Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Notifications
Login / Register
Community
Community
Notifications
close
  • Forums
  • Knowledge Center
  • Events & Webinars
  • Ideas
  • Blogs
Help
Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Login / Register
Sustainability
Sustainability

We Value Your Feedback!
Could you please spare a few minutes to share your thoughts on Cloud Connected vs On-Premise Services. Your feedback can help us shape the future of services.
Learn more about the survey or Click here to Launch the survey
Schneider Electric Services Innovation Team!

Building Automation Knowledge Base

Schneider Electric Building Automation Knowledge Base is a self-service resource to answer all your questions about EcoStruxure Building suite, Andover Continuum, Satchwell, TAC…

cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Show  only  | Search instead for 
Did you mean: 
  • Home
  • Schneider Electric Community
  • Knowledge Center
  • Building Automation Knowledge Base
Options
  • My Knowledge Base Contributions
  • Subscribe
  • Bookmark
  • Invite a Friend
Invite a Co-worker
Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send Invite Cancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
Send New Invite Close
Labels
Top Labels
  • Alphabetical
  • Andover Continuum 2,208
  • TAC Vista 2,045
  • EcoStruxure Building Operation 1,838
  • TAC IA Series 1,821
  • TAC INET 1,458
  • Field Devices 721
  • Satchwell BAS & Sigma 474
  • EcoStruxure Security Expert 325
  • Satchwell MicroNet 252
  • EcoStruxure Building Expert 228
  • EcoStruxure Access Expert 147
  • CCTV 53
  • Project Configuration Tool 46
  • EcoStruxure Building Activate 13
  • EcoStruxure Building Advisor 12
  • ESMI Fire Detection 6
  • Automated Engineering Tool 4
  • EcoStruxure Building Data Platform 3
  • EcoStruxure Workplace Advisor 1
  • EcoStruxure for Retail - IMP 1
  • Previous
  • 1 of 2
  • Next
Top Contributors
  • Product_Support
    Product_Support
  • DavidFisher
    DavidFisher
  • Cody_Failinger
    Cody_Failinger
See More Contributors
Related Products
Thumbnail of EcoStruxure™ Building Operation
Schneider Electric
EcoStruxure™ Building Operation
4
Thumbnail of SmartX IP Controllers
Schneider Electric
SmartX IP Controllers
1
Thumbnail of EcoStruxure™ Building Advisor
Schneider Electric
EcoStruxure™ Building Advisor
1

Related Forums

  • Intelligent Devices Forum

Previous Next

Invite a Colleague

Found this content useful? Share it with a Colleague!

Invite a Colleague Invite

Building Automation Knowledge Base

Sort by:
Helpfulness
  • Date
  • Views
  • Likes
  • Helpfulness
Options
  • Subscribe
  • Bookmark
  • Invite a Friend
  • « Previous
    • 1
    • …
    • 486
    • 487
    • 488
    • …
    • 507
  • Next »

Understanding how the Series 2000 NetPlus Router (NPR) functions in a corporate WAN / LAN environment.

Issue Understanding how the NPR functions in a corporate WAN / LAN environment NPR network Issues What information can we provide to IT (MIS) departments that will explain what the NPR is doing on their network. Product Line TAC INET Environment I/NET Seven Series 2000 NetPlus Router (NPR) Cause This advisory discusses the interaction of a Series 2000 NetPlus Router (NPR) with a corporate LAN/WAN. It is intended to alleviate any concerns MIS personnel may have regarding Ethernet network loading or LAN/WAN security.  Resolution For information on the Series 2000 NetPlus Router (NPR) when used on a corporate LAN / WAN refer to the attached Customer Advisory CA-2004-01.  This advisory includes more detailed information of the following topics: The NetPlus Router and Dial Security Protocols Packet Routing TCP/IP Communication Network exposure I/NET Ethernet Network Loading Network Utilization The NetPlus Router and Network Configurations Network Configuration for Proxy ARP:
View full article
Picard Product_Support
‎2018-09-06 10:28 PM

Last Updated: Administrator DavidFisher Administrator ‎2020-08-13 07:51 AM

Labels:
  • TAC INET
1919 Views

Access Control Application issues: using large number keys, translation tables, importing and converting existing I/NET 2000 databases

Issue Access Control Application Issues including: Using large number keys Translation tables - when and how Importing and converting existing I/NET 2000 databases Environment Access Control Application Cause Getting started with an access control application. Resolution Detailed information described in: I/NET Getting Started Guide (TCON298 Chapter 1) I/NET Technical Reference Guide (TCON300 Chapter 9) Upgrade.txt file included on I/NET Installation CD.
View full article
Picard Product_Support
‎2018-09-06 10:30 PM

