Home

ControlWave Security Vision Application User`s Guide

image

Contents

1. 11 Defining the Users who will be allowed to Access Images from the Camera 12 Viewing Changing the IP Address You Assigned 2222 13 Setting the Correct Date Time Used in TNC T D 14 Specifying the Resolution and Compression Level of the Images 15 Specifying the ControlWave series Controller as an Event Server 16 Specifying the Frequency At Which Images Are 4 2222 17 Configuring Camera Software for Axis 2100 Axis 2120 22 19 Specifying the Resolution and Compression Level of the Images 20 Viewing Changing the IP Address You Assigned 2 2222 21 Setting the Correct Date Time Used in the 22 Defining the Users who will be allowed to Access Images from the Camera 23 Specifying Sequenttal Mode on the Operation Selection Page 24 Specifying How Often You Want the Camera to Take an mage z Specifying How the Images Get Uploaded to the ControlWave series Controller 26 Activating your Choices by Enabling the 2222 27 Step 5 Configure the Security_Vision Function Block s
2. Z What is included in the Security Vision Application Package 4 What if I want to use a different brand of CA ET La daaa adada dala l daaabma abadaq aa aaa Step 1 Set up the ControlVVave sertes 5 Procedures the ControlWave Process Automation Controller 5 Procedures for the ControlVVave MICRO Process Automation Controller 5 6 Write Down the Serial Number of the Camera You ll Need 1 22222 6 710 a AY Aaa E 6 577010 lada 6 7 Assigning IP Address for an Axis 210 211 211A 222222222 2222 5 Assigning the IP Address for an Axis 210 211 211A Camera using Axis IP Utility 7 Assigning a Password for the root User Account 8 Assigning the Address for an Axis 210 211 211A Camera using ARP Commands 8 Assigning the Address for an Axis 2100 Axis 2120 2222222 10 Step 4 Configure Axis Camera Software 5 11 Configuring Camera Software for Axis 210 211 211
3. Images from Camera 2 al stored in Cam 2 folder 1 ControlVVave serles controller in addition to performing normal measurement and control operations stores images from cameras in files in folder in the FLASH memory of the controller These images are uploaded to the ControlWave series controller and stored in FLASH memory each camera has its own folder in FLASH memory for storing images The folders are named x where folder 1 would hold pictures pic1 jpg to picn jpg from camera 1 folder i Actually within the camera the pic file name is pic_ _ 00001 jpg pic_ _ 00002 jpg etc but we have shortened it in these examples for ease of explanation Introduction What is the Security Vision Application cam 2 would hold pictures picl jpg to picn jpg from camera 2 and so on The images are stored in a cyclical order 1 e older images are eventually overwritten as newer images are uploaded Inside the ControlVVave sertes controller runs the user s project to perform control operations For each camera a Security_Vision POU is configured within the ControlWave project The Security Vision POU continually monitors a particular digital input the digital input could be tied to a door alarm a motion sensor etc When the digital input BOOL variable becomes TRUE the Security Vision POU declares a security event and takes a certain number of images specified by the user both before and a
4. Note There must be only ONE Comm Port Subnet on each server Click on OK when finished 47 Security Access Card Reader Application Step 4 Define Which Doors have Card Readers Each door that operates using an Isonas card reader must be defined for the system To define a door right click on the COM port and Right click on choose nsert from the pop up menu a the port subnet e g COM1 The door name MUST follow the format lt RTU_name gt lt door_name gt where RTU names is the name of the ControlWave controller as defined in NetView lt door_name gt is the name of the door as configured in the Security Access function block T separator is required however do NOT type the brackets shown above A Record Will Be Changed i Mode of Operation DOOR Q ad ndan ae Description e DEAE eaa STANDALONE events uploaded manually Door Name LOCAL events uploaded automatically isi KED Local UNLOCKED Loca Network Information Server Servem z SubNet COM A Controller 10 7 Modet 0018 Direction Authority Level required to operate 0 Require Dual Authentication Cancel Help ach card reader has a unique ID ID s are positive integers that start at 1 You can enter any description here 48 Security Access Card Reader Application Each door must be assigned a na
5. 23004 TCP connection to the destination address is not currently active This status can appear even after a connection is made if the connection is dropped RTUName STRING This name is downloaded by the Security Vision application from the ControlWave In the Crystal Access Administrator software the card reader 15 identified in the format RTU DoorName This output is the RTU portion of the name and must match the RTU specified in Crystal Access 44 Security Access Card Reader Application Configuring the Security Database in 15 Crystal Access Administration Software Before you configure the Security Database you need to be able to answer the following questions Which doors will have card readers and which ControlWave controllers will be responsible for controlling particular card readers e Who are the people who will have badges for the card reader and what ID numbers should they be assigned Which doors can people use Here is an overview of the steps for configuring the Security Database IMPORTANT For a full discussion of the Isonas Crystal Access Administrator software please consult the Isonas Crystal Access System Software Reference Manual In addition please be aware that the Security Access application does NOT currently support all of the options available in the Isonas software In particular it does NOT currently support the following items e Shifts can be defined in Isonas but
6. Repeat this process until you have assigned all the people you want in this particular group As you add people you will notice their information will appear in the list on the right hand side of the GROUPS dialog box When you ve finished click on Close As you add people to this group their information will appear in the list ey ISOMAS Crystal Acces Cubic System Administrator Version 10 02 02 App caton Network Calendar Doors People Rights Gies Reports Window Help A GROUPS Another Group AL Bulton BEI Management I4 1444 7 be v t Dete iset Change Delte Members elect m Close Click on Close when you ve finished adding people to the group Step 7 Assign Permissions to Groups So far we ve defined doors and we ve defined the people who will use doors and put them into groups Now we have to specify which groups of people can use which doors Click on Rights gt Permissions to call up the PERMISSIONS dialog box Select the group you want to configure from the Group list along the left hand side of the dialog box Next choose a door you want this group to be able to access from the Door list and then click on Insert New Permission to add this permission to the Permissions Table Repeat this until you have specified all the doors this group can access You can then select a different group and repeat this process When you have defined all your groups com
7. The Adding Changing Employee Record dialog box will appear You must enter the First Name Last Name and EmployeelD number for the person You will also need to specify the Badge ID number for the card or key fob that this person will use Enter the number in the Enter BadgelD or Read From Controller field and click on the Add button NOTE lf the right side of the dialog box is grayed out click on the Last Name or SSN fields to shift focus and make the right hand fields accessible Enter the employee s name A Aoting Changing Employee Record General US Qefined Fields JOHN MI A LastName SMITH First Name Employeell 343 SSN 000 00 0000 Badges Latch Interval m 1 5 aE ar Latch Intery l seconds Insert Change Delete r Enter Badgeld or Read From Controler 5023 Read From RTUTIMAIN D R 7 M Ho L You must assign an ID Enter the badge D from number to each person the card or key fob here then click on Add When finished click on OK Repeat this process for each person you want to add Step 6 Assigning People to Groups Each person you have now defined must be assigned to a group Groups are used to establish permission as to who has access to particular doors To do this first click on People gt Groups and the GROUPS dialog box will appear Click on I
8. continuously of upload them only when an alarm event occurs lt P External Sequential Mode devices Uploads images continuously to the target server at a defined frequency and optionally Applications between specified times during the week Operation Selection 7 Alarm Mode Upload Uploads a single image or a buffered image stream to the target server when an alarm is Enable triggered and optionally sends email alerts Layout Wizards Installation P Application Wote Refer to the product Support pages if you should encounter any difficulty in configuring or installing your product Support MOTE An application script is running If you make any changes you will have ta Disable the running script and then Enable the new one on the Enable page for your changes to take effect Help i i d then Enable th he Enable page f h ke eff b Home 24 Step 4 Configure Axis Camera Software Options Specifying How Often You Want the Camera to Take an Image On the Sequential Operation Scheduler page you specify how often the camera should take a picture 1 e capture an image The frequency of image capture is important If you don t specify it frequently enough you will likely miss something important If however you specify it too frequently 1 you are capturing images very fast you will run the risk of overburdening communications used for your control system with camera images plus you cou
9. including dashes that you copied off of the camera in the previous step Don t type the brackets lt your PC s IP address gt is the IP address of the PC you are currently using Don t type the brackets For example if you want to assign the camera an IP address of 10 177 15 4 and the IP address of the PC you are currently on is 10 177 3 22 and the serial number on the camera is 00 40 8 10 00 86 then enter the following commands C gt arp s 10 177 15 4 00 40 8 10 00 86 10 177 3 22 C gt ping t 10 177 14 4 Connect the external power supply to the Power Supply Connector in the back of the camera Then connect the power supply to your main power The camera is OFF until after you start sending it messages from the PC Within 10 seconds you should see some messages saying Reply from 10 177 14 4 or something similar If instead you receive Request Timed Out messages this indicates a problem Please check that the IP addresses you have used are valid for this network and for the IP mask check the connectors etc For more information about IP addresses see the ControlWave Designer Programmer s Handbook document D5125 Look at the camera and verify that the power indicator on the back of the camera next to the power supply connector is constantly lit Also check to see that the network indicator on the back of the camera next to the network connector is blinking intermittently 10 Step 4 Co
10. o Z Cancel 28 Step 5 Configure the Security Vision Function Block Once you have successfully added the Security_Vision MWT file as a library it will appear under the Libraries icon in the project tree With the Edit Wizard running select the Security_ Vision group and you can add the Security Vision function block into your project like any other function block Make sure the Edit Wizard s D cick onan insertion point running Now choose the _ in the worksheet for your lt Security_Vision gt group 4 program The Security Vision library s Controflv ave Designer myproject2 lmprog lmprog 1 is now vi sibl e in th e proj e ct File Edit View Project Build Objects Layout Online Extras Window 2 18 xi B iz ki 12 27 17 Fel s 616 mimik on mn les sm l tree 50 amp 64 Q R Kin l m zz HH HE aH AHF TA He H Veli p N xj E Project Libraries lb ACCOL3 A PROCONOS Security Vision G Data Types a Logical POUs 0 Improg i Improgl 7 mproq m zs File i File_Delete_Folder File Find After Date Double click on E File Find Before Date Security Vision FB m ha to add it into your program like any other function block myprog my J Improg
