Professional Documents
Culture Documents
Baseline
Telvent
Telvent
Phone:
Fax:
E-mail:
The information contained in this document is confidential and proprietary to Telvent Canada Ltd. It is not to be copied or disclosed for any purpose except as specifically
authorized in writing by Telvent. Although the information contained herein was correct and verified at the time of publication, it is subject to change without notice.
Trademark Acknowledgments
The following is a list of trademarks which may appear in this document:
RealTime Service, XOS, Historical Service, MICRO/1C, PoleCAT, SAGE 2000, SAGE 2100 are all trademarks of Telvent Canada Ltd
AutoCAD is a registered trademark of Autodesk, Inc.
DATEK is a registered trademark of Datek Industries, Ltd.
Ethernet is a registered trademark of Xerox Corporation
MODBUS is a registered trademark of Gould, Inc.
Excel, MS-DOS, WINDOWS, WINDOWS NT are registered trademarks of Microsoft Corporation.
SYBASE, Data Workbench, SQL Server, are registered trademarks of Sybase, Inc.
SIG
Revision
Date
1.0
2003/03/14
1.1
2003/05/26
XOS 7.3.1 release and SPR fixes. Updated for RealTime Services 7.3.1; this
RealTime Service release did not require a document release.
1.1
2003/10/31
1.1
2004/02/06
Contacts
Lead Writer:
Project Manager:
Project Leader:
Author variable
PM variable
PL variable
Software Version
Baseline
Proprietary and Confidential to Telvent
Baseline
Proprietary and Confidential to Telvent
Table of Contents
Document Revision History
Table of Contents
List of Figures
List of Tables
MODULE 1
Introduction
1.1 Events ............................................................................................................................................. 1-1
1.1.1 Event Logging....................................................................................................................... 1-1
1.2 Alarms ............................................................................................................................................ 1-2
1.2.1 State-Based Alarming........................................................................................................... 1-3
1.2.1.1 Abnormal State Alarming ........................................................................................... 1-3
1.2.1.2 Return-to-Normal Alarming........................................................................................ 1-3
1.2.2 Commanded status Points Alarming.................................................................................... 1-3
1.2.2.1 Uncommanded Change-of-State ................................................................................ 1-4
1.2.2.2 Command Failure Alarming........................................................................................ 1-4
1.2.3 Timeout Alarms .................................................................................................................... 1-4
1.2.3.1 Command Failure Timeout Alarming ......................................................................... 1-5
1.2.3.2 Command Timeout Alarming ..................................................................................... 1-5
1.2.4 Communication Alarms........................................................................................................ 1-5
1.2.5 Communication Timeouts .................................................................................................... 1-5
1.2.5.1 Network Alarms........................................................................................................... 1-6
1.2.6 Non-Covered Alarms ............................................................................................................ 1-6
1.2.7 Logging Commanded COS and Setpoints ........................................................................... 1-7
1.2.8 The almsum Table.................................................................................................................. 1-7
1.3 Configuring Alarm Attributes ...................................................................................................... 1-8
MODULE 2
Alarm Configuration
2.1 The Analog Alarm Configure Dialog Box .................................................................................... 2-1
2.1.1 Instrument Failure Checking................................................................................................ 2-3
2.1.2 Deadbands ............................................................................................................................ 2-3
2.1.3 Alarm Limits .......................................................................................................................... 2-4
2.1.4 Rate-of-Change Checks ........................................................................................................ 2-4
2.1.5 Creep Detection.................................................................................................................... 2-5
2.2 The Rate Alarm Configure Dialog Box......................................................................................... 2-5
2.3 The Status Alarm Configure Dialog Box ...................................................................................... 2-6
2.4 The Status States Dialog Box ........................................................................................................ 2-7
2.5 Inhibiting Alarming and Logging................................................................................................. 2-8
2.5.1 Inhibiting status Alarms and Logs ........................................................................................ 2-8
2.5.2 Inhibiting Other Alarms and Logs ....................................................................................... 2-9
Baseline
Proprietary and Confidential to Telvent
Contents - 2
MODULE 3
Alarm Suppression
3.1 The Alarm Suppression Current Configuration Window ............................................................ 3-1
3.2 The Alarm Suppression Edit Dialog Box....................................................................................... 3-2
3.2.1 Parent Control Alarm Suppression ...................................................................................... 3-4
3.2.2 Parent Alarm Suppression.................................................................................................... 3-5
3.2.2.1 Parent Alarm Timeout................................................................................................. 3-6
3.2.2.2 Parent Return-to-Normal Timeout ............................................................................. 3-7
3.2.3 Transient Alarm Suppression ............................................................................................... 3-8
3.2.4 Alarm Hold-off...................................................................................................................... 3-8
3.2.4.1 Communication Order and Alarm Suppression ......................................................... 3-8
3.3 Interaction Between Suppression Types ...................................................................................... 3-9
3.3.1 Alarm Suppression Overview ............................................................................................. 3-10
3.3.2 Alarm Suppression Behavior .............................................................................................. 3-11
3.4 Alarm Disturbance Mode............................................................................................................ 3-11
3.4.1 The Alarm Disturbance Mode Edit Dialog Box ................................................................. 3-12
MODULE 4
Message Sets and Alarm Presentation
4.1 State Message Sets ........................................................................................................................ 4-1
4.1.1 analog and rate Messages ..................................................................................................... 4-3
4.1.2 Remote Message Set ............................................................................................................ 4-3
4.1.3 Status Message Set ............................................................................................................... 4-3
4.1.4 Configuring Message Sets.................................................................................................... 4-4
4.2 Alarm Presentation Attributes ..................................................................................................... 4-6
4.2.1 The Alarm Attribute Edit Dialog Box .................................................................................. 4-7
Index
Baseline
Proprietary and Confidential to Telvent
List of Figures
Figure 1-1
Figure 2-1
Figure 2-2
Figure 2-3
Figure 2-4
Figure 2-5
Figure 2-6
Figure 2-7
Figure 3-1
Figure 3-2
Figure 3-3
Figure 3-4
Figure 3-5
Figure 3-6
Figure 3-7
Figure 3-8
Figure 3-9
Figure 4-1
Figure 4-2
Figure 4-3
Figure 4-4
Figure 4-5
Baseline
Proprietary and Confidential to Telvent
Figures - 2
Baseline
Proprietary and Confidential to Telvent
List of Tables
Table 1-1
Table 1-2
Table 1-3
Table 2-1
Table 2-2
Table 2-3
Table 2-4
Table 2-5
Table 2-6
Table 3-1
Table 3-2
Table 3-3
Table 4-1
Table 4-2
Table 4-3
Table 4-4
Table 4-5
Baseline
Proprietary and Confidential to Telvent
Tables - 2
Baseline
Proprietary and Confidential to Telvent
MODULE 1
Introduction
InstEvent and its sub-component InstAlarm provide wide-ranging capability for monitoring
the conditions of both the system and the field devices that the system controls.
