Professional Documents
Culture Documents
2006, TAC
All Rights Reserved
No part of this publication may be reproduced, read or stored in a retrieval system, or
transmitted, in any form or by any means, electronic, mechanical, photocopying,
recording, or otherwise, without prior written permission of TAC.
This document is produced in the United States of America.
Infinity is a trademark of TAC. All other trademarks are the property of their respective
owners.
Andover Continuum CyberStation Configurators Guide for Version 1.8
December, 2006
TAC part number: 30-3001-781
The information in this document is furnished for informational purposes only, is subject
to change without notice, and should not be construed as a commitment by TAC. TAC
assumes no liability for any errors or inaccuracies that may appear in this document.
TAC, Inc.
One High Street
North Andover, MA 01845
(978) 470-0555
Fax: (978) 975-9782
http://www.tac.com
ii
TAC
Contents
1
Introduction ................................................................................................................ 1
About this Guide........................................................................................................... 1
Key Concepts ............................................................................................................... 3
Andover Continuum Product Description ..................................................................... 5
CyberStation............................................................................................................... 12
Starting CyberStation ................................................................................................. 14
Closing CyberStation.................................................................................................. 15
Continuum Explorer................................................................................................. 39
Objects in Continuum Explorer .................................................................................. 39
Starting Continuum Explorer ...................................................................................... 45
Dropdown Menus ....................................................................................................... 46
Quick Picks Toolbar ................................................................................................... 54
Popup Menus ............................................................................................................. 55
Continuum Explorer Window...................................................................................... 55
Explorer Views ........................................................................................................... 58
Creating Objects......................................................................................................... 62
Importing from ASCII Dump Files .............................................................................. 65
Importing from CSV Files ........................................................................................... 66
Creating CSV Files for CyberStation.......................................................................... 67
Updating or Creating Personnel Objects from CSV Files .......................................... 68
CyberStation Object Editors ....................................................................................... 70
Access Security Rules in Continuum Explorer........................................................... 70
Security ..................................................................................................................... 73
Security Groups.......................................................................................................... 73
Configuring Object-Level Security.............................................................................. 80
Andover Continuum CyberStation Configurators Guide
iii
iv
TAC
TAC
vii
ix
TAC
Personnel Import Utility Tables and Sample XSLT File ..................................... 687
Active Directory Attributes Table .............................................................................. 688
Continuum Personnel Attributes Table .................................................................... 691
Card Type Table....................................................................................................... 695
Active Directory ........................................................................................................ 696
LDAP Protocol.......................................................................................................... 701
Sample XSLT File .................................................................................................... 704
xi
xii
TAC
Introduction
Document Scope
This guide is a reference document for configuring the CyberStation software on your
building control system. Chapters follow the typical sequence that is involved in
configuring CyberStation on your Infinity or BACnet system.
Description
Chapter 1
Chapter 2
Chapter/Appendix
Description
Chapter 3
Chapter 4
Security
Chapter 5
Configuring Users
Chapter 6
Configuring a Network
Chapter 7
Configuring Controllers
Chapter 8
Chapter 9
Chapter 10
Configuring Alarms
Chapter 11
Configuring Reports
Chapter 12
Templates
Chapter 13
Chapter 14
BACnet
Chapter 15
Chapter 16
Configuring Loops
Chapter 17
Configuring TrendLogs
Chapter 18
Chapter 19
Configuring Personnel
Chapter 20
Chapter 21
Chapter 22
Creating Groups
Chapter 23
Creating ListViews
Chapter 24
Creating EventViews
Chapter 25
Chapter 26
Graphics Panels
Appendix A
Appendix B
EpiBuilder Installation
Appendix C
Appendix D
TAC
Chapter/Appendix
Description
Appendix E
Appendix F
Related Documentation
The following documents are related to this configurators guide:
Title
Part Number
30-3001-720
30-3001-814
30-3001-843
30-3001-910
30-3001-989
30-3001-855
30-3001-863
30-3001-872
30-3001-890
CyberStation includes an extensive online help system. This help system is described in
more detail in Chapter 2.
Key Concepts
The design of the CyberStation system is based on several key concepts that are
involved in the makeup of the software and hardware components of a building control
system. These key concepts are outlined below. More thorough descriptions may be
found in subsequent chapters.
Site
Your building complex, or whatever you are controlling with the Andover Continuum
system, is referred to as a site. In complex operations, you may have control of multiple
sites.
Points
The control of equipment requires monitoring individual inputs and actuating individual
outputs. In Infinity and CyberStation systems, these discrete entities are referred to as
points. Youll see references to output point or input point often.
Internal places within a controller or workstations memory are also referred to as points.
These software-based points may be temporary storage locations for setpoints or the
memory location where the current date and time are stored.
Events
During operation, things happen as a result of actions taken by users, by the controllers,
or as the result of no action. These occurrences can include the triggering of an overtemperature warning or the discovery of a forced door entry. In Andover Continuum
systems, they are classified as events.
There are several types of events. Each type can be monitored and acted upon through
automatic and programmed control. All events are stored by the system.
Alarms
Alarms are events that signal the controller of an unusual occurrence. Typical alarms
might include temperature variations and intrusion attempts.
Schedules
Schedules allow the operation of the system to be regulated according to a particular
day, week, month, year, or time of day.
User
The user or operator is the person or persons who manually acknowledge alarms,
monitor system activity, and interact with the system on a daily basis. Users are also
individuals who have access to the CyberStation software.
Configurator
The configurator is the person who sets up (configures) the CyberStation software to
match the physical devices of the site.
Programmer
The programmer is the person who determines the operational flow of the system. The
programmer writes programs in a BASIC-like language called Plain English.
Network
The network is a medium through which electronic hardware communicates. Andover
Continuum products use several types of networks:
Network controllers communicate with a user workstation and with each other via an
Ethernet TCP/IP network. Our products support physical wire and fiber versions of
the Ethernet as well as wide-area wireless Ethernet.
Andover Continuum controllers communicate with external input and output modules
through a variety of commercial and proprietary network products.
TAC
Controller
Controllers are small, dedicated computers that perform the logic necessary to read
external inputs and operate external outputs. User-created programs that are loaded into
the controller define the controllers personality.
There are two types of controllers:
Workstation
The user interacts with the Andover Continuum system through a personal computer
called the workstation, which runs the CyberStation software. CyberStation is used to
configure, program, monitor and operate the system. All workstations on the Andover
Continuum system are BACnet-compliant BACnet Operator Workstations (B-OWS).
Enterprise
The entire Andover Continuum system configuration of workstations, servers and
networks with attached controllers and I/Os is called an enterprise. An enterprise can
consist of an unlimited number of networks containing a total of up to 4 million controllers
and workstations.
CyberStation Software
A key component of the Andover Continuum system is a Windows-based application
program called CyberStation that runs on a PC workstation and interacts with the control
system. Andover Continuums second key software component is the database that
stores all the vital information pertaining to the building automation control system.
CyberStation
CyberStation provides a graphic user interface that can display and manipulate data that
allows the entire site management of adjusting schedules and setpoints, acknowledging
alarms, controlling doors, tracking personnel, and so on.
Andover Continuum allows you to connect several CyberStation workstations
simultaneously to provide for the most flexible configuration/control and monitoring
operation available.
Andover Continuum CyberStation Configurators Guide
Database
The information that describes the structure and operation of your building is stored in the
CyberStation database. The values of each point in the system, the settings for limits, the
configuration of the hardware, the personal data of the personnel granted access to your
building, and more, are contained in the database.
The database engine that CyberStation uses is either Microsoft SQL server or MSDE
2000.
Objects
The components associated with your site (networks, workstations, actuators, sensors,
and so on) are created, monitored, and controlled as objects in CyberStation. For
example, for every controller you have in a building, CyberStation stores a controller
object. When you have created an object for a piece of hardware, you can monitor,
disable, change the settings for, and enable that equipment using that object in
CyberStation. Objects represent every aspect of Andover Continuums building control
system, whether it is building security, lighting, or HVAC control. Refer to Chapter 3 for
more information about objects and how they are represented in CyberStation.
Attributes
An attribute is a characteristic of an object. All objects have attributes associated with
them. In most cases, there are several attributes that describe an object. (Attributes are
known as properties in BACnet objects.)
TAC
Single-User Configuration
In single user configurations (shown below) the Andover Continuum product line consists
of a network controller (NetController or NetController II with optional input/output
modules), a bCX1 or a 9702 Site Controller and a CyberStation workstation. The MSDE
database also resides on the workstation. The NetController/bCX1/9702 use Ethernet
TCP/IP protocol to communicate with the workstation. Field bus communication between
the network controller and the I/O modules is conducted over a special ACC I/O bus.
There are two versions of the bCX1. One uses Infinet protocol and the other
communicates over standard MS/TP BACnet.
Multi-User Configuration
The Andover Continuum system design is based on scalability, so expansion to a multiuser, larger network configuration is easily accomplished. The following figure below
shows such a configuration. In this configuration, the Ethernet LAN is expanded to
include another workstation and an SQL database server.
Network Controllers
There are several types of Andover Continuum network controllers:
bCX1 series
All are Ethernet TCP/IP compatible. The first four contain at least one Infinet port to allow
communication with Infinet application controllers. The b4920 includes one MS/TP
network for communicating with b3xxx BACnet controllers.
8
TAC
The Infinity CX9XXX series are connected to individual IOU modules via an RS-485
cabling arrangement referred to as "LBUS".
The NetController, NetController II, and 9702 Site Controller are powerful CPUs with
flash EPROM providing the central network management functions for Andover
Continuum building automation system. These network controllers can be connected to
individual IOU modules via a different RE-485 protocol called ACC-LON.
The 9702 Site Controller includes the equivalent of a NetController, a power supply, and
an AC-1 access controller in one small package.
The bCX1 is a series of Infinet and Native BACnet routers and controller/ routers. The
Infinet devices (96xx) function as Ethernet-to-Infinet field bus routers. The BACnet
devices (40x0) function as BACnet/IP-to-MS/TP field bus routers
Infinet Controllers
These controllers include combinations of inputs and outputs for the monitoring and
control of local sensors and devices. There is a wide variety of Infinet controllers; each
device is designed for a specific purpose.
Infinet controllers are connected to network controllers via the Infinet network.
BACnet Controllers
These controllers include combinations of inputs and outputs for the monitoring and
control of local sensors and devices. They are equivalent in function to the Infinet i2
series controllers mentioned above.
BACnet controllers are connected to a bCX1 or b4920 controller/gateway via the MasterSlave/Token Passing (MS/TP) network.
Workstations
A personal computer (PC) connected to the Continuum Ethernet network runs the
CyberStation software and database. The system can contain a single workstation or
multiple workstations, depending on the site configuration.
Networks
The Infinet is Andover Continuums high-performance, token-passing LAN that allows Infinet
application controllers to communicate with each other and to a single network controller. With
repeaters, it is possible to have 127 Infinet controllers on one Infinet network
The LBUS is the cable that connects IOU modules to a CX network controller or via the
LA-1 (see Table 1-1) to a NetController or NetController II. Only one LBUS can be
connected to a CX network controller. Each LBUS can handle up to 16 IOUs.
The BACnet MS/TP network is an RS-485 based industry standard LAN that allows
BACnet b3 controllers to communicate with each other and to a single b4920 or bCX1. It
is possible to have 127 Infinet controllers on one MS/TP network.
NetController I/O Modules
NetController I/O modules are specialized units that receive sensor inputs and activate
equipment (valves, fans, door locks, and so on) and perform access control functions.
Andover Continuum CyberStation Configurators Guide
The I/O modules, available in several configurations including input, output, mixed I/O,
and display are listed in the following table.
Type
Module
Function
Input
DI-8
DM-20
MI-6
AO-4-8
AO-4-8-O
DO-4-R
DO-4-R-O
DO-6-TR
LO-2
LO-2-O
AC-1
AC-1A
AC-1 Plus
VS-8-4
LB-8
LS-8
LC-1
VM-1
Output
Access
Control
Display
Miscellaneous VT-1
LA-1
10
TAC
Expansion Module
Function
Universal
xPUI4
xPBD4 *
xPBA4 *
Input
xPDI8
Output
xPAO2
xPAO4
xPDO2
xPD04
xP Display
xP Remote Display
Display
11
CyberStation
You use CyberStation software to configure, monitor and control the Andover Continuum
and Infinity hardware. CyberStation has a collection of tools and applications that work
together to help you create and interface with all the objects in the system. The figure
below illustrates some of them.
12
TAC
Creation Tools
Editors
Every type of object has its own editor. An editor is a software tool that allows you to
create an object of a specific type. Each object type is known as an object class. You can
also use editors to change object settings, such as the value of an output object.
Templates
Templates are objects that are used to create other objects. Templates look like editors
that have been pre-configured with most or all of the information required to rapidly
create multiple instances of the same object class. To create a new object, copy the
template, and change or add information as needed.
Configuration Wizard
The Configuration Wizard allows you to create and edit CyberStation templates. It
presents a tab for each template subfolder contained in the template folder. Clicking on a
tab displays a listing of all the templates available in the subfolder.
CyberStation Online Help
Online help topics cover all CyberStation object class editors (including BACnet object
class editors) and all major CyberStation features. Reference information on the Plain
English IDE programming environment, including a Plain English keyword reference, is
also provided. Help buttons, located in the CyberStation user interface editors, dialogs,
live views, and so on open help topics related to the CyberStation editor or feature in
which you are working. You can also press the F1 key to bring up related help.
For more information about online help, please see: Accessing the Online Help System,
Chapter 2.
Programming Tools
Plain English
Plain English is the programming language you or your programmer will use to write
functions and programs that can automatically initiate and respond to activity in your
building control system. You can also use the Plain English program to automate routine
tasks, such as generating reports. The language is easy to use because its keywords are
common, easy to understand words. The Plain English Editor also makes programming
easy by reducing most of the typing to mouse clicks.
Command Line
The command line is a simple text field interface that allows you to directly enter, via the
keyboard, Plain English commands. The command is executed immediately after entry.
This tool is handy for trying commands before committing them to your program. You can
also review and use a running history of the commands you entered.
Message Window
The Message Window allows you to view the results of your Plain English programs as
CyberStation processes them.
13
Monitoring Tools
Continuum Explorer
The Continuum Explorer is your main access window into CyberStation. It is similar to the
standard Windows explorer, and displays all the objects on your system in a hierarchical
view. This allows you to see the relationship between objects. The Continuum Explorer
also provides access to all the object editors.
Menu Pages
Menu pages are the graphic screens you will see after logging into CyberStation. Menu
pages help you navigate to, as well as monitor, certain objects. These screens contain
"hot spots" that you can click to move to another screen or to open an application. Menu
pages also display a status bar that shows the most recent alarm. The status bar
includes an icon that provides access to the Active Alarm View.
Graphic Panels
Using a sophisticated Graphic Panel editor, you can create colorful screen-based
graphics that simulate control panels, floor plans, and automated warnings or alerts.
These panels can then become primary interfaces for your end users.
Active Event Views, Groups, and ListViews
These are all objects that you create for the purpose of monitoring other objects.
Starting CyberStation
Use the following procedure to start CyberStation:
1. Click the Start button in your task bar.
2. Select Programs.
3. Select Continuum in the list of programs, and then click
program list.
Continuum in the
The CyberStation splash screen and the main menu appear along with the following
dialog:
TAC
Closing CyberStation
Use the following procedure to shut down CyberStation:
1. Right-click the Continuum icon
your screen.
3. When prompted to confirm that you want to close the application, click Yes.
4. If prompted to add a comment, enter a comment in the Comment field, and then
enter your user name and password.
15
5. Click the OK button, and wait for all CyberStation processes to terminate.
If you do not wait for all processes to finish you risk losing system information.
16
TAC
Menu Pages
This chapter describes the features of the CyberStation user interface and explains how
to use screen elements, such as hot spots and popup menus, to access information in
CyberStation. This chapter also describes how to customize CyberStation menu pages to
meet your requirements.
Title Bar - Shows the title for the current menu page.
Menu Area - Covers the entire region in between the title bar and status line.
Main Menu Links or Hot Spots Displays menu selections for major features
(Graphics, Schedules, Groups, and so on) along the left side of the window.
Status Line - Displays information including user name, workstation name, current
date and time, error messages, and prompts.
17
Title Bar
Menu
Area
Hotspot
Menu Links
Alarm Bar
Status Line
All CyberStation menu pages share the same basic features as the Main Menu described
above.
Hot spots
Popup menus
Runs a program.
1. Move the cursor to any part of the menu area that is not a hotspot.
2. Right click to display the popup menu.
3. Select Change Page and then the item you want to open from the dropdown list. For
example:
Placing the cursor over each of these icons displays a message indicating the status of
the item represented by the icon. Right click the icon to bring up a popup menu for each
item.
The SQL Server Icon
The SQL server icon appears only on a machine that is also functioning as the MSDE
Server.
Right click the icon to display a menu that allows you to start and stop the SQL server
from CyberStation and determine whether it starts automatically with the OS
Note: The SQL Server Service Manager menu is usually restricted, and used only by the
system administrator. Do not stop the SQL server without first consulting your
administrator.
Distribution Server Icon
When you make changes to CyberStation objects, CyberStation immediately sends the
new configuration information to the controllers. This process is referred to as distribution
and is performed by the CyberStation distribution server. The CyberStation distribution
server handles moves, copies, deletes, creating objects from templates and any other
actions occurring between a workstation and a controller.
icon in the tool tray provides feedback about the current
The distribution server
status of the distribution server.
Andover Continuum CyberStation Configurators Guide
19
When the workstation is offline, CyberStation does not send or receive messages
form the network. Changes that you make to CyberStation objects while the
workstation is offline are not sent to the controllers until you change the workstation
status to online.
Double click or right click the icon to change the workstation status.
Continuum Icon
Right click the Continuum icon
Alarm Icon
You can double click the Alarm icon
20 TAC
You can also access the Active Alarm View from the popup menu for this icon.
Acknowledge
View report
21
The CyberStation editors, live views, and other major dialogs have a Help button. Click
the Help button (or press the F1 key) to display help topics related to the feature in which
you are working.
To learn how to use all the features of the online help system, click the Contents tab in
the Help navigation pane, and then click the topic, How to Use this Online Help, as
shown below:
22 TAC
When you access the online help system for the first time, please read the topic entitled,
How to Use this Online Help. The help system has a navigation pane and a viewing
pane. The navigation pane has a Contents tab, as well as an Index tab with a text
search engine.
Though the CyberStation online help system contains some task-oriented how to
information, the help topics, by design, are closely aligned with the user-interface
attributes of CyberStation editors, dialogs, and other features that display Help buttons.
Graphics
Click the
hot spot to display a listview of all graphics files on the
system. These graphics files contain Pinpoint panels, which are described in detail in
Chapter 26.
23
Each entry lists the name of the graphic object, its alias, and the ownership of the object,
as indicated by file path. Double click an entry to open the selected object in the Graphics
editor.
Schedules
Click the
hot spot to display a listview of all schedules system. Click
an entry to open the selected schedule in the Schedule editor. Refer to Chapter 15 for a
detailed discussion of Schedules.
Groups
Click the
hot spot to display a listview of all groups on the system. Click
an entry to open the selected group in the Group editor. Refer to Chapter 22 for a
detailed discussion of Groups.
Listviews
Click the
24 TAC
Within this menu page many hot spots are arranged in five categories. Clicking on a hot
button produces a listview of the selected object.
Under Alarms you can request a list of all alarms on the system, as well as the alarm
activity for various time intervals. You can also create a list of all unacknowledged alarms
and view alarm acknowledgements.
The User Activity hot buttons each produce a listview of user activity on the system for a
particular time frame.
The User Logons hot buttons provide selections for the day, week, or month that create
a listview of all user logons to CyberStation. Each entry indicates the time of logon, where
the logon occurred (NodeName) and the name used (UserName) to logon with.
25
The Access Events hot buttons display listviews of access event activity on the system
for a particular time frame. Valid and Invalid Access can also be reported by day, week,
or month. The Invalid Access Listview provides a time stamp, event type, door, a person
ID, card number, and message for each invalid event occurring on the system. See also
Chapter 23, Creating Listviews and Chapter 11, Configuring Reports.
26 TAC
Personnel
Click the
An example of the listview associated with the All Personnel hot spot is shown below.
The hot spots under the Prompted Lists heading let you search for a Personnel object
by entering a card number, a department number, a last name, a driver's license, or a
Social Security number.
Explorer
Click the
27
Continuum Explorer is where you work with all the objects on your CyberStation system.
From Continuum Explorer, you can open object editors, create new objects, open
Listviews and schedules, launch graphics panels and view the properties of objects. See
Chapter 3 for detailed information about working in Continuum Explorer.
28 TAC
Command Line
hot spot to display the Command Line. The Command Line is
Click the
where you enter Plain English statements for carrying out CyberStation system tasks. For
example, you can run a report, print the values of system variables, or change input
setpoints by typing the appropriate keywords for these actions at the Command Line.
The Command Line consists of a title bar, a button to expand the Command Line, a
button to open the explorer, an area in which to type commands, and a message window
in which messages and printed values display.
This is where you type Plain English Statements.
This title bar displays the current path to the controller you
are working on
The title bar contains the path to the controller or device the Command Line is connected
to. To hide or display the title bar, right click it, and select Title Bar from the popup menu.
To view messages that are too long for the Command Line window, you can either resize
the command line, or place your cursor anywhere in the message text to display a pop up
view of the entire message.
Plain English Editor
hot spot to open the Plain English editor. You use the
Click the
Plain English editor to write, edit, and debug your Plain English programs. Refer to the
online help for more information about Plain English and the Plain English editor. You can
also refer to the Plain English Language Reference Guide, 30-3001-872
Message Window
Click the
Window.
29
The Continuum Message Window displays system messages and the results of print
requests generated from within programs.
Graphics Editor
hot spot to display the Pinpoint graphics editor. Pinpoint, the
Click the
CyberStation graphics application program, allows you to produce dynamic virtual control
panels on your workstation. Refer to Chapter 26 for complete details on the use of
Pinpoint.
Configuration Editor
Click the
The Configuration Wizard is a tool for using CyberStation templates. Templates are
predefined objects that you can drag and drop into container objects to create new
objects with the same attributes. The Configuration Wizard displays the templates that
are stored in the template folder. Each subfolder in the template folder creates a tab in
the Wizard. The Miscellaneous tab is created by the template folder itself. Refer to
Chapter 12 for a full discussion on templates.
30 TAC
Point Status
Under the Point Status heading, listviews are available for points. An example of the
listview for Doors is shown below.
System Messages
Under System Messages, hot spots link to error message listviews for the day, week
and month.
31
Windows Applications
The Windows Applications
Windows applications.
32 TAC
Create a
New Page
Save
Run
Help
icon in the Edit toolbar. The current menu page changes to a blank
3. Click the
page and the Page Edit dialog appears:
Page Information
Enter a Name and a Description for the page. Users see the name you entered when
they click Change Page in the shortcut menu and is the name that Change Page hot
spots refer to. Name can be up to 132 characters (including spaces).
Select the Main Page checkbox if you want the page you are creating to be the first page
the user sees.
33
Background File
The typical graphic file for a menu page has some sort of background or theme that
represents the purpose of the menu page and objects or text that can serve as hot spots.
A Main Page graphic might also include the corporate image of your company.
Insert the name of a graphic file for the menu page into the Background File field:
button to browse for a .bmp file. The default path for menu page files is
Use the
wherever CyberStation was installed, in the UserProfile folder.
Select the file you want to use, and click the Open button.
Audio
To add audio to the new menu page, proceed as follows:
1. In the File to Play field, click the
whenever users move to this page.
2. Locate and select the audio (.wav) file that you want to use, and then click the Open
button.
3. Select the Enable checkbox to enable the audio file.
4. Select the Use MS MPlayer checkbox to use Microsofts Media Player. If your
workstations use another type of media player, clear this checkbox.
If you check the Use MS MPlayer box, a second checkbox appears, Show MPlayer.
Check this box if you want the Microsoft Media Player to display on the screen:
Video
To add video to the new menu page, proceed as follows:
1. In the File to Play field, click the
whenever users move to this page.
2. Locate and select the video (.avi) file name, and click the Open button.
3. Check the Enable checkbox to enable the video file.
4. Check the Full Screen checkbox if you want the video to be the size of the monitor
screen. To have the video display in a window, clear this checkbox.
Save and Run
1. Click OK to close the Page Edit dialog.
2. Save your changes by clicking the
3. Click the
icon in the Edit toolbar, or display the shortcut menu and click Run.
You are now ready to add hot spots to the page you created.
34 TAC
35
2. Use your curser to draw a rectangle around the area of the graphic or text that you
want to be the hot spot. Define a big enough hot spot so users can easily click it.
3. Place the curser anywhere inside the dashed lines surrounding the hot spot just
created.
4. Right click, and then select Properties to display the Edit HotSpot dialog:
5. Select the Change Page radio button.
6. From the dropdown menu for the Open field, select the name of the new menu page.
7. Check the Make hotspot look like a window button checkbox.
8. Enter a title for the button in the Button field.
9. Click OK.
10. Click the Save icon in the Edit toolbar.
11. Click the Run icon in the Edit toolbar
The button should now appear on the menu page. Selecting it takes you to new
menu page.
Button Wizard
The Button Wizard is another method for creating buttons on menu pages. You can
create buttons to:
The following procedure described how to use the Button Wizard to create a button that
opens a CyberStation object in the appropriate object editor.
1. Create a hot spot as previously described under Creating a Hotspot as a Windows
Button.
2. Right click inside the Hot Spot rectangle and select Button Wizard from the popup
menu.
You are presented with the following menu.
36 TAC
37
5. From the dropdown menu, select the class of object to attach to the new button, and
click Next.
6. Using the browse button, select a location for the object, select whether users can
browse to other locations to locate the objects, and click Next.
Continuum
Explorer
Continuum Explorer is a tool that allows you to work with all the objects in your Andover
Continuum system. It displays the controllers, inputs, outputs, and workstations and is the
main environment in which you configure your system. From Explorer, you can open
object editors, create new objects, open listviews and schedules, launch graphics panels,
and view the properties of objects.
For example, if an input point called Rm Temp 1 was attached to a CX 9XXX controller
named CX1 which is connected to the Ethernet network called Building 1, you have the
following object hierarchy: the network object (Bldg1) owns the attached device object
(controller CX1) which owns the input point object (Rm Temp1). These relationships are
shown below.
Root
Network
Bldg1
Controller
CX1
Input Point
Rm Temp1
Class Icons
Each class has a default icon associated with it so that you can easily identify the object
class. Icons can represent a hardware object (for example, a controller or a workstation)
or a software object, such as a schedule. The following table shows all the default objectclass icons.
Note: In the following table, an asterisk (*) denotes an object class that may include or be
limited to BACnet objects. Refer to Chapter 14 for more information on BACnet and
BACnet icons.
Icon
Object Class
AlarmEnrollment
AnalogInput *
AnalogOutput *
AnalogValue *
40 TAC
Icon
Object Class
Area
BinaryInput *
BinaryOutput *
BinaryValue *
Calendar *
ControllerUser
CommPort
DateTime
Device (Andover Continuum b4/b3 controller) *
Device (third-party BACnet controller) *
Device (Andover Continuum workstation) *
Device (third-party workstation) *
Door
EventEnrollment *
EventView
EventNotification * (equivalent to BACnet NotificationClass object)
File *
Filter
Andover Continuum CyberStation Configurators Guide 41
Icon
Object Class
Folder (Continuum/Infinity)
Folder (BACnet)
Folder (Continuum/Infinity default class)
Folder (BACnet default class)
Function
Graphics
Group
InfinityController InfinityInfinetCtlr
InfinityInfinetCtlr (Infinity 2 only)
InfinityDateTime
InfinityFunction
InfinityInput
InfinityOutput
InfinityNumeric
InfinityProgram
InfinityString
42 TAC
Icon
Object Class
InfinitySystemVariable
IOUModule
Listview
Loop *
MultistateInput *
MultistateOutput *
MultistateValue *
Network (Continuum/Infinity)
Network (BACnet) *
NetworkDialup
Personnel
Program *
Report
Schedule *
SecurityLevel
String
TrendLog *
Andover Continuum CyberStation Configurators Guide 43
Icon
Object Class
User
VideoLayout
VideoServer
44 TAC
spot.
Title Bar
Dropdown
Menus
Quick Picks
Command Scroll Box
Explorer
Window
Navigation Pane
Viewing Pane
Status Bar
Title bar - indicates the path of the selected object, or the name of the selected
device or folder.
Popup menus
Command scroll box - always shows the path of the last selected object or the
name of the selected device or folder. Clicking the down arrow of the scroll bar
presents a history of all previous selections of objects, devices and folders.
Explorer Window divided into the two main viewing areas: navigation pane and
viewing pane.
Status bar - indicates Explorers activity, either in the idle state (Ready) or displaying
an active state. In the right-hand corner, indicates the number of objects appearing in
the viewing pane, and the number selected.
Dropdown Menus
Object Menu
The following table describes the selections in the Object dropdown menu, shown below.
The number of selections that appears in the dropdown menu varies according to the
object selected.
Object menu options are also available from popup menus when you right click an object.
Selection
Purpose
Open
Edit
Explore
View
Open a listview.
Import Into
Causes the Open dialog to appear. You can select an ASCII dump
file from which to import object settings
Find New
BACnet
Devices
Searches the network for BACnet devices that have not been
declared. The new devices then appear automatically on the
Explorer.
Backup to
Infinet2 Flash
46 TAC
Selection
Purpose
Backup
BACnet
Device
Restore
BACnet
Device
Distribute
Personnel
Send To
When you click this menu item the following submenu items
appear:
Text File: Opens the Save As dialog. Use the Save As dialog to
save Continuum Explorer data in the desired location.
Printer: This option is disabled in this version of Continuum
Explorer.
Controller: Appears whenever a controller icon is highlighted in the
Explorer. Used in conjunction with the Send to Controller Options
selection in the Options menu to reload the controller.
Database: Used in conjunction with the Send to Database
Options selection in the Options menu to reload the database.
New
Delete
Deletes the selected object and all its container objects including all
references and links to the database. It is a nonrecoverable
operation. A Confirm Operation dialog appears as a warning.
Click OK or Cancel.
Rename
Opens the Rename dialog so that you can rename the selected
object.
Page Setup
Properties
Exit
Edit Menu
Selection
Purpose
Select All
Select None
Inverse Selection
View Menu
Selection
Purpose
Toolbar
Status Bar
Explorer Bar
Class Folders
Show TAC
BACnet Device As
Objects
Hide Out Of
Services Devices
Icon
Small Icons
List
Details
Up One Level
Moves the cursor one level higher in the tree hierarchy in the
left pane.
Stop
Refresh
Refresh All
48 TAC
Selection
Purpose
Configuration
Wizard
Options Menu
Selection
Purpose
Copy Options
Send To Controller
Options
Send To Database
Options
Description
General
Name Conflicts
Class Filter
Allows you to select how to copy source objects. You can copy all,
include only certain classes, or exclude certain classes selected from
a scroll-down list.
50 TAC
Checkbox
Distribute personnel during an
ASCII import.
Checkbox
Dump pictures to separate files.
52 TAC
CAUTION: Complete the following steps to ensure that the Send to Database operation
is successful for controllers residing on a bCX1 40x0 controller for a field
bus network.
"Learn" a bCX1 40x0 Controller before Sending to Database Before performing a
routine Send to Database operation on a bCX1 40x0 series controller, you must first
perform a "learn" operation by clicking the Learn button on the Settings tab of the Comm
Port editor. (See Chapter 8.) This ensures that the bCX1 40x0 first knows about the
existence of its BACnet field bus controllers (b3 and third-party controllers). After the
learn, the Send to Database fetches object information from all controllers residing on
the field bus subnetwork and saves it to the CyberStation database. Before performing
the Send to Database operation, make sure you have also selected the Save attached
objects and controllers radio button.
Help Menu
Selection
Purpose
Contents
About Continuum
Explorer
Description
Explorer bar. When you click the downward arrow to the right of the
Explorer bar, a dropdown menu lists the Explorer bar viewing options.
See Using the Explorer Bars.
View Class Folders. For additional information, see Understanding
Object Classes.
View Objects. For additional information, see Understanding Object
Classes.
Stops current process.
Refreshes, or updates, both panes with newly added, deleted, or modified
objects.
Moves the cursor one level higher in the tree hierarchy in the left pane.
Changes the views you see in the Continuum Explorer viewing pane. For
additional information, see Working with the Viewing Pane.
Opens the Configuration Wizard.
Prints the viewing (right) pane of the Continuum Explorer on the default
printer. The dimensions depend on the default printer settings.
54 TAC
Popup Menus
Throughout CyberStation, in the Continuum Explorer and in almost all CyberStation
applications, right clicking displays a popup menu a popup menu.
Popup menus may interchangeably be referred to as shortcut menus.
The selection appearing in bold text in a popup menu is called the default verb for that
object. When you double click an object in the Continuum Explorer or in a browse field,
the action that takes place depends on the default verb for that object.
Navigation Pane
The navigation pane is a tree structure hierarchical representation of the root object and
the objects connected to it.
Viewing Pane
Use the viewing pane to view the contents of objects selected in the navigation pane and
to find details about the objects you are viewing.
Description
Icon
Displays
large icons in
the viewing
pane
Small
Icon
Displays
small icons in
the viewing
pane
List
Displays
objects in a
list in the
viewing pane
Details
Displays
details of
objects in the
viewing pane
56 TAC
Example
Details Options
The Details option provides the following information about CyberStation objects:
Column
Description
Name
DeviceID or
Owner
Alias
Type
Last Change
The picture on the left represents the class folder image of the objects pictured on the
right.
Explorer Views
Continuum Explorer allows you to view your system in five different ways: All Paths,
Networks, Folders, Templates, and BACnet View.
To change views, click the down arrow attached to the Explorer quick picks icon
58 TAC
Networks View
The Networks view shows the objects in your system in the viewing pane in relation to
physical hardware (workstations, controllers, and connected peripheral devices) that
contains them in the navigation pane.
Folders View
The Folders view shows folders, subfolders and class folders in the navigation pane.
Folders, class folders, and objects are shown in the viewing pane.
The Folders view organizes objects in your system independent of their physical
connection to each other. For example, suppose you have an Infinity Input point named
Room Temperature 1 attached to a controller named CX1 and you want to create a folder
named Chiller Plant that contains all the objects having to do with cooling systems in a
building. In Folder view, you place the CX1 controller in the Chiller Plant folder. (See the
following figure.)
In contrast to the Folders view, the Network view shows the objects in relation to their
physical arrangement in the network. The figure below shows the comparison between
the two views back to the root object.
Network View
Root
Folder View
Network
Building 1
Root
Folder Owner
Attached Device
Chiller Plant
CX1
Infinity Input
Room Temperature 1
This arrangement is possible because CyberStation allows every object to have two
owners, an attached network device and a folder owner. In the figure, the input point
Room Temperature 1 has two owners: Chiller Plant Folder and Attached Device CX1.
The folder owner is optional.
60 TAC
Class Folders
CyberStation keeps track of the objects you create by storing them in class folders. Every
time you create a new object on a device, CyberStation either stores it in an existing
class folder, or, if the object is the first instance of a class, CyberStation creates the
appropriate class folder for you. The picture below shows a device and all the class
folders that it owns:
Templates View
The Templates view displays the templates that are available in the CyberStation system.
The templates (Chapter 12) appear as folders and subfolders in the navigation pane. In
the viewing pane the templates are represented as folders and object icons.
BACnet View
In the BACnet view, only BACnet objects and devices are displayed. (Refer to Chapter
14.) For example:
Creating Objects
Here are some points to keep in mind before you create your first object:
CyberStation automatically creates the appropriate class folders as you create your
objects and stores the objects in the applicable views.
You can store objects in more than one view at the same time.
You may use either the navigation pane of Continuum Explorer or the New dialog to
navigate to the device that you want to attach.
Most objects must be attached to (stored in) a device such as a controller or workstation.
The exceptions are:
Areas
Folders
Personnel
AlarmEnrollments
Graphics
Security Levels
Event Views
Groups
Templates
EventNotifications
List Views
Users
CyberStation fills in the Alias field, but you can change it.
7. Click Create to enter the editor of the object you are creating.
The following table lists the CyberStation objects that can be owned by container objects.
Can Be Owned by this Container
This Object
Network
Infinity
Controller
Infinity
Infinet
Controller
Andover
Continuum
Workstation
Infinity
Folder
BACnet
Device *
BACnet
(Network)
Folder **
AlarmEnrollment
No
No
No
Yes
Yes
No
No
AnalogInput
No
No
No
Yes
No
Yes
No
AnalogOutput
No
No
No
Yes
No
Yes
No
AnalogValue
No
No
No
Yes
No
Yes
No
Area
No
No
No
Yes
Yes
No
No
BinaryInput
No
No
No
Yes
Yes
Yes
No
BinaryOutput
No
No
No
Yes
Yes
Yes
No
BinaryValue
No
No
No
Yes
Yes
Yes
No
Calendar
No
No
No
No
No
Yes
No
CommPort
Yes
Yes
No
No
No
No
No
ControllerUser
No
Yes
No
No
Yes
No
No
DateTime
No
No
No
Yes
Yes
No
No
Device *
No
No
No
No
No
Yes
Yes
Door
No
Yes
Yes
Yes
Yes
No
No
EventEnrollment
No
Yes
(b4/b3 only)
No
No
No
Yes
No
EventNotification
No
Yes
(b4/b3 only)
No
Yes
Yes
Yes
No
EventView
No
No
No
No
Yes
No
No
File
No
Yes
Yes
No
No
Yes
No
Filter
No
No
No
No
Yes
No
No
Folder
No
No
No
No
Yes
No
No
Function
No
No
No
Yes
Yes
No
No
Graphics
No
Yes
Yes
Yes
Yes
Yes
No
Group
No
Yes
Yes
Yes
Yes
Yes
No
InfinityController
Yes
No
No
No
Yes
No
No
InfinityDateTime
No
Yes
Yes
No
Yes
No
No
InfinityFunction
No
Yes
Yes
No
Yes
No
No
InfinityInfinetCtlr
No
Yes
No
No
Yes
No
No
InfinityInput
No
Yes
Yes
No
Yes
No
No
Network
Infinity
Controller
Infinity
Infinet
Controller
Andover
Continuum
Workstation
Infinity
Folder
BACnet
Device *
BACnet
(Network)
Folder **
InfinityNumeric
No
Yes
Yes
No
Yes
No
No
InfinityOutput
No
Yes
Yes
No
Yes
No
No
InfinityProgram
No
Yes
Yes
No
Yes
No
No
InfinityString
No
Yes
Yes
No
Yes
No
No
InfinitySystem
Variable
No
Yes
Yes
No
Yes
No
No
IOUModule
No
Yes
No
No*
Yes
No
No
Listview
No
Yes
Yes
Yes
Yes
Yes
No
Loop
No
Yes
Yes
No
Yes
No
No
MultistateInput
No
No
No
Yes
Yes
Yes
No
MultistateOutput
No
No
No
Yes
Yes
Yes
No
MultistateValue
No
No
No
Yes
Yes
Yes
No
Network
No
No
No
No
Yes
No
No
NetworkDialup
No
No
No
Yes
Yes
No
No
Personnel
No
No
No
No
Yes
No
No
Program
No
Yes
Yes
Yes
Yes
Yes
No
Report
No
Yes
Yes
Yes
Yes
No
No
Schedule *
No
Yes
Yes
Yes
Yes
Yes
No
SecurityLevel
No
No
No
No
Yes
No
No
String
No
No
No
Yes
Yes
No
No
TrendLog
No
Yes
Yes
No
Yes
Yes
No
User
No
No
No
No
Yes
No
No
VideoLayout
No
No
No
No
Yes
No
No
VideoServer
No
No
No
No
Yes
No
No
*Note: A Device is a BACnet object, viewed in the BACnet Devices portion of the
Continuum Explorer. A BACnet Device object can be one of the following:
Andover Continuum b4 or b3 controller device, third-party device, third-party
workstation. Although Andover Continuum workstations are BACnet devices,
they appear at the Root, not in the BACnet Devices network. Also, a Schedule
object may or may not be owned by a third-party device, depending on whether
the device supports Schedule.
**Note: A BACnet folder is a folder designated as a network, viewed in the BACnet
Devices portion of the Continuum Explorer.
64 TAC
66 TAC
If you create or edit a CSV file with Microsoft Excel, you must open the CSV file with a
text editor and remove all of the extra commas in the object class lines and at the end of
any lines throughout the file that have extra commas at the end.
Extra
commas
68 TAC
Key,firstname,lastname
Key,socsecno
Key,name
Key,alias
Key,cardnumber,sitecode,cardtype
Key,name,socsecno
Note: Key must not be an attribute in any class. All attributes in the Key Definition Line
(KDL) must also be in the Attribute Definition Line (ADL).
Option This line has two options available, as follows:
NoPhotoUpdate This option does not update the personnel photo file.
ClassName
AutoNumber,CardType,SiteCode,BeginCardNumber
Key,attribute1,attribute2,
Option,NoPhotoUpdate
Right click the object, and select Edit from the popup menu that appears.
Purpose
OK
Cancel
Apply
Refresh
Help
Use this menu to determine whether or not a user has the ability to create listview objects
with a path type that shows objects for more than one path. This action should be used
with the view access (above) to restrict users from seeing objects to which they do not
have access.
72 TAC
Security
Security groups and SecurityLevel objects are two CyberStation tools that you use to
determine the access privileges of CyberStation users.
Security groups enable you to define the access privileges needed by different types
of CyberStation users. You can then assign users to appropriate security groups.
Access privileges that you define for object classes in the Security editor apply to all
objects in that class (for example, all doors, all personnel).
SecurityLevel objects are CyberStation objects that you attach to other CyberStation
objects or to containers. You use SecurityLevel objects if you want to further restrict
security group access to individual objects, or to actions, such as deleting or editing,
that may be taken with the individual objects. You attach a SecurityLevel object to
each CyberStation container or object that you want to be controlled by those
privileges. Access privileges that you define in the SecurityLevel editor for
SecurityLevel objects apply only to the individual objects or containers that you attach
them to. They do not apply to other objects in the same object class. For more
information, see SecurityLevel Editor.
Security Groups
A security group is a category of CyberStation privileges for using editors and
applications. Typically, a system administrator sets up security groups defined by certain
access privileges and then assigns users to security groups in accordance with their
needs.
The security groups are configured to allow or deny the user access to Continuum
objects. Security groups might include the following examples:
Security Guard allowed full access to doors, areas, and personnel data but limited
to view only access to everything else.
HVAC Technician allowed access to all HVAC related objects, but denied access
to everything else.
Andover Continuum CyberStation Configurators Guide 73
in your tooltray.
Security groups are displayed to the right of the action or the tab name. The icon used to
identify each group indicates whether the group has access privileges for it:
indicates that the users in the security group do not have access
The Lock icon
privileges; that is, the action or tab is locked for this security group.
You can also assign and remove privileges by copying access settings to other security
groups and by importing security groups. For more information, see Copying Security
Groups and Importing and Exporting Security Groups later in this chapter.
Note: When you remove access privileges to view an object class for a security group,
users in that group do not see that object in Continuum Explorer. If the objects are
contained within a class folder, the class folder is not displayed when any of these
users are logged into CyberStation. For example, if a user belongs to a security
group that does not have access privileges to view Personnel objects, Personnel
objects and the Personnel class folder are not displayed in Continuum Explorer
when this user is logged into CyberStation.
1. Expand a view or folder. To assign access privileges to object classes, expand the
Classes folder, and then expand an object class.
A list of actions is displayed. If you expanded an object class, a list of the tab names
in that object editor is displayed after the actions.
Use the vertical scroll bar to locate the action for which you would like to assign
access privileges. In addition to actions specific to that object class, if any, the
following actions are listed for most object classes:
Change Out of Service Users belonging to security groups with this privilege can
enable and disable objects of this class.
Create Users belonging to security groups with this privilege can create objects of
this class.
Delete Users belonging to security groups with this privilege can delete objects of
this class.
Edit Users belonging to security groups with this privilege can open the editors of
objects of this class, and modify object values in the editor.
View Users belonging to security groups with this privilege can open the editors of
objects of this class, but cannot modify any values unless they also have Edit
privileges. These users will also be able to view the class folder for any objects for
which they have view access (provided the users also have access to Continuum
Explorer).
Send To Text File Users belonging to security groups with this privilege can
import and export object data to text files.
2. Assign or remove access privileges.
If you want to . . .
Then . . .
assign an access
privilege for an action or
an editor tab to a
security group
In the row that contains the action or tab name, click the
for the security group that you want to have
Lock icon
the privileges.
The Key icon
is now displayed for this security group,
indicating that the group has access to the action or tab.
76 TAC
If you want to . . .
Then . . .
remove an access
privilege for an action or
an editor tab from a
security group
In the row that contains the action or tab name, click the
Key icon for the security group where you want to remove
the privileges.
is now displayed for this security
The Lock icon
group, indicating that the group does not have access to
the action or tab.
assign access
privileges to all actions
within a view, object
class, or folder
remove access
privileges to all actions
within a view, object
class, or folder
3. Click OK.
Copying Access Privileges Between Security Groups
Use this procedure to copy the access privileges assigned to one security group to
another security group. This is useful when you want to define privileges for a security
group that are only slightly different from another security group. When you paste the
copied access privileges to the destination security group, the privileges for all actions in
all folders are replaced with the new privileges. You can then assign or remove privileges
as needed.
1. In the Actions tab, expand a view or folder.
2. If needed, use the horizontal scroll bar to display the icon for the security group
whose access privileges you want to copy.
3. Right click the security group, and select Copy Group from the popup menu.
4. If needed, use the horizontal scroll bar to display the icon for the security group
where you want to paste the access privileges.
5. Right click the security group where you want to paste the privileges, and select
Paste Group from the popup menu.
6. Assign or remove privileges as needed for the security group where you copied the
access privileges.
7. Click Apply or OK.
78 TAC
2. In the Save As dialog, enter a filename, and click the Save button to create the .SDF
file.
Importing One Security Group
Use this procedure to import the access privileges for a selected security group from a
security dump file (.SDF).
1. In the Actions tab, expand a view or folder, and right click the security group for
which you want to import access privileges.
2. Select Import Group from the popup menu.
3. In the Open dialog, select the file containing the security group settings you want to
import, and click the Open button.
Note: Importing access privileges overwrites the previous access privileges for the
security group. Ensure that you have imported the access privileges that you
want to use before clicking Apply to save them in the Security editor.
4. Click Apply or OK to save the access privileges for the selected security group.
Importing All Security Groups
Use this procedure to import the access privileges for all security groups from a security
dump file (.SDF).
1. In the Actions tab, right click anywhere under Action or any white space, and select
Import All from the popup menu.
2. In the Open dialog, select the SDF file that contains the security group privileges that
you want to import, and click the Open button.
Andover Continuum CyberStation Configurators Guide 79
Note: Importing all security group privileges overwrites the previous access privileges
for the security groups. Ensure that you have imported the access privileges
that you want to use before clicking Apply to save them in the Security editor.
3. Click Apply or OK save the security groups settings.
Security groups are displayed to the right of the action or the tab name. The icon used to
identify each group indicates whether the group has access privileges for it:
indicates that the users in the security group do not have access
The Lock icon
privileges; that is, the action or tab is locked for this security group.
indicates that the users in the security group have access privileges;
The Key icon
that is, the action or tab is unlocked for this security group.
Position your cursor over an icon to display the name of the security group and the action
or editor tab it represents. Group names are defined in the Group Names tab of the
Security editor.
View Users belonging to security groups with this privilege can open the editors of
objects of this class, but cannot modify any values unless they also have Edit
privileges. These users will also be able to view the class folder for any objects for
which they have view access (provided the users also have access to Continuum
Explorer).
Send To Text File Users belonging to security groups with this privilege can
import and export object data to text files.
2. Assign or remove access privileges.
If you want to . . .
Then . . .
assign an access
privilege for an action or
an editor tab to a
security group
In the row that contains the action or tab name, click the
for the security group that you want to have
Lock icon
the privileges.
The Key icon
is now displayed for this security group,
indicating that the group has access to the action or tab.
remove an access
privilege for an action or
an editor tab from a
security group
In the row that contains the action or tab name, click the
Key icon for the security group where you want to remove
the privileges.
is now displayed for this security
The Lock icon
group, indicating that the group does not have access to
the action or tab.
assign access
privileges to all actions
within a view, object
class, or folder
remove access
privileges to all actions
within a view, object
class, or folder
82 TAC
3. Click OK.
You attach a SecurityLevel object to individual CyberStation objects in the
SecurityLevel tab in their respective object editors. For more information, see the
help topics for SecurityLevel tabs in the editors.
4. If needed, use the horizontal scroll bar to display the icon for the security group
where you want to paste the access privileges.
5. Right click the security group where you want to paste the privileges, and select
Paste Group from the popup menu.
6. Assign or remove privileges as needed for the security group where you copied the
access privileges.
7. Click Apply or OK.
Andover Continuum CyberStation Configurators Guide 83
84 TAC
Partitions division of site into physical areas (Building A, Building B, and so on)
Administrators
Guards
Maintenance
2. Determine the partitions. This example uses two partitions:
BuildingA
BuildingB
3. Determine the number of security groups to configure:
Number of roles x Number of partitions = Number of groups
For example:
3 x 2 = 6 Security groups
4. Assign names to security groups in the Group Names tab of the Security editor:
BldgAAdmin
BldgBAdmin
BldgAGuard
BldgBGuard
BldgAMain
BldgBMain
8. Create a SecurityLevel object for each folder named BldgAAccess and BldgBAccess,
and define access as shown in the following table.
You can use the Universal Lock/Unlock feature in the SecurityLevel editor to quickly
assign access privileges to the security groups.
Folder
Security Level
Object
Groups Allowed
Access
Groups Denied
Access
BuildingA
BldgAAccess
BldgAAdmin
BldgAGuard
BldgAMain
BldgBAdmin
BldgBGuard
BldgBMain
BuildingB
BldgBAccess
BldgBAdmin
BldgBGuard
BldgBMain
BldgAAdmin
BldgAGuard
BldgAMain
User Limitations
Users that do not have access privileges to certain folders/devices will not be able to
access any objects contained in them. Pinpoint is the exception to this. Pinpoint will not
hide controls based on FDL security. However, Pinpoint does prevent users from editing
objects that they have no access to.
The following table summarizes the effect of user access privileges with FDL security.
Function
User Limitations
List Views
The user will be able to see objects they dont have access to, but will
not be able to access them.
Group Views
The user will be able to see objects they dont have access to, but will
not be able to access them.
Active Alarm
View
The user will be able to see objects they dont have access to, but will
not be able to access them.
Event View
The user will be able to see objects they dont have access to, but will
not be able to access them.
Continuum
Explorer
The user will not see any object that the user doesnt have view access
to when using the Universal Lock. If the Universal Lock is unlocked, for
a group and the view access of a device class or folder is locked, then
the corresponding device/folder will not be viewable from explorer.
If a security level object is set up to allow viewing the folder but not
viewing any child class under it, attaching this security level object to a
folder would not prevent child class objects from showing under that
folder in Continuum Explorer. When users click a child class object
however, an access denied error will show up. The use case of
viewing a folder/device but not viewing children under that folder/device
in Explorer is not supported in current FDL implementation.
Andover Continuum CyberStation Configurators Guide 87
Function
User Limitations
Command
Line
The user cannot change the value of any object or attribute if they do
not have change value level.
Editors
The user cannot edit any object that they do not have edit access to.
