Model Authorities and Model Exchange Jay Britton Principal Architect.

Slides:



Advertisements
Similar presentations
Introduction to TransXChange
Advertisements

WG A Family of CIM Standards based on CIM/XML ( ) - Static Network Model Exchange ( ) - Dynamic Model Exchange - Unbalanced Models.
 The Citrix Application Firewall prevents security breaches, data loss, and possible unauthorized modifications to Web sites that access sensitive business.
Mathematics in the MYP.
Chapters 8, 9, and 10 Design Stage 1 Preconstruction Stage 2: Procurement Conceptual Planning Stage3: Construction Stage 4: Project Close-out.
1 CS 501 Spring 2005 CS 501: Software Engineering Lecture 8 Requirements II.
Fundamentals, Design, and Implementation, 9/e Chapter 3 Entity-Relationship Data Modeling: Process and Examples Instructor: Dragomir R. Radev Fall 2005.
Validating Streaming XML Documents Luc Segoufin & Victor Vianu Presented by Harel Paz.
UCTE CIM VISUALIZATION & EDITING TOOL Jun Zhu, Power Info LLC CIM User Group Meeting, Genval 2009.
Data Exchange Standards in support of transaction processes 08 November 2004 Bonn, Germany Peggy Quarles Perrin Quarles Associates, Inc.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
SERNEC Image/Metadata Database Goals and Components Steve Baskauf
Network (Common) Model Management System Presentation to ERCOT October 21, 2008 Thomas F Garrity Vice President Energy Management and Automation Siemens.
Users' Meeting San Francisco, CA April 18 th, 2006 RCRAInfo Network Exchange.
Jay Britton
1 The Problem Do you have: A legacy ABL system with millions of Lines of ABL Code? Years and years of modifications to your ABL code? System documentation.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1 1. Chapter 2: Relational Databases and Multi-Table Queries Exploring Microsoft Office.
Parcel Data Models for the Geodatabase
NAMS Account Activation Training. 2 What is NAMS? The NASA Account Management System is NASA’s centralized process for requesting and maintaining accounts.
SOFTWARE ENGINEERING BIT-8 APRIL, 16,2008 Introduction to UML.
A Family of CIM EMS Exchange Standards based on CIM/XML ( ) - Static Network Model Exchange ( ) - Dynamic Model Exchange? - Schematic.
Vended Authority Control --Procedures and issues.
Topics Covered: Software requirement specification(SRS) Software requirement specification(SRS) Authors of SRS Authors of SRS Need of SRS Need of SRS.
Distributed File Systems
CIMSpy/CIMdesk A CIM-based Data Engineering Tool
© OECD A joint initiative of the OECD and the European Union, principally financed by the EU. Quality Assurance José Viegas Ribeiro IGF, Portugal SIGMA.
1 RDFid Examples of RDFid: _a73ed7b8a60a4b2ea46318a370b9c7de Definition from the profile The document requires only that in a given full model,
A Family of CIM EMS Exchange Standards based on CIM/XML ( ) - Static Network Model Exchange ( ) - Schematic Layout Exchange ( )
Office Management Tools II Ms Saima Gul.  When you create your tables, you should assign each table a primary key—one or more fields whose contents are.
XML Registries Source: Java TM API for XML Registries Specification.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 3: Operating-System Structures System Components Operating System Services.
Justyna Grzywacz Chief Inspectorate of Environmental Protection 4th November,2011.
European Model Exchange Standard based on - IEC , IEC (updated 2009) - IEC (updated 2009) Jay Britton
Establishing Access To, Making Contact With, and Selecting Participants A Nina A Alexia A Carl A Peggy A Doris Instructor:
An XML based Security Assertion Markup Language
Entity Administrator Training Working with ADEConnect & Entity Admin Portal ADEConnect.
Monitoring Information System Greece Working Group Meeting Brussels, June 2000 STRUCTURAL FUNDS
Prepared By Prepared By : VINAY ALEXANDER ( विनय अलेक्सजेंड़र ) PGT(CS),KV JHAGRAKHAND.
RELATORS, ROLES AND DATA… … similarities and differences.
EMS Users Conference 1 September 23rd – 26th CIM in the Network Model Management System Joel Koepke Network Model Engineer, ERCOT.
ISO Geographic information Procedures for item registration.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
A Family of CIM EMS Exchange Standards based on CIM/XML ( ) - Static Network Model Exchange ( ) - Schematic Layout Exchange ( )
Mr.Prasad Sawant, MIT Pune India Introduction to DBMS.
LECTURE TWO Introduction to Databases: Data models Relational database concepts Introduction to DDL & DML.
BGP Validation Russ White Rule11.us.
Model Exchange and Naming TF ENTSO-E Model Exchange Standard –TSO tool users are still using old procedures (editing simple ascii files) to edit models.
UCTE CIM Visualization & Editing Tool
Anti-Money laundering Solution
Software Engineering Lecture 4 System Modeling The Analysis Stage.
Methodology Logical Database Design for the Relational Model
Structured Analysis and Design Technique
Databases.
Configuration Management and Prince2
CIMSpy/CIMdesk A CIM-based Data Engineering Tool
Model Authorities and Model Exchange
Sections 17– database transactions and controlling User Access
Definition from the profile
Jay Britton
Data Model.
Designs for Data Integrity, validations, security and controls
Transmission Workstream – Partial Assignment
Fixing the Internet: Think Locally, Impact Globally
Functions and Relations
Author: Miran Miklič Comparison and advantages of the Bitemporal and Temporal databases over Tuple-versioning (point-in-time) database.
Model Exchange TF Vasteras, June 12, 2008
Model Authorities and Model Exchange
Model Exchange TF Vasteras, June 12, 2008
Kendall Demaree AREVA T&D Inc. CIMug – Tools Breakout June 12, 2008
Additional Material-Lecture 2
Presentation transcript:

Model Authorities and Model Exchange Jay Britton Principal Architect

> Title of presentation - Date - References33 Model Exchange Business Goal  Neighboring parties in an interconnect exchange models.  Each party is the “modeling authority” only for its own territory.  Each party will use other parties’ internal models to create their external model.  To accomplish this, 1. Each party exports its internal model to its neighbors and keeps it up to date. 2. Each party imports each neighbor’s model and uses it to develop and update its external model.  Proposed Goal: an external model can be updated within an hour of a change to a neighbor’s internal.

> Title of presentation - Date - References44 CIM Exchange (full, partial, incremental) Initial CIM Model Exchange Concept A Internal Model A’s model of B b a Proprietary / Home grown Extract / Merge Tools Proprietary / Home grown Extract / Merge Tools CIM import / export System A Local Vendor Model System A Import Model B’s Model of A B Internal Model System B Local Vendor Model System B Import Model CIM import / export System A EMS System B EMS

> Title of presentation - Date - References55 Making CIM Exchange a Complete Process  MRIDs as permanent unique object identifiers.  Decide who assigns identifiers to each object.  Name registry manages naming differences.  Model exchange uses consistent identifiers.  Specify the modeling territories precisely within the model.  Include security against changes submitted by unauthorized parties.  Report updates with CIM incremental updates.  If problems arise, it is easy to identify the source.  Mark equivalents in the model.  Import process can easily recognize whether an update requires a new reduction.  On-line systems receive and test updates incrementally.  If problems arise, it is easy to identify the source

> Title of presentation - Date - References66 Central Concept: Model Authority Sets (MAS)  Notation:  Nodes represent individual CIM objects.  Branches represent relations between objects.  Two MAS types:  Regional (single authority)  Boundary (bipartisan authority / single caretaker)  Rules:  Every CIM object is in one and only one MAS.  Each MAS controls object MRIDs in its territory.  No object in a regional set relates directly to any object in another regional set.

> Title of presentation - Date - References77 A little more detailed look at a boundary example.

> Title of presentation - Date - References88 A UCTE boundary example.

> Title of presentation - Date - References99 System A EMS System B EMS Use Case: Peer-to-Peer Full Model Exchange Proprietary Model A A Region B Region boundary A Region B Region boundary A Region (reduced) B Region (reduced) Proprietary Model B CIM import CIM Modeler b a

> Title of presentation - Date - References10 System A Local Vendor System B Local Vendor Use Case: A to B Incremental Update Proprietary Model A A Region B Region boundary A Region B Region boundary A Region (reduced) B Region (reduced) Proprietary Model B CIM MAS CIM delta CIM Modeler aa CIM delta If the change can be processed against the reduced region, then it can be transferred directly to the CIM import for system B.

> Title of presentation - Date - References11 CIM Upper Tier Modeling CIM Region Modeling System A Local Vendor Use Case: Hierarchical Exchange System B Local Vendor A Region B Region boundary Proprietary Model A Proprietary Model B CIM import A Region B Region boundary A Region B Region boundary A Region (reduced) B Region (reduced) b a x

> Title of presentation - Date - References12 Why is this a good thing?  Generality  MAS delineate all objects, not just the physical connection boundaries.  Establishing authority and responsibility…  Basis for efficient, repeatable processes.  Clarifies responsibility for naming and MRIDs for all objects.  Processing efficiency for model exchange:  Merging regions is a simple union of objects.  Extraction is a simple transfer of objects without modification.  Replace simply extracts and discards before merging.  Maximum XML file size can be limited to maximum largest MAS size, rather than whole interconnect.  Checking that a change comes from the correct source.  As a regional MA submitting a change: You can make any change you want to your regional set without fear that it would disturb a relationship from another region. Your changes can easily be validated because they must be referentially complete without any other regional set. If your change cannot comply with the above condition, it tells you immediately that you need to arbitrate a change in a boundary set.  As the receiver checking the right to make a change: It must be referentially complete against the source’s region plus its boundaries.