Labels:
  • TAC INET
915 Views

ID Works Limitations when configured with I/NET Seven

Issue What are the limitations of using ID Works with I/NET Seven? Can a "begin time" or an "end time" be assigned to a temporary card from ID Works (Card Access Control Data Entry)? Can an individual’s record be made a "DPU Resident" from ID Works? (I/NET Seven 1.0x) What is the format of the CardID entry in the ID Works system? Can assign PIN numbers be used with an ID Works system? Product Line TAC INET Environment I/NET Seven ID Works  -  For details of what version of Datacard ID Works Software integrates correctly with I/NET Seven refer to Datacard ID Works Software versions for integrating with I/NET Seven.  Cause I/NET Seven provides support for Datacard ID Works identification software. I/NET Seven provides a database view specifically designed for use with ID Works. This view contains tenant and individual data used by the ID Works Video Badging application. It allows you to add individuals, assign key/cards, edit individual parameters, or even delete individuals.  The limitations described below are imposed anytime that you use ID Works to modify your I/NET Seven access control system. Resolution The limitations described below are imposed anytime that you use ID Works to modify your I/NET Seven access control system. ID Works does not allow you to add or modify multiple cards for a single individual. ID Works does not allow you to remove a card from an individual without deleting the individual record in I/NET Seven. You cannot disable an individual’s card without disabling the individual in the I/NET Seven. You cannot create a new group or a new tenant from within ID Works. You cannot assign a begin time or an end time to a temporary card from ID Works – only dates can be entered. I/NET Seven will use a default time of 00:00 (Midnight) on the dates specified. If you need to change this default time, it requires you to go into I/NET Seven > Access > Individuals editor. You cannot make an individual’s record be DPU resident from ID Works. You cannot assign a decimal card number to an individual from within ID Works. The format for this entry has to be a hexadecimal number. You cannot set and individual’s APB scheme (i.e., hard, soft, or graced antipassback) from within ID Works. You cannot assign a PIN to an individual from within ID Works. These can be access via the I/NET individual editor. For further information refer to TCON301 Chapter 5.
View full article
Picard Product_Support
‎2018-09-06 10:41 PM

Last Updated: Administrator CraigEl Administrator ‎2022-08-09 09:20 PM

Labels:
  • TAC INET
1459 Views

Deny Entry Select for Secondary Schedules.

Issue Deny Entry Select transaction / message received when using Secondary Schedules. Environment I/NET Seven DPU Controllers 7910 7920 1284 Cause To use any of the features, listed below, requires that the DPU be a 7920 w/ MIP board or the SCU1284. 7910 and 7920 w/o MIP board will still work with the I/Net system but they cannot use these functions.  The host prevents the download of these features to any DPU revision prior to 3.10. Feature 1: Secondary schedule. Feature 2: Shift management. Feature 3: Extended elevator control to support up to 79 floors.   Resolution Secondary Schedules can only be implemented on 7920 (Mipped) 48K boards. If a Secondary Schedule is set up for an individual on doors that are controlled by a 7920 DPU that use the standard EPROM chip, a “Deny Entry Select Message” will be generated in the Transactions. If 7910s are present then the same above rule applies.
View full article
Picard Product_Support
‎2018-09-06 03:28 PM

Labels:
  • TAC INET
1127 Views

Equalization on Windows XP PCs for I/NET Seven Revisions 1.10 - 1.14.

Issue File Equalization not working even though I/NET indicates Equalization is online. A balloon message pops up saying that Equalization is Online but the data is not shared between Client and File master. Environment Windows XP I/NET Revision1.10 - 1.14 Cause There is an issue with Equalization when using Windows XP as File Master and Clients with I/NET Seven Revision 1.14. Once a Client is connected to the file master, a balloon message pops up saying that Equalization is Online, but it never gets the snapshot from the File Master.  Resolution To correct this issue the following will apply: Verify that the user has full access right on their Windows user Password. Go to My Network Places, Right Click and select Properties. Select the Advanced Tab, verify that there are no checked boxes for the Firewall. Go to Administrative Tools, Local Security Settings. Local Policies, Security Options, Locate the policy "Network Access: Sharing and Security Model for local Accounts" Change the security setting to "Classic – local users authenticate as themselves". Apply changes, shut down and restart the PC.
View full article
Picard Product_Support
‎2018-09-06 03:28 PM

Labels:
  • TAC INET
1272 Views

TAC Xenta I/O modules do not come online after a download from System Plug-In

Issue TAC Xenta I/O modules do not come online after a download from System Plug-In Rapidly blinking green light on I/O modules show offline status (fast blink) Product Line TAC Vista Environment Xenta 400 series I/O modules Cause No I/O assigned to the module in the Menta file Needs a power cycle after download to associate with the base unit Resolution Verify that at least one hardware input or output is assigned to a terminal on the I/O module. If the I/O module is a spare that has been added for later expansion capabilities, it will never associate with the master or report an online status. If this is the case, assign a "dummy" input to the module temporarily if the rapidly blinking LED is a concern. Sometimes even if all of the correct information is downloaded to the TAC Xenta controller, the green light is still blinking rapidly (not configured) on the TAC Xenta I/O module. If this happens try to power cycle the TAC Xenta controller.
View full article
Picard Product_Support
‎2018-09-06 03:28 PM

Last Updated: Guinan RandyDavis Guinan ‎2021-10-26 11:49 AM

Labels:
  • TAC Vista
2200 Views

Relay Control With Xenta Analog Output

Issue Relay Control With Xenta Analog Output Product Line TAC Vista Environment Xenta programmable controllers Xenta 281, 282, 283, 301, 302, 401 Cause Occasionally installers of Xenta controllers are using the Analog Output (AO) of the Xenta controllers to control one or two external relays. This is being done when the HVAC application needs one or two more points of discrete on/off control and when the AOs are not needed for proportional control. Obviously, this deviation from normal I/O application is being entertained in a effort to avoid additional costs of higher capacity controllers and/or the Xenta I/O expansion modules. Implementation has consisted of a 12Vdc relay connected to the AO output and the AO is directed to 100% output (10V) to energize the relay and 0% output (0V) to de-energize the relay. Resolution While this AO relay control application has not been recommended for typical designs, it should be possible to accommodate it reliably as long as some specific considerations are included in the relay selection and installation. For more information please use the following link: Xenta Analog Output
View full article
Picard Product_Support
‎2018-09-06 10:42 PM

Last Updated: Administrator DavidFisher Administrator ‎2020-08-13 07:57 AM

Labels:
  • TAC Vista
1917 Views

SQL Server Systems Overview (I/NET Seven)