An event is a record of conditions and activity within the system. The event history provides
a chronological record of changes in the systems condition, as well as actions taken by
system users over time. An alarm is used to announce a significant event that requires an
operators immediate attention. The generation of an alarm also creates a corresponding
event record. However, the generation of an event does not necessarily create a
corresponding alarm.
You can configure conditions for the following:
Generation of alarms
Annunciation and display of alarms
Suppression of alarms by conditions in other related points
Printing of event logs
1.1
Events
The Event Summary window provides a detailed summary of the operational activity on
the SCADA system. Events are recorded both for operator-initiated actions and for
application-generated activities. A record is generated in the event summary when any of
the following occur:
The system detects an alarmable condition
A significant event occurs in an application
The user issues commands to field devices
The user modifies system configuration parameters
The user acknowledges an alarm
1.1.1
Event Logging
When an event is generated, it is recorded in two locations. First, a copy is stored in the
HistoricalDB event table (refer to the Historical Services Configuration and Administration
Reference). You can view the event through the Event Summary window in XOS, as
discussed in the Operation and Control Reference).
Second, the event message is formatted and placed in the queue for the appropriate
spooler. The spooler process records the event on the appropriate log printer or in a log
file. The event message takes the form of a single line of text stating the nature of the
occurrence. For more information, refer to the Historical Services Configuration and
Administration Reference. The group to which the field device is assigned determines
Baseline
Proprietary and Confidential to Telvent
1-2
which spooler is used. The designated system spooler is used for events that do not have
an appropriate group. (Groups are discussed in detail in the RealTime Services
Configuration and Administration Reference).
The event database will quickly fill with data if you do not empty or purge it periodically.
The archive/cleanup process performs the necessary database purging. If you store events in
a log file, you should periodically delete old entries from the log file. Spooling events to a
file is also discussed in the Historical Services Configuration and Administration Reference.
1.2
Alarms
The system generates two kinds of alarms: database alarms and system alarms. A database
alarm is always associated with a specific point in RealTimeDB. A condition that generates a
system alarm may or may not have a specific RealTime record associated with it. Most
alarms are database alarms.
Alarms refer to either a state or a significant event. If the alarm refers to a state, it persists
until the operator clears the condition that caused the alarm. For example, a value that
moved an analog point into a high alarm state would generate a state alarm, which persists
for the entire time that the point remains in that state. Even if the operator acknowledges
the alarm, the point remains in the Alarm Summary until the points value moves out of
that high alarm state.
If the alarm is caused by a transient condition or an event, the alarm is not persistent: it
vanishes from the Alarm Summary after the operator acknowledges it. For example, a rateof-change (ROC) alarm for an analog point is a non-persistent alarm. Such an alarm serves
to notify the operator of a condition that has occurred, even though the point may still be
well within its normal operational range.
InstAlarm automatically suppresses alarms that may occur when a point has recently been
commanded to change state, or when its alarm state has just changed. This component
helps reduce the number of nuisance alarms. For example, starting a pump could create a
pressure wave that causes several sensors downstream from the pump to go into an alarm
state temporarily. You can configure InstAlarm to suppress these alarms in the downstream
devices.
The alarm/event inhibit features available through XOS provide you with the flexibility to
specify whether or not a given point generates event messages or alarms.
The following baseline windows notify the operator of alarms:
The Alarm Summary window
The Newest Priority Alarms window
The Station Alarm Summary window
Alarm summaries for individual tables, such as analog, rate, and status
For more information on these windows, refer to the Operation and Control Reference.
NOTE Within XOS, the system identifies an alarm condition by replacing the color of the
affected device or monitored value with a different solid or flashing color.
Baseline
Proprietary and Confidential to Telvent
1-3
Module 1 - Introduction
1.2.1
State-Based Alarming
State-based alarming is implemented for analog, rate, and status points. Both analog and
status points implement Intelligent Alarm Suppression. State-based alarming helps
prevent nuisance alarms, which occur when the actions of devices affect the readings of
other devices. High/low/creep/rate-of-change alarm checking is implemented for tables
that hold floating point values, such as analog and rate points.
status points can be configured to have normal and abnormal states. analog points have
lowlow/low/high/highhigh abnormal states and a normal state.
1.2.1.1
1.2.1.2
Return-to-Normal Alarming
When an alarm condition clears, the system:
Generates a return-to-normal alarm message
Clears the alarm from the alarm summaries after the operator ackowledges it
Spools the return-to-normal alarm message to the event summary
When the alarm message is generated, it flashes until the user acknowledges it. After the
user acknowledges it, it stops flashing and is deleted from the alarm summary unless the
status point has been configured to sustain off-normal alarms. When the point returns to
normal, the return-to-normal alarm message appears on the users workstation and the
message begins flashing again. When the user acknowledges the alarm, the return-tonormal alarm disappears from the alarm summary.
If the point returns to normal before the user acknowledges the alarm, the return-tonormal alarm message is submitted to the user and remains flashing until it is
acknowledged. Even if the alarm condition clears before the alarm is acknowledged, the
user must still acknowledge the alarm.
NOTE An alarm is not generated if the user commands a status point to an abnormal
state.
1.2.2
Baseline
Proprietary and Confidential to Telvent
1-4
1.2.2.1
Uncommanded Change-of-State
An uncommanded change of state occurs when a status point changes state without being
commanded. The alarm message and event log will display the name of the status point, its
associated remote, and its description field.