This applies to all editors independently of where they are launched.
web.Client
Pinpoint
Pinpoint will not apply view FDL security to controls. All controls will
always display. If the user does not have change value level, then they
cannot modify values using in line controls. If they do not have edit
access, then they are denied from launching object editors. If they do
not have access to other graphics that are linked using buttons, then
they will be denied access to the graphics when clicking the button.
88 TAC
Configuring
Users
18
5
User Object
For every user in your company who is allowed access to your building control system,
you must create a User object in CyberStation. User objects contain each users
password and security group assignment. If you choose to you can also record personal
information, such as the Social Security number and address, about each user.
User objects are always created under the Root object. ControllerUser objects are
created under the applicable NetController. ControllerUser cannot exist under Root.
ControllerUser Object
For every user in your company who is allowed access to a command terminal remotely
connected to a NetController you must create a ControllerUser object in CyberStation.
(See Creating a ControllerUser Object, later in this chapter.) Controller users are
separate from CyberStation users. Controller objects have a direct relationship with the
NetController they are connected to.
Additionally, the CyberStation can be configured to implement the features that assist in
satisfying the requirements of Part 11 of Title 21 of the Code of Federal Regulations
entitled Electronic Records; Electronic Signatures (better known as 21 CFR 11).
Procedures for setting features on the General Preferences and CFR Preferences
dialogs to implement these features are presented later in this chapter.
The users name. There are two name considerations: the name that is assigned to
the User object that is created for the user and the Full Name that is entered in the
User editor. The object name is the one that system recognizes.
The password this user will use when logging on to CyberStation. (It must be
between 0 and 16 alphanumeric characters as determined by the General
Preferences setting.)
What programs, reports, menu pages, or graphics panels you want to run when this
User logs on.
The CyberStation User Security Group(s) that this user will be assigned to.
In order to use the User editor, you must first create a User object.
Object name, which is also the username the user enters to log on to CyberStation
Security group or groups to which the user is assigned (See Chapter 4 for more
information about security groups.)
You can also enter personal information for the user.
Perform the following steps to create a User object:
1. In Continuum Explorer, right click the Root.
2. Select New, and then select User from the popup menu.
3. In the New dialog, enter the username in the Object name field.
CyberStation fills in the Alias field, but you can change it if needed.
4. Click the Create button.
90 TAC
Full Name
Password
Social
Security
Address
Office Phone #
Enter the users office phone number. You can use any characters
you need, such as dashes and parenthesis. This is optional.
Home Phone #
Enter the users home phone number. You can use any characters
you need, such as dashes and parenthesis. This is optional.
Employee #
Title
Enter the users job title. You can use up to 32 characters, including
spaces. This is optional.
State
LogOn Program
If you have a program that you would like to run every time the
user logs on, click the browse button to locate and select it.
This displays a Browse dialog to help you find the right file.
When you have located the file you want, select it and click the
Select button. This inserts the correct path and filename into
the Logon Program text field.
LogOff Program
If you have a program that you would like to run every time the
user logs off, click the browse button to locate and select it.
This displays a Browse dialog to help you find the right file.
When you have located the file you want, select it and click the
Select button. This inserts the correct path and filename into
the LogOff Program text field.
Report
If you have a report that you would like to run every time the
user logs on, click the browse button to locate and select it.
This displays a Browse dialog to help you find the right file.
When you have located the file you want, select it and click the
Select button. This inserts the correct path and filename into
the Report text field.
Menu File
Graphic
If you have a graphic panel that you would like to display every
time the user logs on, click the browse button to locate and
select it. This displays a Browse dialog to help you find the right
file. When you have located the file you want, select it and click
the Select button. This inserts the correct path and filename
into the Graphic text field.
Inactivity Timer
In this field, you enter the amount of time (in minutes) that no
user activity occurs in CyberStation before the user is
automatically logged off. All applications, such as the
Continuum Explorer, the Plain English IDE, Pinpoint, and any
object editor will be closed after the number of minutes.
Note: Keyboard entry and mouse clicks are considered user
activity. Hovering the mouse over any CyberStation
application is not considered user activity.
Enable Operator
Text Prompt for
changes
92 TAC
Enable Operator
Text Prompt for
Alarm
Acknowledgement
General Preferences
This section presents password management requirements and configuration of 21
CFR 11. In order to implement the password management features of CyberStation, the
following requirements must be met:
A General Preference setting for a password age of between 7 and 180 days must
exist for all users of the system.
A General Preference setting for the consecutive number of invalid login attempts of
between 0 and 255 before an alarm is triggered must exist for all users of the system.
A General Preference setting that tells CyberStation how far back in time to check a
users password history the number of previous passwords to check in search of
duplicate passwords. When a user changes the password, or the password expires,
and a duplicate password is found in his/her password history, the user receives an
error message.
A means to allow any user of the system to change their own password at any time.
A means to allow the system administrator to immediately disable the account of any
user of the system.
94 TAC
2. In the Value column, enter or select your preference for each attribute.
Preference
Value
Maximum consecutive
invalid attempts before
alarm in triggered
Preference
Value
96 TAC
CFR Preferences
The additional 21 CFR 11 features affects two separate areas of the CyberStation
system:
Audit Trail
Alarm Log
Both of these areas are configured from CyberStations CFR Preferences dialog.
The 21 CFR 11 bit of the Security hardware Key (supplied with the CyberStation
installation kit) must be enabled in order for the CFR Preferences features of
CyberStation to be available.
An entry to the Activity Log when CyberStation starts up. The entry will not include
user information since no user is logged on at that time.
An entry to the Activity Log when CyberStation shuts down. The entry will include
user information.
A setting to enable an Operator Text Prompt for changes at both the CFR
Preferences and user levels of the system.
A CFR Preferences setting that provides the user with the option to enable logging of
all attribute values that are set when an object is created.
Perform the following steps to set up the Audit Trail features in CyberStation.
1. Right click the Continuum icon in the tool tray, and select CFR Preferences form the
Continuum popup menu to access the CyberStation CFR Preferences dialog.
2. Verify that the value of item 2, Enable Operator Text Prompt for changes, is set to
True.
3. For item 3, Log attribute values set at object time select either:
True to log the attributes that are set when an object is created.
False to not log the attributes that are set when an object is created.
4. Click Close.
5. For each CyberStation user, verify that the Enable Operator Text Prompt for
Changes checkbox is checked in the Security tab of the User editor.
This is the default setting.
The CyberStation is now configured to implement the 21 CFR 11 Audit Trail features.
The CFR 11 bit of the Security hardware key (supplied with the CyberStation
installation kit) must be enabled in order for the CFR Preferences features of
CyberStation to be available.
The user is forced to enter text comments along with user name and password to the
Alarm log whenever alarms are acknowledged; this is covered under the General
Preferences dialog.
The user name and password must match the logged on user this only applies
when the Allow different user to sign off operator text value is set to False in the
CFR Preferences dialog.
A CFR Preference setting that provides the option of allowing a user other than the
original user to sign off operator text dialogs.
Perform the following steps to set up the Alarm Log features in Continuum CyberStation.
1. Right click the Continuum icon in the tool tray, and select CFR Preferences from the
Continuum popup menu to access the CyberStation CFR Preferences dialog.
2. For item 1, Allow different user to sign off operator text, select one of the
following settings:
True if you want operator text dialogs to accept any valid and enabled CyberStation
user name and password.
False if you want operator text dialogs to accept only the user name and password of
the user that is logged on.
3. For each CyberStation user, verify that the Enable Operator Text Prompt for Alarm
Acknowledgement checkbox is checked in the Security tab or the User editor.
This is the default setting.
The CyberStation is now configured to implement the 21 CFR 11 Alarm Log features.
98 TAC
When the maximum number of invalid logins (set in the General Preferences dialog) is
exceeded, the following error message appears:
If the workstation is added to the list of recipients in the Delivery tab of the
EventNotification editor (for the LogonStatus EventNotifcation object), this alarm is
reported in the Active Alarm View. The user name and the workstation that was used for
the logon attempts are displayed.
Also, any attempt to login at any workstation with a disabled account will fail and be
recorded on the Activity log. This situation is shown in the second entry of the Active
Alarm View log shown above.
Maximum Password Age Exceeded
Whenever the Maximum password age setting in the General Preferences dialog is
exceeded for a user, the user is prompted to create a new password when the user next
attempts to log in.
Password Change and/or Password Length Exceeded
When either of these events occur:
The password is changed in the General tab of the User editor, and the Force
password change after User account password modification in the General
Preferences dialog is set to True.
Right click the User object, and select Disable from the popup menu:
In the User editor, select Disabled in the State dropdown menu on the Security tab.
Password
100 TAC
Login Program
Logout
Program
Controller
Security Level
102 TAC
Configuring a
Network
A network is a system of one or many controllers and their connected peripheral devices
that are linked together on an Ethernet communications network to share information. In
CyberStation, a network object represents a network configuration of up to 190
controllers that know about and exchange information with each other. This chapter
describes the process of creating a network object.
Time Zone
Difference
Default Folder
Controller to
CyberStation
DBsync
6. You can attach up to eight alarms to the network object. You may also attach a
graphic panel and a report or other program to the object.
7. Click the corresponding browse button to select the AlarmEnrollment object, graphic,
or program you want to attach.
8. If you selected AlarmEnrollment objects, click the Enabled checkbox next to the field
to enable the alarm.
9. If you want to attach a SecurityLevel object to this network object, select the
SecurityLevel tab and select a SecurityLevel object.
10. For details in attaching or detaching Security Levels, refer to Chapter 4.
11. Click OK.
106 TAC
Configuring
Controllers
InfinityController (for CXxxxx, NetController, NetController II, bCX1 96xx, bCX1 40x0,
or b4920)
NetController II (model CX9680 or CX9681) configured with its wireless Infinet field
controllers
bCX1 9640 controller configured with its wireless Infinet field controllers
bCX1 40x0 controller configured with its wireless BACnet b3 MS/TP field controllers.
Note: As a future enhancement, ACX 57xx series controllers will support Wireless
communication, much like the NetController II models 9680/9681.
See also the Andover Continuum Wireless Mesh Network Concepts and Best Practices
Guide, 30-3001-912, the NetController II Operation and Technical Reference Guide, 30Andover Continuum CyberStation Configurators Guide 107
3001-995, the ACK 57xx Series Controller Operation and Technical Reference Guide,
30-3001-999, and the bCX1 Series Controller Technical Reference Guide, 30-3001-890.
Note: In order to make one of these controllers a wireless controller, you must designate
one of its comm ports as Wireless to establish wireless communication with the
wireless mesh network.
Note: Andover Continuum BACnet-compliant controllers are included in the Andover
Continuum product line. These are the bCX1 (40x0), b4920 and the b3xxx series
controllers. The b4 is created as an InfinityController object, and the b3 is created
as an InfinityInfinetCtlr object. Depending on which Continuum Explorer view you
select, b4 and b3 controllers may also be viewed as BACnet Device objects in the
BACnet Devices portion of Explorers navigation pane, while also being viewed as
InfinityController and InfinityInfinetCtlr objects in the Infinity portion of the
navigation pane. (Please refer to Chapter 14 for more information on BACnet and
BACnet devices.)
Andover Continuum also supports third-party BACnet devices that are integrated into the
Andover Continuum system.
By default, communication with Andover Continuum BACnet controllers is enabled on
your system. If you have no BACnet devices, or if you do not want exposure to BACnet
class objects, you may want to disable system communication with BACnet, whereby
CyberStation no longer sends or responds to BACnet communication requests. In this
case, only Infinity and InfinityInfinetCtlr controller objects are visible in Continuum
Explorer. For more information, please see Chapter 14.
All InfinityControllers, including b4 controllers, must be commissioned before they can
communicate with CyberStation. bCX1 device commissioning is described in the bCX1
Controller Technical Reference, 30-3001-890.
Once an InfinityController has been commissioned, a network controller object can be
created to represent it on the network.
Commissioning a Controller
In order for CyberStation to communicate with an Ethernet-level controller, you or your
administrator must connect to the controller and enter its network address and other
identification information. This process is called controller commissioning. You can
commission most Andover Continuum controllers by accessing and entering information
on their embedded web pages. Some older controllers, such as the previous-generation
NetController, require you to connect to the controller using a command terminal
emulator, such as HyperTerminal. For more information, please see the manual for your
controller:
ACX 57xx series ACX 57xx Series Controller Operation and Technical Reference
Guide, 30-3001-999
108 TAC
bCX1 series (9640, 40xx) bCX1 Series Controller Technical Reference Guide, 303001-890
ACCNet ID
Controller Type
Comm Status
Out of Service
Check this checkbox if you need to place the controller in an out-ofservice (disabled) state. This creates a return-to-normal failure
alarm on all CyberStations with the associated AlarmEnrollment
editors Alarmed Attribute value set to OutOfService (see Using the
AlarmEnrollment Editor in Chapter 10). It also allows the user to
clear unwanted failure alarms from the alarm viewer and prevents
any further failure alarms being reported from the controller. Also,
personnel distribution cannot occur on the controller or its
associated Infinet controllers.
Daylight Savings
Network Security
Check this checkbox to activate the TAC network security policy for
this controller.
Note: Network security is supported only in the NetController II
model 9680 and in the ACX controller models 5720 and
5740.
The TAC network security policy is a local security policy,
established and enabled through CyberStation, through the
Network Security Configuration web page and other web pages
embedded in the controller, and through your Windows
Administrative Tools. Network security secures communication
between the controller and a workstation using the Internet Security
Protocol (IPS) and the Internet Key Exchange (IKE). It ensures
authentication, integrity, and encryptions of IP data packets.
For more information on how to implement network security in
CyberStation, please see Establishing Network Security for a
Controller later in this chapter. For complete instructions on
configuring network security on the controller and in Windows,
please see the Andover Continuum Network Security Configuration
Guide, 30-3001-996.
110 TAC
Probe Time
IOU Models
UTC Offset
BACnet Device Id
BacMaxMaster
Location
Serial Number
Network ID - UPD
Version
Network ID
Comm2
This integer displays the ID number of the BACnet MasterSlave/Token Passing (MS/TP) or Wireless network on which the
bCX1 (40x0) or b4920 controller resides.
Default Folder
Browse to select the folder where the child objects of this controller
will be stored (optional).
Update OS
Update IOUs
Update BACnet
b3 OS
112 TAC
Update Infinet 2
OS
Update Wireless
I2 OS
OR
Click the Reset button when you need to delete all programs and
points stored on the controller. Use the Reset button with caution,
and only after you have saved the programs and points to the
CyberStation database. When you click the Reset button, a dialog
appears and asks you if you want to continue. If you click OK, you
will not be able to retrieve the deleted programs and points except
by reloading them from the CyberStation database.
Teach
114 TAC
From the dropdown menu, select the type of network protocol through
which the controller communicates with workstations and other
Ethernet-level controllers.
Selections are TCP, UPD, or TCP and UPD.
TCP stands for Transmission Control Protocol. TCP uses a connectionoriented byte stream and guarantees data delivery. TCP is used by
network applications that require guaranteed delivery and that cannot
be hampered by time-outs and retransmissions. TCP requires more
CPU and network bandwidth than UDP.
UDP stands for User Datagram Protocol. Many application protocols
use UDP: for example, Network File System (NFS), Simple Network
Management Protocol (SNMP), and BACnet. UDP, which is a
connectionless datagram delivery service, does not maintain an end-toend connection with the remote UDP module. UDP does not guarantee
delivery, whereas TCP does.
Ethernet ID
IP Address,
Subnet Mask,
PPP IP
Address, and
Default
Router
Max
Response
Time
This number is the number of seconds the controller will wait before
resending a packet of information. In most situations, the default value
of 5 seconds is sufficient. You may want to increase the number of
seconds in the following situations:
This is the Plain English function path of this controllers web page.
This path is used by the web.Client application. When a user clicks a
controller, via the web.Client Web Pages feature, web.Client accesses
this path, and displays the appropriate web page in the browser. For
example:
http://Andover/PE/WebSetSampl
Controller to
CyberStation
DBsync
Check this checkbox if you want changes made to the controller outside
of CyberStation, such as through a command terminal connection to the
controller, to be synchronized with the CyberStation database. If a
reload of the controller occurs, a flag appears on the controller icon in
Continuum Explorer, indicating that a save to database must be
preformed.
X Driver
Max Infinet
Controllers
LAN
116 TAC
LON
Modem
PCB Revision
Web Server
SNMP
ACC_LON I/O
L-BUS I/O
In this example, indicates that ACC_LON I/O is disabled and L-BUS I/O
is enabled.
HCR
Area
Lockdown
Condition
Level
Bootloader
Version
Network
Security
Description
Infinity
Controller
Teach
Network Teach
Global Teach
When there are multiple networks, choosing this teach mode has the
same effect as executing a Network Teach on each Network.
Description
Where It Is Configured
1: Determine if
network security is
enabled for this
controller.
CyberStation
InfinityController editor,
Options tab
2: Configure
network security
on the controller
Web-page dialogs
embedded in the
NetController II 9860 or
the ACX 57x0
3: Configure
network security
on the workstation
4: Activate
network security
for the controller
CyberStation
InfinityController editor,
General tab
6. Access and configure the controller for your preferred security. To do so, you must
access and log in to the controllers main embedded web configuration page, then
navigate to the Network Security Configuration embedded web page.
Note: For complete instructions on configuring network security, please see the
Andover Continuum Network Security Configuration Guide, 30-3001-996, the
NetController II Operation and Technical Reference Guide, 30-3001-995, and
the ACX 57xx Series Controller Operation and Technical Reference Guide, 303001-999.
7. If you have not imported the IPSec security policy, do so now. if you already have, go
to the next step.
From the Windows Control Panel, open Administrative Tools, then Local Security
Policy, which launches the Local Security Policy dialog.
Note: For complete instructions, see the Andover Continuum Network Security
Configuration Guide, 30-3001-996.
8. Edit the imported security policy. You do this via the Control Panel and the TAC
Encrypt and Authenticate dialog.
Note: For complete instructions, see the Andover Continuum Network Security
Configuration Guide, 30-3001-996.
9. If necessary export the edited security policy to other workstation. This allows the use
of the modified policy on other workstations without having to edit it on each
workstation. You do this from the Launch Security Settings dialog.
Note: For complete instructions, see the Andover Continuum Network Security
Configuration Guide, 30-3001-996.
10. Activate network security in an existing controller or on a new controller that you are
creating.
For an existing controller, enter CyberStation offline editing mode.
On the General tab of the InfinityController editor, check the Network Security
checkbox.
11. Click Apply.
12. Enter online editing mode.
13. Verify that the controller is online.
14. From the General tab, click the Teach button to update the network.
120 TAC
2. From Continuum Explorer, right click the controller, and select Send To Text Files.
This dumps the controller objects data into a text file.
3. Update your workstation with a version of CyberStation that supports the newer
NetController models. (These models are supported in CyberStation Version 1.8 and
higher.) See the Andover Continuum CyberStation Installation Guide, 30-3001-720.
4. Physically remove the old NetController, and mount/connect your NetController II.
When you configure and commission the NetController II, use the same controller
name, network IP address, and neting ID. This is performed via the controllers
embedded web commissioning pages, via the General tab, and via the Network tab.
See the Andover Continuum NetController II Operation and Technical Reference
Guide, 30-3001-995, and the Andover Continuum NetController II Installation
Instructions, 30-3001-994.
5. Switch to CyberStation offline editing mode (if you are not already there) in the
InfinityController editor.
6. On the General tab, from the Controller Type dropdown menu, change the model
number to 9680 or 9681, depending on which NetController II you are installing.
7. Make sure you actually want to replace the NetController.
When you attempt to change the controller model, CyberStation displays a few
warning messages:
CyberStation warns that, if an XDriver is used with this controller, not all XDrivers
are supported by the new model. This warning only occurs if an XDriver is loaded
and enabled.
If you proceed, the XDriver links are left in place regardless of the availability of a
replacement XDriver.
XDrivers on NetController II In general, XDrivers that are available on the bCX1
model 9640 are also supported on the NetController II.
For example, supported NetController II XDrivers include, but are not limited to, the
following:
Filter
XdTest
Modbus TCP
Modbus RTU
Note: XDrivers built for the previous-generation NetController will not run on the
NetController II
What is an XDriver? An XDriver is special, customized software that your site
purchases separately from TAC. This XDriver software allows your controller to
connect to and communicate with a special piece of third-party equipment needed at
your site. In the CommPort editor, you must configure a controller comm port for this
special device that the XDriver software enables.
Andover Continuum CyberStation Configurators Guide 121
When you leave the InfinityController editor, go back to online editing mode.
8. If necessary, provide an updated XDriver file compatible with your NetController II.
CyberStation prompts you to do this.
Note: You can specify an XDriver on the General tab of the CommPort editor.
Specify XDriver for the Default Mode, and use the browse button in the
XDriver File Name field to search for and specifiy the path of the XDriver. See,
Configuring Settings for an XDriver, later in this chapter.
9. Determine whether this NetController II has network security. If so, configure network
security for this controller. See, Establishing Network Security for a Controller, earlier
in this chapter.
Note: Network Security is supported online in NetController II model 9680, as well as
ACX controllers 5720 and 5740.
10. Restore (reload) data from your database into the new controller. From Continuum
Explorer, use the Object dropdown menu, or right click the controller and select Sent
to Controller.
11. Back up to flash. In Continuum Explorer, right click the controller, and from the
container popup menu, select Backup to Flash. This saves the controllers RAM
configuration to its flash memory.
122 TAC
2. Select the appropriate radio button, and click OK. (See Chapter 3.)
3. In Continuum Explorer, right click the controller that was edited, select Send To, and
then select Database.
4. When prompted to confirm the operation, click OK to initiate the operation.
When the send to database is accomplished, you can click the Refresh icon to remove
the exclamation flag next to the controller icon in Continuum Explorer.
Cold Start: The Infinet 2 controller comes up, from a reset, with no user objects or
configuration in place.
Cool Start: The Infinet 2 controller comes up, from a reset, and restores a user
configuration from flash memory (the user backup area) that was initially saved by
the user. Cool start can be thought of as a self reload.
Warm Start: The Infinet 2 controller comes up, from a reset, and restores the
configuration that was present in the controller when it was reset and/or power was
lost (restored from the warm start area of flash memory).
For each Infinet 2 controller, you can specify which restart mode to use as described in
Setting the ACCRestartMode Attribute later in this chapter.
To backup the controller you edit the controller and click the Backup to Flash button on
the InfinityInfinetCtlr General tab. (See next page for details.)
2. In the Networks view, right click the InfinityController object under which you are
adding the Infinet controller, select New, and then InfinityInfinetCtlr.
3. Name your controller in the Object name field.
4. Remove the check from the Put object in folder checkbox.
5. Click the Create button.
Enter the controller attributes, and click OK to save the controller object.
Location
126 TAC
Model
Select the Infinet controller's model number from the dropdown menu.
Note: When you select a BACnet-compliant b36xx, b38xx, or b39xx
controller, you are creating an Andover Continuum BACnetcompliant Device object, in addition to an InfinityInfinetCtlr
object. To configure BACnet analog, binary, and multistate
inputs, outputs, and values for this new BACnet device, you
must first create them as Infinity Input, Infinity Output, and
Infinity Numeric points. A b3 controller must be reside on a b4
controller. Otherwise the b3 controller selections will not be
available in the Model dropdown menu. (See also the
subsection, Creating an Andover Continuum b3 Controller, later
in this chapter.)
CommPort
Infinet Id
Enter an ID number for this controller if you are creating this controller
offline. Normally, you let CyberStation assign one for you by clicking
the Learn button from the Comm Port editor (Chapter 8). This is
known as an Infinet Learn. An Infinet Learn checks for new Infinet
controllers. If it finds one without an ID number, it assigns a number. If
it finds an Infinet controller with an ID number that has been manually
entered, it learns that number. You need to perform an Infinet Learn
only if your are adding a new Infinet controller. Do not do an Infinet
Learn if you are replacing an existing controller.
BACnet
Device Id
Default Folder
(Optional)
Click the browse button to select the default folder for this controller.
Status
Backup to
Flash
Update
INfinet2 OS
Update b3 OS
(replaces
above button
for BACnet
controllers)
Find the controllers serial and version numbers, as well as information about any
errors that may have occurred.
With the exception of Serial #, all of the information on this tab is read-only. In the case
of the Serial #, if for some reason the controller had to be replaced, you would enter the
new number in the Serial # field.
Serial #
Displays the serial number that is filled in when you click the Learn
button from the CommPort editor.
Version #
Displays the version number that is filled in when you click the Learn
button from the CommPort editor.
Error #
Error Time
Displays the time and date that the last error occurred on the controller.
Error Count
128 TAC
Reconfigs
Displays the number of times the network has been reconfigured. The
network automatically reconfigures itself when it detects a
communication error. If a high number of errors and a high number of
reconfigs occur, your network may have a loose connection somewhere
that is causing the communication error.
Reset
To use
ACCWarmStartOnly
ACCCoolStartOnly
ACCWarmtoCool
130 TAC
Configuring
Comm Ports
After a controller is defined its communication ports need to be configured for the devices
connect to them.
Each Andover Continuum network controller includes provisions for adding other devices.
The network controllers include up to four programmable communications interfaces
called comm ports and a dedicated interface for the Continuum IOU modules.
A comm port is an electrical interface used to connect the controller to an external device
such as a printer or a terminal. When you create a controller object, CyberStation
automatically creates appropriate comm port objects for each of the comm ports of that
controller. You use the CommPort editor to provide settings that enable the comm port to
work with the device attached to it.
Printers are typically used to produce hard copy of lists and logs.
These devices interface with controllers via an RS-232 serial
connection.
Infinet,
MS/TP,
Wireless
XDriver
TankNet
L-BUS
Description
Comm Port
Number and
Default Mode
You can use the settings indicated for each of the following
controller models:
Baud Rate
Flow Control
Terminal Type
Click the terminal type that you are using. If you are running a
terminal emulation program on a computer, select VT100.
TrackCXD
Direct Connect
132 TAC
Description
Comm Port
Number and
Default Mode
You can use the settings indicated for each of the following
controller models:
Baud Rate
Flow Control
TrackCXD
Description
Comm Port
Number and
Default Mode
You can use the settings indicated for each of the following
controller models:
Baud Rate
The default baud rate is 19.2K. All baud rates are valid. If you are
having communication problems, check the baud rate requirements
for your equipment, and then make the appropriate selection here.
Set to a lower baud rate if you require greater noise immunity.
Flow Control
TrackCXD
Description
Comm Port
Number and
Default Mode
You can use the settings indicated for each of the following controller
models:
Baud Rate
Flow Control
TrackCXD
Description
Comm Port
Number and
Default Mode
You can use the settings indicated for each of the following controller
models:
134 TAC
Baud Rate
ACX 57xx series: Use COMM1. (The ACX57xx controller has only
one configurable RS-485 comm port). Select XDriver for Default
Mode.
The appropriate baud rate may vary depending on the XDriver
software. Refer to the instructions provided with the software.
Flow Control
TrackCXD
Data Length
Parity
Stop Bits
Note: Once you select Infinet and save for the default mode, you cannot change it.
9000 and 9200
9400
9924
Use the Infinet port. The default mode for this port is Infinet.
NetController
(99xx)
NetController II
(9680 and
9681)
ACX 57xx
series
Use COMM1. the ACX 57xx controller has only one configurable RS485 comm port. The default mode for this port is AutoSet.
9702
bCX1 9640
bCX1 40x0
Use COMM2. You can select MS/TP or Wireless for Default Mode.
Baud Rate
The default baud rate is 19.2K baud. Valid baud rates for Infinet also
include 1200, 2400, 4800, and 9600. (MSTP also permits 9600 baud.
Wireless also permits 19.2K.) Set the baud to a lower rate if you
require greater noise immunity. If you are using an Infilink on the
Infinet, be sure that their baud rates match.
Flow Control
TrackCXD
All the BACnet MS/TP network-connected b3 controllers and other BACnet thirdparty devices to the b4 or bCX1 40x0 controller.
All the controllers connected through a wireless subnetwork to the wireless adapter
affixed to the bCX1 9640 Infinet controller.
136 TAC
When the learn process completes, you will be able to see these controllers on the Field
Bus Controllers tab.
Learn and bCX1 40x0 Controllers
Before performing a routine Send to Database operation on a bCX1 40x0 series
controller, you must first perform a "learn" operation. This ensures that the bCX1 40x0
first knows about the existence of its BACnet field bus controllers (b3 and third-party
controllers). After the learn, the Send to Database fetches object information from all
controllers residing on the field bus subnetwork and saves it to the CyberStation
database.
Before performing the Send to Database operation, make sure you have also selected
the Save attached objects and controllers radio button in the Send to Database Options
dialog. This ensures that data from child objects in child controllers (attached to the
parent bCX1 40x0) are also saved.
CAUTION: If you do not do these things, the Send to Database operation may fail for
controllers residing on a bCX1 40x0 controller's field bus network.
See Chapter 3, Continuum Explorer, for more information on Send to Database
operations, and the Send to Database Options dialog.
Comm 1 and 2 of a network controller can be configured as Infinet ports. Each Infinet port
on a network controller can support up to 127 regular (building automation) Infinet
controllers and up to 31 priority (security access and display) Infinet controllers.
Comm Port
Number
The CommPort attribute displays the number of the comm ports you are
editing.
Default
Mode
Each comm port has a default mode. To change the default mode, select
a different one from the Default Mode dropdown menu. The Settings tab
displays different attributes, depending on the default mode you select.
Note: In the event of a controller reset, each comm port reverts to its
original default mode. For a complete list of default modes for each
comm port on each controller, please see the section, Default
Modes, later in this chapter.
138 TAC
Printer
Command
Infinet (Comm 1
and 2 Only)
MSTP
Wireless
Lbus
AutoSet
TankNet
XDriver
(Support for an
XDriver must be
purchased)
NotConfigured
Status
Error
Error Time
Displays the time and date that the last error occurred on the
device.
Error Count
140 TAC
Baud Rate
The Baud rate is the speed, measured in bits per second, at which the
controller sends information to the device that you are connecting to the
comm port. Select the baud rate that matches that required by the
equipment connected to this port.
Track CXD
Flow
Control
The flow control type determines how the comm port handles the flow of
data between the controller and its attached device (usually a printer,
modem or terminal). This process is also known as handshaking.
Select one of the following options from the dropdown menu:
Current
Mode
NoFlowControl
CtsRts
XonXoff
XonXoffCtsRts
This is a read-only attribute that shows you the default mode selected in
the General tab.
User Port
COMM1
COMM2
COMM3
COMM4
COMM16
CustomPort
Default
Mode: Not
Configured
Default
Mode: Not
Configured
Default
Mode:
AutoSet
Default
Mode: Not
Configured
Other
Modes:
Window
AutoSet
Infinet
TankNet
XDriver
Command
on 9300
Other
Modes:
Window
AutoSet
Infinet
TankNet
XDriver
Command
on 9300
Other
Modes:
Window
TankNet
XDriver
Command
on 9300
Other
Modes:
Window
AutoSet
Lbus
TankNet
XDriver
Command
on 9300
9400
Infinet
Port
User Port
COMM1
COMM2
COMM3
COMM4
COMM16
Default
Mode: Not
Configured
Default
Mode: Not
Configured
Default
Mode:
AutoSet
Default
Mode: Not
Configured
Default
Mode: LON
Other
Modes:
Window
Command
AutoSet
Infinet
TankNet
XDriver
Other
Modes:
Window
Command
AutoSet
Infinet
TankNet
XDriver
Other
Modes:
Window
Command
Printer
TankNet
XDriver
Command
Other
Modes:
Window
Command
AutoSet
TankNet
XDriver
Other
Modes:
XDriver
CustomPort
9924
Infinet
Port
User Port
COMM1
COMM2
COMM3
COMM4
COMM16
CustomPort
Default
Mode:
Infinet
Default
Mode: Not
Configured
Default
Mode:
AutoSet
Default Mode :
Other
Modes:
Window
Command
AutoSet
XDriver
Other
Modes:
Window
Command
AutoSet
XDriver
Other
Mode:
XDriver
TankNet
Other Mode :
XDriver
9702
Infinet
Port
User Port
COMM1
COMM2
COMM3
COMM4
COMM16
Default and
only Mode:
Infinet
Default
Mode:
AutoSet
CustomPort
Other
Modes:
Printer
NetController
Infinet
Port
User Port
COMM1
COMM2
COMM3
COMM4
COMM16
CustomPort
Default
Mode: Not
Configured
Other
Modes:
Window
AutoSet
Infinet
TankNet
XDriver
Command
L-BUS
Default
Mode: Not
Configured
Other
Modes:
TankNet
XDriver
Default
Mode:
AutoSet
Other
Modes:
Window
Printer
XDriver
Command
Default
Mode: Not
Configured
Other
Modes:
XDriver
Default
Mode: LON
Other
Modes:
XDriver
144 TAC
User Port
COMM1
COMM2
COMM3
COMM4
COMM16
CustomPort
Default
Mode:
AutoSet
Default
Mode:
AutoSet
Default
Mode:
AutoSet
Default
Mode:
AutoSet
Other
Modes:
Printer
Infinet
Lbus
LON
PPP
Wireless
XDriver
Other
Modes:
Printer
Infinet
Wireless
XDriver
Other
Modes:
Printer
PPP
XDriver
Other
Modes:
Printer I
Lbus
XDriver
Default
Mode:
LON
Other
Modes:
XDriver
UserPort
COMM1
COMM2
COMM3
COMM4
COMM16
CustomPort
Default
Mode:
AutoSet
Other
Modes:
Infinet
Wireless
XDriver
Note: Although Wireless is a selection for COMM1, ACX 57xx series controllers will
support Wireless as a future enhancement.
bCX1 96xx
Infinet
Port
User Port
COMM1
COMM2
COMM3
COMM4
COMM16
CustomPort
Default
Mode:
AutoSet
Default
Mode:
AutoSet
Other
Modes:
Printer
Other
Modes:
Infinet
PPP
Wireless
Xdriver
Printer
Xdriver
bCX1 40x0
Infinet
Port
User Port
COMM1
COMM2
COMM3
COMM4
COMM16
CustomPort
Default
Mode:
AutoSet
Default
Mode:
Autoset
Other
Modes:
Other
Modes:
MS/TP
Printer
Wireless
Printer
146 TAC
Creating IOU
Module
Objects
After you finish configuring a controller with the Comm port editor, you can define your
input and output. Start by defining the IOU modules with the IOUModule editor.
IOU modules are electrical units that contain a number of input and/or output circuits that
are electrically and sometimes physically attached to controllers. They provide controllers
with the ability to interface with the outside world. There are four types of IOU Modules:
Input modules
Output modules
Special-purpose modules
Description
IOU Number
Enter the IOU number here. You must manually assign a unique
number (between 1 and 32) for each IOU module on a network
controller.
Physically label the IOU modules with the numbers you assign. This
number is not the same as the 12-digit module ID # assigned to the
individual module at the factory.
You will use this number when you configure points on this controller.
Model
Number
148 TAC
The model number identifies the type of the IOUModule and is read
from the module.
Comm Status
Module ID
and Program
ID
Learn
Use the Learn button to commission the IOU module on the network.
See Commissioning an IOU Module later in this chapter.
Wink
Use the Wink button after commissioning the IOU module to confirm
that your system recognizes the IOU module.
Click the Wink button. The Status light on the IOU module should flash.
This indicates the IOU module was successfully commissioned.
Update IOU
Click the Update IOU button to browse for a *.iou file (a TAC-provided
Flash File for individual modules) when updating IOU modules with new
firmware.
Version number
150 TAC
Configuring
Alarms
10
151
152 TAC
the editors. You then open a point editor and attach AlarmEnrollment objects to the
point and set other alarm parameters.
To create an EventNotification object, youll make decisions based on the following
questions:
Which colors and fonts will the notification have?
Youll answer this question by specifying font styles and background colors for each
possible event state.
Which notification actions will occur?
Youll answer this question by making selections from a list of possible notification
actions.
Who will be notified of the event?
Youll answer this question by creating a list of workstations where notification of the
event will be delivered.
How will users remove the event from the active alarm view?
Youll answer this question by selecting a condition that must exist before Continuum
will remove the event from the Active Alarm View.
Will Event Notification Include the Playing of Audio Files?
Youll answer this question by deciding whether or not to associate an audio file with
each possible event state.
Who will have permission to make changes to the configuration of this
EventNotification?
Please refer to Chapter 4, Security.
153
!!
CAUTION
When working with EventNotification objects, please be aware that
when you edit existing attributes you are changing the way every
associated basic alarm and AlarmEnrollment object is delivered.
154 TAC
Description
Ack Required
Priority
Priority numbers help sort events in the Active Alarm View. One of
the benefits of sorting by priority number is that it is one way to
display critical events at the top of the active list. In the Active Alarm
View, you determine whether high or low priority numbers display at
the top by selecting either ascending or descending as your sort
order. The range of priority numbers is 0 to 254. Each event state
receives its own priority number. To enter a priority number for an
event state, type it in its text field on the General tab.
155
Colors and
Fonts
For every event state you can specify colors and font styles. The
colors and fonts you select will display in the status bar and in the
Active Event View or Active Alarm View when an event associated
with this EventNotification is delivered.
To select colors and fonts, place your cursor in the Alarm Colors,
RTN Colors or Fault Colors area of the General tab.
Right click to display a pop-up menu.
To select a new font style and size, select Font.
The Font dialog appears. Select a font and font style from the
scrollable lists. As you make your selections, youll see an example of
the font and all the settings youve chosen in the Sample text field.
For more help, click the
dialog.
The repeat interval specifies how many minutes the workstation will
wait until re-issuing the event. When an event is re-issued, its repeat
actions are carried out.
Re-issuing continues until the event is either silenced or
acknowledged. To enter a repeat interval, type the number of minutes
into the Repeat field on the General tab.
156 TAC
Ack Rules
Understanding Alarms
Every reported event has an attribute named ToState. The value of this attribute is
determined by the status of the alarm that triggered the event. At any given time, an
event has one of three possible statuses: Alarm, Return to Normal, and Fault. Listed
below youll see an explanation of each state and how each one triggers an event.
Alarm
Return to
Normal
157
Fault
When a device that is local to the object detects a fault, the object is said
to be in a Fault state. The ability to detect faults and the messages
associated with faults vary depending on the device manufacturer. If the
AlarmEnrollment object or the basic alarm associated with the object
has the Fault report option selected, the controller sends this out as an
event. This event displays in the Active Alarm with a ToState value of
Fault. How and to who the event is delivered is determined by the
associated EventNotification object.
Print Alarm
Print Return to
Normal
158 TAC
Print Fault
Print
Acknowledgment
Run Program
Remove from
Alarm Line on
Acknowledged
Always removes the event from the status line alarm of the
Active Alarm View, when acknowledged.
Beep on Alarm
Beep on Return to
Normal
Beep on Fault
Play Audio on
Alarm
Play Audio on
Return to Normal
Play Audio on
Fault
Plays the fault audio file selected from the Feedback tab.
Display Panel
Display Alarm
View
Display Video
Blink on Alarm
Note: The Active Alarm Views View menu has an entry called
Always on top. When this option is selected, the alarm
view will always be the top most window.
159
Email on Alarm
Email on Return to
Normal
Email on Fault
Email on
Acknowledgement
Page on Alarm
Page on Return to
Normal
Page on Fault
Page on
Acknowledgement
The Delivery tab is where you create a recipient list. Every workstation in the list receives
and views events associated with this EventNotification object in the status line of the
Alarm Bar and their Alarm View.
160 TAC
Via the Recipients Configuration dialog described on the next page, for each
workstation that you add to the recipient list, you specify the following:
The valid time periods during which the workstation will receive notification.
Whether the workstation is designated as one that downloads and forwards alarm
notification messages to other BACnet recipient workstations. (At least one
workstation recipient in the list must be designated this way. See the description of
the Download To BACnet Device checkbox on the next page.)
To delete a recipient workstation from the list, select it and click Remove Recipient.
To add a recipient, click the Add Recipient button. This displays the Recipients
Configuration dialog, shown and described on the next page.
Note: The Send to All Workstations checkbox is always unselectable and appears in
gray. See the description of the Recipients Configuration dialog, next.
Recipient
Click the
button next to the Recipient field. This displays
Continuums Browse dialog for devices. Use this dialog to find the
workstation you want. Click Select to insert the correct path and
workstation name into the Recipient field.
161
BACnet
Address
Download
To BACnet
Device
Check this checkbox to download and forward alarms from this recipient
workstation to other BACnet recipient workstations. This option
conserves memory in BACnet devices in the system. At least one
workstation in the recipient list must be designated as a downloading and
forwarding workstation. When this is checked for this recipient, the
Download column on the Delivery tab displays the value, True.
Valid Days
Select the days on which this workstation will receive notification. Simply
click the checkboxes next to the days you want.
From Time
To Time
Enter the From and To times this workstation can receive event
notification. Select the hour, minute, second, or AM/PM setting you wish
to change. Type over the existing value, or click the up and down arrows
to change the value.
Noncontiguous times are supported such as:
From = 7pm
To = 6am
This is equivalent to
7pm 11:59pm
12am 6am
162 TAC
Primary,
Backup,
Repeat
Transitions
In this section, select the event transition states for an event notification
that is sent to this recipient workstation. Check the checkboxes for
ToOffNormal, ToFault, and ToNormal.
These selections specify which transitions control the delivery of an event
notification to this recipient workstation. For example, you may not want
to notify a security guard about a device fault.
To display the Recipient Configuration dialog, double-click a recipient you would like to
edit, or click the Add Recipient button to work on a new recipient.
To assign a task to a workstation, click in either the Primary or Backup column for that
task. If you would like the workstation to perform the task only if the event has been
repeated, click in the Repeat column as well. The repeat interval is determined by what
you set in minutes on the Repeat field on the General tab. (See EventNotification
General Tab, earlier in this chapter.)
Each column contains the following actions:
Print
163
Forward
Log
Paging
The CyberStation workstations that have been designated primary and backup email
and/or page handlers must have a MAPI-compliant email client such as MS
Exchange or Outlook.
The email client application can communicate with an existing email server
application, such as MS Exchange Server.
Each EventNotification object associated with the alarms that you wish to email or
page must have its own email distribution list in the personal address book or
Contacts list of the client email application using a specified naming convention as
outlined in Step 4 below.
This email distribution list must be stored in the first address book shown in the list of
available address books in the email client application. For example, if you create an
EventNotification distribution list in the Personal Address Book in Microsoft Outlook,
then the Personal Address Book must be the first one showing in the address list
dropdown menu when you open the Address Book.
4. In the Name field enter a name for the distribution list using the following format:
For Email: ACC.eventnotification_name
For Paging: ACC.page.eventnotification_name
For example, if your EventNotification object is named Severe, the personal
distribution list for email deliveries should be named: ACC.Severe. Likewise, your
personal distribution list for page deliveries should be named: ACC.page.Severe.
Note: Use the EventNotification object Name not the Alias, for example, Critical
Temp, not CriticalTemp.
5. Add members (the email addresses or pager and service numbers of those to whom
the notification of the alarm will be sent) to your personal distribution lists.
6. Set address book options so that the address book where your personal distribution
lists are stored is the first one to be searched when sending emails or pages. For
example, in Microsoft Exchange, select Options from the Tools menu. Click the
Addressing tab. When sending mail, check names using these address lists in the
following order area, use the Add button, then the up or down arrow buttons to add
the correct address book to this field and position it at the top of the list.
165
Acknowledged
Returned to Normal
Acknowledged OR
Returned to Normal
Acknowledged AND
Returned to Normal
Acknowledged AFTER
Returned to Normal
Note: You can use the deactivation criteria along with the reporting options in the alarm
enrollment editor to achieve the desired results.
You use audio files when you want a recorded message or sound to play on workstations
when an event is delivered. You can associate a different audio file to each event state.
This is useful for alerting and informing operators as to the specific and appropriate
response for different event states. Here are some basic points to keep in mind when
associating audio files:
For every audio file you add to this tab, make sure you select the corresponding
action on the Actions tab. In other words, if you associate an audio file with the
Alarm state, select Play Audio on Alarm on the Actions tab.
You may also select audio files for AlarmEnrollment objects. Every AlarmEnrollment
object has a designated EventNotification object that defines how the alarm will be
166 TAC
To associate an audio file to an Alarm, Return to Normal or Fault event state, click
button next to the appropriate text field. This will display the dialog shown
the
below:
Audio files have a .wav file extension. You may have to navigate to the system folder
that contains your audio files. Click the
button, then click in the Look in field for
help on moving to different folders. Once you have found the file you want, select it
and click the Open button. This will close the dialog and insert the correct path and
audio file name into the Feedback tab.
167
About AlarmEnrollment
AlarmEnrollment objects define the set of conditions used to determine when a point is in
an alarm state. They specify the text messages that appear in the Active Alarm View.
When you create objects in Continuum, you have the option to attach up to eight alarms
to it. For example, you could set up an InfinityInput object for a temperature sensor so
that an alarm goes off when the temperature gets too high.
Each AlarmEnrollment object is associated with an EventNotification object.
To create an AlarmEnrollment object, youll make decisions based on the following
questions:
Which attributes will trigger this alarm?
Youll answer this question by selecting an attribute on the General tab. Most of the
time alarms are set up to monitor the value attribute.
Who will be notified of this alarm?
Youll answer this question by selecting an EventNotification object on the General
tab. EventNotification objects determine, among other things, which workstations
receive notification, and which methods are used for notification.
What Algorithm will this alarm use?
Youll answer this question by selecting an algorithm and providing its parameters on
the Algorithms tab. An algorithm is a set of rules by which an alarm is evaluated.
What will operators see and hear when this alarm goes off?
Youll answer this question by writing text messages and selecting audio files for each
event state. The text messages you write will appear in the Active Alarm View, alarm log,
emails, pages, and printer output.
After you have configured an alarm, you can review the details of the configuration with
the following:
Object editors
Note: Continuum provides coverage for BACnet compliant devices. Configuring alarms
for these devices requires a new object class called EventEnrollment. Refer to
Chapter 14 for more information on the EventEnrollment editor.
168 TAC
Description
Event
Notification
Browse for an EventNotification object. This will insert the correct path
and object name into the Event Notification text field.
169
Alarmed
Attribute
Only used for workstation alarms. Select an attribute from the dropdown
menu. This is a list of all of the possible attributes from all object classes.
Based on the algorithm parameters you set on the Algorithms tab, the
value of the attribute you select from this list triggers the alarm.
For security applications, the Alarmed Attribute will always be Value.
Infinity always uses Value for a hi/lo limit or expression.
Send
Alarm Type
The selection you make here determines what fields display on the
Algorithms tab of this editor.
The choices of Infinity alarm types are:
Expression
Infinity Low Limit
Infinity High Limit
*Change of State
*Command Failure
*Floating Limit
*Out of Range
*These alarms are only applicable to BACnet objects. Refer to The
EventEnrollment Algorithms Tab in Chapter 14.
Notification
Type
170 TAC
Time Delay
Time Delay appears on the Algorithms tab for each of the choices of
Alarm Type.
In the Time Delay field, enter the number of seconds you want to
postpone evaluating the alarm.
For example, you may decide that the point value can exceed or fall
below its alarm boundaries for 30 seconds before the alarm goes off.
Note: The alarm must be active at the end of the time delay.
Using time delays cuts down on the number of active alarms and reduces
both system traffic and operator responsibility by filtering out some
nuisance alarms
Algorithm
Fields
The other fields that appear on the Algorithms tab differ according to the
Alarm Type selected on the General tab. The above figure reflects an
Expression Alarm Type selection.
171
InfinityNumeric
InfinityInput
InfinityOutput
InfinityDateTime
InfinitySystemVariable
When you select Infinity High Limit from the Alarm Type of the General tab, the
following fields appear on the Algorithms tab.
This algorithm is used with Infinity points to report an alarm if the alarmed attribute value
changes to a value that is equal to or above a high limit that you specify. Youll also
specify a value that the value must change to (or below) before a Return to Normal state
can be reported.
To Use an Infinity High Limit Algorithm:
1. Enter a high limit value in the text field marked High Limit.
2. Enter a return to normal value in the text field marked Return to Normal.
Algorithm Parameters for an Infinity Low Limit Alarm
Infinity Low Limit Alarms can be attached to the following Infinity objects:
InfinityNumeric
InfinityInput
InfinityOutput
InfinityDateTime
InfinitySystemVariable
When you select Infinity Low Limit from the Alarm Type of the General tab, the
following fields appear on the Algorithms tab:
This algorithm is used with Infinity points to report an alarm if the alarmed attribute value
changes to a value that is equal to or below a low limit that you specify. Youll also
specify a value that the value must change to (or above) before a Return to Normal state
can be reported.
172 TAC
The Alarm Points dialog is accessed from the Alarms tab or Advanced Alarms tab of
the following object editors: AnalogInput, AnalogOutput, AnalogValue, BinaryInput,
BinaryOutput, BinaryValue, Door, InfinityInput, InfinityNumeric, InfinitySystemVariable,
MultistateInput, MultistateOutput, MultistateValue, or Network. (See: Attaching Alarms to
a Point, later in this chapter.)
173
Using alarm points saves you the trouble of having to change the expression every time
you attach an expression alarm to a different point.
You must configure these alarm points when you attach an alarm to an object. That is,
you must specify the actual point names for every alarm point the expression references.
The referenced point, for example, can be an input-point temperature reading.
Text
Messages
You can write a different message for each possible event state, Alarm,
Return to Normal and Fault.
Continuum supports wild card characters %n and %d, which inserts
the corresponding name and description of the alarmed object. For
example, %n went into alarm yields: mytempsensor went into alarm.
A good text messages alerts operators to the nature and severity of the
alarm. For example, Temperature is too high or Door Forced Open.
For more on Text Messages, see the next section, Writing Alarm
Messages.
Audio Files
Use audio files when you want a recorded message or sound to play on
workstations when an event is delivered.
You can associate a different file with each event state. This is useful for
alerting and informing operators as to the specific and appropriate
response for different event states.
174 TAC
Note: For every audio file you add to this tab, select the corresponding
action on the Actions tab of the associated EventNotification object.
In other words, if you associate an audio file with Alarm, make sure
the associated EventNotification object has Play Audio on Alarm
selected on its Actions tab.
Note: Some EventNotification objects have audio files associated with
event states as well. When an AlarmEnrollment object with audio
has an associated EventNotification object with audio files, the
AlarmEnrollment audio files take precedence.
175
176 TAC
Click the browse button in the Graphic field to search for the desired graphic
panel that you want to appear when the alarm goes off. Select the page
number of the graphic panel you want first to appear.
Program
Click the browse button in the Program field to search for the desired report
program or any other Plain English program to this object.
Note: You cannot select an HTML report directly. To associate an HTML
report with an object, you must select a program that uses the
SHOWREPORT keyword to run an HTML report. An example of the
SHOWREPORT keyword is:
SHOWREPORT C:\PROGRAM
FILES\CONTINUUM\REPORTS\SYSTEMCHK.HTM
Alarm
Points
Alarm points allow any expression alarm that you attach on this tab to
reference up to four "alarm points," named Point 1, Point 2, Point 3, and Point
4. Using alarm points saves you the trouble of having to change the
expression (via the Algorithms tab of the AlarmEnrollment editor for that
alarm object) every time you attach an expression alarm to a different point:
177
Using the Alarm Points dialog, you must specify the actual point names for
every alarm point the attached expression alarm references. The referenced
point, for example, can be an input-point temperature reading. (See also:
Using an Expression Algorithm.)
Follow this procedure:
1. In the General tab of the AlarmEnrollment editor, for the alarm you want
to attach, make sure that you select Expression for the Alarm Type.
Any attached alarm to which you want to apply alarm points must be an
expression alarm.
