SlidePub
Home
Categories
Login
Register
Home
General
03 Interlocking it is good for you DPDV.pdf
03 Interlocking it is good for you DPDV.pdf
jitunagwa
5 views
25 slides
Aug 08, 2024
Slide
1
of 25
Previous
Next
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
About This Presentation
Nice
Size:
849.7 KB
Language:
en
Added:
Aug 08, 2024
Slides:
25 pages
Slide Content
Slide 1
IXL DP/DV Process:
Madhusudhanarao
Date: 30-Jul-2019
JMRCL Project
–JPJS02-1B
Slide 2
© ALSTOM 2013. All rights reserved. Information contained in this document is indicative only. No representation or warranty is given or should be relied on
that it is complete or correct or will apply to any particular project. This will depend on the technical and commercial circumstances. It is provided without
liability and is subject to change without notice. Reproduction, use or disclosure to third parties, without express written authority, is strictly prohibited.
Presentation title -20/02/2021–P 2
•The purpose of this Presentation isto give an overview of the
Data Preparation activity/ Data Validation activity which starts
from the verified control table and ends at the issuance of
ADEC.
•To Demonstratehow to run variousTools in orderto complete
the Data Preparation / Data Validation activity.
AGENDA
Slide 3
© ALSTOM 2013. All rights reserved. Information contained in this document is indicative only. No representation or warranty is given or should be relied on
that it is complete or correct or will apply to any particular project. This will depend on the technical and commercial circumstances. It is provided without
liability and is subject to change without notice. Reproduction, use or disclosure to third parties, without express written authority, is strictly prohibited.
Presentation title -20/02/2021–P 3
AIM of the course
•
To cover all the specific applications that are designed in the scope of
contracts using the ASCV system as interlocking controller.
•
Data Preparation Plan, describing the Data Preparation process and the
applicable procedures and tools.
•
Data Validation Plan, defining the type of verifications required to
demonstrate that the Data Preparation process has been carried out
correctly, and in accordance with the Data Preparation Plan.
•
The generic software allows to manage all the basic functions of the ZLC (I/O
management, Network, processing of the equation, health monitoring of
ZLC, redundancy, ….)
•
The specific software , consist in the Boolean Equations describing the
behavior between Input and Output according to the CBI principles used.
Slide 4
© ALSTOM 2013. All rights reserved. Information contained in this document is indicative only. No representation or warranty is given or should be relied on
that it is complete or correct or will apply to any particular project. This will depend on the technical and commercial circumstances. It is provided without
liability and is subject to change without notice. Reproduction, use or disclosure to third parties, without express written authority, is strictly prohibited.
Presentation title -20/02/2021–P 4
Definitions
Overview of Verification & Validation
•Validation The activity of demonstrating, by test and analysis,
that the product meets in all respect its specified
requirements.
•Validator The person or agent appointed to carry out validation.
For SIL3 and SIL4 items he must be independent of
the Design Team.
•Verification The activity of determination, by analysis and test,
that the output of each phase of the lifecycle fulfils the
requirements of the previous phase.
•Verifier The person or agent appointed to carry out
verification. He can be a signaling expert, a member
of Design Team, a member of the Validation Team or
a member of the Safety Assurance Team depending
on the kind of verification activity to be carried out.
Designer and Verifier cannot be the same person for
the same activity
Slide 5
© ALSTOM 2013. All rights reserved. Information contained in this document is indicative only. No representation or warranty is given or should be relied on
that it is complete or correct or will apply to any particular project. This will depend on the technical and commercial circumstances. It is provided without
liability and is subject to change without notice. Reproduction, use or disclosure to third parties, without express written authority, is strictly prohibited.
