using Alarms in SCADA
When LineSpeed1 is a variable tag, this expression will produce the following output on
the alarm display or alarm log:
Line Broken Alarm at Line Speed 1234
The following alarm entry uses an expression instead of a tag:
When Tank1 and Tank2 are variable tags, and Offset is a Cicode function, this expression
produces the following output:
High Level at Total Capacity 4985 liters
Note: The result is formatted according to the formatting specified for the first var-
iable tag in the expression. Standard variable formatting specifiers can be used to
define the format for the numeric variable, over-riding the default format specified in
Variable Tags.
See Also
Alarm display fields
{AlarmType,n} Alarm type (string), not localized. Values are: Digital, Analog,
Advanced, Multi-Digital, Time Stamped, Time Stamped Digital,
Time Stamped Analog.
{AlmComment,n} The text entered into the Comment field of the alarm properties
dialog.
{Area,n} Area
762
Chapter 23: Using Alarms in SCADA
{DateExt,n} The date on which the alarm changed state in extended format.
{Deadband,n} Deadband
763
Chapter 23: Using Alarms in SCADA
{LogState,n} The last state that the alarm passed through. (This is useful
when logging alarms to a device.)
{Paging,n} Indicates whether the alarm has to be paged. When the value is
TRUE the alarm will be paged. The default value is FALSE. See
Alarm Paging Properties.
{PagingGroup, n} Indicates the paging group to which the alarm belongs. Max-
imum length is 80 characters.
{Priv,n} Privilege
{State,n} The current state of the alarm. This field may be used for
Alarm Display Only. It is not applicable to Alarm Summary.
ON
OFF
DEVIATION
RATE
LOW
LOWLOW
HIGH
HIGHHIGH
764
Chapter 23: Using Alarms in SCADA
ON State 2
ON State 3
ON State 4
ON State 5
ON State 6
ON State 7
CLEARED
{Time,n} The time at which the alarm changed state (hh:mm:ss). (Set the
[Alarm]SetTimeOnAck parameter to use this field for the time the
alarm is acknowledged.)
{TypeNum,n} Alarm type number (use AlarmType to get string value instead).
Values are:
-1 Invalid
0 Digital
1 Analog
2 Advanced
3 Multi-Digital
4 ArgAna
5 User Event
6 timestamped
7 hardware
8 timestamped digital
9 timestamped analog
765
Chapter 23: Using Alarms in SCADA
{RecordId,n} String that uniquely identifies SOE records within the cluster. On
the Alarm Summary table, this field references the associated SOE
record.
{State,n} State of the event. The value of this field indicates the action that
triggers the event, similar to the value returned by the existing Log-
State field.
{UserLocation,n} The IP address or machine name where the event was triggered.
Notes:
• Any of the above fields can be displayed for any type of alarm. Where not appli-
cable for a particular alarm type, zero or an empty string will be displayed.
• If an alarm value is longer than the field it is to be displayed in (n ), it will be trun-
cated or replaced with the #OVR ("overflow of format width") alert message.
• For summary pages use {SumState}. To log the state to a device, use {LogState}.
State is the current state of the alarm, SumState is the state of the alarm when it
occurred, and Log State is the state of the alarm at the transition.
See Also
Alarm summary fields
766
Chapter 23: Using Alarms in SCADA
You can also use the [Alarm]DefSOEFmt parameter to format the alarm SOE, particularly if
your alarm SOE formats are to be the same.
767
Chapter 23: Using Alarms in SCADA
{FullName, The full name of the user (Full Name) who was logged on No
n} and performed some action on the alarm (for example
acknowledging the alarm or disabling the alarm, etc.).
When the alarm is first activated, the full name is set to
"system" (because the operator did not trip the alarm).
This field is not localized.
{LogState,n} The last state that the alarm passed through. (This is Yes
useful when logging alarms to a device.)
{Paging,n} Alarm paged flag. A flag to indicate that the alarm is going No
to be paged. Values are 1 (TRUE) or 0 (FALSE).
768
Chapter 23: Using Alarms in SCADA
{Pag- Paging group for alarm. A free form text field indicating the No
ingGroup,n} sequence of people to notify in the event the alarm
occurred.
{Quality, n} The IO server will pass the quality of the tag to the Alarm No
server when a tag's value is changed. If the changed tag
value causes a state transition the alarm server will pass
the quality to the database. This field displays the raw
value (2 bytes numeric). The field TSQuality relates to this
field and displays high byte of the 2 byte value in a string.
{Receipt- This field displays the alarm’s occurrence time (if known),
Local- otherwise it displays the receipt time of the alarm.
DateTime,n}
769
Chapter 23: Using Alarms in SCADA
{TSQuality,n} The IO server will pass the quality of the tag to the Alarm Yes
server when a tag's value is changed. If the changed tag
value causes a state transition the alarm server will pass
the quality to the database. The field displays high byte of
the 2 byte value (available under the Quality field) in a
string . Expected Timestamp Quality strings are: Time
Good, Time Uncertain, Clock Not Synchronized, or empty
string if no match is found.
{User- The IP address or machine name where the event was trig- Yes
Location,n} gered.
{User- The name of the user (User Name) who was logged on Yes
Name,n} and performed some action on the alarm (for example
acknowledging the alarm or disabling the alarm, etc.).
When the alarm is first activated, the user name is set to
"system" (because the operator did not trip the alarm).
770
Chapter 23: Using Alarms in SCADA
See Also
Changing the Order of the Alarm Summary Display
{AckDateExt,n} The date (in extended format) when the alarm was
acknowledged (dd/mm/yyyy)
{FullName,n} The full name of the user (Full Name) who was logged on
and performed some action on the alarm (for example
acknowledging the alarm or disabling the alarm, etc.).
When the alarm is first activated, the full name is set to
"system" (because the operator did not trip the alarm).
{OffDate,n} The date when the alarm returned to its normal state
{OffDateExt,n} The date (in extended format) when the alarm returned
to its normal state (dd/mm/yyyy)
771
Chapter 23: Using Alarms in SCADA
{OffTime,n} The time when the alarm returned to its normal state
{OnDateExt,n} The date (in extended format) when the alarm was acti-
vated (dd/mm/yyyy)
{UserName,n} The name of the user (User Name) who was logged on
and performed some action on the alarm (for example
acknowledging the alarm or disabling the alarm, etc.).
When the alarm is first activated, the user name is set to
"system" (because the operator did not trip the alarm).
Note: You can also include in your Alarm Summary any alarm display field other
than State.
See Also
Changing the Order of the Alarm Summary Display
772
Chapter 23: Using Alarms in SCADA
See Also
Formatting an Alarm Display
Note: If an animation is associated with an I/O Device that does not initialize prop-
erly at startup or goes offline while the system is running, the associated animation
is grayed on the relevant graphics pages (because the values are invalid). You can
disable this feature with the [Page]ComBreak parameter. See Handling Communication
Errors in Reports.
1. In the Project Editor or the Graphics Builder, choose System|Fonts. The Fonts dialog
box appears.
2. Enter your font properties.
3. Click Add to append a new record, or Replace to modify an existing record.
See Also
Fonts properties
Fonts properties
Use the Fonts dialog box to define your font properties. Fonts have the following prop-
erties:
Font Name
The name of the font. Unlike background text, strings, and numbers (which can use any
standard Windows font), you need to define a font for animated text.
Font Type
Any text font supported by Windows (31 characters maximum). Choose a font type from
the menu.
You can also specify bold, italic, and underlined text. To specify any of these options,
append the appropriate specifier to the Font Type, for example:
773
Chapter 23: Using Alarms in SCADA
Note: To use a font that is not displayed in the menu, you need to install the font on
your computer before you can use it in your system. To view, install, or remove Win-
dows fonts, use the Windows Control Panel (Fonts Option). Refer to your Windows
documentation for details. (If your system uses a network, every computer needs to
have the font installed.)
Pixel Size
The size of the displayed text. You can specify text fonts in pixels or points.
To specify a point size, enter a negative number in the Pixel Size field; for example:
specifies a ten-point font size. Be aware that you can only specify a point size as a whole
number (integer).
If you have not installed the Font Type (or Pixel Size) on your system, a default font
and/or size is used that most closely resembles the font and/or size you have specified.
If you use a point size, the size remains constant across screen resolutions. On low-res-
olution screens, the font appears larger than on high-resolution screens, which might
cause misalignment of animation. Only use a point size to display text on computer
screens of the same resolution.
Foreground Color
774
Chapter 23: Using Alarms in SCADA
The foreground color of the displayed text (i.e., the color of the text characters). You can
use a predefined color label (accessible via the menu), a user-defined custom label, or the
RGB encoded number generated by the function MakeCitectColour (see the Cicode Reference
Guide).
Note: Do not confuse predefined labels with the color Name feature associated with
the Color Picker. You cannot use color names with this dialog; doing so generates a
compile error.
Foreground Flash
The secondary color applied to the font if using flashing color for your text characters.
You can use a predefined color label (accessible via the menu), a user-defined custom
label, or the RGB encoded number generated by the function MakeCitectColour (see the
Cicode Reference Guide).
If you do not specify a color, the text remains solid.
Background Color
The background color of the displayed text. You can use a predefined color label (acces-
sible via the menu), a user-defined custom label, or the RGB encoded number generated
by the function MakeCitectColour (see the Cicode Reference Guide).
This property is optional. If you do not specify a background color, it defaults to trans-
parent.
Background Flash
The secondary color applied to the background if using flashing color. You can use a
predefined color label (accessible via the menu), a user-defined custom label, or the RGB
encoded number generated by the function MakeCitectColour (see the Cicode Reference
Guide).
If you do not specify a color, the text remains solid.
Comment
Any useful comment (48 characters maximum).
775
Chapter 23: Using Alarms in SCADA
Note: If you intend to use time-stamped digital or time-stamped analog alarm prop-
erties as variable tags, you will want to verify that they are configured correctly with
the necessary data being pushed to the relevant variables via the Cicode function
AlarmNotifyVarChange.
See Time-stamped Digital Alarms and Time-stamped Analog Alarms for more details on
how these alarms operate.
Changes in Alarm Reference Syntax
In versions prior to 7.10 you could refer to an alarm's properties by dot notation ex.
“Alarm1.On”. Such references could appear in both Cicode and on graphic pages and
enabled you to see and control alarm states.
776
Chapter 23: Using Alarms in SCADA
In CitectSCADA 7.20 an alarm’s properties carries not only value, as in 7.10, but also
items similar to Tag Extensions items for example. “Alarm1.On.T”. The alarm reference
syntax is now:
[Cluster.]Alarm.AlarmProperty[.Item]where
AlarmProperty The alarm property name. This part of the reference is not optional as it is
for tags. There are different available properties for different categories of
alarms as in 7.10.
Item The optional Item name. If the item name is not specified, the value of the
alarm property is referenced. Available items are the same as for tags:
Value referenced by “V”, Value Timestamp “VT”, Quality “Q”, Quality Times-
tamp “QT” and overall Timestamp “T”.
See Also
Supported alarm properties
Writing to alarm properties
Setting up alarms
Tag Extensions
.ComBreak For Multi-Digital alarms, the property is set to 1 if the device cannot Digital
read data from the underlying tag at start-up for a time greater
than [Alarm]ArgyleTagValueTimeout value. The property is set to 0
and re-alarms the corresponding alarm, when the alarm server
receives valid data from the device.
777
Chapter 23: Using Alarms in SCADA
.Millisec The milliseconds part of the time the alarm was triggered Long
State enumerations
778
Chapter 23: Using Alarms in SCADA
779
Chapter 23: Using Alarms in SCADA
.Time 32-bit value of the time the alarm was triggered Long
* The .On property for Analog alarms is true if any alarms associated with the alarm tag
are active.
Note: Once an alarm is disabled, it cannot be re-enabled unless you use the function
AlarmEnable() or AlarmEnableRec()
For digital alarms, time-stamped digital alarms, and advanced alarms, the following
properties can also be used:
Note: Desc exists for every alarm type but will not return meaningful data for analog
or time-stamped analog alarms. Desc returns an empty string that indicates whether
the read succeeded; the write indicates that the tag was resolved and that the write
request was sent.
For analog alarms and time-stamped analog alarms, the following properties can also be
used:
780
Chapter 23: Using Alarms in SCADA
For the digital properties below, only one can be true at any point in time for each alarm.
They are arranged in order of priority, from lowest to highest.
Note: DVL and DVH are only evaluated if Deviation > 0. R is only evaluated if Rate
781
Chapter 23: Using Alarms in SCADA
> 0.
Some alarm properties return configuration data. If the user has not defined this infor-
mation, the following defaults are provided:
Property Default
.Setpoint 0
.HighHigh 3.4e+38
.High 3.4e+38
.LowLow -3.4e+38
.Low -3.4e+38
.Rate 0
.Deviation 0
.Deadband 0
.Category 0
.Priority 0
See Also
Writing to alarm properties
Setting up alarms
782
Chapter 23: Using Alarms in SCADA
knowledged")
Analog alarm thresholds can also be changed using the AlarmSetThreshold() function.
Note the following:
l The alarm tag needs to be unique.
l The alarms databases in included projects on the alarms server and the Control
Client computer needs to be identical.
783
Chapter 23: Using Alarms in SCADA
See Also
Supported alarm properties
Setting up alarms
Note: You are not required to specify the port if using the default settings for ports.
See Also
Alarm Server Definitions
Supported alarm properties
Writing to alarm properties
Alarm-
Description
Page
Active When an alarm is triggered, it becomes active and is displayed on the Active
Alarm page. The active state of a digital alarm is ON, while the active state of
an analog alarm varies, depending on the type of alarm (for instance HIGH,
LOW , RATE, and so on).
To acknowledge an alarm, an operator either selects the alarm with the mouse
and clicks the left mouse button, or moves the cursor onto the alarm and
presses the Enter key. Alternatively, the operator can acknowledge every alarm
on page by clicking Alarm Ack.
When an alarm is acknowledged, its display color changes, and its state
changes to ACKNOWLEDGED. When the alarm is reset (when the conditions
that caused the alarm have been rectified), its state changes to OFF. When the
state changes to OFF the Alarm is no longer displayed and is available from the
Disabled Alarm page. You can then view state changes (events) for that alarm
using either the Alarm SOE page.
784
Chapter 23: Using Alarms in SCADA
Alarm-
Description
Page
re-enabled.
(You need to define a command that uses the AlarmDisable() function to dis-
able alarms.)
SOE To maintain a history of alarm activity, an event log is kept. This log stores the
time when each alarm was activated, acknowledged, and reset. You can display
alarms from the event log (including disabled alarms) on the sequence of
events and alarm summary page. The soe page displays actions taken on an
alarm, and user events such as login. You can also add comments to existing
events, and insert new events into the event journal. Manually refresh the page
to view the latest events.
Note:In v7.40 CitectSCADA alarm login system requires two levels of login:
- Login to the Client system supported by the “Login successful” prompt-mes-
sage
- Login to the Alarm DB Server visible via SOE events.
Successful Alarm DB login events are viewable via the SOE page. The login
events can be filtered and sorted by date-time and other filter criteria, with the
specific login event identified by the “Logged on” entry in the Message column
and the corresponding login name in the “User Name” column.
Unsuccessful DB login/connection events though not triggering new SOE
entries, may generate “DB not connected” Hardware alarms.
Summary The Alarm Summary page displays ON/OFF Alarms, acknowledged and unac-
knowledged states. Manually refresh the summary page to view the latest
events before analyzing the data.
Hardware Displays details of any system errors that are unacknowledged, or acknowl-
edged and still in alarm state.
1. Create an alarm (or hardware alarm) page in your project if you have not already
done so. Call the page Alarm for a configurable alarm page, and Hardware for a
hardware alarm page.
2. Create a new keyboard command or a button, to call the page at runtime. You can
also add a touch command to an existing screen object.
3. In the command field, enter PageAlarm() to display the configurable alarms page, or
PageHardware() to display the hardware alarms page.
4. Configure other properties as necessary.
5. Click Add to append a new record, or Replace to modify an existing record.
Note: If using the standard page templates, you don't usually need to create a com-
mand to display the page: the commands are already built in.
785
Chapter 23: Using Alarms in SCADA
To display a customized alarm page (with a non-standard name), use the PageDisplay()
function to display the page, followed by the AlarmSetInfo() function as necessary.
See Also
Adding a comment to the Alarm SOE page
Adding events into the event journal
Note: You cannot modify or delete an existing comment for an event. You can only
add a comment.
786
Chapter 23: Using Alarms in SCADA
You can also add comments to an event on the SOE page using the AlarmComment ()
Cicode function. To add a message to the relevant event you can include the ‘AN’ as an
additional parameter in the function. For example:
To successfully add a comment to an event on the SOE page the following rules need to
be met:
1. The event is not of "Comment" classification.
2. A user should be logged on the client process.
3. If the event is associated with an alarm tag, the logged on user needs to have suf-
ficient privilege to that alarm configured in the database.
4. If the event is not automatically generated by the system (i.e. reflected by its user
name of "System"), the logged on user needs to match to the user name of the event.
5. If the event is automatically generated by the system, the logged on user needs to
have full privilege (i.e. privilege from 1 to 8).
Note:To view all columns on the page go to the Action Tab and click on the Auto
Size icon.
To add a new event to the event journal via the SOE page:
1. Select the relevant event from the display list. Right-click and select the option Add
event.
2. Enter your message in the message field. The associated alarm tag (if relevant to the
selected event) should be displayed in the message dialog title bar e.g. Message
[Alarm_6]. If no associated alarm tag then the title bar will display the following:
Message[].
3. Click OK.
Manually refresh the SOE page to view the new event. The event is displayed with the
timestamp, cluster, associated tag (if relevant) and type of 'Action'.
787
Chapter 23: Using Alarms in SCADA
You can also add events to the event journal page using the SOEEventAdd () Cicode
function.
Troubleshooting Alarms
SOE page displays old events with recent events not shown
If only old events are listed on your SOE page possible causes may include the fol-
lowing:
l The SOE page is not automatically refreshed. Manually refresh the page to update the
list. If this is not the case then potentially the system have trouble to manage the
request.
Possible solutions include:
l Check there is no filter applied to the current SOE display which results in only old
records being displayed
l Using the Alarm filter form decrease the requested LocalTimeDate range.
l Increase system capabilities to treat large number of events
l Increase the alarm server cache size. Refer to the param-
eterAlarm.<ClusterName>.<ServerName>CacheSize for more information
l Increase the maximum number of records returned by a single request. Refer to
the parameter Alarm.<ClusterName>.<ServerName>QueryRowLimit for more
information.
l Increase the request time-outs. Refer to the parameter Alarm.<Cl-
usterName>.<ServerName>ClientRequestTimeout for more information
INI file example:
[alarm]
CacheSize = 80
QueryRowLimit = 1000000
ClientRequestTimeout = 300000
788
Chapter 23: Using Alarms in SCADA
l The system is not able to get events or there is no event in the system.
l The issue can occur for example when (not exhaustive)
l The alarm server is busy and can't answer the request in the given time
l The client display is not connected to the alarm server
l The client user do not have the privileges to see the existing events
Possible solutions include:
l Checking the hardware alarms so that your client is connected to the alarm server (if
not an error message will be displayed)
l Check you did not deactivate the cluster for this client: see [Client]Cluster parameter
for more information).
l Check you are logged in with the right level of privileges
l Check there is no filter applied to the current SOE display which results in an empty
recordset
l Increase the request time-out for all alarm servers (see [Alarm]ClientRequestTimeout
for more information)
l Decrease the requested range by using the filter capability. (Request events for the last
hour for example, or for a particular tag etc)
789
Chapter 23: Using Alarms in SCADA
Note: For archiving to a volume to take place, the volume should be in the defined
path and accessible (CitectSCADA should be able to write to the volume). When the
volume is in place, CitectSCADA will mount the volume automatically (if required),
prior to writing the data.
See Also
Understanding the archiving parameters
Parameter Description
KeepOnlineFor For archiving defines how long the data is viewable on the SOE Page. Default
value is 6 weeks. After this time the data will be deleted. To view the archive
data it will need to be ‘mounted’.Set this parameter using the Citect.ini file.
ArchivePath Where the archive data will be stored. Should be accessible from the alarm
server which executes the archiving operation. For example C:\Data.
Note:The media where the archived file is to be saved should be labeled. If
not labeled archiving will be unsuccessful and a message will display on the
SOE page.
790
Chapter 23: Using Alarms in SCADA
Parameter Description
ArchivePrefix Optional prefix to the archive folder. Combined with the ArchivePath and
timestamp (YYYYMMDD) when archiving was triggered. The archiving action
creates sub folders under archive volume’s folder. For example, if Archive-
Path=C:\Data and ArchivePrefix=Archive and an archiving happened on 21
January 2012, archive volume path is C:\Data\Archive20120121. If there is
any data which is eligible for archiving, “EventJournal” folder will be created
under archive volume’s directory and the archived data will be flushed to
that folder.The folder name would then be C:\Data-
\Archive20120121\EventJournal\ <H*.mwj>
Set this parameter in the Alarm Server Definitions form.
Modify the default settings for ArchiveAfter and KeepOnlineFor, and set the ‘Archive-
Path’ and ‘ArchivePrefix’ before scheduling or manually triggering archiving to occur.
To archive Event Journal data you can:
1. Manually trigger archiving using SOE Cicode functions
2. Set automatic archiving using the Alarm Server Definitions form
3. Use Scheduler to trigger archiving
Note: You need to be logged in as a user, to trigger archiving, and to mount or dis-
mount an archive volume using cicode.
To trigger archiving:
Set function SOEArchive(). Archiving will start, using the values defined in the Archi-
veAfter and KeepOnlineFor parameters.
Note: To avoid data from becoming inaccessible, run the operation every ”Kee-
pOnlineFor” weeks or within the ArchiveAfter and KeepOnlineFor period. For exam-
ple, if ArchiveAfter is 1 week and KeepOnlineFor is 2 weeks manually trigger
archiving after 8 days, so that all data is archived.
791
Chapter 23: Using Alarms in SCADA
Once executed check the location set in the ArchivePath/ArchivePrefix to see files. The
directory may hold multiple files.
792
Chapter 23: Using Alarms in SCADA
Note: To call SOEMount() or SOEDismount(), user has to log in as a role who has
full privilege (privilege 1..8).
See Also
Automatic archiving occurs immediately after the alarm server has started and then
ever number of days specified in the Archive every field.
Note: For archiving to succeed in single process mode you need to login to the
SCADA client in Runtime.
793
Chapter 23: Using Alarms in SCADA
FUNCTION
ArchiveMyData()
Login("Engineer","citect");
SOEArchive();
END
794
Chapter 24: Using an OPC AE Server
OPC (OLE for Process Control) communicates information from a data source such as a
server to any client third party application in a standard way without requiring the
application to have specific knowledge about the data source. The OPC Alarms and
Events specification is similar to the original OPC Data Access specification, only the
Alarms and Events specification addresses real-time alarm and event data instead of
real-time process control data.
The third party client application that is interested in an alarm subscription to the server
needs to link to the server. When the client registers a link to the server, the server loads
into memory and starts executing on the PC.
See the topic Using a Third Party OPC Client to access Alarm Server Data for con-
figuration details.
See also
Computer Setup Wizard - General Options Setup
Note: The field names returned will vary to those field names available on the
sequence of events page.
795
Chapter 24: Using an OPC AE Server
See Also
Computer Setup Wizard - General Options Setup
796
Chapter 25: Configuring Events
You can use an event to trigger an action, such as a command or set of commands. For
example, an operator can be notified when a process is complete, or a series of instruc-
tions can be executed when a process reaches a certain stage.
Events needs to be enabled for events to run. Use the Computer Setup Wizard (Custom
setup) to enable Events. If using a network, you can process events on any computer (or
every computer).
Note: The Events system is not redundant. That is, it is not possible to assign pri-
mary and standby Events Servers. If you require a redundant event reporting system,
use reports instead. See Reporting Information.
To define an event:
See Also
Events Properties
Running Events
Events Properties
Events have the following properties:
Name
For a single computer system, specify GLOBAL for the event name:
Name GLOBAL
797
Chapter 25: Configuring Events
If you are using a network and want to run an event on every computer, specify
GLOBAL for the event name. If you want to run an event only on specific computers,
specify an event name and use the Computer Setup Wizard (Custom setup) to specify
which computer(s) will run the event. The event name does not have to be unique: you
can specify many events with the same name.
Enter a value of 16 characters max.
Note: Make event names agree with the Tag name syntax. The use of any other char-
acters such as spaces will result in a compiler error. Instead of a space, use an under-
score character (_).
Cluster Name
The default cluster to be used when the event action and event trigger Cicode is run.
Any tags in these Cicode expressions will resolve to this default cluster if they don't
have their cluster specified inside the expression. This field can be left blank in single
cluster systems or if every tag inside the expressions are declared in the
<ClusterName>.<TagName> format.
Time
The time of day to synchronize the Period in hh:mm:ss (hours:minutes:seconds). If you
do not specify a time, Period is synchronized at 00:00:00 (that is, midnight). Enter a
value of 32 characters maximum.
Period
The period to check for the event, in hh:mm:ss (hours:minutes:seconds). Enter a value of
32 characters maximum. Alternatively you can specify:
l A weekly period by entering the day of the week to check for the event, for example,
Monday, Tuesday, Wednesday, etc.
l A monthly period by entering the day of the month to check for the event, for exam-
ple, 1st, 2nd, 3rd, 4th, 5th, etc.
l A yearly period by entering the day and the month to check for the event, for exam-
ple, 1st January, 25th February, and so on. The day and month needs to be separated
by a space.
If you do not specify a period or time, the period defaults to one second. If you do not
specify a period, but do specify the time, the period defaults to one day.
Trigger
The Cicode expression (or Variable tag) which is used to determine whether the event
Action is executed. This expression is checked every one second. Enter a value of 254
characters maximum.
Action
798
Chapter 25: Configuring Events
Running Events
The Event Server needs to be enabled for events to work. You can run an event auto-
matically:
l At a specified time and period.
l When a trigger condition becomes TRUE.
l When a trigger condition is TRUE at a specified time and period.
See Also
Specifying times and periods
Using triggers
Period Comment
You can also specify the time of day to synchronize the event, for example:
799
Chapter 25: Configuring Events
Period Comment
The Time synchronizes the time of day to run the event and, with the Period, determines
when the event is run; for example:
Time 6:00:00
Period 1:00:00
In this example, the event is run every hour, on the hour. If you start your runtime sys-
tem at 7:25am, your event is run at 8:00am, and then every hour after that.
See Also
Using triggers
Using triggers
You can use any Cicode expression (or variable tag) as a trigger for an event. If the result
of the expression (in the Trigger field) becomes TRUE, and if the Time and Period fields
are blank, the event is run. For example:
Time
Period
This event is only run when the expression (Trigger) becomes TRUE, that is, when the
digital tag RCC1_MC is ON and the analog tag RCC1_SPEED is less than 10. The expres-
sion needs to become FALSE and then TRUE again before the event is run again.
If you use the Time and/or Period fields, the Trigger is checked at the Time and/or Period
specified, for example:
Time 6:00:00
Period 1:00:00
800
Chapter 25: Configuring Events
This event is run each hour, but only if the expression (Trigger) is TRUE (that is, if the
digital tag RCC1_MC is ON and the analog tag RCC1_SPEED is less than 10).
See Also
Running Events
801
Chapter 25: Configuring Events
802
Chapter 26: Using Accumulators
Accumulators track incremental runtime data, such as motor run hours, power con-
sumption, and downtime. You set a trigger (for example, motor on) to increment three
counters:
l The number of times the accumulator is triggered (for example the number of starts
for the motor).
l The run time, in steps of 1 second.
l A totalized value, by an increment you define (for example the current).
The accumulated data is stored as variable tags in an I/O Device. Variable tags are read
at startup and updated regularly while the trigger is active. You can monitor and dis-
play accumulated data by animating, trending, or logging the variable tags.
Note: You can control (re-read or reset) any accumulator at runtime by using the
AccControl() Cicode function.
To configure an accumulator:
Accumulator Properties
Accumulators have the following properties:
Name
The name of the accumulator. Enter a value of 79 characters or less.
Cluster Name
The name of the cluster that this accumulator runs on. If the Cluster Name is not set,
then this accumulator will run on each defined cluster.
Trigger
803
Chapter 26: Using Accumulators
The Cicode expression (or variable tag) to trigger the accumulator. If the result of the
expression (in this field) is TRUE, accumulation starts. If the result of the expression (in
this field) becomes FALSE, accumulation stops. Enter a value of 254 characters or less.
The frequency with which the trigger is checked is controlled by the [Accumulator]Watch-
Time parameter.
Run Time
The variable (tag) that contains the run time (in seconds). Enter a value of 254 characters
or less. On startup, this value is read. Then the local copy of this variable is incremented
(while Trigger is TRUE) and the variable is written back to the I/O Device at a frequency
determined by the [Accumulator]UpdateTime parameter.
No. of Starts
The variable (tag) that contains the number of starts (that is, the number of times the
trigger changes from FALSE to TRUE). Enter a value of 254 characters or less. On
startup, this value is read. Then the local copy of this variable is incremented and the
variable is written back to the I/O Device at a frequency determined by the [Accumu-
lator]UpdateTime parameter.
Totalizer Inc
Any Cicode expression (or variable tag) to add to (increment) the Totalizer variable
while the Trigger condition is TRUE. Enter a value of 254 characters or less.
Totalizer
The variable (tag) that contains the totalized value. Enter a value of 254 characters or
less.
On startup, this value is read. Each time the trigger is checked and while the trigger is
TRUE, the value in the Totalizer Inc field is added to the local copy of this Totalizer var-
iable. The new Totalizer variable is written back to the I/O Device at a frequency deter-
mined by the [Accumulator]UpdateTime parameter.
For example, if you configure an accumulator for a motor, and Totalizer Inc is the cur-
rent (amperage) used by the motor, then Run Time will contain the time (in seconds)
that the motor has run, No. of Starts will contain the number of times the motor was
started, and Totalizer will contain the total current used by the motor. The average cur-
rent used by the motor is Totalizer/Run Time.
Comment
Any useful comment. Enter a value of 48 characters or less.
Equipment
804
Chapter 26: Using Accumulators
Name of the equipment associated with the Accumulator. Select or enter a name of 254
characters or less. You can optionally prefix a cluster name to the equipment name in
order to restrict the reference to a piece of equipment in only one cluster. The cluster
should be configured otherwise the compile will not be successful. Use this method as
an alternative to referencing a cluster in the equipment properties dialog if the equip-
ment is defined for all clusters.
The following fields are implemented with extended forms (press F2).
Privilege
The privilege needed by an operator to perform operations on the accumulator (by using
accumulator functions). Enter a value of 16 characters or less.
Area
The area to which the accumulator belongs. Only users with access to this area (and any
required privileges) will be able to perform operations on the accumulator. For example,
if you enter Area 1 here, operators need to have access to Area 1 (plus any required priv-
ileges) to perform operations on the accumulator. Enter a value of 16 characters or less.
Notes:
l The run time, number of starts, and totalized value are stored in variables in your I/O
Device. This allows easy access to these variables and, because they are saved in the
I/O Device, their values are saved if the project is shutdown. You can increase system
performance by storing these variables in a Disk I/O Device. (If you store these var-
iables in your external I/O Devices, communications bandwidth will be consumed
updating the variables.
l If using a network, you can use a redundant Disk I/O Device to secure these var-
iables.
l The accumulator server runs as part of the Reports Server. If you have a redundant
Reports Server, you need to use a primary/standby configuration to stop the accumu-
lators running on both Reports Servers. Use the Computer Setup Wizard to define the
Reports Servers.
l You can control (re-read or reset) any accumulator at runtime by using the AccControl
() Cicode function.
805
Chapter 26: Using Accumulators
806
Chapter 27: Logging and Trending Data
Since CitectSCADA version 6.0, the Process Analyst (an built-in trend visualization tool)
has superseded the functionality of trend graphs. However, trend graphs are still sup-
ported. Be aware that to use SPC trends, use trend graphs, since SPC is not supported by
the Process Analyst.
For details, see the Process Analyst Help.
See Also
Trending Data
Trend Graphs
Printing Trend Data
Exporting Trend Data
Using Trend History Files
Using Path Substitution
Debugging Trending
Trending Data
The trend system can help you better understand your plant and equipment's per-
formance. Trending can be used for dynamic visual analysis (trend and SPC graphs),
production records, or for regularly recording the status of equipment for efficiency and
preventive maintenance.
Using trend tags, you can specify the data you want to collect from your I/O Device var-
iables. This information can be logged at regular intervals (periodic trend), or only when
an event occurs (event trend). Event trends are used for trending data that is not time-
based, for example, for a product as it comes off an assembly line. Trend data is usually
saved on disk for analysis or displayed on a trend graph.
The trend system is based on real-time samples. The trend system expects a return of
one data point each time it samples the data. Although gaps in the data can be filled,
you will want to verify that your field device can return data values at the rate you spec-
ify (especially if you are using sample periods of less than 100 ms).
Any amount of data can be collected and stored. The only restriction on the amount of
data that you can store is the size of the hard disk on your computer (an efficient data
storage method is used to optimize the use of storage space on your computer's hard
disk). For long term storage, you can archive the data to disk or tape (without disrupting
your runtime system).
807
Chapter 27: Logging and Trending Data
Note: If you are trending data across a network (distributed processing), it is rec-
ommended that you enable time synchronization using the Time Synchronization
configuration application. This verifies that every trend is synchronized to the same
time.
You might also consider staggering your trend sample requests using the [Trend]Stag-
gerRequestSubgroups parameter.
See Also
Configuring trend tags
1. Choose Tags | Trend Tags. The Trend Tags dialog box appears. (Press F2 to view the
extended Trend Tag form.)
2. Enter your trend tag properties.
3. Click Add to append a new record, or Replace to modify an existing record.
See Also
Trend Tag Properties
Note: When modifying a trend tag, be aware that if the tag was created using the
equipment editor - equipment type workspace, the fields configured will be grayed
out in the tag properties form.
Equipment
The name of the equipment associated with the Trend Tag. Select or enter a name of 254
characters or less. You can optionally prefix a cluster name to the equipment name in
order to restrict the reference to a piece of equipment in only one cluster. The cluster
should be configured otherwise the compile will not be successful. Use this method as
an alternative to referencing a cluster in the equipment properties dialog if the equip-
ment is defined for all clusters.
Item Name
808
Chapter 27: Logging and Trending Data
Enter a meaningful name for Tag Item. Used as part of the equipment hierarchy a mean-
ingful name will help with future migration of your system and the step towards an
object oriented model.
This field is optional. If not configured, the last 63 characters of the “Trend Tag” field
will be used for the Tag Item name. The Trend Tag allows 79 characters, while Tag Item
has a maximum of 63 characters. A compiler alert message may be generated if the
'Equipment.TagItem' name is not unique.
There is a limit of 254 characters on the combination of Equipment and Tag Items, plus
the period '.', for example “Equipment.TagItem” should be 254 characters or less.
See also Scenarios of Tag Item for additional information regarding this field.
Cluster Name
The name of the cluster that runs this trend. If the Cluster Name is not set, then this
trend will run on every defined cluster.
Comment
Any useful comment (254 characters maximum).
Tag Name
The name assigned to the trend data (79 characters maximum). If the trend tag is log-
ging a particular variable, use a 16-character name that resembles the 32-character name
of the related variable tag. This will mean an association between the two is easily rec-
ognizable. The name needs to be unique to the cluster. Trend Tag names need to adhere
to the Tag name syntax. If the name is not unique or is not syntactically correct it may
not be recognized. If you have many tags, use a naming convention (see Using struc-
tured tag names). This makes it easier to find and debug your tags.
Note: Where Cluster Name is left blank, the name needs to be unique to every
defined cluster.
Note: Trend tag names have to be unique and not identical to any SPC tag names
within the cluster(s) that run this trend. Two tags accessing the same file can result
in system errors which may include lost or corrupted trend/SPC data.
809
Chapter 27: Logging and Trending Data
If using the File Name property, ensure that the trend tag uses a unique name. Two tags
accessing the same file can result in system errors which may include lost or corrupted
trend/SPC data.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
Type
The type of trend (32 characters maximum):
l TRN_PERIODIC - A trend that is sampled continuously at a specified period. You
can also define a trigger to stop and start the trend (when a specified condition
occurs in the plant).
l TRN_EVENT - A trend that is sampled once each time the value of the trigger
changes from FALSE to TRUE. Interpolation occurs between each data point to create
a continuous graph.
810
Chapter 27: Logging and Trending Data
l TRN_PERIODIC_EVENT - A trend that is sampled once each time the value of the
trigger changes from FALSE to TRUE. No interpolation occurs between these points,
thus providing a graph which spikes at each data point.
Expression
The logged value of the trend tag (254 characters maximum). You can log individual var-
iables by using a variable tag. For example:
Expression LT131
811
Chapter 27: Logging and Trending Data
You can also log any Cicode expression or function, for example:
Expression LT131/COUNTER
Comment Logs Variable Tag LT131 divided by the Variable Tag COUNTER
Note: When a variable tag is used in the expression field of a trend tag property, the
Eng Zero Scale and Eng Full Scale fields of that variable tag needs to be set appro-
priately, or data may be lost because the trend logs negative values are invalid.
Storage Method
Select Scaled or Floating Point (64 characters). Scaled is a 2-byte data storage method;
floating point uses 8 bytes.
Floating point storage has a dramatically expanded data range in comparison to scaled
storage, allowing values to have far greater resolution. However, you need to consider
that it also uses a lot more disk space. Use scaled where compatibility with pre-V5.31
trend history files is necessary.
This field cannot be left blank. If you do not specify a storage method, the compiler will
generate an error message.
Note:
• Trend records need to explicitly define their trend storage method. The compiler
will raise an error if not defined. In previous versions, the default when not defined
was “Scaled (2 byte)”8 byte . When upgrading, customers should set the trend stor-
age method for blank entries to match the default from the previous version.
• If you edit this property in an existing project, you need to delete the associated
trend files - before you run the new runtime system. (For location of the trend files,
see the File Name.)
Sample Period
The sampling period of the data. You can either enter a period of your own, or choose
one from the menu.
Enter sampling periods of greater than one second in hh:mm:ss (hours:minutes:seconds)
format. If you enter a single digit, without the colon (:), it will be considered a second.
For example, if you enter 2, it will be interpreted as 2 seconds.
Sampling periods of less than one second needs to be entered as decimals. For example,
to enter a period of 200 milliseconds, you would enter 0.2.
812
Chapter 27: Logging and Trending Data
If the sample period is less than one second, then one second needs to be divisible by the
period (to give an integer). For example, a sample period of 0.05 is valid, because 1/0.05
= 20, whereas a sample period of 0.3 is not valid because 1/0.3 = 3.333... .
Note:
• Your I/O Device needs to be capable of providing data at the specified rate, other-
wise gaps will appear in the trend data and/or the hardware alarm Trend has
missed samples will be evoked. You can fill gaps in the file and graph using the
[Trend]GapFillTime parameter. Gaps in the graph only can be filled using the TrnSet-
DisplayMode() function.
• If trends with a sample period of less than a second are shared by several clients
across a network (distributed processing), enable time synchronization using the
Time Synchronization configuration application This verifies that trends are syn-
chronized with each other.
The Trigger is checked each sample period. If the Trigger is TRUE (or has just changed
from FALSE to TRUE, in the case of event trends), the value of the Expression is logged.
Examples
The sampling period of the fastest trend on the page is taken as the default value for the
display period of the page.
This property is optional. If you do not specify a sample period, the sampling period
defaults to 10 seconds.
Note: If you edit this property in an existing project, delete the associated trend files
before running the new runtime system (For location of the trend files, see File
Name).
No. Files
813
Chapter 27: Logging and Trending Data
The number of history files stored on your hard disk (for this tag) (4 characters max-
imum). The maximum number of files you can specify per trend tag is 999. Performance
and storage will be severely impacted by having a large number of history files per
trend.
By default, 2 history files are stored on your hard disk.
Period
The period of the history file, in hh:mm:ss (32 characters maximum). Alternatively, you
can:
l Specify a weekly period by entering the day of the week on which to start the history
file, for example Monday, Tuesday, Wednesday, etc.
l Specify a monthly period by entering the day of the month on which to start the his-
tory file, for example 1st, 2nd, 3rd, 4th, 5th, etc.
l Specify a yearly period by entering the day and the month on which to start the his-
tory file, for example 1st January, 25th February, etc. The day and month needs to be
separated by a space.
If you do not specify a period, the period defaults to Sunday (weekly).
When deciding on a period setting, be aware that the performance of a trend
viewer (be it the existing CitectSCADA or Process Analyst) may be impacted by
the size of a trend file. This is particularly true when displaying event-based trend
data.
Note: If you edit this property in an existing project, delete or move the associated
trend files before you run the new runtime system. (For location of the trend files, see
File Name.)
No. Files
The number of history files stored on your hard disk (for this tag) (4 characters max-
imum). The maximum number of files you can specify per trend tag is 999. Performance
and storage will be severely impacted by having a large number of history files per
trend.
If you do not specify the number of files, 2 history files are stored on your hard disk.
Note: If you edit this property in an existing project, delete or move the associated
trend files - before you run the new runtime system. (For location of the trend files,
see the File Name.)
Time
814
Chapter 27: Logging and Trending Data
The time of day to synchronize the beginning of the history file, in hh:mm:ss (32 char-
acters maximum). If you do not specify a time, the file is synchronized at 0:00:00 (i.e.
midnight). The time needs to be specified in Greenwich Mean Time, not the local time
zone.
Note: If you edit this property in an existing project, delete the associated trend files -
before you run the new runtime system. (For location of the trend files, see the File
Name.)
The following fields are implemented with extended forms (press F2). Note that some of
the fields listed below may be displayed in the previous section of the form.
Trigger
The Cicode expression (or variable tag) that triggers data logging (254 characters max-
imum). For example:
Trigger LT131<50
In this example, logging occurs when the value of the variable tag (LT131) falls below
50.
For a periodic trend, data is logged only while the value of the trigger is TRUE. (The
trend graph will still scroll, but will display <GATED> where the trigger is FALSE.) In
the above example, data is logged continuously while the value of LT131 remains less
than 50. Logging ceases when the value rises to (or above) 50. Logging does not occur
again until the value of LT131 falls below 50.
You do not have to specify a trigger for a periodic trend. If you do not specify a trigger
for a periodic trend, logging occurs continuously.
For an event trend, data is logged once when the value of the trigger changes from
FALSE to TRUE. In the above example, one sample is logged when the value of LT131
first becomes less than 50. Another sample is not logged until the value of LT131 rises to
(or above 50) and again falls below 50.
File Name
The file where the data is to be stored (253 characters maximum). Specify the complete
path or use path substitution.
When data is collected from your plant floor, it is stored in a file on the hard disk of
your computer which is then used to display a trend or SPC graph (a separate file is
used for each trend tag).
815
Chapter 27: Logging and Trending Data
By default, CitectSCADA stores the file in the [DATA] directory on the hard disk where
you installed CitectSCADA. The default name of the file is the trend tag name. However,
you can specify an alternate file name like this:
where [DATA] specifies the disk and path for the data. Use path substitution to make
your project more 'portable'.
Notes:
l You can no longer store trend files in the bin, runtime, backup or user directories or any
subdirectories of these. If you have existing Version 3.xx or 4.xx projects that use
these directories to store trend files, the path for these will have to be changed to the
Data directory.
l The trend system will buffer the acquired data before saving it to a file. The [Trend]
CacheSize parameters determine the buffer sizes for returned data.
l The File Name property is optional. If you do not specify a file name, the file name
defaults to [DATA]:<Name> on the hard disk where you installed CitectSCADA.
Where <Name> is the trend Tag Name.
If you use the File Name property, confirm that no other SPC tags or trend tags use
the same filename. Two tags accessing the same file can result in system errors
which may include lost or corrupted trend/SPC data.
If using the File Name property, ensure that the trend tag uses a unique file name. Two
tags accessing the same file can result in system errors which may include lost or cor-
rupted trend/SPC data.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
l A file extension should not be used when specifying a file name. If you edit this prop-
erty (change the file name or path) in an existing project, existing trend data is
ignored.
Area
The area to which the trend data belongs.
Privilege
The privilege necessary by an operator to display the trend data on a trend.
Eng Units
816
Chapter 27: Logging and Trending Data
Trend Graphs
Trend graphs visually represent past and current activity of plant-floor data, building a
picture over time of how a variable (such as product output, level, temperature, and so
on) changes or how a device or process is performing. You can monitor current activity
as it happens and scroll back through time to view trend history.
As the values of variables change over time or as events happen, the graph moves
across the page. The latest values are displayed by default. You can scroll back through
historical data to display past values of the variable (or process).
817
Chapter 27: Logging and Trending Data
You can trend any single variable or Cicode expression. You can display any number of
trends on the screen simultaneously, even if they have different sample periods. You can
also display up to eight trend tags (pens) in any trend window.
A trend graph can only communicate with one cluster, therefore you cannot mix trends
from multiple clusters on a single trend graph. To graph trends from multiple clusters
you will need to use multiple trend graphs, or, use the Process Analyst which has no
such restrictions.
Historical data collection continues even when the display is not active. You can switch
between pages without affecting trend graphs. Trend data acquisition and storage of
data (in trend history files) continues even when the display is not active.
You can use the following standard trends:
l A single full page trend, where one trend window displays on a graphics page.
l A double full page trend, where two trend windows display on a graphics page.
l A zoom trend with two trend windows and added functionality for zooming.
l A pop-up trend that you can 'pop up' anywhere (in a separate window) on your com-
puter screen.
l User-defined trends that you can position anywhere on any graphics page.
Note: Variable tags can also be visually trended using an SPC Control Chart. Sta-
tistical Process Control (SPC) is a facility that enables you to control the quality of
materials, manufactured products, services, etc. This quality control is achieved by
collecting, arranging, analyzing, and testing sampled data in a manner that detects
lack of uniformity or quality.
See Also
Creating trend pages
818
Chapter 27: Logging and Trending Data
Trend interpolation
Trend interpolation is used to define the appearance of a trend graph when the incom-
ing samples fall out of synchronization with the display period or when samples are
missed.
For example, a particular trend might be sampled five times between each update of the
trend graph. As only one value can be displayed for each update, a single value needs to
be used that appropriately represents the five samples; and that could be the highest
value, the lowest value, or an average.
To define how CitectSCADA calculates the value to use, you set a particular trend inter-
polator display method.
The following table shows the available interpolator display methods, grouped into con-
dense methods (where the display period is longer than the sample period) and stretch
methods (where the display period is less than or equal to the sample period).
Average (default) - this dis- Step (default) - This method simply displays the
plays the average of the samples value of the most recent sample.
within the previous display
period
819
Chapter 27: Logging and Trending Data
Minimum- This displays the Ratio - This method uses the ratio of sample times
lowest value that occurred dur- and values immediately before and after the
ing the previous display period. requested time to interpolate a "straight line" value.
Maximum - This displays the Raw Data - This method displays the actual raw
highest value that occurred dur- values.
ing the previous display period.
The interpolation display method is set via TrnSetDisplayMode() function. You can also
use the [Trend]GapFillMode parameter, but it will interpolate values within the actual
trend file as well as on the trend graph.
Function Purpose
TrnCom- Prints two trends (one overlaid on the other), each of up to four trend
parePlot tags.
The standard trend templates have buttons that call these functions to print data.
When you print using the TrnPrint function, the Plot Setup dialog box appears. Use this
dialog box to:
l Specify the title of the trend.
l Add a comment which is displayed beneath the title.
l Specify whether the trend is going to print in black and white, or in color. The selec-
tion that you make here will become the setting for the [General]PrinterColorMode
parameter.
l Define your printer setup. The printer that you select here will be set as the default
printer at the [General]TrnPrinter parameter.
l Specify whether or not the form displays the next time the function is used. This
check box sets the [General]DisablePlotSetupForm parameter.
820
Chapter 27: Logging and Trending Data
See Also
Exporting Trend Data
Function Purpose
The standard trend templates have buttons that call these functions to export data.
Note: You can also select part of your trend graph (click and drag) and copy the
underlying values to the Windows clipboard. You can then paste them into an Excel
spreadsheet. (If you are pasting millisecond values, you will need to create a custom
format for the TIME column to display these values correctly. To do this, select the
column and select Format | Cells. In the Number tab, select Custom for Category,
and type h:mm:ss.000 AM/PM.)
See Also
Using Trend History Files
821
Chapter 27: Logging and Trending Data
Period Comment
15th Use a new file every month beginning on the 15th of each month
25th June Use a new file every year beginning on the 25th of June
You can also specify the time of day to synchronize the start of the history file; for exam-
ple:
822
Chapter 27: Logging and Trending Data
Time Comment
See Also
Storage method
Storage method
You can select the storage method to use for trend tags and SPC tags. You are given a
choice of either Scaled or Floating Point. Scaled represents a 2-byte data storage method;
floating point uses 8 bytes.
Floating point storage has a dramatically expanded data range in comparison to Scaled
storage, allowing values to be more precise, but it also uses more disk space. Use scaled
where compatibility with pre-V5.31 trend history files is necessary.
You can set the necessary storage method via the Trend Tag or SPC Tag properties form
(press the F2 key to view the extended form). The storage method is set to Scaled by
default.
See Also
Calculating disk storage
Note: The storage method used for a trend (Scaled or Floating Point ) affects the
number of bytes necessary for each sample, so in order to calculate the disk space
necessary correctly it is important to base your calculations on the appropriate for-
mula.
To find out which storage method a particular trend is using, refer to the extended Trend
Tag Properties dialog. (By default, the Scaled storage method is used.)
See Also
Scaled
Floating Point
Reconfiguring history files
823
Chapter 27: Logging and Trending Data
Scaled
Each data sample requires two bytes of storage. You can therefore calculate the total disk
storage necessary for each trend by using the following formula:
Bytes necessary for each = 464 x No. Files + File Period (secs) x (No.
trend 176 + Files) x 2
For example, if a trend record produces one sample every ten seconds for one week, and
you are using five data files (five weeks), the number of bytes necessary is:
10
See Also
Floating Point
Reconfiguring history files
Calculating disk storage
Floating point
Each data sample requires eight bytes of storage. This alters the equation to:
Bytes nec- = 704 x No. Files + 160 + File Period (secs) x (No. Files) x 8
essary for
each trend
Sample Period (secs)
10
Note: The calculations above do not take into account the space necessary to store
the history file for each trend. This is because these files remain at a set size and
therefore do not significantly impact the amount of disk space necessary.
Note: For efficient trends storage, use Windows file compression. By using this
824
Chapter 27: Logging and Trending Data
method you often can reduce your files to 10% of their original size; the actual
amount of compression varies depending on the rate of change of the data.
See Also
Calculating disk storage
Reconfiguring history files
Note: You need to not delete history files (that CitectSCADA creates) from your hard
disk while your system is running, as the trend server will attempt to recreate the
files and this may cause system performance issues.
For example, if you decide to store a trend data file called MYFILE in a directory called
C:\CITECT\DATA\MYTRENDS, you can specify the full path to the file, for example:
or define a path substitution (for example MYDATA) and specify the path as:
825
Chapter 27: Logging and Trending Data
Path substitution provides greater control of data storage. You can change the location of
data files by changing the definition of the data path - instead of locating and changing
each occurrence of the data path.
See Also
Default path definitions
826
Chapter 27: Logging and Trending Data
Debugging Trending
The TrendDebug Citect.ini parameter is provided to help you while logging and trend-
ing data.
Example:
[Trend]
TrendDebug=n
827
Chapter 27: Logging and Trending Data
828
Chapter 28: Understanding Statistical Process Con-
trol
Statistical quality control (SQC) helps track and improve product or service quality. Sta-
tistical process control (SPC) is the primary tool of SQC and encompasses the collection,
arrangement, and interpretation of process variables associated with a product, in regard
to uniformity of quality.
Every process is subject to variation and therefore there is always room to improve proc-
ess consistency and quality. To respond to this, adopt a continuous improvement
strategy. By repeating the following cycle, a strategy of prevention can be implemented.
This is the key to using SPC effectively. Consider the following steps:
l Analyze the process
l What do we know about the variability of this process?
l Is this process statistically controllable (predictable)?
l Is the process capable of meeting the set requirements?
l What considerations are most important to meeting process quality criteria?
l Maintain (control) the process
l Improve the process
SPC encompasses the concepts of variation, statistical control, and process capability,
and typically uses the tools XRS control chart, capability chart, and the Pareto chart.
See Also
Process Variation
Statistical Control
Process Capability
XRS Control Charts
Capability Charts
Configuring capability charts
Pareto Charts
Using Statistical Process Control (SPC) with CitectSCADA
829
Chapter 28: Understanding Statistical Process Control
Process Variation
To use SPC effectively, understand the concept of variation. When a product char-
acteristic is measured repeatedly, each measurement is likely to differ from the last. This
is because the process contains sources of variability.
When the data is grouped into a frequency histogram, it will tend to form a pattern. The
pattern is referred to as a probability distribution and is characterized in three ways:
Note: Most SPC techniques assume that the collected data has a normal distribution.
830
Chapter 28: Understanding Statistical Process Control
Statistical Control
A process is said to be in statistical control when the only sources of variation are from
common causes. A statistically controllable process is desirable because it is predictable,
while a statistically uncontrollable process will yield unpredictable distributions.
Even though a process might not be statistically controllable, it might still meet require-
ments. Conversely, a process which is controllable might not meet requirements. This
issue is clarified by considering Process Capability.
See Also
Process Variation
Process Capability
A process is said to be capable when the percentage of samples outside the specification
limits is less than a predefined value. The following assumptions need to also be true:
l The process is statistically stable (only common causes of variation exist)
l The individual measurements conform to a normal distribution
l Measurement variation (due to the measuring instrument) is small
The specification limits are a reflection of the customers requirements and are selectable.
The percentage of samples that need to lie within the specification limits is calculated
from the standard deviation (sigma)"3-sigmas" on either side of the mean.
Note: The "3-sigma" term refers to the boundaries which are located 3 standard devi-
ations on either side of the center. For a normal distribution 99.74% of the samples
are expected to fall within this boundary.
831
Chapter 28: Understanding Statistical Process Control
Ultimately capability determines whether the process is statistically able to meet the spec-
ification or not. Reducing the effects of common variation will make your process more
capable, as shown here:
See Also
XRS Control Charts
832
Chapter 28: Understanding Statistical Process Control
These lines are used as a guide for analysis as they are based on the natural variability
of the process. These limits are not specification limits.
Capability Charts
The process capability chart is the frequency histogram and distribution of the process
mean data and is used to analyze process capability. This chart is drawn with center
line, lower specification limit and upper specification limit indicators in place. Inter-
preting capability charts is typically made with the Cp, Cpk, kurtosis and skewness
indices.
833
Chapter 28: Understanding Statistical Process Control
Cp index
The inherent process capability (Cp) is the ratio of tolerance to 6-sigma. Essentially this
index indicates whether the distribution would fit inside the USL and LSL limits. Its
meaning is defined as follows:
l Cp > 1.0 - Indicates the process variation will fit within the specified limits (USL and
LSL) and therefore, is capable.
l Cp < 1.0 - Indicates the process is not capable.
Cpk Index
The process capability based on the worst case (Cpk) is similar Cp. This index, however,
indicates where the mean lies in relation to the USL and LSL limits. It is used to math-
ematically clarify Cp. Its meaning is defined as follows:
l Cpk < 0 - Indicates the process mean is outside the specified limits (USL and LSL)
l Cpk = 0 - Indicates the process mean is equal to one of the specified limits.
l Cpk > 0 - Indicates the process mean is within the specified limits.
l Cpk = 1.0 - Indicates that one side of the 6-sigma limits falls on a specification limit.
l Cpk > 1.0 - Indicates that the 6-sigma limits fall completely within the specified lim-
its.
See Also
Pareto Charts
Pareto Charts
A Pareto chart is a tool which is used to analyze the relative frequency of deviations
from specifications or success criteria. The Pareto chart is a frequency histogram which
is ordered from highest to lowest. Unlike control and capability charts, this chart uses no
statistical guides.
834
Chapter 28: Understanding Statistical Process Control
Pareto charts emphasize Pareto's empirical law that any assortment of events consists of
a few major and many minor elements. In the context of SQC, it is important to select the
few vital major opportunities for improvement from the many trivial minor ones. The
Pareto chart is particularly useful for Cost-to-fix versus Deviation-frequency analysis.
In addition to the histogram, typically a cumulative percentage is also given. From top
to bottom, the percentage represents the ratio of the sum of evry value to this point, to
the sum of every value in the chart.
Note: Pareto charts are configured slightly differently and hence, are not included
here.
5. Click OK.
6. Double-click the graph display.
7. Enter the variable tag in the Genie pop-up.
8. Click OK.
9. Save the page.
See Also
SPC Tags
SPC Control Charts
SPC Tags
SPC tags specify data that is to be collected for use in SPC operations. Once data is
defined it can be dynamically analyzed (as SPC graphs and alarms) at run-time. SPC
tags are similar to trend tags.
835
Chapter 28: Understanding Statistical Process Control
Like trends, CitectSCADA can collect and store any amount of SPC data. The only restric-
tion on the amount of data that you can store is the size of the hard disk on your com-
puter. (CitectSCADA uses an efficient data storage method to optimize the use of storage
space on your computer's hard disk.) For long-term storage, you can archive the data to
disk or tape (without disrupting your runtime system). You can also log data at regular
intervals (periodic trend), or only when an event occurs (event trend), in the same
manner as Trend Tags.
Note: SPC does not support Periodic-Event trends, which is a combination of the
properties of Periodic and Event trends. In addition, if you use event-based SPC tags,
your display screen refresh rate may be slower than desired or practical for your
application.
When you define an SPC tag you will want to be sure to fill in the upper specification
limit (USL) and lower specification limit (LSL) if you intend to perform a capability anal-
ysis. These values have to accurately represent the users requirements, and the target
value lie midway between the two. If these fields are left blank the capability analysis
will be meaningless.
To configure an SPC tag:
1. Choose Tags | SPC Tags. The SPC Tags dialog box appears.
2. Enter the SPC tags properties.
3. Click Add to append a new record, or Replace to modify an existing record.
See Also
SPC tag properties
Note: When modifying an SPC tag, be aware that if the tag was created using the
equipment editor - equipment type workspace, the fields configured will be grayed
out in the tag properties form.
Use the SPC Tags dialog box to configure the SPC tag properties. Statistical Process Con-
trol (SPC) Tags have the following properties:
Equipment
The name of the equipment associated with the SPC Tag. Select or enter a name of 254
characters or less. You can optionally prefix a cluster name to the equipment name in
order to restrict the reference to a piece of equipment in only one cluster. The cluster
needs to be configured otherwise the compile will not be successful. Use this method as
836
Chapter 28: Understanding Statistical Process Control
If using the File Name property, ensure that the SPC tag uses a unique name. Two tags
accessing the same file can result in system errors which may include lost or corrupted
trend/SPC data.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
Type
The type of SPC trend:
1. TRN_PERIODIC
2. TRN_EVENT
837
Chapter 28: Understanding Statistical Process Control
Note: SPC does not support Periodic-Event trends, which is a combination of the
properties of Periodic and Event trends. In addition, if you use event-based SPC tags,
your display screen refresh rate may be slower than desired or practical for your
application.
Expression
The logged value of the SPC tag. Enter a value of 254 characters or less. You can log
individual variables by using a Variable Tag, for example:
Expression PT104
The value of the process variable PT104 is logged. Variable PT104 has to be defined as a
variable tag. You can also log any Cicode expression or function, for example:
Expression PT104/COUNTER
Comment Logs Variable Tag PT104 divided by the Variable Tag COUNTER
Subgroup Size
The size of each subgroup. The default value for this value is 5. Valid values are 1 - 25
inclusive.
Storage Method
If you edit this property in an existing project, delete associated SPC trend files before plac-
ing the system back in service.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
Select either Scaled or Floating Point as the storage method for the SPC data (64 char-
acters). The key difference between these two options is that Scaled is a two-byte data
storage method, whereas Floating Point uses eight bytes.
Floating Point storage has a dramatically expanded data range in comparison to Scaled
storage, allowing values to have far greater resolution. However, you need to consider
that it also uses a lot more disk space. Scaled should be used where compatibility with
pre-V5.31 trend history files is necessary.
838
Chapter 28: Understanding Statistical Process Control
This property is optional. If you do not specify a sample period, the sampling period
will default to 10 seconds.
Note: If you edit this property in an existing project, delete or move or move the asso-
ciated trend files before you run the new runtime system.
839
Chapter 28: Understanding Statistical Process Control
If you are unfamiliar with Process Capability and capability indices, ask for expert opin-
ion. Rather than leave this blank (at least) attempt an estimate - Enter a value that you
think is the highest acceptable value of this tag. If you do leave this field blank only your
capability analysis will be affected.
Range
The calculation override for process range (R bar). If a value is specified here it will be
used in every SPC calculation, instead of the value calculated by CitectSCADA. This will
affect the calculation of control limits which are normally a function of the collected sam-
ples of data.
You should not use this field unless you are experienced in SPC.
St. Deviation
The calculation override for process standard deviation (s bar). If a value is specified
here it will be used in every SPC calculation, instead of the value calculated by Citect-
SCADA. This will affect the calculation of control limits which are normally a function
of the collected samples of data.
Do not use this field unless you are experienced in SPC.
No. Files
If you edit this property in an existing project, delete associated SPC trend files before plac-
ing the system back in service.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
The number of history files stored on your hard disk (for this tag).
By default, two history 2 history files are stored on your hard disk. The maximum
number of files you can specify is 270.
Period
If you edit this property in an existing project, delete associated SPC trend files before plac-
ing the system back in service.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
840
Chapter 28: Understanding Statistical Process Control
If you edit this property in an existing project, delete associated SPC trend files before plac-
ing the system back in service.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
The time of day to synchronize the beginning of the history file, in hh:mm:ss (hours:mi-
nutes:seconds). If you do not specify a time, the file is synchronized at 0:00:00 (i.e. mid-
night).
The following fields are implemented with extended forms (press F2). Note that some of
the fields listed below may be displayed in the previous section of the form.
Trigger
The Cicode expression (or variable tag) that triggers data logging. Enter a value of 254
characters or less. For example:
Trigger PT104<500
In this example, logging occurs when the value of the variable tag (PT104) falls below
500.
For a periodic SPC trend, data is logged only while the value of the trigger is TRUE. In
the above example, data is logged continuously while the value of PT104 remains less
than 500. Logging ceases when the value rises to (or above) 500. Logging does not occur
again until the value of PT104 falls below 500.
841
Chapter 28: Understanding Statistical Process Control
You do not have to specify a trigger for a periodic SPC trend. If you do not specify a
trigger for a periodic SPC trend, then logging will occur continuously.
For an event SPC trend,data is logged once when the value of the trigger changes from
FALSE to TRUE. In the above example, one sample is logged when the value of PT104
first becomes less than 500. Another sample is not logged until the value of PT104 rises
to (or above 500) and again falls below 500.
File Name
The file where the data is to be stored. You need to specify the complete path or use path
substitution.
