1 Monitoring Network DMN User Manual
2 Table of contents Table of contents Product features and capabilities System requirements Getting started with the software Installation Logging in for the first time Licensing Configuring the path and COM port settings Setting up and managing users Setting up an import path Setting up requesting computers and connections Device management Alarm management Using the software Monitoring Detailed view Device information Device data Device log Real-time display Function details Factory settings Master log Device analysis Regular analysis Interactive analysis Producing system back-ups Copyright notice: This document is protected by copyright and may not be utilized, reproduced or distributed without prior written permission.
3 1. Product features and capabilities Monitoring The Dometic Monitoring Network (DMN) allows real-time, user-friendly device monitoring. The monitoring not only provides you with data about actual and target temperatures. It also provides a wide range of additional information about door statuses, power supplies etc. The system provides early warnings about critical incidents even, as an option, via or text message. Details on connections and device locations are also displayed. 3 Detailed view and log function You will find details of selected devices in the detailed view. In addition to factory settings and target parameters, you can also call up device-specific incidents here, which are presented in the form of a log. You can also follow the current progress of the actual values via real-time display with a graphic illustration. Master log In the so-called Master log, you will find a chronological compilation of all incidents that are relevant for the connected devices. Easily identifiable symbols indicate whether this is merely an information message or a more important warning message. The user can also enter comments on the incidents or add incidents. Request, connection and device management With the help of request and connection management, you can set up and configure requesting computers (requesters) and their connections. The device manager is used to manage the connected cooling devices. You generate and receive information on the requesting computer that a device is connected with, the alarm profile it was assigned and the users that can see the device in the monitoring. Alarm management With the Dometic Monitoring Network software, you can configure alarms in accordance with your own specifications. Under the "Alarm profiles" menu item, you will find the necessary tools for adjusting the alarm response times. Under "Alarm data" you can specify to whom and via which medium ( , text message, alarm sound) alarm messages are to be sent. User management
4 Under User management you can generate, view and manage user data. The users can also be assigned to various groups in order to adjust their access rights. For this purpose, the software recognizes three different user concepts which feature various rights and restrictions: Supervisor: Highest level of authorization Execution of all program functions Can make every kind of configuration Licensing procedures 4 Administrator: Medium level of authorization No access to the configuration menu User device assignment (visibility of devices for users) Viewer: Lowest level of authorization No access to settings Observer status
5 2. System requirements CPU with 1 GHz 512 MB RAM 50 MB free hard-disk space Microsoft Windows Vista ; Windows XP with Service Pack 2; Windows 2000 with Service Pack 4; Windows 2003 Server 5 3. Getting started with the software This chapter takes you through the entire procedure when using the Dometic Monitoring Network software for the first time. It shows you the following steps: Logging in for the first time Launching the program for the first time Path and port settings Setting up user profiles Setting up requesting computers and connections Once you have made these settings, the program is ready for use.
6 3-1 Installation Please use the supplied installer in order to install the Dometic Medical Center. This will take you step by step through the installation process. If you use Windows Vista as your operating system, you may first have to authorize execution of the program. If this is the case, the following message will be shown. You must click on Authorize in order to be able to install the software: 6
7 3-2 Logging in for the first time Launch the Dometic Monitoring Network. After the Please change the -supervisorpassword message, you will be prompted to select your language and enter a username and password: 7 When the program is launched for the first time, the username is supervisor and the password is dometic. The password entry should always be masked for security reasons. If you would like to make the password visible in order to check it, deactivate the Mask password option by clicking on the box. The password will now be visible. Click on to launch the application or to cancel your log-in.
8 3-3 Licensing The test period for the DMN software is 60 days. To get to the regular application mode from the test version mode you must first register the software. To do this, select "Configuration" under the "Program" menu in the main view. Now select "License" under the "Settings and tools" menu. The license manager will now appear in a new window. 8 Please note: When you use the software for the first time, default settings are already in place for when the program is used in the test version. These impose certain restrictions on the maximum number of requesting computers (requesters), viewing computers (viewers) etc. You can obtain a system ID that is automatically generated by the system from the license manager. Once you have sent this system ID to the manufacturer, you will receive a license file which is specially customized for you. The license file includes information on the validity period and the new permitted number of requesters, viewers and cooling devices. To import this file into your program in order to be able to use all of the program s functions, first click in the License manager on, and then on "Select license". Select the folder which contains the licensing file, highlight the file and click on. The entry fields are completed automatically with the required information. Click on to save your entry. The program must be closed and the computer restarted for the settings to become effective. The licensing usually takes a few working days, during which time the software can be used with minor restrictions.