2. In the Algorithms tab of the AlarmEnrollment editor, enter the expression
in the Expression field. When you want to use alarm points, the alarm
point name (point1, point2, point3, or point4) must be part of the
expression. For example:
...value > point1 + 2...
5. Save the AlarmEnrolllment object after making these expression-alarm
changes.
6. On this tab of this editor, click the Alarm Points button to search for and
select the name of an object for every alarm point referenced by attached
expression alarm. The Alarm Points dialog appears, showing fields
178 TAC
where you may specify up to four point names, Point 1 through Point 4.
7. Click the browse button in one of the point's fields.
8. Once you have found the point you want, click the Select button. That
point specified in the field will be associated with that alarm point and
applied to the attached expression alarm, which references the point.
9. Click OK.
Video
Points
Click the Video Points button to bring up the Video Points dialog:
Use the Video Points dialog to assign cameras to doors and points and
configure parameters that control video images, via VideoLayout objects,
during alarm conditions.
When the alarm goes off, a video layout is launched (if a VideoLayout object
has been configured to work with video points) and displays the "video point"
camera images in the its video image frames. In the Video Points dialog,
you may also configure a camera to record a video clip, for specified number
of seconds, when the alarm goes off.
For complete information about video layouts and video configuration, please
see Chapter 25, Configuring and Viewing Video.
Use the Video Points dialog to assign between one and four "video point"
cameras point 1 through point 4.
Use the Video Servers dropdown menu to select a video server on which the
camera is located. (A VideoServer object must be already configured and the
server online. See Using the Video Server Editor in Chapter 25.)
Use the Cameras dropdown menu to select a camera for the numbered video
point. (The camera must be configured and enabled on the selected video
server.)
Check the Rec. checkbox to enable the recording of a video clip from the
selected camera. Recording begins at the moment the alarm goes off.
In the Duration field, use the up and down arrows to select the number of
seconds to record a video clip, once you check the Rec. checkbox.
In the PTZ field, select the number of the preset camera view. (These PTZ
179
(pan, tilt, zoom) capabilities are configured on the Integral video servers,
using Integral software. See Overview of Integration and Configuration in
Chapter 25.)
If you are associating a VideoLayout with the video points for this object,
then you must first reference these video points from the General tab of the
VideoLayout editor. (See Chapter 25.)
Respond to alarms
View information about alarms to which other operators have already responded
The Active Alarm view is never displayed in both modes it is always in one or the other
mode selected by the user.
ObjectUsing_the_Object_Menu>(w95sec)
View
Acknowledge
Mute
Help
Each of these menus is discussed below.
The Object Menu
The Object menu options are not available in this release:
The View Menu
The View menu consists of the following options. A check mark to the left of a menu
option indicates that option is selected:
Menu Option
Toolbar
Description
Displays the tool bar when selected. Hides the tool bar
when not selected.
Status Bar
Sort
Auto Sort
181
Menu Option
Freeze
Description
Stops alarm list scrolling when selected. Allows alarm list
scrolling when not selected.
Add/Remove Columns
Always on Top
Hide
Hides the active alarm view. When the active alarm view
is hidden, the alarm view icon blinks in the alarm tray.
Places the Active Alarm View into status line mode. The
alarm that appears in the alarm status line is the first
alarm (at the top of the list) that either has not been
acknowledged or has been acknowledged but does not
have the Remove From Status Line When Acknowledged
box checked in the event notification object assigned to
the alarm. In status line mode, the active alarm view list
never appears. Likewise, in alarm view mode, the alarm
status line never appears.
Alarm Enrollment
Event Notification
Object
Program Output
Graphic
Video
182 TAC
Menu Option
Alarm Function
Description
Executes a user-defined Plain English function for the selected
alarm, to make something special happen, regarding the alarm.
The alarm's attributes are passed as arguments into the
function, and the function runs.
Menu Option
Description
Ack Selected
Ack All
183
To . . .
To . . .
Column Contents
Date and time the alarm occurred.
Name
Value
To State
State
Priority
Type
Message
Event Notification
Alarm Enrollment
Operator Text
User Actions
Acknowledged By
Date/Time of
Acknowledgement
Silenced By
185
Column Heading
Date/Time of
Silence
Column Contents
Date and time the alarm was silenced. This is filled in
automatically when the alarm is silenced.
Show on Active Alarm is checked by default, so you must deselect it when you do not
want the active alarm view to display on an active alarm.
Selecting this option overrides the event notification for the active alarm, whenever the
Event Notification editors Display Alarm View option for the alarm is not selected.
Note: When neither the Show on Active Alarm option nor the EventNotification editors
Display Alarm View option is selected for the active alarm, the active alarm view is not
displayed. Instead, the alarm icon in the tool tray flashes.
2. From the popup menu, select Display and Alarm Status Line.
3. The Active Alarm Status Line appears in the Alarm Bar at the bottom of the
Continuum Explorer window.
When the active alarm view is in status line mode, the Active Alarm View window
disappears.
In Status Line mode, the alarm that appears in the status field:
Is the first alarm that would appear at the top of the Active Alarm View list.
Has been acknowledged but does not have the Remove From Alarm Line on
Acknowledged box checked in the Actions tab of the EventNotification editor.
186 TAC
You can also select the Status Line mode from the View menu by clicking on Alarm
Status Line.
In Status Line mode, you can right click the alarm icon
access its context popup menu.
Menu Option
Hide
Description
Hides the status line.
Alarm Viewer
Switches from status line mode to alarm view mode, displaying the
complete active alarm view list.
Always on top
Upon opening the active alarm view, places the active alarm view
window on top of all other windows on your desktop. When you
make this selection, you are prevented from bringing any other
window or process to the front of the active alarm view window.
New alarms appear in the Active Alarm View as they occur. When
this happens the alarm list scrolls down to make room for new
alarms. If you need to concentrate on a particular alarm, you can
momentarily stop the scrolling. This allows you to silence, add
information or acknowledge that alarm without having to constantly
scroll up to find it. When you have finished working with the alarm,
you can restart the scrolling. There are two methods for stopping
and starting the scrolling alarm list:
icon in the Active Alarm View tool bar. The icon,
Click the
which resembles a traffic light, changes from a green to a red light,
shown below:
Click this icon to resume scrolling, or select Freeze from the
View menu. Deselect it to resume scrolling.
187
Silence Alarms
Display
Graphic Panels
Associated
with Alarmed
Objects
or
Click Panel in the menu bar. Not all alarms have associated
panels.
Running Report
Programs
188 TAC
Acknowledging
Alarms
Who Acknowledged
the Alarm?
You can also view the details of any alarm in the Details View dialog.
189
Alarmed object
EventNotification object
AlarmEnrollment object
Describes the result of the action you took in response to the alarm
190 TAC
The order in which you type the actions determines the order in which the actions will
appear in the dropdown menu.
Save or copy Alarm User Actions.txt to the following directory: Program Files\Continuum\
Tip: A complete list of user actions should include an entry such as See Operator Text
to provide for unanticipated user actions. By providing this action, the responding
operator need not leave the User Action column blank when special circumstances
arise. Additionally, directing other operators to the operator text avoids any
confusion as to the action that was taken.
191
Note: If after displaying the list of user actions, you dont see an action that accurately
describes your response to the alarm, type the action you took in the Operator Text
column or in the alarm Details View.
Click the ACK button to acknowledge the alarm and save the entries for Operator Text
and User Actions.
Click the Cancel button to take no action here for the alarm.
There are three ways to turn off the sound of currently playing audio alarms:
Click the mute icon in the Active Alarm View toolbar
Click the mute icon in the Alarm Bar
Click Mute! in the Active Alarm View menu.
Printers
Emails
Pagers
Name
NormalEmail
NormalPager
NormalPrinter
AcknowledgeEmail
AcknowledgePager
AcknowledgePrinter
Default value
normalemail.txt
normalpager.txt
normalprinter.txt
acknowledgeemail.txt
acknowledgepager.txt
acknowledgeprinter.txt
Purpose
Alarm/RTN/Fault email message
Alarm/RTN/Fault pager message
Alarm/RTN/Fault printer message
Acknowledge email message
Acknowledge pager message
Acknowledge printer
Modifications to all these files will not take effect until Continuum is shut down and
restarted. The following table provides the predefined XML tags and their descriptions.
192 TAC
XML Tag
<\date>
Description
The date of the alarm.
Example: Tuesday, June 19, 2001
<\time>
<\name>
<\value>
<\state>
The state of the alarm. The value can be alarm, return to normal,
acknowledged, or fault.
<\priority>
<\type>
<\message>
<\eventnotification>
<\alarmenrollment>
<\operatortext>
The operator text for this alarm (set by those who acknowledged
this event.)
Rename columns
Move columns
Resize columns
193
3. Select the checkbox for the column you want to add or hide in the alarm list.
4. Click OK.
Renaming an Alarm View List Column
To rename a column:
1.
194 TAC
Resizing Columns
Use the mouse to change the width of the Active Alarm View columns. Place your mouse
on the vertical line that separates two columns:
Value
To State
Door1
Unlocked
Alarm
Door4
Locked
Alarm
Door4
Locked
Return to Normal
RoomTemp1
72
Return to Normal
RoomTemp1
85
Alarm
In our example, Name is the primary sort column, Value is the secondary sort column,
and To State is the tertiary sort column. First notice that the first three alarms are sorted
by name. Next, notice that the two Door4 alarms are sorted by To State value because
the values in the primary and secondary columns, Name and Value, are identical. Finally,
notice that the RoomTemp1 alarms are sorted by value because they have the same
name.
Tip: Sort order does not affect the order of your columns. For easier reading, we
suggest positioning your columns by their sort order. In other words, make sure
your primary column is the first column, the secondary column is the second
column, and the tertiary column is the third.
195
Communication Status
Cause of Alarm
Where is Alarm
Displayed
Return to Normal
Condition
Communication
Status
The NetController
detecting the Infinet
controller is offline.
The NetController
detecting the Infinet
controller is online.
Database
Backup Needed
197
Alarm
Condition
Cause of Alarm
Where is Alarm
Displayed
Return to Normal
Condition
Database
Backup
Disabled
The Infinet 2
database has been
backed up 10,000
times, thus
triggering the flash
circuit breaker.
You have to
manually re-enable
the backup. Also,
the alarm is logged
to the object status
dictionary attribute,
and an alarm is
displayed in the
Active Alarm View
using the
InfinetStatus
EventNotification
template object.
The message
displayed is:
Database
Backup Failed
An attempt was
made to back up
the Infinet 2
database, but was
not successful due
to an internal error
(e.g., flash device
failure).
Unable to backup
controller due to
unknown failure.
Backup re-enabled.
The Explorer
displays an overlay
icon and tooltip text
based on this
attribute.
The database has
successfully been
backed up. Also, the
alarm is displayed in
the Active Alarm
View only if the
InfinetStatus Event
Notification template
object was
configured. The
message displayed
is:
Backup failure
corrected; backup
completed.
198 TAC
Offline editing
OS update failure
199
Database Faults
A database fault occurs whenever there is a problem accessing information from the
database. This can happen for two reasons:
The connection between the Continuum workstation and the SQL database becomes
defective.
Fault Detection
When a database fault is detected, the system is set into a "warning state for five
seconds while the fault is verified. If the fault continues past that time, the system enters
a "no database mode". (It may take up to 2 minutes to verify the database fault.) When
will appear in the Explorer task bar at the bottom right-hand
this occurs an icon
corner of the screen and a fault dialog will popup. A database fault message is written to
the NT Event Log (see below) stating that the system has entered a "no database mode".
Both the icon and the dialog will remain until the system recovers from the fault.
However, clicking on the OK button will remove the dialog from the screen and send an
entry to the NT Event Log (see below) stating that the dialog was acknowledged. Also, a
database fault alarm will be displayed in the Active Alarm View window.
Emails (optional) can be sent out to notify selected users that there is a database fault.
This requires that the FaultStatus EventNotification object be configured with a recipient.
If you log off the system during the "no database mode" a message is written to the NT
Event Log indicating your action.
Message: DATABASE FAULT! Continuum workstation is unable to communicate
with the Continuum database server. The database may be offline, or the
network connection to the server may be down.
200 TAC
Configuring
Reports
11
With version 1.7 and higher, CyberStation provides a powerful, versatile, graphical suite
of features, called Reports, that allows you to gather, view, and compare data values,
locally or remotely, manually or automatically, from virtually anywhere in your Continuum
system.
Overview
This section provides an overview of Reports and the Report editor. Specifically:
Print a report.
Select a report data source and report type, including a point's current value,
extended log data, activity events, access events, alarms, and errors. (See: Source
Tab.)
Select a chart type, including plotted trend charts, bar charts, pie charts, and text
reports. (See: Source Tab.)
Filter point-object data that you want to show in the report, based on day/time, and
various object characteristics. (See: Filter Tab.)
Build and modify a list of member objects, whose values you want to display in the
report. (See: Filter Tab.)
Configure the "look and feel" of the report's output text headings, text captions, plot
and scale configuration, and so on. (See: Output Tab.)
Specify the data format you wish to display for example, Adobe PDF and web
formats. (See: Output Tab.)
Configure, add, and remove columns for text reports. (See: Configuring Columns for
Reports.)
View data via one of several data formats, such as HTML, XML, scalable vector
graphics (SVG), and PDF.
Zoom in, zoom out, and adjust the view of the chart you are viewing.
For more information, please see the help topic for the ReportViewer.
202 TAC
Preconfigured reports
Ad hoc reports
Preconfigured reports If you need to view report data for a specific set of values
regularly, and the data sources, report type, output setup generally remain the same,
then configure a Report object that can be accessed, run in the ReportViewer, and/or
distributed at any time, manually or automatically. In Continuum Explorer, Report object
files are placed in a Report object class folder, as other CyberStation objects are. With
preconfigured reports, you may modify the configuration at any time.
To create/modify a preconfigured report:
1. In Continuum Explorer, right click a folder or device, and select New, and then select
Report, from the popup menu.
2. Enter a name for the Report object, and click the Create button. The Report editor
appears.
3. Configure the Report object, using the Source, Filter, and Output tabs, and click
Apply or OK.
Note: To modify an existing Report object, right click the Report object in Explorer,
and select Edit from the popup menu. Also, while in the ReportViewer, you
may edit the parent object of the displayed report, thereby bringing up the
Report editor.
4. To preview/run the report, click the View Report button. The report appears in the
ReportViewer as you configured it.
Ad Hoc Reports If you need to view reports on the fly, without creating a Report
object, then you may quickly locate the point (for example, an Infinity input) and run a
report on it. Use ad hoc reports when you know you do not need to run a report regularly,
when a Report object is not already created for the data you need to see.
To create/modify an ad hoc report:
1. In Continuum Explorer, find the location of the point or points whose values you want
to display in a report.
2. Right click the object.
3. From the popup menu, select View, then Report. The Report editor appears.
4. Configure the ad hoc report for that object, using the Source, Filter, and Output
tabs.
5. In the Filter tab, be sure to add additional objects to the object member list, if
necessary.
6. Click Apply, then click View Report.
The report appears in the ReportViewer as you configured it.
Andover Continuum CyberStation Configurators Guide 203
Note: As an option, you may save the ad hoc report to a file. (See: Output Tab.)
Designating one or more workstations to upload extended log data from the controller
to the CyberStation database, via settings 21 and 22 of the Preferences tab of
Device editor.
For complete information, please see the subsection, Extended Logs, in Chapter 13, the
description of the Device editors Preferences tab in Chapter 14 and the Andover
CyberStation Installation Guide, 30-3001-720.
Source Tab
In the Source tab, shown below, you select the source and type of data on which you
want to report for example, extended log data, alarm event data, error event data, and
so on. You also select the type of chart on which to plot your data for example, pie
chart, bar chart, trend chart, and so on. The settings on this tab work together with the
settings on the other tabs of the Report editor (Filter and Output) to define the content of
the report, before you run it in the ReportViewer.
204 TAC
Meaning
Description
Data Source
Editor Attribute
Meaning
most "up-to-the-minute" extended log entries, not the entries
based on the last specified update interval. Typically, this is
used for remote (RAS) controllers, which require dial-up
access for database uploads. See the extended log settings
in the General Preferences dialog.
See also: What Are Extended Logs? and descriptions of the
Logs tab in the InfinityDateTime, InfinityInput, InfinityOutput,
InfinityNumeric, and InfinityString editors.
206 TAC
Editor Attribute
Meaning
Note: When you select this source, the Configure Columns button
is unselectable. The columns of the ListView object are
duplicated in the text report. To configure the ListView
report columns, do so from the ListView editor.
Note: On the Filter tab, only one ListView object is selected.
Note: The selections in the other three fields, Report Type, Chart
Type, and Chart Subtype, change, depending on which
Data Source you choose. Please see the section, Matching
Data Sources, Report Types, Chart Types, and Chart
Subtypes, later in this chapter.
Report Type
This narrows down the type of data on which you want to report,
based on the Data Source. Select a report type from the
dropdown menu.
There are many report types available, for many different event
scenario. This makes Reports a very powerful and useful tool.
If you choose ExtendedLog or Refreshed-Extended-Log, then
three report types are available:
Editor Attribute
Meaning
Chart Type
Chart Subtype
Select the subtype compatible with your Chart Type. The Text
chart has two subtypes available. All the others have one. Please
see the section, Matching Data Sources, Report Types, Chart
Types, and Chart Subtypes, later in this chapter.
Note: When you select the Chart Type, the box on the right-hand side of the Source
tab displays a graphic example of what this type of chart will look like. For
example, if you select a pie chart, a pie graphic appears. If you choose a
Clustered Bar chart, a clustered bar graphic appears.
Configure Columns
View Report
Click this button to run your report, based on all the criteria you
have configured in the entire Report editor. When you run a
report, it is displayed in the ReportViewer. (See The
ReportViewer, later in this chapter.)
Apply
To differentiate the member-object bar from its "satellite" object bars, the
ReportViewer displays each bar in the cluster in a different color. The
ReportViewer also displays a color key at the bottom of the report, listing the
color, name, and type of object in the cluster.
Data Source
REPORT TYPE
Chart
Type
Chart
Subtype
CurrentValue
Snapshot-of-object-value
Bar
AccBarChart
Pie
AccPieChart
Text
AccTextHtmlA
ccTextXML
Trend
AccTrend
Text
AccTextHtmlA
ccTextXML
Trend
AccTrend
Text
AccTextHtml
AccTextXML
Minmax
AccMinMax
Text
AccTextHtmlA
ccTextXML
Bar
AccBarChart
Pie
AccPieChart
Text
AccTextHtmlA
ccTextXML
Snapshot-of-Trend-Log-buffer-content
ExtendedLog
Object-value
Min-max-of-object-value
Average-of-object-value
RefreshedExtended-Log
Same as ExtendedLog
Data Source
REPORT TYPE
Chart
Type
Chart
Subtype
AccessEvent
Most-accessed-doors
Bar
AccBarChart
Most-accessed-areas
Pie
AccPieChart
Most-accessed-controllers
Text
AccTextHtml
AccTextXML
Clustered
Bar
AccClusteredB
ar
Text
AccTextHtml
AccTextXML
Bar
AccBarChart
Text
AccTextHtml
AccTextXML
Most-active-persons
Access-events-per-person
Access-events-per-area
Access-events-per-door
Invalid-attempts-of-a-person
Invalid-attempts-of-a-door
Invalid-attempts-of-an-area
Valid-and-invalid-attempts-of-a-person
Lock-unlock-events-per-door
Channel-override-events-per-door
Persons-accessed-the-selected-area
Areas-accessed-by-the-selected-person
Access-equipment-fault-report
Door-use-by-person
Area-use-by-person
Controller-use-by-person
Most-active-persons-entering-selectedarea(s)
Most-active-persons-entering-selecteddoor(s)
Access-events-under-a-controller
210 TAC
Data Source
REPORT TYPE
Chart
Type
Chart
Subtype
AlarmEvent
Alarm-transitions-per-object
Bar
AccBarChart
Pie
AccPieChart
Text
AccTextHtml
AccTextXML
Alarms-for-an-event-object-with-alarmenrollment
Clustered
Bar
AccClusteredB
ar
Alarms-for-an-event-object-with-eventnotification
Text
AccTextHtml
AccTextXML
Most-active-alarmed-objects
Offline-alarms-per-controller
Offline-alarms-per-IOU-module
Offline-alarms-per-field-controller
Most-alarm(s)-acking-workstation
Most-alarm(s)-silencing-workstation
Most-alarm(s)-logging-workstation
Most-alarm(s)-acking-user
Most-alarm(s)-silencing-user
Active-alarms-under-a-controller
Active-alarms-under-a-field-controller
Active-alarms-per-object
Active-alarms-under-a-network
Most-offline-IOU
Most-offline-controller
Most-offline-field-controller
Active-unACKed-alarms-per-controller
RTNs-for-an-event-object-with-alarmenrollment
RTNs-for-an-event-object-with-eventnotification
Data Source
REPORT TYPE
Chart
Type
Chart
Subtype
ActivityEvent
Activity-events-per-object
Bar
AccBarChart
Pie
AccPieChart
Text
AccTextHtml
AccTextXML
Error-events-per-object
Bar
AccBarChart
Error-events-per-workstation
Pie
AccPieChart
Error-events-per-controller
Text
AccTextHtml
AccTextXML
Login-attempts-per-user
Failed-login-attempts-per-user
Failed-login-attempts-per-workstation
Objects-created/saved-events-per-user
Most-common-activities
Activity-events-per-activity-type
Activity-events-per-workstation
Activity-events-per-controller
Activity-events-per-controller-withchildren
Activity-events-per-user
ErrorEvent
Error-events-per-controller-with-children
Error-events-per-user
Most-common-errors
212 TAC
From this dialog, you may add and remove columns for your report. You may also sort
the order of columns. The columns that are available for any given report change,
depending on which Data Source and/or Report Type you select on the Source tab.
The following table describes the attributes of the Selectable Columns dialog.
Dialog Attribute
Meaning
Columns
Unselected
Selected
Add
Remove
Up
Down
Sort Attribute
Sort By
You may sort events according to three columns. The report
displays several columns of information, according to the sort
criteria you select here. Sorting is useful to look for trend.
From the Primary, Secondary, and Tertiary dropdown menus,
select up to three columns. The columns you select establish the
sort order that the report uses.
Sort Direction
214 TAC
Time values
Text
Numbers
Binary values
Filter Tab
In the Filter tab, shown below, there are two types of data on which you may apply a filter
for your report:
Time data
Object data
The Log Filter and the Time Interval attributes allow you to filter time by selecting a time
filter or by setting up a specific "custom" time range. A log filter is an existing
CyberStation-supplied filter object, such as Today and Last Week. For more information
on these time-data attributes, please see the descriptions in the table below.
You also build an object member list by filtering object data. Using the object member list,
you specify individual objects on which to report. If you have thousands of objects, then
selecting certain subsets of objects for your report becomes an important task. You may
Andover Continuum CyberStation Configurators Guide 215
browse for and add one or more new members to the list via the Add button. Similarly,
you may highlight one or more members in the list and remove them via the Remove
button.
Using the Path field, you may also specify the path of a controller to run (view) a report
on the member-list objects within that controller in your system. For more information,
please see the attribute descriptions, below.
The settings on this tab work together with the settings on the other tabs of the Report
editor (Source and Output) to define the content of the report, before you run it in the
ReportViewer.
Editor Attribute
Meaning
Log Filter
Select this radio button when you want to specify a time range
for the report, based on a CyberStation system-supplied filter.
To do so, click the Log Filter field's browse button. The Browse
dialog appears, displaying all the filters in the Root directory or
any folder you specify. Select the filter you want, and click the
Select button. The name of this filter appears in the Log Filter
field.
Time Interval
216 TAC
Editor Attribute
Meaning
Add
Editor Attribute
Meaning
Remove
Path
Use the Path dropdown menu to search for and select, from the
tree, a specific system controller whose member-list objects on
which you want to run (view) a report.
Specifying the path of a controller here is necessary when you
have two or more controllers containing objects that have the
same names from controller to controller. For example, one
moment you may want to run a report on FanInput1 through
FanInput8 residing on one fan controller, and the next moment
run another report on the same named points on another fan
controller.
To switch views in the tree, right click the dropdown-menu down
arrow and select Network View or Folder View from the popup.
Configure Attribute
Filter
View Report
218 TAC
Click this button to run your report, based on all the criteria you
have configured in the entire Report editor. When you run a
report, it is displayed in the ReportViewer.
Editor Attribute
Meaning
Apply
Output Tab
In the Output tab, shown below, you configure the "look and feel" of the report output to
appear in the ReportViewer text headings, captions, plot and scale configuration, and
so on as well as how the report is generated and outputted. The settings on this tab work
together with the settings on the other tabs of the Report editor (Filter and Source) to
define the content of the report, before you run it in the ReportViewer.
Two fields on this tab, Output report to email address and Output report to file in path,
work with automatic reports. That is, via a special tool, a report can be set up to run
automatically at regularly scheduled times and then sent to the email addresses and/or
file specified in these fields. See descriptions of these fields, below.
Editor Attribute
Meaning
Heading
Subheading
X-caption
Y-caption
Z-caption
Enter a text caption for the Z (for clustered bar chart). You
may use wildcards in the text. (See the table of available
wildcards, below.)
Note: This field is selectable only when you run a report as a
clustered bar chart. A clustered bar chart is only available
with some Report Types belonging to the AccessEvent and
AlarmEvent Data Sources. (See the table for these types in
the Source tab.)
Footnote
220 TAC
Editor Attribute
Meaning
Heading
Selectable Text Fields: The Heading, Subheading, and Footnote fields are selectable
for all chart types. However, the X-caption, Y-caption, and Z-caption fields are not
selectable for a pie chart or text chart because they are relevant only for trend, bar,
and clustered bar charts.
Default Values in Caption Fields: The default values that appear in the X-caption, Ycaption, and Z-caption fields vary according to the Data Source, Report Type, and
Chart Type that you have selected. For example, when you have a trend, the X-caption
is Time, and the Y-caption is Value. For example, when you select an ActivityEvent
data source and a Most-common-activities report type, the bar chart X-caption is
Activity Type, and the Y-caption is Number of Activities. For example, when you select
an AlarmEvent data source and a Most-alarm(s)-acking-workstation report type, the
bar chart X-caption is Workstation, and the Y-caption is Number of ACKed Alarms.
Available Wildcards for Text Fields
Wildcard
Description
%r
%n
%t
%p
%c
Configuration data
Showing configuration data is especially important when
archiving printed reports, whereby it provides a better
description of what the report is and what it contains.
%d
%u
The units that are described for the first object in the object
member list.
Editor Attribute
Meaning
Heading
This radio button is selectable only when you run a trendchart report that is, when you select ExtendedLog as a
Data Source and Object-value as a Report Type on the
Source tab.
Click this radio button when you want to compare the trends
of multiple points with different scales on one X-and-Y plot.
Report Format
222 TAC
Editor Attribute
Meaning
Heading
Fixed Scale
Click this radio button and enter integers in the From and To
fields to designate the low and high limits of your scale,
based for the units of the point values that are plotted. For
example, the report could show a fixed temperature scale
between 60 and 80 degrees.
Use fixed scales when you do not want the system to set its
own scales automatically, based on the point data being
plotted.
Output report to
email address
Editor Attribute
Meaning
Heading
View Report
Click this button to run your report, based on all the criteria
you have configured in the entire Report editor. When you
run a report, it is displayed in the ReportViewer.
Apply
Note: CyberStation must be running when you use the ReportCmdLine application.
To set up and run a report automatically, perform this procedure:
1. If you want to email this report when it runs automatically, check the Output report
to email address checkbox on the Output tab, and enter email recipients.
Likewise, if you want to save the report to a file when it runs automatically, check the
Output report to file in path checkbox, and enter the path of the file.
2. From the Start menu, select Programs\Accessories\System Tools\Scheduled
Tasks.
The Scheduled Tasks dialog appears:
Click Next.
4. In the next screen, search for the program you want to run (ReportCndLine). Click the
Browse button. In the Select Program to Schedule dialog, navigate to and open the
Program Files\Continuum folder, and select ReportCmdLine.exe.
5. The Scheduled Task Wizard displays the application name, ReportCmdLine, in the
program naming field. If you wish, change this name from ReportCmdLine to another
scheduled-task name in this field:
6. On the same screen, select one of the radio buttons to specify how often you want
this report to run automatically, and click Next.
7. On the next screen, select the time and day you want this scheduled task to start,
and click Next.
Enter a start time and start date, in their respective fields.
Also use the radio buttons to make this task run every day, only on weekdays, or as a
recurring day. The user-interface is self-explanatory:
7. On the next screen (shown on the next page) enter the name and password of a user
in the Enter the user name and Enter the password fields, respectively, and click
Next.
The task will run automatically, as if it were started by that user.
226 TAC
8. The next screen informs you that the task has been successfully scheduled. It also
provides the time and frequency of the task and the day it begins:
If you want to configure more advanced properties for this scheduled task, check the
checkbox entitled, Open advanced properties for this task when I click finish.
9. Click Finish.
The ReportCmdLine (or whatever program name you designated earlier) dialog
appears:
Andover Continuum CyberStation Configurators Guide 227
This dialog contains the "advanced" properties for this task, as mentioned in the
previous step. If you do not check this box in the previous step, the scheduled-task
setup completes, and the ReportCmdLine dialog does not appear.
10. On the Task tab of the ReportCmdLine dialog (shown above) in the Run field, enter
the command line syntax, as follows:
"C:\Program Files\Continuum\ReportCmdLine.exe" /o ObjectName
/u UserName /t Type
Note: When entering the command from here, please make sure you set the
parameters outside the quotes surrounding the path name.
If the ObjectName and/or UserName path contains a space, then you must also
place quotes around those items. For example:
"C:\Program Files\Continuum\ReportCmdLine.exe" /o "ObjectName"
/u "UserName" /t Type
If ObjectName or UserName (when it contains a space) is not enclosed in quotes, the
report does not run.
Parameter
Description
/o
ObjectName
Enter the path name of the Report object you want to run
automatically. It is recommended you use a full path, instead
of the just the name of the object file.
228 TAC
Parameter
Description
/u
UserName
/t
Type
11. On the Task tab, in the Start in field, enter the path of the folder in which you are
starting the application. In this case:
"C:\Program Files\Continuum"
12. Select the Schedule tab.
13. Click the Advanced button to bring up the Advanced Schedule Options dialog. As
needed, configure more advanced settings, then click OK.
14. In the ReportCmdLine dialog, configure other advanced settings, as needed, on the
Task, Schedule, and Settings tabs.
Andover Continuum CyberStation Configurators Guide 229
The ReportViewer
You run, view, compare, and distribute reports in the CyberStation ReportViewer, a
powerful and versatile tool. This section describes the following:
230 TAC
Note: To use any of the report features, your users must be given access to these
features via the Security editor.
Data Format
Displays a scalable vector graphics (SVG) format. This includes bar charts,
clustered bar charts, pie charts, and trend charts.
Displays an HTML text format, in the form of a table.
Displays an XML text format, in the form of XML code.
Displays the content of a PDF file, where the Adobe Acrobat PDF reader
actually launches, and is embedded in, the ReportViewer window.
Note: You may use the Adobe Acrobat PDF reader toolbar functions, such as
Email, Print, Save and Copy, Search, zoom, text touch-up functions, and
other Adobe functions, as if you were running the PDF reader.
You specify PDF format on the Output tab of the Report editor.
Here are several examples of the ReportViewer displaying a pie chart, bar chart, text
chart, XML code, and a trend chart:
232 TAC
Here is an example of the ReportViewer displaying the content of a PDF file, with the
PDF reader embedded in the ReportViewer:
234 TAC
Right click a preconfigured report object in Continuum Explorer, and from the popup
menu select Open, to launch the ReportViewer.
Right click a preconfigured report object in Continuum Explorer, and from the popup
menu, select Edit, to launch the Report editor.
Modify the report configuration, if desired, and click the View Report button in the
Report editor to launch the ReportViewer.
Right click a CyberStation object for which you want to view an ad hoc report, and
from the popup menu click View then Report to launch the Report editor.
Configure the report, and click the View Report button in the Report editor to launch
the ReportViewer.
Schedule a report to run automatically, and have it emailed or saved to a file. (See
Scheduling Automatic Reports, earlier in this chapter.)
Note: If you run a report and no data is available to display in the report, based on your
Report editor configuration, the following message appears in the ReportViewer:
No data was returned for this report. Please check the
report time interval and filter.
Edit the parent object to ensure that your source, filter, and output settings feed
data into the report.
To select an individual report, either click its window or click its tab.
Description
Launches the Report editor for the parent Report object representing this
report. You may edit the Report's configuration and run the report again.
Reloads/refreshes the graphical report in the ReportViewer.
Opens the Microsoft Print dialog, allowing you to print the report.
Opens an email window, and either attaches the report as a file, or embeds
the report content in the email window. The default email recipients are the
ones you listed on the Output tab of the Report editor.
Opens the Microsoft Save As dialog, allowing you, by default, to save the
content of the report in an scalable vector graphics (.SVG) file, .HTML file,
.XML file, or .PDF file, depending on how you configured your report and
what data format you selected. The default file path is the one you listed on
the Output tab of the Report editor.
Opens the Open dialog, allowing you to search for a Report object in your
system, then run it (via the Open button) in the ReportViewer.
236 TAC
Templates
12
Attributes inherited from a template retain a link to the template. Changes to these
attributes in the template affect all objects created from that template. These inherited
attributes are an easy way to maintain consistent attribute values across objects of
the same class. If you try to change an inherited attribute in an object created from a
template, CyberStation protects the link and offers several choices of actions,
including updating the template or breaking the link to it.
Note: If you create Personnel objects from a template, any attribute values with the
inherited from Template data source cannot be edited in the Personnel
Manager.
Andover Continuum CyberStation Configurators Guide 237
If the source of an attribute is Specified By User, CyberStation prompts you for the
attribute value when you use the template to create the object.
BinaryInput
Multi-stateInput
AnalogOutput
BinaryOutput
Multi-stateOutput
AnalogValue
BinaryValue
Multi-stateValue
CyberStation automatically avoids conflicts that are caused by duplicate object names
when you create multiple objects using the template. If CyberStation detects an existing
object with the same name, it appends an underscore and a number to the name of the
new object.
When CyberStation finds an existing object (for example, an alarm named alarm3), it
renames the new object (for example, alarm3_1). The next time the same template is
used to create an object in the same container, CyberStation will give the new object a
name of alarm3_2.
Some fields are disabled in EventEnrollment template objects, and can be specified
only in the objects created from the template.
The event type (Event Type field on General tab of EventEnrollment editor) cannot
be changed once the template object is created.
Some event types are not supported on the Andover Continuum b4 and b3
controllers. (See Using the EventEnrollment Editor, in Chapter 14.)
3. Enter the attribute value, and click the Next button for each prompted attribute.
4. After you see the message The operation is finished, click the Close button in the
Creating Objects from Templates dialog to complete the creation of your new object.
CyberStation automatically avoids conflicts that are caused by duplicate object
names. If CyberStation detects an existing object with the same name, it appends an
underscore and a number to the name of the new object.
Once you have created a new object from a template you can review its attributes with
the object editor or its Properties dialog. When you review the properties of an object
created from a template, the name of the parent template appears at the bottom of the
Main tab.
You can automatically change an inherited attribute in all objects created from a template
by editing the attribute in the template.
240 TAC
Note: If you select the third option, Break the connection between this object and the
template object, you break the connection to the template for all attribute of the
object itself, not just for the attribute you wanted to change.
If you break the link between an object and a template, you cannot link the object to the
template.
242 TAC
Points, Logs,
and Triggers
13
What is a Point?
Throughout Andover Continuum literature youll see references to the word point. In
some cases its definition may be obvious; however there are instances where the term is
not familiar. Inputs and outputs are referred to as points. An input point is a particular
connection at a unique channel where an input sensor is connected. An output point is a
particular channel where an actuator or other output device is connected. Points include
internal memory locations that serve as virtual points. These locations act as storage
locations for values that our programs change. Because they can be read and set just
like inputs and outputs, we find it easier to refer to them in the same terms.
Types of Points
There are three types of points in the Andover Continuum system hardware-defined,
software-defined, and BACnet-defined.
Hardware-Defined
InfinityInput
InfinityOutput
Software-Defined
InfinityDateTime
Storage location where the current system time and date are
available
InfinityNumeric
InfinityString
BACnet-Defined
CyberStation has nine points supported by BACnet devices. BACnet points are created
on third-party BACnet devices or when an InfinityInput, InfinityOutput, or InfinityNumeric
is created on an Andover Continuum b4920 or bCX1 40x0 InfinityController object or an
Andover Continuum b3 InfinityInfinetCtlr object. BACnet points are:
Andover Continuum CyberStation Configurators Guide 243
Note: The term point is a CyberStation term. According to the BACnet standard, these
nine points are known as BACnet objects.
For more information, plase see About BACnet Objects, at the end of this chapter. See
also Chapter 14, BACnet.
Contact closures
Thermistors
Current sensors
DC voltage signals
AC voltage signals
What Is an InfinityOutput?
An InfinityOutput is a connection to an Infinity or Infinet controller where signals are sent
to controlled devices. Outputs turn things on and off, provide variable voltages, currents
or air pressures. Outputs also change value either by program control, the command line,
or from a graphic panel control.
Output Types
Outputs send signals to controlled devices that are:
244 TAC
Electrical type
Engineering units in which you want the data presented on the workstation
Display format in which you want the data presented on the workstation
If a point is enabled, input values are read from the sensor that the point
is attached to, updating the Value attribute with each system scan. For
testing purposes, you can force an input to a pre-set value after you have
set the points State to Disabled.
Units
Units, also known as engineering units, add meaning to the point value.
When displayed on the workstation next to the value, as in 40 %
Humidity, or 75 Deg F, units help users understand what the point is
doing. Enter up to 12 characters (including spaces) in the Units field.
Dont use double quotes.
The text you enter here can be anything you want it to be. It is just a text
string included to help the user. It has no affect on input point values.
Description
246 TAC
State
Enabled means the point is under system control. When the point is
Enabled, the control system reads the sensor and sets the Value attribute
to the value taken from the environment.
Disabled means the system no longer updates the value. If we set the
point to a different value, it holds that value as long as the point remains
disabled.
Never set a point manually unless you are testing or repairing the system.
Exported
Alarms
The format in which the value of this point is displayed on the workstation
ElecType
The electrical type specifies the ElecType attribute for all InfinityInput
points. See Appendix B for a complete listing of the possible electrical
types.
Note: If you are creating this input for an Andover Continuum b4, bCX1
40x0, or b3 controller, then a BACnet AnalogInput, BinaryInput, or
MultistateInput is also created, when you select an analog, digital, or
multistate (supervised) ElecType, respectively. See About BACnet Objects
at the end of this chapter, and see Chapter 14, BACnet.
Invert
If you select Digital as an electrical type, and want to invert the meanings of
ON and OFF, click the Invert box (usually grayed out) to put a check mark
in it.
Channel
Channel numbers are silkscreened onto the front of each type of IO unit on
every type of controller. Typical channel number markings are IN18
(channel 18) on an Eclipse controller IO module or IN5 (channel 5) on an
Andover Continuum IOU Module.
248 TAC
IOU
Format
The format field is where you specify what display format you want to use to
present the Value attribute to the operator. The # sign is a placeholder.
Examples
###.### would be a number with three decimal places
$### shows values greater than zero as ON, values equal to zero as OFF
and values less than zero as ON.
Digital
Filter
Enable or disable the digital filter by selecting True or False from the
dropdown menu. When the Digital Filter is True, value updates are slightly
delayed in order to filter out sudden, radical changes in sensor readings
(due to, for example, electrical surges). When the Digital Filter is False, the
value is updated with every sensor reading. This provides slightly faster
updates.
Threshold
Enter the amount of change in engineering units that must occur before the
point updates other objects such as programs, functions, alarms, reports
and exports to other controllers. A threshold of zero increases network
traffic, as all associated objects update with any change in point value.
Conversion
250 TAC
Auto
Conversion
Enter the top of scale for the engineering units in the Top field on the
left. For example, if you entered % Humidity in the Units field on the
General tab, your top of scale would most likely be 100, for 100%.
Enter the bottom of scale for the engineering units in the Bottom field
on the left. For example, if you entered % Humidity in the Units field on
the General tab, your bottom of scale could be 0, for 0%.
The fields for ElecType values are on the right side of the Auto
Conversion section. The values you enter will be used in a linear
conversion.
Enter the top of scale for the electrical units in the upper ElecType
field on the right. For example, if you selected Voltage in the
ElecType dropdown menu on the Settings tab, your top of scale
would most likely be 5, as this is the highest reading possible for
voltage on many controllers.
Enter the bottom of scale for the electrical units in the lower ElecType
field on the right. For example, if you selected Voltage in the
ElecType dropdown menu on the Settings tab, your bottom of scale
would most likely be 0, as this is the lowest reading possible for
voltage.
Formulas entered in the Conversion field take precedence over the
conversion generated by the Auto Conversion section, but the Auto
Conversion will recognize a limiting or biasing formula and use it in its
conversion.
In the Logs tab, you define and activate two types of logs for a point:
Logs Log entries are stored on the local controller that owns the point. See Logs,
later in this section.
Extended logs CyberStation offloads the local-controller extra log entries for this
point and stores them in the database. This happens once the maximum number of
controller log entries is filled. When you activate extended logs, the additional "extra"
entries are transferred (uploaded) to a workstation's CyberStation database, to
capture them before they are deleted in the controller. The extended log, which is an
extension of a log, continues recording values where the log leaves off. It records
values depending on how you set up the short-term log. These extended log entries
can be uploaded from both local-area network (LAN) controllers and remote-access
services (RAS) network controllers to the workstation. (See Extended Logs, later in
this section.)
Extended logs work according to the attribute settings on this tab, as well as:
Extended-log settings on the Preferences tab of the Device editor for a workstation.
(For more information on these settings, see Extended Logging, later in this section,
and Chapter 14, BACnet.)
252 TAC
Extended-log settings 7, 8, 9, and 10, in the General Preferences dialog. (For more
information on these settings, see Extended Logging, later in this section.)
CyberStation updates automatic logs by inserting new values into the first log entry.
Every interval, a new value is stored in the first log entry, pushing existing values down to
the remaining entries. When the specified number of entries is full of values, the bottom
value "drops off when a new value is inserted.
When working with logs, you wont actually see structures like the one shown above.
Instead, you use point names and index numbers to retrieve values stored in logs. To do
this, simply enclose the index number in square brackets [ ] directly after the point name.
For example, to print the sixth entry (72) of the log for SupplyAir, use the following
command:
PRINT SupplyAir[6]
Manual Logs Unlike automatic logs, CyberStation cannot set manual logs. Manual
logs are set either from the Command Line editor or a Plain English program. To update
a manual log, simply enclose the index number in square brackets [ ] directly after the
point name. The example below sets the third log entry of an array named MyNum:
SET MyNum[3] TO 12
Note: To perform calculations on logs, see the following Plain English keywords:
SUM
AVERAGE
MINIMUM
MAXIMUM
Logs
The following table describes the attributes in the Logs section of this tab. These
settings affect extended logs, when extended logging is activated.
Number of
Entries
Type
254 TAC
In the Type field, use the down arrow to show a list of available log types
and select one:
Manual
LogInstantaneous
LogAverage
LogMinimum
LogMaximum
Interval
If the Type is not Manual, set the Interval. This determines how often
CyberStation stores new values in the log. The values that you enter for
days, hours, minutes and seconds are combined to create the total
interval. For example, if you enter a 1 for days and a 12 for hours, the log
will be updated every 1.5 days. Similarly, if you need a 90-minute interval,
enter a 1 for hours and a 30 for minutes.
Days maximum value is 365
Hours maximum value is 23
Minutes maximum value is 59
Seconds maximum value is 59
Tip: In order to have a log updated at the same time every hour (every quarter hour, or
every half hour, for example) your interval must be evenly divisible into one hour (1
min, 2 min, 3 min, 4 min, 5 min, 6 min, 10 min, 12 min, 15 min, 20 min, or 30 min).
Extended Logs
To activate extended logs for this point, check the Extended Logging checkbox.
When you activate extended logs, the additional "extra" entries are transferred
(uploaded) to a workstation's CyberStation database, to capture them before they are
deleted in the controller.
The extended log, which is an extension of a log, continues recording values where the
log leaves off. It records values depending on how you set up the short-term log. These
extended log entries can be uploaded from both LAN controllers and RAS controllers to
the workstation.
In addition to checking the Extended Logging box and setting the Number of Entries,
Type, and Interval attributes on a point's Logs tab, your administrator also configures
settings 7, 8, 9, and 10, in the General Preferences dialog.
Setting 7, Extended Log Database Check Interval (minutes) This is the time
interval, in minutes, that CyberStation checks the database for points that are enabled for
automatic extended logging, checks the extended logging table, and uploads the point
data. The default is 5 minutes.
Increase for RAS Network: If you know you will be performing extended-log uploading
from controllers on a RAS (remote) network, it is good practice to increase the number of
interval minutes because this process takes longer on such a network. Data is lost when
this process takes longer than 5 minutes beyond the number of minutes specified here. It
is also good practice to decrease the Extended Log maximum RAS Buffer Percentage
(see setting below).
Setting 8, Extended Log Maximum LAN Buffer Interval (minutes) This is the
maximum time interval, in minutes, that CyberStation may check each controller on a
LAN network for new extended logging data.
Setting 9, Extended Log Maximum RAS Buffer Percentage This is the maximum
amount (percentage) of new point log data allowed to accumulate in a controller on a
RAS network, before it is downloaded automatically. It is a percentage of total controller
log size. CyberStation knows the logging interval and the log buffer size on a RAS
controller, and it calculates when a certain percentage of the buffer in the controller is
filled. It dials into the controller when the percentage is exceeded to download the log
data. This may be any percentage between 0 and 100 percent.
Decrease to Ensure More Frequent Downloads: Make sure this percentage is small
enough to ensure more frequent downloading. Data is lost when a downloading
operation takes longer than 5 minutes beyond the number of minutes specified in the
256 TAC
setting above, Extended Log Data Check Interval. It is also good practice to increase
the number of minutes in that setting (see above).
Setting 10, Extended Log Automatic Purge Interval (days) This is the number of
days to keep extended log data in the database before purging it. Extended log data is
stored in a single internal table, so purging the data after a specified number of days
prevents this table from becoming too large. A value of 0 ensures that the data is never
purged.
symbol
To access the General Preference dialog, right click the Continuum
located in the bottom right-hand corner of the screen, and select General Preferences.
Settings 16 of the General Preference dialog are related to password-management
configuration. For more information, please see Chapter 5.
Enabling a Workstation for Extended Logging You may enable or disable any
workstation to download extended log data from controllers on a local-area network
(LAN) or from controllers on a remote-access services (RAS) network, to the workstation.
This is done via settings 19 and 20 (Enable personnel distribution to controllers on
the LAN and Enable personnel distribution to RAS networks) on the Preferences
tab of the Device editor for the workstation device that you wish to enable or disable.
Your must determine which workstations at your site are best suited to perform this task.
For more information, see the Preferences tab of the Device editor, in Chapter 14.
Extended Logging Backwards Compatibility (Old and New Extended Logs)
Before version 1.7, you created Plain English programs for extended logs. These
programs facilitated extended log tables in the database, one table per controller.
During CyberStation installation of version 1.7 or higher, in the database initialization
process (the Database Initialization dialog) you check the Extended Logging
Backwards Compatibility checkbox to retain the pre 1.7 method for creating extended
logs, while also enabling new extended logging functionality. If you do not check this
box, then you may not use the old (pre 1.7) method.
Note: The "old" extended log tables, created before your upgrade to version 1.7, remain
in the database. When a "new" extended log table is created, if necessary, data
from an "old" table are copied and merged with the data in the "new" table.
For more information, please see the CyberStation Installation Guide, 30-3001-720.
Extended Logs and Reports Extended log data, as well as other report data sources,
can be presented in a report and displayed in the form of attractive trend chart, text chart,
bar chart, or pie chart. CyberStation supplies many Report object templates that include
bar-chart templates, pie-chart templates, and trend templates giving reports a certain
default "look and feel."
To use these Report templates, your must import them (and thus activate reports) during
the CyberStation installation process, in an upgrade to version 1.7 or higher. During
installation, in the Database Initialization dialog, you must check the Create/Update
Graphical Report Settings checkbox. If this box is not checked, then the TAC-supplied
Report templates are not available.
For more information, please see the CyberStation Installation Guide, 30-3001-720, as
well as descriptions of Reports and the Report editor in Chapter 11.
Andover Continuum CyberStation Configurators Guide 257
258 TAC
Use the dropdown menu to select the desired comm port. Once the proper comm port
has been selected additional XDriver parameters will be required (see your XDriver
documentation).
260 TAC
InfinityOutput Points
An InfinityOutput point is an object that you create on Infinity or Infinet controllers. An
output point changes or affects the environment by controlling a piece of equipment such
as a heater or fan.
Infinity controllers have numerous (the number varies depending on the type of controller)
channels for output points. A channel in this case is simply an area in the controller than
can be physically connected to a device.
When you create an InfinityOutput point, you define it by specifying values for its
attributes. An attribute can be thought of as a characteristic of the point. For example,
you have many attributes such as height, weight, hair color, and age. Some of the
attributes for an InfinityOutput point include value, electrical type, display format,
threshold.
Youll specify values for these attributes and many more in the following tabs of the
InfinityOutput editor.
Units
Units, also known as engineering units, add meaning to the point value.
When displayed on the workstation next to the value, as in % open, or
PSI, units help users understand what the point is doing. Enter up to 12
characters (including spaces) in the Units field. Dont use double quotes.
The text you enter here can be anything you want it to be. It is just a text
string included to help the user. It has no affect on input point values.
Description
State
Select Enabled or Disabled from the dropdown menu. When the point is
enabled, the control system sets the value to the desired output setting.
When the point is disabled, a program can't set the point. A user can set it
from the Command Line or a control on a graphic panel. Never set a point
manually unless you are testing or repairing the system.
Exported
Alarms
The Alarms attribute displays the number of active alarms associated with
this point.
262 TAC
ElecType
Digital
Current
Tristate
ACC_Pneumatic
Not used
ReaderDoor
(Infinity only)
HiResVoltage
HiResCurrent
PanelMeter
Channel
Channel numbers are silkscreened onto the front of each type of IO unit on
every type of controller. Typical channel number markings are OUT1
(channel 1) on an Eclipse controller IO card or OUT3 (channel 3) on an
Andover Continuum IO Module.
IOU
Format
264 TAC
The format field is where you specify what display format you want to use to
present the Value attribute to the operator. The display format $### shows
values greater than zero as ON, values equal to zero as OFF and values
less than zero as ON.
On the General tab of the editor, include a % sign as the first character of the Units
attribute. For example:
%RH
This will have no effect on the Value attribute of the point.
2. On the Settings tab of the editor, include a % sign in the Format field. For example:
%###.#
When the % sign is in the display format field this way, the Value of the point will
automatically be multiplied by 100 and a % sign added when the point is displayed.
Note: If using this method with an Auto Conversion, the top of scale should be set to
1, not 100.
This second method of showing percents is commonly used with analog outputs.
For example in the Plain English Language print statement:
Print The value is set to %### open., WATER_VALVE
prints the value in numeric characters as a percentage of the scale for the
WATER_VALVE point with the scale set from 0 to 1, where 0 is fully closed and 1 is fully
open. So if the value is .45, the statement prints:
The value is set to 45% open.
Verify ElecValue
From the Command Line, enter PRINT Pointname ELECVALUE
You should see the current input electrical value of the point in the response line.
Continuing On
Once you have tested the point, reopen the editor and complete the remaining tabs to
finish configuring the point.