When CitectSCADA collects data from your plant floor, it stores the data in a file on the
hard disk of your computer. When it subsequently uses the data to display an SPC trend,
it reads the data from this file. (CitectSCADA uses a separate file for each SPC tag.)
By default, CitectSCADA stores the file in the [DATA] directory on the hard disk where
you installed CitectSCADA. The default name of the file is the SPC tag name. However,
you can specify an alternate file name like this:
where [DATA] specifies the disk and path for the data. Use path substitution to make
your project more 'portable'.
The File Name property is optional. If you do not specify a file name, the file name
defaults to [DATA]:<Name> on the hard disk where you installed CitectSCADA. Where
<Name> is the SPC Tag Name.
Note: If you use the File Name property, confirm that no other SPC tags or trend tags
use the same filename. Two tags accessing the same file can result in system errors
which may include lost or corrupted trend/SPC data.
If using the File Name property, ensure that the SPC tag uses a unique name. Two tags
accessing the same file can result in system errors which may include lost or corrupted
trend/SPC data.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
Note: Avoid using a file extension when specifying a file name. If you edit this
842
Chapter 28: Understanding Statistical Process Control
property (change the file name or path) in an existing project, existing SPC data is
ignored.
Area
The area to which the SPC data belongs. Only users with access to this area (and any
necessary privileges) will be able to display the SPC data on an SPC page. For example,
if you enter Area 1 here, operators need to have access to Area 1 (plus any necessary
privileges) to display the SPC data.
Privilege
The privilege necessary by an operator to display the SPC data on an SPC page.
Eng Units
The engineering units of the variable/expression being logged. The engineering units are
used by the SPC trend scales and SPC trend cursor displays.
Format
The format of the variable/expression being logged. The format is used by the SPC trend
scales and SPC trend cursor displays.
This property is optional. If you do not specify a format, the format defaults to ####.#.
Deadband
The value that SPC Tag needs to return to before the SPC data becomes inactive.
Historize
This field enables you to automatically historize and publish the specified variable tag
in Schneider Electric's Historian application.
If you set this field to "TRUE", the variable will be included in an automated con-
figuration process within the Historian environment. If you set the field to "FALSE" (or
leave it blank), the variable will not be included.
843
Chapter 28: Understanding Statistical Process Control
Note: If you want to develop your own XRS template, the method is to copy and
modify and existing template.
Capability charts
The process capability chart is a frequency histogram and distribution of the sample
data currently displayed (on the Mean chart). CitectSCADA automatically takes the data
being trended, builds a distribution, adds the LSL and USL. It also calculates the Cp,
Cpk, kurtosis, and skewness indices.
The process capability is defined in relation to the upper and lower specification limits
(USL and LSL) for a given SPC Tag. These values are defined in SPC Tags and accu-
rately represent the users requirements.
See Also
Configuring capability charts
844
Chapter 28: Understanding Statistical Process Control
1. Define the SPC Tags and specify the LSL and USL.
2. Create the page using a Capability (Cpk) template.
Pareto Charts
Pareto analysis is a technique used to identify the relative importance of problems and
conditions. The Pareto chart is a frequency histogram ordered from highest to lowest-
CitectSCADA automatically orders the bars at run-time. The data for each bar in the his-
togram represents one CitectSCADA variable - as defined in Variable Tags. Do not use
SPC tags.
Note: Typically the frequency in a histogram is of integer type, though you can use
floating point types if you want. Negative values are not valid.
See Also
Configuring Pareto charts
1. Define the Variable Tags (Pareto charts do not use SPC Tags).
2. Create the page using a Pareto template.
To configure a Pareto chart:
845
Chapter 28: Understanding Statistical Process Control
SPC Alarms
CitectSCADAautomatically monitors several special kinds of conditions that are specific
to SPC data. When specific patterns or events occur to an SPC tag, it will set the appro-
priate alarm. Typically these alarms are related to, and used in conjunction with, the
XRS control charts.
SPC alarms are configured differently to standard digital alarms to provide for this extra
functionality. SPC alarms needs to be configured using the Advanced Alarms form. You
use the SPCAlarms Cicode function to check for the condition of the alarms:
Note: An SPC alarm can only be defined on an Alarm Server in the same cluster as
the Trends Server that contains the SPC tag (though the variable tag referenced in the
SPC tag can be on a different IOServer cluster).
Advanced Alarms
The SPC (Trends) Server checks for any specified alarm conditions. When one is
detected, it informs the Alarm Server that an alarm has occurred. Be aware of the
number of subgroups displayed on your SPC charts, and the number used in SPC alarm
calculations (as set by the [SPC]AlarmBufferSize parameter). If these two values differ,
SPC alarms might not correlate with your SPC charts.
The following list shows the alarms types that are valid:
Name Description
XFreak Single point greatly differs (2 sigma) from the center line.
XOutsideCL Process mean outside either of the control limits (UCL or LCL).
846
Chapter 28: Understanding Statistical Process Control
XOut- Process mean outside the alert limits which are 67% of the UCL and LCL.
sideWL
XGrad- Process mean is gradually drifting down to a new level indicated by sev-
ualDown eral consecutive points below the mean.
XErratic Large fluctuations that are greater than the control limits.
XMixture Several consecutive points are far from (outside 1 sigma of) the center
line.
ROutsideCL Process range outside either of the control limits (UCL or LCL).
Note: The above alarms rely on n number of consecutive points to generate the
alarm. The value of n can be set for each type of alarm through SPC parameters.
See Also
SPC Formulas and Constants
847
Chapter 28: Understanding Statistical Process Control
Subgroup Mean ( ):
is the value of the single sample in the group, and is defined by:
Where is the current sample value and is the previous sample value. The
number of moving ranges in the process is always one less than the number of sub-
groups.
Subgroup Standard Deviation (s):
is a measure of absolute variation or dispersion. It describes how much the sample
values differ from their mean, and is estimated by:
The number of subgroup standard deviations in the process is always one less than the
number of subgroups.
Process Average ( ):
Where , , and are the subgroup means, and m is the total number of subgroups
in the process.
Process Range ( ):
Where MR , MR , and MR are the subgroup moving ranges, and m is the total
2 3 m
number of subgroups in the process.
Process Standard Deviation ( ):
848
Chapter 28: Understanding Statistical Process Control
Subgroup Mean ( ):
is the average (not median or center) of the samples in the group, and is defined by:
Where X , X , and X are the sample values in the subgroup, and n is the total number
1 2 n
of samples in the subgroup.
Subgroup Range (R):
is the difference between the highest and lowest samples in the group, and is defined by:
Where X is the maximum sample value and X is the minimum sample value in
max min
the group.
Subgroup Standard Deviation (s):
is a measure of absolute variation or dispersion. It describes how much the sample
values differ from their mean, and is defined by:
Where X's are the sample values in the group, is the group average, and n is the
number of samples in the group.
Process Average ( ):
Where , , and are the subgroup averages, and m is the total number of sub-
groups in the process.
Process Range ( ):
849
Chapter 28: Understanding Statistical Process Control
Where R , R , and R are the subgroup ranges, and m is the total number of subgroups
1 2 m
in the process.
Process Standard Deviation ( ):
Where s , s and s are the group standard deviations, and m is the total number of
1 2 m
groups in the process.
Average Control Limits (UCL and LCL ):
x x
Specify the approximated 3-sigma boundaries. For a normal distribution 99.74% of the
samples will fall within this boundary.
Where is the Process Range and A is a constant (given in the Control Chart Line Con-
2
stants table).
Range Control Limits (UCL and LCL ):
R R
Specify the approximated 3-sigma boundaries. For a normal distribution 99.74% of the
samples will fall within this boundary.
Where is the Process Range and D and D are constants (given in the Control Chart
3 4
Line Constants table).
Standard Deviation Control Limits (UCL and LCL ):
s s
Specify the approximated 3-sigma boundaries. For a normal distribution 99.74% of the
samples will fall within this boundary.
850
Chapter 28: Understanding Statistical Process Control
Where is the Process Standard Deviation and B and B are constants given in the
3 4
Control Chart Line Constants table).
Process Capability (Cp):
Is the capability of a process to meet a specific tolerance. A process is considered capable
when the percentage of samples of a variable for that process that fall within the upper
and lower specification limits is greater than a specified value.
The inherent process capability is defined as:
l Cp > 1.0 - Indicates the process variation is within the specified limits (USL and LSL)
and therefore, is capable.
l Cp < 1.0 - Indicates the process is not capable.
The process capability based on worst case data is defined as:
l Cpk < 0 - Indicates the process mean is outside the specified limits (USL and LSL)
l Cpk = 0 - Indicates the process mean is equal to one of the specified limits.
l Cpk > 0 - Indicates the process mean is within the specified limits.
l Cpk = 1.0 - Indicates that one side of the 6-sigma limits falls on a specification limit.
l Cpk > 1.0 - Indicates that the 6-sigma limits fall completely within the specified lim-
its.
Skewness (Sk):
Is the degree of asymmetry of a frequency distribution (usually in relation to a normal
distribution).
where N is the number of samples for the entire process (i.e. Subgroup Size * number of
Subgroups).
l Skewness > 0 - Indicates that the histogram's mean (and tail) is pushed to the right.
l Skewness < 0 - Indicates that the histogram's mean (and tail) is pushed to the left.
Kurtosis (Ku):
Is the degree of peakedness of a frequency distribution (usually in relation to a normal
distribution).
851
Chapter 28: Understanding Statistical Process Control
where N is the number of samples for the entire process (i.e. Subgroup Size * number of
Subgroups).
l Kurtosis < 3 - Indicates a thin distribution with a relatively high peak.
l Kurtosis > 3 - Indicates a distribution that is wide and flat topped.
Group A2 D2* D3 D4 B3 B4
1 2.660 0 0 3.267
1.12- 3.26-
8 7
2 1.880 0 0 3.267
3.26-
7
3 1.023 0 0 2.568
2.57-
4
4 0.729 0 0 2.266
2.28-
2
5 0.577 0 0 2.089
2.11-
4
852
Chapter 28: Understanding Statistical Process Control
0.13- 1.86-
6 4
853
Chapter 28: Understanding Statistical Process Control
3 7
* D2 is only used for estimating standard deviation when there is one sample per sub-
group.
Reference ANSI Z1.1-1985, Z1.2-1985 & Z1.3-1985: American National Standard, Guide
for Quality Control Charts, Control Chart Method of Analyzing Data, Control Chart Method of
Controlling Quality During Production.
Hints
Double-click the chart area on an SPC page to display the SPC Genie and change the
SPC variables.
The tools and menu items in these procedures automatically open the CitectSCADA
form for you. Move the cursor till it changes to a hand to find these tools or options.
854
Chapter 29: Reporting Information
You can request regular reports on the status of your plant, and reports that provide
information about special conditions in your plant. Reports can be run on a request
basis, at specified times, or when certain events occur (such as a change of state in a bit
address). Output from a report is controlled by a device. A report can be printed when it
runs or saved to disk for printing later. You can use a text editor or word processor to
view, edit, or print the report, or you can display it in CitectSCADA as part of a page.
Reports can also include Cicode statements that execute when the report runs.
Reports are configured in two stages:
l Report properties
l Report format file
If report data is associated with an I/O Device that does not initialize properly at startup
or goes offline while CitectSCADA is running, the associated data is not written to the
report (because the values would be invalid). An error code is written instead.
See Also
Configuring reports
Running Reports
Report Format File
Handling Communication Errors in Reports
Configuring reports
To design, configure and use a report:
1. Configure a device for output of the report (for example, if you want to save a report
to a file when it is run, set up an ASCII_DEV device).
2. Configure the report properties.
3. Edit the report format file. Remember that for an RTF report, the report format file
needs to be saved in RTF format (that is, with an .RTF file extension).
4. Define your PC as a reports server using the Computer Setup Wizard.
To configure report properties:
855
Chapter 29: Reporting Information
See Also
Reports dialog box
Note: Where Cluster Name is left blank, the name needs to be unique to every
defined cluster.
Cluster Name
The name of the cluster that runs this report. If the Cluster Name is not set, then Citect-
SCADA considers this report to run on every defined cluster.
Time
The time of day to synchronize the report, in hh:mm:ss (hours:minutes:seconds). If you
do not specify a time, the report is synchronized at 0:00:00 (i.e., midnight). Enter a value
of 32 characters or less.
Period
The period of the report, in hh:mm:ss (hours:minutes:seconds). Enter a value of 32 char-
acters or less. Alternatively you can:
l Specify a weekly period by entering the day of the week when the report is to start,
for example, Monday, Tuesday, Wednesday, etc.
l Specify a monthly period by entering the day of the month when the report is to start,
for example, 1st, 2nd, 3rd, 4th, 5th, etc.
l Specify a yearly period by entering the day and the month when the report is to start,
for example, 1st January, 25th February, etc. The day and month needs to be sep-
arated by a space.
If you do not specify a period, the report is run daily.
Trigger
856
Chapter 29: Reporting Information
Any Cicode expression (or Variable tag) to trigger the report. Enter a value of 254 char-
acters or less. If the result of the expression (in this field) is TRUE, and the Time and
Period fields are blank, the report is run. The report is only run when the expression
becomes TRUE, and it needs to become FALSE then TRUE again before the report is re-
run.
Report Format File
The name of the report format file. Enter a value of 253 characters or less. If you do not
specify a file extension, it defaults to .RPT. Any valid file name can be used; however,
you cannot use a Path Substitution in this field. If you specify a filename without a path,
the file saves into the directory predefined as Run. The report is assumed (by the Citect-
SCADA compiler) to be ASCII unless an RTF extension is used.
Note: The file name of your report format file can be up to 64 characters long, or 253
characters including the path. It can consist of any characters other than the single
quote ('), and the semi-colon (;).
Output Device
The device where the report will be sent. Enter a value of 16 characters or less.
For RTF reports that are to be saved as a file, select a device of type ASCII_DEV here.
Due to the differing natures of their content; however, it is not recommended that the
same ASCII device be used for logging both RTF and non-RTF reports.
Note: If two or more reports are running at the same time and are sending their out-
put to the same printer, the output of each report can become mixed. You need to use
semaphores to control the access to the printer in each report. See the SemOpen\
Cicode function. If the report only contains Cicode statements (and has no output
data), this property is optional.
Comment
Any useful comment. Enter a value of 48 characters or less.
The following fields are implemented with extended forms (press F2).
Privilege
The privilege necessary by an operator to run this report if the report is a command-
driven report. Enter a value of 16 characters or less.
If the report is time-driven or event-driven, this property is ignored.
857
Chapter 29: Reporting Information
privilege to the command(s) that run the report. If you do assign a different privilege
to the commands, an operator needs to have both privileges to run the report.
Area
The area to which this report belongs. Enter a value of 16 characters or less. Only users
with access to this area (and any necessary privileges) will be able to run this report. For
example, if you enter Area 1 here, operators need to have access to Area 1 (plus any nec-
essary privileges) to run this report.
Running Reports
You can run a report by the following methods:
l Automatically when CitectSCADA starts up
l Automatically at a specified time and period
l Automatically when an event is triggered
l By using a command
l A combination of the above
See Also
Running a report on startup
Specifying times and periods
Using triggers
Using commands
858
Chapter 29: Reporting Information
Period Comment
You can also specify the time of day to synchronize the report, for example:
Time Comment
The time synchronizes the time of day to run the report and, with the Period, determines
when the report is run, for example:
Time Period
6:00:00 1:00:00
In this example, the report is run every hour, on the hour. If you start your runtime sys-
tem at 7:25am, your report is run at 8:00am, and then every hour after that.
See Also
Using triggers
Using triggers
You can use any Cicode expression (or variable tag) as a trigger for a report. If the result
of the expression (in the Trigger field) becomes TRUE, and if the Time and Period fields
are blank, the report is run. For example:
Time
Period
This report is only run when the expression (Trigger) becomes TRUE, i.e., when the dig-
ital tag RCC1_MC is ON and the analog tag RCC1_SPEED is less than 10. The expres-
sion needs to become FALSE and then TRUE again before the report is run again.
859
Chapter 29: Reporting Information
If you use the Time and/or Period fields, the trigger is checked at the time and/or period
specified, for example:
Time 6:00:00
Period 1:00:00
This report is run each hour, but only if the expression (Trigger) is TRUE (i.e., if the dig-
ital tag RCC1_MC is ON and the analog tag RCC1_SPEED is less than 10).
See Also
Using commands
Using commands
If the Time, Period, and Trigger fields are blank, the report can only be run by a com-
mand that calls the Cicode Report() function.
860
Chapter 29: Reporting Information
You can include Cicode expressions and variables by enclosing them (and optional for-
mat specifications) in braces {} - for example:
{TIME(1) }
{PV12:####.##}
{PV12:4.2}
The size of each field (number of characters) is determined by either the format spec-
ification, or by the number of characters between the braces. In the above example, the
variable PV12 is formatted with four characters before the decimal point and two char-
acters after.
You do not have to include the format, for example:
{PV12}
Here, the variable is formatted using only four characters (the number of characters
between the braces).
The following rules apply when logging a report to a database device:
l The format (for the report field) do not specify a field size greater than the size of the
relevant field specified in the device.
l No spaces are allowed between each field specification, for example:
{TIME(1) }{PV12:####.##}{PV12:4.2}
{CICODE}
Statements;
{END}
The block of Cicode is delimited by the commands {CICODE} and {END}. After the {END}
command, the report switches back into WYSIWYG mode. If the entire report is Cicode
or the last section is Cicode, the {END} command is not necessary.
A block of Cicode does not send any output to the device unless you use either the Print
() or PrintLn() functions. If you use one of these functions, the argument is printed to the
device.
Cicode variables (ASCII format only)
You can also declare variables for use within your Cicode block. This is not available in
RTF or HTML format files. Declare any variables at the beginning of the file (i.e. before
any report format or Cicode). Add a {CICODE} block first; for example:
861
Chapter 29: Reporting Information
{CICODE}
INT nVar1;
STRING sVar2;
Statements;
{END}
Remainder of report
Including comments
You can include comments by using the comment character `!' enclosed in braces - for
example:
{!This is a Comment}
A comment in the body of a report differs from a comment in a Cicode block: a comment
in a Cicode block does not require braces.
Including other report elements
The following table describes other elements you can include in reports.
To... Do this...
See Also
Report example
Report example
The following is an example of a report format file (for a printer or ASCII file device):
-----------------------------------
SHIFT REPORT
-----------------------------------
{Time(1) } {Date(2) }
Shift Production {Shift_Prod:###.##} tons
Total Production {Total_Prod} tons
{! The following Cicode displays "Shift Report Complete" on the
screen}
{CICODE}
862
Chapter 29: Reporting Information
Print("End of Report")
Shift_Prod = 0; ! Reset the Shift production tonnage
This report produces the following output to the device and displays "Shift Report Com-
plete" on the graphics page.
-----------------------------------
SHIFT REPORT
-----------------------------------
6:00am 12/3/92
Shift Production 352.45 tons
Total Production 15728 tons
End of Report
1. From the Reports properties form, select the relevant report, and click Edit. Alter-
natively, click Edit Report.
2. Select the report to edit
3. Click Edit.
Note: If the report format file exists, it is loaded into the editor for you to edit. If the
file does not exist, CitectSCADA creates a new file.
863
Chapter 29: Reporting Information
See Also
Reporting errors in I/O Device data
Suppressing reports
Error Meaning
#ERR An uncommon error has occurred. (Use the IsError function to find the occur-
rence.)
Data from this scheduled device is not available as it has not reached its sched-
#WA- uled interval and has no cache value.
IT
For example:
Report Format:
864
Chapter 29: Reporting Information
If the above report is run when the value of PV_1 is out of range (for example 101.5),
SP_1 is 42.35 and OP_1 is 60.0, the output of the report is:
Report Output:
When reports are written to a database device, you might sometimes want to disable the
alert messages and write the values to the report (even if the values are invalid). Use the
ERR_FORMAT_OFF command to disable alert messages and write data as values.
For example:
Report Format:
{ERR_FORMAT_OFF}
{PV_1} {SP_1} {OP_1}
If the above report is run when the value of PV_1 is out of range (for example
101.5)
, SP_1 is 42.35 and OP_1 is 60.0, the output of the report is:
Report Output:
42.35 60.0
Note: If an I/O Device goes offline and you have disabled communication errors, the
value printed into the report is either 0 (zero) or the last value read from the I/O
Device when the report was last run. In either case, the value is invalid.
See Also
Suppressing reports
Suppressing reports
You can suppress reports that are triggered from I/O Devices if a communication error is
detected by using the [Report]ComBreak parameter. For example, you might configure a
report to be run every hour when a bit is on. The I/O Device associated with that bit goes
offline. If the [Report]ComBreak parameter is 0, the report does not run. If the parameter is
1, and if the latest valid value that was read from that bit was 1, the report is run.
This parameter only applies to the trigger of the report, not to the data in the report.
865
Chapter 29: Reporting Information
866
Chapter 30: Using Labels
Labels allow you to use a series of commands (or expressions) in your system without
having to repeat them each time they are used. When you compile the project, the com-
mands (or expressions) defined in the label are substituted in every occurrence of the
label.
Labels are similar to macros used in programming languages such as Basic or 'C'.
You often use the same combination of statements in different commands. For example,
when an operator acknowledges an alarm, you might want to log the details to a file.
Such a command would require several statements:
Instead of entering the same statements when necessary in a command, you can define a
label, and then use the label instead of the statements. When you compile your project,
each occurrence of the label is resolved; that is, the expression in the label is substituted
for the label name. For example:
When an operator issues this command, the expression defined in the label is sub-
stituted in the command.
867
Chapter 30: Using Labels
You can also use the label in combination with other statements, for example:
868
Chapter 30: Using Labels
The main advantage of a label is that it is a global definition, recognized throughout the
CitectSCADA system. If you want to change something (in the above example you might
change the file name or the way the data is logged), you only need to change it in one
place - in the label definition. Other occurrences of the label name will reflect the
changes.
See Also
Using Arguments in Labels
Converting Values into Strings
Substituting Strings
Defining Labels
Expression X = X + STEP
Here, "X" is the variable to be incremented and "STEP" determines the amount of the
increment. You can then use this label in a command, as in the following example:
An operator can use this command to increment the value of SP12 by 10.
Expression X = X + STEP
When you subsequently use this label without any arguments in a command, the default
value is used, for example:
869
Chapter 30: Using Labels
Command Inc(SP12);
See Also
Converting Values into Strings
In the above example, only one argument (TAG) is passed to a function that actually
requires three arguments (AN, font and message). When you use this label in a com-
mand, the function uses AN 25 and the message displays in "BigFont". Only the third
argument (the actual message) varies.
The third argument passed to the function is:
...#TAG+"="+TAG:##.#
#TAG indicates that the name of the tag (and not its value) is displayed.
TAG:##.# indicates that the value of TAG is converted to a string and displayed. It is for-
matted with two numbers before the decimal point and one number following the dec-
imal point.
You can use the above label in a command such as:
Command ShowVariable(SP12);
When you use this command in your runtime system, the command displays
"SP12=<value>", where value is the actual value of SP12 at the time (for example
SP12=42.0).
See Also
Substituting Strings
870
Chapter 30: Using Labels
Substituting Strings
You can pass a string substitution as an argument in a label, for when several variables
have part of the variable name in common; for example:
In the above example, TAG is the common portion of the variable name, and is sub-
stituted at each occurrence in the expression. To display the difference between two var-
iables CP123 and SP123, you would specify SPDev(123) in a command, for example:
Command SPDev(123);
You cannot use a substitution within a string. In the following example, the DESC
Parameter (a text description) will not be substituted as it is between quotation marks:
See Also
Defining Labels
Defining Labels
You can define labels to use in your system.
To define a label:
871
Chapter 30: Using Labels
872
Chapter 31: Using Devices
A device transfers high-level data (such as a report, command log or alarm log) between
CitectSCADA and other elements (such as a printer, database, RTF file, or ASCII file) in
your CitectSCADA system. Devices are similar to I/O Devices in that they both allow
CitectSCADA to exchange data with other components in your control and monitoring
system.
You can use devices for various purposes; for example, to send the output of a report to
a printer, or write data to a database.
873
Chapter 31: Using Devices
874
Chapter 31: Using Devices
See Also
Using groups of devices
Configuring Devices
Formatting Data in the Device
Using Device History Files
About Print Management
See Also
Using devices to read data
875
Chapter 31: Using Devices
Note: When you read from a group of devices, data is only read from the first device
in the group.
See Also
Configuring Devices
Configuring Devices
You need to configure your devices before you can use them with your CitectSCADA sys-
tem.
To configure a device:
876
Chapter 31: Using Devices
Specifies how the data is formatted in the device. The format is determined by the type
of Device, and the data that is sent to the device. Enter a value of 120 characters or less.
See Using Command Fields for information on available fields.
If you are logging alarms or command messages, you need to specify a format, or no
data is written to the device.
Note: The log device for a command is specified wherever the command is defined.
The log device for an alarm is specified at the Alarm Categories form.
When producing reports, the format is ignored. (The format defined for the report is used
to write the report to the device.)
See Also
Formatting Data in the Device
Alarm display fields
Alarm summary fields
Using Command Fields
Header
Additional information for the device. Enter a value of 120 characters or less.
Printer devices
The header is printed on each page. A new page is created each time the form length is
reached. The [Device]FormLength parameter is used to set the form length.
ASCII file devices
Not applicable.
dBASE database devices
Contains the field name used to index the database, for example:
Header {Name}
Note:CitectSCADA database devices only support STRING data types. If you use
another database editor to modify your database, you will want to verify that fields
are in string format.
File Name
877
Chapter 31: Using Devices
The file name of the device. Enter a value of 253 characters or less.
Printer devices
The printer port or UNC name, for example:
When you specify a printer port, you need to include the colon character (:), otherwise
CitectSCADA tries to write to a file (device) with a name similar to the printer port (i.e.
LPT1 or COM2).
Note: When using a UNC name in Windows 95, the printer needs to be in the
Printers section of the Control Panel.
This property is optional. If you do not specify a file name, File Name defaults to \Citec-
tSCADA 7.10\bin\\PowerSCADA Expert 7.30\bin\<Name> on the hard disk where you installed
CitectSCADA. <Name> is the first eight characters of the device name. If you use this
property, verify that no other devices have the same first eight characters in the device
name.
SQL database devices
The database table, for example:
Type
The type of device. Enter a value of 16 characters or less.
878
Chapter 31: Using Devices
PRINTER_DEV Printer
* When defining RTF report properties, an ASCII device would be selected if the report
was to be saved as a file.
This property is optional. If you do not specify a type, the device Type is ASCII_DEV
unless:
The file name is a printer device (LPT1: to LPT4: or COM1: to COM4: or a UNC name),
where Type is PRINTER_DEV, or
The file name extension is .DBF, where Type is dBASE_DEV.
See Also
About Print Management
No. Files
The number of history files. Enter a value of 4 characters or less.
By default, CitectSCADA creates a single data file for each device. (This data file is called
<filename.TXT> or <filename.DBF>, depending whether the device is an ASCII device or
database device.) The number of history files you specify here are in addition to the data
file.
Note: If you do not want history files created, you need to enter 0 (zero) here, and set
the [Device]CreateHistoryFiles parameter to 0; otherwise, 10 history files will be
created as a default. You need to also verify that the data file is of a fixed size. (If the
data accumulates, the file eventually fills the hard disk.)
Time
879
Chapter 31: Using Devices
The time of day to synchronize the beginning of the history file, in hh:mm:ss (hours:mi-
nutes:seconds). Enter a value of 32 characters or less. If you accepted the default number
of history files above, and you specify a time and period, 10 history files will be created.
If you do not specify a time, the file is synchronized at 0:00:00 (i.e. midnight).
If you omit both the time and the period, additional history files will still be created
(with the default time and period). If you don't want history files to be created, you need
to set the [Device]CreateHistoryFiles parameter to 0 (zero).
Period
The period of the history file, in hh:mm:ss (hours:minutes:seconds). Enter a value of 32
characters or less. Alternatively you can:
l Specify a weekly period by entering the day of the week on which to start the history
file, for example Monday, Tuesday, Wednesday, etc.
l Specify a monthly period by entering the day of the month on which to start the his-
tory file, for example 1st, 2nd, 3rd, 4th, 5th, etc.
l Specify a yearly period by entering the day and month on which to start the history
file, for example 1st January, 25th February, etc. The day and month needs to be sep-
arated by a space.
If you accepted the default number of history files above, and you specify a time and
period, 10 history files will be created.
If you do not specify a period, the period defaults to Sunday (weekly).
If you omit both the time and the period, additional history files will still be created
(with the default time and period). If you don't want history files to be created, you need
to set the [Device]CreateHistoryFiles parameter to 0 (zero).
Cluster Name
Select a cluster from the list of clusters defined previously with the Servers, Clusters com-
mand in the Project Editor. See "Cluster Definitions ". If this is a single cluster system
this field can be left blank.
Process
Select the type of server (or client) on which the process runs that sends data to the
device. This field is used to prevent a history file being created while the device is active.
If there is no history processing then this field can be left blank
Comment
Any useful comment. Enter a value of 48 characters or less.
880
Chapter 31: Using Devices
Configuration
Usage
When configured, the device can be associated with SCADA elements, or used in Cicode.
SQL devices are used in Cicode in a slightly different way to other types of devices. For
example, the order of DevSetField and DevAppend is different with SQL devices.
The following example makes a connection to a SQL device, cleans the records, adds
new records to the device, finds records matching the condition, then closes the con-
nection:
FUNCTION
DataSQLDeviceLogging()
STRING strValue = "";
INT hConnection = DevOpen("mySQLDevice") // open the device
IF hConnection <> -1 THEN
DevZap(hConnection); //clean the records
DevSetField(hConnection, "date_","30-03-2011");
DevSetField(hConnection, "day_","Wednesday");
DevSetField(hConnection, "month_","March");
DevSetField(hConnection, "year_","2011");
DevAppend(hConnection);
DevSetField(hConnection, "date_","31-03-2011");
DevSetField(hConnection, "day_","Thursday");
DevSetField(hConnection, "month_","March");
DevSetField(hConnection, "year_","2011");
881
Chapter 31: Using Devices
DevAppend(hConnection);
DevSetField(hConnection, "date_","01-04-2011");
DevSetField(hConnection, "day_","Friday");
DevSetField(hConnection, "month_","April");
DevSetField(hConnection, "year_","2011");
DevAppend(hConnection);
DevSetField(hConnection, "date_","02-04-2011");
DevSetField(hConnection, "day_","Saturday");
DevSetField(hConnection, "month_","April");
DevSetField(hConnection, "year_","2011");
DevAppend(hConnection);
When producing reports, the device format is ignored. The format defined for the report
(i.e. the report format file) is used to write the report to the device.
To include CitectSCADA data you need to specify the field name and (optionally a width
for each field to be printed or written to the file. The format has the following syntax:
882
Chapter 31: Using Devices
Format {Tag,8}{Name,32}
In this case, two fields are printed or written to the file - Tag, with 8 characters, and
Name, with 32 characters. The width specifier is optional - if you do not specify a width,
the width of the field is determined by the number of characters between the braces, for
example:
Format {Name }
In this case, Name is followed by four spaces - the field is printed or written to the file
with 8 characters.
The justification specifier is optional - if it is omitted, the field is left justified. If you use a
justification specifier, you need to also use the width specifier.
To display field text in columns, use the tab character (^t) - for example:
Any spaces that you use in a text string are also included in the string.
See Also
Formatting Data in the Device
Using a database device
883
Chapter 31: Using Devices
Format {Tag,8}{Name,32}
In this case, the database is created with two database fields - Tag, with 8 characters,
and Name, with 32 characters. The size of each database field is determined by the
width you specify in the format. (Justification character are ignored.) Every database field
is character (string) field types.
You can define your own fields (as well as the standard CitectSCADA fields) for the data-
base device, for example:
Format {Name,16}{Water,8}{Sugar,8}{Flour,8}
{Salt,8}{Yeast,8}{Milk,8}
Don't leave any spaces between each field definition or at the end of the format string, or
CitectSCADA creates extra fields for each space (in the device). Do not specify a field
name longer than 10 characters, or CitectSCADA truncates the name to 10 characters.
(The dBASE file format limits field names to a maximum of 10 characters.)
In this example, the database is created with seven database fields. To access the above
dBASE device, use a Cicode function similar to the following:
hDev = DevOpen("Recipe");
DevFind(hDev, "Name", "Bread");
PLC_Water = DevGetField(hDev, "Water");
PLC_Sugar = DevGetField(hDev, "Sugar");
. . .
. . .
DevClose(hDev);
884
Chapter 31: Using Devices
dBASE devices
If the database does not exist, it is created with the specified format. If you do not specify
a format, and if the file name specifies an existing dBASE file, CitectSCADA uses the
existing fields in the database.
SQL devices
You need to create the SQL database by an external application before it can be used.
If you edit a dBASE or SQL device record (in an existing project), the associated physical
device is not edited. For example, if the device is a dBASE type device and you add an
extra field in the device, the extra field is not added to existing database files (when you
run CitectSCADA).
If you want to make changes to the file structure of an existing database and retain exist-
ing data, you need to manually edit the data using dBASE, Excel or some other database
tool.
If you want to make changes to the file structure of an existing database and don’t want
keep the existing data:
1. Close the device.
2. Manually delete the device file.
3. Make your modifications.
4. Open the device.
When the device is opened no device file is available and a new data file is
created with the necessary changes.
See Also
Formatting Data in the Device
Using a database device
INT hRecipe;
hRecipe = DevOpen("Recipe");
885
Chapter 31: Using Devices
FUNCTION
WriteRecipeData(INT hDevice, STRING sName, INT Water, INT Sugar,
INT Flour, INT Salt, INT Yeast, INT Milk)
DevAppend(hDevice);
DevSetField(hDevice, "NAME", sName);
DevSetField(hDevice, "WATER", IntToStr(Water));
DevSetField(hDevice, "SUGAR", IntToStr(Sugar));
DevSetField(hDevice, "FLOUR", IntToStr(Flour));
DevSetField(hDevice, "SALT", IntToStr(Salt));
DevSetField(hDevice, "YEAST", IntToStr(Yeast));
DevSetField(hDevice, "MILK", IntToStr(Milk));
END
DevControl() DevSetField()
To write CitectSCADA data to an SQL database, use the DevWrite() function, but you
need to add a new record and write to fields in the new record. No data is written to the
database if you do not write to all fields.
For example:
FUNCTION
WriteRecipeData(INT hDevice, STRING sName, INT Water, INT Sugar,
INT Flour, INT Salt, INT Yeast, INT Milk)
DevWrite(hDevice, sName);
DevWrite(hDevice, Water);
DevWrite(hDevice, Sugar);
DevWrite(hDevice, Flour);
DevWrite(hDevice, Salt);
DevWrite(hDevice, Yeast);
DevWrite(hDevice, Milk);
886
Chapter 31: Using Devices
END
The following functions return error 267 (File mode is invalid) when the device type is
SQL:
DevFlush()
DevPrev()
DevDelete()
The follow function returns error 263 (Cannot read file) when the device type is SQL:
DevRead()
The following functions return error -1 when the device type is SQL:
DevSize()
DevRecNo()
FUNCTION
GetRecipe(STRING sName)
INT hDev;
hDev = DevOpen("Recipe");
IF hDev >= 0 THEN
IF DevFind(hDev, sName, "NAME") = 0 THEN
PLC_Water = DevGetField(hDev, "WATER");
PLC_Sugar = DevGetField(hDev, "SUGAR");
PLC_Flour = DevGetField(hDev, "FLOUR");
PLC_Salt = DevGetField(hDev, "SALT");
PLC_Yeast = DevGetField(hDev, "YEAST");
PLC_Milk = DevGetField(hDev, "MILK");
ELSE
DspError("Cannot Find Recipe " + sName);
END
DevClose(hDev);
ELSE
DspError("Cannot open recipe database");
END
END
887
Chapter 31: Using Devices
To delete every record from a dBASE database, use the DevZap() function:
To delete records from an SQL database, use the Cicode SQL functions.
DevClose(hRecipe);
888
Chapter 31: Using Devices
Note: The 10 history files are in addition to the default data file that is saved for each
device.
By default, CitectSCADA uses 10 files (if history files are specified). You can change the
default by specifying the number of files to use, for example:
No. Files 20
889
Chapter 31: Using Devices
Period Comment
15th Use a new file every month beginning on the 15th of each month
25th June Use a new file every year beginning on the 25th of June
You can also specify the time of day to synchronize the beginning of the history file, for
example:
Time Comment
The first file does not actually begin at this time: the first file begins when you start your
runtime system. The time and period together determine when new history files are
created, for example:
Time Period
6:00:00 Monday
In the above example, CitectSCADA creates a new file each Monday at 6:00am. If you
start your runtime system at 7:30am on Sunday, your first file only contains 22.5 hours
of data. If you leave your system running, subsequent files start each Monday at 6:00am,
and contain one full week of data.
Archiving data
To archive your data for long-term storage, back up your history files before they are
overwritten. Use the Windows File Manager from the Main program group to check file
creation dates (of the history files) and to back up files. Refer to your Windows doc-
umentation for a description of the File Manager.
See Also
Using Command Fields
890
Chapter 31: Using Devices
{UserName,n} The name of the user (User Name) who was logged on when
the command was issued.
{FullName,n} The full name of the user (Full Name) who was logged on when
the command was issued.
{Time,n} The time (in short format) when the command was issued
(hh:mm).
{TimeLong,n} The time (in long format) when the command was issued
(hh:mm:ss).
{Date,n} The date (in short format) when the command was issued
(dd:mm:yy).
{DateLong,n} The date (in long format) when the command was issued (day
month year).
{DateExt,n} The date (in extended format) when the command was issued
(dd:mm:yyyy).
{Page,n} The page that was displayed when the command was issued.
{MsgLog,n} The message sent as the Message Log property (of the com-
mand record).
You can use the following fields (in the command field) for Keyboard commands only:
...
{Native_MsgLog,n} The native language version of the message sent as the Mes-
sage Log property (of the command record).
891
Chapter 31: Using Devices
Name KeyLog
Then a keyboard command (object, page, or system) could be created with the following
configuration:
Resulting in an output of the following kind: "01/01/99 Density setpoint changed to 123
by Timothy Lee".
892
Chapter 31: Using Devices
For correct logging operation, reserve one printer to be your logging printer. This printer
has to be a local printer, not on the network server. You can then send any other non-log-
ging printouts, (for example, reports) to a shared network or local printer.
See Also
Using Devices
893
Chapter 31: Using Devices
894
Chapter 32: Understanding Equipment in SCADA
Prior to v7.20, CitectSCADA was a tag based environment that used a flat naming archi-
tecture. Individual elements were unable to be linked or organized into a more intelligent
structure that supported built-in relationships and inter-dependencies. In v7.20 Citect-
SCADA began the transition to an object based application. In object-based SCADA appli-
cations, application objects contain aspects or parameters associated with the device
they represent. For example, a pump object can contain all the events, alarms, security,
communications, and scripting associated with a device.
In SCADA the term "Equipment" is used conceptually as a way of providing logical
groupings for objects in your system, to better view trends, alarms, accumulators etc. The
grouping can be created down to the level of one or more items by the use of a textual
representation of an equipment hierarchy. The hierarchy defines a parent / child rela-
tionship between the objects. This can be used to define a plant model that can enable an
ISA-95 compliant structure.
The creation of a structured system based upon an "Equipment" object provides several
benefits:
l At runtime the operator can 'browse' tags sorted by equipment using Tag Browse
Functions.
l At runtime the operator can 'browse' equipment using Equipment Database Function.
l You can Assign a tag
l Equipment can be in a Cluster
l You can access the equipment field with the CTAPI find functions.
l It simplifies the process of defining equipment items and provides project con-
sistency and a simple process to extend the configuration when the time comes to
expand your project.
The Equipment database is the central repository for information about equipment con-
trolled by your CitectSCADA system.
The equipment database can be populated using the Equipment Editor, or Equipment
Properties and Equipment Types dialog boxes, or by importing equipment from a data-
base using an XML template.
See Also
Equipment Properties
Equipment Types
Configuring Equipment
895
Chapter 32: Understanding Equipment in SCADA
896
Chapter 32: Understanding Equipment in SCADA
The second example below demonstrates the hierarchy for a factory called 'Factory1"
which has three production lines each identified as Line1, Line2, and Line3. Each pro-
duction line has two assembly stations identified as Assy1 and Assy2. Each assembly
station has two conveyer belts identified as Convey1 and Convey2.
You could define the equipment structure of Convey2 at Assy2 on Line1 of Factory1 as
follows:
Factory1.Line1.Assy2.Convey2
This would create a hierarchy structure as below:
Similarly, the other items mentioned above contained in Factory1 can be built into a log-
ical hierarchy.
Once an equipment hierarchy is defined you can associate tags such as a trend, SPC,
alarm, variable or accumulator with any item in the structure. The equipment hierarchy
can also be associated to clusters to expand the flexibility even more.
See Also
Configuring Equipment
Equipment Properties
Associating Equipment
Configuring Equipment
Select one of the following methods to configure equipment in CitectSCADA:
l The Equipment Editor
l Equipment Forms
Note: Before configuring equipment for your project, you need to understand the fol-
lowing rules. These rules are around naming conventions, and the association of
equipment with clusters
• Naming Equipment in your project
• Association with Clusters
Once you have created, and/or modified equipment types and equipment using the
equipment editor or the equipment forms you need to select Update Equipment.
897
Chapter 32: Understanding Equipment in SCADA
The Update Equipment tool (available under the Equipment menu of the Project Editor)
processes the template for each piece of equipment to manage the associated con-
figuration records. When updating the equipment configuration, the associated records
are updated by modifying, adding or deleting as required.
See Also
Defining an Equipment Hierarchy
Equipment Editor
Associating Equipment
The equipment name follows the same naming convention as applied to Variable Tags
with the addition of the "." character used to separate levels within the hierarchy. Note
that the "." character cannot be used as the first character in a name, nor as the last char-
acter unless it is followed by another item within the name. For example '.New-
Equipment' and 'NewEquipment.' are invalid
The equipment item name needs to begin with either an alpha character (A-Z or a-z) or
the underscore character (_). Any following characters needs to be either alpha char-
acters (A-Z or a-z), digit characters (0 - 9), backslash characters (\), or underscore char-
acters (_),:
For example the following are valid equipment names,
l _MyEquipment123
l 'My\Equipment123'
l Equip1.Equip23
l Equip1.Equip2.Equip3
However '\NewEquipment\' is invalid.
In addition, tags can be associated with named equipment. The equipment name follows
the same rules that exist for the I/O, Alarm and Trend Tags in terms of uniqueness:
See Also
Associating with Cluster
Configuring Equipment
898
Chapter 32: Understanding Equipment in SCADA
899
Chapter 32: Understanding Equipment in SCADA
7. Define the custom parameters (if needed) for the equipment type
8. Define the Accumulators and/or Equipment states for the equipment type
9. Save the Equipment Type
10. Select the Equipment Tab
11. Create/ add, modify equipment based on an Equipment Type. Equipment will be
saved to the EQUIP.DBF
12. Select the Update Equipment tool (available from the Project Editor) to auto generate
the tags associated with equipment. This will populate the relevant tag form
The Equipment Editor will display the last view used for the opened project. If the
project has not previously been opened, the equipment type editor with no types will be
displayed.
See Also
Equipment Editor Tabs
Equipment Types
Use the Equipment type workspace to define the types of objects in your system. Equip-
ment types (groups) defined in your project act like a template that you can use as the
base configuration for that type of equipment in your project. The properties of the tem-
plate, when used to create equipment within your project, can be manually overridden
or left as the default.
900
Chapter 32: Understanding Equipment in SCADA
Note: If you created a project based on one of the StruxureWAre Starter projects an
Equipment Type – Motor is included. Use this type as an example for other Equip-
ment Types.
1 Equipment Type tree-view. Displays Equipment Types for the project as well as included
projects (excludes system include projects).
2 Equipment Type workspace. Each type has its own workspace, when open the workspace is
indicated with a tab. Click on the type name of the relevant tab to display the corresponding
workspace.
4 Item panel. Items related to the Equipment types are listed. Select an item from the list to
view the elements that belong to it. The name of the Item selected is above the Variable tag
element. E.g. Running.
6 Elements Panel. This panel displays the associated fields from the selected tag.The value for
these fields may be configured manually (text), through equipment references or custom
parameters.
Custom Parameters button. Click on this button to reveal the Custom parameters panel. Use
7
the panel to create and organize parameters into groups.
From the project/equipment type tree-view you can add, open, duplicate a type, rename,
move a type to a project, and delete an equipment type.
See Also
Add Equipment Types
901
Chapter 32: Understanding Equipment in SCADA
5. Select a different project if required. The drop down will show all user-created
include projects
6. Click OK.
The dialog will close and the tree will refresh to display the new Equipment Type. The
new type will be open for editing, where you can edit the description, configure the Items
(associated tags), custom parameters, accumulators and/or equipment states.
An Equipment type with unsaved changes is shown with an asterisk in the tab header.
See Also
Adding Items to Equipment type
Duplicate Equipment Types
Example - Using the Equipment Editor
902
Chapter 32: Understanding Equipment in SCADA
Items
An Item is an attribute of a physical device; that can be defined as equipment, within
your system. For example: the equipment type ‘Motor’ has numerous items such as Run-
ning, Start and Stop which are all attributes of a motor. Each 'Equipment.Item' reference
can be associated to a variable tag. See Variable Tag Properties for more information.
Add Item to Equipment Type
903
Chapter 32: Understanding Equipment in SCADA
1. Create a new item in an equipment type by selecting the Add New item button above
the Items list in the equipment type workspace.
2. The new item will appear in the list (i.e. “New Item #1”).
3. Name the Item
4. Select File ->Save. The item is created with a single variable element.
See Also
Define the elements belonging to the Item
Modifying Items
Modifying Items
You can also rename and remove an Item.
Rename Item
To rename an item:
1. Right-click the item in the Items list.
2. Select Rename from the pop-up menu.
The item’s name in the list becomes editable. Rename the item. The new name is com-
mitted when you complete editing the text. Save the changes.
Delete Item from Equipment Type
To delete an item right-click the item in the list and select Delete from the pop-up menu.
When an item is deleted, the item listed above or below it will then be selected.
See Also
Adding Elements to Items
Elements
Elements are a combination of tags associated with the item for a particular equipment
type. The following tag types can be added as new elements.
Note: When configuring elements you are allowed none or one of an alarm tag, var-
iable tag, and trend or SPC tag. The type drop down list available from the Add New
Element dialog will only display those element types not previously defined for that
item. In other words if you have configured an analog alarm tag for the item, the
other alarm tags will no longer be displayed in the list.
Accumulators, and equipment states though currently configured at the element level
904
Chapter 32: Understanding Equipment in SCADA
belong to the Equipment Type. When configured a new item node will display
called [Other]. All accumulators and equipment states configured for that equipment
type will be listed under this node.
l Advanced Alarms
l Analog Alarms
l Multi - Digital Alarms
l Digital Alarms
l Time-Stamped Alarms
l Time-Stamped Analog Alarms
l Time-Stamped Digital Alarms
l Variable Tags
l Statistical Process Control Tags
l Trends
Add Element to Item
1. To add a new element to an Item select the Add New Element button.
2. The Add New Element Dialog will open
3. Name the element e.g. Var_Running
4. Select a type from the drop down list provided.For example, Analog Alarm.
5. Click OK
The element is created and added to the item. The associated tag, accumulator and/or
equipment state will be created on selecting “Update Equipment” (from the project
editor).
See Also
Adding Fields to Elements
Modifying Elements
Modifying Elements
Rename Element
Rename an element by right-clicking the name of the element, and selecting Rename
from the popup menu. The new name is saved when finished editing the text.
Remove Element from Item
Delete an element by right-clicking the element, and selecting Delete from the popup
menu.
905
Chapter 32: Understanding Equipment in SCADA
See Also
Adding Fields to Elements
Fields
Fields are derived from the selected tag type. The field. names available in the drop
down list are those fields from the corresponding tag form. e.g Digital Alarm - fields
would include Variable Tag A, Variable Tag B.
To add fields to an element:
1. Selecting the Add New Field button.
2. A new row will be added.
3. In the Name field select a field from the list. As previously stated the fields available
in the drop down list are those fields from the corresponding tag form.
4. Specify the value of the field. This can be text, equipment fields and custom param-
eters, or a combination of the three. Type in the Value column or right-click in the
field’s row and select a value reference from the pop-up menu. Options available in
the menu will vary if grouped and ungrouped parameters have been defined. The ref-
erence may be in one of the following formats:
l Equipment Field References – {equipment.fieldname}
l Ungrouped parameters –{equipment.param_list[parameter_name]}
l Grouped parameters –{equipment.group_name[parameter_name]}
To remove fields from an element:
1. Right-click the field to be deleted
2. Select Delete field from the pop-up menu.
See Also
Defining Parameter Groups
Defining Equipment using the Equipment Editor view
Parameters
Parameters are named placeholders for values in an equipment type that can be spec-
ified for each instance of a type. For example, you could specify different setpoint values
for each instance (equipment) of the equipment type Motor.
906
Chapter 32: Understanding Equipment in SCADA
Note: Due to the maximum field length of 254 characters you are limited in how
many parameters you can set. A warning message is displayed in the status area of
the application when the combined length of the parameters and a minimum space
for their values exceeds this field length.
907
Chapter 32: Understanding Equipment in SCADA
Parameter Groups
You can add, rename and remove parameter groups.
To add a parameter group:
1. Click on the Add Group button.
2. This creates a new group in the parameters list, with a default name and no param-
eters. The name is automatically selected for editing.
To rename a parameter group:
1. Right-click the header of the group
2. Selecting Rename from the pop-up menu. The group’s header becomes editable.
3. When the user completes editing the text, if update equipment has not been triggered
references to parameters from this group will be updated to reflect the new group
name. Currently if update equipment has been triggered the references will not be
updated and will revert to the original name.
To remove a parameter group:
1. Right-click its header
2. Selecting Delete from the pop-up menu.
3. This removes all of the parameters in the group as specified earlier, and then
removes the group from the parameters list.
See Also
Parameters
Equipment Editor
The equipment editor displays the equipment hierarchy for all projects.
908
Chapter 32: Understanding Equipment in SCADA
Create Equipment
From the Equipment list select the Name of the Project
Right-click and select New Equipment
In the Add New Equipment Dialog:
Duplicate Equipment
You can create a copy of an object by right-clicking its node in the tree and selecting
Duplicate from the popup menu.
This duplicate is created in the same location as the original, with a unique name (i.e.
“EquipmentName – Copy_1”).
The children of the equipment are not copied.
See Also
Delete Equipment
Rename Equipment
To rename equipment:
1. Right-click the equipment in the tree.
2. Select Rename from the popup menu.
909
Chapter 32: Understanding Equipment in SCADA
Move Equipment
Move Equipment
Move equipment to another parent within the tree by dragging and dropping it. The
equipment cannot be dropped on its own child equipment. All of the equipment’s chil-
dren move with it.
Move Equipment to another project
Change the project that equipment belongs to by right-clicking its node in the tree and
selecting Move to project.
A dialog appears. Change the project that this equipment belongs to.
Close Equipment
An equipment tab may be closed by clicking the tab’s close button.
If there are unsaved changes to the equipment, you can either save the equipment, dis-
card the changes, or cancel closing the equipment.
Delete Equipment
To delete equipment:
1. Right-click the equipment in the tree.
2. Select Delete from the pop-up menu.
OR:
1. Select the equipment in the tree.
2. Press the Delete key.
The equipment and any child equipment that exist are deleted.
See Also
Edit Equipment
910
Chapter 32: Understanding Equipment in SCADA
1. From the Citect Project Editor select -> Equipment -> Equipment Editor
2. The Equipment Editor will open.
911
Chapter 32: Understanding Equipment in SCADA
Double-click Motor. The items, elements and parameters defined for that Equipment
Type will be displayed in the workspace.
The element belonging to the first item ‘Running’ will be displayed.
Select other items and view the elements defined. The items FailStart and FailStop have
an associated alarm tag defined.
912
Chapter 32: Understanding Equipment in SCADA
Scroll down in the workspace to view the fields available to the Alm.FailStart.
When ready create a duplicate of the Motor equipment type.
4. Rename to Motor2
5. Click Enter to commit name change and to open Motor2 in the workspace.
913
Chapter 32: Understanding Equipment in SCADA
914
Chapter 32: Understanding Equipment in SCADA
In the next step you will configure the elements and add and delete fields.
1. Right-click the default name of the variable tag and select Rename
2. Name the variable tag Var.Speed and press Enter to commit the changes
3. In the Tag Name field right-click and select Equipment Fields ->From the list of
fields select Tag Prefix
This will create a reference from this tag type to the corresponding equipment field.
On selecting Tag Prefix the following {equipment.TAGPREFIX} will be inserted into the
field. Modify the value with _SPEED to make it {equipment.TAGPREFIX}_SPEED.
4. Complete the remainder of the variable tag element fields as outlined in the screen
shot below:
915
Chapter 32: Understanding Equipment in SCADA
8. Repeat the previous two steps – selecting Raw Full Scale and setting the value as
1000.
Next you will add the Alarm and Trend elements
9. Select the Add New Element button
10. In the Add New Element Dialog name the element AnaAlm.Speed
11. From the Type drop-down select Analog Alarms
12. Click OK
916
Chapter 32: Understanding Equipment in SCADA
The Analog Alarm element will be added to the bottom of the workspace.
13. Click on the arrow to open the element to fill in the fields.
14. For the fields Tag Name, Alarm Name and Variable Tag enter the value as {equip-
ment.TAGPREFIX}_SPEED
15. Delete the fields after Variable tag to before the High High field. For this field you
will define an un-grouped custom parameter.
16. Click on the Custom Parameter button. The custom parameter dialog will open.
917
Chapter 32: Understanding Equipment in SCADA
20. Complete the remainder of the alarm fields copying the values from the screen shot
above
Next you will add another element. This element will be associated to a trend tag.
21. Click on the Add New Element button
22. From the Add new element dialog
23. Name the Trend tag – Trend.Speed
24. Select Trend tag from the drop down list and click OK
25. For tag name – right click on the value field and select Equipment fields -> tag pre-
fix. Modify the name to be {equipment.tagprefix}_SPEED
26. Repeat for Expression field
27. From the sample period drop down select 00.00.01
28. Refer to the screen shot below when configuring the reminder fields.
29. To add the Area Field. Click the Add field button.
30. From the Name field drop down list select Area.
31. Right click and select Equipment fields and select Area.
32. Click Save to save the element and Equipment type.
918
Chapter 32: Understanding Equipment in SCADA
In the next step you will configure the accumulator and equipment states.
919
Chapter 32: Understanding Equipment in SCADA
At this point close the Equipment Editor and then reopen it. Click on the Equipment
Types tab -> select Motor 2. You will see a new item called [Other] will be listed. The
accumulator you added is available from there as will any equipment states you con-
figure.
920
Chapter 32: Understanding Equipment in SCADA
921
Chapter 32: Understanding Equipment in SCADA
1. If using the Equipment forms an Equipment XMl template with Tag Name and OUT-
PUT defined needs to be added.
2. Add Equipment Types. With the Equipment type you define the base tags and param-
eters that will then be used as a template (saved to xml file) for an 'instance' of the
equipment (object).
3. Create/ add, modify equipment instances based on an Equipment Type. Instance will
be saved to the EQUIP.DBF.
4. Select the Update Equipment tool to auto generate the tags associated with equip-
ment. This will populate the relevant tag form.
See Also
Importing Equipment Using XML Templates
Equipment Types
Use this dialog to add Equipment Types in your project.
Note: In v7.40 the Equipment Editor was introduced. Use the editor to add equip-
ment types, define elements and parameters without having to manually alter the
Equipment XML Template.
Name
The equipment type, such as pump, light, valve, etc. Enter a value of 254 characters or
less. The names in this field populate the Type drop down in the Equipment Properties
form.
Template
Filename for the XML template for the equipment type. Enter a value of 254 characters
or less. See Equipment Templates for information on defining equipment templates.
922
Chapter 32: Understanding Equipment in SCADA
Note: If no template file is specified you will need to manually create and define the
parameters belonging to Tags, Alarms, Trend, and Accumulators.
Comment
Any useful comment. Enter a value of 254 characters or less.
See Also
Configuring Equipment
Defining an Equipment Hierarchy
Equipment Properties
Associating Equipment
Equipment Properties
Equipment has the following properties:
Note: Advanced users can use the DBF plug-in for Microsoft® Excel to edit and save
records directly in the EQUIP.DBF file .
Name
The name of the equipment. The length of the complete name for the equipment is rec-
ommended to be less than 128 chars. The maximum length is 254 chars, however long
names can be harder to use within configuration expressions and Cicode. This can be
either the name of a single piece of equipment or an item of equipment within an equip-
ment hierarchy. Equipment hierarchies can be no more than 14 levels deep, and each
item should be 64 characters or less.
When naming Equipment the following rules apply:
l Equipment names need to be unique within the same cluster; however multiple
equipment with the same name can be defined, if each of the equipment is under a
different cluster.
l Equipment names cannot be the same as alarm tag names.
l Dot (.) notation may be used in equipment name to denote a equipment hierarchy.
E.g. Plant1.Filling.Tank1. Each dot delimiter denotes an extra level in the equipment
hierarchy. Up to 14 levels of hierarchy is supported. Length of individual equipment
may not exceed 64 characters.
l Individual names (delimited by a dot (.) character) within an equipment path need to
follow tag name syntax. E.g. '%', '?', '/', etc. characters are not allowed as part of the
name.
923
Chapter 32: Understanding Equipment in SCADA
l Name of root level equipment may not be the same as any cluster names. E.g. if
Cluster1 is defined in project, you cannot name the equipment "Cluster1.xxx".
l Name of the root level equipment may not be a reserved word. E.g. IF, FOR, WHILE,
END, OR, AND, etc. are not allowed as equipment name.
Type
The specific type of equipment in the system. This drop down box is populated from the
types database created by the Equipment Types form.
Cluster Name
The name of the cluster that this equipment runs on. If the Cluster Name is not set, then
this equipment will run on all clusters defined in the cluster table. The cluster should be
configured otherwise the compile will not be successful.
Tag Prefix
Designed to store the prefix that is used for tags related to the equipment. It can be used
at runtime to find or build a related tag name from an equipment.
I/O Device
The I/O Device used to communicate with this piece of equipment. Specify redundant
devices with a comma between primary and standby, for example, "IODev1,IODev2".
Enter a value of 254 characters or less.
Page
The name of the page on which this equipment appears. Enter a value of 254 characters
or less.
Help
The help context string. Enter a value of 254 characters or less.
Comment
Any useful comment. Enter a value of 254 characters or less.
The fields Scheduled and Default State are used specifically when setting schedules for
this item of equipment. For details on these fields refer to Configuring Equipment for
inclusion in Scheduler
Default State
The name of the default State of the equipment as defined in Configuring Equipment
States.
Scheduled
Specifies if the equipment is included in any scheduled actions. The options are "true" or
"false". See Configuring Scheduler.
924
Chapter 32: Understanding Equipment in SCADA
The following fields are implemented with extended forms (press F2). Note that some of
the fields listed below may be displayed in the previous section of the form.
Location
A string describing the location of the equipment. Enter a value of 254 characters or less.
Area
The area number or label to which this equipment belongs. Only users with access to
this area (and any necessary privileges) will be able to perform operations on the equip-
ment. For example, if you enter Area 1 here, operators need to have access to Area 1
(plus any necessary privileges) to perform operations on the equipment. Enter a value of
16 characters or less.
Composite
The equipment specific composite name derived from the name of the equipment (max-
imum 254 characters)
Parameters
List of parameters to be used with the template configuration. This is a property list sep-
arated by semi-colon characters. For example: MyProp1=abc; MyProp2=def;
MyProp3=123. This field is not available at runtime.
Custom1 .. Custom8
User-defined strings that can be used for filtering equipment when using the Cicode
search functions (maximum 254 characters each).
See Also
Configuring Equipment
Defining an Equipment Hierarchy
Equipment Types
Associating Equipment
Associating Equipment
Association with Tags
The following types have been extended to allow association of them with items of equip-
ment. This is configured using the "Equipment" field of the configuration dialog for each
type. The field provides a ‘picklist’ in the configuration dialog. You can select a value or
manually enter an equipment name. The compiler will check the existence of the equip-
ment referenced. The cluster should be configured otherwise the compile will not be suc-
cessful. Use this method as an alternative to referencing a cluster in the equipment
properties dialog if the equipment is defined for all clusters.
925
Chapter 32: Understanding Equipment in SCADA
l Advanced Alarms
l Analog Alarms
l Multi - Digital Alarms
l Digital Alarms
l Time-Stamped Alarms
l Time-Stamped Analog Alarms
l Time-Stamped Digital Alarms
l Variable Tags
l Statistical Process Control Tags
l Accumulators
l Trends
See Also
Configuring Equipment
Defining an Equipment Hierarchy
Equipment Properties
Associating Equipment
926
Chapter 32: Understanding Equipment in SCADA
927
Chapter 32: Understanding Equipment in SCADA
Example
See Also
Equipment Templates
Importing Equipment
Using Equipment
Example
See Also
Equipment Templates
Importing Equipment
Using Equipment
928
Chapter 32: Understanding Equipment in SCADA
Example
<!-- ===================================================
Input Section - Equipment
===================================================
-->
<input name="equipment" file="equip.dbf" desc="Equipment Database">
<field name="name"></field>
<field name="cluster"></field>
<field name="type"></field>
<field name="iodevice"></field>
<array name="iodevice_list">{Split('{iodevice}',',')}</array>
<field name="tagprefix"></field>
<field name="area"></field>
<field name="page"></field>
<array name="page_list">{Split('{page}',',')}</array>
<field name="help"></field>
<field name="location"></field>
<field name="comment"></field>
<field name="scheduled"></field>
<field name="defstate"></field>
<field name="param"></field>
<array name="param_list">{ToProperty('{param}','=',';')}</array>
<field name="custom1"></field>
<field name="custom2"></field>
<field name="custom3"></field>
<field name="custom4"></field>
<field name="custom5"></field>
<field name="custom6"></field>
<field name="custom7"></field>
<field name="custom8"></field>
929
Chapter 32: Understanding Equipment in SCADA
</input>
See Also
Equipment Templates
Importing Equipment
Using Equipment
Example
<!-- ===================================================
Output Section - <my variable tag>
===================================================
-->
<output name="[FileRef].[RefID]" file="variable.dbf" filter="'{equipment.type}=
930
Chapter 32: Understanding Equipment in SCADA
{type.name}'">
<field name="taggenlink" load="true">[TypeRef].[RefID]</field>
<field name="linked">1</field>
<field name="editcode">11</field>
See Also
Equipment Templates
Importing Equipment
Using Equipment
931
Chapter 32: Understanding Equipment in SCADA
param_list[name] The list of parameters, where name is the specific parameter name
See Also
Equipment Templates: Outputs
Equipment Templates
Importing Equipment
Using Equipment
932
Chapter 32: Understanding Equipment in SCADA
933
Chapter 32: Understanding Equipment in SCADA
To determine the acceptable field names and, respective edit codes, either open citect.frm
and find the respective output file without an extension (for example, advalm for
advanced alarms) or open the respective dbf in the DBF Add-In. All fields listed in the
dbf are acceptable field names. The edit code of the first field in the table is always 1.
