Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
218 views
115 pages
Alarm Configuration
Uploaded by
Mohamed Amine
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save Alarm Configuration For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
218 views
115 pages
Alarm Configuration
Uploaded by
Mohamed Amine
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save Alarm Configuration For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save Alarm Configuration For Later
You are on page 1
/ 115
Search
Fullscreen
Alarm Configuration About Alarms CIMPLICITY HM! software generates alarms for points that are in an alarm state, It also generates alarm messages about system events, such as device fares, program terminations, system startups, and system shutdowns, To configure or modify alarms for points, use the Configure Poinis function. Use Configure Alarm Definitions to configure alarm definitions for alarms generated bby custom software or to modify alarms for CIMPLICITY HMI system events or product options. Alarm Message Variable Run-time Parameters ‘Variable run-time parameters determine the display of field data, Possible parameters that you can include in an alarm message are Parameter Description %ID Displays the Point ID, AVAL Displays the point value (converted to engineering unis if applicable. %EU Displays the Engineering Units label LIMIT Displays the alarm limit that was exceeded. ‘STATE Displays the alarm string for the String Index. %DEV_ID Displays the Point ID of the deviatioa point. ‘*DEV_VAL Displays the value of the deviation point. ‘*DEV_AMT Displays the difference between the current point value and the eviation point value. Displays an actual percent sign in the message. ‘The contents of each vatiable message field are determined whea the alarm is generated. Note GPE-1180 104Standard Alarms A set of standard event alarms is included in your base configuration. These alarms axe: $ALARM_DISABLED [Alarm is disabled Zor the specified point $ALARM_ENABLED Alarm is enabled forthe specified point $ALARM_MODIFIED Alarms is modified for the specified point. $ALARM_RAWLIM ‘Alam: raw lists modified forthe specified point $ALARM_RESTORED Alarm limits restored forthe specified point $AM_STATUS Alam Management status message used to analyze system performance, This message is issued every half-hour and shows the number of alarms generated, the count of alarms acknowledged, reset and deleted, and the average munber of seconds required to log an alarm. SDEVICE ‘Alarm message for specified device. SDEVICE_DOWN Device failure message for specified device. SDEVICE_FAILOVER Reserved for future use $0L_FILE_FULL Log file full message for specitied log fle SDOWNLOAD Setpoint was downloaded to specified device. SDYN_CFG specified entity has been chenged dynamically $GMR_DEV_DOWN Device down message for Series 90 TCP/IP PLC redundancy. SGMR_POINT_DISCREPANCY , Point discrepancy alarm for Series 90 TCP/IP PLC redundancy. SLOGIN_FAILURE Specified user failed to log in to the specific CIMPLICITY project. CIMPLICITY HMI for Windows NI and Windows 95 User Manual GPK-1120GPK1180 SLOGON Specified user has logged in to a specified CIMPLICITY project, SLOGOUT ‘Specified user has logged out from a specified CIMPLICITY project, SREDUND_DEV_DOWN Alarm message for PLC redundancy, $RTR_LINK_DOWN, Ronter Sink has been lost to specified node. AMSI_ALARM Reserved for future use DB_CONN_DOWN Process has lost connection to specified logging database. DB_START_FORWARD Process is forwarding data to specified logging databese, MCP_PROC_DOWN Specified CIMPLICITY process has terminated unexpectedly, ‘These alarms are not associated with any CIMPLICITY Point IDs. They may be modified, but they should never be deleted Alarm Configuration 1935Configuring Alarms g Alarne 1008 ‘To configure an alarro, double-click the Alarms icon in your project's Configuration Cabinet. Lf you have selected the Display search criteria at startup option, the Alarm Definitions Search dialog box opens. Select the filtering criteria you want, and then select OK to open the Configuration - Alarm Definitions window with the Slered list of alarms. IEyou hove not selected the Display search criteria at startup option, the Configuration - Alarm Definitions window opens with alist ofall configured alarms, Elass/0 "falas Type! ‘SALAPM_DISABLED $378 SPTM_AM @ SALAM “ENABLED SSS SPTM_AM SSS SPTMAM HIGH = $OQFLAL SYS SPTM_AM HIGH $AN_STATUS SYS AMSLALAAM SSYS | SWAC_EVENT 3 $875 sSY5 SOGWNLGAD sSYS Joon: $875 ‘SGMA_DEY_DOWN SYS SEVACPONT_DISCRERANCY {SYS eee ‘The Configuration - Alarm Definitions window always displeys the following for ech alarm: Alarm ID ‘The unique Alarm identifier for each alarm in your configuration In addition io Alarm ID, you can choose to display: Class 1D ‘The Alarm Class in which this alarm will be grouped. Alarm Type The type of alarm format used for this alarm. This field is display only. An Alarm Type will be assigned by CIMPLICITY HMI software to an slarm if it contains variable run-time parameters {eee page 10-1), Description A description of the alarm. Message Fixed text and run-time parameters that are displayed when the lara is generated ‘You can control the amount of data presented, and the order in which itis presented Sclect Attributes... from the View menu, or click Attributes on te Toolbar to open the Configure Display Arributes diaiog box and make your changes CIMPLICITY HMI for Windows NT and Windows 95 User Manual GFK-1180‘The list of Alarm Definition list is initially sorted by Alarm ID. You may click on any of the other title buttons at the top of the list to sort the list by that attribute. ‘You can use the Menu functions, Toolbar buttons, and shortcut keys to: © cr new alarm, © Change the window display anributes. © Change startup options © Modify an alarm. + Copy the information for a selected alarm to a new alarm, + Delete an alarm, ‘+ Display a filtered list of zlarms Creating A New Alarm Definition Too a new alarm definition, you can do one of th Select New from the File menu. Click New Itam on the Toolbar. © Press Ctrl#N, After you initiate the request, the New dlarm dialog box opens Enter the name of the new alarm in the Alarm 1D field and select OK. ‘The system verifies that the Alarm ID does not already exist, and that no invalid characters have been used. Ifthe Alarm ID you entered is valid, the Alarm Definition dialog box for the new alarm opens. You will need to enter information on the following property pages: Alarm Definition Defines what the alarm will look Ike. Alarm Routing Defines what Roles will see tbe alarm, Alarm Options Defines the Repeat, Acknowledge, Reset, and Delete attributes forthe alarm, GFK1180 Alarm Configuration 105Alarm Defini: ition Properties for Non-Point Alarms. on isn ecient PEE ‘The Alarm Definition properties for a non-point elarm let you define the following for an alarm: Description Alarm Class Alarm Type Help File Alarm Message 10-8 CLMPLICITY HMI for Windows NT and Windows 95 User Manual Enter an optional description of the alarm, Enter a valid Alarm Class ID in this field. You can sik the Browser buton EA tote ight of the input field to use the Select an Alarm Class Browser to select the Class ID. You can click the Pop-up menu button - to browse for an Alarm Class, edit an existing Alarm Class or create new Alarm Class for the alarm. Select valid alarm type from the drop-down list. For deteiled information on Alatm Types, see the CIMPLICITY HMI for Windows NT and Windows 95 Integrator’s Toalkit Operation Manual (GFK-1461) Enter the name of an optional Help file that can be displayed by Alarm Viewer when ¢ user clicks Help. “The Help file is a text fie that can be displayed by Notepad. Enter the text of the alarm message in this field. An alarm message consists of any combination of fixed text, and variable run-time parameters (see page 10-1). Te total display length for all fixed text and variable parameters is 80 characters, GFK.1180 aeah GPK-1189 Loaging IFDatabese Logging is installed on your computer, you can set the Log Alarm check bor to enable logging for this alarm. Ifyou enable logging, you can then select Settings... o define the logging parameters forthe alarm: (Clear this check box to disable logging for this alam, Alarm Definition Properties for Point Alarms Defi ‘The Alarm Definition properties for point alarms let you define the following for an alam: Definition This input box lets you define the alarm class and message that will be used when this points value goes into an alarm state, Alarm Class An slarm’ class determines the order in which it appears relative to other alarms in Alarm Viewer. Alarns with similar characteristics can be grouped by class, and classes can be prioritized. Enter an Alarm Class in this field. You can also; + Clothe Brower button «Eto he gh of the input box to use che larm Class Browser to display list of lanm Classes and select one © Click the Pop-up menu button - 21 to create a new Alarm Class modify the current Alarm Class, or browse foran Alarm Clas. Alarm Configuration 107Alarm Message Entera message in this field that will be displayed with the alam in Alarm Viewer. ‘An alarm message consists of eny combination of fixed text, and variable run-time parameters (see page 10-1). The ‘otal display length for all fixed text and variable parameters is 78 characters, For example, ifan alarm sting is configured so that the string for Warning High is "WARNING", and the string for Alesma High is "EMERGENCY, the Alarm High and Waring High Limits are 400 and 350 degrees, and the alarm message is: CONDITION: %STATE - TEMP IS AT %VAL DEGREES If the temperature reads 353 degrees, an alarm will be generated with the msssage: CONDITION: WARNING - TEMP IS AT 353 DEGREES Ifthe temperature goes to 402 degrees, the alarm will be updated and the message will res CONDITION: EMERGENCY - TEMP IS AT 402 DEGREES Ifyou specify an Alarm Class, you must specify an Alarm Message. String Index _If you are using %STATE in your alarm message, enter the index number of the string whose texts you want to use. You can also: ‘© Click the Browser button - £4 - to the right of the input field to use the Alarm Siring Browser to display the list of Alarm Strings and select one, + Cikthe Popp easton -21-tcrte sew Alten Sgt crest Ala Beng or rows fren Alena Sig Alarm Criteria ‘You can select one of the following methods for evaluating the alarm values: Absolute Absolute alarms are used to detect when the value of a point is tov higi or too low. ‘On Change (On Change alarms are used to detect when the value of a point changes. Rate of Change Rate of Change alarms are used to detect either a faster or slower than expected change in the value of @ point. Ifyou select Rate of Change, you must also enter a sampling interval inthe Interval fields. ‘The Interval fields represent the frequency at which the point will be sampled for Rate of Chaage alarming, Ifthe difference ‘between the curtent value of the point and the value at the last sample time exceeds alarm limits, an alarm message will be generated 10.8 (CIMPLICITY HMI for Windows NT and Windows 95 User Mara! GFK-1180Deviation Deviation alarms are used to detect when the value ofa point ‘deviates too far from that of 2 second point Ifyou select Deviation, you must also enter a Poist ID in the Deviation Point field. You can also: * Click the Browser button - =~ to the right of the input box to use the Select Port Browser to display a list of Point IDs and select one, + Goethe Popp menu buon = 21 to create a new Point ID, modify the current Point iD, or browse for a Point ID. See Types of Alarming in Chapter 5, "Point Configuration”, for details on the ‘Alarm Criteria, Alarm Values Enter the values you want for alarm limits in these fields. The evaluation of alarm. limits depends on the Alarm Criteria you select, + For Absolute alarming, you can define an upper and lower alarm limit and an upper anc lower warning limit for the point value. ‘+ For Rate of Change alarming the high values are used to detect faster then expected changes, and the low limits are used to detect slower than expected changes. Specify positive alarm limits to check for increasing values and negative alarm limits to check for decreasing values. * For Deviation alarming, you can define an upper and lower alarm limit ‘and an upper and lower warning limit forthe difference between the value of this point and the Deviation point. + For digital points, you can choose to alarm when the point velu is 0 or 1 Alarm Delay ‘The Alarm Delay feature is only available when you select Absolute alarming. If you set the Delay Alarms check box, the Interval fieids represent the leigth of the delay before the alarm is reported, This means an alarm will not be generated unless the point remains in en alann state for the configured interval. Deadband Enter 2 value defining the tolerance for alarm conditions in this fied, ‘The deadband cushions the generation of alarms when a point value fluctuates at an alarm limit, For example, if high alarm limit is defined as 100, the point’ alarm state changes each time the point value goes from 99 to 100 or 100 10 99. Ifa deadband of 5 is defined, the point will go into the alarm state when its value reaches 100, and will stay in the alarm state until the vaiue drops below 95. GFR-110 Alarm Configuration 109Help File Enter the name of tex file that users can display when they lick the Help button in the Alarm Viewer, You can entera filenarse of upto 8 characters, ‘The actual file is in the ALARM_HELP directory in your project. ‘The actual filename is the name given in this field, followed by " HLP" ‘Alarm Help files are ASCII tex: files of up to sixty (60) lines. Bach line can have @ maximum of 70 characters. Files are located in the SS3TZ_ROOT?\alarm_help directory. If you wish, you may use the same Help File for several point. Alarm Routing Properties ‘The Alarm Routing properties let you choose the roles to which this alarm will be routed. All the curently available roles arc listed in the Available Roles box. All the roles currently configured for this alarm are listed in the Configured Roles for Alarm box, You can: + Adda role to the alarm, + Remove a role from the alarm + Chango the properties of a selected role. Create a new role. Adding A Role To add a rots to the Configured Roles for Alarms list: 1. Select the role in the Available Roles tox. 2. Select Add. 10-10 CIMPLICITY HMI for Windows NT and Windows 95 User MaralGFK.1180 Removing A Role To remove a roe from the Configured Roles for Alarms list: 1. Select the sole in the Configured Roles for Alarms list. 2, Select Remove Modifying A Role To view (and possibly modify) the properties for a particular roe: 1. Select the role 2. Select Properties. The Role Properties dialog box for the selected role opens. Adding A New Role ‘To add a new role: 1, Select New. The New Role dialog box opens. 