Issue Is there a document that describes the SQL terms used as part of I/NET Seven's File Equalization feature? Product Line TAC INET Environment I/NET Seven File Equalization SQL 2000 all editions Cause An overview of SQL Server Systems which can be used to describe the SQL terms used within I/NET Seven's File equalization feature.  Resolution SQL Server Systems Overview (I/NET Seven) A SQL Server system can be implemented as a client/server system or as a stand-alone desktop system. The type of system you design will depend on the number of users that will be accessing the database simultaneously and on the kind of work they will be doing. Generally the most typical environment is a tier 2 configuration consisting of a SQL Server 2000 software configured on a PC with client connections over ethernet Desktop System SQL Server can also be used as a stand-alone database server that runs on a desktop computer or a laptop. This is referred to as a desktop system. The client applications run on the same computer that stores the SQL Server engine and the databases. Only one computer is involved in this system. Therefore, no network connection is made from client to server; the client makes a local connection to its local installation of SQL Server. The desktop system is useful in cases in which a single user accesses the database or in which a few users who share a computer access the database at different times. For example, in a small store with one computer, several employees might access the store’s database to insert customer and sales information, but they must take turns accessing the system. Also, as in this example, desktop systems are useful when the database or databases are small. Designing a Microsoft SQL Server System Before you even begin loading the operating system and Microsoft SQL Server, you should have a good idea how you want to design your SQL Server system. By carefully designing your SQL Server system, you can avoid costly downtime caused by having to either rebuild the system or reinstall SQL Server with different options. By comparison, when we talk in general about a system, we mean all of the hardware and software that make up all of the computers working on behalf of the user in order to access data from one or more SQL Server databases. Security Today’s computing environments have differing security requirements. Windows 2000 allows you to customize the level of security to meet your needs. The following features assist you in securing both your computer and network access: Windows NT file system (NTFS) The Windows NT file system is the core security technology in Windows 2000. NTFS provides file security at a group or user level. Required for I/NET Seven Installations. Windows NT security model This feature permits only authorized users to access system resources. This model controls which user or users can access objects, such as files and printers, as well as which actions individuals can take on an object. In addition, you can enable auditing to track and monitor actions taken, as well as to track actions that a user attempted that would have violated a security policy. Encrypting file system (EFS) This feature encrypts files with a randomly generated key. The encryption and decryption processes are transparent to the user. EFS requires your disks to be formatted with NTFS. IP Security (IPSec) support IP Security helps protect data transmitted across a network. This is an integral component for providing security for virtual private networks (VPNs), which allow organizations to transmit data securely across the Internet. Figure 2-1 displays the IP Security configuration dialog box. Kerberos support This feature provides an industry-standard, highly secure authentication method for single-logon support for Windows 2000—based networks. The Kerberos protocol is an Internet standard and is highly effective when you are integrating Windows 2000 systems into an environment with a different operating system, such as UNIX. Microsoft SQL Server Replication: Overview and Snapshot Replication Microsoft SQL Server database replication technology is designed to help you distribute data and stored procedures among the servers in your company. Replication allows you to configure systems to copy data to other systems automatically. Using database replication, you can copy as much or as little data as you want, and you can allocate data among as many systems as you want. Because the replication process is automatic and because during replication a database stores data about the state of the replication as well as the replicated data, there is no danger in losing data. If a replication procedure is interrupted (say, due to a power failure), replication resumes from the point of failure as soon as the systems are running normally again. What Is Database Replication? Database replication is the act of copying, or replicating, data from one table or database to another table or database. Using this technology, you can distribute copies of an entire database to multiple systems throughout your company, or you can distribute selected pieces of the database. When SQL Server replication technology is used, the task of copying and distributing data is automated. No user intervention is needed to replicate data once replication has been set up and configured. Because the data replication and processing is done from within a SQL Server database, there is additional stability and recoverability. If a failure occurs during replication (or while any other SQL Server transaction is being performed), operations resume at the point of failure once the problem is fixed. Because of this, many people prefer replication to other methods of moving data between systems. Replication Components Microsoft SQL Server 2000 replication is based on the publish-and-subscribe metaphor first used to implement replication in SQL Server 6. This metaphor consists of three main concepts: publishers, distributors, and subscribers. A publisher is a database system that makes data available for replication. A distributor is the database system that contains the distribution database, or pseudodata, used to maintain and manage the replication. A subscriber is a database system that receives replicated data and stores the replicated database. Publishers The publisher consists of a Microsoft Windows system hosting a SQL Server database. This database provides data to be replicated to other systems. In addition, the SQL Server database keeps track of which data has changed so that it can be effectively replicated. The publisher also maintains information about which data is configured for replication. Depending on the type of replication that is chosen, the publisher does some work or little work during the replication process. This will be explained in further detail later in this chapter. A replicated environment can contain multiple subscribers, but any given set of data that is configured for replication, called an article, can have only one publisher. Having only one publisher for a particular set of data does not mean that the publisher is the only component that can modify the data—the subscriber can also modify and even republish the data. Distributors In addition to containing the distribution database, servers acting as distributors store metadata, history data, and other information. In many cases, the distributor is also responsible for distributing the replication data to subscribers. The publisher and the distributor are not required to be on the same server. In fact, you will likely use a dedicated server as a distributor. Each publisher must be assigned a distributor when it is created, and a publisher can have only one distributor. NOTE Metadata is data about data. Metadata is used in replication to keep track of the state of replication operations. It is also the data that is propagated by the distributor to other members of the replication set and includes information about the structure of data and the properties of data, such as the type of data in a column (numeric, text, and so on) or the length of a column. Subscribers As mentioned, subscribers are the database servers that store the replicated data and receive updates. Subscribers can also make updates and serve as publishers to other systems. For a subscriber to receive replicated data, it must subscribe to that data. Subscribing to replication involves configuring the subscriber to receive that data. A subscription is the database information to which you are subscribing. Types of Replication SQL Server offers three types of replication: snapshot, transactional, and merge. These replication types offer varying degrees of data consistency within the replicated database, and they require different levels of overhead. Snapshot Replication Snapshot replication is the simplest replication type. With snapshot replication, a picture, or snapshot, of the database is taken periodically and propagated to subscribers. The main advantage of snapshot replication is that it does not involve continuous overhead on publishers and subscribers. That is, it does not require publishers to continuously monitor data changes, and it doesn’t require the continuous transmission of data to subscribers. The main disadvantage is that the database on a subscriber is only as current as the last snapshot. In many cases, as you will see later in this chapter, snapshot replication is sufficient and appropriate—for example, when source data is modified only occasionally. Information such as phone lists, price lists, and item descriptions can easily