Professional Documents
Culture Documents
Introduction...................................................................................................... 1-1
Introduction...................................................................................................... 2-1
Introduction...................................................................................................... 3-1
Introduction...................................................................................................... 4-1
Introduction...................................................................................................... 5-1
Introduction...................................................................................................... 6-1
Introduction...................................................................................................... 7-1
Introduction...................................................................................................... 8-1
Introduction...................................................................................................... 9-1
6 Tools
Introduction.................................................................................................... 10-1
Introduction.................................................................................................... 11-1
Introduction.................................................................................................... 12-1
Introduction.................................................................................................... 13-1
Introduction.................................................................................................... 14-1
Introduction.................................................................................................... 15-1
Introduction.................................................................................................... 16-1
Introduction.................................................................................................... 17-1
Introduction.................................................................................................... 18-1
Introduction.................................................................................................... 19-1
Introduction.................................................................................................... 20-1
Introduction.................................................................................................... 21-1
Introduction.................................................................................................... 22-1
Introduction.................................................................................................... 23-1
Introduction.................................................................................................... 24-1
Table of Contents 13
Introduction.................................................................................................... 25-1
Introduction.................................................................................................... 26-1
Introduction.................................................................................................... 27-1
14 Tools
Introduction.................................................................................................... 28-1
Introduction.................................................................................................... 29-1
Introduction.................................................................................................... 30-1
Introduction.................................................................................................... 31-1
Introduction.................................................................................................... 32-1
Introduction.................................................................................................... 33-1
Introduction.................................................................................................... 34-1
Introduction.................................................................................................... 35-1
Introduction.................................................................................................... 36-1
Table of Contents 19
Introduction.................................................................................................... 37-1
Introduction.................................................................................................... 38-1
Chapter 1
Getting Started
Introduction
This chapter explains Metasys® Operator Workstation (OWS)
concepts and how to log on and log off the OWS. This describes how
to:
• log on an OWS
• log off an OWS
Note: This section assumes the Metasys Building Automation
System (BAS) is installed and running. For information on
installing and commissioning Metasys software, refer to the
Operator Workstation Technical Bulletin (LIT-636013).
Key Concepts
OWS Overview
The OWS is a graphics-based interface that provides advanced facility
management capabilities. The OWS gathers information from the
network and consolidates it into facility-wide reports and summaries.
Summaries
The OWS displays a variety of summaries. Each type of summary
focuses on a specific aspect of the facility. For example, an Override
summary lists objects in software or hardware override. A Critical
summary lists all alarms and changes-of-state defined as Critical report
types. Operators can schedule when summaries are printed.
Database Generation
The OWS archives data. For example, alarm histories, trend data, and
totalized values can be uploaded from the Network Control Modules
(NCMs) and stored in files at the workstation. Operators can view or
print the archived data from the workstation.
The OWS can create the initial database for a facility and edit an
existing database to accommodate additions or changes. Operators can
also use the OWS to download the databases into the NCMs.
Objects
An object generally corresponds to an actual field point or control
process in the facility. For example, an object called RET-FAN might
correspond to a relay contact wired to a return air fan, control
processes (Proportional plus Integral plus Derivative [PID] loops or
routines created in GPL) and hardware such as the workstation itself, a
lighting controller, an NCM, or a printer.
The OWS allows operators to display detailed online information
about all the objects in a facility. Operators can monitor the current
value and status of objects and display point history, trend, and
totalization data. Operators can also command an object from any
window displaying the object and schedule commands to take place at
specific times.
Attributes
Each object has a number of attributes that characterize it. For
example, an object’s name, current value, and high alarm limits are all
attributes. Some attributes are assigned values when the object is
originally defined. For example, the object name is assigned in the
object’s Definition window. Other attributes reflect the realtime status
of the object. For example, the current value of the object is dynamic
data and changes according to field conditions and control processes.
View and modify attributes in Object Focus windows.
Systems
Objects are grouped together in systems. For example, all the hardware
and software objects related to the operation of one air handling unit
might comprise system AHU1.
To uniquely identify an object, the OWS uses both its system name
and object name. For example, AHU1\RET-FAN is the system\object
name of an object corresponding to a particular return air fan in the
AHU1 system. The entire Metasys system knows whether this fan is
On or Off because the continuously updating databases contain records
of current values and states for all objects. These records are kept
according to the object’s system\object name.
1-4 Operator Workstation User’s Manual
PC Groups
The PC group level of organization allows operators to group related
systems. For example, operators might want to group all systems from
one side of a facility in a PC group called WESTWING. A PC group
can contain systems or other PC groups. PC groups can be up to
three levels deep.
The PC group level is for the convenience of the operator only. Since
it is not global data, it is unique to the workstation where the group is
defined and is not used by the Metasys program to identify objects
(only system\object names are used to identify objects). However, PC
group names are included in change-of-state and alarm reports at the
workstation to help operators quickly locate the source of alarms.
Slide Show
When no one is currently logged on to the OWS, a slide show appears.
This slide show is a series of images that can represent a company
logo, or the buildings, floor plans, and equipment in your facility. Each
image is displayed for a defined period before the slide show cycles to
the next image. If a slide show is not defined, the Johnson Controls
logo appears on the screen, or an error message appears stating that no
slide show is defined.
Note: Critical Alarm messages display over the slide show.
However, operators must log on to respond to the alarms.
Password
Passwords protect the security of the BAS. The password determines
facility access. For example, if your password does not allow you to
command objects, the menu options for commanding objects are
unavailable.
Table 1-2: Using the Mouse with Buttons and Names on the Network Map
Item Action Result
Network Button Click Expands network to show each PC group within the network
Network Name Double-click Displays Network summary
PC Group Button Click Expands to show each PC group and system within the PC
group
PC Group Name Double-click Displays PC Group summary
System Button Click Displays System Peek dialog box
System Name Double-click Displays System summary
DEVICES Button Click Expands to show all of the devices defined for the network
DEVICES* Double-click Displays the Devices summary
Device Name Double-click Displays the device’s Focus window
PC File Name Double-click Displays the Reports Destination summary
SYSTEMS Button Click Displays all systems on the network that are not assigned to any
other PC group
SYSTEMS* Double-click Displays PC Group summary
* Actual text appearing on the Network Map
Operator Workstation User’s Manual 1-7
IMPORTANT: The button color indicates the last reliable state of the
object. If the object goes into alarm, and then goes
unreliable, the color of the Network/PC group/System
remains red, even if the object is no longer in alarm.
Note: The Alarm Indication feature is automatically enabled when
OWS software is loaded. To disable this feature, change the
line ENAALMIND=0 in the Metasys section of the
METASYS.INI file. Refer to the Initialization Parameters
Technical Bulletin (LIT-636345).
Menus
The Metasys software uses the same menu options in every
workstation window (Table 1-3). There are two exceptions: the Action
menu and the Network Map’s three additional menu bar options
(Summary, SetUp, and Exit).
The Action menu for each window contains options specific to that
window. For example, the Action menu in an Object Focus window
displays options for commanding an object. The Action menu in the
Trend Item window displays options for setting up the collection of
trend data.
1-8 Operator Workstation User’s Manual
Logon Overview
The Logon dialog box accesses the Operator Workstation (OWS) and
the Metasys System. Passwords determine which functions and
systems operators can access.
When no operator is logged on, a slide show appears on the screen.
This slide show can be a company logo or a series of dynamic
graphical images that represent the operator’s facility. Alarm messages
appear on the screen over the slide show. During this time, the only
alarm action available is clearing the message from the screen. Logged
on operators can manage alarms and perform the functions allowed by
their passwords.
Detailed Procedures
Logging on to OWS
To log on to the OWS:
1. From the Windows Start menu, select
Programs > Johnson Controls > Metasys. The Logon dialog box
appears (Figure 1-3).
2. Select a Network.
3. Enter your password.
Note: If 30 seconds elapse between mouse clicks or keystrokes
during the log-on process, the Logon dialog box
automatically disappears.
4. Click OK. The Network Map appears.
Operator Workstation User’s Manual 1-13
Chapter 2
Introduction
This chapter explains how to use the Network Map. The chapter
describes how to:
• filter the Network Map
• display the expanded IDs
• set window options
• activate a network
Key Concepts
System Peek
The System Peek option is unique to the Network Map. This option
allows you to view the objects within a selected system without having
to leave the Network Map to display a System summary.
Active Network
Use the Activate Network option to switch between networks. A
maximum of five networks can be active at one time, using any
variation of the following:
• one to five N1 Direct networks
• up to two NC Dial networks
• up to four Direct Connect networks
The Network Map displays the most recently activated network. You
can have more than one active network at a time. Complete
functionality (for example, commanding, scheduling) is available in all
activated networks.
Note: To deactivate an NC-Dial (modem or Integrated Services
Digital Network [ISDN]) remote network, use the Hang Up
option in the Dial-Up Window Control menu.
Window Options
Specify the following options with the PC User Options dialog box:
• window size
• object penetration
• close previous window when penetrating
• display expanded ID
When changing these options, they are saved only for your password.
When using a different password, the Metasys program uses either the
default options or the last chosen options linked to that password. The
options are saved for that Operator Workstation only. If the same
options are desired on another OWS, you must set the options using
that OWS.
Operator Workstation User’s Manual 2-3
Window Size
Setting the window size allows operators to specify the size of
Metasys windows and the manner in which they appear. If no setting is
chosen, the default is Full Width and Height. Table 2-1 describes the
three window size options.
Object Penetration
Allows specification of what type of window appears when
double-clicking on an object. Choose either To Focus Window or
Default Action. If no setting is chosen, the default is
To Focus Window.
Display Expanded ID
Choosing Display Expanded ID allows the expanded ID for each item
on the Network Map to appear. The expanded ID appears to the right
2-4 Operator Workstation User’s Manual
of the item’s icon and name. If no setting is chosen, the expanded IDs
do not appear.
Operator Workstation User’s Manual 2-5
Detailed Procedures
Filtering the Network Map
To filter the Network Map:
1. On the View menu, click Filter. The Network Map-Filter dialog
box appears (Figure 2-1).
Activating a Network
To activate a network:
1. On the SetUp menu, click Network. The Network Summary
dialog box appears (Figure 2-4).
Introduction
The calendar allows operators to specify whether each day in a
12 month period is Regular, Holiday, or Alternate. This chapter
explains how to use the calendar. This chapter describes how to:
• set the time and day using a dial-up PC
• use the schedule calendar
• set the time and day clock
• set daylight saving time
Key Concepts
Time and Day Clock Overview
The Clock appears in the lower right corner of the screen. The Clock
displays the following information:
• initials of the operator currently logged on
• password level of the operator (1 through 5)
• name of Workstation
• time
• type of day (Regular, Holiday, or Alternate)
• day of week and date
IMPORTANT: Changing the BAS time and date causes all scheduled
functions to execute according to the new time and
date.
Changing the time and day format does not affect the entire BAS.
Only the following are affected:
• the time and date displayed in the Clock on the workstation screen
• the time and date displayed on the Network Terminal (NT) screen
• the time and date displayed on printouts of summaries
• the time and date displayed in Focus windows
Schedule Calendar
The Schedule Calendar allows operators to specify whether each day
in a 12 month period is Regular, Holiday, or Alternate.
The Regular, Holiday, and Alternate settings are used by the
Scheduling feature. These different settings allow operators to have
three different schedules.
Detailed Procedures
Setting the Time and Day Using a Dial-Up PC
To change the date and/or time:
1. Go to the Dial-Up window.
2. On the Control menu, click Network Date/Time. The Network
Date/Time dialog box appears (Figure 3-2).
Troubleshooting
Autoexec.bat
When transitioning from standard time to daylight saving time or vice
versa, it is possible that the time on the OWS and Network Control
Module (NCM) are not set correctly. This problem also occurs in time
zones that do not support daylight saving time. If you encounter this
problem, add the appropriate line from below to the Autoexec.bat file
on each workstation on the Metasys Network. After the change is
made, you must restart the OWS.
Note: For all other time zones, x is the time zone difference in
hours from Greenwich Mean Time (GMT). For example, in
Hawaii the command is SET TZ-AST10. In New Delhi, the
command is SET TZ=AST5:30.
Operator Workstation User’s Manual 4-1
Chapter 4
Introduction
Operator Workstation allows summaries of all points and
limits to be quickly available. This also includes summaries
of all points that have been overridden, in alarm, disabled, or
locked out state. This chapter describes how to:
• display online summaries
• display Fire Object input device summaries
• display Fire Object output device summaries
• display password summary
• display standard network, PC group, or System
summaries
• display the N2 Dial Network summary
• display the IP Address Configuration summary
For information on archived summaries, refer to the
Displaying Archived Summaries chapter (LIT-120169).
Key Concepts
Online Summary Types
Online summaries contain current information about
selected parts of the facility. Below are general rules that
apply to summaries:
• allow operators to go to a Focus window for an object by
double-clicking the object name
• allow commanding the objects using the Operation and
Communication options
• allow refreshing the data in the summary
• allow operators to change how items are listed in
summaries using the Sort and Filter options
• allow operators to display the PC group or system as a
drawing using Show as Drawing feature
Online summaries display current information about
selected parts of the facility. Access these summaries from
the Network Map Summary dialog box.
Operator Workstation User’s Manual 4-3
Alarm Summary
The Alarm summary lists all objects in the selected PC
group or system that are currently in an Alarm state. If an
object transitions out of alarm after the summary appears, it
appears in the next summary.
For the Alarm summary option to be available, a PC group
or system must be selected on the Network Map. The Alarm
summary displays objects from only one system at a time.
Critical Summary
The Critical summary lists all Critical reports sent to the
Operator Workstation. These are reports of alarms or
changes-of-state that are assigned the Critical report type
during object or feature definition.
Disabled Summary
The Disabled summary lists all objects in a selected PC
group or system that have communications disabled by a
Disable command. A Disable command inhibits the object
from triggering and from sending reports resulting from
changes-of-state. In addition, a disabled object cannot
receive commands, except for an Enable command, the
reverse of Disable.
The Disabled summary option is only available when a PC
group or system is selected on the Network Map.
The Disabled summary displays objects from one system at
a time (Figure 4-4).
Follow-Up Summary
The Follow-Up summary lists all Follow-Up reports sent to
the Operator Workstation and all Critical reports that were
transferred from the Critical summary to the Follow-Up
summary. This summary lists alarms and changes-of-state
that are assigned the Follow-Up or Critical report type
during object or feature definition.
Limits Summary
The Limits summary lists the defined limits for all Analog
Input (AI), Analog Data (AD), and Annunciator Control
Module) ACM objects in the selected PC group or system.
Limits are defined through Operation commands at the
Operator Workstation or NT, and in GPL and JC-BASIC
processes.
The Limits summary option is only available when a PC
group or system is selected on the Network Map. The Limits
summary displays objects from one system at a time.
Lockout Summary
The Lockout summary lists all the objects in the selected PC
group or system that are commanded to have either triggers
or reports locked out. An object is locked out with a
Communication command from an Operator Workstation,
NT, GPL, or JC-BASIC process.
The Lockout summary is only available when a PC group or
system is selected on the Network Map. The Lockout
summary displays objects from one system at a time.
Offline Summary
The Offline summary lists all objects in the selected PC
group or system that are currently offline.
The Offline summary is only available when a PC group or
system is selected on the Network Map. The Offline
summary displays objects from one system at a time.
Override Summary
The Override summary lists all the objects in the selected
PC group or system that are currently in hardware or
software override. An object is overridden by an Operation
command performed at the workstation or NT (software
override), or at an NCM by use of manual switches
(hardware override).
The Override summary is only available, when a PC group
or system is selected on the Network Map. The Override
summary displays objects from one system at a time.
Schedule Summary
The Schedule summary lists all the current summaries for
the item selected.
Standard Summaries
There are three types of Standard summaries: Network,
PC Group, and System. These summaries list all items in the
selected network, PC group, or system.
Trouble Summary
The Trouble summary lists all Fire, Zone, Binary Input (BI)
(N2 Open, FPU BIF, BIS, and ST-102 only) objects
currently in trouble in a selected PC group or system,
regardless of the report type or report destination. If an
object transitions out of trouble, it does not appear in the
Trouble summary the next time the summary is displayed. If
the object goes into a state with a higher priority, it does not
appear in the Trouble summary.
The Trouble summary option is only available, when a PC
group or system is selected on the Network Map. The
Trouble summary displays objects only from one system at a
time.
Utility Profile
The Utility Profile lists Load Group objects defined for the
Demand Limiting/Load Rolling (DLLR) feature and
displays information about their energy consumption in the
current and previous periods. Select a PC group or system
on the Network Map before accessing the Utility Profile.
Detailed Procedures
Displaying Online Summaries
To display an online summary:
1. Select a PC group or system.
2. Click Summary. The Network Map-Summary dialog
box appears (Figure 4-21).
Chapter 5
Introduction
Archive Summaries are archived BAS reports maintained in a PC file
called a Reports Destination summary. The Reports Destination
summary displays archived data. This chapter describes how to:
• display the Reports Destination summary
• clear archived summary reports
• save archived summaries
• purge archived summaries
• restore archived summaries
• display restored summaries
• delete summaries from the archive directory
• set summary limits
• display the Operator Transaction or Card Reader summaries
For more information about online summaries, refer to the Displaying
Online Summaries chapter (LIT-120168).