9 3-4 Configuring the path and COM port settings The path settings are checked each time the software is launched. If the set data paths are not correct, a configuration window in which you can make changes to the settings will appear. If you would like to change the settings while the program is running, select "Configuration" under the "Program" menu in the main view. Now select "Configuration" under the "Settings and tools" menu. The path configuration will now appear in a new window. 9 When the program is launched for the first time, the software uses default settings for the data and monitoring path as well as for the alarm distributor (usually: C:\DMN\*). If you would like to make the database accessible via a network and enter network paths for this purpose, you should first switch to edit mode. To do this, click on then on the box on the right in the row that is to be changed (b.): (a.) and Now complete the information about the data path (1) of the program in the network, the monitoring path (2) in which real-time data are saved and the alarm distributor path (3).
10 10 In alarm situations, you can also be alerted to the alarm by an alarm sound. This alarm sound (4) can be individually defined. The configuration menu also provides the option of playing the sound (5). You will find more detailed information about setting up a back-up path and producing a back-up in chapter 4-6.
11 3-5 Setting up and managing users In the "Program" menu, select "Configuration" and then the "User data" item. 11 The following view will appear: You have so-called supervisor rights (see p. 4) under the default username "Supervisor". Click on to change your user settings and above all your password. The "Edit User" window will appear:
12 Complete your user profile by entering your surname, first name, username and password. Click on to save your changes. You can also set up, edit and delete users via the user management. 12 To set up a new user, click on in the toolbar. You will be taken to the "Add user" entry window. Enter the required user data including the authorization level planned for the user (Supervisor, Administrator, Viewer). Select the group from the drop-down menu with the yellow background. To edit a user, select the user you want and click on in the toolbar. You will be taken to the "Edit user" entry window which is structured in the same way as the "Add user" window. To edit the user, proceed as described above. To delete a user, select the user you want and click on in the toolbar. You will now be prompted to confirm the delete process. Select "Yes" to accept the changes. Click on to return to the monitoring screen. You can complete the configuration with.
14 3-6 Setting up an import path Please note: You only need to set up an import path if you already use the DMCC (Dometic Medical Control Center), i.e. the previous version of the DMN, and would like to import data from the program. 14 To set up an import path, select "Configuration" under the "Program" menu in the main view and then click on Import path. You will be taken to the following menu: Switch to edit mode ( ) and click on the right-hand side of the row that you would like to edit. Enter the data path and the monitoring path of the previous program version from which you would like to obtain the data. Now click on "Import":
15 Click on to return to the monitoring screen. 15
16 3-7 Setting up requesting computers and connections To set up a requesting computer (requester) and a connection, select "Connection data" in the "Device settings" menu: 16 The "Connection management" window will now appear with one overview field for requesting computers and one for connections: Click on to add a new requester. Now complete the requesting computer's data. To do this, you essentially need the computer name and the associated IP string. Under certain circumstances, entering the computer name again instead of the IP address is sufficient. As an option, you can also enter the requester's location. Please note: The computer name is automatically read out by the system.
17 The computer IP string can be entered as a numerical IP address or as a character string (computer name). To set up a new connection, the connection type must be selected. The "Add TCP/IP connection" and "Add serial connection" buttons can be found in the connection toolbar. 17 Please note: Select "Add TCP/IP connection" if the connection to be set up is a network connection via a TCP/IP port. If the requester is connected to your computer via a serial interface, select "Add serial connection". Variant 1: Setting up a TCP/IP connection To set up a TCP/IP connection, first select the name of the requesting computer in the "Requester" field (1). This must be listed in the requesting computer overview to be considered for setting up a connection. Now enter the TCP/IP address (2) (e.g ) and the TCP/IP port (3) (e.g. 745). The connection name (4) is automatically generated by the system. Now click on in order to accept the changes. Click on to return to the connection overview. Variant 2: Setting up a serial connection To set up a connection via a serial port, first select the requesting computer (1) in the "Requester" field. Now specify the serial port to be used (e.g. COM1) (2). The connection name (3) is automatically generated by the system.