be handled by using snapshot replication. Transactional Replication – ( Is not applicable to I/NET Seven) Transactional replication can be used to replicate changes to the database. With transactional replication, any changes made to articles (a set of data configured for replication) are immediately captured from the transaction log and propagated to the distributors. Using transactional replication, you can keep a publisher and its subscribers in almost exactly the same state, depending on how you configure the replication. Transactional replication should be used when it is important to keep all of the replicated systems current. Transactional replication uses more system overhead than snapshot replication because it individually applies each transaction that changes data in the system to the replicated systems. Merge Replication Merge replication is similar to transactional replication in that it keeps track of the changes made to articles. However, instead of individually propagating transactions that make changes, merge replication periodically transmits a batch of changes. Because merge replication transmits data in batches, it is also similar to snapshot replication. Merge replication differs from transactional replication in that it is inherently multidirectional. With merge replication, publishers and subscribers can update the publication equally. Transactional replication also allows subscribers to update the publication, but the two replication types function quite differently. Introduction to Merge Replication Merge replication performs multidirectional replication between the publisher and one or more subscribers. This allows multiple systems to have updatable copies of the publication and to modify their own copies. A modification on the publisher will be replicated to the subscribers. A modification on a subscriber will be replicated to the publisher and then replicated to the other subscribers. Unlike transactional replication, merge replication works by installing triggers on the publisher and on the subscribers. Whenever a change is made to the publication or a copy of it, the appropriate trigger is fired, which causes a replication command to be queued up to be sent to the distribution database. This command is eventually sent to the distribution database and then sent to participating systems. Because merge replication operates this way, it requires much more overhead, especially on the publisher, than does transactional replication. As you will learn in this chapter, the key components involved in the merge replication system are the Merge Agent and the distribution database. The Merge Agent reconciles (merges) incremental changes that have occurred since the last reconciliation. When you use merge replication, no Distribution Agent is used—the Merge Agent communicates with both the publisher and the distributor. The Snapshot Agent is used only to create the initial database. The Merge Agent performs the following tasks. The Merge Agent uploads all changes from the subscriber. All of the rows without a conflict (rows not modified on both the publisher and the subscriber) are uploaded immediately; those with a conflict (rows modified on both systems) are sent to the conflict resolver. The resolver is a module that is used to resolve conflicts in merge replication. You can configure this module to resolve conflicts based on your needs. All changes are applied to the publisher. The Merge Agent uploads all changes from the publisher. All of the rows without a conflict are uploaded immediately; those with a conflict are sent to the conflict resolver. All changes are applied to the subscriber. This process will repeat as scheduled. With push subscriptions, the Merge Agent runs on the distributor. With pull subscriptions, the Merge Agent runs on the subscriber. Each merge publication has its own Merge Agent. Publications A publication is a set of articles grouped together as a unit. Publications provide the means to replicate a logical grouping of articles as one replication object. For example, you can create a publication to be used to replicate a database consisting of multiple tables, each of which is defined as an article. It is more efficient to replicate a database by replicating the entire database in one publication than by replicating tables individually. A publication can consist of a single article, but it almost always contains more than one article. However, a subscriber can subscribe only to publications, not to articles. Therefore, if you want to subscribe to a single article, you must configure a publication that contains only that article and then subscribe to that publication. Push and Pull Subscriptions Replicated data can be propagated in a number of ways. All propagation methods are based on either push subscriptions or pull subscriptions. A subscriber can support a mixture of push and pull subscriptions simultaneously. Push Subscriptions The distributor is responsible for providing updates to the subscribers. Updates are initiated without any request from the subscriber. A push subscription is useful when centralized administration is desired because the distributor, rather than multiple subscribers, controls and administers replication. In other words, the initiation and the scheduling of the replication are handled on the distributor. Pull Subscriptions Pull subscriptions allow subscribers to initiate replication. Replication can be initiated either via a scheduled task or manually. Pull subscriptions are useful if you have a large number of subscribers and if the subscribers are not always attached to the network. Because subscribers initiate pull subscriptions, subscribers not always connected to the network can periodically connect and request replication data. This can also be useful in reducing the number of connection errors reported on the distributor. If the distributor tries to initiate replication to a subscriber that does not respond, an error will be reported. Thus, if the replication is initiated on the subscriber only when it is attached, no errors will be reported. Replication Agents Several agents are used to perform the actions necessary to move the replicated data from the publisher to the distributor and finally to the subscriber: the Snapshot Agent, the Log Reader Agent, the Distribution Agent, the Merge Agent, and the Queue Reader Agent. Snapshot Agent The Snapshot Agent is used for creating and propagating the snapshots from the publisher to the distributor (or snapshot location). The Snapshot Agent creates the replication data (the snapshot) and creates the information that is used by the Distribution Agent to propagate that data (the metadata). The Snapshot Agent stores the snapshot on the distributor (or anywhere that you specify). The Snapshot Agent is also responsible for maintaining information about the synchronization status of the replication objects; this information is stored in the distribution database. The Snapshot Agent is dormant most of the time and might periodically activate, based on the schedule that you have configured, and perform its tasks. Each time the Snapshot Agent runs, it performs the following tasks: The Snapshot Agent establishes a connection from the distributor to the publisher. If a connection is not available, the Snapshot Agent will not proceed with creating the snapshot. Once the connection has been established, the Snapshot Agent locks all of the articles involved in the replication to ensure that the snapshot is a consistent view of the data. The Snapshot Agent establishes a connection from the publisher to the distributor. Once this connection has been established, the Snapshot Agent engineers a copy of the schema for each article and stores that information in the distribution database. This data is considered metadata. The Snapshot Agent takes a snapshot of the actual data on the publisher and writes it to a file at the snapshot location. The snapshot location does not necessarily need to be on the distributor. If all systems involved in the replication are SQL Server systems, the file is stored as a native bulk copy program. If mixed types of systems are involved in the replication, the data is stored in text files. At this point, synchronization information is set by the Snapshot Agent. After the data has been copied, the Snapshot Agent updates information in the distribution database. The Snapshot Agent releases the locks that it has held on the articles and logs the snapshot into the history file. As you can see, the Snapshot Agent is responsible for only creating the snapshot; it does not distribute it to subscribers. Other agents perform this task. Distribution Agent The Distribution Agent propagates snapshots and transactions from the distribution database to subscribers. Each publication has its own Distribution Agent. Merge Agent The Merge Agent is used in merge replication to reconcile (merge) incremental changes that have occurred since the last reconciliation. When you use merge replication, the Distribution Agent and the Snapshot Agent aren’t used—the Merge Agent communicates with both the publisher and the distributor. Backing Up Microsoft SQL Server Backing up the database is one of the DBA’s most important tasks. Having backup files and carefully planning for disaster recovery enable the DBA to restore the system in the event of a failure. The DBA is responsible for keeping the system up and running as much as possible and, in the event of a system failure, for restoring service as quickly as possible. Downtime can be both inconvenient and