Key Concepts
Archived Summaries
Some archive report summaries have parallel online summaries.
Table 5-1 lists some of the archived summaries. The archived
summaries display the same type of information that the online
summaries display, but the information is archived data from the PC
file rather than online data from the NCM. Therefore, any online
information is not included in archive summaries. The Metasys®
system provides three different types of archived summaries:
• Operator Transaction
• Card Reader
• Reports Destination
Archive summaries display data in the PC file that has been defined as
a destination for the reports. Access these summaries from a PC file
Reports Destination summary. The PC file names are displayed at the
bottom of the Network Map. Double-click the PC file name to display
its Reports Destination summary. Refer to Table 5-2 to manage alarms
and COS:
Summary Management
Saving Archive Summaries
Two types of archive summaries can be saved to a floppy disk or tape:
the Operator Transaction summary and the Card Reader summary.
This allows operators to make a protected copy of a summary, as well
as clear the archive database for new Operator Transaction or Card
Reader reports.
The Operator Transaction or Card Reader summary is archived in a
two step process. First the summary is moved to the
\FMS\DATA\network\PCfilename\ARCHIVE directory on the hard
drive. Summaries are renamed according to the date and time they are
archived.
When you archive a summary, the name that the summary is
automatically given appears. Be sure to make note of the date and time
the summary was saved and the type of summary it is in case you want
to retrieve it later.
Once the transaction summary is moved to the ARCHIVE directory on
the hard drive, it is copied to the floppy disk or tape. This allows
collection of current Operator Transaction or Card Reader data in the
new summary while the old data is being saved to a floppy. This
prevents transaction summaries from being disabled for a long period
of time.
Query Information
The Query function maintains specific information from either Card
Reader or Operator Transaction summaries. Like the Filter function,
the Query allows operators to filter certain reports. Operators can also
select the field data that appears. Also, the data for each report can
appear on a single line, allowing operators to view several transaction
reports on one screen.
Operator Workstation User’s Manual 5-11
Detailed Procedures
Displaying the Reports Destination Summary
To display the reports Destination Summary:
Select the PC file name. The Reports Destination summary for the
selected PC file appears (Figure 5-3).
3. On the Action menu, click File Setup. The summary’s File Setup
dialog box appears (Figure 5-5).
?
browse
Camera Toggles between displaying the contents of an imported file and the file
name.
Operator Workstation User’s Manual 5-19
Camera Toggles between displaying the contents of an imported file and the file
name.
5-22 Operator Workstation User’s Manual
Chapter 6
Displaying Drawings
Introduction
This chapter explains how to display the dynamic drawings that
represent the networks, PC groups, and systems in your facility. This
section explains how to:
• display drawings
Note: Micrografx Designer and Draw software are not supported at
Metasys Release 11.00 or later.
Key Concepts
Drawings Overview
The Metasys Operator Workstation allows operators to display your
facility in both textual and graphical formats. Figure 6-1 shows a
System summary with an air handling unit as a textual list of objects.
Figure 6-2 shows a system drawing of the same system with graphical
symbols representing the objects.
AHU2 NCM Definition
Item Edit V iew Action Go To Accessory Help
HDQTRS
WEST
AHU2
Handles
All Windows applications use up or consume Windows handles. Every
application uses handles, and 8,192 handles are available, including:
Windows operating system, Metasys software, and Metasys graphics.
The number of handles that each application uses is dependent on the
contents of the application. For example, an average graphic uses
around 500 Windows handles, although it may be more or less
dependent on the complexity of the drawing.
A graphic with a lot of objects uses more handles than a graphic with
just a few objects. Do not open several complex graphics that use a
large number of objects at one time. If you use up all of the available
handles, Windows operating system generates a General Protection
Fault and you must reboot the system.
6-4 Operator Workstation User’s Manual
Detailed Procedures
Displaying Drawings
To display drawings:
1. On the View menu, click Show as Drawing.
2. Select the desired system.
3. On the GoTo menu, click Selected Item. The system appears as a
drawing, displaying the current values and states of all bound
objects.
Note: If the drawing has not been modified, and only the default
symbols and default graphic binding settings are in effect, it
appears complete.
Operator Workstation User’s Manual 7-1
Chapter 7
Introduction
This section tells you how to manage Alarm and Change-of-State
(COS) reports. This section includes:
• display online summaries
• print online summaries
• filter and sort online Critical and Follow-Up summaries
• display archive summaries
• print archive summaries
• acknowledge a report
• move a critical report to the Follow-Up summary
• discard a critical report
• change the reminder time
• disable enabling the alarm horn
• change the display settings
• clear archived critical reports
• change priority of follow-up reports
• annotate follow-up reports
• discard follow-up reports
• clear archived follow-up reports
• clear archived status reports
Key Concepts
Alarm and COS Reports
The Metasys® system keeps operators completely informed about
every aspect of the facility. The Metasys system:
• records all Trouble, Alarm, and Change-of-State (COS) reports
• sends Trouble, Alarm, and COS reports to the appropriate
destinations
• prioritizes Trouble, Alarm, and COS reports
• informs operators of those Trouble and Alarm reports that might
need immediate attention
Reports are generated when an object enters a Trouble or Alarm state
or when the object changes state, even if it is not in Trouble or Alarm.
Alarm reports also cause the color of the network, PC group, and
system button in which the object is located to change to red.
Report Types
Alarm, Trouble, and Change-of-State reports can be assigned the
following report types: Critical, Follow-Up, or Status. If no report type
is specified, no report is generated.
For objects, specify the report type for Alarm, Trouble, and COS
reports in the object’s Definition or Focus window. For features,
specify the report type when you set up the feature.
Report Destinations
When defined, each system is assigned to one report group. The report
group specifies the destinations for each of the report types. When an
object in the system goes into Alarm or Trouble, or when an object
changes state, the report is sent to the destinations specified by the
system’s report group.
There are three report destinations: an OWS (PC), PC file, or printer.
An Operator Workstation can be a destination for Critical and
Follow-Up reports only. A printer can be a destination for Critical,
Follow-Up, Status, Operator Transaction, and Card Reader
Transaction reports. A PC file can be a destination for all report types.
COS messages can be sent to a buffer for on demand printing. Edit the
METASYS.INI file to specify the number of messages or a specified
time interval. See the Initialization Parameters Technical Bulletin
(LIT-636345) for more information.
Operator Workstation User’s Manual 7-3
If you are using a color printer, you can choose the color and style for
Critical, Follow-Up, Status, Operator Transaction, and Card Reader
Transaction reports. You can choose colors for reports, as well as
styles (Bold, Italic, and/or Shadow). The reports will be printed in
black and white with normal style unless you add any one of these
settings to the METASYS.INI file. For details, refer to the
Initialization Parameters Technical Bulletin (LIT-636345).
Critical Reports
A Critical report sent to an OWS generates a Critical Alarm Warning
message displayed on the workstation screen. This allows the operator
to respond immediately. In addition, the Critical report is sent to the
online Critical summary. This allows the operator to review the
Critical report at a later time and perform the appropriate Alarm
management functions as desired.
Critical Summary
The Critical summary lists all alarms and changes-of-state that are
assigned the Critical report type. The online Critical summary lists all
Critical reports that have the Operator Workstation defined as the
report destination. Alarms that have not been acted on are red.
If you are using a color printer, alarms in the Critical summary are
printed in black unless otherwise specified in the METASYS.INI file.
Alarms with highest priority and the newest alarms are displayed first.
7-6 Operator Workstation User’s Manual
Follow-Up Summary
The Follow-Up summary lists all Trouble, Alarm, and Change-of-State
(COS) reports that are assigned the Follow-Up report type, and all
reports moved from the Critical summary for further follow-up action.
The online Follow-Up summary lists all reports that have the Operator
Workstation defined as the report destination. The reports are listed
chronologically unless the Change Priority option in the Action menu
has been used to reorder the reports.
Alarm Summary
The Alarm summary lists all objects currently in alarm in a selected
PC group/system, regardless of the report type or the report
destination. If an object transitions out of alarm, it is not displayed the
next time you access the summary. This is an online summary and can
only be accessed from the Network Map Summary dialog box.
Note: Fire Input and Output devices are not listed in this summary.
Use the Input Device summary or the Output Device
summary to find out the status for an input or output device.
Trouble Summary
The Trouble summary lists all Fire, Zone, BI (N2 Open, FPU BIF,
BIS, and SST-102 only) objects that are currently in trouble in a
selected PC group/system, regardless of the report type or the report
destination. If an object transitions out of trouble, it does not appear
the next time the summary is accessed. If the object goes into a state
with a higher priority, the trouble status is overridden and it is not
displayed in the trouble summary.
This is an online summary and can only be accessed from the Network
Map Summary dialog box.
Note: Fire input and output devices are not listed in this summary.
Use the Input Device summary or the Output Device
summary to find out the status for an input or output device.
Status Summary
The Status summary lists Alarms or Change-of-State reports that are
assigned the Status report type and that have the PC file defined as the
report destination. This Archive summary can be accessed only from a
Reports Destination summary.
Detailed Procedures
Displaying Online Summaries
To display online summaries:
1. Select a PC group or system.
Note: Proceed to Step 3 to display a Critical or Follow-Up
summary.
2. Click Summary. The Summary dialog box appears (Figure 7-8).
Sorting
To sort the Critical or Follow-Up summary:
1. Display the Critical or Follow-Up summary.
2. On the View menu, click Sort. The COS-Sort dialog box appears
(Figure 7-10).
4. Click OK.
7-16 Operator Workstation User’s Manual
Chapter 8
Commanding Objects
Introduction
This section tells you how to command objects. This chapter explains
how to:
• perform an Operation command
• make adjustments on Analog Input devices
• perform a Communication command
Key Concepts
Commands
Commands tell an object to perform or to stop performing certain
functions.
There are two kinds of commands: Operation commands and
Communication commands. Operation commands direct the actual
functioning of the object.
Operation Commands
Operation commands are used to:
• turn objects On or Off
• put objects in override
• adjust analog output setpoints
• set an object’s High and Low Warning Limits
• adjust Fire Object Analog Input devices
The type of object you are commanding determines the available
Operation commands. The following Operation commands are
available:
• Adjust
• Auto
• State 0 (or Off, Stop)
• State 1 (or On, Start)
• Release All
• Override
Note: In the Command dialog boxes, State 0 and State 1 are
replaced by the display units specified for the selected object
(for example, Off/On, Stop/Start).
If commanding an Analog Input object, the following Operation
commands are available:
• Auto
• Override
• Alarm Limits
• Warning Limits
Operator Workstation User’s Manual 8-3
Default Sensitivity
The Default Sensitivity can be set to three different levels: High,
Medium, and Low. It tells the Analog Input device (detector) when to
consider input valid for triggering alarms. A setting of High makes the
detector very sensitive to even small amounts of smoke. Low
sensitivity means more smoke would have to be detected to trigger an
alarm. Operators can tell what the device is set to by looking in the
Default Sensitivity field in the Input Device summary.
Verify
Verify has two settings: Enable and Disable. If Verify is set to Enable,
it allows an Analog Input device (detector) to count the number of
times its threshold is momentarily exceeded. Enabling this setting can
help prevent unnecessary alarms. If this setting is disabled, the Verify
Count field in the Input Device summary will be blank.
Day/Night Adjustment
Day/Night Adjustment has two settings: Enable and Disable. If
Day/Night Adjustment is set to Enable, the sensitivity level can
automatically change according to the time of day. This prevents
unnecessary alarms. Day/Night Adjustment must be fully set up at the
IFC-1010/2020 before this feature operates properly.
8-4 Operator Workstation User’s Manual
Communication Commands
Communication commands determine how the object interacts with
other parts of the system. For example, use the Lock Triggers
Communication command to prevent an object from triggering a GPL
process. Use the Unlock Reporting command to allow reports
regarding an object to be sent to report destinations.
Communication commands are the same for all objects (except that
Unlock and Lock Reports commands are not available for DCM, XM,
LCD, DCDR, N2Open, and DSC hardware objects). The following
communication commands are available:
• Enable Communications
• Disable Communications
• Unlock Reports
• Lock Reports
• Unlock Triggers
• Lock Triggers
Operator Workstation User’s Manual 8-5
Detailed Procedures
Performing an Operation Command
To perform an Operation command:
1. Select the desired objects to command.
2. On the Action menu, click Selection Operation. The Operation
dialog box appears (Figure 8-1).
Chapter 9
Introduction
This section describes scheduling commands and summaries. This
section describes how to:
• schedule a command
• copy a schedule
• schedule Trend and Totalization
• scheduling summaries
• scheduling process triggers
• schedule Lighting Control Group (LCG) events
• view LCG scheduled events
• modify LCG scheduled events
• delete LCG scheduled events
• modify schedules
• modify DX-9100 Time Schedule Modules
• clear schedules
• print a summary of schedules
• display a summary of schedules
• schedule a temporary calendar date
• modify a calendar date
Key Concepts
Scheduling
The Scheduling feature allows operators to specify when commands
and features take effect and when summaries are printed.
Temporary Schedules
Operators can schedule one-shot daily schedules. Use these Temporary
schedules for special events. Temporary schedules apply to
one specific calendar date only and are automatically deleted at the
end of that day. Temporary schedules override all commands
scheduled under Regular, Alternate, and Holiday schedules.
Each scheduled item (that is, object, system, or PC group) can have up
to 12 temporary schedule days with 32 schedules per day.
Operator Workstation User’s Manual 9-3
Detailed Procedures
Scheduling a Command
To schedule a command:
1. Click the button to the left of the system containing the desired
command. The Network Map-System Peek dialog box appears
(Figure 9-1).
7. Click OK. The new scheduled command is added to the row of the
day you selected in Step 4.
Copying a Schedule
To copy a schedule:
1. Click the button to the left of the system containing the desired
object. The Network Map-System Peek dialog box appears
(Figure 9-1).
2. Select the object to schedule for Trend or Totalization.
3. Click Schedule. A dialog box appears saying that no schedule
exists, and asks you if you want to copy an existing schedule.
4. Click Yes. The Schedule Copy dialog box appears (Figure 9-5).
Scheduling Summaries
To schedule a summary:
1. Go to any window displaying a PC group or system.
2. Select the PC group or system.
3. On the Go To menu, click Schedule. The Scheduling window
appears (Figure 9-7).
Note: If the selected summary has no schedule, the Scheduling dialog
box appears asking if you would like to copy a schedule. If you
don’t want to copy an existing schedule, click No and go to
Step 5.
7. Select the event type. The event line displays the event selected.
8. Enter the Event On Time and Event Off Time.
9. To schedule another event, select another event line.
10. Click OK. The schedule is immediately saved.
Note: Unlike the scheduling of other objects, you do not have to save
the LCG schedule with the Save option in the Item menu. In
addition, LCG object schedules do not appear in the
Scheduling window. To view the schedule for LCG objects,
display the Scheduling-LC Group dialog box.
Figure 9-11: DX9100 Local Time Schedule Modules Definition Dialog Box
Note: The name in the title bar of the dialog box varies depending on
the name of the DX-9100. In Figure 9-11, for example, the
name of the DX9100 is DX91_90. Therefore, DX91_90
appears in the title bar.
4. Make the desired changes to the schedule. Refer to Table 9-1.
6. Click OK.
Notes: When you download the new schedules to the DX-9100, they
are also saved (archived) in a file on the OWS under the
system in which the DX-9100 is located. The name of the file
is the device name with a .TSD extension.
If you later download a configuration file to the DX-9100,
the download dialog box allows you to choose whether to
download the new schedules (.TSD file), or the schedules
originally defined in the configuration file.
Clearing Schedules
To clear existing schedules:
1. Select the scheduled command, feature, or summary you want to
clear.
2. On the Action menu, click Clear Schedules. A dialog box appears,
asking whether you want to clear the schedules.
3. Click OK. The selected schedules are cleared.
4. On the Item menu, click Save. The changes are entered into the
operational database.
Chapter 10
Introduction
Object Focus windows display detailed information about objects.
This section describes how to:
• display an Object Focus window
• display the Control System (CS) Object focus window
Key Concepts
Object Focus Windows
Object Focus windows display detailed information about objects.
This information includes values assigned to the object when the
object was originally defined as well as realtime status for dynamic
attributes.
The Object Focus window also allows operators to modify some of the
object’s attributes. In addition, operators can command the object and
access Point History, Scheduling, Totalization, and Trend windows
from Focus windows.
Types of Objects
Table 10-1 describes the three kinds of object.
The number in the upper right corner of the chart indicates the value at
the current graph cursor position. You can move the graph cursor to
any position on the chart to display the value at that position. Then
drag the graph cursor to any position on the chart. The number in the
upper right corner updates accordingly. Use the graph cursor in the
same way with the Current Trend chart.
For PID Loop control objects, a Fast Trend chart is displayed at the top
of the Focus window (instead of History and Current Trend charts).
Modify Attribute
The lower portion of the Object Focus window contains all the
attributes you can view or modify. When the Focus window is first
displayed, most of these attributes cannot be seen. To bring these
attributes into view, use the vertical scroll bar on the right side of the
window. Figure 10-3 is an example of the Analog Input Focus
window.
Detailed Procedures
Displaying an Object Focus Window
To display an Object Focus window:
1. Double-click a system from the Network Map. The System
summary appears.