11. this value is set to 0 CardData BOOL This output is set TRUE when a valid card is presented to the Isonas card reader and is set FALSE after one task execution This is primarily used for testing troubleshooting purposes DoorState BOOL This is the state of the door red via the card reader This output is set TRUE when the door is closed and FALSE when the door is open REX BOOL This output reports the state of the Remote Exit REX line on the Isonas card reader When REX 15 TRUE the door is unlocked and a Local message is generated This output represents the state of the tamper switch on the Isonas card reader When AUX is TRUE the door is unlocked 43 Security Access Card Reader Application and a Local message is generated AUX BOOL This output reports the state of the AUX line on the Isonas card reader Status DINT This output reports status codes on the operation of the function block The main status codes are 8006 Invalid Door Address 8017 Invalid Checksum 10001 Invalid ID Presented 10002 Nortuname txt file found 10003 No doors txt file found 10004 No users defined for door 17001 Mode not supported 17002 Invalid Mode for serial port 17005 Memory not available for buffer space 17006 Timeout waiting for response 23001 Feature is not supported Seen in simulation only 23002 Destination address was either not a string variable or the length is greater than 80 characters
12. your value for Y is 41 6 This means that ignoring all other factors historical etc your FLASH memory should fail in approximated 41 6 years That s pretty good Most people wouldn t complain about that If however you used the same 2048KB of FLASH for images and you save larger images 16KB and you store images at a faster frequency say one per second then your value for N goes to 128 and ignoring all other factors your FLASH memory should fail in 4 16 years That s a big difference and one likely to affect your operation The point of this exercise therefore is to make you aware of the issue and to give you some basis for balancing the tradeoffs between image size frequency at which images are collected and the life cycle of your FLASH memory In general we recommend 5 seconds for the frequency of updates F 58 Appendix B Troubleshooting Checklist In order for the Security Vision Application to function properly it is important that all the various parts of the application be configured correctly If you are encountering difficulties in using the application please review the checklist below to see that all items are properly configured I Did you set up the ControlWave series controller Is the controller included in a running OpenBSI network running Ethernet and can OpenBSI communicate with it Did you mount the camera according to the guidelines in the Axis Network Camera Installation Guide Did you
13. NOT displayed enter it in the Serial Number field Enter the new address in the IP Address field then click on the Set IP button to load the new address Restart the camera unplug power then restore power within two minutes for the new address to take effect 101 x ili AXIS IP Utility Server View Help iP s Serial number 00408 5604 01 address AXIS 210 60401 interface 1 120 0 211 143 The current IP address for this camera Serial number found on bottom of camera To change the IP address enter the new address here then click on Set IP Set IP Address Set the IP address of AXIS 210 60401 Serial Number IP Address im 0 21 vew Home Page Step 3 Assign an IP Address to the Camera Once the camera is reset you can access its configuration web pages by clicking on the View Home Page button Assigning a Password for the root User Account AXIS Enter the same The very first time you access Configure Root Password password in both the camera you will be required User name these fields then to assign a password to the Password emnene click on OK Root user account Enter the Confirm password ssssss password in the Password and Confirm Passvvord ee ee fel ds OK before the product can be used If the password for roo
14. Security_Access does NOT use them e Door direction checking e g same employee card used to get in without first going out Employee photographs Standalone card reader configuration via the Security Access application Standalone mode allows the card reader to still operate using a local Security Database even if communication is lost with the ControlVVave Note Card readers can still operate in standalone mode if configured through the Isonas software to do SO Step 1 Start Crystal Access and Log in Start the Crystal Access Administration software as follows Start gt Programs Isonas gt Crystal Access Administrator When prompted log in using your password and click on OK If prompted to run the Virtual Reader Controller click on Close 45 Security Access Card Reader Application Step 2 Set Compile and Export Options Click on Application gt Passwords and Options In the Change Passwords and Options dialog box check the following boxes then click on OK Allovv Compile without running Badgesvr exe Export on Compile network people access Skip Send On Compile do not send records to controllers x NOTE You can also set Password Selected ve Adminitrative Operations Level Monitor passwords for Crystal Access Uperalions Level C Operations Level 2 from this page For details see the Crystal Access New Password documentation Verily New Pass
15. and COM Port and Subnet 46 Step 4 Define Which Doors have Card 48 Step 5 Define Which People Will Be Using the Card Readers 50 Bie PR Poono O OD 57 77777 lt are UK a 53 Downloading the Security Database to the ControlVVave Controller 54 Appendix A Effects of Storing FLASH Images on the Life Cycle of Your FLASH memory 55 7 b b 59 Introduction What is the Security Vision Application The Security Vision application is a package of hardware and software available from Emerson s Remote Automation Solutions division which allows a ControlWave series controller to store images from a remote security camera and make them available to operators back at the OpenBSI Workstation Beginning with OpenBSI Version 5 5 a related application Security Access is also supported Security Access allows a ControlVVave controller to control one or more card readers for security doors Security Access may be used in conjunction with or independently from the Security Vision camera application When Would the Security Vision Application be used Typically remote process controllers are installed at remote sites at water pumping stations on natural gas pipelines etc As part of a Supervisory Control and Data Acquisition SCADA system they collect data and send
16. arp s 10 177 15 4 00 40 8c 10 00 86 10 177 3 22 C gt ping t 10 177 14 4 Within 2 minutes of entering the ARP command you must disconnect power from the camera then re connect it to reset the camera You should see some messages saying Reply from 10 177 14 4 or something similar If instead you receive Request Timed Out messages this indicates a problem Please check that the IP addresses you have used are valid for this network and for the IP mask check the connectors etc For more information about IP addresses see the ControlWave Designer Programmer s Handbook document D 125 Assuming the IP address was set successfully you should now be able to type that address into your browser s Address field to call up the web pages in the camera and continue with the configuration Step 3 Assign an IP Address to the Camera Assigning the IP Address for an Axis 2100 Axis 2120 Camera Skip these pages if you have a newer model Axis 210 211 211A camera For this step you will need access to a PC on your network Call up a DOS window and type the following commands at the prompt C gt arp s 5 new P address gt lt serial number lt your PC s IP address gt C gt ping t 5 new IP address gt where 5 new IP address gt is the IP address you want to assign to the web server in the camera Don t type the brackets lt serial number gt is the serial number
17. components that can be damaged by exposure to an electrostatic discharge ESD voltage Depending on the magnitude and duration of the ESD this can result in erratic operation or complete failure of the equipment Read supplemental document S14006 for proper care and handling of ESD sensitive components Remote Automation Solutions A Division of Emerson Process Management 1100 Buckingham Street Watertown CT 06795 Telephone 860 945 2200 Emerson Process Management Training GET THE MOST FROM YOUR EMERSON INSTRUMENT OR SYSTEM e Avoid Delays and problems in getting your system on line e Minimize installation start up and maintenance costs e Make the most effective use of our hardware and software e Know your system As you know a well trained staff is essential to your operation Emerson offers a full schedule of classes conducted by full time professional instructors Classes are offered throughout the year at various locations By participating in our training your personnel can learn how to install calibrate configure program and maintain your Emerson products and realize the full potential of your system For information or to enroll in any class go to http www EKmersonProcess com Remote and click on Educational Services or contact our training department in Watertown at 860 945 2200 Before You Begin This guide is intended to help you get up and
18. gt with the IP address you just assigned to the camera For example http 10 177 14 4 A web page from the camera will appear Skip the Installation Wizard option and instead choose Administration Tools Yj 2100 Heek Camera 7 B L L file Edt Yew Foios Took Heb 1 l 02 22 du 4 5 S amp S Ww iki Dack i Sig maish Hand Seach Print ar Choose Administration Tools TY The Administration Tools page will appear Along the left hand side of the page are links to the various administration options We will discuss the most important ones in this section F Click on the items in the menu to specify various administrative options AXIS ssns sun DUL 19 Step 4 Configure Axis Camera Software Options Specifying the Resolution and Compression Level of the Images On the Image General page you specify the resolution of the images which will be captured by the camera The higher the resolution you specify the larger the file size for each image Also on this page you specify the level of compression for your image files Low compression results in larger file sizes but allows for better image quality High compression results in smaller file sizes but reduces the quality of the images For information on how the image size affects the life cycle of your FLASH memory please see Appendix A Effects of Storing FL
19. improg x 4 1 VBulld A Errors A Warnings A Infos A PLC Errors A Print For Help press F1 12 53 D gt 2GB The function block s name must NOTE Each camera used begin with 5 VIS with a particular controller must have its own Sau Security_Vision function 1222 lotsa Variahle Properties Cancel dl block n addifion the Usage Local Variable Groups 2 5 i VaR 1 F BE TAIN Security_Vision function Defaut di H b Data Type block name you use must Security_Vision Global ariable Groups begin with the characters Initial value E Physical Hardware Sec_Vis H a Controfu ave address Description Show all variables of worksheet 29 Step 5 Configure the Security_ Vision Function Block Configuring the Security Vision Function Block The Security_ Vision function block has several parameters The table below describes what the various parameters mean CAMERA NUMBER INSTRUSION_DETECT MAX_EVENT IMAGES BEFORE EVENT IMAGES AFTER EVENT TEST_FRE INTRUSION_ BYPASS MIN TIME BETVVEEN EVENTS 1 MIN BETVVEEN EVENTS 2 MODE IMAGE COLLECT MODE Data type Explanation Camera INT This specifies the number of the camera The number will be used to locate the appropriate cam_x folder which holds the images for this camera ibDetection This is the digital input wh
20. items you are likely to use For more detailed information on Axis Camera Software configuration please consult the Axis 207 2171 211A Network Camera User s Manual that is included on the Axis Network Cameras Software dt Documentation CD ROM NOTE After configuration to ensure all changes take effect you should power cycle the camera turn it OFF then back ON 11 Step 4 Configure Axis Camera Software Options Defining the Users who will be allowed to Access Images from the Camera You must define a name and password for each person user who will be allowed to view images captured by the camera change administration options etc This is important because you do NOT want unauthorized persons to be able to change the configuration for your own internal security cameras 2 System Options Users AXIS 210 Network Camera version 4 11 sixi File Edit View Favorites Tools Help ay o x f 2 Om O GOD drome 12 A S Address 48 http 120 3 5 64 admin users shtml2basic yesSid 26 EE co Links AXISA AXIS 210 Network Camera Live View Setup Help The root user sers v Basic Configuration iS required and Instructions User List i b d i d 2 Users User Name Jsex Grotp canno Q T Q 2 TCP IP 3 Date amp Time root Administrator a Admini 4 Video amp Image system dministrator y Video 8 Imaqe y Live Vievv Confiq To ad
21. regarding the products or services described herein or their use or applicability RAS reserves the right to modify or improve the designs or specifications of such products at any time without notice All sales are governed by RAS terms and conditions which are available upon request 2010 Remote Automation Solutions division of Emerson Process Management All rights reserved EMERSON
22. running with a minimal amount of effort It does NOT however tell you everything you need to know about setting up and configuring the Security Vision application and the Axis camera hardware and software We have included references throughout this book to other places in the documentation set where you can get more details on a particular subject Throughout your configuration activities please be aware of the following items Shock Hazard Always follow accepted safety guidelines As with all electronic devices improper installation grounding or usage can cause an electrical shock If you have any doubts about how to install ground and use this product safely please consult a qualified electrician Electrostatic Discharge ESD Sensitive electronic devices such as this can be damaged by electrostatic discharge Please follow accepted ESD guidelines If You Need Help If you re having problems setting up and configuring this unit please call our ControlVVave Application Support team at 860 945 2394 or 860 945 2286 for assistance Help is available Monday through Friday 8 00 AM to 4 30 PM Eastern Time excluding holidays and scheduled factory shutdowns Introduction What is the Security Vision Application Introduction What is the Security Vision 1 When Would the Security Vision Application be used 1 How does the Security Vision Application
23. that data back to an operator control center or office which may be miles away Security Vision allows the remote process controller which is already on site performing measurement and control operations to also collect images from one or more security cameras and make them available to operators back at the OpenBSI Workstation in the control center This can provide a useful supplement to other security measures you already have in place at your remote sites intrusion alarms fences etc Introduction What is the Security Vision Application How does the Security Vision Application Work The Axis security camera s are connected via Ethernet to a ControlWave series controller and continually take pictures capture images at a particular frequency specified by the user for example once every minute The images are in JPEG format and are named with the file base name picx where x is the sequential number of the image from that particular camera o Axis camera s periodically capture images of area mages are uploaded to of interest ControlVVave series controller Camera 1 l Pezsipo via FTP over Ethernet line AXIS 2100 08 19 08 18 o Camera 2 17 6 Pg VPeoig 08 17 1 Pic4 jpg 08 16 1 Pic3 jpg 08 15 1 n 2 Images from Camera 1 il j stored in Cam 1 folder 2 T Pic1 jpg
24. the number of the camera You must specify a valid username password combination for this ControlWave controller The Netvvork Address is the IP Address of the ControlWave s Ethernet Port 16 Step 4 Configure Axis Camera Software Options e The Upload Path specifies the folder name used in the ControlWave controller s FLASH memory Each camera which uploads to a particular ControlWave will have a separate folder named cam_x where x is replaced by the number of the camera For example if you have 2 security cameras associated with this ControlWave the upload path for the first one is cam 1 and the upload path for the second one 15 cam_2 The User name and Password must be a valid username and password combination for that ControlWave controller Specifying the Frequency At Which Images Are Uploaded Images are captured and uploaded to ControlWave Security Vision at a scheduled rate so that they are available to users should an event intrusion etc occur The frequency of image capture is important If you don t specify it frequently enough you will likely miss something important If however you specify it too frequently 1 you are capturing images very fast you will run the risk of overburdening communications used for your control system with camera images plus you could overburden the ControlWave controller s FLASH memory For a detailed discussion of how FLASH memory is affected by the nu
25. www EmersonProcess com Remote NOTICE Remote Automation Solutions RAS division of Emerson Process Management shall not be liable for technical or editorial errors in this manual or omissions from this manual RAS MAKES NO WARRANTIES EXPRESSED OR IMPLIED INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE WITH RESPECT TO THIS MANUAL AND IN NO EVENT SHALL RAS BE LIABLE FOR ANY INCIDENTAL PUNITIVE SPECIAL OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO LOSS OF PRODUCTION LOSS OF PROFITS LOSS OF REVENUE OR USE AND COSTS INCURRED INCLUDING WITHOUT LIMITATION FOR CAPITAL FUEL AND POWER AND CLAIMS OF THIRD PARTIES Bristol Inc Bristol Babcock Ltd Bristol Canada BBI SA de CV and the Flow Computer Division are wholly owned subsidiaries of Emerson Electric Co doing business as Remote Automation Solutions RAS a division of Emerson Process Management FloBoss ROCLINK Bristol Bristol Babcock ControlWave TeleFlow and Helicoid are trademarks of RAS AMS PlantWeb and the PlantWeb logo are marks of Emerson Electric Co The Emerson logo is a trademark and service mark of the Emerson Electric Co All other trademarks are property of their respective owners The contents of this publication are presented for informational purposes only While every effort has been made to ensure informational accuracy they are not to be construed as warranties or guarantees express or implied
26. 048 128 And you get 16 for the value of S Determine the Total Number of Images Which Will be Stored in Each Segment 1 Now you need to determine the total number of images which will be stored in each segment The larger the image you save higher resolution lower compression the fewer images you will be able to store in a segment We recommend you take some test images with the Axis camera using various compression resolution settings to settle on a image resolution compression that results in a reasonable image quality that takes a minimum amount of space Once you know the size of the image in kilobytes you can determine the number of images in each segment Once again each segment is 128 KB ie 128 KB Size of image KB So for example 1f each image is 8KB you divide 128 by 8 and get 16 That means that 16 images can be stored in each segment Determine the Total Number of Images Which Will be Stored in FLASH T The total number of images stored in FLASH T is equal to the total number of segments S multiplied by the number of images stored in each segment I 56 Appendix A Effects of Storing Images in Flash on the Life Cycle of Your FLASH Memory T S I So for example if you have 16 segments and each segment holds 16 images multiple 16 by 16 and you get 256 for T Determine the Number of Seconds of FLASH Life Expended for an Erasure Operation N Each time an erasure occurs in FLASH a portion o
27. AM event_4 File Folder 6 23 2006 10 17 4M 00001 File 6 23 2006 10 23 AM 129 pict t z File 6 23 2006 10 23 AM 00003 File 6 23 2006 10 23 4M 12 00004 i File 6 23 2006 10 24 AM gt Search this computer for files Change preferences 40 Security Access Card Reader Application Security Access The Security Access application provides a mechanism for a ControlWave series controller to control and manage one or more proximity card readers The card readers limit access to a particular area to only those users with valid security cards When a person wants to enter a door they pass their security card or key fob in front of the card reader Data from the card is read by the card reader and sent to the ControlVVave controller The controller checks its security database to verify that the card is valid if it is the ControlVVave sends a message back to the card reader to unlock the door If the card is invalid an Access Denied error message is generated and the door remains closed Card reader data is sent to Controlwave Security_ Access function block s checks for validity of card OPERATIONS CENTER AUTHORIZED PERSONNEL ONLY m sonas Card Reader card is valid UNLOCK User passes access card message is sent to door or access key fob in front of sonas Card Reader uu access access card key fob The Security Access application may be used in conj
28. ASH Images on the Life Cycle of Your FLASH memory 23 Axis 2100 Network Camera 2 31 Microsoft Internet Explorer File Edit View Favorites Tools Help Q F 4 51 3 w tree Back Forward Stop Refresh Home Search Favorites History Mail Print Edit Address http 120 0 77 4 admin img general shtml Go Favor X pat oe Image General Snes CAMERA aL M Appearance Da 7 Images single Omoson The greater the resolution EE the greater the file size P External Rotation Normal 41 e Applications 22 gt Operation Compression Low 8 kB zi E D Brightness fe 0 15 m F m G White Balance Automatic a Low compression means higher n Elan file sizes but better picture quality eto Heading High compression means smaller EM m file sizes but reduced picture quality N Date No ves Time O No 24 12h 21 d Front LED flashes on image display E R Flashing Enabled No ves l 215 Flash Frequency E 0 15 __ Click on Save when you ve made er Default viewer for Internet Explorer your cholces 2 Viewer activex Java Applet l ar er T w AXISA zl 4 Internet 20 Step 4 Configure Axis Camera Software Options Viewing Changing the IP Address You Assigned Earlier On the Netw
29. CCESS function block is 7 707 SECAT responsible for controlling a single Isonas card reader you have multiple card readers for this ControlVVave you must configurea gt o separate ACCESS function block for each card reader function MUN block instance name must begin vvith Pei cae SEC ACC OpenDoorD11 1 We will briefly discuss parameters for the H SECURTITY ACCESS function block You mil should also consult the online help in ControlVVave Designer DoorID INT This input is the address of the Isonas Card Reader The address is located on a data plate of the card reader and must be unique per Control Wave port PortNum INT This input is the ControlWave serial Port number used to communicate with the Isonas Card Readers For example 1 would be used for COM 2 for COM2 etc The serial port must be configured as a Generic Serial Port with a baud rate of 9600 DINT This input is the frequency at which the ControlWave 42 Security Access Card Reader Application controller requests data from the card reader Generally this should be set equivalent to the cyclical task rate and the task rate should be executed DoorRelayTimeout I This input is the amount of time the door open relay will remain energized after the Security_Access function block allows entry or either the REX AUX or OpenDI pa
30. F server IP address ie Set manually Date 2003 08 06 yyyy mm ddi Time hh mm ss 22 Step 4 Configure Axis Camera Software Options Defining the Users who will be allowed to Access Images from the Camera You must define a name and password for each person user who will be allowed to view images captured by the camera change administration options etc This is important because you do NOT want unauthorized persons to be able to change the configuration for your own internal security cameras Define the users who can view the image or change the configuration AXIS 2100 System Users NETWORK CAME RA Users root ABS Applications New User Operation F Layout Wizards R R Installation assword P Application Werity Support User Rights Admin Dial in C view i Help Home Kok F F L R AT 23 Step 4 Configure Axis Camera Software Options Specifying Sequential Mode on the Operation Selection Page You must choose Sequential Mode That is because the Security Vision application sequentially takes pictures even if no security event is currently happening so that if an event does occur it may capture images both before and after the event You must choose Sequential Mode Operation Selection Select one of the following modes of operation to define whether you want to upload pictures