extremely expensive. Getting the database back up and running as soon as possible is essential. Backup Terminology Before we look at backup techniques, let’s review some terminology. In this section, you’ll learn some basic facts about backup, restore, and recovery operations. Backup and Restore Backup and restore operations are related and involve saving data from the database for later use, similar to the backup and restore operations that can be performed by the operating system. During the backup, data is copied from the database and saved in another location. The difference between an operating system backup and a database backup is that the operating system backup can save individual files, whereas the database backup saves the entire database. Usually, a database is shared by many users, whereas many operating system files belong to individual users. Thus, a database backup backs up all of the user’s data at once. Because SQL Server is designed for maximum uptime, the backup process is designed to work while the database is up and running, and even while users are accessing the database. During the restore, the backed up data is copied back to the database. (Don’t confuse restore with recovery; these are two separate operations.) Unlike the backup process, the restore process cannot be done while SQL Server is up and running. In addition, a table cannot be restored separately. Recovery Recovery involves the ability of the relational database management system (RDBMS) to survive a system failure and replay (recover) transactions. Because of the delay in writing changes to disk, a system failure might leave the database in a corrupted state, because some changes made to the database might not have been written to disk or changes written to disk might not have been committed. To maintain the integrity of the database, SQL Server logs all changes in a transaction log. When SQL Server restarts after a system failure, it uses the transaction log to roll forward transactions that were committed but not written to disk and to roll back transactions that were not committed at the time of the failure. In this manner, data accuracy is guaranteed. SQL Server must be prepared to handle several types of transactions during recovery, including the following: Transactions that are queries only No recovery is necessary. Transactions that changed data in the database and were committed but were not written to disk During recovery, SQL Server reads the data pages from disk, reapplies the changes, and then rewrites the pages to disk. Transactions that changed data in the database, were committed, and were written to disk During recovery, SQL Server determines that the changes were written to disk. No other intervention is required. Transactions that changed data in the database and were not committed During recovery, SQL Server uses the transaction log to undo any changes that were made to data pages and restores the database to the state it was in before the transactions started. When SQL Server restarts from a system failure, the recovery mechanism starts automatically. The recovery mechanism uses the transaction log to determine which transactions need to be recovered and which do not. Many of the transactions will not need recovery, but SQL Server must read the transaction log to determine which transactions do require recovery. SQL Server starts reading the transaction log at the point where the last checkpoint occurred. System Failure You might be wondering whether backups are really necessary if you use technologies such as Microsoft Cluster Services and RAID fault tolerance. The answer is a resounding “yes.” Your system can fail in a number of ways, and those methods of fault tolerance and fault recovery will help keep your system functioning properly through only some of them. Some system failures can be mild; others can be devastating. To understand why backups are so important, you need to know about the three main categories of failures: hardware failures, software failures, and human error. Hardware Failures Hardware failures are probably the most common type of failure you will encounter. Although these failures are becoming less frequent as computer hardware becomes more reliable, components will still wear out over time. Typical hardware failures include the following: CPU, memory, or bus failure These failures usually result in a system crash. After you replace the faulty component and restart the system, SQL Server automatically performs a database recovery. The database itself is intact, so it does not need to be restored—SQL Server needs simply to replay the lost transactions. Disk failure If you’re using RAID fault tolerance, this failure type will probably not affect the state of the database at all. You must simply repair the RAID array. If you are not using RAID fault tolerance or if an entire RAID array fails, your only alternative is to restore the database from the backup and use the transaction log backups to recover the database. Catastrophic system failure or permanent loss of server If the entire system is destroyed in a fire or some other disaster, you might have to start over from scratch. The hardware will need to be reassembled, the database restored from the backup, and the database recovered by means of the data and transaction log backups. Software Failures Software failures are rare, and your system probably will never experience them. However, a software failure is usually more disastrous than a hardware failure because software has built-in features that minimize the effect of hardware failures, and without these protective features, the system is vulnerable to disaster if a hardware failure occurs. The transaction log is an example of a software feature designed to help systems recover from hardware failures. Typical software failures include the following: Operating system failure If a failure of this type occurs in the I/O subsystem, data on disk can be corrupted. If no database corruption occurs, only recovery is necessary. If database corruption occurs, your only option is to restore the database from a backup. RDBMS failure SQL Server itself can fail. If this type of failure causes corruption to occur, the database must be restored from a backup and recovered. If no corruption occurs, only the automatic recovery is needed to return the system to the state it was in at the point of failure. Application failure Applications can fail, which can cause data corruption. Like an RDBMS failure, if this type of failure causes corruption to occur, the database must be restored from a backup. If no corruption occurs, no restore is necessary; the automatic recovery will return the system to the state it was in at the point of failure. You might also need to obtain a patch from your application vendor to prevent this type of failure from recurring. Human Error The third main category of failure is human error. Human errors can occur at any time and without notice. They can be mild or severe. Unfortunately, these types of errors can go unnoticed for days or even weeks, which can make recovery more difficult. By establishing a good relationship (including good communication) with your users, you can help make recovery from user errors easier and faster. Users should not be afraid to come to you immediately to report a mistake. The earlier you find out about an error, the better. The following failures can be caused by human error: Database server loss Human errors that can cause the server to fail include accidentally shutting off the power or shutting down the server without first shutting down SQL Server. Recovery is automatic when SQL Server is restarted, but it might take some time. Because the database is intact on disk, a restore is not necessary. Data loss This type of loss can be caused by someone’s accidentally deleting a data file, for example, thus causing loss of the database. Restore and recovery operations must be performed to return the database to its prefailure state. Table loss or corrupted data If a table is dropped by mistake or its data is somehow incorrectly changed, you can use backup and recovery to return the table to its original state. Recovery from this type of failure can be quite complex because a single table or a small set of data that is lost cannot simply be recovered from a backup. Data Base Backups All SQL Server backups are performed for a specific database. To completely back up your system, you should back up all databases in the system and their transaction logs. Don’t forget to back up the master database as well. And remember, without good backups, you might not be able to restore your data in the event of a failure. Full Backups As mentioned, a full backup involves backing up an entire database. All of the filegroups and data files that are part of this database are backed up. If you have multiple databases, you should back up all of them. A full backup is probably the most common technique for backing up small- to medium-size databases. Depending on how large the databases are, this process can be quite time consuming, so if time is an issue, you might consider performing differential backups or filegroup backups, as described next. Once you start a backup, you cannot pause it—the backup will continue until the entire database is backed up. Conclusion It is very important to understand when using SQL Server 2000 full version that this application requires more specific knowledge in deployment and configuration of this software program.
View full article
Picard Product_Support
‎2018-09-06 10:44 PM