2. Double-click the desired object. The Focus window for that object
appears (Figure 10-3).
Chapter 11
Introduction
This section explains how to use the online help features provided with
the OWS. This section describes how to:
• use task help
• access help for Modifiable attributes
• access attribute help for Non-Modifiable attributes
• display and edit operating instructions
• write a new operation instruction
Key Concepts
Online Help
Online help is available in Metasys windows. There are several types
of online help: attribute help, operating instructions, descriptive, and
procedural.
Attribute Help
Definition and Focus windows exist for all the hardware and software
objects in your facility. Use the Definition windows to specify
attribute values. Use the Focus windows when viewing or modifying
these values at a later time. While entering or viewing attribute values,
operators might need more information about an attribute.
To access online attribute help in a Definition or Focus window, use
the Help menu. Attribute Help consists of comprehensive information
about every attribute in Focus and Definition windows, including the
format valid ranges to use when entering attribute values.
Operator Workstation User’s Manual 11-3
Operator Help
In most Metasys windows, pressing the F1 key accesses Help for the
window currently in use. Some examples include:
• In the Network Map window, pressing F1 opens the “Using the
Network Map” help topic.
• In the Network Map window with a PC Group highlighted,
pressing F1 opens the “PC Group” help topic.
• In the IP Address Configuration Summary window, pressing F1
opens the “IP Address Configuration Summary” help topic.
Task Help
From the help topics, you can also get step-by-step procedures for
every operator task.
Operating Instructions
Operating instructions are text files written by operators and facility
engineers. Since these instructions can be easily edited via Notepad,
operators can communicate freely with one another about the changing
conditions of the facility.
The operating instruction text files are numbered and each object is
assigned an operating instruction number in the object’s Definition or
Focus window. This associates the instruction with the object.
11-4 Operator Workstation User’s Manual
Detailed Procedures
Using Task Help
To use task help:
1. On the menu bar, click the How Do I button.
2. Minimize the task list window. The procedure help appears in a
smaller window on top of the Metasys window.
Note: Not all of the Metasys windows are context-sensitive. Press
F1 at any time to check if context-sensitive help is available.
If a help topic does not appear after pressing F1, select Help
Topics from the Help menu. Use the Contents or Search
feature to locate help topics.
Chapter 12
Introduction
This section tells you how to use the Point History feature. This
chapter describes how to:
• display the point history item window
• display the history item window from a window displaying objects
• display the history item window from a reports destination
summary
• display the point history data window
Key Concepts
Point History
The Point History feature samples, displays, and archives attribute data
associated with objects. The attributes sampled are the object’s current
value and status (for example, offline, disabled, overridden).
At the OWS, point history information can be displayed in
three places:
• in graphs at the top of an Object Focus window
• in a Point History Data window accessed from a summary
displaying objects
• in a Point History Data window accessed from a PC file Reports
Destination summary
Note: There is no Point History for CS objects. To get point history
on a CS object’s attributes, refer to the mapped AD objects
and BD objects attributes.
Detailed Procedures
Displaying the Point History Item Window
To display the Point History Item window:
1. Select a system on the map.
2. On the Go To menu, click History. The History Item dialog box
appears (Figure 12-2).
Chapter 13
Using Totalization
Introduction
This section tells you how to use the Totalization feature. This section
describes how to:
• display the Totalization item window
• display the Totalization item window from a window displaying
objects
• display the Totalization item window from a reports destination
summary
• add a Totalization entry
• begin Totalization
• end Totalization
• reset a Totalization value
• modify a Totalization entry
• clear a Totalization entry
• clear selected reports
• purge files
• display the Totalization data window
• archive Totalization data
Key Concepts
Totalization
The Totalization feature totals quantities and counts the number of
times events occur. Totalization answers questions such as: How much
steam (or gas, or chilled water) did the facility use last month? or How
many hours was the supply fan for AHU3 in operation last week?
Use Totalization data to save energy, lower energy costs, and provide
effective maintenance.
The Totalization data is collected by the NCM and appears in a graph
or table at the OWS.
There are four types of Totalization: Analog, Pulse, Runtime, and
Event.
Analog Totalization
Analog Totalization totals data recorded at an analog sensor.
It answers the question How much? and is typically used to measure
the consumption of a supply such as chilled water or steam. The input
sensor provides a value corresponding to the current rate of
consumption or flow.
Pulse Totalization
Pulse Totalization, used only with Accumulator (ACM) objects, totals
data recorded at a pulse sensor. It answers the question How much?
and is typically used to measure the consumption of a supply, such as
gas or electricity. The input sensor provides a pulse as each unit of
consumable energy is sensed.
Runtime Totalization
Runtime Totalization accumulates total time only while a particular
condition is satisfied. It answers the question How long? and is
typically used to determine how long equipment is running in order to
schedule maintenance after a certain amount of use. The runtime totals
are recorded in minutes and then converted to hours.
Event Totalization
Event Totalization records a total of the number of times a binary
event occurs. It answers the question How often? and is typically used
to determine the frequency of events.
Operator Workstation User’s Manual 13-3
Totalization Value
The Totalization value is reset to 0 when the Totalization absolute
limit is exceeded; Totalization then continues from a set value of 0.
The limits are 9,999,999 for Pulse and Analog, 99,999.9 for Runtime,
and 9,999,999 for Event Totalization. Entries used for Totalization
must be whole numbers.
Operators can specify an optional user-defined limit when defining
attributes for Totalization. The user-defined limit does not reset the
value to 0 when exceeded. Even if operators define a limit,
Totalization resets if the absolute limit is reached. When the
user-defined limit is exceeded, operators have the ability to specify
that a report and alarm message be generated.
Detailed Procedures
Displaying the Totalization Item Window
To display the Totalization Item window:
1. Select a system.
2. On the Go To menu, click Totalization. The Totalization Item
window appears (Figure 13-4).
Beginning Totalization
To begin Totalization for a selected attribute:
1. Select one or more attributes in the Totalization Item window.
2. On the Action menu, click Begin Totalization.
Ending Totalization
To end Totalization for a selected attribute:
1. Select one or more attributes in the Totalization Item window.
2. On the Action menu, click End Totalization. Totalization data
collection ends for the selected attributes.
13-10 Operator Workstation User’s Manual
Chapter 14
Using Trend
Introduction
The trend data is collected by the NCM and displayed in a graph or
table at the OWS. This chapter describes how to:
• display the trend item window
• add a trend entry
• begin trend
• end trend
• modify a trend entry
• clear a trend entry
• display a trend data window
• scale trend data
• refresh trend data
• activate fast trend
• archive trend data
• clear archived trend data
Key Concepts
Trend
The Trend feature differs from the Point History feature in that Point
History data collection has a fixed attribute list, fixed sample period,
and fixed number of samples. In contrast, the Trend feature allows
operators to specify the attributes to be trended, the sample interval,
and the number of samples.
The Trend feature monitors changes in object attribute values over
time. The Trend feature answers questions like the following: How
constant is the temperature in a certain area of the building? How often
does the temperature get close to the warning limit?
The Trend feature can be accessed from any window displaying
objects or from a Reports Destination summary. The options are
described below.
Fast Trend
The Fast Trend feature provides the higher sample rate required to
check the response of PID Loop objects.
When Fast Trend is activated, a Fast Trend graph appears at the top of
a PID Loop Object Focus window. This graph displays dynamic Fast
Trend information for up to four selected attributes.
The buffer in the NCM can hold up to 180 Fast Trend samples. When
the buffer is full, old samples are removed to make room for new
samples.
Fast Trending takes place only while the PID Loop Object Focus
window is open. When you close the window, the buffer is cleared. In
addition, whenever you change any of the Fast Trend setup
parameters, the buffer is cleared and trending starts over.
14-6 Operator Workstation User’s Manual
Only one PID Loop object from each DCM can display Fast Trend
information at one time.
When more than one request is made for Fast Trend information from
the same DCM, the most recent request overrides the previous request.
Figure 14-3 shows an example of a Fast Trend graph.
Detailed Procedures
Displaying the Trend Item Window
Displaying the Trend Item Window from the Network Map
To display the Trend Item window from the Network Map:
1. Click a system on the map.
2. On the Go To menu, click Trend. The Trend Item window appears
(Figure 14-1).
4. Click OK.
14-10 Operator Workstation User’s Manual
Beginning Trend
To begin trend data collection for selected attributes:
1. Select one or more attributes in the Trend Item window.
2. On the Action menu, click Begin Trend.
Ending Trend
To end trend data collection for selected attributes:
1. Select one or more attributes in the Trend Item window.
2. On the Action menu, click End Trend.
4. Click OK.
Operator Workstation User’s Manual 14-13
Chapter 15
Introduction
The Dial-Up Input/Output (I/O) feature (Dial-Up) allows a Metasys
Network to communicate over phone lines (via a modem) to remote
I/O devices such as OWS or printers. Whenever communication to a
remote device is needed, Dial-Up makes the connection.
Communication to a remote device is necessary when a remote device
is defined as a destination for Critical or Follow-Up change-of-state
reports or summaries.
This chapter describes how to:
• initiate a call
• cancel a call
• hang up a call
Key Concepts
Dial-Up
Dial-Up is different from other features because you do not access it
by clicking a menu option. Instead, the Dial-Up window appears
automatically whenever remote communication is required.
Dial-Up Window
Figure 15-1 shows the Dial-Up window that appears whenever remote
communication is about to be initiated. This window displays the
name of the network that is about to be called.
Connection is Successful
The Dial-Up window displays the source, destination, and duration of
the call. The duration updates every second. The status of the
connection is also displayed, as well as the baud rate of
communication.
The local workstation can handle up to two simultaneous connections
to remote devices. Therefore, there can be up to two Dial-Up windows
(or telephone icons) on the screen at one time.
15-4 Operator Workstation User’s Manual
Detailed Procedures
Initiating a Call
To initiate a call:
1. Logon.
2. Click the Continue button on the Connection dialog box and the
call is attempted immediately.
Note: Conection is automatically attempted after 10 seconds
without user action.
Canceling a Call
To cancel a call:
1. Logon.
2. Click the Cancel button when the Connection Dialog box appears.
Ending a Call
To end a call:
1. Display the Control menu by clicking the Control-menu box in the
upper left corner of the Dial-Up window.
2. Click Hang Up. The connection is canceled; however, any
applications using Dial-Up remain open until closed by the user.
Notes: After hanging up, if the operator initiates any action from the
network map that requires online data, a dial-up connection
occurs, and the connection remains active until the user logs
off or hangs up.
After hanging up, any scheduled operation or incoming call
makes the connection, performs the operation required, and
then terminates the connection after the operation is
complete.
The Hang-Up option is only available in the Control-menu
box accessed from a Dial-Up window.
Operator Workstation User’s Manual 16-1
Chapter 16
Introduction
This section describes using the Dial-Up feature to connect to remote
devices via the N2 Dialer Module (NDM).
The N2 Dial feature allows you to communicate over phone lines
through the NDM to remote devices. Using the NDM may eliminate
the need for a second NCM at the remote site.
The N2 Dial feature also allows remote devices to send alarms and
change-of-state messages to the local OWS.
Before you can connect to devices using the N2 Dialer Module, both
the local and remote NDMs must be configured using the N2 Dial
application in the HVAC PRO system.
This chapter describes how to:
• display the N2 Dial Network summary
• refresh the N2 Dial Network summary
• close the N2 Dial Network summary
• dial a remote site
• disconnect from a remote site
Key Concepts
N2 Dial Network Summary
The N2 Dial Network summary displays the status of all connections
from the OWS to remote sites that are connected via the NDM.
It is also used to dial a remote site or disconnect from a remote site.
Figure 16-1 shows an example of an N2 dial network summary.
Table 16-1 describes the different fields in the summary.
Detailed Procedures
Displaying the N2 Dial Network Summary
To display the N2 Dial Network summary, on the Setup menu, click
N2 Dial. The N2 Dial Network summary appears (Figure 16-1).
Note: The Dial Status field is valid only during the Dial process.
Table 16-2 describes the six Dial statuses that may appear in
the Dial Status field during the Dial process.
Chapter 17
Introduction
Online generation is the process performed at the Operator
Workstation (OWS) to set up or modify a database. Setting up a
database means defining the networks, devices, Personal Computer
(PC) groups, systems, and objects that make up the facility.
For example, when defining a network, you specify the type of
connection between the network and the OWS: N1-Direct, NC-Dial, or
NC-Direct. When defining a system, specify the system name, report
group, and host Network Control Module (NCM). When defining
software and hardware objects, specify values for the object attributes.
For example, specify display units for binary objects and alarm limits
for analog objects.
Online generation can be performed at two stages: when the Building
Automation System (BAS) is initially set up and when additions or
changes are made to the facility. During initial setup, use definition
windows and dialog boxes to define new items. Use Focus windows to
view and modify existing definitions.
To define databases offline, use Data Definition Language (DDL) and
Graphic Programming Language (GPL). For detailed information on
DDL and GPL, refer to the DDL Programmer’s Manual and the GPL
Programmer’s Manual.
Key Concepts
Online Generation
The OWS requires the entry of a Level 1 or 2 password to perform
online generation.
As part of the minimum database, the OWS provides a default Level 1
password. Use the default password to log onto the OWS and define a
new password. Give the new password a level of 1 (the system must
always have at least one Level 1 password). Then delete the default
password.
Always define items in the proper order, from highest to lowest level
of organization. For example, define networks before PC groups,
define PC groups before systems, and define systems before objects.
After making changes to the database, perform an upload. Uploading
copies the operational database (the database altered during
Online Generation) to the archive database stored at the OWS.
Because the archive database is the master copy, upload often.
Minimum Database
The OWS provides the following minimum database:
• one PC, N1-Direct
• one NCM
• one network, N1-Direct
• default password database
• one system “SYS”
• 16 report access groups
This minimum database provides a foundation and allows the user to
add as many new items (networks, PC groups, systems, and objects) as
the facility requires, or delete items that are not required by the
facility.
Operator Workstation User’s Manual 17-3
Detailed Procedure
Performing Online Generation
Perform Online Generation steps in the following order:
1. Log on using the default password, define a new Level 1 password,
and delete the default password.
2. Modify the minimum database to meet the specific requirements of
your facility.
3. Define networks. See the Defining Networks chapter (LIT-120144)
in this manual.
4. Define devices (for example, OWS, NCM, Printer, etc.). See the
Defining Devices chapter (LIT-120145) in this manual.
5. Define PC groups. See the Defining PC Groups chapter
(LIT-120146) in this manual.
6. Define the systems within the PC groups. See the Defining Systems
chapter (LIT-120147) in this manual.
7. Define software models. See the Defining Software Models chapter
(LIT-120148) in this manual.
8. Define the hardware objects within the systems. See the Defining
Objects chapter (LIT-120149) in this manual.
9. Define hardware objects before software objects because software
objects must be assigned to an existing hardware system and object
name.
10. Define the software objects.
11. Perform the additional Online Generation tasks in any order
(define passwords, define report/access groups, create alarm
messages, define graphics, etc.).
12. Upload the modified databases (NCM and global) to make sure the
archived versions (master copies) stored at the OWS are kept up to
date.
Operator Workstation User’s Manual 18-1
Chapter 18
Defining Networks
Introduction
A network is a group of related equipment controlled by at least
one NCM and interconnected by an N1 Local Area Network (LAN)
Bus (or, in the case of remote networks, a modem and phone lines). A
facility may consist of one network or of multiple networks. The OWS
monitors and controls these networks.
This chapter describes how to:
• define a new network
• modify a network
• delete a network
Key Concepts
Network Definition
Each network must be defined. To define a new network, assign it a
name and specify the connection type between the network and the
OWS. The connection types are N1-Direct, NC-Direct, and NC-Dial.
N1-Direct means the network is connected to the OWS via the N1
LAN. NC-Direct means the network is directly connected to the OWS
via a port on the NCM. NC-Dial means the network is remotely
connected to the OWS via a modem, phone lines, and a serial port on
the NCM, or via the Integrated Services Digital Network (ISDN) and a
serial port on the NCM.
The Metasys BAS contains at least one defined N1-Direct network as
part of the minimum database.
Network Summary
The Network Summary lists all the networks defined for an OWS.
Figure 18-1 shows an example of a Network Summary.
Network Activation
Use the Activate Network option to switch between networks in a
multiple-network facility. A maximum of five networks can be active
at one time using any combination of the following:
• one to five N1-Direct networks
• up to four NC-Direct networks
• up to two NC-Dial remote networks
The Network Map displays the most recently activated network.
More than one window for an active network can be open at a time.
Complete functionality (for example, commanding, scheduling) is
available in all activated networks.
Note: To deactivate an NC-Dial (modem or ISDN) remote
network, use the Hang Up option in the Dial-Up Window
Control menu.
Operator Workstation User’s Manual 18-5
Detailed Procedures
Defining a New Network
To define a new network:
1. On the SetUp menu, click Network. The Network Summary
appears.
2. On the Item menu, select New. The Network-Item New dialog
box appears (Figure 18-3).
Modifying a Network
To modify network definition information:
1. On the SetUp menu, click Network. The Network Summary
appears (Figure 18-1).
2. Double-click the network. The Network Focus window appears
(Figure 18-2).
3. Make the desired changes. Only the values contained in boxes
may be modified.
