Alarms and Events Logging Project Mentors: Suneel Kumar Venugopal Vanga.

Slides:



Advertisements
Similar presentations
Support.ebsco.com EBSCOadmin Reports & Statistics Tutorial.
Advertisements

Welcome to eDMR This PowerPoint presentation is designed to show eDMR users how to login and begin using the eDMR system.
ISecurity GUI User-Friendly Interface. Features Full support of all green-screen functionality Simultaneous views of multiple iSecurity screens and activities.
Studbook Keeper News! Keeping Studbook Keepers Up-to- date with the latest News Flashes!
Using the Self Service BMC Helpdesk
State of Kansas INF43 & INF44 – Process & Error Correction Statewide Management, Accounting and Reporting Tool This Desk Aid instructs users on the INF43.
SERVICE MANAGER 9.2 VIEWS AND REPORTS July, 2011.
We, at Vipara TechnoSoft specialize in delivering high quality, flexible, cost effective, reliable, result-oriented applications which can be capitalized.
Use case tutorial examples.
SEEM 3430 – Tutorial 2 Two Examples on Requirement Definition and Use Cases.
© Tally Solutions Pvt. Ltd. All Rights Reserved 1 Shoper 9 Tally.ERP 9 Interface January 2010.
UNESCO ICTLIP Module 4. Lesson 3 Database Design, and Information Storage and Retrieval Lesson 3. Information storage and retrieval using WinISIS.
Interrupts (contd..) Multiple I/O devices may be connected to the processor and the memory via a bus. Some or all of these devices may be capable of generating.
VBA Modules, Functions, Variables, and Constants
1 Real-time requirements  Intro to Software Engineering  Software Development Process Models  Formal methods in software specification  Structured.
Alarms and Events Processing Group No. 2 Project Guide: Prof. N.D.R.Sarma.
CRM ZETA ERP. CRM SALESSUPPORT CONTACT MGNT ACCOUNT.
Alarms and Events - Processing and Logging Project Mentors Suneel Kumar Venugopal Vanga.
E. halFILE™ Providing images and documents to the Internet hal Systems Corporation.
Bonrix Track & Trace System A GPS Based Vehicle Tracing System (SMS, GPRS/3G, Offline) Bonrix Software Systems Ahmedabad (INDIA) Website:
MathXL ® for School Teacher Training Series Creating Tests or Quizzes.
Presented By: Shashank Bhadauriya Varun Singh Shakti Suman.
DEMONSTRATION FOR SIGMA DATA ACQUISITION MODULES Tempatron Ltd Data Measurements Division Darwin Close Reading RG2 0TB UK T : +44 (0) F :
Students: Nadia Goshmir, Yulia Koretsky Supervisor: Shai Rozenrauch Industrial Project Advanced Tool for Automatic Testing Final Presentation.
This presentation will guide you though the initial stages of installation, through to producing your first report Click your mouse to advance the presentation.
V 0.1Slide 1 Security – Audit Trail How to maintain audit trail? Access Control Other Information Configuration Customization  audit trail  purge.
By Daniel Siassi.  XHTML  For Structure  CSS  For Stylization of Structure  SQL Database  Store Customer, Calendar, and Order Data  PHP  Server-side.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Requirements Walk-through
1 BTEC HNC Systems Support Castle College 2007/8 Systems Analysis Lecture 9 Introduction to Design.
Supervisory Control and Data Acquisition (SCADA) Software.
 Definition  Components  Advantages  Limitations Contents  Definition Definition  Functions Functions.
All rights reserved, property and © CAD Computer GmbH & Co.KG 2009 Cover page.
All rights reserved, property and © CAD Computer GmbH & Co.KG 2009 Cover page.
NARFE’S NEW Online Activities Modules What are Online Activities Modules Online refers to internet access only – Provides easy access to specific.
1 OPOL Training (OrderPro Online) Prepared by Christina Van Metre Independent Educational Consultant CTO, Business Development Team © Training Version.
CYBORG Domain Independent Distributed Database Retrieval System Alok Khemka Kapil Assudani Kedar Fondekar Rahul Nabar.
Tools Menu and Other Concepts Alerts Event Log SLA Management Search Address Space Search Syslog Download NetIIS Standalone Application.
TPM Software within Good Spirit School Division. TPM Software is an integrated Student Services Software Solution Forms / Printouts / Reports Integrated.
A ISP free video conferencing application for mobile devices using wireless and VoIP Technology.
SII CPD SCHEME THE SUPERUSER LICENSE Active Reflective Self-Directed Development.
Now, please open your book to page 60, and let’s talk about chapter 9: How Data is Stored.
Reports and Learning Resources Module 5 1. SLMS Primary Administrator Training Module 5: Reports and Learning Resources 2.
Enterprise Resource Planning System (ERP) Flowchart #7
Home Security Leslie Locke 1. Did you know? According to the FBI, a home invasion occurs once every 14 seconds 2.
SCATS Release Review SMUG, March 2013 Sydney.
Database and Information Management Chapter 9 – Computers: Understanding Technology, 3 rd edition.
Session 1 Module 1: Introduction to Data Integrity
CS6502 Operating Systems - Dr. J. Garrido Memory Management – Part 1 Class Will Start Momentarily… Lecture 8b CS6502 Operating Systems Dr. Jose M. Garrido.
PestPac Software. Leads The Leads Module allows you to track all of your pending sales for your company from the first contact to the close. By the end.
CIAF Summary Report 2012/13 TPM Software within Good Spirit School Division.
UFCFY5-30-1Multimedia Studio Scripting for Interactive Media Times Table Quiz This will contribute towards your online portfolio for this module.
2008 Freshmen Java Project Produced by 2008 IDS Freshmen.
Techniques for List Creation (2) Data formatting and control level processing Basics for Interactive Lists Detail lists The Program Interface Interactive.
10 1 Chapter 10 - A Transaction Management Database Systems: Design, Implementation, and Management, Rob and Coronel.
Introduction to Bugzilla. May 12, 2011 What is Bugzilla? Bugzilla is a defect- or issue-tracking system Allows individual or groups of developers effectively.
Chavez, Melesan Karen De Luna, Lin Detera, Patrick Kevin Martinez, Jellene Joy Dental Clinic Database System Functional Requirements.
National Workshop on ANSN Capacity Building IT modules OAP, Thailand 25 th – 27 th June 2013 KUNJEER Sameer B Pool of experts database and further enhancements.
COPA Post-Rollover Setting the Year End Dates and Enrolling Your Children
Analysis Review of Workflow Subsystem Kaushik Merchant And The Workflow Team.
Functions of Operating Systems V1.0 (22/10/2005).
NARFE’S NEW Online Activity Modules What are Online Activity Modules Online refers to internet access only – Provides easy access to specific.
Online Reimbursement Management System Group Members: Clint Schramek Lawrence Brown Junior Bowen Data Flow Diagrams.
Architecture Review 10/11/2004
Know About MS Access Database
Structured Analysis and Dataflow Diagrams
CSE 784 Software Studio Syracuse University
Cover page.
Correct Function.
Presentation transcript:

Alarms and Events Logging Project Mentors: Suneel Kumar Venugopal Vanga

‘Alarms’ Requirements Alarms are raised at any ‘point’ in the SCADA system, when the value exceeds a particular range. Alarms are raised at any ‘point’ in the SCADA system, when the value exceeds a particular range. The range can be dynamically varied depending on weather. The range can be dynamically varied depending on weather. There should be stages of severity of alarms. There should be stages of severity of alarms.

Alarms Contd. Alarms are displayed online and need not be stored in the database. Alarms are displayed online and need not be stored in the database. An alarm should not be erased before the user takes appropriate action An alarm should not be erased before the user takes appropriate action Alarms should be sorted according to order of priority before displaying it. Alarms should be sorted according to order of priority before displaying it. Alarms can be edited Alarms can be edited

‘Events’ Requirements Events are also like alarms but can be generated even when the value is within the ‘safe’ range. Events are also like alarms but can be generated even when the value is within the ‘safe’ range. Events need to be logged into the database Events need to be logged into the database Events are in fixed format. Events are in fixed format. Events cannot be edited Events cannot be edited

Events Contd. Events are written with the date and time into the database and does not need user intervention. Events are written with the date and time into the database and does not need user intervention. Search for events that occurred years back. Search for events that occurred years back.

Alarm/Event Monitor Module Control System Database GUI RTURTU System Alarm/Event generator System Design diagram

Prerequisites and Outstanding Issues All information like limits associated with SCADA points are stored in the database previously. All information like limits associated with SCADA points are stored in the database previously. Only events are logged. Alarms are not entered into the database. Only events are logged. Alarms are not entered into the database. Alarms are lost once the system is shut down. No recovery is possible. Alarms are lost once the system is shut down. No recovery is possible.

Steps In processing 1. The Event/Alarm monitor program continuously checks for events/alarms. 2. As soon as one is raised, it informs the control system about the point in the SCADA system in which it is raised, the value at the point. 3. The control system analyses the event/alarm and compares with the limits that are in the database.

Steps Contd. For the alarms two types of lists are maintained Acknowledged/ Unacknowledged. For the alarms two types of lists are maintained Acknowledged/ Unacknowledged. As noted in the requirements the severity of the alarms, the priority for the SCADA point, present weather are all used to appropriately position the alarm in the unacknowledged list. As noted in the requirements the severity of the alarms, the priority for the SCADA point, present weather are all used to appropriately position the alarm in the unacknowledged list.

Steps Contd. Events are first logged into the database before informing the user Events are first logged into the database before informing the user They are persistent. They are persistent. There is no need for user acknowledgement of events. There is no need for user acknowledgement of events.

Plan of the design Generating program though external to the system is a part of the project. Generating program though external to the system is a part of the project. The monitor system, generating program, the control system form the major part and would be independently developed. The monitor system, generating program, the control system form the major part and would be independently developed. The database and the GUI will be developed simultaneously with the other parts. The database and the GUI will be developed simultaneously with the other parts.

Questions?

Nitin Gupta Arvind Tiwary L. Jagannathan Ashutosh Parida Thank You