When the user acknowledges an uncommanded change-of-state alarm, the alarm normally
disappears immediately from the alarm summary. However, if the status point has been
configured to sustain off-normal alarms, the system consults the abnormal state table. If the
state changed to an abnormal state, the alarm remains in the alarm summary even if the
user has acknowledged it.
Like state-based alarming, it is possible to independently disable alarming of transitions to
normal or abnormal states, as well as the logging of an uncommanded change-of-state.
NOTE An alarm is not generated if the user commands a status point to an abnormal
state.
1.2.2.2
1.2.3
Timeout Alarms
User commands that are sent to analog and status points require a timeout period in which
to allow the device to perform the operation. If the operation is not performed within this
time, InstAlarm generates a timeout alarm.
Baseline
Proprietary and Confidential to Telvent
1-5
Module 1 - Introduction
NOTE rate points are typically flow measuring devices with no control capabilities;
therefore, rate records do not have this facility.
1.2.3.1
1.2.3.2
1.2.4
Communication Alarms
The communication line between the RTU and the host computer may encounter minor
errors and problems. The statistics for communication errors are recorded in the remote
table, and then transferred to the HistoricalDBs CommStats database, where they are
stored in the RemPeriodStats table. The connection statistics are recorded in the
connection table, and then transferred to the HistoricalDBs CommStats database, where
they are stored in the ConnPeriodStats table.
To view historical results, click any field of a points information line on the Remote
Summary, Remote Primary Statistics Summary, or Remote Alternate Statistics Summary
window. (For more information on these summary windows, refer to the Operation and
Control Reference.) When the action menu appears, click Historical Statistics to open the
Communications Statistics Edit dialog box, which displays historical results.
1.2.5
Communication Timeouts
The system reports most types of communication failures as soon as they occur (e.g.
security error, illegal message, short message). However, if the remote fails to
Baseline
Proprietary and Confidential to Telvent
1-6
communicate, the system generates a no-reply alarm if the failure lasts for longer than the
no-reply timeout period.
1.2.5.1
Network Alarms
InstAlarm and InstEvent can also generate alarms related to critical network components
and the network communication between the host computers and the terminal servers. For
example, if the primary LAN fails over to the secondary LAN, an alarm message is generated
to indicate that a failover has occurred.
The following tables shows the messages for the internal network failover flag alarms
defined in the cpu message set.
1.2.6
Description
Fail
The workstation CPU is failing over to backup unit (or there is a failing
LAN).
Pending
Init
Standby
Hot
Switch
The host CPU and its LAN is failing, requiring a LAN switch. (This is also
used for device failover to another unit.)
Doswitch
This is the process of switching LANs during a host CPU failover. (This is
also used for device failover to another unit.)
Non-Covered Alarms
There are situations when an alarm is generated from an area that is currently not selected
for control by any user. (This may happen on a night shift, for example, when fewer users
are on duty.) Any or all of the workstations can be configured to receive such non-covered
alarms.
When alarms are being generated for an area that is controlled by an operator, noncovered alarms from another area occur only if alarm cover checking is enabled. If alarm
cover checking is disabled, the system will not generate non-covered alarms. For related
information, see Area Edit dialog box in the RealTime Services Configuration and
Administration Reference.
NOTE If a user receives a non-covered alarm, she does not automatically have the
authority to acknowledge it or to control the necessary devices in that area. First, she
must be able to select the area with the non-covered alarm for control, which can only
occur if the workstation rights and/or user rights allow it. At any given time, therefore, at
least one user should have rights to control each area. (Area of responsibility is discussed
in the RealTime Services Configuration and Administration Reference.)
Baseline
Proprietary and Confidential to Telvent
1-7
Module 1 - Introduction
1.2.7
1.2.8
The name of the point, table, and group with which the alarm is associated
Whether or not the alarm is persistent (a persistent alarm remains in the alarm summary even after the user acknowledges it)
The following table lists all of the fields in the almsum table.
Data Type
Description
category
pntname
covered
oas_boolean_t
dbname
pntname
DBnPnt
almsum_dbpnt
flashing
oas_boolean_t
fldname
fieldname
group
groupslot
host
pntname
inalarm
oas_boolean_t
message
almsumMsg
pntdesc
pntdescription
Baseline
Proprietary and Confidential to Telvent
1-8
Data Type
Description
ptname
almsum_key
purgetimer
short
The purge timer, in seconds, is used when a non-persistent alarm is to remain in the summary for a time after
alarm acknowledgement.
rtu
remoteslot
severity
sev_enum
Sevtime
alm_sevtime_t
timestamp
internaltime
timestampstr
alm_timestr_t
type
almTypeEnum
The almsum table is not accessible through the DMT. Use the following to access or modify
the table:
acknowledge
addDBalarm
addSYSalarm
filteralm
Each of these is described in the Business Object Reference.
1.3
Baseline
Proprietary and Confidential to Telvent
1-9
Module 1 - Introduction
Description
Message
Alarm Attr.
Disturbance Mode
Suppression Overview
Click this to open the Alarm Suppression Overview window (Figure 3-8). Refer to The Alarm Suppression Current
Configuration Window (Section 3.1).
Baseline
Proprietary and Confidential to Telvent
1-10
Baseline
Proprietary and Confidential to Telvent
MODULE 2
Alarm Configuration
rate points that use accumulator pulse counts (as opposed to ones that use analog inputs)
calculate the pulse rate and use it for alarm generation. When status points undergo
uncommanded state changes, alarms are generated.
This module covers the following interfaces that are used in configuring alarms:
The Analog Alarm Configure Dialog Box (Section 2.1)
The Rate Alarm Configure Dialog Box (Section 2.2)
The Status Alarm Configure Dialog Box (Section 2.3)
2.1
Baseline
Proprietary and Confidential to Telvent
2-2
Click Analog on the Database Management Tool to open the Analog Edit dialog box.
For more information, refer to the RealTime Services Configuration and Administration
Reference.
Type or select the name of the analog point in the Name: field.
Click Alarming....
The following table provides information on each of the items that appear on the dialog
box.
