CENTRAL MANAGING ENERGY DASHBOARDS
KEPPING YOU AND YOUR RESIDENCE IN CONTROL
CENTRALLY MANAGED SYSTEMS
Real time alarms and alerts to be centrally coordinated or distributed on-site.
For companies with large number of sites which contain a wide variety of legacy and modern systems and devices, the ability to achieve real time integration can prove to be complex. We provide significant advantages for multi-site integration across an extensive portfolio of sites. Access to and control of data is controlled centrally, but can be granted at site level within pre-defined parameters, allowing a user with little or no formal training the ability to have access to basic data.
Altitude provides the ability to collect data across the corporate network or internet using a variety of methods. Data from multiple sites can be monitored in bulk and reports may be automatically scheduled and distributed to designated employees via E-mail or SMS. The software allow real time alarms and alerts to be centrally coordinated or distributed on-site.
Data can be exported to facilities/estate management packages to enable work orders to be generated, with the contractor knowing which element of a particular device has triggered the alert.
Altitude is therefore also very suitable for companies wishing to undertake energy performance contracting across a wide portfolio of estates. The ability to obtain and visualise data through one common user interface at a variety of sites and then use the same web based user interface to take immediate decisions is key to effective energy performance contracting.
INTERGRATION OF THIRD PARTY SYSTEMS
This modular architecture improves reliability.
Kaldien can provide an intelligent middle-ware software solution which can run one or more communication driver which provides access to all open standard protocols as well as to most proprietary and specialist legacy protocols.
The architecture of which is based on services that perform specific functions and run as separate tasks, ensuring that the performance of one service does not affect another. This modular architecture improves reliability.
Its primary function is to store incoming data from the Communication Services into a database.
The Data Logger Service is a configurable utility for recording data from the Altitude system. Its primary function is to store incoming data from the Communication Services into a database.
Connectivity to any database supporting ODBC, including Microsoft Access®, SQL Server, Oracle, MySQL etc ensures compatibility with preferred corporate databases.
Logged data can be displayed graphically and analyzed using third party packages including popular Office applications such as Microsoft Access and Excel.
These alarms can then be used by the Alerts Service to send e-mail, SMS messages, set tag values.
The Alarm Manager Service is a configurable application for monitoring data from the Altitude system and generating alarms based on various criteria. These alarms can then be used by the Alerts Service to send e-mail, SMS messages, set tag values (for example, to switch on external sounders) play WAV sound files and/or print details etc. to notify users of potential problems.
These alarm details are also made available on the Altitude Web Client in an Alarm List for viewing and acknowledging. For larger systems the Control Centre can be used together with the Alarm Monitor Client application to monitor and acknowledge thousands of alarms.
This powerful feature enables e-mails to be sent to line managers if the alarm hasn't been acknowledged within a specified time.
The Alerts service uses filters to generate alerts when an alarm is generated by the Alarm Manager. A filter defines the alarm groups that this filter is active with and also the alert type (e-mail, set data tag value, play sound, print), the priority (1 to 16) and the alarm status (warning, alarm, acknowledged etc.).
The Alerts service will process each alarm from the Alarm Manager and decide on the appropriate action. Alert types are defined using templates to produce, for example, clear and informative e-mail. E-mails can also be escalated.
This powerful feature enables e-mails to be sent to line managers if the alarm hasn't been acknowledged within a specified time. Multiple levels of escalation may be set up.
Comprehensive calendar functions aid schedule planning and include annual/weekly schedules to eliminate the need for re-entry of recurring events.
The Scheduler Service enables events to be pre-programmed for any time and date in the future and for each of these events to have an associated action or list of actions. A configuration console is provided with the Scheduler Service to allow local setting up of the schedules, with the option for some user interface elements to be driven through the Java Client from within a Web Browser.
An example of its use could be to trigger data logging based on schedules e.g. enable logging between 9:00am – 5:00pm. Exceptions are used with schedules to either inhibit or to enable a schedule - for example a holiday period where certain actions need to be stopped, or common Special Days e.g. maintenance schedules or shut downs, with outputs selectable as active or inactive.
Comprehensive calendar functions aid schedule planning and include annual/weekly schedules to eliminate the need for re-entry of recurring events. Schedules are fully configurable using the built-in console with facility to update times periods from Web browser.
THE CHRONOS SCHEDULING SERVICE
Chronos incorporates powerful temporary time scheduling capability to set one-off schedules up to 14 days in advance.
The Chronos scheduling service has a simplified user interface and built in temporary scheduling capability. Chronos enables events to be pre-programmed for any time and date in the future and for each of these events to have an associated action or list of actions.
A comprehensive web based interface is provided to allow setting of the schedules, with the option for user interface elements to be driven through the Java Client from within a Web Browser.
Chronos features a simple web based user interface where the user simply drags the start and stop 'handles' on the web form to change the time settings. Up to four on/off periods per day may be configured.
Chronos incorporates powerful temporary time scheduling capability to set one-off schedules up to 14 days in advance. The overview interface shows schedules and their status at a glance with temporary schedules shown as icons.
Users access a temporary setting for a particular day by clicking on the day or zone and are presented with settings that will apply for the selected day only. At the end of the specified day the standard time schedule is used once again without the user having to take any action. Chronos incorporates a two year Holiday planner, to set a day as a holiday the user simply clicks on the calendar to toggle between holiday and normal day.
THE DATA GATEWAY SERVICE
Link network devices of the same or even different technologies.
The Altitude Data Gateway Service enables the transfer of data values between two tags in the Altitude system. Multiple configurations can be made between tags on the same Altitude host, or even between different Altitude hosts on the same IP network.
It can used to link network devices of the same or even different technologies. A simple example is to connect a switched output from one network (say a hardware device connected via OPC) to an input on a Building Management system using a different driver.
This feature allows the security administrator to permit different users to access different features of the system.
All transactions between the Altitude Server and the User are subject to security procedures that ensure the data on the system is protected from unauthorized access. Altitude uses secure user authentication employing encryption and 128-bit industry standard MD5 digital signatures. Data may be set to Read Only, Read/Write (full access) or no access.
This feature allows the security administrator to permit different users to access different features of the system. For example, a user with no access rights to a particular group of related information would see no graphics or data on pages containing this information whereas a user with full access rights would be able to view this information and make changes to it.
Security is based on users and groups; each user has an individual profile (user name, logon ID, password etc.) and may belong to one or more groups. Each group is then granted access to data items in the system as required. Access may be granted at any level on the data hierarchy, at an individual data item level or node level (or pre-defined group of data items).
The entire audit log can be viewed and filtered or log entries for individual users can be shown.
All of the transactions handled by Altitude are filtered and posted to a database that acts as an Audit Log of Server activity. Altitude logs all user actions for all client connections including:
User Log onFailed user authentication connectionsScreens that have been displayed, when they were displayed and by which user Network variable values that have been changed, when they were changed and by which user Various system information Messages relating to each Altitude service
The entire audit log can be viewed and filtered or log entries for individual users can be shown. Duration of the log file can be configured to limit the overall size.