Presentation title -20/02/2021–P 5
Overview of IXL Verification & Validation activities
S ig n a lin g P r in c ip le a n d
ty p ic a l c o n tr o l ta b le
d e s ig n
S ig n a lin g P r in c ip le
V e r if ic a tio n
( R e f : U 2 0 0 - D - 3 5 3 )
S ig n a lin g P r in c ip le
V a lid a tio n
( R e f : U 2 0 0 - D - 3 5 3 )
S ta tio n C o n tr o l T a b le
d e s ig n
S ta tio n C o n tr o l T a b le
V e r if ic a tio n
( R e f : U 2 0 0 - D - 0 8 4 )
B o o le a n E q u a t io n F ile
G e n e r a tio n
S ta tio n D a ta
v a lid a tio n
( R e f : U 2 0 0 - D - 0 6 7 )
I/O A llo c a tio n & E P R O M
G e n e r a tio n
S ta tio n V it a l D a ta
C o n tr o l
( R e f : U 2 0 0 - D - 3 5 4 )
O n S ite
in s ta lla tio n
In te r f a c e v a r ia b le s
V a lid a tio n
( R e f : U 2 0 0 - D - 0 8 7 )
a c tiv itie s re p e a te d f o r e a c h
s ta tio n
T y p ic a l C o n t r o l T a b le O K
Y
Y
Y
Y
Y
Y
Y
V e r i f ic a t io n o r
v a lid a t io n a c t iv it i e s
O t h e r a c t iv it ie s
c h e c k r e s u lt o f t h e
p r e v io u s a c t iv it y
N
N
N
N
N
N
Slide 6
© ALSTOM 2013. All rights reserved. Information contained in this document is indicative only. No representation or warranty is given or should be relied on
that it is complete or correct or will apply to any particular project. This will depend on the technical and commercial circumstances. It is provided without
liability and is subject to change without notice. Reproduction, use or disclosure to third parties, without express written authority, is strictly prohibited.
Presentation title -20/02/2021–P 6
Control Table Design and Verification Process
Station
Definition (1)
Control Table
Station
Draft
A nalyse
C B I Data develo per
C B I D ata v erifier expert
(V erifier 1)
Typical Control Table
Verified
U se
A nalyse
Reading Form
W rite
C B I data verifier expert
(A rbitratio n)
A nalyse
A nalyse
Detailling accepted changes
Control Table
Station
Verified
C B I D at a verifier expert
(V erif ier 2)
Reading Form
W rite
A nalyse
A nalyse
A nalyse
Modification
O K
Firs t and sec ond C T
releas e
Second C T realease (A fter double
c om paraison)
First CT releas e
(1) A ll usefull doc um ent to
des ign C ontrol Table
Slide 7
© ALSTOM 2013. All rights reserved. Information contained in this document is indicative only. No representation or warranty is given or should be relied on
that it is complete or correct or will apply to any particular project. This will depend on the technical and commercial circumstances. It is provided without
liability and is subject to change without notice. Reproduction, use or disclosure to third parties, without express written authority, is strictly prohibited.
Presentation title -20/02/2021–P 7
Sample Control Table Sheet
5 -CONTROL ROUTE by INDIVIDUAL CONTROL
ROUTE
Point Set or Free to move and
Man.Autho. Not Given
Route Not
Set
Virtual Route
Not Set
Interlocking for
the Virtual
Route
Fleet Route
Not Set
Route
Blocking Not
Activated
Maintenance
Block Not
Activated
Subroute
Released
Overlap
Released
Cycle Not
Set
Route
Cancellatio
n
Except if
Subroute
Locked
Route across
two CBI
Acces
Autorisation
Signal Off
NormalReverse
Rxx_yy_CR/NXC
RCxx_yy_CERCV
V_PRCNxx_NXC
PPNxx_NXC
V_PRCRxx_N
XC
PPRxx_NXC
Rxx_yy_CRVy_Rxx_yy_CRFRxx_yy_CRRBLxx_yy_CRMBLxx_CRUxx_yy_NXC
Oxx_yy_NX
C
CYxx_CR/
NERCV
RDxx_yy_
CERCV
Uxx_yy_NXCRxx_yy_TMR
AU_ACCxx_NX
C
SSxx_OFF_NE
RCV
01H_08H Nil Nil 08H_01HNil Nil Nil 01H_08H31H29H_ABNilNil
01H_08
HNil No Nil Nil
05H_04H Nil Nil 04H_05HNil Nil 04H_05H05H_04H30H28H_ABNilNil
05H_04
HNil No Nil Nil
04H_05H Nil Nil 05H_04H07G_02GNil Nil 04H_05H68G_26H28H_BANilNil
04H_05
HNil Yes Nil Nil
16H_26H_BA
08H_01H Nil Nil 01H_08H03G_06GNil Nil 08H_01H69G_27H29H_BANilNil
08H_01