Table 2-1 Fields and check boxes on the Analog Alarm Configure dialog box
Field/Check box
Reference
Alarm Deadband:
Baseline
Proprietary and Confidential to Telvent
2-3
Table 2-1 Fields and check boxes on the Analog Alarm Configure dialog box (Continued)
Field/Check box
2.1.1
Reference
Creep Detection
Deviation Alarm Limit:
Alarm Suppression:
2.1.2
Deadbands
The Alarm Deadband: field controls the sensitivity of the high and low alarms. These
alarms are always triggered when the value being monitored crosses the high or low limit.
The value that causes the alarm state to end depends on the deadband. When the point is
in the high alarm state, it remains in that state until it drops below the high limit minus
the deadband, as shown in the Deadband Example (Figure 2-2). These conditions prevent
minor fluctuations from repeatedly putting the value into and out of the alarm state.
Similarly, when a point is in the low alarm state, it remains in that state until it rises above
the low limit plus the deadband. If the deadband is set to zero, this feature is disabled.
These deadband rules apply in the same manner to the HiHi and LoLo limits.
Baseline
Proprietary and Confidential to Telvent
2-4
HH
High-High
Limit
High Limit
Low Limit
deadband
deadband
Low-Low
Limit
HH
H
L
2.1.3
Alarm Limits
Standard normal operating values for the analog and rate points lie within certain Hi and
Lo limits. When a measured value exceeds the high limit, or goes below the low limit, a
state alarm is generated to indicate that a condition requires attention. A second set of
limits, known as HiHi and LoLo, are above and below the high and low limits. When a
measured value exceeds the HiHi, or goes below LoLo limits, a state alarm is generated to
indicate that a critical condition has occurred.
Typically, a higher severity is assigned to HiHi / LoLo conditions than to the Hi/Lo. Refer to
State Message Sets (Section 4.1).
2.1.4
Rate-of-Change Checks
analog and rate instruments register a value that increases or decreases depending on
process conditions. InstAlarm can monitor the rate-of-change (ROC) in the value. Rate-ofchange is determined by normalizing the last scan value and the current value to the unit
time (in seconds):
lastvalue currentvalue
ROC = -------------------------------------------------------------------time
Some instruments have a manufacturers specification indicating that errors can occur if a
certain ROC value is exceeded. At times, a monitored process variable can require a ROC
limit to prevent errors based on rapid adjustments to the system. In these cases, select the
Rate of Change Alarm check box on the Analog Alarm Configure dialog box (Figure 2-1)
and enter the maximum allowable rate-of-change (in engineering units per second) in the
Baseline
Proprietary and Confidential to Telvent
2-5
Rate of Change Limit: field. An alarm is generated if the calculated rate of change is
greater than this amount.
The correct limit is determined by the instrument specifications and the process
limitations.
2.1.5
Creep Detection
You may need to properly calibrate analog and rate instruments to ensure that their
values are accurate and do not creep out of the calibrated state. analog and rate points
have an option that allows you to store an initial value or creep setpoint, updated on
startup and whenever a creep alarm is generated. This initial value can then be compared
to all subsequent values. This comparison measures any creep deviation of the input value.
The amount of creep is the absolute difference between the current scan value and the
creep setpoint that was set when the last creep alarm occurred:
creep = currentvalue setpoint
If the analog point is supposed to test for creeping, select the Creep Detection check box
on the Analog Alarm Configure dialog box (Figure 2-1). You should do this when the
instrument specifications indicate a maximum raw deviation value that is acceptable
before calibration deterioration occurs. Convert this raw value to the applicable
engineering units for the point and enter it in the Deviation Alarm Limit: field. An alarm is
generated if the calculated creep exceeds this limit.
2.2
Baseline
Proprietary and Confidential to Telvent
2-6
Click Rate on the DMT to open the Rate Edit dialog box. This dialog box is also
discussed in the RealTime Services Configuration and Administration Reference.
Click Alarming....
The following table provides information on each of the items that appear on the dialog
box.
Table 2-2 Fields and check boxes on the Rate Alarm Configure dialog box
Field/Check box
2.3
Reference
Alarm Deadband:
Creep Detection
Deviation Alarm Limit:
Alarm Suppression:
Baseline
Proprietary and Confidential to Telvent
2-7
Click Status on the DMT to open the Status Edit dialog box. For more information on
this dialog box, refer to the RealTime Services Configuration and Administration
Reference.
Click Alarming....
The following table provides information on each of the items that appear on the dialog
box.
2.4
Description
Select this check box to allow alarms to remain in the Alarm Summary window as long as the point remains in the abnormal state.
The beeping stops when the user acknowledges them, but they
are only removed from the window when the point returns to the
normal state.
If Sustain COS Alarms is not selected, alarms disappear from the
Alarm Summary window as soon as they are acknowledged.
Alarm Suppression
Clicking the arrow next to this field opens the Alarm Suppression
Current Configuration window (Figure 3-1). Refer to The Alarm
Suppression Current Configuration Window (Section 3.1).
Click Abnormal States... on the Status Edit dialog box. For more information on this
dialog box, refer to the RealTime Services Configuration and Administration Reference.
Baseline
Proprietary and Confidential to Telvent
2-8
2.5
Click Status on the Database Management Tool. This opens the Status Edit dialog box.
Refer to the RealTime Services Configuration and Administration, for more
information on this dialog box.
Click Abnormal States.... This opens the Status States dialog box (Section Figure 2-5).
2.5.1
Click Status on the DMT to open the Status Edit dialog box, as discribed in the
Click Inhibit....
Baseline
Proprietary and Confidential to Telvent
2-9
The following table provides information on each of the items that appear on the dialog
box.
Description
Inhibit alarming of
uncommanded
changes to normal
state
If selected, the system alarms are not generated when the point
undergoes an uncommanded change to the normal state.
If an unacknowledged abnormal state alarm exists, the change
to normal state alarm will occur whether or not Inhibit alarming of uncommanded changes to normal state is selected.
This ensures that the operator is aware that the points alarm
state has changed.
Inhibit logging of
uncommanded
changes to normal
state
If selected, the system events are not logged when the point
undergoes an uncommanded change to the normal state.
