1/104
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Monitoring and control systems
These are responsible for controlling the technology used by a company (hardware, networks and communications, operating systems or applications, services and processes) in order to analyze their operation and performance, and to detect and prevent possible errors/failures.
monitoring and control system
The purpose of _______________________ is to allow automatic and manual control of system components according to the operational or technical need and to provide system status information.
Graphic visualization
Records
Analysis in real time
System alerts and notifications
Production of reports
Possibility of installing plug-ins
Distinction by type of user
System Monitoring and Control FEATURES (5)
Analysis in real time
It refers to a feature wherein a good system will offer a continuous monitoring, which has no delays, or at least those delays are minimum.
System alerts and notifications
It refers to a feature wherein once a particular event happens, a notice, which will reach the right people, will be generated. Alerts can normally be configured so that the event that triggers them can be selected.
Graphic visualization
It refers to a feature wherein in order to facilitate the analysis of the data provided, the monitoring tool will create graphs with the data provided; these graphs will be preferably friendly and easy to understand.
Production of reports
It refers to a feature wherein in order to present the data to clients or different departments of the company, the monitoring system should allow reporting
Records
It refers to a feature wherein when generating a record with previous monitoring, it will be easier to evaluate the evolution of the operation of the monitored systems.
Possibility of installing plug-ins
It refers to a feature wherein which may exist in a generic way or may even be created ad hoc to meet the particular needs of a client.
Distinction by type of user
It refers to a feature wherein the data accessed by each user will be different depending on the permissions available.
LR
MC
RR
PI
PO
SS
SMC ACTIVITIES (6)
logging and reporting
LR
monitor and control
MC
release and restoration
RR
problem isolation and service restoration
PI
position operation
PO
site specific SMC tasks
SS
Operational management of technical services
it refers to the planning coordination and execution of activities to ensure the effective and efficient delivery of technical support and maintenance within the organization.
Service Orientation
Proactive Maintenance and Monitoring
Standardization and Process Management
Resource Optimization
Continuous Improvement
Risk Management and Resilience
Collaboration and Communication
Data-Driven Decision-Making
Compliance and Safety
Customer-centric Approach
PRINCIPLES OF THE OPERATIONAL MANAGEMENT (10)
Service Orientation
It is a principle of operational management which refers to focus on delivering reliable and high quality service
Proactive Maintenance and Monitoring
It is a principle of operational management which refers to implement preventive and predictive maintenance to reduce failure
Standardization and Process Management
It is a principle of operational management which refers to develop clear Standard Operating Procedures (SOPs)
Resource Optimization
It is a principle of operational management which refers to ensure optimal utilization of personnel, technology and financial resources
Continuous Improvement
It is a principle of operational management which refers toconduct root cause analysis and implement corrective actions
Risk Management and Resilience
It is a principle of operational management which refers to identify potential risks and develop contingency plans
Collaboration and Communication
It is a principle of operational management which refers to ensure effective communication and ensure clear documentation and reporting
Data-Driven Decision-Making
it is a principle of operational management which refers to use real-time data and analytics for informed decisions and track performance metrics
Compliance and Safety
it is a principle of operational management which refers to ensure operations comply with regulations and safety standards
Customer-centric Approach
it is a principle of operational management which refers to provide timely and effective resolution of technical issues and gather feedback
Facilitate problem resolution
Ensure system reliability and availability
Ensure compliance and safety
Deliver quality service
Optimize resource utilization
Support continuous monitoring and improvement
PURPOSE OF THE OPERATIONAL MANAGEMENT (6)
technical system architecture
The ___________________ of SMC is a structured framework that defines how different components within the system interact to monitor, manage and control operations.
hierarchical
Technical System Architecture is typically _____________, consisting of interconnected layers and subsystems.
Field Layer (Data Acquisition Layer)
Communication Layer
Control and Processing Layer
Application and User Interface Layer
4 KEY LAYERS OF TECHNICAL SYSTEM ARCHITECTURE
Field Layer (Data Acquisition Layer)
-It is responsible for collecting real-time data from sensors, devices, and other monitoring instruments.
-It converts physical signals into digital data and sends it to the communication layer
Communication Layer
- facilitates data transmission between field devices and control systems
- ensures secure, low-latency communication for real-time data flow
Control and Processing Layer
- processes incoming data, generates actionable insights, and sends control commands
- monitors system performance, triggers automated responses, and supports human intervention when necessary
Application and User Interface Layer
-provides operators and engineers with a visual representation of system data and control options
- displays real-time data, system status, alarms, and performance reports, allowing decision-making and manual control
Centralized Architecture vs. Distributed Architecture
Redundancy and Failover Mechanisms
Data Storage and Management
Security Framework
OTHERARCHITECTURALFEATURES (4)
Centralized Architecture
Architectural feature which refers to all monitoring and control functions are managed from a single control center. Best for smaller or localized systems.
Distributed Architecture
Architectural feature which refers to multiple control units manage different subsystems, sending data to a central monitoring center. Common in large-scale operations like power grids or air traffic management.
Redundancy and Failover Mechanisms
Architectural feature which refers to redundant servers, backup communication lines, and failover data centers ensure continued operation in case of failure.
