Professional Documents
Culture Documents
EBI R500.1 EBIOverview PDF
EBI R500.1 EBIOverview PDF
Overview
EBI-ZZDOC500-02
May 2016
Release 500
Document Release Issue Date
EBI-ZZDOC500-02 500 2 May 2016
Disclaimer
This document contains Honeywell proprietary information. Information contained
herein is to be used solely for the purpose submitted, and no part of this document or its
contents shall be reproduced, published, or disclosed to a third party without the express
permission of Honeywell International Sàrl.
While this information is presented in good faith and believed to be accurate, Honeywell
disclaims the implied warranties of merchantability and fitness for a purpose and makes
no express warranties except as may be stated in its written agreement with and for its
customer.
In no event is Honeywell liable to anyone for any direct, special, or consequential
damages. The information and specifications in this document are subject to change
without notice.
Copyright 2016 - Honeywell International Sàrl
2 www.honeywell.com
Contents
3
CONTENTS
4 www.honeywell.com
CONTENTS
5
CONTENTS
6 www.honeywell.com
About this guide
7
ABOUT THIS GUIDE
Installation Guide
The Installation Guide describes how to set up server and client computers and install
the EBI components.
8 www.honeywell.com
ABOUT THIS GUIDE
Operator's Guide
The Operator's Guide describes how to use Station to monitor and control your EBI
system.
9
ABOUT THIS GUIDE
Diagnostic Guide
The Diagnostic Guide is a troubleshooting reference. It describes common problems,
diagnostic checks and solutions.
Document availability
The documents are supplied in one or more of the following formats:
• Documentation Set—a help file that contains all EBI documents.
You can access the Documentation Set from Station, or from the Start menu by
selecting Programs > Enterprise Buildings Integrator > EBI Documentation.
• Print—included in the EBI delivery package.
• PDF—supplied on EBI DVD. (If necessary, you can load them on any computer.)
• Context-sensitive help—supplied with client applications such as Quick Builder and
Display Builder.
The following table shows the formats in which each document is supplied.
10 www.honeywell.com
ABOUT THIS GUIDE
11
ABOUT THIS GUIDE
12 www.honeywell.com
Introduction to EBI
This section provides an overview of EBI. You should read this section carefully to gain
an understanding of EBI features and capabilities.
Related topics
“The versatility of EBI” on page 14
“Architectural flexibility” on page 17
“Operator interfaces” on page 24
“Operator security” on page 28
“Exchanging data with other applications” on page 31
“Advanced customization capabilities” on page 34
“Companion products” on page 37
“Understanding supervisory control” on page 38
“About points” on page 39
13
INTRODUCTION TO EBI
14 www.honeywell.com
INTRODUCTION TO EBI
Stations (Clients)
Dial In
F-Box BNA
Other Integration
Server
HVAC Controllers
Security & Access Controllers
XLS System
15
INTRODUCTION TO EBI
• Alarm Pager
• HVAC reports
16 www.honeywell.com
INTRODUCTION TO EBI
Architectural flexibility
The philosophy behind EBI is to provide an open standard for integration and to
embrace open technology. EBI supports TCP/IP networking standards, and industry-
specific standards such as BACnet and Echelon LONmark. EBI also supports standard
LAN and WAN network topologies, cloud connectivity, as well as serial and dial-up
connections.
EBI is based around a server-client architecture. The server maintains a high-
performance, real-time database. Clients include Stations (EBI's operator interface) and
other applications such as spreadsheets or relational databases.
The modular design of EBI makes it an extremely cost-effective and scalable solution.
The following examples show typical configurations that range from small single-node
systems to multi-server integrated systems.
Server redundancy
You can improve system availability with server redundancy. In a redundant server
system, EBI is installed on two identically configured servers.
EBI uses software arbitration to determine which server acts as primary. (With software
arbitration, each server polls the other over the network to determine whether the other
server has failed.)