2. Enter the new Role ID in the Role ID field 3. Select OK. The Role Properties dialog box forthe selected rote opens. 4, Select the privileges you want for the new roe. 5. Select OK to create the new role and close the Role Properties dislog box Alarm Confwration 10-11Alarm Options Properties ‘The Alarm Options properties let you define the Repeat, Acknowiedge, Delete, and Reset requirements for the alarm. ‘+ Use Repeat Timeout to control how often the alarm will be re-sent to ‘alarm printers + Use Acknowledge Timeout to control whether or not the alarm will bbe automatically acknowledged. ‘+ Use Deletion Requirements io determine winen the alarm is deleted. + Use Reset Timeout i control whether or not the alarm willbe automatically reset, ‘+ Use Max Number Stacked to define the number of occurrences to retain when this alarm is generated more than once before being eleted. After the Max Number Stacked is reached, the oldest alarm ‘occurrence is deleted as each new occurrence is generated, + Use Manual Reset Allowed to permit users to manually reset the alarm. Ifyou disallow Manual Reset, the alacm can only be reset by the, application detecting the alarm condition or by the Alarm Manager ‘when an Automatic Reset is defined. 10.12 CIMPLICITY HMI for Windows NT and Windows 95 User Manual GFK-1180 woRepeat Timeout If you have configured an Alarta Printer, use these fields to control how the message for this alarm will be sent to the Alarm Printer: Time Immediate Never Sclect this redio button to send the alarm message to all interested processes at the interval you enter in the Minutes ‘input field until the alarm is cleared. In particular, the Alarm Printer (AMLP) is an interested process, Selecting this option will cause the alarm message to bbe reprinted on she Alerm Line Printer at the selected interval until the alarm is cleared. Note ‘The actual number of minutes that the Alarm Manager will, wait before repeating the alarm may be greater than this umber. ‘The maximum time will be the nurher you enter in this field plus the number of minutes configured for the timer for processing automatic alarms in the Alarm Manager configuration file (atazm mgr dat). The default for this timer is 5 minutes. Select this radio button to send the alarm message to all interested processes immediately when itis generated. In particular, the Alarm Printer (AMLP) is an interested process, Selecting this option will cause the alarm message to be printed once when it is generated. The alarm message will not be repeated, Select this radio button if you do not want to send the alaem message to any interested processes. Deletion Requirements ‘The Deletion Requirements determine the conditions under which the alarm may be deleted from the system. You can choose one or both of the following: Acknowledge Reset Set this check box to delete the alarm when it is acknowledged. Set this check box to delete the alarm when it is reset, If you set both check boxes, the alarm will not be deleted until it has been acknowledged and reset. GFK-1180 Alarm Configuration 10-13Acknowledge Timeout Use these fields to contro] how the alarm will be acknowledged. Time Immediate Never Reset Timeout Select this radio button and enter the number of minutes in the utes input field for the Alarm Manager to wait before automatically acknowledging the alarm. “The alarm may also be acknowledged by 2 user before the tine period expires. Note The actual number of minutes that the Alarm Manager will ‘wait before automatically acknowledging the alarm may be greater than this number. The maximum time will be the amber you onier in this field pius the number of minutes configured for the timer for processing automatic alarms in the ‘Alarm Manager configuration file (ataza_agz.dat), The default for this timer is 5 minates Select this radio button if you want the Alarm Manager to ‘automatically acknowledge the alarm when it is generated. ‘Select this radio bution if the alarm is never to be utomaiically acknowledged. Use these fields to control how the alarmn will be reset Time Immediate Never Select this radio button and enter the number of minutes in the Minutes input field for the Alarm Manager to wait before automatically resetting the alarm. ‘The alam may also be reset by the application detecting the slarm condition or manually by user (if mancal reset is, allowed) before the time interval expires. Note ‘The actual number of minutes that the Alarm Manager will wait before automaticaly resetting the alarm may be greater than this number. The maximum time will be the number you canter in this field plus the number of minutes configured for the timer for processing automatic alarms inthe Alarm ‘Manager configuration fle (alaza_ngz.dat). The default for this timer is 5 minutes Select this radio bution if you want the Alarm Manager to automatically reset the alarm when itis generated. ‘Select this radio button if the alarm is never to be automatically reset. 10-14 CIMPLICITY HMI for Windows NT and Windows 95 User Manuat GPK-1180, eeUsing Alarm Audio Support About Alarm Audio Support You can configure an alarm-class to use audio alarming whenever an alarm in that class is generated. You can use a weve (. AV) file or a beep. The sound is played until the Alarm Stop condition is met for all the alaems from the configured class. To generate an audio alarm froma wave file, your computer needs: * A sound card to generate the sound + A sound system, such as a spezker or headset, to make the sound audible ‘To generate an audio alarm with the beep, your computer needs the system beep (you can also generate @ beep from a sound card, but iis not required). LFyou do have & sound card, you can configure the frequency, duration and number of beeps, If you o not bave a sound card: + For Windows NT, you can configure she frequency, duration and number of beeps. + For Windows 95, ‘you can configure the number of beeps. Audio alarms are prioritized by two keys, alarm class priority and project priority. ‘You can select one of these keys to be the primary key for prioritization: About Prioritizing Alarms ‘The Alarm Sound Manager cen only play one sound at a time, You can configure the Alarm Sound Manager to prioritize alarms by Alarm Class or Project priority. You determine Alarm Class priorities when you configure Alarm Classes, ‘You determine Project priorities when you connect to projects in the Alarm Sound Manager window, When you prioritize alarms by Alarm Class, the determination of the highest priority alarm is: +The sound for first alarm for the highest priority Alarm Class is played first. + Ifalarmis exist for the same Alarm Ciass in more than one project, then the highest priority alarm for the highest priority project is played first.‘+ fmore than one project has the highest priority, then the order in which ‘the projects are displayed in the Alarm Sound Manager window determines the project priority. ‘When you prioritize alarms by Project priority, the determination of the highest priority alarm is: ‘+The sound forthe alarm with highest priority Alerm Class in the highest priority project is played first. + If more than one project hes the highest priority, then the order in which the projects are displayed in the Alarm Sound Manager window Getermines the project priority. Examples Suppose you heve three projects, each with two Alarm Classes as follows: Project Priority Alarm Class Priority AlarmClass Priority PROJL 3. ALMIA 1 ALMIB 2 PROM. 2 ALMA 1 ALOR 2 PROS 1 ALMBA, 1 ALMBB 2 In addition, you currently have one alarm generated for each class in each project. If you prioritize audio elarms by Alarm Class, the alarm order ALBA, ALM2A, ALMLA, ALM3B, ALM2B, ALMIB If you prioritize audio alarms by Project priority, the alarm order is: ALMA, ALM3B, ALM2A, ALM?B, ALMIA, ALMIB CIMPLICITY® EMI for Windows NT and Windows 9§ User's Manual GPK-1180 fueConfiguring Alarm Audio Support GPE 1180 ‘You configure Alarm Audio support in the Alarm Class configuration. ‘To configure Alarm Audio support for an Alarm Class 1, Double-click the Alarm Class icon in your project's Configuration cabinet, 2. Select the Alarm Class for which you want to configure Alarm Audio support from the list of Alarm Classes. 3. Open the Alarm Class Configuration dialog box for the Alarm Class. 4, Select the Audio property page. ‘Set the Audio support check box if you want audio support for the alarm class. You can configure two types of sounds: s Wave file © Beep You can now do one of the following: + Select OK to seve all changes made and close the Alarm Class Configuration dialog box. ‘+ Select Apply to save all changes made ané leave the dialog box open ‘+ Select Cancel to close the Alarm Class dialog box without saving changes, Using Alarm Audio Support wnsWave File Configuration ‘To configure a wave file for audio alarming: 1, Click the Wave file radio button to use 2 wave (.wav) file when the alarm sounds, 2, Enter the name of the save file in the File name field. You can use the browser button to browse for a wave file for this field. You can specify logical nates in the file name, such a5 sz7=_nooT and E6M_ROOT in the path name for the wave file. These are expanded into actual directory names when the file is used. For example, SI7#_ROOT; \sounds\high. wav refers to the file Righ.wav in the sounds directory within the HMI project’ directory. You can also use a special variable called W2H_DIR, which expands to the Windows 9SINT directory. Beep Configuration 0 configure a beep for audio alarming: 1, Click the Beep radio button if you want to use a beep sound. ‘On computers with sound cards, this is the default sound event. (On computers without sound card, this isthe default systern beep. Specify the following information for the beep sound: For Windows NT, or if you are generating the beep through the sound, card on Windows 95: + Bnter the Frequency of the sound. Select 2 value between 37 and 32767 Hertz. Remember, 1000 ilseconds equa 1 ‘+ Enter the Duration of the sound in milliseconds. Selecta value Sst ‘between I and 10000 milliseconds. For both Windows NT and Windows 95. * Enter the Number of beeps to play when the alarm is generate. Select a value between i and 10 Ifyou enter a value greater than 1, the Delay field is enabted. + Use the Delay field to enter the delay between the beeps in nillisoconds. Select « value between 0 and 10000 milliseconds. ds CIMPLICITY® Hd for Windows NT and Windows 95 User's Manal GFk-1189About Alarm Sound Manager ‘You cen use the Alarm Sound Manager to conneot to running HMI projects that are broadcasting on your local network. The Alarm Sound Manager then plays sounds and displays elerm information when alarms are generated by those projects for alarm classes that have audio alana support. @ You must ran the Alarm Sound Manages in oder fr the sounds tobe played = Torun the Alarm Sound Manager, select oF double click the Alarm Sound Manager een icon inthe Windows Start Menu Using the Alarm Sound Manager When the Alarm Sound Manager is running, you can see its icon on the Windows Taskbar, SAMPLE COR_t048 71 The dlarm Sound Manager window displays the current alarm, GFK-1180 sing Alarm Audio Support Ins “7‘The items on the lower past of the Alarm Sound Manager window are available at all times. ‘They include + The current alarm being played + The Mute check box + “The Load profile... and Save profile... buttons + The Minimize, Exit, sné Help buttons ‘You can use the Projects, Options, and Startup pages to select the projects whose alarms you want to display, the priority of concurrent alarms, start the Alarm Sound ‘Manager at startup and select a dafrult profile file Turning Sound On and Off ‘You can set the Mute check box to temporarily shut off sound play, When you shut off sound play, the Windows Taskbar icon for the Alarm Sound Manager changes to aoeM a ee Saving the Current Configuration After you have configured the Alarm Sound Manager window properties to your liking, you can save your configuration, and then recall it whenever you open this window. To save ail the changes you have made in the current Alarm Sound Manager session, select Save profile... To retrieve a previously saved profile and display it in the current Alarm Sound ‘Manager session, select Load Profil Using the Window Buttons To minimize the window, select Mi To exit the Alain Sound Manager, select Exit Remember thet if you do this, audio. slamming stops andthe icon for the Alarm Sound Manager no longer appears on the Windows Taskbar. To display the He/p window for Alarm Sound Management, select Help, CIMPLICITY@ HMI for Windows NT and Windows 95 User's Manual GFKE1180 weGFK-1189 Projects Properties ‘The Projects page lets you add and remove broadcasting projects o the current While you are displaying this property page, you still have access to the alarm information at the bottom of the window. Adding a project To add a project, click on the Add... button. The Add Project dialog box opens. Use the drop-down list button to the right of the Project field to select a project to add. Select the project priority by specifying a number greater or equal to 2ero (0). The higher the number, the lower the priority (which means that zero (0) isthe highest priority). ‘The project is placed in the list of projects according to its priority. If more than or project has the same priority, then they are displayed in the order that they were added to the list, Using Alarm Audio Support nsU8 Examples: For example, if you connect to PROMI with priority 3, PROJ2 with priority 2, and PROJS with priority 1, then the list of projects looks like this PROS PROI2 PROJ If you connect to PRO! with priority 3, PROJ2 with priority 1 and PROIS with priority 1, then the list of projects looks like this: PROI2 PROD PROMI This project ordering is used by the Alarm Sound Manager to help determine which sound plays first at run-time Deleting a project To delete a project, select it and click on the Delete button. CIMPLICITY® HIM for Windows NT and Windows 95 User's Manual GPK-1180Option Properties ‘The Options page lets you: GFK-1180 Select which priority to check first when concurrent alarms are received, You can select Alarm Class or Project. Specify the alarm sound/beep stop condition, You can select one of the following: + Acknowledge only - the zlatm sound/beep stops when the alarm is acknowledged. ‘+ Reset only - the alarm sound/beep stops when the alarm is reset. + Both Ack and Reset the alarm sound/beep stops when the alarm is acknowledged and reset + Either Ack or Reset - the alarm sound/beep stops when the alarm is acknowledged or reset. Configure the Project default priority to be used when adding new projects to the current session. This value must be greater or equal to. 0 (2er0). The higher the number, the lower the priority (his means that 0 is the ‘highest priority