0% found this document useful (0 votes)
218 views115 pages

Alarm Configuration

Uploaded by

Mohamed Amine
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
218 views115 pages

Alarm Configuration

Uploaded by

Mohamed Amine
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 115
Alarm Configuration About Alarms CIMPLICITY HM! software generates alarms for points that are in an alarm state, It also generates alarm messages about system events, such as device fares, program terminations, system startups, and system shutdowns, To configure or modify alarms for points, use the Configure Poinis function. Use Configure Alarm Definitions to configure alarm definitions for alarms generated bby custom software or to modify alarms for CIMPLICITY HMI system events or product options. Alarm Message Variable Run-time Parameters ‘Variable run-time parameters determine the display of field data, Possible parameters that you can include in an alarm message are Parameter Description %ID Displays the Point ID, AVAL Displays the point value (converted to engineering unis if applicable. %EU Displays the Engineering Units label LIMIT Displays the alarm limit that was exceeded. ‘STATE Displays the alarm string for the String Index. %DEV_ID Displays the Point ID of the deviatioa point. ‘*DEV_VAL Displays the value of the deviation point. ‘*DEV_AMT Displays the difference between the current point value and the eviation point value. Displays an actual percent sign in the message. ‘The contents of each vatiable message field are determined whea the alarm is generated. Note GPE-1180 104 Standard Alarms A set of standard event alarms is included in your base configuration. These alarms axe: $ALARM_DISABLED [Alarm is disabled Zor the specified point $ALARM_ENABLED Alarm is enabled forthe specified point $ALARM_MODIFIED Alarms is modified for the specified point. $ALARM_RAWLIM ‘Alam: raw lists modified forthe specified point $ALARM_RESTORED Alarm limits restored forthe specified point $AM_STATUS Alam Management status message used to analyze system performance, This message is issued every half-hour and shows the number of alarms generated, the count of alarms acknowledged, reset and deleted, and the average munber of seconds required to log an alarm. SDEVICE ‘Alarm message for specified device. SDEVICE_DOWN Device failure message for specified device. SDEVICE_FAILOVER Reserved for future use $0L_FILE_FULL Log file full message for specitied log fle SDOWNLOAD Setpoint was downloaded to specified device. SDYN_CFG specified entity has been chenged dynamically $GMR_DEV_DOWN Device down message for Series 90 TCP/IP PLC redundancy. SGMR_POINT_DISCREPANCY , Point discrepancy alarm for Series 90 TCP/IP PLC redundancy. SLOGIN_FAILURE Specified user failed to log in to the specific CIMPLICITY project. CIMPLICITY HMI for Windows NI and Windows 95 User Manual GPK-1120 GPK1180 SLOGON Specified user has logged in to a specified CIMPLICITY project, SLOGOUT ‘Specified user has logged out from a specified CIMPLICITY project, SREDUND_DEV_DOWN Alarm message for PLC redundancy, $RTR_LINK_DOWN, Ronter Sink has been lost to specified node. AMSI_ALARM Reserved for future use DB_CONN_DOWN Process has lost connection to specified logging database. DB_START_FORWARD Process is forwarding data to specified logging databese, MCP_PROC_DOWN Specified CIMPLICITY process has terminated unexpectedly, ‘These alarms are not associated with any CIMPLICITY Point IDs. They may be modified, but they should never be deleted Alarm Configuration 1935 Configuring Alarms g Alarne 1008 ‘To configure an alarro, double-click the Alarms icon in your project's Configuration Cabinet. Lf you have selected the Display search criteria at startup option, the Alarm Definitions Search dialog box opens. Select the filtering criteria you want, and then select OK to open the Configuration - Alarm Definitions window with the Slered list of alarms. IEyou hove not selected the Display search criteria at startup option, the Configuration - Alarm Definitions window opens with alist ofall configured alarms, Elass/0 "falas Type! ‘SALAPM_DISABLED $378 SPTM_AM @ SALAM “ENABLED SSS SPTM_AM SSS SPTMAM HIGH = $OQFLAL SYS SPTM_AM HIGH $AN_STATUS SYS AMSLALAAM SSYS | SWAC_EVENT 3 $875 sSY5 SOGWNLGAD sSYS Joon: $875 ‘SGMA_DEY_DOWN SYS SEVACPONT_DISCRERANCY {SYS eee ‘The Configuration - Alarm Definitions window always displeys the following for ech alarm: Alarm ID ‘The unique Alarm identifier for each alarm in your configuration In addition io Alarm ID, you can choose to display: Class 1D ‘The Alarm Class in which this alarm will be grouped. Alarm Type The type of alarm format used for this alarm. This field is display only. An Alarm Type will be assigned by CIMPLICITY HMI software to an slarm if it contains variable run-time parameters {eee page 10-1), Description A description of the alarm. Message Fixed text and run-time parameters that are displayed when the lara is generated ‘You can control the amount of data presented, and the order in which itis presented Sclect Attributes... from the View menu, or click Attributes on te Toolbar to open the Configure Display Arributes diaiog box and make your changes CIMPLICITY HMI for Windows NT and Windows 95 User Manual GFK-1180 ‘The list of Alarm Definition list is initially sorted by Alarm ID. You may click on any of the other title buttons at the top of the list to sort the list by that attribute. ‘You can use the Menu functions, Toolbar buttons, and shortcut keys to: © cr new alarm, © Change the window display anributes. © Change startup options © Modify an alarm. + Copy the information for a selected alarm to a new alarm, + Delete an alarm, ‘+ Display a filtered list of zlarms Creating A New Alarm Definition Too a new alarm definition, you can do one of th Select New from the File menu. Click New Itam on the Toolbar. © Press Ctrl#N, After you initiate the request, the New dlarm dialog box opens Enter the name of the new alarm in the Alarm 1D field and select OK. ‘The system verifies that the Alarm ID does not already exist, and that no invalid characters have been used. Ifthe Alarm ID you entered is valid, the Alarm Definition dialog box for the new alarm opens. You will need to enter information on the following property pages: Alarm Definition Defines what the alarm will look Ike. Alarm Routing Defines what Roles will see tbe alarm, Alarm Options Defines the Repeat, Acknowledge, Reset, and Delete attributes forthe alarm, GFK1180 Alarm Configuration 105 Alarm Defini: ition Properties for Non-Point Alarms. on isn ecient PEE ‘The Alarm Definition properties for a non-point elarm let you define the following for an alarm: Description Alarm Class Alarm Type Help File Alarm Message 10-8 CLMPLICITY HMI for Windows NT and Windows 95 User Manual Enter an optional description of the alarm, Enter a valid Alarm Class ID in this field. You can sik the Browser buton EA tote ight of the input field to use the Select an Alarm Class Browser to select the Class ID. You can click the Pop-up menu button - to browse for an Alarm Class, edit an existing Alarm Class or create new Alarm Class for the alarm. Select valid alarm type from the drop-down list. For deteiled information on Alatm Types, see the CIMPLICITY HMI for Windows NT and Windows 95 Integrator’s Toalkit Operation Manual (GFK-1461) Enter the name of an optional Help file that can be displayed by Alarm Viewer when ¢ user clicks Help. “The Help file is a text fie that can be displayed by Notepad. Enter the text of the alarm message in this field. An alarm message consists of any combination of fixed text, and variable run-time parameters (see page 10-1). Te total display length for all fixed text and variable parameters is 80 characters, GFK.1180 ae ah GPK-1189 Loaging IFDatabese Logging is installed on your computer, you can set the Log Alarm check bor to enable logging for this alarm. Ifyou enable logging, you can then select Settings... o define the logging parameters forthe alarm: (Clear this check box to disable logging for this alam, Alarm Definition Properties for Point Alarms Defi ‘The Alarm Definition properties for point alarms let you define the following for an alam: Definition This input box lets you define the alarm class and message that will be used when this points value goes into an alarm state, Alarm Class An slarm’ class determines the order in which it appears relative to other alarms in Alarm Viewer. Alarns with similar characteristics can be grouped by class, and classes can be prioritized. Enter an Alarm Class in this field. You can also; + Clothe Brower button «Eto he gh of the input box to use che larm Class Browser to display list of lanm Classes and select one © Click the Pop-up menu button - 21 to create a new Alarm Class modify the current Alarm Class, or browse foran Alarm Clas. Alarm Configuration 107 Alarm Message Entera message in this field that will be displayed with the alam in Alarm Viewer. ‘An alarm message consists of eny combination of fixed text, and variable run-time parameters (see page 10-1). The ‘otal display length for all fixed text and variable parameters is 78 characters, For example, ifan alarm sting is configured so that the string for Warning High is "WARNING", and the string for Alesma High is "EMERGENCY, the Alarm High and Waring High Limits are 400 and 350 degrees, and the alarm message is: CONDITION: %STATE - TEMP IS AT %VAL DEGREES If the temperature reads 353 degrees, an alarm will be generated with the msssage: CONDITION: WARNING - TEMP IS AT 353 DEGREES Ifthe temperature goes to 402 degrees, the alarm will be updated and the message will res CONDITION: EMERGENCY - TEMP IS AT 402 DEGREES Ifyou specify an Alarm Class, you must specify an Alarm Message. String Index _If you are using %STATE