17
INTRODUCTION TO EBI
Ethernet
Controllers
Stations
18 www.honeywell.com
INTRODUCTION TO EBI
WAN
Site A Site C
Site B
Point servers
A point server is a high-level interface that allows EBI to exchange data with other
applications or sub-systems, such as LON and BACnet, without the need for
individually configuring points in EBI.
Point servers read data directly from the field when requested by EBI. The structure of
each data set (called a flexible point) is determined by the application or sub-system,
rather than by EBI.
The LonWorks point server option, for example, gives EBI access to Honeywell
EXCEL 10 devices without the need for complex point-building configuration tasks. It
also includes pre-built point detail displays for EXCEL 10 devices so that operators can
monitor their HVAC system.
The following figure shows a system that uses three LonWorks point servers to integrate
three LonWorks networks.
19
INTRODUCTION TO EBI
Honeywell Server
Ethernet
LonWorks
Point Servers
Controller interfaces
Controller interfaces enable EBI to exchange data with controllers by individually
mapping memory locations in the controllers to standard points in EBI. (EBI provides
interfaces for most types of controllers used in security and building management.)
Controller-to-server connections
The way in which you connect a controller to the server depends on several factors, such
as the physical layout of your site and the controller's communication ports.
Network connections
If a controller has a network port, you can connect it directly to the network, as shown in
the following figure.
20 www.honeywell.com
INTRODUCTION TO EBI
Honeywell Server
Ethernet
Controllers
21
INTRODUCTION TO EBI
Server
Network
Controllers
Building A Building B
22 www.honeywell.com
INTRODUCTION TO EBI
LAN
Terminal Server
Controllers
Modems
You can use modems to connect controllers located at remote sites.
If you only require infrequent scanning, you could use a dial-up modem. If you require
more frequent scanning, you could use a modem in conjunction with a leased line.
23
INTRODUCTION TO EBI
Operator interfaces
Station is EBI's user interface that presents information in a graphical, user-friendly
manner. (There are other operator interfaces such as HMIWeb browser and Honeywell
EasyMobile.)
In general, Station runs on standard computers that are connected to the server through
the network. However, Station supports most Windows-compliant peripherals such as
touch-screens with dedicated function keys. (If you have an entry-level system, you can
even use Station on the server computer.)
You can have up to four instances of Station running simultaneously on the one
computer. From a licensing point of view, all instances of Station on the same computer
are treated as one Station connection. For example, if you have a license for two static
Stations and two client computers, you can run up to eight instances of Station (four on
each computer).
You can configure the way in which the instances of Station interact. For example, when
operators call up trends and groups from STN01 (the master Station), you can direct
trends to STN02 and groups to STN03. If you have several monitors, you can also direct
each instance of Station to a specific monitor.
Displays
Station uses displays to present information. Each display is, in effect, a control panel
that shows information about a particular part of the system, and contains appropriate
controls such as buttons and scroll bars.
System displays
EBI is supplied with a comprehensive set of system displays that present information in a
standardized manner.
24 www.honeywell.com
INTRODUCTION TO EBI
Custom displays
You can make it much easier for operators to supervise your facility if you create
suitable custom displays, such as the one shown in the following figure.
You use HMIWeb Display Builder, a specialized drawing tool supplied with EBI, to
create custom displays. HMIWeb Display builder is supplied with clip art libraries that
25
INTRODUCTION TO EBI
cover both security and building management. You can also insert your own graphics,
such as photographs and floor layouts.
HMIWeb browser
The EBI inbuilt Web server enables users to access EBI using HMIWeb browser
components and Internet Explorer. HMIWeb browser is especially useful to casual users
remotely accessing Honeywell Building Manager.
The section “Configuring the EBI Web Server” in the Configuration and Administration
Guide provides detailed information about setting up the web server and configuring
HMIWeb browser. It also describes the operational differences between Station and
HMIWeb browser. (For example, it is not suitable for accessing the cardholder
management system or Honeywell DVM systems.)
Each HMIWeb browser session is treated as a rotary Station connection. Consequently,
you need to ensure that your license includes enough rotary Stations to cater for
HMIWeb browser users.
