How to achieve satisfactory performance of the access system: stability, efficiency, operation, fluidity Timo Hakulinen (GS/ASE) Thanks: LHC access team.

Slides:



Advertisements
Similar presentations
Making the System Operational
Advertisements

Performance Testing - Kanwalpreet Singh.
Beyond the Help Desk Getting ahead of the game Mihaela Damian Dan Sexton 11 th July 2013 CSCS > School of Clinical Medicine > University of Cambridge.
KX-NS1000 Initial Set Up For step by step : 16 May,
1 DB2 Access Recording Services Auditing DB2 on z/OS with “DBARS” A product developed by Software Product Research.
© 2005 Prentice Hall7-1 Stumpf and Teague Object-Oriented Systems Analysis and Design with UML.
Chapter 6 Database Design
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Software Development Problems Range of Intervention Theory Prevention, Treatment and Maintenance Planning, Development and Use Cost of Intervention.
Computer Engineering 203 R Smith Agile Development 1/ Agile Methods What are Agile Methods? – Extreme Programming is the best known example – SCRUM.
6 Chapter 6 Database Design Hachim Haddouti. 6 2 Hachim Haddouti and Rob & Coronel, Ch6 In this chapter, you will learn: That successful database design.
Software Testing Test Design and Implementation. Agenda Test Design Test Implementation Test Design Sources Automated Testing 2.
Chapter 9 Overview  Reasons to monitor SQL Server  Performance Monitoring and Tuning  Tools for Monitoring SQL Server  Common Monitoring and Tuning.
Tomasz Ladzinski GS/ASE. LASS Annual Maintenance & Tests General Principles Each winter shutdown preventive maintenance of EIS takes place. It is followed.
Computer System Lifecycle Chapter 1. Introduction Computer System users, administrators, and designers are all interested in performance evaluation. Whether.
An Introduction to AlarmInsight
Degree and Graduation Seminar Project Management Processes
GIF++ ACCESS SYSTEM Dorothea Pfeiffer GIF++ Project Meeting Thanks to: V. Martins De Sousa Dos Rios, D. Vaxelaire, D. Haasler.
Manage Engine: Q Engine. What is it?  Tool developed by Manage Engine that allows one to test web applications using a variety of different tests to.
Starting a New Project at IPAC Lee Bennett IPAC Systems Engineering Team Lead June
Software Testing Life Cycle
LHC machine Schedule, coordination & WAT K. Foraz March 22 nd, 2011 IMWG - LHC machine1.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
IST 210 Database Design Process IST 210 Todd S. Bacastow January 2005.
1 Introduction to Database Systems. 2 Database and Database System / A database is a shared collection of logically related data designed to meet the.
Week 4 Lecture Part 3 of 3 Database Design Samuel ConnSamuel Conn, Faculty Suggestions for using the Lecture Slides.
Consolidation of access systems for the injector Complex ATOP days 4-6 March 2009 P. Ninin & R, Nunes in behalf of the PS and SPS access project teams…
CERN – European Organization for Nuclear Research Administrative Information Services Demonstration of 3 HTMLDB-based applications 1 IT-AIS-HRMarch 17.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Extreme/Agile Programming Prabhaker Mateti. ACK These slides are collected from many authors along with a few of mine. Many thanks to all these authors.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
© 2012 xtUML.org Bill Chown – Mentor Graphics Model Driven Engineering.
SFWR ENG 3KO4 Slide 1 Management of Software Engineering Chapter 8: Fundamentals of Software Engineering C. Ghezzi, M. Jazayeri, D. Mandrioli.
CERN-IT Oracle Database Physics Services Maria Girone, IT-DB 13 December 2004.
Fault Tolerance Benchmarking. 2 Owerview What is Benchmarking? What is Dependability? What is Dependability Benchmarking? What is the relation between.
Computing Facilities CERN IT Department CH-1211 Geneva 23 Switzerland t CF Automatic server registration and burn-in framework HEPIX’13 28.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
CERN IT Department t LHCb Software Distribution Roberto Santinelli CERN IT/GS.
Smart Home Technologies
Jean-Roch Vlimant, CERN Physics Performance and Dataset Project Physics Data & MC Validation Group McM : The Evolution of PREP. The CMS tool for Monte-Carlo.
Access System – LASS/LACS L. Ponce On behalf of the OP team.
CERN General Infrastructure Services Department CERN GS Department CH-1211 Geneva 23 Switzerland Db Futures Workshop
1 Object-Oriented Analysis and Design with the Unified Process Figure 13-1 Implementation discipline activities.
Chapter 8 System Management Semester 2. Objectives  Evaluating an operating system  Cooperation among components  The role of memory, processor,
Distributed Logging Facility Castor External Operation Workshop, CERN, November 14th 2006 Dennis Waldron CERN / IT.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
AB/CO Review, Interlock team, 20 th September Interlock team – the AB/CO point of view M.Zerlauth, R.Harrison Powering Interlocks A common task.
Olivier Callot 5 June 2007 Electronic Logbooks Why moving away from Atlog ? Proposed improved configuration Release schedule.
Site Services and Policies Summary Dirk Düllmann, CERN IT More details at
Day in the Life (DITL) Production Operations with Energy Builder Copyright © 2015 EDataViz LLC.
6/13/2015 Visit the Sponsor tables to enter their end of day raffles. Turn in your completed Event Evaluation form at the end of the day in the Registration.
IST 210 Database Design Process IST 210, Section 1 Todd S. Bacastow January 2004.
SAP R/3 User Administration1. 2 User administration in a productive environment is an ongoing process of creating, deleting, changing, and monitoring.
Managing multiple projects or services? Have a mix of Microsoft Project and more simple tasks? Need better visibility and control?
Access system and radiation monitors session (session 5) Topics and subjects discussed Main issues Magali Gruwé and Tomasz Ladzinski 5 th February 2010.
LHC intervention scheduling with the Work Acceptance Tool
(Access system for HWC)
1 DB2 Access Recording Services Auditing DB2 on z/OS with “DBARS” A product developed by Software Product Research.
Software Project Configuration Management
System Design, Implementation and Review
CENF – Personnel Protection System Preliminary Study
CENF – Personnel Protection System Preliminary Study
Evolution and future of the Access safety and control systems
Chapter 6 Database Design
FOUNDATIONAL CONCEPTS
Designed-in Logic to Ensure Safety of Integration and Field Engineering of Large Scale CBTC Systems Author: Fenggang Shi.
Workshop on Accelerator Operations
Lawson ProcessFlow Overview and Actual ProcessFlow Solutions
Assumption for a given sector
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