19 3-7 Device management You can add and manage devices using the device management. The devices can be assigned alarms and alarm profiles. You can also specify which device is visible for which users. You will find the device management in the "Device settings" area under the "Device data" menu item: 19 The "Device management" window now appears with an overview field for devices set up (1) and a user view (2): To add a new device click in the toolbar on. You will now be taken to the "Add device information" window, where you can enter the data for the new device to be set up. Begin with the "Device data" item:
20 The device name (1) and serial number (3) must be entered manually (click at the righthand side of the row), whilst you are offered two options for the device type (2) in the drop-down menu: Dometic Direct or ADAM. Select Dometic Direct if the device to be set up is a Dometic refrigerator. Select ADAM if you want to monitor a device of another manufacturer using an ADAM adapter. 20 Now complete the "Properties" menu item: Under "Connection port" (1) select the requester connection you want. Now enter the RS485 number (2). You can activate or deactivate the device in the "Activation status" (3) field. If you have selected "ADAM" under device type, you are provided with another menu item, "Adam communication". This step is not required if it is a Dometic Direct device. You can enter the target value (1) and the temperature limits you want here (upper limit/high=(2)/lower limit/low=(3)). You can optionally enter the location of the device and additional remarks in the "Information" menu item.
21 You then finish by editing the alarm configuration. You can assign a regular alarm (1) and an emergency alarm (2) to the device. If you have not yet configured your own alarm profile, select the setting "No alarm profile" from the drop-down menu under "Alarm". You will find more details on setting up an alarm profile in the "Alarm management" chapter. 21 If you want to edit devices which have already been set up, select the device you want and click in the toolbar on. For the settings that you want to change, proceed correspondingly as when setting up a device. To be able to see if a device is visible for a specific user or not, click on "User view" in the toolbar above the device list. You will now be provided with a list of the created users. A checkmark in front of the user's name shows whether or not a particular device is visible for them.
22 If you want to make a device visible for a user, checkmark the box. The background of the row becomes blue. If you want to make a device invisible for a user, remove the checkmark from the box. The background of the row becomes white. 22 Click on to save the settings. Click on to return to the device manager. Information about the visibility of a device is provided in the bottom part of the "Device management" window if you mark the device in the selection. The device is visible only for the users listed in the user view.
23 3-8 Alarm management With the alarm management, you can create alarm schemas, manage alarm data and assign different alarm profiles to individual devices. You will find the most important tools for alarm management in the "Device settings" area under "Alarm profile configuration" and "Alarm settings": 23 "Alarm profile configuration" takes you to the view of the same name. You are provided with an overview of the alarm profiles and the alarm addressees which have been set up. This view is empty when the software is executed for the first time. Step-by-step instructions for configuring your alarms to meet specific requirements are provided below. Step 1: Setting up an alarm profile To set up an alarm profile, click on "New profile": The "Add alarm profile" window will now open. Enter the name you want for your alarm profile and click on is Working days.. In the example shown, the name of the alarm schema
24 24 Step 2: Adding an alarm schema You can now add an alarm schema to your new alarm profile. To do this, exit the window. In the overview, select the profile to be edited in the list. Now click on "New alarm schema". You will be taken to the "Add alarm" window, where you can configure the times for your alarm. First give the alarm schema a name (in the example: "morning/noon"). Now select the appropriate times and checkmark the relevant weekdays (in the example: Monday to Friday between and 13.00):
25 Once you have saved your settings, the period between and on workdays is covered. Of course, you can also set up a schema which covers the whole day ( ). However, this is only possible if the recipient of the alarm message is always the same person and/or the same device, e.g. a mobile telephone used specially for this purpose. If this is the case, please ignore step 3. Please note: The software works strictly according to days, i.e. it is not possible to specify a period which goes beyond In this case, the schema would have to be split into two separate time periods, e.g. Monday, until and Tuesday, until Step 3: Adding additional alarm schemas If you would like to configure additional day and night times, go back to the alarm profile overview, mark the profile which is to be supplemented and then click on New alarm schema. You can now set the period from until for example: Click on to accept the changes. You can add as many alarm schemas as you want to an alarm profile. Step 4: Specifying alarm recipients and reactions A warning symbol in the alarm profile overview indicates that an addressee and a reaction have not yet been assigned to the alarm profile:
26 To assign an alarm addressee to a schema and specify how the alarm is to be 26 forwarded, return to the "Alarm profiles" overview. Now click on toolbar: in the bottom Complete the data in the "Add alarm" window: You can enter the name of the new alarm under "Alarm" (1). The alarm can be forwarded via , text message or DECT (only if licensed accordingly) (2) to a specific recipient (3), and with a delay (4) if desired. Depending on requirements, the number for text messages can be entered either with the country code (e.g or +352) or without it. Examples A correctly set up text-message alarm without a delay:
27 A correctly set up alarm with a delay of 30 seconds: 27 A complete alarm profile, subdivided into workdays and weekends, as well as alarm schemas for various times of day: Please note: You can use an existing alarm schema for a number of different profiles. To do this, set up the profile and click on "Add alarm schema":
29 4. Using the software 4-1 Monitoring In the monitoring view, you will find all the important information for monitoring: details of the device and its connection, actual and target temperature values, as well as current incidents. 29 For faster access, you will find the link to the monitoring view in both the "Devices" area under "Monitor", and on the top screen edge below the "Control monitor" bar. The view is structured as follows: (1) Device status This column provides you with information on the device's status and its connection. The color of the background and the warnpin are important here. The background color provides information on the device status; the warnpin on the connection. There are six possible combinations: 1.
