3-60 Programming 15088:K 3/21/01The real power of the CBE Programming comes from the equation, which is evaluated by the control panel todetermine a variety of alarm initiating conditions. The equation provides the real decision-making abilitythrough the use of an operator acting on a set of operands. The operands for an output module can be addressableinitiating devices, software zones (forward or reverse-activating), or addressable control modules assigned anaddress lower than its own. For a reverse-activating zone, the operands can be addressable initiating devices,forward zones, or reverse zones that are lower than its address.The format for an equation is shown below, where the operators are OR, AND, NOT, XZONE, DEL, SDEL, andTIM; and the operands are groupings of initiating devices and/or software zones, as well as informationspecific to the format of individual operators.Operator(- - - -Operands - - - -)Examples: OR(Z9 Z15 Z23)AND(L1D1 Z3 L1D35 L1D72)NOT(Z23)XZONE(Z23)DEL(HH.MM.SS HH.MM.SS (L1M1))SDEL(HH.MM.SS HH.MM.SS (Z1))TIM(SU MO TU WE TR FR SA HH.MM HH.MM)All of the operator formats above are explained in detail on the following pages.Control-By-Event Programming Constraints• There can only be one DEL or SDEL operator in a control-by-event equation, not both.• If there is no duration time field in a DEL or SDEL, the equation will always be activated.• The maximum value of DELAY TIME + DURATION TIME is 255:59:59.• If either the day, month or year field is omitted, that field is assumed to be all allowable values of thefield omitted. Example: 12--90 is equivalent to any day in December 1990.• The HH.MM field for START TIME and STOP TIME uses military time.• The HH.MM field for STOP TIME must be greater than the START TIME.• The maximum value of START TIME or STOP TIME is 24:00.• If an alarm condition occurs, all active TIM devices will be deactivated. All TIM equations will beignored until all alarms are restored, at which point all TIM devices will return to their proper state.See Section 4.3, Size Limitations for the constraints on the size, in bytes, of the CBE.