How to achieve satisfactory performance of the access system: stability, efficiency, operation, fluidity Timo Hakulinen (GS/ASE) Thanks: LHC access team (GS/ASE), LHC operation (BE/OP) LHC Performance Workshop Chamonix

LHC access/safety system Chamonix Timo Hakulinen2

LHC access modes (From user’s point of view) General (unsupervised automatic) – 1: badge – 2: enter PAD – 3: iris scan – 4: enter zone – Pre-approved authorization by person/zone Restricted / Patrol (operator controlled) – 1: call operators (intercom) – 2: badge – 3: take key – 4: unlock PAD with key – 5: enter PAD – 6: iris scan – 7: enter zone – Approved ADI in EDH – Ultimate responsibility with engineer in charge Closed / Veto (no access possible) – HW tests – In beam Chamonix Timo Hakulinen3

Goals of the access system Manage personnel access to controlled areas, safety system permitting General design goals: – Reliability (don’t expose users, don’t break beam) – Performance (for both users and operators) – Flexibility (allow change / reconfiguration) – Traceability / history / logging – Automate as much as possible – Offer best possible interface to manually carry out things that cannot (or should not) be automated Chamonix Timo Hakulinen4

Some access statistics ( Total and controlled accesses) Aug 1, Jan 23, 2010: – Total accesses: (avg 1033 / day) – Restricted mode: (avg 191 / day) Chamonix Timo Hakulinen5 Keys taken / day

Some access statistics 2 ( The busiest day) The busiest day for operators: – Restricted mode accesses (keys taken): 670 Chamonix Timo Hakulinen6 Access distribution by access point

Some access statistics 3 ( Waiting times) User waiting times from call to operators to access – Subjective estimates based on experience – Best case: < 1 min (no rush, ADI ok, system ok) – Normal: 1 – 5 min (normal operator load) – Worst case: 30 min – ∞ (big rush, multiple access points at the same time, technical problems) Chamonix Timo Hakulinen7