HNil Yes Nil Nil
17H_27H_BA
(1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (11)(12)(13)(14) (15) (16) (17)
(1) Route Designation (11) Overlap conflicting with the Route
(2) List of points covered in Normal position by the Route and controlled in Normal position for
protection of the Route
(12) Cycle conflicting with the
route
(3) List of points covered in Reverse position by the Route and controlled in Reverse position for protection of the
Route
(13) Control of the cancellation of the Route, can be shunted by the subroute released in case of route entry to the
depot
(4) All the conflicting Routes which are Not prevented by different
point position
(14) Route Destruction Control is Not active when the subroute is
locked
(5) Virtual Route Not
Set
(15) Route across two CBI ("Yes" or
"No")
(6) Interlocking letter for the Virtual Route if incompatilities in several other cbi or Nil if incompatilities
in only one cbi
(16) Autorisation Acces AU_ACCxy_NXC (Entry Non Interlocked
tracks)
(7) All the conflicting Fleet Routes which are Not prevented by different point position
(17) Signal OFF SSxy_OFF_W (Entry
Dépôt)
(8) Route blocking of the route under
control
(9) Maintenance block for the route under control
(10) Last Subroute of the Route mentioned in column 4
and 5
Slide 8
© ALSTOM 2013. All rights reserved. Information contained in this document is indicative only. No representation or warranty is given or should be relied on
that it is complete or correct or will apply to any particular project. This will depend on the technical and commercial circumstances. It is provided without
liability and is subject to change without notice. Reproduction, use or disclosure to third parties, without express written authority, is strictly prohibited.
Presentation title -20/02/2021–P 8
DP/DV Overview of Process
C o n t r o l T a b l e
S t a t i o n u n d e r T e s t
V e r i f i e d
D B T a b e l l a
G e n e r a t i o n
D B T a b e l l a
C o n f i g u r a t i o n
D b T a b e l l a F i l e s
V e r i f i e d
S i g n a l i n g v e r i f i e r
O K
D b T a b e l l a
F i l e s
N o
R e a d i n g F o r m
C B I I n t e r l o c k i n g R u l e s
V a l i d a t e d
A D E S 2 + +
S t a t i o n B E F
B E F G e n e r a t i o n 1 B E F G e n e r a t i o n 2
A D E S 2
S t a t i o n B E F
B E F C o m p a r a t o r 1
( W i n D i f f )
B E F C o m p a r a t o r 2
( E x a m D i f f )
S i g n a l i n g v e r i f i e r
A n a l y s e
O KF a i l e dC h a n g e R e q u e s t ( A M )
D a t a V a l i d a t i o n
B E F G e n e r a t i o n 1
M a k i n g
E P R O M
Slide 9
© ALSTOM 2013. All rights reserved. Information contained in this document is indicative only. No representation or warranty is given or should be relied on
that it is complete or correct or will apply to any particular project. This will depend on the technical and commercial circumstances. It is provided without
liability and is subject to change without notice. Reproduction, use or disclosure to third parties, without express written authority, is strictly prohibited.
Presentation title -20/02/2021–P 9
TOOLS
•
DBT –DB Tabella
•
ADES2 / ADES2++
•
DVT –Data Validation Tool
•
Configuration Wizard.
•
Computer Aided Application (CAA).
•
Application Data Verifier(ADV).
Slide 10
© ALSTOM 2013. All rights reserved. Information contained in this document is indicative only. No representation or warranty is given or should be relied on
that it is complete or correct or will apply to any particular project. This will depend on the technical and commercial circumstances. It is provided without
liability and is subject to change without notice. Reproduction, use or disclosure to third parties, without express written authority, is strictly prohibited.
Presentation title -20/02/2021–P 10
CBI DB Tabella Definition
Input: CBI Station Control Table verified,
PRDSS(Prolog Rules Data structure specification)
Output: dbTabella.pl
Description:Parameterization of the description file ( this file
allows to indicate the last line for each excel sheet of
the control table)
Tool: DBTabellatool (DBT.xls)
Responsible:CBI data developer
Verified Control
Table
PRDSS file
DBT Tool dbTabella.pl
Slide 11
© ALSTOM 2013. All rights reserved. Information contained in this document is indicative only. No representation or warranty is given or should be relied on
that it is complete or correct or will apply to any particular project. This will depend on the technical and commercial circumstances. It is provided without
liability and is subject to change without notice. Reproduction, use or disclosure to third parties, without express written authority, is strictly prohibited.
Presentation title -20/02/2021–P 11
CBI DB Tabella Verification
Slide 12
© ALSTOM 2013. All rights reserved. Information contained in this document is indicative only. No representation or warranty is given or should be relied on
that it is complete or correct or will apply to any particular project. This will depend on the technical and commercial circumstances. It is provided without
liability and is subject to change without notice. Reproduction, use or disclosure to third parties, without express written authority, is strictly prohibited.
Presentation title -20/02/2021–P 12
CBI BEF generation
ADES2 & ADES2 ++ Tools are used to generate Boolean equations file.
Equations of both the tools are the same and these are calculated differently
and their results are compared.
Input :Verified DB Tabella, Prolog Rules
Output1:ADES2 result: output files stored in output directory
equazioni_0.dat Boolean equations files
dichiarazioni_0.dat variables file
Output2 : ADES2 ++ result: output files stored in output directory
ades2++_equations.dat:
ades2++_station.log:
Tool: ADES2 and ADES2++
Responsible:CBI Data developer
Slide 13
© ALSTOM 2013. All rights reserved. Information contained in this document is indicative only. No representation or warranty is given or should be relied on
that it is complete or correct or will apply to any particular project. This will depend on the technical and commercial circumstances. It is provided without
liability and is subject to change without notice. Reproduction, use or disclosure to third parties, without express written authority, is strictly prohibited.
Presentation title -20/02/2021–P 13
CBI BEF Verification
Input: CBI Boolean Equation File1, CBI Boolean Equation File2
Output:Verified BEF
Description This verification is performed in order to check that
the BEF generate by ADES2 and ADES2++ are equal
Tool: WinDiff, ExamDiff
Procedure:CBI Data Verification Procedure
Report: Verification report, anomaly
Responsible:CBI Data verifier
Slide 14
© ALSTOM 2013. All rights reserved. Information contained in this document is indicative only. No representation or warranty is given or should be relied on
that it is complete or correct or will apply to any particular project. This will depend on the technical and commercial circumstances. It is provided without
liability and is subject to change without notice. Reproduction, use or disclosure to third parties, without express written authority, is strictly prohibited.
Presentation title -20/02/2021–P 14
CBI BEF Validation
Input: BEF, Verified Control Table , Cross checking matrix (in built file for
DVT tool)
Output: Validated BEF
Description:The operator launch the DVT with the BEF to validate and the
verified control table. Validator shall analyze all the DVT reports
and check the full coverage by ticked the DVT report and control
table, this operation is made by using the Cross checking matrix
which give for each report the correspondence in the control table.
The results of the validation activity are recorded in the CBI BEF
Validation File.
Tool: Data Validation Tool –DVT
Report: CBI BEF Validation Report
Responsible:CBI data validation
Slide 15
© ALSTOM 2013. All rights reserved. Information contained in this document is indicative only. No representation or warranty is given or should be relied on
that it is complete or correct or will apply to any particular project. This will depend on the technical and commercial circumstances. It is provided without
liability and is subject to change without notice. Reproduction, use or disclosure to third parties, without express written authority, is strictly prohibited.
Presentation title -20/02/2021–P 15
BEF Validation Activity
Slide 16
© ALSTOM 2013. All rights reserved. Information contained in this document is indicative only. No representation or warranty is given or should be relied on
that it is complete or correct or will apply to any particular project. This will depend on the technical and commercial circumstances. It is provided without
liability and is subject to change without notice. Reproduction, use or disclosure to third parties, without express written authority, is strictly prohibited.