Honeywell EasyMobile
If you use EBI for Building Management, Honeywell EasyMobile is a solution allowing
the basic operations of EBI from most mobile browser interfaces such as smartphones.
26 www.honeywell.com
INTRODUCTION TO EBI
Honeywell EasyMobile can assist with maintenance tasks. For example, a field
technician can make adjustments to HVAC equipment and use Honeywell EasyMobile
to connect to EBI to see the affect on the HVAC system.
Honeywell EasyMobile is designed as a complementary tool to Station and therefore the
full Station functionality is not available on Honeywell EasyMobile.
27
INTRODUCTION TO EBI
Operator security
You can configure operator security using:
• Facility Model, Organization Model, and scope of responsibility
• Station security
• Point control restrictions
Related topics
“Facility Model, Organization Model, and scope of responsibility” on page 28
“Station security” on page 28
“Point control restrictions” on page 29
“Electronic Signatures” on page 30
Station security
You can restrict access to Station using either operator-based or Station-based security.
28 www.honeywell.com
INTRODUCTION TO EBI
Operator-based security
With operator-based security each operator has an operator ID and a security level, and
logs on to Station using the operator ID and password.
Operator-based security provides six security levels, each with different privileges: View
Only, Ack Only (Acknowledge only), Oper, Supv, Engr, and Mngr (shown in order of
increasing security level).
You can use operator-based security to restrict:
• Control of points
• Access to specific locations
• Access based on day and time
• Access to specific Stations
You can also specify an 'inactivity time', which, if exceeded, automatically logs off the
operator.
Station-based security
Station-based security does not require an operator ID or password to log on to Station
with Oper security level. However, passwords are required to change to higher security
levels in order to perform configuration and administration tasks.
Security is managed on a Station-by-Station basis, enabling a particular Station to access
designated parts of the database.
Duress login
As an added security precaution, an operator, under hostile circumstances, can log on
using a duress login and set off a silent alarm in order to alert other operators.
29
INTRODUCTION TO EBI
Electronic Signatures
EBI's Electronic Signature option enables you to implement electronic signatures for
specified operator actions, such as controlling particular points.
An electronic signature requires a user with appropriate privileges to enter their operator
ID and password, as well as the reason for performing the action.
For critical actions, you can configure them to require two signatures.
Details about each action, including the operator name(s), date and time are stored in the
events database.
30 www.honeywell.com
INTRODUCTION TO EBI
Related topics
“Microsoft Excel Data Exchange” on page 31
“ODBC Data Exchange” on page 31
“ODBC Driver” on page 32
“OPC” on page 32
31
INTRODUCTION TO EBI
ODBC Driver
The ODBC Driver is primarily intended for reporting, and enables an ODBC-compliant
application to access data in the EBI database, such as history, event, access, and point
parameter values. ODBC-compliant applications include Microsoft Access and
Microsoft Excel.
OPC
EBI provides the following OPC options, each of which has been optimized for a
particular purpose.
32 www.honeywell.com
INTRODUCTION TO EBI
• You have a system that provides an OPC server, but not an OPC client. However, the
system needs to retrieve data from EBI.
• EBI data needs to be transferred to a third-party OPC server whenever it changes,
irrespective of the reason for the change (including when the data is changed by an
operator).
OPC Data Transfer supports redundant EBI servers, and is therefore itself redundant.
33
INTRODUCTION TO EBI
34 www.honeywell.com
INTRODUCTION TO EBI
The following tables describe the options available in the context of the type of
application you might require. The types of applications have been broadly categorized
as:
• Integrating with business processes
• Integrating with third-party hardware
Question/answer Recommendation
Q. What level of operator interaction is required and what type of content is the operator
interacting with?
A. Support for operator workflow for typical Use the HMIWeb Display Builder to create
operators using Station and/or HMIWeb custom displays.
browser and interacting with notifications
For detailed information about building custom
(alarms, events) and point parameter data
displays and the scripting that is available, see the
HMIWeb Display Building Guide.