31. SP REAL Specifies the frequency in milliseconds at which the function block will check to see if the camera is sending new messages ibAuthorizedEntry BOOL If FALSE nMinTimeBetvveenEvents 1 will be used to specify how frequently events are logged immediately following a trigger If TRUE 1MinTimeBetweenEvents_2 will be used to specify how frequently events are logged immediately following a trigger You might for example want to prevent events being triggered during the regular workday since authorized people are present and regularly tripping motion sensors etc To do this you could create logic to set ibAuthorizedEntry to TRUE during regular working hours and then at the end of the day set it to FALSE For whichever time is active if a positive value is specified for that number of seconds after an ibDetection edge trigger any subsequent edge triggers will be ignored If zero is specified subsequent edge triggers are processed normally depending on the value of obBusy If a negative Min TimeBetvveenEvents 1 These parameters allow you to specify in seconds tvvo separate times for hovv frequently events are HMin TimeBetvveenEvents 2 logged immediately following an event trigger via ibDetection This may be used to prevent additional events from being created for the same intrusion incident It may be desirable for example to prevent event triggering while authorized people are working on site 1 an authorized en
32. User Manual Document D5126 Part D301427X012 m ControlVVave Security Vision Application User s Guide 08 19 Camera 1 Pic23 jpg 08 19 08 18 1 Pic5 ipg Pic6 jpg Camera 2 i 1 Pic4 jpg N 08 16 1 Pic3 jpg 08 15 1 Pic2 jpg 08 14 1 Pic jpg 5 EMERSON Remote Automation Solutions www EmersonProcess com Remote IMPORTANT READ INSTRUCTIONS BEFORE STARTING Be sure that these instructions are carefully read and understood before any operation is attempted Improper use of this device in some applications may result in damage or injury The user is urged to keep this book filed in a convenient location for future reference These instructions may not cover all details or variations in equipment or cover every possible situation to be met in connection with installation operation or maintenance Should problems arise that are not covered sufficiently in the text the purchaser is advised to contact Emerson Process Management Remote Automation Solutions division RAS for further information EQUIPMENT APPLICATION WARNING The customer should note that a failure of this instrument or system for whatever reason may leave an operating process without protection Depending upon the application this could result in possible damage to prope
33. _name If you enter this for a door definition it means that a person in a group assigned to this door can use their card at any card reader that has this door_name configured in the SECURTTY ACCESS function block no matter which ControlVVave controller the card reader 1s connected to RTU_name ANY If you enter this for a door definition it means that a person in a group assigned to this door can use their card at any card reader connected to the ControlWave named RTU_name These ANY door wildcards are useful because they reduce the amount of configuration you have to perform and also reduce configuration file sizes allowing faster updates to the system if you have slow communication lines You can enter a textual description of the door in the Description field 49 Security Access Card Reader Application The Controller ID is a number identifying the card reader that must be unique for each server subnet You cannot re use this number on a different door in the system since each card reader can only handle a single door The Controller D must be a positive integer The other items should be left at their default values Click on OK when finished The door icon will now appear in the left window pane Repeat for each additional door that has a card reader Step 5 Define Which People Will Be Using the Card Readers Each person who will be entering the door s controlled by one of the Is
34. aa lak ay uaa qaabalkdanada 28 Getting the Security Vision POU into your ControlWave Designer Profect 28 Adding the Security Vision POU as a User Library into your Project 28 111 Introduction What is the Security Vision Application Configuring the Security_Vision Function 30 Step 6 Viewing Collected Images in OpenBS 33 Starting the Security Vision utility on the OpenBSI Workstation 34 Using the Security Vision Main Window pastatecctassnssnsndaseccccasnaionadasixnscsueresabendsnecsnuexcaninianenteans 34 Viewing the Images Associated with a Security 35 To See alisto All 36 Using the Security Vision Options Dialog BOX 37 Manually Cycling through the images in an Event 14 38 Adding Nodes to the Security 39 Removing a Node from the Security Vision 39 Pee 0 D bb 39 ou n Reader C D RAR Ra aldad Ansi 41 Configuring the SECURITY_ACCESS function DUL Dd d d 42 Configuring the Security Database in Isonas Crystal Access Administration Software 45 Re i aioe eel m 45 ot mer Lompe and EXDOTUUULODN xn aa a alda 46 Step 3 Define a Server
35. connect an Ethernet cable to the camera and then connect the cable to a network hub of your OpenBSI network Is the external power supply connected to the camera and is it powered on Did you assign an IP address to the camera using the arp command After assigning the IP address to the camera were you able to type that address into your browser to bring up the camera s internal web page From the internal web pages did you set up the administrative options including Resolution and compression level of images Correct system date and time Users for the camera Mode of operation You must specify Sequential Mode Frequency at which images are captured Upload parameters These determine how the images get uploaded from the camera into the ControlWave controller Did you enable the camera application software after you configured the parameters This is 59 Appendix B Troubleshooting Checklist a critical step if you don t enable the application the configuration settings won t take effect Remember also that if you make configuration changes while the application is already running you must momentarily disable the application and then re enable it for the changes to take effect In ControlWave Designer did you open the Security_Vision ZWT file build it and save it as a library MWT file Did you include the Security_Vision MWT library in your ControlWave project Did you insert Security Vision fu
36. d a user 5 gt Event Configuration click on Add y System Options Add Modify Remove About User Settings Enable anonymous viewer login no user name or password required Maximum number of simultaneous Motion JPEG viewers limited to 20 max 20 subsequent viewers will see a blank image Save Reset x BB 0 iinteme o http 120 3 5 64 System Options User Suny m ik User Setup User name FRED Password CU Confirm password User group s Operator Administrator OK sncel Internet 2 Enter the name of the new user Choose a password for the user and enter it in both of these fields Choose the privileges of the user Click on OK when finished After you have defined the user click on the Save button to save the changes 12 Step 4 Configure Axis Camera Software Options Viewing Changing the IP Address You Assigned Earlier On the TCP IP Settings page you can view change the IP address you assigned to the camera in Step 3 You should leave these settings at their defaults AXIS TCP IP Settings IP Address Configuration v Basic Configuration Instructions 1 Users 2 TCP IP 3 Date amp Time 4 Video amp Image C Obtain IP address via DHCP Use the following IP address IP address gt Video amp Image Subnet mask y Live View Config Defaul
37. e workstation Delay between images when displaying This is the period of time in seconds that an image ee econds Image Storage Folder Image File Prefix from an Event folder will be displayed on the screen before the next image in sequence will be shown instead This is the root path on the OpenBSI Workstation where event folders will be created for storing images uploaded from the Control Wave 18 the prefix used for naming images stored at the RTU If desired you can specify a different prefix for the image names of images stored on the PC workstation To do so specify the new name in the Image File Prefix field NOTE This field CANNOT be used to change the prefix name of images down in the ControlWave 37 Step 6 Viewing Collected Images in OpenBSI Door Input Folder Time interval to check for Door Input changes Download Door Info to RTUs on startup Isonas Configuration Program This is the folder where the door configuration file exists If a folder name is specified here the door files may be downloaded to all RTUs This is the rate in seconds at which Security Access will check the door input folder for changes in the door configuration The security database generated by the Isonas configuration software Crystal Access Administrator software or other must be downloaded to RTUs that host doors If you check this box the security database will be downloaded automatical
38. e you have a low speed BSAP network you must be aware that automatic image transfers may affect the overall performance of your process control network To improve performance in a situation like this you may want to consider transferring images only on an on demand basis See the section on configuring the Security Vision function block for more information The Axis Network Camera is our standard offering Users can use virtually any Internet capable camera provided that it can use File Transfer Protocol FTP to upload images Step 1 Install the ControlWave series controller The ControlVVave sertes Controller must be installed on site added to the OpenBSI network as either a BSAP or an IP node and it MUST have an Ethernet port configured which will be used to communicate with the camera s Procedures for the ControlWave Process Automation Controller Installation procedures for the ControlWave are described in detail in manual C7 ControlVVave Also see the ControlWave Quick Setup Guide document D5084 for a quick overview of the installation process including software setup Procedures for the ControlWave MICRO Process Automation Controller Installation procedures for the ControlWave MICRO Process Automation Controller are described in detail in manual C7 ControlVVaveMT CRO Also see the ControlWave MICRO Quick Setup Guide document D5124 for a quick overview of the installation process including software setup S
39. e Settings Current Server Time Date 2005 09 30 Time 15 39 41 New Server Time V Automatically adjust for daylight saving time changes Time mode Synchronize with computer time Time 15 31 43 Date amp Time Format Used in Images Predefined YYYY MM DD 2 Ovm eer ve 24h 7 With resolution Specify time format predefined 1 second zl E Ovm Save Reset Specify date format 14 Step 4 Configure Axis Camera Software Options Specifying the Resolution and Compression Level of the Images On the Image Settings page you specify the resolution of the images number of pixels used which will be captured by the camera The higher the resolution you specify the larger the file size for each image Also on this page you specify the level of compression for your image files Low compression results in larger file sizes but allows for better image quality High compression results in smaller file sizes but reduces the quality of the images For information on how the image size affects the life cycle of your FLASH memory please see Appendix A Effects of Storing FLASH Images on the Life Cycle of Your FLASH memory AXISA AXIS 210 Network Camera Live View Setup Help v Basic Configuration Instructions 1 Users 2 TCP IP 3 Date amp Time 4 Video amp Image y Video amp Image gt Live View Config gt Event Configuration gt System Options Abou
40. e available for viewing until all images associated with the event had been stored in the Event folder In other words saving too many images over a long period of time could delay your response to a particular security event Username and Password must be consistent between RTU and Workstation The Security Vision application requires that the username and password combination used to sign onto the ControlVVave MUST MATCH the username and password combination used to log onto the OpenBSI Workstation If this is NOT true errors will be generated in the Actions pane of the Security Vision application Once the Digital Input triggers a security event images from before the event are placed in an Event folder and a certain number of images defined by the user from the period after the event are also placed in the event folder When the complete set of images are in the folder an alarm is generated to notify users at all OpenBSI Workstations configured as alarm destinations that a security event has occurred and a copy of the Event folder is sent to those OpenBSI Workstations The alarm about a Security event is displayed in the Security Vision application running at the OpenBSI Workstation 33 Step 6 Viewing Collected Images in OpenBSI Starting the Security Vision utility on the OpenBSI Workstation Before you can start NetView must be running with the current NETDEF files for your network To start the Security V