30 The connection is set up and active. All actual values of the device are in the normal area The connection is set up and active. The current actual temperature values of the device, however, are outside the upper or lower limits. The device is in the alarm status. 3. The device's connection has just been interrupted. The actual values were in the normal area with the last possible measurement, but the latest measurement could not be made. 4. The device's connection was interrupted more than 2.5 minutes ago. The device's actual values were actually in the normal area with the last measurement, but the values may have already exceeded or fallen below the defined temperature limits in the meantime. 5. The device's connection was interrupted more than 10.5 minutes ago. Statements cannot be made on any temperatures being exceeded or not reached. 6. The device and connection are currently inactive.
31 Please note: The "Control monitor" bar is constantly in the foreground so that a reported alarm state cannot be hidden by another window. The bar turns red during an alarm. 31 (2) Device name The name of the device to be monitored is shown here. (3) Door alarm and other warnings In this column, you will find current information about the door's state and other critical states. There are two possibilities in the door alarm column: Doors are closed. Door alarm: Door is open. (4) Lower limit The lower temperature limit set for the respective device, below which it must not fall. (5) Temperature The currently measured actual temperature value of the device. (6) Upper limit
32 The upper temperature limit set for the respective device, which must not be exceeded. (7) Location The device's current location. (8) Connection 32 The requesting computer's connection path.
33 4-2 Detailed view Under the "Details" menu item within the monitoring window, you will find the following view: 33 This view can also be accessed via the side control view in the "Devices" area. You can now view detailed device information and gain an overview of the temperature progression of the selected device using a real-time display.
34 4-3 Device information The "Device information" menu item provides you with specific device data and a device log Device data 34 Here you will find Main data Temperatures Parameters Device log The device log allows you to view a chronological compilation of the incidents of a specific device. You will be taken to the scroll function by double-clicking on an entry. You can view details of up to 19 consecutive entries here. Use the arrow buttons to move up and down. Scroll up Scroll down
35 Click on to close the window and return to the log. You can filter the incidents according to incident type in the device log. A distinction is made between the following incident types: 35 Warning message Information message Critical warning message In order, for example, to have only critical warning messages displayed, activate the filter by clicking on the icon for critical warning messages, or, if all incident types are already displayed in the log, click on the respective icon for information messages and warning messages in order to deactivate their view. You will then be provided with a filtered view, from which all information messages and regular warning messages are excluded. The device log also provides you with the option of creating manual entries and commenting on existing entries. Click on to create an entry. You will be taken to the "Add" view.
36 To generate a new entry, enter the text you want and click on "Save". Click on "Close" to return to the log view Real-time display The real-time display provides you with real-time, graphically illustrated monitoring of an individual device. The lower limit, upper limit and target value as well as the temperature of the regulation sensor and the temperature shown on the device are displayed. 36 Thanks to an automatic display update facility, the graphic in the real-time display is updated every 15 seconds. You can also reduce and increase the displayed time interval using the zoom function. Please note: To reduce or increase the displayed time interval, you must first deactivate the automatic display update facility. To do this, click on the Update button. The field will change as shown below: You can then begin altering the time interval. To do this, use the mouse to move the marker to the point in time where you want the graphic to start. The line above the graphic provides information about the date and the exact time:
37 While holding the left mouse button down, move the marker to the point where you want the analysis to end. The time interval which is to be displayed is shown with a black background: 37 Release the mouse button. A zoom view of your selected time period will now appear. It is possible to zoom in again even within the detailed view. The smallest possible time period which can be displayed is an hour. To exit the zoom view and return to the original view, double-click on the graphic.