A. Support for operator workflow for typical Use the CMS Customization Toolkit.
operators using Station and/or HMIWeb
browser and the operator interacts with
cardholder data
A. Support for ad-hoc users with limited Use Enterprise Web Services REST interface to
access to EBI using a browser and the ad-hoc create a web interface that connects to the EBI
users require point: parameter data server.
A. A combination of operator interaction and A combination of solutions may be required, such
system automation is required as building custom displays using HMIWeb
Display builder, the CMS Customization Toolkit,
and custom applications using Enterprise Web
Services and Cardholder Services.
A. No interaction is required, the solution Ask the follow-on question, What is the scope of
needs to provide an automated workflow the data/workflow?
Q. What is the scope of the data/workflow?
A. data/workflow remains completing within Use Automation Rules or Server Scripting to
the EBI system extend existing EBI functionality
A. Data/workflow spans both EBI and non- Use Enterprise Web Services to create a custom
Honeywell enterprise systems application.
35
INTRODUCTION TO EBI
Question/answer Recommendation
Q. Does the device support a standard?
A. The device supports on the following Investigate whether the EBI interfaces for these
industry standards: industry standards can be used.
• BACnet
• LonWorks
• OPC
A. The device does not support one of Create a Comms Driver using Real-time Data
the standards, or the EBI interface for Services.
the standards is not suitable.
For information about understanding the scope of
work required to develop a Comms driver, see the
topic, “Assessing the requirements for integrating with
third-party devices” in the Application Development
Guide.
36 www.honeywell.com
INTRODUCTION TO EBI
Companion products
The following Honeywell products are tightly integrated with EBI and provide
specialized functionality:
• Honeywell Digital Video Manager
• Honeywell Energy Manager
For more information about any of these products, contact your Honeywell
representative.
Related topics
“Honeywell Digital Video Manager” on page 37
“Honeywell Energy Manager” on page 37
37
INTRODUCTION TO EBI
38 www.honeywell.com
INTRODUCTION TO EBI
About points
A point is a collection of information about a particular part of your system. For
example, a point representing a motor would include the following items of information:
• An ID, also known as a tag name, which uniquely identifies the motor.
• A description, such as "Fan cool unit 1".
• A full name. The full name indicates a point's location within the Facility Model; for
example, /Facility/Honeywell/Grnd Floor/TempGuage1 indicates that the point
named TempGuage1 is assigned to the location named Grnd Floor which is itself
assigned to the location name Honeywell.
• The current state (Off or On).
• The desired state. This is applicable if you are allowed to control the point. For
example, if current state of the motor is On you can change the real state of the motor
to Off using the display.
Points are used to exchange data between controllers and the server database.
EBI records each significant change in the values for a point as an event, which
operators can see on the Event Summary display. Point events can also be treated as
alarms.
39
INTRODUCTION TO EBI
40 www.honeywell.com
Using EBI
This section describes the basics of using EBI, such as responding to alarms and events,
analyzing system data, and working with events and historical data.
Related topics
“Responding to alarms and events” on page 42
“Analyzing system data” on page 45
“Archiving point history and events” on page 47
“Troubleshooting EBI” on page 48
41
USING EBI
Server Station
Alarm!
Card status
"stolen"
Card Reader
Access Panel
Printer
All alarm conditions are recorded in the event log, including when an alarm is generated,
when it returns to normal, and when it is acknowledged.
Alarms are generally assigned different priorities to help you view critical alarms first.
The priorities are: Urgent, High, Low, and Journal. Journal alarms are not shown on the
Alarm Summary but are recorded as events.
Operators can:
• View events and alarms on Stations. The Status Zone, beneath the display, always
shows the most recent (or oldest) and highest priority alarm that has not been
acknowledged.
• Print a summary of alarms and events to an alarm/event printer. All alarms and
events are recorded in an alarm/event journal.
42 www.honeywell.com
USING EBI
Alarm shelving
Alarm shelving is a form of manual suppression that enables operators to remove
individual alarms from the main alarm summary display for a limited time.