Inhibit alarming of
uncommanded
changes to abnormal
state
If selected, the system alarms are not generated when the point
undergoes an uncommanded change to an abnormal state.
Inhibit logging of
uncommanded
changes to abnormal
state
If selected, the system events are not logged when the point
undergoes an uncommanded change to an abnormal state.
NOTE Uncommanded changes are those that occur without the users intervention.
For example, if someone in the field opens a valve, the change is considered to be
uncommanded since the change did not result from the operators action.
NOTE You configure certain states as abnormal via the Status States dialog box
(Figure 2-5).
2.5.2
Baseline
Proprietary and Confidential to Telvent
2-10
Open the specific edit dialog box. If it is an analog point, open the Analog Edit dialog
box.
Click Inhibits....
The following table lists the check boxes that appear on the dialog box.
Description
Off-Normal Alarm
Normal Alarm
Off-Normal Log
Select this check box if events are not supposed to be logged when
the point changes from normal state to off-normal state.
Normal Log
Select this check box if events are not supposed to be logged when
the point changes from off-normal state to normal state.
The operator can also inhibit alarms generated from analog, rate, and status points through
the points XOS control panels. For remote points, the operator can put an RTU offscan, but
cannot actually disable alarming for all points.
While the user can inhibit alarm generation through XOS, only the system administrator can
inhibit event logging through RealTimeDB records via the DMT.
Baseline
Proprietary and Confidential to Telvent
2-11
The following table lists conditions that determine normal and off-normal states.
Condition/Determinant
analog
connection
rate
remote
no-reply timeouts, security errors, short messages, and illegal messages (Normal alarms are generated and logged. For more information on remote, refer to the the Communication Management
Reference.)
Baseline
Proprietary and Confidential to Telvent
2-12
Baseline
Proprietary and Confidential to Telvent
MODULE 3
Alarm Suppression
3.1
Baseline
Proprietary and Confidential to Telvent
3-2
Click Analog or Status on the DMT. This opens the Analog Edit dialog box or the Status
Edit dialog box. For more information on these dialog boxes, refer to the RealTime
Services Configuration and Administration Reference).
Click Alarming.... This opens the Analog Alarm Configure dialog box (Figure 2-1) or the
Status Alarm Configure dialog box (Figure 2-4).
The following table lists the column heading names and buttons that appear on the Alarm
Suppression Current Configuration window (Figure 3-1)
Suppress Method
Table
Table: field
Point
Point: field
Alarm/Control
Timers
(Seconds)
Return to Normal
Alarm Holdoff
State Based
Check State
Alarm State
Add
3.2
Baseline
Proprietary and Confidential to Telvent
3-3
Open the Alarm Suppression Current Configuration window (Figure 3-1). For more
information, refer to The Alarm Suppression Current Configuration Window
(Section 3.1).
Click Add.... to open the Alarm Suppression Edit dialog box (Figure 3-2).
NOTE You should see the points name in the upper, right-hand corner of the dialog
box.
The following table provides brief descriptions of the fields and buttons on the dialog box.
Table 3-2 Buttons and fields on the Alarm Suppression Edit dialog box
Field/Button
Description/Reference
Suppression Method:
Parent Control
Parent Alarm
Transient
Refer to:
Parent Control Alarm Suppression (Section 3.2.1)
Parent Alarm Suppression (Section 3.2.2)
Transient Alarm Suppression (Section 3.2.3)
Table:
Point:
Baseline
Proprietary and Confidential to Telvent
3-4
Table 3-2 Buttons and fields on the Alarm Suppression Edit dialog box
Field/Button
3.2.1
Description/Reference
Parent Alarm/Control:
Alarm Holdoff:
Alarm State:
Select the state for which the alarm suppression configuration is valid. For analog, it might be high alarm state; for
status, it might be the opened state. The alarm state
options that are provided are sensitive to the child point
being edited. Only the valid child states are shown.
Baseline
Proprietary and Confidential to Telvent
3-5
Child State
hi hi alarm
hi alarm
normal
0
Parent is commanded
at time 0 and child is
marked for alarm
suppression.
10
20
50
100
In the Parent Control Alarm Suppression Example (Figure 3-3), the state of the child goes
into alarm shortly after the command is sent to the parent. The child returns to normal at
the 100-second mark. If the control suppression timeout is set to a value greater than 100
seconds, then the child will not alarm: it has returned to normal before the alarm
suppression timeout expired. If the timeout value were shorter, for instance 90 seconds,
then the child alarm is generated after 90 seconds.
NOTE If a parent is commanded while a control suppression timeout is already under
way, then the control suppression timeout will be reset. However, when the updated
alarm suppression timeout value expires, control suppression does not record a new
child state value for evaluation.
NOTE Only child state alarms that result from data krunching are suppressed by parent
control alarm suppression. Other types of alarms (e.g. command failure) execute as
normal. Parent control alarm suppression is supported for analog and status points.
3.2.2
Baseline
Proprietary and Confidential to Telvent
3-6
for alarm, return-to-normal, and alarm hold-off are either cancelled or prevented from
being triggered. For example, assume that a child is configured for parent alarm
suppression in the normal, hi, and low alarm states. If the points parent changes alarm
state, the parents alarm remains suppressed while it remains in the normal, hi, or low alarm
state. If the parent reaches the high-high or low-low alarm state, its alarm suppression is
cancelled immediately and the system generates an alarm.
Parent alarm suppression only suppresses child state alarms that result from data krunching.
Other types of alarms (e.g. command failure) execute as normal. Parent alarm suppression is
supported for analog and status points.
3.2.2.1
Alarm State
Parent
alarm
Child1
Child2 alarm suppression timeout
Child1 alarm suppression timeout
normal
10
Child2
60
Child alarms
are suppressed
100
115
Child1 returns to
normal without
generating alarms
Parent returns
to normal
130
Time (Seconds)
In the Parent Alarm Suppression Example (Figure 3-4), the parent alarm occurs and the
children alarms are suppressed. The parent returns to normal before the alarm suppression
timeout value expires.
Children alarms are reevaluated when the parent alarm timeout value expires. This value
can be set to a relatively short value or to a value that is beyond the parents alarm
duration.