41. eady to be sent to the ControlWave units Downloading the Security Database to the ControlWave Controller The final step in configuring the Security Access application is to download the contents of the Security Database to the ControlWave controller The Isonas Crystal Access Administrator creates a database that resides in three separate files called in the Isonas LiveDB folder ACCESS CSV CONTROL CSV and PEOPLE CSV Do NOT attempt to edit these files OpenBSI Security Vision will generate two additional files based in the information in these called DOORS TXT and RTUNAME TXT To download the Security Database click on Command gt Download Door Info in the OpenBSI Security Vision application and the DOORS TXT and RTUNAME TXT files will be downloaded to the ControlWave NOTE Prior to OpenBSI 5 8 DOORS TXT contained door information for all RTUs beginning with OpenBSI 5 8 it only includes information for the current RTU receiving the security database Click on Command gt Download Door Info Z Folders Security Vision 2 0 File View Command Window Help FRoNT_oooR 54 Appendix A Effects of Storing Images in Flash on the Life Cycle of Your FLASH Memory Your ControlWave controller contains 8MB of FLASH Memory This FLASH memory is used for the following purposes e 4MB is used to hold the System Firmware code which governs the internal operations of the ControlVVave The remaining 4MB can contain the f
42. f the life cycle of the FLASH memory is expended To determine this time multiply the total number of images in FLASH T by the frequency F at which the unit is updated with a new image The frequency of updates F is in seconds N T F For example if you have 256 images in FLASH T and you are collecting new images at a frequency F of one new image every 5 seconds multiply 256 5 1280 Determine the Life Expectancy in Years Y of The FLASH Memory Based on the Number Size and Frequency of Images Now the big question what is the life expectancy of my FLASH memory when I use the Security Vision application NOTE Once again we must stress that these calculations only take into account the affect of camera images on the FLASH memory they do NOT factor in the affect of historical data updates web pages writes or any other items in FLASH The specification for the FLASH memory used in the ControlWave is 1 000 000 erasure operations To determine the life expectancy multiply 1 000 000 by N the amount of FLASH life expended by an erasure then divide it by the number of seconds in a year 30 758 400 Y N 1 000 000 30 758 400 57 Appendix A Effects of Storing Images in Flash on the Life Cycle of Your FLASH Memory So if the size of your images is 8KB each and you re using 2048KB of FLASH for images and the camera is storing a new image in the unit every 5 seconds then your value for N is 1280 and
43. fter the event was triggered and stores them in a separate Event folder When all images associated with the event have been copied Operators at the OpenBSI Workstation are notified and can then view the images associated with a particular event and take appropriate actions GD Unauthorized person triggers motion sensor or intrusion alarm at 7 23 42 Camera 1 2 4 DiGITAL input DI turns TRUE and Security_ Vision POU in the Cam 1 ControlWave controller declares T a security event z gt DIGITAL INPUT wo IS un 07 23 27 07 23 32 07 23 37 07 23 42 07 23 47 07 23 57 07 24 02 07 24 07 il im il Pic73 jpg Pic74 jog Pic75 jog Pic 76 jog Pic77 jpg 7 8 Pic79 jog Pic80 jpg 07 23 32 07 23 37 07 23 42 07 23 47 07 23 57 ii AA s Contents of m an EVENT folder EVENT FOLDER 4 Picl jog Pic2 jpog Pic3 pg g O For each camera associated with the Digital Input an Event Folder is generated and a pre defined number of images from that camera from both before and after the event was triggered are stored in the Event folder In this case 2 images before and 2 after are stored NOTE PIC numbers are re numbered for files in the Event folder Operators at the Open BSI Workstation receive notification
44. h will serve as the user library needed for Security Vision You can start your project with this file More likely you already have an existing project which performs some measurement and control operations and you want to add the Security Vision POU to that project To do that you must add the Security_Vision MWT User Library into the existing project see the next section Adding the Security Vision POU as a User Library into your Project s Contro ave Designer Untitled In your project in File Edit View Project Build Onine Extras 2 Control Wave Designer ln zz ey Saar right click on the ia m a m l gi w g 30 s A A Libraries item in the project tree and choose TA Right click on the Libraries Insert gt Library from the item in the project tree then D pop up menus Der choose Insert and Library from the pop up aj RTU_CFG IPC_33 Sa RTU_RESOURCE Control ave menus Tacks Choose the Security Vision mwt Lookin Gy Projects 7 tel esi Choose the 7 SMe m Security Vision J Security Vision project then click on teehee project as the Include to insert it into f Security Vision mat a library you want your project to insert then click on Include File name Security_Vision mut Include oe Files of type User Library F m t
45. ich triggers a security event When a security event occurs an Event folder is created and images from both before and after the time of the event are stored Typically the digital input used for this parameter would be from an intrusion alarm or motion sensor The trigger may be either a rising or falling edge as chosen by the ibDetectionMode parameter While the obBusy parameter is TRUE subsequent edge triggers are BUSY TRANSFERRING FILES GETTING PICTURES INTRUSION DETECTED OUT ignored Once an edge trigger occurs subsequent triggers will be handled according to the 1MinTimeBetweenEvents_n parameters NOTE The ibDetection transition should be a single pulse and then should be reset It is the responsibility of the programmer to include this logic in the project 11Folders This defines the maximum number of event folders that can be saved IMPORTANT When all event folders have been used and a new security event occurs the oldest event folder will be overwritten to save images for the newest security event 30 Step 5 Configure the Security Vision Function Block Parameter Name an type Explanation u This specifies the number of images that should be saved in the Event folder from immediately before the security event was triggered 1PostImages This specifies the number of images that should be saved in the Event folder from the period after the security event was triggered irCameraTest
46. ision utility click on Start gt Programs gt OpenBSI Tools gt Utility Programs gt Security Vision Using the Security Vision Main Window The Security Vision main window will appear Network Tree shows Actions window pane reports all RTUs which have Security Event alarms and other been included in the messages about the Security Vision Security Vision system EH Folders Security Vision File View Command Window Help application aE 22 06 20 2004 14 10 00 1 08 20 2004 14 20 00 1 08 20 2004 13 40 00 ow EZ 1 08 20 2004 13 50 00 Individual Event folders hold images associated with a particular Security event Folders are named based with the timestamp of when the event occurred To view the images double click on the folder 34 Step 6 Viewing Collected Images in OpenBSI The Security Vision utility main window is divided into two parts The left hand window pane shows a tree of all RTUs which the user has identified as being equipped and configured for the Security Vision application If you click on the plus sign under an RTU icon any Event folders which have been generated at that RTU will be displayed Each Event folder holds images associated with a particular Security Event The event folders are named with the timestamp from the digital input DI alarm associated with the event in the format mmddyyyy hhmmss Where mm isthe month dd is the day yyyy 15 the year hh is the ho
47. ld overburden the Control Wave controller s FLASH memory For a detailed discussion of how FLASH memory is affected by the number and frequency at which images are stored see Appendix A Effects of Storing FLASH Images on the Life Cycle of Your FLASH memory Here you specify how often the camera will capture an image Sequential Operation Scheduler Settings Choose whether to take images at a regular frequency or at different frequencies within a mac Primary or Secondary Time window and optionally establish a digital input pre condition that b Network must be satisfied before the AXIS 2100 can fake Afotures F System F External devices Primary Time Applications Primary Time Enabled F Operation ie Alape Selection Schedul EI m Restricted between Enable Layout Start JOS hour 30 min Wizards Stop 15 hour 142 min Installation Application Support Primary Image Frequency Help Every tenths of sec i Home l seconds M Mon M Tue M wed M Thu F Fri L sat Ll sun Take Pictures regardless of input only when input is high only when input iz low A Every li minute s Every Secondary Time Secondary Time Enabled Applies only outside the above restrictions Secondary Image Frequency Take Pictures Ewer tenth s of sec Every seconds Every 1 minutafz Every hourls regardless of input only when input is high only
48. ler to the Security Vision application click on File gt Add Nodes or click on New Nodes Add the Add Node icon shown above Cancel The Add Nodes dialog box will appear Click on the node you want to add so that it is highlighted then click on the Add button To add multiple nodes hold down the Ctrl key as you select the nodes then click on the Add button To add multiple nodes which are adjacent to each other in the list of nodes select the first node then hold down the Shift key then select the last adjacent node then click on the Add button Removing a Node from the Security Vision Application To remove a node from the Security Vision application which will delete all its associated Event folders from this OpenBSI Workstation click on the node in the tree of nodes then click on File gt Remove Node or click on the Remove node icon shown above Al Deleting an Event Folder To delete an Event Folder from this OpenBSI Workstation click in the tree on the folder you want to delete then click on the Delete Folder icon shown above or right click on the folder and choose Delete Folder from the pop up menu To delete all folders associated with a particular camera right click on the camera icon and choose Delete All Folders from the pop up menu 39 Step 6 Viewing Collected Images in OpenBSI e ftp 10 16 0 101 cam 1 Microsoft Internet Explorer view Favorite
49. ly when you start the Security Vision application This is provided in case Isonas changes the name of the executable program used to generate the security database The default name is isonas exe If this happens use the Browse button to specify the name and location of the new executable Click on OK when you have finished making changes or Cancel to abandon the changes Manually Cycling through the images in an Event Folder If you turn off the automatic cycling of images from the event folder by setting Delay between images when displaying parameter in the Security Vision Options dialog box to 0 you can manually cycle through the images one at a time by clicking on the directional controls in the toolbar NOTE These controls are only available when the delay parameter mentioned above is otherwise they are grayed out folder folder ui ii i in the current Event folder Click on this icon to display the first image earliest by timestamp in the current Event Click on this icon to display the last image newest by timestamp in the current Event Click on this icon to display the previous image in sequence as determined by timestamps in the current Event folder Click on this icon to display the next image in sequence as determined by timestamp 38 Step 6 Viewing Collected Images in OpenBSI Adding Nodes to the Security Vision Application To add a ControlWave series control
50. mber and frequency at which images are stored see Appendix A Effects of Storing FLASH Images on the Life Cycle of Your FLASH memory To configure the capturing of the images you need to create a scheduled event From the Event Types page click on the Add scheduled button Add a Scheduled Event AXISA AXIS 210 Network Camera Live View Setup Event Types Event Type List gt Basic Configuration y Video amp Image 5 g Trig Sched Actions Stats Enabl Priority Inacti gt Live View Config v Event Configuration Instructions Event Servers Event Types Port Status gt System Options Add triggered Add scheduled Modify Remove About upload Hu HTTP upload Eu Email upload O Output port En Email notification Hn HTTP notification Tn TCP notification 17 Step 4 Configure Axis Camera Software Options R x 2 http 120 3 5 64 Event Configuration Scheduled Event Type Setup AXIS 210 Network Ca Scheduled Event Type Setup General Name New Event Priority Activation Time O Always C Recurrence pattern Sun iz Mon T Tue a Wed T Thu 0 Fri p Sat Start time fc 0 00 Duration E 0 00 max 168 00 hours Never event type disabled When Activated 22 Upload images Select upload type FTP X Upload to FTP server Primary NewFTPServer Y 1 Secondary Upload for seco