Specify witether you want the alarmn sound/beep to be repeated. If you set the Repeat soundibeep checkbox, the sound/bcep is repeated every ten (10) seconds nil the stop sound/beep condition is satisfied, Hf you clear the Repeat sound/beep check box, each alarm sound/beep is played only once Using Alarm Audio Support He10 While you are displaying this property page, you still hve access to the alarm information at the botom ofthe wind Startup Properties ‘The Startup page lets you configure the Alerm Sound Manager to start up at boot time, and specify a default profile to use whenever the Alarm Sound Manager starts, CIMPLICITY® Alarm Sound Manas I | Gesam ‘While you are displaying this property page, you still have access to the alarm information at the bottom of the window. To start the Alarm Sound Manager at boot, set the Start at Windows startup check box. To specify « profile file to be used by the Alarm Sound Manager when it starts, enter the name of the file in the Use profile field. You can use the browser button to the right of the input field to search for a profile file. CIMPLICIT I HMI for Windows NT and Windows 95 User's Manual GFK-186Alarm Blocking Configuration About Alarm Blocking Monitoring and control systems do an excellent job of informing operators of problem conditions through alarms. However, there are times when operators can be overwhelmed by aumerous alarms that are the result of one major problem. For example, when # process conveyor stops, it affects all machines feeding into it. The operator needs to know that the major problem is the stopped conveyor and not waste valuable time looking through all the other resulting alarms, Alarm Blocking lets you configure a hierarchy of alarms for your process so users see the important alarms first, Alann Blocking you + Logically group alarms into blocking groups. + Select a run-time blocking mode for each lacking group, + Assign a priority level to each alarm in a blocking group. Each Alan Blocking group works independently. This means that the high priority alarms in one group do rot block the high priority alarms in another group, Before you implement Alarm Blocking, you need to plan how you want to group and prioritize your slarms for your project. You need to decide: ‘+The number of blocking groups you need, ‘+ Which alarms are to be assigned to each blocking group. ‘+ How the alarms are to be prioritized in each blocking group, How to handle the display of group, Alarms that you do not assign to Alarm Bl Blocking. ‘equal priority alarms in each blocking cking groups are not affected by Alerm GFK-1180 21Assigning Alarms CIMPLICITY HMI software generates two types of alarms; point alarms and syster alarms. Each point alarm is uniquely identified by ts Alerm ID. Bach system alarm is uniquely identified by its Alarm ID and Resource ID. For example: © Forpoint XYZ, * Each unique instance of the SDEVICE_DOWN sysiem alarm is ientified by the Alarm ID and the Resource LD of the affected device. nique Alarm ID is XYZ, For Alarm Blocking, you can assign 2 uniquely identified alarm to only one group, This means: * You can assign a point alarm to only.one blocking group. * You can assign a uniquely identified system alarm to only oné blocking group. ‘This means that you can have more than one instance of a system alarm ina blocking group or you may have system alarmas in more than one blocking group, provided that the Resource ID you assign to each instance is unique across ali Alarm Blocking groups. Choosing Blocking Modes ‘You can select one of two blocking modes for each Alarm Blocking group that you create, ‘+ Ieyou select Peer Blocking mode, only the frst alarm ina set of elarms ‘with equal priority displays. ‘+ Lfyou select Non-Pear Blockinig mode, ll alarms in a set of alarms with equal priority display. Assigning Alarm Priorities ‘You need to assign each alarm in an Alarm Blocking group » number from 0 to 32767. The higher the number you enter, the higher the priority of the alarm, For example, alarm XXX with priority 100 blocks alarm YYY with priority 10. You can assign the same priority number to more than one alarm in an Alarm Blocking group. ‘The priority of an alarm and the blocking mode of the group determine whether the alarm is blocked or not, CIMPLICITY HMI for Windows NT and Windows 95 User Manual GPE-1180 weOFK-1180 Alarm Blocking Rules When an alarm that is assigned to an Alarm Blocking group is generated: + Iftheve is 2 current alann with higher priority in the group, the newly generated alarm is blocked, + ForPeer Blocking, if there is a current alarm with equal priority in the group, the newly generated alarm is blocked. In other words, only one alarm in a set of alarms with equal priority displays at any given time. ‘+ For Non-Peer Blocking, all current alarms with equal priority display at any given time. ‘When the blocking slasma returns to Normal state or is deleted: » For Peer Blocking, if alarms of equal priority exist, the oldest one displays and becomes the new blocking alarm. ‘+. For Non-Peer Blocking, al! alarms with the next lower priority dispiey and become the new blocking alarms. flower priority alarm is the current blocking alarm and e higher priority alarm is generated, the lower priority alarm remains on the list of alarms and the higher Priority alarm becomes the new blocking alarm. ‘an alarm already exists in Normal ctato and it returns to Alarm state, the alarm is not blocked, Alar Blocking Configuration 128Configuring Alarm Blocking = Alam Blecking To configure alara blocking, double-click the Alarm Blocking icon in your project’s Configuration Cabinet, Ifyou heve selected the Display search criteria at startup option, the Alarm Block Group Search dialog box opens. Select th filtering erteria you want, and then select OK to open the Alarm Blocking Group - Configuration window with the filtered list of alarm groups. If you have not selected the Display search criteria at startup option, the Alarm Blocking Group - Configuration window opens witha list of all configured alarm. [Descipiion = Grown? group t ‘The Alarm Blocking Group ~ Configuration window always displays the following attribute for each Alarm Class: Group ID ‘The identifier for the class In addition to Group ID, you can choose to display: Group Description Optional description of the group Peer block Identifies whether Peer Blocking is enabled or disabled. ‘The list of groups is initially sorted by Group ID. You may click any of the other tisle buttons at the top of the list to sort the list by that attribute. You can use the Menu functions, Toolbar burns, and shorteut Keys to: + Create anew Alarm block group. + Add alarms tothe groups + Remove alarms from the groups. + Modify alarm information inthe groups + Change the window display attributes + Change sterup options + Delete an alarm block group. + Display altered list of alarm block groupe CIMPLICITY HMI for Windows ND and Windows 95 User Mansa GFRIIS9Creating an Alarm Block Group To create a new Alam block group, you can do one of the following: + Select New from the File menu, + Click New Item on the Toolbar. + Press Ctri4N, -Afier you initiate the request, the Alarm Blocking dialog box opens. You can sesize the width of the Alarm ID, Priority and Resource {D fields to suit your needs. Enter the following information to create a new Alarm block grovp: Group ID Description Peer block Alarms Enter a new, unique Alam group name. The group name can be up to 32 characters long. Enter ¢ description of the Alarm group. The ‘description can be up to 64 characters long. Set this check box to enforce Peer Blocking Mode for this group. Clear this check box if you want to use Non-Peer Blocking Mode. ‘The Blocking Mode and alarm priorities determine the alarm blocking hierarchy at run-time ‘This input box displays the current list of alarms in the ‘Ales block group. ‘You can add an alarm to thelist by direetly entering its Alan ID, Priority and Resource ID or by using the ‘Add bution to select an Alarm ID from the Browser dialog box. GFK-1180 Alarm Blocking Configuration IDs aYou can change an alarm on the list by directly edit its Alarm ID, Priority or Resource 1D or by selecting, the Alarm ID and pressing Set attributes... Tod Delete. ‘an alarm from the list select it and press Select OK to close the Alarm Blocking dialog box end create the new Alarm block group. Select Cancel to close the Alarm Blocking dialog box without creating a new Alarm block group, Adding an Alarm ‘You can enter the name of an Alarm ID in the Alarm 1D field in any of the following You can select Add to open the Browser dialog box and browse for the Alarm ID you want, ‘© You can click the Browser button to the right of the input field Jo open the Browser dialog box and browse for the Alc: ID you want. > You can olick the Pop-up menu button to the right of the input field to create a new Alarm ID, modify the current Alarm LD or browse for an Alarm 1D, Enter the priority of the Alarm ID in the Priority ficld. This can be @ number from 0 to 32767. The higher the number you enter, the higher the blocking priority for the alan. For example, if you have alarm XXX with priority set to 10 end alarm YYY with priority set to 100 in the same group, when alarm YYY generates, it blocks alarm XXX. 1fthe Alarm ID does nor have a Point ID, you mst assign 2 Resource ID to the flarm. You can click the Browser button to the right of the input field to open the Browser dialog box and browse for the Resource ID you want. You can also use the Pop-up menu button to create a new Resource ID, modify the current Resource ID or browse for s Resource ID. Remember that each Alarm [D/Resource 1D combination must be unique within « group and across all goups. Removing an Alarm “To remove an slam tom an Alam block group 1. Select the alarm from the list. 2, Press Delete. “The ist of elarms in the window updates immediately Modifying an Alarm You can modify an alarm’s name, priority and Resource ID in the list, All you need to dois: L. Select ¢ field you want to edit in the Alarms list. 2. Type in your changes. 125 CIMPLICITY HU! for Windows NT and Windows 9§ User Manual GFK-1180If you are che Pop-p Menu buttons in the field to searct ging an Alarm ID or Resource ID, you can also use the Browser and ‘You can also set a number of alarms to the same priority and/or Resource ID at the same time. To do this: 1, Select the alarms whose priority and/or Resource ID you want to set. ‘You can use the Shift and Ctrl keys while making your selection, 2. Select Set Attributes... The Set tributes dialog box opens 3. Enter the new priority and/or Resource ID forthe alarms and select (OK. All the selected alerms will be assigned the new priority. Non- point alarms wil be assigned the new Resource ID. Modifying an Alarm Block Group To modify an Alarm block group, you can double-click the Alarm block group you ‘want to modify. Altematively, you can select the Alarm block group you want fo ‘modify, then do one of the following: * Select Modify from the Edit mens, + Click Modify item on the Tooibar. + Press Ctrl+M, After you initiate the request, the Alarm Blocking dialog box opens. The fields ‘contain the group's current configuration information. You can’ + Modify the group description + Change the Peer block stan Add alarms tothe lst. + Remove alarms from the list + Change alarm names, priorities and Resource IDs on the ls. Select OK to close the Alarm Blocking dialog box and modify the information for the selected Alarm group. Select Cancel to close the 4larm Blocking dielog box without modifying the Alarm group, Alarm Blocking Configuration retAlarm Printer Configuration About Alarm Printer Configuration Alte, Printer GPK-1180 wy You can configure. serial or parallel printer in CIMPLICITY HMI software thet prints alarms and/or events as they occur. ‘You may also configure an alarm printer to write toa fle, rather than to adevice. You may configure a local or network printer asthe alaom printer. “If your project includes the Host Redundancy option, you may configure a redundant alarm printer. Important Before you start, make sure that the printer is not configured in Windows. To configure an alarm printer, double-click the Alarm Printer icon in your project's Configuration cabinet Ifyou have selected the Display search criteria at startup option, the Alarm Log Printer Search dialog box opens. Select the filtering criteria you want, and then select OK to open the Alarm Log Printer - Configuration window with the filtered list of printers. Lf you have nor selected the Display search criteria at startup option, the Alarm er ~ Configuration window opens witha list of all configured printers, Tae Ba‘The Alarm Log Printer - Configuration window always displays the following for each printer: Name ‘Tho name of the alerm printer, In addition to Name, you can choose to display: Node ID ‘The node to which the alarm printer is connected. Destination The actual device or file name of the printer (like tPT2: or anlp. £11) Page Width ‘The page width in characters. Page Length — The page length in lines. ‘The list of alarm printers is initially sorted by Name. You may click on any of the other title buttons at the top of the list to sort the list by that anribute ‘You can use che Menu functions, Toolbar butions, and shorteut keys t: + Create a new alarm printer. # Change ihe window display atebutes. + Change startup options. + Modify an alarm printer. + Delete an alarm printer. Display 2 file od list of alarm printecs Adding an Alarm Printer 132 “To add # new alarm printer, you ean Go one of the following + Select New fiom the File menu. + Select New Item on the Toolbar +) Press CtrleN. ‘After you initiate the request, the New Alarm Log Printer dialog box opens. Cees Enter the name of the new alarm printer, or the name of the file you want to vite alarms to in the Name field end select OK. You may enter a maximum of 16 characters. The system verifies thatthe alarm printer name does not already exist, and that no invalid characters have been used If the alarm printer name you entered is valid, the Alarm Printer properties dialog ‘box for the new alarm printer opens, CIMPLICITY EM! for Windows NT and Windows 95 User Manual CFK-1180Alarm Printer Properties GFR-1180 The Alarm Printer property sheet let you define the device, and the types of alarms handled by it. You can configure focal and network printers. You caa also consigure zedundant alan printers if your project supports the Host Redundancy option, When you are finished defining the alarm printer properties, select OK to close the Alarm Prinier property sheet and create the new alarm printer, or select Cancel to close the property sheet without creating the new elarm printer. General Properties ‘The AMLP Configuration property page let you define the following for ¢ new alarm printer: Log Events Select this check box if