Shelving is typically used by operators to hide “nuisance” alarms that are distracting
them from other more important alarms. Although multiple alarms can be shelved at the
same time, you can only shelve one alarm at a time.
Alarm shelving is most suitable for the following situations and scenarios:
• Dealing with stale or standing alarms such as those arising from instrument
malfunction or faulty equipment awaiting repair.
• Background or nuisance alarms such as those arising from unusual weather
conditions.
• Dealing with alarms that require action that may take time. For example, an operator
may need to change a temperature set point for a process that takes two hours to
effect the change. In a case like this, operators can shelve the alarm for two hours,
knowing that if the alarm is re-annunciated after that time, there is still a problem
that needs to be addressed.
43
USING EBI
Alarm groups
By using alarm groups, you can create an arbitrary group of points for the purposes of
monitoring alarms on those points. For example, you might want to group together all
points that represent the fire doors in your building. As a result of doing this, you can
easily monitor any alarms on any of these doors.
44 www.honeywell.com
USING EBI
Related topics
“Reports” on page 45
“Trends” on page 45
“Storing point history” on page 46
Reports
EBI includes a comprehensive set of standard reports that are useful for analyzing and
monitoring alarms, events, points, cards, and so on. If necessary, you can create your
own custom reports using tools such as Microsoft Access.
You can request reports when you need them, or produce them automatically at pre-
defined times. You can also specify a report's destination: either a printer or display.
Trends
You can use trends (specialized displays) to analyze changes in point values over time.
You can include an Event Summary in your trend to investigate any correlation between
changes in points to specific events.
Trends can present information in several forms (such as lines or bars) and can show
values for up to 32 points.
45
USING EBI
46 www.honeywell.com
USING EBI
Event archiving
EBI stores every event, such as point status changes or operator actions, in an event
database for a specified time.
Event archiving enables you to archive these events to disk or tape, where they can be
stored for future retrieval. For example, you can restore event archives so that they can
be included in standard reports.
Event archiving can be scheduled automatically, or an alarm can be generated to alert the
operator to archive the events.
47
USING EBI
Troubleshooting EBI
EBI includes the Diagnostic Framework, a stand-alone application that provides a
unified interface for running tests, collecting diagnostic information and viewing logs.
The Diagnostic Framework contains a set of pre-defined tests that are applicable to your
system and the current environment—that is, the tests vary depending on whether the
Diagnostic Framework is installed on a server as opposed to a client computer.
If you have a problem that you can reproduce—for example, you cannot start the server
—you can record relevant system activity as you reproduce the problem.
You also use the Diagnostic Framework to create diagnostic packages for TAC, which
include log, recordings (captured when reproducing a problem) and other files that may
help diagnose the problem.
48 www.honeywell.com
Using EBI for Security Management
This section describes how EBI is used for security management. It includes the
following topics:
• Cardholder management
• Controlling building access
• Access control concepts
Related topics
“Cardholder management” on page 50
“Controlling building access” on page 52
“Access control concepts” on page 54
49
USING EBI FOR SECURITY MANAGEMENT
Cardholder management
Access to a site or installation is usually controlled using access cards. Anyone who
requires access has a card that is imprinted with identification details. When they use the
card (at a door, for example), the access controller that has been downloaded with the
EBI cardholder database checks their access permissions, and grants or denies access.
Cardholders can only access a location if they have the required permissions (and are
seeking access during the appropriate shifts).
In EBI, access rights are easy to allocate and easy to maintain, and you can define your
own fields for cardholder information. You can even design and print your own access
cards (with photos, signatures, logos, and so on).
Integrated PhotoID
You use the Integrated PhotoID option to create your site's access cards. You can design
the layout of the card (including the cardholder's photograph, signature, and other
personal details) and then encode information onto the card using magnetic stripes or
barcodes.
Integrated PhotoID supports chromakey and ghosting, which make it more difficult to
forge or tamper with cards. (Chromakey removes the background from a cardholder's
photograph, and ghosting makes the cardholder's photograph semi-transparent.)