The edit code of the fields other than 1 equals the edit code of the previous field times 2
(i.e. the edit code of the second field is 2, third - 4, fourth - 8 and so on).
See Also
Equipment Templates: Outputs
Equipment Templates
Importing Equipment
Using Equipment
934
Chapter 32: Understanding Equipment in SCADA
Example
</template>
See Also
Equipment Templates
Importing Equipment
Using Equipment
935
Chapter 32: Understanding Equipment in SCADA
936
Chapter 33: Using External Databases
You can store and update runtime data from your plant floor in a database external to
CitectSCADA. You can also use CitectSCADA to send information from the database
(such as a recipe) to I/O Devices in your plant.
CitectSCADA supports two types of databases:
l dBASE databases
l SQL databases
By using an external application to read and write the same database records, you can
effectively interface to an external application through, for example, a relational data-
base.
CitectSCADA provides two methods of communication with a database:
l using Vijeo Citect Devices
l using the SQL class of Cicode functions
Devices are most useful when the automatic reporting and logging features of Citect-
SCADA are used.
dBASE databases
The dBASE file format has become an industry standard for data storage, and Citect-
SCADA supports the standard dBASE format. You can use any database editor (that sup-
ports dBASE III files) to create a database, and to read and write database records.
To connect to a database, you need to define a CitectSCADA Device. Devices specify the
format and location of the database, for example:
Name Recipe
Header Name
File [DATA]:RECIPE.DBF
Name
Type DBASE_DEV
937
Chapter 33: Using External Databases
SQL databases
SQL (Structured Query Language) also has become an industry standard. SQL is a com-
mand language that allows you to define, manipulate, and control data in SQL data-
bases - and in other relational databases. Most database servers support SQL. SQL gives
you direct access to database servers on other platforms, such as computers, mini-com-
puters, and mainframe computers.
You can use the CitectSCADA Device functions to set up the format and locations of
each of your SQL databases. Alternatively, use the SQL functions for direct control over
SQL transactions.
You need to define a CitectSCADA Device to specify the format and location of the data-
base, for example:
Name Recipe
In the Format field, specify the field names in the SQL database, for example:
The Header is the database connection string for ODBC connection, for example:
Type SQL_DEV
See Also
Using Structured Query Language
938
Chapter 33: Using External Databases
NOTICE
To avoid SCADA and database PERFORMANCE DEGRADATION please consider:
- Build queries that require an acceptable use of system resources (memory, CPU,
threads).
- Limit scope of queries with parameter-driven WHERE clauses.
- Avoid using SELECT * to return all columns.
- Do not perform queries with null values for date time parameters.
- Try to balance load between relational database management systems (RDBM) and
SCADA, for example consider sorting data on the client side rather than the server side.
- Consider using stored procedures to minimize the number of round trips to the server.
SQL functions provide absolute control and flexibility over connections and queries. Que-
rying a database via the Device system is slower than constructing a query via a SQL
function due to the generic nature of a device.
CitectSCADA 7.30 introduces the use of ADO.NET library of SQL functions, which pro-
vides a modern approach to data access, which can be programmed using any of .NET
managed languages, and is supported and further developed by its manufacturer. Fur-
ther the new ADO.NET approach enables you to have multiple recordsets per con-
nection, and multiple queries per recordset. Previous versions restricted you to 1
recordset per connection and 1 query per connection. More importantly the new imple-
mentation delegates connections, disconnections and query executions to separate appli-
cation threads meaning that SQL queries need no longer be blocking actions.
The technology facilitates connections to databases from various vendors and obtains
data sets by executing either ANSI SQL commands or any database specific dialects of
SQL (if a dedicated provider is used) such as T-SQL or PL/SQL.
Connections can be established to databases which:
l Have an ODBC driver
l Have an OleDB provider
l Use MS SQL Server
939
Chapter 33: Using External Databases
Specifically, the Cicode SQL DB interface can be used to connect to either Historian or
Historical Alarm databases as long as they use databases fulfilling one of the above con-
ditions and store their data in types that can be read by the Cicode SQL interface.
See Also
Limitations When Using Legacy SQL Functions
Database Connection Objects
Connecting to an SQL database
Basic SQL Scenarios
Alarm Server Database Specification
940
Chapter 33: Using External Databases
The CCicode SQL database interface enables users to create a connection object, connect
it to a database, execute SQL queries and step through records in either the default con-
nected recordset, using legacy Cicode functions, or a disconnected recordset, using the
new Cicode functions. See examples in SQLCreate and SQLConnect Cicode function
descriptions.
941
Chapter 33: Using External Databases
Typically this scenario is used when the result of a query is displayed on a graphic page
in the form of a table with the possibility of scrolling forward and backward through the
data.
In this case the data from a disconnected SCADA recordset is displayed on a graphic
page using the SQLGetField and SQLIsNullField SQL functions.
Data pertaining to the SQL query is copied to the disconnected SCADA recordset just
after executing the query. This behavior means that there is no additional data fetching
when you iterate through disconnected recordsets later.
Note: When executing queries, there is a direct relation between data size, execution
time and memory consumption: the more data fetched the longer execution time and
the larger amount of physical memory taken by the SCADA recordset. Take care to
design your queries so that they return only amount of data compatible with avail-
able resources and performance expectations.
Since recordsets reside in memory while active, it is your responsibility to close unused
SCADA recordsets when they are no longer required.
Disconnected SCADA recordsets don’t depend on the existence of either the database con-
nection object or the SQL connection to a database. The recordsets can therefore be seen
as disconnected immediately after executing a query. They do not synchronize with the
source database after that point. Afterwards, the SQL connection to a database can either
stay open or be closed.
Connecting to an SQL database
Executing SQL commands
Using a transaction
Expressing dates and times in SQL
942
Chapter 33: Using External Databases
Before you can use SQL commands, you need to connect to the SQL database. In pre-
vious versions of CitectSCADA you would use the SQLConnect function to provide the
access. It has the format:
SQLConnect(sConnect);
INT hSQL;
hSQL = SQLConnect("DSN=DBASE_FILES;DB=C:\ODBC\EMP;LCK=NONE;CS=ANSI");
! Connect to a dBASE Compatible Database File.
INT hSQL;
hSQL = SQLConnect("DSN=EXCEL_FILE;DB=C:\ODBC\EMP;FS=10");
! Connect to an Excel File.
INT hSQL;
hSQL = SQLConnect("DSN=ORACLE_TABLES;SRVR=X:ACCTS;UID=SCOTT;PWD=TIGER");
! Connect to an Oracle Database.
Refer to the documentation that accompanied your SQL server for details about con-
necting to an SQL database.
To close a legacy database connection, use the SQLDisconnect function with the handle
to the connection object.
The new interface requires two calls in order to open a connection to a database. The
first call uses SQLCreate which prepares the database connection object. A second call
SQLOpen establishes the SQL connection to the database.
SQLOpen can be used to reopen previously closed connections.
To close an ADO.NET database connection, use the SQLClose function to close the con-
nection and then the SQLDispose with the handle to the connection object.
New functions can be used with the pre-existing ones. However, as a good pro-
gramming practice, it is advised not to mix the old and the new interface. A hardware
alarm will be generated if a SQLDisconnect is detected when there are connections
opened with SQLCreate/SQLOpen, or if SQLClose/SQLDispose are detected and there are
connections opened with SQLConnect.
943
Chapter 33: Using External Databases
See Also
Executing SQL commands
Working with recordsets
Parameterized queries
Parameterized queries are now possible with the new ADO.NET SQL interface. This pro-
vides the possibility to define queries with parameters which can be substituted later by
concrete values (integers, reals or strings). This is especially useful when a query is built
using end user data, such as user names and passwords, inserted via graphical pages
(forms). When correctly applied, parameterized queries can prevent SQL injection
attacks.
Parameters are defined for each DB connection object and concrete values are substituted
into queries just before executing the function from the SQLExec family.
The parameters exist in DB connection objects as long as the objects exist. The function
SQLParamsClearAll can be used to remove all parameters from a specified DB con-
nection object. There is currently no way to iterate through all existing parameters in a
DB connection object nor to remove a single selected parameter from the object’s col-
lection.
Each database provider (ODBC, OleDb, SQL Server) implements parameterized queries
in different ways. As SQL queries can be very complicated, it is difficult to provide a
generic converter for unifying the parameterization syntax. So to use parameterized que-
ries, you should have knowledge of how they work on a particular provider and struc-
ture your Cicode accordingly.
944
Chapter 33: Using External Databases
To add records into the database table, use the "INSERT INTO" command. The com-
mand has the following syntax:
This command adds the values for each field in the table, for example:
SQLExec(hSQL, "INSERT INTO recipe VALUES ('Bread', '10', '5', '7', '1', '1', '2')");
Column names are optional; however, if you omit column (field) names, the values are
inserted into the fields in the same order as the values.
To read data from an SQL database, use the SQL "SELECT" command. You can use the
"SELECT" command to read an entire set of records, or a row, from the table. You can
then use the SQLGetField() function to read the data in each field, for example:
945
Chapter 33: Using External Databases
To delete database records, use the SQL "DELETE" command. The command has the fol-
lowing syntax:
See Also
Using a transaction
Using a transaction
You can use a database transaction for more sophisticated database operations. A data-
base transaction allows you to execute a series of SQL commands and then either com-
mit the changes to the database, or 'roll back' (cancel) the changes, for example:
Check the ODBC-compatibility level of your database driver if you cannot use trans-
actions.
See Also
Expressing dates and times in SQL
946
Chapter 33: Using External Databases
Calendar, or the database tables needs to be exported to text files before use in Citect-
SCADA. Dates in Microsoft Access database tables exported as text files are stored as
Gregorian values.
See Also
Conversions between database and Cicode types
[<format>'YYYY-MM-DD HH:MM:SS.FFFFFF']
where:
l <format> (the first character after the opening square bracket) needs to be one of the
following:
l d - date
l t - time
l dt - date and time.
Whether you are specifying a date, time, or date and time, you need to provide the com-
plete 26 character string, for example:
[d'1995-02-18 00::00.000000']
Refer to the documentation that accompanied your SQL server for further information
about SQL commands.
947
Chapter 33: Using External Databases
NOTICE
LACK OF DATA CONVERSION
Ensure that all your database fields can be converted. Otherwise, when conversion is pos-
sible, some data may not be converted, but there is no indication that has occurred. For
example when SCADA isn't properly parameterized.
There are a large number of custom DB types that need macros/functions to be called on
the database side of the SQL connection for their proper conversion to strings.
CHAR(), NCHAR(), VARCHAR(), NTEXT, NVARCHAR The text is converted to MBCS 8-bit string.
(), TEXT, XML
DATE, DATETIME, DATETIME2(), DATE- Date and time as a string. Only one format
TIMEOFFSET, SMALLDATETIME, TIME() and UTC. If users wish to have date/time
in a different format, have to use DB side
conversion macros/functions in their
SELECT queries.
948
Chapter 33: Using External Databases
Text, Memo, Hyperlink, Lookup Wizard The text is converted to MBCS 8-bit string.
* The string has to be shorter than 255 characters, otherwise an error is thrown.
The Cicode runtime engine tries to automatically convert strings to target data types
when a cast operation is necessary. The following conversions are potentially allowed:
STRING to INT and STRING to REAL.
949
Chapter 33: Using External Databases
950
Chapter 34: Exchanging Data with Other Appli-
cations
You can transfer data between CitectSCADA and other software for storage, analysis,
and post processing, or to control and tune your CitectSCADA system.
CitectSCADA uses the following methods to exchange data:
l dynamic data exchange (DDE), where CitectSCADA can act as a:
l DDE server providing tag values to requesting clients
l DDE client to request data from other applications.
l open database connectivity (ODBC), where CitectSCADA functions as an ODBC
server, allowing other applications to read CitectSCADA variables directly.
l By using a common external database, where CitectSCADA and other applications
use the same database to store and share information.
CitectSCADA also supports importing and linking variable tag data from external data-
bases. See Linking, Importing, and Exporting Tags.
Note: As the DDE protocol is not designed for high-speed data transfer, the use of
951
Chapter 34: Exchanging Data with Other Applications
l For information about DDE conversations, see DDE conversations and client syntax.
l To establish a DDE conversation between applications on the same computer, see Set-
ting up DDE conversations.
l To establish DDE conversations between applications running on different computers
over the same network, see Network DDE.
l To establish DDE Conversations with the CitectSCADA tag database directly, see Con-
necting to the CitectSCADA tag database using DDE.
Note: When reading or writing to CitectSCADA tags using DDE, you might unknow-
ingly add to your CitectSCADA license point count. Once the dynamic point count is
greater than the license point count, the software protection mechanism will ter-
minate CitectSCADA runtime. Therefore, when accessing tags via DDE, it's impor-
tant to remain aware of how many points you have used. For details, see license
point count in the Installation and Configuration Guide.
The syntax sent by the DDE Client when it tries to establish a DDE conversation with
the DDE server, consists of three parts:
l The name of the application to retrieve the data from.
l The file or topic name which contains the data to be retrieved.
l The cell range, value, field, or data item that's being requested.
These are combined in the format:
952
Chapter 34: Exchanging Data with Other Applications
name>
where:
l <DDE server applicationname> identifies the DDE server application.
l | (pipe character) separates the DDE server application name from the DDE Topic
Name with no spaces between them.
l <DDE Topic name>identifies the context of the data. For DDE Servers that operate on
file-based documents, DDE topic names are typically file names. For other DDE
Servers, they are other DDE application-specific strings.
l ! (exclamation character) separates the DDE Topic Name from the DDE Data item
name with no spaces.
l <DDE Data item name>is a string that identifies the data item that a DDE server can
pass to a DDE Client during a DDE transaction. In some instances, the DDE Data
item name is optional. Refer to the DDE application documentation for particulars.
Note: In the DDE Client syntax structure example above, every placeholder shown
inside arrow brackets ( <placeholder> ) has to be replaced with the actual name of
the item that it describes. Do not include the arrow brackets and the placeholder
words they contain in the statement, and are shown here only for your information.
As the DDE protocol was designed in an era before long file names, DDE only supports
the use of short (8 character) file names. To overcome this limitation, enclose the three
parts of the DDE syntax within single quotes respectively. For example:
This instructs DDE to treat the characters within the quotes as strings, thus permitting
them to contain long file names, the space character (), the pipe character (|), the excla-
mation or bang character (!), or any other non alphanumeric character.
See Also
Setting up DDE conversations
953
Chapter 34: Exchanging Data with Other Applications
At the beginning of a DDE conversation, a DDE Client requests the services of a DDE
server using DDE Client syntax (which contains the DDE server application name, topic
or file name, and the data item name in the request). For DDE Client syntax details, see
DDE conversations and client syntax.
To set up an application as a DDE Client, that is, to request data from a DDE server
application, you need to use appropriate values in the DDE Client syntax as follows:
DDE server application name
The DDE server name is usually the DDE server application name, for example the DDE
server name for CitectSCADA is "Citect", the DDE server name for Microsoft Excel is
"Excel", the DDE server name for Microsoft Word is "WinWord", and the DDE server
name for Microsoft Access is "MSAccess". Most DDE Servers respond to only one name.
Note: The proper DDE Client syntax of the DDE Topic name section for accessing a
Microsoft Access database is constructed like this: "<DataBaseName>; TABLE <Table-
Name>".
The <DataBaseName> placeholder is for the name of the Access database file followed
by a semicolon ( ; ). You might have to include the file path; however this might not be
the case (i.e. if it is known that Access will be running with the target file open). The
.MDB suffix is optional (as .MDB is the default suffix for Access databases), unless the
full path was included.
The TABLE <TableName> is the command string to instruct Access which table data
you intend to converse with. DDE also supports the use of QUERY <QueryName> or
SQL <SQLString> in place of TABLE <TableName>.
The use of the semi-colon ( ; ) after the '<DataBaseName>' placeholder, and the use of
UPPERCASE for the 'TABLE', 'QUERY', and 'SQL' commands in the DDE string syntax
are necessary. The whole section needs to be enclosed in quotes ( " ).
DDE Data item name
954
Chapter 34: Exchanging Data with Other Applications
The DDE Data item name for CitectSCADA depends upon the DDE Topic name being
used. When using 'Variable' as the DDE Topic name to access the variable tag database
directly, the DDE Data item name is the CitectSCADA variable tag name. When using
'Data' as the DDE Topic name to access a value posted using the Cicode DDEPost() func-
tion, the DDE Data item name is the posted name.
The DDE Data item name for Microsoft Excel is the cell range in Row number Column
number format (for example R1C1). The DDE Data item name for Microsoft Word is a
bookmark name. The DDE Data item name for Microsoft Access is dependant upon
which topic name was used. Refer to the Microsoft Access Help for details.
Note: These CitectSCADA DDE help topics and examples were originally written for
Windows 3.xx and subsequently updated for Office 95 on Windows 95. Microsoft
has since introduced security measures with Office 2000 and later versions which,
by default, block Office applications from being DDE Clients. For security details, see
Using DDE with Microsoft Office applications.
CitectSCADA can perform as both a DDE server and as a DDE client as necessary. To set
up CitectSCADA to use DDE, see Exchanging CitectSCADA data via DDE.
CitectSCADA comes with an Excel workbook file which contains macros to help you
insert correct DDE Client syntax links from your CitectSCADA runtime project tag data-
base directly into an Excel worksheet.
955
Chapter 34: Exchanging Data with Other Applications
Use the DDEh handle functions for Network DDE, and for Access DDE.
See Also
Exchanging CitectSCADA data via DDE
Note: You can also execute commands in another application from CitectSCADA
with the DDEExec() function. Similarly, you can run Cicode functions from another
application by passing the functions through that application's DDE Execute com-
mand.
See Also
Connecting to the CitectSCADA tag database using DDE
=Citect|Variable!PV1
956
Chapter 34: Exchanging Data with Other Applications
CitectSCADA runtime and the DDE Client application (for example Excel) need to both
be running on the same computer. For information about DDE conversations, see DDE
conversations and client syntax.
To establish a DDE conversation between applications on the same computer, see Setting
up DDE conversations.
To establish DDE conversations between applications running on different computers
over the same network, see Network DDE.
DDEPost("Process1", PV1)
Once posted, this value can be accessed, for example, from a cell in Excel containing the
following formula:
=Citect|Data!Process1
957
Chapter 34: Exchanging Data with Other Applications
l The name of the posted value (for example Process1) not to exceed 8 characters or
contain spaces if you want to link to it via a Microsoft Word DDE field. Microsoft
Excel, however, accepts long data item names if enclosed within single quotes (for
example 'Process Variable 1').
l You need to use Data as the DDE Topic name when accessing posted values. See Set-
ting up DDE conversations.
This method of DDE connection requires that both CitectSCADA runtime and the DDE
Client application (for example Excel or Word) are running on the same computer at the
same time. Once the DDE connection has been made, the DDE Client would normally
display the updated value of the CitectSCADA DDE posting as soon as it becomes avail-
able, usually within milliseconds of the post.
Unfortunately, this posting method of DDE linking is subject to breakage whenever
CitectSCADA runtime is closed, even if CitectSCADA runtime is subsequently restarted.
The DDE Client application might not detect the lack of connection, as updates to the
data in the DDE Client (for example Excel) only occur after each post by the DDE server
(CitectSCADA runtime). If no further posts occur, and in this scenario none will (as the
DDE link is disconnected), the DDE Client application receives no update, and sub-
sequently might display data which could be out of date. This disconnected state will
remain until the DDE link in the DDE Client application is refreshed or the DDE Client
application is restarted.
See Also
Writing values to a DDE application
958
Chapter 34: Exchanging Data with Other Applications
This DDE function is one-way, so to update the tag value in the remote DDE server
application, this function will need to be called every time the value of this CitectSCADA
variable changes.
Writing directly to a DDE server assumes a prior knowledge of the DDE server. In the
above example, the spreadsheet or document needs to exist and Excel or Word (as appro-
priate) needs to be running for the DDE communication to be successful.
Notes:
l Instead of using the once only DDEWrite(), you could use the multiple use DDE han-
dle function DDEhPoke().
l Verify that remote requests are enabled in the other application. For example, in
Excel, you need to verify the Ignore other applications check box is cleared (the
default setting). In Excel 2003, use Tools | Options | General to adjust this setting.
l The High security setting (if selected) on Microsoft Office 2000 and later versions
does not appear to affect the use of remote DDE Client requests with those Office
applications. See Using DDE with Microsoft Office applications.
See Also
Reading values from a DDE application
The data from Row 1, Column 1 on Sheet 1 of Book 1 in Excel is read and stored in the
CitectSCADA variable "PV1". This DDE function is one-way, and will need to be called
whenever the value needs to be updated in CitectSCADA.
Reading from a DDE server assumes a prior knowledge of the DDE server. In the above
example, Excel needs to be running and the appropriately named spreadsheet needs to
exist. The CitectSCADA variable PV1 needs to also have been previously declared.
Note: Instead of using the once only DDERead(), you could use the multiple use DDE
handle function DDEhRequest().
Verify that remote requests are enabled in the other application. For example, in Excel,
you need to confirm that the Ignore other applications check box is cleared (the default
setting). In Excel 2003, use Tools | Options | General to adjust this setting.
959
Chapter 34: Exchanging Data with Other Applications
The High security setting (if selected) on Microsoft Office 2000 and later versions does
not appear to affect the use of remote DDE Client requests with those Office applications.
See Using DDE with Microsoft Office applications.
960
Chapter 34: Exchanging Data with Other Applications
l If you set your security level to Low, external DDE Servers are run regardless of
whether they are digitally signed and trusted, or not.
Note: If you need to manipulate another application's objects from Microsoft Office,
consider using OLE Automation.
Network DDE
Network DDE is a version of the DDE protocol for use across a network. For information
about DDE, see Using DDE (Dynamic Data Exchange). For details about setting up Citect-
SCADA to use DDE, see Exchanging CitectSCADA data via DDE.
Just like the establishment of a DDE conversation between applications running on the
same computer, a network DDE conversation uses the same DDE protocol to share data
between applications running on separate computers connected to a common network.
Network DDE is a Windows Service used to initiate and maintain the network con-
nections, security, and shared file space needed for using DDE over a network, and
needs to be running on both computers at the same time. For startup details, see Starting
network DDE services.
A network DDE trusted share needs to be manually created for the Network DDE server
application on the Network DDE server application machine. This instructs the Network
DDE Service (on the DDE server application machine), as to which application and topic
to connect with. It is this share name which the Network DDE Client application can
subsequently communicate with. For details, see Setting up network DDE shares.
The Network DDE Client starts the Network DDE conversation by connecting to the Net-
work DDE Share on the Network DDE server computer. For details, see Using network
DDE.
961
Chapter 34: Exchanging Data with Other Applications
l On the Windows Start menu, click Start | Run, type in "netdde" (without the quotes)
and press the Enter key. Do so on both machines.
To automatically start the Network DDE Services on machine startup:
l With Windows 2000 and later, use the Windows Services Manager (select Start |
Control Panel | Administrative Tools | Services) to set the Network DDE
servicefrom Manual to Automatic. To do so, right-click the service and select Prop-
erties from the pop-up menu. On the General tab select Automatic from the drop-
down list of the Startup type field. Click OK. Close evry window and restart the
machine.
To verify that the NetDDE Services are running:
l The Windows Task Manager lists NetDDE.exe on the Processes tab when running.
To view the Windows Task Manager, press CTRL+ALT+DEL.
l The Service Administrative Tools also lists the status of Network DDE and Network
DDE DSDM. To view the Windows Services Manager, select Start | Settings | Con-
trol Panel | Administrative Tools | Services.
Note: If you are using only the Microsoft Client Service for NetWare Networks,
the NW IPX/SPX/NetBIOS compatible protocol needs to be enabled for
NetDDE.exe to load.
To test that Network DDE is operational between two machines on the same network
Microsoft Windows ships with a network DDE application called Chat. It is installed in
the system32 folder.
1. On the Windows Start menu, click Start | Run, type in "winchat" (without the
quotes) and press the Enter key. Do so on both machines.
2. On one machine, select the Chat menu Conversation | Dial or click the dial button.
The Select Computer dialog will display.
3. Select the other computer from the list, and click OK. Chat will attempt to establish a
network DDE conversation between the computers.
Note: If Chat is not already running on the other computer, it times-out and states
that the other computer didn't answer. If however, the other computer is already
running Chat, it will keep dialling until answered.
4. On the other machine, (while it is being dialed), select the Chat menu Conversation |
Answer or click the answer button. Type in a message and it will display in the Chat
window on the other machine. The conversation will continue until either machine
hangs up.
962
Chapter 34: Exchanging Data with Other Applications
Once a Chat conversation is established, it proves that both machines are properly set-
up and capable of handling network DDE conversations. You can view the share prop-
erties for Chat$ by using the DDEShares.exe application as described in Setting up net-
work DDE shares.
You don't have to run Chat to use Network DDE with CitectSCADA. This Network DDE
test only uses Chat as an example to confirm Network DDE functionality between two
machines. Once you have established that Network DDE is functional, close the Chat
windows, create the Network DDE Trusted Share for your Network DDE server appli-
cation, and connect to the share using Network DDE. See Connecting to a network DDE
shared application.
Note: You only have to create a DDE Share if you intend to use DDE between two
separate applications running on different machines, and you only have to create the
DDE Share on the machine that contains the application which will be the DDE
server.
The Windows DDESHARE.EXE utility enables users to manage DDE shares. The 32-bit
version is shipped with each Microsoft operating system and is located in the Win-
dows\System32 sub-directory.
To manually launch the DDE Share utility:
l On the Windows Start menu, click Start | Run, type in "ddeshare" (without the
quotes) and press the Enter key.
When DDEShare.EXE is running, it displays the DDE Share utility window containing
two icons which launch the DDE Shares dialog, and the DDE Trusted Shares dialog:
In the DDE Share utility, double-click the left icon (without the check mark) to display
the DDE Shares dialog box:
The DDE Shares dialog is used to create, manage, and delete global DDE shares on your
computer, and to view the DDE shares of any computer on the network. You can use
this dialog to confirm the names of shares available on any machine on the same net-
work. From the DDE Shares menu, select Shares | Select Computer and choose the com-
puter name you're interested in from the list.
963
Chapter 34: Exchanging Data with Other Applications
DDE Shares
There are three types of DDE shares: old style, new style, and static. CitectSCADA only
supports the static type. The names of static shares follow the convention
<ShareName>$
so to set up a CitectSCADA server computer as a Network DDE share, use the name
"Citect$" as the sharename on that computer. To expose the CitectSCADA runtime var-
iable tag database for suitable DDE linking, use the word "Variable" as the DDE Share
Topic name.
Note: The trailing dollar sign ($) is necessary as part of the DDE share name syntax.
1. In the DDE Shares dialog, click Add a Share. The DDE Shares Properties dialog
appears. Verify that the fields are blank, or unchecked, except for the Grant access to
every item radio button which needs to be checked.
2. Click Permissions. The DDE Share Name Permissions dialog appears.
3. Read and Link is the default permission setting. If you want to write data to the DDE
Share application, change the permission to Full Control.
4. Click OK.
5. Click OK to save the Share, and return to the DDE Shares dialog.
See Also
Using DDE Trusted Shares
1. On the DDE Shares dialog, highlight the new 'Citect$' share entry, and click Trust
Share to display the Trusted Share Properties dialog box.
964
Chapter 34: Exchanging Data with Other Applications
2. Check Initiate to Application Enable to allow new connections to the DDE share.
3. Click OK.
To view the trusted shares:
1. In the DDESHARE utility double-click the right icon (with the check mark) to display
the DDE Trusted Shares dialog.
2. The DDE Trusted Shares dialog lists the DDE shares that are trusted in the current
user's context. You can view and modify trusted share properties and remove DDE
shares from the list of trusted shares.
3. Once setup is completed, close the DDE Share utility dialog box.
Note: You cannot connect using Network DDE to a shared application on the same
machine. You can only connect using Network DDE to a shared application on
another machine (which needs to also be on the same network).
To connect to a Network DDE shared application, you use an altered version of the DDE
syntax, which replaces the "<ApplicationName>" with "<ComputerName>\NDDE$" and
replaces the "<TopicName>" with the Network DDE server Share "<ShareName>", and
continues to use the "<DataItemName>" as normal.
At first glance, there appears to be no way to specify the DDE Application or Topic
names in the Network DDE syntax call, and indeed, that is the case. However, the DDE
Application and Topic names are defined in the DDE server Share settings. So, when the
Network DDE server machine receives the call (from the Network DDE Client) con-
taining the Share name, it knows which application and topic to connect with. See Con-
necting to a network DDE shared application.
965
Chapter 34: Exchanging Data with Other Applications
With Network DDE Client syntax, the DDE Application name is replaced with the fol-
lowing string enclosed in single quotes:
'\\<ComputerName>\NDDE$'
where "<ComputerName>" is the name of the computer running the DDE server appli-
cation, and "NDDE$" notifies Windows on the remote computer that the calling DDE
Client wishes to establish a Network DDE channel. You cannot omit the NDDE$ string,
or it won't work.
The DDE Topic name is replaced with the following string also enclosed in single
quotes:
'<ShareName>'
where "<ShareName>" is the name of the DDE Trusted Share previously set-up on the
DDE server computer. The DDE Share on the DDE server machine contains the details of
which application and topic to create the Network DDE link with. Most often, DDE
server share names end with a $ character.
Note: You need to use a separate DDE share name on the remote computer for each
combination of DDE application name and DDE topic name you want to share. You
can not declare the topic as a wild card (*).
For example, to create a Network DDE link with the following criteria:
l CitectSCADA variable tag name: "PV1"
l CitectSCADA server computer name: "PlantSvr"
l Remote DDE Share name: "Citect$"
you would construct a Network DDE Client call containing:
'\\PlantSvr\NDDE$'|'Citect$'!PV1
In Excel, the following formula could be placed directly into a worksheet cell:
='\\PlantSvr\NDDE$'|'Citect$'!PV1
If prompted for a username and password, use one that has appropriate permissions on
the DDE server computer.
Note: You cannot omit the DDE syntax pipe character (|) or exclamation character
(!), nor can you enclose those characters within quotes (').
966
Chapter 34: Exchanging Data with Other Applications
CitectSCADA comes with an Excel workbook file which contains macros to help you
insert correct DDE Client syntax links from your CitectSCADA runtime project tag data-
base directly into an Excel worksheet.
Note: If your ODBC driver is not included in the list of Installed ODBC Drivers,
return to the ODBC setup utility and install your driver (select the Drivers... but-
ton).
4. From the Add Data Source dialog box, select your ODBC driver. The Setup dialog is
displayed.
5. Enter the Data Source Name of the driver that you used previously. For example, if
you had used SQL with a dBASEIII database, then your connection string would
have been "DRV=QEDBF". To avoid changing the connection strings throughout your
967
Chapter 34: Exchanging Data with Other Applications
l Any functions you might have created in early versions are backward-compatible.
Q+E drivers are now ODBC-compliant, so you need to upgrade your old Q+E data-
base driver to a Q+E ODBC database driver.
See Also
About the ODBC driver
968
Chapter 34: Exchanging Data with Other Applications
Developing queries in Access also has an advantage that the resulting Recordsets can be
viewed in Access to test that they contain the data that is expected. The queries can incor-
porate SQL Functions (such as BETWEEN & AND).
The Jet Engine can also call upon theVBA Expression Service. This means that many
non ANSI functions can also be used (both in SQL statements and Access Query Def-
initions) provided there is no need to migrate to a non Access system at a later date.
Refer to VBA Functions Reference in the Access or Excel help system (only those func-
tions with (VBA) after them and are appropriate to an SQL environment, are likely to
work in an SQL statement).
See Also
Setting up ODBC
Setting up ODBC
To use ODBC, the Access ODBC Driver needs to be installed. This can be obtained from
Microsoft and is included with Microsoft Office. The installation programme (for exam-
ple, for Microsoft Office) will copy the necessary drivers and the Jet Engine DLL into the
appropriate Windows directories when the appropriate Data Access/ODBC options are
selected.
With the Driver installed on the PC the ODBC Icon can be selected from the Control
Panel and a Data Service Name set up for the desired MDB. This is used in the DSN=
part of the connect string.
The Jet Engine DLL is quite large (1 MB) and the execution speed of the runtime (and
your application) can be impacted if the Windows Virtual Memory Manager (VMM)
swaps it out of memory. The next time an SQL is executed there will be short delay
while the DLL is loaded back into memory. To force the VMM to keep the DLL in mem-
ory, design a simple dummy table with only one record and one field and set up a
Cicode task that frequently (say every 10-15 seconds) calls a SELECT query based only
on the dummy table. This has no significant effect on CPU load and keeps the DLL in
memory.
See Also
Getting the correct syntax with ODBC
969
Chapter 34: Exchanging Data with Other Applications
MS Query tends to create SQL text that is more complex than necessary. In particular it
includes the path with the file name which is not necessary because the path is already
defined in the DSN entry. It is considered bad practice to hard code file paths. MS Query
also tends to prefix column (field) names with the table names to avoid any chance of
ambiguity. Again this is not always necessary and it is desirable to keep the SQL text as
brief as possible in your code.
The SQL statement text generated by the query designer can be pasted into Execute SQL
window (under the File menu of MS Query), any surplus text removed and the SQL state-
ment tested until the simplest syntax that works can be found. There is provision to save
the SQL text if necessary. The final version of the SQL statement can be used with con-
fidence in Cicode.
See Also
Programming style with ODBC
Note: These examples exclude error checking to keep them as simple as possible.
However, both common sense and accepted programming practices mandate that
you include error checking in your ODBC code.
970
Chapter 34: Exchanging Data with Other Applications
If there is a need to execute the queries on a Remote Computer, the code can set up on a
Reports Server or an Event Server. This is especially relevant if the code is to be triggered
by an event in a PLC. If the code is to be triggered by a User at a Display Station, and the
query is considered too CPU intensive, the Display Station can be used to set the PLC bit
that calls to code or call the Report using the Cicode Report() function. Another pos-
sibility is to use the Cicode MsgRPC() function to call a Cicode function (with param-
eters, if necessary) on a remote computer. Each of these alternatives require CitectSCADA
to be running on the remote computer.
See Also
Comparing DDE with ODBC
971
Chapter 34: Exchanging Data with Other Applications
The JET Engine DLL cannot be directly called on a remote PC, (Reports or MsgRPC() can
be used however, to run SQL statements on a Remote Computer which needs to be be
running CitectSCADA).
See Also
ODBC compatibility
ODBC compatibility
This section describes the necessary and optional ODBC functions that your database
driver needs to support:
l Essential functions
l Optional functions
Essential functions
The CitectSCADA SQL devices and Cicode functions only work if the database driver
supports the following ODBC functions:
Level 0 Level 1
SQLAllocConnect SQLColumns
SQLAllocEnv SQLDriverConnect
SQLAllocStmt SQLGetData
SQLBindCol SQLGetFunctions
SQLColAttributes SQLGetInfo
SQLDescribeCol SQLGetTypeInfo
SQLDosconnect SQLParamData
SQLError SQLPutData
SQLExecDirect SQLSetConnectOption
SQLExecute SQLSetStmtOption
SQLFetch
972
Chapter 34: Exchanging Data with Other Applications
SQLFreeStmt
SQLGetCursorName
SQLNumResultCols
SQLPrepare
SQLRowCount
SQLSetParam
Optional functions
CitectSCADA SQL devices and Cicode functions also use the ODBC functions listed in
the table below. While these functions are not necessary for operation, if they are absent
in a driver, the error code 307 (SQL database error) will be returned if the ODBC driver
does not support the necessary ODBC functions. To get the message associated with the
error, call the Cicode function SQLErrMsg.
Level 0
SQLTran- If the driver does not support this function, the Cicode functions SQLBe-
sact ginTran(), SQLCommit(), and SQLRollBack() are not supported.
Level 1
Level 2
SQLData The driver does not need to support this function. It is provided by ODBC.
Sources
SQLEx- Without this function, CitectSCADA cannot take advantage of the native
tended database's ability to fetch records at random.
Fetch
SQLSet- Without this function, CitectSCADA cannot take advantage of the native
Scroll database's ability to fetch records at random.
Options
973
Chapter 34: Exchanging Data with Other Applications
See Also
Using CitectSCADA as an ODBC server
CitectSCADA can only function as a database server at runtime. Using tags through
ODBC at runtime can still add to your CitectSCADA License point count. Once the
dynamic point count is greater than the license point count, the software protection
mechanism will shutdown CitectSCADA runtime. Therefore, when accessing tags via
the ODBC server, it's important to keep aware of how many points you have used. For
details see License point count in the Installation and Configuration Guide.
Setting up the CitectSCADA ODBC server:
You need to have TCP/IP installed on your computer first.
1. Choose Start | Settings | Control Panel.
2. Double-click the ODBC icon.
3. Click Add on the User DSN tab.
Note: If you select other tabs you will see that the CitectSCADA ODBC driver has
974
Chapter 34: Exchanging Data with Other Applications
4. Select the Citect Driver from the list and click Finish.
5. Enter "Citect" in the Data Source field. If you do not want to use this name, make
sure the name you use is one word.
6. Enter the Computer Name in the Host field. The Computer Name is specified in the
Network section of the Control Panel.
7. Click OK.
Accessing the CitectSCADA ODBC server using MS Query (V2.00):
All ODBC capable applications use different ways to construct queries for accessing
CitectSCADA tags. The example instructions for using MS Query, given here, show a
simple implementation. MS Excel and MS Access use the same method.
1. Verify that you have MS Query installed on your computer.
2. Set up the CitectSCADA ODBC server.
3. Run CitectSCADA.
4. Run MS Query.
5. From the File menu (in MS Query) select New Query.
6. Select the CitectSCADA Data Source Name (DSN) from the Available Data Sources
list. Click the Use button.
7. Select the Tags table. Click the Add button and then the Close button.
8. You can now run a query to extract the Tag data from CitectSCADA. The simplest
way to see this is by double-clicking Names and Tags.
Accessing the CitectSCADA ODBC server using MS Query (V8.00):
Unlike Version 2.00, User DSNs are not used by Version 8.00. Instead it uses File DSNs
which by default are stored in Program Files\Common Files\ODBC\Data Source folder. File
DSNs are not stored in the Windows registry, they are text files given the .DSN exten-
sion. When you connect to an existing data source, only the available File DSNs that are
stored on that PC are displayed. MS Query V8.00 does not display User or System DSNs.
The simplest solution is to create a File DSN that points to a User DSN.
To create a file DSN that points to a user DSN:
1. Use a text editor (Notepad for example) and create a file containing the following two
lines:
[ODBC]
DSN=<MyUsrDSN>
975
Chapter 34: Exchanging Data with Other Applications
where <MyUserDSN> is the name of an existing user DSN that you have created
via the ODBC icon in the Control Panel.
2. Click Save As on the File menu and type a name that includes a .DSN file extension.
For example, "Citect_File.dsn" is a valid name. Include the quotation marks so that
the .DSN file name extension is added correctly. Save it to the default File DSN direc-
tory listed above, then it will appear in the DSN list box.
3. Open the ODBC Manager from the Control Panel and verify that you can see your
newly created File.DSN.
4. Open the ODBC Manager from the Control Panel and verify that you have created a
User DSN called <MyUsrDSN>. For example:
1. Select Citect Driver and click Finish.
2. Type "Citect" in the Data Source field (i.e., <MyUsrDSN>).
3. Enter Computer Name in the Host field.
When you run MS Query, you can now select your File DSN from the list.
See Also
Reading data from an access table with ODBC
Function SQLTest
INT hSQL, iResult;
hSQL = SQLConnect("DSN=ODBCTest;UID=YourUID_C;PWD=YourPWD");
IF hSQL <> -1 Then
iResult = SQLExec(hSQL, "SELECT * FROM qryRecipes
WHERE Recipe Between '3000' And '6000'");
IF iResult = 0 Then
WHILE SQLNext(hSQL) = 0 DO
TraceMsg(">" + SQLGetField(hSQL, "Recipe")
+ "<>" +SQLGetField(hSQL, "Flour")
+ "<>" +SQLGetField(hSQL, "Water")
+ "<>" +SQLGetField(hSQL, "Cocoa") + "<");
END
SQLDisconnect(hSQL);
ELSE
Message("SQL Error", SQLErrMsg, 48);
END
ELSE
Message("SQL Error", SQLErrMsg, 48);
976
Chapter 34: Exchanging Data with Other Applications
END
END
See Also
Appending data with ODBC
Function SQLInsert
INT hSQL, iResult;
hSQL = SQLConnect("DSN=ODBCTest;UID=YourUID;PWD=YourPWD");
IF hSQL <> -1 Then
iResult = SQLExec(hSQL, "INSERT INTO tblRecipes
(Recipe, Flour, Water, Cocoa) VALUES ('X1234', 2, 3, 4)" );
SQLDisconnect(hSQL);
END
END
To avoid having to deal with SQL statements, you can use the standard Cicode device
functions to append records to an Access table. First configure an SQL device. If the table
has many fields that do not need to be written to, define only those fields that are nec-
essary in the device definition (this keeps the device definition simple and reduces the
number of DevWrite instructions). DevOpen, DevWrite and DevClose can then be used
to add records to the table.
CitectSCADA accepts successive DevWrites until they equal the number of fields in the
device definition at which time it constructs an SQL INSERT statement. The DevWrites
needs to contain data for fields in the same order as the device definition. Do a DevOpen
followed immediately by successive DevWrites for as many records as are necessary
then a DevClose to avoid data being out of context.
See Also
Editing data with ODBC
977
Chapter 34: Exchanging Data with Other Applications
Function SQLUpdate
INT hSQL, iResult;
hSQL = SQLConnect("DSN=ODBCTest;UID=YourUID;PWD=YourPWD");
IF hSQL <> -1 Then
iResult = SQLExec(hSQL, "UPDATE tblRecipes SET Flour = 20,
Water = 30,Cocoa = 40 WHERE Recipe = 'X1234'");
SQLDisconnect(hSQL);
END
END
Note: The ODBC/SQL environment does not let you edit the "Current Record" (there
is no current record). Consequently you cannot use DevAppend or DevSetField to add or
modify records.
See Also
Deleting rows from an Access table
Function SQLDelete
INT hSQL, iResult;
hSQL = SQLConnect("DSN=ODBCTest;UID=YourUID_C;PWD=YourPWD");
IF hSQL <> -1 Then
iResult = SQLExec(hSQL, "DELETE FROM tblRecipes WHERE
Recipe = 'X1234'");
SQLDisconnect(hSQL);
END
END
See Also
Calling action queries with ODBC
To call an Access ACTION via ODBC, use the Call statement in SQLExec:
"{Call qdeDeleteRecipe}"
978
Chapter 34: Exchanging Data with Other Applications
Parameter queries
Many ODBC Servers will accept PARAMETERS in a Call statement so that PARAM-
ETERS can be defined in a Query Definition on the server and their values supplied by
ODBC Clients at run time. Unfortunately, the Access Jet Engine uses Parameter Markers
which are not supported in the standard Call statement. The method outlined here can
be used as a work-around.
For each query that requires PARAMETERS, design a arguments table with the same
name as the query but with a different prefix. For example, if the query is qryParamTest,
the TABLE could be called argParamTest.
The TABLE could have, say, five fields called Param1, Param2, Param3, Param4,
Param5.
Add this table to the Access Query Definition for qryParamTest. Then the field names
can be used as PARAMETERS anywhere in the Query Definition.
979
Chapter 34: Exchanging Data with Other Applications
A simple Cicode function can be written to which the query name (without the prefix)
and PARAMETERS are passed. The function inserts "arg" in front of the query name and
executes a DELETE from the TABLE (to verify that it is empty) and then performs an
INSERT to leave the table containing ONE RECORD with the desired PARAMETERS in
the appropriate fields. The function then prefixes the query Name with "qry" and calls
the query.
Function SQLCall(INT hSQL, STRING sQueryName, STRING sArg1 = " ", STRING sArg2 = "
",
STRING sArg3 = " ", STRING sArg4 = " ", STRING sArg5 = " ")
STRING sTable, sQuery;
sTable = "arg" + sQueryName;
sQuery = "qry" + sQueryName;
SQLExec(hSQL, "DELETE FROM " + sTable);
SQLExec(hSQL, "INSERT INTO " + sTable + " (Param1, Param2, Param3, Param4,
Param5) VALUES ('" + sArg1 + "', '" + sArg2 + "', '" + sArg3 + "',
'" + sArg4 + "', '" + sArg5 + "')");
SQLExec(hSQL, "{Call " + sQuery + "}");
END
The default parameters for SQLCall needs to be SPACES if "Allow Zero Length" is "No"
in the Access table Definitions for fields Param1, Param2 etc.
The function can be used to call many different PARAMETER queries.
An advantage of this work-around is that, even after CitectSCADA has been shut down,
the query can be called from Access and, because the PARAMETERS are still stored in
the arguments table, the resulting Recordset can be viewed in Access.
Another method is to design queries that perform any necessary joins, sorting and field
selection the call them using a WHERE clause to select the desired rows (records).
See Also
Access and Cicode date/time conversions
980
Chapter 34: Exchanging Data with Other Applications
l Convert to strings - The Data and/or Time are converted to and from text strings
using the standard conversion functions available in each environment.
l Use the #Date/Time# SQL syntax - The Jet Engine will convert and Dates and Time
strings enclosed in # markers. This date could be useful in a WHERE clause:
The American Date format is used in this case, the Jet Engine DLL ignores the local Date
and Time settings as set in Windows Control Panel.
Compatibility
This Add-In is specifically designed for use with Microsoft Excel 2007 or later, it is not
compatible with Microsoft Excel 2003.
981
Chapter 34: Exchanging Data with Other Applications
Functionality
982
Chapter 34: Exchanging Data with Other Applications
Functionality
The add-in is automatically available to Excel when the add-in is installed by the Citect-
SCADA installation. When you open Microsoft Excel you will see a new toolbar called
Project DBF Add-in, containing the following fields and buttons:
1. Master.dbf location
2. SaveDBF table
3. SCADA project
4. SCADA table
5. Save DBF
6. Save As
7. Open DBF
8. Save Only/Save and re-index
To access the tables using the Add-In:
1. If the location of the Master.dbf file is not displayed in the master.dbf location field, it
will display Enter path to master.dbf. Click on this field to display a dialog box
where you can enter the location. This populates the SCADA Project field.
2. Click the drop down arrow in the SCADA Project Field to select the Project in which
the .dbf file (table) resides that you want to open. This populates the SCADA Table
field.
Note: Any tables listed in the ExcludedProjectTables.xml are excluded from the list of
tables.
3. Click the drop down arrow in the SCADA Table field to select the table. The table will
open in Microsoft Excel as a new worksheet named with the table name. If the table
is a read only table an alert (sometimes referred to as a "warning") message is dis-
played advising you that it is read only.
Alternatively, if the dbf file that you wish to open is not the Master.dbf file, or is not
located in the root dbf file location, click the Open DBF button and browse to the location
of the dbf file that you want to open.
To edit the contents of the table in Microsoft Excel
A table in .dbf format is displayed in Microsoft Excel in the following equivalent format:
l A field is displayed as a column.
l A record is displayed as a row.
l A field within a record (data) is displayed as a cell.
983
Chapter 34: Exchanging Data with Other Applications
You may edit any of the data in the table, shown as cells within a row. You may delete a
record shown as a row, and add a record. However you cannot change the structure of
the table by modifying the name of any Field, shown as a column, add a column or
delete a column. If you do change the structure an alert message will be displayed when
you attempt to save the table.
If you edit a cell in the table take care not to exceed the maximum field length set for that
field in the table.
To save a table in Microsoft Excel
1. Select to Save and re-index the table, or Save Only, from the drop down control on
the toolbar.
If you do not re-index an indexed table the table will be saved more quickly, but you will
need to manually re-index the table when you have completed your edits. To re-index
manually, select Pack from the File menu of the CitectSCADA Project Editor.
2. Click the SaveDBF table button.
When you save the table the Add-In performs the following checks prior to saving the
table:
1. Verifies that the file type is .dbf.
2. Checks for any changes in table structure that may have been made. For restrictions
on changes to the table structure, refer to "To edit the contents of the table in Micro-
soft Excel".
3. Updates the existing table according to the data in the Microsoft Excel worksheet.
4. Re-indexes the updated table if it is was an indexed table (if Save and re-index was
selected).
If the edited table in the Microsoft Excel worksheets does not pass every check, an alert
(sometimes referred to as a "warning") message is displayed and the existing table on
disk will not be affected until you correct the condition that caused any check to not
pass.
You can also save a dbf file with a different name by clicking the Save As button on the
toolbar and entering a name for the file. This method of saving also includes the option
of saving the dbf file with or without re-indexing the table.
Note: If you attempt to save a table in .dbf format in Microsoft Excel using the Micro-
soft Excel File > Save command an alert message is displayed advising you that the
file cannot be saved in the current format and that use the SaveDBF button on the
Microsoft Excel toolbar.
984
Chapter 35: Genies and Super Genies
There are two types of Genies within CitectSCADA:
Genie - collection of related objects, which you add to your graphics pages when you
configure your system. You can paste any number of Genies onto a graphics page (for
example, multiple pumps on the same page).
Super Genie - dynamic pages (usually pop-ups), to which you pass information when
the page displays at runtime. You can use Super Genies for pop-up type controllers (to
control a process, or a single piece of plant floor equipment).
CitectSCADA includes libraries of Genies and Super Genies that you can use in your sys-
tem. You can also define your own and add them to a specific library to be reused again
within your project.
See Also
Genies
Configuring Super Genies
Genies
Usually each object on a graphics page is configured individually. With a Genie, you
can combine several related objects into a group, and store the group in a Genie library
(similar to a symbol library). The Genie can then be used as a single object (pasted,
moved, resized, etc.), and the elements configured collectively. Many types of graphic
objects, and their configuration data, can be stored with the Genie.
Genies work by substituting common information in an object. Genies can be groups of
objects (start/stop controller) or even one object (a button), that you may want to save in
the genie library so you can reuse it through out the project.
The advantage of using a Genie is that objects are defined once, and then after you place
the Genie onto a page, you only need to configure the substituted properties.
Before using Genies you need to understand the following term:
Substitution –A substitution can be a number or name you use to define an object or
group of object’s properties when creating a genie. Used as a placeholder the property is
replaced at runtime with a real value.
See Also
Configuring Genies
Defining Substitutions for Genies
985
Chapter 35: Genies and Super Genies
Using Genies
For STRING variable type substitutions enclose the %% in quotation marks e.g.
“%label%”, so that CitectSCADA does not read it as a tag.
Note: You are not restricted to using only variable tags as substitution strings. Any
expression can be substituted, such as constants or labels, or equipment.item tag ref-
erences e.g %Tank.Level%. Only fields that accept text can have Genie tag sub-
stitutions. You can also define substitutions to variables that aren't in the current
project by using the IFDEF function.
See Also
Configuring Genies
Using Genie Substitutions in Templates
Configuring Genies
Configuring a new Genie is similar to creating a page with graphical objects, but with
genies there is no background. Typically you create a new Genie using the Graphics
Builder, add the objects, defining the Genie substitutions, and save the Genie in a Genie
library.
To create a new Genie:
986
Chapter 35: Genies and Super Genies
l Configure the Cicode function and its parameters.In the example the parameters have
been substituted with a placeholder.
In this example both substitutions are STRING variable types, therefore the %% char-
acters have been enclosed in quotation marks.
3. Click OK to close the button properties dialog.
4. Click the Save tool, or choose File | Save.
5. Select the Project and Library in which to store the Genie.
6. Enter a name for the Genie in Genie.
7. Click OK. (To create a new library for the Genie, click New. In the field provided
name the new library and click OK. The name of the library is added to the library
list.)
In the second example two objects are combined and saved as a genie.
A text object that shows the Level of Tank 1, and a symbol object that indicates if Tank 1
is in use.
1. Select the symbol set object from the drawing toolbox
2. Drag onto the blank genie page, the symbol set dialog will open
3. Configure the appearance of the symbol set (Type, On symbol when, OFF symbol, On
symbol)
4. Select the text object and place onto the page under the symbol.
5. Configure the text object (Type, Expression)
6. Click OK
7. Click the Save tool, or choose File| Save.
987
Chapter 35: Genies and Super Genies
Using Genies
Once you have created (defined and saved) your Genie, you can use it on any graphics
page.
Using the first genie example (the button) from the create genie topic:
1. Click the Paste Genie tool in the toolbox or choose Edit | Paste Genie
2. In the Paste Genie dialog, select the library the genie belongs to.
3. Select the genie from the list and click OK (Or double-click the thumbnail of the
genie)
4. The genie is pasted onto the graphics page. A dialog will open, prompting you to con-
figure the properties of the genie. You will see that the field names match the ‘sub-
stitutions’ used when creating the genie. Click OK to close the dialog.
988
Chapter 35: Genies and Super Genies
At runtime the dialog values you entered into the prompt replace each substitution in
the genie.
To reuse this genie in the project you would enter a different title and example text when
prompted.
Note: To display the properties of the individual objects in a Genie (instead of the
Genie Properties), hold the Control (CTRL) key down and double-click the object. If,
however, a link to the Genie has been retained, most of these properties will be read-
only.
989
Chapter 35: Genies and Super Genies
The examples used above are simple uses of a Genie. You can define Genies that use
many objects, with substitution strings for any text property (or properties) of an object.
Note: If you use structured tags, you can use substitution strings within a tag name
to construct more sophisticated Genies. See Using Structured Tag Names with
Genies.
See Also
Maintaining a Genie
Maintaining a Genie
You can open an existing genie to edit it.
To open an existing Genie:
990
Chapter 35: Genies and Super Genies
If you modify a Genie when the project is running in the background, you need to per-
form an Update Pages to see the changes in the runtime project. If a runtime page con-
taining the Genie is displayed when the change is made, it will not be updated until you
exit then re-display it.
See Also
Configuring Genies
Using Genies
Using Genie Substitutions in Templates
991
Chapter 35: Genies and Super Genies
When you configure the Genie (with the Genie dialog), you have to enter three separate
tags: DEV1_PV, DEV1_SP and DEV1_OP. However, if you use structured tags, you can
configure the rectangles as follows:
In this case, you only have to enter one tag (DEV1) to generate six objects. The Genie
automatically concatenates DEV1 with either _PV, _SP, or _OP, depending on where the
tag is substituted. As well as a reduction in configuration time, this Genie is easier to
maintain.
Note: The above example illustrates the power of Genies. The more complex and the
greater number of objects in a Genie, the greater the advantage of using structured
tags. You can also make complex Genies by using multiple variables for a Genie
property. For example, %Level%_TIC_%Occ%_PV or any combination of prefix, suffix and
number of Genie variables.
See Also
Using structured tags with Super Genies
Super Genies
Individual pages (popup controllers, loop tune pages, etc.) are often used to control and
monitor devices. Super Genies are ideal when there are many devices of the same type
within a project, because you can re-use them without re-configuring for each device.
You can configure the common properties once, which is then passed to the Super Genie
at runtime.
Before Configuring a Super Genie you need to understand the following terms:
Association- An association is a name or number tag reference that you can use when
defining a Super Genie substitution. Used with ‘Ass’ Super Genie Cicode functions to
assign, and set the dynamically generated values of the Super Genie at runtime.
992
Chapter 35: Genies and Super Genies
Note: Explicit type casting to BCD, BYTE, LONGBCD, UINT and ULONG types is
not supported for the substituted tag. Use typeless substitutions for these types.
993
Chapter 35: Genies and Super Genies
If you do not specify a data type, it will default to TYPELESS. Typeless substitution
allows you to pass tags of BYTE, BCD, DIGITAL, INT, UINT, LONG, LONGBCD, or
REAL types, but not STRING. When you make a typeless substitution, CitectSCADA will
automatically try to convert the substituted 'data' to the correct type at runtime.
Note: You might want to use typeless substitutions because they offer more flex-
ibility, but be aware that errors can be harder to find.
See Also
Defining Associations for Super Genies
Configuring Super Genies
994
Chapter 35: Genies and Super Genies
Note: If you configure a Super Genie in this way and name the page with an ! prefix
to hide it, you need to select List System Pages from the Graphics Builder Options
menu to show the page with the other pages, so you can then select it and edit the
page.
Note: When creating a Super Genie, if you reference an association that has not been
defined on the Page Properties - Associations tab, it will be assumed to be an asso-
ciation type substitution with no Default, Value on error, or Description. You will
need to define the Default, Value on error, and add a Description (if necessary)
directly in the associations tab.
995
Chapter 35: Genies and Super Genies
In the example above there are two numeric expressions on the Super Genie page. When
configuring the Super Genie the association name Level was added directly to the page
properties- associations tab. The other association name Position will be passed to it at
runtime using an Ass() Cicode function.
See Also
Using a Super Genie Page
Configuring a Super Genie as a Library Object
996
Chapter 35: Genies and Super Genies
To create a new Super Genie (using the Super Genie library option):
Note: The first eight characters of the Super Genie name needs to be unique for each
Super Genie. Save it in a Super Genie library using an exclamation mark (!) prefix.
This keeps the pages hidden in the configuration environment (they are visible only
if attached to a Genie).
See Also
Using a Super Genie Library Object
997
Chapter 35: Genies and Super Genies
Note: When embedding a Super Genie in another. The embedded Genie (for the
embedded Super Genie) needs to use AssMetadata functions instead of Ass func-
tions.
998
Chapter 35: Genies and Super Genies
Note: You can also use Equipment.Item to reference a variable tag instead of using
the variable tag name. For example:Instead of variable tag name "Milk_Level" you
may reference the tag using "MilkMixer.Level" where Milk Mixer is the Equipment
name and Level is the item Name.
Note: When the Super Genie is attached to a genie, the Super Genie library object is
instantiated and becomes a new page in your project. This means any object can be
configured to call the Super Genie page.
In the following example a button will be created and saved as a genie. The Super Genie
library object created in a previous example will then be attached to the genie.
1. Select File | New Genie
2. Draw the button that the user will click at runtime to display the popup. This button
will call a Super Genie Cicode function, which performs the associations and dis-
plays the dynamically generated values
3. Configure the input tab. In the example below the AssMetadata Cicode function is
used to call the Super Genie.
999
Chapter 35: Genies and Super Genies
4. Configure the Metadata tab – define the name | value pairs. Match the name of the
metadata with the name of the association, so the dynamically generated value is
assigned to the correct association at runtime.
Note: For metadata values with no corresponding tag configured, place the value
within single quotes otherwise a hardware alarm will be raised. For example if a
value MyTitle has been configured to substitute a Super Genie window title (?TItle?),
then configure the value as 'MyTitle'
1000
Chapter 35: Genies and Super Genies
1. From the graphics page select Edit | Paste Genie, browse for the Genie you just
created, and select it.
2. On Pasting the Genie, a dialog will open prompting you to fill in the fields and enter
the variable tags.
1001
Chapter 35: Genies and Super Genies
Using tags through Super Genies at runtime increases your dynamic license point count.
Super Genies called after you have reached your point limit will return #COM. For more
information see license point count in the Installation and Configuration Guide.
See Also
Maintaining a Super Genie
Using a Super Genie Page
Note:Changes made to a page (created from a Super Genie library object) will be over-
ridden when you ' Update Pages'.
1002
Chapter 35: Genies and Super Genies
Note: If you delete a Super Genie page that is in use,the object configured to call the
page at runtime will become inoperable.
See Also
Using Constants and Arrays with Super Genies
Note: If you delete a Super Genie page that is in use,the object configured to call the
page at runtime will become inoperable.
1003
Chapter 35: Genies and Super Genies
Constants
The ability to pass constants into Super Genies is restricted in that, the constant asso-
ciation can only be where you can enter a normal Cicode tag - keyboard command, sym-
bol address field etc. The following types of constants are supported: STRING, INTEGER,
DIGITAL, REAL, and LONG.
To pass a constant you need to format the argument in the Ass function to include a sin-
gle quote on either side. For example, to pass the constant data 1.2345 into a Super
Genie, you would call the Ass function like this:
To pass a variable tag or equipment.item tag reference, you don't need the single quotes.
For example, to pass variable tag TAG1 into a Super Genie, you would call the Ass func-
tion as follows;
See Also
Arrays
Arrays
Super Genies can accept array elements or entire arrays as substitution. Passing an ele-
ment of an array is straightforward, and is done by reference to the element, as shown
here:
AssPopUp("MyPopUp", "DigArray[42]");
To pass an entire array to a Super Genie, only the array name is used. For example:
1004
Chapter 35: Genies and Super Genies
AssPopUp("MyPopUp", "DigArray");
To pass an entire array to a Super Genie, configure it to accept the array instead of a sin-
gle value. Use the following syntax for the Super Genie substitution string:
Only arrays of data type DIGITAL, INT, REAL, and LONG are supported.
See Also
Using array offsets
If you have a tag Tag1 defined as an array of 4 elements. For example, when using the
GENERIC protocol the tag has an address I1[4]:
I2
I3
I4
Tag1 represents the registers I1, I2, I3 and I4. When Tag1 is used with the Ass() Cicode
function it behaves as follows:
l If you associate a value using Ass(hWin, "X", "Tag1", 0) then the substitution string
?X?[0] gives the value in I1.
l If you associate a value using Ass(hWin, "X", "Tag1", 0) then the substitution string
?X?[2] gives the value in I3.
l If you associate a value using Ass(hWin, "X", "Tag1[0]", 0) then the substitution string
?X?[2] gives the value in I3.
l If you associate a value using Ass(hWin, "X", "Tag1[1]", 0) then the substitution string
?X?[2] gives the value in I4. This is because the two offsets are added together to deter-
mine the final offset within the array variable.
l If you associate a value using Ass(hWin, "X", "Tag1[2]", 0) then the substitution string
?X?[2] gives the error #ERR. This is because the sum of the two array offsets gives a
position (Tag1[4]) that is outside the bounds of the array.
Using array offsets with a tag that is not an array
1005
Chapter 35: Genies and Super Genies
If you have a tag Tag2 defined as a single value. For example, when using the GENERIC
protocol the tag has an address I1:
Tag2 = I1 -> I1
When Tag2 is used with the Ass() Cicode function it behaves as follows:
l If you associate a value using Ass(hWin, "X", "Tag2", 0) then the substitution string
?X?[0] gives the value in I1. This is because a non-array tag is equivalent to an array
with one element.
l If you associate a value using Ass(hWin, "X", "Tag2[0]", 0) then the substitution string
?X?[0] gives the value in I1. This is because a non-array tag is equivalent to an array
with one element.
l If you associate a value using Ass(hWin, "X", "Tag2", 0) then the substitution string
?X?[2] gives the error #ERR. This is because a non-zero offset cannot be applied to a
non-array tag.
l If you associate a value using Ass(hWin, "X", "Tag2[0]", 0) then the substitution string
?X?[2] gives the error #ERR. This is because a non-zero offset cannot be applied to a
non-array tag.
l If you associate a value using Ass(hWin, "X", "Tag2[1]", 0) then the substitution string
?X?[2] gives the error #ERR. This is because a non-zero offset cannot be applied to a
non-array tag.
l If you associate a value using Ass(hWin, "X", "Tag2[2]", 0) then the substitution string
?X?[2] gives the error #ERR. This is because a non-zero offset cannot be applied to a
non-array tag.