in your alarm message, enter the index number of the string whose texts you want to use. You can also: ‘© Click the Browser button - £4 - to the right of the input field to use the Alarm Siring Browser to display the list of Alarm Strings and select one, + Cikthe Popp easton -21-tcrte sew Alten Sgt crest Ala Beng or rows fren Alena Sig Alarm Criteria ‘You can select one of the following methods for evaluating the alarm values: Absolute Absolute alarms are used to detect when the value of a point is tov higi or too low. ‘On Change (On Change alarms are used to detect when the value of a point changes. Rate of Change Rate of Change alarms are used to detect either a faster or slower than expected change in the value of @ point. Ifyou select Rate of Change, you must also enter a sampling interval inthe Interval fields. ‘The Interval fields represent the frequency at which the point will be sampled for Rate of Chaage alarming, Ifthe difference ‘between the curtent value of the point and the value at the last sample time exceeds alarm limits, an alarm message will be generated 10.8 (CIMPLICITY HMI for Windows NT and Windows 95 User Mara! GFK-1180 Deviation Deviation alarms are used to detect when the value ofa point ‘deviates too far from that of 2 second point Ifyou select Deviation, you must also enter a Poist ID in the Deviation Point field. You can also: * Click the Browser button - =~ to the right of the input box to use the Select Port Browser to display a list of Point IDs and select one, + Goethe Popp menu buon = 21 to create a new Point ID, modify the current Point iD, or browse for a Point ID. See Types of Alarming in Chapter 5, "Point Configuration”, for details on the ‘Alarm Criteria, Alarm Values Enter the values you want for alarm limits in these fields. The evaluation of alarm. limits depends on the Alarm Criteria you select, + For Absolute alarming, you can define an upper and lower alarm limit and an upper anc lower warning limit for the point value. ‘+ For Rate of Change alarming the high values are used to detect faster then expected changes, and the low limits are used to detect slower than expected changes. Specify positive alarm limits to check for increasing values and negative alarm limits to check for decreasing values. * For Deviation alarming, you can define an upper and lower alarm limit ‘and an upper and lower warning limit forthe difference between the value of this point and the Deviation point. + For digital points, you can choose to alarm when the point velu is 0 or 1 Alarm Delay ‘The Alarm Delay feature is only available when you select Absolute alarming. If you set the Delay Alarms check box, the Interval fieids represent the leigth of the delay before the alarm is reported, This means an alarm will not be generated unless the point remains in en alann state for the configured interval. Deadband Enter 2 value defining the tolerance for alarm conditions in this fied, ‘The deadband cushions the generation of alarms when a point value fluctuates at an alarm limit, For example, if high alarm limit is defined as 100, the point’ alarm state changes each time the point value goes from 99 to 100 or 100 10 99. Ifa deadband of 5 is defined, the point will go into the alarm state when its value reaches 100, and will stay in the alarm state until the vaiue drops below 95. GFR-110 Alarm Configuration 109 Help File Enter the name of tex file that users can display when they lick the Help button in the Alarm Viewer, You can entera filenarse of upto 8 characters, ‘The actual file is in the ALARM_HELP directory in your project. ‘The actual filename is the name given in this field, followed by " HLP" ‘Alarm Help files are ASCII tex: files of up to sixty (60) lines. Bach line can have @ maximum of 70 characters. Files are located in the SS3TZ_ROOT?\alarm_help directory. If you wish, you may use the same Help File for several point. Alarm Routing Properties ‘The Alarm Routing properties let you choose the roles to which this alarm will be routed. All the curently available roles arc listed in the Available Roles box. All the roles currently configured for this alarm are listed in the Configured Roles for Alarm box, You can: + Adda role to the alarm, + Remove a role from the alarm + Chango the properties of a selected role. Create a new role. Adding A Role To add a rots to the Configured Roles for Alarms list: 1. Select the role in the Available Roles tox. 2. Select Add. 10-10 CIMPLICITY HMI for Windows NT and Windows 95 User Maral GFK.1180 Removing A Role To remove a roe from the Configured Roles for Alarms list: 1. Select the sole in the Configured Roles for Alarms list. 2, Select Remove Modifying A Role To view (and possibly modify) the properties for a particular roe: 1. Select the role 2. Select Properties. The Role Properties dialog box for the selected role opens. Adding A New Role ‘To add a new role: 1, Select New. The New Role dialog box opens. 2. Enter the new Role ID in the Role ID field 3. Select OK. The Role Properties dialog box forthe selected rote opens. 4, Select the privileges you want for the new roe. 5. Select OK to create the new role and close the Role Properties dislog box Alarm Confwration 10-11 Alarm Options Properties ‘The Alarm Options properties let you define the Repeat, Acknowiedge, Delete, and Reset requirements for the alarm. ‘+ Use Repeat Timeout to control how often the alarm will be re-sent to ‘alarm printers + Use Acknowledge Timeout to control whether or not the alarm will bbe automatically acknowledged. ‘+ Use Deletion Requirements io determine winen the alarm is deleted. + Use Reset Timeout i control whether or not the alarm willbe automatically reset, ‘+ Use Max Number Stacked to define the number of occurrences to retain when this alarm is generated more than once before being eleted. After the Max Number Stacked is reached, the oldest alarm ‘occurrence is deleted as each new occurrence is generated, + Use Manual Reset Allowed to permit users to manually reset the alarm. Ifyou disallow Manual Reset, the alacm can only be reset by the, application detecting the alarm condition or by the Alarm Manager ‘when an Automatic Reset is defined. 10.12 CIMPLICITY HMI for Windows NT and Windows 95 User Manual GFK-1180 wo Repeat Timeout If you have configured an Alarta Printer, use these fields to control how the message for this alarm will be sent to the Alarm Printer: Time Immediate Never Sclect this redio button to send the alarm message to all interested processes at the interval you enter in the Minutes ‘input field until the alarm is cleared. In particular, the Alarm Printer (AMLP) is an interested process, Selecting this option will cause the alarm message to bbe reprinted on she Alerm Line Printer at the selected interval until the alarm is cleared. Note ‘The actual number of minutes that the Alarm Manager will, wait before repeating the alarm may be greater than this umber. ‘The maximum time will be the nurher you enter in this field plus the number of minutes configured for the timer for processing automatic alarms in the Alarm Manager configuration file (atazm mgr dat). The default for this timer is 5 minutes. Select this radio button to send the alarm message to all interested processes immediately when itis generated. In particular, the Alarm Printer (AMLP) is an interested process, Selecting this option will cause the alarm message to be printed once when it is generated. The alarm message will not be repeated, Select this radio button if you do not want to send the alaem message to any interested processes. Deletion Requirements ‘The Deletion Requirements determine the conditions under which the alarm may be deleted from the system. You can choose one or both of the following: Acknowledge Reset Set this check box to delete the alarm when it is acknowledged. Set this check box to delete the alarm when it is reset, If you set both check boxes, the alarm will not be deleted until it has been acknowledged and reset. GFK-1180 Alarm Configuration 10-13 Acknowledge Timeout Use these fields to contro] how the alarm will be acknowledged. Time Immediate Never Reset Timeout Select this radio button and enter the number of minutes in the utes input field for the Alarm Manager to wait before automatically acknowledging the alarm. “The alarm may also be acknowledged by 2 user before the tine period expires. Note The actual number of minutes that the Alarm Manager will ‘wait before automatically acknowledging the alarm may be greater than this number. The maximum time will be the amber you onier in this field pius the number of minutes configured for the timer for processing automatic alarms in the ‘Alarm Manager configuration file (ataza_agz.dat), The default for this timer is 5 minates Select this radio button if you want the Alarm Manager to ‘automatically acknowledge the alarm when it is generated. ‘Select this radio bution if the alarm is never to be utomaiically acknowledged. Use these fields to control how the alarmn will be reset Time Immediate Never Select this radio button and enter the number of minutes in the Minutes input field for the Alarm Manager to wait before automatically resetting the alarm. ‘The alam may also be reset by the application detecting the slarm condition or manually by user (if mancal reset is, allowed) before the time interval expires. Note ‘The actual number of minutes that the Alarm Manager will wait before automaticaly resetting the alarm may be greater than this number. The maximum time will be the number you canter in this field plus the number of minutes configured for the timer for processing automatic alarms inthe Alarm ‘Manager configuration fle (alaza_ngz.dat). The default for this timer is 5 minutes Select this radio bution if you want the Alarm Manager to automatically reset the alarm when itis generated. ‘Select this radio button if the alarm is never to be automatically reset. 