The details of all access cards created using Integrated PhotoID are saved as part of the
cardholder database. In addition to the convenience of only having to enter information
once, you have a central location from which you can create reports on cardholder
information. This is particularly useful if you are using Integrated PhotoID from a
remote Station.
50 www.honeywell.com
USING EBI FOR SECURITY MANAGEMENT
Integrated PhotoID can be used with a wide range of cameras, both digital and video. (A
video capture card is required if you use a video camera.)
Reception Management
The Reception Management feature enables you to track and report on visitors to your
facility.
The activities you can perform using Reception Management are:
• Checking in visitors on arrival
• Checking out visitors on departure
• Preregistering visitors
• Collecting and performing historical analysis of visits and visitor data
• Assigning and returning temporary cards
In addition, the Reception Web Module allows you to manage reception tasks using a
browser rather than Station.
51
USING EBI FOR SECURITY MANAGEMENT
Related topics
“Server control of access” on page 52
“Downloading access information to the field device” on page 52
“Managing alarms” on page 52
Managing alarms
If there is an attempt at security violation, EBI's alarm management ensures that
operators know about it instantly and know precisely how to react. If a number of alarms
occur simultaneously, EBI prioritizes them so that the important ones can be
acknowledged first.
If an operator does not respond to an alarm within a given time period, the deadman
timer triggers an alarm. This means that you can be sure that operators are at their posts
and that all alarms are acknowledged promptly. Additionally, all actions are logged to an
event file and are available for future reporting and analysis.
EBI gives you the flexibility to choose precisely what constitutes an alarm. You can
choose its priority, and associate it with any or all point states. You can display an alarm
52 www.honeywell.com
USING EBI FOR SECURITY MANAGEMENT
on a standard display, or you can create your own custom displays. You can even trigger
an audible tone or '.wav' file when an alarm occurs.
53
USING EBI FOR SECURITY MANAGEMENT
Related topics
“Card readers” on page 54
“Access points” on page 54
“Floor points” on page 55
“Zones” on page 55
“Time periods” on page 57
“Access rights” on page 57
“Perimeter Global Anti-Passback” on page 57
“Occupancy reporting” on page 57
“Cardholder reporting” on page 58
Card readers
A card reader is a hardware device that decodes the encrypted information stored on an
access card. A card reader connects to an Access Controller.
Normally card readers control doors, but they can also control turnstiles, lifts, gates, or
any other physical devices designed to control access. EBI includes interfaces to a wide
range of makes and models of card reader and access controller.
The decision to enable or deny access to a given card is made locally by the access
controller itself, using the configuration data EBI downloads to it. Each device must be
configured according to its hardware requirements. One issue to resolve during planning
is the limitation on how much configuration information your particular type of
controller can hold. You will need to plan your system very carefully to ensure that it
does not try to download more information to a given controller than can be stored.
Access points
An access point represents a card reader which defines an entry or exit point to a
physical space. Access points are used to monitor card traffic at the card reader by
recording the card number and cardholder name, and whether or not access was granted.
If two card readers were associated with one physical door—one to control entry and
one to control exit—two access points would be used to represent these two card
readers.
54 www.honeywell.com
USING EBI FOR SECURITY MANAGEMENT
Access points are configured using Quick Builder and downloaded to the server
database. Operators view information about the access point and make limited changes
to the configuration on the point detail display for the access point. Access point
information can also be printed from any of various reports.
Floor points
A floor point represents a particular floor in a building served by elevators. Floor points
restrict access to certain floors of a building through control of the elevators.
A floor point is a specialized status point. A floor is either in the 'access' state, allowing
anyone to stop at the floor, or in the 'secure' state, where only cardholders with the
required privileges can access the floor.
Zones
A zone represents a physical space which is totally enclosed by card readers. That is, in
order to enter a physical space, one must use an access card at a card reader which
allows entry to that space. It should not be possible to enter this physical space without
using a card reader.
55
USING EBI FOR SECURITY MANAGEMENT
A zone consists of a list of access points which represent the card readers which allow
entry to the physical space. An access point can only be included in one zone, because a
card reader can define the entry into only one physical space.