1006
Chapter 35: Genies and Super Genies
The inherited area may be avoided by defining the Super Genie to have a specific area.
Then, every instance of the Super Genie will have the same area, no matter which area
its parent is from. Super Genies will only inherit areas if their area is blank.
If you do not use structured tags, you can call the Ass function for the above Super
Genie as follows:
OR using equipment.item
1007
Chapter 35: Genies and Super Genies
To concatenate information for the Super Genie, you could also write your own Cicode
function, as follows:
FUNCTION
AssMine(STRING sPage, STRING "DEV1")
AssPage(sPage, sTag + "_PV", sTag + "_SP", sTag + "_OP");
END
OR using equipment.item
FUNCTION
AssMine(STRING sPage, STRING "Equip1.Item")
AssPage(sPage, sTag + "_PV", sTag + "_SP", sTag + "_OP");
END
With this function, you can call your AssMine() function (for example, from a command
button), and pass a single tag (DEV1), as follows:
AssMine("PageName", "DEV1");
OR using equipment.item
AssMine("PageName", "Equip1.Item");
Writing your own Cicode function to call a Super Genie provides extra flexibility; how-
ever, you can also use a Super Genie (for example, from a button command) to call the
Ass function, as follows:
When you use the above Super Genie, you only enter the page name and tag or equip-
ment.item once.
You need to pass the tag name (by enclosing it in quotation marks) to the Super Genie
functions. You cannot pass the tag values. For example, if you pass %tag%_SP (no
quotes), the value of the variable and not the tag name is passed to the Super Genie, and
the association will not succeed, and a runtime error may result.
See Also
Using structured tags with Genies
1008
Chapter 35: Genies and Super Genies
IFDEF macro
The IFDEF statement consists of three arguments:
IFDEF (<"Tag Reference">, <Hidden When value if tag defined>, <Hidden When value if
tag
undefined>)
The first includes a tag reference (variable tag name or Equipment.Item). If the variable
tag is defined in the tag database at project compilation, the IFDEF statement is replaced
in the Hidden When field by the second argument. If the variable tag is undefined, the
Hidden When field will contain the third argument.
Example 1
IFDEF("Bit_1", 0, 1)
In the above example, if Bit_1 is defined in the tag database, the value in the Hidden
When field will be 0. If Bit_1 is undefined, the value will be 1. Since the object is hidden
when the value is TRUE, the object will be hidden when BIT_1 is undefined (i.e. when
the Hidden When field contains 1).
Example 2
1009
Chapter 35: Genies and Super Genies
IFDEF("Bit_2",,"1")
If the second argument is omitted, as in Example 2, the variable tag specified in the first
argument is used. If Bit_2 is defined, therefore, the Hidden When field will contain Bit_
2. The value of the variable tag Bit_2 is then used to determine if the object is hidden. A
non-zero value will equate to TRUE, causing the object to be hidden.
If Bit_2 is undefined, the Hidden When expression evaluates to 1 (TRUE) and the object
is hidden.
To enter an IFDEF statement in the Hidden When Field:
1. Double-click the graphics object for which you want to edit the field.
2. Select the Appearance tab.
3. Click the Hidden When field and enter the IFDEF statement.
4. Click OK.
1010
Chapter 36: Multi-Language Projects
CitectSCADA supports a language switching capability that allows text within the run-
time environment to be translated into a variety of languages.
Items such as alarm descriptions, button text, keyboard/alarm logs, graphics text and
Cicode strings can be marked for translation during the configuration of a project, and
then displayed in a specified language at runtime. A project can support multiple lan-
guages, and you can dynamically switch between them.
Note: Text translation does not happen automatically. A language can only be sup-
ported if the required translations are manually inserted into localized language data-
bases.
See Also
Preparing a project for multi-language support
Setting the local language used at runtime
Changing the local language during runtime
1011
Chapter 36: Multi-Language Projects
This indicator serves two purposes; it flags the text as native, and tells CitectSCADA to
change the text from native to local at runtime.
By default, the text that you enter here can be in any combination of upper- and low-
ercase. In other words, Motor Inoperative will be considered the same string as motor
inoperative or MOTOR Inoperative, and they will have the same local language trans-
lation. Case-sensitivity can be introduced by setting the [Language]CaseSensitive param-
eter to 1.
1012
Chapter 36: Multi-Language Projects
Note:
1. The [Language]CaseSensitive parameter does not apply to alarm strings. Alarm
strings are always case sensitive. For example Motor Inoperative is different to
MOTOR INOPERATIVE.
2. Alarm fields no longer support Width and Justify options.
Refer to the topic Marking Alarm Text for Translation for more information
Width can be assigned any value from 0 to 254. If the local text is longer than specified,
it is truncated and left-justified. If a width is not specified, the field is the length of the
local text and the text left-justified.
Justify specifies the text justification and can only be used with Width.
Justify can be one of the following values:
l l or L - Left
l r or R - Right
l c or C - Center
l n or N - None
For example, to limit the local text in the previous case to 20 characters with right jus-
tification:
Characters that are normally part of the formatting - @ , () - can also be used within the
native text. To do this, place a caret (^) character before them. For example, to include a
comma without introducing a formatting error:
Note: The caret (^) character does appear at runtime or in the language database.
See Also
Defining the languages supported by a project
1013
Chapter 36: Multi-Language Projects
Note: For alarm related strings the Escape character ^ is removed during com-
pilation. When used immediately preceding a valid translation marker such as ^@
(text), it will skip translation and will be removed.
The following table outlines translation marker scenarios and what will happen if:
Compiler Error
Scenario Translated Display as Language
message
1014
Chapter 36: Multi-Language Projects
Compiler Error
Scenario Translated Display as Language
message
itself is regarded
as a normal char-
acter, trans-
lation marker
requires @ to be
immediately fol-
lowed by ( and a
) to follow later.
The string will
appear in the
local language
DBFs as “Text
@Text”. Double
layers of trans-
lation markers
are invalid.
See Also
Defining the languages supported by a project
Note: The language defined in the Citect.INI file will take precedence over the default
language defined in your project. For more information refer to Rules for using
parameters.
On defining your required languages in Vijeo Citect this will update the project database
LANG.dbf. This database is used to specify the local languages you would like a project
to support. It also determines if OEM conversion is required for a particular language.
1015
Chapter 36: Multi-Language Projects
Next define the default language to be used in your project. This needs to be one of the
languages you defined in the Lang.dbf.
During compilation, a local language database (eg. French.DBF) is generated for each lan-
guage defined in LANG.dbf. If the project, does not have an existing database for one of
the specified languages, one will be created with its native column populated with
native strings and local column empty.
Once this process is complete, an .rdb file is added to the master project for each defined
language to facilitate the operation of multi-language switching during runtime.
The following table provides an example of how LANG.dbf would impact the project
"MasterProject1" when compiled.
Runtime
Local Language Databases
Database
lanen.rdb
lanfr-fr.rdb
lanja-
JP.rdb
French(France)
French(France).dbf Plus RDBs
MasterProject1 English English.dbf
Japanese(Japan).dbf for lan-
Japanese(Japan)
guages
defined in
default
include
projects
If your master project includes an Include project (not one of the include projects
included with Vijeo Citect) you will need to define the supported languages within your
include project as well as in the master project.
The following table provides an example of how LANG.DBF would impact the project
“MasterProject1” when linked to "IncludeProject1" which has its own existing language
databases.
1016
Chapter 36: Multi-Language Projects
Runtime
Local Language Databases
Database
If a project and one of its included projects have variations of the same language data-
base, the translations will be merged into the ‘.rdb file’, in the table above the French
files (1 & 2) were merged.
You can also see that during compilation the Korean.dbf was created and added to the
"MasterProject". Once you have defined the required languages, and defined the default
language for your project you can open the language DBFs and insert translation (for
main and include projects).
Note: If you do not define any languages in LANG.dbf, CitectSCADA will create a
default file _lanEN.rdb The native text will be used for the associated translations.
1. In Project Editor, select Languages from the System menu. The Languages dialog box
appears.
2. In the Languages dialog, choose the required language from the drop down list and
enter the required language properties.
3. Click Add to append a new record, or Replace to modify an existing record.
1017
Chapter 36: Multi-Language Projects
Note: When setting the properties for you will be required to associate a setting for
the parameter [CTEDIT]ANSIToOEM for each language. This parameter defines
whether or not the language requires translation to OEM. See the topic OEM char-
acter sets for more information.
See Also
Languages Properties
Translating local language database
Defining CitectSCADA unsupported languages
Languages Properties
Languages have the following properties:
Language
Select the language from the drop down list provided.
Source File (Optional)
A file which contains translation for the chosen language. Enter the complete file name
(with extension) For example, Spanish.DBF.
The compiler raises an alert for any specified file names with the wrong extension or
without an extension.
If a file is specified but cannot be found, the compiler creates a DBF file in that name
with empty translations.
If this field is empty and “English(Australia)” has been chosen, the compiler will look
for “English(Australia).DBF” first, if not found, then “English.DBF”, if still not found, it
will create a file named “English(Australia).DBF” with empty translations.
ANSIToOEM
This field corresponds to the Citect.ini parameter [CTEDIT]ANSIToOEM, which deter-
mines if ANSI to OEM translation is required to support a language. Once you associate
a setting for this parameter with a language, the parameter will be adjusted accordingly
whenever the language is implemented. (See OEM character sets for more information.)
Comment
Any useful comment (optional).
See also
Defining the languages supported by a project
1018
Chapter 36: Multi-Language Projects
1019
Chapter 36: Multi-Language Projects
l 204 - Russian
l 222 - Thai
l 238 - East European
See Also
Setting the local language used at runtime
NATIVE LOCAL
Line Disconnected Alarm at Line Speed alarme "Ligne deconnectee" sur la vitesse de
la ligne
When the project is run, the French translations will display in place of the associated
native text.
If you do not enter a local equivalent for a native text string, the native text is displayed
by default. You can specify to display "#MESS" instead of the native text by setting the
[Language]DisplayError parameter to 1 (one); the default is 0 (zero).
A language database can contain entries which are not actually included in a project.
This means that a single language database can be developed that is applicable to many
projects.
Once you have completed adding translations to a database, you will need to recompile
the project to implement the changes.
1020
Chapter 36: Multi-Language Projects
Note: After translation, review the foreign language interface and verify that trans-
lated strings fit in their graphics elements correctly.
See Also
Setting the local language used at runtime
Note: To use characters for Baltic, Central European, Cyrillic, Greek, Turkish, and
Asian languages, or right-to-left languages (Arabic, Hebrew, Farsi, and Urdu) the
operating system needs to have the corresponding language version of Windows, or
have installed system support for that language.
See Also
Logging data in different languages
Changing the local language at runtime
1021
Chapter 36: Multi-Language Projects
To log both native and local to the same device, just enter the standard fields, and the
native fields together in the format field. To log them to different devices, use a Group of
two devices, and enter the local fields as the format for one, and the native fields as the
format for the other.
See Also
ASCII and ANSI character sets
Note:
1. The [Language]DisplayError parameter does not apply to alarm strings.
2. : For alarm data where there are multiple clients and one user name, a scenario
may occur where the runtime display shows a variety of languages. For more infor-
mation refer to Alarm data localization.
See Also
Logging data in different languages
1022
Chapter 36: Multi-Language Projects
ever, the alarm data in Client A is in English instead of French. Thus Client A would
display both French and English even though Client A has logged in with French.
3. Client C then logs into “Operator” with German. Once login has been successful, the
display contents in Client C are in German, including both UI and alarm data. How-
ever, the alarm data in Client A and Client B are in German instead of French or Eng-
lish. Thus Client A would display both French and German even though Client A
has logged in with French, and Client B would display both English and German.
In this scenaio allow Client A, Client B and Client C to use separate accounts, such as
“OperatorA”, “OperatorB”, “OperatorC”. This will then allow each user to view the run-
time display in their preferred language.
See Also
Setting the local language used at runtime
Note: Character sets are distinct from fonts. A font defines the visual/appearance
properties of a character, not its meaning.
ASCII (American Standard Code for Information Interchange) is a widely adopted 7-bit
code specifying the basic alphanumeric character set of the English language. For exam-
ple, the character capital "A" has the ASCII value of 65, the character lowercase "a" a
value of 97.
The ASCII character set contains 96 characters and is commonly used as a standard for
protocols and files.
Much of CitectSCADA uses ANSI (American National Standards Institute) character sets.
ANSI character sets are language-based, with each different language version of Win-
dows (French, Korean and so on) requiring a specific ANSI character set. Codes 32 to
127 contain standard ASCII characters.
Windows uses Unicode, but still supports ANSI character sets. Several of CitectSCADA's
utilities have been created for Unicode, for instance Process Analyst. Unicode accom-
modates known character sets by having one 16-bit (worldwide) character encoding
standard.
See Also
OEM character sets
1023
Chapter 36: Multi-Language Projects
1024
Chapter 37: Working with Multiple Monitors
Multiple monitors are now supported in the core product instead of within a set of tem-
plates. CitectSCADA runtime will display a new window on each of the multiple mon-
itors at start-up. Once the windows are displayed, the user can use the standard page
navigation functions to change pages on the individual window. The built-in page navi-
gation functions work under the multi-monitor environment. Several built-in Cicode
functions are made available for the user to query information for each of the monitors
installed on the machine for further customization.
Multiple monitors are configured by CitectSCADA at startup as follows:
l Reads [MultiMonitors] Monitors to determine which monitors will be shown with
CitectSCADA windows.
l Enumerates through the specified monitors and show a new CitectSCADA window
at the origin of each of the monitors. The page to be displayed on each monitor will
be determined by the parameter [MultiMonitors] StartupPage<n>.
l Once a CitectSCADA window is displayed on each of the specified monitors, you can
use the standard page navigation functions to display a page on each of the win-
dows independently.
If this conflicts with your own implementation of multiple monitors support, for exam-
ple if you are using CSV templates, you can disable the core support by setting param-
eter [MultiMonitors] DisableAutoStart to 1.
See Also
Configuring Startup Pages for Multiple Monitors
MultiMonitors Parameters in the Parameters documentation
1025
Chapter 37: Working with Multiple Monitors
Note:
• The OPC DA Server does not fully support WriteVQT functionality, as a Citect-
SCADA I/O server does not allow quality and timestamp changes that are generated
from an external source.
• Connecting a CitectSCADA OPC DA client to an CitectSCADA OPC DA server is
not recommended, as the client was not designed to be used in this way. This mode
of operation has not been validated.
1026
Chapter 37: Working with Multiple Monitors
Note: To successfully operate an OPC DA Server, you will need to correctly configure
its DCOM settings based on your client requirements. See the topic OPC DA Server
DCOM settings.
See also
OPC DA Server Properties
1027
Chapter 37: Working with Multiple Monitors
Selecting Flat will present tags at a single level represented by their tag names. Selecting
Hierarchy presents the tags in a directory structure that represents the clusters and equip-
ment definitions that are used.
No selection is the default, which is the equivalent of selecting Flat.
For more information, see OPC Item Browsing.
Comment
Any useful comment (optional).
The following fields are implemented with extended forms (press F2).
Additional OPC Item Vendor Properties:
Field
Selecting True will expose the Field tag extension as an OPC DA vendor-specific prop-
erty of the OPC item. No selection is the default, which is the equivalent of selecting
False.
Valid
Selecting True will expose the last valid value for the Valid tag extension as an OPC DA
vendor-specific property of the OPC item. No selection is the default, which is the equiv-
alent of selecting False.
OverrideMode
Selecting True will expose the OverrideMode tag extension as an OPC DA vendor-spe-
cific property of the OPC item. No selection is the default, which is the equivalent of
selecting False.
ControlMode
Selecting True will expose the ControlMode tag extension as an OPC DA vendor-specific
property of the OPC item. No selection is the default, which is the equivalent of selecting
False.
Status
Selecting True will expose the Status tag extension as an OPC DA vendor-specific prop-
erty of the OPC item. No selection is the default, which is the equivalent of selecting
False.
Override
Selecting True will expose the Override tag extension as an OPC DA vendor-specific
property of the OPC item. No selection is the default, which is the equivalent of selecting
False.
1028
Chapter 37: Working with Multiple Monitors
See Also
Configuring the OPC DA Server
1029
Chapter 37: Working with Multiple Monitors
l click OK
7. You can now exit the Properties dialog.
To configure the OPC DA Server specific settings
1030
Chapter 37: Working with Multiple Monitors
where multiple instances of the Runtime Manager and the OPC DA Server are
launched.
7. Once you have selected an option, you can exit the Properties dialog.
To configure the connectivity environment settings
The way you configure a server's connectivity settings depends on whether it is on a
domain or part of a workgroup. The following points describe how you should set up dif-
ferent client/server combinations.
l If the server is on a domain and the client is on a domain:
On the server computer, add the domain login identity that the client uses to the
OPC DCOM users group you have created.
l If the server is on a domain and the client is part of a workgroup:
Create a matching Windows login identity on the server with the same password
as the Windows login identity on the client machine. Add this Windows login
identity to the OPC DCOM users group you have created.
l If the server is part of a workgroup and the client is on a domain:
Create a matching Windows login identity on the server with the same password
as the domain login identity on the client machine. Add this Windows logon iden-
tity to the OPC DCOM users group you have created.
l If the server is part of the same workgroup as the client:
Create a matching Windows login identity on the server with the same password
as the Windows login identity on the client machine. Add this Windows login
identity to the OPC DCOM users group you have created.
Note: The registry entry for OPC Client application needs to be configured to accept callbacks. An indication
that this is not being done as required, is that all synchronous OPC DA APIs work as expected but data updates
and other asynchronous operation never complete.
See also
OPC DA Server Properties
1031
Chapter 37: Working with Multiple Monitors
See also
OPC Item Browsing
Notes:
1. Data Type filtering is not supported in the browsing function. This is due to the
fact that CitectSCADA data types are not known until tags are subscribed to, if the
user interface and other clients are subscribed at different points in time, clients
could get a different list of tags for the same filter being applied. This is an accepted
relaxation of the OPC Foundation CTT rule.
2. The actual "fully qualified" subscription name for an OPC DA Item might differ to
1032
Chapter 37: Working with Multiple Monitors
the name returned by the OPC DA Browsing APIs, which is in accordance with OPC
DA v2.05 and 3.0 specification. For example, in a multiclustered system "Tag1"
might be defined in several clusters so its "fully qualified" item id might be
"Cluster1.Tag1". Subscription to "Tag1" might still work where there is no ambiguity.
In general it is recommended that OPC DA Clients obtain "fully qualified" ITEM ID
via GetItemID if OPC DA v2.05 is used, or from OPCITEMPROPERTY structure if
OPC DA v3.0 is used.
See also
Configuring the OPC DA Server
1033
Chapter 37: Working with Multiple Monitors
1034
Chapter 37: Working with Multiple Monitors
OPC DA Server
Version 1.0 Version 2.0 Version 3.0
required interfaces
OPC Server
OPC Group
See also
OPC DA Server Reference Information
1035
Chapter 37: Working with Multiple Monitors
1036
Chapter 37: Working with Multiple Monitors
R4 OK OK OK OK OK OK Over- OK
flow
if out of
range
R8 OK OK OK OK OK OK Over- OK
flow
if out of
range
CY OK OK OK OK OK OK Over- OK
flow
if out of
range
DATE OK OK OK OK OK OK Over- OK
flow
if out of
range
BSTR OK OK OK OK OK OK OK OK
BOOL OK OK OK OK OK OK Over-
flow
OK
if out of
range
Note: For read operations that result in an overflow, OPC E_FAIL will be returned
and read quality will be set to BAD.
See also
OPC client write request conversions
OPC DA Server reference information
1037
Chapter 37: Working with Multiple Monitors
1038
Chapter 37: Working with Multiple Monitors
BOOL OK OK OK OK OK OK OK OK
Note: For write operations that result in an overflow, OPC E_FAIL will be returned
and the target SCADA value will not be changed.
See also
OPC client read request conversions
OPC DA Server reference information
Note: The property IDs 2, 3 and 4 may not provide actual values in some cases.
Refer to the Note column below for more information.
Variant data
Property ID Description Note
type
1039
Chapter 37: Working with Multiple Monitors
Variant data
Property ID Description Note
type
See also
OPC DA Server Reference Information
1040
Chapter 37: Working with Multiple Monitors
The following topics describe how the EWS server is implemented in CitectSCADA, and
the set of features it supports. The topics include:
l Supported EWS methods
l Configuring the EWS Server
l Operating the EWS at runtime
l Using HTTPS certificates
Note: The information included here is only intended to describe the variation of
EWS implemented in Product. If you would like more comprehensive information
about Schneider Electric's EWS platform, contact Technical Support.
See also
Configuring the EWS Server
Operating the EWS at runtime
Supported Methods
1041
Chapter 37: Working with Multiple Monitors
Note: It is assumed you have some understanding of SSL. Please refer to http://t-
echnet.microsoft.com/en-us/library/bb727098.aspx for more information on how to
create your own certificate.
See also
EWS Server Properties
Note: If more than one EWS server is configured for the same computer compilation
will be unsuccessful. The following compilation message will be generated "Multiple
EWS Servers cannot run on the same machine."
Server Name
The name of the server. The name needs to be unique to the project and any included
projects, and not contain spaces. If the name is not unique, compiler error 2082, "A
server with this name already exists" will be returned.
Network addresses
1042
Chapter 37: Working with Multiple Monitors
The network address of the server being configured. Use a configured network address
for EWS Server network address. If the network address is empty, then localhost
(127.0.0.1) will be used; if an invalid network address is provided, compiler error 2084,
"Network address not defined in 'Servers' > 'Network Address' Form" will be returned.
Port
The port this server will listen on. The port number needs to be unique amongst all
SCADA servers that share the same IP address. If the port field is empty, 2086 will be
used. If the port number is not unique, compiler error 2088 "Invalid port number" will be
returned.
Certificate Name
The 'subject' of a valid X.509 certificate that is used for secure transactions between EWS
server and client under Secure Socket Layer protocol. The certificate needs to be installed
on the EWS server manually.
Comment
Any useful comment (optional).
See Also
Configuring the EcoStruxure Web Services Server
Note: It is assumed you have some understanding of SSL. Please refer to http://t-
echnet.microsoft.com/en-us/library/bb727098.aspx for more information on how to
create your own certificate.
1043
Chapter 37: Working with Multiple Monitors
Note: EcoStruxure Web Services Servers in CitectSCADA require SSL. If the certificate
is not specified in the configuration, compiler throws error "Certificate must be con-
figured for EWS Server" and compilation fails. If certificate that user specified is not
found in LocalMachine.My certificate store on the host machine, EWS will not be
launched. Details of error will be logged to tracelog.EWSServer.dat under the logs
folder.
See also
Configuring the EcoStruxure Web Services Server
NOTICE
NOTICE It is recommended that you do not set the [Server]EWSAllowAnonymousAccess
INI parameter to 1.If set unauthorized access to tag data may occur. Enable access only if
your EWS Client supports Anonymous authentication and no other.
Note: To Invoke EWS Service Methods from EWS client requires certificate and user
credentials authentication. The X.509 certificate used for the EWS server needs to be
trusted by the client. More information on certificate management may be found at
http://msdn.microsoft.com/en-us/library/ms731899(v=vs.100).aspx.
Supported methods
1044
Chapter 37: Working with Multiple Monitors
l GetValues
l GetContainerItems
l SetValues
l GetItems
l GetWebServiceInformation
Unsupported methods
l GetAlarmEvents
l GetUpdatedAlarmEvents
l GetAlarmEventTypes
l AcknowledgeAlarmEvents
l GetHistory
Note: If Allow Anonymous Access is enabled, the SetValues method is not supported
for anonymous users.
See also
Configuring the EcoStruxure Web Services Server
1045
Chapter 37: Working with Multiple Monitors
1046
Chapter 38: Compiling and Running a Project
This section describes how to compile and run a CitectSCADA project, and the func-
tionality available to support these processes.
See Also
Compiling a Project
Running the System
Running Your System Over the Internet
Restarting the System Online
Software Protection
Compiling a Project
The CitectSCADA compiler brings together elements of your project - the configuration
databases, graphics and Cicode files - to create a runtime system.
Compilation checks the project for errors and optimizes your system for fast and efficient
operation. The time necessary to compile a project depends on its size and on the speed
of your computer. Typically, compiling only takes several minutes.
When the CitectSCADA compiler runs, it normally opens files in exclusive mode. In this
mode only CitectSCADA has access to the files (while the compiler is running). This
improves the performance of the compiler, but can also result in an incomplete com-
pilation if two people try to compile different projects at the same time, and these
projects have one or more Include projects in common. The [General] ShareFiles param-
eter tells the compiler to open files in shared mode. This option allows shared network
users to run the compiler at the same time, but it can increase the time necessary for the
compilation.
Restart the client process if the hardware alarm "Cicode library timestamp differs" is raised
after a page is opened.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
1047
Chapter 38: Compiling and Running a Project
Note: A hardware alarm of "Cicode library timestamp differs" will be raised if the
Cicode library used by a page has a different timestamp from the one in memory.
The timestamps will be different if the project has been fully recompiled, the project
has been incrementally recompiled after the page has been modified, or if the project
has been incrementally recompiled after any Cicode has been modified.
To compile a project:
1048
Chapter 38: Compiling and Running a Project
Incremental compilation
You can compile the project incrementally. With incremental compilation, CitectSCADA
only compiles the database records that were added (or changed) since the last com-
pilation. The remainder of the project is not re-compiled.
Note: Some database records are dependent on other database records. If you change
a dependent record, CitectSCADA compiles the entire database.
Before you run a system on a live plant, perform a complete compilation (switch off
Incremental Compile) as the compilation will be more rigorous. Similarly, when you
restore a project from floppy disk, you need to perform a complete compilation the first
time (switch off Incremental Compile).
To switch to Incremental Compile:
1049
Chapter 38: Compiling and Running a Project
l Do not attempt to run your system until you have resolved errors reported during
project compilation.
l Always perform a complete compilation before promoting your project to the test or
live environments.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
Compilation options
The compiler has a number of options available to help simplify the process of resolving
compilation issues. Typically, these options modify the output of the compile error log,
making it more practical to assess specific error types and entries.
The options listed here can be adjusted via the Project Editor Options dialog, which is
accessible from the Project Editor's Tools menu.
l Log "tag not defined" warnings during compile
If you select this option, the compiler will generate a "tag not defined" warning in
the error log for any tags detected that are not defined in the variable database.
As CitectSCADA v7.40 now allows you to include undefined tags on your
graphic pages, this warning may be redundant and impractical. By unchecking
this option, the warnings are still included in the displayed warning count, but
they are not added to the error log.
l Log deprecated warnings during compile
If you select this option, the compiler will generate a warning to identify any dep-
recated elements it detects in a project, i.e. any functions, parameters, or Kernel
commands that are no longer supported.
1050
Chapter 38: Compiling and Running a Project
By unchecking this option, the warnings are still included in the displayed warn-
ing count, but they are not added to the error log.
l Warn about unused tags during full compile
This option enables the generation of warning entries for unused tags that are not
used directly in a CitectSCADA project. The warning entries are included in the
compile errors form when a full compile is run. By default this option is not
selected.
See Also
Setting the Project Editor options
Property Description
Type The type of error. Three types can occur during compilation. These are:
ERROR - The compilation process continues, however the project will not com-
pile successfully until you have corrected the error.
FATAL - The severity of this error is such that it halts the compilation process.
The project cannot be compiled until you correct the error.
WARNING - The error was not serious enough to stop the project being com-
piled successfully, however investigate and correct the error.
Rec- The number of the database record where the error has occurred.
ord
Name The name of the graphics page, library, or report format file where the error
has been detected.
Field The database field where the error has been detected.
Table The database table where the error has been detected.
Con- The location in the database field, report format file, or Cicode library where
text the error has been detected. The context of the error is enclosed in braces {. .
. }.
1051
Chapter 38: Compiling and Running a Project
See Also
Compile Error Messages
Error Mes-
Description
sage
Address When reading a long or real from the memory of an I/O Device, addresses
on bad need to be on odd or even boundaries. Addresses cannot be mixed. You can
boundary disable checking with the [General]CheckAddressBoundary parameter.
Analog An INT or other analog tag is specified where a DIGITAL tag is expected.
address Check that the tag name is correct, or that a DIGITAL data type is specified
not sup- for the tag.
ported
Array size A tag is indexed but that tag is not declared as an array, or no index has
exceeded been specified when a tag is declared as an array, or the wrong number of
dimensions are specified for an array, or more than four dimensions are
specified for an array.
Bad The format is incorrectly specified for an analog variable. Check the Format
analog for- field in the Variable Tags form.
mat
Bad factor A Cicode expression that contains an invalid expression has been used.
spec- Check the syntax of the expression.
ification
Bad float- A floating-point number cannot be found where one is expected, or the
ing point floating-point value is out of range.
value
Bad I/O The variable tag address is not a valid format for the I/O Device protocol
Device you are using: check the address format. (See the Data Types topic in the
variable Help for each supported I/O Device for a list of appropriate address formats
for that device).
Bad An integer value cannot be found where one is expected, or the integer
integer value is out of range.
value
Bad point The incorrect point limit is specified in the Citect.ini file. The point limit
limit needs to correspond to your CitectSCADA license.
Bad raw An invalid raw data type or a mismatch of data types is specified, for exam-
1052
Chapter 38: Compiling and Running a Project
Error Mes-
Description
sage
data type ple, an attempt was made to convert an integer into a string.
This may be due to a variable address implying a data type that is not com-
patible with the data type specified.
Example 1
Address: DB101,54.3[32]
In this case, the address implies that the variable is an array of 32 DIG-
ITALs (via bit access) but the tag data type is REAL.
Example 2
Protocol: ABMLXEIP
Address: T4:0/0
In this case, the address implies that the variable is a DIGITAL (via bit
access) but the tag data type is INT.
Cannot Error message(s) were detected while compiling the function library.
compile
every
function
Cannot The file cannot be opened. The file does not exist, or it has become corrupt,
open file or your system is out of file handles.
Cannot The file cannot be read. The end of file was found, or it has become cor-
read from rupt.
file
Cannot A RETURN statement cannot be used in a function that does not return a
return value. Remove the RETURN statement or declare a return data type for the
value function.
from void
1053
Chapter 38: Compiling and Running a Project
Error Mes-
Description
sage
function
Cannot You cannot declare an array within a function. Arrays can only be declared
use an as library variables, i.e. at the beginning of the library file.
array
inside
function
Cannot The file cannot accept a write operation. The file has become corrupt or the
write to disk is full.
file
Cicode An array in a Cicode module cannot exceed 60 KB. Reduce the size of the
data limit array.
reached
Close The Cicode statement has a different number of open and close brackets.
bracket Another close bracket ')' or ']' is expected in the statement.
expected
Close com- A comment opened with /* needs to be closed with the */ delimiter. Add
ment the */ delimiter or use a single line comment that starts with an excla-
delimiter mation mark (!) and has no end delimiter.
expected
Close quo- The Cicode statement has a different number of open and close quotation
tation marks. Another close quotation mark (") is expected in the statement.
mark
expected
Database The database is full. If the error persists, contact Technical Support for this
table full product.
Disk full The disk is full. Remove unwanted files from the disk, or replace the exist-
1054
Chapter 38: Compiling and Running a Project
Error Mes-
Description
sage
Equipment Indicates that the Item field on the Tag Form (Variable Tags, Trend Tags, and
not specified all Alarm Tags) was specified without an associated Equipment Name.
for tag item.
Please spec-
ify equip-
ment or
remove tag
item
Equipment Indicates the combination of “Equipment.Tag Item” is not unique within the
Name and cluster. Change the name of the Equipment and/or Tag Item.
Tag Item not
This message will also occur if on the same level within the equipment hier-
unique.
archy, the equipment object and the tag item object name are identical.
Specify or
change the
Tag Item
field
Expres- An expression is too large for the compiler. Reduce the length of the expres-
sion too sion by splitting the expression into two or more smaller expressions.
big
File The file has been opened by another user. Set the [General] ShareFiles
already parameter to 1 in the Citect.ini file to open files in shared mode.
opened in
SINGLE
mode
File does The file cannot be found. Check that the file name is correct.
not exist
File is An attempt was made to write to a read-only file. Check that the file name is
read only correct or change the attributes of the file.
1055
Chapter 38: Compiling and Running a Project
Error Mes-
Description
sage
File not The database needs to be indexed, but the index file associated with the
indexed database cannot be found. Pack the database.
File size A Cicode functions file, or Report format file, or an include file is too big.
error The maximum file size is 1 MB.
GLOBAL You have declared a Global function within your Cicode. Global is not a valid
function function type. Instead, the type Public needs to be used.
is not
allowed,
use PUB-
LIC
Group not A group name was expected. Check that the group name is correct, or that
found the group has been specified correctly in the Groups form.
Include An included project (specified in the Included Projects database) does not
project exist. Check the name of the included project.
not found
Incorrect Too many or too few arguments have been passed to a Cicode function.
number
of argu-
ments for
function
Index key The database has a corrupted index. Pack the database.
has
changed
Invalid A non-integer value was found where a TRUE or FALSE value is expected.
BOOLEAN For example, the controlling expression in an IF, WHILE, or FOR statement
value needs to be an integer.
Invalid The font does not exist in the project. Check that the font name is correct,
font name or specify the font with the Fonts form.
1056
Chapter 38: Compiling and Running a Project
Error Mes-
Description
sage
Invalid A group does not exist in the project. Check that the group name is correct,
group def- or specify the group with the Groups form.
inition
Invalid The time is incorrectly specified in the Time, Period or Sample Period field
time for- of a Reports, Events, Trend Tags, SPC Trend Tags, or Devices form.
mat
Time formats needs to be in the format HH:MM:SS and needs to be in the
range of 0:00:00 - 23:59:59. Only the hour is necessary, for example a
value 16 means 16:00 (4:00 PM). Also 24:00:00 is accepted for historical
purposes, and maps directly to 0:00:00.
Label The syntax of the argument is incorrect, or the incorrect number of argu-
argument ments has been specified, or the number of characters in an argument is
error incorrect.
Label is Label names needs to be unique. Check the Labels form for duplicated
defined names.
twice
Label too The label is too big. The size of a label cannot exceed 8 kb.
big
Maximum The report file size needs to be less than 63 kb. Reduce the size of the
report report or configure two reports.
size
exceeded
MODULE You have declared a Module function within your Cicode. Module is not a
function valid function type. Instead, the type Private needs to be used.
is not
allowed,
use PRI-
VATE
1057
Chapter 38: Compiling and Running a Project
Error Mes-
Description
sage
tion
No user A CitectSCADA system is read only until someone logs in. Therefore, before
defined compilation can occur, a user and role needs to be defined to allow someone to
log in. No User has been defined in the configuration for this project. At least
one user needs to be defined.
Not data- The database has become corrupt or the file format is unknown. Pack the
base for- database.
mat
Open You need to use parentheses () in Cicode functions, even when they have
bracket no parameters, for example MyFunction().
expected
This error can be generated when a variable tag is placed on a graphics
page and the name of the tag is identical to the name of a Cicode function in
the project or an included project.
Out of file CitectSCADA uses a file handle to open each file. When you try to open too
handles many files or databases simultaneously, CitectSCADA can need more file
handles than are available.
You are likely to run out of file handles if you have many included projects.
When CitectSCADA compiles your project, it will open several files in each
include project at the same time, so each extra project you include will
increase the usage of file handles. If you get this alert message when you
have added another include project, you have run out of file handles. To
verify this, remove one of the included projects to see if CitectSCADA can
then compile your project.
With Windows running on a network, the setup of the number of file han-
dles is located in various places. To increase the number of file handles in
DOS, the setup is in the CONFIG.SYS file. If you are using Novell Netware
you need to also increase the file handles in the NET.CFG or SHELL.CFG file.
You need to also increase the number used by CitectSCADA with the [CtE-
dit]DbFiles parameter. Adjust the following settings the associated files:
CONFIG.SYS
FILES=120
NET.CFG or SHELL.CFG
file handles=120
1058
Chapter 38: Compiling and Running a Project
Error Mes-
Description
sage
Out of CitectSCADA has run out of memory. Increase the amount of memory in the
memory computer or use smaller databases.
Point limit The maximum number of points that can be referenced has been reached.
reached The maximum point limit is determined by your CitectSCADA license. Con-
tact Technical Support for this product.
PRIVATE You have declared a Private variable within your Cicode. Private is not a
variable is valid variable type. Instead, the type Module needs to be used.
not
allowed,
use MOD-
ULE
Protocol The protocol field in the I/O Devices database is blank. You need to select a
expected protocol for the I/O Device.
PUBLIC You have declared a Public variable within your Cicode. Public is not a valid
variable is variable type. Instead, the type Global needs to be used.
not
allowed,
use
GLOBAL
Reached The end of the database has been reached or the database has become cor-
the end of rupt. Pack the database. If the error persists, contact Technical Support for
table this product.
Read A mapped variable cannot be written when Remap Write is disabled, and
remap is cannot be read when Remap Read is disabled. Check the Remapping form.
not sup-
ported for
this var-
iable
Software An internal CitectSCADA software error has been detected. Contact Tech-
error nical Support for this product.
1059
Chapter 38: Compiling and Running a Project
Error Mes-
Description
sage
Spec- A system file has become corrupt, or been deleted. Re-install CitectSCADA
ification on your system. If the error persists, contact Technical Support for this
file invalid product.
Statement CitectSCADA is expecting a statement. Check the Cicode for syntax errors.
expected
String too The string size has been exceeded. The maximum size of the string not to
big exceed 255 characters.
Super Super Genie syntax (?) can only be used on pages. You cannot use a Super
Genie Genie in a report or Cicode function library. Use the TagRead() and
must be TagWrite() functions instead.
on a page
Symbol A database record does not exist. Check that the record name is correct.
search
failed
Syntax A malformed Cicode expression has been specified. Check the structure of
error the expression.
Tag Tag names need to be unique. Check the Variable Tags form for duplicated
already names.
defined
Tag A tag name was not found where one was expected, or an expression has
expected been passed to a function that expects a tag. Check that the tag name is cor-
rect, or specify the tag with the Variables Tag form.
Tag not The tag does not exist. Check that the tag name (or the equipment.item ref-
found erence) is correct, or specify the tag (with the Variables Tag form). If the
tag does exist in the variables database, the index to the database might be
incorrect. This can occur if you have edited the variables database using
Excel or some other database editor. To re-index the database choose File |
Pack (in the Project Editor).
Too many Too many arguments are specified in a Cicode function. The maximum
argu- number of arguments allowed is 32.
ments
1060
Chapter 38: Compiling and Running a Project
Error Mes-
Description
sage
Too many More than 4500 user functions have been defined. To increase the number
Cicode of functions allowed (up to 10000), use the CtEdit parameter Max-
functions CicodeFunctions This error is often due to Cicode functions being defined in
a number of included projects. Extending this parameter might affect sys-
tem performance. Only set it when advised by Citect Customer Service.
Too many Too many fields have been specified in the database. This error will only
fields in occur if the Citect.frm file has been changed or become corrupt.contact
database Technical.Support for this product.
Too many The maximum number of .DBF files that can be open simultaneously has
files open been exceeded. Increase the limit by changing the [CtEdit] DbFiles param-
eter.
Too many More than 240 Include projects have been defined.
Include
projects
Too many Too many records have been specified in the database. This error should
records in only occur if the Citect.frm file has been changed or become corrupt. Con-
database tact Technical Support for this product.
Trailing There are extra trailing characters in a Cicode statement, following the
char- semi-colon.
acters in
Cicode
Trailing The database record name contains invalid characters. Remove any invalid
char- characters from the record name.
acters in
Name
The beginning of the database has been reached or the database has
Unexpect- become corrupt. Pack the database. If the error persists, contact Technical
ed begin- Support for this product.
ning of
file
The end of the database has been reached or the database has become cor-
Unexpect- rupt. Pack the database. If the error persists, contact Technical Support for
ed end of this product.
file
Unknown An output file could not be opened during compilation. Pack the database. If
bin error the error persists, contact Technical Support for this product..
1061
Chapter 38: Compiling and Running a Project
Error Mes-
Description
sage
Unknown A field is being referenced that does not exist. The database has been mod-
field ified or has become corrupt. Pack the databases. If the error persists, con-
tact Technical Support of this product.
Unknown The include file cannot be found. Check the name of the include file, or that
file the included file is in the correct directory.
Unknown The I/O Device (unit) does not exist in the project. Check that the I/O
I/O Device name is correct.
Device
Note: Shared folders are not recommended for servers or control computers.
1062
Chapter 38: Compiling and Running a Project
timestamp to those in the COPY directory, the files are copied across to the RUN
directory.
By updating the runtime files in the COPY directory, they will be automatically copied to
the RUN directory whenever they are changed.
Shared Folders
This is where the runtime files are stored in a network shared location, with a backup
server specified in case the main files are not available.
l [CtEdit]Runpoints to the main remote shared location of the runtime files.
l [CtEdit]Backup points to the alternate remote shared location.
Note: Shared folders are not recommended for servers or control computers.
1063
Chapter 38: Compiling and Running a Project
Run/Copy can be used to update project files from the File Server (PC1) to the File Client
(PC2). Run/Copy does not support nested project folders, therefore project folders need to
be on the same level as shown below.
The [User] folder (or a parent of the [User] folder) needs to be shared on the network. The
shared folder needs to be accessible for machines to download the project runtime files.
In this example, [User] is shared.
File Client (PC2)
File Client (PC2) will use Run/Copy to get the latest updated projects from the File
Server.
The settings for Run/Copy on the client are:
[ctEdit]Copy = \\PC1\User\Main
[ctEdit]Run = C:\Documents and Settings\All Users\Application Data\Citect\Citec-
tSCADA 7.30\User\Main
The [Run] folder needs to be a child of the [User] folder on the target machine. The fol-
lowing pictures shows the project folders before and after the first project start-up with
Run/Copy.
1064
Chapter 38: Compiling and Running a Project
It can be seen that the project folders are automatically created by the Run/Copy process
if they don't exist. In this example, the basic runtime files are copied to the [Run] folder.
Any other files will be copied over on demand, such as page *.ctg and *.rdb files. After a
successful project start-up, it is also possible for the project to start up when the [Copy]
path is not available (if, for example, the File Server is uncontactable). In this case, only
pages that have been previously viewed (that have been copied over previously on
demand) are available.
If the target machine has the project development environment installed, do not launch
CitectSCADA Explorer after Run/Copy are set up. Doing so will override the [Run] path
setting and you may end up running the wrong project.
See Also
File server redundancy
Using the Web Client
1065
Chapter 38: Compiling and Running a Project
1. Determine the name and location of any files that you want to deploy with the
project.
These files could include CSV or DBF files associated with tables presented on
project pages, or HTML content. It should also include any required ActiveX
objects.
Note: The following files cannot be included into a Web Deployment as they are
used by the compiler when preparing the zip files:
• Changes.dbf
• Custfiles.dbf
• Errlog.dbf
• Custfiles.zip
• Custactivex.zip
• _library.rdb
• _project.rdb
2. In Project Editor, select Custom Files from the System menu. The Custom Files dialog
will display.
3. Enter the required Custom File Properties for each file you would like to include in a
deployment. The Add button appends a new file entry, or Replace modifies an exist-
ing entry.
4. If you are adding an ActiveX object, you need to specify this by setting the Is ActiveX
field on the extended form properties (accessible via the F2 key).
5. If you need the file to be placed in a particular directory on the destination server fol-
lowing extraction, specify the required location in the Destination location field (acces-
sible via the F2 key).
See Custom File Properties for more information.
Note: If an ActiveX object has an associated data source, verify that the data source
can be located by the computer hosting the client. See the topic Managing associated
data sources under the section on ActiveX objects in the CitectSCADA Help.
See Also
Running the Web Deployment Preparation tool
1066
Chapter 38: Compiling and Running a Project
File Name
The name of a file you would like to incorporate into to a runtime deployment. For exam-
ple, a CSV or DBF file associated with a table presented on a project page, an HTML file,
or a required ActiveX object. You can use wild cards ('*' or '?') when specifying a file
name.
To identify a custom file, you need to precede the file name with:
l an absolute path
l the Windows relative path
l a CitectSCADA directory
A Windows relative path should navigate from the current project directory. A Citect-
SCADA directory path can be one of the following:
l [BIN] – where the CitectSCADA binary files are located
l [Config] – where the CitectSCADA configuration files are located
l [DATA] – where the CitectSCADA data files are located
l [USER] – where databases are located
l [COMMONFILES] – where CitectSCADA common files are located
The Browse button allows you to select a required file with the path included.
Note: The following files cannot be included as Web Client files as they are used by
the compiler when preparing the deployment zip files:
• Changes.dbf
• Custfiles.dbf
• Errlog.dbf
• Custfiles.zip
• Custactivex.zip
• _library.rdb
• _project.rdb
Comment
Any useful comment (optional).
The following fields are implemented with extended forms (press F2).
Is ActiveX
This field specifies if a file is an ActiveX object or not, which determines if it should be
included in custActivex.zip or custFiles.zip. If the value you select is False, the file will
be added to custFiles.zip; if you select True it will be added to custActiveX.zip.
1067
Chapter 38: Compiling and Running a Project
If you leave this field blank, any file with the extension ".ocx", will be automatically
added to custActiveX.zip by the compiler. This is because ActiveX objects typically use
this file extension. Similarly, any files that don't have this extension will be auto-
matically added to custFiles.zip
If you select False in this field where an .ocx file has been identified, it will force the .ocx
file to be included in custFiles.zip.
Destination location
This field specifies the folder structure that should be used to host the file when it is
extracted from the one of the delivered zip files. It should represent a directory path in
relation to the location where extraction occurs. For example: \Files\
The base folder for extraction is C:\ProgramData\Schneider Electric\CitectSCADA
7.30\User\Example
Note: If an ActiveX object has an associated data source, verify that the data source
can be located by the computer hosting the client. See the topic Managing associated
data sources under the section on ActiveX objects in the CitectSCADA User Guide
Help.
See also
Identifying user files for inclusion in a deployment
Note: Before you attempt to run a project, check that the host computer has been
appropriately configured using the Computer Setup Wizard. See Configuring Your
System for more information.
See Also
Startup and runtime configuration
Running servers independently
Server redirection
System tuning
Restarting the System Online
Server Side Online Changes
Client Side Online Changes
1068
Chapter 38: Compiling and Running a Project
Note:CitectSCADA automatically compiles the project (if uncompiled) when you try
to run it.
1069
Chapter 38: Compiling and Running a Project
The Runtime Manager can be launched during the configuration of a project via the
Tools menu in Citect Explorer, Graphics Builder and Project Editor. Launching the Run-
time Manager this way presents it in an idle state, allowing you to start a particular proc-
ess by itself.
Once a process is started (by right-clicking on it and selecting Start), the Runtime Man-
ager's monitoring pane displays the startup log for the selected processes, and launches
Runtime.
Note: Only one instance of Runtime Manager can run on a machine at any time.
For more information on using Runtime Manager, click on its Help button.
See Also
Server Redirection
[AddressForwarding]
<ClusterName>.<ServerName>=<ipaddress>:<port>
You can also redirect the Peer Port connection for an I/O Server using the following syn-
tax:
1070
Chapter 38: Compiling and Running a Project
[AddressForwarding]
<ClusterName>.<ServerName>_PeerPort=<ipaddress>:<port>
For Alarm Servers that have alarm properties enabled, you can redirect the alarm prop-
erties connector using the following:
[AddressForwarding]
<ClusterName>.<ServerName>_AlarmProps=<ipaddress>:<port>
Address forwarding is only interpreted and used during startup of Citect Runtime. It is
recommended (but not necessary) that the Computer Setup Wizard is run before running
up a project to confirm your changes.
Note: The CitectSCADA Web Client uses address forwarding to manage com-
munication across corporate firewalls. Any manual adjustments may also impact the
ability to connect a Web Client to a deployment on a Web Server.
1071
Chapter 38: Compiling and Running a Project
1. Click the icon that you use to start Citect Explorer or Runtime.
2. Right-click to display the shortcut menu and select Properties.
3. Click the Shortcut tab.
4. Add the name of the INI file to the command line property of the appropriate icon
using the -i option. For example, to start CitectSCADA v 7.30 using the initialization
file my.ini, enter the following line:
Note: The Computer Setup Wizard uses the same .ini as specified for Citect Explorer.
You can specify different .ini files for both the Runtime and Explorer programs. How-
ever, if you initiate Runtime from the Explorer, it uses the ini that is specified for the
Explorer.
System tuning
CitectSCADA is designed for optimal performance, so it is not necessary for most users
to tune their system. However, special circumstances might require that you adjust your
system for optimal performance. The Kernel allows you to locate areas that need tuning,
and the tuning itself is usually done through parameters. For example, you can improve
performance of the client by using the [Page]ScanTime and [Alarm]ScanTime parameters.
Cache tuning
Tune the cache large enough so that unnecessary reads are not generated, and small
enough that old data is not returned while keeping the communication channel busy. If
the cache is too large, the communication channel might become idle for a while and so
waste its bandwidth. Also if the cache is too large, a CitectSCADA client might start to
short cycle on reads request, which will generate unnecessary network or internal traffic
load.
Read short cycling occurs when a client requests data from the I/O Server, and the data
is returned from the cache, so it is returned quickly. The client will process the data (dis-
play it on screen) then ask for the same data again. If the I/O Server again returns the
same data from the cache, the client will process the same data again which is redun-
dant and a waste of CPU and the network (to transmit the request and response). When
short cycling starts to occur, the CPU and network loading will rise while the PLC com-
munication traffic will start to fall.
1072
Chapter 38: Compiling and Running a Project
To tune the cache you need to balance the cache time between unnecessary reads and
short cycling. The method described below assumes you know how to use the Citect-
SCADA debugging Kernel.
1. Turn off unit caching, use the CACHE command in the Kernel so you don't have to
re-compile your project.
2. Run one CitectSCADA client only on the network, use the Client in the I/O Server for
the test.
3. Display a typical page to generate normal PLC loading for your system.
4. In the Kernel use the STATS command to reset the CitectSCADA statistics.
5. In the Kernel display the page 'PAGE TABLE STATS'. This page shows the cycle and
execution time of various CitectSCADA tasks, some of which consume PLC data. The
tasks called 'Citect n' where n is a number are the tasks which get data from the PLC
and display on screen. Look at the Avg Cycle time, this is the third column from the
left. Assume that the Avg cycle time is 1200 ms. T his will mean that the current
page is gathering PLC data and displaying its data on the screen in 1200 ms.
6. Always set the cache time below this average cycle time to minimize short cycling.
On average set it to less than half this time, that is 600 ms.
7. Set the cache time to half the cycle time (600 ms). You might not see any improve-
ment in performance with a single client, as caching will only improve performance
with multi clients. You might see improvements if you are also running trends,
alarms or reports which are requesting the same data.
8. Add another CitectSCADA client that is displaying the same data. Reset the STATS
and check the Average cycle time. Each new client will not increase the cycle time, it
will drop slightly. Also look at PAGE GENERAL, to see that each new client services
its reads from the cache; i.e., the % cache reads increases.
9. If the average cycle time drops to less than half the original time then short cycling is
occurring and you need to decrease the cache time until this stops.
Tuning the cache is a trial and error process - as you change it, the read cycle time
will also change. The cache time will also depend on what the current PLC traffic is.
The current traffic is dynamic as CitectSCADA will only read what is needed depend-
ing on the current page, trend, alarm and reports running. Monitor the average cycle
time under lower loading conditions and set the cache as low as necessary to stop or
help prevent short cycling.
1073
Chapter 38: Compiling and Running a Project
Note: It is recommended that the ServerGetProperty Cicode function be used with the
LibRDBMemTime and LibRDBDiskTime properties to check if there is a change to the
Cicode library before attempting a reload. Following a reload please check the cor-
responding server's syslog.dat file for any reload messages. The Cicode changes will
not be reloaded.
A restart of the client is needed to update the Cicode library version to the latest com-
piled version.
Restart the client process if the hardware alarm "Cicode library timestamp differs" is raised
after a page is opened.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
Note: A hardware alarm of "Cicode library timestamp differs" will be raised if the
Cicode library used by a page has a different timestamp from the one in memory.
The timestamps will be different if the project has been fully recompiled, the project
has been incrementally recompiled after the page has been modified, or if the project
has been incrementally recompiled after any Cicode has been modified.
See Also
Client Side Online Changes
Compiling the Project
Linking Projects
PageDisplay in the Cicode Reference Guide
1074
Chapter 38: Compiling and Running a Project
Note: It is recommended that the ServerGetProperty Cicode function be used with the
LibRDBMemTime and LibRDBDiskTime properties to check if there is a change to the
Cicode library before attempting a reload. Following a reload please check the cor-
responding server's syslog.dat file for any reload messages. The Cicode changes will
not be reloaded, therefore a restart may be more appropriate.
Restart the server process if a "Cicode library timestamp differs" error is detected. The
library mismatch is indicated on the server in either the hardware alarm or the server's sys-
log.dat file.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
Note: A message in the Syslog.dat file and hardware alarm of "Cicode library times-
tamp differs" (error code 454) will be raised if the Cicode library used by one or more
server runtime databases is different from the one in memory. The timestamps will
be different if the project has been fully recompiled (with or without Cicode mod-
ification), or if the project has been incrementally recompiled after any Cicode has
been modified.
1075
Chapter 38: Compiling and Running a Project
l Advanced Alarms
l Multi-Digital Alarms
l Time Stamped Digital Alarms
l Time Stamped Analog Alarms
l Alarm Categories - The Alarm Category is not reloaded on the client side.
The following Alarm Category fields are used by the server and will be reloaded:
l ON Action
l OFF Action
l ACK Action
l Summary Device
l Log Device, ON, OFF and ACK log devices
The numbers of added, modified and deleted categories are recorded in the system log.
Alarm categories are identified by their category numbers. Two category records with the
same category number are treated as one category in runtime, and the later one would be
loaded.
The number of added categories indicates how many categories with new category
numbers have been added to the alarm server.
The number of modified categories indicates how many categories, of which the category
number existed in the runtime before reloading, have been modified in the alarm server.
If a user has defined a new category record, but its category number was used by an
existing category, the category reload will count this situation as a modification of the
category with this category number, rather than an addition. A category is shown as
modified if any content in the category record is modified, including the case that only
client side settings are modified. In this case, the reload does not change the state of this
category in the memory, but it is still counted as one modified category.
The number of deleted categories indicates how many categories have been deleted from
the alarm server. A category is defined as deleted if none of the other categories has the
same category number as this category. In the case that two category records have the
same category number, deleting the latter one in the table will instead increment the
modify count, while delete the former one would not increment any count.
When [Alarm]EnableErrorLogging is set to 1, an alarm server adds a syslog entry for
errors from adding, modifying or deleting an alarm record or a category record. The
errors can be due to category number out of range or category priority number out of
range. Two new hardware alarms (520 and 523) have been introduced for those errors.
See Cicode and General Errors for more details.
Reloading an alarm server will affect alarm property tags and may make them invalid
(when alarm is deleted) or make them available (when adding alarms).
1076
Chapter 38: Compiling and Running a Project
1077
Chapter 38: Compiling and Running a Project
See Also
ServerReload in the Cicode Reference Guide
Alarm Description No No
Alarm Category No No
Help No No
Delay No No
Comment No No
Privilege No No
Area No No
Custom 1..8 No No
Paging No No
Paging Group No No
High No Yes
1078
Chapter 38: Compiling and Running a Project
Low No Yes
SetPoint No Yes
Deviation No Yes
High Delay No No
Low Delay No No
DEviation Delay No No
Rate No Yes
Deadband No Yes
Format No No
Timer No Yes
Expression No Yes
Realarm No Yes
On Function No No
1079
Chapter 38: Compiling and Running a Project
Off Function No No
State No Yes
State Description No No
Trend Servers
Changes to the following properties of trends make existing trend files invalid and result
in the creation of a new trend file (renaming the old one for backup):
l Sample Period
l Type
l Storage Method
l No of Files
l Time (File)
l Period (File)
Changing the scale of a tag will make the trend history invalid.
Effect of reload on a modified Trend:
Cluster Name Yes No
Expression No Yes
Trigger No Yes
Comment No No
Privilege No No
Area No No
Eng Units No No
Format No No
Report Servers
Effect of reload on a modified Report:
1080
Chapter 38: Compiling and Running a Project
Time No Yes
Period No Yes
Trigger No No
Output Device No No
Privilege No No
Area No No
Name Yes No
Trigger No Yes
No. of Starts No No
Totaliser Inc No No
Totaliser No No
Comment No No
Privilege No No
Area No No
Note: Reload will not occur if the standby alarm server is not in “prepared” state.
Reload then occurs on the main alarm server, where it compares the RDBs in memory
and then updates the configuration data in the database. The database on the main
alarm server then synchronizes with the database on the standby server.
1081
Chapter 38: Compiling and Running a Project
Use the [Alarm]UseConfigLimits INI parameter to set whether on reload or restart the
alarm property values are retrieved from the RDB or the alarm server side database.
See Also
Server Side Online Changes
The time taken for the system changeover depends on the size of the project and the
extent of the changes to the project:
l If you only change graphics pages, CitectSCADA does a partial restart (changing only
the pages in the runtime system). Changeover is instantaneous.
l If you change any databases (for example, add a new alarm tag, trend tag, or Cicode
function), CitectSCADA does a full restart to run the updated project.
See Also
Restarting a networked system online
1082
Chapter 38: Compiling and Running a Project
1083
Chapter 38: Compiling and Running a Project
When Project B is complete , you can use the online restart facility to change the runtime
system to Project B.
1084
Chapter 38: Compiling and Running a Project
Where possible, balance clients across both phases of the shutdown. The [Shutdown]Phase
parameter defines the phase to which each CitectSCADA computer responds.
You can exclude selected computers (for example I/O Servers) from the online restart pro-
cedure with the [Shutdown]NetworkIgnore parameter.
For security, you can prevent selected computers from initiating the online restart pro-
cedure with the [Shutdown]NetworkStart parameter.
INT
FUNCTION
MyShutdown()
STRING sPath;
// Perform housekeeping tasks
...
sPath = ProjectCurrentGet();
If sPath = "ProjectA" Then
ProjectSet("ProjectB");
Else
ProjectSet("ProjectA");
END
Shutdown("Everybody", sPath, 2);
END
1085
Chapter 38: Compiling and Running a Project
Note: CitectSCADA also allows you to run your projects in a standard Web browser
across a network of LAN-connected computers. See the CitectSCADA Web Client.
See Also
CitectSCADA Internet Display Client
CitectSCADA Internet server
Startup and runtime configuration
Server - client file updates
1086
Chapter 38: Compiling and Running a Project
l If an ActiveX object has an associated data source, you need to verify the data source
can be located by the computer hosting the Internet Display Client. See the topic Man-
aging associated data sources.
l If you want to use the Process Analyst via the IDC, you need to copy the Process
Analyst view (.pav) files to the IDC in order to do so.
See Also
CitectSCADA Internet server
Note: The Internet Display Client is not supported on Windows Vista. It will still
operate correctly on earlier Operating Systems, however there are no plans to provide
support for IDC on Vista and above in the future.
See Also
Startup and runtime configuration
Note: The Internet Display Client is not supported on Windows Vista. It will still
operate correctly on earlier Operating Systems, however there are no plans to provide
support for IDC on Vista and above in the future.
See Also
Server - client file updates
1087
Chapter 38: Compiling and Running a Project
Note: The Internet Display Client is not supported on Windows Vista. It will still
operate correctly on earlier Operating Systems, however there are no plans to provide
support for IDC on Vista and above in the future.
7. If the Runtime project on the Internet Server has links to any included projects, the
Internet Display Client can only access the included project files if they are stored on
the same directory level as the Runtime project. For example, if the current project is
located at:
C:\Documents and Settings/All Users/Application Data/Schneider Electric/CitectSCADA
v7.40/User
(Vista and later C:\ProgramData/Schneider Electric/CitectSCADA v7.40/User<current
project>)
then any included projects needs to be located on the same level:
1088
Chapter 38: Compiling and Running a Project
and the Internet directory will be located on the same level at:
C:\Documents and Settings/All Users/Application Data/Schneider Electric/CitectSCADA v7.-
40/Internet
(Vista and later C:\ProgramData/Schneider Electric/CitectSCADA v7.40/Internet).
If the runtime project on the Internet server is stored elsewhere, an appropriately located
Internet directory needs to be created.
To install the Internet Display Client:
1. Verify that you have installed the Internet Display Client and set up your Internet
server.
2. At the Internet Display Client, double-click the Citect Runtime icon in the Citect-
SCADA IDC program group.
3. In the Citect Internet Client Setup dialog, type the TCP/IP address of your Citect-
SCADA Internet Server (for example 10.5.6.7 or plant.yourdomain.com). You can also
optionally enter a port number separated by a colon ":". If you do not enter a port
number the port number specified in the [Internet]Port parameter in the Citect.ini file
will be used, the default is 21.
4. Type your password
1089
Chapter 38: Compiling and Running a Project
5. Click OK. The relevant data will be downloaded to your computer and your project
will run (if the CitectSCADA Internet Server is running).
To connect to a different CitectSCADA Internet Server once your project is running on the Internet
Display Client:
Option Description
Addres- Enter the TCP/IP address of the CitectSCADA Internet Server (for example
s 10.5.6.7 or plant.yourdomain.com). You can also optionally enter a port
number separated by a colon ":". If you do not enter a port number the port
number specified in the [Internet]Port parameter in the Citect.ini file will be
used, the default is 21. The address of the last Internet Server used will be
automatically entered here. The addresses of every Internet Server previously
used are retained in the menu (with the most recently used at the top).
Pass- Enter the password supplied to you by the CitectSCADA Internet Server admin-
word istrator. Your password will be encrypted before it is sent across the Internet.
If you enter an incorrect password, the connection attempt will not succeed.
3. Click OK. The relevant data is downloaded to your computer and your project will
run.
1090
Chapter 38: Compiling and Running a Project
See Also
Gathering Runtime Information
Using the Kernel
Hardware alarms
When an error is detected that affects CitectSCADA's operation, a hardware alarm is gen-
erated. Hardware alarms are usually displayed on a dedicated Hardware Alarm page,
available as a standard template.
The hardware alarm page indicates what is happening in your CitectSCADA system. If
loss of communication occurs, if Cicode can't execute, if a graphics page is not updating
correctly, or if a server becomes inoperative, this page shows you. Hardware alarms con-
sist of a unique description and error code.
The hardware alarms do not have detailed information, but serve to point you in the
right direction. For example, if you have a Conflicting Animation alarm, CitectSCADA
will not tell you the cause. You need to observe which page causes the hardware alarm,
and locate the animations yourself.
Note: Do not allow your system to have any recurring hardware alarms.
1091
Chapter 38: Compiling and Running a Project
There are two hardware alarm fields that are not always shown on the hardware alarms
pages. ERRPAGE will display the name of the page that was displayed when the error
was detected. This is useful for finding errors caused by improperly programmed
animations. ERRDESC provides information that is specific to the type of the alarm. For
example, if the alarm is an I/O Device error, ERRDESC shows the name of the device.