Operator Workstation User’s Manual 18-7
Deleting a Network
To delete a network:
1. Delete all PC groups and systems in the network. See the Defining
PC Groups (LIT-120146) and Defining Systems (LIT-1201147)
chapters later in this manual.
2. On the SetUp menu, click Network. The Network Summary
appears (Figure 18-1).
3. Select the network.
4. On the Item menu, click Delete. The Delete dialog box appears.
5. Click OK to delete the network from the operational database.
18-8 Operator Workstation User’s Manual
Troubleshooting
Correcting Invalid Entries
If you enter invalid information into a field, the field appears red when
you attempt to select another field. When this occurs, select the
incorrect value and type in the correct information. In addition, if you
attempt to save a network with invalid information, a dialog box
appears, informing you of the error. Acknowledge the message by
clicking the OK button. Make the necessary corrections and attempt to
save the network again.
An entry might be invalid because it is not in the correct format or
because it exceeds the valid range.
Operator Workstation User’s Manual 19-1
Chapter 19
Defining Devices
Introduction
Devices include NCMs, OWSs (PCs or portable computers), and
printers. Each network has a system called Devices, which contains all
the defined devices in the network.
Note: N2 devices (for example, DCM, XBN, XRL), S2 devices
(for example, FPU, DSC8500), L2 devices (DSC), and
N2E devices (for example, DX91ECH) are considered
hardware objects. Refer to the Defining Objects chapter
(LIT-120149) of this manual.
This chapter describes how to:
• define a device
• modify a device definition
• delete a device
• define and modify a default report destination
• delete a default report destination
• set up or modify PC ports
• modify the IP address of a device
Key Concepts
Devices Summary
Use the Devices summary to view devices, delete devices, and access
device Focus and Definition windows. Figure 19-1 shows an example
of a Devices summary.
Unconfigured OWSs
Unconfigured OWSs have the same functionality as defined OWSs,
except that they cannot receive change-of-state reports or archive data.
An unconfigured OWS can be NC-Direct or NC-Dial (not N1-Direct).
Unconfigured OWSs do not appear in the Devices system on the
Network Map or in the Devices summary.
To use an unconfigured OWS, make the NC-Direct or NC-Dial
connection and log on to the desired network using the Logon dialog
box. The unconfigured OWS must have the network in its database. If
the unconfigured OWS does not have the network in its database,
define the network at the undefined OWS.
Operator Workstation User’s Manual 19-5
Detailed Procedures
Defining a Device
To define a device:
1. Double-click Devices. The Devices summary appears
(Figure 19-1).
2. On the Item menu, click New. The Devices-Item New dialog box
appears (Figure 19-3).
Shortcut
To copy definition information from one device to another:
1. Select a device in the Devices summary that is similar to the new
device.
2. For example, to define a new N1-Direct Connect PC, select an
existing N1-Direct Connect PC in the Devices summary.
3. On the Item menu, select New. The Copy From field at the bottom
of the Definition dialog box displays the name of the selected
device.
4. Click OK. A Definition window appears with the same
configuration as the selected N1-Direct Connect PC.
5. Specify a unique name, make any necessary changes, and save the
new device.
3. On the Item menu, click Save. Close the window after the changes
are saved.
Note: Some of the items modified in the device’s Focus
window (such as connection type, baud rate, and subnet
and port address) may also need to be modified in the
NOVRAM View/Modify dialog box. Refer to the
NCSETUP for Windows Technical Bulletin
(LIT-6360251d) for detailed information.
4. To add the changes to the archive database, perform a global
upload.
After modifying an NC device, perform an NC data download,
following the guidelines described in the Uploading and
Downloading Databases chapter (LIT-120155) of this manual.
Deleting a Device
To delete a device:
1. Double-click Devices. The Devices summary appears
(Figure 19-1).
2. Click the device.
Note: Only one device can be deleted at a time. The delete
option is not available if more than one device is
selected or if no devices are selected.
3. On the Item menu, click Delete. The Delete dialog box appears.
4. Click the OK button in the Delete dialog box to delete the device
from the operational database. The device no longer appears in the
Devices summary.
To add the changes to the archive database, perform a global
upload.
After deleting a PC (either dial-up or directly connected to an
NCM), perform an NC data download.
Modem Port OK
COM1
COM2 Cancel
Modemset
4. Enter the new IP address and click OK. The new address appears
in the IP Address Configuration summary.
5. On the System menu, click Save.
6. Double-click the Control Menu box to close the summary.
19-14 Operator Workstation User’s Manual
Troubleshooting
Correcting Invalid Entries
If you enter invalid information into a field, the field appears red when
you attempt to select another field. In this case, select the invalid entry
and correct it. In addition, if you attempt to save invalid information, a
dialog box appears indicating the error. In this case, acknowledge the
message by clicking the OK button. Then make corrections and
attempt to save the information again.
An entry might be invalid because it is in the wrong format or exceeds
the valid range.
Operator Workstation User’s Manual 20-1
Chapter 20
Defining PC Groups
Introduction
A PC group (group) is a set of systems or other PC groups. Group
systems by location, function, or any other convenient association. For
example, if a network facility has two wings, it might be useful to
group the systems within the facility according to the two wings. In
this case, define two PC groups: EAST and WEST. Then, when
defining a system, assign the system to the appropriate PC group.
The PC group level of organization is not global data; it resides only at
the OWS used to define the groups, and Metasys software does not use
it to control objects. However, for the operator’s understanding of the
facility, the group level might be very helpful. In addition, the PC
group name appears on alarm reports, change-of-state reports, and
other summaries to help quickly pinpoint the source of information.
This chapter describes how to:
• define a new PC group
• modify the expanded ID of a PC group
• delete a PC group
Key Concepts
PC Groups
The PC group names appear as branches on the Network Map. There
can be up to three nested PC group levels.
PC Groups
HDQTRS
EAST
1st Floor
2nd Floor
3rd Floor
4th Floor
AHU1
AHU2
Mechroom
Boiler
West
1st Floor
pcgroups
PC Group Summary
The PC Group Summary lists all the items in the selected PC group.
Figure 20-2 shows an example of a PC Group summary.
Detailed Procedures
Defining a New PC Group
Defining a New PC Group as a Branch within Another PC
Group:
To define a new PC group as a branch within another PC group:
1. Double-click the name of the PC group you wish to add to the
other PC group. The PC Group summary appears (Figure 20-2).
2. On the Item menu, click New. The Item New dialog box appears
(Figure 20-3).
Deleting a PC Group
Note: Before deleting a PC group, delete all the groups and
systems within the group.
To delete a PC group:
1. Double-click the network or the PC group that contains the group
you want to delete. The Network or PC Group summary appears.
2. Click the PC group you want to delete.
3. On the Item menu, click Delete. The Delete dialog box appears.
4. Click OK.
20-6 Operator Workstation User’s Manual
Operator Workstation User’s Manual 20-7
Troubleshooting
Correcting Invalid Entries
If a dialog box field contains invalid information, a message appears
when you attempt to save the new PC group. Acknowledge the
message by clicking the OK button. Then correct the field and try
saving the PC group again.
An entry might be invalid because it is not in the correct format.
Operator Workstation User’s Manual 21-1
Chapter 21
Defining Systems
Introduction
Systems are sets of objects related by function, location, or any other
convenient association. For example, the hardware and software
objects in one air handling unit might comprise the system called
AHU1. The hardware and software objects in another air handling unit
might comprise AHU2.
Define a system at one of two levels: as a branch from the network
name itself or as a branch within a defined PC group. It is more
common to define a system as a branch within a defined PC group.
This chapter describes how to:
• define a system
• modify a system
• delete a system
• change the system display order
• move a system to a new PC group
Key Concepts
Modifying a System
It is possible to modify a system’s expanded ID (description) or assign
the system to a different report/access group. See Modifying a System
under Detailed Procedures.
PC Groups
Most systems are defined as a branch within a PC group. The user can
move a system from one PC group to another with the Modify Group
Assignment function. This is a permanent move and appears on the
Network Map and in summaries. See Modifying a Group Assignment
later in this chapter.
Operator Workstation User’s Manual 21-3
Detailed Procedures
Defining a System
To define a system:
1. Double-click the PC group. The PC Group summary appears.
2. On the Item menu, click New. The Item New dialog box appears
(Figure 21-1).
Shortcut
To copy definition information from one system to another:
1. Select an existing system in the PC Group summary that is similar
to the new system.
2. On the Item menu, click New. The name of the selected system
appears in the Copy From field in the Item New dialog box.
3. Click OK. The System Definition dialog box appears. The values
of the selected system appear in the fields in the dialog box.
4. Enter a unique name, make any necessary changes, and save the
new system.
Operator Workstation User’s Manual 21-5
Modifying a System
To modify a system:
1. Select the PC group that contains the system.
2. On the GoTo menu, click Selected Item. The PC group Standard
Summary appears (Figure 21-3).
Deleting a System
Note: Delete all objects from a system before deleting the system
itself.
To delete a system:
1. Double-click the PC group that contains the system. The PC
Group summary appears.
2. Click on the system (or systems).
3. On the Item menu, click Delete. The Delete dialog box appears.
4. Click OK.
To add the changes to the archive database, perform a global
upload (described in the Uploading and Downloading Databases
chapter [LIT-120155] of this manual).
Operator Workstation User’s Manual 21-7
5. Type the number of the new position in the New Position text box.
A number equal to or greater than the total number of systems in
the network displays the system in the last position.
6. Click OK.
7. To reposition more systems, repeat Steps 5 through 9.
8. On the Item menu, click Save.
To add the changes to the archive database, perform a global
upload (refer to the Uploading and Downloading Databases
chapter [LIT-120155]).
Troubleshooting
Correcting Invalid Entries
If a dialog box field contains invalid information, a message appears
when you attempt to save the new system. Acknowledge the message
by clicking the OK button. Then make the necessary corrections and
try saving the new system again.
An entry might be invalid because it is not in the correct format or
because it exceeds the valid range.
Operator Workstation User’s Manual 22-1
Chapter 22
Introduction
A software model is a predefined set of attributes used as a default for
defining Control System (CS) software objects. OWS uses a specified
model as a reference and assigns its attributes and values to the new
object.
The software model serves three purposes:
• It makes Control System object definition possible.
• It allows for the creation of Control Systems well in advance of
product installation.
• It helps to ensure that Application Specific Controllers (ASCs),
such as the Unitary Controller (UNT), Air Handling Unit (AHU),
Variable Air Volume (VAV), Variable Air Volume Modular
Assembly (VMA), and DX-9100 are used consistently throughout
a facility.
The chapter describes how to:
• define a software model
• view a software model
• modify a software model
• print a software model
Key Concepts
Software Model Definition
Software model definition involves adding a new model to a PC
archive database. It can then be used as a reference during database
generation to configure Control System objects for Application
Specific Controllers (ASCs).
When creating a software model, plan your attributes carefully. You
must define every attribute you declare or start the process again. For
example, if you declare five attributes but only define four of them,
you must cancel the define operation and start over.
To create a new software model quickly and easily, find an existing
model that is similar to the new model. Make a copy of the existing
model and edit the copy. See the Detailed Procedures section later in
this chapter.
Notes: New and modified software models exist in the archive of
the OWS used to create them. In order to store a model on a
different OWS, transfer the model using a floppy disk, or use
another method of file transfer. Be sure to transfer all four
files in the directory that “Models” variable in the
METASYS.INI file points to.
If a CS object references the modified software model,
download the NCM containing the CS object. Refer to the
Uploading and Downloading Databases chapter
(LIT-120155) of this guide.
Print Options
Two types of printing are available from the Software Model
summary: Item Print and Model Print.
Item Print prints a list of all existing software models held in the
archive database. The printed information includes the model names,
types, and associated hardware.
Model Print prints a hard copy of a specified software model. The
printed information includes the object attribute type, the hardware
reference, the override and adjust settings, the object description, and
the engineering units.
Note: Metasys software does not support printing between OWSs
with different operating systems when one of those systems
is a Windows® 2000 Professional system.
Detailed Procedures
Defining a Software Model
To define a software model:
1. On the SetUp menu, click Software Model. The Software Model
summary appears (Figure 22-1).
2. On the Action menu, click Add Model. The Software Model
Summary-Add dialog box appears (Figure 22-2).
Model Print
To print a hard copy of a software model:
1. On the SetUp menu, click Software Models. The Software Model
summary appears (Figure 22-1).
2. Select a model to print.
3. To select more than one model, hold down the Ctrl key while
clicking on the desired models.
4. On the Action menu, click Print Model. The Print message box
appears in the Software Summary indicating that the printing is in
progress.
Operator Workstation User’s Manual 22-11
Troubleshooting
Correcting Invalid Entries
If you attempt to save invalid information, a dialog box appears
indicating the error. Acknowledge the message by clicking the OK
button. Make corrections and attempt to save the information again.
An entry might be invalid because it is in the wrong format or exceeds
the valid range.
Operator Workstation User’s Manual 23-1
Chapter 23
Defining Objects
Introduction
Defining an object involves adding a new object to an existing system
and assigning values to the object’s attributes (for example, the
object’s name, expanded ID, and engineering units).
This chapter describes how to:
• define an object
• delete an object
• change the system display order of objects
Key Concepts
Objects
There are three categories of objects: point objects, hardware objects,
and control objects.
Point Objects
A point object is the software definition for a specific field device such
as a temperature sensor (Analog Input object) or fan control relay
(Binary Output object). The following are point objects:
• Analog Input (AI)
• Accumulator (ACM)
• Analog Output Digital (AOD)
• Binary Input (BI)
• Analog Output Setpoint (AOS)
• Binary Data (BD)
• Analog Data (AD)
• Binary Output (BO)
• Zone
• Card Reader (CR)
• Multistate Data (MSD)
• Multistate Input (MSI)
• Multistate Output (MSO)
• Multi-Command (MC)
Operator Workstation User’s Manual 23-3
Hardware Objects
A hardware object is the software definition for an L2, N2, N2E, S2,
or LONWORKS® compatible device. Table 23-1 lists the hardware
objects for each device type.
Control Objects
A control object is the software definition for a specific process that
combines multiple field devices and logic to perform a function. The
following are control objects:
• Lighting Control Group (LCG)
• Proportional plus Integral plus Derivative (PID) Loop
• Demand Limiting/Load Rolling Group
• Process (GPL/JCBASIC)
• Control System Object (CS)
Note: Refer to the Using Processes chapter (LIT-120160) of this
manual for descriptions of GPL process objects.
23-4 Operator Workstation User’s Manual
Online Help
The OWS provides online help for all Definition and Focus windows.
This help includes the formats and valid ranges to use when entering
attribute values. To access help, click the Attribute Help option in the
Help menu. Refer to the Using Online Help chapter (LIT-120175) of
the Operator’s Guide for a complete description of online help.
Operator Workstation User’s Manual 23-5
Detailed Procedures
Defining an Object
To define an object:
1. Double-click the system in which the new object will reside.
The System summary appears.
2. On the Item menu, click New. The Item New dialog box appears
(Figure 23-1).
7. After specifying the attribute values, click Save on the Item menu
to add the new object to the operational database.
To add the changes to the archive database, perform an NCM
upload (refer to the Uploading and Downloading Databases
chapter [LIT-120155] of this manual).
Shortcut
To copy definition information from one object to another:
1. When the System summary is displayed, select an already defined
object that is the same type as the new object.
2. For example, to add a new Binary Output object, select an existing
Binary Output object in the System summary.
3. On the Item menu, click New. The Item New dialog box
(Figure 23-1) appears with the Copy From field filled in with the
selected object’s name.
4. Specify the hardware system and hardware object and click OK. A
Definition window for the selected object type appears. The fields
in this window contain the selected object’s values.
5. Enter a unique object name, make any necessary changes, and
save the new object.
Deleting an Object
Note: Before deleting a hardware object, delete any software
objects that reference the hardware object.
To delete an object:
1. Display the summary of the system that contains the object.
2. Click on the object.
3. On the Item menu, click Delete. The Delete dialog box appears.
4. Click OK.
5. To add the changes to the archive database, perform an upload
(refer to the Uploading and Downloading Databases chapter
[LIT-120155] of this manual).
8. On the Item menu, click Save to save the new positions. The new
order is entered into the operational database.
To save the new order to the archive database, perform an NCM
upload of the system’s NCM host (uploads are described in the
Uploading and Downloading Databases chapter [LIT-120155]of
this manual).
23-10 Operator Workstation User’s Manual
Troubleshooting
Correcting Invalid Entries
If you enter invalid information into a field, the field appears red when
you attempt to select another field. If this happens, select and correct
the invalid value. If you attempt to save a new object with invalid
information, an error message appears. Acknowledge the message by
clicking OK. Type in corrections and attempt to save the new object
again.
An entry might be invalid because it is not in the correct format or
because it exceeds the valid range.
Operator Workstation User’s Manual 24-1
Chapter 24
Defining Passwords
Introduction
Passwords protect the security of the BAS by allowing different users
different levels of access to the facility. For example, one user can
have complete access to all objects, while another user can have read-
only access to HVAC objects. Each BAS can have up to 100 unique
user passwords. The OWS provides five levels of password protection
and up to 32 report/access groups for each facility. Refer to the
Password Technical Bulletin (LIT-636111) to find out what level of
password is needed for various OWS functions.