Last Updated: Administrator DavidFisher Administrator ‎2020-08-13 08:00 AM

Labels:
  • TAC INET
1543 Views

Problems can occur if LonMaker is not installed in the default directory

Issue There have been some reports of problems encountered when LonMaker is installed in locations other then the default directory. These problems can include failure of LonMaker .dll files to register as well as plug-in registration failure. Environment Echelon LonMaker Cause LonMaker is not installed in default directory. Typically this refers to the C:\ drive, but it doesn't necessarily have to. Resolution Restrict the LonMaker installation to the default directory and the default LonWorks folder. Example: C:\LonWorks
View full article
Picard Product_Support
‎2018-09-06 03:28 PM

Labels:
  • TAC Vista
1217 Views

LON Network - Cable Transient Suppression

Issue LON Network - Cable Transient Suppression Product Line EcoStruxure Building OperationTAC IA Series, TAC Vista Environment LON networks that extend beyond the walls of a single building Cause Surge arrestors dissipate transient energy before the cable can provide a low resistance path to the building ground, preventing potential electrical damage. Resolution Click here to download the white paper on this topic: Cable Transient Suppression It is recommended that a Transient Suppression protection device be installed on the LON communications cable at any point where the cable enters or exits the building. The LON is frequently used to connect a collection of controllers in one building with a collection of controllers in one or more other buildings in a campus. The LON may also extend outside the protection of an office building when servicing communications to roof-top equipment and/or outside monitoring equipment. At any location where the LON cable penetrates and extends outside the building compartment, it is recommended that a gas discharge type lightning arrestor be installed across the LON conductor pair and earth ground as shown below. This should be positioned as close as possible to the wall penetration location. The objective is to keep the cable distance as short as possible before the cable suppression is provided. It is important that a heavy gauge earth ground connection be provided to the gas discharge protector with as short a length as possible. Here we want to dissipate the transient energy as soon as possible before the cable extends on into the facility and provide a low resistance path to the building ground. SA2-U8 Surge Arrestor TAC provides a Model SA2-U8 Surge Arrestor which can be used for this purpose. This SA2-U8 device is a gas discharge arrestor packaged in a small DIN rail mountable enclosure. The SA2-U8 is UL864 listed and is the only device that can be used on TAC UL864 listed system. It must be installed on the LON cable at any entry/exit locations. Other Gas Discharge Suppressors On non-UL864 systems, the SA2-U8 may also be used, or the installer may use any one of a number of available 90V gas discharge tube devices. These are typically tubular shaped components and since you need two tubes (one for each of the two LON conductors) a dual element three lead discharge tube is recommended. The device’s leads may be attached to a standard screw terminal block and mounted in most any size electrical box. A collection of some of the suitable gas discharge devices that could be used is as follows: Manufacturer Part Number Bourns 2026-09-C Epcos B88069X8440B202 Citel BTS-90 SRC Devices PMT-090-14   There are other acceptable part numbers available from each of these manufacturers with variations provided in the lead configuration and lengths while maintaining the same 90V protection rating. Devices To Avoid It is not recommended that you use any semiconductor type (Transzorb / TVS / Diode) protection devices. Their higher speed and lower clamping voltage characteristics is not necessary with the inherent protection offered by the FTT-10 and FT-X1 LON transceivers. Such semiconductor based transient suppression devices frequently add some undesirable capacitance to the network which impedes communication performance and most inject signal clamping at voltage levels much lower than necessary or desirable for the Free Topology FTT-10 and FT-X1 based LON networks. The common mode noise immunity of the FTT LON should be much better than that provided by the typical RS485 network. This should provide more tolerance for electrically noisy environments. However, it has been observed that some semiconductor based network protection units have been used that can drastically degrade communications performance. One such device is the Model 91287 from Atlantic Scientific Corp. which was identified by the manufacturer as a LON System protector. This device clamps the signal at one diode drop below ground level which virtually destroys the LON’s common mode noise tolerance. The presence of one of these devices has been found to be the cause of communications problems in a system operating is an electrically noisy environment. This type of communications impairment may be encountered immediately. In other instances, LON retries may cover the problem and the system may operate for extended period of time before environmental or equipment changes raise noise levels above the tolerable threshold. This threshold is now much worse than RS485 networks. This device, and any similar, should be avoided on any LON systems.
View full article
Picard Product_Support
‎2018-09-06 10:46 PM