See Also
Log files
Log Files
CitectSCADA supports the following log files.
syslog.dat The syslog.dat file is the primary log file for CitectSCADA. It
contains useful system information, from low-level driver traf-
fic and Kernel messages, to user defined messages. Trace
options (except some CTAPI traces) are sent to this file. See
SysLog Format for more information.
CitectSCADA locks syslog.dat while running. However, you
can still view it by using the 'SysLog' command in the Kernel.
There is a single SysLog file per IOServer process for both
the Drivers and the IOServer (in earlier versions of Citect-
SCADA there was 1 file for the IOServer and 1 file for the Driv-
ers).
tracelog.RuntimeManager.dat This file contains logs relating to the operation of the Runtime
Manager.
1092
Chapter 38: Compiling and Running a Project
Log files may have additional suffixes included in their name, for example, an archived
log file will include a timestamp.
If a system uses separate processes, a log file is appended with the component name. An
example of this could be:
syslog.IOServer.Cluster1.dat
Note: If CitectSCADA suffers an unexpected shut down, the Crash Handler will
create a compressed file containing a number of log and data files that may be useful
in determining the cause. See The Crash Handler.
See Also
Configuring Logging
Time-stamping
With the release of CitectSCADA 7.20, log file entries use the following timestamp for-
mat:
yyyy-mm-dd<SPACE>HH:mm:ss.fff<TAB>TZD
where:
yyyy = year (e.g. 2008, 2009)
mm = month (e.g. 01, 05, 12)
dd = date (e.g. 01, 02, 31)
HH = hour of the day (24 hour format)
mm = minute (e.g. 00, 02, 59)
ss = seconds (e.g. 00, 02, 20, 59)
fff = milliseconds (e.g. 000, 123, 999)
TZD = local time offset from the UTC (e.g. +10:00, -09.00)
For example:
2009-06-03 11:19:33.249 +01:00
See Also
Configuring Logging
File locations
1093
Chapter 38: Compiling and Running a Project
The CitectSCADA log files are located in the following directory in versions of Windows
prior to Vista.
In Windows Vista, the files are located in the Program Data directory:
C:\ProgramData\Citect\CitectSCADA x.xx\Logs
In both cases, driver log files will appear in the Logs directory in a folder named after
the particular driver.
See Also
Configuring Logging
Performing Calculations
If you wish to perform calculations on the time and dates recorded in the log files, this
can be accomplished by opening the files in Microsoft Excel. Open the file in Excel by
selecting settings in the Text Import wizard such that the date and time fields are NOT
split into separate cells. Once opened in Excel, select the column containing the date and
time and format the cells in the column with a custom format of yyyy-mm-dd
hh:mm:ss.000. This will allow Excel to correctly parse the date/time, and store the value
in days, as the number of days (and fractions of a day) since 1900-01-01 00:00:00.000
(this date/time has a value of 1).
Calculations between date/time values can be simply performed. However, it needs to be
remembered that, since Excel treats times as days, if the difference in milliseconds
between two date/times is necessary, the result of the difference calculation needs to be
multiplied by (24*60*60*1000).
Parsing the UTC offset
Using the UTC offset in Excel is a little more complicated, as Excel will not accept neg-
ative times. Therefore format the UTC offset cell/s as a text string, and write a formula to
convert it into a fraction of a day. For example, if the UTC offset is held in cell B4, the for-
mula is:
=LEFT(B4,1)&TIME(MID(B4,2,2),RIGHT(B4,2),0)
This will convert the UTC offset into a correctly signed numerical value expressed as a
fraction of one day.
For example:
l "+09:00" is converted to "+0.375"
l "-04:30" is converted to "-0.1875"
This UTC offset value can be subtracted from the local time to derive the UTC time.
UTC offset could be used with merge logs from two different time zones. In this case you
may wish to make both logs based on UTC time.
1094
Chapter 38: Compiling and Running a Project
SysLog Format
The SysLog file is a tab-delimited file with each field having a minimum width. This
enables the file to be easily viewed in a text editor or imported into an application such
as Excel. The file has the following format:
l Level – 5 chars
l Category – 11 chars
l Thread Id – 4 byte hex
l Driver Name – 16 chars
l Unit – 16 chars
l Function – 50 chars
l File – 30 chars
l Line – 4 byte decimal
l Message – 1024 chars
See Also
SysLog
Log Files
Tracelog Format
In traces in the PSIClient and CSAToPSI categories, Sent and Received Notations will be
indicated with "<=" and "=>" will be added to indicate tag data flow on the client side.
l "=>" indicates that the log entry is tracing a message that the client has sent to
clusters.
l "<=" indicates that the log entry is trace a message that the client has received from
an IO Server.
In addition, the session name will be appended in the message to identify the IO Server
which handled the tag request.
See Also
Configuring Logging
1095
Chapter 38: Compiling and Running a Project
Configuring Logging
You can make adjustments to the way CitectSCADA logs data using Citect.ini param-
eters. This includes the ability to filter logs according to priority, category or severity.
The available parameters are listed within the Logging Settings page of the Computer
Setup Editor. From here, you can learn how each parameter will impact system logging,
and make adjustments directly into the local Citect.ini file.
The Logging Settings page is accessible from the home page of the Computer Setup
Editor. For more information, see Using the Computer Setup Editor.
Some of the available logging parameters can be updated while your CitectSCADA sys-
tem is running. For more information, see Adjusting logging during runtime.
Note: Logging can cause a strain on system resources. When configuring logging, be
aware of the potential impact on normal operation. For example, a large number of
traces can affect CPU performance, while log file archiving may use up disk space.
Archiving syslog.dat
The syslog.dat file is restricted in size (to 2000 kb by default). When it reaches its size
limit, CitectSCADA renames it syslog.bak, and starts a new syslog.dat.
You can make this size restriction larger or smaller by using the [Debug]SysLogSize
parameter. For example, the following lines in the Citect.ini will set the syslog.dat size
to 30 Mb:
[DEBUG]
SysLogSize=30000
If you want to archive more than one system log file, you can set [Debug]SysLogArchive to
1. This adds a timestamp to the filename.
See Also
Log files
SysLog file
1096
Chapter 38: Compiling and Running a Project
1097
Chapter 38: Compiling and Running a Project
If CitectSCADA suffers an unexpected shut down, the Crash Handler will create a com-
pressed file containing a number of log and data files that may be useful in determining
the cause. These files include:
l syslog.dat
l Citect.ini
l tracelog.dat
l kernel.dat
l debug.log
l user.dmp (see below)
In a multi-process system, these files may use extended names, for example:
syslog.IOServer.Cluster1.dat
You can configure CitectSCADA to save the Crash Handler zip file to the local Logs
directory. If an unexpected shut down occurs, the path to the saved zip file will be
recorded in the syslog.dat. The compressed file can be also emailed to Schneider Electric
(Australia) Pty. Ltd. for analysis, or to a specified email address.
These features are not enabled by default; to enabled and configure the Crash Handler
you need to set the [CrashHandler] parameters
Note: Schneider Electric (Australia) Pty. Ltd. may use the information included in an
unexpected shutdown email to help resolve problems in future releases, but it cannot
reply or follow up a problem with users directly. To discuss these, contact Technical
Support.
Configuring user.dmp
User.dmp is a configurable file that logs exception details. When an unexpected shut
down occurs, it captures objects and their variables in memory in a process referred to
as a "mini-dump". This dump file can be analyzed by Technical Support.
The information included in this process is adjustable via the parameter [Debug]Mini-
DumpType It supports a "light" mini-dump with local stack information for unmanaged
code, through to a "heavy" dump (the default setting) including accessible memory for a
process and thread information. You can also switch the mini-dump off.
To reduce the amount of disk space used by a heavy dump, it is compressed after it is
created (along with other log files) into a file called "Citect32Exception_[timestamp].zip".
1098
Chapter 38: Compiling and Running a Project
To help manage the amount of disk space used by this process, you can adjust the
number of Citect32Exception_[timestamp].zip files that are stored using [Debug]Max-
MiniDumps. You can also raise a hardware alarm to warn when disk space on the
drive where these files are stored falls below a specified minimum amount using
[Debug]LogsDriveMinimumFreeSpace.
See Also
Log Files
Note: restrict access to the Kernel: anyone using the Kernel has total control of Citect-
SCADA (and subsequently your plant and equipment).
1099
Chapter 38: Compiling and Running a Project
l Do not use the kernel for normal CitectSCADA operation. The kernel is only for diag-
nostics and debugging purposes.
l Configure your security so that only approved personnel can view or use the kernel.
l Do not view or use the kernel unless you are an expert user of CitectSCADA and
Cicode, or are under the direct guidance of Technical Support for this product.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
1100
Chapter 38: Compiling and Running a Project
Note: Clear these options (the default) after commissioning so that there is no acci-
dental or unauthorized use of the Kernel.
Command DspKernel(1);
To close the Kernel window, call the DspKernel() function again, passing 0 in the iMode
argument:
Command DspKernel(0);
Note: put the highest privilege level on the DspKernel command to prevent your
1101
Chapter 38: Compiling and Running a Project
Note: Access to the Cache and Cicode Kernel commands is password-protected for
security. For details, see Access to Cicode and Cache commands.
By default, CitectSCADA runs in one instance on a single processor. With this con-
figuration, a single Kernel window reports on every processe.
If CitectSCADA runtime is configured to run in multiple instances, each instance has a
separate Kernel window that displays instance-specific system messages; for example,
trend-related system messages appear in the Trend window in the Kernel. You can
switch between Kernel windows by using the Kernel menu on the Kernel window menu
bar.
For a default configuration, the Kernel window displays the following messages:
l Initializing Sub Systems - The primary parts of CitectSCADA are getting started.
l Initializing Font System - Creating fonts that have been defined within CitectSCADA.
These are fonts used for displaying items such as alarms, and pre-V5.0 dynamic text.
l Initializing Client System.
l Starting IO Server - Only visible if the CitectSCADA computer is an I/O Server. If the
computer is an I/O Server and this message does not display, the computer is improp-
1102
Chapter 38: Compiling and Running a Project
erly set up: run the Computer Setup Wizard to check your configuration. IO Server
Started - The server has started and is functioning correctly.
l Initializing I/O Server - Starting to check what is necessary for the I/O Server
to work, and initializing any cards that are necessary.
l On a Client, these messages will be replaced with Calling '<I/O Server>' Con-
nected.
l Initializing Cicode System - Cicode has been loaded into memory, and is prepared to
run.
l Initializing com System - Checking that ports and hardware are responding and
functioning correctly.
l Initializing Request System - The system that handles requests from the Client part
of CitectSCADA to the Server parts of CitectSCADA.
l Initializing Trend Client System - The Trend Client is slightly different than the nor-
mal client, so it needs separate initialization.
l Starting Trends Server - You will only see these messages if the CitectSCADA com-
puter is a Trends Server. If the computer is a Trends Server, and these messages do
not display, most likely the computer is improperly set up. run the Computer Setup
Wizard to check your configuration.
l Trend Startup - CitectSCADA is checking for the trend files, and making new
ones if they can't be found.
l Initializing Trend Acq System - Every trend you define has its own sample
rate. Here CitectSCADA is setting up the system so it can poll the data at the cor-
rect rate for each trend pen.
On a Client, these messages will be replaced with Calling '<Trends Server>' Connected.
l Initializing Alarm System.
l Loading Alarm Databases - You will only see these messages if the CitectSCADA
computer is an alarms server. This is loading alarm data into memory. If the com-
puter is an alarms server, and these messages do not display, most likely the com-
puter is improperly set up. run the Computer Setup Wizard to check your
configuration.
l Open Alarm Save File
Loading Alarm Save File
Alarm Save File Loaded - CitectSCADA gets the alarm save file (that was created in
the specified directory), and examines it in order to see the status of existing alarms.
If you have a redundant alarms server, then this alarms server will interrogate the
other instead of using the alarm save file - since the information on the other server
will be newer than any file.
Starting Alarm Processing- The server is now processing (and serving) alarm data.
1103
Chapter 38: Compiling and Running a Project
On a Client, these messages will be replaced with Calling '<Alarm Server>' Con-
nected.
1104
Chapter 38: Compiling and Running a Project
Use the Main window to check that your I/O Devices come online correctly when start-
ing. First the ports need to initialize, then the I/O Device itself will come online. When a
device does not initialize as expected, CitectSCADA displays a message such as "PLC
not responding", "I/O Device Offline" or similar.
Some I/O Devices might take two attempts to come online. If so, CitectSCADA waits
(usually 30 seconds) and tries again. If the I/O Device does not come online after the sec-
ond attempt, check your configuration (at both ends) and cabling.
Note: The Kernel continues to report changes in the status of I/O Devices to the Main
window. This information might also be reported as alarms to the Hardware Alarms
page.
See Also
Using Kernel Commands
Key Description
Down Scans forward through the command history. (Commands are displayed in
arrow the command line.)
Left Moves the cursor back one character at a time (in the command line).
arrow
Right Moves the cursor forward one character at a time (in the command line).
arrow
Delete Deletes the character to the right of the cursor (in the command line).
1105
Chapter 38: Compiling and Running a Project
Back- Deletes the character to the left of the cursor (in the command line).
space
Insert Switches from over-strike mode to insert character mode (in the command
line).
Note: When typing a command in the Main window, if a message appears in the
middle of your command, you can still execute the command normally. Use theShell
command to open a new command window.
See Also
Kernel commands
Kernel commands
The table below describes the kernel commands.
Command Description
Cicode Opens a child window that you can use to call Cicode functions.
Debug Enables the debugging of raw data transfer between CitectSCADA and a
driver.
DriverTrace Lists the driver control blocks (DCBs) on the I/O Server awaiting delivery
to a driver.
1106
Chapter 38: Compiling and Running a Project
Log Enables or disables the logging of I/O Device reads and writes.
Page Driver Displays information about each driver in the CitectSCADA system.
Page Unit Displays information about each I/O Device in the CitectSCADA system.
Cache
Changes the cache timeout for each I/O Device with which CitectSCADA is com-
municating.
Syntax
1107
Chapter 38: Compiling and Running a Project
Any valid I/O Device defined in the project (using the I/O Devices form), or * for I/O Devices.
<Timeout>
This command allows you to tune the cache timeout while the I/O Server is com-
municating with the I/O Devices. If you set the timeout to 0 (zero), the cache is disabled.
If you specify a cache timeout for an I/O Device that has the cache disabled, the cache is
enabled.
Any changes made to an I/O Device only apply while the I/O Server is running. If you
restart the I/O Server, the cache timeout reverts to the value configured in the project.
Once you have determined the optimum cache timeout, make the change persistent by
setting the value in the I/O Devices form (for the particular I/O Device).
See Also
Kernel commands
Displaying the kernel window
Cicode
Opens a child window that you can use to call Cicode functions, on either a local or
remote computer. Any built-in or user-written function can be called from this window.
You do not need to specify all the optional arguments, as the optional arguments will be
given runtime defaults (not compiler defaults) as follows:
Data type INT = 0
Data type REAL = 0.0
Data type STRING = ""
Syntax
Cicode [<Name>]
Where:
<Name>
Optionally the name of a Citect Server (for example, Alarms, Reports, Trends) or a client computer
name.
If you enter the Cicode command with no Name argument, a local Cicode window is
created.Cicode commands are executed on the local computer.
1108
Chapter 38: Compiling and Running a Project
<clustername>.<server>
Cicode Cluster1.Alarm
If you enter a server or computer name as the Name argument, you can create a Cicode
window to the remote server or computer. Cicode commands entered in a remote Cicode
window are executed on the remote computer. For example, to create a Cicode window
where commands execute on the Alarm Server, use:
Cicode Alarm
If you issue the command from a server, you can create a window to the "MyComputer"
computer:
Cicode MyComputer
If the remote computer can be found, its name is displayed in the title of the Cicode win-
dow, otherwise a local window is created.
Note: You can only specify a computer name if you are issuing the command on a
server. This function only supports Client to Server or Server to Client connection.
Each Cicode command is executed with its own Cicode task, so you can start tasks that
take a long time to complete. The Cicode prompt returns immediately after the Cicode
task has started and the task continues to run in the background. If the function is com-
pleted immediately, the return result of the function is displayed. If the function con-
tinues to run, the result is not displayed and cannot be returned - the message "Task still
running" and the task handle is returned instead.
Note: Remember that there is no Privilege check on any command issued from this
window, so you have full access to the system.
The Cicode prompt 0:> shows the current window number with which any object is asso-
ciated. To change the current window, use the WinGoto() function (or any other Cicode
function that affects the current window).
The Cicode window does not recognize any variable names, so when you call a Cicode
function, you can only pass constants (for example numbers or strings). When you call a
function that expects a string, pass a string constant, for example Prompt("Hello from
the Kernel"). If the string is only a single word, you do not have to use delimiters, for
example Prompt(Hello). The Cicode window tries to convert whatever you enter (as argu-
1109
Chapter 38: Compiling and Running a Project
ments) into the correct data type. If it cannot convert the arguments, it passes either 0
(zero) or an empty string to the function.
Note: Some Cicode functions are implemented as label macros by the compiler.
These macros allow backward compatibility when the number of arguments to a
function has been changed. Because the Cicode window does not expand macros,
you cannot call these functions directly. You need to use the macro expansion. If the
function you are trying to use cannot be found, try again by adding an underscore (_)
to the front of the function name, for example _DevClose(1).
You can also shut down the Citect system from this window by using the Shutdown
() function.
See Also
Kernel commands
Displaying the kernel window
Cls
Clears text from the Main or Cicode windows, and moves the cursor to the top left-hand
corner.
Syntax
Cls
Use this command to clear the current window when it has become cluttered (from dis-
playing debug data or too many commands).
See Also
Kernel commands
Displaying the kernel window
Debug
Enables the debugging of raw data that is transferred between Citect and a selected
driver. Protocol traffic is displayed in the Kernel window and logged to the SysLog.DAT
file.
Syntax
<Mode>
1110
Chapter 38: Compiling and Running a Project
The mode:
<Display>
MONO - Send the debug to a monochrome monitor (if one is attached) as well
as the Kernel.
MONOONLY - Send the debug to the monochrome monitor only.
To place a port in debug mode, enter DEBUG followed by the port name and the mode
you require. If you do not know the name of the port, enter DEBUG (without any argu-
ments), and Citect displays a list of available ports.
Only the I/O Server communicates with the I/O Devices, so this command is generally
used only on the I/O Server.
When you enable a debug trace mode, Citect displays protocol traffic in the Kernel win-
dow and logs it to the SysLog.DAT file. This tends to reduce Citect's performance (as
there may be a lot of data), and therefore not enable debug trace on an I/O Server that is
important to your current operation. Use this command only during commissioning or
on a non-vital section. Excessive use of this command may cause the I/O Device to go
offline.
Do not enable or use the Debug Trace mode in an operational environment. This mode is
only for use during commissioning.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
1111
Chapter 38: Compiling and Running a Project
When the debug trace is sent to a Monochrome monitor, it is displayed directly from the
interrupt routine of the driver and therefore at a much faster rate. This trace (if MONO-
ONLY is used) causes less CPU overload of Citect while the trace is active, and provides
instantaneous output. This method is useful if you are developing your own driver and
your driver crashes before the debug trace is displayed in the Kernel.
You can use the Shell command to create an extra command window while the trace is
active. This allows you to enter more commands (in the new window).
You can use the Pause command to stop the debug output (to view the data).
See Also
Kernel commands
Displaying the kernel window
DriverTrace
Lists the commands and information issued to a driver by CitectSCADA. It can be useful
in debugging a driver, for example, it can help determine why a driver is unable to fully
initialize.
Note: Running syslog traces can draw heavily on a CPU usage. monitor the impact
on CPU performance when implementing a large number of traces.
Syntax
DriverTrace [OFF|CMDS|VER[BOSE]|ERR[OR]
|PORT=<name>|MASK=<xxxxxxxx>|DUMP]
Where:
blank
Returns the current DriverTrace settings. This can be useful to determine the current mask or port
settings before implementing a new trace. Just key DriverTrace into the Kernel and hit the return key
to view the current settings.
OFF
CMDS
Turns the DriverTrace on, but does not display the contents of the data buffer.
Note: Specific driver commands need to be enabled with the Kernel command Driv-
erTrace[Mask], or the DriverTraceMask INI parameter.
VER[BOSE]
1112
Chapter 38: Compiling and Running a Project
Turns the DriverTrace on, and displays the contents of the data buffer.
Note: Specific driver commands need to be enabled with the Kernel command Driv-
erTrace[Mask], or the DriverTraceMask INI parameter.
ERR[OR]
Turns the DriverTrace on, but only traces DCBs with errors (DCBs are the internal data structures
used for communication between the I/O server and a driver).
PORT
Allows traces to be limited to a particular driver port, by defining a port name. The default setting,
PORT=*, will trace all ports.
MASK
A 4-byte hexadecimal number that represents a bit mask used to either include or exclude driver
commands from the DriverTrace. The driver commands and their values are as follows:
CTDRV_INIT 00000001
CTDRV_OPEN 00000002
CTDRV_INIT_CHANNEL 00000004
CTDRV_INIT_UNIT 00000008
CTDRV_READ 00000010
CTDRV_WRITE 00000020
CTDRV_CONVERT 00000040
CTDRV_CANCEL 00000080
CTDRV_CPU 00000100
CTDRV_DATABASE 00000200
CTDRV_STOP_UNIT 00000400
CTDRV_STOP_CHANNEL 00000800
1113
Chapter 38: Compiling and Running a Project
CTDRV_CLOSE 00001000
CTDRV_FORMAT 00002000
CTDRV_STATS 00004000
CTDRV_DEBUG 00008000
CTDRV_INFO 00010000
CTDRV_STATUS_UNIT 00020000
CTDRV_INIT_CARD 00040000
CTDRV_UPDATE_INFO 00080000
CTDRV_UI_READ 00100000
CTDRV_UI_WRITE 00200000
CTDRV_EXIT 00400000
CTDRV_UNITACTIVATES 01000000
CTDRV_SUBSCRIPTIONS 02000000
CTDRV_EVENTUPDATES 04000000
CTDRV_STATUS_DISCONNECT 40000000
For example, the value you would use to include only the CTDRV_OPEN, CTDRV_INIT_UNIT
and CTDRV_READ commands would be: 0000001A.
Most users will want to exclude the CPU function call, as this happens often. Do this by setting a
mask of 7ffffeff.
DUMP
Lists the driver control blocks (DCBs) on the I/O Server awaiting delivery to a driver and actioning
from the driver.
Examples
1114
Chapter 38: Compiling and Running a Project
Exit
Closes the Cicode or Shell windows.
Syntax
Exit
1115
Chapter 38: Compiling and Running a Project
Note: You cannot use this command to close the Main window. See Closing the ker-
nel window.
To close every other window, select Close from the window's control-menu box, or press
Esc, or double click the control-menu box.
See Also
Kernel commands
Displaying the kernel window
Help
Displays a list of some of the commands that are available in the Kernel.
Syntax
Help
See Also
Kernel commands
Displaying the kernel window
INI
Displays local citect.ini file. (If you are using a Citect Internet Display Client to run a
project over the internet, the .ini file in the bin directory will display). You can use the
Page Up, Page Down, and arrow keys to move through the file, but you cannot edit or
save it.
Syntax
INI
Note: This window is the same that is used to display the syslog.dat file. You can
display either the citect.ini or syslog.dat in this window, but you cannot display both
at the same time.
See Also
Kernel commands
Displaying the kernel window
Log
Enables or disables the logging of I/O DEVICE reads and writes to the syslog.dat file.
Syntax
1116
Chapter 38: Compiling and Running a Project
<Mode>
See Also
Kernel commands
Displaying the kernel window
Page General
Displays general statistics information on the overall performance of Citect.
Syntax
Page General
General Statistics
Server The server name of this computer or, if it is a client, the name of the primary
Name server this client talks to.
Node The computer name of this computer. You can set this through the Computer
Name Setup Wizard. This is only used if you have Citect in a networking con-
figuration.
Stat The time since the Cicode command to reset the statistics was run.
Reset
Mem- The total amount of free physical memory. The physical RAM that is free on the
1117
Chapter 38: Compiling and Running a Project
Sched- The number of times that the Citect scheduler is looking for a task to execute.
uler A good indication of how fast the computer can respond to an event. This
Cycles number depends on the speed of the computer and the CPU resources that
Citect is using.
This value is completely different depending on whether you are running 32-
bit or 16-bit Citect. This is because Citect can use the 32-bit operating system
to perform process scheduling, an operation that Citect needs to perform
itself in the 16-bit environment.
16-bit: The busier Citect is, the lower the number. Typical values of 10,000 to
50,000; a highly loaded system may drop to below 1000.
32-bit: The busier Citect is, the higher the number. Typical values of 100 to
1000; a highly loaded system may rise above 5000.
CPU The percentage of the total available computer processing power that is being
Usage used on this computer.
Tasks The number of tasks per second that the Citect scheduler is executing, to
Per Sec show how busy Citect is. This number will be between 30 and 200 tasks per
second. If the computer is an I/O Server, the task number is higher (because
each protocol uses many tasks).
Lost Citect keeps track of internal errors in its local error buffers. The Lost Errors
Errors counter is incremented when an error is detected and there is no buffer in
which to put the alert message. This number should normally be 0 (zero). If
this field is incrementing, you may have a problem with your system.
Read The first number is the total number of read requests sent to the I/O Server
1118
Chapter 38: Compiling and Running a Project
Reque- from client Citect computers, including the local Citect client. This number con-
sts tinues to increment from 0 (to billions) depending on how fast clients are
requesting data and how long the server has been running.
The second number is more useful - it records the read requests per second.
This value also depends on how fast the clients are requesting data from the
I/O Server, and should be between 5 and 400 requests per second
Phys- The first number is the total number of physical reads made to the I/O Devices.
ical Because the I/O Server can optimize the number of read requests made to the
Reads I/O Devices, this number is usually smaller than the number of read requests.
This number is similar to the read requests and increments forever.
The second number is the number of physical reads per second (that the I/O
Server is performing). The rate depends on the clients and how fast the server
can communicate to the I/O Devices (typically 5 to 200).
The total number of times a request was made for the same I/O Device address
Blocke- while the I/O Server was already reading that address. The server blocks the
d two requests together as an optimization.
Reads
Digital The total number of digital points that the I/O Server has read from I/O
Reads Devices.
Digital The number of digital reads per second that the I/O Server is processing. This
Reads provides a general indication of performance. It is dependent on the protocol.
per
Sec
Write The first number is the total number of write requests sent to the I/O Server
Reque- from client Citect computers, including the local Citect client. The second
sts number is the write requests per second (that the I/O Server is performing).
The number of requests depends on the rate at which clients are sending write
requests to the I/O Server (typically 0 to 20). If the number of requests con-
tinually exceeds 10, then this may be causing performance to decline (usually
caused by Cicode performing too many writes to the I/O Devices).
Phys- The first number is the total number of physical writes made to the I/O
ical Devices. Because the I/O Server can optimize the number of write requests
Writes made to the I/O Devices, this number is usually smaller than the number of
write requests. The second number is the number of physical writes per sec-
ond (that the I/O Server is performing).
The number of writes depends on the rate at which clients are sending write
requests to the I/O Server (typically 0 to 20). If the number of requests con-
tinually exceeds 10, then this may be causing performance to decline (usually
caused by Cicode performing too many writes to the I/O Devices).
The total number of times a request was made for the same I/O Device address
1119
Chapter 38: Compiling and Running a Project
Blocke- while the I/O Server was already writing that address. The server blocks the
d two requests together as an optimization.
Writes
Reg- The total number of register points that the I/O Server has read from I/O
ister Devices.
Reads
Reg- The number of register reads per second that the I/O Server is processing.
ister This provides a general indication of performance. It is dependent on the pro-
Reads tocol.
per
Sec
Cache The number of read requests serviced from the read cache.
Reads
Cache The percentage of reads serviced from the cache. If the cache read % is large,
Reads (for example greater than 40%), the I/O Device cache timeout could be set too
(%) high. Try reducing the I/O Device cache time to bring the % cache below 40%.
The % of read cache depends on the configuration of your Citect system and
the number of clients connected. If you have many clients looking at the same
I/O Device data, the cache % may be very high, however this does not usually
impact performance. For example, if you have 10 Citect clients viewing the
same page, a cache read of 90% would be acceptable.
Cache The number of times a cache buffer was flushed because a write request was
Flush directed to the same location. When you write to the I/O Device and that
address is in the read cache, Citect flushes the data from the cache. The next
time the data is read, it is reloaded from the I/O Device to reflect the new value.
Cache The number of read-ahead updates made to the cache buffer. When read
RD ahead caching is enabled, the I/O Server will try to read any I/O Device data
Ahead which is coming close to cache 'timeout' time. The I/O Server will only read this
data if the communication channel to the I/O Device is idle - to give higher
priority to other read requests.
Cache The number of active cache buffers allocated. Each block of data that is read
Buff- from the I/O Device requires a cache buffer when stored in the cache. The
ers number of cache buffers active at once depends on the dynamic operation of
the Citect computers and their project configurations (typically 0 to 100).
Cache The number of times the cache needed to allocate additional buffers but no
Short buffers were available. When this happens the server cannot cache the data.
This does not generate errors but it does lower performance. If this field incre-
ments too quickly, increase the available memory.
The time taken by the I/O Server to process read and write requests (i.e. the
Respo- time from when a request arrives at the server to when it is sent back to the
1120
Chapter 38: Compiling and Running a Project
nse client). This time depends on the physical response time of the I/O Device and
Times how long the request had to wait in a queue for other requests to be com-
pleted. This time increases as the server's loading increases, and is a good
indication of the total system response.
The average, minimum, and maximum times are displayed. Typical values
depend on the I/O Device protocol, however Citect should have an average
response of 500 to 2000 ms. Slower protocols or a heavily loaded system may
make the response time higher, but be able to get response times of less than
two seconds even for very large systems.
Points The maximum number of I/O points that can exist in your Citect system. The
combined Static and Dynamic count cannot exceed this number. The point
limit is part of the Citect software protection, and is programmed into your
hardware key.
Max The maximum number of fully functional Citect computers (Full Licenses) that
Full can exist in your Citect system. This number is part of the Citect software pro-
tection, and is programmed into your hardware key.
Cur- The current number of fully functional Citect computers (Full Licenses) that
rent are running in your Citect system.
Full
Peak The peak number of fully functional Citect computers (Full Licenses) that your
Full Citect system has experienced since it was re-started.
Max The maximum number of View-only Clients that can exist in your Citect system.
Mngr This number is part of the Citect software protection, and is programmed into
your hardware key.
Cur- The current number of View-only Clients that are running in your Citect sys-
rent tem.
Mngr
Peak The peak number of View-only Clients that your Citect system has experienced
Mngr since it was re-started.
Max The maximum number of Display-only Clients that can exist in your Citect sys-
Dsp tem. This number is part of the Citect software protection, and is programmed
into your hardware key.
Cur- The current number of Display-only Clients that are running in your Citect sys-
1121
Chapter 38: Compiling and Running a Project
rent tem.
Dsp
Peak The peak number of Display-only Clients that your Citect system has expe-
Dsp rienced since it was re-started.
See Also
Kernel commands
Displaying the kernel window
Page Driver
Displays information about each driver in the Citect system. This window is only dis-
played if the Citect computer is configured as an I/O Server with physical I/O Devices
attached.
Syntax
Page Driver
Use Page Up and Page Down keys to scan the driver list.
Driver Statistics
Port The name of the physical port the driver is using for communication.
Name
Title The protocol title and version string. Protocol drivers for Citect Versions 3.xx,
4.xx, and 5.xx, are Version 2.0 type drivers.
Read The first number is the total number of read requests sent to the driver from
Request- every client Citect computer, including the local Citect client.
s
The second number is the read requests per second (that the I/O Server is
performing).
Physical The first number is the total number of physical reads made to the I/O
Reads Devices. Because the I/O Server can optimize the number of read requests
made to the I/O Devices, this number is usually smaller than the number of
read requests.
The second number is the number of physical reads per second (that the I/O
Server is performing).
Blocked The total number of times a request was made for the same I/O Device
Reads address while the driver was already reading or about to read that address.
1122
Chapter 38: Compiling and Running a Project
Digital The total number of digital points that the I/O Server has read from every I/O
Reads Device.
Digital The number of digital reads per second that the I/O Server is processing.
Reads This provides a general indication of performance. It is dependent on the pro-
per Sec tocol.
Write The first number is the total number of write requests sent to the driver from
Request- every client Citect computer, including the local Citect client.
s
The second number is the write requests per second (that the I/O Server is
performing).
Physical The first number is the total number of physical writes made to the I/O
Writes Devices. Because the I/O Server can optimize the number of write requests
made to the I/O Devices, this number is usually smaller than the number of
write requests.
The second number is the number of physical writes per second (that the I/O
Server is performing).
Blocked The total number of times a request was made for the same I/O Device
Writes address while the driver was already writing that address. The driver blocks
the two requests together as an optimization.
Register The total number of register points that the I/O Server has read from every
Reads I/O Device.
Register The number of register reads per second that the I/O Server is processing.
Reads This provides a general indication of performance. It is dependent on the pro-
per Sec tocol.
Cache The number of read requests serviced from the read cache.
Reads
Cache The percentage of reads serviced from the cache. If the cache read % is large
Reads (for example greater than 40%), the I/O Device cache timeout could be set
(%) too high. Try reducing the I/O Device cache time to bring the % cache below
40%.
The % of read cache depends on the configuration of your Citect system and
the number of clients connected. If you have many clients looking at the same
I/O Device data, the cache % may be very high, however this does not cause
a problem. For example, if you have 10 Citect clients viewing the same page,
a cache read of 90% would be acceptable.
1123
Chapter 38: Compiling and Running a Project
Short The number of times the server needed a buffer for the driver but none were
buffers available. This can reduce communication performance and result in loss of
requests. Increase available memory if this field increments too quickly (that
is, more than 10 per minute).
Driver The number of low-level driver errors encountered before retries were per-
Errors formed. This field may continue to increment even if no errors are reported
because the driver retries and it may complete the command on the second
attempt. If this field increments quickly (i.e. 10 or more per minute) without
other errors being reported, you may have a low-level error that affects per-
formance.
Out of The number of times the driver requires a buffer but none were available.
Buffers The driver needs to discard the data. If this field increments too quickly,
increase the number of pending commands the driver can process. This field
only increments with client drivers. I/O Device drivers do not require pend-
ing buffers.
Time The number of timeouts encountered by the driver during operations. This
Outs field may continue to increment with no visual errors as the driver retries the
operation. If this field increments excessively, there may be a communication
problem.
Retries The number of retries executed by the driver. If this field is incrementing,
there may be a communication problem.
Max- This is the number of requests that are kept in a buffer waiting to be serviced
imum by the protocol. There is a pre defined default value for this for every pro-
Pending tocol. If a protocol is capable of handling multiple requests or commands at a
Com- time then this number may be high. If the protocol is capable of only handling
mands 1 command at a time then this will probably be 1 or 2.
Block- This is the range that the I/O Driver will use when blocking read or write
ing Size requests together at runtime. The default value for this is typically set after
(Bytes) quite a lot of experimentation. The value is calculated as the optimum range
of data that the I/O Device can respond to, to get the fastest response times
from your I/O Device.
For example, if the Blocking Size is 100 and you have a graphics page that
has Address1 and Address 99 on it, Citect will read both of these addresses
in one request. If you have Address 1 and Address 101 on the page Citect will
issue 2 separate read requests. The block size may not be the maximum
packet size for the protocol, since a particular type of I/O Device may respond
faster to smaller requests of data than larger requests.
There is one important consideration when using this method; many I/O
Devices need to have their Memory tables created by the user. If the user
does not define every memory address in a range, then Citect may try and
read a block of memory from the I/O Device that does not exist (giving a hard-
ware alarm). This is because Citect will ask for the whole range of addresses
between the starting address and the ending address. So, if in our previous
1124
Chapter 38: Compiling and Running a Project
example the I/O Device did not have address 76, it would report back to
Citect that it could not read address 76. The I/O Driver does not know that it
doesn't need this address and will retry the command, and in some cases will
eventually put the I/O Device offline.
Confirm that you always have defined the memory addresses that Citect will
need to read.
Timeout This is the period of time that the I/O Driver will wait before re-requesting
Period data, if no answer comes from the I/O Device.
(ms)
Max- The number of times the I/O Driver will attempt to get data from the I/O
imum Device.
Retries
Combining this with Timeout gives you the total period before Citect will put
an I/O Device offline.
If the Timeout=2000 and Retry=2 then Citect will wait 2 seconds for a
response, then retry, wait 2 seconds, retry, wait 2 seconds, Offline. Total
time between losing communications and deciding it is offline is now 6 sec-
onds. You can modify these parameters, but if you set them too low you will
generate unneeded retries and possibly get I/O Device Offline messages.
Poll This is the time in milliseconds that Citect will check the port for data or write
Time data to the port. If this is 0 then the protocol is operating in Interrupt mode.
(ms)
Trans- This is the time that Citect will hold a packet of data between receiving a
mit response from the last request and sending the new request. This is usually
Delay 0, however some protocols can become saturated and start to misbehave. In
(ms) these cases the default value has been calculated while the protocol was
being tested, and modifying this value to something smaller will cause prob-
lems. However, making it bigger will only have a very slight impact on the
overall response times in your system, but may make the communications
more stable.
Watch- This is the period of time that Citect will wait after deciding an I/O Device is
time offline before trying to re-establish communications. This is typically 30 sec-
(sec- onds. It can be made smaller but not be made smaller than the period that
onds) Timeout and Retry will be - otherwise you will not be able to re-establish com-
munications with an I/O Device.
The time taken by the driver to process read and write requests (i.e. the time
Respon- taken to process a single read or write operation to the I/O Device). This time
se depends only on the physical response time of the I/O Device, because no
Times queue waiting time is included. This field reflects any tuning of the com-
munication channel (for example increasing the baud rate will reduce the
response time).
1125
Chapter 38: Compiling and Running a Project
Channel This field displays the percentage of the total capacity of the hardware chan-
Usage nel that is currently being used. The I/O Server tries to keep the utilization as
high as possible, however if the client Citect computers are requesting data
slower than the channel can supply, the total will be below 100%. It is pos-
sible for the channel usage to rise above 100% as some I/O Device drivers
can process more than one command at the same time (having two or more
commands using the channel at the same time).
Bytes The number of bytes transferred (each second) by the driver. This number
Per Sec- provides a simple performance indication that is useful when tuning the
ond driver.
Special By enabling verbose mode (press V) or by pressing the down arrow, twenty
Var- special variables are displayed. The meaning of these variables is driver-spe-
iables cific.
See Also
Kernel commands
Displaying the kernel window
Page Memory
Displays memory debugging information. This window is designed for use by Citect spe-
cialists, and requires a high degree of expertise to use.
Syntax
Page Memory
See Also
Kernel commands
Displaying the kernel window
Page Queue
Queues are the main data structure used in CitectSCADA, and this allows the various
queues active on the system to be displayed. To view the different queues, press the page
up and page down keys.
On each page, the handle of the queue being viewed, its name, and its length is dis-
played. The number of queues and entries within these depends entirely on the custom
configuration of Citect32 and the individual project.
Queue formats can vary but several common formats exist.
Example
Queue Sleep
Handle 5 Length 49
1126
Chapter 38: Compiling and Running a Project
This is the most common queue type. Column meanings are as follows :
Mode (Name hidden): U for user-space task, and S for system tasks.
Name: The name of the task.
Hnd : The internal handle for the task.
State: The state of the task, it can be one of: Free, Curr, Ready, Sleep, Wait, Susp and
Dodgy.
Prty: The priority of the item in the queue. It can be one of; Low, User and High.
CPU: Shows the percentage of CPU time used by this task.
Min: Minimum response time for the task (from statistics).
Max: Maximum response time for the task (from statistics).
Avg: Average response time.
Count: The number of times this task has been run.
See Also
Kernel commands
Displaying the kernel window
Page RDB
Displays information about each of Citect's runtime databases (RDBs).
Syntax
Page RDB
Use the Page Up and Page Down keys to move between the tables.
1127
Chapter 38: Compiling and Running a Project
The runtime databases contain your compiled project configuration information. There
are two types of RDB; resident and non-resident.
Resident databases are loaded at Citect startup and remain in memory. Examples of res-
ident databases are Alarms, Trends, Reports, and Functions. The names of resident data-
bases start with the underscore character (_).
Non-resident databases are those that are associated with pages. These databases are
loaded (and unloaded) as necessary - when the page is displayed.
Each database is divided into 10 (or so) tables; <name>, TEXT, REQUEST, PIECE, CODE,
SCALE, RUN, WRITE, FUNC, SYMB, and <name>.
See Also
Kernel commands
Displaying the kernel window
Page Table
Contains information about CitectSCADA's runtime data structures. Currently there are
about 50 tables of information, most of which are only relevant in specific cir-
cumstances.
Syntax
The Table window that appears hosts a number of tables. Use the Page Up and Page
Down keys to navigate through the table list. Use Up Arrow and Down Arrow keys to
scroll the data for the table that is currently displayed.
The table MASTER_TABLE displays a list of every table. The following tables are par-
ticularly useful:
l Page Table Accum.ReloadError
l Page Table Alarm.ReloadError
l Page Table Broadcast
l Page Table Cicode
l Page Table CSAtoPSI.Subs
l Page Table Data.Connection
l Page Table Data.Recordset
l Page Table OPCServerConnections
1128
Chapter 38: Compiling and Running a Project
Displays the accumulator records in the runtime system that did not reload properly
with the latest server online change.
Field Description
Status Showing the nature and the status of the record update in the format of
"[Add | Modify | Delete] ( [succeeded |failed] )"
See Also
Page Table
Displays the alarm records in the runtime system that did not reload properly with the
latest server online change.
Field Description
Type Alarm type, i.e. Digital, Analog, Advanced, Multi-Digital, Time Stamped,
TS-Digital or TS-Analog.
Status Showing the nature and the status of the record update in the format of
"[Add | Modify | Delete] ( [succeeded |failed] )"
1129
Chapter 38: Compiling and Running a Project
Field Description
See Also
Page Table
Field Description
See Also
Page Table
This table contains a list of Cicode tasks currently running. It contains the task name,
handle and running state, as well as some statistics. CPU_Time is the total time that the
task has run for - it is incremented each time the task runs. The CPU is the percentage of
total available CPU that the task is using (fast tasks often have 00 CPU).
See Also
Page Table
Displays a list of client tag subscriptions. The Page table CSAtoPSI.Subs contains the fol-
lowing columns:
Field Description
1130
Chapter 38: Compiling and Running a Project
Field Description
See Also
Page Table
This table displays a list of current database connections. The Page table users contains
the following columns:
Field Description
See Also
Page Table
This table displays a list of recordsets. The Page table users contains the following col-
umns:
Field Description
1131
Chapter 38: Compiling and Running a Project
Field Description
See Also
Page Table
Field Description
OPC Handle This is the handle the OPC server uses to reference a particular OPC con-
nection. This handle can be cross referenced with log file entries.
#Groups The number of groups created within the OPC server instance. This
number includes both active and inactive groups.
#Items The number of items creates within the OPC server instances. This
number is the total of all active/inactive items in all groups.
#Reads The number of reads that have been requested for items.
#Writes The number of writes that have been request for items.
#Updates The number of updates that have been received for subscribed items.
See Also
Page Table
Displays the performance counters that are holding an instance in the current Citect run-
time process.
Field Description
Instance The performance counter instance name (omitting the process signature,
i.e. procid: ####).
1132
Chapter 38: Compiling and Running a Project
See Also
Page Table
Displays the report records in the runtime system that did not reload properly with the
latest server online change.
Field Description
Status Showing the nature and the status of the record update in the format of
"[Add | Modify | Delete] ( [succeeded |failed] )"
See Also
Page Table
This table shows the following details for each SQL connection:
Field Description
QryActv Indication that the query is active (set to TRUE between SQLExec and
SQLEnd).
TrnActv Indication that the transaction is active (shown only in verbose mode).
See Also
Page Table
This very useful table contains the cycle and execution times of every task that is run-
ning in Citect. The Execution time is the time taken for the entire task to run. The Cycle
time is the time between when a task starts and when it starts again. The CPU is the per-
centage of total available CPU that the task is using (fast tasks often have 00 CPU).
1133
Chapter 38: Compiling and Running a Project
The Citect 0 entry is the display task (graphics page updates) for the main window. That
is, the total time taken for the Client to request data from the I/O Server, the I/O Server to
get the data and send it back to the Client, and the Client to update the display.
Note: Citect 0 corresponds to the display task for the main window. Citect 1 for the
first child window, Citect 2 for the third, and so on.
The CodeX entries correspond to Cicode tasks, where X is the handle of the task. You
can find out which task corresponds to which handle by viewing Cicode table.
Note: There will be a Trend Acq entry for every different trend sampling period you
have defined in your project.
See Also
Page Table
Field Description
l Client
Format: <cluster name><service name>
Examples: Cluster1Alarm, Cluster1Report, Cluster1Trend
l Server
Format: <server name><cluster name>
Examples: AlarmServer1Cluster1, ReportServer1Cluster1, Trend-
Server1Cluster1
1134
Chapter 38: Compiling and Running a Project
Field Description
Node Either the node to which the tran is connected, or the status of the con-
nection:
l <call>
The client tran is attempting to connect.
l <listen>
The server tran is waiting to be connected.
l <disabled>
The tran is currently disabled.
l node name
The tran has connected and is online. The value is the name of
the node/computer to which the tran is connected. This could be
the current computer or a different computer depending on the
TCP/ IP configuration of the project.
l Local
This tran connects two components which exist in the same proc-
ess. For instance, when CitectSCADA is run in single process
mode, every server component runs in the same process as the
client. In this case, the connections between these components
would be marked as Local.
1135
Chapter 38: Compiling and Running a Project
Field Description
Hnd This value represents the handle number in the tran table of the record.
Cnt This value indicates the number of times the tran has established a con-
nection. Specifically it counts the number of times the tran receives the
MSG_OPEN message. This value has no meaning for local trans for which
it remains 0.
If the number is high, it can indicate that your network is dropping and
then re-establishing connections. However, it could also mean that the
server has been running for a long time and many clients have started
and stopped, thereby closing and opening sessions.
Send This value displays the number of messages that have been sent by the
tran.
Rec This value displays the number of messages that have been received by
the tran.
Wait This value represents the number of times the tran had to wait to get a
1136
Chapter 38: Compiling and Running a Project
Field Description
Stack This value indicates the protocol number. Historically, this incorporated
the NetBIOS LanA numbers with the TCP/IP protocol stacks. However, Net-
BIOS support was removed for version 7.0 while TCP/IP support was
enhanced to include redundant Network Interface Cards (NIC).
The Stack value displays an index (1-based) which indicates on which
redundant IP address the server tran is listening or connected. Its value
is only used for out-of-process TCP/IP server trans; it has no meaning for
every other tran.
Service This column displays the type of the service used by the tran (regardless
of the tran mode). The valid services are Alarm, IO, Report and Trend.
State This is the current state of the tran. Valid states are Online, Offline, Con-
necting (client trans only), Disconnecting, Listening (server trans only)
and Disabled.
See Also
Page Table
Displays the alarm records in the runtime system that did not reload properly with the
latest server online change.
Field Description
Status Showing the nature and the status of the record update in the format of
"[Add | Modify | Delete] ( [succeeded |failed] )"
See Also
Page Table
1137
Chapter 38: Compiling and Running a Project
This table displays a list of users currently logged into the system either locally or
remotely.The Page table users contains the following columns:
Field Description
Default Indicates whether user is the default user for the Citect process. Only one user
can be a default user.
Indicates if user is the local user of the current process. Only one user can be
Local User
the current processes local user.
See Also
Page Table
Page Unit
Displays information about each I/O Device in the Citect system. This information is dis-
played if the Citect computer is configured as an I/O Server or simply as a client. If the
computer is a client, then every I/O Device for every I/O Server is displayed. If the com-
puter is an I/O Server, then only the I/O Devices for that I/O Server are displayed. You
can display I/O Devices from other I/O Servers by using the Verbose mode (press V to
enable Verbose mode). If the computer is a client, then not every one of the I/O Device
Information is updated (because only the I/O Server has this information).
Syntax
Page Unit
If the Citect computer is a client, the status and error codes are only local to the com-
puter and do not reflect the true status of the I/O Device on the I/O Server. Be aware that
every configured I/O Device is displayed in this window, not just the I/O Devices for the
particular I/O Server. (Any remote I/O Devices do not reflect the true status of the I/O
Device).
Use the Page Up and Page Down keys to scan the I/O Device list.
I/O Device Information
I/O The name of the I/O Device defined in the project (with the I/O Devices
Device form).
1138
Chapter 38: Compiling and Running a Project
I/O The name of the I/O Server that is servicing this I/O Device.
Server
Com- A description of the I/O Device defined in the project (with the I/O Devices
ment form).
I/O The I/O Device number defined in the project (with the I/O Devices form).
Device
No
PLC The physical I/O Device address defined in the project (with the I/O Devices
Number form).
Protocol The protocol used for communication with the I/O Device.
Server The status of the I/O Device. The Server Status is only valid if the computer is
Status an I/O Server and it is servicing this I/O Device. The Client Status field is
and valid for Clients only, and indicates the status of the I/O Device that is
Client attached to the I/O Server. The I/O Device status can be one of the following:
Status
RUNNING - Indicates that the communication link with the I/O Device is good.
STANDBY - Indicates that the communication link with the I/O Device is good,
but communication with that I/O Device is currently being performed by
another port. This port is in standby mode.
REMOTE - Indicates that the status of the I/O Device is OK, but it is not cur-
rently connected.
Primary Indicates if the I/O Device is in primary mode; Yes = Primary, No = Standby.
If the I/O Device is in primary mode, the server starts a communication chan-
nel with the I/O Device as soon as the server is activated. If an I/O Device is
in standby mode, the I/O Device remains inactive when the server starts
(until a primary I/O Device becomes inoperative).
Client The name of the I/O Server that this client is using. This allows you to identify
Using the primary and standby I/O Servers.
1139
Chapter 38: Compiling and Running a Project
Generic The last generic error code returned by the driver. Because most protocol
Error drivers have their own special errors, they cannot be recognized by the I/O
Server. The drivers convert their special errors into generic errors that can
be identified by the server.
Error The error handle that is assigned by the I/O Server to each error. This handle
Handle is not used by Citect (at this time).
Driver The driver-specific error code. Each driver has its own special error codes.
Error Refer to the driver specific errors (for the particular protocol) for an expla-
nation of each of the error codes.
Error The alert message associated with the generic error code.
Mes-
sage
Restarts The number of times the server has tried to establish a connection with the
I/O Device. This number is normally 1, because the server establishes a con-
nection at startup. If this field displays a number greater than 1, there is a
problem with the communication channel.
The time taken by the driver to process read and write requests (i.e. the time
Respon- taken to process a single read or write operation to the I/O Device). This time
se depends only on the physical response time of the I/O Device, because no
Times queue waiting time is included. This field reflects any tuning of the com-
munication channel (for example doubling the baud rate will half the
response time). The average, minimum, and maximum times are displayed.
Note: One I/O Device with a slow response can slow down your entire sys-
tem. For example, if you have an I/O Device with a response of 2000 ms, any
pages in your system that use data from that device, will have a minimum
update time of 2000 ms.
Cache If the I/O Device is cached, this field displays the cache timeout value. Data is
Timeout held in the cache for this timeout period before being discarded and re-read
from the I/O Device. Only read data is cached.
Block- The current blocking constant value for this I/O Device, as specified in the
ing Con- protocol.
stant
1140
Chapter 38: Compiling and Running a Project
See Also
Kernel commands
Displaying the kernel window
Pause
Pauses debug output in the Kernel window.
Syntax
Pause
See Also
Kernel commands
Displaying the kernel window
Shell
Opens a new command (shell) window.
Syntax
Shell
You can use shell windows in a similar manner to a Main window. Shell windows are
useful for displaying debugging information, or entering commands when the Main win-
dow is displaying debug trace data. You can close the shell windows by selecting Close
from the window's system icon or with the Exit command.
See Also
Kernel commands
Displaying the kernel window
Stats
Resets system statistics (used in the page general, page drivers, page table (stats), and
page I/O Device windows) to 0 (zero).
Syntax
Stats
1141
Chapter 38: Compiling and Running a Project
This command allows you to reset the statistics after Citect has been running for a long
time, and therefore provides an indication of the statistics now (instead of an average
over the total time that Citect has been running).
Note: Some I/O Server statistics are automatically reset every few minutes.
See Also
Kernel commands
Displaying the kernel window
SysLog
Displays local SysLog.DAT file. The SysLog.DAT is read from disk before being dis-
played, but is not updated once it is displayed. You need to close and re-open the win-
dow to force it to update. You can use the Page Up, Page Down, and arrow keys to move
through the file, but you cannot edit or save it.
Syntax
SysLog [Delete]
Use the optional Delete keyword to clear (purge) the contents of the SysLog.DAT file.
Note: This window is the same that is used to display the Citect.INI file. You can dis-
play either the Citect.INI or Syslog.DAT in this window, but you cannot display both
at the same time.
See Also
SysLog Format
Kernel commands
Displaying the kernel window
1142
Chapter 38: Compiling and Running a Project
The automated configuration process will implement any equipment hierarchies defined
in the source SCADA system, and apply the data acquisition method appropriate to the
source variable type.
To prepare variables for automated configuration within Historian, you need to initially
identify them within your CitectSCADA project. For more information, see Preparing var-
iables for Historian integration.
Note: CitectHistorian requires a valid license. Contact your local Schneider Electric
sales representative for more information on the licensing options that are available.
Note: If a variable has the Historian field set to "false", it will still be added to the
Historian data sources directory when an import schema is run. You will still be
able to manually historize and publish the variable within the Historian envi-
ronment.
For more information, see the topic Automating the configuration of SCADA attributes in the
CitectHistorian user documentation.
1143
Chapter 38: Compiling and Running a Project
1144
Scheduler
1145
1146
Chapter 39: Scheduler for Operators
This section contains information for Operators using Scheduler during runtime. It
describes the following:
1. Scheduler - an overview
2. Understanding the tree-view
3. Adding new Schedules
4. Understanding Schedule Inheritance
5. Overlapping rules
Scheduler - an Overview
The Scheduler control gives you the ability to schedule equipment operations around
peak and non-peak work hours within a business. You can create recurring schedules,
and configure and view schedule entries on a daily, weekly and monthly basis.
You can drag and drop schedule entries, override existing schedules and delete entries
from the calendar view. You can also quickly review scheduled states that are set to
occur.
The Scheduler control has been developed based on a component from Telerik controls.
1147
Chapter 39: Scheduler for Operators
In the diagram above the branch defined as 'Factory' is the parent with the item 'Floor'
as the child. 'Floor' has the item 'Line1' as a child, and 'Line1' has the items Lights 1 to 6
as children.
The tree-view
In the tree-view nodes can be expanded and collapsed to display their children. A con-
text menu is available and its contents are based on the equipment state and current
mode of the equipment. The 'tooltip' indicates the current state of an equipment item.
Context
Icon Equipment Mode
Menu
Automatic mode. The state is either the equipment’s default state, or is set Override
by any active schedules.
1148
Chapter 39: Scheduler for Operators
Context
Icon Equipment Mode
Menu
A piece of virtual equipment. This equipment has NO states defined, how- No con-
ever can have children. A virtual equipment t item does not have a current text
state. menu
Manual override. The state is defined by a value set by using the “Set to Remove
state” menu item. Override
Set to
State
You should understand the relationship of each branch in the equipment tree, as sched-
uled actions on one branch can affect the behavior of branches underneath.
See Also
Schedule Inheritance
Override and Normal Mode
1149
Chapter 39: Scheduler for Operators
to 1:59 am, and on switching to daylight saving time will skip to 3.00 am thus passing
the end time of 2:30 am.
For recurring schedule entries set to start during the transition to daylight saving, the
entry will run from 3.00 am to the end time. For example if the schedule entry is set from
2.30 am to 4.00 am, the schedule will skip to 3.0 am and start from 3.00 am to 4.00 am.
For the end of daylight saving:
For single schedule entries, that includes the transition to daylight saving, the entries
will run for an additional hour due to the time going backwards for one hour. For exam-
ple, if the schedule entry is from 1.30 to 3.30 am, and the time is set to switch at 3.00 am
(back to 2.00 am) for the end of daylight saving, then the schedule will run from 1.30 to
3.00 am, and then after the switch to daylight saving, will run from 2.00 am to 3.30 am.
For single schedule entries that are set to end during the transition to daylight saving,
the entry will run for an additional period from end time to 3.00 am (2.00 am). For exam-
ple, if the schedule entry is set from 1:30 to 2:30, the schedule will run from 1:30 am to
3.00 am (2.00 am), then from 2.00 am to 2:30 am for a total of 2 hours.
For recurring schedule entries that are set to end during the transition to daylight saving,
the entry will run before the switch to daylight saving. For example, if the schedule entry
is set from 1.30 am to 2.30 am, the schedule will run from 1.30 am to 2.30 am for one
hour only.
For single and recurring schedule entries that are set to start during the transition to day-
light saving, the entry will run after the switch to daylight saving. For example, if the
schedule entry is set from 2:30 to 3:30, the schedule will run from 2:30 am to 3:30 am for
1 hour only.
Knowing the rules above for the end of daylight saving you can decide to schedule a
recurring event or a single entry depending on how you want the equipment to behave.
Note: To see resolved schedule entries and how the scheduler is set to behave during
the transition to and from daylight saving, refer to the Runtime View in the Cal-
endar, to view every action set to be executed.
1150
Chapter 39: Scheduler for Operators
1. Select the equipment you want to schedule from the equipment tree.
2. In the calendar double-click on the required time slot to create a new appointment.
3. The Appointment dialog will open
4. From the State drop-down menu select the relevant 'State' to schedule for the equip-
ment
5. Add a Description (optional) of the schedule entry
6. Select the Start and End time of the State
7. For single schedule entries select OK to save the entry.
Note: If daylight savings is set to start or end, the time frame (e.g. 2 am to 3 am) is
read-only and schedules cannot be added. Refer to Scheduling entries on Daylight
Saving for more information.
1. Confirm the Start and End time of the entry.A recurring entry cannot have a duration
of more than 24 hours.
2. In Recurrence Pattern, select either Daily, Weekly, Monthly, Yearly, or Special days.
l Daily - daily occurrence of schedule entry at same start and end time. You can then
select how regularly the schedule will occur, for example every 2 days would mean
the schedule would occur every second day.
l Weekly - occur on the same day every week at the same time
l Monthly - the dialog will refresh. For monthly there are two types of recurrence you
can choose:
The same day of every month . E.g. day 3 of every month or every other month
The day, of a certain week in each month. E.g. first Thursday of every month or
every other month
l Yearly - the dialog will refresh. For yearly there are two types of recurrence you can
choose:
The same day, same month , every year. E.g. Every January 9
1151
Chapter 39: Scheduler for Operators
The day, of a certain week in a certain month. E.g. The third Wednesday of
March.
l Special days - if selected the schedule entry will occur only on special days, that fall
on the selected weekday. To enable "Special days"the radio button "Special Days
Included" needs to be set to something other than "None".
3. In Special days Included Select whether the schedule entry will run on every special
day or selected special days (within a group) or none. If select:
l All Occurrences - the schedule entry will occur on every special day regardless of
group.
l Selected Categories - the schedule entry will occur on the special days within that
group. You can select more than one group.
l None - schedule entry will not occur on special days
4. In the Range of recurrence select the start date and end date (if needed).
l No end date - scheduler entry will occur indefinitely when specified
l End After - select number of occurrences. E.g. 9 occurrences. Schedule entry will
occur 9 times.
l End by - select end date of schedule entry.
5. Click OK to close the Edit Recurrence dialog.
6. Click OK to save the schedule entry.
Note: The schedule entry may disappear from the current configuration view depending on the recurrence
pattern defined for the schedule and when the schedule entry was set to start.
1152
Chapter 39: Scheduler for Operators
Floor ON and Not sched- Will not be ON. Will resolve to default
OFF uled state OFF
Light4 ON and 5 pm to 7 5 pm to
OFF pm in State 5.30 pm in Will be in State OFF from 5 pm to 5.30
ON State OFF pm as the second schedule entry was
(accessed (accessed at accessed last and takes precedence.
at 8.30 10.30 am) Will be ON from 5.30 pm to 7.pm.
am)
If State has a priority set, the state with the highest priority defined will take precedence
regardless of recurrence. And if two (or more) schedule entries have the same state prior-
ity the schedule entry with the latest start time will take precedence.
1153
Chapter 39: Scheduler for Operators
Schedule Inheritance
Schedule Inheritance is where the child branch or branches inherit the schedule entries
from the parent, when the 'state' of the schedule entry is also defined for the child. If the
current parent 'state' is not defined for the child equipment, the child will ignore the
schedule entry of the parent equipment.
Using the tree-view from the previous example,
States
Equipment Scheduled What this means
defined
Light2 OFF Not scheduled Will not be ON as not a valid state for Light2
To check what schedule entries exist for the equipment, select the item in the tree-view to
refresh the Calendar.
1154
Chapter 39: Scheduler for Operators
l When override mode is enabled on equipment that is classed as a parent, itself and
child equipment will inherit the override mode and any state changes from the par-
ent.
l If the child is set to override mode, the child will not inherit the schedule entry from
the parent. When override mode on the child is disabled, it will go into inherited over-
ride mode and will inherit any schedule entries from the parent.
The following tables outline both rules:
States
Equipment Mode Scheduled What this means
defined
States
Equipment Mode Scheduled What this means
defined
1155
Chapter 39: Scheduler for Operators
States
Equipment Mode Scheduled What this means
defined
Special Days
Special days are days where the normal daily or weekly schedule of equipment does not
apply. In the Edit Recurrence dialog you can select the group or type of special day, and
when each day will occur.
When adding a new schedule the following rules apply:
l Daily, weekly, monthly and yearly schedule entries will not occur on a special days,
unless specified using the options in the Special Days Included area.
l For schedule entries you want to occur only on 'special days' and not on normal
days then select in the Recurrence area, 'special days' and select the day you want
1156
Chapter 39: Scheduler for Operators
the schedule to run. If the special day falls on the selected weekday, the schedule
entry will run.
1157
Chapter 39: Scheduler for Operators
1158
Chapter 40: Scheduler for Engineers
This section describes the following:
1. Understanding Scheduler
2. Defining Equipment for inclusion into Scheduler
3. Define States belonging to Equipment
4. Add and configure the CitectSCADA ActiveX control onto a graphics page
5. Configuring Special days
Understanding Scheduler
Scheduler is a component of the Report server with an ActiveX control that enables you
to link your CitectSCADA system to a calendar. When configured you can schedule your
systems operations, for example, schedule operations around peak and non-peak periods
with lighting, heating and other equipment within your system set to turn on and off
depending on when people will be there, thus optimizing energy efficiency.You can also
use Scheduler to plan maintenance days whereby any equipment that is not required
can be turned off.