10-14 CIMPLICITY HMI for Windows NT and Windows 95 User Manuat GPK-1180, ee Using Alarm Audio Support About Alarm Audio Support You can configure an alarm-class to use audio alarming whenever an alarm in that class is generated. You can use a weve (. AV) file or a beep. The sound is played until the Alarm Stop condition is met for all the alaems from the configured class. To generate an audio alarm froma wave file, your computer needs: * A sound card to generate the sound + A sound system, such as a spezker or headset, to make the sound audible ‘To generate an audio alarm with the beep, your computer needs the system beep (you can also generate @ beep from a sound card, but iis not required). LFyou do have & sound card, you can configure the frequency, duration and number of beeps, If you o not bave a sound card: + For Windows NT, you can configure she frequency, duration and number of beeps. + For Windows 95, ‘you can configure the number of beeps. Audio alarms are prioritized by two keys, alarm class priority and project priority. ‘You can select one of these keys to be the primary key for prioritization: About Prioritizing Alarms ‘The Alarm Sound Manager cen only play one sound at a time, You can configure the Alarm Sound Manager to prioritize alarms by Alarm Class or Project priority. You determine Alarm Class priorities when you configure Alarm Classes, ‘You determine Project priorities when you connect to projects in the Alarm Sound Manager window, When you prioritize alarms by Alarm Class, the determination of the highest priority alarm is: +The sound for first alarm for the highest priority Alarm Class is played first. + Ifalarmis exist for the same Alarm Ciass in more than one project, then the highest priority alarm for the highest priority project is played first. ‘+ fmore than one project has the highest priority, then the order in which ‘the projects are displayed in the Alarm Sound Manager window determines the project priority. ‘When you prioritize alarms by Project priority, the determination of the highest priority alarm is: ‘+The sound forthe alarm with highest priority Alerm Class in the highest priority project is played first. + If more than one project hes the highest priority, then the order in which the projects are displayed in the Alarm Sound Manager window Getermines the project priority. Examples Suppose you heve three projects, each with two Alarm Classes as follows: Project Priority Alarm Class Priority AlarmClass Priority PROJL 3. ALMIA 1 ALMIB 2 PROM. 2 ALMA 1 ALOR 2 PROS 1 ALMBA, 1 ALMBB 2 In addition, you currently have one alarm generated for each class in each project. If you prioritize audio elarms by Alarm Class, the alarm order ALBA, ALM2A, ALMLA, ALM3B, ALM2B, ALMIB If you prioritize audio alarms by Project priority, the alarm order is: ALMA, ALM3B, ALM2A, ALM?B, ALMIA, ALMIB CIMPLICITY® EMI for Windows NT and Windows 9§ User's Manual GPK-1180 fue Configuring Alarm Audio Support GPE 1180 ‘You configure Alarm Audio support in the Alarm Class configuration. ‘To configure Alarm Audio support for an Alarm Class 1, Double-click the Alarm Class icon in your project's Configuration cabinet, 2. Select the Alarm Class for which you want to configure Alarm Audio support from the list of Alarm Classes. 3. Open the Alarm Class Configuration dialog box for the Alarm Class. 4, Select the Audio property page. ‘Set the Audio support check box if you want audio support for the alarm class. You can configure two types of sounds: s Wave file © Beep You can now do one of the following: + Select OK to seve all changes made and close the Alarm Class Configuration dialog box. ‘+ Select Apply to save all changes made ané leave the dialog box open ‘+ Select Cancel to close the Alarm Class dialog box without saving changes, Using Alarm Audio Support wns Wave File Configuration ‘To configure a wave file for audio alarming: 1, Click the Wave file radio button to use 2 wave (.wav) file when the alarm sounds, 2, Enter the name of the save file in the File name field. You can use the browser button to browse for a wave file for this field. You can specify logical nates in the file name, such a5 sz7=_nooT and E6M_ROOT in the path name for the wave file. These are expanded into actual directory names when the file is used. For example, SI7#_ROOT; \sounds\high. wav refers to the file Righ.wav in the sounds directory within the HMI project’ directory. You can also use a special variable called W2H_DIR, which expands to the Windows 9SINT directory. Beep Configuration 0 configure a beep for audio alarming: 1, Click the Beep radio button if you want to use a beep sound. ‘On computers with sound cards, this is the default sound event. (On computers without sound card, this isthe default systern beep. Specify the following information for the beep sound: For Windows NT, or if you are generating the beep through the sound, card on Windows 95: + Bnter the Frequency of the sound. Select 2 value between 37 and 32767 Hertz. Remember, 1000 ilseconds equa 1 ‘+ Enter the Duration of the sound in milliseconds. Selecta value Sst ‘between I and 10000 milliseconds. For both Windows NT and Windows 95. * Enter the Number of beeps to play when the alarm is generate. Select a value between i and 10 Ifyou enter a value greater than 1, the Delay field is enabted. + Use the Delay field to enter the delay between the beeps in nillisoconds. Select « value between 0 and 10000 milliseconds. ds CIMPLICITY® Hd for Windows NT and Windows 95 User's Manal GFk-1189 About Alarm Sound Manager ‘You cen use the Alarm Sound Manager to conneot to running HMI projects that are broadcasting on your local network. The Alarm Sound Manager then plays sounds and displays elerm information when alarms are generated by those projects for alarm classes that have audio alana support. @ You must ran the Alarm Sound Manages in oder fr the sounds tobe played = Torun the Alarm Sound Manager, select oF double click the Alarm Sound Manager een icon inthe Windows Start Menu Using the Alarm Sound Manager When the Alarm Sound Manager is running, you can see its icon on the Windows Taskbar, SAMPLE COR_t048 71 The dlarm Sound Manager window displays the current alarm, GFK-1180 sing Alarm Audio Support Ins “7 ‘The items on the lower past of the Alarm Sound Manager window are available at all times. ‘They include + The current alarm being played + The Mute check box + “The Load profile... and Save profile... buttons + The Minimize, Exit, sné Help buttons ‘You can use the Projects, Options, and Startup pages to select the projects whose alarms you want to display, the priority of concurrent alarms, start the Alarm Sound ‘Manager at startup and select a dafrult profile file Turning Sound On and Off ‘You can set the Mute check box to temporarily shut off sound play, When you shut off sound play, the Windows Taskbar icon for the Alarm Sound Manager changes to aoeM a ee Saving the Current Configuration After you have configured the Alarm Sound Manager window properties to your liking, you can save your configuration, and then recall it whenever you open this window. To save ail the changes you have made in the current Alarm Sound Manager session, select Save profile... To retrieve a previously saved profile and display it in the current Alarm Sound ‘Manager session, select Load Profil Using the Window Buttons To minimize the window, select Mi To exit the Alain Sound Manager, select Exit Remember thet if you do this, audio. slamming stops andthe icon for the Alarm Sound Manager no longer appears on the Windows Taskbar. To display the He/p window for Alarm Sound Management, select Help, CIMPLICITY@ HMI for Windows NT and Windows 95 User's Manual GFKE1180 we GFK-1189 Projects Properties ‘The Projects page lets you add and remove broadcasting projects o the current While you are displaying this property page, you still have access to the alarm information at the bottom of the window. Adding a project To add a project, click on the Add... button. The Add Project dialog box opens. Use the drop-down list button to the right of the Project field to select a project to add. Select the project priority by specifying a number greater or equal to 2ero (0). The higher the number, the lower the priority (which means that zero (0) isthe highest priority). ‘The project is placed in the list of projects according to its priority. If more than or project has the same priority, then they are displayed in the order that they were added to the list, Using Alarm Audio Support ns U8 Examples: For example, if you connect to PROMI with priority 3, PROJ2 with priority 2, and PROJS with priority 1, then the list of projects looks like this PROS PROI2 PROJ If you connect to PRO! with priority 3, PROJ2 with priority 1 and PROIS with priority 1, then the list of projects looks like this: PROI2 PROD PROMI This project ordering is used by the Alarm Sound Manager to help determine which sound plays first at run-time Deleting a project To delete a project, select it and click on the Delete button. CIMPLICITY® HIM for Windows NT and Windows 95 User's Manual GPK-1180 Option Properties ‘The Options page lets you: GFK-1180 Select which priority to check first when concurrent alarms are received, You can select Alarm Class or Project. Specify the alarm sound/beep stop condition, You can select one of the following: + Acknowledge only - the zlatm sound/beep stops when the alarm is acknowledged. ‘+ Reset only - the alarm sound/beep stops when the alarm is reset. + Both Ack and Reset the alarm sound/beep stops when the alarm is acknowledged and reset + Either Ack or Reset - the alarm sound/beep stops when the alarm is