Last Updated: Janeway PeterEdvik Janeway ‎2019-11-07 05:51 AM

Labels:
  • EcoStruxure Building Operation
  • TAC IA Series
  • TAC Vista
2266 Views

ID Works 4.0 badge printing with I/NET rev 1.1x

Issue Printing a recently modified badge results in an error message: "This is not an active card." Environment ID Works 4.0 I/NET rev 1.1x Cause Making a change to an existing badge, data, or picture. Resolution Any time an existing badge, data, or picture is changed, these changes must be saved to I/NET before printing the revised badge.
View full article
Picard Product_Support
‎2018-09-06 03:28 PM

Labels:
  • TAC INET
1154 Views

NPR Connectivity over the Internet

Issue NPR Connectivity over the Internet Product Line TAC INET Environment I/NET NetPlus Router (NPR) Series 2000 Cause In most cases when communication occurs over the Internet, firewalls are in place to block non typical ports.  I/NET utilizes Ports 50069 (set by default).  These ports usually need to be configured within routers to allow I/NET to communicate correctly. Resolution Receiving messages from one I/NET System to another over the Internet through an NPR that is behind a Firewall. In order to accomplish this there are several steps that need to be done. Configure the NPR with a static IP Address. Set the Host Masking to send and receive messages (this will not be available when directly connected). Remove the NPR from behind the firewall and connect outside the firewall. Connected directly to the Internet. Set the Host Masking so that it can receive messages. Once communications have been established, You can now replace the NPR back behind the firewall. Also refer to Which ports must be open on a commercial router in order to communicate with an NPR over a WAN? which discusses ports utilized by I/NET. For cases where you are using the Xenta Server 527 NetPlus Router (NPR) refer to TCP/IP Ports used by the I/NET system: UDP Port Settings.
View full article
Picard Product_Support
‎2018-09-06 08:28 PM

Last Updated: Administrator CraigEl Administrator ‎2022-08-09 09:47 PM

Labels:
  • TAC INET
1368 Views

Sunrise/Sunset Time Schedules I/NET Seven rev 1.xx and 7780 Lighting Controllers.

Issue Sunrise/Sunset Time Schedules I/NET Seven rev 1.xx and 7780 Lighting Controllers. Environment I/NET Seven 2.30 and lower Model 7780 DLCU Firmware 5.09 and below. Cause There was an issue in I/NET 2.3 and lower where the Time Schedule for Sunrise and Sunset would not work on 7780 Lighting Controllers. Resolution To work around this issue in 2.3, these steps should be followed: Go to the Resident IO Point that is controlling the Lights. Go to the TS Extension and Modify. Add a Start action on #3 at midnight. This would re-enforce the timer to start again. This has been corrected in firmware release 5.10 for the Model 7780 DLCU (Firmware release with I/NET Seven 2.31). To eliminate the issue, and upgrade will be required.
View full article
Picard Product_Support
‎2018-09-06 03:28 PM

Labels:
  • TAC INET
1428 Views

Door Transactions defined in the Door Editor are not dialing back to the host

Issue Door Transactions defined in the Door Editor are not dialing back to the host Environment I/NET Cause Only distribution group 1 messages will cause a dial tap to dial out. Keep this in mind if your system is configured to use the 7806x tap to report to a remote host. Resolution Ensure that all doors and reader points use group 1 for messaging.
View full article
Picard Product_Support
‎2018-09-06 03:28 PM

Labels:
  • TAC INET
994 Views

Someone held a door open and the "Door open too long" did not report the alarm, what could cause this?