you want to log evens to the printer. Log Alarms Select this check box if you want to log alarms to the printer. If you clear this check box, the Alarm logging options are grayed out Alarm Printer Configuration BEAlarm Logging Options “These options are available only when you select the Log alarms check box. Use these fields to specify the types of alarms, and alarms classes that will be printed ‘on this alarm printer Generated alarms Set this check box to log messages when alarms are gencrated. Acknowledged alarms Set this check box to iog messages when alarms are acknowledged. Reset alarms Set this check box to log messages when alarms are reset. Deleted alarms Set this check box to log messages when alarms are deleted All alarm classes Set this check box to log messages for all alarm classes. When you do, the ‘Alarm Class input field will be grayed out. Alarm Class ‘This field is available when you ciear the All alarm classes check box. ‘Ifyou want log elarms for a particular Alarm Class, enter that class name in this field. You ean also: ‘© Click the Browser button - 241 to che the Select Alarm Class browser and u Jnt of the input field to display to select the Alarm Class. ‘© Click the Pop-up Ment button - 24 to create a new Alarm Class, edit the current Alarm Class, or browse for an Alarm Class. Output Enter the device name for the alarm printer. You can ‘* Enter the name ofa local port on the project's computer (for example - LLPT2 or COML) where you have attached the alarm printer. Note ‘ou are connecting to serial port COM10 and above, the fonnat is \\. \comens, + Enter file name to write alarms to a fle. If you wish, you may also enter 2 period followed by a three character file extension (for example, alarms. £42). Ifyou do not enter 2 file extension, none is automatically provided. ‘The file is placed in the project’s \Log directory. CIMPLICITY HT for Windows NT and Windows 9§ User Manuat GFK-1180GFK-1180 * Enter the path for a network printer (for example, \\w_o0Saa¢ \dspent) Note If the printer is connected locally on your computer, use the local port nazze instead of the network path, ‘+ Enter the path fora file on a network disk (for example, \\nt002 \proji\alarns). ‘You can associate more than one alarm printer with a network printer or file on a network disk. Ifyou use a network printer fil, you should clear the Print header fcid inthe Layout property page. Layout Properties ‘The Layout property page lets you determine whether a header should be printed at ‘the top ofa page. Enter information in the following Gelés: Print Headers Set this check box if you want to print a header at the top of each page. If you have more than.one alas printer process sending messages to the same printer oor file, clear this check box. When you clear the check box, the Page length field is disabled, Alarm Printer ConfigurationPage Length Enter the number of lines per page that can be printed. The number must be an integer between 1 and 999. Page Width Enter the number of characters that can be printed on a line. The nurmber must be an integer between 80 and 132. Redundant Alarm Printing This felis enabled if your project has the Host Redundancy option, Set this check box ifyou went both the Master and Slave computers to print slarms. Clear this check box if you only want the Master computer to print alarms: Date/Time Format AHHH Ma HHMMSS A e|HMM A HAH MideS8-7T Use the Date/Time Format properties to choose hew the alarm printer will print the ate and time. You can define the following: Header Date Select the formst you want to use to print the date on the alarm printer page header. ‘This eld is not available if you are not printing a page header. A sample for the format you choose displays in the Sample field inthis box. You may select one of ‘the formats from the list, or construct your own format, CLMPLICITY FMI for Wondows NT and Windows 95 User Manual GFK-1180 waGFK1120 Alarm Date/Time Select the formet you want to use wo print the date and time of each alarm. A sample for the format you choose displays in the Sample field in this box. You may sclect one ofthe formats from thelist, oF construct your own format. Constructing Date and Time Formats To construct date Formats, se th following information: m Numeric month with no lending zero mm Numeric month with leading zero. mmm Shor text month mmmm Long Text month, d ‘Numeric day with no leading zero. dd Numeric day with loading zero. ddd Short text day ofthe week. dddd Long text day ofthe week. y Last two digits of year. For digits 00 through 09, ony the last digit is displayed. yw Last ro digits of year, For digits 00 through 09, both digits are displayed. yyy All four digits of year For example, ifyou enter dddd dd mmmm yyyy, the sample date will be Saturday 05 March 1994, ‘You may use spaces, dashes, slashes or any other delimiter of your choice to separate the date fletds, To construct time formats, use the following information: H ‘Hours based on a tweive-hour clock with no leading zero, HH Hours based on a twelveshour clock with leading zero. HHH Hours based on 2 24-hour clock with no leading zero. HHHH Hours based on-a 24-hour clock with leading zero. M ‘Minutes with no leading zero. MM Minutes with leading zero. s Seconds with no leading zero. ss Seconds with leading zero, T Hundreths of seconds with no leading zero. 7 Hundredths of seconds with leading zeros. P,A.pjora AM/PM indicator For example, ifyou enter HHHH:MM:SS:TT p, the sample time ill be 43:05:06:08 PM, You may use colons, spaces or any other delimiter of your choice to separate the time fields. Alarm Printer ConfigurationMore about Redundant Alarm Printers Ina redundant configuration, both the Master and Slave computer have the same configurstion. When you perform a Configuration Update, the configuration data for the project on the Master computer is copied to the project on the Slave computer. fing and Output ficlds ‘The information you enter ia the Redundant alarm pri determine where alarms will be printed. First let’ take a redundant configuration where each computer has 2 local line printer (LPT1) configured. The primary computer is COMP! and the secondary comp compa, covet comes vt ‘+ Ifyou enter zea in the Output field and select che Redundant alarm printing check box, the Master project on COMP? sends alarm ‘messages 10 LPTI on COMPI and the Slave project on COMP2 sends ‘alarm messages that it generates while in standby mode to LPT1 on coMP2, ‘When the project on COMP? becomes the Master project, it continues to send alarm printer messages to LPTI on COMP2, + Ifyou enter 271 in the Output field and clear the Redundant alarm printing check box, the Master project on COMP! sends alanns to LPT1 on COMPI. The Slave project on COMP? sends no alarms until it becomes the Master project. ‘When the project on COMP? becomes the Master project, it sends alarta messages to LPT1 on COMP2. Now, let look at @ redundant configuration with a network ine printer (WABCWNET1). The primary computer is COMPI and the secondary computer is cOMP2, \ABOINET: + Ifyou enter \\asc\waz2 in the Output field and select the Redundant alarm printing check box, the Master project on COMP! sends alarm messages io 'ABC\NETI and the Slave project on COMP2 sends alarm messages that it generates while in standby mode tw WABCINETI. Tals may result in duplicate messages. If you select this option, disable the Print header ‘el 15 ITY HUAI for Windows NT and Windows 95 User Manuel GFR-1180= ifyowenter \\ase\wer: in the Output field and clear the Redundant alarm printing check box, the Master project on COMP! sencis alarms to the network device. The Slave project on COMP? sends alarms until it bccomes the Mastcr project. ‘When the project on COMP2 becomes the Master project, it sends alarm messages to \\ABCWNETI Additional Steps for Serial Printers Jf you are configuring e serial printer, its printer beud rate, parity, and data length will have to be set each time your system is rebooted. ‘You can do this by creating & file called ciimp_port..bat in the top-level directory on the disk where your project is located. The fle will be called by the Alarm Printer program when it initiates printing on the printer. The file contains facke off moda
baud-crate> parity-
datasca> stepecm> where
isthe serial porcto which the printer is connected
isthe baud rate ofthe printer.
isthe parity used by the printer.
is the number of data bits. em> is the number of stop bits. For example, if you bave a printer on COMI: port that communicates at 9600 baud, xo party, 8 data bits and I stop bit, the file would fook like this: jache off moda COML: baud=9600 parity=n datas8 stop=1 Ifyou have more than one serial printer, you will need one mode line per printer. To create this fie: 1, Open a Notepad window. 2. Enter the printer configuration information according to the ebove ‘emplate, 3. Save the file called cimp_port bat in the top-level directory on the isk where your project is located. GRK-1180 Alarm Printer Configuration 139Modifying the Size of the Alarm Queue “The Alarm Line Printer program (AMLP) assumes that there is no restriction for the size of the larm message qucuc. If the output device is disabled, virtual memory overflow can result ‘You can use the AMLP_MAX_QUEUE global parameter to restrict the size of the alarm message queue, For detailed information on editing the giobal parameter file, ses "Global Parameters" under System Management. record format for AMLP_MAX_QUEUE is: AMLP_MAX QUZUG|3 |
‘where
isthe maximum mimber of messages inthe quene. ‘After you implement this global parameter, ifthe output device is disabled and the number of alarms in the alarm queue exceeds the value you speci, the alarm message: the alarm queue is generated, ropped has exceeded the configured size of alarm To return to the defeult queue size, remove the AMLP_MAX_QUEUE record from the Global Parameters file Choosing Delete and Acknowledge Times ‘The Alarm Line Printer program (AMLP) assumes that the time to be printed when an aarma is acknowledged or deleted isthe time the alarm was generated, You can use the AMLP_USE_GEN_TIME global parameter to select whether you want the generation time or the action (acknowledge or delete) time to be printed. ‘The record format for AMLP_USE_GEN_TIME is aua?_0SE_GEY_TTKG|1|
where
Creating a New User To crvate a new user, you can do one of the following: ‘© Select New from the File mens. © Click New Item on the Toolbar. Press CtriN. ‘After you initiate the request, the Mew User dialog box opens. Baier the name of the new user in the User ID field and select OK. The system verifies that the User ID does not already exist, and tbat no invalid characters have been used. Ifthe User ID you entered is valid, the User Properties dilog box for the new user opens. You will need to enter information inthe following categories: General Defines the password and role for the user. Resources Defines the resources for which the user can view data, ‘When you are finished defining the user's properties, select OK to close the dialog box and create the new user, or select Cancel to close the dialog box without “creating the new user. coMPLE ITY HMI for Windows NT and Windows 95 User Manual GPK-1139,2 GPK1180 User General Properties ‘The General properties let you define the following for # new user Note If you change a user's configuration dynamically, the user must log out then log back in for the changes to take effec. Role Entec the user's role in this field, a "You can cick he Browser buon - El 1th ight ofthe input eld to play the Select A Role Browser and use it to select the role ‘You can also use the Pop-up Menu button - role, of Browser for another role to create a new role, edit the current Password Needed Set this check box to require the user to enter a password at login. Clear this check box if the user does not need to enter a password. Password and Confirm Password ‘This input box and the Confirm Password input box can only be accessed when the Password Needed check ox is set, Enter the user’ password in this input box, and then re-enter tin the Confirm Password input box. Amcerisk are displayed in place of the charectes you type If, at some future date, you clear the Password Nooded check box, the Password input box will retain the original password, but the user does not need to enter it wien logging in, User Configuration 55186 ‘At run-time, the following rules also apply to user passwords: + A.user is prompted to change the password when the current password expires. + A.user can change the password from the CIMPLICITY Login Panel. + Avuser can use the ChangePassword command in the Basic Control Engine to change the password in CimView. * Ina Server Redundancy configuration, a user can only change the password when the Primary computer is running. User Name Enter the user's name or descriptive text about the user. Enabled Sot this check box.to enable the user account. ‘If you clear this check box, the account is disabled and is not available for user login. ‘If you disable an account dynamically, currently logged in users will not be logged out; however, new login attempts will be rejected. Password Expires Enter the suber of days until the user's password expizes or enter zero ifthe password never expires. ‘After the elapsed number of days, the user will be required to change the password prior to logging in Ins Server Redundancy configuration, Automatic Password Expiration is not supported, CEMPLICITY HMI for Windows NI and Windows 95 User Manual GFK.1/20User Resource Properties ‘The Resources properties let you define the resources for whick the user can view alarms, The resources currently assigned to the user are displayed in the Resources box. You can add or del TF you change a users resources dynamically, th to access the changed set st log out then log back in sources, Adding A Single Resource To aud a resouree to the user ist 1, Emtera id Resource ID in the input box, You can click the Browser button 15) to the right of the input field to use the Select A Resource Browser and us it to select the Resource ID, You can also use the Pop-up Menu button - 24 - to create a new Resouree ID, edit the current Resource ID, or browse for another Resource ID. 2. Select Add The new resource will appear in the Resources box. Adding All Resources To add all the currently configured resources ta the user's list, select Add All, All the resources appear in the Resources box GFK-1160 User Configuration 1n718 Deleting A Resource “To delete a resource ftom the user list 1. Select the resoure inthe Resources box 2. Select Deleta, “The resouroe is removed froma the Resources box. You can also use the Shift and Ctr! keys in combination with the mouse to select more then one resource for deletion. CIMPLICITY HMI for Windows NP and Windows 95 User Manual GFK1180Database Logger About the Database Logger ODBC stands for