Enter information into the Triggers, Alarms, Logs and XDriver tabs of the InfinityOutput
editor. Complete these tabs using the explanations provided earlier in this chapter for
completing the same tabs of the InfinityInput editor.
Refer to Chapter 4 for details on entering information into the Security Level tab.
266 TAC
InfinityDateTime
InfinityString
Object editor
Note: For instructions on how to use objects editors in general refer to Chapter 3.
The InfinityNumeric General Tab
Attributes that you can set for all InfinityNumeric points include Value, Units,
Description, State, Format and Setpoint. For points connected to certain IOU modules,
you also set the Channel and IOU numbers and Direction.
Value
Units
Units (engineering units) make clear the type of information the point
registers. They display next to the Value, as in 72 Deg F, to help
users. Other examples of engineering units are: % Humidity and Deg
C. Type up to 12 characters (including spaces). Dont use quotation
marks.
Description
Channel and
IOU Numbers
Set channel and IOU numbers so the points value can be read or
changed by a display module.
(NetControllers
Only)
268 TAC
Direction
IOOutput
IOBidirectional
BACnet
Object Type
State
Setpoint
Check the Setpoint checkbox so the controller stores the current point
value in the CyberStation database.
Format
The format field is where you specify what display format you want to
use to present the Value attribute to the operator. The # sign is a
placeholder. Examples:
###.### would be a number with three decimal places
$### would equal on/off/-on.
Exported
Continuing On
Once you have tested the point, reopen the editor and complete the remaining tabs to
finish configuring the point.
Enter information into the Triggers, Alarms, Logs, and XDriver tabs of the
InfinityNumeric editor. Complete these tabs using the explanations provided earlier in this
chapter for completing the same tabs of the InfinityInput editor.
Refer to Chapter 4 for details on entering information into the Security Level tab.
Note: For instructions on how to use objects editors in general refer to Chapter 3.
The InfinityDateTime General Tab
InfinityDateTime points store date and time information used in schedules and are used
to create time stamps. They print from Plain English in the format: MM/DD/YY.
Value
Description
Channel
and IOU
Numbers
Set channel and IOU numbers so the points value can be read or
changed by a display module.
Enter the channel number as it is marked on the controller. Enter an
IOU number.
On 9200 CX controllers, IOU numbers are set with dipswitches. After
you enter these numbers, select a direction, if applicable (NetController
only).
270 TAC
Direction
IOOutput
IOBidirectional
State
Setpoint
Check the Setpoint checkbox so the controller stores the current point
value in the CyberStation database.
Exported
Continuing On
Once you have tested the point, reopen the editor and complete the remaining tabs to
finish configuring the point.
Enter information into the Triggers, Logs and XDriver tabs of the InfinityDateTime editor.
Complete these tabs using the explanations provided earlier in this chapter for the
InfinityInput editor.
Refer to Chapter 4 for details on entering information into the Security Level tab.
Value
Description
String Size
The default InfinityString point size is 132 characters. You can set a
lower number, being sure to pad the size in case you later change
the string. The control system truncates characters that exceed the
specified string size.
Channel and
IOU Numbers
Set channel and IOU numbers so the points value can be read or
changed by a display module.
(NetController
Only)
272 TAC
Direction
IOOutput
IOBidirectional
State
Setpoint
Check the Setpoint checkbox so the controller stores the current point
value in the CyberStation database.
Continuing On
Once you have tested the point, reopen the editor and complete the remaining tabs to
finish configuring the point. Enter information into the Triggers, Logs and XDriver tabs
of the InfinityString editor. Complete these tabs using the explanations provided earlier in
this chapter for the InfinityInput editor.
Refer to Chapter 4 for details on entering information into the Security Level tab.
AnalogInput
BinaryInput
MultistateInput
AnalogOutput
BinaryOutput
MultistateOutput
AnalogValue
BinaryValue
MultistateValue
BACnet Input and Output Objects When you create an InfinityInput and select an
analog, binary, or multistate electrical type (via the ElecType field in the Settings tab of
the InfinityInput editor) a BACnet AnalogInput, BinaryInput, or MultistateInput is also
created, respectively.
BACnet Value Objects When you create an InfinityNumeric and select AnalogValue,
BinaryValue, or MultistateValue as the BACnet Device Type field in the General tab of
the InfinityNumeric editor, a BACnet AnalogValue, BinaryValue, or MultistateValue is also
created, respectively.
These editors and their tabs are shown earlier in this chapter.
Note: For third-party BACnet devices that are integrated into the Andover Continuum
system, AnalogInput, BinaryInput, and MultistateInput objects were already created
as objects on those third-party BACnet controllers.
When InfinityInputs, InfinityOutputs, and InfinityNumerics are first created, their BACnet
counterparts are not simultaneously created. The BACnet counterpart is created when,
from Continuum Explorer, you highlight the BACnet controller (b4, bCX1 40x0, b3), right
click, and from the popup menu select Send To Database. See Chapter 3 and Chapter
14.
In Continuum Explorer, after these BACnet points are created and learned into the
system, they appear as Infinity points in the CyberStation/Infinity portion of the navigation
pane, and as BACnet points in the BACnet Devices portion of the navigation pane. On
the Infinity side, they appear in CyberStation/Infinity class folders beneath the
InfinityController and InfinityInfinetCtlr object icons. Likewise, on the BACnet side, they
appear in BACnet default class folders beneath their Device icons. (See Chapter 3 and
Chapter 14 for more information on these Explorer views.)
274 TAC
BACnet
14
Andover Continuum fully supports the BACnet standard. Andover Continuums BACnet
product line includes controllers, expansion IO modules, repeaters, routers, and
CyberStation workstations modified as BACnet Operator Workstation (B-OWS). This
chapter describes CyberStations implementation of BACnet support, including BACnetcompliant editors and other BACnet features that help you successfully configure and
integrate BACnet devices into your building control system.
What is BACnet?
BACnet stands for Building Automation and Control network. It is a communication
protocol, developed by the American Society of Heating, Refrigerating and AirConditioning Engineers, Inc. (ASHRAE), that allows products made by different
manufacturers to be integrated into a single building automated control system. This
means that as long as they meet the ANSI/ASHRAE BACnet Standard, different
manufacturers products can seamlessly communicate data to each other over a network.
The types of products include controllers, workstations, actuators, and sensors. In
BACnet, each of these products is referred to as a device.
In order for communications to occur between two different systems a common network
technology is required. BACnet supports six different types of networks: Ethernet,
BACnet/IP, ARCNET, MS/TP, Point-to-Point, and LonTalk. Continuum supports MS/TP, a
twisted-pair cabling arrangement based on the RS-485 standard, and BACnet/IP for its
BACnet networking requirements.
BACnet provides a standard to model each BACnet device in a building automation
system network as a collection of software entities called objects. Each object is
characterized by a set of attributes called properties. A third feature, called services,
provides messages needed for manipulating the devices objects and properties.
BACnet Objects
The BACnet protocol is based on objects, properties, and services. Objects are the
logical representation of system data. Objects may represent single physical points or
Andover Continuum CyberStation Configurators Guide 275
Properties
Objects are examined and controlled by a set of properties that belong to each object.
BACnet properties are equivalent to attributes in CyberStation. (Refer to Key Concepts in
Chapter 1.) Examples of object properties are name, type, present value, status flags,
high-limit, low limit, and so forth. The most commonly used property for interoperability is
Present Value.
Each BACnet device also has a device object containing properties that can be used to
verify communications, identify the vendor, and identify software and firmware revision
and other characteristics of the device. The device objects properties represent the
externally visible characteristics of a BACnet device.
Note: CyberStation provides object editors for most BACnet objects. The user interfaces
in these editors have the same look and feel as other CyberStation/Infinity object
editors. BACnet properties appear inside the editors, the way CyberStation
attributes do. (See the sections, BACnet Defined Objects and Infinity and BACnet
Object Editors, later in this chapter.)
Important: While using these object editors, you will notice that certain
properties/attributes and, in some cases, entire sections and tabs are
unselectable (appear gray). This means that they are not supported on or
applicable to the device on which the object resides for example, on
Andover Continuum b4920, bCX1 (40x0 series), and b3 controllers, and
certain third-party BACnet devices.
276 TAC
Services
In order for two different devices to interoperate, a common set of services is required.
BACnet services provide messages for accessing and manipulating properties of device
objects.
For example, the devices need to identify themselves (I Am, Who Is), read and write data
(Read Property, Write Property), and so forth. BACnet defines 35 services that are
grouped into six categories:
Alarm and Event
Device Management
File Transfer
Object Access
Virtual Terminal
Security
BACnet-Related Documentation
For more information on BACnet, Andover Continuums BACnet product line, and
Andover Continuums implementation of BACnet, please see the following:
4. Click the + sign next to display BACnet devices, folders, and other objects:
BACnet
Device Icons
Note: You can also right click an InfinityController and select Find New BACnet
Devices.
278 TAC
BACnet Icons
In CyberStation, BACnet-related icons appear in the Explorer to differentiate between
BACnet and non-BACnet devices. These icons are shown below.
BACnet Devices
Continuum
Third Party
Continuum i2
(olive)
Device
Third Party
Workstation
(gray)
(olive monitor)
CyberStation
Workstation
(blue monitor)
Folders
BACnet
Folder
(blue)
BACnet Default
Class Folder
(blue)
CyberStation Default
Class Folder
BACnet
BACnet
BACnet
AnalogInput
AnalogOutput
BinaryInput
BinaryOutput
MultistateInput
AnalogValue
BinaryValue
MultistateOutput
Networks
BACnet
Network
Color differentiates between Andover Continuum (blue) and third-party (olive) BACnet
devices, folders, and workstations. Also, Andover Continuum i2 devices appear in gray.
The following illustration shows Continuum Explorer with many of these BACnet and nonBACnet icons. Note that the upper portion of the navigation pane shows Infinity (nonBACnet) icons, whereas the lower portion shows BACnet icons, beneath the BACnet
network icon:
280 TAC
This causes the content of the device to be uploaded to the SQL database. Once the
process is complete, select Refresh from the Explorers View menu (or click the
Explorers refresh button) and the exclamation flag disappears from the devices icon.
Automatic Save to Database
You can set up CyberStation so that each new BACnet device is automatically saved to
the database (upon learning of new BACnet devices) by performing the following
procedure:
in the window taskbar (tool tray).
1. Right click the Continuum icon
2. Select BACnet Preferences from the popup menu:
3. In the BACnet Preferences dialog (shown on the next page) change the value of
item 2, Automatically save new BACnet devices to the database, from False to
True.
4. Find new BACnet devices. Right click over the Root directory in the Explorer, and
from the popup menu, select Find New BACnet Devices. (See the procedure,
Locating BACnet Devices, earlier in this chapter.)
Viewing Options
CyberStation offers you three ways to view Andover Continuum BACnet controllers in the
Explorer. The choices are:
282 TAC
The navigation pane of the Explorer now reflects this viewing selection. For example:
b4920 controllers,
b4Controller1 and
b4Controller2 are
shown with Infinity
Controller icons in the
The navigation pane of the Explorer now reflects this viewing selection. For example:
bCX1 controllers,
b4Controller1 and
b4Controller2, do not
appear as Infinity
Controllers in the Infinity
portion of the tree.
The navigation pane now reflects this viewing selection. For example:
bCX1 controllers,
b4Controller1 and
b4Controller2, do not appear
in the BACnet portion of the
Disabling BACnet
The first setting (Enable BACnet) in the BACnet Preferences dialog allows you to
disable communication with all BACnet devices on your system. To accomplish this:
1. Right click the Continuum icon
in the window taskbar (tool tray).
2. Select BACnet Preferences from the popup menu:
3. In the BACnet Preferences dialog, change the value on item 1, Enable BACnet,
from True to False.
4. Change your viewing options to Infinity Controller Only:
Once you have performed this procedure, CyberStation no longer sends or responds to
BACnet communication requests and works completely in the context of
CyberStation/Infinity class objects.
To return to BACnet, change the Enable BACnet setting to True (its default setting) and
change your viewing option to Infinity Controller and BACnet Device.
284 TAC
BACnet View
The Explorer provides a BACnet View selection in its View dropdown menu. This
selection shows only the BACnet portion of the Explorer tree. To use this view:
1. Click the down arrow attached to the Explorer bar icon
toolbar.
2. Select BACnet View from the dropdown menu:
The navigation pane shows the BACnet devices portion of the tree:
For each BBMD, the BBMD Registration dialog lists the IP address, network port,
broadcast disk mask, and last "teach time" the last time you used the Teach button to
inform other BBMDs about the existence of your BBMD and BBMD table. (See Teaching
BBMDs, below.)
Adding BBMDs
You may add a BBMD to your BBMD table, as follows:
1. From the BACnet Preferences dialog, click the BBMD Registration button:
3. Enter the IP address, network port, and broadcast distribution mask of the BBMD.
Note: If you also want to learn about the BBMDs contained within the internal table of
the BBMD you are adding, check the Import all BBMDs from device checkbox.
The BBMDs from that table are added to the registered list (your table).
4. Click OK, then from the BBMD Registration dialog, click Refresh.
Teaching BBMDs
From the BBMD Registration dialog, you may teach other system BBMDs about the
existence of your BBMD (including the BBMDs listed in your internal BBMD table).
1. From the BACnet Preferences dialog (shown in previous section) click the BBMD
Registration button. The BBMD Registration dialog (shown in previous section)
appears.
2. Click the Teach button. A window appears showing the progress of the teach
process, before the process completes. The Last Teach Time column in the BBMD
Registration dialog will reflect this teach.
Deleting BBMDs
From the BBMD Registration dialog, you may delete one or more BBMDs.
1. From the BACnet Preferences dialog, click the BBMD Registration button. The
BBMD Registration dialog appears.
2. Highlight (select) a BBMD entry in the list.
3. Click the Delete button, then click the Refresh button.
Note: Click the Exit button to dismiss the BBMD Registration dialog.
For important related BBMD information, see also the Details tab and the Foreign
Devices tab of the Device editor, which is discussed next. For complete information on
BBMDs, please see Introducing BACnet A Guide for Continuum Users, 30-3001-863.
Description
BACnet Network
Number
288 TAC
Model Name
Device Node ID
Device Status
Comm Status
Primary Access
Server
Secondary Access
Server
Auto Download
Probe Time
Probe Type
Out of Service
When checked, hides the selected device. (See Hiding Out-ofService Devices, earlier in this chapter.)
BACnet Workstation
Location
Container Type
Serial Number
Default Folder
Specifies the default folder under which the device will appear.
Reinitialize Device
Teach
290 TAC
Cold Start when the controller comes up from a reset and recalls a backup copy
of the controllers original RAM database
Warm Start when the controller comes up from a reset and recalls a copy of the
controllers database at the time the reset or power failure occurred.
To reinitialize a controller proceed as follows:
1. Click the Reinitialize Device button (previous page) to bring up the Reinitialize
Device dialog:
2. Click the State fields down-arrow button to open the dropdown menu.
3. Click the desired reinitialize state (Coldstart or Warmstart).
4. Enter your password in the Password field. (Enter password on third-party BACnet
devices only. Andover Continuum BACnet controllers do not require a password.)
5. Click the OK button.
Teach
Click this button to perform a manual "teach". This updates or "teaches" all Infinity
controllers (including Andover Continuum BACnet controllers) about this CyberStation
device and teaches all Infinity controllers about each other and about all devices.
Note: The Teach feature is implemented on CyberStation devices only. It is not
implemented on BACnet devices.
When you click the Teach button, a Select Teach Mode dialog appears:
Description
Device Teach
Click the Device Teach radio button to teach all Infinity controllers,
including b4920/bCX1 (40x0 series) controllers, on the network about
the existence and properties of this device.
Global Teach
292 TAC
Supported Services
Supported Object
Types
Vendor Name
Vendor ID
Software Revision
Firmware Revision
Protocol Version
Protocol Revision
Database Revision
APDU Retries
APDU Timeout
Segmentation Support
294 TAC
Segment Timeout
Max Segments
Accepted
Max # of Async
Requests
Request Interval
296 TAC
BACnet Broadcast
Management Device
BBMD Port
Time to Live
Note: For complete information on all BACnet properties, please see ANSI/ASHRAE
Standard 135-2004: BACnet A Data Communication Protocol for Building Automation
and Control Networks.
The backup selections on this tab see also the editor attributes table below allow
you to:
298 TAC
Back up configuration information for this controller from the database and archive it
into a text (ASCII dump) file.
Backup
When you have selected the operation you want and (if
needed) have selected an archive file, click the Backup
button to execute the backup operation. For Andover
Continuum BACnet controllers, the Distribution
Properties dialog appears, showing progress messages
about the status of the backup operations.
For some third-party BACnet controllers, you are first
prompted to enter a password. If the password is
accepted, the operation begins.
Restore
Device
BACnetNetworkNumber
BACnetMacAddress
This tab lists all the foreign devices contained in the BBMD's internal foreign device table.
A foreign device is a BACnet device that has an IP subnet address different from those
comprising the BACnet/IP network. Foreign devices are registered with a BBMD. This
registration makes it possible for the BBMD to facilitate the delivery of broadcast
messages among registered BACnet devices located on different system subnetworks.
Note: The BACnet Broadcast Management Device checkbox on the Details tab must
be checked for the Foreign Devices tab to appear.
For more information on BBMDs, please see Introducing BACnet A Guide for
Continuum Users, 30-3001-863.
For each foreign device listed, this tab displays the following information. The values in
this tab reflect the properties of subscriptions of foreign devices registered with
CyberStation.
IP Address The IP address of the BBMD with which you want to register this
device as a foreign device. This is specified in the Details tab.
Port The BACnet network port (hexadecimal integer) of the BBMD with which you
want to register this device as a foreign device. This is specified in the Details tab.
302 TAC
Time To Live The total number of seconds that a foreign device registration
inactive that is, how long it will be registered in the table of foreign devices of the
BBMD. If no re-registration occurs before the time expires, the foreign device is
purged from the table when the time expires. This is specified in the Details tab.
Time Remaining The number of remaining seconds that a foreign device will be
registered in the table of foreign devices. If the foreign device is not re-registered
before this time expires, then it is purged from the table when the time expires.
Local Time
UTC Offset
Local Date
Daylight Savings
Synchronize to
Local Time and
Date
To synchronize the new BACnet device with the systems local time and date:
1. Scroll through the BACnetDevice window to locate the new BACnet device.
Andover Continuum CyberStation Configurators Guide 303
Event Object
Alarm State
Acked Transitions
304 TAC
Setting
Description
Value
Setting
Description
Value
10
11
12 thru
14
15 thru
17
18
19
Setting
Description
Value
Setting
Description
Value
308 TAC
Setting
Description
Value
24
Security levels are actual CyberStation objects (Security Level objects) configured via the
Security Level editor.
A security level can deny access to a CyberStation object editor on a page-by-page basis
using object-level security. Object-level security is a way to deny user groups the ability
to create, delete, or change individual CyberStation objects. Every object editor in
CyberStation has a Security Level tab that displays a list of all existing security level
objects. Selecting a security level object here attaches that security level to the object
being edited.
To attach a security level to this point, locate the security level in the Name column and
click the radio button next to it. To detach a security level from this point, locate the
security level in the Name column and double-click the radio button to remove the black
dot it contains. Or you can right click the security level in the Name column to bring up a
popup menu. Click Clear Selection in the popup menu.
Refer to Chapter 4 for information on the attaching security levels to a BACnet device.
The Next Step
Once you are finished with the BACnet Device editor, you can begin to configure alarms
for your BACnet devices.
310 TAC
312 TAC
Description
Event Notification
Object
Event Property
Send
Event Type
Notification Type
*Recipient
*Process Id
*Priority
314 TAC
*Confirmed
Notification
*Only applicable to third party devices. Grayed out for all Andover Continuum devices.
The EventEnrollment Algorithms Tab
The Algorithms tab is where you set the parameters for the algorithm that will be used to
evaluate the event. The appearance of this tab is determined by the Event Type
selection that was made on the General tab.
Time Delay
Time Delay appears on the Algorithms tab for all of the Event Type
selections, except Buffer Ready. (See the General tab.)
Type the number of seconds in the Time Delay field you want to
postpone evaluating the alarm.
For example, you may decide that the point value can exceed or fall
below its alarm boundaries for 30 seconds before the alarm goes off. If
at the end of the 30 seconds, the object is in alarm, the alarm goes off
regardless of its state during the 30-second delay.
Using time delays cuts down on the number of active alarms and
reduces both system traffic and operator responsibility by filtering out
some nuisance alarms.
Algorithm Parameters
The other fields that appear on the Algorithms tab differ according to the Event Type
selected on the General tab. The above figure reflects an Out of Range Event Type
selection. The algorithm parameters that you set for each of the event types are
described on the following pages.
Andover Continuum CyberStation Configurators Guide 315
Note that the dead band value is optional. If you leave this value at 0, then all values
between the high and low limits are considered normal. When the associated point
attribute exceeds or falls below the normal range, its Event State attribute changes to
High Limit or Low Limit, respectively.
316 TAC
The value of the referenced property becomes equal to one of the values contained
in the Bitstring Values list, after applying the Bitmask.
That value remains equal for the duration of seconds displayed in the Time Delay
field.
The change of bitstring generates a ToOffnormal transition, and an event notification
is sent.
A change of bitstring clears (transitions ToNormal) when:
The value of the referenced event property is no longer equal to one of the values
contained in the Bitstring Values list, after applying the Bitmask.
That value remains not equal for the duration of seconds in the Time Delay field.
Time Delay
Time Delay appears on the Algorithms tab for each of the choices of
Event Type on the General tab.
Type the number of seconds in the Time Delay field you want to
postpone evaluating the alarm.
For example, you may decide that the point value can exceed or fall
below its alarm boundaries for 30 seconds before the alarm goes off.
Using time delays cuts down on the number of active alarms and
reduces both system traffic and operator responsibility by filtering out
some nuisance alarms.
Andover Continuum CyberStation Configurators Guide 317
Bitmask
This field represents a bitmask that is used to indicate which bits in the
referenced property are to be monitored by the algorithm.
A value of 1 in a bit position indicates that the bit in this position in the
referenced property is to be monitored by the algorithm.
A value of 0 in a bit position indicates that the bit in this position in the
referenced property is not significant for the purpose of detecting this
change of bitstring.
Bitstring
Values
This is list of bitstrings that apply to this event algorithm. This list of
bitstrings defines the set of states for which the referenced property is
OffNormal. Only the bits indicated by the Bitmask are significant.
If the value of the referenced property changes to one of the values in
this bitstring list, then the referenced property of this EventEnrollment
object makes a ToOffnormal transition, and appropriate notifications
are sent.
318 TAC
The value of the referenced property becomes equal to one of the values contained
in list of values in the Alarm On field.
That value remains equal for the duration of seconds displayed in the Time Delay
field.
This type of event may only be applied to a property that has discrete or enumerated
values, including Boolean.
The change of state generates a ToOffnormal transition, and an event notification
is sent.
A change of state clears (transitions ToNormal) when:
The value of the referenced property is no longer equal to one of the values in the list
That value remains not equal for the duration of seconds in the Time Delay field.
Time Delay
Time Delay appears on the Algorithms tab for each of the choices of
Event Type on the General tab.
Type the number of seconds in the Time Delay field you want to
postpone evaluating the alarm.
For example, you may decide that the point value can exceed or fall
below its alarm boundaries for 30 seconds before the alarm goes off. If
at the end of the 30 seconds, the object is in alarm, the alarm goes off
regardless of its state during the 30-second delay.
Using time delays cuts down on the number of active alarms and
reduces both system traffic and operator responsibility by filtering out
some nuisance alarms.
Alarm On
This is a list of values that apply to the referenced property. The types
of values here may only be discrete or enumerated values, including
Boolean.
That amount remains equal to or greater than this value for the duration of seconds
displayed in the Time Delay field.
If the referenced property is a bitstring data type, then the change of value occurs when:
The bits remain changed for the duration of seconds in the Time Delay field.
Time Delay
Time Delay appears on the Algorithms tab for each of the choices of
Event Type on the General tab.
Type the number of seconds in the Time Delay field you want to
postpone evaluating the alarm.
For example, you may decide that the point value can exceed or fall
below its alarm boundaries for 30 seconds before the alarm goes off.
Using time delays cuts down on the number of active alarms and
reduces both system traffic and operator responsibility by filtering out
some nuisance alarms.
Bitstring
Reference
320 TAC
Property
Increment
Bitmask
This field represents a bitmask that is used to indicate which bits in the
referenced property are to be monitored by the algorithm.
A value of 1 in a bit position indicates that the bit in this position in the
referenced property is to be monitored by the algorithm.
A value of 0 in a bit position indicates that the bit in this position in the
referenced property is not significant for the purpose of detecting this
change of bitstring.
A command failure occurs when the value of the referenced property differs from the
value of the attribute specified in the Feedback Reference section, for the duration of
seconds displayed in the Time Delay field.
This algorithm may be used, for example, to verify that a process change has occurred
after writing to a property.
This type of event shall only be applied to a property that has a discrete value.
The command failure generates a ToOffnormal transition, and an event notification
is sent.
A command failure clears (transitions ToNormal) when the value of the referenced
property becomes equal to the value of the attribute specified in the Feedback
Reference section, for the duration of seconds in the Time Delay field.
Time Delay
Time Delay appears on the Algorithms tab for each of the choices of
Event Type on the General tab.
Type the number of seconds in the Time Delay field you want to
postpone evaluating the alarm.
For example, you may decide that the point value can exceed or fall
below its alarm boundaries for 30 seconds before the alarm goes off.
Using time delays cuts down on the number of active alarms and
reduces both system traffic and operator responsibility by filtering out
some nuisance alarms.
Feedback
Reference
Object
Displays the name of the object, whose value is being compared to the
value of the attribute that is selected in the Attribute field.
Attribute
322 TAC
Assumptions
Selected Alarmed Attribute = Value
Assumptions
Selected Alarmed Attribute = Value
Deadband = 1
Discussion
For example, suppose the value for RoomTemp1 changes from 75 to 72. This change
would result in a normal state, because the following floating limit equations result in
TRUE:
attribute value < (set point reference value + High Diff Limit) - dead band value
OR
72 < 70 + 4 1
and
attribute value > set point reference value - Low Diff Limit + dead band value
OR
324 TAC
72 > 70 - 20 + 1
Diagram
When you select Floating Limit from the Event Type on the General tab, the
Algorithms tab appears, as shown below.
Time Delay
Time Delay appears on the Algorithms tab for each of the choices of
Event Type on the General tab.
Type the number of seconds in the Time Delay field you want to
postpone evaluating the alarm.
For example, you may decide that the point value can exceed or fall
below its alarm boundaries for 30 seconds before the alarm goes off.
Using time delays cuts down on the number of active alarms and
reduces both system traffic and operator responsibility by filtering out
some nuisance alarms.
High Diff
Limit
This field establishes the value amount that is allowed above the high
limit of the acceptable range of values (deadband). This "diff" amount is
added to the value of the Setpoint Reference attribute.
The reference property value is then compared with the attribute value
to determine if a floating high-limit event has occurred.
This field establishes the value amount that is allowed below the low
limit of the acceptable range of values (deadband).
This "diff" amount is subtracted from the value of the Setpoint
Reference attribute. The reference property value is then compared
with the attribute value to determine if a floating low-limit event has
occurred.
Deadband
Object
Attribute
5. In the Browse dialog, click the object you want to highlight it.
6. Click the Select button in the Browse dialog, and the correct path and object name
will be inserted into the Object field.
7. Finally, select an attribute from the Attribute dropdown menu.
Buffer Ready
The Buffer Ready type is used only when you have attached a TrendLog object in the
Object field of the General tab. In this case, this EventEnrollment algorithm
accommodates workstation recipients who need to be notified when new records are
added to a TrendLog object, so that the records can get downloaded to each
workstation's database. (Please also see a related procedure, in Chapter 17, Configuring
TrendLogs, for configuring algorithmic notifications for a TrendLog.)
326 TAC
Event State
Last Time
Stamp
Indicates the times of the last event notifications for the three listed
conditions.
To OffNormal
Indicates the last time that the event transitioned to the OffNormal state.
To Normal
Indicates the last time that the event transitioned to the Normal state.
To Fault
Indicates the last time that the event transitioned to the Fault state.
Command Prioritization
In a building control system, an object may be manipulated by any number of different
applications. Each such application program has a well-defined function it needs to
perform. When the actions of two or more application programs conflict with regard to the
value of an objects property, a decision process must be implemented to determine
which application has priority.
Commandable Properties
In a BACnet system, a prioritization scheme is used to assign varying levels of priorities
to object properties (referred to as commandable properties). At present, the objects
that have commandable properties are:
Object
Commandable Property
Analog Output
Present_Value
Binary Output
Present_Value
Multi-state Output
Present_Value
Analog Value
Present_Value
Binary Value
Present_Value
Multi-State Value
Present_Value
Each of these objects is responsible for acting upon its commandable property in
accordance with a command priority list.
Application
Priority Level
Application
Manual-Life Safety
Available
Automatic-Life Safety
10
Available
Available
11
Available
Available
12
Available
Critical Equipment
Control
13
Available
Minimum On/Off
14
Available
Available
15
Available
Manual Operator
16
Available
328 TAC
For interoperability between BACnet systems, it is necessary that all BACnet devices
implement the same priority scheme. In CyberStation, this requirement is implemented by
incorporating the 16 priorities in the BACnet Preferences dialog.
The standard command priority list is reflected in a dropdown menu on the Value column
of the CyberStation BACnet Preferences dialog:
The seven applications that require BACnet command priority level assignments are:
CyberStation programs
Command Line
Editor
ListView
web.Client
Other
Pinpoint
CAUTION
The assignment of BACnet command priorities described in the following
steps should only be accomplished by the system administrator.
InfinityOutput
Software-Defined
InfinityDateTime
Storage location where the current system time and date are available
InfinityNumeric
InfinityString
BinaryInput
MultistateInput
AnalogOutput
BinaryOutput
MultistateOutput
AnalogValue
BinaryValue
MultistateValue
Point Values
Maps to BACnet
InfinityInput
AnalogInput
Digital
BinaryInput
Counter, supervised
MultistateInput
Voltage, Current
AnalogOutput
Digital
BinaryOutput
Tristate
MultistateOutput
InfinityOutput
InfinityNumeric
AnalogValue
BinaryValue
MultistateValue
InfinityString
No equivalent
InfinityDateTime
No equivalent
330 TAC
InfinityInput
AnalogInput
One of the Infinity points, PhotoCell, did not map because it did not fit the BACnet profile
for an AnalogInput.
InfinityOutput to BinaryOutput
The point-mapping table shows that an InfinityOutput point maps to a BACnet
BinaryOutput object. An example of this relationship is show below:
Andover Continuum CyberStation Configurators Guide 331
InfinityOutput
BinaryOutput
In the above example, only the FanStart InfinityOutput point mapped to a BinaryOutput
object. Neither the ValueControl point (an analog type) nor the TriStateValue point (a
multistate type) fit the BACnet profile for a BinaryOutput.
InfinityNumeric to AnalogValue
The point-mapping table shows that an InfinityNumeric point maps to a BACnet
AnalogValue object. An example of this relationship is shown below:
332 TAC
InfinityNumeric
AnalogValue
In this example, all four InfinityNumeric points fit the BACnet profile AnalogValue objects.
Andover Continuum BACnet objects, on b3, bCX1 (40x0 series), and b4920 devices, as
third-party devices would see them. However, if your system has no third-party devices,
but does have b4920, bCX1 (40x0 series), and b3 controllers, there would normally be no
reason to view them as BACnet objects in the BACnet Devices portion of the Continuum
Explorer navigation pane.
Although the combined Infinity/BACnet view is enabled by default, you would normally
configure, view, and work with Andover Continuum BACnet-compliant controllers and
their objects using the Infinity Controller Only view option via the Explorers View
dropdown menu, described earlier in this chapter. That is, you would view and work with
InfinityController and InfinityInfinetCtlr objects, instead of b4920, bCX1 (40x0 series), and
b3 BACnet Device objects. You would view and work with InfinityInputs, InfinityOutputs,
and InfinityNumeric points, instead of AnalogInput/Output/Value objects, Binary
Inputs/Outputs/Value objects, and MultistateInputs/Outputs/Value objects.
Note: Although you would view and work with them on the Andover Continuum side, you
still must find and save them into the BACnet side for proper configuration and
operation. See the section, Post-Installation System Integration, earlier in this
chapter.
If you are viewing third-party BACnet devices, you may also find out which objects and
services are supported for the device, using the Details tab of the Device editor,
described earlier in this chapter.
New BACnet objects on a b4920, bCX1 (40x0 series), or b3 controller are created from
Infinity point editors that is, entirely from the Infinity view. Before creating BACnet
objects as InfinityInputs, InfinityOutputs, and InfinityNumerics, you will have:
Installed and commissioned a new Andover Continuum b4920 or bCX1 (40x0 series)
controller in the system. (See Appendix A for information on commissioning a new
controller.)
Created and fully configured one or more InfinityController objects. (See Creating an
InfinityController Object in Chapter 7.)
Within the Explorer, selected Find New BACnet Devices to locate the new
controllers. (This is described earlier in this chapter.)
334 TAC
For example, assume that you have created an InfinityInput point called Fan1Status, and
that it was assigned to a sensor that would supply electrical-current input signals to the
controller. It would therefore have been assigned Voltage in the Elec Type field of the
InfinityInput editors Settings tab. (See InfinityInput Settings Tab in Chapter 13.) In the
BACnet view, if you were to decide to use it, this InfinityInput point would map, as an
AnalogInput, to the corresponding BACnet Device object that corresponds to the b4920,
bCX1 (40x0 series), or b3 controller.
If you decide to use the BACnet view, once you have configured and saved the object,
you may view it from its BACnet device, as follows:
1. Click the + next to the BACnet devices icon
2. Click the + sign next to the Andover Continuum BACnet controller device icon
expand it.
3. An AnalogInput BACnet folder should appear beneath the device icon. Click the
folder to open it:
to
4. The Fan1Status InfinityInput object that you created should appear in the Explorers
viewing pane, as an AnalogInput:
Editor
You use the BACnet AnalogInput editor to refine the object (created as an InfinityInput on
a b4920, bCX1 (40x0 series), or b3 controller or as an AnalogInput on a third-party
BACnet device). It represents analog values such as voltage, current, temperature, and
so on. This editor has five tabs that let you type in or select information, or in some cases
supply you with data.
Note: The Triggers and Advanced Alarms tabs are unselectable (appear gray) for all
BACnet objects because they are enabled only for CyberStation/Infinity objects only.
Also, the Basic Alarms tab is supported for BACnet objects attached to third-party
BACnet devices, not for objects attached to Andover Continuum b4920, bCX1 (40x0
series), and b3 controller devices.
AnalogInput General Tab
The General tab has several properties for which you provide values, and a few
properties that will be set by the control system.
Value
Units
Update
Interval
Description
Device Type
Out of Service
Check this checkbox to put this object out of service so that it loses
communication with its attached device. Putting the object out of
service is a good way to test the object and the functions that rely on it.
You can simulate various situations by manually changing the value or
reliability attributes. This allows you to see how associated functions
react to these changes.
Format
Status
336 TAC
Event State
Displays the value of the To State attribute which is set by the control
system. If you have set up this object to report alarms, this attribute
displays Normal when the object is not in an alarm state and
OffNormal when it is. If you have not set up the object to report
alarms, this attribute always displays NORMAL.
Acknowledge
Received For
COV
Increment
High Limit
338 TAC
Enter a high limit for the object. Check the Enable checkbox to the
right to enable the high limit. The high and low limits establish
boundaries for the object value. When the object value exceeds the
high limit, or falls below the low limit, the alarm goes off.
Low Limit
Enter a low limit for the object. Check the Enable checkbox to the right
to enable the low limit.
Time Delay
Enter a time delay in seconds. The time delay postpones the alarm for
the amount of time you specify. For example, you may decide that the
object value can exceed or fall below its boundaries for 30 seconds
before the alarm goes off. Using time delays cuts down on the number
of active alarms and reduces both system traffic and operator
responsibility.
Dead Band
Enter a dead band value. The dead band value establishes a range,
known as a dead band, within the high and low limits. This range is
used to define a subset of acceptable, or normal, values. The dead
band value that you supply is subtracted from the high limit, and added
to the low limit. The resulting values form the high and low ends of the
range of normal values.
Report
Notification
Type
Event
Notification
Graphic
Browse for the graphic panel program file that you want to display
when the object goes into an alarm state.
Program
Browse for the program that you want to run when the object goes into
an alarm state.
340 TAC
Alarm Points
Alarm points allow any expression alarm that you attach on this tab to
reference up to four "alarm points," named Point 1, Point 2, Point 3,
and Point 4. Using alarm points saves you the trouble of having to
change the expression (via the Algorithms tab of the AlarmEnrollment
editor for that alarm object) every time you attach an expression alarm
to a different point. For complete information, please see the section,
Using the Alarms/Advanced Alarms Tab of an Object Editor, in
Chapter 10.
Video
Video Points
Video points allow you to assign cameras to doors and points and
configure parameters that control video images, via VideoLayout
objects, during alarm conditions. When the alarm goes off, a video
layout is launched (if a VideoLayout object has been configured to
work with video points) and displays the "video point" camera images
in the its video image frames. In the Video Points dialog, you may
also configure a camera to record a video clip, for specified number of
seconds, when the alarm goes off.
For complete information on this field, and how to use Video Points,
please see the section, Using the Alarms/Advanced Alarms Tab of an
Object Editor, in Chapter 10. See also Chapter 25, Configuring and
Viewing Video.
To attach a security level to this point, locate the security level in the Name column and
click the radio button next to it.
To detach a security level from this point, locate the security level in the Name column
and double-click the radio button to remove the black dot it contains. Or you can right
click the security level in the Name column to bring up a popup menu. Click Clear
Selection in the popup menu.
BACnet AnalogOutput
Editor
An AnalogOutput is a BACnet object that is created with the InfinityOutput editor. (See
Chapter 13) They can also be learned in from a third-party device, or created via the
AnalogOutput editor. AnalogOutputs are associated with BACnet devices.
Note: The Triggers and Advanced Alarms tabs are unselectable (appear gray) for all
BACnet objects because they are enabled only for CyberStation/Infinity objects
only. Also, the Basic Alarms tab is supported for BACnet objects attached to thirdparty BACnet devices, not for objects attached to Andover Continuum b4920,
bCX1 (40x0 series), and b3 controller devices.
When you create an InfinityOutput object for an Infinity b4920 or bCX1 (40x0 series)
controller, or an Infinity Infinet b3 series controller, and select an analog electrical type via
the Settings tab of the InfinityOutput editor, a BACnet AnalogOutput is created. (Refer to
Chapter 13.)
AnalogOutput General Tab
The General tab has several attributes that you can provide values for, and a few
attributes that are set by the control system. Many fields on this tab are also view-only.
342 TAC
Present Value
This field displays this object's present value that the current priority
(the priority level that appears in the Present Priority field) is currently
commanding to this object. This field is non-editable.
Present
Priority
Command
Value
This field is used for setting the value of the analog output at the
default command priority displayed in the Command Priority field. By
default, the command priority is set to the command value established
in the BACnet Preferences dialog. The default is Manual Operator. If
you have access permission, you may change the value in this field for
this command priority level.
Command
Priority
This field displays the default command priority value that is used
when setting and relinquishing the value. By default, this field is set to
the command value established in the BACnet Preferences dialog.
This field is non-editable.
Set
Click this button to assign the new value (the value that you just
changed in the Command Value field) to this object.
Relinquish
Click this button to relinquish the non-NULL value of the priority level
that appears in the Command Priority field.
Note: Relinquishing the value means changing it to NULL, so that the
next higher-numbered priority level that holds a non-NULL value
begins to command its value to the object.
From the Command Priority tab, your administrator may relinquish
values at all command priorities.
Units
Description
Device Type
Enter the type of device that is connected to this analog output object.
Update
Interval
Out of Service
Check this checkbox to put the object out of service, so that it loses
communication with its attached device. Putting the object out of
service is a good way to test the object and the functions that rely on it.
You can simulate various situations by manually changing the value or
reliability attributes. This allows you to see how associated functions
react to these changes.
Format
Status
344 TAC
Reliability
It no longer commands a value to this BACnet object at the select priority level.
When first configuring your system, also remember to set the value in the Relinquish
Default field, located at the bottom of this tab. This default value is commanded to the
object when all priority level values are relinquished (in other words, when they become
all NULL). This protects against users who inappropriately click the Relinquish button on
the General tab and/or on this tab.
See the subsection, Application Priority Assignments, earlier in this chapter, for command
priority levels.
Present Value
This field displays the objects present value that the current priority
(the priority level that appears in the Present Priority field) is currently
commanding to this object. This field is non-editable.
Present
Priority
Command
Value
This field is used for setting the value of the analog output at the
default command priority displayed in the Command Priority field. By
default, this field is set to the command value established in the
BACnet Preferences dialog. The default is Manual Operator. If you
have access permission, you may change the value in this field for this
command priority level.
Command
Priority
This field displays the default command priority level value. By default,
this field is set to the command value established in the BACnet
Preferences dialog. From this field's dropdown menu, you may
change this level's value, which appears in the Command Value field.
Also, from the Command Priority dropdown menu, you may select
any other priority level, and also change its value.
Set
Click this button to assign the new value (the value that you just
changed) to this object at the corresponding command priority.
346 TAC
Relinquish
Click this button to relinquish the non-NULL value of the priority level
that appears in the Command Priority field.
Note: Relinquishing the value means changing it to NULL, so that the
next higher-numbered priority level that holds a non-NULL value
begins to command its value to the object.
To relinquish any level's value, first use the Command Priority
dropdown menu to select the priority level whose value you want to
relinquish, then
click Relinquish.
Priority Array
Window
This window contains the BACnet priority array a list of the names
of all 16 BACnet protocol command priority levels, along with the value
that each level in the array is currently commanding.
Relinquish
Default
Editor
An AnalogValue is a BACnet object that is created via the InfinityNumeric editor. (Refer to
Chapter 13.) They can also be learned in from a third-party device, or created via the
AnalogValue editor. AnalogValues are associated with BACnet devices.
Note: The Triggers and Advanced Alarms tabs are unselectable (appear gray) for all
BACnet objects because they are enabled only for CyberStation/Infinity objects
only. Also, the Basic Alarms tab is supported for BACnet objects attached to thirdparty BACnet devices, not for objects attached to Andover Continuum b4920,
bCX1 (40x0 series), and b3 controller devices.
When you create an InfinityNumeric point for an Infinity b4920 or bCX1 (40x0 series)
controller, or an Infinity b3 series controller, and select AnalogValue in the BACnet
Object Type field of the InfinityNumeric editors General tab, a BACnet AnalogValue is
created. (Refer to Chapter 13.) AnalogValue points are temporary storage locations in the
controllers memory that store floating-point numbers.
AnalogValue General Tab
With the exception of Units (discussed below) the remainder of items on this tab is
covered under AnalogOutput General Tab.
Units
Select a unit from the dropdown menu. When displayed next to the value,
as in 72 Degrees F, or 17 Employees, units help users understand what
the point is doing.
Format
Editor
A BinaryInput is a BACnet object that is created via the InfinityInput editor, or on thirdparty devices. They can be learned from a third-party device, or created via the
BinaryInput editor. BinaryInputs are associated with BACnet devices.
Note: The Triggers and Advanced Alarms tabs are unselectable (appear gray) for all
BACnet objects because they are enabled only for CyberStation/Infinity objects
only. Also, the Basic Alarms tab is supported for BACnet objects attached to thirdparty BACnet devices, not for objects attached to Andover Continuum b4920,
bCX1 (40x0 series), and b3 controller devices.
When you create an Infinity Input point for an Infinity b4920 or bCX1 (40x0 series)
controller, or an Infinity b3 series controller, and select a digital/binary electrical type on
the Settings tab of the InfinityInput editor, a BACnet BinaryInput point is created.
Typically, these inputs are used to detect whether a particular piece of equipment, like a
fan or a pump is running or idle. The ON state usually indicates the equipment is running,
whereas the OFF state usually indicates the equipment is idle.
348 TAC
Value
Description
Device Type
Out of Service
Status
Reliability
Inactive Text
Enter text for an inactive state. This text is displayed as the value when
the binary input is in the inactive state.
Active Text
Enter text for an active state. This text is displayed as the value when
the binary input is in the active state.
Polarity
Active Time
Change of State
350 TAC
Active Time
Elapsed Time Shows the number of seconds since the point's status
changed from Inactive to Active.
Last Reset Shows the date and time the elapsed time was last reset.
Reset Elapsed Active Time on Next Save For the controller reset the
Elapsed Active Time the next time data are saved, check this checkbox.
Change of
State
Value Changed at Shows the date and time the state last changed.
Change-of-State Count Shows you how much time the state has
changed.
Last Reset Shows the time when this count was last reset to zero.
Reset Change-of-State Count on Next Save For the controller reset
the Change of State Count the next time data are saved, check this
checkbox.
Acknowledgement
Received For
Alarm Where
Value Is
Report
Time Delay
Notification Type
Event Notification
352 TAC
BACnet BinaryOutput
Editor
Enter text for an inactive state. This text will help future operators
determine the meaning of values for this point.
Active Text
Enter text for an active state. This text will help future operators
determine the meaning of values for this point.
Minimum On
Time
Enter the minimum time in seconds that the point will remain active
after it has been changed to active.
Minimum Off
Time
Enter the minimum time in seconds that the point will remain inactive
after it has been changed to inactive.
Polarity
354 TAC
Select the inactive entry or the active entry from the dropdown menu.
The object must equal this value for an alarm to occur. (These
selections represent text set in fields on the Settings tab.)
Editor
A BinaryValue is a BACnet point object that is created via the InfinityNumeric editor, or on
third-party devices. They can be learned from a third-party device, or created via the
BinaryValue editor. BinaryValues are associated with BACnet devices.
Note: The Triggers and Advanced Alarms tabs are unselectable (appear gray) for all
BACnet objects because they are enabled only for CyberStation/Infinity objects
only. Also, the Basic Alarms tab is supported for BACnet objects attached to thirdparty BACnet devices, not for objects attached to Andover Continuum b4920,
bCX1 (40x0 series), and b3 controller devices.
When you create an InfinityNumeric for an Infinity b4920 or bCX1 (40x0 series) controller,
or an Infinity b3 series controller, and select BinaryValue in the BACnet Object Type
field of the InfinityNumeric editor's General tab, a BinaryValue is created if the Infinity or
Infinet controller on which it resides was created as a BACnet device. (Refer to Chapter
13.) Typically, BinaryValues are used as control system parameters that have only one of
two possible values that you define.
Editor
A MultistateInput is a BACnet object that is created via the InfinityInput editor, or on thirdparty devices. (Refer also to Chapter 13.) They can be learned from a third-party device,
or created via the MultistateInput editor. MultistateInputs are associated with BACnet
devices.
When you create an InfinityInput for an Infinity controller, and select a multistate
(Supervised) electrical type, via the Settings tab of the InfinityInput editor, a BACnet
MultistateInput is created if the controller on which it resides was created as a Andover
Continuum BACnet-compliant device specifically:
356 TAC
In these cases, a MultistateInput is created with three states: On, Off, and Trouble. See
also the subsection, MultistateInput States Tab.
Note: For third-party BACnet devices that become part of the Andover Continuum
system, MultistateInput objects were already created as objects on those thirdparty BACnet controllers. Therefore, Continuum Explorer already lists these objects
as MultistateInputs within third-party devices.
Controllers have channels for sensors. A channel in this case is an area in the controller
that can be physically connected to a sensor. A sensor is a device that measures and
reports on specific environmental factors, such as temperature, humidity, water pressure,
and air flow.
MultistateInput values represent one of a specific set of possible states that you define.
Each state that you define has its own numeric value. The state text is what users see as
the objects value.
Note: The Triggers and Advanced Alarms tabs are unselectable (appear gray) for all
BACnet objects because they are enabled only for CyberStation/Infinity objects
only. Also, the Basic Alarms tab is supported for BACnet objects attached to thirdparty BACnet devices, not for objects attached to Andover Continuum b4920,
bCX1 (40x0 series), and b3 controller devices.
358 TAC
Number of
States
This is an integer that defines the number of states for this object. The
number must be greater than zero.
State Text
With the exception of Alarm Values and Faults Values (described below) the remainder
of the properties on this tab is covered under the AnalogInput editor.
Alarm Values
This list specifies the states that the MultistateInput must equal before
a ToOffnormal event is generated. This is required if intrinsic reporting
is supported by this object.
Fault Values
As an option, this list specifies the states that the MultistateInput must
equal before a ToFault event is generated. If it becomes equal to any
of the states in the list, and no physical fault has been detected, then
Reliability (General tab) has the value, MultistateFault. This is
required if intrinsic reporting is supported by this object.
360 TAC
BACnet MultistateOutput
Editor
Refer to BinaryOutput General Tab for a description of all the properties that appear on
this tab.
362 TAC
Each state listed in the State Text field has a its own text and numeric value beginning
with 1:
1 <= value <= number of states
Number of
States
This is an integer that defines the number of states for this object. The
number must be greater than zero.
State Text
This specifies the value that the MultistateOutput must equal for an
alarm to occur.
Editor
A MultistateValue is a BACnet object that is created, and assigned state values, via the
InfinityNumeric editor and third-party BACnet devices. (Refer also to Chapter 13.) They
can be learned from a third-party device, or created via the MultistateValue editor.
MultistateValues are associated with BACnet devices. When you create an
InfinityNumeric for an Infinity controller and select MultistateValue in the BACnet Object
Type field of the InfinityNumeric editor's General tab, a BACnet MultistateValue is created
if the controller on which it resides was created as an Andover Continuum BACnet device
specifically:
party BACnet devices, not for objects attached to Andover Continuum b4920,
bCX1 (40x0 series), and b3 controller devices.
Creating and Assigning State Values for a
MultistateValue
As mentioned on the previous page, on an Andover Continuum b4920, bCX1 (40x0
series), or b3 controller, you create a MultistateValue object as an InfinityNumeric point.
For example:
As shown above, on the General tab of the InfinityNumeric editor, select MultistateValue
from the BACnet Object Type fields dropdown menu. Enter a value, in the Value field,
and select the corresponding units of measure from the dropdown menu in the Units
field.
A MultistateValue, when it is created as an InfinityNumeric, can have a wide variety of
different sets or clusters of values. In addition to assigning an integer or floating-point
numeric value and units, you may also assign such things as days of the week, or
months of the year, or other non-numeric (text) state values. In the Value field, when you
enter a non-numeric text value, such as Monday, CyberStation searches its internal
System Value Cluster (SVC) tables for the cluster of states to which Monday belongs
in this case, a cluster that lists seven states (index 17). In the MultistateValue editor,
you may change the Present Value field of the General tab to select another cluster
member. (See the subsection, MultistateValue General Tab.)
An InfinityNumeric that has been designated as a MultistateValue can also be assigned a
value cluster that resembles a binary object. For example, it can have three states
(index of 3) with state values of On, Off, and On. Or, it can have two states with state
Andover Continuum CyberStation Configurators Guide 365
values of Active and Inactive. Entering On or Inactive in the Value field triggers an
automatic search to the CyberStation SVC tables, for the appropriate multistate cluster
member. Those values are then reflected in the MultistateValue object editor.
CAUTION: You must assign a value for multistate objects (in this case, a cluster type) in
the InfinityNumeric editor. You may reassign a state (a member of a cluster) in a
Multistate editor, but you cannot assign a cluster itself. If you do not assign a value in the
InfinityNumeric editor, then by default, the MultistateValue is assigned a dummy value of
State-1 with an index of 256 State-1 through State-256.