NOTE The alarm suppression timeout value is not reset if the parent transitions to normal and then back to alarm state before the timeout value expires.
Baseline
Proprietary and Confidential to Telvent
3-7
3.2.2.2
Parent
Alarm State
alarm
Child
Alarrm Suppression Timeout
RTN Suppression Timeout
normal
20
40
100
Time (Seconds)
The parent RTN alarm suppression timeout can be used in combination with the parent
alarm suppression timeout. The Parent Return-to-Normal Suppression Example (Figure 3-5)
shows both timeout values configured. In this case, the parent returns to the normal state
and the RTN alarm suppression timeout extends the suppression interval. As the child
returns to the same state it was in at the time of suppression, the system will not generate
any child alarms. If the parent stays in the alarm state for more than 40 seconds, the RTN
timer is not triggered; the system reevaluates the child and, consequently, generates an
alarm.
NOTE If only the RTN suppression is configured (i.e. alarms are indefinitely suppressed
while the parent is in alarm), then the suppression is cleared if the remote containing
the parent goes stale due to communication failure or the remote being placed offscan.
NOTE Regardless of the configuration of the timeout values, the childs state is compared to its state when the parent went into alarm after all timers have expired. The
childs alarm state is not reevaluated as each timeout value (or timer) expires.
Baseline
Proprietary and Confidential to Telvent
3-8
The timeout values are not reset during transitions between alarm states or during
transitions between normal states. The alarm suppression timeout value is cleared when the
parent shifts into a normal state and after the successful setup of the RTN alarm suppression
timeout. However, if the parent shifts back into an alarm state while the RTN timer is active,
then the system will neither clear the RTN alarm suppression timeout value, nor set up an
alarm suppression timeout value. This avoids the indefinite suppression of alarms when the
parent toggles continuously between abnormal and normal states.
3.2.3
Alarm State
alarm
Child
Hold-off Timeout
normal
Time (Seconds)
The alarm hold-off timer is not triggered anew if a new telemetry value is received for the
child while the alarm hold-timer is in effect.
3.2.4
Alarm Hold-off
Alarm hold-off is used to temporarily suppress child state alarms that result from data
krunching. Other types of alarms, such as command failure, execute as normal. Alarm holdoff is supported for analog and status points.
3.2.4.1
Baseline
Proprietary and Confidential to Telvent
3-9
Alarm State
Real Parent
Telemetered
Parent
alarm
normal
Time (Seconds)
Real Parent
goes into alarm.
Parent suppresses
child alarm and
Alarm Hold-off
timer is cancelled.
Child returns to
normal without
generating alarms.
If there is no method to delay the evaluation of the childs alarm state until the parent
alarm state is updated, then suppression occurs after the child has gone into alarm. Both
alarm and RTN alarm events are generated for the child. The alarm hold-off timer
postpones the alarm long enough to receive the updated parent value.
In the Alarm Hold-off Example (Figure 3-7), alarm hold-off is triggered when the child
enters the alarm state. The alarm hold-off saves the childs previous value for comparison
with the value when the timer expires. The parent goes into alarm, sets the alarm
suppression timeout, and cancels the alarm hold-off timer. However, the parent does not
change the child value that is saved by the alarm hold-off. When the alarm suppression
timeout expires, the child is back to its original state; therefore, no alarm is generated.
NOTE The alarm hold-off timer is triggered when the points alarm state changes and
neither its parent alarm nor return-to-normal alarm has suppressed it. The alarm holdoff timer is cancelled if its parent goes into an alarm state before the hold-off timeout
expires.
3.3
Baseline
Proprietary and Confidential to Telvent
3-10
3.3.1
The window shows a selected point with a parent point that triggers parent control alarm
suppression for the point. It also shows a child point for which this point triggers parent
alarm suppression. Any transient alarm suppression configured for the point is also
displayed. If the selected point had multiple parent alarm-suppression triggers, or multiple
children for which it triggered alarm suppression, then they would also be displayed.
Click the Table drop down arrow and select the table to which the point belongs.
Baseline
Proprietary and Confidential to Telvent
3-11
NOTE Clicking the parent and child Edit buttons reveals details about the alarm suppression relationship between the selected point and its parent and child. You can also
modify the relationship using the Edit button.
3.3.2
3.4
Baseline
Proprietary and Confidential to Telvent
3-12
When an operator disables alarm disturbance mode, the system regenerates suppressed
state-based alarms, such as those resulting from data krunch. Other low priority alarms,
however, such as command failure alarms and system alarms, are not regenerated. The
system reevaluates non-inhibited alarm records of analog, status, and rate points for which
no alarm record exists in the alarm summary.
3.4.1
Table 3-3 Fields and Buttons on the Alarm Disturbance Edit dialog box
Field/Button
Description
Record Name:
System:
Maximum Severity:
Record alarms whose severity is lower than or equal to the one set by
this field setting are suppressed
For more information on the buttons, refer to the Standard Navigation and Configuration Information Guide.
Click Disturbance Mode on the DMT to open the Alarm Disturbance Edit dialog box
(Figure 3-9).
Select a record by clicking the arrow button next to the Record Name: field.
Select the system by clicking the arrow button next to the System: field.
Baseline
Proprietary and Confidential to Telvent
3-13
NOTE Record and system names are often the same value.
4
Click Dismiss.
