Model Authorities and Model Exchange

Slides:



Advertisements
Similar presentations
Introduction to TransXChange
Advertisements

Model Authorities and Model Exchange Jay Britton Principal Architect.
WG A Family of CIM Standards based on CIM/XML ( ) - Static Network Model Exchange ( ) - Dynamic Model Exchange - Unbalanced Models.
 The Citrix Application Firewall prevents security breaches, data loss, and possible unauthorized modifications to Web sites that access sensitive business.
Mathematics in the MYP.
Chapters 8, 9, and 10 Design Stage 1 Preconstruction Stage 2: Procurement Conceptual Planning Stage3: Construction Stage 4: Project Close-out.
1 CS 501 Spring 2005 CS 501: Software Engineering Lecture 8 Requirements II.
Fundamentals, Design, and Implementation, 9/e Chapter 3 Entity-Relationship Data Modeling: Process and Examples Instructor: Dragomir R. Radev Fall 2005.
UCTE CIM VISUALIZATION & EDITING TOOL Jun Zhu, Power Info LLC CIM User Group Meeting, Genval 2009.
Data Exchange Standards in support of transaction processes 08 November 2004 Bonn, Germany Peggy Quarles Perrin Quarles Associates, Inc.
SERNEC Image/Metadata Database Goals and Components Steve Baskauf
Jay Britton
Parcel Data Models for the Geodatabase
NAMS Account Activation Training. 2 What is NAMS? The NASA Account Management System is NASA’s centralized process for requesting and maintaining accounts.
SOFTWARE ENGINEERING BIT-8 APRIL, 16,2008 Introduction to UML.
A Family of CIM EMS Exchange Standards based on CIM/XML ( ) - Static Network Model Exchange ( ) - Dynamic Model Exchange? - Schematic.
Distributed File Systems
CIMSpy/CIMdesk A CIM-based Data Engineering Tool
© OECD A joint initiative of the OECD and the European Union, principally financed by the EU. Quality Assurance José Viegas Ribeiro IGF, Portugal SIGMA.
1 RDFid Examples of RDFid: _a73ed7b8a60a4b2ea46318a370b9c7de Definition from the profile The document requires only that in a given full model,
A Family of CIM EMS Exchange Standards based on CIM/XML ( ) - Static Network Model Exchange ( ) - Schematic Layout Exchange ( )
XML Registries Source: Java TM API for XML Registries Specification.
Justyna Grzywacz Chief Inspectorate of Environmental Protection 4th November,2011.
European Model Exchange Standard based on - IEC , IEC (updated 2009) - IEC (updated 2009) Jay Britton
An XML based Security Assertion Markup Language
Monitoring Information System Greece Working Group Meeting Brussels, June 2000 STRUCTURAL FUNDS
EMS Users Conference 1 September 23rd – 26th CIM in the Network Model Management System Joel Koepke Network Model Engineer, ERCOT.
ISO Geographic information Procedures for item registration.
A Family of CIM EMS Exchange Standards based on CIM/XML ( ) - Static Network Model Exchange ( ) - Schematic Layout Exchange ( )
Mr.Prasad Sawant, MIT Pune India Introduction to DBMS.
BGP Validation Russ White Rule11.us.
Model Exchange and Naming TF ENTSO-E Model Exchange Standard –TSO tool users are still using old procedures (editing simple ascii files) to edit models.
UW Whitewater Procurement Card Program. Overview The purpose of UW-Whitewater Procurement Card Program is to establish a more efficient, cost- effective.
UCTE CIM Visualization & Editing Tool
Software Configuration Management
Anti-Money laundering Solution
Routing Protocols and Concepts
Distance Vector Routing Protocols
Methodology Logical Database Design for the Relational Model
Structured Analysis and Design Technique
Cryptography and Network Security
Software Engineering (CSI 321)
Information Delivery Manuals: Functional Parts
Configuration Management and Prince2
CIMSpy/CIMdesk A CIM-based Data Engineering Tool
Satisfactory Academic Progress (SAP)
Satisfactory Academic Progress Standards (SAP)
Chapter 2 Database Environment Pearson Education © 2009.
Sections 17– database transactions and controlling User Access
Distance Vector Routing Protocols
Definition from the profile
Database Environment Transparencies
BPMN - Business Process Modeling Notations
Jay Britton
Data Model.
The Network Model Management System
Distance Vector Routing Protocols
Final Design Authorization
Transmission Workstream – Partial Assignment
An information flow model FM is defined by
ePhyto DRAFT APPENDIX 1 TO ISPM 12:2011
Fixing the Internet: Think Locally, Impact Globally
Author: Miran Miklič Comparison and advantages of the Bitemporal and Temporal databases over Tuple-versioning (point-in-time) database.
Model Exchange TF Vasteras, June 12, 2008
Language Model Grammar Conversion
Subject Name: SOFTWARE ENGINEERING Subject Code:10IS51
Improvement of Consistency among AS Policies on IRR Database
Model Authorities and Model Exchange
Model Exchange TF Vasteras, June 12, 2008
Kendall Demaree AREVA T&D Inc. CIMug – Tools Breakout June 12, 2008
Presentation transcript:

Model Authorities and Model Exchange Jay Britton Principal Architect

Model Exchange Business Goal Neighboring parties in an interconnect exchange models. Each party is the “modeling authority” only for its own territory. Each party will use other parties’ internal models to create their external model. To accomplish this, Each party exports its internal model to its neighbors and keeps it up to date. Each party imports each neighbor’s model and uses it to develop and update its external model. Proposed Goal: an external model can be updated within an hour of a change to a neighbor’s internal.

Initial CIM Model Exchange Concept CIM Exchange (full, partial, incremental) CIM import / export CIM import / export System B Import Model System A Import Model a Proprietary / Home grown Extract / Merge Tools Proprietary / Home grown Extract / Merge Tools b A Internal Model B’s Model of A System A Local Vendor Model System B Local Vendor Model A’s model of B B Internal Model System B EMS System A EMS

Making CIM Exchange a Complete Process MRIDs as permanent unique object identifiers. Decide who assigns identifiers to each object. Name registry manages naming differences. Model exchange uses consistent identifiers. Specify the modeling territories precisely within the model. Include security against changes submitted by unauthorized parties. Report updates with CIM incremental updates. If problems arise, it is easy to identify the source. Mark equivalents in the model. Import process can easily recognize whether an update requires a new reduction. On-line systems receive and test updates incrementally. If problems arise, it is easy to identify the source

Central Concept: Model Authority Sets (MAS) Notation: Nodes represent individual CIM objects. Branches represent relations between objects. Two MAS types: Regional (single authority) Boundary (bipartisan authority / single caretaker) Rules: Every CIM object is in one and only one MAS. Each MAS controls object MRIDs in its territory. No object in a regional set relates directly to any object in another regional set.

A little more detailed look at a boundary example.

A UCTE boundary example.

Use Case: Peer-to-Peer Full Model Exchange CIM Modeler CIM Modeler A Region A Region boundary boundary B Region B Region a A Region (reduced) B Region (reduced) b System A EMS System B EMS CIM import CIM import Proprietary Model B Proprietary Model A

Use Case: A to B Incremental Update CIM Modeler CIM Modeler a a A Region A Region boundary boundary B Region B Region A Region (reduced) B Region (reduced) If the change can be processed against the reduced region, then it can be transferred directly to the CIM import for system B. System A Local Vendor System B Local Vendor CIM delta CIM MAS CIM delta Proprietary Model B Proprietary Model A

Use Case: Hierarchical Exchange CIM Upper Tier Modeling x A Region boundary B Region CIM Region Modeling CIM Region Modeling A Region A Region boundary boundary B Region B Region a b A Region (reduced) B Region (reduced) CIM import CIM import System A Local Vendor System B Local Vendor Proprietary Model A Proprietary Model B

Why is this a good thing? Generality MAS delineate all objects, not just the physical connection boundaries. Establishing authority and responsibility… Basis for efficient, repeatable processes. Clarifies responsibility for naming and MRIDs for all objects. Processing efficiency for model exchange: Merging regions is a simple union of objects. Extraction is a simple transfer of objects without modification. Replace simply extracts and discards before merging. Maximum XML file size can be limited to maximum largest MAS size, rather than whole interconnect. Checking that a change comes from the correct source. As a regional MA submitting a change: You can make any change you want to your regional set without fear that it would disturb a relationship from another region. Your changes can easily be validated because they must be referentially complete without any other regional set. If your change cannot comply with the above condition, it tells you immediately that you need to arbitrate a change in a boundary set. As the receiver checking the right to make a change: It must be referentially complete against the source’s region plus its boundaries.