MultistateValue General Tab
Refer to BinaryOutput General Tab for a description of all the items that appear on this
tab. (Note that this tab does not have the Device Type field that appears on the
BinaryOutput and MultistateOutput General tabs.)
MultistateValue States Tab
If the MultistateValue was created as an InfinityNumeric for an Andover Continuum
b4920, bCX1 (40x0 series), or b3 controller, the States tab reflects the multistate cluster
value that you entered on the General tab of the InfinityNumeric editor. For example, if
you entered Wednesday, the cluster representing days of the week is shown in the
MultistateValue editor. The integer 7 appears in the Number of States field, and the
values Sunday through Saturday appear in the State Text field. As mentioned earlier in
366 TAC
this section, in the InfinityNumeric editor, you can assign a wide variety of different
clusters of values.
Note: On third-party BACnet devices, you can also load and unload BACnet programs
via the Program Editor, depending on whether the third-party device supports these
capabilities. You cannot load and unload programs on Andover Continuum BACnet
devices.
The properties on the General tab are compliant with the BACnet standard.
If an InfinityProgram object is created on a b4920, bCX1 (40x0 series), or b3 controller
via the Plain English IDE then the program can be viewed in two places in the
CyberStation system because:
b4920, bCX1 (40x0 series), and b3 controllers exist as Infinity controller and
InfinityInfinet controller objects, respectively, on the "Infinity side" of the system. In
this case, the program is an InfinityProgram object.
b4920, bCX1 (40x0 series), and b3 controllers also can be viewed as Device objects.
In this case, the program is a BACnet Program object.
368 TAC
Note: Refer to the Plain English Language Reference Guide, 30-3001-872, for complete
details on the IDE.
The Program Editor General Tab
The General tab provides you with the following information, some are read only and
others you fill in.
Program State
This status line displays the current state of the process executing the
BACnet program. One of the following values is displayed:
Idle The process is not executing
Loading The program is being loaded
Running The program is currently executing
Waiting The program is waiting for some external event.
Halted The program is halted because of some error condition.
Unloading The program has been requested to terminate.
Reason for
Halt and
Description of
Halt
These status lines display a numeric error code, a text value, and a
text description, of an error that has caused the executing program to
halt. (It also tells you when the program is executing normally.)
Reason for Halt The Reason for Halt status line displays an
integer plus one of the following values:
Normal The program is not halted due to any error condition.
Load Failed The program could not complete loading.
Internal The program is halted by some internal mechanism.
Program The program is halted by a program-change request.
Other The program is halted for some other reason.
Description of Halt The Description of Halt field displays a userwritten text description (originating in the local BACnet device on which
the application program resides) that accompanies to the error code
and value displayed in Reason for Halt.
Program
Location
Instance of
Displays the local name (originating in the local BACnet device) of the
program being executed. The content of what is displayed is defined
locally.
Load and
Upload
Run
Restart
Halt
Description
Out of Service
Check this checkbox if you wish to put this program out of service
(disable it). You must check this box while the program is running.
When it is out of service, it loses communication with its attached
device. It is a good way to test the program and the processes that rely
on it.
Status
Displays one of four flags that indicate the general status of the
program. Three of the flags are associated with the values of other
properties of this object. A more detailed status could be determined
by reading the properties that are linked to these flags. The four flags
are:
In_Alarm The program is in an alarm state.
Fault The program is in a fault state.
Overridden The program has been overridden by a mechanism
that is local to the corresponding BACnet device.
Out_Of_Service The program is in an out-of-service (disabled)
state.
Reliability
370 TAC
Configuring
Schedules
and Calendars
15
The Schedule editor allows you to create Continuum Infinity and/or BACnet Schedule
objects. A schedule is essentially a collection of scheduled events that typically
determine, for example, when equipment runs, processes occur, personnel have access
to an area, doors are locked or unlocked, and so on. A schedule comprises standard
days and user defined standard days, such as holidays. A schedule also includes
BACnet exception schedules, special calendar entries based on the BACnet Calendar
object, which Continuum supports. These Calendar entries can be single days, a range of
days, or recurring days, in accordance with the BACnet standard. You can therefore
create or reference Calendar object values and integrate them into a Schedule object.
This chapter covers:
Schedule Views
The Schedule editor presents yearly, weekly, and daily views. To see each view, simply
click the Yearly, Weekly, or Daily tab, respectively:
372 TAC
To move to the next/previous year, week, or month, click the right-arrow button (next) or
left-arrow button (previous) at the top of the respective tab.
On these various views, there are scheduled events for standard days and user-defined
standard days, as well as exception schedule calendar entries. Continuum supplies only
one default user-defined day Holiday. You may create other user-defined standard
days. The standard days, Monday through Friday, appear in one default color (light blue)
while the weekend standard days, Saturday and Sunday, appear in another default color
(medium blue). The user-defined day, Holiday, appears in red, by default.
Note: You may change the color of a standard or user-defined day when you edit one of
these days.
Note: To see more of the schedule events on the weekly and daily views, increase the
size of your Schedule editor window, as you would increase the size of any
Microsoft window.
The Standard Days tab lists the Weekly Schedule tree (Monday through Sunday) as
well as the User Defined Days tree (Holiday by default, plus any other user-defined
standard day you create). For more information, see: Working with Standard Days and
User-defined Days, later in this chapter.
374 TAC
The Exception tab lists the Exception Schedule tree, which includes calendar entries
(single days, ranges of days, recurring days) that have been assigned (selected) or
referenced. The Exception Schedule tree includes user-defined standard days. For
more information, see: Working with Exception Schedules, later in this chapter.
Note: An exception-schedule entry is sometimes based on the BACnet Calendar object,
which Continuum supports, in accordance with the BACnet standard. These
Calendar object values can be integrated into a Schedule object. (See Calendars
and the Calendar Editor, later in this chapter.)
Note: To see more of the entries in the Exception and Standard Day trees, increase the
size of your Schedule editor window, as you would increase the size of any
Microsoft window.
Configuration
You configure all Schedules, both for Infinity and BACnet controllers, using the
Configuration tab. The attributes on this tab define a schedule, when and where it takes
effect, when it is enabled or disabled, how it is downloaded to a controller, and so on.
When you create a Schedule object on a BACnet controller, such as an Andover
Continuum b4 controller, the Infinity-related attributes on the Configuration tab are not
visible. Likewise, when you create a Schedule object on an Infinity controller, the
BACnet-related attributes are not visible. For more information, see: Configuration Tab,
on the next page.
Note: When you create a Schedule object on a BACnet controller, such as an Andover
Continuum b4 controller, the Infinity-related attributes in the Schedule editor, such
as some attributes on the Configuration tab, are not visible. Likewise, when you
create a Schedule object on an Infinity controller, the BACnet-related attributes are
not visible.
Note: When you make changes to standard days in a schedule, they take effect globally
for all years within the schedule and affect all objects set by that schedule.
Current State
The Current State tab, which is visible only for a BACnet controllers Schedule object,
displays information about the value of the current event. For more information, see
Current State Tab later in this chapter.
Configuration Tab
Use the Configuration tab to configure schedules, both for Infinity and BACnet
controllers. The attributes on this tab define a schedule, when and where it takes effect,
when it is enabled or disabled, how it is downloaded to a controller, and so on.
Note: When you create a Schedule object on a BACnet controller, such as an Andover
Continuum b4 controller, the Infinity-related attributes on this tab are not visible.
Likewise, when you create a Schedule object on an Infinity controller, the BACnetrelated attributes are not visible.
The Configuration tab attributes on a BACnet controller are shown on the next page.
376 TAC
The following table provides descriptions of attributes that appear on the tab for a
Schedule object created on a BACnet controller.
Editor Attribute
Meaning
Description
Clear Past
Events
Check this box when you need to delete BACnet special events
that no longer impact an exception schedule. This may become
necessary to conserve memory in controllers on your system
when updated exception schedules are sent to controllers.
By default, this box is not checked. When you check this box,
save the Schedule, and re-open the editor, the box is checked.
Important things to know about this feature:
Editor Attribute
Meaning
Of the four types of exception choices (Date, Range of Dates,
Recurrence, and Calendar Reference) only Date and Range of
Dates may be automatically removed.
Newly created exceptions that take effect and expire in the
past are removed immediately Exception entries that meet
the above criteria are automatically removed from view either
when the box is initially checked or when the editor opens with
the box already checked. If you inadvertently add new exceptions
whose expiration dates are in the past (more than three days old)
these expired events will also be removed from view the next
time the editor opens.
In all cases, the exception value is written as it appears in the
view when you click the OK or Apply button.
In addition to using this checkbox, you can also conserve
memory by creating partial-day exception schedules. See
Partial-Day Exception Schedules, later in this chapter.
Effective
From/To
Priority
378 TAC
Editor Attribute
Meaning
Time Scale
Default Data
Type
Schedule Default
Value
Value Type
This section (enabled only for devices that support the BACnet
standard revision 2004 and higher) displays a default value/type
for the entire schedule when no other value is assigned. That is,
the scheduled default is used as a "last resort" for the present
value when no other exception or weekly scheduled event is in
control. Check the NULL checkbox to relinquish control of a
commanded property when no scheduled events are in effect.
Note: When you set the Default Data Type (see above) the
schedule default value type is set to that default data type
automatically.
Note: The Schedule Default value also works with partial-day
exception schedules. Please see Partial-day exception
schedules , later in this chapter.
Editor Attribute
Meaning
Value
Value Type
Object Property
List
380 TAC
This window lists BACnet objects that are set by this schedule.
To add a schedule to the list, click the Add button and from the
Search for an object property reference dialog, search for and
select an object, then click the Select button. The selection
appears in the list. To remove an object from the list, highlight it in
the list, then click Delete.
The following table provides descriptions of attributes that appear on this tab for a
Schedule object created on an Infinity controller.
Editor Attribute
Meaning
Description
State
Point
Configuration
In the Occupancy field, enter the path or click the browse button
to search for Infinity DateTime point that designates when the
schedule becomes active. In the Unoccupancy field, enter the
path or click the browse button to search for an Infinity DateTime
point that designate when the schedule becomes inactive. In the
Occupancy Point field, enter the path or click the browse button
to search for the InfinityNumeric or InfinityOutput object that will
be set by this schedule.
A schedule is used to turn the object on (active) or off (inactive).
Time Scale
Events
Note
382 TAC
Editor Attribute
Meaning
Automatic
Schedule
Download
Check this checkbox, and select a day and time, to download this
schedule's values automatically from the workstation database to
the controller on which this schedule was opened. Use the day
dropdown menu to select a day.
To select a time, click and highlight the hours, minutes, seconds,
or AM/PM field to select the hour, minute, second, and AM/PM,
you want the automatic download to occur. Use the up and down
arrows to move to the previous hour/minute/second and to select
AM or PM.
Action
Overview
Overview
Using the Exception tab, you may create and/or reference a BACnet exception schedule
to your Schedule object. An exception schedule is a special schedule entry that is
sometimes based on the BACnet Calendar object, which Continuum supports. These
exception entries can be single days, a range of days, recurring days, or a referenced
Calendar object, in accordance with the BACnet standard. You can therefore integrate
Calendar object values into a Schedule object.
Note: Exception schedules can also be partial days, as of the implementation of the
BACnet protocol revision 4. That is, you can create two or more exception
schedules for the same day. See also Partial-day exception schedules, later in this
chapter.
Note: You may not use a recurring-day entry or referenced Calendar-object exception
entry for a schedule created on an Infinity controller only a BACnet controller.
The Exception tab lists the Exception Schedule tree, which includes single days,
ranges of days, recurring days, and referenced calendar days that have been assigned
Andover Continuum CyberStation Configurators Guide 383
(selected). This includes the assignment of user-defined days, as well as any new
exception entry that you create or reference via the Exception Schedule tree.
2. In the Entry Type section, select one of the following radio buttons:
Date
Range of dates
Recurrence
Calendar Reference
Notice the data fields on the right side of the dialog are different for each selection.
Note: The Recurrence and Calendar Reference radio button selections do not
appear for a Schedule on an Infinity controller.
3. Enter the desired information in the data fields on the right side of the dialog. These
fields are self-explanatory.
384 TAC
Note: For year, month, day, and day of week, you can select "any," as opposed to a
specific selection. To do so, check the respective Any checkboxes. Also, for
Month, you may use the dropdown menu to select Odd Months or Event
Months, as opposed to a specific month.
For range, enter a starting and ending date.
For recurrence, enter a recurring weekday for a particular month. For example, if you
were defining "Thanksgiving," you could choose Last, Thursday, and November.
For a calendar reference, click the Calendar Reference Object field's browse
button. The Select an object dialog appears. Search for and select the Calendar
object (on a BACnet controller) that you want to reference and integrate into your
Schedule object. Click the Select button. The Calendar object path appears in the
Calendar Reference Object field.
4. Select either the Time Value List radio button (when you want to add one or more
unique time values to apply to the new entry) or the User Defined Standard Day
radio button when you want select the time value of an existing user-defined day,
such as Holiday.
If you select Time Value List, go to step 5. If you select User Defined Standard
Day, go to step 6.
5. Click the Add button. The Time Value dialog appears:
In the Time field, select a time at which you want this entry's event to apply a value
hour, minute, second.
Note: If you want to use BACnet time fields (in which you can specify a specific time or
any time) check the BACnet Time Fields checkbox. There are four BACnet time
fields. From left to right, enter the hour, minute, second, and hundredth of
second. To enter any hour, any minute, any second, or any hundredth of second,
enter the word "Any" in the desired field.
In the Value field and Value Type field (schedule on a BACnet controller) enter a value
and value type. For example, on a BACnet controller, for a temperature value, you could
enter a real number and select Real from the Value Type field's dropdown menu. For
example, you could enter a text value, then select Character String as a value type.
Andover Continuum CyberStation Configurators Guide 385
In the Notes field, describe the entry's event. These notes, along with the values, appear
in the weekly and daily views. Click OK. The time/value entry appears in the Time Value
List window in the Special Event dialog.
Repeat this procedure if you want to apply two or more times/values for this entry. For
example, you may create one time/value to raise the temperature at 7:00 a.m. to 70
degrees, and another to lower the temperature at 9:00 pm to 55 degrees.
386 TAC
CAUTION: Too many exception-entry events scheduled on one day can create
time/value conflicts. If this happens, the following warning appears on the Daily tab,
as well as the Weekly tab for each conflicted day:
There are too many events in this day. Please double-click
to see details.
Double click over this warning on the Daily or Weekly tab. The Time Values for Day
dialog appears, displaying a list of times/values for events scheduled on that day.
Note: The values you select are applied to the attached objects listed in the Object
Property List (BACnet controller) on the Configuration tab. On an Infinity
controller, values are applied to the InfinityNumeric or InfinityOutput point
specified in the Occupancy Point field on the Configuration tab.
Note: You may also access the Time Value dialog (and create a new exception
event) by clicking in the time margin or a non-event slot in the Daily or Weekly
tab. The Time Value dialog accessed from those tabs asks for a start-time
event, as well as an end-time event. For example:
"Rest of the day" end time As described above, when you access the Time
Value dialog on the Daily or Weekly tab, and you are asked to specify both a start
time and an end time. Here you have the option of specifying a midnight end time by
checking the Rest of the day checkbox. Check this box when this event needs to be
active for the remainder of the day. It also saves you the time of filling in the End
time fields.
Again, if you want to use BACnet time fields (in which you can specify a specific time
or any time) check the BACnet Time Fields checkbox.
Go to step 7.
Andover Continuum CyberStation Configurators Guide 387
6. From the dropdown menu, select the user-defined standard day whose value you
want to apply to this new entry.
Note: The values you select are applied to the attached objects listed in the Object
Property List (BACnet controller) on the Configuration tab. On an Infinity
controller, values are applied to the InfinityNumeric or InfinityOutput point
specified in the Occupancy Point field on the Configuration tab.
7. In the Event Priority field of the BACnet Special Event dialog, select a BACnet
command priority (1...16) from the dropdown menu. This priority is useful if there are
exception schedule event conflicts. For more information on BACnet command
priority, see the Help topic, Working with Command Priorities, in your Continuum
online help, and Chapter 14, BACnet, and your BACnet Standard.
8. In the Name field, enter a name or description of the day, range, recurrence, or
referenced entry. This name appears for this entry in tree.
9. Click OK. The new entry is added to the tree.
Note: At this point, you may right click the Daily or Weekly tab and from the popup
menu and select the number of minutes with which you want to partition an
hour in the daily and weekly views. Selections are: 5 minutes, 6 minutes, 10
minutes, 15 minutes, 30 minutes, 60 minutes. (This is known as the Time
Scale, which you may also set on the Configuration tab.) The time scale
applies to the entire schedule.
For example, if you select 15 Minutes, four time slots (demarcated by gray lines) appear
within each hour in the daily and weekly views throughout the schedule. For example, if
you select 5 Minutes, 12 time slots (demarcated by gray lines) appear within each hour in
the daily and weekly views.
388 TAC
For example, take a classroom that is normally controlled by a weekly schedule, where
the room is occupied from 9:00 a.m. to 3:00 p.m. But suppose that one particular
Wednesday a special lab takes place from 6:00 to 8:00. Before revision 2004, if an
exception schedule were added to allow this room to be occupied from 6:00 to 8:00 on a
particular Wednesday, that exception would also need to specify the room as occupied
from 9:00 to 3:00 because all Wednesday's normal events would be overridden.
Partial-day scheduling removes that limitation. When an exception event ends, control
can be passed back to the weekly schedule. In the classroom example, this allows you to
specify an exception entry only from 6:00 to 8:00. You can pass control from the
exception back to the weekly schedule by specifying a special value (NULL) in the
exception's time value list. In the classroom case, it means that the exception could look
like this:
6:00 a.m. - Specify the value (for example, turn on heat or light) that makes the room
occupied.
8:00 a.m. - Specify the value that makes the room not occupied.
6:00 a.m. - Specify the value that makes the room occupied.
8:00 a.m. - Specify the value that makes the room not occupied.
Exception 2
9:00 a.m. - Specify the value that makes the room occupied.
3:00 p.m. - Specify the value that makes the room not occupied.
value. Instead, the exception can just specify the NULL value and cause the schedule
default to take control because there are no weekly events at 8:00 a.m.
390 TAC
Overview
Overview
The Schedule editor, by default, supplies weekly standard days (Monday through
Sunday). These standard days are listed on the Standard Day tab, in the Weekly
Schedule tree.
You may modify any weekly standard day. Within each standard day, you add and edit
events, specifying the time these events become active and inactive during the day, as
well as values for these events for example, temperature values, on/off switches, and
so on.
Note: For schedules on an Infinity controller, an event value can only be either on
(active) or off (inactive). However, on a BACnet controller, you may apply many
different types of event values for example, real numbers, character strings,
arrays, Boolean values, and so on, and change these values during the course of a
day, as needed.
Event information, including notes on and the current state of each event, appears within
the daily and weekly calendar view of a weekly standard day.
Also on the Standard Day tab, in the User Defined Day tree, you may create userdefined standard days. Only one user-defined standard day is supplied by default
Holiday.
Note: When you edit standard days and user-defined standard days, you make global
changes that affect all weeks of all years within that schedule, and all objects that
are attached to that schedule.
minute, second, and hundredth of second. To enter any hour, any minute, any
second, or any hundredth of second, enter the word "Any" in the desired field.
In the Value field and Value Type field (schedule on a BACnet controller) enter a
value and value type. For example, on a BACnet controller, for a temperature value,
you could enter a real number and select Real from the Value Type field's dropdown
menu. For example, you could enter a text value, then select Character String as a
value type.
Note: The Value Type field is not available for a schedule on an Infinity controller.
Value field choices on an Infinity controller are Active and Inactive (on/off).
For a schedule on a BACnet controller, choices for Value Type are:
Boolean
Unsigned Integer
Signed Integer
Enumerated
Date
Time
Character String
Real
BACnet Object Identifier
Double
Octet String
Bit String
Check the NULL checkbox to relinquish control of a commanded property when no
scheduled events are in effect.
In the Notes field, describe the entry's event. These notes, along with the values, appear
in the weekly and daily views.
Click OK. The event appears in the Event List window in the standard day dialog.
Repeat this procedure if you want to apply two or more time/value events for this entry.
For example, you may create one time/value to raise the temperature at 7:00 a.m. to 70
degrees, and another to lower the temperature at 9:00 pm to 55 degrees.
Note: The values you select are applied to the attached objects listed in the Object
Property List (BACnet controller) on the Configuration tab. On an Infinity
controller, values are applied to the InfinityNumeric or InfinityOutput point specified
in the Occupancy Point field on the Configuration tab.
Note: You may also access the Time Value dialog (and create a new event) by clicking
in the time margin or a non-event slot in the Daily or Weekly tab. The Time Value
dialog accessed from those tabs asks for a start-time event, as well as an end-time
event. For example:
Andover Continuum CyberStation Configurators Guide 393
"Rest of the day" end time As described above, when you access the Time
Value dialog on the Daily or Weekly tab, and you are asked to specify both a start
time and an end time. Here you have the option of specifying a midnight end time by
checking the Rest of the day checkbox. Check this box when this event needs to be
active for the remainder of the day. It also saves you the time of filling in the End
time fields.
5. Check the Apply events to all weekdays in weekly schedule checkbox to copy this
weekday's events to all other weekdays.
6. Click OK.
The standard day changes appear throughout the Schedule editor.
Note: At this point, you may right click the Daily or Weekly tab and from the popup
menu select the number of minutes with which you want to partition an hour in
the daily and weekly views. Selections are: 5 minutes, 6 minutes, 10 minutes,
15 minutes, 30 minutes, 60 minutes. (This is known as the Time Scale, which
you may also set on the Configuration tab.) The time scale applies to the
entire schedule.
For example, if you select 15 Minutes, four time slots (demarcated by gray lines) appear
within each hour in the daily and weekly views throughout the schedule. For example, if
you select 5 Minutes, 12 time slots (demarcated by gray lines) appear within each hour in
the daily and weekly views.
394 TAC
Note: The Value Type field is not available for a schedule on an Infinity controller.
Value field choices on an Infinity controller are Active and Inactive (on/off).
For a schedule on a BACnet controller, choices for Value Type are:
Boolean
Unsigned Integer
Signed Integer
Enumerated
Date
Time
Character String
Real
BACnet Object Identifier
Double
Octet String
Bit String
Check the NULL checkbox to relinquish control of a commanded property when no
scheduled events are in effect.
In the Notes field, describe the entry's event. These notes, along with the values, appear
in the weekly and daily views.
Click OK. The event appears in the Event List window in the Standard Day dialog.
Repeat this procedure if you want to apply two or more time/value events for this entry.
For example, you may create one time/value to raise the temperature at 7:00 a.m. to 70
degrees, and another to lower the temperature at 9:00 pm to 55 degrees.
CAUTION: Too many exception-entry events scheduled on one day can create
time/value conflicts. If this happens, the following warning appears on the Daily tab,
as well as the Weekly tab for each conflicted day:
There are too many events in this day. Please doubleclick to see details.
Double click over this warning on the Daily or Weekly tab. The Time Values for Day
dialog appears, displaying a list of times/values for events scheduled on that day.
Note: The values you select are applied to the attached objects listed in the Object
Property List (BACnet controller) on the Configuration tab. On an Infinity
controller, values are applied to the InfinityNumeric or InfinityOutput point
specified in the Occupancy Point field on the Configuration tab.
Note: You may also access the Time Value dialog (and create a new event) by
clicking in the time margin or a non-event slot in the Daily or Weekly tab. The
396 TAC
Time Value dialog accessed from those tabs asks for a start-time event, as
well as an end-time event.
5. Click OK.
The user-defined standard day changes appear throughout the Schedule editor.
Note: At this point, you may right click the Daily or Weekly tab and from the popup
menu select the number of minutes with which you want to partition an hour in
the daily and weekly views. Selections are: 5 minutes, 6 minutes, 10 minutes,
15 minutes, 30 minutes, 60 minutes. (This is known as the Time Scale, which
you may also set on the Configuration tab.) The time scale applies to the
entire schedule.
For example, if you select 15 Minutes, four time slots (demarcated by gray lines)
appear within each hour in the daily and weekly views throughout the schedule. For
example, if you select 5 Minutes, 12 time slots (demarcated by gray lines) appear
within each hour in the daily and weekly views.
The Exception Schedule tree also lists these days as an exception range of days,
with its range icon. (See: Working with Exception Schedules, earlier in this chapter)
398 TAC
To select (highlight) an entire week, click to the left of that week (to the left of Sunday
"S" of that week).
Meaning
Present Value
Displays the present value of the current event. This can be of any
BACnet time/value type. (See Working with Exception Schedules
and Working with Standard and User-defined Days.)
Reliability
Status Flags
Transition Time
Editor Attribute
Meaning
(change) from one value to another.
Following Displays the day/time, following the next transition,
that objects will transition (change) from one value to another.
Note: See also Proprietary Schedule Properties for Programs,
below.
SetValue
Identifier
Meaning
PreviousTransitionTime
512
NextTransitionTime
513
FollowingTransitionTime
514
These properties are unsigned integer values, each giving a date and time expressed as
the number of seconds.
Plain English, which specifies the behavior of Program objects, can compare these times
with the present time and compute time intervals.
In a Plain English program, the value of the each property would be specified as follows:
ScheduleName PreviousTransitionTime
ScheduleName NextTransitionTime
ScheduleName FollowingTransitionTime
400 TAC
where ScheduleName is the name of the Schedule object, whose event start and stop
times are being computed.
Each transition indicates a scheduled change in the value of the Schedule's
Present_Value property. These values are stored as, and can be read or written as,
InfinityDateTime objects.
Note: In a Plain English program, the ReadProperty function can be used to retrieve the
values of these properties. (These properties are read-only.)
When determining a transition, time-value pairs that specify the same value as the
Schedule's PresentValue (that do not change the value) are not considered transitions.
Similarly, if two or more time-value pairs have the same time, only the last pair with that
time is used for determining a transition.
For more information on Plain English, please see the Plain English Language
Reference, 30-3001-872, and the Continuum online help.
When you click the Copy button, the tabs become visible, as shown below:
To expand and retract the width of the Mass Create/Mass Change tabs, place your
cursor on the left border of the tab area until it becomes a double-arrow cursor. Drag this
cursor left or right to expand or retract, respectively. When the tab area covers part of the
Yearly, Weekly, or Daily view, as shown above, use the horizontal scroll bar to see the
right side of the view.
To close the Mass Create/Mass Change tab area, click the X button, located in the
upper-right corner of the tab area.
As the tab indicates, there are three general steps for populating a schedule:
Note: If your schedule is created on a BACnet controller, BACnet devices are listed.
Likewise, if it is created on an Infinity controller, Infinity devices are listed.
3. In the list, highlight (select) one or more controllers with which you want to populate
this schedule. Also:
To select them all, right click a controller and choose Select All from the popup
menu.
To deselect them all, right click a controller and choose Select None from the popup
menu.
To remove entries from the list, highlight them and click the Remove button. (Or you
may right click an entry, and select Remove Devices from the popup menu.)
Adding a controller to the list To add device entries to the list, click the Add button
(or right click an entry and select Add Devices).
The Selection dialog appears.
Note: As an alternative you may also drag and drop device objects from Continuum
Explorer to the member object list window.
From the Selection dialog, search for and select the device objects you want to add.
Use the Objects of type dropdown menu to select the object class you want to add:
InfinityController, InfinityInfinetCtrl, or Device. Only objects of that object class type
appear. (For Infinity schedules, the Device object is not available in this dropdown menu.)
Click the Select button. The paths of the newly added objects appear in mass-create list.
Note: In the Selection dialog, you may use the network view button, folder-view button,
and other buttons, as well as the Folder dropdown menu to expose the tree (as
you would in Continuum Explorer) to adjust view of directory paths and available
objects.
Click the Populate button (Step 3). The schedule is copied to the selected devices in the
list.
Note: Look at the Status column in the list in Step 2. For each list member, this column
states whether the population process has succeeded or failed.
If the process fails If the process fails, some possible explanations are:
The schedule contains a Calendar object reference and you are attempting to
populate a BACnet controller that does not support Calendar objects.
You are attempting to copy a schedule to your own controller (the one on which the
schedule was created).
You are attempting to copy a schedule to a controller that does contain the objects
listed in the Object Property List of the Configuration tab (BACnet) or that does
contain the attached Occupancy Point object of the Configuration tab (Infinity).
As the tab indicates, there are three general steps for updating a schedule:
404 TAC
1. On the Mass Change tab, in the search field of Step 1 (Search for schedules to
update), use the wildcard asterisk to enter an alphanumeric string contained in the
paths of schedules that need to be updated. For example, *sched* would list all the
controllers whose paths have the string "sched".
Note: If you want to list all schedules, and not narrow the list, leave this field blank
(with just the asterisk).
2. Click the Search button.
Based on what you enter in the search field, schedule paths are listed under the
Device column in the window of Step 2, and the names of those Schedule objects
listed under the Schedule Name column.
3. In the list, select one or more schedules you want to update. Also:
To select them all, right click in the list and choose Select All from the popup menu.
To deselect them all, right click in the list and choose Select None from the popup
menu.
To remove entries from the list, highlight them and click the Remove button. (Or you
may right click an entry, and select Remove Devices from the popup menu.)
To edit any schedule in the list, right click the schedule you want to edit, and select
Edit Schedule from the popup menu (or simply double click the schedule).
The Schedule editor for that schedule appears with its current (last-saved)
configuration. If at any time you wish to return to the original (previous) original
schedule, click the Return to path at the bottom, beneath Step 3.
Adding a schedule to the list To add schedule entries to the list, click the Add
button (or right click an entry and select Add Schedules).
The Selection dialog appears.
Note: As an alternative, you may also drag and drop Schedule objects from
Continuum Explorer to the member object list window.
From the Selection dialog, search for and select the Schedule objects you want to
add.
Only objects of object class type, Schedule, appear.
Click the Select button. The paths of the newly added objects appear in masschange list.
Note: In the Selection dialog, you may use the network view button, folder-view
button, and other buttons, as well as the Folder dropdown menu to expose the
tree (as you would in Continuum Explorer) to adjust view of directory paths and
available objects.
4. Click the Update button (Step 3).
Your schedule configuration overwrites the configurations of the selected schedules
in the list.
Andover Continuum CyberStation Configurators Guide 405
Note: Look at the Status column in the list in Step 2. For each list member, this
column states whether the update process has succeeded or failed.
A single-day
A range of dates
A recurrence of a day
You create a Calendar object on an Infinity b4920, b40xx series, or b3 controller, in the
Infinity view of the Continuum Explorer. A Calendar object, like other BACnet objects on
the Continuum system, is placed in both an Infinity Calendar class folder beneath the b4,
b40xx series, or b3 controller, and in a BACnet Calendar class folder beneath its
corresponding b4, b40xx series, or b3 controller in the BACnet view.
Note: In the BACnet view, you may create a Calendar object on a third-party BACnet
device, but not on an Andover Continuum BACnet device.
Note: Some BACnet controllers support a Schedule but do not support a Calendar.
Others support both objects. Infinity legacy (non b4 and b3) controllers support
Schedule objects, but not Calendar objects.
406 TAC
The Date List tree lists all established dates single days, ranges of days, and recurring
days and identifies them in the list with the following icons:
Single day
Range of days
Recurring days
Note: Dates listed in the Date List appear in light blue on the calendar. If you select a
day in the Date List, it appears in yellow on the calendar.
The Present Value field displays the current value of the Calendar object.
Enter a description of the Calendar object in the Description field.
Adding and Removing a Single Day via Calendar Click You may add a single day
to the Date List by clicking once on an individual day on the calendar. The single day
entry immediately appears in the Date List.
Andover Continuum CyberStation Configurators Guide 407
Note: When you add a day in this way, notice its entry is not named in the Date List. To
name it, right click its new Date List entry, and from the Calendar Entry dialog,
enter a name in the Name field. (Or in the tree, you may simply click inside its
empty name field and enter a name the way you would for a file in Microsoft
Windows Explorer.)
Note: You may also use the yearly calendar to assign two or more individual (non
consecutive) dates. Hold down the CTRL key, and click (highlight) the individual
days you wish to assign. Right click, and proceed as described, above.
You may also remove a day by clicking once on a single established "red" or "blue" day
on the calendar. When you do so, you are asked:
Do you want to remove all calendar entries that reference this date?
Click Yes to remove the date or No to keep it.
Adding Calendar Entries via Calendar Entry Dialog Add a single day, range of
days, or recurring days, using the Calendar Entry dialog. To add an entry:
1. Click the New Calendar Entry button, or right click an entry in the Date List, and
select New Calendar Entry.
The Calendar Entry dialog appears.
2. In the Entry Type section, select one of the following radio buttons.
Date
Range of dates
Recurrence
Notice the calendar data fields on the right side of the dialog are different for each
selection.
3. Enter the desired information in the calendar data fields on the right side of the
dialog. These fields are self-explanatory.
For range, enter a starting and ending date.
Note: You may also use the yearly calendar to assign a range of days. In the yearly
view, click and hold the mouse button on the first day of the range (for
example, February 15). Drag the cursor on the calendar to the last day of the
range (for example, February 22). The range (February 15...22) is highlighted.
Enter a name by editing its calendar entry in the Date List.
For recurrence, enter a recurring weekday for a particular month. For example, if you
were defining "Thanksgiving," you could choose Last, Thursday, and November.
4. In the Name field, enter a name or description of the day, range, or recurrence entry.
This name appears for this entry in the Date List.
5. Click OK. The new entry is added to the Date List.
408 TAC
Editing or Removing an Entry via Date List To edit an existing entry, right click the
entry, and select Edit from the popup menu. The Calendar Entry dialog appears for that
entry. Modify the data as needed.
To remove an entry from the Date List tree, right click the entry, and select Remove from
the popup menu. The entry is immediately removed from the tree and the calendar view.
410 TAC
Configuring
Loops
16
Overview
A Loop is a BACnet standard object that allows you to create a feedback system without
manually creating or editing Plain English code. The loop feedback system is comparable
to cruise control for a car. Just as cruise control automatically adjusts variables to
maintain the desired speed, the loop object automatically adjusts input values to achieve
the desired setpoint and remain at the setpoint indefinitely. The ultimate goal is for the
input to reach the setpoint in the shortest amount of time possible. It does so by using a
PID (Proportional, Integral, and Derivative) control algorithm.
The controller obtains the value of the input when it polls the current value of the input
reference (sensor, valve, and so on.). Then, the controller uses the PID algorithm to
adjust the input to come as close as possible to the setpoint. The result of the PID
algorithm determines an output that is then assigned to the output reference, or an object
whose values control such things as sensors and dampers. The controller continues to
alter the value of the output to maintain the input value at the value of the setpoint.
The error, or the difference between the input value and the setpoint value, is used to
adjust the output value. The PID algorithm uses the error's value to measure how much
the loop should be adjusted. The Tuning tab gives you the opportunity to adjust these
values or to tune the loop to fit your particular preference.
You create a Loop-object feedback system using the Loop editor and its tabs. Using the
General tab, you can monitor and alter the current state of the loop. The Tuning tab also
contains a dynamically updating graph that displays loop, output, input, and setpoint
values as they change over time. This tab is interactive because you can tune the loop
and customize the graph to your liking.
This chapter presents the following topics:
General Tab
Tuning Tab
What Is PID?
Andover Continuum CyberStation Configurators Guide 411
General Tab
The General tab allows you to view and/or alter the current state of the loop object.
Note: All output-reference, setpoint-reference, and input-reference values are references
to objects that were originally created either as points on Andover Continuum
controllers, or as BACnet objects on third-party BACnet controllers.
412 TAC
Meaning
Description
Units
From the dropdown menu, select the type of units desired for the
output value.
Present Loop
Value
Displays the result of the most recent PID calculation. This value
is used to set the output reference object and the priority defined
by the present pool priority.
Present Output
Value
Present Loop
Priority
Present Output
Priority
Output Reference
Input Value
Input Reference
Select the object from which the loop obtains the current value.
Using the browse button, search for and select the object. Then
select an attribute from the dropdown menu. The attributes that
appear in the menu vary, according to the object that is selected.
Index
Editor Attribute
Meaning
Setpoint
If you prefer to enter a specific setpoint value for this loop, select
this radio button. When you select this button, the field enables
and the Setpoint Reference fields (see below) disable.
In this Setpoint field, you can only enter numeric values.
Numbers with decimals are acceptable entries.
Setpoint Reference
Index
Update Interval
Enter the time (in milliseconds) the PID loop should wait before
re-evaluating its output.
Note: Do not make this value too small because you want to
give the environment a chance to react to the output.
If the loop updates the output too frequently, the equipment can
burn out. Check the manufacturer's recommendations to avoid
causing harm to the equipment.
Out of Service
414 TAC
Editor Attribute
Meaning
Status
Reliability
The Controlled_Variable_Reference or
Manipulated_Variable_Reference properties reference an
AnalogInput or AnalogOutput, where the Channel (Infinity
property) is not configured. This causes the Out_Of_Service
property for the AnalogInput or AnalogOutput to always have a
value of True, which in turn causes the Loop's Reliability
property to have a value of OpenLoop.
Editor Attribute
Meaning
Note: The editor only shows the Priority Array attribute in the Input and Setpoint
Reference dropdown menus if the reference is an AnalogValue. The dropdown
menu also displays all attributes that are float values; therefore, it might show
attributes that the controller does not support.
Tuning Tab
The Tuning tab contains all the PID (proportional, integral, derivative) loop variables. It
also contains a dynamically updating graph that displays loop, output, input, and setpoint
values as they change over time.
This tab is interactive. That is, you can tune the loop and customize the graph to your
liking.
Before Version 1.73, Continuum users created Plain English programs to set the PID
gain constants and tune the loop. Now you can accomplish these tasks via the Tuning
tab. (See also What Is PID? later in this chapter.)
416 TAC
Editor Attribute
Meaning
Loop Value
Output Value
Input Value
Setpoint Value
Editor Attribute
Meaning
Maximum Loop
Value
Enter the maximum value that the PID algorithm can assign to the
loop. If the output should never go above a certain value, set the
limit in this field.
Minimum Loop
Value
Enter the minimum value that the PID algorithm can assign to the
loop. If the output should never go below a certain value, set the
limit in this field.
Poll Frequency
Sample Size
Select the intervals of time for the X axis. The maximum sample
size is 10; the larger the sample size, the more points the graph
displays.
Note: Non-default values that you select for Poll Frequency and Sample Size take
effect immediately, as you manipulate a live graph in real time while the Loop
editor is open. Non-default values cannot be saved they revert back to the default
values when you close the Loop editor because these attributes are technically
not part of the Loop object. When you change these values, the Apply button
does not become selectable.
The Graph
The graph displays the effects the PID algorithm has on the input,
output, and setpoint values. The graph dynamically shows how
the values you assign to the proportional, integral, and derivative
constants alter the value of the loop.
To start the graph, right click the graph and select Start from the
popup menu.
Double-click the graph (or right click the graph and select
Maximize from the popup menu) to maximize the graph into its
own separate window.
You can also customize the graph configuration by right clicking
the graph and selecting the Display from the popup menu.
Capturing the Graph: You may capture a screenshot of the
current graph (create a graphic file) by right clicking the graph
and selecting Save Screenshot. This feature makes it easy to
distribute the graph to others and to illustrate documents.
See Customizing the PID Graph, later in this chapter.
Proportional
Specify the value for the proportional constant in the Value field
and select the type of units from the dropdown menu
Integral
Specify the value for the integral constant in the Value field and
select the type of units from the dropdown menu.
Derivative
Specify the value for the derivative constant in the Value field and
select the type of units from the dropdown menu.
418 TAC
Editor Attribute
Meaning
Error
This field displays the difference between the input and the
setpoint.
Last Error
This field displays the previous difference between the input and
the setpoint.
Bias
The bias is the amount of the initial value of the output reference.
If the PID algorithm produces a value of X, then the final value of
the loop will be X plus the bias. For example, if the valve starts at
10% open, as opposed to 0, you have to add that initial value (the
bias) to the value of the loop.
Action
What Is PID?
Note: In order to tune a loop, you should already have some experience with PID and
feedback loops.
PID control refers to three types of control actions that are used in the process of
modulating equipment, such as valves, dampers, and variable-speed devices. It is
essentially a balancing act between the Proportional, Integral, and Derivative controls to
reach the desired setpoint. These three types of controls are defined as follows:
Proportional - Control based on how far the input is away from the setpoint.
Integral - Control based on the average error over time. (The error is the
Derivative - Control based on how quickly the input is approaching the setpoint.
PID control combines the three types of control actions, which improve control accuracy
and lessens the time it takes for the input to reach the setpoint.
Note: The input is also referred to as the controlled variable because it is the
environmental factor you want to control.
Proportional Control
Proportional control produces a control signal based on the difference between an actual
condition and a desired condition for example, the difference between the actual
temperature and the setpoint. The controller sends a signal that is directly proportional to
this difference, or the error. (the difference between the input and the setpoint). Although
Andover Continuum CyberStation Configurators Guide 419
simple and fast, proportional action alone produces a small amount of error, or an
"offset," which prevents the system from reaching the desired setpoint. The Proportional
control algorithm is as follows:
Proportional = Kp * Err
where Kp is the Proportional Gain and Err is the error (the difference between the input
and the setpoint)
where Output is the output of the controller, Kp is the Proportional Gain, Err is the error
(the difference between the input and the setpoint), Ki is the Integral Gain, Err is the
sum of errors since the error became greater than the threshold, Time is the change in
error since the last PID update, Kd is the Derivative Gain, Err is the change in error
since the last PID update, and the Bias is the offset adjustment parameter.
420 TAC
Tuning Process
Note: In order to tune a loop, you should already understand PID and have some
experience with feedback loops.
The most common method for tuning the loop is the process of trial and error that is,
tuning while observing the response to setpoint changes. After specifying
objects/attributes for the Output, Input, and Setpoint sections on the General tab,
perform the following procedure.
To tune a PID loop using the Loop editor, follow this procedure:
1. Modulate the output. That is, determine how often the controller should update the
output. Enter a value in the Update Interval field on the General tab
2. Set the action of the output reference. Select either Direct or Reverse from the
Action field's dropdown menu on the Tuning tab.
3. If you wish to enter an initial value for the output reference, insert the value in the
Bias field on the Tuning tab.
4. Enter the PID gain constants into the corresponding fields on the Tuning tab.
One way to ensure a steady control is to enter a value in the Proportional field and
leave the Integral and Derivative values at 0. After you see the resulting output
change on the graph and in the other fields on the Tuning tab, modify the integral
and derivative gains until you achieve the result you want. Try entering the initial
integral value for the integral gain and reduce the value until you achieve a steady
loop. Do the same for the derivative value.
Note: The value of the proportional gain constant is usually 1.0 or below.
Eliminate the bias when the output is being ramped from the start point. The ramping
acts as a slowly increasing bias.
Eliminate the Derivative gain PID control loops that produce setpoint reset signals.
For example, eliminate the derivative gain if a room temperature control loop resets
the supply air temp setpoint or VAV flow setpoint. It is important to reset setpoints
smoothly and slowly to reduce erratic secondary control responses.
Some control loops cannot be accurately tuned by simply manipulating gain factors.
There are other factors that influence the accuracy of control loops. Some of these
factors are as follows:
o The controlled device (or output reference), such as a damper or a valve,
must be sized properly.
o The difference between the controlled variable and the controlled
medium cannot be too extreme. For example, the control loop could be
compromised if you are attempting to control a reheat coil for a 70degree leaving air temp when the hot water supply temperature is 210
degrees and the entering air temperature is 68 degrees.
o The sensor SPAN must be small enough to be sensitive to the
application while no conditions fall outside the range's minimum and
maximum values.
o The sensor position should be in a location that best represents the
average of the application. For example, duct temperature sensors
should not be located close to heating coils to avoid heating by radiation.
422 TAC
424 TAC
The following table describes the attributes of the four major sections of the dialog.
Editor Attribute
Meaning
Graph Properties
X-Axis Properties
Y-Axis Properties
426 TAC
On the Tuning tab, click the hyperlinked colored text of the plot you wish to configure:
Loop Value
Output Value
Input Value
Setpoint Value
Right click the graph, and select Plot Properties. The Graph Configuration dialog
appears.
Depending on which plot you want to configure, select one of the following from the
popup menu:
Input Value
Setpoint Value
Loop Value
Output Value
Using the navigational tree on the left-hand side of the dialog, you can expand Plot, and
switch from one plot configuration to another.
The following table describes the attributes of the four major sections of the dialog.
Editor Attribute
Meaning
Plot Properties
Line Properties
Change the color of the line by clicking the browse button and
then selecting a specific color from the dialog. Click the OK
button to finalize the change.
Assign a style to the line by selecting an option from the
corresponding dropdown menu.
Specify the width of the line by clicking the up and down arrows
or by entering the number manually.
Point Properties
Change the color of the point by clicking the browse button and
then selecting a specific color from the dialog. Click the OK
button to finalize the change.
Assign a style to the point by selecting an option from the
corresponding dropdown menu.
Specify the width of the point by clicking the up and down
arrows or by entering the number manually.
Border Properties
428 TAC
The information here determines when the alarm will go off, and what happens when it
does. Information that determines what happens when the alarm goes off is built into the
EventNotification object that you associate with this alarm. The EventNotification object
defines how and to whom the alarm is broadcast.
Editor Attribute
Meaning
Event State
Editor Attribute
Meaning
Acknowledge
Received For
COV Increment
If the difference between the present value and the last present
value of the loop is greater then the COV increment, an alarm is
sent.
Error Limit
Enter an error limit for the object. If the current error exceeds the
set error limit, an alarm is sent.
Time Delay
Report
430 TAC
The Alarm option triggers the basic alarm when the object's
Event State changes to OffNormal.
The Return To Normal option triggers the basic alarm when
the object's Event State changes to Normal
The Fault option triggers the basic alarm when a local device
detects a fault.
Editor Attribute
Meaning
Notification Type
Event Notification
The Advanced Alarms tab is disabled for BACnet objects (b4, bCX1, b3, and thirdparty). They are supported for Infinity (non-BACnet) objects only. See the appropriate
Infinity object editor.
432 TAC
Configuring
Trend Logs
17
Overview
A TrendLog is an object that allows you to configure the logging of data from other
BACnet object property. You can log data on an object/property using one of these
methods:
Periodic polling of data Entries are logged via regular continuous polling of an
object/property. (See the General tab.)
Each TrendLog object has an internal buffer, stored on the controller, whereby the
TrendLog acquires data and stores it in its buffer. (See also the Data tab later in this
chapter.) When entries are added to the log, workstations can be automatically notified of
new entries, and workstations can automatically download them to their databases. (See
also the Basic Alarms tab later in this chapter.)
The records in a TrendLog object can also be run as a trend report, displayed in the
ReportViewer, after the TrendLog object is specified in the Report editor. (See Chapter
11, Configuring Reports.) It can be launched via the View Report button on the Data tab.
General Tab
On the General tab, configure basic information for this TrendLog. You also select either
of the following logging methods:
Periodic poll
Before choosing a method, perform an assessment of how the data will be changing,
how the data will be used, and how much memory each method would use for any
given application.
For frequently changing values, periodic polling provides more predictable results. If
the COV Increment in the logged object is set to 0 (the default) room temperature
readings could produce thousands of records per day. Without changing the COV
Increment of the input, periodic polling (for example, every 30 minutes - 48 records
per day) is more efficient.
Note: Be aware that the Threshold attribute (Conversions tab of InfinityInput object
editor Chapter 13) and the COV Increment property (Basic Alarms tab of
the AnalogInput, AnalogOutput, and AnalogValue editors Chapter 14) have
two different effects. Setting the Threshold higher (for example, degrees
Fahrenheit) only affects the activity of the present value. It is the setting of the
COV Increment higher that reduces the number of COV events in the logged
object.
COV is generally a better choice for binary outputs that do not change their values
more than a few times per day. With periodic polling, you may not know when the
output value changes. For example, if you set polling to occur every 30 minutes, you
know only that the output is polled every 30 minutes -- that 48 records are stored
each day, even if their value changes, for example, only three times. With COV, you
not only have three records stored but also know precisely when those records were
stored (precisely when the values changed).
Changing the COV Increment of the logged object (as opposed to changing the COV
increment of the TrendLog) is generally better for reducing network traffic. The
system filters events at the source, rather than at the TrendLog object, which may
reside on an external controller.
434 TAC
Meaning
Description
Enabled/Disabled
Logged Object
Logged Property
Editor Attribute
Meaning
Index
Change of Value
(COV)
Clear the content of the log buffer. (See the Data tab.)
436 TAC
Editor Attribute
Meaning
usually 0 or NULL.
Note: The values in these fields cannot be changed if this
TrendLog resides on an Andover Continuum BACnet
controller, only on some third-party BACnet controllers.
Periodic Poll
If you want logging to stop at a specific day and time, check this
checkbox and select a day from the dropdown menu, and use
the up/down arrow buttons to select a time. If logging is already
underway and you do not need a start time, but do want it
disabled at a specific time, do not check the Enable Start Time
checkbox.
Note: The Timed Activation settings are not based on recurring intervals. That is, you
cannot set start/stop times for each day. They simply designate one period of
time, one begin time and one end time.
Data Tab
The Data tab displays the current entries in this TrendLog, as well as general information
about the log. It also allows you to filter the logs that are displayed.
Dialog Attribute
Meaning
Record Count
Record Count
Since Creation
Displays the number of records that have been logged since this
TrendLog was created.
Filter
Last
Check the Filter checkbox when you want to limit the number of
records manually downloaded and displayed in the record list (or
"grid") on the lower half of this Data tab.
In the Last field, enter (or use the up/down arrows to select) the
number of records to download and display in the list.
Important: Do not enter a number greater than 4000. The most
recent records in a buffer are downloaded to a workstation's
database, and the number of records that can be manually
downloaded is capped at 4000. Therefore, this means that if a
buffer has more than 4000 records, the least recent records
residing in the buffer (above the 4000 record count) are never
downloaded.
Refresh Grid
438 TAC
Click this button to refresh the list of records and display the most
recent object/property values being logged.
Dialog Attribute
Meaning
Clear Records
View Report
List of records
The table in the lower half of the Data tab displays records
currently residing in the TrendLog's buffer.
TimeStamp column displays the date and time the record was
logged.
StatusFlags column displays a BACnet flag (InAlarm, Fault,
Overridden, or Out_Of_Service). These are the logged object's
status flags, and they are not always available since a controller
may or may not associate these flags with the log record. The
flags appear here when they are set (True). For example, if all the
flags are False, then the column is empty, even though the
Status_Flags property value is stored as part of that record.
LogDatum column displays the actual status message that is
logged. It could be any BACnet data type, although most
controllers only support a few basic ones. LogDatum might also
contain messages like "log-disabled," "failure," error messages,
and so on.
For more information on status flags and LogDatum, please see
the BACnet Standard.
Specifically:
Last Download Time Lists the day and time of the last time a workstation
downloaded records from the controller the database.
Last CyberStation to Log Data Lists the name of the workstation that performed
the last download.
Number of records downloaded Lists the total number of records that the
workstation downloaded during the last download.
440 TAC
Editor Attribute
Meaning
Event Notification
Notification Type
Notification Threshold
New Records
442 TAC
Editor Attribute
Meaning
To Normal / Buffer
Ready Events
Editor Attribute
Meaning
LogBuffer is entered in the Event Property field. LogBuffer represents the list
of records displayed in the Data tab in the TrendLog editor.
Buffer Ready is the Event Type, only one field, Notification Threshold, appears on
this tab.
Note: This number serves the same purpose as the Notification Threshold field in
the TrendLog editor (intrinsic method).