Issue Someone held a door open and the "Door open too long" did not report the alarm, what could cause this? Environment I/NET Cause If you are running I/NET 2.2x version there could be three reasons for this. In the door editor, there is a new alarm point defined for the "DOTL" that needs to be populated. The other possible cause is, if the door is in the unlock mode, the "DOTL" will not alarm.  The door sense switch is not working correctly. If you are running I/NET 1.xx then the "b & c" answers could be the problem. Resolution If you are running I/NET 2.2x version there could be three reasons for this. In the door editor, there is a new alarm point defined for the “DOTL” that needs to be populated. Connect to the controller Select Edit>Controller Doors Modify the Door Change the DOTL setting to "Alarm"  The other possible cause is, if the door is in the unlock mode, the “DOTL” will not alarm.  Check the state of the doors DO point Change the door schedule so that the door will be locked The door sense switch is not working correctly. If you are running I/NET 1.xx then the b & c answers could be the problem.
View full article
Picard Product_Support
‎2018-09-06 03:28 PM

Labels:
  • TAC INET
943 Views

Infinity schedules do not download at the specified download time

Issue Infinity schedules are not downloading at the times they are configured. A typical symptom would be if scheduled to download on Sunday but not occurring until the following Monday morning right after activity starts at the site. Product Line Andover Continuum Environment Cyberstation Cause The machine running the Cyberstation that is configured to download the schedules has gone into hibernation or sleep. Resolution Configure the computer's Power Options to keep the CPU running at all times, it is OK to turn OFF the display, but the CPU has to be kept running in order for the download to take place. See How can I prevent my Endura Workstation from sleeping, hibernating or powering off automatically? for detailed instructions on how to turn off hibernation. 
View full article
Picard Product_Support
‎2018-09-11 12:55 PM

Labels:
  • Andover Continuum
1321 Views

Force door and DOTL alarms not received in the correct filter (Routine, Priority, Critical) in AMT

Issue Force door and DOTL alarms not received in the correct filter (Routine, Priority, Critical) in AMT. Product Line TAC INET Environment I/NET Seven 2.2x and above. Cause I/NET distribution group and masking has not been set correctly.  There are two locations that this exists when dealing with Access Control and Doors, and must be set correctly to achieve the correct / desired results. Resolution The Force door, DOTL, Door normal, Door relocked, SLI not Available, Mode messages and Request to exit messages use the masking and distribution group that have been defined within the "Resident I/O Point editor" for the specific Door DO point. All other messages use the masking and the distribution group that is in the Door editor.  See picture below: Additionally you must also ensure that Door Normal message type is set correctly. Refer to Acknowledge and purge a "Force Door" alarm in AMT for further information.
View full article
Picard Product_Support
‎2018-09-06 08:23 PM

Last Updated: Administrator DavidFisher Administrator ‎2020-08-13 08:04 AM

Labels:
  • TAC INET
1281 Views

Door points defined in the I/NET system do not show up in the Door Summary page

Issue I have door points defined in the I/NET system, but they do not show up in the Door Summary page. What is wrong? Environment I/NET Access Control Cause As part of the Access Control database process, before any Door configuration can be done they must be saved within the SQL database, and more specifically within I/NET's Network Configuration. Within the Network Configuration, the Door Names can be different to the Point Names, its these Door Names that are then used within the I/NET Access Control Database. Resolution In addition to meeting all the door point criteria, the points must also have been saved in the Network Configuration Editor before they will appear in the door summary list.
View full article
Picard Product_Support
‎2018-09-06 03:27 PM

Labels:
  • TAC INET
1057 Views

Communication with this SLI could not be established. Editing cannot be done.

Issue Highlighted a door point and selected Schedules; I cannot modify the schedule. What is wrong? Error received: Communication with this SLI could not be established. Editing cannot be done. Product Line TAC INET Environment I/NET Seven Work Offline (Offline edit) Cause When you highlight a door point schedule, I/NET attempts to establish communication with the selected door’s SLI (Sub LAN Interface). If communication with the SLI is successful, I/NET will proceed normally. However, if I/NET cannot communicate with the SLI, you will not be able to modify the schedule assignment for the selected door.  This is the case also for the following editors: Access Initiated Control Personnel Schedules Door Schedules Doors Elevators Resolution Communication must be established with the sub LAN devices (DPU) before schedules can be edited. It is possible to do this in an offline mode as long as you have the Sub LAN Interface's (SLI) SAV file.  Refer to Offline Database Edit  for further information on Offline Edit.
View full article
Picard Product_Support
‎2018-09-06 10:47 PM

Last Updated: Administrator DavidFisher Administrator ‎2020-08-14 10:42 AM

Labels:
  • TAC INET
1529 Views

Error when Modifying a door in I/NET: Any changes made to the door extension will be stored in the SLI

Issue I tried to modify a door point and I/NET gives me the following dialog box explaining that any changes to the door extension will be stored in the SLI. What would cause this dialog box to occur? Environment I/NET Cause If the communication between the SLI and the DPU is currently unavailable, this will cause the dialog box to occur. Please note that once the communications between the SLI and the DPU have been re-established the stored changes will be sent to the DPU. Resolution Select Edit MCU configuration to verify communication failure Not any Red text, as these addresses are offline Troubleshoot and repair physical communications
View full article
Picard Product_Support
‎2018-09-06 03:27 PM

Labels:
  • TAC INET
969 Views
  • « Previous
    • 1
    • …
    • 486
    • 487
    • 488
    • …
    • 507
  • Next »
To The Top!

Forums

  • APC UPS Data Center Backup Solutions
  • EcoStruxure IT
  • EcoStruxure Geo SCADA Expert
  • Metering & Power Quality
  • Schneider Electric Wiser

Knowledge Center

Events & webinars

Ideas

Blogs

Get Started

  • Ask the Community
  • Community Guidelines
  • Community User Guide
  • How-To & Best Practice
  • Experts Leaderboard
  • Contact Support
Brand-Logo
Subscribing is a smart move!
You can subscribe to this board after you log in or create your free account.
Forum-Icon

Create your free account or log in to subscribe to the board - and gain access to more than 10,000+ support articles along with insights from experts and peers.

Register today for FREE

Register Now

Already have an account? Login

Terms & Conditions Privacy Notice Change your Cookie Settings © 2025 Schneider Electric

This is a heading

With achievable small steps, users progress and continually feel satisfaction in task accomplishment.

Usetiful Onboarding Checklist remembers the progress of every user, allowing them to take bite-sized journeys and continue where they left.

of