Scheduler has been designed to be a core component of the report server. This provides
tight integration with the SCADA. It also supports the online change functionality avail-
able with the 7.20 CitectSCADA release using the report server reload.
With the Scheduler release, equipment definitions are now part of the report server proc-
ess. This means that the equipment browse now returns data from the centralized report
servers. The equipment information will be cached on the client so it will still provide
the existing client side performance while adding centralized online change func-
tionality.
1159
Chapter 40: Scheduler for Engineers
Backing up CitectSCADA
Back up your CitectSCADA project as you would any project within CitectSCADA. A
backup will include the configuration settings made during design time. See below for
backing up runtime defined schedules.
Refer to the topic Backing up a project for more information in the CitectSCADA main
help.
To back up schedule entries made at runtime using the Scheduler ActiveX control interface:
Copy the [ClusterName].[ReportServerName].scheduling file (i.e. Cluster1.-
ReportServer1.scheduling.xml) from the CitectSCADA 'Data' directory on your local
machine to a secondary location.
To restore the scheduler engine state and configuration view within the Scheduler Acti-
veX control- copy the xml file back into the Data directory.
To confirm the restore open the Scheduler page at runtime and select the configuration
view.
1160
Chapter 40: Scheduler for Engineers
Online Changes
Online changes have been extended to include CitectSCADA. Records can be modified
during runtime using the project editor, recompiled and the resulting database files
updated ( for CitectSCADA the files are equip.dbf and restate.dbf). You can initiate a con-
figuration reload for each server using the Runtime Manager or using Cicode functions.
The following rules apply:
l If you delete equipment or an equipment state, the engine will not process any sched-
uled entries that belong to that equipment or equipment state.
l If you modify an equipment name or the name of an equipment state, it is similar to
deleting the equipment or equipment state and adding a new one.
Redundancy
For CitectSCADA it is recommended a redundant report server is configured. Syn-
chronize the time on both servers.
1161
Chapter 40: Scheduler for Engineers
Note: At startup the scheduler engine may begin executing actions before other
server processes in the system are available. This may result in the action not com-
pleting successfully. To help avoid this issue, use the ini parameter [Scheduling]Start-
Delay to delay the startup of the scheduler engine. This allows time for the other
server processes of the system to come online before any scheduled actions are ini-
tiated.
l Do not use the kernel for normal CitectSCADA operation. The kernel is only for diag-
nostics and debugging purposes.
l Configure your security so that only approved personnel can view or use the kernel.
l Do not view or use the kernel unless you are an expert user of CitectSCADA and
Cicode, or are under the direct guidance of Technical Support for this product.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
1162
Chapter 40: Scheduler for Engineers
Start delayed - Start operation was requested but delayed due to the start delay period
not being elapsed. The message indicates that the start will occur later and specifies in
how many milliseconds. A timestamp is supplied indicating the local time that the start
was called.
Started - Runtime Transitions Manager has been started, and a local timestamp sup-
plied indicating when.
Delayed Start Cancelled - Prior start call which was queued due to startdelay has been
dequeued and not started.
Stopped - Runtime Transition Manager has halted its operation, a local timestamp indi-
cating when.
Redundancy Engine
1163
Chapter 40: Scheduler for Engineers
Notes:By default the logging levels are set to every category, but only Critical and
Error level traces will be logged. As the traces from the scheduler are currently Infor-
mational only, change this level to include information. (If that is the only change
made, then informational traces from every component will be directed to the trace-
log) With manipulation of the debug ini parameters, you can fine tune a fairly gran-
ular trace set.
Example for scheduler critical, error, information ONLY:
[Debug]SeverityFilter= Critical,Error,Information
CategoryFilterMode=0
CategoryFilter=Scheduler
1164
Chapter 40: Scheduler for Engineers
Note: Currently traces for equipment property changes are logged on the server that
they occurred on. No updates done via synchronization are logged.
Time Synchronization
For operators to schedule equipment during the transition of daylight saving the client
and server should be in the same time zone.
If the time of the client machine is no longer synchronized with the time of the server
unplanned state changes may occur or state changes may not occur at the correct time.
Configuring Scheduler
Before configuring Scheduler you need to understand the following terms that are used
throughout this guide:
l Equipment – a component or set of components that when grouped form a logical
item within CitectSCADA.
l States – any condition or mode of operation belonging to the equipment. For example
a light may have two states, on and off.
Scenario
The following ‘factory’ scenario will be used for examples throughout the Scheduler
help.
1165
Chapter 40: Scheduler for Engineers
1166
Chapter 40: Scheduler for Engineers
The equipment should have a default state defined belonging to the same cluster. If no
default state is defined there will be a compile error.
Example - equipment hierarchy in Scheduler:
Using the 'Factory ' scenario the lights for Line 1 and the lighting and heating for Meet-
ing room 1 need to be added into the system as equipment.
Follow the naming convention guidelines (described in the topic Equipment Properties
enter the names as:
Factory.Offices.MeetingRoom1.Lighting
Factory.Offices.MeetingRoom1.Heating
Factory.Floor.Line1.Light1
Factory.Floor.Line1.Light2
Factory.Floor.Line1.Light3
Factory.Floor.Line1.Light4
Factory.Floor.Line1.Light5
Factory.Floor.Line1.Light6
At runtime the following tree is displayed in the Scheduler.
Once you have configured the equipment for your system, you need to define the
required equipment states. For example, the light in meeting room 1 the default state
would be OFF.
See Also
1167
Chapter 40: Scheduler for Engineers
Editing States
From the project editor choose Equipment | Equipment States
Modify the properties of the States form, when complete
Click Replace to modify an existing record.
Do not use the scheduler in situations where equipment state actions must be executed.
The engine does not ensure that defined actions are executed for every state transition. The
scheduler engine will not be able to run actions when other state actions for the same equip-
ment take longer time to complete or a communication fault occurs.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
Field Description
Name Name of the State. Usually this would be an 'action' the equipment could be
scheduled to do. For example, a light could have the action 'on' or 'active'
defined.
1168
Chapter 40: Scheduler for Engineers
Field Description
tory.Floor.Line1.Light1".
Equipment should be an existing item on the selected cluster.
Cluster The name of the cluster to which this State will belong.
Name
Entry The action the State will take when triggered. For example the entry action for
Action light 1 could be tag_light1=1. When light1 is scheduled, this will trigger the
light to turn on. Entry Action can be any Cicode expression.
Delay The time that needs to elapse before the state will initially become active.
If delay is defined the Entry Action for the state will not occur until the delay
period has elapsed. For example; this would allow you to turn on every light
sequentially to avoid a power spike.
Period Sets the frequency of the 'Repeat Action'. For example set the repeat action to
occur every hour.
Note: The repeat period will not start until the entry action has completed. The
first repeat action will occur after the entry action completes plus one repeat
time period. For example, if the Entry Action takes ten minutes to complete, the
Repeat Action will not start until after ten minutes even though the Repeat
Action is set to occur every two minutes.
The following fields are implemented with extended forms (press F2).
Field Description
Priority Number used to determine which schedule entry will run if a schedule conflict
occurs between more than one state.
DR
Demand and response mode (DR). The default DR mode value is 0.
Mode
Note: If the report server is run in single process mode and no user is logged in, all
tag writes attempted by the scheduler when actions are run will not succeed. We rec-
ommend running the report server(s) in multi-process mode to avoid this issue (the
server user will be logged in), or setting the citect.ini parameter [Client]Auto-
LoginMode to either 2 or 6 to insure a user is always logged in.
1169
Chapter 40: Scheduler for Engineers
Do not use the scheduler in situations where equipment requires a guaranteed sequence of
successful actions. The scheduler engine will attempt to run the actions in the correct
order, but if entry actions take too long or a failure in communications occurs when an
entry action is run, the engine does not guarantee that the equipment will receive every
command.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
The entry action is a Cicode expression to execute when the equipment transitions to the
state. For example, the expression can be used to write a value to a variable tag.
Using the factory scenario described earlier, the states 'ON' and 'OFF' were identified for
the heating in meeting room 1. The states would be configured as below:
Field Value
Name ON
Equipment Factory.Office.MeetingRoom1.Heating
Field Value
Name OFF
Equipment Factory.Office.MeetingRoom1.Heating
An entry action when triggered, causes the equipment to perform a certain action. In the
example above when the state is changed the heating will either turn on or off.
1170
Chapter 40: Scheduler for Engineers
Note: If the report server is run in single process mode and no user is logged in, all
tag writes attempted by the scheduler when actions are run will fail. We recommend
running the report server(s) in multi-process mode to avoid this issue (the server
user will be logged in), or setting the citect.ini parameter [Client]AutoLoginMode to
either 2 or 6 to insure a user is always logged in.
Open the runtime view to see the actions that are planned to be executed. You can ena-
ble the tag write event queue logging to help identify incomplete actions. Refer to the
[General]TagWriteEventQue parameter in the CSE Help Reference for more information.
This means lights 1 to 6 will turn on over a period of 6 seconds, when triggered at the
same time. A light every second.
1171
Chapter 40: Scheduler for Engineers
Do not use the scheduler in situations where equipment state actions must be executed.
The engine does not ensure that defined actions are executed for every state transition. The
scheduler engine will not be able to run actions when other state actions for the same equip-
ment take longer time to complete or a communication fault occurs.
Failure to follow these instructions can result in death, serious injury, or equip-
ment damage.
When configuring states you can define a repeat action. This action can be set to repeat
for the specified repeat period. For example, the heating set point can be adjusted to fol-
low the outside temperature trend to save energy. The first repeat action will execute
after waiting for one repeat period starting after completion of the entry action.
Field Value
Name ON
Equipment Factory.Office.MeetingRoom1.Heating
Period 00:15:00
Note:
• The repeat action will only start after the entry has completed.
• The repeat action will re-trigger at or after the specified period.
• The repeat action will not re-trigger until the previous repeat action has completed.
1172
Chapter 40: Scheduler for Engineers
In Scheduler, states can be defined multiple times, each for a specific DR mode. Thus the
state that is action-ed (scheduled to occur) is determined by the DR mode for the equip-
ment. In the example below "line2.lights" has multiple 'On' States with different DR
modes. This allows the room to be scheduled for ‘On’, with the amount of energy con-
sumed adjusted according to the assigned DR mode.
Equipment DR Entry
Equipment Description
State Mode Action
Off 0 Tagl2_
lights=0
The default DR mode value is '0'. When the DR mode field is empty, the default value is
used. The scheduler engine selects the state with the nearest lower DR mode value in the
case where an exact match to the current specified DR mode is not found.
Set the DR mode on equipment using the EquipSetProperty Cicode function
For example : EquipSetProperty (Equipment, "DRMODE", "1", cluster)
Being an ActiveX control, you can insert the CitectSCADA as an object on a Citect-
SCADA graphics page.
To do this, do one of the following:
l Go to Edit | Insert ActiveX Control. The Insert ActiveX dialog box appears.
l Double-click the CitectSCADA Control item in the ActiveX Controls list box.
l In Graphics Builder go to Objects | Scheduler or Ctrl-U
l In Graphics Builder, display the toolbar from the View|Show Toolbar menu and
click the Scheduler tool.
The Scheduler Control properties dialog will open.
1173
Chapter 40: Scheduler for Engineers
For details on configuring the properties for the control, see the topics: ActiveX Object
Properties - Appearance (Tag Association), and Defining Common Object Properties in
the CitectSCADA help.
As an ActiveX control you can resize, and re-position the control on the page. For Citect-
SCADA resize the control so the whole calendar will display in the control window at
runtime.
See Also
States
Defining States
1174
Using the Web Client
1175
1176
Chapter 41: The Web Client
The CitectSCADA Web Client allows you to view a live CitectSCADA project within a
Web browser. It provides easy access to CitectSCADA Runtime for LAN-connected users
requiring read/write access to current production information.
For example, a senior manager could monitor a facility and access current production
information from any computer on the LAN without the need for extensive downloads
or software installation.
Note: On 64 bit Windows operating systems (XP 64 bit and Vista 64 bit), there are
two Internet Explorer options. One for 32 bit mode and one for 64 bit mode. The Web
Client needs to be used in Internet Explorer 32 bit mode.
If you start the Control Client and then start the Web Client on the same machine run-
ning Windows Vista operating system, an alert message will be displayed. This will
occur for projects that use ActiveX executable components, for example the Example
project. In order to use these projects you need to add the Web Server address as a
trusted site in Internet Explorer.
See Also
System architecture
System architecture
To display a live CitectSCADA project in an Internet browser, you need to combine the
content of the project pages and the current data these pages present using standard,
Web-based communication protocols. To understand the communication architecture for
the CitectSCADA Web Client, it's easiest to consider the role each of the following com-
ponents play in achieving this outcome:
l CitectSCADA Web Server - Performs the server-side functionality of the system. It
operates by accepting requests from the client, and providing a response to the client
when the clients details are authenticated. It then directs a client to the graphical and
functional content of a CitectSCADA project and the location of the runtime servers.
This information is stored on the Web Server when a CitectSCADA project is con-
figured as a "deployment". A CitectSCADA Web Server can contain multiple deploy-
ments.
1177
Chapter 41: The Web Client
l CitectSCADA Runtime Servers (including the I/O Server, Alarm Server, Trends
Server and Reports Server) - Monitor the physical production facility and contain
the live variable tag data, alarms and trends that the Web Client will display.
l Web Client - provides the platform to merge a deployed project's pages and content
with the raw data drawn from the runtime servers. Again, standard Web tech-
nologies are necessary, so the client uses Microsoft Internet Explorer.
The following diagram shows how these components interact.
CitectSCADA Web Client communications architecture.
1178
Chapter 41: The Web Client
Once the Web Client has connected to the Runtime servers, steps 2 and 3 become an
ongoing process, with the necessary content being called upon as the user navigates the
project pages.
The citect.ini file settings used by a Web Client are taken from the citect.ini file on the
Web Server at the time of connection.
This diagram has the system components set up on different computers purely for the
sake of explaining the communications model. In reality, the flexibility of the architecture
allows these components to be distributed in any necessary arrangement; they can even
share a common location.
Getting Started
The CitectSCADA Web Client Help is designed to guide you through the steps necessary
to successfully set up a Web Client system.
For detailed information on installing and configuring the web server for both Microsoft
IIS and Apache, refer to the The CitectSCADA Installation and Configuration Guide
which is available in a PDF format on the Installation CD, or in the Documentation
folder of your CitectSCADA installation.
To facilitate your installation, first familiarize yourself with the System architecture, and
then work your way through the following steps, as they will logically guide you
through the correct set up procedure.
1179
Chapter 41: The Web Client
Note: In order to implement a web client solution you need to first install Microsoft
.NET Framework 2.0 on the web client machine.
Note: To use the Web Client, your CitectSCADA system needs to be configured to
communicate using TCP/IP. This means the network addresses in your project needs
to be defined using standard IP addressing.
1180
Chapter 41: The Web Client
Feature limitations
The following features are not supported:
l Cicode Debugger
l Remote shutdown
l Fuzzy Logic
l Kernel windows
l Keyboard shortcuts that clash with Internet Explorer's keyboard shortcuts
l Web Client is unable to act as a CitectSCADA Server
l Pages based on the default Menu Page template will only show buttons for pages pre-
viously visited
l The Page Select button on the default Normal template only lists pages previously
visited
l The CSV_Include project's Update Page List menu item will not work
Note: If your project is based on the CSV_Include template, you need to create a
customized menu to access pages from the menu bar.
See Also
Functionality limitations of the Web Client platform
Cicode Function Limitations
1181
Chapter 41: The Web Client
Pro- "
jectRestartSet
ProjectSet "
Shutdown "
ShutdownForm "
UserCreate Changes to user profiles need to be made on the machine where the
project is compiled and auto-deployed.
UserCreateForm "
UserDelete "
UserEditForm "
UserPassword "
User- "
PasswordForm
1182
Chapter 41: The Web Client
WinFree "
WinMode "
WinMove "
WinPos "
WinSize "
WinTitle "
WndShow "
See Also
Identifying external files for inclusion in a web deployment
Functionality limitations of the Web Client platform
Feature limitations
1. Verify that the project you want to deploy has had any associated user files or Acti-
veX objects identified in the Web Client Files dialog (see Identifying external files for
inclusion in a deployment).
2. Check the Fast Runtime Display option in the Graphics Builder. Update pages and
pack libraries for include projects and then main projects.
3. Locate the project you want to deploy in Citect Explorer and do a fresh compile.
4. Go to the Citect Explorer Tools menu and select Web Deployment Preparation (or
click the following icon on the Explorer toolbar):
5. A progress indicator appears. The size of the project significantly affects how long
this process takes; a large project with many files can take over ten minutes to proc-
ess, depending on your hardware. (You can abort the deployment preparation if you
want.)
1183
Chapter 41: The Web Client
6. When complete, a dialog appears stating the preparation was successful. Click OK.
The project is now ready for deployment on the Web Server. If you change a
project, you need to do a fresh compile and run the Web Deployment Preparation
tool again.
Note: You can run the Web Deployment Preparation tool automatically when you
compile a project. To do this, go to the Citect Project Editor Tools menu and select
Options. Select the Prepare for Web Deployment option and click OK. Be aware that
this increases the time taken for each compile, particularly for large projects.
Configuring a deployment
A deployment represents the implementation of a CitectSCADA project on the Web
Server. It incorporates the files and components necessary to display a project, and keeps
a record of the location of the servers where CitectSCADA Runtime data is generated.
The deployments configured on a Web Server are listed on the Web Client home page,
which is the page that appears when you initially log in. The configuration details for a
deployment can be displayed by clicking the small plus (+) icon to the left of the deploy-
ment name.
The type of action you can implement for a deployment depends on the permissions
granted by your log in. For example, if you log in as a View-only Client, you can only
view a deployment. If you are an administrator, you can edit deployments and create
new ones.
The following list describes the functionality associated with each of the icons presented
on the home page.:
Help - displays this help page on how to configure and use the Web Client.
Start Control Client - Displays the selected deployment with Control Client
permissions (Control Client and Administrator Client only)
1184
Chapter 41: The Web Client
Additionally, the System Messages panel provides notification of events that impact the
current status of the Web Server.
Note: The Citect.ini file settings used by a Web Client are taken from the Citect.ini file
on the Web Server at the time of connection. This includes which clusters a Web
Client has access to. To switch clusters in a project viewed using a Web Client, use
the functions ClusterActivate and ClusterDeactivate.
See Also
Preparing a Project for Deployment
Creating a new deployment
Deploying a project from within CitectSCADA
Displaying a deployment
Editing an existing deployment
Updating a deployment to reflect project changes
Deleting a deployment
Note: If you've upgraded your version of the Web Client, you can still view your
legacy deployments that you created using version 6.1 or earlier of the Web
Client. For details, see Web Client Upgrade Considerations.
3. Identify the source of the CitectSCADA project's content in the Project Path field.
1185
Chapter 41: The Web Client
If the project is located locally on the Web Server, you can use a normal path
address. The path needs to point directly to the project within the
CitectSCADAUser directory. For example, the location of the MyExample project
would be:
[User]\MyExample
Note: If you are remotely administering the Web Server and use a local path
address, verify that the path represents the location of the project on the Web
Server computer, not the computer you are currently using.
If the project is not located on the Web Server, you need to use a UNC address that
identifies the host network computer and the directory it can be found in. For
example,
\\ComputerName\<path to application data>\User\MyExample
Note: You need to share the directory a project resides in to allow the Web Server
access to it. Ideally, create a share from the directory (called WebShare, for exam-
ple) and then use the following project path:
\\ComputerName\WebShare
Remember that if you are trying to access the project directory from a remote com-
puter, a "local" administrator log in will not provide you with appropriate access
on a different computer. use a network user profile that will be recognized by other
computers on the same domain.
4. Determine if any of the I/O, Alarms, Reports or Trends Servers associated with the
project are protected by a firewall. If they are, you need to confirm with the firewall
administrator if the CitectSCADA ports have been opened to allow direct access, or if
the firewall is using address forwarding.
If forwarding is being used, you will need to identify each server by typing the
name in the Server field, using the following format:
<ClusterName>.<ServerName>
If you have alarm properties enabled on an Alarm Server, you will need to con-
figure an alarm properties connector as a separate server to let the Web Server
know which port it is running on. Type the Alarm Server name in the Server field,
using the following format:
<ClusterName>.<AlarmServerName>_AlarmProps
For example:
ClusterOne.AlarmServerOne_AlarmProps
1186
Chapter 41: The Web Client
Type in the Address and Port for each server, as supplied by the firewall admin-
istrator.
Note: The Web Client will automatically add any servers that are redirected in
this way to the [AddressForwarding] section of the local Citect.ini file. See Using
address forwarding for more information.
You can add additional servers to the list by selecting the Add New Server icon.
5. Use the Client Control text box to specify the use of a particular version of the Web
Client component when the deployment is displayed.
The menu lists the different versions of the Web Client control currently installed
on the Web Server. Typically, choose the version of the control that matches the
version of CitectSCADA your project was compiled on.
6. Click Apply Changes.
This is important, as you'll lose your changes if you jump straight back to the
home page.
All the project files are retrieved from the path indicated, and copied to the Web
Server ready for access by the Web Clients.
Once complete, information about the size of the project appears in the File Paths
banner above the Project Path field. The number to the left indicates how many
files are included in the project; the number to the right indicates the total size of
the project.
The deployment is saved. When you return to the Web Client home page, by clicking the
home icon, your new deployment is listed.
See Also
Deploying a project from within CitectSCADA
Displaying a deployment
l [WebServer]DeployRoot
1187
Chapter 41: The Web Client
These parameters identify the client component used with the project and the location of
the deployment root directory. When the project is compiled and prepared for deploy-
ment, it is placed directly on the Web Server.
Notes:
l If you've upgraded your Web Client to version 7, you can still view your legacy
deployments. For details, see Web Client Upgrade Issues.
l When implementing this option, consider to your Citect.ini file configuration, as any
errors with these parameters are difficult to diagnose. To avoid input errors, use the
Web Deployment Tool on the Citect Explorer tool bar with the Web Server's Web
Deployment GUI.
l If the project name contains non-ASCII characters, deploying from within Citect-
SCADA might be unsuccessful and raise errors. Under these circumstances, use the
Web Server interface to create the deployment.
To deploy a project from within CitectSCADA:
1. Confirm that your CitectSCADA system is configured to use TCP/IP. If you run the
Computer Setup Wizard, the Networking page will identify which communications
protocol is being used.
2. Adjust the [WebServer]DeployRoot parameter within the Citect.ini file. This param-
eter represents the directory where the deployment will be located on the WebServer.
If you have set up an IIS-based Web Server, the default location will be the Deploy
directory within the installed directories. For example:
[WebServer]
DeployRoot=C:\inetpub\wwwroot\Citect\deploy
Note: When setting the [WebServer]DeployRoot ini parameter, the path needs to con-
tain "deploy" as the last subfolder name, otherwise the deployment will be unsuc-
cessful. Use a mapped drive instead of a UNC address if deploying to a network
destination from a Windows 2000 system. Do not map a drive directly to the
deployment location, as the path needs to finish with a "deploy" subfolder.
1188
Chapter 41: The Web Client
Your project will now appear as a deployment within the Web Client home page
next time you log in. Each project that is deployed is given a dedicated deploy-
ment name and project path.
Note: You can run the Web Deployment Preparation process automatically when
you compile a project. To do this, go to the Citect Project Editor Tools menu and
choose Options. Select the Prepare for Web Deployment option and click OK. Be
aware, however, that this might increase the time necessary for a project to com-
pile.
5. Determine if any of the I/O, Alarms, Reports or Trends Servers associated with the
project are running behind a firewall. If they are, you need to confirm with the fire-
wall administrator if the CitectSCADA ports have been opened to allow direct access,
or if the firewall is using port forwarding.
If port forwarding is being used, you will need to log in to the Web Client as an
Administrator, select the project, and then the Edit Deployment button:
6. Identify each server that port forwarding is being used for by typing the name in the
Server field, using the following format:
<ClusterName>.<ServerName>
If you have alarm properties enabled on an Alarm Server, you will need to con-
figure an alarm properties connector as a separate server to let the Web Server
know which port it is running on. Type the Alarm Server name in the Server field,
using the following format:
<ClusterName>.<AlarmServerName>_AlarmProps
1189
Chapter 41: The Web Client
For example:
ClusterOne.AlarmServerOne_AlarmProps
7. Type in the Address and Port for each server, as supplied by the firewall admin-
istrator.
Note: The Web Client will automatically add any servers that are redirected in
this way to the [AddressForwarding] section of the local Citect.ini file. See Using
address forwarding for more information.
You can add additional servers to the list by selecting the Add New Server icon.
See Also
Displaying a deployment
Displaying a deployment
When you display a deployment, it downloads the necessary Web Client component file
from the Web Server, enabling you to run the associated CitectSCADA project in your
Web browser.
Note: The Citect.ini file settings used by a Web Client are taken from the Citect.ini file
on the Web Server at the time of connection. This includes which clusters a Web
Client has access to. To switch clusters in a project viewed using a Web Client, use
the functions ClusterActivate and ClusterDeactivate.
To display a deployment:
1. Locate the deployment you want to display in the list of available deployments.
2. Click the relevant icon (Start Control Client or Start View-only Client) to display the
deployment.
The display options available to you depend on your login permissions. If you select the
View-only Client icon (the one with the gold lock), you can only read the current values
for the CitectSCADA project.
Once the necessary project files and components have been downloaded, the Citect-
SCADA project appears. You can now navigate the project pages as necessary.
Note: An alert message might appear if the current user on the client machine does
not have Windows administrator rights when a new or updated component file (.cab
1190
Chapter 41: The Web Client
file) is downloaded. Verify that the current Windows user has administrator rights if
a new deployment is run or an updated .cab file needs to be downloaded.
See Also
Editing an existing deployment
1. Select the deployment you want to edit in the list of available deployments.
2. Click the Edit Deployment icon.
3. Click Apply Changes. (This is important, as you'll lose your changes if you jump
straight back to the home page.)
The Web Server retrieves a fresh set of pages and components for the CitectSCADA
project, which will include any recent changes.
See Also
Updating a deployment to reflect project changes
1191
Chapter 41: The Web Client
1. Verify that the project you want to update has been compiled and processed within
the CitectSCADA by the Web Deployment Preparation tool. See Running the Web
Deployment Preparation tool.
2. Select the deployment you want to update.
3. Click the Edit Deployment icon.
The Web Server retrieves a fresh set of pages and components for the CitectSCADA
project, which will include any recent changes.
See Also
Editing an existing deployment
Deleting a deployment
Deleting a deployment
To delete a deployment from a Web Server, you need to log in as an Administrator
Client.
To delete a deployment from the Web Server:
1. Select the deployment you want to delete from the list of available deployments.
2. Click Delete Deployment.
A dialog asks you to confirm that you want to delete the deployment. Click OK.
1192
Chapter 41: The Web Client
See Also
Configuring a deployment
1193
Chapter 41: The Web Client
English en
French fr
German de
Spanish es
Simplified Chinese zh
Japanese ja
Korean ko
Having found no match in "zh-cn", the script tries to load Simplified Chinese language,
"zh", as a match. The interface will automatically display in Chinese.
See Also
Using a language different to the current system locale setting
1. Decide which language you want to use and determine its associated language code.
(See How default languages are implemented for a list of the codes for the default lan-
guages supported by the Web Server).
For example, if you want to use Chinese, the code necessary would be zh.
Note: If the language you want to use is not one of the supported languages, you
need to create and translate your own message file. See Implementing a non-
default language.
2. Use a URL query to indicate the language you want to use for the Web Client deploy-
ment pages. For example, if the address field on your browser currently reads:
http://localhost/CitectSCADAPowerSCADA Expert
add a "/?lang=" query to the end of the address. For example, Chinese would be:
http://localhost/CitectSCADAPowerSCADA Expert/?lang=zh
1194
Chapter 41: The Web Client
Note: If you use a code that represents a regional variation of one of the default
languages and that specific code cannot be matched, the Web Server can only
implement the available default version of the language. For example, using the
language code for Chinese (PRC), "zh-cn", results in the Simplified Chinese being
used, "zh".
Your Web browser now displays the Web Client's deployment configuration pages using
the appropriate language.
See Also
Implementing a non-default language
1. Using a text editor that supports the language you want to edit, open one of the exist-
ing message files located in the Web Server's locales directory; the default path is:
C:\Program Files\Citect\CitectSCADA 7.10Schneider Electric\PowerSCADA Expert
7.30\Web Server\locales
Open a file that includes the language that will be easiest to translate. The lan-
guage code at the start of each file name can be used to identify the language each
file represents; for example, the English language file is called enmsg.xml.
2. Save the file back to the locales directory, using the appropriate language code in the
name.
To name the file correctly, check the list of Windows Language Codes for the
appropriate code. This will allow your translated resource file (XXmsg.xml) to be
automatically loaded when the Web Client home page is launched, provided it
matches the current system locale setting.
For example, to implement Hebrew on the Web Client's configuration pages, you
would name your file hemsg.xml. To use the Taiwanese variation of Chinese, you
would call the file zh-twmsg.xml.
3. Now change the file content. Firstly, set the correct encoding format.
The encoding format is defined in the top line of the file, which appears as fol-
lows:
<?xml version="1.0" encoding="iso-8859-1" ?>
1195
Chapter 41: The Web Client
If the language uses English characters, the format you would use is ANSI, which
is defined as "iso-8859-1" (see example above).
If the language uses non-English characters, you would use Unicode, which is
defined as "UTF-8" (see example below).
<?xml version="1.0" encoding="UTF-8" ?>
4. Now translate the text that appears on the Web Client interface.
The content that needs to be translated is divided across two sections within the
file: "labels" and "messages". The labels section includes the content used to
describe and identify the elements of the interface; the messages section includes
the notifications that appear in the system messages panel.
To translate these sections, alter the text between the enclosing XML tags. Do not
alter the tags themselves. The XML tags define where each label is used.
Note: Make sure you maintain any "%" characters, as these are used to insert sys-
tem information.
...
would appear as follows in Spanish:
<!-- Labels -->
<span id="TITLE">Despliegue del Cliente Web CitectSCADA</span>
<span id="SYSMSG">Mensajes del Sistema</span>
<span id="DEP">Despliegue</span>
<span id="DESC">Descripción</span>
<span id="ACTION">Acción</span>
<!-- Messages -->
<sysmsg id="DELOK">% eliminado.</sysmsg>
<sysmsg id="DELCAN">% NO será eliminado.</sysmsg>
<sysmsg id="DEPNULL">No puede % un despliegue vacío.</sysmsg>
Once you have translated the file and saved it with the appropriate name to the locales
folder, your Web Server will be able to support the language.
Note: When you save your file, make sure the text editor you used saves the file in
1196
Chapter 41: The Web Client
the appropriate format depending on the language coding used, i.e. ANSI or Unicode
(UTF-8) . See step 3 above.
If you're planning on installing Web Client version 7.x but want to view legacy (that is,
pre-version 7.0) deployments, before installing the new version, back up your old deploy-
ments to a durable storage medium and place them in a secure location. Then, after
installing the new version, copy your old deployment(s) back to the deploy folder (see
above), and the legacy .cab file(s) to the corresponding folder in the client folder; this
will make your old deployments available for use.
Creating new deployments
When creating a new deployment, be aware that the .cab file you use (Client Control) for
the deployment needs to correspond to the correct version of the project you want to
access or the deployment will not succeed. For example, to create a deployment based on
a version 7.0 CitectSCADA project, from the Client Control menu choose
700/filename.cab; to create a deployment based on a version 7.30 CitectSCADA project,
from the Client Control menu choose 730/filename.cab.
Deploying a project from within CitectSCADA
If you are deploying a project from within CitectSCADA, edit the [webserver] section in
your citect.ini file to specify the correct cab file for the version of the Web Client you're
using. For example, for a version 7.0 deployment, specify a .cab file located in the 700
folder; for a 7.10 version, specify the 710 folder.
1197
Chapter 41: The Web Client
1198
Chapter 41: The Web Client
3. In Add this Web site to the zone field, add the web server's IP address as follows:
http://<ip address>
Note: Whenever Web Client pages do not load, display, or perform correctly, verify
your security settings even if you are not running Windows 2003 Server.
Q: When I try to start the Web Client, I get the alert message "Starting Citect Web
Client Failed: Can not initialize Citect system", and then the Web Client browser win-
dow stops responding to my inputs. How do I correct this?
A: First check that you haven't accidentally deleted the #DisplayClient folder from the
installed Web Server directory, as this will cause this error. By default, this directory is
located at:
C:\Inetpub\wwwroot\Citect\deploy\#displayclient
If this is not the case, this is due to an incorrect MIME setting: the initialization files are
not being recognized in Windows 2003 as registered file extensions. To correct this, add
the correct MIME type extension by doing the following:
1. Run the IIS manager and go to Web Sites|Default Web Site|Citect|deploy.
2. Choose Properties from the folder's right-click menu.
3. Go to HTTP Headers|MIME types.
4. In the Extension field, enter ".*".
5. In the MIME type field, enter "all".
6. Restart your Web server and client.
General considerations
This section describes general considerations relating to the Web Client product.
Q. When I try to run a deployment in Internet Explorer, I get the following error: "Prob-
lems with this page might prevent it from being displayed properly...". What is the
cause?
A. When you first try to run a deployment, Citect will attempt to download the client
component (the .cab file) associated with that deployment if it is not already present on
the local machine. If this download of the client component is triggered, and the cur-
rently signed in user does not have Windows local administrative rights on the client,
then this alert message occurs.
1199
Chapter 41: The Web Client
The solution is to verify that the person who runs a deployment for the first time is a
Windows local administrator on the client machine. Once the components have been
downloaded, any user will be able to access and run the deployment. The alert message
will not reoccur unless the .cab file is updated.
Q. I deployed a project from within CitectSCADA using the appropriate Citect.ini
[WebServer] parameters, but the project does not appear in the list of deployments on
the Web Server. A dialog informed me that the deployment was successful. What has
happened?
A. This situation can occur if you make an error with the syntax for the [WebServer]
DeployRoot parameter. If, for example, you use a curly bracket instead of a square bracket,
(for example, "[WebServer}DeployRoot"), the compiler cannot read the parameter and
deployment files are sent to the CitectSCADA project directory instead:
[User]\<Project Name>
The deployment is flagged as successful, but it cannot be located by the Web Server.
If you have deployed a project but it does not appear in the Web Server's list, check the
location above for a subfolder called "Web Deploy". If such a folder exists, correct the syn-
tax used in your Citect.ini file.
Q. I deleted a user from the list of users configured for access to the Web Server, but
they can still log in. How do I deny them access?
A. Sometimes a user can connect to the Web Server even after their user account has
been deleted. This can occur when the operating system does not immediately report the
user deletion to the web server. The period between the deletion of a user and the restric-
tion of access can be about a half an hour.
The solution is to deny access to the user before deleting them. That way, they cannot
gain access. See the topic "Deleting a user account" in the Web Client section of the Citect-
SCADA Installation and Configuration Guide.
Q. When I try to run the Web Client component for the first time, I get a "System Set-
tings Change" message instructing me to restart my computer. What do I do?
A. This message appears on computers that contain old versions of some system files
necessary by the Web Client Control. If these files are used by another application during
installation, this System Settings Change message appears. Click OK to restart your
machine to allow the newer versions of the necessary files to be installed during system
reboot. The alert message will not reoccur unless another application reloads the old
files.
Q. One of the ActiveX Object's included in my project cannot locate its associated data
source. Where is it?
1200
Chapter 41: The Web Client
A. If an ActiveX object has an associated data source, you need to verify the data source
can be located by the computer hosting the Web Client. See the topic Managing asso-
ciated data sources for details.
Q. Why does a pop-up saying "Client control (CitectSCADAWebClient_7_0_xxx.cab) is
not in the option list!" when I try to edit my deployment from the Web Client Deploy-
ment Configuration Page?
There are two possible reasons for this dialog:
1. You might have set the [Web Server] parameter WebClientControl incorrectly. The
Web page might not recognize the name or version of the .cab file. also check that
you've used a forward slash in front of the cab file name, as this is necessary for the
Web Server to locate the correct file.
2. A user might have deleted the necessary .cab file from C:Program Files\C-
itect\CitectSCADA 7.10\WebServer\client\700C:\Program Files\Schneider Elec-
tric\PowerSCADA Expert 7.30\WebServer\client\700(or the specified location). Therefore,
the Web page cannot find it.
Q. The Process Analyst interface normally displays in a foreign language as I trans-
lated the language resource DLL, but it displays in English on the Web Client plat-
form. How do I correct this?
A. A Process Analyst control running inside a CitectSCADA Web Client supports run-
time language switching, but you need to configure which languages the Web Client will
download to the client machine.
To configure the languages to download:
Note: The bin.zip file and its contents are not version-checked. This means you
need to manually remove the bin.zip from the Web Client machines if your server
contains a more recent bin.zip file. To do this:
1. Find the installation directory of the Analyst.dll file on your Web Client
machines and look for a file called bin.zip in this directory.
2. Delete this file.
3. Reconnect to the Web server to download the latest bin.zip file.
Q. I have keyboard shortcuts configured in my CitectSCADA project, but they do not
work properly when the project is deployed in the Web Client. What's wrong?
1201
Chapter 41: The Web Client
A. Keyboard shortcuts configured for Internet Explorer (IE) take precedence over key-
board shortcuts configured within your CitectSCADA projects. For example, the Example
project has F11 assigned to call up Help on a selected animation point on a graphics
page. If the project is run as a Web Client deployment, F11 will toggle the view to full
screen, as is the case normally with IE.
This is a limitation of using Internet Explorer to host CitectSCADA projects. The easiest
solution is to return to the CitectSCADA configuration environment and assign your
shortcuts so that no clashes occur. See the Internet Explorer Help for details of pre-
configured keyboard shortcuts.
Q. I can't print from the Web Client. Why not?
A. You can print from the Web Client, but not by using your browser's File | Print com-
mand. Instead, in your CitectSCADA project, create a Print control that uses the Cicode
WinPrint() function to print the page you want.
Q. The new page that I added to my CitectSCADA project does not appear in the Page
Select list or the default menu page in the Web Client. How can I correct this?
A: If the page you added to your CitectSCADA project does not appear in Web Client,
you can manually type in the page name in the Page Select list to view this new page. In
this version of the Web Client, the new page is not added to the default menu page.
Q. The Web Client Deployment Page displays incorrectly on Windows 2000 Advanced
Server. 'Show Server Details' is missing, and the icons for Start client, Delete Deploy-
ment and Edit Deployment are also missing. What is wrong?
A. This appears to be caused by Windows Automatic Update installing several com-
ponents at the same time after a fresh install of the operating system. Even though Inter-
net Explorer might have been upgraded to the latest version (for example, 6.0.2800.1106)
it might still behave as a version 5 browser; for example, it offers limited support for
"iframes". If you call up About Internet Explorer from the Help menu, and a Version 5-
style dialog appears with a version 6 release number, then your computer is affected in
this way.
A complete uninstall/reinstall of Internet Explorer will correct the problem.
Q. When I launch the web server, the login form prompts me for a user name and
password. When I enter the valid local administrator user name and password the
HTTP 500 Internal server error message pops up saying that the page cannot be dis-
played. What is wrong?
A. The problem is caused by the fact that the computer was in an invalid state in the
way that it lost its trust relationship with the domain controller. Removing the computer
and re-adding it to the domain will correct the problem. To do so perform the following
steps:
1202
Chapter 41: The Web Client
1203
Chapter 41: The Web Client
1204
Chapter 42: Windows Language Codes
af Afrikaans hu Hungarian
sq Albanian is Icelandic
1205
Chapter 42: Windows Language Codes
eu Basque rm Rhaeto-Romanic
bg Bulgarian ro Romanian
ca Catalan ru Russian
hr Croatian sl Slovenian
cs Czech sb Sorbian
1206
Chapter 42: Windows Language Codes
fi Finnish sx Sutu
1207
Chapter 42: Windows Language Codes
el Greek ji Yiddish
he Hebrew zu Zulu
hi Hindi
1208
Chapter 43: Introducing StruxureWare Templates
The StruxureWare Template Project is a preconfigured project that includes a set of tem-
plates intended for use in StruxureWare designed systems.
Note: These templates are not designed for direct upgrade from existing tab style tem-
plates. If you want to use these templates you will need to manipulate the page
objects so that the objects are rendered correctly on screen.
When a new CitectSCADA project is created to use SxW_Style_1 as the default template
style, the StruxureWare Template (SxW_Style_Include) project is automatically incor-
porated as an included project. This means the project's templates are available for
implementation when creating your graphics pages in Graphics Builder.
As well as including a standard graphics page template for creating plant mimics, the
project also includes predefined alarm templates, a set of file templates for displaying
text, Rich Text Format and HTML files. They have identical page navigation, alarm
banners and menus for consistent "look and feel", and usability across an entire project.
Note: Do not modify the StruxureWare Template project for use as a runtime project.
It will not compile successfully, and be set aside for use as a template for new
projects. CitectSCADA upgrades install a new version of the StruxureWare Template
project, which will overwrite changes you make to the project when this happens.
See Also
The StruxureWare Interface
1209
Chapter 43: Introducing StruxureWare Templates
Note: The Alarm templates include a left-hand panel that enables users to filter
using the Equipment hierarchy.
See Also
The Header
The Header
1 The icon and name of the product. They are always visible, and cannot
be resized.
2 The Alarm panel. It displays status (and counts) for various types of
alarms, including active, unacknowledged, disabled and hardware
alarms, shortcuts to relevant alarm and events page, and controls to
silence alarm (sound).
1210
Chapter 43: Introducing StruxureWare Templates
3 The Alarm banner. It lists recent alarms. Click on the white arrow in the
side tab to expand/reduce the alarm banner.
4 Currently login user name, click on the drop-down arrow for more login
related options, and print commands. The options for the login drop-
down menu are user configurable via the Menu Configuration form.
The items for this menu should be assigned with page name of “Tem-
plate” and Level 1 name of “Login”. When the alarm banner is
expanded, this section will collapse to a single drop-down arrow. The
information shown here will be automatically incorporated to the drop-
down menu.
See Also
The Right-Panel
The Main Window
1211
Chapter 43: Introducing StruxureWare Templates
The Right-Panel
2 Click on the plus and minus signs next to the nodes to expand and collapse items.
1212
Chapter 43: Introducing StruxureWare Templates
User configurable logo. To display your logo in the allocated space, define your
logo as bitmap symbol in your project. The dimension of the bitmap should be
3
230 x 50. Assign the name of your symbol (in format of library.symbol) to project
/ INI parameter [Page]Logo.
See Also
The Header
The Main Window
1 History button. Move back through the tabs that have been opened.
3 Forward and back navigation command buttons and the Display list button. Use
to scroll and display the list of opened pages.
4 Tabs of opened pages. Allows you to access and navigate between pages that
have been selected from the right-panel or launched from other pages.
1213
Chapter 43: Introducing StruxureWare Templates
Page specific menu commands. Menu configuration defined specified for this
5 page appears here. (Menu configuration that is common to all pages appears on
the navigation tree on the right panel).
See Also
Using Pages and Templates
1214
Chapter 44: Using StruxureWare Pages and Tem-
plates
When you create a new project based on the StruxureWare templates starter project, the
following templates are available for you to use as you create your graphics pages. The
templates are divided into three parts with each part sharing common functionality,
including page navigation , menus and tools. Options available may vary according to
the type of page.
The StruxureWare template starter project has the following templates:
Tem- Description
plate
Type
Blank For users who want to create their pages from scratch. See Blank Page Tem-
plate.
Data For users who want to display a table of data retrieved from built-in data browse
Browse functions on a page. See Data Browse Page Template.
Alarm Includes Alarm, Disabled, Hardware, Sequence of events and Summary for
displaying different types of alarm list. See Alarm Page Templates.
Proc- Includes SinglePA, DoublePA, PopPA. See Process Analyst Page Templates.
ess
Analyst
File Includes File, File_RTF and File_HTML for displaying a plain text file, rich text
format file and HTML file / URL respectively. See File Page Templates.
See Also
Creating a New Project
Creating Pages
1215
Chapter 44: Using StruxureWare Pages and Templates
Field Description
Equipment The symbol library for displaying equipment symbol for each item in the equip-
Symbol ment tree. The symbol is displayed based on the type of the equipment. It
Library should have the same name as the equipment type assigned to an equipment
(Optional) record. If not specified, it defaults to a symbol library named “Equipment”.
Equipment The default symbol to be displayed next to the item in the equipment tree if sym-
Default bol corresponding to the equipment type of the item cannot be found from the
Symbol supplied Equipment Symbol Library. The symbol should be specified in format
1216
Chapter 44: Using StruxureWare Pages and Templates
Clusters A comma delimited string specifying only items from a subset of clusters to be
(Optional) included in the display. If not specified, items from all clusters will be included.
Filter A filter expression specifying the records to return during the browse If not
(Optional) specified, all records will be returned. Please see the browse open Cicode func-
tion of the selected browse type for the details of filter expression supported.
Fields A comma delimited string specifying the fields (columns) to be returned during
(Optional) the browse. If it is not specified, all fields of the selected browse type will be dis-
played: Tag, Tag Item, Value, Comment, Cluster, Equipment, Item, Type, IODev,
Addr, Arr_Size, Eng_Zero,Eng_Full, Eng_Units,Format, Deadband, Raw_Zero,
Raw_Full, Scaled_Type, Ovr_Mode, Ctrl_Mode, Override, Valid, Status, Field,
Num_Subs.
Sort By A comma delimited string specifying the order of sorting preferences. This is
(Optional) only applicable to TagBrowse. Please see the Sort parameter of the built-in
Cicode function TagBrowseOpen for details.
View Name A name to represent a view setting about the placement and width of the col-
(Optional) umns displayed on the browse table. The view name works with the Save view
and Restored saved view options at runtime. You can assign a unique view on
different data browse pages or share the same view among multiple pages.
When user selects the Save view command from the Action tab, the current col-
umn settings will be saved under the view name. Once a view is saved, when
user re-enters the page, previous saved view settings will be retrieved auto-
matically. The saved view can also be restored on demand by selecting the
Restored saved view from the Action tab. User can reset (forget) the view to the
default as how it was pre-configured by selecting the Restore view to default
command under the Action tab.
For system engineers, the information associated with a view name is saved
under INI parameters:
[BrowseTableView] <BrowseType>.<ViewName>.Fields
<BrowseType>.<ViewName>.ColWidths
in comma delimited format. You can pre-configure these parameters in your
project as the defaults.
Privilege Only applicable to Browse Type of "TagBrowse", this specifies the privilege
(Optional) required by the logged on user to change the values / operating mode of var-
iable tags displayed on the table. If no privilege is defined, no modification will
be allowed.
Use the equipment tree to filter the data browse table at runtime. Items belonging to
selected parent and child branches will be displayed with the exception of 'Server-
Browse' which is not associated with equipment.
Refer to Interactive Data Browse List for list display options available at runtime.
1217
Chapter 44: Using StruxureWare Pages and Templates
See Also
Creating Pages`
1218
Chapter 44: Using StruxureWare Pages and Templates
Note: To disable the Set Value command leave the privilege field empty. See Data
Browse Template topic for more information.
1219
Chapter 44: Using StruxureWare Pages and Templates
therefore is not updated automatically. To retrieve the latest events you can manually
refresh the page.
l Alarm Summary Page : Used to create a page displaying a historical log of alarms
that have occurred. This page can be used for troubleshooting purposes.The template
has the equipment tree-view panel displayed on the left hand side of the page for fil-
tering of the display list. When configured the tree-view will display a hierarchy of
equipment available to the currently logged on user. To create a default summary
alarm page for your project, create a new page based on the summary template. By
default, the name of the page is expected to be "Summary". However, you can change
the name of the page by adjusting the setting for the INI parameter [Page]Sum-
maryPage.
Summary data is not automatically refreshed at runtime. Manually refresh the Summary
and SOE page before using its data for analysis of plant state.
The alarm templates display alarm lists using a "no draw" mode. The display of alarm
fields is handled by a new set of template specific Cicode functions and genies to control
each of the alarm fields' position and size. The alarm list is installed with a callback
event function to redraw the alarm list upon data change. The "no draw" mode and data
change callback event are supported by a modified form of the existing Cicode function
AlarmDsp().
Name Description
Acknowledge Acknowledge all alarms on the current page. Available on Active Alarm page.
Page
Disable Page Disable all alarms on the current page. Available on Active Alarm page.
Enable Page Enables all alarms on Page. Available on Disabled Alarm Page.
Filter... Opens the alarm filter form. Filter form varies according to alarm page open.
1220
Chapter 44: Using StruxureWare Pages and Templates
Name Description
Reset Filter Clears the effect of the filter criteria specified through the filter form.
Auto size col- Auto size column widths in the alarm display list.
umns
Save View Save the column settings of the alarm display.The same settings will then be
used for this alarm page.
Restore Restore the column settings according to the alarm format set in parameter
Saved View [Format]<FormatName>.
Reset view to Reset the column settings of alarm display to default. Define your own default
default by setting parameters[Format]<FormatName> as project parameters.
1221
Chapter 44: Using StruxureWare Pages and Templates
The user can select single or multiple alarms on the alarm list so that the same oper-
ation can be applied to multiple selected alarms in one go. If some of the selected alarms
are off-screen, before the required operation is completed, a message dialog will popup,
reminding the user that some of the selected records are not viewable. On clicking Con-
tinue or the Enter key the selected records on and off the screen will be acted on. On click-
ing Cancel or the ESC key the command is canceled. If the selected records are viewable
on-screen the message dialog will not open.
Alarm selection works as follows:
l To select a single alarm: Left-click an alarm that is not already selected to select it.
l To select a continuous range of alarms: Select a single alarm to mark the start of the
selection. Then hold the SHIFT key and left-click another alarm to extend the selec-
tion. Alternatively, you can select rows by dragging the mouse cursor from the start-
ing to the ending row. Once rows are selected, you can extend the range of the
selection by SHIFT left-clicking another row of alarm.
l To select disjointed rows, hold the CTRL key while selecting a row.
l To deselect alarm(s): Left-click any alarm within a selection range to deselect the
whole range. Only the row that you have clicked will remain selected. Click the
selected row again to deselect it.
Sorting the Alarm List
Users can sort the alarm list display using most fields except for 'State' and 'Type'. To
sort click on the header of the relevant column.
The default order of alarms is dependent on the [Alarm]SummarySortMode parameter
and the type of alarm page.
Refer to the topic Default Sort Order for more information.
Context Menu
Right-click on any alarm row to bring up the context menu for alarm operations.Options
available in the context menu will vary depending on whether single or multiple items
are selected. If you right-click on an alarm that is not already selected, this will select it.
Subsequent commands (selected from the context menu) will then only operate on this
single alarm. On the other hand, if you right-click on any alarm within a selection range,
this will not change the selection. Subsequent commands selected will operate on each
alarm within the selection range. Several operation options are available in the context
menu:
l Acknowledge: acknowledges selected alarms. This option is restricted by the privilege
set by the parameter [Privilege]AckAlarms. This is not available on the Alarm Sum-
mary page.
l Disable: disables selected alarms. This option is restricted by the privilege set by the
parameter [Privilege]DisableAlarms. It is not available on the Disabled Alarms page.
1222
Chapter 44: Using StruxureWare Pages and Templates
l Enable: enables selected alarms. This option is restricted by the privilege set by the
parameter [Privilege]DisableAlarms. It is not available on the Active Alarms page.
l Comment: Add a comment to an event. This option is only available when a single
row is selected. This option is restricted by the privilege set by the parameter [Priv-
ilege]AckAlarms. This option is available to Alarm Summary and SOE pages only.
l Information: displays the detailed information of a single alarm.
l Help: displays the Help page (which is set in the Help field of the alarm record in
Project Editor) of a single alarm.
Note: The Hardware Alarms template only allows a single alarm to be selected. Its
context menu has only the Acknowledge option which is also restricted by the priv-
ilege set by parameter [Privilege]AckAlarms.
Note: If the parent equipment branch is checked, child equipment cannot be dese-
lected.
If the parent is not selected you can change the checked states of the child equipment.
Next to each item in the tree, an alarm count is displayed. The count includes the total
number of alarms belonging to the equipment and its child hierarchy. The type of
alarms that are counted vary according to the type of alarms that are displayed on the
list. For example, on the active alarms page, the count represents the active alarms asso-
ciated to that equipment, while on the disabled alarms page, the count represents the dis-
abled alarms associated to that equipment. Other points to consider with the equipment
count include:
1. The count on the tree node represents the total number of alarms that are associated
with that equipment hierarchy branch.
2. For alarms that are not associated to equipment, the count is not available due to the
nature of the equipment tree view.
3. The counts are not affected by the filter applied to the alarm list.
1223
Chapter 44: Using StruxureWare Pages and Templates
4. Due to point 2 and 3, the total sum of the counts from the equipment tree does not
equal to the alarm count on the alarm banner, and they never mean to be com-
parable. The alarm count on the banner represents the total number of (unfiltered)
unacknowledged alarms in the system (subjected to the viewable areas of the cur-
rently logged on user).
1224
Chapter 44: Using StruxureWare Pages and Templates
1225
Chapter 44: Using StruxureWare Pages and Templates
l When you create a page based on any of these templates in Graphics Builder, you
can predefine the file for display at runtime. Clicking anywhere on the page will
show a genie style dialog to allow you to enter a file path to assign a file to the page.
A Citect path substitution string can be used in the file path. When the page is
recalled at runtime, for example via PageDisplay(), the specified file will be auto-
matically displayed.
l The "Open File" button displays an Open File dialog to select a different file to dis-
play.
l The "Refresh" button reopens the already opened file to get the latest contents.
l The full path name of the currently opened file is displayed.
1226
Chapter 45: Creating a New Project
Creating a project based on the StruxureWare templates project is simple; by default, it is
incorporated as an included project in new projects. This means whenever you start a
new project, the StruxureWare templates are ready to use as necessary.
There are two ways to create a project based on the StruxureWare templates:
l Use the pre-defined starter project
l Create a project from scratch
Note: It is recommended when creating a project, you base it on one of the starter
projects. Offering a basic level of functionality, the project can be modified and
extended to suit your needs.
1. Choose New Project from the File menu, or click the New Project button.
2. Type a name for your project and choose a location for the files. When naming your
project do not use spaces in the project name. Although CitectSCADA does not pre-
vent you from using spaces in a project name, using spaces can cause unpredictable
results.
3. Click the Create project based on starter project checkbox.
4. Choose the project on which you want to base your new project.
5. Click OK.
Two pre-defined starter projects with page resolutions HD1080 and HD768 for wide
screens only are provided as part of the product installation. Each of the starter projects
will be based on project "SxW_Style_1" and contain:
l A cluster named "Cluster1".
l A server of each server types: “IOServer1”, “AlarmServer1”, “ReportServer1” and“-
TrendServer1”.
l A memory I/O devices named “Internal”.
l Equipment type “Motor” and its associated template file, graphical genie and super-
genie pop-up pages.
l A role named "Administrators" which is linked to the "BUILTIN\Administrators"
Windows group and have global privilege of 1 to 8. This allows a user to log in
1227
Chapter 45: Creating a New Project
CitectSCADA at runtime using a Windows user account who belongs to the Admin-
istrators group of the local machine.
l Pages of Alarm, Summary, Disabled, Hardware, ProcessAnalyst and !Pr-
ocessAnalystPopup, Data Browse -Control Inhibit, and Manual Override, based on
the relevant templates found in the SxW_Style_Include project.
l Page specific menu items. For example, the active alarm page will have page specific
menu items such as Simulate, History, Acknowledge and Disable, and Filter options.
The newly created project will be immediately compilable, and will contain a basic level
of built-in functions such as viewing alarms and trends, and a menu displayed in the
right-panel to easily access and navigate the included pages.
Create a project from scratch
To configure a project based on the StruxureWare templates from scratch, follow these
steps:
1. Create a privileged user; see Creating a Privileged User.
2. Run the Computer Setup Wizard; see Running the Computer Setup Wizard.
3. Set up instant trending; see Using Instant Trending.
4. Set up multiple monitor display; see Displaying a Project on Multiple Monitors.
5. Implement audible alarms; see Implementing Audible Alarms.
6. Add Pages; see Creating New Pages
7. Create/define custom menu; see Creating Custom
Don't modify the StuxureWare template project for use as a runtime project; set it aside
for use as a template for new projects.
If creating a project based on the StuxureWare templates, it is not recommended to
include pages based on templates that use a different style, including the earlier Include
project. Doing so might affect functionality.
See Also
Creating Pages
1228
Chapter 45: Creating a New Project
When configuring a StruxureWare template project,check that your users have appro-
priate access to the available functionality. Verify that your users can acknowledge
alarms if necessary.
To adjust the global privileges for the elements previously listed for a more complex
security architecture, adjust the [Privilege] parameters in the Citect.ini file. Click the rel-
evant link in the previous table above for details.
See Also
Running the Computer Setup Wizard
Privilege Parameters in the Parameters online help
1229
Chapter 45: Creating a New Project
3. Call the Process Analyst Display. At runtime, call your process analyst page either
as a fullscreen page or pop-up page using the Cicode function PageDisplay(page-
name) or PagePopup(pagename) respectively.
4. Add Variable Tags / Local Variables for Trending. Use the Add Pens dialog pro-
vided with the Process Analyst to add pens to the process analyst chart as normal. In
the dialog, you can now select any variable tags or local variables for trending.
See Also
Process Analyst Page Templates
1. Verify that the alarms you want to trigger an audible alert are assigned to a category
and given a particular priority.
2. Adjust the parameter [Alarm]Soundn. This parameter determines the wav file used
when an alarm sounds, based on the priority of the alarm (n). For example, [Alarm]
1230
Chapter 45: Creating a New Project
Sound1 identifies the .wav file that will be sounded whenever a priority 1 alarm is trig-
gered.
Creating Pages
If you created your project by selecting the Create project based on starter project check-
box in the New Project dialog, pages of Alarm, Summary, SOE, Disabled, Hardware, Pro-
cessAnalyst and !ProcessAnalystPopup will already be created in your new project. You
can accept those pages or modify them as you develop your project. See Creating a new
project.
If you created your project from scratch, there are no predefined pages in your project.
The navigation controls at runtime on the StruxureWare template expect several default
pages to exist in your project for basic functionality such as alarm and trend displays.
You are recommended to add the following pages to your project based on the provided
templates of your chosen size:
Template Description
Summary Alarms Summary page, called from the Alarms toolbar using the His-
1231
Chapter 45: Creating a New Project
Template Description
SOE (Sequence of Sequence of events page, called from the Alarms toolbar using the His-
Events) torical events icon.
The links between the pages listed and the controls that call them are defined by the
[Page] parameter settings within the Citect.ini file. The relevant parameters are [Page]Pro-
cessAnalystPage, [Page]ProcessAnalystPopupPage, [Page]AlarmPage and [Page]Hard-
warePage, etc. If you want a button to call a page with a different name, adjust these
parameter settings. For details see Page Parameters.
Note: If you try to launch a StruxureWare template from within Citect Explorer, you
need to drill down to [Project Name]/Graphics/Templates/sxw_style_1/[Resolution] to
locate it. Two different wide screen resolutions are provided HD768 and HD1080.
Example 1: In the basic example outlined below the following pages MyFirstPage,
MySecondPage, MyThirdPage, MyActiveAlarmPage, MyDisabledPage, and MySOEPage
will be added to the menu so they will be listed in the right-hand panel.
1232
Chapter 45: Creating a New Project
To configure:
1. From the Citect Project Editor -> select System -> Menu Configuration
2. In the Menu Configuration dialog complete the following fields:
Field Value
Level 1 MyPage
Level 2 MyFirstPage
3. Click Add
4. Repeat steps 1 to 4 for the remaining pages MySecondPage, and MyThirdPage.
5. When finished compile and run your project. The right-panel should look like the one
below:
Example 2: To separate the alarm pages from the other graphic pages will create a new
node MyAlarm Pages , and add MyActiveAlarmPage, MyDisabledPage, and MySOE-
Page .
To configure:
1. From the Citect Project Editor -> select System -> Menu Configuration
2. In the Menu Configuration dialog complete the following fields:
Field Value
3. Click Add
4. Repeat steps 1 to 4 for the remaining pages MyDisabledPage, and MySOEPage.
5. When finished compile and run your project. The right-panel should look like the one
below:
1233
Chapter 45: Creating a New Project
Example 3:In the next example an icon will be added to appear next to the Active Alarm
Page. The icon used is a standard symbol in the Include project.
To configure:
1. From the Citect Project Editor -> select System -> Menu Configuration
2. In the Menu Configuration dialog complete the following fields:
Field Value
Symbol icons_16x16.alam_act
3. Click Replace
4. When finished compile and run your project. The right-panel should look like the one
below:
1234
Chapter 45: Creating a New Project
Note: The above examples are for basic illustration only. It is recommended you refer
to the example project and the menu configuration settings to further your under-
standing.
See Also
Note: For pages created based on the Process Analyst templates, you can print the
screen using the standard Print button, or print the chart using the Print button on
the toolbar of the Process Analyst object. Give the user both alternatives as they both
serve different purposes.
1235
Chapter 45: Creating a New Project
1236
Using the Tab Style Page Templates
1237
1238
Chapter 46: Introducing Tab Style Page Templates
The Tab Style Template Project is a preconfigured project that includes a set of templates
styled for the Windows 7 environment. It will help you reduce the time necessary to con-
figure a new project.
When a new CitectSCADA project is created, the Tab Style Template (Tab_Style_Include)
project is automatically incorporated as an included project. This means the project's tem-
plates are available for implementation when creating your graphics pages in Graphics
Builder.
As well as including a standard graphics page template for creating plant mimics, the
project also includes predefined process analyst and alarm templates (with or without
the equipment tree-view panel), a set of file templates for displaying text, Rich Text For-
mat and HTML files. They have identical tab style navigation and alarm menus for con-
sistent "look and feel" across an entire project. The project also supports multimonitor
displays, allowing you to simultaneously display several graphics pages across several
computer screens.
Note: Do not modify the Tab Style Template project for use as a runtime project. It
will not compile successfully, and be set aside for use as a template for new projects.
CitectSCADA upgrades install a new version of the Tab Style Template project,
which will overwrite changes you make to the project when this happens.
1239
Chapter 46: Introducing Tab Style Page Templates
1240
Chapter 47: Using Pages and Templates
When you create a new project based on the Tab Style templates, the following templates
are available for you to use as you create your graphics pages. These templates share
Common Navigation Functionality, such as a customizable tabbed menu, a navigation
toolbar and an alarm toolbar. This section describes the templates and their buttons,
menus and tools.
The Tab Style template project has the following templates:
Tem- Description
plate
Type
Blank For users who want to create their pages from scratch. See Blank Page Tem-
plate.
Data For users who want to display a table of data retrieved from built-in data browse
Browse functions on a page. See Data Browse Page Template.
Alarm Includes Alarm, Disabled, Hardware, Summary and Sequence of events for
displaying different types of alarm list. See Alarm Page Templates.