The chapter describes how to:
• display the password summary
• add a password
• modify a password
• delete a password
Key Concepts
Password Definition
To define a password means to add it to the password database. This
process involves specifying the display language, time out interval,
password level, and Report/Access groups that are in effect when the
password is logged on.
Display Language
The display language determines which language the OWS uses to
display text in windows. For example, if French is specified, all
windows, menus, prompts, and messages are displayed in French.
Password Level
The password level determines which functions are available to the
user. For example, a user with a Level 5 password has read-only
access to summaries. This user cannot command objects or change
attribute values in Object Focus windows. A user with a password
level of two can perform all functions except defining or modifying
passwords. A user with a password Level of 1 can perform all
functions, including the definition of new passwords.
Operator Workstation User’s Manual 24-3
Report/Access Groups
Each system belongs to a particular report/access group. When
defining a user’s password, specify the report/access groups to which
the user has access. This determines which systems the user can
access.
The use of report/access groups provides flexible security protection.
For example, all systems having to do with heating and air
conditioning can be assigned to a report/access group called HVAC.
When defining a password for a user, whose main job is to control
heating and air conditioning equipment, specify that the user be given
access to the HVAC report group only. This means the user only has
access to those systems assigned to the HVAC report group. When this
user is logged on, the Network Map and any summaries only display
the HVAC systems. All other systems are not accessible. If another
password is logged on that allows access to all report/access groups,
the Network Map displays all systems in the network.
For more information on report/access groups, refer to the Defining
Report/Access Groups chapter (LIT-120151) of this manual.
Password Summary
Use the password summary to add new passwords to the database,
modify the settings for existing passwords, and delete passwords. To
perform any of these functions, the user must have a Level 1 password.
Figure 24-1 shows an example of a password summary.
Detailed Procedures
Adding a Password
To add a password:
1. On the SetUp menu, click Password. The Password Summary
appears (Figure 24-1).
2. On the Action menu, click Add Password. The Password
Summary-Add dialog box appears (Figure 24-2).
Shortcut
To copy the settings from an existing password to a new password:
1. Select a password in the password summary that has settings
similar to the new password.
2. On the Action menu, click Add Password. The fields in the
Password Summary-Add dialog box (Figure 24-2) contain the
values of the copied password.
3. Make any necessary changes and click OK.
Modifying a Password
To modify a password:
1. On the SetUp menu, click Password. The password summary
appears (Figure 24-1).
2. Select a password to change.
3. On the Action menu, click Modify Password. The Password
Summary-Modify dialog box appears (Figure 24-3).
24-8 Operator Workstation User’s Manual
Shortcut
Use the following shortcut to modify a password quickly:
1. In the Password Summary, double-click the password. The
Password Summary-Modify dialog box appears (Figure 24-3).
2. Make the desired changes.
3. Click OK.
To save the changes to the archive global database, perform a
global upload (which is described in the Uploading and
Downloading Databases chapter [LIT-120155] of this manual).
Deleting a Password
To delete a password:
1. On the SetUp menu, click Password. The password summary
appears (Figure 24-1).
2. Select a password (or passwords) to delete.
3. On the Action menu, click Password. The Clear Password dialog
box appears.
4. Click OK.
5. Repeat Steps 1 through 4 to delete another password.
6. On the Item menu, click Save. The changes to the password
summary are saved to the operational global database.
To save the changes to the archive global database, perform a
global upload (which is described in the Uploading and
Downloading Databases chapter [LIT-120155] of this manual).
Operator Workstation User’s Manual 25-1
Chapter 25
Introduction
Report/access groups (report groups) specify exactly where different
reports are directed. For example, a report group can direct all Critical
reports generated by fire systems to the local OWS, and direct all
Follow-Up reports generated by HVAC systems to a remote printer.
This chapter describes how to:
• define a report/access group
• define destinations for a report/access group
• delete a destination
Key Concepts
Report/Access Groups
When defining systems, assign each system to one report group.
Define each report group by assigning destinations for the eight report
types. The eight report types are Critical, Follow-Up, Status, History,
Totalization, Trend, Operator Transaction, and Card Reader.
Destinations can be any defined PC, printer, or PC file (only Critical
and Follow-Up reports can have a PC as a destination). There can be
up to eight destinations for each report type, in groups 1-16 and up to
sixteen destinations for each report type in groups 17-32.
For example, when defining Report Group 3, send all Critical reports
to PC3 and Printer4, and all Totalization reports to a PC file called
FILE3. When an object in a system assigned to Report Group 3
generates a Critical report, the system sends the report to PC3 and
Printer4. When an object in this system generates a Totalization report,
the system sends the report to the FILE3 PC file.
Assign report groups to each user password. When logged on, users
only have access to those systems that are in report groups assigned to
their password. The other systems do not appear on the Network Map
or any summaries.
There can be up to 32 defined Report/Access Groups.
Detailed Procedures
Defining Report/Access Groups
To define a report/access group:
1. On the SetUp menu, click Report/Access Group. The
Report/Access Group summary appears (see Figure 25-1).
2. On the Item menu, click New. The Item New box appears
(see Figure 25-2).
Deleting a Destination
To delete a destination:
1. Display the Report Group summary.
2. Double-click the report group that contains the destination. The
Report Group Focus window appears (see Figure 25-1).
3. Select the destination.
4. On the Action menu, click Delete Destination. The Delete
Destination dialog box appears.
5. Click OK.
6. On the Item menu, click Save.
7. To save the changes to the archive database, perform a global
upload (which is described in the Uploading and Downloading
Databases chapter [LIT-120155] of this manual).
Operator Workstation User’s Manual 26-1
Chapter 26
Introduction
An alarm message is an ASCII text string associated with a specific
object. When the object goes into an alarm state, the message
associated with the object appears in the Critical Alarm box on the
OWS screen, and in Critical and Follow-Up summaries. The message
might tell the operator what to do in the case of an emergency. For
example, the message “Fire--call 911 and evacuate
building!” might be associated with an object that goes into an
alarm state when fire is detected.
Analog objects may have two messages associated with them: an
alarm message displayed when alarm limits are exceeded, and a
warning message displayed when warning limits are exceeded.
This chapter describes how to:
• display the alarm message summary
• add an alarm message
• modify an alarm message
• clear an alarm message
Key Concepts
Alarm Messages
Alarm messages can be up to 65 characters long. Each alarm message
is assigned a number from 1 to 255, inclusive. One alarm message can
be assigned to many objects.
Alarm messages are stored in Network Control Modules (NCMs).
Each NCM has a different set of up to 255 messages. A system’s host
NCM must contain the alarm messages for objects in the system. For
example, if NC3 is the host NCM for the AHU1 system, the NC3 must
store all alarm messages for objects in AHU1.
Detailed Procedures
Displaying the Alarm Message Summary
To display the alarm message summary:
1. Click on an NCM.
2. On the SetUp menu, click Alarm Message. The alarm message
summary (Figure 26-1) for the selected NCM appears.
Shortcut
To add a new alarm message that is similar to an existing alarm
message:
1. Select an NCM from the Network Map.
2. On the SetUp menu, click Alarm Message. The alarm message
summary (Figure 26-1) for the selected NCM appears.
3. Select an existing alarm message.
4. On the Action menu, click Add Message. The Alarm
Messages-Add dialog box appears (see Figure 26-2), displaying
the copied message.
5. Enter a new message number.
6. Make any necessary changes to the message text.
7. Click OK.
8. On the Item menu, click Save to enter the message into the NCM
operational database.
To add the changes to the archive database, perform an NCM
upload (which is described in the Uploading and Downloading
Databases chapter [LIT-120155] of this manual).
Shortcut
To quickly modify an alarm message:
1. Click the NCM that contains the message.
2. On the SetUp menu, click Alarm Message. The alarm message
summary appears (Figure 26-1).
3. Double-click the alarm message. The Modify Message dialog box
appears (see Figure 26-3).
4. Make desired changes to the message text.
5. Click OK.
6. On the Item menu, click Save to enter the message into the NCM
operational database.
To add the changes to the archive database, perform an NCM
upload (which is described in the Uploading and Downloading
Databases chapter [LIT-120155] of this guide).
Chapter 27
Introduction
Access cards are used to enter locked areas or buildings. The access
card definition process defines or limits a card holder’s access to the
facility. For example, one person may be able to enter a building at
any time (unlimited access), while another may only be able to enter
between 6:00 a.m. and 5:00 p.m. (restricted access).
This chapter describes how to:
• display the access cards summary
• print the access cards summary
• define an access card
• modify an access card
• delete an access card
• define user data
• modify user data
• modify user definable field titles
• print user data
• quit Superbase 4 software
• display access controllers for an access card
Key Concepts
Access Cards Summary
The access cards summary displays data on all access cards defined on
the network, regardless of the NCMs or controllers associated with the
cards. Use the access cards summary to add, modify, or delete access
card files.
Note: If an NC is offline, the cards associated with those devices
do not appear in the summary. When any NCM on the
network is offline, a warning message appears indicating the
offline status before the summary appears.
The access cards summary is organized either by card number or by
last name, depending on the filter selected in the Filter dialog box.
(The summary displays the first 30 cards by number if no filter is
specified.)
Figure 27-1 shows and example of an access cards summary.
Table 27-1 details the information provided in each of the access cards
summary fields.
• Define the Access Controller (AC) and Card Reader (CR) objects,
as well as the time zones, before defining any access card.
• To add, modify, or delete an access card the database of the
security NCM, the NCM must be online. If the NCM is offline, its
associated Access Controllers and access cards do not appear. If
any NCM is offline when the access cards summary appears, a
warning message appears indicating that an NCM is offline. (This
NCM may or may not be a security NCM.)
• Verify that the Access Controller is online before adding an access
card to its database. (If an Access Controller is offline, it is still
listed in the Add Card dialog box; however, access card data added
or modified to an offline controller is not saved.) You cannot
delete an access card from an offline Access Controller. If an
Access Controller is offline when Add Card or Modify Card dialog
box appears, a warning message indicating that an Access
Controller is offline appears.
• Define at least one Access Controller and one Card Reader for the
card in the Add Card dialog box before adding a card online.
Operator Workstation User’s Manual 27-5
Card ID SAVE
Time Zone 0
Last Name
A First Name Process Group 0 QUIT
Card Issue Level 0 In/Out State N/A C
Executive Privilege N Valid Readers
Bldg1.Door1
Bldg1/Door2
Bldg1/Door3
Access Controllers Bldg1/Door4
Bldg1/Security1 Bldg1/Door5
B Bldg1/Security2 Bldg1/LAB
Bldg1/Storage
Bldg1/Security3
Bldg1/Security4
Bldg2/Security1
Bldg2/Security2
Bldg2/Security3
Bldg2/Security4
Bldg2/Security5
Bldg3/Security1
Bldg3/Security2
OK CANCEL
Bldg3/Security3
* Indicates Card in Controller
EXAMPLE
E D
Superbase 4 Software
The Superbase 4 program is a database management software package
that maintains certain OWS databases. Superbase 4 software displays
and manages:
• access card user data
• Operator Transaction summaries
• Card Reader Transaction summaries
The Superbase 4 package included in Metasys software is a runtime
version and does not have full Superbase 4 capabilites. For instance,
the runtime version of Superbase 4 can not change screen formats. The
only changes that can be made to any Superbase 4 screen within the
OWS are the four User Definable Data fields in the Employee menu.
To change the screen format in any other way, purchase the full
Superbase 4 package.
Note: Superbase 4 software is case-sensitive. Develop a standard
format for data entered in Superbase 4 software.
this will not change the record created in the Add Card dialog box
(Figure 27-2).
Main Menu
The Main Menu (Figure 27-3) allows access to other user data menus,
the query menu, and the report menu. It also allows modification of the
four User Definable fields.
Vehicle Menu
Use the Vehicle menu (Figure 27-6) to view and modify information
about an access card holder’s vehicle. This window can record
information for two vehicles per card holder.
Badge Menu
Use the Badge menu (Figure 27-7) to view and modify specific
information about the card holder’s access card.
Employee Menu
Use the Employee menu (Figure 27-8) to input specific information
about an employee (this menu has two pages; click P-2 for the second
page). The Employee menu appears when the User Data button is
pushed in the Modify Card dialog box.
Identity Menu
Use the Identity menu (Figure 27-9) to input a card holder’s
photograph and signature.
Personal Menu
Use the Personal menu (Figure 27-10) to input personal information
about the card holder, such as home address, telephone number, and
emergency contact information.
Emergency Files
Use the Emergency field to record instructions to be followed in the
event of an emergency for each card holder (for example, the name,
address, and phone number of the person that should be contacted
should an emergency arise).
Creating Emergency files requires the full Superbase 4 package; to use
this feature with only the runtime version, simply copy and modify the
example file provided. To access this example file (BLANKENG.SBT),
access the Personal menu in Superbase 4 Modify mode. The file
automatically appears in the Emergency field of the Personal menu.
Detailed Procedures
Displaying the Access Cards Summary
To display the access cards summary:
1. Click Summary on the menu bar. The Network Map-Summary
dialog box appears (Figure 27-11).
6. Click a Card Reader to validate it for the card holder, and enter
the Time Zone and Process Group for the Controller.
Note: The In/Out State applies only to access cards used in In
or Out Card Readers. For example, if the user last used
the access card in an In Card Reader, the In/Out State
would display In. The card does not work in another In
Card Reader until the user inserts the card in an Out
Card Reader. When the card is first defined, the In/Out
State is N/A and works in either an In or Out Card
Reader. To change a card holder’s In/Out State back to
N/A after he or she has used it, click on the card holder’s
name in the access cards summary and click Modify
Card Data on the Action menu. Click Save in the Card
Summary-Modify Card dialog box. The In/Out State is
returned to N/A when the card is saved.
7. Click OK.
To add another controller for the access card, double-click another
controller and repeat Steps 6 and 7.
8. To define user data, click the User Data button, and refer to
Defining User Data later in this document. Always define user
data using the archive PC defined for the security NCMs on the
network. (All security NCMs must have the same archive PC.)
To skip the process of defining user data, click Save. A message
box appears indicating that the data has been saved. Click OK,
and an empty Add Card dialog box appears.
9. Add another card or select Quit to return to the access cards
summary.
Shortcut
To copy information for an existing access card similar to the new
card:
1. Click Summary on the menu bar. The Network Map-Summary
dialog box appears (Figure 27-11).
2. Select access cards in the Network Map-Summary list box and
click Display. The access cards summary appears.
3. Select a card to copy.
4. On the Action menu, click Add Card. The Card Summary-Add
Card dialog box appears (Figure 27-2) defined with the same
Access Controller and Card Reader information as the copied
card.
5. Fill in the Global information and make any other necessary
changes in the Add Card dialog box.
Operator Workstation User’s Manual 27-23
IMPORTANT: Never use the Control Menu box in the upper, left
corner of the screen to exit Superbase 4 software.
Using the Control Menu box to exit could cause the
PC to lock up.
Figure 27-20: Modify Card Dialog Box Displaying Access Controllers and
Card Readers
27-36 Operator Workstation User’s Manual
Chapter 28
Introduction
Time zones are database records the Access Controller object
maintains that control certain aspects of access card, Card Reader, and
Binary Input operation. Specify the time zone that controls each
operation when defining the object or item.
This chapter describes how to:
• define a time zone
• modify a time zone
• delete a time zone
• print a time zone schedule
Key Concepts
Card Reader Time Zones
There are three fields in the Card Reader Definition window that time
zones can control: Reader Active, Override, and Personal
Identification Number (PIN) Suppress. These fields control certain
aspects of Card Reader operation according to the times specified for
each day for the time zone.
For more information on Card Reader definition, refer to the Defining
Objects chapter (LIT-120149).
Reader Active
The time zone number entered in this field specifies the times when a
valid card allows access to that door. Enabled time periods allow entry
with valid cards. Disabled time periods only allow entry with cards
that have Executive Privilege. After defining a time zone, enter the
time zone number in the Reader Active field in the Card Reader
Definition window.
Override
The time zone number entered in this field specifies the times when
the Card Reader is in the Access mode. Effectively, the door will be
unlocked during the enabled time period. After defining a time zone,
enter the time zone number in the Override field in the Card Reader
Definition window.
PIN Suppress
The time zone number entered in this field specifies the time periods
when card readers do not require PIN codes to access a building or
area. The enabled time periods are the periods when the reader does
not require a PIN. After defining a time zone, enter the time zone
number in the PIN Suppress field in the Card Reader Definition
window.
Operator Workstation User’s Manual 28-3
Table 28-1 describes the fields in the Add/Modify Time Zone dialog
box.
Detailed Procedures
Defining a Time Zone
To define a time zone:
1. On the GoTo menu in the Access Controller Focus window, click
Schedule. The Access Controller Scheduling window appears.
4. Select the days of the week that the defined time periods affect.
You may select multiple days. The Time Period list box shows a
predefined Disable time period of 00:00. You may change the
command to Enabled; however, leave the time set to 00:00.
Otherwise, an error message appears when you attempt to save the
information.
5. Click inside one of the Time Period list boxes to select one of the
time periods (1-16).
6. Enter an Enable Time or a Disable Time in the appropriate field.
The time appears in the Time Period field selected in Step 5.
Repeat Steps 5 and 6 to define any other time periods for the
selected days.