A typical busy day (Synthesis of shifts on two separate days) Two single-operator shifts: 1 st 7:30-12:30, 2 nd 12:30-17:30 Two peaks: – Early morning (8-9:30) and after lunch (13:30-15) – During a peak ~3-5 calls in the queue all the time Events: – Morning: 99 calls, ~170 accesses – Afternoon: 3 patrols, 97 calls, ~210 accesses – Average 2 persons / call, max. 16 persons / call – 1 system problem requiring operator intervention (user could not exit a zone, access maintenance intervention required) – 1 hardware problem (maintenance intervention required) Normal procedure: – 1: user calls and gives ADI – 2: operator checks ADI in EDH – 3: operator gives key to user – 4: user enters zone – Repeat until all users passed Experienced operator performance: ~1 min / call Chamonix Timo Hakulinen8

Issues affecting access performance 1.Technical malfunctions – Hardware problems (contacts, key distribution, relays) – Software problems (video, biometry) – mainly in the parts specific to CERN – External factors (network /routers, Oracle service, HR DB, human interventions) 2.Shortcomings of the system design – Protocol: Access-devices – servers – DB – Op-post (performance bottlenecks identified) – LACS operator interface (scaling limitations, speed) – Key distribution (bottleneck at access points while in restricted mode – operator has to follow each access) 3.Administrative issues – Inflexible ADI mechanism (EDH) – Scheduling conflicts Chamonix Timo Hakulinen9

What can be done technically ( 1: Technical malfunctions) Hardware problems – Rigorous preventive maintenance program ongoing (example: campaign to change PAD position contacts in 2009) – Redesigned video architecture (new recorders and software) – Improved hardware monitoring (proactively analyze, anticipate, and address problems) Software problems – Correctives by the vendor – Workarounds by the CERN team – Biometry subsystem (simplify architecture: biometry on badge) – Improved software monitoring External factors – Collaboration with the respective services Example: Analyze with IT network problems, which strongly affected LACS and other systems over the last few months – turned out to be a faulty router – Improved monitoring (again) Chamonix Timo Hakulinen10

What can be done technically ( 2: Shortcomings of the system design) Protocol: Access-point – servers – DB – Op-post – Fundamental system feature – cannot be modified at will – Optimization of the server processes – Make sure that network and database always in good shape LACS operator interface (long time operator request) – Streamlined standard interface (limited approach) – Go towards standard Evolynx-software (take out CERN specifics as much as possible – allows to follow standard SW releases) – A special-purpose high-performance interface without generic overhead for access-operation only facilitating management of multiple access points (development project) Key distribution – Separate the key distribution phase from access entry cycle (operator gives out all keys of a group and lets them pass through access point at their own pace) Chamonix Timo Hakulinen11

What can be done technically ( 3: Administrative issues) Inflexible ADI mechanism – First: decide what the future “ADI” mechanism will look like (primarily operational business, with input from access team) – The proposed AET mechanism (see Julie’s talk) – Possibility for better integration of this information into the access interface for restricted mode: When user badges, check and show (all) valid AETs for the access point Requires enforcement – A new [partial] access mode (examples): General mode with AET (automatic, cannot treat exceptions) General mode with operator confirmation (with AET, supervised without key) In any case, only in LACS; LASS will not be modified Scheduling conflicts – Mostly out of scope for access/safety system – Improvement possible with the new AET mechanism Chamonix Timo Hakulinen12

Priorities and timetables (Best estimates at this time) TaskDelay (within…) ComplexityCost AET integration (access system side only) 6 monthsFairly simple SW> 10k Redesign of operator interface (dedicated to access operations) 1 yearSomewhat complex SW> 10k Decouple key distribution from access cycle 1 yearSomewhat complex SW and HW > 100k Biometry on badge2 yearsSomewhat complex SW and HW > 100k New access modes (General with operator, …) 2 yearsComplex SW and HW> 100k New video architecture3 yearsSubsystem redesign> 100k Chamonix Timo Hakulinen13

Conclusions Heavy utilization of the LHC access/safety system has uncovered shortcomings, which have been analyzed To achieve a better performance from the point of view of users and operators, both technical and administrative issues need to be addressed Several technical improvements possible (go with the easiest and most effective first) Lessons learned are being applied in the design of the future access/safety system upgrades (PS, SPS) Thank You Chamonix Timo Hakulinen14