Proc- Includes SinglePA, DoublePA, PopPA. See Process Analyst Page Templates.
ess
Analyst
File Includes File, File_RTF and File_HTML for displaying a plain text file, rich text
format file and HTML file / URL respectively. See File Page Templates.
See Also
Creating a New Project
Creating Pages
1241
Chapter 47: Using Pages and Templates
1242
Chapter 47: Using Pages and Templates
Where there are too many menu items to fit comfortably within the menu bar (either for
the tabs or the menu icons), a pair of drop-down list buttons are supplied at either end
of the menu bar which provide access to the menu items. The horizontal arrow buttons
on the menu bar displays only those items not visible on either side of the screen. The
vertical arrow button on the left side of the menu bar displays menu items (either tabs or
the menu icons for the currently selected tab)
See Also
Creating Custom Menus
Navigation Toolbar
The Navigation toolbar includes clickable text and icons to quickly access the common
pages and functions from every page in the project.
The following items are available from the toolbar:
Ico- Nam-
Description
n e
Goes Goes back to the page displayed before the current page.
back
one
page
in the
page
his-
tory
Goes Goes forward to the page that was displayed prior to the back button
for- being pressed. The arrow to the right of the button allows you to
ward select from menu of recently visited pages.
one
page
in the
page
his-
tory
Dis- Changes the display to the "parent page" of the current page. You
plays can assign a parent page to a graphics page by setting an envi-
the ronment variable in Graphics Builder. To do this, open the page you
par- want to assign a parent to. Go to the properties dialog for the page
ent (File | Properties), and click the Environment tab. Add a new var-
page iable called "ParentPage" with a value of the page name of the parent
page.
1243
Chapter 47: Using Pages and Templates
Ico- Nam-
Description
n e
the erties dialog (File | Properties) for each page in the sequence and
pre- set the Previous field on the General tab accordingly.
vious
page
Dis- Displays the "home" page. A home page act as a default page for the
plays project. To set a home page, use the [Page]HomePage parameter.
the
home
page
Dis- Displays a dialog box with a list of graphics pages defined in the
plays project. The user can select a page name for display.
the
Page
Selec-
t
dialo-
g
Prints Prints the current graphic page to the selected printer using the
the built-in WinPrint() Cicode function. You can specify your own print-
cur- ing function for the page by setting an environment variable in Graph-
rent ics Builder. To do this, open the page you want to assign a printer
page function to. Go to the properties dialog for the page (File | Prop-
erties), and click the Environment tab. Add a new variable called
"PrintPage" with a value of Cicode command in the syntax of "?" fol-
lowed by a valid Cicode function name and comma separated argu-
ments, for example, ?MyPrintFunction "arg1","arg2".
Login Displays the standard CitectSCADA login prompt. The menu to the
/ Log- right offers extra options. The default options are Login, Logout,
out Change Password, Edit User (restricted by login) and Create User
(restricted by login). Logged in user is indicated to the right of the
button. You can override the default options by defining your own
login menu in the menu configuration database via Project Editor. The
Page field and Level 1 field of these menu items needs to be set to
"Template" and "Login" respectively.
1244
Chapter 47: Using Pages and Templates
Alarm Toolbar
The alarms toolbar provides access to current alarm information and navigation buttons
for single-click access to alarm pages. It also includes standard CitectSCADA prompt
and current date and time.
The alarms toolbar contains the following features:
n/a Last The center panel of the toolbar displays the last alarms triggered
Alarms within the system, providing the operator with an immediate visual
cue to alarm occurrences.
You can modify the format of this list and control which alarms
appear. For example, you can set the list to only display alarms of a
particular type, category or priority.
Active Changes the display to the active alarms page. This button is
Alarms animated and shows the count of unacknowledged alarms in the
system. The page displayed by this button is determined by the
parameter [Page]AlarmPage.
His- The arrow to the right allows you to change the display to the
torical sequence of events or alarm summary page. When clicking on the
Events historical events button again the sequence of events page will dis-
play by default.However, if there is no SOE page configured in the
project, the alarm summary page will be displayed.
Dis- Changes the display to the disabled alarms page. This button
1245
Chapter 47: Using Pages and Templates
abled shows the count of disabled alarms in the system. The page dis-
Alarms played by this button is determined by the parameter [Page]Dis-
abledPage.
Alarm Silences the audible alarm buzzer that sounds when there are
Silenc- pending unacknowledged alarms. See Implementing Audible
e Alarms.
Note: Starting in version 7.20, you can customize the behavior of the standard win-
dow titlebar to lock down its functions to achieve the same result that used to be
only possible by hiding it in the previous versions. This is achieved by overriding
the titlebar events or setting the startup mode of the window.
See Also
Creating Tab Style Pages
Securing the Window Titlebar
1246
Chapter 47: Using Pages and Templates
Field Description
Equipment The symbol library for displaying equipment symbol for each item in the equip-
Symbol ment tree. The symbol is displayed based on the type of the equipment. It
Library should have the same name as the equipment type assigned to an equipment
(Optional) record. If not specified, it defaults to a symbol library named “Equipment”.
Equipment The default symbol to be displayed next to the item in the equipment tree if sym-
Default bol corresponding to the equipment type of the item cannot be found from the
Symbol supplied Equipment Symbol Library. The symbol should be specified in format
(Optional) of <library name>.<symbol name>
Clusters A comma delimited string specifying only items from a subset of clusters to be
(Optional) included in the display. If not specified, items from all clusters will be included.
Filter A filter expression specifying the records to return during the browse If not
(Optional) specified, all records will be returned. Please see the browse open Cicode func-
tion of the selected browse type for the details of filter expression supported.
Fields A comma delimited string specifying the fields (columns) to be returned during
(Optional) the browse. If it is not specified, all fields of the selected browse type will be dis-
played: Tag, Tag Item, Value, Comment, Cluster, Equipment, Item, Type, IODev,
Addr, Arr_Size, Eng_Zero,Eng_Full, Eng_Units,Format, Deadband, Raw_Zero,
Raw_Full, Scaled_Type, Ovr_Mode, Ctrl_Mode, Override, Valid, Status, Field,
Num_Subs.
Sort By A comma delimited string specifying the order of sorting preferences. This is
(Optional) only applicable to TagBrowse. Please see the Sort parameter of the built-in
Cicode function TagBrowseOpen for details.
View Name A name to represent a view setting about the placement and width of the col-
(Optional) umns displayed on the browse table. The view name works with the Save view
and Restored saved view options at runtime. You can assign a unique view on
1247
Chapter 47: Using Pages and Templates
different data browse pages or share the same view among multiple pages.
When user selects the Save view command from the Action tab, the current col-
umn settings will be saved under the view name. Once a view is saved, when
user re-enters the page, previous saved view settings will be retrieved auto-
matically. The saved view can also be restored on demand by selecting the
Restored saved view from the Action tab. User can reset (forget) the view to the
default as how it was pre-configured by selecting the Restore view to default
command under the Action tab.
For system engineers, the information associated with a view name is saved
under INI parameters:
[BrowseTableView] <BrowseType>.<ViewName>.Fields
<BrowseType>.<ViewName>.ColWidths
in comma delimited format. You can pre-configure these parameters in your
project as the defaults.
Privilege Only applicable to Browse Type of "TagBrowse", this specifies the privilege
(Optional) required by the logged on user to change the values / operating mode of var-
iable tags displayed on the table. If no privilege is defined, no modification will
be allowed.
Use the equipment tree to filter the data browse table at runtime. Items belonging to
selected parent and child branches will be displayed with the exception of 'Server-
Browse' which is not associated with equipment.
Refer to Interactive Data Browse List for list display options available at runtime.
See Also
Creating Pages`
1248
Chapter 47: Using Pages and Templates
starting to the ending row. Once rows are selected, you can extend its range by SHIFT
left-clicking another row of alarm.
l To select disjointed rows, hold the CTRL key while selecting a row.
l To deselect alarm(s): Left-click any alarm within a selection range to deselect the
whole range. Only the row that you have clicked will remain selected. Click the
selected row again to deselect it.
Context Menu
If the page is set to display tag browse data, right-click on any row will bring up the con-
text menu for operations. Options available in the context menu will vary depending on
whether single or multiple items are selected:
The commands will only work if:
l Tag field is included in the table display
l For system with multiple clusters, the cluster field will also need to be included
The items available on the menu are selection sensitive depending on whether single or
multiple items are selected at the time. The following options are available only when
single row is selected:
l Set Value
The following options are available:
l Set Override Mode
l Set Control Mode
Action Tab
When the user displays a Data Browse page based on the Data Browse template, an
Action tab will be automatically added to the menu bar.The following options are avail-
able on the Action tab:
1249
Chapter 47: Using Pages and Templates
1250
Chapter 47: Using Pages and Templates
is not updated automatically. To retrieve the latest events you can manually refresh
the page.
l Alarm Summary Page (summary_equip): Used to create a page displaying a his-
torical log of alarms that have occurred. This page can be used for troubleshooting
purposes.The template has the equipment tree-view panel displayed on the left hand
side of the page. When configured the tree-view will display a hierarchy of equip-
ment available to the currently logged on user. To create a default summary alarm
page for your project, create a new page based on the summary_equip template. By
default, the name of the page is expected to be "Summary". However, you can change
the name of the page by adjusting the setting for the INI parameter [Page]Sum-
maryPage.
Summary data is not automatically refreshed at runtime. Manually refresh the Summary
page before using its data for analysis of plant state.
The alarm equipment tree-view templates display alarm lists using a "no draw" mode.
The display of alarm fields is handled by a new set of template specific Cicode functions
and genies to control each of the alarm fields' position and size. The alarm list is
installed with a callback event function to redraw the alarm list upon data change. The
"no draw" mode and data change callback event are supported by a modified form of
the existing Cicode function AlarmDsp().
Common Functionality
The alarm equipment tree-view page templates offered as part of the tab style page tem-
plates include common graphical user interface (GUI) features for easy operation and
consistent appearance.
These include:
l Action Tab - Provides controls to carry out common tasks that apply to the whole of
the alarm list.
l Interactive Alarm List - Provides controls to manipulate the columns displayed on
the alarm list and select alarms.
l Equipment Tree-view filter - The tree-view can be used to filter the results of the list
of alarms displayed.
l Column Sorting and Filtering Status Indicator - Sorting and filtering status indicator
shown in header of column.
1251
Chapter 47: Using Pages and Templates
See Also
Action tab
Interactive Alarm List
Filtering Alarms using the Equipment tree-view
Column Sorting and Filtering Status Indicator
Action Tab
When the user displays an alarm page based on the alarm equipment tree-view tem-
plates, an Action tab will be automatically added to the menu bar. Options available on
the Action tab vary according to the type of Alarm page.
Set Filter Opens the alarm filter form. Filter form varies according
to alarm page open.
Reset filter Clears the effect of the filter criteria specified through
the filter form.
Reload View Reload the column settings according to the alarm format
set in parameter [Format]<FormatName>.
1252
Chapter 47: Using Pages and Templates
Auto size col- Auto size column widths in the alarm display list.
umns
1253
Chapter 47: Using Pages and Templates
ing Cancel or the ESC key the command is canceled. If the selected records are viewable
on-screen the message dialog will not open.
Alarm selection works as follows:
l To select a single alarm: Left-click an alarm that is not already selected to select it.
l To select a continuous range of alarms: Select a single alarm to mark the start of the
selection. Then hold the SHIFT key and left-click another alarm to extend the selec-
tion. Alternatively, you can select rows by dragging the mouse cursor from the start-
ing to the ending row. Once rows are selected, you can extend the range of the
selection by SHIFT left-clicking another row of alarm.
l To select disjointed rows, hold the CTRL key while selecting a row.
l To deselect alarm(s): Left-click any alarm within a selection range to deselect the
whole range. Only the row that you have clicked will remain selected. Click the
selected row again to deselect it.
Sorting the Alarm List
Users can sort the alarm list display using most fields except for 'State' and 'Type'. To
sort click on the header of the relevant column.
The default order of alarms is dependent on the [Alarm]SummarySortMode parameter
and the type of alarm page.
Refer to the topic Default Sort Order for more information.
Context Menu
Right-click on any alarm row to bring up the context menu for alarm operations.Options
available in the context menu will vary depending on whether single or multiple items
are selected. If you right-click on an alarm that is not already selected, this will select it.
Subsequent commands (selected from the context menu) will then only operate on this
single alarm. On the other hand, if you right-click on any alarm within a selection range,
this will not change the selection. Subsequent commands selected will operate on each
alarm within the selection range. Several operation options are available in the context
menu:
l Information: displays the detailed information of a single alarm that has the cursor
focus (indicated by surrounded by a white box).
l Help: displays the Help page (which is set in the Help field of the alarm record in
Project Editor) of a single alarm that has the cursor focus.
l Acknowledge: acknowledges selected alarms. This option is restricted by the privilege
set by the parameter [Privilege]AckAlarms . This is not available on the Alarm Sum-
mary page.
l Disable: disables selected alarms. This option is restricted by the privilege set by the
parameter [Privilege]DisableAlarms . It is not available on the Disabled Alarms page.
1254
Chapter 47: Using Pages and Templates
l Enable: enables selected alarms. This option is restricted by the privilege set by the
parameter [Privilege]DisableAlarms . It is not available on the Active Alarms page.
l Comment: Add a comment to an event. This option is only available when a single
row is selected. This option is restricted by the privilege set by the parameter [Priv-
ilege]AckAlarms . This option is available to Alarm Summary and SOE pages only.
Note: The Hardware Alarms template only allows a single alarm to be selected. Its
context menu has only the Acknowledge option which is also restricted by the priv-
ilege set by parameter [Privilege]AckAlarms.
Symbol Description
If an equivalent field to the column is being filtered the appropriate filter symbol will
appear in the heading of the column. For example, date and time should be filtered
together, thus when the date field is specified in the alarm filter form, the filter symbol
will appear in the time column.
1255
Chapter 47: Using Pages and Templates
To select equipment, check the box to the left of the relevant branches. If you select equip-
ment with child branches, then the child equipment will be selected and grayed out.
Note: If the parent equipment branch is checked, child equipment cannot be dese-
lected.
If the parent is not selected you can change the checked states of the child equipment.
Next to each item in the tree, an alarm count is displayed. The count includes the total
number of alarms belonging to the equipment and its child hierarchy. The type of
alarms that are counted vary according to the type of alarms that are displayed on the
list. For example, on the active alarms page, the count represents the active alarms asso-
ciated to that equipment, while on the disabled alarms page, the count represents the dis-
abled alarms associated to that equipment. Other points to consider with the equipment
count include:
1. The count on the tree node represents the total number of alarms that are associated
with that equipment.
2. For alarms that are not associated to equipment, the count is not available due to the
nature of the equipment tree view.
3. The counts are not affected by the filter applied to the alarm list.
4. Due to point 2 and 3, the total sum of the counts from the equipment tree does not
equal to the alarm count on the alarm banner, and they never mean to be com-
parable. The alarm count on the banner represents the total number of (unfiltered)
unacknowledged alarms in the system (subjected to the viewable areas of the cur-
rently logged on user).
1256
Chapter 47: Using Pages and Templates
However, you can change the name of the page by adjusting the setting for the INI
parameter [Page]HardwarePage.
l Disabled Alarm Page (Disabled): Used to create a page displaying alarms that are
presently disabled in the system. The alarms will appear on this page when they
have been disabled from the normal alarm system due to a maintenance shutdown,
nuisance tripping etc. To create a default disabled alarm page for your project, create
a new page based on this template. By default, the name of the page is expected to be
"Disabled". However, you can change the name of the page by adjusting the setting
for the INI parameter [Page]DisabledPage.
l Sequence of Events Page (SOE): Used to create a page displaying a snapshot of all
state transitions of an alarm instance that have occurred. To create a default SOE
page for your project, create a new page based on this template. By default, the name
of the page is expected to be "SOE". However, you can change the name of the page
by adjusting the setting for the INI parameter. [Page]SOEPage. Unlike the active, hard-
ware, disabled pages that are refreshed automatically at runtime to display real time
data, the SOE and Summary pages display a snapshot of events that have occured,
therefore is not updated automatically. To retrieve the latest events you can manually
refresh the page.
l Alarm Summary Page (Summary): Used to create a page displaying a historical log
of alarms that have occurred. This page can be used for troubleshooting purposes. To
create a default alarm summary page for your project, create a new page based on
this template. By default, the name of the page is expected to be "Summary". How-
ever, you can change the name of the page by adjusting the setting for the INI param-
eter [Page]SummaryPage.
CAUTION Summary data is not automatically refreshed at runtime. Manually refresh the
Summary page before using its data for analysis of plant state.
The alarm templates (except the hardware alarm template) display alarm lists using a
"no draw" mode. The display of alarm fields is handled by a new set of template specific
Cicode functions and genies to control each of the alarm fields' position and size. The
alarm list is installed with a callback event function to redraw the alarm list upon data
change. The "no draw" mode and data change callback event are supported by a mod-
ified form of the existing Cicode function AlarmDsp().
1257
Chapter 47: Using Pages and Templates
Common Functionality
The alarm page templates offered as part of the tab style page templates include com-
mon graphical user interface (GUI) features for easy operation and consistent appear-
ance.
These include:
l Task Panels - Provides controls to carry out common tasks that apply to the whole of
the alarm list.
l Interactive Alarm List - Provides controls to manipulate the columns displayed on
the alarm list and select alarms.
See Also
Task Panels
Interactive Alarm List
Task Panels
The alarm page templates share panels to the left of the alarms list that support the fol-
lowing functionality:
Page Tasks
Allows the user to navigate through the list of alarms a page at a time. The Print /
Export hyperlink (not available in the hardware alarm page) allows the user to send the
alarms on the list to a printer or a file. The output will be presented in a HTML table,
and reflects the columns, filter and sort settings that are currently used on the display.
There are options to output available alarms (starting from page 1) or specific pages of
alarms starting from the current page of the alarm list. The blue box indicates the current
page number of the alarm list.
Filter Tasks
Allows the user to filter the current list based on date time, alarm name, plant area,
alarm category and other criteria. The Reset filter hyperlink clears the effect of the filter
criteria specified through the filter form. The blue box indicates the current filter setting.
It may display one of the following states:
l No Filter - no filter is applied
l Filter Applied - filter criteria specified in the filter form is applied
l Custom Filter - filter criteria is applied via Cicode function AlarmSetInfo() by the user
Control Tasks
Offers the option to:
1258
Chapter 47: Using Pages and Templates
l Acknowledge alarms on the current page (only available on Active Alarms and Hard-
ware Alarms page)
l Disable alarms on the current page (only available on Active Alarms page)
l Enable alarms on the current page (only available on Disabled Alarms page)
l Silence alarm sound (not available on Hardware Alarms page)
This panel is not featured on the Alarm Summary page.
View Tasks
Offers the option to:
l Add new column to the alarm list.
l Automatically fit the width of columns to show the most content.
l Reload the column settings according to the alarm format set in parameter [Format]
<FormatName>.
l Save the current column settings to parameter [Format]<FormatName>, so that the
same settings are used when this page is displayed in the future.
This panel is not featured on the Hardware Alarm page.
1259
Chapter 47: Using Pages and Templates
l To deselect alarm(s): Left-click any alarm within a selection range to deselect the
whole range.
Context Menu
Right-click on any alarm row to bring up the context menu for alarm operations.
Options available in the context menu will vary depending on whether single or mul-
tiple items are selected. If you right-click on an alarm that is not already selected, this
will select it. Subsequent commands (selected from the context menu) will then only oper-
ate on this single alarm. On the other hand, if you right-click on any alarm within a
selection range, this will not change the selection. Subsequent commands selected will
operate on each alarm within the selection range. Several operation options are available
in the context menu:
l Information: displays the detailed information of a single alarm that has the cursor
focus (indicated by surrounded by a white box).
l Help: displays the Help page (which is set in the Help field of the alarm record in
Project Editor) of a single alarm that has the cursor focus.
l Acknowledge: acknowledges selected alarms. This option is restricted by the privilege
set by the parameter [Privilege]AckAlarms . This is not available on the Alarm Sum-
mary page.
l Disable: disables selected alarms. This option is restricted by the privilege set by the
parameter [Privilege]DisableAlarms . It is not available on the Disabled Alarms page.
l Enable: enables selected alarms. This option is restricted by the privilege set by the
parameter [Privilege]DisableAlarms . It is not available on the Active Alarms page.
l Comment: Add a comment to an event. This option is only available when a single
row is selected. This option is restricted by the privilege set by the parameter [Priv-
ilege]AckAlarms . This option is available to Alarm Summary and SOE pages only.
Note: The Hardware Alarms template only allows a single alarm to be selected. Its
context menu has only the Acknowledge option which is also restricted by the priv-
ilege set by parameter [Privilege]AckAlarms.
1260
Chapter 47: Using Pages and Templates
1261
Chapter 47: Using Pages and Templates
1262
Chapter 48: Creating a New Project
Creating a project based on the Tab Style templates project is simple; by default, it is
incorporated as an included project in new projects. This means whenever you start a
new project, the tab style templates are ready to use as necessary.
There are two ways to create a project based on the tab style templates:
l Use the pre-defined starter project
l Create a project from scratch
Using the pre-defined starter project
To base a project on an existing starter project:
1. Choose New Project from the File menu, or click the New Project button.
2. Type a name for your project and choose a location for the files. When naming your
project do not use spaces in the project name. Although CitectSCADA does not pre-
vent you from using spaces in a project name, using spaces can cause unpredictable
results.
3. Click the Create project based on starter project checkbox.
4. Choose the project on which you want to base your new project.
5. Click OK.
Four pre-defined starter projects with page resolutions of XGA, SXGA, WUXGA and
HD1080 (Full HD) are provided as part of the product installation. Each of the starter
projects will be based on project "Tab_Style_1" and contain:
l A cluster named "Cluster1".
l A role named "Administrators" which is linked to the "BUILTIN\Administrators"
Windows group and have global privilege of 8. This allow a user to log in Citect-
SCADA at runtime using a Windows user account who belongs to the Admin-
istrators group of the local machine.
l Pages of Alarm, Summary, Disabled, Hardware, ProcessAnalyst and !Pr-
ocessAnalystPopup based on the relevant templates found in the Tab_Style_Include
project.
The newly created project will be immediately compilable, and will contain a basic level
of built-in functions such as viewing alarms and trends.
Create a project from scratch
1263
Chapter 48: Creating a New Project
To make it easier to configure a project based on the tab style templates from scratch, fol-
low these steps:
1. Create a privileged user; see Creating a Privileged User.
2. Run the Computer Setup Wizard; see Running the Computer Setup Wizard.
3. Set up instant trending; see Using Instant Trending.
4. Set up multiple monitor display; see Displaying a Project on Multiple Monitors.
5. Implement audible alarms; see Implementing Audible Alarms.
Don't modify the tab style templates project for use as a runtime project; set it aside for
use as a template for new projects.
If creating a project based on the tab style templates, it is not recommended to include
pages based on templates that use a different style, including the earlier Include project.
Doing so might affect functionality.
See Also
Creating Pages
When configuring a tab style templates project,check that your users have appropriate
access to the available functionality. Verify that your users can acknowledge alarms if
necessary.
1264
Chapter 48: Creating a New Project
To adjust the global privileges for the elements previously listed for a more complex
security architecture, adjust the [Privilege] parameters in the Citect.ini file. Click the rel-
evant link in the previous table above for details.
See Also
Running the Computer Setup Wizard
Privilege Parameters in the Parameters online help
1265
Chapter 48: Creating a New Project
1. Verify that the alarms you want to trigger an audible alert are assigned to a category
and given a particular priority.
2. Adjust the parameter [Alarm]Soundn. This parameter determines the wav file used
when an alarm sounds, based on the priority of the alarm (n). For example, [Alarm]
1266
Chapter 48: Creating a New Project
Sound1 identifies the .wav file that will be sounded whenever a priority 1 alarm is trig-
gered.
Creating Pages
If you created your project by selecting the Create project based on starter project check-
box in the New Project dialog, Alarm, SOE, Disabled, Hardware, ProcessAnalyst, !Pr-
ocessAnalystPopup, ControlInhibit, ManualOverride, VariableTags and generic
equipment pop-up pages would already have been created in your new project. You can
accept those pages or modify them as you develop your project.See Creating a new
project.
If you created your project from scratch, there are no predefined pages in your project.
The navigation controls on the tab template expect several default pages to exist in your
project for basic functionality such as alarm and trend displays. You are recommended
to add the following pages to your project based on the provided templates of your
chosen size:
Template Description
Summary Alarms Summary page, called from the Alarms toolbar using the His-
torical events icon.
1267
Chapter 48: Creating a New Project
Template Description
SOE (Sequence of Sequence of events page, called from the Alarms toolbar using the His-
Events) torical events icon.
The links between the pages listed and the controls that call them are defined by the
[Page] parameter settings within the Citect.ini file. The relevant parameters are [Page]Pro-
cessAnalystPage, [Page]ProcessAnalystPopupPage, [Page]AlarmPage and [Page]Hard-
warePage, etc. If you want a button to call a page with a different name, adjust these
parameter settings. For details see Page Parameters .
Note: If you try to launch a tab style template from within Citect Explorer, you need
to drill down to [Project Name]/Graphics/Templates/tab_style_1/[Resolution] to locate
it. Four different resolutions are provided including XGA, SXGA, HD1080 and
WUXGA.
1268
Chapter 48: Creating a New Project
Tabs Buttons
Pages Automatically populate the non-system pages configured in the project and
included project(s)
Disabled Alarms
Hardware Alarms
See Also
Defining page menus
Defining template popup menus
1269
Chapter 48: Creating a New Project
The Cicode expression to be executed when the menu item is selected. String of 256 char-
acters.
Symbol
The symbol to associate with the menu entry in the format of <library name>.<symbol
name>. The template expects the symbol to be a certain size when it is configured
against different menu types: For tabs, symbols are 16 x 16 pixels. For buttons, symbols
are 32 x 32 pixels. Some common symbols can be found in the symbol libraries of icons_
16x16 and icons_32x32. The field is not applicable for menu and sub-menu items.
Comment
A comment about the menu entry. String of 128 characters.
Page
The page on which this entry will exist. If blank, the entry exists every page. The page
name of "Template" is a keyword used in the templates for defining custom pop-up
menus.
Hidden when
The tab menu bar on the template does not support visibility. When the expression
defined in this field is true, the relevant menu entry is disabled instead.
Disabled when
Cicode expression to determine when the menu entry is disabled on the page. String of
256 characters.
Disabled style
This field is not used by the tab menu bar on the template.
Width
The width (measured in pixels) of the item appear on the page. If this is not specified,
the item is automatically sized to show the most content. This field only applies to the
tabs and buttons.
The objects used in the template are subjected to minimum widths: Tab (Level 1)= 63 pix-
els, and Button(Level 2) = 61 pixels.
Checked
Whether the menu item shows a check mark next to it. This field only applies to the
menu items and sub-menu items.
Privilege
The user privilege of (0-8) necessary to select the menu entry.
Area
The user area (0-255) necessary to select the menu entry.
1270
Chapter 48: Creating a New Project
See Also
Defining template popup menus
Configuring Page Menus
Note: For pages created based on the Process Analyst templates, you can print the
1271
Chapter 48: Creating a New Project
screen using the standard Print button, or print the chart using the Print button on
the toolbar of the Process Analyst object. Give the user both alternatives as they both
serve different purposes.
1272
Using the Library Control Include Project
1273
1274
Chapter 49: Introducing the Library Control Include
Project
The Library Control Include project is a series of genies for common UI controls such as
an equipment tree view, data table, and vertical and horizontal scrollbars.
The project is a system include project, and only appears in the Project List tree pane in
Citect Explorer if the View ->“Show Include Project” option is checked.
1275
Chapter 49: Introducing the Library Control Include Project
1276
Chapter 50: Using the Library Controls
The following genies are available for you to use as you create your graphics pages.
Alar- A version of the Table genie for displaying an alarm list. Place on page to dis-
mT- play an alarm list.
able
Dat- A version of the Table genie to display snapshot information Place on page to dis-
a retrieved via the built-in data browse family of Cicode func- play a snapshot of
Bro- tions, such as AlmBrowse, TagBrowse and TrnBrowse or data retrieved from
wse other data browse-like data by providing custom initialization the built-in data
Tab- callback function to the genie. browse functions.
le
Equ- A version of the Tree genie for displaying a hierarchy of equip- Place on page to dis-
ipT- ment configured in the project. The EquipTree genie auto- play an equipment
ree matically loads the equipment defined in the project. tree.
For advanced usage, such as doing custom actions upon dif-
ferent events, you will need to write your own Cicode func-
tions and assign them to the callback functions part of the
genie form.
Scr- Displays a horizontal scrollbar for panning the displayed con- Place on page to view
oll- tent horizontally to reveal the off-screen portion of the con- the off screen content
ba- tent. This genie can be used with any content by hooking up
r_ the call-back events of the genies with the appropriate Cicode
Hor- functions (written by the users).
z
Scr- Displays a vertical scrollbar for panning the displayed content Place on page to view
oll- vertically to reveal the off-screen portion of the content. This the off screen content
ba- genie can be used with any content by hooking up the call-
r_ back events of the genies with the appropriate Cicode func-
Vert tions (written by the users).
Slid- Displays a Slider for hiding and displaying the equipment Place on page to hide
er tree-view panel on screen. the equipment tree-
view panel
SQL A version of the BrowseTable genie to display information Place on page to dis-
Tab- retrieved using the built-in SQL functions as a disconnected play data retrieved
le recordset. from an SQL data
source.
1277
Chapter 50: Using the Library Controls
Tab Displays a list of opened pages uniquely in the navigation bar. Place on page to dis-
play a list of opened
See Using the Tab Library Control for examples in how the
pages that will allow
control can be used.
users to navigate
between pages easily.
Tab- Displays background highlight for a particular row when it is Use when want to high-
le selected. This genie is to be used in conjunction with the light the selected row
Row Table genies. However, its use is optional. with a blue back-
ground color.
The position and size of the highlight is not automatically cal-
culated at runtime. Locate and resize the instance of this
genie in the Graphics Builder at design time.
Tab- Displays multiple rows of data on the screen in tabular layout. Place on page to dis-
le The genie is designed to display only a certain number of play table like data
rows and columns of data on screen. You can view the off- such as alarms, or
screen portion of the table by using it with the scrollbar database records.
genies or via specific Cicode functions. This genie does not
include the row highlight animation for row selection. How-
ever, you can find out which rows are selected via a set of spe-
cific Cicode functions.
Tag- A version of the Table genie for displaying a table of variable Place on page to dis-
Tab- tags added to the genie using the LibTagTable_AddTag() play a table of variable
le Cicode function. tags.
See Using the Tag Table Library Control for examples in how
the control can be used.
To use paste the genie on to the graphics page, and fill in the genie parameters at design
time. When complete select OK to save the library control.
See Also
Parameter Description
Alarm Table Name of table (max characters). Used to identify the genie when on a
Name graphics page
1278
Chapter 50: Using the Library Controls
Note:Leave the size of the genie at design time as 100 pixels, as it will be
automatically calculated at runtime.
Header Padding The pixel padding between the bottom of the header text (column name)
and the bottom of the header row
Row Padding The pixel padding between the bottom of the cell text and the bottom of
each row.
Column Pad- The pixel padding on the left-hand-side and right-hand-side of the cell text
ding relative to the width of each column.
Refresh Rate The minimum (quickest possible) rate that the control will be redrawn.
The control is only redrawn as required upon changes to the layout, scroll-
ing or other user initiated events.
Scan Delay The number of page scan delay before the genie is initialized at runtime.
(Optional) this can be set to different number on different control genies to stagger
the initialization order. If not set defaults to 1.
Last Alarm List True/False drop down box. Determines whether the alarm list is a normal
list (which will be instantiated via function AlarmDsp) or a last alarm list
(which will be instantiated via function AlarmDspLast)
Horizontal The name of the horizontal scrollbar genie on the page that allows the user
Scrollbar to horizontally scroll the content displayed on the control genie If you do
(Optional) not require horizontal scrolling, leave this field blank.
Vertical Scroll- The name of the horizontal scrollbar genie on the page that allows the user
bar to vertically scroll the content displayed on the control genie If you do not
require vertical scrolling, leave this field blank.
(Optional)
Format Cat- The alarm category for determining the fields (columns) displayed If this is
egory not specified, the columns displayed on the table will be determined by the
field format defined in alarm category 0.
Cluster The cluster of the alarm list If this is not specified, alarms from all clusters
configured in the project will be displayed.
Alarm Type The display type of the alarm list Please see the type parameter of the built-
in Cicode function AlarmDsp for details.
1279
Chapter 50: Using the Library Controls
Intialize Callback function that is called when the control initializes. The callback
(Optional) function should return either TRUE (1) for success or FALSE (0) if unsuc-
cessful. By default, if the user specified function does not initialize, the con-
trol genie will retry the function a few times before giving up. This callback
only supports the #Name keyword which represents the name assigned to
the control genie.
Left Mouse Callback function that is called when the user clicks the left mouse button
(Optional) No particular return value is expected from this function, and it supports
the following keywords in its argument list:
#Name = name assigned to the genie
#Row = row number of the cell (w.r.t. the underlying data) that is clicked
#Col = column number of the cell that is clicked
#RowDsp = row number of the cell relative to the display that is clicked
#ColDsp = column number of the cell relative to the display that is clicked
#AN= the animation number where the alarm is displayed
Right Mouse Callback function that is called when the user clicks the right mouse button
(Optional) It uses the same specification as that of the Left mouse callback .
Double Click Callback function that is called when the user double-click the left mouse
(Optional) button It uses the same specification as that of the Left mouse callback.
Table Reload Callback function that is called when the control is redrawn No particular
(Optional) return value is expected from this function, and it supports the following
keywords in its argument list:
#Name = name assigned to the genie
Note:The Table can be up to 62 columns (although the latter columns may not have
the column separators). For tables that return more columns that the limit, the first
62 columns will be displayed.
See Also
Using Library Controls
1280
Chapter 50: Using the Library Controls
// Set up filter
INT nAN = LibAlmTable_GetAN(sTable);
INT hEdit = AlarmFilterEditOpen(nAN);
AlarmFilterEditSet(hEdit, "Equipment=" + sEquipment);
AlarmFilterEditCommit(hEdit);
AlarmFilterEditClose(hEdit);
RETURN TRUE;
END
2. From the Graphics Builder create a new page (e.g. the Normal Tab Style Page)
3. When created, from the Object toolbox select -> The Paste Genie icon.
4. In the Paste Genie window select the lib_controls library
5. Select the Alarm Table genie. The Alarm Table genie is pasted onto the graphics
page.
In the ALarm Table Genie property dialog configure the following fields:
Parameter Description
Width 400 ( all columns within the table are displayed. If left at 100 some col-
umns may not be displayed)
Number of rows 10
Header Height 18
Row Height 15
Header Padding 5
Row Padding 4
Column Padding 5
Horizontal Scrollbar
Vertical Scrollbar
Initialize MyAlmTable_Init("#Name","Plant*")
1281
Chapter 50: Using the Library Controls
7. Save the graphics page and compile and run the project.
At runtime the table will look like the following:
See Also
Using Library Controls
Parameter Description
Browse Table Name of table. Used to identify the genie when on a graphics page
Name
Header Padding The pixel padding between the bottom of the header text (column name)
and the bottom of the header row
Row Padding The pixel padding between the bottom of the cell text and the bottom of
each row.
Column Pad- The pixel padding on the left-hand-side and right-hand-side of the cell text
ding relative to the width of each column.
Refresh Rate The minimum (quickest possible) rate that the control will be redrawn.
The control is only redrawn as required upon changes to the layout, scroll-
ing or other user initiated events.
Scan Delay The number of page scan delay before the genie is initialized at runtime.
(Optional) this can be set to different number on different control genies to stagger
1282
Chapter 50: Using the Library Controls
Browse Type The type of project configuration to be browsed and displayed, including:
AccumBrowse – for listing accumulators
AlmBrowse – for listing alarm tags
AlmSummary – for listing alarm summary
EquipBrowse – for listing equipment
ServerBrowse – for listing servers
TagBrowse – for listing variable tags
TrnBrowse – for listing trend tags
Filter (Optional) A filter expression specifying the records to return during the browse If it
is not specified, all records will be returned. Please see the browse open
Cicode function of the selected browse type for the details of filter expres-
sion supported.
Sort By A comma delimited string specifying the order of sorting preferences. This
(Optional) is only applicable to TagBrowse. Please see the Sort parameter of the built-
in Cicode function TagBrowseOpen for details.
Horizontal The name of the horizontal scrollbar genie on the page that allows the user
Scrollbar to horizontally scroll the content displayed on the control genie If you do
(Optional) not require horizontal scrolling, leave this field blank.
Vertical Scroll- The name of the horizontal scrollbar genie on the page that allows the user
bar to vertically scroll the content displayed on the control genie If you do not
require vertical scrolling, leave this field blank.
(Optional)
Selection Font The pre-configured font for cell text when it is selected .
Auto Width True/False drop down box. False is selected by default. Determines
whether the column width will be automatically adjusted to show the entire
cell content when the control is redrawn.
Allow Selection True/False drop down. True is selected by default. Determines whether
allow the rows displayed on the control are selectable .
Clusters A comma delimited string specifying only items from a subset of clusters to
(Optional) be included in the display. If it is not specified, items from all clusters will
be included.
Intialize Callback function that is called when the control initializes. The callback
(Optional) function should return either TRUE (1) for success or FALSE (0) if unsuc-
1283
Chapter 50: Using the Library Controls
cessful. By default, if the user specified function does not initialize, the con-
trol genie will retry the function a few times before giving up. This callback
only supports the #Name keyword which represents the name assigned to
the control genie.
Left Mouse Callback function that is called when the user clicks the left mouse button.
(Optional) No particular return value is expected from this function, and it supports
the following keywords in its argument list:
#Name = name assigned to the genie
#Row = row number of the cell (w.r.t. the underlying data) that is clicked
#Col = column number of the cell that is clicked
#RowDsp = row number of the cell relative to the display that is clicked
#ColDsp = column number of the cell relative to the display that is clicked
Right Mouse Callback function that is called when the user clicks the right mouse but-
(Optional) ton. It uses the same specification as that of the Left mouse callback .
Double Click Callback function that is called when the user double-click the left mouse
(Optional) button. It uses the same specification as that of the Left mouse callback.
Table Reload Callback function that is called when the control is redrawn No particular
(Optional) return value is expected from this function, and it supports the following
keywords in its argument list:
#Name = name assigned to the genie
Note:The Table can be up to 62 columns (although the latter columns may not have
the column separators). For tables that return more columns that the limit, the first
62 columns will be displayed.
See Also
Using Library Controls
Note: For the genie to work, report server must be defined in your project, and your
project can connect to the report server at runtime.
Parameter Description
Tree Name Name of table (max characters). Used to identify the genie when on a
1284
Chapter 50: Using the Library Controls
graphics page
Show CheckBox True/False drop down box. False is selected by default. Determines
whether to show the checkboxes next to each of the tree items.
Force Child True/False drop down box. False is selected by default. Determines
whether to force all children tree items to follow the checked status of
their parent when the latter is checked / unchecked.
Window Inst True/False drop down box. True is selected by default. Determines
whether create a new instance of the equipment hierarchy on each win-
dow where the equipment tree is displayed.
Refresh Rate The minimum (quickest possible) rate that the control will be redrawn.
The control is only redrawn as required upon changes to the layout, scroll-
ing or other user initiated events
Expand Level The minimum expand level of the tree hierarchy. Set to 0 to allow the tree
be collapsed to its root items.
Horizontal The name of the horizontal scrollbar genie on the page that allows the
Scrollba user to horizontally scroll the content displayed on the control genie If you
(Optional)r do not require horizontal scrolling, leave this field blank.
Vertical Scrollbar The name of the horizontal scrollbar genie on the page that allows the
(Optional) user to vertically scroll the content displayed on the control genie If you
do not require vertical scrolling, leave this field blank.
Label Font The font used for displaying the tree item label.
Item Font The font used for displaying the optional dynamic text next to the tree
item.
Symbol Library The name of the symbol library that contains the symbols for displayed
(Optional) next to the tree items.
Refresh Rate The minimum rate that the control will be redrawn.
Note: The control is only redrawn as required upon changes to the lay-
out, scrolling or other user initialized events.
Scan Delay The number of page scan delay before the genie is initialized at runtime.
This can be set to different number on different control genies to stagger
the initialization order.
Expand Level The minimum expand level of the tree hierarchy. Set this to 0 to allow the
tree to be collapsed to its root items.
1285
Chapter 50: Using the Library Controls
Intialize Callback function that is called when the control initializes. The callback
function should return either TRUE (1) for success or FALSE (0) for
unsuccessful. By default, if the user specified function does not initialize,
the control genie will retry the function a few times before giving up. This
callback only supports the #Name keyword which represents the name
assigned to the control genie.
Row Item Callback function that is called when the table initializes The callback func-
tion should return a string value. The value returned will be displayed
next to the tree item label. It supports the following keyword in its argu-
ment list:
#Name - Name assigned to the genie
#Ref – the complete path of the tree item
#Label – the label of the tree item
#ItemDsp- The position of the item as displayed on screen
#IsChecked - The checked status of the tree item
#IsParent - Whether the item is expanded/collapsed
#ItemDsp - The position of the item as displayed on screen
#Node - The handle to the internal menu node object that represents the
tree item
#Level - The level of the tree item
Selected Callback function that is called when a tree item is selected. No particular
return value is expected from this function, and it supports the same set
of keywords as that of the Row Item function in its argument list. Callback
function that is called when the checkbox of a tree item is clicked. No par-
ticular return value is expected from this function, and it supports the
same set of keywords as that of the Row Item function in its argument list.
Checked Callback function that is called when a tree item is selected. No particular
return value is expected from this function, and it supports the same set
of keywords as that of the Row Item function in its argument list. Callback
function that is called when the checkbox of a tree item is clicked. No par-
ticular return value is expected from this function, and it supports the
same set of keywords as that of the Row Item function in its argument list.
Left Mouse Callback function that is called when the user clicks the left mouse button
No particular return value is expected from this function, and it supports
the following keywords in its argument list:
#Node - The handle to the internal menu node object that represents the
tree item
#Level - The level of the tree item
Right Mouse Callback function that is called when the user clicks the right mouse but-
ton. It uses the same specification as that of the Left mouse callback .
Double Click Callback function that is called when the user double-click the left mouse
button. It uses the same specification as that of the Left mouse callback.
Tree Reload Callback function that is called when the control is redrawn. No particular
1286
Chapter 50: Using the Library Controls
return value is expected from this function, and it supports the following
keywords in its argument list:
#Name = name assigned to the genie
Parameter Description
Tree Name Name of table (max characters). Used to identify the genie when on a
graphics page
Note: The project will compile and run when configured with longer equipment
names, a runtime error may occur when you attempt to interact with the tree display
based on the 'EquipTree' genie. When this happens, an alarm icon will appear on the
tree view, and a "Too few arguments for function or argument string too long" hard-
ware alarm will be reported. This usually indicates either the equipment name is too
long or the name of the tree genie is too long.
See Also
Using Library Controls
Note: The PageTabs genie is specifically designed for displaying page data. The
genie internally binds page data to the tab display. You should not add tabs directly.
Manipulating the tab data using the LibTabs Cicode function may result in
unexpected behavior.
Parameter Description
Page Tabs Name of page tabs control (max characters 254). Used to identify the genie
Name when on a graphics page.
Vertical Pad- The vertical distance (in pixels) between the tab elements and the bottom
ding of the tabs control.
1287
Chapter 50: Using the Library Controls
Tab Padding The horizontal distance (in pixels) between the edges and elements of a tab
Auto Width True/False drop down box. False is selected by default. Determines
whether the column width will be automatically adjusted to show full cell
content when the control is redrawn.
Icon Add Pad- Additional vertical padding for the display of icon relative to the text. Pos-
ding itive padding will move the icon further upward, and vice versa.
Refresh Rate The minimum (quickest possible) rate that the control will be redrawn.
The control is only redrawn as required upon changes to the layout, scroll-
ing or other user initiated events.
Scan Delay The number of page scan delay before the genie is initialized at runtime.
(Optional) this can be set to different number on different control genies to stagger
the initialization order. If not set defaults to 1
Menu (Page) Name of page with menu items to display. this is only applicable when Page
Name type is set to "PageMenu"
Tab Line Style The display style of the separator between tabs, options are:
Dark
Light
None
Tab Select Style The display style for highlighting of selected tab:
Dark
Light
None
Allow Drag Sort Indicates whether to allow individual tabs to be repositioned by drag and
drop.
Allow Drag Indicates whether to allow individual tabs to be deleted by dragging it ver-
Delete tically away from the tabs control.
Tab Select Icon The icon to be displayed when a tab is selected. An icon must be pre-con-
figured as a symbol in your project. It is specified by the syntax of <symbol
library>.<symbol>.
Intialize Callback function that is called when the control initializes The callback
(Optional) function should return either TRUE (1) for success or FALSE (0) if unsuc-
cessful. By default, if the user specified function does not initialize, the con-
1288
Chapter 50: Using the Library Controls
trol genie will retry the function a few times before giving up. This callback
only supports the #Name keyword which represents the name assigned to
the control genie.
Note:The initialization callback function may be called multiple times when-
ever the tab is re-initialized.
Right Mouse Callback function that is called when the user clicks the right mouse button
(Optional) No particular return value is expected from this function, and it supports
the following keywords in its argument list:
#Name = name assigned to the genie
#Ref = reference (assigned when tab is added) of the cell that is clicked
#TabDsp = tab number of the cell relative to the display that is clicked
#Icon =Icon number indicating the different areas with a tab is clicked:
<=0 - text on tab is clicked
1- icon to left hand side of text is clicked
2- icon to right hand side of text is clicked
3- selection icon (only shows up when a tab selected) is clicked
Double Click Callback function that is called when the user double-click the left mouse
(Optional) button. It uses the same specification as that of the Left mouse callback.
Tabs Reload Callback function that is called when the control is redrawn. No particular
(Optional) return value is expected from this function, and it supports the following
keywords in its argument list:
#Name = name assigned to the genie
See Also
Using Library Controls
Parameter Description
Scrollbar Name A unique name used to identify the genie within a page.
Width The pixel width of the control at runtime. Leave the size of the genie at
design time as 100 pixels, as it will be automatically calculated at run-
time.
Update on Drag True/False (True selected by default). Determines whether the position of
the scrollbar and the contents of the associated control genie is updated
while the thumb is being dragged
Auto Hide Determines whether the scrollbar will be automatically hidden when the
contents of the associated control are fully displayed on screen
Allow Double Determines whether the scrollbar will response to mouse double-click
Click event
1289
Chapter 50: Using the Library Controls
Hidden When A user specified expression to explicitly hide the scrollbar If this is not
specified, it is defaulted to FALSE (not hidden).
Initialize Callback function that is called when the control initializes The callback
function should return either TRUE (1) for success or FALSE (0) if unsuc-
cessful. By default, if the user specified function does not initialize, the
control genie will retry the function a few time before giving up. This call-
back only supports the #Name keyword which represents the name
assigned to the control genie.
Right Mouse Callback function to be called when the user clicks the right mouse button
on the scrollbar. Supports the same set of substitutions as Callback.
See Also
Using Library Controls
Parameter Description
Scrollbar Name A unique name used to identify the genie within a page.
Height The pixel height of the control at runtime. Leave the height of the genie at
design time as 100 pixels, as it will be automatically calculated at run-
time.
Update on Drag True/False (True selected by default). Determines whether the position of
the scrollbar and the contents of the associated control genie is updated
while the thumb is being dragged
Auto Hide Determines whether the scrollbar will be automatically hidden when the
contents of the associated control are fully displayed on screen
Allow Double Determines whether the scrollbar will response to mouse double-click
Click event
Hidden When A user specified expression to explicitly hide the scrollbar If this is not
specified, it is defaulted to FALSE (not hidden).
Initialize Callback function that is called when the control initializes The callback
function should return either TRUE (1) for success or FALSE (0) for fail-
1290
Chapter 50: Using the Library Controls
ure. By default, if the user specified function fails to initialize, the control
genie will retry the function a few time before giving up. This callback
only supports the #Name keyword which represents the name assigned
to the control genie.
Right Mouse Callback function to be called when the user click the right mouse button
on the scrollbar. Supports the same set of substitutions as Callback.
See Also
Using Library Controls
Parameter Description
Slider Name A unique name used to identify the control genie within a page.
Length The pixel height of the control at runtime. Leave the size of the genie at
design time as 100 pixels, as it will be automatically calculated at run-
time.
Minimum Offset The min. offset (in pixels) the slider can be dragged to. The acceptable
range is -4000 to 4000.
Maximum Offset The max. offset (in pixels) the slider can be dragged to. The acceptable
range is -4000 to 4000.
Docked Offset The offset (in pixels) the slider is moved to when it is docked. If this is not
(Optional) set, it is defaulted to -4000.
The acceptable range is -4000 to 4000.
Dockable Whether the middle thumb button will appear at runtime, so that the user
can click on it to move the slider to the docked offset.
Update on Drag Whether the position of the scrollbar and the contents of the associated
control genie is updated while the thumb is being dragged.
Scan Delay The number of page scan delay before the genie is initialized at runtime
(Optional) This can be set to different number on different control genies to stacker
1291
Chapter 50: Using the Library Controls
Initialize Callback function that is called when the control initializes The callback
function should return either TRUE (1) for success or FALSE (0) for
unsuccessful. By default,if the user specified function can not initialize
successfully, the control genie will retry the function a few times before
giving up. This callback only supports the #Name keyword which rep-
resents the name assigned to the control genie.
Callback Callback function to be called when the position of the slider is updated.
No particular return value is expected from this function, and it supports
the following keywords in its argument list:
#Name = name assigned to the genie
#Offset = Offset of the slider position relative to its initial position
Right Mouse Callback function to be called when the user click the right mouse button
on the scrollbar
See Also
Using Library Controls
Parameter Description
SQL Table Name of table (max characters). Used to identify the genie when on a
Name graphics page
Header Padding The pixel padding between the bottom of the header text (column name)
and the bottom of the header row
Row Padding The pixel padding between the bottom of the cell text and the bottom of
each row.
Column Pad- The pixel padding on the left-hand-side and right-hand-side of the cell text
ding relative to the width of each column.
Refresh Rate The minimum (quickest possible) rate that the control will be redrawn.
The control is only redrawn as required upon changes to the layout, scroll-
ing or other user initiated events.
1292
Chapter 50: Using the Library Controls
Scan Delay The number of page scan delay before the genie is initialized at runtime.
(Optional) this can be set to different number on different control genies to stagger
the initialization order. If not set defaults to 1.
Connection Str The ADO connection string to the database source Please see the sConnect
parameter of the built-in Cicode function SQLCreate for details.
SQL Selection The SQL query statement to return a table of records (recordset)
Query
Horizontal The name of the horizontal scrollbar genie on the page that allows the user
Scrollbar to horizontally scroll the content displayed on the control genie If you do
(Optional) not require horizontal scrolling, leave this field blank.
Vertical Scroll- The name of the horizontal scrollbar genie on the page that allows the user
bar to vertically scroll the content displayed on the control genie If you do not
require vertical scrolling, leave this field blank.
(Optional)
Selection Font The pre-configured font for cell text when it is selected .
Auto Width True/False drop down box. False is selected by default. Determines
whether the column width will be automatically adjusted to show full cell
content when the control is redrawn.
Allow Selection True/False drop down. True is selected by default. Determines whether
allow the rows displayed on the control are selectable .
Intialize Callback function that is called when the control initializes. The callback
(Optional) function should return either TRUE (1) for success or FALSE (0) if unsuc-
cessful. By default, if the user specified function does not initialize, the con-
trol genie will retry the function a few times before giving up. This callback
only supports the #Name keyword which represents the name assigned to
the control genie.
Left Mouse Callback function that is called when the user clicks the left mouse button.
(Optional) No particular return value is expected from this function, and it supports
the following keywords in its argument list:
#Name = name assigned to the genie
#Row = row number of the cell (w.r.t. the underlying data) that is clicked
#Col = column number of the cell that is clicked
#RowDsp = row number of the cell relative to the display that is clicked
#ColDsp = column number of the cell relative to the display that is clicked
Right Mouse Callback function that is called when the user clicks the right mouse but-
(Optional) ton. It uses the same specification as that of the Left mouse callback .
Double Click Callback function that is called when the user double-click the left mouse
(Optional) button. It uses the same specification as that of the Left mouse callback.
1293
Chapter 50: Using the Library Controls
Table Reload Callback function that is called when the control is redrawn No particular
(Optional) return value is expected from this function, and it supports the following
keywords in its argument list:
#Name = name assigned to the genie
Note: The Table can be up to 62 columns (although the latter columns may not have
the column separators). For tables that return more columns that the limit, the first
62 columns will be displayed.
See Also
Using Library Controls
Parameter Description
Tabs Name Name of tabs control (max characters). Used to identify the genie when on
a graphics page.
Vertical Pad- The vertical distance (in pixels) between the tab elements and the bottom
ding of the tabs control.
Tab Padding The horizontal distance (in pixels) between the edges and elements of a tab
Auto Width True/False drop down box. False is selected by default. Determines
whether the column width will be automatically adjusted to show full cell
content when the control is redrawn.
Icon Add Pad- Additional vertical padding for the display of icon relative to the text. Pos-
ding itive padding will move the icon further upward, and vice versa.
Refresh Rate The minimum (quickest possible) rate that the control will be redrawn.
The control is only redrawn as required upon changes to the layout, scroll-
1294
Chapter 50: Using the Library Controls
Scan Delay The number of page scan delay before the genie is initialized at runtime.
(Optional) this can be set to different number on different control genies to stagger
the initialization order. If not set defaults to 1
Tab Line Style The display style of the separator between tabs, options are:
Dark
Light
None
Tab Select Style The display style for highlighting of selected tab:
Dark
Light
None
Allow Drag Sort Indicates whether to allow individual tabs to be repositioned by drag and
drop.
Allow Drag Indicates whether to allow individual tabs to be deleted by dragging it ver-
Delete tically away from the tabs control.
Tab Select Icon The icon to be displayed when a tab is selected. An icon must be pre-con-
figured as a symbol in your project. It is specified by the syntax of <symbol
library>.<symbol>.
Intialize Callback function that is called when the control initializes The callback
(Optional) function should return either TRUE (1) for success or FALSE (0) if unsuc-
cessful. By default, if the user specified function does not initialize, the con-
trol genie will retry the function a few time before giving up. This callback
only supports the #Name keyword which represents the name assigned to
the control genie.
Note:The initialization callback function may be called multiple times when-
ever the tab is re-initialized.
Left Mouse Callback function that is called when the user clicks the left mouse button
(Optional) No particular return value is expected from this function, and it supports
the following keywords in its argument list:
#Tab= tab ordinal number of the cell that is clicked
#Name = name assigned to the genie
#Ref = reference (assigned when tab is added) of the cell that is clicked
#TabDsp = tab number of the cell relative to the display that is clicked
#Icon =Icon number indicating the different areas within a tab when
clicked:
<=0 - text on tab is clicked
1- icon to left hand side of text is clicked
2- icon to right hand side of text is clicked
3- selection icon (only shows up when a tab selected) is clicked
Right Mouse Callback function that is called when the user clicks the right mouse but-
(Optional) ton. It uses the same specification as that of the Left mouse callback .
1295
Chapter 50: Using the Library Controls
Double Click Callback function that is called when the user double-click the left mouse
(Optional) button. It uses the same specification as that of the Left mouse callback.
Tabs Reload Callback function that is called when the control is redrawn. No particular
(Optional) return value is expected from this function, and it supports the following
keywords in its argument list:
#Name = name assigned to the genie
See Also
Using Library Controls
2. From Graphics builder create a new page (e.g. Normal Tab Style Page)
3. When created, from the Object Toolbox select -> The Paste Genie icon
4. In the Paste Genie window select the lib_contols library
5. Select the Tabs genie. The genie is pasted onto the graphics page. In the tasb genie
dialog configure the following fields:
Parameter Description
Width 400
Height 30
Initialize MyTabs_Init("#Name")
1296
Chapter 50: Using the Library Controls
Example 2: Binding a Cicode function to return the value for the individual tabs
This is similar to setting a formula in Excel. With binding, cell values are not stored in
the tabs control. the control will call the provided Cicode function when it needs the
data.
1. Using the Cicode sample below, open the Cicode Editor and create a new Cicode file,
function.For Example:'MyTabs_Ex2.ci'
RETURN TRUE;
END
2. As in example 1 add a tabs library control to the graphics page. In the Tabs Genie
property dialog configure the following fields:
Parameter Description
Width 400
Height 30
Initialize MyTabs_Initdyn("#Name")
1297
Chapter 50: Using the Library Controls
See Also
Using Library Controls
Parameter Description
Table Name Name of table (max characters). Used to identify the genie when on a
graphics page
Header Padding The pixel padding between the bottom of the header text (column name)
and the bottom of the header row
Row Padding The pixel padding between the bottom of the cell text and the bottom of
each row.
Column Pad- The pixel padding on the left-hand-side and right-hand-side of the cell text
ding relative to the width of each column.
Refresh Rate The minimum (quickest possible) rate that the control will be redrawn.
The control is only redrawn as required upon changes to the layout, scroll-
ing or other user initiated events.
Horizontal The name of the horizontal scrollbar genie on the page that allows the user
Scrollbar to horizontally scroll the content displayed on the control genie If you do
(Optional) not require horizontal scrolling, leave this field blank.
1298
Chapter 50: Using the Library Controls
Vertical Scroll- The name of the horizontal scrollbar genie on the page that allows the user
bar to vertically scroll the content displayed on the control genie If you do not
require vertical scrolling, leave this field blank.
(Optional)
Selection Font The pre-configured font for cell text when it is selected .
Auto Width True/False drop down box. False is selected by default. Determines
whether the column width will be automatically adjusted to show complete
cell content when the control is redrawn.
Allow Selection True/False drop down. True is selected by default. Determines whether
allow the rows displayed on the control are selectable .
Scan Delay The number of page scan delay before the genie is initialized at runtime.
(Optional) this can be set to different number on different control genies to stagger
the initialization order. If not set defaults to 1.
Intialize Callback function that is called when the control initializes The callback
(Optional) function should return either TRUE (1) for success or FALSE (0) if unsuc-
cessful. By default, if the user specified function does not initialize, the con-
trol genie will retry the function a few time before giving up. This callback
only supports the #Name keyword which represents the name assigned to
the control genie.
Left Mouse Callback function that is called when the user clicks the left mouse button
(Optional) No particular return value is expected from this function, and it supports
the following keywords in its argument list:
#Name = name assigned to the genie
#Row = row number of the cell (w.r.t. the underlying data) that is clicked
#Col = column number of the cell that is clicked
#RowDsp = row number of the cell relative to the display that is clicked
#ColDsp = column number of the cell relative to the display that is clicked
Right Mouse Callback function that is called when the user clicks the right mouse button
(Optional) It uses the same specification as that of the Left mouse callback .
Double Click Callback function that is called when the user double-click the left mouse
(Optional) button It uses the same specification as that of the Left mouse callback.
Table Reload Callback function that is called when the control is redrawn No particular
(Optional) return value is expected from this function, and it supports the following
keywords in its argument list:
#Name = name assigned to the genie
1299
Chapter 50: Using the Library Controls
Note:The Table can be up to 62 columns (although the latter columns may not have
the column separators). For tables that return more columns that the limit, the first
62 columns will be displayed.
See Also
Using the Tag Table Library Control
Using Library Controls
RETURN TRUE;
END
//Function to add a new row of data to the table
INT FUNCTION MyTable_AddRow(STRING sTable, STRING sCol1Value, STRING sCol2Value)
// Add data to the table, and the data is stored in the table
INT nRow = LibTable_SetCellValue(sTable, -1, 1, sCol1Value);
RETURN LibTable_SetCellValue(sTable, nRow, 2, sCol2Value);
END
2. From the Graphics Builder create a new page (E.g. the Normal Tab Style Page)
3. When created, from the Object toolbox select -> The Paste Genie icon.
4. In the Paste Genie window select the lib_controls library
1300
Chapter 50: Using the Library Controls
5. Select the Table genie. The Table genie is pasted onto the graphics page.
In the Table Genie property dialog configure the following fields:
Parameter Description
Width 400 (all columns within the table are displayed. If left at 100 some col-
umns may not be displayed)
Number of rows 10
Header Height 18
Row Height 15
Header Padding 5
Row Padding 4
Column Padding 5
Horizontal Scrollbar
Vertical Scrollbar
Initialize MyTable_Init("#Name")
Example 2: Binding a Cicode function to return the value for the individual cells of the
table
This is similar to setting a formula in Excel. With binding, cell values are not stored in
the table. The table will call the provided Cicode function when it needs data.
1301
Chapter 50: Using the Library Controls
1. The Cicode sample below will be used in the following example. Open the Cicode
Editor and create a new cicode file, for example, _MyTable_Ex2.ci
RETURN TRUE;
END
//Function to return the value for a data cell
STRING FUNCTION MyTable_GetCellValue(STRING sTable, INT nRow, INT nCol)
IF (nRow > LibTable_GetPropertyInt(sTable, "RowCount")) THEN
RETURN "";
END
RETURN "Dyn. value for Cell(" + nRow:# + "," + nCol:# + ")";
END
Parameter Description
Width 400 (all columns within the table are displayed. If left at 100 some col-
umns may not be displayed)
Number of rows 10
Header Height 18
Row Height 15
Header Padding 5
Row Padding 4
Column Padding 5
Horizontal Scrollbar
1302
Chapter 50: Using the Library Controls
Vertical Scrollbar
Initialize MyTable_InitDyn("#Name")
See Also
Using Library Controls
Parameter Description
Table Name The name of the table (or its derived) genies that already exists on the
page.
See Also
Using Library Controls
Parameter Description
Tag Table Name Name of table (max characters). Used to identify the genie when on a
graphics page
1303
Chapter 50: Using the Library Controls
Header Padding The pixel padding between the bottom of the header text (column name)
and the bottom of the header row
Row Padding The pixel padding between the bottom of the cell text and the bottom of
each row.
Column Pad- The pixel padding on the left-hand-side and right-hand-side of the cell text
ding relative to the width of each column.
Refresh Rate The minimum (quickest possible) rate that the control will be redrawn.
The control is only redrawn as required upon changes to the layout, scroll-
ing or other user initiated events.
Scan Delay The number of page scan delay before the genie is initialized at runtime.
(Optional) this can be set to different number on different control genies to stagger
the initialization order. If not set defaults to 1.
Horizontal The name of the horizontal scrollbar genie on the page that allows the user
Scrollbar to horizontally scroll the content displayed on the control genie If you do
(Optional) not require horizontal scrolling, leave this field blank.
Vertical Scroll- The name of the horizontal scrollbar genie on the page that allows the user
bar (Optional) to vertically scroll the content displayed on the control genie If you do not
require vertical scrolling, leave this field blank.
Selection Font The pre-configured font for cell text when it is selected .
Auto Width True/False drop down box. False is selected by default. Determines
whether the column width will be automatically adjusted to show full cell
content when the control is redrawn.
Allow Selection True/False drop down. True is selected by default. Determines whether
allow the rows displayed on the control are selectable .