acknowledged or reset. Configure the Project default priority to be used when adding new projects to the current session. This value must be greater or equal to. 0 (2er0). The higher the number, the lower the priority (his means that 0 is the ‘highest priority Specify witether you want the alarmn sound/beep to be repeated. If you set the Repeat soundibeep checkbox, the sound/bcep is repeated every ten (10) seconds nil the stop sound/beep condition is satisfied, Hf you clear the Repeat sound/beep check box, each alarm sound/beep is played only once Using Alarm Audio Support He 10 While you are displaying this property page, you still hve access to the alarm information at the botom ofthe wind Startup Properties ‘The Startup page lets you configure the Alerm Sound Manager to start up at boot time, and specify a default profile to use whenever the Alarm Sound Manager starts, CIMPLICITY® Alarm Sound Manas I | Gesam ‘While you are displaying this property page, you still have access to the alarm information at the bottom of the window. To start the Alarm Sound Manager at boot, set the Start at Windows startup check box. To specify « profile file to be used by the Alarm Sound Manager when it starts, enter the name of the file in the Use profile field. You can use the browser button to the right of the input field to search for a profile file. CIMPLICIT I HMI for Windows NT and Windows 95 User's Manual GFK-186 Alarm Blocking Configuration About Alarm Blocking Monitoring and control systems do an excellent job of informing operators of problem conditions through alarms. However, there are times when operators can be overwhelmed by aumerous alarms that are the result of one major problem. For example, when # process conveyor stops, it affects all machines feeding into it. The operator needs to know that the major problem is the stopped conveyor and not waste valuable time looking through all the other resulting alarms, Alarm Blocking lets you configure a hierarchy of alarms for your process so users see the important alarms first, Alann Blocking you + Logically group alarms into blocking groups. + Select a run-time blocking mode for each lacking group, + Assign a priority level to each alarm in a blocking group. Each Alan Blocking group works independently. This means that the high priority alarms in one group do rot block the high priority alarms in another group, Before you implement Alarm Blocking, you need to plan how you want to group and prioritize your slarms for your project. You need to decide: ‘+The number of blocking groups you need, ‘+ Which alarms are to be assigned to each blocking group. ‘+ How the alarms are to be prioritized in each blocking group, How to handle the display of group, Alarms that you do not assign to Alarm Bl Blocking. ‘equal priority alarms in each blocking cking groups are not affected by Alerm GFK-1180 21 Assigning Alarms CIMPLICITY HMI software generates two types of alarms; point alarms and syster alarms. Each point alarm is uniquely identified by ts Alerm ID. Bach system alarm is uniquely identified by its Alarm ID and Resource ID. For example: © Forpoint XYZ, * Each unique instance of the SDEVICE_DOWN sysiem alarm is ientified by the Alarm ID and the Resource LD of the affected device. nique Alarm ID is XYZ, For Alarm Blocking, you can assign 2 uniquely identified alarm to only one group, This means: * You can assign a point alarm to only.one blocking group. * You can assign a uniquely identified system alarm to only oné blocking group. ‘This means that you can have more than one instance of a system alarm ina blocking group or you may have system alarmas in more than one blocking group, provided that the Resource ID you assign to each instance is unique across ali Alarm Blocking groups. Choosing Blocking Modes ‘You can select one of two blocking modes for each Alarm Blocking group that you create, ‘+ Ieyou select Peer Blocking mode, only the frst alarm ina set of elarms ‘with equal priority displays. ‘+ Lfyou select Non-Pear Blockinig mode, ll alarms in a set of alarms with equal priority display. Assigning Alarm Priorities ‘You need to assign each alarm in an Alarm Blocking group » number from 0 to 32767. The higher the number you enter, the higher the priority of the alarm, For example, alarm XXX with priority 100 blocks alarm YYY with priority 10. You can assign the same priority number to more than one alarm in an Alarm Blocking group. ‘The priority of an alarm and the blocking mode of the group determine whether the alarm is blocked or not, CIMPLICITY HMI for Windows NT and Windows 95 User Manual GPE-1180 we OFK-1180 Alarm Blocking Rules When an alarm that is assigned to an Alarm Blocking group is generated: + Iftheve is 2 current alann with higher priority in the group, the newly generated alarm is blocked, + ForPeer Blocking, if there is a current alarm with equal priority in the group, the newly generated alarm is blocked. In other words, only one alarm in a set of alarms with equal priority displays at any given time. ‘+ For Non-Peer Blocking, all current alarms with equal priority display at any given time. ‘When the blocking slasma returns to Normal state or is deleted: » For Peer Blocking, if alarms of equal priority exist, the oldest one displays and becomes the new blocking alarm. ‘+. For Non-Peer Blocking, al! alarms with the next lower priority dispiey and become the new blocking alarms. flower priority alarm is the current blocking alarm and e higher priority alarm is generated, the lower priority alarm remains on the list of alarms and the higher Priority alarm becomes the new blocking alarm. ‘an alarm already exists in Normal ctato and it returns to Alarm state, the alarm is not blocked, Alar Blocking Configuration 128 Configuring Alarm Blocking = Alam Blecking To configure alara blocking, double-click the Alarm Blocking icon in your project’s Configuration Cabinet, Ifyou heve selected the Display search criteria at startup option, the Alarm Block Group Search dialog box opens. Select th filtering erteria you want, and then select OK to open the Alarm Blocking Group - Configuration window with the filtered list of alarm groups. If you have not selected the Display search criteria at startup option, the Alarm Blocking Group - Configuration window opens witha list of all configured alarm. [Descipiion = Grown? group t ‘The Alarm Blocking Group ~ Configuration window always displays the following attribute for each Alarm Class: Group ID ‘The identifier for the class In addition to Group ID, you can choose to display: Group Description Optional description of the group Peer block Identifies whether Peer Blocking is enabled or disabled. ‘The list of groups is initially sorted by Group ID. You may click any of the other tisle buttons at the top of the list to sort the list by that attribute. You can use the Menu functions, Toolbar burns, and shorteut Keys to: + Create anew Alarm block group. + Add alarms tothe groups + Remove alarms from the groups. + Modify alarm information inthe groups + Change the window display attributes + Change sterup options + Delete an alarm block group. + Display altered list of alarm block groupe CIMPLICITY HMI for Windows ND and Windows 95 User Mansa GFRIIS9 Creating an Alarm Block Group To create a new Alam block group, you can do one of the following: + Select New from the File menu, + Click New Item on the Toolbar. + Press Ctri4N, -Afier you initiate the request, the Alarm Blocking dialog box opens. You can sesize the width of the Alarm ID, Priority and Resource {D fields to suit your needs. Enter the following information to create a new Alarm block grovp: Group ID Description Peer block Alarms Enter a new, unique Alam group name. The group name can be up to 32 characters long. Enter ¢ description of the Alarm group. The ‘description can be up to 64 characters long. Set this check box to enforce Peer Blocking Mode for this group. Clear this check box if you want to use Non-Peer Blocking Mode. ‘The Blocking Mode and alarm priorities determine the alarm blocking hierarchy at run-time ‘This input box displays the current list of alarms in the ‘Ales block group. ‘You can add an alarm to thelist by direetly entering its Alan ID, Priority and Resource ID or by using the ‘Add bution to select an Alarm ID from the Browser dialog box. GFK-1180 Alarm Blocking Configuration IDs a You can change an alarm on the list by directly edit its Alarm ID, Priority or Resource 1D or by selecting, the Alarm ID and pressing Set attributes... Tod Delete. ‘an alarm from the list select it and press Select OK to close the Alarm Blocking dialog box end create the new Alarm block group. Select Cancel to close the Alarm Blocking dialog box without creating a new Alarm block group, Adding an Alarm ‘You can enter the name of an Alarm ID in the Alarm 1D field in any of the following You can select Add to open the Browser dialog box and browse for the Alarm ID you want, ‘© You can click the Browser button to the right of the input field Jo open the Browser dialog box and browse for the Alc: ID you want. > You can olick the Pop-up menu button to the right of the input field to create a new Alarm ID, modify the current Alarm LD or browse for an Alarm 1D, Enter the priority of the Alarm ID in the Priority ficld. This can be @ number from 0 to 32767. The higher the number you enter, the higher the blocking priority for the alan. For example, if you have alarm XXX with priority set to 10 end alarm YYY with priority set to 100 in the same group, when alarm YYY generates, it blocks alarm XXX. 1fthe Alarm ID does nor have a Point ID, you mst assign 2 Resource ID to the flarm. You can click the Browser button to the right of the input field to open the Browser dialog box and browse for the Resource ID you want. You can also use the Pop-up menu button to create a new Resource ID, modify the current Resource ID or browse for s Resource ID. Remember that each Alarm [D/Resource 1D combination must be unique within « group and across all goups. Removing an Alarm “To remove an slam tom an Alam block group 1. Select the alarm from the list. 2, Press Delete. “The ist of elarms in the window updates immediately Modifying an Alarm You can modify an alarm’s name, priority and Resource ID in the list, All you need to dois: L. Select ¢ field you want to edit in the Alarms list. 2. Type in your changes. 