38 38 You can also shift the view to the left or right. To do this, use the scroll bar at the bottom edge of the screen Function details The "Function details" tab provides information on: Temperatures (upper limit, display, target value, lower limit, regulation sensor) Status (control unit status) Digital outputs (inside light, evaporator fan, tray heating, compressor, input command) Digital inputs (AC fan, AC drain, AC compressor, AC magnetic valve, AC condenser, door switch, evaporator pressure) Alarms and warning messages (door open, mechanical section cleaning, low battery voltage, battery failure, HP pressure switch, compressor stop, magnetic
39 valve, tray heating cables, evaporator fan cables, ambient temperature, defrost sensor failure, regulation sensor failure, display sensor failure) Functional states (warm alarm review, cold alarm review, evaporator fan wait mode, power failure) Factory settings 39 You will find details of the various factory settings for the device on the Factory settings tab.
40 4-4 Master log The master log is in the "Devices" area under the "Master log" item and on the top edge of the screen under the "Control monitor" bar. 40 You can view and edit chronologically arranged details of all devices here. To do this, select the display period you want via the calendar function of the "Start date" and "End date" windows. Now click on "Update": The master log has an update function, the so-called AUTO-VIEW-UPDATE. This function ensures that the view always jumps back to the most up-to-date entries, generally every 15 seconds, even if older entries are currently being displayed. This ensures that the user does not overlook any new warning messages. If you want to view older master log entries or it is necessary to filter or edit entries (more on this in the following section), then it is recommended that the display update
41 be temporarily deactivated. Remove the checkmark in front of the "Auto-view-update" bar by clicking on it and you can then keep track of the activities mentioned above without any interruptions. 41 To guarantee system security at all times, this function too is subject to certain restrictions. The auto-view-update is automatically reactivated when an alarm message is present or the system has not detected any activity for five minutes. Like the device log, the master log also has a filter function, which can be applied to the entire log extract. A distinction is made between three incident types: Warning message Information message Critical warning message You can activate or deactivate the incident type for the display by clicking on the respective field. The master log also has another function, which allows you to filter the view according to dates, times, device names, device types, locations and incidents. If, for example, you want to view all incidents that are identified with the "High temperature alarm" incident type, left-click in the field with the incident type you want. The respective field now becomes red:
42 Now click on the "Apply filter" field ( high temperature alarms. ). You will now be provided with a list of all 42 To return to the overall view, click on the "Load selection list" field ( ). You can proceed exactly like this for all other criteria.
43 4-5 Device analysis You will find the device analysis in the "Analysis" area under the "Device analysis" menu item: 43 The analysis wizard will appear. Proceed in two steps to complete the analysis. Step 1: Select the device to be analyzed from the list. Click on. Step 2: Select the start point you want via the "Start period for analysis" window's calendar function. Now specify the duration of the analysis period by setting the number of days.
44 Use the arrow buttons to reduce ( ) or increase ( ) the time period. Select the white checkbox if you want an interactive analysis. The analysis period in this case may not be more than two days. 44 Please note: Differences between regular and interactive analysis Regular analysis Interactive analysis Maximum 7 days 1-2 days No "zoom" "Zoom" function Marker is used only to show the exact time Marker is used to show the exact time and to select the "zoom" period Print function No print function Click on or F10 to start the analysis. Click on if you want to go back to step 1. Select view. or F4 to exit the analysis wizard and return to the main Regular analysis The following view opens for a regular analysis:
45 45 You will find details of the analyzed device in the top left of the window. The device log is shown in the top right of the window. Like the master log, the device log too has a filter function. A distinction is made between three incident types: Warning message Information message Critical warning message You can activate or deactivate the incident type for the display by clicking on the respective field.
46 If you would then like to view the complete log with all warning messages, click on the "Load selection list" button ( ). You can use the marker to display the exact time. You can move the marker by placing the mouse pointer in the graphic field and moving it to the left or right. 46 To print out the current view, click on the arrow next to the printer symbol above the device log: You can then select from the following options: Interactive analysis The following view will appear for an interactive analysis:
47 47 As for the regular analysis, you will find details of the analyzed device and the device log in the top left and top right of the window. The filter function too is the same as for the regular analysis (see p. 45). If you would like to reduce the displayed time period (zoom), use the mouse to move the marker to the point in time where you want the graphic to start. The line above the graphic provides information about the date and the exact time: While holding the left mouse button down, move the marker to the point where you want the analysis to end. The time interval which is to be displayed is shown with a black background: