UNICOS CONSISTENT IMPORT/EXPORT. Agenda  Present status of prototype for new import  Verification of addresses during check  Non standard import files.

Slides:



Advertisements
Similar presentations
I/O Organization popo.
Advertisements

Lists Chapter 4 Carrano, Data Structures and Abstractions with Java, Second Edition, (c) 2007 Pearson Education, Inc. All rights reserved X.
1 SOLVAY The Sarralbe Experience Sarralbe is the name of a town in France, close to the border between France and Germany. In this town Solvay has a Production.
Chapter 7: Key Process Areas for Level 2: Repeatable - Arvind Kabir Yateesh.
More CMM Part Two : Details.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
Eva van Emden, CWI Reverse Engineering Java Using ASF+SDF and Rigi A preliminary experience report.
Backup and recovery Basics of Backup and restoration Types of recovery Defining strategy Starting up and shutting down 80/20 rule SLA’s.
1 CMPT 275 Software Engineering Revision Control.
“GENERIC SCRIPT” Everything can be automated, even automation process itself. “GENERIC SCRIPT” Everything can be automated, even automation process itself.
Database Constraints. Database constraints are restrictions on the contents of the database or on database operations Database constraints provide a way.
Industrial Control Engineering UNICOS framework 2014 Marco Boccioli - EN/ICE-SCD - 18/12/2014  UNICOS  UNICOS  Plan for Q
130 October 2009 PIC - WIC - LHC_CIRCUIT UNICOS PVSS.
Advance Computer Programming Java Database Connectivity (JDBC) – In order to connect a Java application to a database, you need to use a JDBC driver. –
Preparation and processing of in-session documents.
Legacy Remote I/O Upgrade to Ethernet
WP6: Grid Authorization Service Review meeting in Berlin, March 8 th 2004 Marcin Adamski Michał Chmielewski Sergiusz Fonrobert Jarek Nabrzyski Tomasz Nowocień.
Linux Operations and Administration
CPC (C ONTINUOUS P ROCESS C ONTROL ) SCADA UNICOS: UN IFIED I NDUSTRIAL CO NTROL S YSTEM CPC (C ONTINUOUS P ROCESS C ONTROL ) SCADA 1 Marco Boccioli -
Hands-On Microsoft Windows Server 2008
Module 3: Table Selection
Automatic Generation Tools UNICOS Application Builder Overview 11/02/2014 Ivan Prieto Barreiro - EN-ICE1.
Business Analysis and Essential Competencies
1 Software Development Configuration management. \ 2 Software Configuration  Items that comprise all information produced as part of the software development.
Access Training Linux/Unix Power Broker Access Custom Schema Database Access Customer Training Date: 25-JAN-2005.
 Mathias Dutour / UAB Dev. team  UNICOS regular meeting  29 January 2009.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
© Logicalis Group Using DB2/400 effectively. Data integrity facilities Traditional iSeries database usage Applications are responsible for data integrity.
Module 7: Resolving NetBIOS Names by Using Windows Internet Name Service (WINS)
UNICOS redesign Front End naming 24/04/2013 Marco Boccioli.
Assessing the influence on processes when evolving the software architecture By Larsson S, Wall A, Wallin P Parul Patel.
PI Data Archive Server COM Points Richard Beeson.
© Janice Regan, CMPT 300, May CMPT 300 Introduction to Operating Systems Memory: Relocation.
Industrial Control Engineering UNICOS device and front-end Hervé Milcent UNICOS device front-endHervé Milcent1.
Writing requirements specifications. Why we need requirements specifications To give structure to your desires To avoid waste of resources To avoid slippage.
© 2002 IBM Corporation Confidential | Date | Other Information, if necessary June, 2011 Made available under the Eclipse Public License v Mobile.
Chapter 9 Constraints. Chapter Objectives  Explain the purpose of constraints in a table  Distinguish among PRIMARY KEY, FOREIGN KEY, UNIQUE, CHECK,
DBT544. DB2/400 Advanced Features Level Check Considerations Database Constraints File Overrides Object and Record Locks Trigger Programs.
Cluster Consistency Monitor. Why use a cluster consistency monitoring tool? A Cluster is by definition a setup of configurations to maintain the operation.
1 Software Maintenance The process of changing the system after it has been delivered and in operation Software change is inevitable –New requirements.
Visual Basic for Application - Microsoft Access 2003 Finishing the application.
“The LHC GCS Framework” Geraldine Thomas CERN, IT-CO A complete PLC and PVSS automatic code Generation.
Classes, Interfaces and Packages
Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
UNICOS LHCLoggingDB Josef Hofer EN/ICE/SCD. Agenda The LHC Logging Database Purpose of the LHCLogging component Basic concepts Advanced concepts Logging.
ISOLDE Vacuum Controls (CERN-GSI WS), S. Blanchard TE-VSC-ICM UNICOS implementation in ISOLDE Sebastien Blanchard TE/VSC Interlocks, Controls.
ISO 9001:2015 Subject: Quality Management System Clause 8 - Operation
© 2009 IBM Corporation IWS z/OS SPEs Auditing enhancements.
UAB Requirements for 2016 Ivan Prieto Barreiro 18/04/2016 UAB Requirements for
 System Requirement Specification and System Planning.
UNICOS Application Builder Architecture
Now you don’t need to take any stress about the Cisco Exam
Reuse Separate classes could be developed for all the different objects that are needed in each program. However that would be wasteful. Often many functionalities.
UAB Development Status
UCPC RP Presentation for GSI
Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) practice-questions.html.
MICROSOFT Networking with Windows Server VCE
Maintaining Data Integrity in Programmable Logic in Atmospheric Environments through Error Detection Joel Seely Technical Marketing Manager Military &
Batch Setup.
Audit Documentation and Administration
Lesson 6: Protecting, Maintaining and Managing Databases
Migration-Issues-xx Where it’s been and might be going
What’s changed in the Shibboleth 1.2 Origin
Course: Module: Lesson # & Name Instructional Material 1 of 32 Lesson Delivery Mode: Lesson Duration: Document Name: 1. Professional Diploma in ERP Systems.
Moving from Studio to Atelier
Gmail Password Recovery
Overview Multimedia: The Role of WINS in the Network Infrastructure
David Cleverly – Development Lead
Data Management for POC EID
Presentation transcript:

UNICOS CONSISTENT IMPORT/EXPORT

Agenda  Present status of prototype for new import  Verification of addresses during check  Non standard import files  Role of the delete command  Use of value archive  Future support of ‘exotic’ features  Public interfaces of the import library

Prototype for new import … can import devices by name  ADD new & UPDATE existing devices  SHIFT device indices … can detect & report conflicts (using device index)  DELETED devices  RENAMED devices … can automatically clean-up (delete) obsolete devices  Delete remaining devices that are not in import file  Only works with full file, manual confirmation necessary Snapshot for testing is available in Nexus

Limitations of the prototype No automatic renaming of devices  Reason: Cannot distinguish rename from delete & recreate  Manual resolving required Limited automatic deletion of devices  Reason: Cannot distinguish rename from delete & recreate  Manual resolving required No detection of address shifts  Cannot check if a new address is used by another device  Reason: Device implementation provides no such function

Verify addresses during check Adding or deleting a single device can cause address shifts of all other devices (even those of other types or other applications)  Full import of complete file works fine  Partial import: we may not be able to detect corrupt files  Multi application: Consistent treatment would require batch import Possible solution:  Extend device packages to be able to report output addresses from import file (CPC6 is already capable, other packages ?)  This would enable us to check addresses prior to import Device Type 1Device Type 2 X (newly add device) L (shifted address) A (shifted index & address) M (shifted address) B (shifted index & address) N (shifted address) C (shifted index & address) O (shifted address)

Non standard import files (PIC,WIC) Custom import file format (used to reference sub-devices) Problem: New import cannot be applied here because:  Device A, B, C are no UNICOS devices  Device index is not unique, no detection of index shifts Are there more cases like this ? DEVICE TYPEDEVICE INDEXDEVICE NAMEExplanation CIW 1CIP.UA23.AL2 “Real” device, is a DP CIW 1A “Sub-device, is part of DP CIW 1B “Sub-device, is part of DP CIW 1C “Sub-device, is part DP

Role of the delete command Keyword Delete in import file  It is the only way to delete devices in UNICOS  Single devices are being referenced by index, this can be very misleading when using import by name  There is only a delete but no rename keyword, which would be needed as well  Developers need to comment/uncomment/edit the DELETE statement to achieve what they want Proposal: purely declarative import file  Import file contains devices and no commands  Add an expert panel that allows to delete and rename devices

Use of Value Archive (file-based) UNICOS contains lots of complicated code related to ValArch  Eg. Checks if devices fit into an archive, etc  Not even sure that it works correctly!  The Valarch code is interleaved into the import libraries… How much of it is still needed after migration to RDB?  Parallel archiving used only marginally and temporarily (to assure archive-depth of 1 year in CRYO, for instance)  Do we need to maintain all the diagnostics/configuration facilities (we could use the WinCC OA built-ins)  How could we deal with development/testing? Proposal: Make the use of ValueArchive deprecated, with more “manual” configuration

Future support of ‘exotic’ features Keyword PLCCONFIG_extended  Used to import PLC communication?  Is it still used?  Should it be still supported? Keywords SystemAlarm and _UnSystemAlarm  In CPC system alarms are created with front-end  Are keywords still used?  Should they still be supported?

Interfaces of unImportDevice library  Right now all functions in the import library are public  This makes it very hard to refactor the code, because it is not obvious which functions are being used by application packages and which not.  Proposal: Specify a well defined public interface, so that we gain more freedom to refactor the code.  If this should be done, we need to know which functions of the library are being used by external packages.

That’s all folks “In the middle of difficulty lies opportunity” - Albert Einstein