6. On the Delivery tab of the EventNotification editor, specify the workstations to be
notified when new records are added to the attached TrendLog.
Note: Recipient workstations listed on the Delivery tab must be up and running in
order for records to get delivered to the database. If all workstations are
CyberStations, then one CyberStation must receive the information.
See Chapter 10.
7. On the Preferences tab of the Device editor for each workstation, ensure that
preference 21, Download Extended Log data from controllers on the LAN, is set
to True.
8. For this device, perform a Send to -> Database operation.
Note: Failure to perform this step will prevent Continuum from downloading
TrendLog records.
9. During the process, in each editor, be sure to click Apply and/or OK to save your
work.
See Chapter 14 for more information on the EventEnrollment and Device editors. See
Chapter 10 for more information on the EventNotification editor.
446 TAC
Configuring
Areas and
Doors
18
Anti-Passback
Violation
Clearance Level
Condition Level
(not available for all
controllers)
Executive Privilege
(not available for all
controllers)
Global Condition
Level
(not available for all
controllers)
Invalid Attempt
448
TAC
Lockdown
(not available for all
controllers)
Passback
Request-to-Exit
(RTE) Device
Supervised Input
Tailgating
When you create Personnel objects, you assign the areas to which each person has
access. The Personnel object is then included in the People with access tab in the Area
editor, as shown in the following illustration.
450
TAC
The following diagram is an example of how areas and doors can be defined and
controlled.
Motion
Detector
Office
Lab
Glass Break
Detector
Door 4
Door 2
Door 3
Lobby
Door 1
Card Reader
Keypad
Outside
Motion
Detector
Request-toExit
In this example, Door 2 has both an entry reader and an exit reader. Personnel must
present their access cards to enter and exit the area labeled Lab. They can enter the
Office area through Door 3 by typing a code at a keypad. They can exit the Office area to
the Lobby area through Door 3 without using a card or keypad entry. They can also exit
the Office area through Door 4, which has a Request-to-Exit device.
Each Area object has a list of Door objects and a list of authorized personnel.
Each Door object is configured with an entry reader and exit reader (optional) that
associates each reader with one Area object. From the Door object, you can see
which person was the last to go through.
Andover Continuum CyberStation Configurators Guide 451
Each Personnel object has a list of Area objects to which the person is allowed
access.
Site codes and format information for access control card sets
IOU, channel and area information for entry and exit card reader and keypad inputs
452
TAC
o
o
o
o
o
o
The InfinityNumeric objects that those schedules turn on and off (optional)
Door Lock
Door
Switch
Displays whether the door has been open, closed or tampered with.
Door State
The Door Switch is a supervisory input from the door you are assigning to
the controller. The field displays Open, Closed or Trouble. Trouble
indicates that a problem, such as a cut wire or a shorted wire, is present at
the door switch.
Disabled means that no personnel access is allowed through the door.
Enabled means valid access is permitted to authorized personnel.
Operating
Mode
Note: For more information on the use of multiple custom formats with specific
controllers, see Appendix E.
Site Codes
General Code
Arm Code
Card Format
ABA Formats
454
TAC
Wiegand
Formats
Invert
Unlock on Exit
Request
Check this checkbox if you want to unlock the door every time
an exit request occurs. Otherwise, clear the checkbox.
Note: If the door is in the Lockdown state, all requests to exit
are ignored, even if this option is selected.
456
TAC
The table below summarizes the selections in the dropdown menus in these fields based
upon your switch configuration. Wiring configurations for each switch type are shown on
the following page.
Supervised Input Type
Switch Type
NOSeries
NOParallel
NOSerPar
NCSeries
NCParallel
NCSerPar
The table below summarizes the ACX781 door switch configuration options.
Supervised Inputs
1-8
9 or 10
11 or 12
1 - 32
458
TAC
NC Series
NO Series
External
Resistor
10 K
External
Resistor
10 K
AUX
or
DOOR
or
REX
AUX
or
DOOR
or
REX
Contact
Closure
Contact
Closure
RET
RET
Sensor
Switch
Position
Resistance
Value
Value
Closed
Open
Closed
Open
Shorted
Wire cut
10 K
Infinite
Zero K
Infinite
Off
On
Trouble
On
Sensor
Switch
Position
Resistance
Value
Value
Closed
Open
Open
Closed
Shorted
Wire cut
Infinite
10 K
Zero K
Infinite
Off
On
Trouble
On
No Parallel
NC Parallel
AUX
or
DOOR
or
REX
AUX
or
DOOR
or
REX
External
Resistor
10 K
Contact
Closure
External
Resistor
10 K
Contact
Closure
RET
RET
Sensor
Switch
Position
Resistance
Value
Value
Sensor
Switch
Position
Resistance
Value
Value
Closed
Open
Closed
Open
Shorted
Wire cut
Zero K
10 K
Zero K
Infinite
Off
On
Off
Trouble
Closed
Open
Open
Closed
Shorted
Wire cut
10K
Zero K
Zero K
Infinite
Off
On
On
Trouble
AUX
or
DOOR
or
REX
Contact
Closure
AUX
or
DOOR
or
REX
Contact
Closure
RET
RET
Sensor
Switch
Position
Resistance
Value
Value
Sensor
Switch
Position
Resistance
Value
Value
Closed
Open
Closed
Open
Shorted
Wire cut
5K
10 K
Zero K
Infinite
Off
On
Trouble
Trouble
Closed
Open
Open
Closed
Shorted
Wire cut
10K
5K
Zero K
Infinite
Off
On
Trouble
Trouble
Anti-Passback Control
460 TAC
Anti-Passback Type
Select the events that you want to log for this door. You can
view the logged events at the Access Events tab of the Door
editor and in the Active Event View.
Select the checkbox next to each event that you want to log.
Valid Attempts
Invalid Attempts
Exit Requests
Forced Entries
Occurs when the door switch detects that the door lock is
locked and the doors with is open, or the input is tampered
with (Trouble condition).
Door Ajar
On the XDriver tab, select a comm port from the dropdown menu for the Commport
field.
Reader IOU
Reader Channel
Keypad Channel
462 TAC
Area
Click the browse button. In the Browse dialog, select the area to
which the door gives access.
When you save the settings for this door, CyberStation
automatically assigns the door to the area you selected.
Note: Selecting an area from the Browse dialog ensures
that the full path name for the Area object is entered into
the field.
Validate Reader or
PIN
Access Validation
Validate Site
Validate Card
Validate PIN
General Code
Personnel Schedule
Reader Schedule
Reader Enable
Schedule
Department Point
464 TAC
Timed Anti-Passback
Minutes
Zone Number
Anti-Passback
Protection
Allow Entry on an
Anti-Passback
Violation
PIN Duress
Displays Card mode, Site mode and Card Mode, or PIN mode.
Last Person
Admitted
Displays the name of the person associated with the last card
number or access code used to go through the door.
Time Admitted
Displays the time the last person went through the door.
Last Persons
Department
Displays the name of the person who last attempted to enter but
was not granted access.
Entry Count
Reader Channel
Keypad Channel
Area
Validate Reader or
PIN
466 TAC
Access Validation
Validate Site
Validate Card
Validate PIN
General Code
Personnel Schedule
Reader Schedule
Department Point
Timed Anti-Passback
Minutes
Zone Number
Anti-Passback
Protection
Allow Entry on an
Anti-Passback
Violation
PIN Duress
468 TAC
Displays Card mode, Site mode and Card Mode, or PIN mode.
Last Person
Admitted
Displays the name of the person associated with the last card
number or access code used to go through the door.
Time Admitted
Displays the time the last person went through the door.
Last Persons
Department
Exit Count
Event Class
Time Stamp
Person
The name and path of the Personnel object for the person
causing the event.
Area
You can issue a lockdown message to prevent access through all doors assigned to
an area.
You can clear the Lockdown state to restore routine access to an area.
470 TAC
You can lock down and restore access to individual doors in an area that is not
locked down.
You can view the lockdown status of an area and of the doors assigned to an area.
Schedules that unlock doors or allow access with valid cards or keypad entries
Attempts to force unlock a door in the Door editor, through a Pinpoint control, or
using a Plain English program
Only personnel who are assigned executive privilege access and are assigned access
rights to the area can enter or exit through a door in the lockdown state. You select
executive privilege access and assign area access rights in the Personnel object for each
person that you want to have this access. For more information about executive privilege,
see Chapter 19.
When the Lockdown state is cleared from an area, routine access resumes at doors to
the area (if adjacent areas are also not in the Lockdown state.)
A door is not locked down when the value for ForceLock is False. The value
may be false because the controller for the door did not receive the lockdown
message, or because the controller does not support the area lockdown feature.
If a door could not respond to the lockdown message (for example, because its
controller was temporarily offline), in the General tab you can click the Lockdown
Area button to send the message again.
4. To remove the Lockdown state from the area, in the General tab, click the Clear
Lockdown Area button.
When you remove the Lockdown state, all doors to the area resume their normal
states. A door that provides access to another area that is still locked down remains
locked down until the Lockdown state is cleared from the other area.
Andover Continuum CyberStation Configurators Guide 471
A door is not locked down when the value for ForceLock is False. The value
may be false because the controller for the door did not receive the lockdown
message, or because the controller does not support the area lockdown feature.
If a door could not respond to the lockdown message (for example, because its
controller was temporarily offline), in the General tab you can click the Lockdown
Selected Doors button to send the message again.
5. To remove the Lockdown state from doors, select one or more doors, and click the
Clear Lockdown Selected Doors button.
When you remove the Lockdown state, doors resume their normal states. A door that
provides access to an area that is locked down remains locked down until the
Lockdown state is cleared from the other area.
You can quickly change the condition level at all controllers by sending a new value for
ConditionLevel from the CyberStation workstation using the Global Condition Level
dialog. This is a faster method of changing the values than manually changing the
condition level at each controller. You can also restore the previous condition level at all
controllers by selecting a ConditionLevel value of Local in this dialog.
For more information about condition levels, see Personnel Clearance Levels and
Controller Condition Levels in Chapter 19, Personnel.
You can enter a command to change the value from the command line.
You can use a Plain English (PE) program to change the value.
You can use PE script attached to a Pinpoint control to change the value.
When you use the command line or a PE program to send a value for this variable, you
must use the numeric value that corresponds to the condition level that you want to set.
Do not use a text string.
For example, if you want to use the SET command to change the value for
ConditionLevel to Level 5, use the following syntax:
SET \[pathname]\ConditionLevel = 5
474 TAC
Personnel
19
This chapter covers two major topics, the Personnel Manager and the Personnel Import
Utility. The CyberStation Personnel Manager is a powerful and easy-to use tool for
creating, viewing, and managing personnel records. The Personnel Import Utility allows
you to import third-party personnel data that was created outside of an Andover
Continuum system. It bridges the gap between other personnel databases and
CyberStation personnel records by allowing you to import and upload personnel data in
large amounts and save the imported data as CyberStation Personnel objects.
Personnel Manager
Use the CyberStation Personnel Manager for entering, viewing, and managing personnel
data:
Security access information, such as card number and a list of the areas the person
may enter.
Employee information, such as department name and number, supervisor name, and
vehicle information.
Personal information, such as name, blood type, emergency contact, height, weight,
and hair color.
The data for each person is stored in a Personnel object. In the Personnel Manager, a
Personnel object can also be referred to as a record, card, or badge because the data in
the Personnel object may be associated with any of these.
Search Capability
In the Personnel Manager, you can quickly locate Personnel objects using the built-in
search feature. You can search by criteria such as first and last names, card number, and
employee number. You can enter full or partial information for the criteria. Search results
can display thumbnail photos from employee badges, if available.
476 TAC
You can specify the areas in profiles. The areas are then assigned in any Personnel
objects created from the profile.
You can replace the areas in a Personnel object with the areas from a profile or a
personnel template.
Values for attributes marked with an asterisk (*) are required. If you try to save the
record without all required values, a warning message lists attributes that still require
entries.
If
Then
478 TAC
If
Then
If the Personnel object is associated with a template, you cannot change attribute
values inherited from that template.
5. Assign areas to this Personnel object, if needed.
Any areas that are assigned in the profile you used to create the Personnel object
are automatically assigned to the object. You can assign other areas to the object as
needed.
If you want to
Then
If you want to
Then
6. If you want to attach a schedule point to one or more areas, expand an area, and
click the icon next to Add Schedule.
The Add Schedules dialog is displayed. If needed, select the browse button next to
Schedule Points Location, and locate the folder or container with the schedule
point you want to add.
Select a schedule point. Select the areas where you want to attach the schedule
point, and click OK.
7. If you want to override this person's Default Clearance Level for an area, expand the
area, and click the icon next to Clearance Level.
In the Clearance Level dialog, enter a new value for the clearance level, and click
OK.
If the security key attached to the CyberStation workstation is not configured to view
condition levels, condition level and clearance level attributes and values are not
displayed or configurable in CyberStation. For more information about clearance
levels, see Personnel Clearance Levels and Controller Condition Levels later in this
chapter.
8. Click Apply.
9. If needed, click Add Record, select a profile, and repeat this procedure from step 4
to add another Personnel object.
10. Click OK to save changes and close the Personnel Manager.
Note: You can also locate a Personnel object that you want to edit by scrolling through
the list of Personnel objects in Continuum Explorer. You can then double click the
object to open it in the Personnel Manager and edit it as described in this topic.
Perform the following steps to search for a Personnel object.
1. In the Personnel Manager, click the New Search button, and enter search criteria.
The Personnel Manager can search for exactly what you type if you put the entry in
quotes. If you do not enter quotes, the Personnel Manager searches for records with
attributes that begin with what you type. The following table provides an example of
search criteria entered to locate a Personnel object by last name.
Typing
Searches for
Johnson
John
You can limit the number of records returned by entering a value between 1 and 50
for Maximum Results. If you do not enter a value, the Personnel Manager displays
the first 50 records that match the search criteria that you entered.
2. Click the Find Now button.
If not already checked, check the Show Thumbnails checkbox if you want to display
photos in the search results.
3. Click a name in the search results to display the record details in the Personnel
Manager.
To return to your search results, click the Search Results tab.
Then...
Then...
Note: Areas assigned from a profile or template using the Reset Access Rights
button described below do not maintain their association with the profile or
template they came from. If you later edit the profile or template, existing
Personnel objects are not affected by the changes.
3. Click Apply.
3. Expand the area that you wish to add a schedule point to.
4. Click the icon next to Add Schedule to display the Add Schedules dialog.
5. If needed, select the browse button next to Schedule Points Location, and locate
the folder or container with the schedule point you want to add.
6. Select a schedule point. Select the areas where you want to attach the schedule
point, and click OK.
7. Click Apply.
6. Click Apply.
486 TAC
5. Click OK.
Creating or Editing a Badge
To create or modify a persons badge, including layout photo, signature, and fingerprint,
perform the following steps.
1. On the General tab of the Personnel editor, click the Make/Edit Badge button. (From
the Personnel Manager, click the Create/Edit Badge button.
2. In the Badge Layout field, specify a badge layout file. Either accept the default or
click the browse button to search for and select another layout. (The default layout
must be assigned in the Preferences tab of the Device editor.
EPIDesigner Compatible with Guard Draw: In Version 1.8 and higher, the
EPIDesigner application replaces Guard Draw, which was the layout tool used in
previous versions. Guard Draw files created in previous versions are compatible with
EPIDesigner. The Badge Layout field accepts either an EPIDesigner layout (.dgn
file) or a Guard Draw layout (.gdr file). You can easily open and save your existing
Guard Draw layout in EPIDesigner. It is saved as a .dgn file.
3. Click the Edit Badge Layout button. The EPIDesigner application appears.
4. Use EPIDesigner (and its graphical layout window) to design or change the design of
this persons badge layout.
EPIDesigner Documentation: For complete instructions on how to use this
EPIDesigner application, access its online help using the Help dropdown menu in the
menu bar. Also consult the EPIDesigner 6.3 Users Guide. This manual is available
as .PDF file via your Windows Start menu. (Click Start, select Programs, select
Continuum, and then select Documentation.)
5. From the Made/Edit Badge dialog, to capture a photo, signature, or fingerprint, as
needed, double click inside the photo, signature, or fingerprint window, respectively.
488 TAC
To do so:
In the graphical layout window, select an existing graphic element or make a new
one and select it.
Select an attribute form the attribute dropdown menu, located next to Text dropdown
menu on the bottom toolbar.
The name of the attribute appears inside the selected graphic element.
EPIDesigner Documentation: For complete instructions on how to use this
EPIDesigner application, access its online help using the Help dropdown menu in the
menu bar or consult the EPIDesigner 6.3 Users Guide.
Print the current card (or multiple cards) if you wish to do so.
Printing a single card To print the current card, from the File dropdown menu on
the Make/Edit Badge dialog, select Print Card. (You may also click the Print Badge
button.) To preview the current card before printing it, select Print Preview Card
from the File dropdown menu. The Print Preview dialog appears, displaying the card
you are about to print. When you print a card you are also issuing a card.
Printing more than one card To print all cards that have not already been printed
in other words, cards that have not yet been issued select Batch Print Cards
from the File dropdown menu. This prints, or issues, all the non-printed cards. To
see all the cards that have not yet been issued, select Batch Preview Cards. The
Print Preview dialog appears. Click the right-arrow button to scroll through all the
cards, one by one, that you are about to print. Click the left-arrow button to scroll
back.
Note: At any given time, each card carries a status of Issued or Unprinted (nonissued). To find out how many cards have been issued, look at the Issued field
on the Make/Edit Badge dialog. If you want to change the status of the current
card from Issued to Unprinted, open the Tools dropdown menu, and select
Set Card Unprinted. When you set an issued card to Unprinted, the number
displayed in the Issued field is reduced by one, and that card is added to the
list on non-issued card in the Print Preview dialog.
8. Set up external card encoding if you wish to do so.
Configure your encoder settings by accessing the following dialogs:
From the Tools dropdown menu on the Make/Edit Badge dialog, select External
Card Encoder Setup. The External Encoders Setup dialog appears.
From the File dropdown menu in EPIDesigner, select Layout Properties. From the
Layout Properties dialog, select the General tab, and click the Encoding button.
The Card Encoding dialog appears.
Note: If you need instructions for configuring the settings on these dialogs, click the
Help button to access extensive online documentation, or consult the
EPIDesigner 6.3 Users Guide.
9. Set up card encoding for a printer if you wish to do so.
490 TAC
Then...
Click Close.
2. Click the Issue Temp Card button, and enter a new card number when prompted.
When clicked, the button label changes to Restore Temp Card. You can click the
Restore Temp Card button to restore card information that was saved by issuing a
temporary card.
3. Click Apply.
Searches for
Johnson
John
You can limit the number of records returned by entering a value between 1 and 50
for Maximum Results. If you do not enter a value, the Personnel Manager displays
the first 50 records that match the search criteria that you entered.
2. Click the Find Now button.
If not already checked, check the Show Thumbnails checkbox if you want to display
photos in the search results.
3. Click a name in the search results to display the record details in the Personnel
Manager.
To return to your search results, click the Search Results tab.
4. Click the Delete Record button.
5. When prompted to confirm deletion, click Yes.
6. To locate additional Personnel objects to delete, click the Search Results tab. Select
another object to delete, or perform a new search.
494 TAC
The Default Clearance Level applies to all areas that you assign to the person,
unless you choose to override this value with different values for individual areas.
The Clearance Level for areas enables you to provide different access privileges to
different areas assigned to the same person. The clearance level you assign to an
area in a Personnel object does not affect the access of other personnel with access
to the same area.
NetController II
ACX 57xx
The Condition Level variable must be enabled in the security key in order for these
controllers to use the variable and accept Condition Level values sent from CyberStation.
Typically, the controller condition level corresponds to security alert levels that your
company has established for emergencies. You use controller condition levels with
personnel clearance levels to control access during different categories of emergency. A
value of 1 for a controller condition level is the most severe alert level. A value of 255 is
the least severe. A value of 0 indicates that no condition level is in effect.
You can quickly change the condition level at all controllers by using the Global Condition
Level dialog to send a new Condition Level value to the controllers from the CyberStation
workstation. This is a faster method of changing the values than manually changing the
condition level at each controller. You can also restore the previous condition level at all
controllers using this feature.
The following figure is an example of how a new Condition Level is sent from
CyberStation changes condition levels at two controllers.
496 TAC
1 is the clearance level that allows the most access. That is, when the condition level
is 1 (most severe alert), only personnel with a clearance level of 1 who are assigned
to the area will have access.
255 is the clearance level that allows the least access. That is, the condition level
must be 255 for personnel with a clearance level of 255 to be allowed access.
Andover Continuum CyberStation Configurators Guide 497
You can use as many of these levels as you need. For example, a public facility in the
United States might define condition levels that correspond to the five levels of the
Department of Homeland Security (DHS) Advisory System, as shown in the following
table.
DHS Level
DHS Color
Condition Level
Clearance Level
Needed for Access
Severe
Red
Level_01
High
Orange
Level_02
Elevated
Yellow
Level_03
Guarded
Blue
Level_04
Low
Green
Level_05
In Personnel objects, you can specify clearance levels that correspond to these condition
levels.
The attributes displayed when a user creates, edits, or views a Personnel objects,
including attribute labels, whether attributes are required or are read only, and default
values
The areas assigned to Personnel objects, which can also include schedule points
attached to the areas, clearance levels for individual areas, and whether the area is
enabled or disabled
Profiles are similar to personnel templates. However, in addition to determining the
personnel information that is predefined, profiles enable you to have more control over
the personnel data that is entered, edited, and viewed in a Personnel object.
For example, you can assign a profile that does not display sensitive information, such as
Social Security numbers, to CyberStation users who do not need to see this information.
Users who do require this information can be assigned a profile in which sensitive
attributes are displayed. You can also specify whether attribute values are editable or
read only.
498 TAC
Any additional access rights associated with the areas, such as schedules and
clearance levels
The user can edit the area assignments and access rights as needed in the Personnel
object.
The profile assigned to the user determines:
The attributes displayed in the Details tab for the new object
Any predefined properties of the attributes, such as default entries and required
entries
Any predefined properties of the attributes, such as read-only and required entries
In Continuum Explorer, you can use the Configuration Wizard to create a Personnel
object from a template that you select. You can also drag a personnel template to a
folder containing your Personnel objects to create a new object.
In the Personnel Manager, you can create a Personnel object from a profile that has
a template assigned to it, if you have customized a profile to include the Template
attribute. In the profile, you can also specify the personnel template to use.
When you edit the Personnel object, a message is displayed in the Personnel Manager
status line indicating that a template is attached to the Personnel object. Any attribute
values that are inherited from the template are read-only in the Personnel Manager.
Attribute values copied (not inherited) from the template are editable. The profile
assigned to the CyberStation user determines which attributes are displayed, regardless
of the profile used to create the Personnel object.
If you edit a template that is already assigned to Personnel objects, any changes to
inherited attributes will automatically be changed in the Personnel objects using the
template (Template content is displayed in the Personnel editor dialog rather than in the
Personnel Manager.). Changes to attribute values that are copied (not inherited) from the
template will not change in existing Personnel objects. New Personnel objects created
Andover Continuum CyberStation Configurators Guide 499
from the edited template will include the updated values for both inherited and copied
attributes.
Assigning Areas from Personnel Profiles and Templates
In the Personnel Manager, you can quickly assign areas specified in a profile or a
template to a Personnel object. Any schedule points and clearance levels attached to the
areas are also included in the Personnel object when you add the areas. Once in a
Personnel object, you can edit the areas list as needed for the individual.
Note: Area, schedule, and area clearance levels assigned to a Personnel object from a
profile or template using the Reset Access Rights button in the Personnel
Manager completely replace any area information already in the Personnel object.
You can select one attribute at a time, or select more than one by pressing the Ctrl or
Shift key while selecting.
It is recommended that you always include First Name and Last Name in a profile,
and make these attributes required entries.
500 TAC
). The
Description
Required
Read Only
Check this checkbox to make this attribute value read only; that
is, not changeable. It is not recommended that an attribute be
both required and read only.
Default
9. Click the browse button next to Path for New Personnel, and select the folder where
you want to save Personnel objects created from this profile.
Although it is not recommended, you can save Personnel objects in Root. If you
selected a folder but want to select Root, click in the Path for New Personnel field,
and press the Delete key or the Backspace key. Root is then displayed in the field.
When you save the profile, you are prompted to confirm that you want to use Root.
Click OK to continue.
10. Click OK.
6. Click OK.
7. Click OK to save the profile.
Attaching Schedule Points to Profiles
Use this procedure to attach a schedule point to a specific area assigned to a profile.
Schedule points are associated with schedules that define specific time periods when a
person can access that area. For example, you may want to allow contractors into the
building through the lobby only between the hours of 8 A.M. and 5 P.M.
You can attach only one schedule point to an area. However, you can attach the same
schedule point to multiple areas.
1. In the Personnel Manager, click the Configure button.
If the Personnel Manager is not open, you can double click any Personnel object in
Continuum Explorer to open the Personnel Manager, and then click the Configure
button.
2. In the Configuration dialog, select the profile that you want to edit.
3. Click the Assign Area button.
4. In the Assign Areas dialog, expand Assigned.
5. Expand the area to which you want to attach a schedule point.
6. Click the icon next to Add Schedule to display the Add Schedules dialog.
If needed, select the browse button next to Schedule Points Location, and locate
the folder or container with the schedule point you want to add.
7. Select a schedule point. Select one or more areas where you want to attach this
schedule point, and click OK.
8. Click OK.
9. Click OK to save the profile.
Changing an Area Clearance Level in a Profile
Use this procedure to assign a clearance level to a specific area in a profile. When a new
Personnel object is created from this profile, the clearance level for the area is included in
the new object.
The predefined value for Clearance Level for all areas is zero, indicating that the value
entered for Default Clearance Level in the personnel attributes (shown on the Details tab)
is the clearance level used for the area. If you want personnel to have access privileges
for a certain area that are more or less restricted than the access provided by the
person's default clearance level, you can specify a different clearance level for that area.
If the security key attached to the CyberStation workstation is not configured to view
condition levels, condition level and clearance level attributes and values are not
displayed or configurable in CyberStation. For more information about clearance levels,
see Personnel Clearance Levels and Controller Condition Levels earlier in this chapter.
1. In the Personnel Manager, click the Configure button.
If the Personnel Manager is not open, you can double click any Personnel object in
Continuum Explorer to open the Personnel Manager, and then click the Configure
button.
The Configure button is disabled unless a Personnel object is currently displayed in
the Personnel Manager.
2. In the Configuration dialog, select the profile that you want to edit.
3. Click the Assign Area button.
4. In the Assign Areas dialog, expand Assigned.
504 TAC
5. Expand the area for which you want to change the clearance level.
If the Personnel Manager is not open, you can double click any Personnel object in
Continuum Explorer to open the Personnel Manager, and then click the
Configuration button.
The Configure button is disabled unless a Personnel object is currently displayed in
the Personnel Manager.
2. In the Configuration dialog, select the profile that you want to delete.
3. Click the Delete button.
4. When prompted to confirm deletion, click Yes.
5. Click OK.
If the profile you deleted was assigned to any users, assign another profile to the
users as described in Assigning a Profile to a User. If you do not assign another
profile, the profile selected in the configuration settings is used.
506 TAC
3. In the Display Name column, edit attribute names as you want them to appear in the
Personnel Manager.
The Attribute column contains attribute names as they are defined in the
CyberStation program. These names are not editable.
4. Check the corresponding Limit Allowable Values checkbox for each attribute whose
values you want to limit.
If you select this option, users must select a value for the attribute from a dropdown
list whose entries you define. Users cannot enter values that are not in the list. For
example, you can check the Limit Allowable Values checkbox for Department and
then enter a list of the departments in your company.
This option is available for attributes whose values are text strings. It is not available
for attributes with numeric, date/time, or logical (True/False) values.
5. In the Edit Allowable Values column, click the blue button for the corresponding
attribute to open the Edit Allowable Values dialog.
Note: If you did not check Limit Allowable Values for the attribute, the dropdown list
you create will not be displayed with the attribute when you create or edit a
Personnel object using this attribute.
6. Click in the Attribute Values field and enter the value(s) you want in the dropdown
list for this attribute.
When you start typing a value, a new line appears under your value. To add another
value, press the Enter key.
To delete a value, check the Delete checkbox for that value. The value is deleted
when you click OK. The value is not removed from any Personnel objects in which it
is currently used.
7. Click OK to save the attribute values.
8. Click OK.
9. Click OK.
The path for the card reader that you can use to read card information and display it
in Personnel Manager
The default paths for schedule points and new Personnel objects
The profile that is used to display Personnel objects if no other profile is assigned to a
user
3. To display thumbnail images of personnel by default with search results, check the
Show Thumbnails on startup checkbox.
You can also display or hide thumbnail images at any time in the Search Results
tab.
4. To select a card reader that you can use to read card information in the Personnel
Manager, check the Enrollment Reader checkbox and click the browse button.
Select the Door object to which the reader is assigned, and click the Select button.
Note: The enrollment reader does not need to be physically connected to a door.
However, in CyberStation, you set up all card readers by entering their settings
in Door objects. For information about setting up a card reader, see Chapter
18.
5. Click the browse button for Schedule Location. In the Select Schedule Location
dialog, select the folder or controller that contains schedule points for determining
when personnel can access specific areas, and click the Select button.
When you attach schedule points to areas in a profile or Personnel object, you can
select a different folder or controller, if needed.
6. Under Default Profile, select the profile that the Personnel Manager uses to display
Personnel objects for any users who are not assigned another profile. The default
assigned profile is Employee.
A personnel profile is a collection of settings that you can use to view existing
Personnel objects or to create new objects in the Personnel Manager. The profile
determines what personnel data is visible to users. You can assign different profiles
to different users as needed to prevent unauthorized access to sensitive personnel
data. For more information, see Assigning a Profile to a User.
7. Click OK.
http://www.serverwatch.com/tutorials/article.php/1474461
http://www.windowsnetworking.com/articles_tutorials/w2ksvrin.html
http://activedirectory.com
Note: You do not need to install anything on CyberStation to accommodate Active
Directory or LDAP; however the Personnel Import Utility is a separately purchased
option, enabled via your CyberStation product key. It is launched from the
Continuum task icon's popup menu, if you have a license. (See the import process
below.)
Note: Throughout these topics, references to the Continuum Personnel editor can also
mean the Personnel Manager, depending on which one you are using.
510 TAC
Define a folder location into which the transformed CyberStation Personnel objects
will be placed.
View the transformed data (the CyberStation Personnel object attributes) before they
are imported.
4. Map the Active Directory data source attributes to the Continuum Personnel
editor attributes.
When you lunch the Personnel Import Utility, attributes are automatically extracted
from a configuration file and populated in the mapping window of the Configuration
tab. In this mapping window, you can include, exclude, and add new attributes so
that they appear or do not appear in the imported Personnel records. For more
information on mapping attributes, see Mapping Data Source Attributes to
Continuum Personnel Attributes later in this chapter.
Note: When you launch the utility for the first time, data are extracted from a default
configuration file, PersonnelImportUtility.exe.config. (You can enter your own
configuration file name when you save all configuration settings.) For more
information, see Step 8 below and the topic Saving a Configuration and
Importing Data into CyberStatioin.
5. Edit your transformation file and specify the file name.
Use the browse button in the Transformation File Name field on the Configuration
tab to search for and edit the XSLT transformation file.
When you do this for the first time, you can open the default file,
PIUTransformation.xsl, which is located in:
Program Files\Continuum
or you may select your own XSLT file.
The XSLT file, written in xsl tag code, provides additional instructions that define and
customize personnel attributes in the transformation of personnel records. For
example, in this file it is recommended that you define an Alias name and define (or
accept the default for) the location of the folder into which imported personnel records
are stored.
Using this file, you can also modify mapped attributes, resulting in highly customized
records.
When finished, save your transformation file either the default file or your own file. If
you choose, you can also rename the file and place it another directory.
6. Retrieve and preview your mapped data-source and transformed data
attributes.
You must look at the data-source and transformed data that is, all the Active
Directory source attributes and the CyberStation Personnel attributes. (You do this
using the Preview button on the Configuration tab. Source data attributes are
displayed in the matrix on the Data Source Data tab. Transformed CyberStation
Personnel attributes are displayed in the matrix on the Transformed Data tab.)
Filter the number of records you want to preview using the Preview filters on the
Configuration tab.
512 TAC
514 TAC
Filtering the records you want to import by different categories (name, department,
group, or time)
Viewing the total number of filtered records and the total number of records that have
successfully been imported
Transforming the data using the XSLT file (use the default or modify your own) to add
or customize personnel attributes.
The following table describes the attributes on the Configuration tab.
Data Source Attributes
Attribute
Description
Server Name
The path of the Active Directory domain server, where the source
personnel data to be imported resides.
The default server name is LDAP://testDC=test,DC=com.
The test next to // is the server name.
The test in DC=test is the domain name.
User Name
Name of the user who can access the data source data on the Active
Directory.
Password
Attribute
Description
All Records
Select this radio button to get all the data source personnel
records from the Active Directory domain server.
Filtered Records
Select this radio button when you want to filter the data and
get records based on record name, department, group,
disabled records, and/or time.
By Record Name
(Starts With)
By Record Name
(Is Exactly)
By Department
516 TAC
Attribute
Description
the users under that specific department. This option is only
enabled when Filtered Records is checked.
By Group
By Time
Created
Select this radio button to get all the users created during the
time interval you supply, or by using a filter such as Last
Hour, Last Week, Last Year, Last Month, or Last Run.
This selection works with the Time Filter dialog. See Time
Filter below. This option is only enabled when Filtered
Records is checked.
The Last Run time is not updated until an import operation
occurs. It is only for an existing configuration.
Last Run is used for 2 cases:
It gets the value when the last import occurred with that
configuration and the current time you are executing for
the existing configurations. It searches within the time
frame.
Modified
It gets the value when the last import occurred with that
configuration and the current time you are executing for
the existing configurations. It searches within the time
frame.
Attribute
Time Filter
Disabled Records
Preview Attributes
518 TAC
Description
current time and you will not see any records.
After selecting Created or Modified, click this button to launch
the Time Filter dialog and choose the time period in which
personnel records were created or modified. Records are
retrieved strictly during the time you set. All times are adjusted
to UTC.
Attribute
Description
Filter
Time Interval
Attribute
Description
All
Some
Preview
Other Attributes
Attribute
Description
Total Number of
Filtered Records
Total Number of
Imported Records
Transformation File
Name
Apply
Transformation
Click this button to apply the changes in the XSLT file and
see the transformed data. For more information, see
Transforming Data Using the XSLT File and the
Transformed Data tab.
Configuration File
Name
Attribute
Description
the field, the Save Configuration dialog appears, asking
you to specify a name for the configuration file.
Import
Cancel
Help
520 TAC
For example, if you want to include a person's name, but not his/her office telephone
number, check these boxes:
givenname /First Name
sn / Last Name
but do not check this box:
telephonenumber / Office Phone
In this mapping window, you may also use the dropdown menu (embedded in entries
within the Continuum Personnel Attribute column) to select another attribute to
correspond with (or "map to") the data-source attribute. You do not need to accept the
default mapping. Attributes in the dropdown menu represent those in CyberStation
Personnel objects.
You can further customize and add attributes by editing the XSLT file. For more
information, please see Transforming Data Using the XSLT File.
There are some rules to keep in mind when youre mapping data source attributes to
CyberStation personnel attributes:
Andover Continuum CyberStation Configurators Guide 521
A single Active Directory attribute should not be mapped to more than one
CyberStation attribute.
A single CyberStation attribute should not be mapped to more than one Active
Directory attribute.
CyberStation attributes that are mapped to Active Directory attributes must also
appear in the XSLT file's "copy-of select" list. (See sample XSLT file section for more
information.)
The XSLT file should reference CyberStation attributes and not reference any Active
Directory attributes.
When specifying CyberStation attribute names in the XSLT file, be aware that
CyberStation attribute names are case-sensitive (refer to table of Continuum attribute
names for correct spelling).
Through the use of XSLT tags, it is possible to set the value of one CyberStation
attribute to the value of a different CyberStation attribute.
Attribute-mapping changes you make on the Configuration tab are saved with the
configuration file.
The following table is a sample listing of data-source (Active Directory) attributes with
their corresponding CyberStation Personnel object attributes. These are extracted from
the configuration file, but do not represent all the data-source attributes that reside on the
Active Directory domain server.
Note: When the Active Directory server is also a Microsoft Exchange Server, Active
Directory stores 16 additional "extended" attributes that can map to Continuum
Personnel attributes.
Previewing Data
Before importing transformed personnel records, you must preview your data via the
Preview button, located on the Configuration tab. When previewing data, you can either
preview all personnel by selecting the All radio button, or specify how many personnel
records to preview by selecting Some. When Some is selected, the default number (100)
is automatically filled in; however, you can enter another number.
Clicking the Preview button displays the data on the Data Source Data tab and
Transformed Data tab. It is important to view your data first because you want to make
sure everything is mapped correctly before you import all the data.
You should pay particular attention to the Alias attribute, since this attribute is the primary
key to the CyberStation Personnel creation mechanism. You should verify that all aliases
are unique and contain a value consistent with CyberStation naming conventions.
The Personnel Import Utility will strip invalid characters and use the left-most sixteen
characters when creating an alias. Records with empty Alias values will not be
created.
522 TAC
If the aliases are not unique, subsequent records will be updated, rather than created.
If the personnel information is incorrect or you want to change something, you can go
back to the Configuration tab, change it, then preview it again. You should always
preview your data before importing it.
If you make more changes, you must click the Apply Transformation button again in
order to display the changes. Personnel Import Utility will not make the changes
automatically.
Notice that these attributes are not the CyberStation attributes that you selected in the
Map Data Source Attributes to CyberStation Attributes window on the Configuration
tab. See Mapping Data Source Attributes to CyberStation Personnel Attributes.
In order to see the CyberStation attributes that you mapped on the Configuration tab,
look at the Transformed Data tab.
Andover Continuum CyberStation Configurators Guide 523
Define an owner folder location into which imported personnel records are placed (as
Continuum Personnel objects).
Add Area links (can be added only from the XSLT file)
Define the Alias name, which is used later to find that person in the database. You
shouldn't change this every time; it is a one-time process.
Add attributes like Site Code, Card Name, and so on that may not be included in
mapping, to supplement user information that comes from Active Directory.
The transformed data that appears on this tab represents the way you have:
Each alias must be unique. If the aliases are not unique, subsequent records will be
updated with that record and a new record will not be created. (See Saving a
Configuration and Importing Data into CyberStation.) To verify this, when previewing
your data, make sure that every alias name under the "Alias" column is unique before
importing.
Andover Continuum CyberStation Configurators Guide 525
Each person under the Owner Folder column must be assigned to a location. This
attribute defines the folder where the record will reside in Continuum Explorer (for
example, Root\Floor 1, Root\Lobby, and so on).
Remember, if you change the XSLT transformation file, you must click Apply
Transformation or the Preview button to update the information on this tab.
Click Yes.
If you do not enter/select a filename, and click the Save Config File button, the Save
Configuration dialog appears, asking you to enter a name in the field provided. Enter a
name, and click OK.
When you save a configuration, all settings on the Configuration tab are saved the
filtered data, server name, transformation file name, mapped attributes, and so on.
(Remember, saving a configuration file does not save the information to the XSLT file
only to the configuration file.)
Number of Imported Records (showing how many records have been imported during
and after the import process).
Note: User accounts that are disabled in Active Directory will be disabled in
CyberStation.
This lists the reasons why a record could not be imported. For example:
An attribute was mapped incorrectly. (The log tells you the incorrect attribute.)
Along with the Error Log, the CyberStation Activity Log (Activity Event table in the
CyberStation database) automatically tracks all user activities and logs all Personnel
Import Utility activities.
Andover Continuum CyberStation Configurators Guide 527
528 TAC
Managing
Personnel
Distribution
20
When personnel are assigned to areas and doors, their information is sent to the
controller hardware, where the doors are located. The act of sending this information is
called distribution. Several things can get in the way of a clean distribution:
The telephone line connecting a remote site to the main controller may be busy.
In all these cases, the distribution of a personnel object may not make it down to the
proper controller immediately. Eventually, the distribution will go through, unless the
memory capacity of the controller is exceeded. However, in the meantime, key personnel
may not be able to obtain entrance to the area.
You may also designate multiple workstations to act as distribution servers. By having
more than one workstation perform a distribution, there is less dependency on a single
PC. The workstations work together to assure that they do not perform multiple
distributions of the same personnel object. The Access Distribution View displays the
workstation that is currently distributing or handling the distribution of any personnel
object. Distribution is enabled for every workstation, by default. To disable a workstation's
ability to distribute records to controllers, set preference 19 (Enable personnel
distribution to controllers on the LAN) and/or 20 (Enable personnel distribution to
RAS networks) to FALSE on the Preferences tab of the Device editor for any
workstation that should not be a distributing workstation. (See Chapter 14 for a
description of the settings on the Device editors Preferences tab.)
Using Continuums General Preferences dialog, you may also set the number of
concurrent personnel distributions sent to controllers on each field bus network, as well
as set a time interval between these fieldbus distributions. This is done via General
Preference settings 12 and 13, as follows:
530 TAC
If you wish to switch from summary view to full view (where individual transactions
are listed, instead of totals) go to step 3, and apply a filter.
Note: In order to use the Distribute Now function, you must switch to full view and
apply a filter.
3. Switch from summary view to full view.
Select Edit filters from the Filters dropdown menu. The Filter dialog appears.
4. In the Filter dialog, remove the check from the Summary view checkbox, and apply
a filter. (See Filtering Distribution Events in Access Distribution View, next.)
Note: In summary view, Filter dialog attributes are not selectable, except two
destinations, Network and Controller.
5. Click OK. The full Access Distribution View appears.
6. Select Refresh from the View menu, or click the refresh button icon in the toolbar.
Note: Access Distribution View remembers your filter settings and launches in full
view at your next session.
When you launch the Access Distribution View initially, the Access Distribution
View Summary appears. To switch from summary view to full view, remove the
check from the Summary view checkbox at the top of the Filter dialog. The
summary view lists the total number of transactions for each destination, based
on the status of each transaction. The full view lists the actual, individual
transactions, instead of totals. You must apply a filter in order to use the
Distribute Now feature. (See Launching and Populating the Access Distribution
View, earlier in this chapter.)
Access Distribution View remembers your filter settings. Therefore, these settings are
applied in the full view in your next session.
The Filter dialog has three general types of filters:
Destination
Personnel
Status
Destination Filter
Filter
Description
Network
Select the Network radio button, and click the browse button in the
Network field, to search for and select a Network object. This displays
only the transactions occurring in the selected network.
From the Browse dialog, use the dropdown menu in the Objects of type
field to select Network. No other object class is selectable.
Highlight the network you want, and its name appears in the Object
name field. Click the Select button to select that network and dismiss the
Browse dialog. The Network object name appears in the Network field.
As an option, you can apply an area to the selected network. (See Area,
below.)
532 TAC
Controller
Select the Controller radio button, and click the browse button in the
Controller field, to search for and select an InfinityController or
InfinityInfinetCtlr object. This displays only the transactions that are
controlled by the selected controller.
From the Browse dialog, use the dropdown menu in the Objects of type
field to select InfinityController to make just Infinity controllers selectable,
select InfinityInfinetCtlr to make only Infinet controllers selectable, or
select All classes to make them both selectable.
Highlight the controller you want, and its name appears in the Object
name field. Click the Select button to select that controller and dismiss
the Browse dialog. The controller object name appears in the Controller
field.
As an option, you can apply an area to the selected controller. (See Area,
below.)
Door
Select the Door radio button, and click the browse button in the Door
field, to search for and select a Door object. This displays only the
transactions occurring at the selected door. From the Browse dialog, use
the dropdown menu in the Objects of type field to select Door. No other
object class is selectable.
Highlight the door you want, and its name appears in the Object name
field. Click the Select button to select that door and dismiss the Browse
dialog. The Door object name appears in the Door field.
As an option, you can apply an area to the selected door. (See Area,
below.)
Note: You may deselect any and all radio buttons in the Destination filter section.
You need not select any Destination radio button.
Area
Check the Area checkbox, and click the browse button in the Area field,
to search for and select an Area object. This displays only the
transactions that are happening in the selected area.
Note: You may select an area as a sole destination, or you may select a
network, controller, or door, and then select an area with which to
associate it.
In the Browse dialog, use the dropdown menu in the Objects of type to
select Area. No other object class is selectable.
Highlight the area you want, and its name appears in the Object name
field. Click the Select button to select that area and dismiss the Browse
dialog. The Area object name appears in the Area field.
Personnel Filter
Filter
Description
No Personnel
Filter
Select this radio button when you do not want to apply any personnel
filter, thereby allowing any personnel record to appear in the list of
transactions.
Andover Continuum CyberStation Configurators Guide 533
Browse for
Personnel
Select this radio button, and click the browse button in this field, to
search for one personnel record that you wish to appear in the list of
transactions. This path of this person's personnel record object
appears in this field.
Use filters
below
Select this radio button when you want to apply a filter, rather than
specifying a personnel record. You may apply a filter according to:
First Name, Last Name, Department, and Card Number, described
below.
First Name
Check the First Name checkbox, and enter the first name in the field.
Select the Exact match radio button, and enter a complete first name,
if you want to display transactions for all persons who have this first
name.
Select the Starts with radio button, and enter a string of characters, if
you want to list transactions for all persons whose first names begin
with these characters. For example, if you enter KE, the filter finds
matches with persons named Kenneth, Kendra, Kelly, Kevin, and so
on. Click OK to apply the filter.
Last Name
Check the Last Name checkbox, and enter the last name in the field.
Select the Exact match radio button, and enter a complete last name,
if you want to display transactions for all persons who have this last
name.
Select the Starts with radio button, and enter a string of characters, if
you want to list transactions for all persons whose last names begin
with these characters. For example, if you enter SIMON, the filter finds
matches with persons with last names such as Simon, Simone,
Simonson, Simonetti, and so on.
Click OK to apply the filter.
Department
Card Number
Check the Card Number checkbox, and enter the card number in the
field, to display transactions for the person who holds this card
number.
Click OK to apply the filter.
534 TAC
Status Filter
Filter
Description
Success
Failed
In Process
Available
Controller
out of service
Note: For each transaction listed in the Access Distribution View, the Status column
displays an icon that indicates one of these status conditions. For a description of
these icons, please see Using Columns in the Access Distribution View, next.
536 TAC
Column
Description
Status
Description
The transaction has completed
successfully.
Success
Failed
In Process
Available
Controller
out of
service
Destination
Area
Displays the path of the area to which the person has access.
Department
Door
Column
Description
Personnel
Card Number
Card Type
Displays the type of card that was specified (via the Personnel
editor when the personnel record object was established) for the
person.
Site Code
Last Error
Displays the text of the system error occurring in the most recent
(or current) transaction. If the most recent transaction is a
success, then the word "Success" appears.
Next Retry
Displays the date and time of the next attempt to process the
transaction.
Each time a transaction fails, the failure count is incremented.
The "next retry" time is based on the number of failures. The
transaction is tried less and less frequently as this number of
failures increases. For example, the Next Retry time is 10
minutes from the current time for the first failure, 20 minutes for
the second failure, 40 minutes for the third failure, 80 minutes for
the fourth failure, and so on. This ensures that reoccurring
unsuccessful transactions do not have a negative impact on the
system.
Priority
Transaction Type
538 TAC
Column
Number of Failures
Locking
Workstation
Description
are being re-distributed to the controller, after its reload, to
repopulate personnel in the controller. The transaction is
responsible for setting the SystemStatus variable back to
Normal.
Displays an integer indicating the number of failed distribution
attempts, including "retries."
Displays the workstation that is currently processing or
"handling" the transaction, regardless of the status. If the locking
workstation goes down, the lock on the transaction expires,
allowing another workstation to process the transaction.
Distribute
Now
Refresh
Sort
Description
Opens the Pending Access Distribution dialog, which allows
immediate distribution. This resolves a person's attempt to access an
area. (See Distributing Personnel Immediately Distribute Now, next.)
Refreshes the list so that information is up-to-date. (You may also
select Refresh from the View menu.)
Enables the column sort function. (You may also select Sort from the
View menu.)
The sort function works like the sort function in the Active Alarm View
and the Active Event View. (Please see Using Columns in the Access
Distribution View, earlier in this chapter.)
Help
Right-arrow
and left-arrow
buttons
Opens the online help system. (You may also select Contents from
the Help menu.)
Displays the next "page" in the view, when the list of transactions is
longer than the length of the window.
Note: The page status line at the bottom of the view (Page x of x) tells
you what "page" you are currently viewing in a long list.
Click the inner right-arrow button to move to the next page. Click the
rightmost button to view the last page. Likewise, click the inner leftarrow button to view the previous page and the leftmost button to view
the first page.
Note: You may move the Distribute Now, Refresh, Sort, and Help buttons as one
toolbar. Click and hold the left edge of the Distribute Now button, and drag the
toolbar to the desired location.
Click and drag the arrow buttons as one toolbar in the same way.
Note: The Distribute Now button is enabled in the toolbar only when both the
personnel and controller object IDs are present. Both are needed to perform
the distribution.
3. In the Pending Access Distribution dialog, make sure the person that appears in
the Personnel field is the one that you wish to distribute to the controller that appears
in the Controller field. If this is not the right person or controller, click Cancel to
dismiss this dialog.
Make sure information in the Door and Area fields is also correct.
4. If this is the right person and controller, click the Distribute Now button.
The personnel record is immediately distributed to the controller.
5. In the Access Distribution View, select Refresh from the View menu (or click the
refresh button) to refresh the information in the window.
In the Status column, the status icon of this event is changed.
542 TAC
Managing
Configuration
Files
21
Overview
Continuum's file management system offers a powerful suite of features that manage
configuration information for BACnet devices. You can automatically back up
configuration information from the BACnet device to your database, as well as
automatically restore it from the database to the device. The configuration information
resides in a special configuration file, which is stored as an object the BACnet class
object, File. You can also archive it locally in a text file (ASCII dump .dmp file.)
Backup Capabilities
Specifically, file management backup features allow you to:
Note: You perform these operations via either the right-click container popup menu in
Continuum Explorer's navigation pane or the Backup/Restore tab in the Device
editor for that controller. For detailed information on backup operations, please see
Backing Up a Device's Configuration and the Device editor's Backup/Restore tab,
Chapter 14.
Andover Continuum CyberStation Configurators Guide 543
Restore Capabilities
Specifically file management restore features allow you to:
Restore the archived configuration information (contained in the text ASCII-dump file)
to your database.
Note: You perform these operations via either the right-click container popup menu in
Continuum Explorer's navigation pane or the Backup/Restore tab in the Device
editor for that controller. For detailed information on restore operations, please see
Restoring a Device's Configuration and the Device editor's Backup/Restore tab,
Chapter 14.
General Tab
The File editor's General tab displays information about the file properties of the
ACCConfiguration file.
Note: The General tab is read-only. You cannot change the values in its fields.
The following table describes the read-only attributes of the General tab. For more
information on these attributes, see the File object type section in the BACnet Standard.
Editor Attribute
Meaning
Description
Last Changed
Type
544 TAC
Editor Attribute
Meaning
Size
Displays the size of the file. The size changes whenever the
file is modified.
Access Method
Record Count
Archive
Read Only
Back up configuration information from the database and archive it to a text (ASCII
dump) file. (See Backup/Restore tab of the Device editor, Chapter 14.)
Note: Backup/restore operations are not supported in the context menu if the device
does not support the BACnet property, AutomaticReadFile. Backup/restore
operations are not supported on the Backup/Restore tab of Device editor if the
device does not support the BACnet property BackupFailureTimeout.