51. me called the Door Name The door name must consist of the ControlWave controller s RTU name as defined in NetView followed by an explanation point and then the name of the door exactly as configured in the Security_Access function block in the ControlWave NOTE The door name is case sensitive DOORS doors and Door5 would all refer to different doors Two doors have been For example if you have a ControlWave controller with a defined for this system node name of RTU and it controls two card readers to which you have given the names of FRONT_DOOR and ee i es REAR DOOR in Security_Access function blocks you must assign door names of RTU1 FRONT_DOOR RTUI REAR_DOOR Door ID Door Name NOTE You can re use the names FRONT DOOR and REAR_DOOR with another controller but the combination of the node name RTU with either of those names cannot be repeated for a different card reader s Door Name IMPORTANT If you have a large number of doors and there are certain doors that can be opened by any user or all doors can be opened by any user there are three special door definitions that you can use instead of defining each and every door ANY IANY If you enter this for a door definition it means that a person in a group assigned to this door can use their card at any door at any RTU in the system If that s what you want this is the only door you need to define ANY door
52. n however will not indicate a edge transition when obBusy is TRUE or if uMinimumTimeBetweenEvents timers are counting 32 Step 6 Viewing Collected Images in OpenBSI IMPORTANT NOTES Specifying Alarm Destinations In order to view security events from the camera s your OpenBSI Workstation must have been configured at the Network Host PC NHP to be one of the four 4 valid alarm destinations for the RTU hosting the camera s Alarm Destinations are configured in the Network Wizard when you are creating your OpenBSI Network For information on this see Chapter 6 of the OpenBSI Utilities Manual document D508 1 Delay between Event Trigger and Report of Security Event Because the alarm message from the Security Vision function block is NOT sent until the full set of images for the security event are ready users should carefully consider how many images they capture and how frequently they capture them If for example the user specifies that they want to save 15 images after the security event is triggered and images are captured every minute it will be 15 minutes before the alarm is sent reporting the event occurring because images associated with the event are still being collected during the intervening minutes If the digital input used to trigger the Security Event was an alarm variable that alarm would be reported earlier through the systems normal alarm reporting mechanism but the actual images still would not b
53. nable page devices Applications F Operation Selection Scheduler Upload Enable i Layout Wizards Installation Applicaton Support Help F Home m AXIS 2100 Operation Enable NETWORK CAMERA After making your settings in the scheduler and upload pages enable the application by clicking the button below If there is another application already enabled and you have made changes to your settings click first on the Disable button and then on the Enable button The application s current status is shown above the buttons Co frent status of the application is displayed here Application iz enabled 2 Mote Fefer to the product Support pages if you should encounter any difficulty in configuring or installing your product You must Enable the application for the camera in order for it to capture any images ns ii ii Liki EA TIONG 27 Step 5 Configure the Security_Vision Function Block Getting the Security Vision POU into your ControlWave Designer Project As part of the ControlWave Security installation the Security_Vision ZWT file will be loaded from the CD ROM onto your OpenBSI Workstation You must open this file in ControlWave Designer and then build it using the Build gt Make command in ControlVVave Designer Then use the File gt Save Project As Zip Project As to save the project with the name Security Vision MWT This will generate an MWT file whic
54. nce Number Suffix Up To Specified Maximum s OD la 3 ET ED EE You must choose Network Sequential Operation Upload EA peme You must choose FTP Comet __These items all refer to the b ControlWave controller which r 55 a hosts this camera Dre tela tee Winer __ This is the folder in FLASH memory F Hele Us ten i es at the ControlWave where images R B will be stored h d guste ee n y m FET E oua You must use Pic as the 2 T re base filename nnen You must choose Sequence Number M Suffix Up To Default Maximum or ae 000 Sequence Number Suffix Up To Z Sequence Humber Baia Up Ta Epatifind Mariaani 20 0 4 es E Specified Maximum ve gage fer yow charged th tibi offends 26 Step 4 Configure Axis Camera Software Options Activating your Choices by Enabling the Application The camera application software must be enabled in order for the choices you have made with the administration tools to be activated IMPORTANT Because the camera application software only reads the administrative parameters when it is started if the camera application software is already enabled running you will need to momentarily disable it and then re enable it for the changes to take effect The application is enabled disabled from the Operation E
55. nction blocks in your ControlWave project for each camera hosted by this ControlWave and did you configure them properly Does the name of each Security Vision function block start with Sec_Vis Did you define each workstation running the Security Vision application as an alarm destination for the RTUs hosting the camera s Within the Security Vision application running at the OpenBSI Workstation did you add a node via File gt Add Node for each RTU hosting security camera s 60 User Manual D5126 ControlWave Security Vision May 2010 Emerson Process Management Remote Automation Solutions 1100 Buckingham Street Watertown CT 06795 Phone 1 860 945 2262 Fax 1 860 945 2525 www EmersonProcess com Remote Emerson Process Management Remote Automation Solutions 6338 Viscount Rd Mississauga Ont L4V 1H3 Canada Phone 905 362 0880 Fax 905 362 0882 www EmersonProcess com Remote Emerson Process Management SA de CV Calle 10 145 Col San Pedro de los Pinos 01180 Mexico D F Mexico T 52 55 5809 5300 F 52 55 2614 8663 www EmersonProcess com Remote Emerson Process Management Ltd Remote Automation Solutions Blackpole Road Worcester WR3 8YB United Kingdom Phone 44 1905 856950 Fax 44 1905 856969 www EmersonProcess com Remote Emerson Process Management AP Pte Ltd Remote Automation Solutions Division 1 Pandan Crescent Singapore 128461 Phone 65 6770 8584 Fax 65 6891 7841
56. nd s Upload as long the event is active Maximum possible fzo per minute aj Desired image frequency Base file name pic C Add date time suffix Add sequence number suffix no maximum value Overvrite Use ovm file format See help for more information Use event specific image settings Image Settings a ctivate output port J send email notification Send HTTP notification to zi You must choose Add sequence number suffix up to value then start over and chose how many images to save before wrapping around and overwriting old images This should typically be 20 Because the camera is always uploading new images to the ControlWave controller you should choose Always You need to upload images via FTP to the ControlWave which is your FTP server You need to upload as long as the event is active which is all the time since the camera uploads images continuously Exercise care when choosing the frequency at which images are uploaded Click on OK when you have finished defining the scheduled event 18 Step 4 Configure Axis Camera Software Options Configuring Camera Software for Axis 2100 Axis 2120 Skip these pages if you have a newer Axis 210 211 211A camera In the browser on your PC type the following on the Address line http lt camera s new IP address gt where you replace 5 new IP address
57. nfigure Axis Camera Software Options Configuring Camera Software for Axis 210 211 211A Skip these pages if you have an older model Axis 2100 2120 camera The different camera configuration pages are accessed via links on the left hand side of the page To access the different pages to configure the camera click on the links in the menu on the left hand side of the screen i Basic Configuration Basic Configuration AXIS 210 Network Camera version 4 11 File Edit View Favorites Tools Help O Back gt x E A 42 Search Sve Favorites 42 rel 2 Address 2 http 120 3 5 64 operator basic shtml AXIS 210 Network Camera Live View Setup Help Tr ie v Basic Configuration Basic Configuration Instructions Before using the AXIS 210 Network Camera there are certain settings that should be 1 Users made most of which require Administrator access privileges To quickly access these 2 TCP IP settings use the numbered shortcuts to the left All the settings are also available from 3 Date amp Time the standard setup links in the menu 4 Video amp Image Note that the only required setting is the IP address which is set on the TCP IP page All other settings are optional Please see the online help for more information r Video amp Image Software version 4 11 r Live View Config r Event Configuration r System Options About v Eo fig internet NOTE This section highlights the
58. nsert to add a new group Management New Group REX Sensor Staff 14144 417 bee xi Another zuuyi 25562 Hainer hael alne Radicella 104 Delete Insert Change Delete Members Select Close 21 Security Access Card Reader Application Enter a name in the Group Name field We made up a name called PLANT STAFF 2 To create a group click on Insert to add group Anaa Grene rame Record name then enter the Group Name in the Adding a Group Name Record dialog box and click on OK Group Name PLANT STAFF Click on OK when done Now that you have your new group defined you need to assign people to the group With the name of your group highlighted click on the Insert button on the right side of the dialog box The new group now appears in the list of groups ISONAS Crystal Access Cubic EN System Administrator Version 10 02 02 Applicaton Network Calendar Doc People Rights Biles Reoorts Window Hep A GROUPS Another Group AL Button BEI xj Management tajaa 2 Members Close Select With the group name highlighted click on Insert to add people to the group Enter the Employee ID number and click on OK Now enter the employee ID number of a person you want to add to this group and click on OK 22 Security Access Card Reader Application
59. of event and can view images on the Open BSI Workstation N M 3 Introduction What is the Security Vision Application What is included in the Security Vision Application Package The Security Vision Application consists of the following components e Axis 210 211 211A Network Camera includes Axis camera software CD ROM and Installation Guide If used outside the Axis camera must be in a proper outdoor enclosure NOTE ControlWave Security Vision also supports older Axis Model 2100 2120 cameras the 2100 model is for indoor use only the 2120 model can be used outdoors when installed in a proper enclosure Network Hub for camera Cables OpenBSI software CD ROM includes Security Vision software ControlWave series Controller unless purchased separately What if want to use a different brand of camera If you purchase the Security Vision application without the Axis Network Camera and choose to use a different brand of camera the camera you choose must be able to send images to the ControlWave series controller via File Transfer Protocol FTP Before You Begin You must have a working process control network in which one or more OpenBSI Workstations communicates with ControlWave series controller s either via IP or BSAP IMPORTANT When using Security Vision you must consider how much bandwidth will be consumed by transferring images on the network If for exampl