Open Data Base Connectiviy ‘The Database Logger option lets you log alarms, events, and point values to a database, then retrieve the information for reports via a wide variety of ODBC- compliant applications You dont need to know about SQL or database internals to configure logging tables. ‘Simply select the items you want to log and conditions under which you want to log. them. You can log individual points in detail, or you can group points together for twond analysis. In addition, you can define multiple tables with different logging conditions and attributes to meet different needs within your facility. ‘The Database Logger option uses the standard ODBC interface to log your production data. This interface supports both the Microsoft Access and Microsoft SQL Server databases. ‘You ean enter the Database Logger configuration transactions from Point Configuration or from the Database Logging icon in the CIMPLICITY Configuration cabinet. Types of Log Files Available 180 CIMPLICITY software organizes logging ino the following categories: + Alarm Logging + Bvent Logging + Data Logging + Group Logging © Application Logging déAlarm Logging Alarm Logging lets you log alarm information in the Alarm Log table. You can specify alarms to be logged as they are generated, cleared, acknowledged, andlor delved ‘The following system alarms are recorded in the Alarm Log table: Alarm ID Description SDEVICE Specified device has a problem. SDEVICE_DOWN Specified device has failed. SDEVICE_FAILOVER Device failover for Server Redundaney. $GMR_DEV_DOWN Specified Series 90 TCP/P redundant deviee is down, §GMR_POINT_DISCREPANCY Specified Series 90 TCP/IP redundant point has discrepancy. $REDUND_DEV_DOWN Redundant device down for Server Redundancy. AMSIALARM. Reserved for future use. DB_CONN_DOWN Connection lost to specified database for Database Logger. DB_START_ FORWARD Forwarding files found for Database Logger Store and Forward. McP_PROC_DOWN Specified CIMPLICITY process has terminated unexpectedly. Event Logging Event Logging lets you log system and user-defined events in the Event Log table ‘The following system events are recorded in the Event Log table: Event 1D Description SALARM_DISABLED Alarming for specified point is disabled. SALARM_ENABLED Alarming for specified point is enabled SALARM_MODIFIED Alarm limits for specified point modified by user. SALARM_RESTORED Alarm limits for specified point restored to original values $AM_STATUS Alarm Management throughput statisties, Issued every half-hour. SDL_FILE_FULL Reserved for future use. SDOWNLOAD Setpoint was downloaded to a specified point. SDYN_CFG Dynamic configuration enable/disable has been petfonmed by a specified wer. SLOGIN_DISABLED Specified use failed to log in tothe specified CIMPLICITY HMI project. 16.2 CIMPLICITY HMI for Windows NT and Windows 95 User Menuel GFK-1180GFK-1180 $LOGON Specified user has logged into a specified CIMPLICITY HMI projec. SLOGOUT Specified user has logged out of a specified CIMPLICITY HMI project. $RTR_LINK_DOWN Router link has been lost to specified node. DEMO_SPEED Carwash Demo speed alacm is generated Data Logging Data logging lets you log point data ina variety of ways, ‘You can log points: + Ate specified time of day. © Periodically 2a specified time interval + Periodically ata specified time interval while a digital point is HIGH or Low, + When the slarm state on the point changes. + Whenever the point’s vaiue is updated. Whenever point data is logged, the entry inthe log file includes the Point ID, a timestamp, and other optional atributes that you select. Group Logging Group logging lets you log information on e group of points in parallel. This method tives better performance and uses disk space more efficiently than Data logging Each entry in @ Group log table contains timestamp and the information you select foreach point. Group data can be logged as follows: + Ata specified time of day. + Periodically ata specified time interval + Periodically at a specified time interval waile a digital point is HIGH or Low. + In response to an event ‘+ When the alarm state on a point changes. + Whenever a point’s value is updated. Application Logging Certain CIMPLICITY HMI applications, such as the Basic Control Engine, allow you to log actions. To take advantage this feature, you must configure an ‘Application Table for the product option, ‘Te application chooses waat date to log and wen to logit Dacabase Logger 163Creating Tables When a project is started, the Datebase Logger creates any tables you have configured for that project based on the attributes you have specified. This means you dont have to know anything sbout databeses to log data from your CIMPLICITY project Specifically, when a project starts, the Database Logger will: + Attempt to create or repair any missing or damaged databases. © Create any missing tables, ‘© Create any missing colurmns in the tables. Microsoft Access Note To successfully create or repair tables, the Detabase Logger requires an exclusive Jock on the Access database, If another application is using the Access database, the Database Logger cannot exclusively lock the database, and it will terminate. If this happens, the following message will be logged in the Status Log for zhe project: Unable to repair database This problem occurs, for example, if a user is running reports op the Access database iil 9 project is being started. Using Wildcards in Search Strings You can use the following wildcards in the Database Logger user interface: * Use this wildcard to search for any number of characters at this point in the string. For example, if you want to display the list of tables that start with "Mand end with "X", enter M*X in the Table Identifier field, 2 Use this wildcard to search for any character in this place in the string. For example, if you want to display the list of tables whose fist character is "M" and third character is "X", enter M?X in the Table Identifier field. Note There are no implied wildcards. If you do not inclade or terminate your search string vith an asterisk, only those items that match your request exactly will be returns Lf Browser button is available to the right of an input field, you can click it and use the Browser to select the filter. Ef you are calling ODBC fimetions directly, you cannot use the * and ? wildcards, The underscore (_) characteris the only available wildcard. Use itto search for any character in this place in e string 1 you are calling SQL fimetions directly, you can use the * and ? wildcards. 14 CIMPLICINY HMI for Windows NT and Windows 95 User Manual GPK-1180Table Characteristics ‘The Database Logger tables have the foliowing characteristics: Points with Engineering Units conversion are stored in floating point format GFK-1180 Column Defini ‘ions A table can have, at most, 250 columns, The following columns are defined for each, type of log file Dats logging tables contain a timestamp and Point ID column, phas an additional column for each table and point atiribute you have selected, ‘The number of columns is indegendent of the nuraber of poins in the table, For example, if youhave a table that logs the point value and previous value for ali points configured for data Togging, the table will have four columns Alarm, Event, and Application logging tables have columns that are specific to that table, plus an additional column for each table attribute ‘you hove selected, All table rows include a timestamp column and an fnutoinerement sequence number that ensures that each row is unique, Group logging tables contain a timestamp colurmn, pins an additional ‘oluma for each table and point attribute you have selected. For example, if you have a table logging the Value and alarm state of five points, the table will have eleven columns. ‘The number of columns you can actually have in a group table depends ‘on the type of data you are storing. A record being added to the database can have at most 2 KB of data. With overhead, 2 KB amounts 10 approximately 222 8-byte floating-point numbers. If you are storing @ number of floating-point numbers or long text strings ina group recor, it is recommended that you verify thatthe 2 KB Limit is not being exceeded Dasabase Logger 165Key Definitions ‘The following keys are defined foreach type of logfile © Group logging tables have a unique primary key index on the ‘timestamp column. if you have selected the project name table attribute, the primary Key index also includes the project name columa, © Data logging tables have 2 primary key index on the joined timestamp ‘and Point ID columns, and a secondary index on the timestamp alone. Ifyou have selected the project name table attribute, the primary key index also includes the project name column. © Alarm, Event, and Application logging tables have a primary key index ‘on the joined timestamp and sequence number columns, and a secondary index on the timestamp alone. If you have selected the project name table atribute, the primary key index also includes the project name column. Important Since the Microsoft Access format does not support subsecond timestamp data, you cannot log points to a Data or Group table at subsecond rates. Attempting to do so will cause the duplicate-keyed records to be dropped from the database. 165 CIMPLICITY HMI for Windows NT and Windows 95 User Manual CFKII80Entering from Point Configuration ‘When you are configuring a point, you can choose to log point data and/or alarm data for that point ‘+ Whea you select Log Data, the point is automatically added to the DATA_LOG table with the defauit point Logging Conditions for that table, You can customize your point logging by selecting Settings... ‘The Point Logging dialog box opens. + When you select Log Alarm, the point’s alam is automatically added to the ALARM_LOG table witi the default alarm Logging Conditions for that table. You can customize your alarm logging by selecting Settings... The Alarm Logging dialog box opers. Point Logging ‘When you select Settings... for Log Data, the Point Logging dialog box opens This dialog box lists the tables where the point you selected is currently being logged. Ifthe list is empry, the point is not being logged in any table. ‘Use this dialog box to add the point to logging tables, modify logging tables, or remove the point from one or more logging tables. GFK1180 Database Logger 1607 aeAdding the Point to a Logging Table To ade the point to another logging table: L. Select Add... 2. The Tabie Browser disiog box opens. Select the table or tables where you want fo add the point, then select OK to retum to the Poine Logging Gialog box. 3. When you return to the Point Logging dialog box, the tables) that you selected are added to the list. You must confirm the additions in order to have them take effect. Select Cancel to cance! the additions, or select OK to contizma them, Modifying the Logging Properties for the Point ‘To change the logging properties for the point in a particular table: 1. Select the table 2. Select Modify 3. The Table Properties dialog box forthe point opens. Make your modifications, and then select OK to retum to the Pou Logging dialog box. 4. When you return to the Point Logging dialog box, the modifications you have made to the point have already taken place. Note that the Cancel bution bas changed to a Close button to indicate that you cannet undo the modifications. Removing the Point from One or More Logging Tables To remove the point from a logging table: 1. Select the tables from which you want to remove the point. The tables that you select will be highlighted. 2. Select Remove. 3. You will be asked to verify the removal request. Select Cancel to cancel the request, or select OK to proceed 4. When you retum to the Point Logging dialog box, the tble(s) that you selected are deleted from the lst. You must confirm the deletions in order to have them take effect. Select Cancel to cancel the deletions, or select OK to confirm them, Removing the Point from All Logging Tables To remove the point from all logging tables: 1. Select Remove All 2 You willbe asked to verify the removal request. Select Cancel to cancel the request, or selac: OK ta proceed. 3. When you return to the Point Logging dialog box, all logging tables that coatain the point are deleted from the lst. You must confi the deletions in order to have them take effect. Select Cancel to cancel the deletions, or select OK to contlem them. L608 ceuicr Y HMI for Windows NT and Windows 95 User Manual GFR-1180GPK1180 Alarm Logging When you select Settings... or Log Alarm, the Alarm Logging dilog box opene ‘The Alarm Logging dialog box shows you the table the point alarm is being currently logged to along withthe states that are being logged. If the alarm is not currently being logged, the default setting is ALARM_LOG ard the default ALARM_LOG point properties ae selected. Ifthe alarm is currently being logged, the intial settings will indicate which table is being used, and which states are being logged. You can log an aizrm to the ALARM_LOG table or to the EVENT_LOG table. An alana can only be logged to one of these tables, nat Both. If, for example, an alarm is ‘currently being logged to the EVENT _LOG table, and you select the ALARM_LOG table inthis dialog box, the alarm is automatically removed from the EVENT _LOG table when you select OK. Logging an Alarm To log an alarm: 1. Select the ALARM_LOG table or the EVENT_LOG table. 2. Ifyouhave selected the ALARM_LOG table, select the alarm events to log. You may choose any combination of events, 3. Select OK to confirm your changes and close the dialog box, or select Caneel to cancel your proposed changes and close the dialog box. Displaying Table Attributes ‘You can use the Table attributes button to display and modify the table properties for the ALARM_LOG and EVENT_LOG tables. To display the table properties for the table to which the alarm is currently being logged: L. Select Table attributes. The Table Properties dialog box for the selected table opens. Make your modifications, and then select OK 10 retum to the Alarm Logging dialog box. 2. When the Alarm Logging dialog box redisplays, the table has been: modified. Note that the Cancel bution iss changed to a Close button to indicate that you cannot cance! the modification of the tabie, 3. Select Close to close the dialog box without making any otter changes. Before you select OK, make sure that you are logging the alasra to the correct tab. Database Logger 169Using the Table Browser Use the Table Browser dialog box to select a table to display a filtered list of logging tables, add a point to one or more tables, create a new logging table, or modify the properties of an existing table ‘You can set the Auto Browse check box to have the current list of tables displayed automatically when you open the browser. Displaying A Table List ‘The dialog box initially displays a blank list of tables. You can choose to display the list ofall logging tables, or you can fiter the list according to table identifier andor table type To display «ble lise 1, Enter information in the Table Identifier field. You can leave this field blank, or you can enter a full or partial table name, IF you are centering a partial table name, you can use the following wildcards: 7 - Matches exactly one character *- Matches zero or more arbitrary characters, Select « Table Type. You cen display al table names, or you can select a particular type of table. When you click the Select button for this fielé, your choices are: ALL - digplaye all group and data table names. DATA- displays all data table names GROUP - displays all group table names, 3. Select Browse to display the list of ables. 