Presentation title -20/02/2021–P 16
Application Data Definition
Input: Validated BEF, CBI Station Configuration, sub system and system
data interface specification, FSFB Data interface .
Output: Station Definition Files (Generation of *.xif, *.dat, *.ion,)
Description: The Station application data includes several groups of data. All
data are managed using a tool named “Configuration Wizard”.
In other words, this tool allows the user to define the ASCV HW
configuration (e.g. configuration of I/O boards, …), the
configuration of vital network, and so on.
Tool: Configuration Wizard
Responsible: CBI data developer
Slide 17
© ALSTOM 2013. All rights reserved. Information contained in this document is indicative only. No representation or warranty is given or should be relied on
that it is complete or correct or will apply to any particular project. This will depend on the technical and commercial circumstances. It is provided without
liability and is subject to change without notice. Reproduction, use or disclosure to third parties, without express written authority, is strictly prohibited.
Presentation title -20/02/2021–P 17
Purpose of Configuration Wizard
•
To configure variables used in Boolean Equations
•
To configure System Physical I/O cards
•
To configure Vital Network Configuration, and Vital Variables
•
exchange over the Vital Network towards other subsystems
•
To describe the HW system (up to physical boards), network and
module details
•
To fully define Non Vital Data (ORXMT variables) for Diagnostic
Subsystem (SDM)
Slide 18
© ALSTOM 2013. All rights reserved. Information contained in this document is indicative only. No representation or warranty is given or should be relied on
that it is complete or correct or will apply to any particular project. This will depend on the technical and commercial circumstances. It is provided without
liability and is subject to change without notice. Reproduction, use or disclosure to third parties, without express written authority, is strictly prohibited.
Presentation title -20/02/2021–P 18
User Menu -Configuration Wizard
•
New project
•
Open project
•
Close project
•
Generate FDI.DAT
•
Generate FDI.XIF
•
Generate FDI.IONV
•
Exit
Slide 19
© ALSTOM 2013. All rights reserved. Information contained in this document is indicative only. No representation or warranty is given or should be relied on
that it is complete or correct or will apply to any particular project. This will depend on the technical and commercial circumstances. It is provided without
liability and is subject to change without notice. Reproduction, use or disclosure to third parties, without express written authority, is strictly prohibited.
Presentation title -20/02/2021–P 19
Application Data Definition Verification
Input: CBI Station Configuration, CBI sub system and system Data
Interfaces Specification, Input Output CBI board allocation .
Output:Station Definition Files (*.xif, *.dat, *.ion, files)
Description:The verification of the Station Definition is performed by
checking the printout of application data (issued of
Configuration Wizard tool) against the input.
Tool: None
Procedure:CBI Data Verification Procedure
Report: Report on Application Data Definition Manual Verification .
Responsible:CBI data verifier
Slide 20
© ALSTOM 2013. All rights reserved. Information contained in this document is indicative only. No representation or warranty is given or should be relied on
that it is complete or correct or will apply to any particular project. This will depend on the technical and commercial circumstances. It is provided without
liability and is subject to change without notice. Reproduction, use or disclosure to third parties, without express written authority, is strictly prohibited.
Presentation title -20/02/2021–P 20
Application Data production and EPROM programming
Input: Station Application Data
Output: Programmed application data media
Description:This activity is performed using the Computer Aided
Application (CAA) tool. The CAA tool, in its forward step,
receives as inputs the application data related to a
particular station. The CAA tool generates the data
definition files in “executable” format for each ASCV
component/module. These data definition files are then
used for media programming.
Tool: CAA
Responsible:CBI Data developer
Slide 21
© ALSTOM 2013. All rights reserved. Information contained in this document is indicative only. No representation or warranty is given or should be relied on
that it is complete or correct or will apply to any particular project. This will depend on the technical and commercial circumstances. It is provided without
liability and is subject to change without notice. Reproduction, use or disclosure to third parties, without express written authority, is strictly prohibited.
Presentation title -20/02/2021–P 21
CAA Input
Station Definition File (SDF) : They contain information concerning typical
configuration of standalone application (Boolean Equations, I/O configuration, etc.)