Baseline
Proprietary and Confidential to Telvent
3-14
Baseline
Proprietary and Confidential to Telvent
MODULE 4
4.1
Baseline
Proprietary and Confidential to Telvent
4-2
The following table shows the message sets that are used.
remote points
connection
points
Sets used
for
omnicomm
points
Base Message
analog
rtu
conmsg
omnicomm
Record # 1
Normal
No Reply
No Connection
Inactive
Record # 2
High
Normal
Connected
Startup
Record # 3
High
Normal
Connected
Active
Record # 4
Low
Security Error
Connecting
Shutdown
Record # 5
Deviation
Long Message
Failed
Record # 6
High-high
Short Message
Error
Record # 7
Low-low
Wrong Remote
Retry
Record # 8
Instrument fail
high
Offline
Normal
Record # 9
Instrument fail
low
Bad Message
Record # 10
Rate of Change
Database Error
Poll Cycle
Record # 11
Off Scan
Offline
Record # 12
Illegal Message
Config Error
Record # 13
Unavailable mdm
Record #14
Line Failure
Reservation mdm
Record #15
Hang-up mdm
Record #16
TX Error
Record #17
TX Short
Record #18
RX Error
Record #19
RX Short
Record #20
RX None
Record #21
Success
Baseline
Proprietary and Confidential to Telvent
4-3
4.1.1
4.1.2
Description
Normal
High
Value has exceeded the high limit (taking into account the deadband)
Low
Value has exceeded the low limit (taking into account the deadband)
Deviation
Hihi
Lolo
Instrument fail hi
The analog/rate instruments upper limit has been reached. The upper limit is
configured in the Maximum (raw): field on the Analog Input dialog box or
on the Rate AnalogInput dialog box (refer to the RealTime Services Configuration and Administration Reference).
The analog/rate instruments lower limit has been reached. The lower limit is
configured in the Minimum (raw): field on the Analog Input dialog box or
on the Rate AnalogInput dialog box (refer to the RealTime Services Configuration and Administration Reference).
ROC
The rate at which the change in value has exceeded the specified limit
4.1.3
Baseline
Proprietary and Confidential to Telvent
4-4
for example, is used for a valve instead of the Open/Running/Trip state, the SCADA system
interprets the valve state as Close when it is actually Open. Selecting the Normally Open
option for the status point inverts the sense when the status raw value is converted to its
EGU value.
Description
Valve
Error
Open
Valve is open.
Close
Valve is closed.
Transit
Pump
Error
Running
Pump is operating.
Off
Sequence
Breaker
Error
Trip
Close
For two-state status records (i.e. one-bit status), the middle two messages of the message
set are used so that the same message set can be used for one-bit and two-bit status points.
The second message in the set must be for the Open/Start/On/Trip state, and the third
message must be for the Close/Stop/Off state. If the field device does not return a value of 1
to indicate the Open/Start/On/Trip state, then invert the sense of the status valve.
Configuration of status inputs is discussed in the RealTime Services Configuration and
Administration Reference.
4.1.4
Click Message on the DMT to open the Message Set Edit dialog box (Figure 4-1).
Baseline
Proprietary and Confidential to Telvent
4-5
In the Set Name: field, type the name of the new message set.
Click Add. This opens the Message Set Add dialog box (Figure 4-2).
Click Message on the DMT. This opens the Message Set Edit dialog box (Figure 4-1).
Baseline
Proprietary and Confidential to Telvent
4-6
Double-click the state to be modified. This opens the Message Edit dialog box
(Figure 4-3).
Select a foreground color. The Foreground color: field determines the real-time color
of attach objects, such as devices and text messages, as they appear on the XOS dialog
boxes and windows.
NOTE Typical color assignments for alarm severity levels are red for high, yellow for
medium, and green for low severity. If a message state is severe enough to justify attaching a red color (Foreground color: field is set to red), then the state severity should
match this message state (State Severity: field should be set to high). If a message
state uses a color (such as magenta, cyan, white) that is not defined for an alarm level, it
is recommended that this message state be assigned a low state severity level.
6
4.2
Click Modify.
Color Assignment
High
Red
Medium
Yellow
Low
Green
Alarm severity is also indicated by the frequency and duration of beeping. More severe
alarms are typically configured to beep more rapidly. All alarms, regardless of severity, are
usually configured to beep until they are acknowledged.
Baseline
Proprietary and Confidential to Telvent
4-7
NOTE Information on alarm severity ratings are stored in the RealTimeDBs xosalmattr
table.
4.2.1
The following table provides descriptions of the fields on the dialog box.
Description
Name:
Sound File:
The wave file that is used to announce any alarm of this severity.
Alarm Severity:
Severity Color:
The alarm color is set via this field. For alarms in the alarm summary, the number of available severity levels is pre-defined.
Refer to Typical alarm severity color assignment (Table 4-4).
Number of Beeps/Cycle:
This field sets the number of beeps per cycle. Higher priority
alarms should have more beeps per second than low priority
alarms.
Number of Cycles:
Baseline
Proprietary and Confidential to Telvent
4-8
Click Alarm Attr. on the DMT. This opens the Alarm Attribute Edit dialog box
(Figure 4-4).
Click the arrow next to the Sound File: field. This opens the WAV File Select dialog box
(Figure 4-5).
Click the file name to select the file. To test the file before selection:
a Click the glue icon.
b Click the file name.
c
10
11
Click Dismiss.
Baseline
Proprietary and Confidential to Telvent
Index
A
Abnormal State Alarming .....................................1-3
acknowledge..........................................................1-8
addDBalarm ...........................................................1-8
addSYSalarm ..........................................................1-8
alarm ......................................................................1-1
alarm attribute
configuring .........................................................4-8
Alarm Attribute Edit dialog box ...........................4-7
Alarm Severity ....................................................4-7
Beep Cycle Time (sec) .........................................4-7
Number of Beeps/Cycle ......................................4-7
Number of Cycles................................................4-7
Severity Color......................................................4-7
Sound File ...........................................................4-7
Alarm Deadband ...................................................2-3
.............................................................................2-2
Alarm Disturbance Mode ....................................3-11
Alarm Hold-off.......................................................3-8
Alarm Holdoff ........................................................3-4
alarm limits ............................................................2-4
Alarm Presentation Attributes..............................4-6
Alarm Severity........................................................4-7
alarm severity
color assignment ................................................4-6
Alarm State ............................................................3-4
Alarm Suppression ......................................... 2-3, 2-7
Alarm Suppression Behavior ...............................3-11
Alarm Suppression Current Configuration...........3-1
Alarm Suppression Current Configuration window .