16-10 CMPLICITY HMI for Windows NT and Windows 95 User Mamuat GFK1180GRK-LI80 Creating A New Table To create a new logging table; 1 2 Select New Table... ‘The Now Table dialog box opens. Make your modifications, and then select OK to retum to the Table Browser dialog box. When the Table Browser dialog box redisplays, the new table has been created and eppears in the table ist. Note that the Cancel button has changed to 2 Close bution io indicate that you cannot unde the creation ofthe table. Modifying the Properties of A Table ‘The Modify Table... button is only available when you select a single table from the list, To miodify the properties of a table: 1 2. 3 Select the table from the lst. Select Modify Table.. ‘The Table Properties dislog box for the selected table opens, Make your modifications, and then select OK to return to the Table Browser iatog box. When the Table Browser dialog box redisplays, the table has been ‘modified. Note that the Cancel button has changed to a Close button to indicate that you cannot undo the modification of the table. Dazabase Logger 16:11Starting from Your Project’s Configuration Cabinet ¢ Database Logging J612 Doubie-click the Davabuse Logger icon in your project's Configuration cabinet to initite the configuration function. ‘The CIMPLICITY Database Logger Configuration window opens. Ginn f PO)EVENT_LOG Fete beast ‘The CIMPLICITY Database Logger Configuration window displays a list ofall the currently configured group and data tables, as weil as the Alarm Log and Event Log tables. The icon to the left of each table indicates its type as follows: @) Alarm Log table or Bvent Log table EE] Date Log bie Group Log wbie (EApplication table You can use the Menu functions, Toolbar buttons and shortcut keys to: + Add a new Group or Dts table. + Copy the information fora selected table to anew table, + Delete a tabi + Modify a table's properties + Open a bie + AdE poins to a able, + Modify logging properties, + Display a fitered lst of tables, CIMPLICITY HMI for Windows NT and Windows 9§ User Manual GPK1180Database Logger Window Menu Options ‘You can use the menu options to create new tables, modify, copy or Gelete tables, toggle the Toolbar and Status Bar display, filter the table list, change log properties, and access Help, The File Menu When you select the Fila menu, the following drop-down list displays: Creates a new group or data table Displays the contents of the currently selected table, Copy Table... Copies the current table and its contents 10 a new table, Delete Table Deletes the currently selected table, Exit Exits the Data Logger function. The Edit Menu ‘When you select the Edit menu, the following drop-down list displays: ‘The Edit menu functions are: Table Properties... Displays and modifies the properties of the currently selected table. Add Alarms. Adds alarms to the Alaon Log or Event Log table, Add Points ‘Adds points to a Data Log or Group Log table Reconcile Table... Opens he Reconcile Table dialog box. Logging Properties... Displays and modifies Data Logger properties. GFK-1130 Datobese Logger 16-13The View Menu ‘When you select the View menu, the following drop-down list displays: ‘The View menu functions are: Toolbar _—_Enables/disables the display of the Toolbar. Status Bar Enables/disables the display of the Status Bas, Fitter... Filters the list of log tables. The Help Menu When you select the Help menu, the following drop-down list displays: ‘The Help menu functions are: Help Topics Displays the Help Contents for the Database Logger. ‘About Database Logger Displays the current version number for Database Logger. Using the Window Pop-Up Menu “The Window Pop-up Mena i available when you are working with a Dstabase ‘Use one of the following methods to access this menu: + With no tables selected, hold down the right mouse button. You can then select the general meau options. + Select a table and hold down the right mouse button, You can then select general or table related menu options. ‘The mem functions are: Open Opens the selected table. New. Opens the New Table dialog box and lets you create a new table. Rename... Opens the Rename Table dislog box and Jets you rename the table. d614 COMPLICITY HME for Windows NT and Windows 95 User Marat GFK-1130 wsLogging Properties... 4 table Deletes the selec Copies the selected table to a new table Opens the Table Properties dialog for the selected table. Opens the Select A Point or Select a Alarm Definition dialog box and lets you select points forthe table, Opens the Logging Properties dislog box. Database Logger Toolbar Buttons ‘The Toolbar buttons on the CIMPLICITY Database Logger Configuration window will perform the following functions: New Table Open Table Delete Table Copy Table Add Item Table Properties Loggi Filter Items About Database Logger \g Properties Creates a new data or group table. Displays the contents of the currently selected table. Deietes the currently selected table. Copies the current table and its contents to anew table, ‘Adds points or alasms to the selected table, Displays and modifies the properties of the currently selected table. Displays and modifies Date Logger properties. Filters the list of visible items. Displays program information, version umber and copyright, Database Logger Shortcut Keys ‘You can use the following shortcut keys to initiate commonly used functions: Ctrien, ctriec ctrit0 Creates a new group or data table, Copies the current table and its contents to 2 new table. Displays the contents of the currently selected table Dasabase Logger 1615Creating ANew Table ~ ‘When you create 2 new log table, the New Table dialog box opens. ‘To create @ new date or group table: 1, Boter the name of the new table in the Table identifier input field, ‘The name can contain alphanumeric characters (A thorough Z, O through 9) and underscores (_). ‘The name shoud be no longer then 16 characters. If you enter more then 16 characters, the name will automatically be truncated to the first 16 characters when you select OK. You cannot use the name of a currently existing table when you create a new table 2. Select the type of table you want. 3. Select OK to create the table, or select Cancel to cancel the proposed ‘ereation. When you select OK, the Table Properties dialog box opens. You can only ereate new group and data log tables. Only one Alarm table (celled ALARM_LOG) and one Event table (called EVENT_LOG) table exist in the Data Logger. You cannot delete these tables, and you cannot ereate additional Alarm or Event tables 16:16 (CIMPLICITY HMI for Windows NT and Windows 9 User Manual GPR1380Table Properties Five properties can be associated withthe property dislog box fora table, They are Logging Coniitions, Logging Attributes, Maintenance Events, Maintenance Actions and Logging Properties. + Logging Concitions determine wher data willbe pu into the log table, © Logging Attributes determine what data will be logged in the tabe, “You can specify point atributes, table attributes, and array attributes, © Maintenance Events define when export, purge, and command actions ‘will be performed on the table ‘+ Maintenance Actions define the type of sctions that take place when a Maintenance Event occurs. © Logging Properties define the database connection and tbe Store and Forward properties for the table ‘The number of properties, and the information on them depends on the type of table you are looking at * For the ALARM_LOG table, you can modify Default Logging Conditions, Logging Attributes, Maintenance Events, Maintenance Actions and Logging Properties. + For de EVENT_LOG table, you can modify Logging Attributes, ‘Maintenance Events Maintenance Actions and Logging Properties, + Fora data table, you can define or modify defeult Logging Conditions, Logging Attributes, Maintenance Events, Maintenance Actions and Logging Properties, + Fora group table, you can define or modify Logsing Conditions, Logging Attributes, Maintenance Events, Maintenance Actions and Logging Properties. ‘+ Foran application table, you can modify Logging Attributes, Maintenance Events, Maintenance Actions and Logging Properties, To dispiay a particular property page, move the cursor to its name tab in the Table Properties dialog box and click the left mouse button. Before that page is displayed, ‘any changes that you have trade on the current property page are validated. If any problems are found daring validation, you must correct them before the next property page is displayed. ‘When you select OK, information on all the properties in the dialog box are applied to the table, ‘When you select Cancel, none of the information on any of the propartios is applied to the table. GFK-1180, Database Logger 16517Default Logging Conditions for the ALARM_LOG Table the current default logging criteria for alarms being logged into the table. These criteria are: Generate Information about the alarm is logged when the alarm occur. Acknowledge Information about the alarm is logged when the alarm is acknowledged by she operator or the system. Reset {Information about the alarm is logged when the alarm is reset by the operator or the system. Delete Information about the alstm is logged when the alarm is ‘manually deleted from the system. Modifying Logging Conditions To change the defauit logging conditions: 1. Set the check box for 2ach even: tbat you want to log. 2, Clear the check box for each event thet you do not want to log Select OK, 1618 CIMPLICITY HME for Windows NT and Windows 9$ User Manual GFK-1180Logging Conditions for Group and Data Tables ‘The Logging Conditions property page for a group or data table displays the current Jogging conditions for the table. You can have logging to the table acour under any combination of the following: + Data triggered logging + Alann wiggered logging + Timedi/gated logging Seiect Use Defaults to reset the Logging Conditions to their default values. The default is to log data periodically every $ minutes. ‘The Point and Point Alarm fields have a Browser buston and 2 Pop-up Menu button + Use the Browser button - l- to open the Select A Paine Browser and search for a Point ID. + Use the Pop-up Menu button for an existing Point ID. 19 create a new Point ID or browse GFK-1180 Databese Logger 1619Table Data Triggered Logging Select his option if you want to log data when the trigger points value changes. “To select this type of logging! 1. Set the On point value update check box. 2. Enter the Point ID ofthe tigger pint in the Point field ‘You can combine data tiggered logging with alarm tiggezed loging. IE you do not define any logging conditions under Timed/Gated Logging, then data will only be logged into the table when the tigger occurs Table Alarm Triggered Logging Select this option if you want to log data when the tigger point goes into the select alarm state, ‘To salect this type of logging: 1, Setthe Alarm triggered logging check box. 2. Set the check box for each alarm state tbat you want to tigger logging. 3. Enter the Point ID of the wigger point in the Point alarm field For this option to work successfully, you mmst define alarm limits for the trigger point. For example, if you select 2 Point ID and choose its Alsrm High state, logging in the table will occur each time the point enters the Alarm High state. ‘You can combine alam triggered logging with data tiggered logging. If you do not define any logaing conditions under Timed/Gated Logging, then data will only be logged ino the table when te triguer occur. Combining Triggers ‘You can combine triggers. When you combine triggers, logging occurs when either ofthe triggers occurs. For example, if you want to log set of points when POINT_A is updated or when POINT_B is in Alarm High sate 1. Set the On point value update check box. Enter POINT_A in the Point field, Set the On point alarm state check box. Set the Alarm High check box. Enter POINT_B in the Point feld 16-20 CIMPLICITY BM? for Windows NT and Windows 95 User Manual GFK-1I80Table Timed/Gated Logging Timers and gates determine the logging interval. You can choose one or more of the following evens: Beriodic Sct this check box wen you want to log data into the table at rogular intorvala ‘Enter the time value in the input field, and select the time interval Valid intervals are DAYS, HOURS, MINUTES, SECONDS, or TICKS (100 ticks = I second). ‘Synchronized Set this check box when you want to log data at a particular time of day. Enter the time in the input field, and select AM or PM, (On digital point state Set this check box if you want to log data while a
GRK-1180 Triggered Maintenance Events ‘You can select either ofthe following triggered maintenance events: Disk space low Maintenance actions will be executed when disk space below the specified threshold. ‘The disk is checked for this condition at an interval you specify in the Logging Properties dialog box. Logging count Maintenance actions will be executed when the number of records logged to the table reaches @ multiple ofthis number. Timed/Gated Maintenance Events ‘You can select any of the following timed/geted maintenance events: Periodic. ‘Maintenance actions will be executed at the time interval specified. ‘Valid intervals are DAYS, HOURS, and MINUTES, Synchronized ‘Maintenance actions will be executed at the time of ay specified, On digital point state Maintenance actions will be executed when the
records in the table are exported. ByTime Data entered in the table for the last
days, hours, or rinutes is exported. CIMPLICITY HMI for Windows NT and Windows 95 Urer Manual GFR-1180Purge Actions Purge actions let you delete dats from the table when a maintenance event occurs. To select this option: Set the Delete records check box. 2. Select the number of records you want to retain in the table. ‘You can retain records in one of the following ways: By Count Delete all but the last (most recent)
records in the rable By Time Delete all but the records entered in the table for the last