Notes: Any two enable times on one day must have a disable
time falling between them, or vice versa. This means that,
for each day, you can define up to eight Enable Times
and eight Disable Times, for a total of sixteen time
periods.
For example, if a particular day has an Enable Time
defined for 08:30 and a Disable Time defined as 10:30,
you cannot define another Enable Time between
08:30 and 10:30. The same applies for Disable Time.
7. Click Save. A dialog box appears indicating that the time zone has
been saved, and the Access Controller Scheduling window appears
(Figure 28-2).
Note: Always save the data before defining another day for the
time zone, or the OWS will lose the data.
Chapter 29
Introduction
An upload or download is the transfer of data from one device or file
to another. This transfer of data keeps information at different
locations synchronized and up to date.
For example, the archive database should always be an up-to-date
master copy of the database. Therefore, whenever the operational
database changes (for example, after a new object is defined), copy the
operational database to the archive database. This is called an upload.
This chapter describes how to:
• perform an NCM upload
• perform an NCM download
• perform a DSC8500 download
• perform a D600 Access Controller download
• perform an N2Open download
• perform a System 91 download
• perform a global upload
• perform a global download
• abort an upload or download
• clear upload and download status lines
Key Concepts
Databases
There are three types of databases: global, NCM, and Controller.
Global and NCM databases are uploaded and downloaded. Controller
databases are only downloaded.
NCM Database
The NCM database contains process code and object/feature data,
including GPL process objects, object definition, and trend data. The
operational NCM database is the database that the NCM is currently
using online. The archive NCM database is the master copy stored at
the OWS designated as the NCM’s archive. An archive device is
designated during NCM setup. The archive workstation can be either
the one you are currently using or another workstation. The archive
database is the version copied to the NCM during a download.
Note: There are different types of NCMs (for example, Standard
and Migration). Keep in mind that these NCMs serve
different purposes, and that some of the information they
download is unique, depending on the way the NCMs are
configured.
Global Database
The global database contains network configuration, the Devices
system, systems, report/access groups, and the password database. The
operational global database is the version currently being used online
by the network. The archive global database is the master copy stored
at the OWS.
Controller Database
The controller database contains object/feature data specific to various
types of controllers. The Download Controller command supports
download to a variety of controllers: DSC8500s, D600s, AHUs,
DX-9100s, DX91ECHs, LCP/DC9100s, PHXs, TC-9100s, UNTs,
VAVs, and XTMs.
Operator Workstation User’s Manual 29-3
NCM Upload
An NCM upload copies the operational NCM database to the archive
NCM database. Whenever the operational database changes (for
example, when a new object is defined), perform an upload to keep the
archive database up to date.
Copy the NCM database either to the workstation performing the
upload (This PC), or to the workstation defined as the NCM archive
database (NC Archive). You can upload from only one NCM at a time
from any one workstation.
An NCM upload uploads all object/feature databases in the NCM. The
OWS cannot upload an individual database (for example, BI object
data). The only exception to this is the uploading of process objects
(which is described in the Using Processes chapter [LIT-120160]).
Note: If the upload fails, the previous version of the archive
database is restored.
Only the supported object/feature data for the NC type is uploaded.
Refer to the Uploading and Downloading Databases Technical
Bulletin (LIT-636115) for more information.
NCM Download
An NCM download copies the archive NCM database to the NCM.
Perform a download after installing an NCM or changing the archive
database. The download ensures that the NCM has the correct,
up-to-date database.
If an N1 node (NCM) is moved from an ARCNET® network to an
Ethernet network and the node address changes, recompile and
download the weekly scheduling and GPL process databases.
If both the global and NCM archive databases change, perform the
global download before the NCM download. Do not perform both at
the same time.
29-4 Operator Workstation User’s Manual
An NCM download can copy either the NCM database only, or both
the NCM database and BAS code. BAS code is the set of
Metasys-executable files that allow the NCM to run. A download of
BAS code is necessary for the installation of a new NCM, or the
installation of a new release of OWS software.
If the NCM loses both AC power and battery power, it automatically
initiates a download of BAS code and databases from the workstation
designated as the NCM’s archive when the power returns. The
Upload/Download summary (described later in this section) records
NCM-initiated downloads.
If the system includes an Ethernet Router between the archive OWS
and the NCM, disconnect any unconfigured NC-Direct OWS before
downloading.
Download the archive NCM database either from the OWS performing
the download (This PC), or from the workstation defined as the NCM
archive device (NC Archive).
The workstation performing the NCM download must contain an
operational copy of the global database. Before downloading a newly
defined NCM, perform a global upload. Then compile the NC DDL
database file and perform a code and data download.
Whenever the NCM is downloaded with the NCM database, the online
global database is also downloaded to the NCM. If the downloading
NCM is connected to an N1 network, time and date stamps are
checked with the network global. All online nodes on the network
share the most recent global databases.
An NCM download downloads all object/feature databases. The OWS
does not support the download of individual databases (for example,
BI object data). The only exception to this is the downloading of single
process objects (which is described in the Using Processes chapter
[LIT-120160]).
Only the supported feature/object data for the NC type is downloaded.
Refer to the Uploading and Downloading Databases Technical
Bulletin (LIT-636115) for more information.
Global Upload
A global upload copies the operational global database to the archive
global database at the workstation performing the upload. Whenever
the operational global database changes (for example, when a new
password is defined), perform an upload to keep the archive database
up to date.
If the network and workstation are connected through phone lines and
a modem (if the workstation is remote), the Dial-Up feature makes the
connection that allows the global upload to occur.
Only one global upload (or download) may be in progress at a PC at
one time.
Global Download
A global download copies the global archive database to the global
operational database at the workstation performing the download. If
the version copied to the workstation is more recent than the
operational version, the workstation downloads the most recent
database to all online nodes on the network.
If the network and workstation are connected through phone lines and
a modem (if the workstation is remote), the Dial-Up feature makes the
connection that allows the global download to occur.
Only one global download (or upload) may be in progress at a PC at
one time.
If both the global and NCM archive databases change, perform the
global download before the NCM download. Do not perform both at
the same time.
DSC8500 Download
DSC8500 object files are created using the CAL1 programming
language. A download to the DSC8500 controller copies the CAL1
archive database to the operational database of the DSC8500.
After adding to or changing a DSC8500 CAL1 program, perform a
DSC8500 download so that the operational data in the DSC8500 is
up to date.
Download the CAL1 program for a DSC8500 from the OWS
requesting the download (This PC), or from the workstation defined as
the NCM archive device (NC Archive). The PC performing the
download must contain the CAL1 program for the DSC8500. The
CAL1 program can be archived at any PC, not just the archive PC of
the NCM to which the DSC is connected.
29-6 Operator Workstation User’s Manual
D600 Download
A download to the D600 Access Controller copies Access Controller,
Card Reader, Binary Input, Time Zone, and Access Card databases
from the NCM to the D600. After installing an NCM or downloading
altered access data to the Security NCM, always download to the D600
Access Controller.
Note: When Security objects, Binary objects, access cards, Card
Reader objects, and time zones are added online, they are
automatically downloaded to the D600.
A read-only, non-triggerable attribute in the Focus window indicates
whether a download is currently in progress.
N2Open Download
An N2Open download sends a configuration file from the workstation,
via the NCM, to the specific device. The following devices can be
downloaded:
• Air Handling Unit (AHU)
• Phoenix Fume Hood Controller (PHX)
• Unitary (UNT) Controller
• Variable Air Volume (VAV) Controller
A read-only, non-triggerable attribute in the Access Controller Focus
window indicates whether a download is currently in progress.
The AHU, UNT, VAV, and PHX are configured using HVAC PRO
software. Configure the PHX using HVAC PRO Release 4.00 or later.
The others may be configured using an earlier version.
29-8 Operator Workstation User’s Manual
System 91 Download
A System 91 download sends a configuration file from the
workstation, via the NCM, to one of the following devices:
• Extended Digital Controller (DX-9100 and DX91ECH)
• Lab and Central Plant Controller (LCP/DC-9100)
• I/O Extension/Expansion Modules (XTM only; does not include
XT-9100)
• Terminal Controller (TC-9100)
Operator Workstation User’s Manual 29-9
Upload/Download Summary
The Upload/Download summary contains a record of device uploads
and downloads that have been executed or are currently being
executed at the workstation. The devices whose uploads or downloads
may appear in the summary are:
• NCM
• DSC8500
• D600 Access Controller
• N2Open controller (AHU, VAV, UNT, or PHX)
• System 91 controller (LCP/DC9100, XTM, DX9100, or
DX91ECH)
Note: Global uploads/downloads do not appear in the summary.
The summary displays the status of device uploads and downloads,
and allows the user to abort any uploads or downloads that are in
progress.
The summary automatically appears as an icon (see Figure 29-1) when
a device upload or download begins. The default location is as an
application item on the task bar and the icon can be restored or
maximized to view contents.
FIG60
Table 29-1 details the information that the fields in the summary
provide.
Detailed Procedures
Performing a NCM Upload
To perform an NCM upload:
1. Click the NCM.
2. On the Action menu, click NC Upload. The NCM Upload dialog
box appears (Figure 29-3).
Troubleshooting
Table 29-2 explains error messages that may occur during a download
or an upload.
Chapter 30
Archiving CAL1
Introduction
This chapter explains how to archive CAL1 files for the DSC8500
hardware object. There are two types of CAL1 files: object and source.
CAL1 object files contain the information necessary for operating the
DSC8500 controller and allowing it to interface with the network via
the S2 Migration NCM. CAL1 source files are files that the DSC
Translator compiles in order to create CAL1 object files.
This chapter describes how to:
• archive CAL1 object files
• delete CAL1 object files
Key Concepts
Archiving CAL1 Files
The archiving process can be done with either the Disk Operating
System (DOS) or with the Windows operating system. The Archive
CAL1 option in Windows software archives both object and source
files at the same time.
In order to download a DSC8500 controller from the OWS, the archive
PC for the NCM must contain a CAL1 object file for each DSC8500 it
is responsible for. A utility called CAL1ARCH is provided with DDL
software. The CAL1ARCH utility loads CAL1 object files into a PC’s
database.
Keep source files in a separate directory on the hard drive or on
diskettes. The OWS provides the C:\FMS\SAVE directory, which is
automatically created during the installation of OWS software. When
the source files are compiled, the object files are created in the same
directory as the source files, and the Archive Utility can transfer the
object files from the directory to the PC database.
Note: The CAL1 Archive Utility can also archive CAL1 source
files for use with the DSC8500 Snapshot feature.
Nevertheless, keep copies of the source files in a separate
directory on the hard drive or diskette.
Before executing the CAL1 archiving process:
• Install DDL. Which includes the CAL1 archiving utility.
• Compile the Database source files.
For more information, refer to the DDL Programmer’s Manual.
Operator Workstation User’s Manual 30-3
Example:
CAL1ARCH a:\DSC1.obj Networka Systemb\DSC1
Detailed Procedures
Archiving CAL1 Object Files
Using DOS
To archive a CAL1 object file or source file using the DOS method:
1. Insert a disk copy of the CAL1 file in Drive A, or verify that it is
stored on the PC’s hard drive.
2. For an object file, at the DOS prompt, type:
CAL1ARCH -O CAL1Inputfile[.obj] Networkname
Systemname\Objectname
For a source file, at the DOS prompt, type:
CAL1ARCH -S CAL1Inputfile[.cal]
Networkname Systemname\Objectname
Note: For an example of this format, type CAL1ARCH.
3. Press Return. A message appears asking for confirmation. Press
Return again to continue. If the file is copied correctly, the
following message appears:
The CAL1 file was archived successfully.
Troubleshooting
Common Errors
Errors may occur during the archiving process for any of the reasons
described below. Error messages often indicate which specific error
has occurred.
Using DOS
Common errors:
• The Network is not defined.
• The number of parameters for the command is incorrect.
• The parameter is invalid (that is, a space within the name).
Chapter 31
Introduction
The OWS contains archived database files for the entire facility. The
purpose of the save and restore functions is to back up and restore
these files.
The OWS can save and restore either the entire database or a single
network database. The entire database includes the global database and
all network databases archived at the workstation. A single network
database contains all the NCM databases in the network that are
archived at the workstation, and the global database for that network.
This chapter describes how to:
• save a database
• restore a database
Key Concepts
Saving Databases
Saving databases involves using a workstation to back up (on diskette)
all the NCM databases and the global database of a specified network
that are archived on that workstation.
The process of saving databases varies slightly depending on the
version of Windows® Operating System (OS) that the OWS uses
(Windows 2000 Professional OS or Windows XP Professional OS).
Restoring Databases
The database restoration process copies (to the workstation) the
database on diskettes. For example, if the diskettes contain only
one network database, only that database is restored. The copy from
diskette overwrites the database at the workstation.
Compressed files automatically return to their normal format when
restored; however, the restore process creates a temporary file, called
the CONTRACT.ZIP file, to protect data during the process. The hard
drive should have enough memory to hold a temporary copy of the
compressed file in order to restore it. If the restore process is
successful, the CONTRACT.ZIP file is automatically deleted. If the
process fails, delete it manually, using DOS or the Windows File
Manager.
The restore process returns files to the same directory that they were in
when they were saved. If a directory was empty when it was saved, the
OWS recreates it during the restore process.
Depending on the version of Windows OS the OWS is using (that
is, Windows 2000 Professional OS or Windows XP Professional OS),
the method of restoring a file varies. See the appropriate section in
Detailed Procedures to find out how to restore a database.
LOG Files
During each save or restore attempt, .LOG files are created containing
both error and processing information about the save or restore
process. Refer to the appropriate .LOG file to find what the exact
nature of failed save or restore attempt was, as well as what files
should have been saved or restored. The C:\SAVEREST directory
contains all .LOG files. Each subsequent save or restore overwrites the
.LOG files, so there is never more than one of each of these file types
on the hard drive. A detailed explanation of each of the .LOG files
appears below.
Operator Workstation User’s Manual 31-3
[NETWORK].LOG
The save process creates and names a .LOG file according to the saved
database. For example, the .LOG file for the network JCITOWER
would be named JCITOWER.LOG. This file lists three types of
information:
• all of the files that the save process should have copied, including
each of the global files and all of the network’s directories and
database files
• any global files that the OWS could not find. (The OWS may not
find Global files if a directory or file name has been changed.)
• errors that occur during the save process. Errors may or may not
cause the save process to fail.
DIRFILES.LOG
The DIRFILES.LOG file, located in the \SAVEREST directory, lists
all of the directories to be saved during the save process. The PC uses
this file for internal processing and deletes it automatically when the
save is complete; however, if the save fails, DIRFILES is not deleted.
The next save attempt overwrites this file. However, this file consumes
a small amount of memory; to conserve disk space, delete the file
manually.
RESTDB.LOG
The RESTDB.LOG file contains a list of each of the global and
network database files restored during the restore process. This file
also contains error messages for each error that occurred during the
process. Errors may or may not cause the restore process to fail.
MAKEDIR.LOG
The MAKEDIR.LOG lists all directories created during the restore
process. These directories were empty during the save process, and
would have been created by recompiling the DDL files in past releases
of OWS software.
Detailed Procedures
Saving the Database
To save the database using Windows 2000 Professional or
Windows XP Professional OS, use the following instructions:
1. On the Exit menu, click Backup Utility > Backup. A message
appears stating that the PC is about to exit the Metasys system.
The Windows Backup/Restore procedure begins.
2. On the Window drop down menu, click Drives.
3. Select the files to back up by clicking inside the check box next to
each file. (Selecting a directory selects all of the files within the
directory.) Select all files in a directory by placing a check box
next to the directory name. As a minimum, include the following
files and directories:
\CUSTOMAC
\FMS\BIN\GPL\JCIMACS
\FMS\GRFXLIB
\FMS\ERRORLOG
\FMS\SAVE
\FMS\STATIC\*SBQ
\FMS\DATA\N1NET.DBF
\FMS\DATA\PCDEVICE.DBF
\FMS\DATA\Win.ini
\FMS\DATA\NETNAME.NDX
\FMS\DATA\PCCONFIG.DBF
\FMS\DATA\PCPORT.NDX
\FMS\DATA\DDL\*.DDL
\FMS\DATA\MODELS
\FMS\DATA\HVACPRO
\FMS\DATA\SYSTEM91
\FMS\DATA\“NETWORK NAME”
\FMS\DATA\“NETWORK NAME”.DOB
Replace the NETWORK NAME with the actual name of the
network being backed up.
4. Click the Backup button when finished. The Backup Information
dialog box appears.
31-6 Operator Workstation User’s Manual
Restoring a Database
Use the following procedure to restore the database with
Windows 2000 Professional OS or Windows XP Professional OS:
Note: A database saved using the DOS program SAVEDB.BAT
using Windows 3.1, Windows 95, or Windows 98 OS can be
restored on a Windows 2000 Professional OS or Windows XP
Professional OS machine using the DOS program RESTDB.bat
(DOS program).
1. On the Exit menu, click Backup Utility > Backup. A message
appears indicating that the PC is about to exit the Metasys system.
The Windows Backup/Restore procedure begins.
2. The tape drive activates. Double-click the directory in the right
window. A detail tree of the files that reside on tape appears.
3. Select files to restore by clicking the check box next to the file
name.
4. When the process is complete, check the \winnt\backup.log
to verify that the process restored all of the files and that no error
messages are present.