For AXSS-II, FS90, PCSC, and SE controllers, you can assign up to 128 access points to
a single zone. The points can be those associated with physical doors or with elevator
floors. Zones are paired with time periods to create access level definitions for site entry
and exit control.
Access points are assigned to the same zones if they define entry into the same physical
space. In the following figure, for example, doors C, D, and F define entry into the
Payroll zone.
Outside
Reader A
Pay Office
Counter Area
G C
J I F E D
56 www.honeywell.com
USING EBI FOR SECURITY MANAGEMENT
Time periods
A time period represents a period during which a person may have access to a physical
space.
For example, the time period Working Hours might be made up of days Monday to
Friday and times 9:00am to 5:00pm, excluding holidays.
Time periods are configured and modified on Time Period Configuration displays. The
time period details depend on the type of access controller you use: all controllers of the
same type store the same time period definitions.
Access rights
Access rights is a term that encompasses both access levels and Temaline behavior
models. Both access levels and behavior models represent a particular set of access
control criteria. If you have FS90, PCSC, SE, or AXSS-II access controllers, you use
access levels. If you have Temaline access controllers, you use behavior models.
An access level is a combination of zones and time periods where the zone defines the
physical space and the time period defines the times at which that physical space may be
accessed.
Behavior models consist of a time-based component (time periods and day types) and a
typological component (the TemaKey terminals for accessing gateways). You can assign
up to four behavior models per cardholder per Temaline site.
Occupancy reporting
Once your facility is divided into zones, you can report on which people are currently in
a particular zone.
57
USING EBI FOR SECURITY MANAGEMENT
This works best if both entry and exit points to the zone are controlled by card readers.
This enables EBI to determine when people have entered a zone and when they have
exited it, either by entering another zone or by exiting the whole facility. Without dual
readers, you can tell only which zone a person last entered; until they present their card
to enter another zone, you cannot tell if they have left.
Cardholder reporting
Using EBI's pre-configured reports, you can produce a number of cardholder reports,
including:
• Card Usage
• Cardholder Details
• Cardholder List
• Cardholder Zone Summary
58 www.honeywell.com
Using EBI for Building Management
Related topics
“Monitoring and controlling HVAC information” on page 60
“Scheduling” on page 61
“Alarm paging” on page 63
“Life Safety Management” on page 64
59
USING EBI FOR BUILDING MANAGEMENT
60 www.honeywell.com
USING EBI FOR BUILDING MANAGEMENT
Scheduling
EBI's scheduling capabilities enable you to control points on both a one-off and periodic
basis.
Global Schedules
Global Schedules enable controls to be carried out on predetermined days and at
predetermined times. EBI Global Schedules provide an integrated means of configuring
and viewing schedule information.
With Global Schedules you can define schedules, calendars and holidays once and then
propagate them to all supported controllers. The current release of EBI Global Schedules
supports schedules for:
• Honeywell Server points
• BNPS-R7044 controllers
• Excel 5000 controllers
• BACnet controllers
Key concepts related to Global Schedules are:
• Resources
• Control items
• Calendars
A resource is a way in which you can represent the real control entities of your site by
grouping point parameters or control items. After creating a resource you can start to
define new schedules for that resource, or you can assign an existing schedule that was
created for another resource. As you define the schedules for a selected resource,
summary schedule information is added to the Microsoft Outlook-style Global
Schedules display.
Control items are the actual control parameters that will perform the control that you
need to schedule. So, after you have decided on how you want to structure your
resources, you then need to define which control parameters on which controllers will
perform the required controls for each resource.
Calendars are generally a way of creating exceptions to normal daily (recurring) control
schedules. For example, if an office building is open every day of the working week
(except for public holidays), you would set up a system calendar that includes all public
holidays to ensure that the standard recurrent schedule is not in operation on those days
when the building is not open for general access.
61
USING EBI FOR BUILDING MANAGEMENT
schedule switch the lights on at 7 am each day and another schedule to switch them off
at 9 pm.