days, hours, or minutes, If you want to save the data to be purged from the table to a CSV format file before removing it from the table, then set the Save deleted in file check box and enter the name of the CSV file. Command Actions (Command actions let you perform more complicated actions when maintenance events occur. You can select one or both of these action Execute SQL command Lets you execute « SQL command on the table. Enter the command in the input field, Run program Lots you run a program. Enter the program pathname in the input field. You may include ‘command-line arguments for the program, Compact database Use this action to compact the Microsoft Access database where the table resides during a maintenance event, arning} Use the Compact database action with great caution. Compacting a Microsoft Access database requires the database file not be used by any process, otherwise the action falls and waits to be executed during the next maintenance event. Due to this restriction, the Database Logger terminates all communication with the Microsoft Access database while the compact action occurs. This means that the logger ‘queues may overflow depending on how fast items are being logged nd t GPE-1180 Daiabase Logger 16.27Logging Properties for All Tables ‘The Logging Properties property page for a table displays the current database ‘connection and the parameters used by Store and Forward for the table. Connect Information ‘You can select an ODBC data source for cach tabie thet you create in the Detabese Logger. To connect to table, enter the following information: ODBC data source Select the data source to receive logged data for this table. This fold displays the list of curently configured ODBC data sources, In general, it will consist ofa list of one or more Microsoft Access or SQL Servers. ‘The defoult data sources ar: © CIMPLICITY Alarm Logging ‘A Microsoft Access data source that logs data to the CIMPLOG-MDB file in the ARC directory of your CIMPLICITY HMI project. + CIMPLICITY Point Logging A Microsoft Access data source that loge data to the POINTLOG.MDB file in the ARC directory of your CIMPLICITY HMI project. + CIMPLICITY SQL Server Logging ‘A Microsoi SQL Server data source that logs data to an on-node SQL Server database. You ‘must install SQL Server (sold separately) to use this data source, 1628 CIMPLICITY HMI for Windows NT and Windows 95 User Manual CPKL189Ifyou have en Orecie database, you may the see ODBC data source that you crested for Oracle, Database user Enter the username needed to connect to the selected database driver. This field is required if yyou are connecting to % SQL Server. Password Enter the password needed to connect to the selected database driver. This field is required if you are connecting to 2 SQL Server, Reconnect wait ps Enter the amount of time the Database Logger waits between reconnect attempts wher the connection to the database is lost. The default is 30 seconds, Enter a value between 0 (continuous retvies) and 24 hours. Store and Forward ‘To configure Store and Forward for this table, set the Enable Store and Forward check box. “After you enable this feanure, use the radio buttons to select between unlimited or Jinnited storage of database records. Unlimited Click this radio button if you want the Database Logger to store an unlimited -mumber of records when its connection to the database is down, ‘The number of records actually stored is determined by the amount of time the connection is lost and by the amount of free disk space you have. Max number of stored records Click this dio bution if you want to select the mumber of records the Database Logger ‘will store wien its conection to the database is down, Enter a number between 1 and 4,294,967,295. GFK-1180 Database Logger 16-28Filtering the Table List ‘To filter the list of tables in the Darabase Logger window, select Filter... from the View menu. ‘The Filter Tables dialog box opens. Use this dialog box to filter the Hist of logging tables by Table Identifier and/or Table ‘Type. To filter the table list: 1, Enter a full or partial Table ID in the Table Identifier input field. You can use the ? and * wildcards to perform partial string searches. Select the Table Type you want to filter for. Valid selections are ALARM, ALL, DATA, EXTERNAL, or GROUP. 3. Select OK to filter the list according to the information you've entered, or select Cancel to cancel the filter function. To display all the tables, put an asterisk (*) in the Table Identifier field, and select, ALL for the Table Type. Copying a Table 16-30 Important ‘You cannot copy the Alarm (ALARM_LOG), Event (EVENT_LOG) or External tables. To copy the attributes, actions, and contents of a selected group or date table to 3 new table, select the table you want to copy, then do one of the following: + Select Copy... from the File nemo. + Select Copy... from the window pop-up menu. + Click the Copy button on the Toolbar + Press Ctritc ‘The Copy dialog box opens Cony table GROUP CIMPLICITY Hl for Windows NT and Windows 95 User Marea! GFK-1180 cier the new table narae in the input field. You mst enter a new name. The Data Logger will not let you use a current table name for a new table. Select OK to create the table, or select Cancel to cancel the copy function, Renaming A Table To rename 2 date or group table, select the table, and then do one of the following: ‘+ Select Rename... from the File menu. ‘+ Select Rename... from the window pop-up menu, + Press CtrleR, ‘The Rename table dialog box opens Enter the new table name in the input field. You must enter 2 new name, The Database Logger will aot let you use a current able name when you rename a tabi. ‘Select OK to create the table, or select Cancel to cancel the rename function, Note ‘You cannot rename the Alam (ALARM LOG), Eve tables. (EVENT_LOG) or External Deleting A Table To delotea group, data or extemal table, selec the table, and then do one ofthe following ‘+ Select Delete Table from the File men. + Select Delete... from the window pop-up mena, + Click the Delote Table buron on the Tootba A confirmation message dialog box forthe table opens Select OK in the confirmation mnessage box to verify that you want the table removed, or select Cancel to cance! your request, Tie table ist updates after the confirmation message box closes. Note “Yai Gar lee fe Alem (ALAR LOG) of Bon EVENTLL GFK-1160 Database Logger 16:31Reconciling a Table ‘You can use the Reconcile option on the Edit menu to show the differences between the current CIMPLICITY HMI table configuration and the logging database, ‘When you select Reconcile from the Edit menu, the Reconcile Table dialog box The dialog box lists all the ficids inthe table configuration, and any fields in the table in the database that are not in the configuration. Each field has one of the following icons: G—@ Field isin the Database Logger configuration and database table © Field is in the Database Logger configuration and database table, but types don’ match, Field is in the database table, but not in the Database Logger table configuration (unused) os S— Fields in the Database Logger configuration, but not in the database table (uncreated). - Field has been removed from the Database Logger configuration and the database table. “You can use this dislog box to remove unused fields from the datshase table or create fields in the database table for new fields in the configuration. . Important You can use this dialog box to remove fields from Microsoft Access databases. Fields in SQL Server and Oracle databases must be removed manually. 5632 CIMPLICITY HMI for Windows NT and Windows 9§ User Maral GPE1180Creating Uncreated Database Fields To create fields in the database for new fields in the configaration: 1. Select the fields you want to create, Uncreated fields display this icon: © ‘You can use the Shift and Ctrl keys to select Select Uncreated to se ct multiple fields, or you can all the uncreated fields in the table 2. Selest Create, Afier the fields are created in the database, their icons change to: Removing Unused Microsoft Access Fields Toremove unused fields fom the database abe: 1. Selet the felds you vant to remove, ‘Unused fields display this icon: @—2 ‘You can use the Shift and Ctrl keys to select multiple fields, or you can select Select Unused to select all the unused fields in the table, 2. Select Remove. After the unused fis are removed from the database, thei icons change tor @—® Removing Unused SQL Server and Oracle Fields ‘SQL Server and Oracle do not directly support dropping colurmns in a database table. To delete unused columns, you must: 1, Copy the table to @ temporary table. 2. Drop the table from the database, 3. Recreate the tible with the fields you wish to use, 4. Copy the data from the temporary fable tothe new table, 5. Delete the temporary table. Consult your SQi. Server or Oracle documentation for details on how to do this, GFK-1189 Database Logger 16-33Database Logger Properties The Logging Properties dialog box lets you define logging parameters, and specify the type of database driver that interfaces with the Databese Logger option, Benchmark tests on a 60 MHz Pentium PC show that the following data rates can be sustained for group tables with 200 points: Microsoft Access 3.5 waites/scoond On-node SQL Server 18 writes/sevond ‘Ya Group table kolds 200 points. 18.» write is defined as a single log event on a table, The data rate is relatively ‘writes/s0c to that table gives a data ‘rate of 3500 poins/eec. 1634 independent of the mumber of points logged to a table, and of the number of tables boeing logued to. For example, using ¢ SQL Server, you can og to 18 tables in one second, or you can perform 3 log events on 6 tables in one second, Because of this characteristic, a group table can log Cate faster than a dais table with the same number of points Note ‘Smaller groups log faster then larger groups. However, one large group logs faster than two that are half as big do. Parameters CIMPLICITY HMI jor Windows NT and Windows 95 User Manual GFK-1180 “a‘The Parameters page displays the curcent disk scan rate, date table quoue size, deta Jogging scan rete, and maintenance action export path. When you open the ODBC Configuration page, ox select OK to close the property shec, information on the page will be validated, You can define the following parameters: + Disk fll scan rate + Database queue size * Point data logging scan rate + Maintenance action export path Disk full scan rate (min) If any of your tables use the "Disk Full" maintenance event, you should know that the disk is nbt continvously monitored for this condition, Instead, the disk is monitored at the rate specified by this field ‘The "Disk Full" condition is only useful for Microsoft Access databases. The SQL Server forces prealloeation of disk space for data tables. Database queue size ‘This field controls the queue of logged data for each table, Entcra queue size that \ill support worst-case logging during activity bursts. For exemple, if 10 points are being logged to the DATA_LOG table, you should havea queue size of at feast 10 in case their logging conditions all occur simultaneously. ‘A message is logged to your project®s Status Log whenever the database queue for a table overflows, and additional waite requests are dropped until tere is room in the (queue for ther, Ifyou are doing more logging than cen be supported by the benchmarked data rate forthe database, increasing the size of the database queue will not resolve the problem of lost deta, Increasing the size of the Database Logger queue will increase the emount of memory used by the database logge. Since each table preallocates memory for the queve, this growth will take place at startup time. For each additional encry in the queve, the following additional memory will be used: Alarm Log Table 200 bytes per enty. Event Log Table 200 bytes per entry. Data Tables Size of logged data plus 36 bytes Group Tables _ Size of logged deta plus 36 bytes. GPE-1180 Daxabase Logger 16035100 ticks = 1 second 16-36 Point data logging scan rate (ticks) ‘This scan rte is the worst-case scan rate et which the Point Data Logger will submit data for logging. The value you enter here should be faster then the fastest table acan rate, Enter the scam rate in ticks. ‘This value should be faster than the fastest table scan rate, and large enough so that all the data for a PLC scan comes into the database together. Maintenance action export path ‘The export path defines the directory that holds the files created by table maintenance export and purge actions. This pathname is validated when the Parameters page is closed. ‘The defeult velue of $r7H_ROOT: \ARC places the daie into the ARC subdirectory of the project. You may use the logical directory name STTB_ROOT to specify a different subditectory of your project, or use any other full pata specification suck as D:\ EXPORT, Alarm and Point Logging The Alarm Logging page shows the ODBC configuration that will be used when logging data to the ALARM_LOG, EVENT_LOG and Applicasion tables. The Point Logging page shows the ODBC configuration that will be used when logging data to Data and Group tables. ‘You can define the following parameters + Connect information, including ODBC Data Source, Database User, Password, and Reconnect Wait Period. + Store and forward information, including Enable Store and Forward and the maximum number of stored records. (CIMPLICITY EMI for Windows NT and Windows 95 User Marsal GFE-1180 eeIf edditional information is required to connect to the database you selocted, you will be prompted for it during validation. Validation occurs when you select OK, or select the Paramezers page. Information needed varies from database to database. In ‘general: ‘+ Ifyou are connecting to a Microsoft Access database, you may be prompted fora file name, + Leyouare connecting to ® SQL Server, you may be prompted for 2 database name. ‘+ Ifyouare connecting to an Oracle database, you may be prompted for a Server ID. Enter the Alias Name for the Oracle database in this Held. Hf the Data Logger is unable to connect o the selected database, validation fails, Connect Information Enter information in the following fields: ODBC Data Source Select the data source to receive logged data. This Hicld displays a current list of ODBC data sources. Jn general, it consists of 2 list of one or more Miczosoit Access or SQL Servers. The default data sources are: + CIMPLICITY Alarm Logging A Microsoft Access data source that logs data to the CIMPLOG MDB file in the ARC directory of your CIMPLICITY instatiation, + CIMPLICITY Point Logging ‘A Microsoft Access data source tha’ logs data to the POINTLOG.MDB file is the ARC directory of your CIMPLICITY installation, Note ‘The CIMPLOG MDB end POINTLOG MDB files compatible with Microsoft Access version 7.0 * CIMPLICITY SQL Server Logging A Microsoft SQL Server data source that logs data to an on-node SQL Server database. You ust install SQL Server (Sold separately) to use this data source, Ifyou are using an Oracle Database, you may see the ODBC data source that you created for Oracle. If you are using Microsoft Access, you need to be aware that there are file locking issues for both logging and reporting if you sclect the same Microsoit Access data source for both the Alarm and Point fogging pages, To avoid these problems, always select separate data sources for Alarm and Point logging pages. GFK-1180 Dosabase Logger 1637 “”eIfyou are using SQL Server or Oracle, these file locking issues do not exist. You may configure both the Alarm and Point logging pages tothe sarae SQL. Server data source Database User Enter the usemame needed to connect to the selected database driver. This field is required if you are connecting to 2 SQL Server. Password Enter the password needed to connect to the selected database driver. This field is required if you are connecting to an SQL Server. Reconnect Wait Period Enter the amount of time the Database Logger waits between reconnect attempts when the connection %0 the database is lost. The default is 30 seconds. Enter a value between 0 seconds (continuous revries) and 24 hours. Store'and Forward ‘Enter information in the following fields: Enable Store and Forward Set this check box to enable the Store and Forward feature, ‘After you enable the feature, use the radio buttons to select between unlimited or limited storage of database records. Unlimited ‘Click on this radio button if you want the Database Logger to store en unlimited ‘number of records while its connection to the database is down. The number of records actually stored is determined by the amount of time the connection is lost and by the amount of free disk space you ave, ‘Max number of stored records Click on this radio button if you want to select the nuraber of records the Database Logger will store when its connection to the database is down. Enter a number between 1 and 4,294,967,295. 