60. ollowing items e Historical Data most users choose to store historical audit and archive data in FLASH memory e Zipped copy of the project ZWT e Boot project e Images from the Security Vision application The amount of FLASH memory you use and the frequency at which it gets erased affects the life cycle of the FLASH memory The following calculations can be used to calculate how FLASH memory is used when storing images from Security Vision and its affect on life cycle of the FLASH NOTE These calculations only take into account the affect of camera images on the FLASH memory they do NOT factor in the affect of historical data updates or any other items in FLASH Appendix A Effects of Storing Images in Flash on the Life Cycle of Your FLASH Memory Determine the Number of Segments of FLASH which will be used for Images S FLASH memory is erased written to one segment at a time so first you must determine the number of segments of FLASH memory which will be used for storing images from the Security Vision application Each segment is 128 KiloBytes also can be written as 128KB or just 128K of memory So for this calculation divide the total amount of FLASH memory you want to use for images from the camera by 128 S Total amount of Flash memory to be used for images 128 So for example if you want to reserve 2 megabytes 2 048 KB of FLASH memory for images from the camera divide 2048 by 128 S 2
61. onas card readers must be identified for the system To define people click on People gt People Badges xi D Name Badge ID Badge Expiration Image Special Recalled Badges Image Directory C ISONAS LiveDB Images mea zi People potion Ferameters FirstName Mj ID SSN Latch User i 1000 000 00 0000 Burkley Dick 101 455 32 8791 Partner Matsumoto Roger 103 D 00 0000 Radicella Michael 104 388 77 2634 Vice President Hafner Jill 2 105 000 00 0000 Jones Shirl 106000 00 0000 0 Chapman Kris 112 000 00 0000 0 Radicella Jennifer 1201000 00 0000 0 Grayson Jon 121000 00 0000 0 Cury ra 1234124 00 00 0000 Manning Tim C 124000 00 0000 Shonkowski Kris 1355 000 00 0000 Brandon 222 000 00 0000 R HR CARL 3331000 00 0000 Roark Chris 34229 000 00 0000 REX 4294967291 000 00 0000 0 AUX 4294967282 000 00 0000 Fadicella alt Michael 43613 00 LOCK 4336 000 00 0000 0 Select Image NORMAL 5O073 000 00 0000 Hilburn Bill 56781000 00 0000 7445 000 00 0000 Groups to which selected person belongs ld aa a 2 gt oe oe Close Click on Insert A list of all people defined in the system will appear or the list will be empty if this is the first time you are adding people 50 Security Access Card Reader Application Click on the Insert button
62. ork TCP IP page you can view change the IP address you assigned to the camera in Step 3 Here you can verify the IP address you assigned earlier Other parameters should be left at their defaults Network TCP IP NETWORK CAMERA Set IP Address Automatically Protocol F Enable Bootp Enable DHCP Set IP Address Manually Motific ation a System IF Address 120 0 77 4 pee External devices Subnet Mask 255 0 0 0 Applications Default Router i2011 Operation P Layout Host Marne anisPreduct Wizards DNS F Installation P Application Domain Marnie irisse gt Support Primary OMS Server i Help 2 Secondary DNS Server F Home Miscellaneous Select Media Auto negotiate Bandwidth images only Unlimited MBity s HTTP Port Humber eo Default 80 zi Fi Li kilim ATIOCNG 21 Step 4 Configure Axis Camera Software Options Setting the Correct Date Time Used in the Camera Be sure to set the correct date and time in the camera because the date and time are used to organize the images that you save for later retrieval System Date and Time Current Camera Time Date 2003 08 06 Time 1111 03 27 New Camera Time EMT T B R EE m uu R ie mn Automatically adjust for Daylight saving time changes Time Mode Synchronize with computer time Date 2003 08 06 Time 11 03 30 Synchronize with HT
63. pile the information so that its ready to be downloaded to the ControlWave unit by clicking on the Compile Send to Doors Full button Then click on Close to exit the dialog box 53 Security Access Card Reader Application Select the group you want to give permissions to In this case we ve selected PPLANT STAFF A PERMISSIONS dede 1 Permission Door Mode nber can open the door dunng the shit Namal ET Dog unlocks sutomal call at start of shift C UNLOCKED Automatic DOCKED Badge Door remains unlocked after a valid badge is presented f UNLOCKED Badge LOCK DOW Door iz locked down during shill supersedes other permissions LOCKDOWH r Premission Apples To 1 Permissions Table Sopris ae Network only Doo Mode Name Shi Name ApplesT al stand Alone ony Ignore the Shift EE since Bristol Babcock doesn t currently yE support it Gup FLANT_STAFF Shift Doo ATUTMAN DOOR 6 insert New Permission R Comgde Send to Doors incremental Het5tat Select a door that you want to allow RTUTIMAIN DOOR this group to use then click on the Insert New Permission button Repeat for each s additional door you want See this group to have access to When you re finished giving permissions to your groups compile your Security Database so that its r
64. rameters is set TRUE DoorRelayTimeout basically determines how NT long the door remains unlocked for the person trying to come in The default is 10 seconds NT This input is the amount of time the door is allowed to remain open after a valid door open event before a Door Open Too Long alarm is generated This could occur for example if someone holds the door open too long or props it open or if it doesn t latch properly on closing NT DoorOpenTimeout OpenDoorDI BOOL This is an optional input for making a door open request This is in addition to the REX and AUX inputs available on the Isonas Card Reader DoorName STRING In the Crystal Access Administrator software the card reader is identified in the format R7 U DoorName IMPORTANT This input is the DoorName portion of the name and must match exactly the DoorName specified in Crystal Access It is case sensitive for example DOORS doors and Door5 do NOT match Init BOOL If you change the value of DoorID PortNum or RepeatRate you must set this to TRUE for the function block to be restarted with the new parameters It will then immediately be set to FALSE Index I This output is a number identifying the last valid card number to be used in the Isonas card reader This is primarily used for testing troubleshooting purposes NOTE This number is not the same as the card ID number it is an internal number referring to a particular user When there is no activity
65. rty or injury to persons It is suggested that the purchaser review the need for additional backup equipment or provide alternate means of protection such as alarm devices output limiting fail safe valves relief valves emergency shutoffs emergency switches etc If additional information is required the purchaser is advised to contact RAS RETURNED EQUIPMENT WARNING When returning any equipment to RAS for repairs or evaluation please note the following The party sending such materials is responsible to ensure that the materials returned to RAS are clean to safe levels as such levels are defined and or determined by applicable federal state and or local law regulations or codes Such party agrees to indemnify RAS and save RAS harmless from any liability or damage which RAS may incur or suffer due to such party s failure to so act ELECTRICAL GROUNDING Metal enclosures and exposed metal parts of electrical instruments must be grounded in accordance with OSHA rules and regulations pertaining to Design Safety Standards for Electrical Systems 29 CFR Part 1910 Subpart S dated April 16 1981 OSHA rulings are in agreement with the National Electrical Code The grounding requirement is also applicable to mechanical or pneumatic instruments that include electrically operated devices such as lights switches relays alarms or chart drives EQUIPMENT DAMAGE FROM ELECTROSTATIC DISCHARGE VOLTAGE This product contains sensitive electronic
66. s Tools Help x Folders 2 Size Type File Folder z 4 37 PM File Folder 6 22 2006 4 37 PM 75 are you looking Ghevent_1 File Folder 6 22 2006 4 37 PM event File Folder 6 22 2006 4 37 PM 1717777 Elevent 1 File Folder 612212006 4 37 PM complete sentences event File Folder 6 22 2006 4 37 PM Please type your query event_t File Folder 6 22 2006 4 37 PM here then press lt Enter gt event File Folder 6 22 2006 4 37 PM event_2 File Folder 6 23 2006 10 00 4M Sample question event_2 File Folder 6 23 2006 10 00 4M Buy 4 book online event_2 File Folder 6 23 2006 10 00 4M You may also want to event_2 File Folder 6 23 2006 10 00 4M event_2 File Folder 6 23 2006 10 00 4M event_2 File Folder 6 23 2006 10 00 4M event_2 File Folder 6 23 2006 10 00 4M event_2 File Folder 6 23 2006 10 00 4M event_3 File Folder 6 23 2006 10 14 4M Search event_3 File Folder 6 23 2006 10 14 AM event_3 File Folder 6 23 2006 10 14 4M event_3 File Folder 6 23 2006 10 14 4M event_3 File Folder 6 23 2006 10 14 AM event_3 File Folder 6 23 2006 10 14 AM event_3 File Folder 6 23 2006 10 14 4M event_3 File Folder 6 23 2006 10 14 4M event_4 File Folder 6 23 2006 10 17 4M event_4 File Folder 6 23 2006 10 17 4M event_4 File Folder 6 23 2006 10 17 AM event_4 File Folder 6 23 2006 10 17 AM event_4 File Folder 6 23 2006 10 17 AM jevent_4 File Folder 6 23 2006 10 17 AM event_4 File Folder 6 23 2006 10 17
67. s included in your package for use if you do not have a spare place to connect NOTE The Axis Network Camera Installation Guide includes instructions on using the camera via a dial up network this option is not supported for the Security Vision application you must use the Ethernet connection Step 3 Assign an IP address to the Camera Assigning the IP Address for an Axis 210 211 211A Camera Skip these pages if you have an older model Axis 2100 2120 camera There are two methods for setting the address an Axis 210 211 211A camera You can run the Axis IP Utility or you can type ARP commands from the DOS prompt NOTE No matter which of these methods you use the very first time you use the camera you will also need to assign a password for the root user account See Assigning a Password for the root User Account later in this section Assigning the IP Address for an Axis 210 211 211A Camera using Axis IP Utility One way to set the IP Address for these Axis Models 15 to use the Axis IP Utility included on the Axis Network Cameras Software amp Documentation CD ROM If the camera is already connected to your local area network LAN the Axis IP Utility will attempt to detect it automatically NOTE The factory default IP address of the camera is 192 168 0 90 To change the address click on Server gt Set IP Address and the Set IP Address dialog box will appear If the serial number of the camera is
68. t Image Settings The greater the resolution eee en ee the greater the file size Resolution 480x360 I pixels Compression so 0 100 Rotate image 0 x me a o 100 Low compression means higher Eas ri v ek y tare isa file sizes but better picture quality Contrast 50 0 100 Does not affect Test image High compression means smaller For Test image 0 black white other values have no effect on color ym file sizes but reduced picture quality Include overlay image at the coordinates X fo Y IV Include date IV Include time You can specily text you want to MV Include text OFFICE AREA appear on the image for example to es yam identify the location viewed by the camera Place text date time at bstomi aj of image Video Stream Limit video stream time to 0 1 seconds per session Limit frame rate to 10 301 fps per viewer Click on Save when you ve made your choices Only applicable to Motion JPEG Test Test Image Appearance and Overlay Settings using fotion JPEG before Test saving Reset Click on Save when finished I3 Step 4 Configure Axis Camera Software Options Specifying the ControlWave series Controller as an Event Server Images from the Axis camera are uploaded to the ControlWave controller and stored in FLASH memory for use with the ControlWave Security Vision application You must identify
69. t box will appear To retrieve images for an event in the list click on the event name and click on Retrieve A dialog box that shows the progress of the retrieval opens You can cancel retrieval of the images by Events Rtu Lincoln Camera Cam_1 Sample list box Fl Node CW6 clicking on the Cancel button Transferring Event Images Image 2 of 10 Bytes 17800 of 22607 36 Step 6 Viewing Collected Images in OpenBSI Using the Security Vision Options Dialog Box The Security Vision Options dialog box allows you to alter certain aspects of how the Security Vision application works This dialog box is accessible by clicking on the icon shown above or by clicking on View Options from the menu bar Security Vision Options IP Options Delete remote folders after collection Cancel View Options Delay between images when displaying 1 Seconds A zero entry disables cycling though images Folder Options Image Storage Folder AO penBSI security Browse Image File Prefix pic Door Security Options Door Input Folder Browse Time Interval to check for Door Input changes 3600 i Download Door Info to ATUs on startup Configuration Proqram e hisonas isonas exe Browse Delete remote folders after collection When checked will delete event folders in the controller after the images for those events have been collected by the Security Vision application at th