Chapter 32
Introduction
Demand Limiting/Load Rolling combines two related features, both of
which lower facility energy costs. Demand Limiting lowers the peak
demand of energy usage by temporarily turning off designated
equipment before the usage reaches the defined target limit. Load
Rolling lowers energy usage by constantly turning off enough
equipment to meet the target (for Load Rolling, the target is the
amount of energy to be off at any given time).
This chapter describes how to:
• display the Load Group Focus window
• define a load group object
• define a load
• modify a load
• delete a load
• display the Utility Profile
Key Concepts
Demand Limiting/Load Rolling Setup
There are two tasks to perform when setting up the Demand
Limiting/Load Rolling feature.
The first task is defining the Load Group object for Demand Limiting,
Load Rolling, or both. For this process, specify the values that the
system will use to determine when loads are turned off (for example,
the limit that energy consumption is not to exceed). Turning off loads
is also called shedding loads.
The second task in the process of setting up DL/LR is to define the
loads that make up the Load Group. Use the Load Definition window
to define these loads as BO, BD, Multistate Object (MSO), or
Multistate Data (MSD) objects.
Utility Profile
The Utility Profile screen displays detailed information about the
energy consumption of Load Group objects. Information in the utility
profile can not be changed. Figure 32-2 shows an example of a utility
profile.
Table 32-1 details the information that the Utility Profile fields
display.
Operation Commands
• Demand Limiting-Monitor Only—Disables the shedding of
loads by the Demand Limiting feature. Demand Limiting continues
to monitor energy consumption and make calculations. Because of
this, the object is ready to shed loads when enabled again. This
command complements the Demand Limiting-Shedding command.
• Demand Limiting – Shedding—Enables the shedding of loads by
the Demand Limiting feature. This command complements the
Demand Limiting-Monitor Only command.
• Load Rolling-Monitor Only—Disables the shedding of loads by
Load Rolling. This command complements the Load
Rolling-Shedding command.
Operator Workstation User’s Manual 32-5
Communication Commands
The Lock/Unlock Triggers and Lock/Unlock Reports commands
operate for the Load Group object as they do for other objects. The
Enable and Disable commands differ for the Load Group object as
follows:
• Enable—Enables the DL/LR feature. This command complements
the Disable command. DL/LR begins monitoring and calculating
data.
• Disable—Disables the DL/LR feature. When the feature is
disabled, it does not monitor data or make DL/LR calculations.
Therefore, when the feature is enabled after a Disable command, it
must start its calculations from the beginning.
Online Help
Use the online help (provided for all Definition and Focus windows) to
explain any unfamiliar fields during the definition process. Online help
describes the fields and gives the formats and valid ranges to use when
entering values.
To access online help, use the Attribute Help option on the Help menu.
For a complete description of online help, refer to the Using
Online Help chapter (LIT-120175).
Operator Workstation User’s Manual 32-7
Detailed Procedures
Displaying the Load Group Focus Window
To display the Load Group Focus window:
1. Double-click the system that contains the Load Group Object. The
System summary appears.
2. Double-click the Load Group object. The Load Group Focus
window appears (Figure 32-1).
Defining a Load
To define loads:
1. Double-click the system that contains the most recently defined
Load Group object. The system summary appears.
2. Double-click the Load Group object. The Load Group Focus
window appears (Figure 32-1).
3. Double-click the Associated Loads button in the upper right
corner of the Load Group Focus window. The Associated Loads
dialog box appears (Figure 32-5). This box lists the loads in the
Load Group.
Shortcut
To add a load that is similar to one already defined:
1. Select a load that is similar to the new load in the Associated
Loads dialog box.
2. Click Add. The Load Definition window appears (Figure 32-6),
displaying the settings of the selected load.
3. Specify the system\object name of the new load, change the other
settings as needed, and save the load.
Modifying a Load
To modify a load:
1. Display the Load Group Focus window by double-clicking the
Load Group object in any summary displaying the object.
2. Click the Associated Loads option button in the upper right corner
of the window. The Associated Loads dialog box appears
(Figure 32-5).
3. Select the priority level. The list box displays all loads at the
selected priority level. If necessary, use the scroll bar to scroll
through the list of loads.
4. Double-click the load. The Load Focus window for the selected
load appears (Figure 32-7).
Operator Workstation User’s Manual 32-13
Deleting a Load
To delete a load:
1. Display the Load Group Focus window by double-clicking the
Load Group object in any summary displaying the object.
2. Click the Associated Loads option button in the upper right corner
of the window. The Associated Loads dialog box appears
(Figure 32-5).
3. Select the priority level. The list box displays all loads at the
selected priority level.
4. Click the load.
5. Click the Delete option button. The Delete dialog box appears,
asking for confirmation.
32-14 Operator Workstation User’s Manual
6. Click OK. The selected load is deleted from the Load Group.
To save the changes to the archived database, perform an NCM
upload (described in the Uploading and Downloading Databases
chapter [LIT-120155]).
Troubleshooting
Correcting Invalid Entries
If a field contains invalid information, it appears red when cursor
moves to a new field. If this happens, select and correct the
information. If you attempt to save the window with invalid
information, a message appears indicating the error. Acknowledge the
message by clicking OK, correct the information, and attempt the save
again.
An entry might be invalid because it is not in the correct format or
because it exceeds the valid range.
Operator Workstation User’s Manual 33-1
Chapter 33
Using Diagnostics
Introduction
Use Metasys Diagnostics to troubleshoot the hardware components of
the BAS and to check how efficiently the devices are communicating.
Perform diagnostics on the network, on an N1 device (OWS or NCM),
or on an N2, L2, S2, N2E, or LONWORKS compatible device (that is,
DCM, XRL, DSC8500, or FPU).
Activate Diagnostics from any OWS (PC or portable) remotely or
directly connected to an online Network Control Module (NCM).
This chapter describes how to:
• print network diagnostics
• display PC diagnostics
• display NC diagnostics
• perform N2/L2/S2 diagnostics
• update statistics
• clear statistics
• print diagnostics
Key Concepts
Network Diagnostics
The Network Diagnostics option prints detailed information about the
hardware configuration and addressing of the entire network. The PC
can only print Network Diagnostic information; it cannot display this
information on the screen.
The printout of Network Diagnostics includes listings of all connected
OWSs, NCMs, N2/L2/S2/N2E/LONWORKS compatible devices, and all
software objects connected to each N2/L2/S2/N2E/LONWORKS
compatible device.
PC Diagnostics
The PC Diagnostics option displays N1 statistics collected at the
selected OWS (not all N1 traffic). This information appears in the
Diagnostics-N1 Statistics window. Figure 33-1 shows an example of
this window.
Table 33-1 details the type of information found in each of the fields
of the Diagnostics-N1 Statistics window.
NC Diagnostics
There are eight NC Diagnostics options, all described below.
Reset NC
If the NCM has already been downloaded, this option warm starts the
NCM. If the NCM has not been downloaded, this option cold starts the
NCM. The cold start induces a download of BAS code and databases.
BAS code consists of Metasys executable files. The databases include
system\object records, control processes, and feature information. Both
warm and cold resets activate a series of internal self-tests, and the
NCM goes offline until the self-tests are complete.
Reload NC
Cold starts the NCM. The cold start induces a download of BAS code
and databases.
NOVRAM View
When you choose this option, a dialog box appears indicating that the
function has been moved to WNCSETUP.EXE. Use WNCSETUP to
see or modify NOVRAM information for the selected NCM. See the
NCSETUP for Windows Technical Bulletin (LIT-6360251d) for more
information.
N1 Statistics
The N1 Statistics window that appears for NC diagnostics is identical
the PC Diagnostics window (Figure 33-1). See Table 33-1 for a
description of the fields in this window.
33-4 Operator Workstation User’s Manual
N2/L2/S2 Statistics
If more than one trunk is defined, NC/L2/S2 Statistics displays a
second dialog box for selecting N2/L2/S2 Trunk 1, Trunk 2, or both.
Select a trunk and click OK. The N2 Statistics window appears
(Figure 33-2).
LONWORKS Statistics
Figure 33-3 shows the Diagnostics-LON Statistics window, which
displays diagnostics information for LONWORKS devices connected to
the selected NCM.
Task/Error Log
The Diagnostics-NC Task Error Log window (Figure 33-4) contains
the contents of the NCM’s detected runtime errors.
Detailed Procedures
Printing Network Diagnostics
To print network diagnostics:
1. Select the name of the network on the map.
2. On the Action menu, click Diagnostic. The Network Diagnostics
dialog box appears (Figure 33-6).
Displaying PC Diagnostics
To display PC diagnostics:
1. From the Network Map, select an OWS to use to perform
diagnostics.
2. On the Action menu, select Diagnostic. The following PC
Diagnostics dialog box appears (Figure 33-7).
Displaying NC Diagnostics
To display NC diagnostics:
1. Double-click on the Devices PC group to display the Devices
Focus window. The Devices Focus window appears.
2. Select an NCM. (The NCM must be online.)
3. On the Action menu, click Diagnostics. The NC Diagnostics
dialog box appears (Figure 33-8).
Updating Statistics
To update the statistics displayed on the current screen, click Reread
Statistics on the Action menu. (The NC Task/Error Log Action menu
displays Reread Log.)
Clearing Statistics
To clear the statistics to 0, click Clear Statistics on the Action menu.
The Diagnostics feature continues to collect data starting from 0. (The
NC Task/Error Log Action menu displays Clear Log.)
Printing Diagnostics
To print diagnostics information:
1. Display the diagnostics on the screen as described in this chapter.
2. On the Item menu, click Print to send the current screen to the
active printer. (Specify the active printer with the Change Printer
option on the Item menu.)
Operator Workstation User’s Manual 34-1
Chapter 34
Using Processes
Introduction
Processes are programs that determine how equipment operates based
on actual field conditions and internal logic. For example, a process
can specify that when the outside temperature reaches freezing, an
additional heating system is activated.
This chapter describes how to:
• display the process window
• display a process focus window
• add a new process
• import an existing process
• delete a process
• edit a process
• print source and list files
• disable a process
• enable a process
• compile a process
• download a process
• upload a process
• trigger a process
Key Concepts
Process Programming Languages
There are two process programming languages: Graphic Programming
Language (GPL) and JC-BASIC. GPL draws BAS control strategies
using a mouse, symbols, and icons. JC-BASIC, a modification of the
BASIC programming language, writes BAS processes as textual lines
of code. After using GPL or JC-BASIC to create processes, download
the processes into the NCM using the OWS.
Process Window
Use the Process window to perform process functions, such as adding
and deleting processes or downloading them into the NCM.
The Process window is accessible from any window that displays a
system containing processes (for example, System summary, Critical
summary).
Figure 34-1 shows an example of a Process window.
the NCM. An upload copies the process in the NCM to the process
(.OBJ file) on disk.
Operator Workstation User’s Manual 34-5
Triggering Processes
Use the Process Field window to trigger (execute) a process. A process
must be in one of the following states to be triggered: Ready, Waiting,
Executing, or Time-sliced.
For information on scheduling a specific time for the process to be
triggered, see the Scheduling Commands and Summaries chapter
(LIT-120173).
34-8 Operator Workstation User’s Manual
Detailed Procedures
Displaying the Process Window
To display the Process window:
1. Click a system.
2. On the GoTo menu, click Process. The Process window appears,
displaying the processes in the selected system (Figure 34-1).
Deleting Processes
To delete processes:
1. Display the Process Disk or Process Field window.
Note: To delete processes from the Process Field window, the
processes must be disabled or Error Locked.
2. Select the processes.
3. Click the Item and select Delete. The Delete dialog box appears,
asking for confirmation.
4. Click OK.
Editing a Process
Note: Only one file can be edited at a time.
To edit a process:
1. Display the Process Disk window (Figure 34-2).
2. Select the process.
3. On the Action menu, click Edit. Microsoft Wordpad (or another
text editor) opens.
4. Edit the file according to JC-BASIC guidelines. For more
information, refer to the JC-BASIC Programmer’s Manual.
5. Save the edited file and exit.
34-10 Operator Workstation User’s Manual
Disabling a Process
To disable a process:
1. Display the Process Disk or Process Field window.
2. Select the .OBJ files or processes.
3. On the Action menu, click Disable. The Disable dialog box
appears .
4. Click OK. An asterisk appears to the left of the disabled
processes.
Enabling a Process
To enable a process:
1. Display the Process Disk or Process Field window.
2. Select the disabled .OBJ files or processes.
3. On the Action menu, click Enable. The Enable dialog box
appears.
4. Click OK.
Compiling a Process
Note: Do not move the mouse or windows on the PC screen more
than necessary after this process begins. Excess mouse or
window movement during a compile process could cause the
process to terminate.
To compile a process:
1. Display the Process Disk window (Figure 34-2).
2. Select the relevant .BAS file.
3. On the Action menu, click Compile. The Compile dialog box
appears (Figure 34-6).
Operator Workstation User’s Manual 34-11
Downloading a Process
To download a process:
1. Display the Process Disk window (Figure 34-2).
2. Select the relevant .OBJ file or files.
Note: After compiling a GPL source file, always download all
processes in the file.
3. On the Action menu, click Download. The Download dialog box
appears.
4. Click OK. Once the download begins, it cannot be cancelled. No
other actions can be performed on the NCM during a download.
If the process download fails, perform an NCM data only
download to insure that the NCM contains the accurate database.
For information on NCM downloads, refer to the Uploading and
Downloading Databases chapter (LIT-120155).
Uploading a Process
To upload a process:
1. Display the Process Field window (Figure 34-3).
2. Select the processes.
3. On the Action menu, click Upload. The Upload dialog box
appears.
4. Click OK. Once started, the upload cannot be canceled. The
workstation cannot perform other actions during an upload.
Triggering a Process
To trigger a process:
1. Display the Process Field window (Figure 34-3).
2. Select the processes.
3. On the Action menu, click Trigger. The Trigger dialog box
appears.
4. Click OK.
Operator Workstation User’s Manual 35-1
Chapter 35
Editing Graphics
Introduction
The OWS can provide information on the entire facility in both textual
and graphical formats. A System summary displays an air handling
unit as a textual list of objects. A system drawing displays the same
system with graphical symbols representing the objects.
This section discusses system drawings and provides some examples
of drawings created with Micrografx Designer™ software. The chapter
assumes the reader knows how to use Designer or DRAW software to
create system drawings. While drawing procedures in Micrografx
Designer and Micrografx® DRAW are similar, refer to the appropriate
manual for detailed instructions.
Designer and DRAW are no longer supported at Metasys
Release 11.00. Thus, you cannot create new graphics for the OWS
with these programs. This chapter only describes how to modify
drawings that already exist.
This chapter describes how to:
• access Designer/DRAW
• unbind objects and symbols
• bind symbols and objects
• set colors for a symbol
• modify a bound symbol
• delete a bound symbol
• modify slide show settings
Key Concepts
Graphic Binding
All graphics symbols are bound, or associated, to certain objects in the
system. The graphic symbol indicates dynamic data about its
associated object.
Each symbol can also display certain information, such as the object’s
Focus window, when the user double-clicks the symbol.
Designer can modify a bound symbol without destroying its binding if
it is given the same Symbol ID. If the symbol is a combination of
drawing elements, use Designer to break it apart, modify it, and
recombine it. You can also use this process to change the location of
Metasys text associated with an object.
Change the binding associations of symbols and objects in the
displayed graphics by unbinding the symbol from an object and
rebinding it to a new one. See Detailed Procedures for further
instructions.
Alarm Flashing
An object symbol can be made to flash when it goes into certain alarm
states. The color of the object alternates between its static and alarm
state colors. This feature is turned on by setting three parameters in the
METASYS.INI file. Refer to the Initialization Parameters Technical
Bulletin (LIT-636345) for details.
Note: If the flashing interval is set too low and there are many
flashing objects within the drawing, the operation of the
system may slow down. A flashing interval of less than
0.5 second is not recommended.
Setting Colors
The OWS indicates changes-of-state in an object by changing the color
of the object and its associated text within the dynamic drawing.
The OWS provides default colors for each state that an object can
experience. To change the color settings, click Set Colors/Test on the
Binding Editor Action menu.
Default colors are described in the Graphics Technical Bulletin
(LIT-636108).
Operator Workstation User’s Manual 35-3
Slide Show
IMPORTANT: The Metasys PMI slide show does not work if
M5 Workstation is loaded. Use the M5 Workstation
slide show instead. See Appendix D: Screen Manager
Slide Show of the M5 Workstation User’s Guide,
LIT-1153896.
The slide show is a series of images that appears on the OWS screen
when no one is logged on. The images can include a company logo,
floor plans, or the dynamic drawings that represent the PC groups and
systems within the facility. Each image remains on the screen for a
defined time period before the slide show cycles to the next image.
FIG102
Detailed Procedures
Accessing Designer or DRAW
Program Manager Method
To access Designer or DRAW:
1. On the Exit menu, click Program Manager. A dialog box appears
asking if the BAS should continue to run.
2. Click Yes or No.
3. Double-click the Designer/Draw icon.
4. When finished, exit and double-click the Metasys icon to return to
the Metasys program.
Designer Method
Note: To access Designer using the Exit Menu described below, set
Designer = Yes in the Metasys section of the METASYS.INI
file. (This is the default, if Designer was installed before
Metasys.)