Procedures
Backing up a single device To back up a configuration for a single device, perform
the following procedure:
1. On the BACnet side of Continuum Explorer's navigational pane, locate the controller
whose configuration information you want to back up.
2. Right click over the device, and from the popup menu select Backup BACnet
Device.
For Andover Continuum BACnet controllers, the backup operation begins and the
Distribution Properties dialog appears, showing the progress of and information
about the operation. (For more information on the Distribution Server and the
Distribution Properties dialog, see Chapter 2.)
Andover Continuum CyberStation Configurators Guide 545
For some third-party BACnet controllers, you are first prompted to enter a password.
If the password is accepted, the operation begins.
Backing up multiple devices To back up configurations for multiple devices, perform
the following procedure:
1. On the BACnet side of Continuum Explorer's navigational pane, locate the controllers
whose configuration information you want to back up.
2. In the navigational tree, click the parent container containing the desired devices, so
that those controllers appear in the viewing pane.
For example, the parent container could be BACnet Devices or any BACnet
controller that contains sub-devices.
3. Highlight (select) two or more controllers in the viewing pane.
4. Right click over the highlighted controllers, and from the popup menu select Backup
BACnet Device.
For Andover Continuum BACnet controllers, the backup operation begins and the
Distribution Properties dialog appears, showing progress messages about the
status of the operations. For multiple controllers, information is backed up one
controller at a time. The progress messages tell you when the backup operation
finishes for one controller and begins for the next. (For more information on the
Distribution Server and the Distribution Properties dialog, see Chapter 2.)
For some third-party BACnet controllers, you are first prompted to enter a password.
If the password is accepted, the operation begins.
Backing up all devices on a BACnet Network You can back up configurations for all
devices residing in a BACnet network by right clicking over a BACnet Network folder:
1. On the BACnet side of Continuum Explorer's navigational pane, locate the blue
BACnet Network folder that contains the devices whose configurations you want to
back up.
2. To back up all the devices contained in the Network, right click over Network folder,
and from the popup menu select Backup BACnet Device.
To back up two or more controllers selectively (but not all of them), in the navigation
tree, click the Network folder so that its controllers appear in the viewing pane. In the
viewing pane, highlight (select) the controllers you want to back up.
For Andover Continuum BACnet controllers, the backup operation begins and the
Distribution Properties dialog appears, showing progress messages about the
status of the operations. For multiple controllers, information is backed up one
controller at a time. The progress messages tell you when the backup operation
finishes for one controller and begins for the next. (For more information on the
Distribution Server and the Distribution Properties dialog, see Chapter 2.)
For some third-party BACnet controllers, you are first prompted to enter a password.
If the password is accepted, the operation begins.
546 TAC
Restore configuration information from your database to multiple controllers. (See the
procedures below.)
Restore the archived configuration information (contained in the text ASCII-dump file)
to your database. (See the Backup/Restore tab of the Device editor, Chapter 14.)
Note: Backup/restore operations are not supported in the context menu if the device
does not support the BACnet property, AutomicReadFile. Backup/restore
operations are not supported on the Backup/Restore tab of Device editor if the
device does not support the BACnet property BackupFailureTimeout.
Procedures
Restoring to a single device To restore a configuration to a single device, perform
the following procedure:
1. On the BACnet side of Continuum Explorer's navigational pane, locate the controller
whose configuration information you want to restore.
2. Right click over the device, and from the popup menu select Restore BACnet
Device.
For Andover Continuum BACnet controllers, the restore operation begins and the
Distribution Properties dialog appears, showing the progress of and information
about the operation. (For more information on the Distribution Server and the
Distribution Properties dialog, see Chapter 2.)
For some third-party BACnet controllers, you are first prompted to enter a password.
If the password is accepted, the operation begins.
Restoring to multiple devices To restore configurations to multiple devices, perform
the following procedure:
1. On the BACnet side of Continuum Explorer's navigational pane, locate the controllers
whose configuration information you want to restore.
2. In the navigational tree, click the parent container containing the desired devices, so
that those controllers appear in the viewing pane.
For example, the parent container could be BACnet Devices or any BACnet
controller that contains sub-devices.
Andover Continuum CyberStation Configurators Guide 547
548 TAC
Creating
Groups
22
What is a Group?
A group is an object used to monitor other objects. Each group has its own list of objects
known as members. Members can be objects from any class, and one group can have
members from different classes. Typically, youll create a member list by adding objects
that have something in common. For example, you could create a group that monitors all
the objects stored on a particular controller. Similarly, you could use a group object to
monitor all the objects pertaining to a particular function, such as air handling or security.
Group objects provide three ways to monitor objects:
You can view a groups member list. The member list displays the name, class, and
value of every object in the member list. For groups that consist entirely of personnel
objects, the member list displays the last name, first name and middle initial of the
individual, the last known location of the individual, and personnel object name.
You can view a graph the groups first 15 points. The graph plots logged values.
You can view a history of the object values. The history displays a list of all the points
in the group, and the values logged for them over a particular period.
When creating a group, youll work with the group editor to build or modify its member list,
and you make choices that will configure the groups graph and history views.
What is a Graph?
The graph view plots logged values for a point, or the first 15 points and/or system
variables in a groups member list. Youll see a vertical scale to the left of the graph.
Along the bottom, youll see a horizontal line delineated by time periods. In most cases,
youll see a horizontal scroll bar that allows you to move left and right along the time line.
The vertical scale and the horizontal time line are also known as the vertical axis and
horizontal axis, respectively. The body of the graph displays one line for each point. To
the right of the graph, youll see a legend. The legend lists the names of the points, each
in different color. The color of the point name matches the color of its respective line in
the graph.
Reading Graphs
Graphs differ from histories in that they depict trends as well as actual point values. For
example, its easy to see whether temperatures tend to rise at noon. Simply find 12:00
PM in the horizontal time line, then look at the lines above its tick mark in the body of the
graph. Do they spike up, or drop down? In a history view, you would have to compare all
the point values in the 12:00 PM row against values in other rows to retrieve the same
information.
As with a history view, a graph view also provides specific point values for specific times.
To locate a points value, find the time you want in the horizontal axis. Next, imagine a
vertical line going from the times tick mark to the line that represents the point in which
you are interested. Finally, imagine a horizontal line going from the line to the vertical
axis. The value located where the horizontal line intersects the vertical axis is the value of
the point for that particular time.
Click the scale to change its color and scale values. The scale will change to
according to the order of the points in the legend. Keep clicking until the scales color
matches the color of the point whose scale you would like to see.
Click a point name in the legend. This changes the scale color and the scale values
to match the point on which you click.
550 TAC
LogAverage Continuum calculates average point values over every interval, using
a weighted average algorithm. Average values are stored at the end of every interval.
LogMinimum Continuum compares all values over an interval, and finds the
minimum value. Minimum values are stored at the end of every interval.
LogMaximum Continuum compares all values over an interval, and finds the
maximum value. Maximum values are stored at the end of every interval.
Log intervals determine how often to record the point value. These intervals are specified
in the points editor, on the Logs tab. Logs store values in an array that group views use
to create histories and graphs.
Description
The text you enter in this field appears as the title of the graph and
history of your group.
Default View
Select the view of the group that you want to appear when you open
the Group object with the SHOW command.
Default Time
Range
Enter the Days, Hours or Minutes to specify what period of time your
group graph or history will sample. For example, if you enter 1 hour,
the group monitors group members for one hour. The time range
selected on this tab does not affect the starting and stopping time for
the group. These values are specified by you when you open a History
or Graph view.
Member List
Refresh Rate
This is the polling rate. Enter the interval in seconds at which you want
the system to update values for your group. Members will only be
refreshed when the Member List is shown.
Personnel
Only Member
List
Open
Edit
Rename
Properties
Use the Member List tab to add and delete members. You can also look the properties
for each member.
Adding Members To add a member, click the Add button. This displays a Browse
dialog to help you locate the object you want. You can also add members by dragging the
objects from the viewing pane of the Explorer into the open member list. After you have
found the object you are looking for, select it, then click the Select button. When adding
objects, keep these points in mind:
Graph and history views display only point objects that have automatic logs set up for
them.
If you are creating a group consisting entirely of Personnel objects, select Personnel
Members Only on the General tab to insure that the member list displays the
appropriate attributes.
552 TAC
When you add folder, ListView, or group objects, all the objects contained by or listed
in these objects are added to the group as well.
Deleting Members To delete a member, click it, then click the Delete button.
Viewing Member Properties To view a members properties, click it, then click the
Properties button.
Scale of
Vertical
Axis
Singular Scale: Use the Singular Scale option if all your points use the
same units.
Vertical
Axis Scale
If you are using a single scale, you will need to define the vertical axis. The
vertical axis displays a range for the point values in your member list.
Top
Enter the number that will show on the graph view as top of scale.
Bottom
Enter the number that will show on the graph view as bottom of scale.
Units
Enter the Unit nomenclature that will show as the label for the vertical axis,
for example, Deg F.
554 TAC
Multiple Scale: Use the Multiple Scale option if you have a group of
objects with different units.
Display
History
Values
This view displays two types of values, actual and fill. Actual
values are taken from automatic logs at the intervals defined for
each log. Fill values occur at the interval defined by the Time
Between Rows setting.
Filling Type
Select the option for filling in values between the logged values
on the History chart. The history view displays two types of
values: actual and interim.
Actual values are taken from automatic logs at the intervals
defined for each log.
Interim values occur at the interval defined by the Time Between
Rows setting. If the Time Between Rows setting matches the
automatic log interval, all the values displayed are actual values.
In most cases, however, the Time Between Rows setting is less
than the log interval.
For example, the time between rows could be set to 10 seconds,
and the log interval could be one minute. In this case, the history
view will display more rows than there are entries in the log. In
fact, there will be 5 rows for every 1-log entry. To compensate for
this, the history view uses interim values until it receives an actual
value from the log.
Interim values are either repeated actual values, or sloped to
show the gradation between one actual value and the next. The
Filling Type determines how the History view will display the
interim values. Your Filling Type choices are as follows:
None This option displays only the values taken at each log
interval. In other words, no interim values are displayed between
rows. The following picture shows a history view using the None
filling type:
This filling type omits interim values from the history view. To
achieve this effect, click None on the History tab.
556 TAC
Repeat Values Until Change This option repeats the last value
until the point value changes
The following picture shows a history view using the Repeat filling
type:
This filing type repeats the last actual value until it changes. To
achieve this effect, click Repeat Values Until Change on the
History tab.
Slope Between Values This option displays gradations of
values between the rows. Gradation calculations are based on
the difference between row values, and the number of refresh
rate values between rows.
The following picture shows a history view using the Slope filling
type:
Notice that this filling type shows gradations of one actual value
to the next. To achieve this effect, click Slope Between Values on
the History tab.
Time
Between
Rows
Dim Fill
Values
558 TAC
The following picture shows a history view with its interim values
dimmed:
2. You then can change an existing Groups default settings or add members to its
member list. If there is a check in the checkbox next to an object on a Member List,
that object will appear in a history.
3. You can drag and drop objects from Continuum Explorer to the Member List tab.
560 TAC
Creating
ListViews
23
What is a ListView?
A ListView is a Continuum object that displays information about a specific object class.
ListView information is either live or retrieved from the Continuum database. The
information that you see in a ListView depends on the columns of information displayed,
how those columns have been configured, and whether or not qualifiers have been
established to filter objects by specified criteria. You can view the contents of the
ListView from the ListView object itself, from an HTML report, or from a printed
document.
ListViews provide features that allow you to display an HTML report, format and print the
ListView contents, and even access the ListView editor itself. From the editor, you can
add and configure columns, choose colors for various situations, and set up qualifiers to
filter objects. Additionally, you can open the editor for any object shown in the ListView.
Description
Class
Select an object class from the dropdown menu. This list of objects
includes all the object classes that appear in the New object popup list
in Continuum Explorer.
Continuum also provides many specialized ListView classes you can
use to track system events, such as AlarmInfo, DistributionBatch,
EventLogControl and ImExportRef.
562 TAC
Select from the dropdown menu. This helps Continuum decide where it
looks for objects in the Class, such as Programs on a particular
controller or BinaryValue points stored in a certain folder.
AllPaths
Searches the folder in the Path field and all its subfolders
DeviceOnly
Searches the device in the Path field all the objects attached (owned by)
the device
Prompt
Designates this ListView as the default view for the class you selected
from the Class dropdown menu.
Path
Options
Show Grid Lines: Use this option if you want your ListView to contain
row and column markings.
Live Data on Open: Use this option to make the ListView open with live
data rather than data from the Continuum database.
Options
Live Data Refresh Rate: If your ListView contains live data, enter the
refresh rate in seconds. Continuum refreshes the ListView display using
the interval you specify here. Five (5) seconds is the fastest a list view is
permitted to refresh.
List Reload Rate: The rate that Continuum reloads the entire list in
seconds. The time is measured from when the list finishes loading. For
example if you set the reload rate to 20 seconds, the list will reload 20
seconds after it finishes loading, not 20 seconds from when it starts
loading: load list, wait 20 seconds, reload list, wait 20 seconds, and so
on. Zero (0) seconds disables this feature. A valid setting must be 5 or
more seconds.
Report
Template
Browse to find the HTML report template file that you want to use for this
ListView.
The HTML file must be local to the workstation or be stored on the
server.
The HTML report templates provided for this course contain the fields
that will accept ListView attribute data.
When you view the HTML report, the ListView data that appears in the report fields is
static. The values are not updated from the ListView. Creating HTML report templates is
covered in the Continuum System Administration Course.
564 TAC
Add Column
Click the Add Column button once for every column you want in your
ListView. For every column you add, a column template like the one
shown below appears:
See Configuring ListView Columns on the next tab for instructions on configuring
columns after you create them.
Each column template begins with default values for every aspect of your data. To
specify different values, click in the field containing the value you want to change (see
diagram above). Depending on the value type, you can:
1. Type over the existing value
2. Choose a new value from a dropdown menu.
Andover Continuum CyberStation Configurators Guide 565
How to Configure
Attribute
Heading
Edit
Select this checkbox to let users edit the attribute from the
ListView. Clear the checkbox to disallow editing.
Note: Not all attributes are editable.
Font and
Heading Font
For each ListView column you can specify fonts for the
column data and the column heading:
Click in the Font or Heading Font field of your column.
Click the
dialog.
Select a font, font style and size from the scrollable lists. As
you do so, the Sample box shows a text sample.
In Effects, specify strikeout marks, underlines and font
color.
Click OK to save your font settings.
Justification
Source
Sort
Width
Show
566 TAC
Column Field
How to Configure
Background
Color
Sorting in ListViews
You can sort the data in your ListView by the values of up to three attributes.
This is useful for ordering the rows of data to make them easier to read. Select the
attributes used to sort the rows from the Columns tab.
Because each column represents one attribute of the object class you are viewing, you
can sort by Name, Value, or Status providing you have added and configured columns
for those attributes.
Select an Order number to help establish the sort order when you sort by more than one
attribute. See Understanding Sort Order on the next tab.
Select either Ascending or Descending from the dropdown menu. See the section,
Sorting in Ascending or Descending Order on the next tab.
Click OK to save your work, or click Cancel to exit the dialog without saving.
For every attribute on which you base the sort order, specify if its the Primary,
Secondary, or Tertiary sort order.
The Order number defines what happens when Continuum finds two objects that have
the same attribute value.
Andover Continuum CyberStation Configurators Guide 567
For example, if the Primary sort attribute is Name, how does Continuum order two
objects named RoomTemp1? Which does it list first?
If another attribute has been set up as the Secondary sort attribute, Continuum uses its
value to decide which object is listed first.
The Tertiary sort attribute works the same way. If Continuum finds two objects with the
same Primary and Secondary sort attributes, it uses the Tertiary sort attribute to decide
how to list the objects.
Ascending order starts with the lowest value and ends with the highest value.
Descending order starts with the highest value and ends with the lowest value.
Note: Values such as Active, Inactive, ON, OFF, Online, Offline, Enabled and
Disabled are represented to Continuum by 1 and 0 respectively. These values are
sorted just like numeric values.
Sorting Example
The following example shows Numeric objects sorted in Ascending order, with Name as
the Primary sort attribute, Value as the Secondary and Device Name as the Tertiary:
The first two objects are sorted by Device Name because they have the same name and
value. The third object is sorted by Value because, although it has the same name as the
first two, its value is higher. The last two objects are sorted by Name.
three main sections: Database, Live and Highlight. In addition, the Highlight Color field
is used in conjunction with the Highlight section.
The Qualifiers tab offers two methods of creating qualifying statements for ListView
objects:
1. Type the statements directly into the appropriate text field.
2. Use the Query Wizard to build the statements.
The method that you use is determined by the state of the "Advanced XXX Qualifiers
checkbox.
If it is checked, the edit control is enabled and text can be entered into the text field.
If it is not checked, the Query Wizard button is enabled and selecting it will open the
Query Wizard dialog (see below) which allows you to build an appropriate qualifier
statement.
Using the first (advanced) method, you are responsible for creating the qualifier
statement correctly. With the second method, the Query Wizard assists you in building
the statement and once it is built, it is returned to the appropriate text field in the Qualifier
tab. If necessary, the statement can then be edited by checking the "Advanced XXX
Qualifier checkbox
Live versus Database Qualifiers
The Qualifiers tab offers you the choice of constructing statements Live or from the
Database. If you select Live, the Cyberstation retrieves the settings of the qualifier
statement attributes directly from the controller. If you select Database the Cyberstation
retrieves the attributes settings from Continuum's database.
Andover Continuum CyberStation Configurators Guide 569
The choice between Live and Database depends on certain factors. By using Live, you
are assured of getting the latest version of the qualifier attribute settings since they are
retrieved directly from the controller. If you know the attribute doesn't change very often,
you can retrieve it from the database, which is faster than going to the controller to get a
live value.
Using the Qualifiers Tab in the Advanced Mode
To create your qualifier statements directly in the Qualifiers tab, proceed as follows:
1. Click the Advanced Database (or Live) Qualifier checkbox.
2. Type the Plain English qualifier statement/s in the Database (or Live) text field. For
example: STATE = DISABLED OR OVERRIDE = TRUE
3. Click the Advanced Highlight Qualifier checkbox if you wish to highlight certain
parts of the statement created in step 2.
4. Type the parts of the statement you want highlighted in the Highlight text field. For
the example in Step 2, if you want to highlight only those objects with an Override
value of TRUE, you would enter the following statement:
5. OVERRIDE = TRUE
6. Place the cursor in the Highlight Color text field and click the right mouse button:
570 TAC
2. Click the down arrow in the Attribute list field and scroll through the list and select
the attribute you want by clicking on it.
3. Click the down arrow in the Operator list field and select the operator you want by
clicking on it. (See "Operator Selections" on the next page.)
4. Click the Value text field and type in the appropriate value for your qualifier statement
(see "Value Selections" on the next page).
5. Click the Prompt checkbox if you want to be prompted for an alternate attribute value
when the ListView appears. (See "Prompt for an Attribute Value" on the next page.)
Note: The Prompt feature is only available for a Database qualifier. It is not available
for object link attributes, such as owner ID or device ID.
6. If you have additional qualifying conditions to add to your statement move down to
the next row of boxes on the Wizard.
Andover Continuum CyberStation Configurators Guide 571
7. Fill in the Attribute, Operator and Value fields as described in steps 2, 3 and 4.
8. Click the left hand field to enter a joint and/or operator. (See "Compound Qualifiers"
on the next page.)
9. Repeat steps 6, 7 and 8 if additional Compound Qualifiers are required.
10. Click the OK button. If the statement validates without any errors, it will re-appear in
the appropriate text field of the Qualifier tab. If errors occur during validation, an
error message will appear and must be corrected to complete the operation. (See
"Error Messages" later in this chapter.)
Operator Selections
The operators that are selectable from the Operator dropdown menu include the
following:
>
Is
Is like
>=
Is not
Is not like
<
Is between
<=
Is not between
Refer to Chapter 3 of the Plain English Language Reference manual for explanations for
each of these operators. The values to associate with these operators are discussed
below.
Value Selections
The value that you select must be an appropriate one for the operator. The value
requirements for certain operators are listed below.
Operators
Value
Is
Is not
Is like
Is not like
Is between
Is not between
>, >=
<, <=
572 TAC
Compound Qualifiers
Notice that an additional selection box appears to the left of the last three rows in the
Query Wizard dialog. These boxes allow you to link multiple statements together with the
and/or joining operators. An example might look like this:
Attribute
Operator
Value
Description
A*
Is like
Value
1 & 10
and
is between
Channel
1
and
>
Prompt for an Attribute Value
Notice that a Prompt checkbox is located at the right hand end of each row on the Query
Wizard dialog. This is an optional feature that is only available for a Database qualifier.
Activating the checkbox will cause a prompt to appear on the screen when the ListView is
opened. The prompt will allow you to change the corresponding attribute value and thus
change the contents of the ListView for that particular object.
Error Messages
The error messages that you may receive if the qualifier statement is invalid are listed
below.
Note: In the Error Message column, the words in italics represent the type of item that
would be substituted in the actual message.
Error Message
Possible Cause
574 TAC
3. You are presented with the following screen. Select the times you require in the
Range fields and the Time Between Rows fields. Select the type of log you require
and click OK or Now.
4. Depending on whether you selected History or Graph, you are presented one of the
following screens depicting a history or a graph of your ListView.
If you select History, the following appears:
576 TAC
Creating
EventViews
24
Overview
An EventView object determines which access-related events will display in an Active
Event View. You configure an EventView object using the EventView editor.
Active Event Views are used to monitor access-related activities. These activities include
the use of card readers and/or keypads to gain access through locked doors, or trouble
situations such as a door left ajar, keypad tampering, or forced entry. Active Event Views
also provide information such as who is using which door, when, and whether the door
re-locks properly. Event views are called active because they receive and list access
control events as they occur.
Using the EventView editor, you specify the types of events and the doors you want to
monitor. You can also specify sorting criteria for the events, and configure the font and
color for each event. Once you have created an EventView object, users on any
CyberStation workstation can monitor events as they occur in an Active Event View.
578 TAC
Creating an EventView
From the Continuum Explorer, right-click the Live Views folder, New, and select
EventView.
Type in a name for the new EventView (for example, DoorXXEventView) and press
Enter.
You will be presented with the following tabs. These tabs are discussed in the following
sections.
General
Doors
Description
Enter a description that explains which doors and event types will
display in the Active Event View. (Adding this information is optional.)
Maximum
Number of
Events
Enter the maximum number of events you want the Active Event
View to display at one time.
Maximum Time
in View
Sort Criteria
In the Sort Criteria area, you may sort events according to three
columns. The Active Event View displays several columns of
information for every event, according to the sort criteria you select
here. Sorting is useful for grouping events to look for trends in, for
example, the source of events, types of events, and which personnel
are accessing which doors most often.
From the Primary, Secondary, and Tertiary dropdown menus, select
up to three columns. The columns you select establish the sort order
that the Active Event View uses. Check the ascending checkbox to
sort in ascending order, or clear it to sort by descending order and
click OK to save your work.
580 TAC
5. When you do not want to include an event type in the Active Event View, scroll to the
event type you want to remove, and click the checkbox to remove the check.
Note: As an alternative, select the event type you do not want to include, and click
Uncheck Selected.
582 TAC
Columns
Menus
The Active Event View has the following dropdown menus: Object, View, and Help.
Object Menu
Menu Selection
Description
Print Preview
Print Setup
Menu Selection
Description
Toolbar
Sort
Auto Sort
Freeze
Add/Remove
Columns
Status Bar
Always on Top
When selected, ensures that the Active Event View will stay on
top of all other applications on your screen.
Opens the EventView object editor for this Active Event View.
Door
Area
Person
Menu Selection
Description
Contents
About Active
Access Event View
Quick Picks
As an alternative to the dropdown menus, you may use the these quick pick icons to save
time:
Click this
To
Click this
To
Columns
For every event, the Active Event View displays the following columns of information:
Column
Description
Date/Time
Type
Door
Person
Area
Controller
Message
Zone Code
Department
Point
Card
Number
Card Type
Site Code
Access card site code number of the person causing the event
Two options are available for changing the way the information is presented in the view:
Resizing Columns You can resize column widths by pointing on the vertical
dividing line between two columns.
Adding/Removing Columns from the View - You can modify the settings for the
view to remove (or add) columns from the display. To accomplish this, choose the
option Add/Remove Columns from the View dropdown menu.
A dialog appears:
Click the box to the left the columns you want removed from the view. The check
mark is removed from the box indicating the column has been deselected. Click the
OK button to save the changes and have the view updated to reflect the column
removal. Conversely, if you want to add columns to the view, click in the box so a
check mark does appear and then click OK to save the changes.
586 TAC
Field
Type
Description
Indicates what type of event occurred.
Date and
Time
Message
Door
Personnel
Shows the person associated with the card reader or keypad event.
Area
Controller
Department
Point
Zone Code
Reflects the code number of the zone in which the event occurred, if
your system uses zone rather than area based access control.
Card #
Shows the access card number of the person causing the event.
Card Type
Indicates the type of access control card used by the person causing
the event.
Site Code
Displays the site code assigned to the person causing the event (if one
has been defined for the person).
Sorting Events
You can sort events by the values of up to three columns. This is useful for grouping
events to look for trends in, for example, the source of events, types of events, and which
personnel are accessing which doors most often.
Note: You may also sort events by columns, and establish sort criteria, via the General
tab of the EventView editor.
588 TAC
2. Double-click the door whose activities you want to monitor. The Door editor window
opens for the door (in this example, Lobby Door is the selected door.)
To monitor the access control activities of a particular door, you open the Door editor
window for the door through a listview. Follow this procedure:
1. Click the Access Events tab. The window updates to show the events recorded for
this door, in chronological order.
590 TAC
As you can see from the figure, the Access Events list displays:
o
Area associated with the event (Area columnnot shown in this figure
but accessible via the horizontal scroll bar)
2. Click the Refresh button to see the most recent access events.
In addition to monitoring active events, you may need to review past event information
that has been stored in the CyberStation database. To look at event history, ListViews
are utilized.
Event history is useful in diagnosing recurring problems. For example, your supervisor
may ask you to research Door Ajar events for a particular door. Or, gather information
about the number of personnel moving into or out of a specific area.
An example event listview is shown below.
592 TAC
Configuring
and Viewing
Video
25
Version 1.7 and higher, CyberStation has two video object classes, VideoLayout and
VideoServer, and video integration. Specifically, this chapter presents:
Various attributes for many existing object classes that have video associated with
them for example, graphics objects, Door objects, and points, such as InfinityInput
and BinaryInput.
Active Alarm View features and Active Event View features that integrate video with
individual alarms and access events, respectively
Andover Continuum CyberStation Configurators Guide 593
The following procedure provides an overview of configuration tasks that you perform to
achieve video solutions suited to your site. While completing these tasks, refer to the
other sections in this chapter (Using the VideoServer Editor and Using the VideoLayout
Editor) for more details. Also refer to other parts of this manual, where noted.
1. Create all VideoServer objects Enter server names, user names, passwords,
and IP addresses. Test each server's connection. (See Using the VideoServer Editor,
later in this chapter.)
Note: You must have already gathered this information from each video server,
which should have already been configured, along with cameras and presets.
(See your Integral video server documentation.)
2. Create all VideoLayout objects When you create a VideoLayout object, you
must associate cameras with (and assign them to) video control frames, or
windows, where images are displayed.
There are two ways to do this:
Manually assign cameras You may manually assign a camera that is,
hardwire it to each video frame in the VideoLayout object editor. You would
typically hardwire a camera to view video that is not associated with alarms. For
example, this method is useful during real-time surveillance and routine guard
tours. (See Using the VideoLayout Editor, later in this chapter.)
Within the VideoLayout object, you must reference one of the four video points. (See
Using the VideoLayout Editor, later in this chapter.)
The actual assignment of video points in objects is addressed in Step 4. See Step 4
below, as well as the section, Using the Alarms/Advanced Alarms Tab of an Object
Editor, in Chapter 10, Configuring Alarms.)
3. Make a list of objects to be associated with video You do this whenever you
have a need to view video images when those objects, such as doors and input
points, go into alarm or have an access event.
4. Configure video points in the object editor For each object in the list, configure
video points using its object editor, and associate the object with a VideoLayout.
Video points are video-server and camera references that are attached to Continuum
objects. Video points also contain other video information, such as presets, record
flags, and PTZ (pan, tilt, zoom) information. A VideoLayout can be attached to
objects in exactly the same way a graphic can be attached to an object.
594 TAC
Note: If you launch (open) a VideoLayout from Continuum Explorer, from a graphic, from
a ListView, and so on, and that layout references video points, then only the frames
whose cameras have been hardwired display video.
Open each object from the list in Step 3, select its editors Alarms tab or Advanced
Alarms tab, and associate the video layout with the object. (See the section, Using the
Alarms/Advanced Alarms Tab of an Object Editor, in Chapter 10, Configuring Alarms.)
Configure video points 1 through 4 from the Video Points dialog. (See Chapter 10.)
Repeat for each object in your list.
1. Configure EventNotifications to display video with alarms If you are
associating video with alarms, and you want to pop up a video layout when a new
alarm comes in, then edit the EventNotifications associated with those alarms, and
select Display Video on the Actions tab of the EventNotification editor. (See the
section, The EventNotifcation Actions Tab, in Chapter 10.)
2. Configure graphics with video Configure graphic controls to launch hardwired
video layouts from buttons and other graphic controls.
3. Test the alarms and access events Trigger an alarm with an associated video
layout. Ensure the video pops up, if configured to do so.
If you choose not to pop up video, you can launch the video layout using the new
video button on the Active Alarm View. (See Active Alarm View in Chapter 10.)
Repeat this process for access events, if necessary. Launch the video layout using
the new video button on the Active Event View. (See Active Event View in Chapter
21.)
General Tab
In the General tab, you assign a physical video server to this VideoServer object:
Any camera attached to this VideoServer object may therefore assigned to video image
windows (video controls) in the VideoLayout editor.
Editor Attribute
Meaning
Description
IP Address
Enter the IP address of the physical video server that you wish to
assign to this object.
User Name
Password
Verify Password
Enter the user name, and this user's password, that will be used to
log onto the video server, when this VideoServer object is
accessed. This user must exist on the actual video server to which
you are connected. If the user does not exist on the server, this
VideoServer object cannot be created for that user.
Tip: To have two or more users log onto the same video server,
create two or more VideoServer objects that connect to the same
server, but with different user names and passwords. This is useful
when you need to limit a Continuum user's access to Continuum
video features. For example, a guard typically should not have the
same access to video servers and layouts as an administrator.
596 TAC
Test Connection
Click this button to test the network connection to the server whose
IP address appears.
If the test is successful, this message appears beneath the button:
Connection successful
If it is unsuccessful, this message appears:
Error Connecting to Server
Freeze, reload/refresh, pan, tilt, zoom, and adjust the image resolution (contrast,
brightness, and so on)
Each image window in the layout is called a video control frame. Using a multiple-camera
matrix, the VideoLayout editor allows you to assign (and view the images of) one, two,
three, four, six, or nine cameras.
Note: In order to assign a camera to a video control, at least one video server must have
been configured so that its cameras are available to the VideoLayout. (See the
first two sections in this chapter.)
In Continuum Explorer, you may create a VideoLayout object from the Root directory or a
folder. You may not create a VideoLayout object from a network, controller, workstation,
or any other device.
General Tab
In the General tab, you configure a VideoLayout object, view video images, and perform
basic video operations:
The General tab displays one or more video controls frames that display live or
recorded images from one or more video cameras associated with one or more video
servers. Using a multiple-camera matrix, you may assign (and view the images of) one,
two, three, four, six, or nine cameras in the same layout.
How to Access the Video Control Popup Menu The video control popup menu
allows you to assign and reassign cameras, view live video, play back recorded video
clips, capture video images, adjust the image resolution, and perform other basic video
operations. To access the video control popup menu:
598 TAC
1. Select (highlight) the video control frame with which you want to work. A red box
appears around the selected frame.
2. Right click the selected frame. The popup menu appears.
Video Control Popup Menu The following table describes the choices in a video
control popup menu, as well as the tasks you may perform via each selection.
Menu
Selection
Description
Live Video
Select Live Video to display live (real time) images from the camera
assigned to this video control frame.
Note: Be sure to select Live Video again for any image that was
previously frozen. (See Freeze Video, below.)
Recorded
Video
Select Recorded Video to play back a video clip from the camera
assigned to this video control frame. When Recorded Video is selected,
a list of clips appears at the bottom of the video layout. Each clip in the
list displays the camera name, the date the clip was recorded, the start
time, the end time, and the number of frames. For example:
Select the video clip that you want to play back. A black play button and
stop button appear on the bottom of the frame. Click the play button to
begin the playback. Click the stop button to stop playback. You may also
use the slider control within the frame to move forward and backward in
the recording.
To search for available video clips, specify a start date/time and an end
date/time in the Start and End fields, respectively. Then click the
Search button. All video clips within that time frame appear in the list.
In the date fields, click the down arrow to display a calendar. Then click
a start or end date on the calendar. The selected date is highlighted in
Andover Continuum CyberStation Configurators Guide 599
Menu
Selection
Description
blue, while the current date appears in a red circle. As an alternative,
you may highlight the month, day, or year field, and manually key-in the
month, day, or year.
In the time fields, use the up- and down-arrow buttons to select a time.
As an alternative, you may highlight the hour, minute, second, or AM/PM
field, and manually key-in the hour, minute, and second, and specify
morning or afternoon/evening (AM or PM).
Playback fps Select the speed (number of frames per second) at
which you want to play back the video clip. The current number of
frames per second is displayed at the left of this field. Use the slider bar
and right- and left-arrow buttons, as needed.
Note: Video clips are stored on the video server, and not in the
Continuum database.
Freeze
Video
Select Freeze Video to freeze the moving image of this video control
frame immediately.
Delete
Camera
Assignment
PTZ
Select PTZ when you need to pan, tilt, or zoom in and out of the video
image in this video control frame.
Note: The camera assigned to this video control frame must have PTZ
capabilities in order to use this feature.
At the bottom of the frame, PTZ displays the numbers 1...6, as well as
the following letters:
IOFNOC
I Click to zoom in.
O Click to zoom out.
F Click to focus the camera "far" or further out.
N Click to focus the camera "near" or further in.
O Click to open the iris and increase the amount of light streaming
into the camera.
C Click to close the iris and decrease the amount of light streaming
into the camera.
The numbers 1...6 are the first six "preset" camera views. Although
some cameras support up to 256 camera presets, only the first six are
600 TAC
Menu
Selection
Description
supported here.
Panning and tilting To pan and tilt the camera, place your cursor
inside the video control frame, and click once. A light blue thick arrow
appears. You may pan/tilt up, down, left, right, and diagonally. The blue
arrow changes direction, according to where you place it on the frame:
Up arrow Pan up. Click cursor at top-center.
Down arrow Pan down. Click cursor at bottom-center.
Left arrow Pan left. Click cursor at left-center.
Right arrow Pan right. Click cursor at right-center.
Right diagonal up arrow Pan diagonally to the upper right. Click
cursor at top right corner.
Left diagonal up arrow Pan diagonally to the upper left. Click cursor
at top left corner.
Right diagonal down arrow Pan diagonally to the lower right. Click
cursor at bottom right corner.
Left diagonal down arrow Pan diagonally to the lower left. Click
cursor at bottom left corner.
Capture
Image
Select Capture Image to capture the image being displayed in this video
control frame and to save it to a file.
The Capture Video Image Save dialog appears. Browse for the
directory in which you want to save the image file, specify the file name,
specify the image file type (.BMP, .JPG, and so on), and click Save.
Video
Points
Menu
Selection
Description
designate between one and four video points, whereby each numbered
"video point" represents a frame in this VideoLayout's matrix.
About the Video Points Dialog Click the Video Points button on the
Alarms or Advanced Alarms tab of the editors listed above to bring up
the Video Points dialog. (See also Chapter 10, Configuring Alarms.)
In this Video Points dialog, you may also configure a camera to record
a video clip, for specified number of seconds, when the alarm goes off.
Video Servers: Use the Video Servers dropdown menu to select a
video server on which the camera is located. (A VideoServer object must
be already configured and the server online. See VideoServer Editor
earlier in this chapter.)
Cameras: Use the Cameras dropdown menu to select a camera for the
numbered video point. (The camera must be configured and enabled on
the selected video server.)
Rec: Check the Rec. checkbox to record a video clip from the selected
camera. Recording begins at the moment the alarm goes off.
Duration: In the Duration field, use the up and down arrows to select
the number of seconds to record a video clip, once you check the Rec.
checkbox.
PTZ: In the PTZ field, select the number of the preset camera view. (This
camera must have PTZ (pan, tilt, zoom) capabilities in order to use this
feature.) See also the General tab of the VideoLayout editor.)
After you preassign the video point cameras to the frames (Chapter 10)
you reference a video point number here (in the General tab of the
VideoLayout editor) that corresponds with each numbered frame you
configured in the Video Points dialog. Right click over the frame, select
Video Points, then select 1, 2, 3, or 4. For example, the camera you
specified as "Video point 1" in the object editor is assigned to the frame
you reference as "1" in this VideoLayout object.
When the VideoLayout is launched, on an alarm associated with the
602 TAC
Menu
Selection
Description
object, this preconfigured video control matrix is displayed.
Change
Camera
The following table describes other General tab video attributes and buttons, which allow
you to adjust your video control images.
Editor Attribute
Meaning
Text Overlay
Editor Attribute
Meaning
Text Colors
You may change the color of the text in the text overlay by clicking
one of the six colors in the color key, located beneath the text
overlay radio buttons. These colors are:
Red
White
Blue
Yellow
Green
Black
Black is the default.
Brightness
Contrast
Sharpness
Reload Layout
Click this button to reload and refresh all the video controls.
Click this button to freeze every video image in every video control
frame.
If you wish to freeze the image for just one video control, right click
the control frame and select Freeze Video from the popup. (See the
table above.)
Capture Layout
Matrix
Selections
604 TAC
Graphics
Panels
26
Introduction
The Pinpoint graphics application is used to produce dynamic virtual control panels right
on your CyberStation workstation.
CyberStation control panels are computer-generated representations of physical panels.
They consist of a screen display of buttons, switches, animations and text, and other
controls that control particular points, particular elements of log or array points, point
attributes, system variables, or certain Continuum objects, such as areas and doors.
Every control placed on a CyberStation control panel can be easily changed, deleted and
re-assigned through software.
Controls can be active or passive:
Active controls, such as a switch or button, can be manipulated by the user. For
example, a switch control, when turned, might set a point value or setpoint.
Passive controls convey information, such as gauges and read-only text controls that
display values. A text control might display the current room temperature.
A control panel can have one or more controls, or not controls at all.
Pinpoint supports a simple form of animation that uses multiple images of the same
control. Because each image is slightly different, viewing them in a sequential order
produces the effect of animation.
The following example shows a Pinpoint graphics panel that monitors HVAC equipment
on one floor of a building.
Controls
The following list identifies the type of controls available in the Pinpoint application. A
library of predefined images for each control is provided with the application. You can
also use bitmap images that you created in another application to represent controls.
Switches
Pinpoint switch controls allow you to control two-state (on-off) points. In
addition to their control capabilities, they also can display a different
image for each state. Clicking once activates the control and also
automatically displays the controls image associated with its activation.
You choose the bitmap image set that defines the switch in each
position.
Buttons
Buttons work in a similar manner to switches. They allow you to control
two-state (on-off) points, launch applications, etc. Buttons can be any
shape, but they do not change appearance.
Active Animated Buttons
Active or animated buttons can be any shape. They can change color
when pressed.
606 TAC
Bar Control
A bar control shows the value of the point by rising or descending to a
particular level as the value of the point changes. Both horizontal and
vertical bar controls are available in the image library.
Text Control
A text control displays a textual representation of a point value. If the
point is an input or output, it displays the point value in engineering
units. For a numeric point, it displays the numeric value. For a string
point, it displays the characters in the string. For a datetime point, it
displays the date and time in the point.
Door Control
The door control provides a graphic display of a CyberStation door
object. It illustrates the switch states of the door by using configurable
animation. Images illustrate the states of the door, such as
locked/unlocked, trouble, and alarm. When you right click a door
control, a popup menu provides access to additional functions, such as
locking or unlocking the door, and opening the Door editor.
Area Control
The area control provides a graphic display of an Area object and can
indicate whether the area is in Lockdown state or its normal state. You
can also use an area control to initiate or clear the Lockdown state.
Popup menu options allow you to lockdown individual doors to the
area, or to clear the Lockdown state as well as to access other area
functions. For more information regarding area lockdown, see Chapter
18.
608 TAC
Text
Controls
Controller Time/Date
This is a text control tied to the system clock. It displays the date and time.
Power Fail
This text control indicates whether the power fail condition is true or false.
The other text controls are also tied to various points throughout the
system and include such information as the amount of free system
memory, which server is being accessed, alarm and error counts, etc.
Bar Control
Temperature Gauge
Gate Switches
Off On
These switch controls operate security gates. When on, the indicator on
the top of the switch turns red.
Gate 4
This object indicates whether a gate in the building area is open (up) or
closed (down) position.
3. Select the File option on the Pinpoint menu bar, and then select New.
4. In the Create Graphic dialog, enter a name into the Object Name field, and click the
Create button. A new blank Pinpoint panel appears.
610 TAC
3. Enter (or browse to) the appropriate locations where you want your graphics, image,
and background files stored.
Location
Description
Graphics Folder
Image Folder
Background
Folder
Description
Warn Save
Into Run Mode
Make Backup
Copy Panel
File
Home Panel
Field
Enter (or browse to) a Pinpoint graphic file to use as the Pinpoint
application home panel. When you click the Home button of the
Pinpoint Standard Toolbar, the selected home panel opens.
Andover Continuum CyberStation Configurators Guide 611
Option
Description
No Change
Opens the home panel with no change to the current panel state.
Minimize
Close (default)
Default Paper
Orientation
Field
Units of
Measure
Select the units of measure for the size of your canvas. The
default is inches.
5. Click OK.
3. Place the cursor over the object in Continuum Explorer that you want to place on the
panel.
4. Hold down the right mouse button while you drag the object onto the Pinpoint panel.
5. Release the mouse button.
A popup menu appears listing the control types.
6. Select the type of control you want.
The object will appear on the panel represented by the control you selected.
Pinpoint Environment
Pinpoint operates in two modes: Design and Run.
In Design Mode you create a panel, which allows you to draw, animate, and insert
objects, attach points, etc.
In Run Mode the panel operates showing assigned point values, opening/closing
doors, etc.as you designed it to do.
Below are the basic components of the Pinpoint environment:
Pinpoint Window
Features
Description
Menu bar
Tool bars
Canvas
Status bar
The status bar along the bottom of the window indicates whether
Pinpoint is in Design Mode or Run Mode, and at what
magnification the panel is displaying. The status bar also provides
you with useful prompts, and visual indication of the status of
various keyboard functions.
To
You can
Draw a component of
equal proportions or at
90 degree angles
Resize a component
from the center
Draw a line
Draw a polyline
Draw a polygon
Draw a rectangle
Draw a polycurve
Draw an ellipse
Add text
614 TAC
To
Add an image
You can
Click the Image button
to open a standard dialog
from which you can select an image to insert on the
canvas in the following formats:
.bmp
.ico
.jpg
.emf
.dib
Plain English
Program to Run
When the Panel is
Opened
Scroll Bars
3. Select the Canvas tab, and select preferences for the panel workspace, which is
called the canvas.
Background
Color
Select a background color for the panel from the drop down
list.
Background
File
Canvas Width/
Height
4. Select the Object List tab to view the CyberStation objects attached to Pinpoint
controls in the current panel.
616 TAC
Object name
Component name
Polling Rate
Delete
Go To
Find Object
Replace With
Replace Object
Replace All
Objects
6. If you want to attach a single object to this panel, click the Security Level tab and
select a single object.
7. Click OK.
Andover Continuum CyberStation Configurators Guide 617
Select line color, style, and width. Dashed or dotted lines can be used only when 0
Point is selected for line width.
If you do not want to display lines when the panel is in Run Mode, check the
Transparent checkbox.
618 TAC
4. Select the Font tab, and select font properties to define the appearance of text in a
component.
Because True Type fonts are the only fonts that support rotation, text is limited to
True Type fonts.
5. Click OK.
Text
2. Click a location on the canvas to place the text box. Adjust the size, placement, and
appearance of the component as needed.
If you want to
Then
If you want to
Then
3. To make this text component an active component (tied to a point object ), select the
text component, and click the Text
The Active Text tab page of the Active Text Object dialog is displayed.
Object
Enter or use the browse button to locate the path to the point object
and attribute you want to attach to the component. Browse or type
in the path to a Continuum point and attribute.
User Entry
High/Low
Limit
Enter the maximum and minimum values accepted for this point
when user entry is enabled.
4. If the selected object is attached to alarm(s), select the Alarms tab, and use the
colorwells attached to each alarm to select the color the text changes to in response
to the alarm event.
5. Select the Misc tab.
6. If you want to adjust the polling rate, enter a new value for Rate.
The polling rate determines how often a point is queried per millisecond to see if its
value has changed.
7. Check the ToolTips checkbox if you want to display a tooltip when the cursor lovers
over the text box, and then specify the tooltip content:
Select Attached Object if you want to display the name and path of the object
attached to the text box.
Select User Defined, and enter the appropriate text if you want to display custom
text in the tooltip.
8. Click OK.
9. To save and test the component, click the Run Mode button in the Standard toolbar.
Click the Design Mode button to return to editing the panel.
620 TAC
Inserting Images
To insert an image to use in a component, perform the following steps. You can insert
predefined images from the image library or browse images created another application.
1. From the Insert menu, select Image Library.
2. In the PinPoint images dialog, expand folders to view the list of images, and select an
image to display it in the preview area.
3. To insert a custom image, click the Browse button to locate the folder that contains
the image.
4. Double click an image to insert it in the current panel.
Continue inserting images as needed.
5. Click Close.
You can draw the graphics with the Pinpoint drawing tools.
2. Select the graphic object, and select the Active Rotation button
Components toolbar.
3. In the Active Rotation dialog, select the point the control represents and the rotation
properties of the control.
Object
Rotate when:
622 TAC
Direction
Rotation Rate
Enter the rotation rate for the control. The valid range for
this field is between 100 and 5000 milliseconds.
Angle
Select Pivot
Point
4. Click OK.
5. To save and test the component, select the Run Mode, or select the Run Mode button
from the Standard toolbar. This action saves the panel.
Click the Design Mode button to return to editing the panel.
Person:
LastPersonEntered
LastPersonExited
LastInvalidEntry
Fade:
Delay Time
LastInvalidEntryExit
If you select one of these attributes, you can display the persons
photo when the person enters/exits through the door.
Enter the number of seconds you want to display a photo before
it fades. If the delay is 0, the personnel photo will not fade.
Fade: File
User Entry
Select this checkbox to change the control right from the panel in
Run Mode.
Select this checkbox to hear a beep when a new photo appears.
Beep When
the Picture
Changes
3. Click OK.
4. To save and test the component, select the Run Mode, or select the Run Mode
button
Rectangle
2. Draw a rectangle on the canvas by holding down the left mouse button and moving
the mouse diagonally.
624 TAC
3. If you want to edit visual properties of the rectangle, such as color, right click and
select Display Properties from the popup menu. Edit the properties and click OK.
6. Select the rectangle and select the Active Bar icon from the Active Components
toolbar.
5. In the Active Bar Object dialog, select the object the bar represents and the properties
of the bar.
Object
User Entry
Top of Scale
Bottom of Scale
Direction
6. Click OK.
7. To save and test the component, select the Run Mode, or select the Run Mode
button
Open an object
Open a panel
Replace a point
After you select an action, the Active Button data entry fields change to reflect the
information required for that action. The following table describes how to configure
each option.
If you select
Then
Open Object
Open Panel
Enter or click the browse button to specify the full path for
the graphics panel the button opens. Under Current
Window, select what happens to the display of the
current panel (the panel containing the button) when the
new panel is opened.
Replace Point
626 TAC
Start Windows
Program (enables you
to start any installed
Windows applications,
such as Notepad or
Excel, or to create or edit
CyberStation Objects)
Toggle Value
Enter or click the browse button to specify the full path for
the point you want to turn on or off (or enable/disable,
etc.) when a user clicks the button.
Current Panel
3. To execute Plain English (PE) commands in addition to the button action you defined
in step 5, select the Plain English script tab, and enter the PE script. Click the
Check button to verify that the script has no syntax or other errors.
PE scripts can execute any command-line command. PE scripts cannot have local
variable declarations or labels. PE scripts are executed before the selected Active
Button performs its action (i.e., open panel, open object, etc.).
4. Select the Misc tab.
5. If you want to adjust the polling rate, enter a new value for Rate.
The polling rate determines how often a point is queried per millisecond to see if its
value has changed.
6. Select the ToolTips checkbox if you want to display a tooltip when the curser hovers
over the text box, and then specify the tooltip content:
Select Attached Object if you want to display the name and path of the object
attached to the text box.
Select User Defined, and enter the appropriate text if you want to display custom
text in the tooltip.
7. Click OK.
8. To save and test the component, click the Run Mode button in the standard toolbar.
Click the Design Mode button to return to editing the panel.
628 TAC
Then
Proceed to step 3.
Proceed to step 4.
3. Select the point, images, and valid range for analog animation.
Value
Enter or click the browse button to specify the full path of to the analog
value to be used to control which image is viewed for the animation.
Image Ranges
Value ranges for each chosen image file. The ranges are created
from the low and high limit you enter.
Image Files
Preview
Click this button to preview the files in the Image Files field.
High/Low
Limit
Change
By default, the ranges are split evenly over the range limits entered
in the High Limit and Low Limit fields. Use this button to change
the high limit for a selected range (and as a result the low limit for
the next higher range) in the Image Range field.
Reset
Click this button to reset all the ranges to their default ranges ({High
limit Low Limit}/ # of files in the image list). This is only applicable
if you have made changes to the default range.
Select this checkbox to hide the animation if the value of the point is
outside the limits of the range.
Hide
Animation if
Above/Below
Range
8. Select the point, images, and animation properties for digital animation.
630 TAC
Value
Image Files
Enter or click the browse button to specify the full path of the binary
value to be used to control which image is viewed for the animation.
List of the images to be used for this animation.
To create and organize the list of images, use the four icons above
the preview area:
Insert a new image Click this icon and type in the file name
and path in the edit box.
Delete an image Select the image to be deleted and click
this icon.
Move an image one up the list Select the image to move and
click this icon.
Move an image one down the list - Select the image to move
and click this icon.
Also, to edit an existing image, double click the image and make the
appropriate changes in the open edit box.
Preview
Click this button to preview the files in the Image Files field.
Animate When
On
Animate only
when Change
of State
If this checkbox is selected, the system runs through the image list
one time for change of state on, and then in reverse order for change
of state off. This cycle repeats for every change of state.
Invisible When
Off
Current Frame
When Off
When the animation is off and visible, select this checkbox for the
current frame to appear. Leave this checkbox unselected for the first
frame in the image list to appear.
Image Rate
Rate (in ms) the system cycles through the images selected in
Image Files.
Select Attached Object if you want to display the name and path of the object
attached to the text box.
Select User Defined, and enter the appropriate text if you want to display custom
text in the tooltip.
8. Click OK.
9. To save and test the component, click the Run Mode button in the standard toolbar.
Click the Design Mode button to return to editing the panel.
632 TAC
Trigger
Trigger Options
Disable Action
Action Field
Enter or click the browse button to specify the full path to the
object used to trigger the animated effects of the button. The
trigger is the point or attribute that initiates (fires) an event.