3-1
opening the ........................................................3-2
Alarm Suppression Edit Dialog Box ......................3-2
Alarm Suppression Edit dialog box.......................3-3
opening the ........................................................3-3
Alarm Suppression Overview ..............................3-10
alarms
database..............................................................1-2
limits....................................................................2-4
network alarms...................................................1-6
non-covered........................................................1-6
return-to-normal ................................................1-3
system alarms......................................................1-2
almsum Table .........................................................1-7
analog ..................................................................2-11
Analog Alarm Configure Dialog Box....................2-1
Analog Alarm Configure dialog box ....................2-2
Analog and Rate Messages ...................................4-3
Analog Inhibit dialog box ...................................2-10
archive ....................................................................1-2
D
database alarms .....................................................1-2
Deadband
Example...............................................................2-4
Deviation Alarm Limit ...........................................2-3
Deviation alarm limit.............................................2-5
E
Events .....................................................................1-1
events
event logging......................................................1-1
F
filteralm..................................................................1-8
Foreground color ...................................................4-6
H
Hi Alarm Limit ........................................................2-2
Hi/Lo Alarm Check .................................................2-2
Hi/Lo operating-range checking ...........................2-1
Hierarchical Alarm Suppression ............................3-5
Hierarchical Alarm Timeout ..................................3-6
Hierarchical Return-to-Normal Timeout...............3-7
HiHi Alarm Limit ....................................................2-2
HiHi alarm limit......................................................2-4
HiHi/LoLo Alarm Check..........................................2-2
HiHi/LoLo operating-range checking....................2-1
Historical Statistics .................................................1-5
B
Base Message .........................................................4-1
base plus offset ......................................................4-1
Beep Cycle Time (sec) ............................................4-7
C
cleanup ...................................................................1-2
Cmd Failure Timeout .............................................1-5
OASyS DNA SCADA Suite
command failure....................................................1-3
Command Failure Alarming ..................................1-4
Command Timeout ................................................1-5
Command Timeout Alarming ...............................1-5
Commanded Status Points Alarming....................1-3
CommStats ..............................................................1-5
Communication Order and Alarm Suppression ...3-8
Configuring a status points abnormal states ......2-8
Configuring alarm disturbance mode ................3-12
Configuring an alarm attribute ............................4-8
connection............................................................2-11
ConnPeriodStats .......................................................1-5
Control-Initiated Alarm Suppression ....................3-4
creep .......................................................................2-5
Creep Detection ...................................... 2-1, 2-3, 2-5
creep detection ......................................................2-5
Baseline
Proprietary and Confidential to Telvent
Index - 2
L
Lo Alarm Limit .......................................................2-2
Log Command Success...........................................1-7
Logging Commanded COS and Setpoints ............1-7
logging events .......................................................1-1
LoLo Alarm Limit ...................................................2-2
LoLo alarm limit .....................................................2-4
M
Message Edit dialog box
Foreground color................................................4-6
State Severity ......................................................4-6
Message Set Add dialog box.................................4-5
Message Set Edit dialog box .................................4-5
message sets
remote.................................................................4-3
status ...................................................................4-3
message table
message sets .......................................................4-2
messages
analog and rate alarm .......................................4-3
Modifying a message set.......................................4-5
N
network alarms ......................................................1-6
Network communication alarm text ....................1-6
non-covered alarms ...............................................1-6
Normal Alarm ......................................................2-10
Normal and Off-normal state determinants ......2-11
Normal Log ..........................................................2-10
Number of Beeps/Cycle .........................................4-7
Number of Cycles ...................................................4-7
O
Off-Normal Alarm................................................2-10
Off-Normal Log....................................................2-10
Opening a points Inhibit dialog box .................2-10
Opening the Alarm Suppression Current Configuration window ....................................................3-2
Opening the Alarm Suppression Edit dialog box 3-3
Opening the Rate Alarm Configure dialog box...2-6
Opening the Status Alarm Configure dialog box 2-7
Opening the Status Inhibit dialog box .................2-8
Opening the Status States dialog box ..................2-7
P
Parent Alarm ..........................................................3-3
Parent Alarm/Control ............................................3-4
Parent Control .......................................................3-3
Parent Return to Normal.......................................3-4
R
rate .......................................................................2-11
Rate Alarm Configure Dialog Box ........................2-5
Rate Alarm Configure dialog box
opening the ........................................................2-6
Rate of Change Alarm ................................... 2-2, 2-4
Rate of Change Limit.............................................2-5
Rate of Change Limits ...........................................2-2
rate-of-change .......................................................2-4
Rate-of-Change checking ......................................2-1
rate-of-change checks ...........................................2-4
remote ..................................................................2-11
Remote Message Set..............................................4-3
remote message set ...............................................4-3
RemPeriodStats ........................................................1-5
return to normal alarm .........................................1-3
Return-to-Normal Alarming..................................1-3
return-to-normal alarms........................................1-3
ROC .........................................................................2-4
S
Selecting a point to view on the Alarm Suppression
Overview window .........................................3-10
Setpoint Tolerance.................................................1-5
Severity Color .........................................................4-7
Sound File...............................................................4-7
State Message Sets.................................................4-1
State Severity .........................................................4-6
State-Based Alarming ............................................1-3
State-based alarming.............................................1-4
Status Alarm Configure Dialog Box......................2-6
Status Alarm Configure dialog box ......................2-6
opening the ........................................................2-7
Status Inhibit dialog box
opening the ........................................................2-8
Status Message Set ................................................4-3
status message set .................................................4-3
Status States dialog box ........................................2-7
opening the ........................................................2-7
Suppression Method
Parent Alarm.......................................................3-3
Parent Control ....................................................3-3
Transient .............................................................3-3
Suppression Overview .........................................3-10
Sustain COS Alarms................................................2-7
system alarms .........................................................1-2
T
Tables
almsum ................................................................1-7
tables
xosalmattr ...........................................................4-7
Timeout Alarms......................................................1-4
timeouts .................................................................1-5
Transient.................................................................3-3
Transient Alarm Suppression ................................3-8
U
Uncommanded Change-of-State ..........................1-4
Baseline
Proprietary and Confidential to Telvent
Index - 3
V
Valid for Specific State ..........................................3-4
W
WAV File Select dialog box ...................................4-8
X
xosalmattr table.....................................................4-7
Baseline
Proprietary and Confidential to Telvent
Index - 4
Baseline
Proprietary and Confidential to Telvent