To access Designer:
1. On the Exit menu, click Designer. A dialog box appears asking if
the BAS should continue to run.
2. Click Yes. The Network Map becomes an icon in the lower portion
of the screen and Designer opens.
3. When finished, close Designer. Click on the Network Map icon.
The Network Map appears.
HDQTRS
WEST
AHU2
7. Type the object name of the object in the Item text box (the
Group\System name is already entered).
The Available Selections list box lists the names of all items
available for the PC group/system in the next sublevel. For
example, if there is no valid item specified in the Item text box or
this box is empty, a list of all PC groups and systems defined
under the network appears. Click on an item. The selected item is
added to the text in the Item text box, and the next sublevel of
names appears. If the selected name specifies a system, the list
contains names of all of the objects in the system. After selecting
an object, the Available Item list box disappears. To leave the
Available Item list box after selecting a group or system, either
click another area of the dialog box, click OK or Cancel, or press
Tab.
When binding an attribute, type the name of the attribute after the
object name, separating the two with a colon ( : ). For example,
the Object AHU2 and the attribute Display would appear in the
Item Name field like this:
West\2ndFloor\AHU2:DISPLAY.
To see a list of available types of attributes, type a question mark
(?) after the colon. The Attribute Class box appears in the Bind
dialog box. Click on a class to select it, and the Available
Selections list box lists the available attributes. Click the desired
attribute. It appears in the Item field.
Note: Fire Object input and output devices can also be
specified; however, the devices do not appear in the
Available Items box. The names of these devices are
available from the Input and Output Device summaries.
When indicating a device, precede it with a pound
sign (#). For example, an entry might look like this:
GRP1\FIRESYS\ZONE:#7BF1.
8. Specify the text to display in place of the dummy string for the
object or attribute by clicking any, all, or none of the check boxes.
For example, click the Description check box to display the
object’s 24-character expanded ID next to the symbol of the
object. Click Value/Units to display the object’s current value. (If
analog, the engineering units are also displayed.) The Text options
vary depending on the type of object.
Operator Workstation User’s Manual 35-9
Chapter 36
Defining Queries
Introduction
The Query is a Superbase 4 tool for collecting and analyzing database
information concerning specific parts of the BAS. Use the query to
analyze data from three different databases: the Access Card summary,
the Operator Transaction summary, and the Card Reader summary.
For example, define a query from the Card Reader summary to find
out how often a particular door is used during certain times of the day.
Or define a query from the Operator Transaction summary to find out
how many times a particular operator has discarded Follow-Up reports
over a specific period of time.
This chapter describes how to:
• define a query
• modify a query
• delete a query
• display a query
• print a query
• save a query to a file
• exit a query
Key Concepts
Superbase 4 Software
Superbase 4 program is a database management software package that
maintains certain OWS databases. The Superbase 4 package included
in Metasys software is a runtime version and does not have full
Superbase 4 software capabilities.
The runtime version of Superbase 4 software that comes with Metasys
Release 4.0 or higher can define the title and output sections of a
query. To define the destination section, purchase the full Superbase 4
package.
Query Definition
To define a query that draws data from the Operator Transaction
summary, display the summary. Superbase 4 software loads when the
summary appears. This allows access to the OPTRANS file that
contains all of the Operator Transaction data. To find out how to
display the Operator Transaction summary, refer to the Displaying
Archived Summaries chapter (LIT-120169).
To define a query that draws data from the Card Reader summary,
start Superbase 4 software by displaying the summary. This allows
access to the CARDRDR file which contains all of the Card Reader
transaction data. To find out how to display the Card Reader summary,
refer to the Displaying Archive Summaries chapter (LIT-120169).
To define a query that draws data from the Access Card summary,
start Superbase 4 software by clicking the User Data button in the
Modify Card dialog box for an access card. This allows access to the
PERSON file, which contains all of the Access Card data. To find out
how to display the Modify Card dialog box, refer to Defining Access
Cards (LIT-120153) in the Advanced User’s Guide of this manual.
Figure 36-1 shows an example of a query defined using data from the
Access Cards summary.
Operator’s Workstation User’s Manual 36-3
Displaying a Query
Use the Query menu (Figure 36-2) to display a query. The Query
menu is accessible from three different Superbase 4 screens: the Main
menu, the Operator Transaction menu, or the Card Reader menu.
36-4 Operator Workstation User’s Manual
Query Title
The title section of a query can display the title, date, and page number
of the query on each page. The upper portion of the Query Definition
dialog box (see Figure 36-4) defines this section. Defining the title
section is optional. If no title, date, or page numbers are defined, the
query data appears on the first line of the printed page or PC screen.
If the query has a title, it appears centered on each page. The date
appears in the upper left corner of each page, and the page number
appears in the upper right.
Operator’s Workstation User’s Manual 36-5
Query Output
The query output section of the Query Definition dialog box defines
the type of information that the query collects, as well as how the
information is ordered. The output section specifies data collection in
four categories: Fields, Report, Filter, and Order.
To define a query, the Fields output must be specified; Report, Filter,
and Order output are optional.
Fields Output
Clicking the Fields button displays the Fields Output dialog box
(Figure 36-6). This dialog box specifies the fields from which the
query draws data, as well as the page format. Individual fields can be
up to 70 columns (character spaces) long across the page.
Before defining the Fields Output, determine how the query is going to
be organized, including:
• which fields from which the query draws
• where each column should appear on the query, in character spaces
(for example, a position of 20 means the column begins at
20 character spaces from the left side of the page)
• the limit to the number of characters that can appear in each field
• whether any of the fields should have a heading different from the
field title that appears in the Fields dialog box (Figure 36-6)
• whether the query appears in the standard table format (as in
Figure 36-1) or use the NEWLINE function (Figure 36-3). The
NEWLINE format is useful for queries in which the columns
would exceed the 70-character space maximum across the page.
36-6 Operator Workstation User’s Manual
Table 36-1 lists the fields available for a query of Access Card User
Data.
Table 36-3lists the fields available for a query of data from the Card
Reader summary:
Table 36-4 lists the key words and their functions. Place these
keywords before the text they are formatting.
Report Output
Click the Report button to analyze data collected by the query. For
example, a report can count the total number of records in a query
Filter Output
Click the Filter button to limit the types of information the query
collects. For example, the query could collect data from records where
the Department field is defined as Research. The Filter works the same
way as the filter option in the browsing control panel.
Order Output
Click the Order button to select the order in which the query data
appears. The default order for the data is the order in which it is found
on the disk.
Operator’s Workstation User’s Manual 36-13
Detailed Procedures
Defining a Query
To define a query:
1. Start Superbase 4 software by displaying either the Operator
Transaction summary or the Card Reader summary, or by clicking
the User Data button in the Modify Card dialog box.
Note: Make sure to start Superbase 4 software from the correct
file in order to gain access to the appropriate database.
2. If you started Superbase 4 software from the access card Modify
Card dialog box, click Exit to return to the Main menu.
If you started Superbase 4 software by displaying the Operator
Transaction or Card Reader summary, click Cancel to exit to the
Operator Transaction or Card Reader menu.
3. Click the Query > Add. The Query Definition dialog box appears
(Figure 36-4).
Title
Fields
Report
Output
Filter
Order
QUERYDEF
Table 36-5 describes the Fields dialog box selection buttons and their
function.
Heading
ON Use this button to extract data from more than one database for a query. This query is
called a Multi-File query and is not recommended for querying Metasys BAS data, since
File current data can be accessed from only one database at a time.
+-*/() Use the mathematics keys on the right side of the dialog box to perform mathematic
Derived Column computations on two or more numeric fields. For example, use the addition button (+) to
Expressions add the values of two fields to form another entry in a query.
Click this button to start a column heading on a new line. If a new line is not specified,
LINE the query outputs the data in a tabular format. To specify a new line, click the Line button
Line and select the field that should begin on a new line. Click the Line button once for each
blank line between field headings.
2. Click the @ Position button and type the column number where the
first column in the query should begin in the Value text box. Click
Value or press Enter.
One column equals one character space wide, beginning at the left
margin. For example, @20 means that the column will be
positioned 20 character spaces from the left of the page. The first
column is usually positioned @1.
3. To limit the width of the column, click & Limit. Type the
maximum number of characters that the column should contain in
the Value text box. Click Value or press Enter.
Notes: This step is optional. However, make sure that the
query’s columns do not overlap on each other.
To specify the number of digits that can appear before
and after a decimal point, type the number of digits to
appear before the decimal, the decimal point, and the
number of digits to appear after the decimal. For
example, if no more than two digits should appear both
before and after the decimal point, type 2.2 in the Value
text box.
Operator’s Workstation User’s Manual 36-17
4. Click on a field name in the list box. The values selected in the
previous two steps now apply to this field.
To create a query field that is a mathematical computation of
two or more numeric fields, use the Derived Column Expression
buttons, and enclose the equation in parentheses.
5. To give the field a heading in the query that is different from its
field name, click AS Heading and type the new heading into the
value text box. Click Value or press Enter.
6. Repeat Steps 2 through 5 for each field that appears in the query.
When finished, click OK. The query definition dialog box (Figure
36-4) reappears with the field output definition displayed in the
Fields text box.
7. Click another option and continue defining the query, or click OK
to save the query.
To define queries using the NEWLINE format (Figure 36-3):
1. Click the Fields button in the Query Definition dialog box. The
Query Fields dialog box appears (Figure 36-6).
2. Click the Line button. NEWLINE appears in the Field text box.
3. Click the Field name that should appear first in the query. The
name appears to the right of NEWLINE in the Field text box.
4. To give the field a heading in the query that is different from its
field name, click AS Heading and type the new heading into the
Value text box. Click Value or press Enter.
5. Repeat steps 2 through 4 for all remaining fields that appears in
the query.
6. When finished, click OK. The query definition dialog box
(Figure 36-4) appears with the field output definition displayed in
the Fields text box.
7. Click another option and continue defining the query, or click OK
to save the query.
36-18 Operator Workstation User’s Manual
Report Output
To define a report function:
1. Click the Report button on the Query Definition dialog box. The
Report dialog box appears (Figure 36-7).
Group Click this button to display information drawn from a subgroup of records within a file.
The way the query is ordered (using the Order button) determines which subgroups are
available for use in the Report section. Define the order before using the Group function
in the Report dialog box. For example, if the query is ordered by Department, count the
number of records in each department by clicking Group > Count > Department.
Summarize Click this button before clicking OK in the Report dialog box to display a summary of the
query data specified in the Reports line without displaying the fields specified in the
Fields line. This is useful for displaying file Report calculations without going through the
individual records.
Filter Output
To filter a query:
1. Click the Filter button in the Query Definition dialog box. The
Filter dialog box appears (Figure 36-8).
4. Click OK. The Query Definition dialog box (Figure 36-4) appears
with the Filter selections displayed in the text box located to the
right of the Filter button.
5. Click another option and continue defining the query, or click OK
to save the query.
36-22 Operator Workstation User’s Manual
Modifying a Query
To modify a query:
1. Click the Query button on either the Main menu, Operator
Transaction menu, or Card Reader menu. The Query menu
appears (Figure 36-2).
2. Click Modify. The Query Selection dialog box appears
(Figure 36-10).
Deleting a Query
To delete a query:
1. Click the Query button on either the Main menu, Operator
Transaction menu, or Card Reader menu. The Query menu
appears (Figure 36-2).
2. Click Delete. The Query Selection dialog box appears
(Figure 36-10).
3. Select the query from the list box. The query name appears in the
text box.
4. Click Delete. The query is deleted, and the OWS returns to the
Query menu.
Displaying a Query
To display a query:
1. Click the Query button on either the Main menu, Operator
Transaction menu, or Card Reader menu. The Query menu
appears (Figure 36-2).
To display the Operator Transaction summary or Card Reader
Transaction menu, click Cancel in the Operator Transaction or
Card Reader summary. The summary closes and its Transaction
Menu appears.
To display the Card Reader Main menu, display the Access Cards
summary, select a card, and click Modify Card Data from the
Action menu to display the Modify Card dialog box. Start
Superbase 4 software by clicking User Data, and click Exit in the
Employee menu to go to the Card Reader Main menu.
2. Click Display in the current menu.
3. Select the query from the list box. The query name appears in the
text box.
4. Click OK. The query appears. (See Figure 36-1 for an example.)
5. Click Clear to clear the selection or click Cancel to cancel the
query request.
Press the space bar to page down in a query. To return to the
beginning of a query, exit the query and display it again. To exit
the query, page down to the end of the query and press the space
bar again.
Operator’s Workstation User’s Manual 36-25
Printing a Query
To print a query:
1. On the Query menu, click Print. The Query Selection dialog box
appears (Figure 36-10).
2. Select the query from the list box. The query name appears in the
text box.
3. Click OK. A message box appears indicating that the query is
being printed.
Exiting a Query
To exit a query:
1. Page down to the end of the query by pressing the space bar. Press
the space bar again. The query closes, and the Query menu
appears.
Note: If the query is only one page long, press the space bar
once to return to the Query menu.
2. Click the Exit button, or click Exit on the Query Command menu.
The Query menu closes and the Main menu appears.
Note: If the query was accessed from the Operator Transaction
or Card Reader summary, the OWS returns to the
summary rather than the Main menu.
Operator Workstation User’s Manual 37-1
Chapter 37
Introduction
The Custom Applications feature allows the user to access other
software applications, such as Microsoft Excel, from the OWS without
closing Metasys software.
This chapter describes how to:
• set up access to the Custom Applications menu
• add an application to the Custom Applications menu
• modify the Custom Applications menu
• delete an application from the Custom Applications menu
• start a custom application
Key Concepts
Adding Custom Applications
In order to run via the Custom Applications option, the application
must be a Windows application or a Windows PIF file. The hard drive
of the OWS must contain the application, and the application must be
added to the Custom Applications menu (see Adding an Application to
the Custom Applications Menu later in this chapter).
Up to 19 applications can be added to the Custom Applications menu.
Before adding an item, determine:
• the name that should appear on the menu
• the password level for exiting to the software
• the DOS command line that prompts the program to run
CUSTMENU.INI
To add an application to the Custom Applications menu, you must edit
the CUSTMENU.INI file. Before editing this file, define the path for
accessing the CUSTMENU.INI file so that the file is accessible from
the Accessory menu on the Network Map. See Setting Up Access to
the Custom Menu under Detailed Procedures.
Figure 37-1 shows the CUSTMENU.INI files displayed in Notepad.
Detailed Procedures
Setting Up Access to the Custom Applications Menu
To set up access to the Custom Applications menu:
1. Run Notepad or any other text editor.
2. Open the CUSTMENU.INI file. This file is located in the
Windows directory by default.
3. Change Line 1 so it contains the complete path name under which
the notepad.exe file is stored (see Figure 37-2).
Was
1=2, &Add a Custom Menu Item...,notepad custmenu.ini
this
Change
1=2, &Add a Custom Menu Item...,notepad c:\windows\custmenu.ini
to this
direct
4. On the File menu, click Save. This saves the additions to the
CUSTMENU.INI file. Close Notepad.
5. Log off of the OWS and log on again to see the changes in the
Custom Applications menu.
Chapter 38
Introduction
The OWS uses summaries to monitor specific aspects of a facility’s
operation. For further monitoring options, create a custom summary.
For example, create a summary to display all of the fans in the facility
that have a current status of On, or to display all of the temperature
sensors that have a value of greater than or equal to 72.0 degrees.
This chapter describes how to:
• define a custom summary
• copy a custom summary
• display a custom summary
• refresh a custom summary
• print a custom summary
• modify a custom summary
• delete a custom summary
Key Concepts
Custom Summaries
Custom summaries can be either permanent or temporary. Permanent
summaries are saved and accessed through the Summary option on the
Network Map. Temporary summaries are one-time summaries that are
not saved for future use. In order to designate a summary as
temporary, leave the Summary Name field blank.
To make the definition process quicker and easier, find an existing
custom summary that is similar to the new summary. Copy the existing
custom summary and edit the copy.
Here are a few general rules that apply to custom summaries:
• Always give a custom summary a unique name.
• To designate as summary as a temporary summary, leave the
Summary Name field blank in the Custom Summary-New dialog
box (Figure 38-3). The OWS does not save temporary summaries
for future use.
• To have a custom summary appear on multiple workstations,
define the summary at each workstation separately. Custom
summaries only appear on the workstation at which they where
created.
• To command an object from the custom summary, select the object
and click Operation or Communication on the Action menu.
• Access an object’s Focus window from the custom summary by
double-clicking on the object name in the summary.
• Program custom summaries to print on a schedule (if desired) in
the same manner as you would other online summaries. (For more
information, refer to Scheduling Commands and Summaries
chapter [LIT-120173].)
• Make sure to enter the correct criteria type (that is, Value, Status,
or Unit) for the object type, or no objects appear in the summary.
Figure 38-1 shows an example of a custom summary. The summary’s
PC group is stated at the top of the window. In this example, the
summary is from the Union Fans PC group.
The Date and Time stamps indicate the time that the summary was
opened or last updated (refreshed).
Operator Workstation User’s Manual 38-3
Detailed Procedures
Defining a Custom Summary
To define a custom summary:
1. Select the network, PC groups, or systems for the summary to
describe.
2. Click the Summary menu. The Network Map-Summary dialog
box appears (Figure 38-2).