125 CIMPLICITY HU! for Windows NT and Windows 9§ User Manual GFK-1180 If you are che Pop-p Menu buttons in the field to searct ging an Alarm ID or Resource ID, you can also use the Browser and ‘You can also set a number of alarms to the same priority and/or Resource ID at the same time. To do this: 1, Select the alarms whose priority and/or Resource ID you want to set. ‘You can use the Shift and Ctrl keys while making your selection, 2. Select Set Attributes... The Set tributes dialog box opens 3. Enter the new priority and/or Resource ID forthe alarms and select (OK. All the selected alerms will be assigned the new priority. Non- point alarms wil be assigned the new Resource ID. Modifying an Alarm Block Group To modify an Alarm block group, you can double-click the Alarm block group you ‘want to modify. Altematively, you can select the Alarm block group you want fo ‘modify, then do one of the following: * Select Modify from the Edit mens, + Click Modify item on the Tooibar. + Press Ctrl+M, After you initiate the request, the Alarm Blocking dialog box opens. The fields ‘contain the group's current configuration information. You can’ + Modify the group description + Change the Peer block stan Add alarms tothe lst. + Remove alarms from the list + Change alarm names, priorities and Resource IDs on the ls. Select OK to close the Alarm Blocking dialog box and modify the information for the selected Alarm group. Select Cancel to close the 4larm Blocking dielog box without modifying the Alarm group, Alarm Blocking Configuration ret Alarm Printer Configuration About Alarm Printer Configuration Alte, Printer GPK-1180 wy You can configure. serial or parallel printer in CIMPLICITY HMI software thet prints alarms and/or events as they occur. ‘You may also configure an alarm printer to write toa fle, rather than to adevice. You may configure a local or network printer asthe alaom printer. “If your project includes the Host Redundancy option, you may configure a redundant alarm printer. Important Before you start, make sure that the printer is not configured in Windows. To configure an alarm printer, double-click the Alarm Printer icon in your project's Configuration cabinet Ifyou have selected the Display search criteria at startup option, the Alarm Log Printer Search dialog box opens. Select the filtering criteria you want, and then select OK to open the Alarm Log Printer - Configuration window with the filtered list of printers. Lf you have nor selected the Display search criteria at startup option, the Alarm er ~ Configuration window opens witha list of all configured printers, Tae Ba ‘The Alarm Log Printer - Configuration window always displays the following for each printer: Name ‘Tho name of the alerm printer, In addition to Name, you can choose to display: Node ID ‘The node to which the alarm printer is connected. Destination The actual device or file name of the printer (like tPT2: or anlp. £11) Page Width ‘The page width in characters. Page Length — The page length in lines. ‘The list of alarm printers is initially sorted by Name. You may click on any of the other title buttons at the top of the list to sort the list by that anribute ‘You can use che Menu functions, Toolbar butions, and shorteut keys t: + Create a new alarm printer. # Change ihe window display atebutes. + Change startup options. + Modify an alarm printer. + Delete an alarm printer. Display 2 file od list of alarm printecs Adding an Alarm Printer 132 “To add # new alarm printer, you ean Go one of the following + Select New fiom the File menu. + Select New Item on the Toolbar +) Press CtrleN. ‘After you initiate the request, the New Alarm Log Printer dialog box opens. Cees Enter the name of the new alarm printer, or the name of the file you want to vite alarms to in the Name field end select OK. You may enter a maximum of 16 characters. The system verifies thatthe alarm printer name does not already exist, and that no invalid characters have been used If the alarm printer name you entered is valid, the Alarm Printer properties dialog ‘box for the new alarm printer opens, CIMPLICITY EM! for Windows NT and Windows 95 User Manual CFK-1180 Alarm Printer Properties GFR-1180 The Alarm Printer property sheet let you define the device, and the types of alarms handled by it. You can configure focal and network printers. You caa also consigure zedundant alan printers if your project supports the Host Redundancy option, When you are finished defining the alarm printer properties, select OK to close the Alarm Prinier property sheet and create the new alarm printer, or select Cancel to close the property sheet without creating the new elarm printer. General Properties ‘The AMLP Configuration property page let you define the following for ¢ new alarm printer: Log Events Select this check box if you want to log evens to the printer. Log Alarms Select this check box if you want to log alarms to the printer. If you clear this check box, the Alarm logging options are grayed out Alarm Printer Configuration BE Alarm Logging Options “These options are available only when you select the Log alarms check box. Use these fields to specify the types of alarms, and alarms classes that will be printed ‘on this alarm printer Generated alarms Set this check box to log messages when alarms are gencrated. Acknowledged alarms Set this check box to iog messages when alarms are acknowledged. Reset alarms Set this check box to log messages when alarms are reset. Deleted alarms Set this check box to log messages when alarms are deleted All alarm classes Set this check box to log messages for all alarm classes. When you do, the ‘Alarm Class input field will be grayed out. Alarm Class ‘This field is available when you ciear the All alarm classes check box. ‘Ifyou want log elarms for a particular Alarm Class, enter that class name in this field. You ean also: ‘© Click the Browser button - 241 to che the Select Alarm Class browser and u Jnt of the input field to display to select the Alarm Class. ‘© Click the Pop-up Ment button - 24 to create a new Alarm Class, edit the current Alarm Class, or browse for an Alarm Class. Output Enter the device name for the alarm printer. You can ‘* Enter the name ofa local port on the project's computer (for example - LLPT2 or COML) where you have attached the alarm printer. Note ‘ou are connecting to serial port COM10 and above, the fonnat is \\. \comens, + Enter file name to write alarms to a fle. If you wish, you may also enter 2 period followed by a three character file extension (for example, alarms. £42). Ifyou do not enter 2 file extension, none is automatically provided. ‘The file is placed in the project’s \Log directory. CIMPLICITY HT for Windows NT and Windows 9§ User Manuat GFK-1180 GFK-1180 * Enter the path for a network printer (for example, \\w_o0Saa¢ \dspent) Note If the printer is connected locally on your computer, use the local port nazze instead of the network path, ‘+ Enter the path fora file on a network disk (for example, \\nt002 \proji\alarns). ‘You can associate more than one alarm printer with a network printer or file on a network disk. Ifyou use a network printer fil, you should clear the Print header fcid inthe Layout property page. Layout Properties ‘The Layout property page lets you determine whether a header should be printed at ‘the top ofa page. Enter information in the following Gelés: Print Headers Set this check box if you want to print a header at the top of each page. If you have more than.one alas printer process sending messages to the same printer oor file, clear this check box. When you clear the check box, the Page length field is disabled, Alarm Printer Configuration Page Length Enter the number of lines per page that can be printed. The number must be an integer between 1 and 999. Page Width Enter the number of characters that can be printed on a line. The nurmber must be an integer between 80 and 132. Redundant Alarm Printing This felis enabled if your project has the Host Redundancy option, Set this check box ifyou went both the Master and Slave computers to print slarms. Clear this check box if you only want the Master computer to print alarms: Date/Time Format AHHH Ma HHMMSS A e|HMM A HAH MideS8-7T Use the Date/Time Format properties to choose hew the alarm printer will print the ate and time. You can define the following: Header Date Select the formst you want to use to print the date on the alarm printer page header. ‘This eld is not available if you are not printing a page header. A sample for the format you choose displays in the Sample field inthis box. You may select one of ‘the formats from the list, or construct your own format, CLMPLICITY FMI for Wondows NT and Windows 95 User Manual GFK-1180 wa GFK1120 Alarm Date/Time Select the formet you want to use wo print the date and time of each alarm. A sample for the format you choose displays in the Sample field in this box. You may sclect one ofthe formats from thelist, oF construct your own format. Constructing Date and Time Formats To construct date Formats, se th following information: m Numeric month with no lending zero mm Numeric month with leading zero. mmm Shor text month mmmm Long Text month, d ‘Numeric day with no leading zero. dd Numeric day with loading zero. ddd Short text day ofthe week. dddd Long text day ofthe week. y Last two digits of year. For digits 00 through 09, ony the last digit is displayed. yw Last ro digits of year, For digits 00 through 09, both digits are displayed. yyy All four digits of year For example, ifyou enter dddd dd mmmm yyyy, the sample date will be Saturday 05 March 1994, ‘You may use spaces, dashes, slashes or any other delimiter of your choice to separate the date fletds, To construct time formats, use the following information: H ‘Hours based on a tweive-hour clock with no leading zero, HH Hours based on a twelveshour clock with leading zero. HHH Hours based on 2 24-hour clock with no leading zero. HHHH Hours based on-a 24-hour clock with leading zero. M ‘Minutes with no leading zero. MM Minutes with leading zero. s Seconds with no leading zero. ss Seconds with leading zero, T Hundreths of seconds with no leading zero. 7 Hundredths of seconds with leading zeros. P,A.pjora AM/PM indicator For example, ifyou enter HHHH:MM:SS:TT p, the sample time ill be 43:05:06:08 PM, You may use colons, spaces or any other delimiter of your choice to separate the time fields. Alarm Printer Configuration More about Redundant Alarm Printers Ina redundant configuration, both the Master and Slave computer have the same configurstion. When you perform a Configuration Update, the configuration data for the project on the Master computer is copied to the project on the Slave computer. fing and Output ficlds ‘The information you enter ia the Redundant alarm pri determine where alarms will be printed. First let’ take a redundant configuration where each computer has 2 local line printer (LPT1) configured. The primary computer is COMP! and the secondary comp compa, covet comes vt ‘+ Ifyou enter zea in the Output field and select che Redundant alarm printing check box, the Master project on COMP? sends alarm ‘messages 10 LPTI on COMPI and the Slave project on COMP2 sends ‘alarm messages that it generates while in standby mode to LPT1 on coMP2, ‘When the project on COMP? becomes the Master project, it continues to send alarm printer messages to LPTI on COMP2, + Ifyou enter 271 in the Output field and clear the Redundant alarm printing check box, the Master project on COMP! sends alanns to LPT1 on COMPI. The Slave project on COMP? sends no alarms until it becomes the Master project. ‘When the project on COMP? becomes the Master project, it sends alarta messages to LPT1 on COMP2. Now, let look at @ redundant configuration with a network ine printer (WABCWNET1). The primary computer is COMPI and the secondary computer is cOMP2, \ABOINET: + Ifyou enter \\asc\waz2 in the Output field and select the Redundant alarm printing check box, the Master project on COMP! sends alarm messages io 'ABC\NETI and the Slave project on COMP2 sends alarm messages that it generates while in standby mode tw WABCINETI. Tals may result in duplicate messages. If you select this option, disable the Print header ‘el 15 ITY HUAI for Windows NT and Windows 95 User Manuel GFR-1180 = ifyowenter \\ase\wer: in the Output field and clear the Redundant alarm printing check box, the Master project on COMP! sencis alarms to the network device. The Slave project on COMP? sends alarms until it bccomes the Mastcr project. ‘When the project on COMP2 becomes the Master project, it sends alarm messages to \\ABCWNETI Additional Steps for Serial Printers Jf you are configuring e serial printer, its printer beud rate, parity, and data length will have to be set each time your system is rebooted. ‘You can do this by creating & file called ciimp_port..bat in the top-level directory on the disk where your project is located. The fle will be called by the Alarm Printer program when it initiates printing on the printer. The file contains facke off moda baud-crate> parity- datasca> stepecm> where isthe serial porcto which the printer is connected isthe baud rate ofthe printer. isthe parity used by the printer. is the number of data bits. em> is the number of stop bits. For example, if you bave a printer on COMI: port that communicates at 9600 baud, xo party, 8 data bits and I stop bit, the file would fook like this: jache off moda COML: baud=9600 parity=n datas8 stop=1 Ifyou have more than one serial printer, you will need one mode line per printer. To create this fie: 1, Open a Notepad window. 2. Enter the printer configuration information according to the ebove ‘emplate, 3. Save the file called cimp_port bat in the top-level directory on the isk where your project is located. GRK-1180 Alarm Printer Configuration 139 Modifying the Size of the Alarm Queue “The Alarm Line Printer program (AMLP) assumes that there is no restriction for the size of the larm message qucuc. If the output device is disabled, virtual memory overflow can result ‘You can use the AMLP_MAX_QUEUE global parameter to restrict the size of the alarm message queue, For detailed information on editing the giobal parameter file, ses "Global Parameters" under System Management. record format for AMLP_MAX_QUEUE is: AMLP_MAX QUZUG|3 | ‘where isthe maximum mimber of messages inthe quene. ‘After you implement this global parameter, ifthe output device is disabled and the number of alarms in the alarm queue exceeds the value you speci, the alarm message: the alarm queue is generated, ropped has exceeded the configured size of alarm To return to the defeult queue size, remove the AMLP_MAX_QUEUE record from the Global Parameters file Choosing Delete and Acknowledge Times ‘The Alarm Line Printer program (AMLP) assumes that the time to be printed when an aarma is acknowledged or deleted isthe time the alarm was generated, You can use the AMLP_USE_GEN_TIME global parameter to select whether you want the generation time or the action (acknowledge or delete) time to be printed. ‘The record format for AMLP_USE_GEN_TIME is aua?_0SE_GEY_TTKG|1| days, hours, or rinutes is exported. CIMPLICITY HMI for Windows NT and Windows 95 Urer Manual GFR-1180 Purge Actions Purge actions let you delete dats from the table when a maintenance event occurs. To select this option: Set the Delete records check box. 2. Select the number of records you want to retain in the table. ‘You can retain records in one of the following ways: By Count Delete all but the last (most recent) records in the rable By Time Delete all but the records entered in the table for the last days, hours, or minutes, If you want to save the data to be purged from the table to a CSV format file before removing it from the table, then set the Save deleted in file check box and enter the name of the CSV file. Command Actions (Command actions let you perform more complicated actions when maintenance events occur. You can select one or both of these action Execute SQL command Lets you execute « SQL command on the table. Enter the command in the input field, Run program Lots you run a program. Enter the program pathname in the input field. You may include ‘command-line arguments for the program, Compact database Use this action to compact the Microsoft Access database where the table resides during a maintenance event, arning} Use the Compact database action with great caution. Compacting a Microsoft Access database requires the database file not be used by any process, otherwise the action falls and waits to be executed during the next maintenance event. Due to this restriction, the Database Logger terminates all communication with the Microsoft Access database while the compact action occurs. This means that the logger ‘queues may overflow depending on how fast items are being logged nd t GPE-1180 Daiabase Logger 16.27 Logging Properties for All Tables ‘The Logging Properties property page for a table displays the current database ‘connection and the parameters used by Store and Forward for the table. Connect Information ‘You can select an ODBC data source for cach tabie thet you create in the Detabese Logger. To connect to table, enter the following information: ODBC data source Select the data source to receive logged data for this table. This fold displays the list of curently configured ODBC data sources, In general, it will consist ofa list of one or more Microsoft Access or SQL Servers. ‘The defoult data sources ar: © CIMPLICITY Alarm Logging ‘A Microsoft Access data source that logs data to the CIMPLOG-MDB file in the ARC directory of your CIMPLICITY HMI project. + CIMPLICITY Point Logging A Microsoft Access data source that loge data to the POINTLOG.MDB file in the ARC directory of your CIMPLICITY HMI project. + CIMPLICITY SQL Server Logging ‘A Microsoi SQL Server data source that logs data to an on-node SQL Server database. You ‘must install SQL Server (sold separately) to use this data source, 1628 CIMPLICITY HMI for Windows NT and Windows 95 User Manual CPKL189 Ifyou have en Orecie database, you may the see ODBC data source that you crested for Oracle, Database user Enter the username needed to connect to the selected database driver. This field is required if yyou are connecting to % SQL Server. Password Enter the password needed to connect to the selected database driver. This field is required if you are connecting to 2 SQL Server, Reconnect wait ps Enter the amount of time the Database Logger waits between reconnect attempts wher the connection to the database is lost. The default is 30 seconds, Enter a value between 0 (continuous retvies) and 24 hours. Store and Forward ‘To configure Store and Forward for this table, set the Enable Store and Forward check box. “After you enable this feanure, use the radio buttons to select between unlimited or Jinnited storage of database records. Unlimited Click this radio button if you want the Database Logger to store an unlimited -mumber of records when its connection to the database is down, ‘The number of records actually stored is determined by the amount of time the connection is lost and by the amount of free disk space you have. Max number of stored records Click this dio bution if you want to select the mumber of records the Database Logger ‘will store wien its conection to the database is down, Enter a number between 1 and 4,294,967,295. GFK-1180 Database Logger 16-28 Filtering the Table List ‘To filter the list of tables in the Darabase Logger window, select Filter... from the View menu. ‘The Filter Tables dialog box opens. Use this dialog box to filter the Hist of logging tables by Table Identifier and/or Table ‘Type. To filter the table list: 1, Enter a full or partial Table ID in the Table Identifier input field. You can use the ? and * wildcards to perform partial string searches. Select the Table Type you want to filter for. Valid selections are ALARM, ALL, DATA, EXTERNAL, or GROUP. 