System Definition Files (NET):They contain general and network configuration
information (Number of links, number of nodes, base configuration, etc.)
INPUT:
System
DefinitionFiles(NET),SystemDefinitionFiles(SDFs)
<Network>.DAT
<Line>. INI
<Network>.INI
<Station>.DAT
<Station>.ION
<Station>.XIF
Slide 22
© ALSTOM 2013. All rights reserved. Information contained in this document is indicative only. No representation or warranty is given or should be relied on
that it is complete or correct or will apply to any particular project. This will depend on the technical and commercial circumstances. It is provided without
liability and is subject to change without notice. Reproduction, use or disclosure to third parties, without express written authority, is strictly prohibited.
Presentation title -20/02/2021–P 22
CAA Output
CAAproducethefollowingoutput:
EPROMSimageFiles
SDMFiles
NetworkSimulatorsFiles
Reports
AuxiliaryFilesforADVprocess
CAA
Slide 23
© ALSTOM 2013. All rights reserved. Information contained in this document is indicative only. No representation or warranty is given or should be relied on
that it is complete or correct or will apply to any particular project. This will depend on the technical and commercial circumstances. It is provided without
liability and is subject to change without notice. Reproduction, use or disclosure to third parties, without express written authority, is strictly prohibited.
Presentation title -20/02/2021–P 23
Programmed Application Data Verification
Input:Original Application Data, Programmed sets of application data
memories (Normal and Reserve sets)
Output:Application Data Equivalence Certificate
Record:See report
Responsible: CBI Validation Manager
Slide 24
© ALSTOM 2013. All rights reserved. Information contained in this document is indicative only. No representation or warranty is given or should be relied on
that it is complete or correct or will apply to any particular project. This will depend on the technical and commercial circumstances. It is provided without
liability and is subject to change without notice. Reproduction, use or disclosure to third parties, without express written authority, is strictly prohibited.
Presentation title -20/02/2021–P 24
Vital Data Control Process
Validated
BEF
BEF
validation
report
Verified
Application
data
Manual
verification
report
Hexadecimal
files
EPROM
verification
report
Reconstructed
vital files
Vital Data
Equivalence
Certificate
(Part 1)
Vital Data
Equivalence
Certificate
(Part 2)
EPROM
configuration
management
file
CBI Subsystem
configuration
management
file
++
Step 1- Data Preparation and BEF Validation
Step 2
EPROM Burning &
Reconstruction
Step 3 ASCV vital data verification
Step 44 -Delivery
CBI Data
Configuration
Database
Version of Application dataFrozen
Reconstructed
vital files
Slide 25
www.alstom.com
Thank You
Tags
metro
Categories
General
Download
Download Slideshow
Get the original presentation file
Quick Actions
Embed
Share
Save
Print
Full
Report
Statistics
Views
5
Slides
25
Age
485 days
Related Slideshows
22
Pray For The Peace Of Jerusalem and You Will Prosper
RodolfoMoralesMarcuc
33 views
26
Don_t_Waste_Your_Life_God.....powerpoint
chalobrido8
36 views
31
VILLASUR_FACTORS_TO_CONSIDER_IN_PLATING_SALAD_10-13.pdf
JaiJai148317
33 views
14
Fertility awareness methods for women in the society
Isaiah47
30 views
35
Chapter 5 Arithmetic Functions Computer Organisation and Architecture
RitikSharma297999
29 views
5
syakira bhasa inggris (1) (1).pptx.......
ourcommunity56
30 views
View More in This Category
Embed Slideshow
Dimensions
Width (px)
Height (px)
Start Page
Which slide to start from (1-25)
Options
Auto-play slides
Show controls
Embed Code
Copy Code
Share Slideshow
Share on Social Media
Share on Facebook
Share on Twitter
Share on LinkedIn
Share via Email
Or copy link
Copy
Report Content
Reason for reporting
*
Select a reason...
Inappropriate content
Copyright violation
Spam or misleading
Offensive or hateful
Privacy violation
Other
Slide number
Leave blank if it applies to the entire slideshow
Additional details
*
Help us understand the problem better