70. t is lost the product must be reset to the factory default settings by pressing the button located in the product s casing Please see the user documentation for more information TEJA You can then log onto the camera s web pages using the root account and password User name IG root Password Remember my password cancel Assigning the IP Address for an Axis 210 211 211A Camera using ARP Commands Another way to set the IP address for the camera is to use ARP commands From a PC on your network call up a DOS window and type the following commands at the prompt C gt arp s 5 new IP address gt lt serial number lt your PC s IP address gt C gt ping t 5 new IP address gt where Step 3 Assign an IP address to the Camera lt camera s new IP address gt is the IP address you want to assign to the web server in the camera Don t type the brackets lt serial number gt is the serial number including dashes that you copied off of the camera in the previous step Don t type the brackets lt your PC s IP address gt is the IP address of the PC you are currently using Don t type the brackets For example if you want to assign the camera an IP address of 10 177 15 4 and the IP address of the PC you are currently on is 10 177 3 22 and the serial number on the camera is 00 40 8 10 00 86 then enter the following commands C gt
71. t router gt Event Configuration z Auto Configure Link Local Address DNS Configuration gt System Options Obtain DNS server address via DHCP About Domain name Primary DNS server Secondary DNS server Host Name Configuration Obtain host name via DHCP Use the following host name Enable dynamic DNS updates Register DNS name TTL Services AXIS 210 Network Camera Use the folloving DNS server address This should shovv the IP address for the camera that you configured earlier NN Test button lets you verify that the IP address can be reached from this PC Live View Setup Help View 120 3 5 64 Test View use to separate names View axisProduct Axisproduct example com Options for notification of IP address change Settings Click on the Save button when finished 13 Step 4 Configure Axis Camera Software Options Setting the Correct Date Time Used in the Camera Be sure to set the correct date and time in the camera because the date and time are used to organize the images that you save for later retrieval Click on Save when finished v Basic Configuration Instructions 1 Users 2 TCP IP 3 Date amp Time 4 Video amp Image Video amp Image gt Live View Config Event Configuration System Options About AXIS 210 Netvvork Camera Live View Setup Help Date amp Tim
72. tep 2 Install the Network Camera on Site Write Down the Serial Number of the Camera You ll Need it Later Write down the serial number on the camera including dashes you will need it later in the installation process The serial number is located on a sticker on the bottom of the camera Mount the Camera following the Guidelines in the Axis Network Camera Installation Guide Mount the camera 1 the desired location so that it can take pictures of the area of interest More details on mounting the camera are included in the user documentation on the Axis CD ROM IMPORTANT The current model Axis Network Camera can be used outdoors provided that it is installed in a proper enclosure and protected from direct sunlight or very bright lights such as from a halogen bulb If you are using the older model Axis 2100 2120 cameras the Axis 2100 camera is designed for indoor use only and should not be subjected to direct sunlight or very bright lights such as from a halogen bulb The AXIS 2120 can be used outdoors provided that it is installed in a proper enclosure and protected from direct sunlight or very bright lights such as from a halogen bulb Bright lights can damage the CCD element in any of these cameras Connect an Ethernet Cable to the Camera Plug an Ethernet Cable into the RJ45 network connector on the back of the camera then connect the other end of the cable to an active Ethernet hub of your Ethernet network A hub i
73. the ControlWave as an Event Server so it can receive those images ControlWave Security Vision requires that you define an FTP Event Server so choose Add FTP here AXIS a AXIS 210 Network Camera Live View Setup Help o Event Servers Event Server List Basic Configuration Video amp Image Name Profvocol Network Address Upload Path User Name Live View Config v Event Configuration Instructions Event Servers Event Types Motion Detection Port Status System Options Add FTP Add HTTP Add TCP Modify Remove About i http 120 3 5 64 Event Configuration Event Server Setup AXIS 210 Network Camera ve iola Choose a name for the FTP Event Server Setup Event Server FTP Server This must be the IP address Network address of the ControlWave controller host name or IP address R that is the host to the camera Port number 21 120 1 70 3 Upload path Login Information This is the folder in FLASH memory User name semi ve at the ControlVVave where images PP will be stored ControlVVave Security Advanced Settings Vision requires the folder have the Use passive mode Test Test the connection to the specified FTP server OK Cancel Done z Fe lan Internet Specify a name for the ControlVVave in the Name field name cam XI where x is
74. try The choice of which time is used GiMinTimeBetweenEvents_1 and 1MinTimeBetweenEvents_2 15 determined based on the ibAuthorizedEntry parameter 31 Step 5 Configure the Security_ Vision Function Block Data type Explanation value is specified all edge transitions are ignored this would be useful for example if you want to prevent event triggers during the normal workday ibDetectionMode When FALSE default the input at ibDetection must be a falling edge trigger must transition from TRUE to FALSE When TRUE the input at ibDetection must be a rising edge trigger must transition from FALSE to TRUE ibImageCollectionMode When FALSE default the Sec_ Vis function block will automatically send messages to the Security Vision utility to initiate collection of images from an event folder When TRUE when a new event occurs the image will be stored in a folder at the ControlWave The user can retrieve the image by right clicking on the camera folder and choosing List Remote Events A pop up window will then appear with a list of event folders and the user can select which folder to collect obBusy BOOL This is set to TRUE whenever image files are currently being transferred Whenever this is TRUE new security events reported at the ibDetection parameter are ignored obCamFail BOOL When set TRUE indicates that no new image files are being received from the camera obDetection BOOL Similar to ibDetectio
75. unction with or independently from the Security Vision camera application The major components of the Security Access application are ControlWave series controller with an Ethernet Port or an RS 485 port to connect to the card reader s The RS 485 Port must be configured as a Generic Serial Port with a baud rate of 9600 A ControlWave project containing the Security_Access function block Isonas Card reader and one or more access cards Isonas Crystal Access software Security Vision software at the OpenBSI Workstation 41 Security Access Card Reader Application The following basic steps are required when setting up the Security Access application We will list them first and then go over each one in detail NOTE This assumes you have at least one Isonas Card Reader installed at least one access card for the reader and have installed the Isonas Crystal Access Administrator software on your PC 1 Create a project in ControlWave Designer that includes a separate fully configured SECURITY_ACCESS function block for each card reader handled by this ControlWave Download this project into the ControlWave controller 2 Configure a security database using Isonas Crystal Access Administrator software This database includes information on each door reader and person who will have access to the door 3 Download the security database to the ControlWave controller Configuring the SECURITY ACCESS function block The SECURITY_A
76. ur of the day 0 23 format mm 15 the minutes SS is the seconds Viewing the Images Associated with a Security Event RTU name Folder name corresponds To view the images associated with a Security Jick eee Event either double click on the folder for that 00 b gt event or click once on the folder then click on the Show icon see above or click on File gt Show In either case a sequence of all of the images from that folder will be displayed one at a time uper ink perm link mi Hen sinda Save lagel As Eint Harnet Shaw Picture Save Picture Ag Bunu If desired you can adjust the rate at which the individual images are aie presented via the Delay between images when displaying parameter Set as Background in the Options dialog box or you can turn off the automatic presentation and manually scroll through the pictures using toolbar controls by Copy specifying 0 for the delay ony Shortens ee Youcan right click on an individual image and perform various Add to Favorites standard Windows options such as save it locally on your PC send it Properties via e mail etc see figure at left 35 Step 6 Viewing Collected Images in OpenBSI To See a List of All Security Events for a Camera If you want to see a list of all security events associated with a particular camera right click on the icon for that camera and choose List Remote Events A lis
77. when input iz low Step 4 Configure Axis Camera Software Options Specifying How the Images Get Uploaded to the ControlWave series Controller On the Sequential Operation Upload page you must specify how images are sent from the camera to the ControlWave series controller You must always upload via the Network The upload must be performed via FTP File Transfer Protocol e The Remote Host is your ControlWave series controller so for Host Name User Name and Password enter the IP address of the ControlWave as well as a valid username and password combination for that ControlWave controller e The Upload Path specifies the folder name used in the ControlWave series controller s FLASH memory Each camera which uploads to a particular ControlWave will have a separate folder named cam_x where x 1s replaced by the number of the camera For example if you have 2 security cameras the upload path for the first one is cam 1 and the upload path for the second one is cam_2 The Base File Name MUST be pic Images in the upload path folder will be numbered sequentially 1 00001 0002 pic_ 00003 etc NOTE When an event occurs the images for that event will be re numbered pic 1 pic_2 pic_3 etc as part of that event regardless of what the original pic number was e For the filename suffix you must choose either Sequence Number Suffix Up To Default Maximum or Seque
78. word r Language Engish 7 Check each of V Allow Compde without running Badgesvi exe these boxes th en V Export On Compie network people access click on OK V Skip Send On Compile do not send records to controllers Step 3 Define a Server and COM Port and Subnet The Isonas software requires that a server COM port and subnet be defined for the card reader The choices for names and numbers is arbitrary however you can only have one COM Port per subnet 46 Security Access Card Reader Application Right click on the Network icon and choose Insert SORAS Crystal Access Cubic EN System Administrator Version 10 02 02 i start S a Moock 0 Ela saman cesna on EB somas ea l ax Enter a Name and Server ID and click on OK In the Adding a SERVERS Record dialog box enter a name in the Name field You can choose a name or just use the default Sever lb or Server ID fou may choose any Nagie Name For the Server ID choose any two digit number Click on OK next Now right click on the resulting x aa SERVER icon and choose msert from 01 Server01 the pop up menu The Adding a Subnet a dialog box will appear Choose an ID CommPot COMI Ts number for this COM port subnet 157 NOTE There can only be one subnet per server

Download Pdf Manuals

image

Related Search

Related Contents

Tangent AMP-50 User's Manual  HERMA Coloured Labels A4 70x37 mm red paper matt 480 pcs.  DuVRi standard INFORMATIVA RISCHI    Qx Amplified DNA Assay - (Becton, Dickinson and Company  2009年度事業報告  Les enjeux économiques de l`informatique  TM-100SU  「やさシティ、まつど。」商品券  Pour la suppression de maladies fongiques dans les carottes, les  

Copyright © All rights reserved.
Failed to retrieve file