3. Select OK to filter the list according to the information you've entered, or select Cancel to cancel the filter function. To display all the tables, put an asterisk (*) in the Table Identifier field, and select, ALL for the Table Type. Copying a Table 16-30 Important ‘You cannot copy the Alarm (ALARM_LOG), Event (EVENT_LOG) or External tables. To copy the attributes, actions, and contents of a selected group or date table to 3 new table, select the table you want to copy, then do one of the following: + Select Copy... from the File nemo. + Select Copy... from the window pop-up menu. + Click the Copy button on the Toolbar + Press Ctritc ‘The Copy dialog box opens Cony table GROUP CIMPLICITY Hl for Windows NT and Windows 95 User Marea! GFK-1180 ci er the new table narae in the input field. You mst enter a new name. The Data Logger will not let you use a current table name for a new table. Select OK to create the table, or select Cancel to cancel the copy function, Renaming A Table To rename 2 date or group table, select the table, and then do one of the following: ‘+ Select Rename... from the File menu. ‘+ Select Rename... from the window pop-up menu, + Press CtrleR, ‘The Rename table dialog box opens Enter the new table name in the input field. You must enter 2 new name, The Database Logger will aot let you use a current able name when you rename a tabi. ‘Select OK to create the table, or select Cancel to cancel the rename function, Note ‘You cannot rename the Alam (ALARM LOG), Eve tables. (EVENT_LOG) or External Deleting A Table To delotea group, data or extemal table, selec the table, and then do one ofthe following ‘+ Select Delete Table from the File men. + Select Delete... from the window pop-up mena, + Click the Delote Table buron on the Tootba A confirmation message dialog box forthe table opens Select OK in the confirmation mnessage box to verify that you want the table removed, or select Cancel to cance! your request, Tie table ist updates after the confirmation message box closes. Note “Yai Gar lee fe Alem (ALAR LOG) of Bon EVENTLL GFK-1160 Database Logger 16:31 Reconciling a Table ‘You can use the Reconcile option on the Edit menu to show the differences between the current CIMPLICITY HMI table configuration and the logging database, ‘When you select Reconcile from the Edit menu, the Reconcile Table dialog box The dialog box lists all the ficids inthe table configuration, and any fields in the table in the database that are not in the configuration. Each field has one of the following icons: G—@ Field isin the Database Logger configuration and database table © Field is in the Database Logger configuration and database table, but types don’ match, Field is in the database table, but not in the Database Logger table configuration (unused) os S— Fields in the Database Logger configuration, but not in the database table (uncreated). - Field has been removed from the Database Logger configuration and the database table. “You can use this dislog box to remove unused fields from the datshase table or create fields in the database table for new fields in the configuration. . Important You can use this dialog box to remove fields from Microsoft Access databases. Fields in SQL Server and Oracle databases must be removed manually. 5632 CIMPLICITY HMI for Windows NT and Windows 9§ User Maral GPE1180 Creating Uncreated Database Fields To create fields in the database for new fields in the configaration: 1. Select the fields you want to create, Uncreated fields display this icon: © ‘You can use the Shift and Ctrl keys to select Select Uncreated to se ct multiple fields, or you can all the uncreated fields in the table 2. Selest Create, Afier the fields are created in the database, their icons change to: Removing Unused Microsoft Access Fields Toremove unused fields fom the database abe: 1. Selet the felds you vant to remove, ‘Unused fields display this icon: @—2 ‘You can use the Shift and Ctrl keys to select multiple fields, or you can select Select Unused to select all the unused fields in the table, 2. Select Remove. After the unused fis are removed from the database, thei icons change tor @—® Removing Unused SQL Server and Oracle Fields ‘SQL Server and Oracle do not directly support dropping colurmns in a database table. To delete unused columns, you must: 1, Copy the table to @ temporary table. 2. Drop the table from the database, 3. Recreate the tible with the fields you wish to use, 4. Copy the data from the temporary fable tothe new table, 5. Delete the temporary table. Consult your SQi. Server or Oracle documentation for details on how to do this, GFK-1189 Database Logger 16-33 Database Logger Properties The Logging Properties dialog box lets you define logging parameters, and specify the type of database driver that interfaces with the Databese Logger option, Benchmark tests on a 60 MHz Pentium PC show that the following data rates can be sustained for group tables with 200 points: Microsoft Access 3.5 waites/scoond On-node SQL Server 18 writes/sevond ‘Ya Group table kolds 200 points. 18.» write is defined as a single log event on a table, The data rate is relatively ‘writes/s0c to that table gives a data ‘rate of 3500 poins/eec. 1634 independent of the mumber of points logged to a table, and of the number of tables boeing logued to. For example, using ¢ SQL Server, you can og to 18 tables in one second, or you can perform 3 log events on 6 tables in one second, Because of this characteristic, a group table can log Cate faster than a dais table with the same number of points Note ‘Smaller groups log faster then larger groups. However, one large group logs faster than two that are half as big do. Parameters CIMPLICITY HMI jor Windows NT and Windows 95 User Manual GFK-1180 “a ‘The Parameters page displays the curcent disk scan rate, date table quoue size, deta Jogging scan rete, and maintenance action export path. When you open the ODBC Configuration page, ox select OK to close the property shec, information on the page will be validated, You can define the following parameters: + Disk fll scan rate + Database queue size * Point data logging scan rate + Maintenance action export path Disk full scan rate (min) If any of your tables use the "Disk Full" maintenance event, you should know that the disk is nbt continvously monitored for this condition, Instead, the disk is monitored at the rate specified by this field ‘The "Disk Full" condition is only useful for Microsoft Access databases. The SQL Server forces prealloeation of disk space for data tables. Database queue size ‘This field controls the queue of logged data for each table, Entcra queue size that \ill support worst-case logging during activity bursts. For exemple, if 10 points are being logged to the DATA_LOG table, you should havea queue size of at feast 10 in case their logging conditions all occur simultaneously. ‘A message is logged to your project®s Status Log whenever the database queue for a table overflows, and additional waite requests are dropped until tere is room in the (queue for ther, Ifyou are doing more logging than cen be supported by the benchmarked data rate forthe database, increasing the size of the database queue will not resolve the problem of lost deta, Increasing the size of the Database Logger queue will increase the emount of memory used by the database logge. Since each table preallocates memory for the queve, this growth will take place at startup time. For each additional encry in the queve, the following additional memory will be used: Alarm Log Table 200 bytes per enty. Event Log Table 200 bytes per entry. Data Tables Size of logged data plus 36 bytes Group Tables _ Size of logged deta plus 36 bytes. GPE-1180 Daxabase Logger 16035 100 ticks = 1 second 16-36 Point data logging scan rate (ticks) ‘This scan rte is the worst-case scan rate et which the Point Data Logger will submit data for logging. The value you enter here should be faster then the fastest table acan rate, Enter the scam rate in ticks. ‘This value should be faster than the fastest table scan rate, and large enough so that all the data for a PLC scan comes into the database together. Maintenance action export path ‘The export path defines the directory that holds the files created by table maintenance export and purge actions. This pathname is validated when the Parameters page is closed. ‘The defeult velue of $r7H_ROOT: \ARC places the daie into the ARC subdirectory of the project. You may use the logical directory name STTB_ROOT to specify a different subditectory of your project, or use any other full pata specification suck as D:\ EXPORT, Alarm and Point Logging The Alarm Logging page shows the ODBC configuration that will be used when logging data to the ALARM_LOG, EVENT_LOG and Applicasion tables. The