16-38 CIMPLICITY HMI for Windows ND and Windows 9§ User Manual GFE1180Displaying A Table To display the contents ofa table, you can double-click on the table name in the CIMPLICITY Database Logger Configuration Window. Alternatively, you can select the table in the CIMPLICITY Dasabase Logger Configuration window then: + Select Open Tabl + Click the Open Table button on the Toolbar. + Press Ctri+0. ‘Toe CIMPLICITY Database Logger Configuration window for the solected teble opens. from the File menu, pTSauAAN DISABLED, |] GALATI ENA SALARM_MODIFIED SALARIM_RESTORED SAM_STATUS SOL_FLE_FULL SDOWNLBAD SOYN_CFE s.0g0N s\OGOUT SATR_UNK_DOWN DEWO_SPEED “You can use the Menu functions, Toolbar buttons and shorteut keys to: + Add new points to the table. ‘+ Delete points from the table. ‘+ Display and modify point or alarm logging properties. + Display and modify table properties, + Display a filtered list of points + Close the table and retum to the main Data Logging window. GFK-1180 Database Logger 1639Table Menu Options ‘You can use the menu options to add points io the table, deiete points from the table, display end modify table and point properties, toggle the Toolbar and Status Bar display, filter the table list, and zccess Help. The File Menu ‘When you select the File menu, the following drop-down list displays: For Data and Group tables For Alarm and Bvent tables ‘The File mena options are: Add Points... For Data and Group logs, adds pois tothe tabe. Add Alarms. For Alarm and Event logs, adds alarms to the table, Remove Point Removes the selected point from the table. Remove Alarm Removes the selected alarm from the table. Close Table Closes the table and returns to the main Data Logger window, The Edit Menu ‘When you select the Edit menu, the following drop-down list displays: For Data and Group tables For Alarm and Event tables ‘The Edit menu options are: Point Properties... For Data and Group logs, displays and modifies the logging properties of the selected point Alarm Properties... For Alarm and Event logs, displays and modifies the logging properties of the selected alarm. Table Properties... Displays andl modifies the properties ofthe table. Reconcile Table... Reconciles the current table with the database. 16.40 CIMPLICITY HM! for Windows NT and Windows 95 User Manual GPK-1130GFK-1180 The View Menu When you select the View menu, the following drop-down list displays: ‘The View menu options are: Toolbar Enables/disables the Toolber display. Status Bar Enables/disables the Stats Bar display. Fitter... iter the lis of point in the table. The Help Menu ‘When you select the Help menu, the following drop-down list displays: ‘Tae Help menv options are: Help Topics Opens the Help Contents for the Database Logger About Database Logger Displays the current version number for Database Logger. Using The Window Pop-Up Menu ‘Tac Window Pop-up Menu is available when you are working with at Database Logger table. For Data and Point ables For Alarm and Event tables Use one of the following methods to 2ocess this menu ‘+ With no itemns selected, hold down the right mouse button. You can then select the table related memu options. + Select an item in the table and hold down the right mouse button, You can then select item or table related menu options. ‘The menu functions are Remove Removes the selected point. Properties... Opens the Properties dialog box for the selected point ‘Add Points... For Data and Group logs, opens the Select 4 Point Browscr and lets you select points to be added to the table Add Alarms... For Alarm end Event logs, opens the Select 4 Alarm Definition Browser and lets you select armas to be added to the table. Database Logger 16-41Table Properties... Opens the Properties dialog box for the table Close Closes the table. Table Toolbar Buttons ‘The Toolbar buttons available to you are About Database Logger Displays program information, version umber and copyright. Close Table Closes the table and retum tothe main window. Remove Items Removes selected points or alarms from the table. ‘Add Item ‘Adds points or alarms to the table, [Ee] tem Properties Displays and modifies the logging eh properties for the selected point or alarm. |Bjj_— Table Properties: Displays and modifies the properties of = the table. (]__Fiter tems Filters the List of points or alarms in the ‘able S Adding Points to A Table The Select A Point dialog box opens when you add a new point to ¢ data or group table. Use this dialog box, which is part of the Browser, to generate a list of points from which you can select 2 point (or points) to add io the table. For more infomation on the Point Browser, see that chapter in this manual. Removing Points from A Table To remove 2 poiat from a table! 1. Select the point. 2. Select Remove Point from the File menu or click the "Remove Point" button on the Toolbar. A confirmation message box opens. Select OK in the confirmation message box to verify that you want the point removed or select Cancel to cancel your request. “The poin: fist updates afer the confirmation message box closes. Editing Point Logging Properties 7 You can modify the logging properties for each properties that you can modify depend on the t point ina logging table. The le type: ‘© Forpoints in group tables, you can modify each points Logging Avteibutes, + Forpoints in data tabies, the Alarm Log tabie, and the Event Log table, you caa modify each point’s Logging Conditions. 16-42 CIMPLICITY HMI for Woxdows NT and Windows 95 User Manual GFK-1180GPK-1180 Group Table Point Properties ‘The Logging Auribuces property page for a point ina group ‘able displays the current attributes assigned to the point. You can have point logging occur under any combination of the following: + Point Attributes © Array Attributes (array points only) Select Use Defaults to reset the Logging Attributes to their defeult values. The
You might also like
Cimplicity Users Manual Gfk1180f
PDF
No ratings yet
Cimplicity Users Manual Gfk1180f
618 pages
ECS User Manual v7.0.6
PDF
100% (1)
ECS User Manual v7.0.6
750 pages
Alarm Center Users Manual
PDF
100% (4)
Alarm Center Users Manual
210 pages
Alarm Handling Ma268 b1 PDF
PDF
No ratings yet
Alarm Handling Ma268 b1 PDF
158 pages
Mark V Control Setting Specification
PDF
No ratings yet
Mark V Control Setting Specification
125 pages
Zte Alarm Management PDF
PDF
100% (1)
Zte Alarm Management PDF
82 pages
Cimplicity 1
PDF
No ratings yet
Cimplicity 1
119 pages
Cimplicity 4
PDF
No ratings yet
Cimplicity 4
62 pages
Zenon Alarms Administration
PDF
100% (1)
Zenon Alarms Administration
167 pages
ECS 7.7 Tamamı
PDF
100% (1)
ECS 7.7 Tamamı
787 pages
GEI-100165 Ethernet TCP-IP GEDS Standard Message Format (GSM)
PDF
100% (1)
GEI-100165 Ethernet TCP-IP GEDS Standard Message Format (GSM)
30 pages
Gei-100271 System Database (SDB) Browser PDF
PDF
No ratings yet
Gei-100271 System Database (SDB) Browser PDF
18 pages
Cimplicity 5
PDF
No ratings yet
Cimplicity 5
56 pages
TIA PRO2 11 HMI Alarm Messages
PDF
No ratings yet
TIA PRO2 11 HMI Alarm Messages
14 pages
Adding Points To Cimplicity
PDF
100% (1)
Adding Points To Cimplicity
1 page
Communication Guide, Tricon v9.6 PDF
PDF
100% (1)
Communication Guide, Tricon v9.6 PDF
248 pages
Technical Product Guide, Tricon v9.4 PDF
PDF
No ratings yet
Technical Product Guide, Tricon v9.4 PDF
88 pages
Technical Product Guide, Tricon v9.4 PDF
PDF
No ratings yet
Technical Product Guide, Tricon v9.4 PDF
88 pages
BN3500 Maintenance
PDF
100% (1)
BN3500 Maintenance
94 pages
07 AlarmManagement en
PDF
No ratings yet
07 AlarmManagement en
39 pages
It Alarms and Events
PDF
No ratings yet
It Alarms and Events
358 pages
Editing MKVI Alarm Screens r1
PDF
No ratings yet
Editing MKVI Alarm Screens r1
16 pages
McAfee SIEM ESM10 Best Practices For Alarms
PDF
No ratings yet
McAfee SIEM ESM10 Best Practices For Alarms
28 pages
JX-300XP Real-Time Monitoring
PDF
No ratings yet
JX-300XP Real-Time Monitoring
17 pages
BM Cimplicity Alarms and Messages Master
PDF
No ratings yet
BM Cimplicity Alarms and Messages Master
223 pages
04 Fault Management - PPT-82
PDF
No ratings yet
04 Fault Management - PPT-82
82 pages
Alarm Viewer Documentation
PDF
No ratings yet
Alarm Viewer Documentation
12 pages
03 - PlantPAx Alarm Configuration For View 6
PDF
No ratings yet
03 - PlantPAx Alarm Configuration For View 6
16 pages
It Alarms and Events
PDF
100% (1)
It Alarms and Events
520 pages
Alarm Client Control
PDF
No ratings yet
Alarm Client Control
177 pages
BM Cimplicity Alarms and Messages Master
PDF
No ratings yet
BM Cimplicity Alarms and Messages Master
189 pages
Upload Documents
PDF
No ratings yet
Upload Documents
122 pages
Alarms Control V7
PDF
No ratings yet
Alarms Control V7
74 pages
Implementing Alarms and Messages
PDF
No ratings yet
Implementing Alarms and Messages
122 pages
ITAlarms and Events
PDF
No ratings yet
ITAlarms and Events
520 pages
B0193au - H Process Alarm Configuration
PDF
No ratings yet
B0193au - H Process Alarm Configuration
98 pages
HMI Configuration Setup r1
PDF
No ratings yet
HMI Configuration Setup r1
13 pages
Training - M2000 (M2000V200R012C00) - Alarm Management-20120417-C - V1.0
PDF
No ratings yet
Training - M2000 (M2000V200R012C00) - Alarm Management-20120417-C - V1.0
104 pages
06 eSCN230 Alarm Management and Monitoring 16 9 (G02806198 - OTHZH A)
PDF
No ratings yet
06 eSCN230 Alarm Management and Monitoring 16 9 (G02806198 - OTHZH A)
43 pages
Gei 100697
PDF
No ratings yet
Gei 100697
52 pages
Communication Guide, Trident v1.2 PDF
PDF
No ratings yet
Communication Guide, Trident v1.2 PDF
266 pages
Gei 100620 PDF
PDF
No ratings yet
Gei 100620 PDF
121 pages
3BSE025998 Alarm
PDF
No ratings yet
3BSE025998 Alarm
110 pages
It Alarms and Events
PDF
No ratings yet
It Alarms and Events
496 pages
CMPC 108 - PLC-HMI Project - Module 10 - Creating The Alarm Server
PDF
No ratings yet
CMPC 108 - PLC-HMI Project - Module 10 - Creating The Alarm Server
26 pages
09 Alarms June2022 v02 HANDOUT
PDF
No ratings yet
09 Alarms June2022 v02 HANDOUT
14 pages
Adding Points To Cimplicity - SDB - Exchange r2
PDF
No ratings yet
Adding Points To Cimplicity - SDB - Exchange r2
2 pages
CEMPLE Users Guide, TriStation v3.0 PDF
PDF
No ratings yet
CEMPLE Users Guide, TriStation v3.0 PDF
100 pages
Alarms v5.0 Ini File
PDF
No ratings yet
Alarms v5.0 Ini File
23 pages
AeConfigurator UserGuide
PDF
No ratings yet
AeConfigurator UserGuide
16 pages
Mcafee Siem Alarms: Setting Up and Managing Alarms in Mcafee Esm 10.X
PDF
No ratings yet
Mcafee Siem Alarms: Setting Up and Managing Alarms in Mcafee Esm 10.X
28 pages
User Guide: Alarm and Events Configurator: Document Version 1.0
PDF
No ratings yet
User Guide: Alarm and Events Configurator: Document Version 1.0
18 pages
5 - Siemens Open Library - Siemens HMI Alarm Generation V1.2
PDF
No ratings yet
5 - Siemens Open Library - Siemens HMI Alarm Generation V1.2
13 pages
Siemens Comfort Panel Alarm Messaging
PDF
No ratings yet
Siemens Comfort Panel Alarm Messaging
18 pages
Chapter 2 System Architecture: Hapter
PDF
No ratings yet
Chapter 2 System Architecture: Hapter
34 pages
Alarm & Events: Shailendra Sharma CE-HMI Department
PDF
No ratings yet
Alarm & Events: Shailendra Sharma CE-HMI Department
21 pages
Technical Product Guide, Trident v1.0 PDF
PDF
No ratings yet
Technical Product Guide, Trident v1.0 PDF
40 pages
Technical Product Guide, Trident v1.0 PDF
PDF
No ratings yet
Technical Product Guide, Trident v1.0 PDF
40 pages
ECS & QCX Core - Alarm Live - User Manual
PDF
No ratings yet
ECS & QCX Core - Alarm Live - User Manual
19 pages
Chapter 5 Installation and Configuration: Hapter
PDF
No ratings yet
Chapter 5 Installation and Configuration: Hapter
18 pages
McAfee SIEM Best Practices For Alarms PDF
PDF
No ratings yet
McAfee SIEM Best Practices For Alarms PDF
20 pages
Creating and Configuring Alarms: Struxureware Building Operation 1.9
PDF
No ratings yet
Creating and Configuring Alarms: Struxureware Building Operation 1.9
26 pages
15 Fault Management - PPT-82
PDF
No ratings yet
15 Fault Management - PPT-82
82 pages
Alarm
PDF
No ratings yet
Alarm
21 pages
Alarmh v2.07.1
PDF
No ratings yet
Alarmh v2.07.1
18 pages
AlarmNotifier User Guide
PDF
No ratings yet
AlarmNotifier User Guide
32 pages
Alarm Handler4
PDF
No ratings yet
Alarm Handler4
27 pages
Hyper Alarm Server - Quick Start
PDF
No ratings yet
Hyper Alarm Server - Quick Start
7 pages
CIM HT017 Global Alaup Configuration
PDF
No ratings yet
CIM HT017 Global Alaup Configuration
6 pages
Gea s1004 PDF
PDF
No ratings yet
Gea s1004 PDF
8 pages
P Alarm 2.0 Syslib Rm002c en e
PDF
No ratings yet
P Alarm 2.0 Syslib Rm002c en e
40 pages
Parameters For Setting The Alarm/Event Maintenance Experience
PDF
No ratings yet
Parameters For Setting The Alarm/Event Maintenance Experience
2 pages
Tool Converting FactoryTalk View SE HMI Alarms To A&E Tag-Based Alarms
PDF
No ratings yet
Tool Converting FactoryTalk View SE HMI Alarms To A&E Tag-Based Alarms
2 pages
GEI-100189A System Database For System Toolbox
PDF
No ratings yet
GEI-100189A System Database For System Toolbox
22 pages