62 www.honeywell.com
USING EBI FOR BUILDING MANAGEMENT
Alarm paging
The Alarm Pager option pages specified alarms to a number of pagers.
You can use two techniques to specify which alarms are paged:
• Individually define each point and the minimum alarm priority that results in a paged
alarm
• Specify the operators whose alarms are paged—that is, alarms assigned to locations
for which operators are responsible are paged (Only applicable if you use operator-
based security.)
If the paging service provider allows, the Alarm Paging system sends multiple message
blocks at the same time, thus reducing the amount of times it has to ring up the provider.
The Alarm Paging system supports the following protocols:
• Paging Entry Terminal (PET) protocol
• Telocator Alphanumeric Protocol (TAP)
• Universal Computer Protocol (UCP)
The Alarm Paging system also supports sending messages as:
• Email
• SNMP messages
63
USING EBI FOR BUILDING MANAGEMENT
64 www.honeywell.com
Notices
Trademarks
IdentIPoint® and SafeBrowse® are U.S registered trademarks of Honeywell
International Inc.
Other trademarks
Microsoft and SQL Server are either registered trademarks or trademarks of Microsoft
Corporation in the United States and/or other countries.
Trademarks that appear in this document are used only to the benefit of the trademark
owner, with no intention of trademark infringement.
65
NOTICES
66 www.honeywell.com
NOTICES
67
NOTICES
Training classes
Honeywell holds technical training classes on Enterprise Buildings Integrator. These
classes are taught by experts in the field of building control systems. For more
information about these classes, contact your Honeywell representative.
68 www.honeywell.com
Index
A Life Safety 64
overview 59
Access and Control Security Guide 8 scheduling 61
access cards 50 Building Management Guide 8
access control
alarms 52
areas 28 C
concepts 54 card readers
downloading card details 52 described 54
levels 57 downloading card details 52
overview 52 cardholders
points 54 database information 50
zones 55 management of 50
access points 54 reporting 58
Advanced Alarm Management 44 cards
Advanced Configuration Guide 8 access levels 57
Alarm Paging 63 downloading access details to readers 52
alarms photos 50
access-related, managing 52 charts 45
Advanced Alarm Management 44 Cloud Connector 17
described 42 companion products 37
responding to 42 Configuration and Administration Guide 8
shelving 43 control
analyzing history card access 52
overview 46 controllers
trend displays 45 connecting 20
archiving interfaces to EBI 20
event 47 modem-connected 20
history 47 custom displays 24
areas 28 custom reports 45
B D
Backup and Restore Guide 8 database, controlling access to 28
building access, controlling 52 Diagnostic Framework, described 48
building management Diagnostic Guide 8
accessing HVAC information 60 direct serial connections to controllers 20
alarm paging 63 displays
69
INDEX
E L
levels, access 57
EBI Web Server 26
Life Safety Management 64
electronic signatures 30
lifts (elevators), control of 55
elevators, control of 55
login, duress 28
Energy Manager 37
event archiving 47
EXCEL 5000 60, 61 M
exchanging data with other applications 31
extended history 46 Microsoft Excel
Data Exchange
described 31
F modems, using 20
fast history 46
Fire Management 64
fire panels 64 O
overview 16 occupancy reporting 57
flexible points 19 ODBC Data Exchange
floor points 55 described 31
ODBC driver
G described 32
OPC
Global Schedules 61 Alarm and Event Server 32
graphs 45 client interface 32
Data Access Server 32
H Integrator 32
Hardware and Point Build Reference 8 operator-based security 28
history
archiving 47
overview 46
P
types of 46 paging, alarm 63
HMIWeb browser 26 Perimeter Global Anti-Passback 57
Honeywell Digital Video Manager 37 periods, time 57
HVAC PGAP 57
information, accessing 60 Pharmaceutical Compliance option 16
overview 59 Photo ID, Integrated 50
photographs on access cards 50
point servers 19
I points
Import and Export Guide 8
70 www.honeywell.com
INDEX
71
INDEX
72 www.honeywell.com