Point Logging page shows the ODBC configuration that will be used when logging data to Data and Group tables. ‘You can define the following parameters + Connect information, including ODBC Data Source, Database User, Password, and Reconnect Wait Period. + Store and forward information, including Enable Store and Forward and the maximum number of stored records. (CIMPLICITY EMI for Windows NT and Windows 95 User Marsal GFE-1180 ee If edditional information is required to connect to the database you selocted, you will be prompted for it during validation. Validation occurs when you select OK, or select the Paramezers page. Information needed varies from database to database. In ‘general: ‘+ Ifyou are connecting to a Microsoft Access database, you may be prompted fora file name, + Leyouare connecting to ® SQL Server, you may be prompted for 2 database name. ‘+ Ifyouare connecting to an Oracle database, you may be prompted for a Server ID. Enter the Alias Name for the Oracle database in this Held. Hf the Data Logger is unable to connect o the selected database, validation fails, Connect Information Enter information in the following fields: ODBC Data Source Select the data source to receive logged data. This Hicld displays a current list of ODBC data sources. Jn general, it consists of 2 list of one or more Miczosoit Access or SQL Servers. The default data sources are: + CIMPLICITY Alarm Logging A Microsoft Access data source that logs data to the CIMPLOG MDB file in the ARC directory of your CIMPLICITY instatiation, + CIMPLICITY Point Logging ‘A Microsoft Access data source tha’ logs data to the POINTLOG.MDB file is the ARC directory of your CIMPLICITY installation, Note ‘The CIMPLOG MDB end POINTLOG MDB files compatible with Microsoft Access version 7.0 * CIMPLICITY SQL Server Logging A Microsoft SQL Server data source that logs data to an on-node SQL Server database. You ust install SQL Server (Sold separately) to use this data source, Ifyou are using an Oracle Database, you may see the ODBC data source that you created for Oracle. If you are using Microsoft Access, you need to be aware that there are file locking issues for both logging and reporting if you sclect the same Microsoit Access data source for both the Alarm and Point fogging pages, To avoid these problems, always select separate data sources for Alarm and Point logging pages. GFK-1180 Dosabase Logger 1637 “”e Ifyou are using SQL Server or Oracle, these file locking issues do not exist. You may configure both the Alarm and Point logging pages tothe sarae SQL. Server data source Database User Enter the usemame needed to connect to the selected database driver. This field is required if you are connecting to 2 SQL Server. Password Enter the password needed to connect to the selected database driver. This field is required if you are connecting to an SQL Server. Reconnect Wait Period Enter the amount of time the Database Logger waits between reconnect attempts when the connection %0 the database is lost. The default is 30 seconds. Enter a value between 0 seconds (continuous revries) and 24 hours. Store'and Forward ‘Enter information in the following fields: Enable Store and Forward Set this check box to enable the Store and Forward feature, ‘After you enable the feature, use the radio buttons to select between unlimited or limited storage of database records. Unlimited ‘Click on this radio button if you want the Database Logger to store en unlimited ‘number of records while its connection to the database is down. The number of records actually stored is determined by the amount of time the connection is lost and by the amount of free disk space you ave, ‘Max number of stored records Click on this radio button if you want to select the nuraber of records the Database Logger will store when its connection to the database is down. Enter a number between 1 and 4,294,967,295. 16-38 CIMPLICITY HMI for Windows ND and Windows 9§ User Manual GFE1180 Displaying A Table To display the contents ofa table, you can double-click on the table name in the CIMPLICITY Database Logger Configuration Window. Alternatively, you can select the table in the CIMPLICITY Dasabase Logger Configuration window then: + Select Open Tabl + Click the Open Table button on the Toolbar. + Press Ctri+0. ‘Toe CIMPLICITY Database Logger Configuration window for the solected teble opens. from the File menu, pTSauAAN DISABLED, |] GALATI ENA SALARM_MODIFIED SALARIM_RESTORED SAM_STATUS SOL_FLE_FULL SDOWNLBAD SOYN_CFE s.0g0N s\OGOUT SATR_UNK_DOWN DEWO_SPEED “You can use the Menu functions, Toolbar buttons and shorteut keys to: + Add new points to the table. ‘+ Delete points from the table. ‘+ Display and modify point or alarm logging properties. + Display and modify table properties, + Display a filtered list of points + Close the table and retum to the main Data Logging window. GFK-1180 Database Logger 1639 Table Menu Options ‘You can use the menu options to add points io the table, deiete points from the table, display end modify table and point properties, toggle the Toolbar and Status Bar display, filter the table list, and zccess Help. The File Menu ‘When you select the File menu, the following drop-down list displays: For Data and Group tables For Alarm and Bvent tables ‘The File mena options are: Add Points... For Data and Group logs, adds pois tothe tabe. Add Alarms. For Alarm and Event logs, adds alarms to the table, Remove Point Removes the selected point from the table. Remove Alarm Removes the selected alarm from the table. Close Table Closes the table and returns to the main Data Logger window, The Edit Menu ‘When you select the Edit menu, the following drop-down list displays: For Data and Group tables For Alarm and Event tables ‘The Edit menu options are: Point Properties... For Data and Group logs, displays and modifies the logging properties of the selected point Alarm Properties... For Alarm and Event logs, displays and modifies the logging properties of the selected alarm. Table Properties... Displays andl modifies the properties ofthe table. Reconcile Table... Reconciles the current table with the database. 16.40 CIMPLICITY HM! for Windows NT and Windows 95 User Manual GPK-1130 GFK-1180 The View Menu When you select the View menu, the following drop-down list displays: ‘The View menu options are: Toolbar Enables/disables the Toolber display. Status Bar Enables/disables the Stats Bar display. Fitter... iter the lis of point in the table. The Help Menu ‘When you select the Help menu, the following drop-down list displays: ‘Tae Help menv options are: Help Topics Opens the Help Contents for the Database Logger About Database Logger Displays the current version number for Database Logger. Using The Window Pop-Up Menu ‘Tac Window Pop-up Menu is available when you are working with at Database Logger table. For Data and Point ables For Alarm and Event tables Use one of the following methods to 2ocess this menu ‘+ With no itemns selected, hold down the right mouse button. You can then select the table related memu options. + Select an item in the table and hold down the right mouse button, You can then select item or table related menu options. ‘The menu functions are Remove Removes the selected point. Properties... Opens the Properties dialog box for the selected point ‘Add Points... For Data and Group logs, opens the Select 4 Point Browscr and lets you select points to be added to the table Add Alarms... For Alarm end Event logs, opens the Select 4 Alarm Definition Browser and lets you select armas to be added to the table. Database Logger 16-41 Table Properties... Opens the Properties dialog box for the table Close Closes the table. Table Toolbar Buttons ‘The Toolbar buttons available to you are About Database Logger Displays program information, version umber and copyright. Close Table Closes the table and retum tothe main window. Remove Items Removes selected points or alarms from the table. ‘Add Item ‘Adds points or alarms to the table, [Ee] tem Properties Displays and modifies the logging eh properties for the selected point or alarm. |Bjj_— Table Properties: Displays and modifies the properties of = the table. (]__Fiter tems Filters the List of points or alarms in the ‘able S Adding Points to A Table The Select A Point dialog box opens when you add a new point to ¢ data or group table. Use this dialog box, which is part of the Browser, to generate a list of points from which you can select 2 point (or points) to add io the table. For more infomation on the Point Browser, see that chapter in this manual. Removing Points from A Table To remove 2 poiat from a table! 1. Select the point. 2. Select Remove Point from the File menu or click the "Remove Point" button on the Toolbar. A confirmation message box opens. Select OK in the confirmation message box to verify that you want the point removed or select Cancel to cancel your request. “The poin: fist updates afer the confirmation message box closes. Editing Point Logging Properties 7 You can modify the logging properties for each properties that you can modify depend on the t point ina logging table. The le type: ‘© Forpoints in group tables, you can modify each points Logging Avteibutes, + Forpoints in data tabies, the Alarm Log tabie, and the Event Log table, you caa modify each point’s Logging Conditions. 16-42 CIMPLICITY HMI for Woxdows NT and Windows 95 User Manual GFK-1180 GPK-1180 Group Table Point Properties ‘The Logging Auribuces property page for a point ina group ‘able displays the current attributes assigned to the point. You can have point logging occur under any combination of the following: + Point Attributes © Array Attributes (array points only) Select Use Defaults to reset the Logging Attributes to their defeult values. The

You might also like