Select the event that triggers button animation:
On/Off
Alarm
Ranges
Object Drop
Menu
Current Window
Trigger
Option
Value
Fill
Visible
Blink and
Beep
634 TAC
The values in the Trigger Option Values list are determined by the
selection you make in the Trigger Options in the Active Animated
button tab. In the above example, the choices are On/Off. Use this tab
to determine how the button appears in each state.
Note: Both On and Off require separate configuration.
Select this checkbox to select Fill options for the state selected in the
Trigger Option Value field. The Fill Properties dialog appears. Select
fill settings for the button, and click OK.
PE scripts can execute any command-line command. PE scripts cannot have local
variable declarations or labels. PE scripts are executed before the selected Active
Button performs its action (i.e., open panel, open object, etc.).
7. Select the Misc tab.
8. If you want to adjust the polling rate, enter a new value for Rate.
The polling rate determines how often a point is queried per millisecond to see if its
value has changed..
9. Select the ToolTips checkbox if you want to display a tooltip when the curser hovers
over the text box, and then specify the tooltip content:
Select Attached Object if you want to display the name and path of the object
attached to the text box.
Select User Defined, and enter the appropriate text if you want to display custom
text in the tooltip.
10. Click OK.
11. To save and test the component, click the Run Mode button in the standard toolbar.
Click the Design Mode button to return to editing the panel.
Inserting a Scale
A scale active component works with a gauge active component to display the value of a
point object that you specify:
The scale provides the visual characteristics: upper and low limits, divisions and
steps, and labels. Create the scale before you create the gauge.
The gauge provides the graphic element that represents the point value on the scale,
such as the needed on a circular dial.
To insert a scale, follow these steps:
1. From the Insert menu, select Scale.
The Scale dialog appears with the default scale type as linear.
2. Select settings that define the appearance and labeling on the scale.
Type
Orientation
636 TAC
Start and
Sweep Angle
Fields
Direction
Radio
Buttons
Use these radio buttons to choose the direction that the numbers
will appear on the scale.
Scale Color
Limits
Use these fields to set the high and low limits of the scale. The
limits can be positive or negative (you can set the number of
decimal places that appear in the Decimal Places field). The High
limit is the largest number displayed on the scale. The Low Limit is
the smallest number displayed on the scale.
Subdivisions
Use these fields to set the number of Subdivisions and Steps that
appear on the scale. Subdivisions are the tiny tick marks between
each Step (major tick mark).
Show Units
Use these fields to type in and select the color for a short text
string usually used to display the units of scale. Select the color
you desire from the colorwell, which opens like a drop down list.
Show
Numbers
3. Click OK.
Inserting a Gauge
To insert a gauge, follow these steps:
1. Use the drawing toolbar to create the graphic representing the gauge reading on the
scale you drew in the previous procedure.
Andover Continuum CyberStation Configurators Guide 637
2. Position the graphic on the scale, and select the graphic (not the scale component).
3. From the Active Components toolbar, select Gauge. The Gauge dialog appears.
Browse for or enter the Continuum point that the gauge will
indicate.
Enter the upper and low limits of values shown.
Select the direction in which the numbers will appear on the
scale:
Selecting Clockwise causes the numbers to appear
clockwise from high to low.
Sweep
Angle
Select Pivot
Point
5. Click OK.
The gauge is now capable of moving to the corresponding position on the scale when
the value it represents changes.
638 TAC
2. Click the button control to display the Active Button Object dialog.
Note: The properties of this Window control are the same as the standard Pinpoint
active button control. Refer to the section in this chapter called Creating an
Active Button Control for detailed information about these properties.
2. Select Edit from the menu bar, and click Object Properties.
3.
In the Edit Box Object Properties dialog, select the properties you require.
Object
User Entry
3D Border
Select the ToolTips checkbox if you want to display a tooltip when the curser
hovers over the text box, and then specify the tooltip content.
640 TAC
Select Attached Object if you want to display the name and path of the object
attached to the text box.
6. Select User Defined, and enter the appropriate text if you want to display custom
text in the tooltip.
7. Click OK.
8. To save and test the component, click the Run Mode button in the standard toolbar.
Click the Design Mode button to return to editing the panel.
2. Select Edit from the menu bar, and select Object Properties.
3. In the Switch Properties dialog, select the properties you require.
Object
Style
Under Style, click the down arrow, and then select the switch
graphic you want to use.
User Entry
Select Attached Object if you want to display the name and path of the object
attached to the text box.
Select User Defined, and enter the appropriate text if you want to display custom
text in the tooltip.
7. Click OK.
8. To save and test the component, click the Run Mode button in the standard toolbar.
Click the Design Mode button to return to editing the panel.
2. Select Edit from the menu bar, and select Object Properties.
3. In the Combobox Object Properties dialog, select the properties you require.
Object
List Items
Autofill
Also, to edit an existing list item, double click the item and make the
appropriate changes in the edit box.
Click this button to automatically insert the values of a selected object
in the List Items field.
Note: A message will appear informing you that the current list of
items will be overwritten with the newly selected values.
642 TAC
and
Select Attached Object if you want to display the name and path of the object
attached to the text box.
Select User Defined, and enter the appropriate text if you want to display custom
text in the tooltip.
7. Click OK.
8. To save and test the component, click the Run Mode button in the standard toolbar.
Click the Design Mode button to return to editing the panel.
2. Select Edit from the menu bar, and select Object Properties.
3. In the Slider dialog, select the properties you require.
Object
Top of Scale
Bottom of
Scale
Integers Only
Select Attached Object if you want to display the name and path of the object
attached to the text box.
Select User Defined, and enter the appropriate text if you want to display custom
text in the tooltip.
7. Click OK.
8. To save and test the component, click the Run Mode button in the standard toolbar.
Click the Design Mode button to return to editing the panel.
644 TAC
2.
Right click the empty video control window, and select Display Properties from the
popup menu.
Note: If you wish to select a source object, it must be an object that has two states
something that can be on or off, enabled or disabled, set or cleared, and so on.
Live or recorded video is displayed only when the object is an on/enabled
state. It does not display when it is in an off/enabled state. If you do not select
a source object, live images are displayed continuously, and recorded file video
is played either once (by default) or continuously, via the Loop Forever
checkbox (described in the following text).
7. If you select a source data object, click the browse button in the Play when object
value is On field, search for, and select an object that has an on/off (or
enabled/disabled) state, such as an alarm.
8. Click the Video Source Device radio button if you want to display live images from a
surveillance camera.
If you are selecting Video Source File, go to step 11.
9. If you clicked Video Source Device, select a video driver from the dropdown menu,
and then go to step 12.
Your system must be configured with video surveillance-camera software in order for
video driver selections to appear in the dropdown menu.
The following video hardware is recommended for use with the video control window:
646 TAC
10. If you selected Video Source File, click the browse button in the Video Source File
field to browse for a AVI, MOV, or MPG file whose video recording you want to play
back. Use the four checkboxes to configure the files video display.
Select
If you want
Loop Forever
Show configuration
menu
Recorded images If you are viewing a recorded video file, the beginning of the
recording appears (in a stopped state) in design mode in your video control window.
For example:
Note: Your video control window can play a video stream in either design mode or
run mode
In the recorded video image above, notice the play controls along the bottom of the
control window. Live images (from a video source device) do not display play
controls.
Play Controls In run or design mode, the play controls function as follows:
Click the menu button (next to the play button) to bring up the
Menu button
configuration menu at any time, while the video is playing or stopped.
12. Configure the size, sound, and speed of your video stream via the Configuration
menu.
648 TAC
(You must have checked the Show configuration menu checkbox in the Video
Properties dialog.) This menu also allows you to make a still copy of the image
inside the video control window, open and close the window, and pause, stop, and
resume playback.
To use this menu, right click on the video control window in run or design mode. The
Configuration popup menu appears.
Select
To
View
Select the size of the image from its popup menu, as shown
above.
Volume
Speed
Copy
Select Attached Object if you want to display the name and path of the object
attached to the text box.
Select User Defined, and enter the appropriate text if you want to display custom
text in the tooltip.
Andover Continuum CyberStation Configurators Guide 649
2. Select Edit from the menu bar, and select Object Properties.
3. In the Check Box dialog, select the properties you require.
Object
User Entry
Select Attached Object if you want to display the name and path of the object
attached to the text box.
650 TAC
Select User Defined, and enter the appropriate text if you want to display custom
text in the tooltip.
7. Click OK.
8. To save and test the component, click the Run Mode button in the standard toolbar.
Click the Design Mode button to return to editing the panel.
On-Off
Select this option when you want to launch two different web
pages in your web browser control one when the string object is
turned on, and the other when it is turned off. When you select
On-Off, the Options tab becomes selectable.
From the On-Off Options tab, in the On field, enter a URL
address, or click the browse button to specify an HTML file that
you want to launch in your web browser control window when
your string object is turned on. Likewise, in the Off field, enter a
URL address, or click the browse button to specify an HTML file
that you want to launch in your web browser control window when
your string object is turned off.
Alarms
Select this option when you want to open different web pages
according to a particular state of an alarm, when an alarm is
triggered on you string object. For example, you can launch one
URL or HTML file when an alarm is active, another when it is
acknowledged, another when it is returned, and so on. When you
select Alarms, the Options tab becomes selectable.
In this Options tab, there are five fields; one field for each sate of
an alarm. In each states respective field, enter a URL address or
use the browse button to specify an HTML file. When your string
object triggers an alarm, the web page that you specify will open
according to the state of the alarm.
5. In the General tab, you can specify a home page for your web browser control
window. To do, simply enter a URL address in the Home Page field, or click the
browse button to browse for an HTML file to launch as a home page.
When the web browser control is active, click the home icon
control to go to the specified home page.
6. From the General tab, you can select user entry mode and theater mode by checking
the User entry URL and Theater Mode checkboxes, respectively.
User entry URL
Theater Mode
9. Click OK.
10. To save and test the component, click the Run Mode button in the standard toolbar.
Click the Design Mode button to return to editing the panel.
2. Select Edit from the menu bar, and select Object Properties.
3. In the Progress Bar Object Properties dialog, select the properties you require.
Object
High/Low Limit
Display Value
Units
Vertical
User Entry
4. Click the Colors tab to view the Colors dialog. This screen allows you to select colors
for:
Text
Background
Start
End
5. Select the Misc tab.
6. If you want to adjust the polling rate, enter a new value for Rate.
The polling rate determines how often a point is queried per millisecond to see if its
value has changed.
7. Select the ToolTips checkbox if you want to display a tooltip when the curser hovers
over the text box, and then specify the tooltip content.
Andover Continuum CyberStation Configurators Guide 653
Select Attached Object if you want to display the name and path of the object
attached to the text box.
Select User Defined, and enter the appropriate text if you want to display custom
text in the tooltip.
8. Click OK.
9. To save and test the component, click the Run Mode button in the standard toolbar.
Click the Design Mode button to return to editing the panel.
Pen labels area (beneath the time scale by default). This area lists the pens (a key to
the data object sources) that are plotted on the graph. You may move the pen labels
area to the right side of the trend control windows via the Graph Properties dialog,
discussed later in this section.
The trend window with its four main areas is shown below. In this example, the trend
control has three pens, each of which is polling data for temperature, in degrees
Fahrenheit:
You may select the color and plot-point design of each pen, via the pen style properties.
654 TAC
The area surrounding the entire trend control window is called the
margin. You may change the margin color (as well as many other
characteristics of the graph) via the Graph Properties dialog,
discussed later in this chapter.
Scrolling
Pen scale units begin at 0 at the bottom of the graph, by default. You
many scroll the pen units scale and the time scale by placing the
cursor over one of the scales, holding down the left mouse button,
and dragging the scale up or down (for the pen scaled) or from side to
side (for the time scale). You may also scroll up the pen units scale to
show negative unit values. Scrolling the scales is useful when you
want to demarcate a certain area of plots on the graph.
Zooming
Your trend control allows you to zoom in and zoom out on the graph.
The zoom features are contained in the graphs run mode menu.
About Pens
All pens belonging to a trend control are displayed in the windows pen labels areas. The
list of pens in the pen labels area is scrollable if there are more pens than the area can
display. In the pen labels area, each pen is listed as a pushbutton. Each label name
appears on its respective button.
You may select a pen as follows:
The graph is empty, and it does not display the pen labels area because you have
not yet created a pen. However, the active pen unit scale and the time scale appear
at the left side and bottom of the graph, respectively.
2. Right click, and select Add New Pen from the popup menu. The Pen Properties
dialog appears.
656 TAC
3. Click the browse button in the Pen Data Object field, and search for an object whose
data you wish to poll, track, and plot.
A data source is a real-time source (object attribute). The name of the pen data
object becomes the pen label (i.e., the name of the pen). Pen labels appear in the
pen labels area of the trend control window.
4. In the Scale area, enter maximum and minimum values for the data that is plotted on
the graph.
5. In the Style area, customize the appearance of the trend line and data points. Style
characteristics include pen color, what kind of line connects the data points, as well
as the style of the data points themselves.
Check the Hide this pen checkbox when you dont want this pen to appear on the
graph. The pen continues to record data from its source data object, but does not plot
data on the graph. A gray screen covers the pen itself in the pen labels area. For
example, the pen on the left is hidden:
6. Click OK.
7. Right click the trend control, and select Properties from the popup menu.
8. Select the Plot tab and specify properties of the graph.
Margin
Plot
Label
In the label field, as an option, you may enter a name for the trend
control window. This label appears above the graph. Click the Font
button to select a typeface and font for the trend control label, as
well as for the text throughout the entire trend control.
Check the Show checkbox when you want to show the trend
control label name. Remove the check in the Show checkbox when
you want to hide the label name.
Time Scale
Check the Show Time Scale checkbox when you want to show the
time scale on the trend control. Remove the check when you want
to hide the time scale. The Show Time Scale box is checked by
default. Check the Vertical Text checkbox when you want to
display time scale text vertically, at a right angle. This box is not
checked, and text is displayed horizontally, by default. When you
check this box, text is displayed vertically.
9. Click the Pen Labels tab to show, hide, and position pen labels, as well as pen label
units, on the trend control.
Show Pen Labels
Displays the pen labels along the right side of the trend
control.
Vertical Text
10. Select the Pens tab to add or delete a pen, as well as access the Pen Properties
dialog, where you may view and/or modify a pens properties.
11. Select the Misc tab.
12. If you want to adjust the polling rate, enter a new value for Rate.
The polling rate determines how often a point is queried per millisecond to see if its
value has changed.
13. Select the ToolTips checkbox if you want to display a tooltip when the curser hovers
over the text box, and then specify the tooltip content.
Select Attached Object if you want to display the name and path of the object
attached to the text box.
Select User Defined, and enter the appropriate text if you want to display custom
text in the tooltip.
14. Click OK.
15. To save and test the component, click the Run Mode button in the standard toolbar.
Click the Design Mode button to return to editing the panel.
Run Mode Menu Features of Trend Graphs
The run mode popup menus for the graph and the pen labels enable you to control
certain display characteristics of the plotted data.
658 TAC
Restart
Auto Scroll
Select Auto Scroll when you want the graph to scroll to the left
automatically whenever more data samples are plotted on the
graph. This allows you to see the latest plotted data.
Fit Time
Select Fit Time to show all the plotted data on the graph at once,
beginning with the time of the first plot in the leftmost part of the
graph, and ending with the latest plot on the rightmost part of the
graph.
Time Zoom In
Select Time Zoom In to zoom into the graph area (time axis) by
50 percent of its current size.
Select Time Zoom Out to zoom out of the graph area (time axis)
by 50 percent of its current size.
Hide
Fit Time
Select Fit Time to show all the plotted data on the graph at
once, beginning with the time of the first plot in the leftmost part
of the graph, and ending with the latest plot on the rightmost
part of the graph.
Select Add New Pen to launch the Pen Properties dialog, which
allows you to add a new pen to the trend control window. See also
Adding a New Pen.
Auto Scroll
Select Auto Scroll when you want the graph to scroll to the left
automatically whenever more data samples are plotted on the
graph. This allows you to see the latest plotted data.
Fit Time
Select Fit Time to show all the plotted data on the graph at once,
beginning with the time of the first plot in the leftmost part of the
graph, and ending with the latest plot on the rightmost part of the
graph.
Right click a pen, and select Pen Properties to launch the Pen Properties dialog
containing all the settings for that particular pen.
2. Right click the control, and select Object Properties from the popup menu.
The LED Number Control Object Properties dialog appears.
3. In the General tab, click the browse button in the Object field, search for, and select
an object whose numeric value you want to display.
4. Enter the number of digits to display. You may select a minimum of one digit and a
maximum of 10 digits.
5. Check the User Entry checkbox if you want users to be able to manually change the
integer value of the number controls source object.
660 TAC
Users can click the control to display a calculator where they can specify a new
value. Clear the checkbox to make the control read only.
6. Select the Alarms tab, and select a color for each state of an alarm.
When your data object triggers an alarm, the integer in the LED number control
appears in the specified color, depending on its current state.
7. Select the Misc tab.
8. If you want to adjust the polling rate, enter a new value for Rate.
The polling rate determines how often a point is queried per millisecond to see if its
value has changed.
9. Select the ToolTips checkbox if you want to display a tooltip when the curser hovers
over the text box, and then specify the tooltip content.
Select Attached Object if you want to display the name and path of the object
attached to the text box.
Select User Defined, and enter the appropriate text if you want to display custom
text in the tooltip.
Click OK.
10. To save and test the component, click the Run Mode button in the standard toolbar.
Click the Design Mode button to return to editing the panel.
Alarm
Enabled/disabled
Locked/unlocked
Scheduled lock/unlock
Trouble
Timed unlock
2. Right click the door control and select Object Properties to display the Door
Control dialog.
3. In the General tab, select the properties you require.
Object
Style
User Entry
Switch
Animation
7. Select the Personnel Data tab, to select up to four attributes to be displayed in the
details dialog.
You can select any personnel attributes listed to be displayed under the personnel
picture of the last person to enter or to exit through the attached door. If the check
box next to the attribute is checked, it is displayed in the dialog.
8. To execute Plain English (PE) commands in addition the button action you defined in
step 5, select the Plain English Script tab, and enter the PE script. Click the Check
button to verify that the script has no syntax or other errors.
PE scripts can execute any command-line command. PE scripts cannot have local
variable declarations or labels. PE scripts are executed before the selected Active
Button performs its action (i.e., open panel, open object, etc.).
9. Select the Misc tab.
10. If you want to adjust the polling rate, enter a new value for Rate.
The polling rate determines how often a point is queried per millisecond to see if its
value has changed..
11. Select the ToolTips checkbox if you want to display a tooltip when the curser hovers
over the text box, and then specify the tooltip content:
Select Attached Object if you want to display the name and path of the object
attached to the text box.
Select User Defined, and enter the appropriate text if you want to display custom
text in the tooltip.
12. Click OK.
13. To save and test the component, click the Run Mode button in the standard toolbar.
Click the Design Mode button to return to editing the panel.
Controlling a Door
You can use a door control to unlock the door assigned to the control, view door details
and events, and perform other functions to control that door object.
You cannot use a door control to lock down a door or to clear the Lockdown state from a
door. Instead, use the area control for the Area object to which the door is assigned.
Note: The User Entry checkbox must be checked in the Door Control dialog for the
specific door control before you can control the door as described in the following
table. For more information see, Creating a Door Control, earlier in this chapter.
If you want to
Then
664 TAC
User Entry
Flat Appearance
4. In the Images tab, specify how you want to represent the area in its Lockdown and
Normal states:
Select Custom Images, and use the browse buttons to select the files that
contain the bitmap images you want to use for the Lockdown and Normal states.
Select Color, and select the colors you want to represent the Lockdown and
Normal states for this area. When you select the Color option, the select color
fills the rectangle that represents the area in the specified state.
5. In the Label tab, select the Show Area Name checkbox if you want to display the
area name on the control. Select the font and color you want to use to use for the text
in the Lockdown and Normal states.
6. In the Plain English (PE) Script tab, you can execute any command-line command.
PE Scripts cannot have local variable declarations or labels. Note that PE scripts are
executed before the selected active button performs its actions (that is, open panel,
open object, and so on).
Create or insert your PE script, and click the Check button to check the script for
errors.
7. Select the Misc tab.
8. If you want to adjust the polling rate, enter a new value for Rate.
The polling rate determines how often a point is queried per millisecond to see if its
value has changed..
9. Select the ToolTips checkbox if you want to display a tooltip when the curser hovers
over the text box, and then specify the tooltip content:
Select Attached Object if you want to display the name and path of the object
attached to the text box.
Select User Defined, and enter the appropriate text if you want to display custom
text in the tooltip.
10. Click OK.
11. To save and test the component, click the Run Mode button in the standard toolbar.
Click the Design Mode button to return to editing the panel.
666 TAC
If you want to
Then
Then
Lock down an
individual door
Right click the area control, select Doors, and then select
the name of the door you want to lock down. Select
Lockdown.
Right click the area control, select Doors, and then select
the name of the door you want to change. Select Clear
Lockdown.
668 TAC
Appendix A
Using the Personnel Editor
The following appendix describes how to complete the tabs of the Personnel object
editor. The Personnel editor is a dialog similar to other CyberStation dialogs. The
Personnel Manager, described in Chapter 19, is a powerful and easy-to-use tool for
entering, viewing, and managing personnel data. If you prefer to use the Personnel
editor, you can edit the workstation configuration to display this editor.
1.
2.
3.
4.
In Continuum Explorer, right click your workstation folder, and click Open.
Select the Preferences tab of the Device editor.
Scroll down to the preference setting, Use Personnel Manager, and select False.
Click OK.
In Continuum Explorer, you can double click a Personnel object to edit the object in
the Personnel editor.
672 TAC
From the General tab, you also create or modify a photo ID badge for this person. See
the Make/Edit Badge description in the table below.
Note: The Andover Continuum system supports custom ABA cards. Each custom ABA
format must be defined as a special Infinity String. The custom format of this string
affects the way you enter card numbers and site does in this tab.
Name
Enter from left to right, a persons first name, middle initial or middle name
(if applicable), and last name.
State
Activation
Date
Enter the date and time a person can begin using an access card.
Expiration
Date
Enter an expiration date and time for this person's access card. Expiration
Date automatically disables a personnel object when the specified
date/time is reached.
Card Type
Card
Number
Site Code
PIN
Visitor
ADA
Signature
Default
Clearance
Level
Enter the clearance level that applies to all areas you assign to this
person. You can enter a value between 0 and 255, with 1 providing the
greatest access and 255 providing the least access. Enter 0 if you do not
want to assign a default clearance level to this person.
You can override the Default Clearance Level for an individual area by
entering a different clearance level for the area when you assign the area
to this person. You assign areas to a personnel object and specify their
clearance levels in the Area List tab.
Executive
Privilege
Mark Card
As Lost
Click this button in the editor if a person has lost an access card.
Issue
Temporary
Card/
Restore
Permanent
Card
Make/Edit
Badge
Click this button to create or modify a photo ID badge for this person.
When you click this button, the Make/Edit Badge dialog appears. From
this dialog, you can create/edit a badge layout, select a photo-image
source, and, if necessary, a signature-image and fingerprint-image
source. See Making/Editing a Badge in Chapter 19 for more information.
To create or modify a badge layout, your site must have purchased the
separately sold application called the EPIDesigner. This option is
enabled/licensed via your CyberStation key, if your site has purchased
this option.
Compatible with old Guard Draw Files: For Version 1.8 and higher,
EPIDesigner is used for layout instead of Guard Draw. However, you can
easily open and save you pre-Version 1.8 Guard Draw layouts (.gdr files)
as EPIDesigner layouts (.dgn files).
The clearance level, if any, assigned to each area for this person, and whether
validation for access to this area occurs at the access server or at the controller
managing doors to the area
The status of the area, either enabled or disabled, indicating whether or not the area
is currently accessible
674 TAC
You can complete the following tasks in the Area List tab:
Enter a clearance level for a specific area assigned to one person, overriding the
value for Default Clearance Level entered in the General tab.
676 TAC
3. Click OK.
You are then asked: Do you want to attach a schedule to the areas?
4. Click Yes to search for, select, and attach a schedule, via the Browse dialog.
Click No if you do not want to attach a schedule.
5. Click OK.
If you want to change the clearance level of any of the areas you added, you can edit
the area properties as described below.
Custom
Control
Fields
Allow AntiPassBack
Disable
Card if not
used in
Days
Enter the number of days of inactivity after which the access card is
disabled. The card remains in the database and is restored if you
later enable the card in the General tab.
Enter the name of the department for which this person works.
Dept Number
Employee Number
Supervisor
Office Phone
Office Location
Title
Parking Sticker
Vehicle Info
678 TAC
person.
License
Social Security #
Start Date
Info 1 Info 6
City
State
ZIP
Country
Emergency
Phone
Home Phone
Date of Birth
Hair Color
Eye Color
Height
Weight
Sex
Blood Type
Displays the last area entered by this person. If needed, you can
also override the current area with a different area for this
person.
CyberStation determines the current area from the last door
entered information, if available. In systems sets up to prevent
or discourage tailgating, you may occasionally need to override
the displayed current area if the person accessed a different
area without using their card or entering their PIN and is now
prevented from leaving an area.
To override the current area, click the browse button. In the
Browse dialog, locate the correct area for the person, and click
the Select button. CyberStation distributes the new current area
for this person to the appropriate controllers.
Current Security
Zone
Last Door
Entered
Displays the object name of the last door a person went through
using an access card and/or access code.
Current Status
Time of Entry
Displays the time and date a person entered the area displayed
for Current Area.
680 TAC
Time Stamp
Displays the date and time at which the access event occurred.
Door
Displays the name and path of the Door with which the person
caused the event.
Area
682 TAC
684 TAC
Appendix B
EpiBuilder Installation
685
In order to make or modify a badge layout, your site must have already purchased the
separately sold badging software product, EPIBuilder, made and distributed by
ImageWare Systems. In CyberStation Version 1.8 and higher, EPIBuilder replaces
EPISuite software, which was used in previous versions. The EPIBuilder option is
enabled and activated via your CyberStation key, if your site has purchased this option.
In CyberStation 1.8 and higher, the EPIDesigner application replaces Guard Draw as the
badge layout tool. (Guard Draw is used in previous versions of CyberStation.) However,
your existing Guard Draw files are compatible with and can be used in EPIDesigner.
Installing EPIBuilder
EPIBuilder, with its EPIDesigner photo badge layout application, is a separate product
that your site has purchased as a special option. EPIBuilder is included on your
CyberStation product key that you insert into your computer. If your site has not
purchased EPIBuilder, TAC activates the option inside the CyberStation key at the
factory. Therefore, not much is required, other than inserting your key.
1. Insert the CyberStation product key into the USB port on your computer, as you
would normally.
Note: If your site has purchased this option, then EPIBuilder is already activated
inside your CyberStation key. Proceed to Step 2.
However, if your site wants to add EPIBuilder on computers with existing
CyberStation installations, then your administrator must contact TAC to obtain
an activation code. When contacting TAC, provide the serial number of your
CyberStation key. To assist in obtaining this serial number and activating the
key, run the file, ACCKeyWriter.exe, located in:
Program Files\Continuum
Enter the activation code into the Keycode field in the ACCKeyWriter, and click
the Update button. If successful, you receive this message:
Your key has been programmed.
This activation must be performed on every workstation.
2. Continue installing CyberStation as you would normally.
For more information on installing CyberStation, please see the Andover Continuum
CyberStation Installation Guide, 30-3001-720.
686 TAC
Appendix C
Personnel Import Utility Tables
and Sample XSLT File
Andover Continuum CyberStation Configurators Guide 687
Card type formats and allowed values for site code and card number
This appendix also includes a sample XSLT file and general information about Active
Directory and the Lightweight Directory Access Protocol (LDAP).
Address
Country/region
Address
Country/region
company
Organization
Company
countryCode
Address
Country/region
department
Organization
Department
description
General
Display Name
directReports
Organization
Direct Reports
Attribute Name
assistant
businessCategory
c
carLicense
cn
co
comment
createTimeStamp
688 TAC
Attribute Name
Active Directory
User Interface Tab
displayName
General
Display Name
facsimileTelephone
Number
Telephones
Fax
givenName
General
First Name
homePhone
Telephones
Home
distinguishedName
division
employeeID
employeeNumber
employeeType
extensionAttribute1
extensionAttribute2
extensionAttribute3
extensionAttribute4
extensionAttribute5
extensionAttribute6
extensionAttribute7
extensionAttribute8
extensionAttribute9
extensionAttribute10
extensionAttribute11
extensionAttribute12
extensionAttribute13
extensionAttribute14
extensionAttribute15
extensionAttribute16
homePostalAddress
houseIdentifier
Andover Continuum CyberStation Configurators Guide 689
Attribute Name
Active Directory
User Interface Tab
info
Telephones
Notes
initial
General
Initials
ipPhone
Telephones
IP phone
l (Lower-case L)
Address
City
General
manager
Organization
Manager
memberOf
Member Of
Member Of
Telephones
Mobile
otherFacsimileTelephone
Number
Telephones
otherHomePhone
Telephones
otherIpPhone
Telephones
otherMobile
Telephones
otherPager
Telephones
otherTelephone
General
Telephones
Pager
General
Office
postalCode
Address
Zip/Postal Code
postOfficeBox
Address
P.O. Box
middleName
mobile
modifyTimeStamp
name
otherMailbox
ou
pager
personalTitle
physicalDeliveryOffice
Name
postalAddress
preferredLanguage
690 TAC
Attribute Name
Active Directory
User Interface Tab
primaryGroupID
Member Of
Primary Group
Account
sn
General
Last Name
st
Address
State/Province
streetAddress
Address
Street
telephoneNumber
General
Telephone Number
title
Organization
Title
url
General
userPrincipalName
Account
userWorkstations
Account
Logon On To/Logon
Workstations
whenChanged
Object
Modified
whenCreated
Object
Created
wWWHomePage
General
Web Page
primaryInternationalISDN
Number
primaryTelexNumber
roomNumber
sAMAccountName
sAMAccountType
street
Continuum
Personnel Editor
Personnel
Tab and Field
Attribute Name
Active
Directory
Data Type
ADA
General / ADA
String or
Boolean
Address
Personal Info /
Address
String
Alias
Properties / Alias
String
AllowEntEntEgr
Privileges / Allow
String or
Entry Upon Area Anti- Boolean
Passback Violation
AreaLinks
AreaList / N/A
String
Blood
String
Card Number
Genera / Card
Number
String or
Integer
Card Type
String
City
String
Country
Personal Info /
Country
String
DateOfBirth
Generalized
Time
Time Value
Default
Clearance
Level
General / Default
Clearance Level
String or
Integer
Value 0-255
Department
Employee Info /
Department
String
Department
Code
Employee Info /
Department Number
String or
Integer
Value 0-65535
692 TAC
Continuum
Personnel Editor
Personnel
Tab and Field
Attribute Name
Active
Directory
Data Type
Emergency
Contact
Personal Info /
Emergency
String
Emergency
Phone
EmpNumber
Employee Ingo /
Employee Number
String
Executive
Privilege
General / Executive
Privilege
String or
Boolean
Expiration
Date
General / Expiration
Date
Generalized
Time
Time Value
EyeColor
String
FirstName
General / Name
String
HairColor
String
Height
HomePhone
String
Info1
Info2
Info3
Info4
Info5
Info6
JobTitle
String
Continuum
Personnel Editor
Personnel
Tab and Field
Attribute Name
Active
Directory
Data Type
LastName
General / Name
String
License
Number
Employee Info /
License
String
Lost Card
General / N/A
String or
Boolean
MiddleName
General / Name
String
NonABACard
Number
General / Card
Number
String or
Integer
OfficeLocation
Employee Info /
Office Location
String
Parking
Sticker
Employee Info /
Parking Sticker
String
PIN
General / Pin
String or
Integer
Value of 1-65535
RefTemplate
Templates / N/A
String
SecurityLevel
String
Sex
String
Value of "Male" or
"Female"
SiteCode
String or
Integer
SocSecNo
Employee Info /
Social Security No
String
StartDate
Generalized
Time
Time Value
694 TAC
Continuum
Personnel Editor
Personnel
Tab and Field
Attribute Name
Active
Directory
Data Type
State
General / State
N/A
StateOf
Residence
String
Supervisor
Employee Info /
Supervisor
String
Vehicleinfo
Employee Info /
Vehicle Info
String
Visitor
General / Visitor
String or
Boolean
Weight
Personal Info /
Weight
String or
Integer
Value of 0-999
WorkPhone
Employee Info /
Office Phone
String
ZIP
String
ABA2
N/A
1 99999999999999999999999
AC4plus432
1 2047
1 8191
CK34
1 4095
1 7065535
CustomMagStripe
(Custom ABA)
0 65535
1 99999999999999999999999
CustomWiegand
0 6535
1 4294967295
G31 (Wiegand31)
1 255
1 65535
HIDCorp1000_35
1 4095
1 1048575
Infinity_37
1 4095
1 524287
Andover Continuum CyberStation Configurators Guide 695
Card Type
PINOnly
N/A
N/A
Wiegand26
1 255
1 65535
Active Directory
The Personnel Import Utility uses the Microsoft Active Directory service. Active Directory,
a service based on the LDAP network protocol, provides a unified view of complex
networks. It is a tree structure. Each node in the tree has a set of properties.
Active Directory, or Active Directory Services (ADS), resides on a server known as the
domain controller. The domain controller must be Windows Server 2000 or Windows
Server 2003 machine. When ADS is installed, four principle objects are created:
A computer entry that represents the domain controller for the Windows 2000/2003
Server
A Domain context container into which the above objects are placed.
Note: You IT or system administrator is responsible for learning about and stabling the
Microsoft Active Directory service on a domain server. You must have this
Microsoft service in order to use the Personnel Import Utility. For more information
on setting up Active Directory, visit webs sites such as these:
http://www.serverwatch.com/tutorials/article.php/1474461
http://www.windowsnetworking.com/articles_tutorials/w2ksvrin.html
http://activedirectory.com
Internal Directory: These directories are used within the corporate network for
publishing information about users and resources within the enterprise. A companys
internal directory may be accessible to employees when they are outside the
company network using a secure connection such as a virtual private network (VPN)
connections, but it is not accessible to non-employees.
696 TAC
Application Directory: These directories store private directory data that are
relevant only to the application in a local directory, perhaps on the same server as
the application, without requiring any additional configuration to Active Directory. The
personalization data, which is only interesting to the portal application and does not
need to be widely replicated, can be stared solely in the directory associated with the
application. This solution reduces replication traffic on the network between domain
controllers.
Description
Simple Objects
Organizational Units
Domain
Tree
Unit
Description
Domain Trees
Forest
698 TAC
Unit
Description
Site
Schema
Description
The Active Directory provides the DN, RDN, GUID, and UPN for objects to ensure
uniqueness, ease of location for LDAP queries, and ease of use. These names are used
to map data source attributes to Continuum personnel record attributes in the Personnel
Import Utility. (For more information, refer to Chapter 19, Personnel.)
Global Catalog
The LDAP protocol allows network users to search for a find te objects in the Active
Directory they want to use. For this to happen, the Active Directory domain controllers
maintain a global catalog.
The global catalog allows users and applications to find objects in the Active Directory by
searching for one or more particular attributes. The global catalog holds a partial
replica of the objects and their most common attributes. When you perform a search
operation to find a user (or other object), the global catalog is checked to find matched for
700 TAC
that request. The global catalog looks for that attribute and returns matches. Data in the
global catalog are built and maintained through replications among domain controllers.
LDAP Protocol
The Lightweight Directory Access Protocol (LDAP) is a networking protocol for
querying and modifying directory services running over TCP/IP. The Personnel Import
Utility uses the LDAP-compatible Microsoft Active Directory service. An LDAP directory
usually followings the x.500 model: it is a tree of entries, each of which consists of a set
of named attributes with values.
Note: If you need to know more about the KDAP beyond the information that is provided
in this manual, please consult websites and other literature for this network
protocol.
Protocol Overview
LDAP is a protocol designed to be a lightweight front-end to a X.500 directory or standalone directory serve, such as Active Directory, over the Transmission Control Protocol
(TCP) and the User Datagram Protocol (UDP).
LDAP is a client-server protocol that enables you to locate specific information and other
resources, such as files and devices on a network. Protocol elements are carried directly
over TCP or UDP, thereby bypassing much of the session/presentation overhead
requires for other directory serves, such as X.5000. LDAP uses a lightweight basic
encoding rule (BER) notation to encode all protocol elements.
An attribute has a name (an attribute type or attribute description) and one or more
values.
Each entry has an unambiguous name: Distinguished Name (DN). This consists of its
Relative Distinguished Name (RDN) constructed from some attribute(s) in the entry,
followed by the parent entrys DN. Think of the DN as a full filename, or a database
index value, and the RDN as a relative filename in a folder. For more information on
these names, refer to Active Directory earlier in this appendix.
A server holds a subtree starting from a specific entry (for example,
dc=example,dc=com and its children). Servers may also hold references to other
servers, so an attempt to access ou=Some department,dc=example,dc=com could
return a referral or continuum reference to a server that holds the part of the directory
tree. The client can then contact the other server. Some servers support chaining, which
means the server contacts the other server and returns the results to the client.
LDAP rarely defines any ordering. The server may return the values in an attribute, the
attributes in an entry, and the entries found by a search operation, in any order.
The following is a table of acronyms used in LDAP.
ADSI
ADS
DNS
DN
Distinguished Name
OU
Organizational Name
CN
Common Name
LDIF
RDN
DC
Domain Controller
ADAM
The following is a table of Active Directory user attributes information and their
corresponding LDAP names.
Attribute
Name
Description
CN
LDAP Display
Name
Text-Country
TextCountry
CO
Address
Address
streetAddress
AddressHome
AddressHome
honePostalAddress
Assistant
Assistant
Assistant
Comment
Comment
info
Picture
Picture
thumbnailPhoto
CountryName
CountryName
FacsimileTelephoneNumber
FacsimileTelephoneNumber
facsimileTelephone
Number
702 TAC
Attribute
Name
Description
CN
LDAP Display
Name
InternationalISDNNumber
Specifies an International
ISDN Number associated with
an objet.
Internation
al-ISDNNumber
internationalISDNN
umber
LocalityName
LocalityName
Personal-Title
PersonalTitle
PersonalTitle
Post-OfficeBox
PostOffice-Box
postOfficeBox
PostalAddress
PostalAddress
PostalAddress
Postal-Code
PostalCode
PoastalCode
State-OrProvinceName
State-OrProvinceName
st
SteetAddress
StreetAddress
street
TelephoneNumer
TelephoneNumber
telephoneNumber
PhoneHome-Other
PhoneHomeOther
otherHomePhone
Selecting all the attributes you mapped in the Map DataSource Attributes to
Continuum Attributes window
Adding Arealinks
Removing carriage return characters (or any characters) when importing AD attribute
values
704 TAC
2.
<!-- If the attribute is used here don't add it at the <xsl:copy-of select-->
<!-<StateOfResidence>
<xsl:choose>
<xsl:when test="StateOfResidence='Massachusetts'">
<xsl:text>MA</xsl:text>
</xsl:when>
<xsl:when test="StateOfResidence='New Hampshire'">
<xsl:text>NH</xsl:text>
</xsl:when>
<xsl:when test="StateOfResidence='Washington DC'">
<xsl:text>DC</xsl:text>
</xsl:when>
<xsl:when test="StateOfResidence='Connecticut'">
<xsl:text>CT</xsl:text>
</xsl:when>
<xsl:otherwise>
<xsl:value-of select="StateOfResidence"/>
</xsl:otherwise>
</xsl:choose>
</StateOfResidence>-->
3.
706 TAC
6. Adding Arealinks
<!-- To implement Area Links, uncomment the section below before the <AreaLinks>
tag and after the </AreaLinks> tag-->
<!-- To add more areas, Copy the <AreaLink></AreaLink> tags and everything
between them and past after the first </AreaLink> tag-->
<!-- State can be Enabled or Disabled, Preload is Workstation Only and can
be True or False, AreaId example Root\MyPersonnelFolder. -->
<!-- This is line 1 of 2 to remove to implement Area Links
<AreaLinks>
<AreaLink>
<AreaId><![CDATA[Full Path To Area Here]]></AreaId>
<SchedId>Full Path To Schedule Here</SchedId>
<State>Enabled</State>
<Preload>False</Preload>
<ClearanceLevel>0</ClearanceLevel>
</AreaLink>
</AreaLinks>
This is line 2 of 2 to implement Area Links -->
708 TAC
710 TAC
Appendix D
Scheduling Automatic Personnel
Object Updates
Andover Continuum CyberStation Configurators Guide 711
This appendix provides a procedure for setting automatic updating of personnel data in
CyberStation with data from your personnel application. This information applies only to
customers who use the Personnel Import Utility to import personnel records into
CyberStation. For more information about the Personnel Import Utility, see Chapter 19.
The Windows Task Scheduler is a Windows system tool you can use to run scripts or
programs according to a schedule. With this tool, you may regularly perform personnel
import operations automatically at specific times.
Note: Before you run Task Scheduler, make sure the computers date and time settings
are accurate.
Perform the following steps to set up and run a task automatically:
1. From the Windows Start menu, select Programs, select Accessories, select
System Tools, and then select Scheduled Tasks.
Note: This procedure is based on Microsoft Windows XP. Other user interfaces may
vary.
2. In the Schedule Tasks dialog, double click Add Scheduled Task, and click Next.
3. To search for the program you want to run (PersonnelImportUtility), click Browse.
4. Double click the Program Files folder, and then double click the Continuum foler.
5. Navigate to and double click PersonnelImportUtility.exe.
The Schedule Task Wizard automatically displays the application name in the
program naming field.
712 TAC
6. Select one of the radio buttons to specify how often you want to thus update to run
automatically, and click Next.
7. Select the time and day you want this scheduled task to start, enter a Start time and
Start Date in their respective fields, and click Next.
8. Enter the name and password of a user in the Enter the user name field and Enter
the password field respectively, and click Next.
The final screen informs you that the task has been successfully scheduled. It also
provides the time and frequency of the task and the day it begins. For example:
714 TAC
If you want to configure more advanced properties for this scheduled task, check the
Open advanced properties for this task when I click Finish checkbox.
9. Click Finish.
10. The PersonnelImportUtility dialog appears.
This dialog contains the advanced properties for this task, as mentions in the
previous step. If you do not check this box in the previous step, the scheduled task
setup completes, and the PersonnelImportUtility dialog does not appear.
11. In the Tasks tab of the PersonelImportUtility dialog, enter the command in the Run
field as follows:
C:\Program Files\Continumm-C ConfigurationFileName G No E
ErrorFil.txt -U acc
Note: When entering the command rom here, please make sure you set the
parameters outside the quotes surrounding the path name.
If the ObjectName and/or UserName contains a space, then you must also place
quotes around those items.
Andover Continuum CyberStation Configurators Guide 715
12. Enter the path of the folder in which you are starting the application in the Start field.
In this case:
C:\Program Files\Continuum
13. In the Schedule tab, click the Advanced button to bring up the Advanced Schedule
Options dialog. Configure more advanced settings as needed, and click OK.
Modify
View, Run
Read
View
Write
716 TAC
The following is a table of names you must use and a description of those names.
Name
Description
-C
-G
UI Mode
-E
-U
PersonnelImportUtility
Status Notation
Meaning
Empty
Missed
Running
Note: Task Scheduler sends deleted tasks to the Recycle Bin. If you do not want a task
to run, but think you might want to use the task later, Disable the task instead of
deleting it.
Description
AT Service Account
View Log
718 TAC
Appendix E
Custom Card Formats
719
Site code
Issue code
Manufacturer code
CyberStation provides the user with an interface to specify the structure of a custom ABA
magnetic stripe card.
A door can be configured for ABA Format2 or Custom ABA, but not both.
The default mode for parsing a card is fixed length. Installations not using fixed length
cards must indicate that they are using variable length structures with a special
identifier character (V) described later in this section.
Overall Process
The over process of setting up CyberStation to support custom ABA access cards works
as follows:
Define a special InfinityString object in the CX controller editor and name it
CustomABAFormat. This allows CyberStation to interrupt important custom information
contained on a persons ABA access card for example, the site or faculty code, the
issue code, the manufacturer code, and so on.
Enter the card number and site code of the Personnel object for each holder.
Once the door is configured for Custom ABA card format, the CX controller sends the
value of the string to the AC-! Plus modules.
The AC-1 Plus modules use the information in the string to parse card swipes and
then send the parsed data (CardNumber, SiteCode, etc.) to the CX controller for
validation.
720 TAC
Procedure
The detailed steps involved in defining and configuring a custom ABA card format are
described below.
1. In network view in the Continuum Explorer, right click the CX controller to be
configured for the custom ABA format.
2. Select New, and then select InfinityString from the dropdown menus.
3. Type in CustomABAFormat in the Object name field of the New dialog.
4. Click the Create button. This InfintyString editor will appear.
5. In the General tab, set the String Size field to 60 or less characters. 132 is the
default. If you enter more than 60 you will receive an error message (only on CX
reload).
6. Ensure that the Setpoint checkbox is checked (the string must be identified as a
setpoint) and click Apply.
7. In the Value field, enter the unique alphanumeric characters for the
CustomABAFormat string.
8. Click OK.
9. Open the Door editor associated with the CustomABAFormat CX controller selected
in step 1.
10. In the Card Formats tab, select the Card Format ABA radio button.
11. Select the ABA Formats Custom checkbox.
12. In the Entry Reader tab, select the Validate Site checkboxes, along with any other
applicable checkboxes.
13. Repeat step 12 for the Exit Reader tab.
14. Click OK.
15. Open the Personnel Manager (or Personnel editor) for the person holding a
CustomABAFormat access card.
16. From the Card Type dropdown menu, select CustomMagStripe.
17. Enter the correct numbers in the Site Code and Card Number fields.
Site Code is optional. If it is not used, set it to 0.
18. Click OK.
Repeat steps 15-18 for each custom ABA cardholder.
721
Description
Bit
Start Sentinel
Field Separator
End Sentinel
Longitudinal
Redundancy Check
Character (LCR)
722 TAC
Card Field
Description
Alphanumeric
Identifier
T (an ASCII
character)
V (an ASCII
character)
1 (a hexadecimal
integer)
Card Number
2 (a hexadecimal
integer)
Field Separator
S (an ASCII
character)
4 (a hexadecimal
integer)
Manufacturer Code
8 (a hexadecimal
integer)
Shared-field Integers
Any other
hexadecimal
integer
Not Used
X (an ASCII
character)
End Sentinel
Z (an ASCII
character)
Longitudinal
Redundancy Check
(LRC)
L (an ASCII
character)
R (an ASCII
character)
723
The second and third digits (33) are the first two digits of the site code as well as the
first two digits of the card number since both fields share them.
Digits 7-15 (222222222) are the remaining digits of the card number.
Digits 17-20 (XXX) are ignored by CyberStation since they have been marked as not
used.
10555
10123456789
2002
1040
Note that the site code and card number share the same first two digits (10) as
determined by the 33 in the string format.
Rules and Guidelines
Here are some important rules and guidelines to follow when entering the string structure
value:
CyberStation parses and interprets the card data from left to right, based on the
string structure you provide. The leftmost digit becomes the most significant digit.
Remember, the a limit of 60 characters.
Limit
Card Numer
19 digits
724 TAC
Site Code
5 digits
2 digits
Manufacturer Code
16 digits
In a fixed-length structure, you must use a field separator (S) to correspond with
every place it appears in the persons card. For example, if the card contains four
field spearators, your structure must have four separators that must appear in the
same location specified by the CustomABAFormat string. If the card has no
separators, your structure should have no separators.
In any structure, the not-used character (X) should correspond with digits that are not
used on the card (see example on previous page).
725
726 TAC
You must place the overlapping (shared) integer in the structure from left to right because
CyberStation parses digits from left to right.
For example, suppose you were sharing two numbers in the site code and card number.
(The integer 3 specifies a share between these two fields.) Suppose the persons site
code is 75, and the card number is 75944. The site code and card number fields in your
structure would look similar to this:
T332222
For every combination of shared fields (two, three, or four fields), the following table tells
you which hexadecimal integer to use in your string structure.
Note: Each integer below is the sum of the integers that represent the shared fields (1 for
site code, 2 for card number, 4 for card issue code, and 8 for manufacturer code).
For example, a 9 specifies a share between the site code field (1) and
manufacturer code field (8) in other words, 1 plus 8. A 6 specifies a share
between the card number field (2) and the card issue code field (4) in other
words, 2 plus 4.
To Share Digits in these
Fields
Card Number
Site Code
3
(represents 2+1)
Site Code
Card Issue Code
5
(represents 1+4)
Card Number
Card Issue Code
6
(represents 2+4)
Card Number
Site Code
Card Issue Code
7
(represents 2+1+4)
Site Code
Manufacturer Code
9
(represents 1+8)
Card Number
Manufacturer Code
A
(represents 2+8)
Card Number
Site Code
Manufacturer Code
B
(represents 2+1+8)
C
(represents 4+8)
Site Code
Card Issue Code
Manufacturer Code
D
(represents 1+4+8)
727
Card Number
Site Code
Manufacturer Code
Card Number
Site Code
Card Issue Code
Manufacturer Code
F
(represents 2+1+4+8)
(represents 2+1+8)
Each custom card format must have a unique site code, otherwise the system will not
be bale to uniquely identify people with the same card number but different formats.
Selecting the Custom card type on a door will allow all custom card types to enter
that door.
Functionality
There is no change in the way custom cards are implemented; this new revision only
expands the number of custom cards supported from one to four.
Custom Card Validation in Degrade Mode
Degrade Mode is when the AC-1 cannot communication with the NetController. For the
AC-1 to perform site code validation when operating in degrade mode, do the following:
728 TAC
Add the following code at the end of the Plain English program where the AccessFormat
array9s) is/are initialized:
Numeric siteCode1, SiteCode2, SiteCode3, SiteCode4
Set up AccessFormat below
AccessFormat[0] =
etc
729
The AC-1 can only store all four site codes for one format and the last one selected from
the above list wins. Out of the four possible Custom Access Format arrays, only the
AccessFormat is sent to the AC-1. Note that if G31 were select, the AC-1 would store
that instead of Custom Access Format.
730 TAC
Appendix F
Points Electrical Types
731
InfinityInput Types
Type
Description
ACC_Airflow
ACC_Keypad
ACC_Pressure
ACCTemp(DegC)
ACCTemp(DegF)
Counter
732 TAC
Type
Description
Digital
InputCurrent
RTD1000TempC
RTD1000TempC2W
RTD1000TempF
RTD1000TempF2W
RTDTemp(DegC)
RTDTemp(DegF)
RTDTempC2W
RTDTempF2W
733
Type
Description
Supervised
TankProbe
ThermoCoupBTempC
ThermoCoupBTempF
ThermoCoupETempC
ThermoCoupETempF
ThermoCoupJTempC
ThermoCoupJTempF
ThermoCoupKTempC
734 TAC
Type
Description
ThermoCoupKTempF
ThermoCoupRTempC
ThermoCoupRTempF
ThermoCoupSTempC
ThermoCoupSTempF
ThermoCoupTTempC
ThermoCoupTTempF
Voltage
InfinityOutput Types
Type
Description
Current
Digital
HiResCurrent
HiResVoltage
PanelMeter
Use this unit type when setting up an output point for an LS-8
Seven Segment Display Board IOU module. A PanelMeter
output allows a Plain English program to assign a numeric
value to the display without doing a string conversion. The
Alternative is to use a string output, but the Plain English
program must convert the string using the NumToStrn
function.
735
Type
Description
Pneumatic
Tristate
Voltage
736 TAC
30-3001-781