Intialize Callback function that is called when the control initializes The callback
(Optional) function should return either TRUE (1) for success or FALSE (0) if unsuc-
cessful. By default, if the user specified function does not initialize, the con-
trol genie will retry the function a few time before giving up. This callback
only supports the #Name keyword which represents the name assigned to
the control genie.
Note:The initialization callback function may be called multiple times when-
ever the table is re-initialized.
1304
Chapter 50: Using the Library Controls
Left Mouse Callback function that is called when the user clicks the left mouse button
(Optional) No particular return value is expected from this function, and it supports
the following keywords in its argument list:
#Name = name assigned to the genie
#Row = row number of the cell (w.r.t. the underlying data) that is clicked
#Col = column number of the cell that is clicked
#RowDsp = row number of the cell relative to the display that is clicked
#ColDsp = column number of the cell relative to the display that is clicked
Right Mouse Callback function that is called when the user clicks the right mouse button
(Optional) It uses the same specification as that of the Left mouse callback .
Double Click Callback function that is called when the user double-click the left mouse
(Optional) button It uses the same specification as that of the Left mouse callback.
Table Reload Callback function that is called when the control is redrawn No particular
(Optional) return value is expected from this function, and it supports the following
keywords in its argument list:
#Name = name assigned to the genie
Note:The Table can be up to 62 columns (although the latter columns may not have
the column separators).
See Also
Using Library Controls
Parameter Description
1305
Chapter 50: Using the Library Controls
Width 300 ( all columns within the table are displayed. If left at 100 the value
column is not displayed)
Number of rows 20
Header Height 18
Row Height 15
Header Padding 5
Row Padding 4
Column Padding 5
Horizontal Scrollbar
Parameter Description
Height 100
Action Up
Up Command LibTagTable_AddTag("VariableTags","Bit_1")
1306
Chapter 50: Using the Library Controls
l Configuring a button to launch a form field where you can enter the name of the tag:
The Cicode for the up command could be:
LibTagTable_AddTag("Variabletags", Input("Add Tag","Tag name:", ""));
1. Using the Cicode sample below, open the Cicode Editor and create a function.
Example:'MyTagTableInitialze' initialization function:
1307
Chapter 50: Using the Library Controls
Parameter Description
Width 300 ( all columns within the table are displayed. If left at 100 the value
column is not displayed)
Number of rows 20
Header Height 18
Row Height 15
Header Padding 5
Row Padding 4
Column Padding 5
Horizontal Scrollbar
Initialze MyTagTableInitialize("#Name")
Parameter Description
Height 100
1308
Chapter 50: Using the Library Controls
See Also
Using Library Controls
Parameter Description
Tree Name Name of table (max characters). Used to identify the genie when on a
graphics page
Show CheckBox True/False drop down box. False is selected by default. Determines
whether to show the checkboxes next to each of the tree items.
Force Child True/False drop down box. False is selected by default. Determines
whether to force all children tree items to follow the checked status of
their parent when the latter is checked / unchecked.
Window Inst True/False drop down box. True is selected by default. Determines
whether create a new instance of the equipment hierarchy on each
window where the equipment tree is displayed.
Refresh Rate The minimum (quickest possible) rate that the control will be redrawn.
The control is only redrawn as required upon changes to the layout,
scrolling or other user initiated events
Expand Level The minimum expand level of the tree hierarchy. Set to 0 to allow the
tree to be collapsed to its root items.
1309
Chapter 50: Using the Library Controls
Horizontal Scrollbar The name of the horizontal scrollbar genie on the page that allows the
(Optional) user to horizontally scroll the content displayed on the control genie If
you do not require horizontal scrolling, leave this field blank.
Vertical Scrollbar The name of the horizontal scrollbar genie on the page that allows the
(Optional) user to vertically scroll the content displayed on the control genie If
you do not require vertical scrolling, leave this field blank.
Label Font The font used for displaying the tree item label.
Item Font The font used for displaying the optional dynamic text next to the tree
item.
Symbol Library The name of the symbol library that contains the symbols for displayed
(Optional) next to the tree items.
Refresh Rate The minimum rate that the control will be redrawn.
Note: The control is only redrawn as required upon changes to the lay-
out, scrolling or other user initialized events.
Scan Delay The number of page scan delay before the genie is initialized at run-
time. This can be set to different number on different control genies to
stagger the initialization order.
Expand Level The minimum expand level of the tree hierarchy. Set this to 0 to allow
the tree to be collapsed to its root items.
Menu (Page) Name Name of page with menu items to display. If not specified it will default
to the menu configuration of the current window.
Intialize Callback function that is called when the control initializes. The call-
back function should return either TRUE (1) for success or FALSE (0)
for unsuccessful. By default, if the user specified function cannot ini-
tialize successfully, the control genie will retry the function a few time
before giving up. This callback only supports the #Name keyword
which represents the name assigned to the control genie.
Row Item Callback function that is called when the table initializes The callback
function should return a string value. The value returned will be dis-
played next to the tree item label. It supports the following keyword in
its argument list:
#Name - Name assigned to the genie
#Ref – the complete path of the tree item
#Label – the label of the tree item
#ItemDsp- The position of the item as displayed on screen
#IsChecked - The checked status of the tree item
#IsParent - Whether the item is expanded/collapsed
#ItemDsp - The position of the item as displayed on screen
#Node - The handle to the internal menu node object that represents
the tree item
#Level - The level of the tree item
1310
Chapter 50: Using the Library Controls
Selected Callback function that is called when a tree item is selected. No par-
ticular return value is expected from this function, and it supports the
same set of keywords as that of the Row Item function in its argument
list. Callback function that is called when the checkbox of a tree item is
clicked. No particular return value is expected from this function, and
it supports the same set of keywords as that of the Row Item function
in its argument list.
Checked Callback function that is called when a tree item is selected. No par-
ticular return value is expected from this function, and it supports the
same set of keywords as that of the Row Item function in its argument
list. Callback function that is called when the checkbox of a tree item is
clicked. No particular return value is expected from this function, and
it supports the same set of keywords as that of the Row Item function
in its argument list.
Left Mouse Callback function that is called when the user clicks the left mouse but-
ton No particular return value is expected from this function, and it
supports the following keywords in its argument list:
#Node - The handle to the internal menu node object that represents
the tree item
#Level - The level of the tree item
Right Mouse Callback function that is called when the user clicks the right mouse
button. It uses the same specification as that of the Left mouse call-
back .
Double Click Callback function that is called when the user double-click the left
mouse button. It uses the same specification as that of the Left mouse
callback.
Tree Reload Callback function that is called when the control is redrawn. No par-
ticular return value is expected from this function, and it supports the
following keywords in its argument list:
#Name = name assigned to the genie
See Also
Using the Tree Genie
Using Library Controls
Note: Configure the Equipment Tree genie to view equipment in your system.
The example below illustrates how the genie can be used to view menu items within
your system for a particular page. A basic example, the implementation of the tree genie
can also be used to display dynamic generated menu items using Cicode.
Example 1: Displaying Pre-configured Menu Items
1311
Chapter 50: Using the Library Controls
Using the Example project, if you would like to display the menu items for the "_plant"
page, complete the following:
1. From the Object toolbox select -> The Paste Genie icon.
2. In the Paste Genie window select the lib_controls library
3. Select the Tree genie. The Tree genie is pasted onto the graphics page.
In the Tree Genie property dialog configure the following fields:
Parameter Description
Width 200
Number of rows 10
Row Height 15
Expand Level 0
Selected MenuNodeRunCommand(#Node)
1312
Chapter 50: Using the Library Controls
This is the more versatile usage of the menu tree where you can create an in-memory
menu hierarchy and populate it with your own data, and use the Tree control to display
it on the screen. The EquipTree genie is an example of such usage.
1. Using the Cicode sample below, open the Cicode Editor and create a callback func-
tion.
Example:'Mytree' initialization callback function:
Parameter Description
Width 200
Number of rows 10
1313
Chapter 50: Using the Library Controls
Expand Level 0
Initialize MyTreeInitialize("#Name")
Selected MenuNodeRunCommand(#Node)
Assign the name of the in-memory menu hierarchy to the Menu name field of the genie
by assigning this name to the "Menu (Page) Name" field of the Tree control genie at con-
figuration time.
3. Click OK to save the changes
4. Save the page.
Compile and then run the project. At runtime the tree (menu) will look like the following:
See Also
Using Library Controls
1314
Chapter 50: Using the Library Controls
MyFunction(“#Name”,”MyPage”,100)
When the specified event occurs, the MyFunction function will be called. The value of
the #Name keyword after converted to the name assigned to the genie control, together
with the literals “MyPage” and 100, will be passed to the function that takes two
STRING and one INT arguments.
See Also
Using Library Controls
1315
Chapter 50: Using the Library Controls
1316
Using the CSV_Include Project
1317
1318
Chapter 51: Introducing CSV_Include
The CSV_Include Project is a preconfigured project that includes a set of templates and
pages styled for the Windows XP environment. It will help you reduce the time nec-
essary to configure a new project.
When a new CitectSCADA project is created, the CSV_Include project is automatically
incorporated as an included project. This means the project's templates and associated
content are available for implementation when creating your graphics pages in Graphics
Builder.
As well as including a standard graphics page template for creating plant mimics, the
project also includes predefined trend and alarm display pages, an administration tools
page, a file page for displaying text and Rich Text Format files, and a selection of popup
windows. They have identical navigation and alarm menus for consistent "look and
feel" across an entire project. The project even supports multimonitor displays, allowing
you to simultaneously display several graphics pages across several computer screens.
Note: Do not modify the CSV_Include project for use as a runtime project. It will not
compile successfully, and be set aside for use as a template for new projects. Citect-
SCADA upgrades install a new version of the CSV_Include project, so you will lose
changes you make to the project when this happens.
1319
Chapter 51: Introducing CSV_Include
Reference material is also included, describing the citect.ini parameters and Cicode func-
tions available to customize a project.
1320
Chapter 52: Using Pages and Templates
When you create a new project based on CSV_Include, the following templates and
pages are available for you to use as you create your graphics pages. This section
describes the pages and their buttons, menus, and tools.
The CSV_Include project has the following templates:
1321
Chapter 52: Using Pages and Templates
See Also
Creating a New Project
Creating Pages
1322
Chapter 52: Using Pages and Templates
l Hardware Alarm Page (Hardware): Used to create a page displaying details of any
system errors that are unacknowledged or acknowledged and still in alarm state, for
example, if communications are lost, if Cicode can't execute, if a graphics page is not
updating correctly, or if a server becomes inoperative, this page will alert you. The
preconfigured page CSV_AlarmHardware is based on this template.
l Disabled Alarm Page (Disabled): Used to create a page displaying alarms that are
presently disabled in the system. The preconfigured page CSV_AlarmDisabled is
based on this template. The alarms will appear on this page when they have been dis-
abled from the normal alarm system due to a maintenance shutdown, nuisance trip-
ping etc.
l Alarm Summary Page (Summary): Used to create a page displaying a historical log
of alarms that have occurred. The preconfigured page CSV_AlarmSummary is based
on this template. This page can be used for troubleshooting purposes.
Common functionality
The alarm page templates share panels to the left of the alarms list that support the fol-
lowing functionality:
Acknowledge Tasks
Offers the option to:
l acknowledge alarms on the current page
l acknowledge just the selected alarm
l silence an audible alarm.
It is featured on the Active Alarms page and the Hardware Alarms page.
Alarm Page Tasks
Allows the user to navigate through the list of alarms a page at a time. The blue box indi-
cates if more than one page is available to view.
Alarm List Filter Tasks
Allows the user to filter the current list based on plant area or by alarm category. To
apply a particular filter, you first configure an alarm group.
1323
Chapter 52: Using Pages and Templates
l DoubleTrend:A 2 x 8-pen trend display spread across a divided screen. The pre-
configured page CSV_TrendDouble is based on this template.
l PopTrend: A four-pen pop-up display that can be launched from other graphics
pages.
l InstantTrend: A popup window for instant display of a variable tag.
Note: To implement the Instant Trend feature in one of your own projects, you
need to add the CSV_InstantTrend project as an Included project. (See Including a
project in the current project.)
The Trend, Double Trend and PopTrend displays allow you to select and display trend
tags from your CitectSCADA project on a color-coded linear chart. Being based on infor-
mation coming from the CitectSCADA Trends Server, these displays are supported by
stored historical data that can be recalled if necessary.
The Instant Trend display is unique as it allows the selection of up to four variable tags
for display. This allows you to visually monitor a tag without having to set it up within
your CitectSCADA project as a trend tag. You can even load tags directly into the dis-
play by hovering the mouse over a tag value on a graphics page and keying in a plus
sign (see the parameter [TrendX]KeySeq).
There are limitations to this feature, however, as data is only available from the time the
display is launched and is lost when the display is closed. The Instant Trend feature has
a duration setting that limits the amount of time the display can remain open, you can
adjust the default setting for this via the parameter [TrendX]Duration.
For details on implementing instant trending, see Setting Up Instant Trending.
Common functionality
The trend display templates share common controls that support the following func-
tionality:
l Selected Trend Field
l Range/Scale markers
l Span markers
l Set span button
l Trend cursor
l History mode
l Zoom
l Autoscale
l Scale defaults
1324
Chapter 52: Using Pages and Templates
l Export to file
l Paste to clipboard
l Plot trend
l Trend group
The field is color coded to match the graphical display, hence the colorful nature of the
listed fields.
To load a trend into a Selected Trend field, right-click the field. A menu appears allow-
ing you to select a trend or clear the field. Once you have loaded your selected trends,
you can make a particular pen the focus of the graph by clicking this field. An arrow to
the left of the field indicates it is currently the focus trend.
This field appears slightly different when using instant trending, as the graph will be dis-
playing current data for a variable tag, not a trend tag. In this case, the selection field
appears as below, with the tag name, current value, description and sample period dis-
played.
Range/Scale markers
These markers appear along the vertical axis and show the scale of the display for the
currently selected pen, highlighting the lowest to highest values for the scale range.
1325
Chapter 52: Using Pages and Templates
Span markers
These markers appear along the horizontal axis, and show the span of the trend display
in time. The left-hand marker shows the current start time and date, the right shows the
current end time and date. Typically the right-hand marker shows the current time; how-
ever, this can be affected by zooming or displaying in Historical mode.
Trend cursor
Allows you to select a location on the graphical trend display and determine the time
and date for that particular point. The arrows to the left end of the display allow you to
move the cursor left or right. The Exit icon to the right closes the trend cursor.
History mode
Allows you to scroll forward or backward through a graph of a trend tag's history. To
switch into History Mode, select the Display History Mode checkbox. The display
changes to lower version of the control shown to the left.
The four buttons allow you to move backwards or forwards through the trend graph,
with the two outer buttons shifting a page at a time, and the two inner buttons shifting
half a page. The clock icon allows you to edit the end time for the historical display.
Deselecting the box returns to the normal trend view.
1326
Chapter 52: Using Pages and Templates
Zoom
Zooms in on or out of the current display. Zoom in (+) increases the focus of the display
and continues zooming in on subsequent clicks. Zoom out (-) returns to the default.
Autoscale
Autoscales the current view, which means the scale adjusts to the lowest and highest
values reached.
Scale defaults
Returns the scale for the display to the default for the currently selected trend.
Export to file
Exports the data for the currently displayed trend to a file. A Save As dialog will appear,
allowing you to save the data as a D Base III file (.DBF file), a comma separated value
file (.CSV file) or a text file (.TXT).
Paste to clipboard
Sends the data for the currently displayed trend to the Windows clipboard.
Plot trend
Plots the trend to a printer. Use this button to print a trend graph instead of the Print
Page button. A dialog allows you to configure the printer setup.
1327
Chapter 52: Using Pages and Templates
Trend group
Allows you to load a trend group. A dialog lists the currently configured groups and
allows you to clear currently displayed variable tags. See Creating a Trends Group.
?CSV_Nav_File(MyPageTitle,[Run]:\file.txt,2)
This would call up the file page, put the title "MyPageTitle" on the title bar, load the file
called File.txt from the Run directory, and allow the file to be edited (with the last argu-
ment set to 2, the file can be saved).
The parameter [Navigation]FilePage determines the page that's used as the palette for
this process. The preconfigured page CSV_File is the default. You can change the setting
for Navigation[FilePage], however, you need to verify that any page you specify for this
parameter is based on the CSV_File template, otherwise CSV_Nav_File will not be able
to execute properly.
1328
Chapter 52: Using Pages and Templates
l Citect Configuration: Allows the user to launch the listed Citect configuration tools
from within the runtime environment. This includes viewing and editing the
Citect.INI file, running the Computer Setup Wizard, creating alarm groups, trend
groups, and launching the Menu Configuration tool.
l Citect Kernel: Launches the various components of the Citect Kernel, allowing the
system to be debugged from within the runtime environment.
l System / Hardware: I/O Device Stats launches a dialog displaying I/O Device sta-
tistics. The Next and Previous buttons allow you to step through the I/O Devices con-
nected to the system, while the Search button allows you to view statistics for a
particular device.
The Tag Debug tool allows you to browse a list of available tags and read the current
value for a selected tag. Depending on your access privileges, you may also be able to
write a new value to the tag.
The right-hand side of this page displays statistics about the CitectSCADA system:
l System Information: Provides details of the CPU usage, memory usage and available
disk space for the current runtime machine.
l Citect Information: Provides information about the CitectSCADA system including
version information and the number of trend, alarm and report clients currently con-
nected
l I/O Server: Provides information about the status of the CitectSCADA I/O Server your
system is connected to. The name of the I/O Server machine appears in the title bar of
this panel. The information displayed includes:
l Average: Overall average response time (ms).
l Maximum - the overall maximum response time (ms)
l Minimum: Overall minimum response time (ms).
l Read Request: Total read requests per second.
l Read Physical: Total physical read requests per second.
l Write Request: Total write requests per second.
l Write Physical: Total physical write requests per second.
l Reset button:lclears the current values and recalculates them.
Common Toolbars
Pages in the CSV_Include project include common toolbars for easy navigation and fea-
ture access, as well as a consistent appearance.
The following three toolbars remain on screen during operation:
1329
Chapter 52: Using Pages and Templates
l Navigation toolbar: Provides navigation buttons and direct access to key pages such
as the Trends page and Admin Tools page.
l Alarm toolbar: Provides access to Alarms pages and displays the last three active
alarms.
l Custom Menus toolbar: Provides menus capable of navigating to a specific page or
calling a Cicode function. The content of the menus is generated at runtime using a
lookup table.
See Also
Navigation Toolbar
Alarms Toolbar
Creating Custom Menus
Navigation Toolbar
The Navigation toolbar includes buttons that allow the user to move between a project's
pages. If the current user has insufficient privilege or there is no option configured for a
particular button, it is unavailable to the user.
1330
Chapter 52: Using Pages and Templates
1331
Chapter 52: Using Pages and Templates
See Also
Alarms Toolbar
Creating Custom Menus
Alarms Toolbar
The alarms toolbar provides access to current alarm information and navigation buttons
for single-click access to alarm pages. It also includes standard CitectSCADA prompt
and current date and time.
n/a Last The center panel of the toolbar displays the last three alarms trig-
Alarms gered within the system, providing the operator with an immediate
visual cue to alarm occurrences.
You can modify the format of this list and control which alarms
appear. For example, you can set the list to only display alarms of a
1332
Chapter 52: Using Pages and Templates
Active Changes the display to the active alarms page, CSV_Alarm. This
Alarms button is animated and will blink when there is an unac-
knowledged alarm in the system. This action performed by this
button is determined by the parameter [Navigation]AlarmPage.
Alarm Silences the audible alarm buzzer that sounds when an alarm
Silenc- occurs. See Implementing Audible Alarms.
e
See Also
Creating Custom Menus
1333
Chapter 52: Using Pages and Templates
1334
Chapter 53: Creating a New Project
Creating a project based on the CSV_Include project is simple; by default, it is incor-
porated as an included project in new projects. This means whenever you start a new
project, the CSV_Include pages and templates are ready to use as necessary.
To make it easier to configure a project based on the CSV_Include project, follow these
steps:
1. Create a privileged user; see Creating a Privileged User.
2. Run the Computer Setup Wizard; see Running the Computer Setup Wizard.
3. Set up instant trending; see Setting Up Instant Trending.
4. Set up multiple monitor display; see Displaying a Project on Multiple Monitors.
5. Implement audible alarms; see Implementing Audible Alarms.
Don't modify the CSV_Include project for use as a runtime project; set it aside for use as
a template for new projects.
If creating a project based on the CSV_Include templates, don't include pages based on
templates that use a different style, including the earlier Include project. Doing so might
affect functionality.
See Also
Creating Pages
1335
Chapter 53: Creating a New Project
When configuring a CSV_Include project, check that your users have appropriate access
to the available functionality. Verify that your users can acknowledge alarms if nec-
essary, and that they have access to the full functionality of the Admin Tools page.
To adjust the global privileges for the elements previously listed for a more complex
security architecture, adjust the [Privilege] parameters in the Citect.ini file. Click the rel-
evant link in the previous table above for details.
See Also
Running the Computer Setup Wizard
1336
Chapter 53: Creating a New Project
1337
Chapter 53: Creating a New Project
clash with other application functionality. To change the key sequence for this fea-
ture, see the parameter[TrendX]KeySeq.
See Also
Trend Page Templates
1. Verify that the alarms you want to trigger an audible alert are assigned to a category
and given a particular priority.
2. Adjust the parameter [Alarm]Soundn. This parameter determines the wav file used
when an alarm sounds, based on the priority of the alarm (n). For example, [Alarm]
Sound1 identifies the .wav file that will be sounded whenever a priority 1 alarm is trig-
gered.
3. If necessary, adjust the parameter [Alarm]SoundnInterval. This parameter determines
how long the selected wav file sounds, based on the priority of the alarm (n). For
1338
Chapter 53: Creating a New Project
Creating Pages
When considering the pages necessary for your project, first determine if you can use
any of the predefined pages in the CSV_Include project:
CSV_Trend Default 8-pen Trend page, called from the Trend button on the Navi-
gation toolbar.
CSV_Admin- Admin Tools page, called from the Tools button on the Navigation tool-
Tools bar.
There are also several pages that are accommodated by the Navigation toolbar that
you'll need to create if necessary. Decide if the following pages would be useful in your
project and create them using the appropriate name:
Page Description
name
1339
Chapter 53: Creating a New Project
Network Called from the Network button on the Navigation toolbar. This button does
not display if a page called "Network" does not exist.
The links between the pages listed and the buttons that call them are defined by the
[Navigation] parameter settings within the Citect.ini file. If you want a button to call a
page with a different name, adjust these parameter settings. For details see "CSV Include
Parameters" in the CitectSCADA Technical Reference.
Note: If you try to launch a CSV template from within Citect Explorer, you need to
drill down to [Project Name]/Graphics/Templates/csv_xp_01/XGA to locate it.
The CSV_Include project can add rollover buttons to pages without drawing and con-
figuring multiple elements. You can add text to a page that has a button appear behind
it whenever the cursor passes by adding the function DspButtonRollOver() to a button's
visibility property. No arguments are necessary.
See Also
Adding user assistance to a page
1340
Chapter 53: Creating a New Project
Once you have created a .CHM file, it is recommended you place it in the project direc-
tory.
To configure the help button for a project page
SetTopic:<PageName>
where <PageName> is the name of the page included in your CitectSCADA project. Do
not include a space after the colon.
5. In the Value field, identify the associated HTML Help file and topic using the fol-
lowing format:
<HelpFileName>|<HTMLPageName>
where:
l <HelpFileName> is the name of the compiled HTML Help file you've created
(for example MyHelpFile.chm)
l <HTMLPageName> is the name of the compiled HTML page you'd like dis-
played as a help topic (for example Help_Topic.html).
6. If necessary, add a Comment.
7. Click Add.
The help button will now launch the identified HTML file with the selected topic show-
ing.
To disable the help button for a project page
SetTopic:<PageName>
1341
Chapter 53: Creating a New Project
where <PageName> is the name of the page included in your CitectSCADA project. Do
not include a space after the colon.
5. In the Value field, type in DISABLED.
6. If necessary, add a Comment.
7. Click Add.
The help button on the identified page will now be unavailable during runtime.
See Also
Using Pages and Templates
Page The page field is defined as either "Generic", or the name of a page within
the project. Generic specifies that the menu is associated with every page, a
specific page name indicates the menus that will appear just on that par-
ticular page.
1342
Chapter 53: Creating a New Project
Sub- Submenus that appear in a menu (optional). Adding a sub menu auto-
menu matically removes the action defined for the menu item it is branched from,
as the parent becomes a placeholder for the list of sub menus.
The Menu Names that appear are the five defaults: Pages, Trends, Alarms, File and
Tools.
The fields you can expect to see associated with an item, as defined in the DBF table, are
as follows:
Action Either the name of the page to display or a Cicode function. If specifying a
Cicode function, it needs to be prefixed by a question mark ("?"). To invoke a
Cicode function that has arguments from the Menu System, use the following
format: function name, space, comma-separated list of string arguments. For
example, ?LoadPav dP45.pav.
Dis- Indicates if the item is currently disabled (embossed). For example, if the cur-
abled rent login does not meet the necessary privilege set for the item (see above),
this field will be set to True and the menu item will appear embossed to indi-
cate its currently not active.
Check- Indicates if the menu item is currently checked (with a tick). True indicates
ed
See Also
Building custom menus
1343
Chapter 53: Creating a New Project
Edit Item Available when an Item is selected. This option displays the
Edit Item dialog, which allows you to define the fields asso-
ciated with the current Item. In particular, it allows you to
specify the action associated with the item. (See Editing an
item)
New Page Adds a new page to the menu configuration. Use this option
to create new custom menus designed specifically for a par-
ticular page in your project. The name you give the new page
in the menu configuration needs to be identical to the name of
the page in your project that you want the menus to be
applied to.
New Sub Item Adds a sub item to the currently selected item. A subitem
overwrites the action configured for its parent item. The par-
ent item becomes a label identifying the list of Sub Items
assigned to it.
Delete Page Deletes the currently selected Page from the menu con-
figuration.
Delete Button Deletes the currently selected Menu Button from the menu
configuration.
Delete Item Deletes the currently selected Item from the menu con-
figuration.
Delete Sub Item Deletes the currently selected Sub Item from the menu con-
figuration.
Copy page Copies the currently selected page and pastes it to the end of
the menu configuration. This option is useful if you want a
page to include the generic page menu configuration, but
with additional menus that only appear when the particular
page is displayed. To do this, copy the generic page, rename
it to match the page you want to customize the menus for,
then add the necessary menus and items.
Editing an item
You configure a menu item's functionality by using the Edit Item Menu dialog.
1344
Chapter 53: Creating a New Project
Use this dialog to identify the action an item will trigger, be it navigation to a specific
page, or execution a function. To launch this dialog, right-click the item to configure and
choose Edit Item from the menu.
fill out the fields as follows:
Action Indicates the name of the page to display, or a Cicode function. If specifying a
Cicode function, it needs to be prefixed by a question mark ("?").
Priv- The login privilege necessary to trigger the action. Only users with appro-
ilege priate access privileges will be able to use this item.
Check- Leave this set to False unless you want the item checked by default.
ed
But- Leave this set to zero (0) as this sets the menu button to the appropriate
ton width. To set a specific width for the button, input the width in pixels.
Width
See Also
Common Toolbars
1. Go to the Admin Tools page of a runtime project by clicking the Tools button.
2. Select Configure an Alarm Group from the Citect Configuration panel. The Configure
Alarm Groups dialog appears.
1345
Chapter 53: Creating a New Project
3. In the Alarm Group Description box, type the name you want to use to identify the
group.
4. In the Categories box, list the alarm categories configured in the CitectSCADA run-
time project that you want to use to define the group.
5. In the Area box, type the areas defined in the CitectSCADA project you want to use to
define the group.
6. Click Add.
The information to the right of the dialog indicates how many alarm groups are con-
figured and where you are currently positioned in this list. You can scroll through the
list of configured groups by using the up and down arrows.
To change a group, locate it in the list, change it as appropriate, then click Replace.
See Also
Creating a Trends Group
1. Click Tools.
2. Select Configure a Trend Group from the Citect Configuration panel. The Configure
Trend Groups dialog appears.
3. In the Description text box, type the name you want to use to identify the group.
4. In the Trend Pen text boxes, select the eight variable tags you want the group to
trend. Click the button on the right of each field to view the available tags within the
CitectSCADA runtime project.
5. In the Area text box, type the areas defined in the CitectSCADA project you want to
use to define the group.
6. Click Add.
The information to the right of the dialog indicates how many trend groups are con-
figured and where you are currently positioned in this list. You can scroll through the
list of configured groups by using the up and down arrows.
1346
Chapter 53: Creating a New Project
To change a group, locate it in the list of groups or browse to it using the selection but-
ton to the right of the Description text box, make the necessary changes, then click
Replace.
See Also
Creating an Alarms Group
Note: With the standard CSV_Include trend pages, you can print the screen using
the standard Print button, or plot the trend using the Trend Plot button. give the user
both alternatives as they both serve different purposes.
1347
Chapter 53: Creating a New Project
1348
Glossary
1
10base2
Ethernet implementation on thin coaxial cable. Typically uses a BNC connection.
10base5
Ethernet implementation on thick coaxial cable.
10baseT
Ethernet implementation on unshielded twisted pair. Typically uses as RJ45 connection.
A
Accredited - Level 1
Drivers developed under the CiTDriversQA96 Driver Quality and Accreditation System, which
ensures the driver was designed, coded, and tested to the highest possible standards.
Accredited - Level 2
Drivers developed using the CiTDriversQA92 Driver Quality and Accreditation System.
accumulator
A facility that allows you to track incremental runtime data such as motor run hours, power con-
sumption, and downtime.
active alarm
An active alarm is an alarm in one of the following states: ON and unacknowledged; ON and
acknowledged; OFF and unacknowledged.
advanced alarm
Triggered when the result of a Cicode expression changes to true. Use advanced alarms only when
alarm functionality cannot be obtained with the other alarm types. If you configure too many
advanced alarms, your system performance can be affected.
alarm categories
You can assign each alarm to a category, and then process each category as a group. For example, for
each category, you can specify the display characteristics, the action to be taken when an alarm in the
1349
Glossary
category is triggered, and how data about the alarm is logged. You can also assign a priority to the
category, which can be used to order alarm displays, filter acknowledgments, and so on.
Alarms Server
Monitors all alarms and displays an alarm on the appropriate control client(s) when an alarm con-
dition becomes active.
analog alarms
Triggered when an analog variable reaches a specified value. supports four types of analog alarms:
high and high high alarms; low and low low alarms; deviation alarms; and rate of change alarms.
animation point
The points on a graphics page where an object displays. When you add an object to your page, auto-
matically allocates a number (AN) to the animation point, (i.e., the location of the object).
area
A large application can be visualized as a series of discrete sections or areas. Areas can be defined
geographically (where parts of the plant are separated by vast distances) or logically (as discrete proc-
esses or individual tasks).
arguments
Values (or variables) passed in a key sequence to a keyboard command in runtime (as operator
input). Arguments can also be the values (or variables) passed to a Cicode function when it executes.
Association
An association is the name or number you use when defining a Super Genie substitution, the value
or values of which are dynamically generated at runtime.
1350
Glossary
B
baud rate
The number of times per second a signal changes in a communication channel. While the baud rate
directly affects the speed of data transmission, the term is often erroneously used to describe the data
transfer rate. The correct measure for the data rate is bits per second (bps).
bottleneck
A bottleneck occurs when too many requests are being sent to a PLC communication link/data high-
way. It can occur with all types of protocols, and is dependent on several factors, including the
frequency of requests, the number of duplicated (and hence wasteful) requests, whether the protocol
supports multiple outstanding requests, as well as other network traffic.
browse sequence
A series of graphics pages linked by a browse sequence, which is a linear navigation sequence within
your runtime system that uses Page Previous and Page Next commands.
C
cache (I/O device data cache)
When caching is enabled, all data read from a I/O device is stored temporarily in the memory of the
I/O server. If another request is made (from the same or another control client) for the same data
1351
Glossary
within the cache time, the I/O server returns the value in its memory, rather than read the I/O device
a second time.
callback function
A function that is passed as an argument in another function. Callback functions must be user-
written functions.
Cicode
Programming language designed for plant monitoring and control applications. Similar to languages
such as Pascal.
CiNet
CiNet is no longer supported. CiNet was designed as a low speed wide area network (for remote mon-
itoring applications). If you have a widely-distributed application where computers are separated by
vast distances, using a LAN to connect your control clients can be expensive. To connect control
clients in this instance, use Microsoft's remote access server (RAS) or a Microsoft-approved solution,
such as Shiva LanRover.
citect.ini file
A text file that stores information about how each computer (servers and control clients) operates in
the configuration and runtime environments. The Citect.INI file stores parameters specific to each
computer and therefore cannot be configured as part of the project.
CiUSAFE
CiUSAFE is the application used to manage the hardware key that authorizes use of your software
within the agreed limitations.
client
A computer that accesses shared network resources provided by another computer called a server. 's
client-server based architecture is designed to distribute the processing tasks and optimize per-
formance.
cluster
A discrete group of alarms servers, trends servers, reports servers, and I/O servers. It would usually
also possess local control clients. For a plant comprising several individual sections or systems, mul-
tiple clusters can be used, one cluster for each section.
command
A command performs a particular task or series of tasks in your runtime system. A command is built
from Cicode and can consist of just a function or a statement.
1352
Glossary
communications link
A connection between computers and peripheral devices, enabling data transfer. A communications
link can be a network, a modem, or simply a cable. .
communications port
PC port used for sending and receiving serial data (also called serial or COM ports).
computer
A computer running . Other common industry terms for this computer could be node, machine or
workstation.
Control Client
The interface between the runtime system and an operator. If you are using on a network, all com-
puters (on the network) are control clients.
D
data acquisition board
Data acquisition boards communicate directly with field equipment (sensors, controllers, and so on).
You can install a data acquisition board in your server to directly access your field equipment.
data bits
Group of binary digits (bits) used to represent a single character of data in asynchronous trans-
mission.
data transfer
Transfer of information from one location to another. The speed of data transfer is measured in bits
per second (bps).
1353
Glossary
DB-15
Often called a `D' type connector due to the vague D shape of the casing. Has 15 pins arranged in
two rows of 8 and 7 pins. While not as common as DB-9 or DB-25 they may be found on some com-
puters and data communication equipment. Comes in both male (pins protruding) and female (pin
sockets) configurations.
DB-25
Often called a `D' type connector due to the vague D shape of the casing. Has 25 pins arranged in
two rows of 13 and 12 pins. This kind of connection is a part of the standard for RS-232-D and is
found on many computers, modems and other data communication equipment. Comes in both male
(pins protruding) and female (pin sockets) configurations.
DB-9
Often called a `D' type connector due to the vague D shape of the casing. Has 9 pins arranged in two
rows of 5 and 4 pins. This kind of connection is common and is often used as the serial (com) port in
computers. Often used in modems and other data communication equipment. Comes in both male
(pins protruding) and female (pin sockets) configurations.
DDE
dynamic data exchange
debug.log
The debug.log file stores information about an unexpected system shut down or other internal issues.
If an unexpected shutdown occurs, it will identify the version and path of each DLL being used at
the time.
deviation alarm
Triggered when the value of a variable deviates from a setpoint by a specified amount. The alarm
remains active until the value of the variable falls (or rises) to the value of the deadband. .
dial-back modem
Only returns calls from remote I/O devices.
dial-in modem
Only receives calls from remote I/O devices, identifies the caller, then hangs up immediately so it can
receive other calls. then returns the call using a dial-back modem.
1354
Glossary
dial-out modem
Makes calls to remote I/O devices in response to a request; e.g., scheduled, event-based, operator
request, and so on. Also returns calls from remote I/O devices.
Digiboard
A high-speed serial board manufactured by the Digiboard Corporation.
digital alarms
Triggered by a state change in a digital variable. Use these alarms when a process has only one of
two states. You can use either the on (1) state or off (0) state (of a digital variable) to trigger the alarm.
display period
Defines the rate at which trend data is displayed on the trend page.
distributed processing
For large applications with large amounts of data, you can distribute the data processing to reduce
the load on individual computers.
distributed servers
If your plant consists several sections or systems, you can assign a cluster to each individual section,
and then monitor all sections using one control client.Note: Don't use distributed servers to split up a
single section or process into discrete areas. A single cluster system with distributed processing
would be better used here since it would not be hampered by the maintenance overhead of a dis-
tributed server system (such as extra project compilations, and so on).
dot notation
Used for Internet addresses. Dot notation consists of four fields (called octets), each containing a dec-
imal number between 0 and 255 and separated by a full stop (.).
1355
Glossary
driver
A driver is used to communicate with control and monitoring devices, allowing the run-time system
to interact directly with different types of equipment. Communication with an I/O device requires a
device driver which implements the communication protocol(s).
driver logs
Driver logs relate to the operation of a particular driver and are named accordingly. For example, the
OPC driver is logged in 'OPC.dat'.
duplex
The ability to send and receive data over the same communication line.
E
empty value
Indicates that the variant has not yet been initialized (assigned a value). Variants that are empty
return a VarType of 0. Variables containing zero-length strings (" ") aren't empty, nor are numeric var-
iables having a value of 0.
Equipment States
Determine the action that the item or group of equipment will take at the scheduled time.
Ethernet
Widely used type of local area network based on the CSMA/CD bus access method (IEEE 802.3).
event trend/SPC
To construct an event trend/SPC, takes a sample when a particular event is triggered (in the plant).
This sample is displayed in the window. The event must then reset and trigger again, before the next
sample is taken. Events are identified by the event number. .
1356
Glossary
expression
A statement (or group of statements) that returns a value. An expression can be a single variable, a
mathematical formula, or a function.
F
Field element
The latest tag field data received from a device.
file server
A computer with a large data storage capacity dedicated to file storage and accessed by other client
computers via a network. On larger networks, the file server runs a special network operating system.
On smaller installations, the file server may run a PC operating system supplemented by peer-to-peer
networking software.
full duplex
Simultaneous two-way (in both directions) independent transmission (4 Wires).
G
generic protocol
A pseudo-protocol supported by disk I/O devices that provides a convenient way to represent disk
data. The generic protocol is not a real protocol (communicates with no physical I/O device).
Genie
If you have numerous devices of the same type (e.g., 100 centrifugal pumps), the display graphics for
each will behave in much the same way. Using Genies, you only have to configure common behav-
ior once. The graphics can then be saved as a Genie and pasted once for each device.
global client
A control client used to monitor information from several systems or sections (using clusters).
graphics page
A drawing (or image) that appears on a workstation to provide operators with control of a plant, and
display a visual representation of conditions within the plant.
1357
Glossary
H
half duplex
Transmission in either direction, but not simultaneously.
hardware alarm
A hardware alarm indicates that an error has been detected in your system. Typically displayed on a
dedicated hardware alarms page, this type of alarm may indicate that a loss of communication has
occurred, that Cicode can not execute, that a graphics page is not updating correctly, or that a server
has become inoperative. A description and error code are provided to help decipher the cause of the
problem.
histogram
A bar graph that shows frequency of occurrence versus value. Quite often the data is fitted to a dis-
tribution such as a normal distribution. .
historize
To archive historical data for a variable for the purpose of future analysis. This is achieved through
integration with Schneider Electric's Historian application.
I
I/O Device
An item of equipment that communicates with plant-floor control or monitoring equipment (sensors,
controllers, and so on). The most common I/O devices are PLCs (programmable logic controllers);
however, supports a wide range of I/O devices, including loop controllers, bar code readers, scientific
analyzers, remote terminal units (RTUs), and distributed control systems (DCS). can communicate
with any I/O device that has a standard communications channel or data highway.
1358
Glossary
their register addresses. I/O devices usually support several types of variables; however, the most
common are digital variables and integer variables.
I/O server
A dedicated communications server that exchanges data between I/O devices and control clients. No
data processing is performed by the I/O server (except for its local display). Data is collected and
passed to the control clients for display, or to another server for further processing. All data sent to
an I/O device from any computer is also channelled through the I/O server. If data traffic is heavy,
you can use several I/O servers to balance the load.
imestamp (T)
The timestamp of when the element was last updated on a tag extension.
interrupt
An external event indicating that the CPU should suspend its current task to service a designated
activity.
IP address
A unique logical address used by the Internet Protocol (IP). Contains a network and host ID. The for-
mat is called dotted decimal notation, and is written in the form: w.x.y.z.
1359
Glossary
K
Kernel
The Kernel allows you to perform low-level diagnostic and debugging operations for runtime anal-
ysis of your system. A set of diagnostic windows display low-level data structures, runtime data-
bases, statistics, debug traces, network traffic, I/O device traffic and so on.
keyboard command
Consist of a key sequence that an operator enters on the keyboard, and an instruction (or series of
instructions) that executes when the key sequence is entered. Keyboard commands can be assigned to
an object or page, or they can be project-wide.
knowledge base
Provides high-level technical information beyond the scope of standard technical documentation that
is updated regularly and available at http://www.citect.com.
kurtosis
An index indicating the degree of peakedness of a frequency distribution (usually in relation to a nor-
mal distribution). Kurtosis < 3 indicates a thin distribution with a relatively high peak. Kurtosis > 3
indicates a distribution that is wide and flat topped.
L
language database
When a project is compiled, creates a language database (dBASE III format) consisting of two fields:
native and local. Any text marked with a language change indicator is automatically entered in the
native field. You can then open the database and enter the translated text in the local field.
link
A copy of a library item, possessing the properties of the library original. Because it is linked, the
copy is updated whenever the original is changed.
1360
Glossary
local language
The language of the end user. Runtime display items such as alarm descriptions, button text, key-
board/alarm logs, graphic text, Cicode strings and so on can be displayed in the local language, even
though they may have been configured in the language of the developer (native language).
local variable
Local variables allow you to store data in memory when you start your runtime system. They are
created each time the system starts, and therefore do not retain their values when you shut down.
log files
Log files are a record of time-stamped system data that can be analyzed to determine the cause of a
problem. The available log files include syslog.dat, tracelog.dat, debug.log, kernel.dat, and dedicated
driver logs.
M
maximum request length
The maximum number of data bits that can be read from the I/O device in a single request. For exam-
ple, if the maximum request length is 2048 bits, the maximum number of integers that can be read is:
2048/16 = 128.
Metadata
Metadata is a list of names with corresponding values that is attached to an objects animation point.
millisecond trending
Allows you to use a trends sample period of less than one second.
mimic
A visual representation of a production system using an organised set of graphical pages. .
1361
Glossary
multi-digital alarms
Use combinations of values from three digital variables to define eight states. For each state, you spec-
ify a description (e.g., healthy or stopped), and whether or not the state triggers an alarm.
N
native language
Generally the language of the project developer. Display items such as alarm descriptions, button
text, keyboard/alarm logs, graphic text, Cicode strings and so on can be configured in the native lan-
guage, and displayed, at runtime, in the language of the end-user (local language).
network
A group of computers and peripheral devices, connected through a communications link. Data and
services (e.g., printers, file servers, and modems) can be shared by computers on the network. A local
network of PCs is called a LAN.
network computer
A computer running that is connected to a LAN through a network adaptor card and network soft-
ware. .
nodes
A structural anchor point for a graphic object, usually visible as a small square box superimposed
over a graphic. Nodes will be located separately at the start, at the end, and at every change in direc-
tion within a graphic object. .
normal distribution
Also known as a `bell' curve, the normal distribution is the best known and widely applicable dis-
tribution. The distribution is symmetrical and popularly represents the laws of chance. 68.27% of the
area lies between -1 sigma and +1 sigma, 95.45% between -2 sigma and+2 sigma, and 99.73%
1362
Glossary
between -3 sigma and +3 sigma. The values of skewness and kurtosis are used to provide quan-
titative measures for normality. Assuming that at least 20 samples are used to construct a dis-
tribution, a good rule of thumb is to accept the data as a normal distribution when, -1.0 = skewness =
1.0 2 = kurtosis = 4.
null value
Indicates that a variant contains no valid data. Variants that are null return a VarType of 1. Null is
not the same as empty, which indicates that a variant has not yet been initialized. It is also not the
same as a zero-length string (" "), which is sometimes referred to as a null string. Null is not equiv-
alent to zero or blank. A value of null is not considered to be greater than, less than, or equivalent to
any other value, including another value of null. A boolean comparison using a null value will
return false.
O
object
Basic building blocks of a graphics page. Most objects possess properties that allow them to change
dynamically under user-definable runtime conditions allowing them to provide animated display of
conditions within the plant.
object ID (OID)
An object ID associated with every tag in a project that uniquely identifies the tag for use by tag-
based drivers, automatically generated at compile. It is used instead of the actual address of the reg-
ister (which is what most other drivers use to read from and write to I/O devices).
ODBC
Open Data Base Connectivity
OLE
Object Linking and Embedding (OLE) is a Microsoft technology that can be used to create customized
user interface elements.
OPC
OLE for Process Control (OPC) is a set of communications standards maintained by the OPC Foun-
dation for the industrial automation industry.
OPC DA
OPC Data Access (OPC DA) is a set of specifications designed to support the communication of real
time data across client/server architectures.
1363
Glossary
OPC item
An OPC item represents the connection to a data source within a server (for example, a variable tag
in a SCADA system).
override mode
A state where an invalid tag quality value is overridden by a manually added value.
P
pack
Packing a database re-indexes database records and deletes records marked for deletion. If you edit
your databases externally to , you should pack the database afterwards.
parity
A communications error-checking procedure. The number of 1's must be the same (even or odd) for
each group of bits transmitted without error.
periodic trend
A trend that is sampled continuously at a specified period. You can also define a trigger (an event) to
stop and start the trend (when a specified condition occurs in the plant).
persistence cache
Cache data saved to a computer hard disk that allows an I/O server to be shut down and restarted
without having to re-dial each I/O device to get its current values. This cache consists of all the I/O
device's tag values.
point limit
An individual digital (or analog) variable read from an I/O device. only counts physical points (and
counts them only once, no matter how many times they are used). The point limit is the maximum
1364
Glossary
number of I/O device addresses that can be read and is specified by your license. When you run the
point count of your project is checked against the point limit specified by your Hardware Key.
port(s)
Provide the communication gateway to your I/O device(s).
Privileges
Level of access applied to system elements within your project. A user assigned a role that possesses
the matching privilege can control it.
project
The elements of a monitoring and control system, such as graphics pages, objects, and so on. These
elements are stored in files of various types; for example, graphics files for graphics pages, databases
for configuration records, and so on. You use the compiler to compile the project into a runtime sys-
tem.
properties, object
Describes the appearance of an object (size, location, color, and so on.) and its function (the command
or expression executed by the object, the privilege required to gain access to the object, and so on).
protocol
Messaging format consisting of a set of messages and guidelines used for communication between
the server and an I/O device. The communication protocol determines how and the I/O device com-
municate; the type of data to exchange; rules governing communication initiation and termination;
and error detection.
proxi/proxy server
Caches internet transactions to improve performance by reducing the average transaction times by
storing query and retrieved information for re-use when the same request is made again. When an
Internet display client (IDC) connects to a proxy server, that server provides the TCP/IP addresses nec-
essary to access report server session information.
PSTN
A public switched telephone network is the network of all the world's public switched telephone net-
works. It is now primarily digital and includes mobile as well as fixed telephones.
1365
Glossary
Q
qualified tag reference
Referencing tag data by using the tag name, element name and the item name.
Quality (Q)
The quality of the value of a tag extension.
QualityTimestamp (QT)
The timestamp of when the quality last changed on a tag extension
R
rate of change alarms
Triggered when the value of the variable changes faster than a specified rate. The alarm remains
active until the rate of change falls below the specified rate. Deadband does not apply to a rate of
change alarm.
record name
Usually the primary property of a database record, referenced in system through its name. Database
record names must be unique for each type of database record. Sometimes you can use identical
names for different record types. However, to avoid confusion, you should use a unique name for
each database record in your application.When you specify a name for a database record, the name
must begin with an alphabetic character (A-Z, a-z) and cn only include alphanumeric characters (A-
Z, a-z, 0-9) and the underscore character (_). For example, "Pressure," "Motor_10," and "SV122_Open"
are all valid database record names. Each database record name can contain up to 16 char-
acters.Database record names are not case-sensitive, so "MOTOR_1," "Motor_1" and "motor_1" are all
identical database record names. For this reason use a meaningful name for any database record as
well as the necessary naming conventions.
redundancy
A method of using the hardware in a system such that if one component in the system becomes
inoperative, control of the system is maintained, and no data is lost.
1366
Glossary
remote communications
Interaction between two computers through a modem and telephone line.
remote terminal
A terminal remote from the computer that controls it. The computer and remote terminal com-
municate via a modem and telephone line.
report
A statement or account of plant-floor conditions. reports can be requested when required, on a peri-
odic basis, or when an event occurs.
Reports Server
Controls report processing. You can request reports at any time or when specific events occur.
reserved words
Words that cannot be used as a name for any database record or Cicode function.
RJ11
A type of IDC plug commonly used in data communications. Recognizable as the style of data plug
used in phone line and handset connectors. RJ11 is a 6/4 plug with 6 contacts but only 4 loaded.
RJ12
A type of IDC plug commonly used in data communications. Recognizable as the style of data plug
used in phone line and handset connectors. RJ12 is a 6/6 plug with 6 contacts.
RJ45
A type of IDC plug commonly used in data communications. Recognizable as the style of data plug
used in phone line and handset connectors. RJ45 is often used with 10baseT and is an 6/8 plug with
8 contacts.
Roles
A defined set of permissions (privileges and areas) that are assigned to users.
RS-232
An industry standard for serial communication. The standard specifies the lines and signal char-
acteristics that are used to control the serial transfer of data between devices.
RS-422
An industry standard for serial communication. The standard specifies the lines and signal char-
acteristics that are used to control the serial transfer of data between devices. RS-422 uses balanced
1367
Glossary
RS-485
An industry standard for serial communication. The standard specifies the lines and signal char-
acteristics that are used to control the serial transfer of data between devices. RS-485 uses balanced
voltage interface circuits in multi-point systems.
runtime system
The system that controls and monitors your application, process, or plant. The runtime system is
sometimes called the Man-Machine Interface (MMI), and is compiled from a project.
S
scalable architecture
A system architecture that can be resized without having to modify existing system hardware or soft-
ware. lets you re-allocate tasks as more computers are added, as well as distribute the processing
load.
schedule period
Determines how often the I/O server contacts a scheduled I/O device to read data from it. .
serial communication
Uses the communication port on your computer or a high speed serial board (or boards) installed
inside your computer.
server
A computer connected to an I/O device (or number of I/O devices). When is running, the server
exchanges data with the I/O device(s) and distributes information to the other control clients as
required. A local area network (LAN) computer that perform processing tasks or makes resources
available to other client computers. In , client-server architecture distributes processing tasks to opti-
mize performance.
simplex transmission
Data transmission in one direction only.
skewness
An index indicating the degree of asymmetry of a frequency distribution (usually in relation to a nor-
mal distribution). When a distribution is skewed to the left (for example), then the tail is extended on
that side, and there is more data on the left side of the graph than would be expected from a normal
distribution. Positive skew indicates the distribution's mean (and tail) is skewed to the right. Neg-
ative skew indicates the distribution's mean (and tail) is skewed to the left.
1368
Glossary
slider control
Allow an operator to change the value of an analog variable by dragging an object (or group) on the
graphics page. Sliders also move automatically to reflect the value of the variable tag.
soft PLC
A pure software (virtual) PLC created by software and existing only within the computer memory.
Usually provides a software interface for communication (READ and WRITE) operations to take
place with the soft PLC. Also known as a `virtual field unit' or `virtual I/O device'.
software protection
uses a hardware key that plugs into the printer port of your computer to protect against license
infringement. The hardware key contains the details of your user license. When you run , the point
count in your project is checked against the point limit specified in the hardware key.
staleness period
Represents the total number of seconds that will elapse after the last update before extended quality
of the tag element is set to “Stale”.
stop bits
The number of bits that signals the end of a character in asynchronous transmission. The number is
usually 1 or 2. Stop bits are required in asynchronous transmissions because the irregular time gaps
between transmitted characters makes it impossible for the server or I/O device to determine when
the next character should arrive.
substatus value
The underlying details of a QUALITY tag.
Substitution
A Super Genie substitution is comprised of the data type (optional) and association that you use to
define an object or group of object’s properties when creating a Super Genie.
Super Genies
Dynamic pages (usually pop-ups), to which you pass information when the page displays at run-
time. You can use Super Genies for pop-up type controllers (to control a process, or a single piece of
plant floor equipment).
1369
Glossary
symbol
An object (or group of objects) stored in a library for later retrieval and use. By storing common
objects in a library, you reduce the amount of disk space required to store your project, and reduce the
amount of memory required by the run-time system.
syslog.dat
Syslog.dat is the primary log file. It contains useful system information, from low-level driver traffic
and Kernel messages, to user defined messages. Trace options (except some CTAPI traces) are sent to
this file.
T
tag extension
Additional information for a tag that represents data as a collection of elements, and a collection of
items in a tag.
task
Includes operations such as I/O processing, alarm processing, display management, and Cicode
execution. Any individual `instance' of Cicode is also a `task'.
template
A base drawing or time-saving pattern used to shape a graphics page. Each template contains base
information for the page, such as borders and common control buttons. provides templates for all
common page types.
text box
When text is added to a graphics page, it is placed in a text box. A text box has a number of handles,
which can be used to manipulate the text object.
thread
Used to manage simultaneous execution of tasks in multitasking operating systems, enabling the
operating system to determine priorities and schedule CPU access.
timeout
The period of time during which a task must be completed. If the timeout period is reached before a
task completes, the task is terminated.
time-stamped alarms
An alarm triggered by a state change in a digital variable. Time-stamped alarms have an associated
register in the I/O device to record the exact time when the alarm changes to active. Use time-
stamped alarms when you need to know the exact order in which alarms occur.
1370
Glossary
tool tip
A help message that displays in a pop-up window when an operator holds the mouse stationary
over an object.
Touch command
Can be assigned to objects on graphics pages. Touch commands allow you to send commands to the
runtime system by clicking an object.
tracelog.dat
The tracelog.dat file contains managed code logging, mainly in relation to data subscriptions and
updates. Note that field traces and requests to native drivers go to the syslog.dat or a specific driver
log file.
trend
A graphical representation of the changing values of a plant-floor variable (or expression), or a
number of variables. .
trend line
The actual line on a trend that represents the changing values of a plant-floor variable (or expres-
sion). .
trend plot
Consists of a trend (or a number of trends), a title, a comment, scales, times and so on.
Trends Server
Controls the accumulation and logging of trend information. This information provides a current and
historical view of the plant, and can be processed for display on a graphics page or printed in a
report.
1371
Glossary
U
UAC
User Account Control. Security technology introduced in Windows Vista to enable users to run with
standard user rights more easily. .
Users
A person or group of persons that require access to the runtime system
V
Valid element
The last field data which had “Good” quality in a tag extension.
Value (V)
The value of the extension of a tag.
ValueTimestamp (VT)
The timestamp of when the value last changed on a tag extension
view-only client
A computer configured with manager-only access to the runtime system. No control of the system is
possible, but full access to data monitoring is permitted.
virtual
Behavioral identification rather than a physical one. For example, Windows 95 is a virtual desktop.
W
wizard
A facility that simplifies an otherwise complex procedure by presenting the procedure as a series of
simple steps.
1372
Index
alarms
advanced alarm properties 734
A advanced, adding 712
access alarm category properties 752
disabling 686 analog alarm properties 726
object 683 analog, adding 711
properties 684 audible 1338
property 569 tab style templates 1230, 1266
access table, reading data from 976 categories of 752
accumulators 803 debugging hardware 1091
configuring 803 delay 713
properties 803 digital alarm properties 715
action queries, calling 978 digital, adding 710
Active Alarms button 1245, 1332 display order 772
ActiveX Data Objects 93 displaying variable data in 761
ActiveX objects 630 formatting display 759
identifying 634 multi-digital alarm properties 722
managing associated data sources 630 multi-digital, adding 710
adding properties supported as tags 777
new schedule, operator 1150 server redundancy 315
user records 262 setting up 784
address forwarding 1070 time-stamped alarm properties 718
Admin Tools page template 1328 time-stamped analog alarm properties 737
advanced alarms time-stamped analog, adding 712
adding 712 time-stamped digital alarm properties 731
Advanced Security Settings dialog 235 time-stamped digital, adding 712
alarm time-stamped, adding 710
display fields 762 using properties as tags 776
filters 743 writing to properties of 782
page template 1219, 1250, 1256, 1322 alarms group 1345
paging properties 63 Alarms Summary button 1245, 1332
soe fields 766 Alarms toolbar 1245, 1332
summary fields 771 Align dialog box 584
tag name 414 aligning objects 584
Alarm data localization 1022 grids 544
alarm server, troubleshooting 788 guidelines 545
Alarm Silence button 1245, 1332 alternative .ini file 1071
alarm text analog alarms
marking for language change 1013 adding 711
alarming 93 animation point (AN) 546, 586
ANSI character sets 1023
1373
Index
1374
Index
1375
Index
1376
Index
1377
Index
1378
Index
1379
Index
1380
Index
1381
Index
1382
Index
vertical 644
multi-digital alarms O
adding 710 object alignment 584
multi-dropping 401 grids 544
multi-language projects 1011 guidelines 545
multi-process system object properties 566
running independent servers 1069 disable access 686
multi-state objects fill color 659 object types 589
multidrop remote I/O Devices 403 ActiveX 630
multiple language support for Web Client 1193 buttons 614
non-default languages 1195 Cicode 626
multiple monitors, configuring 1026 ellipse 596
multiple monitors, using 1338 free hand line 589
numbers 614
pasted symbol 628
N polygons 601
Named Filters 747
rectangles 592
naming 898
straight line 591
naming standards 180
symbol sets 617
native 58
text 607
native language 1011
trends 623
native security 265
objects 563
navigation toolbar 1330
3D effects 638
nesting Super Genies 1006
access 683, 686
network DDE 961, 965
access properties 684
network DDE shared application 965
access property 569
network DDE shares 963
aligning 584
Network Page button 1331
appearance 566
network redundancy 312
applying effects 637
network redundancy, configuring 313
copying/pasting 582
networked system, restarting 1084
deleting 580
New Example Project 72
fill color 657
New Project dialog box 195
array objects 661
New Style dialog box 521
gradient objects 666
New Time Synchronization Service 64
multi-state 659
Next button 1331
on/off 657
Normal Mode 1155
threshold objects 664
normal page template 1322
fill level 669
normal tab style page template 1216, 1246
fill property 568
NTFS file system 235
grouping 581
numbers (objects) 614
groups 564
numeric variables 429
horizontal movement property 642
input property 568
keyboard commands 676
1383
Index
1384
Index
page table Stats kernel command 1133 posting data using DDE 957
page table Tran kernel command 1134 preconfigured pages 1321
page table Trend.ReloadError kernel preconfigured struxureware style pages 1215
command 1137 preconfigured tab style pages 1241
page table users kernel command 1138 prefixes in tag names 415
page templates 518 preparing a project for Web Client
page unit kernel command 1138 deployment 1180
pages 1231, 1267, 1340 Previous button 1331
splash 522 print management 892
startup 522 Print Page button 1332
Pages printer devices 873
Open 114 format 882
pages, preconfigured 1321 printing
pages, preconfigured struxureware style 1215 project details 201
pages, preconfigured tab style 1241 trend data 820
PageTabs Library Control Genie 1287 privilege hierarchy 258
paging, alarms 63 privilege/area combinations 247, 258
parameter queries 979 privileged user 1228, 1264, 1335
Parent Page button 1331 privileges, using areas with 260
Pareto charts 834 process analyst page template 1224, 1260
Paste to clipboard button 1327 process capability 831
pasted symbol objects 628 process variation 830
pasting objects 582 project restoration and security 265
path definitions 826 Project tag mismatch detected 392
path substitution 825 project upgrades, read-only 238
pause kernel command 1141 projectDBF 981
Pelco 73 projects
performance 382, 1072 backing up 206
Performance Enhancements 74 compiling 1047
periods, specifying for events 799 copying 200
Permission Entry dialog 235 editing properties 197
persisted I/O memory mode 368 hybrid 231
persistence 368 including 212
pipe arrangements 605 multi-language 1011
pipe objects 605 printing details 201
Plot trend button 1327 read-only 235
plots, in reports 862 restoring 211
point count, independent 147 projects, creating 1227, 1263, 1335
polygon objects 601 properties
polygon properties 602 3D effects 638
polylines, drawing 601 ellipses 597
ports properties 349 fill level 669
post compile commands 75 font 773
1385
Index
1386
Index
1387
Index
sizing substitutions
graphics pages 523 defining for Super Genies 993
objects by scaling 650 path 825
slider property 568 string 871
sliders 678, 682 summary display, alarms 772
Snap to Grid command 544 Super Genies
SOE areas 1006
events, alarm 790 arrays and 1004
software licensing 95, 145 arrays offsets 1005
software update 97 associations 1007
span markers 1326 associations for 994
spc page template 1225, 1261 constants and 1004
Special Days nesting 1006
Engineer 1156 substitutions for 993
Operator 1156 support 33
specifying supported methods 1044
schedule 409 suppressing reports 865
search coverage 221 Swap Color dialog box 552
splash page 522 symbol set objects 617
SQL database devices 873 symbols 557
format 884 syntax, ODBC 969
SQL databases 938 syslog format 1095
squares, drawing 592 syslog kernel command 1142
starter project 1227, 1263 system
starting network DDE services 961 running a 1068
startup configuration 1069, 1087 system tuning 1072
startup page 522
state properties 1168 T
states tab menus, default 1242
equipment 1165 tables, displaying, in alarms 761
statistical control 831 Tabs genie library control 1294
statistical process control (SPC) 829 tag
stats kernel command 1141 controlling 456, 458
storage method, trend data 823 element 441
storage, calculating disk 823 naming 414
straight line objects 591 overriding 456, 458
straight line properties 591 tag-based driver data validation 392
STRING 420 tag browser
string arrays 434 FastLinx for Mitsubishi 469
string substitution 871 OPC Data Access Server 474
structured query language (SQL) 939 tag browsing 438-441
commands 945 tag data types 420
times and dates 946 tag database, connecting to 956
structured tag names 415
1388
Index
1389
Index
1390
Index
W
web-based help 72
Web Client 1177
configuring a deployment 1184
creating a deployment 1185
default languages 1193
deleting a deployment 1192
deploying a project 1187
displaying a deployment 1190
editing a deployment 1191
frequently asked questions 1198
functionality limitations 1181
getting started 1179
implementing non-default langauges 1195
introduction 1177
multiple language support 1193
preparing a project for deployment 1180
preparing user files for delivery 1065
setting up a system 1179
system architecture 1177
updating a deployment 1192
using a different language to the locale set-
ting 1194
Web Deployment Preparation tool 1183
Web Deployment Preparation tool 1183
Windows security 265
Windows user security 265
Windows Vista compatibility 1069
writing
to alarm properties 782
to I/O Devices 410
writing tags 455
X
XML DataSource Schema 451
XML template, TagGen 478
1391
Index
1392