-Essential for maintaining uptime and reliability
Data Storage and Management
• Collected data is stored in real-time databases
• Historical data is used for performance analysis, predictive maintenance, and compliance reporting.
Security Framework
• Firewalls, encryption protocols, and access controls protect against cyber threats.
• Continuous monitoring detects anomalies and unauthorized activities.
the transfer of responsibility
In System Monitoring and Control (SMC), _________________ refers to the structured handover of operational oversight and management of a specific service from one entity, team, or individual to another.
TRANSFER OF RESPONSIBILITY
In System Monitoring and Control (SMC), the ______________________ refers to the structured handover of operational oversight and management of a specific service. This is a critical process that ensures continuity, accountability, and service reliability during transitions.
Shift Changes
This occurs when operators or technicians on different shifts assume control of monitoring and management.
System Maintenance
This occurs when responsibility moves from the operations team to the maintenance team for planned repairs or updates.
Incident Management
This occurs when an issue is escalated to specialized support teams.
Service Provider Handover
This occurs when a third-party service provider takes over or relinquishes operational control.
Project Completion
This occurs upon the successful implementation of a new system or service, responsibility may shift from the project team to operations.
Shift Changes
Shift Changes
Incident Management
Service Provider Handover
Project Completion
The transfer of responsibility may occur in various scenarios, including: (5)
System Configuration
_________________ for monitoring and control involves setup of hardware, software, network infrastructure and protocols that work together to ensure real-time system performance management. The primary goal is to collect data, analyze it and execute control actions when necessary
Monitoring Devices and Sensors
Control Devices
Data Collection and Aggregation
Monitoring and Control Software
Communication Network
Control Center and User Interface
System Configuration (6)
Monitoring Devices and Sensors
Collect real time data from various points within the system; often use protocols like SNMP (Simple Network Management Protocol)
Control Devices
Execute commands to manage the system based on monitoring data; perform adjustments like activating backups, shutting downfaulty units, or rerouting traffic
Data Collection and Aggregation
Centralize and store data from various sources
Monitoring and Control Software
Provides a visual interface for operators to observe and manage systems; network monitoring tools like Zabbix
Communication Network
Facilitates reliable data transmission between sensors, controllers, and monitoring systems; LAN/WAN, VPNs, wireless or fiber optic networks
Control Center and User Interface
Provide operators with real-time insights and control options; user roles and permissions are defined to ensure secure operations
configured, Configurations
The System Monitoring and Control (SMC) system can be __________in various ways depending on the complexity of the operations, the industry requirements, and the size of the monitored infrastructure. __________ typically vary from simple, localized systems to large-scale, distributed networks.
Standalone Configuration
Centralized Configuration
Distributed Configuration
Hybrid Configuration
Cloud-Based Configuration
Redundant Configuration
Mobile and Remote Configuration
PRIMARYCONFIGURATIONS (7)
Centralized Configuration
all monitoring and control functions are managed from one central control room or data center
• Advantages: Real-time visibility over all subsystems and easier coordination and decision-making
• Limitations: Risk of single point of failure and requires robust communication networks
Standalone Configuration
- single monitoring and control system managing a specific application or area.
• Advantages: Simple setup and maintenance and cost-effective for small operations
• Limitations: No centralized oversight and limited scalability
Distributed Configuration
– monitoring and control responsibilities are divided across multiple regional or remote control units, with a central system for oversight.
• Advantages: Improved fault tolerance and reduces latency in remote areas
• Limitations: Complex to manage and maintain and requires effective data synchronization
Hybrid Configuration
- combines centralized and distributed configurations, offering both local control and centralized oversight.
• Advantages: Balances control between local and central systems and provides redundancy and flexibility
• Limitations: Higher cost and complexity
Cloud-Based Configuration
- data from sensors and devices is sent to a cloud platform for analysis, monitoring, and control.
• Advantages: scalable, flexible and accessible from anywhere with internet connectivity
• Limitations: Reliant on stable internet connectivity and data security and privacy concerns
Redundant Configuration
- designed with backup components and failover mechanisms to ensure continued operations during failures.
• Advantages: High system availability and reliability and prevents service interruptions
• Limitations: High implementation and maintenance costs
Mobile and Remote Configuration
- provides monitoring and control through mobile applications or remote access portals.
• Advantages: Flexible access for operators in the field and reduces response time to issues
• Limitations: Security risks from remote access
System Monitoring and Control (SMC) systems
In ______________________________, making configuration changes is a critical task that involves adjusting settings, parameters, or components to ensure the system operates efficiently and meets operational requirements.
Change Management Process
Version Control and Configuration Management Tools
Redundancy and Failover Techniques
Configuration Validation and Simulation
Incremental or Phased Implementation
Backup and Recovery Procedures
Remote Management and Automation
Remote Management and Automation
Rollback and Recovery Plans
Documentation and Knowledge Management
GENERAL TECHNIQUES FOR MAKING CONFIGURATION CHANGES (10)
Change Management Process
formal process that governs how configuration changes are planned, evaluated, and implemented.
Version Control and Configuration Management Tools
tools that track and manage configuration changes, ensuring version control and consistency.
Redundancy and Failover Techniques
prevent service disruptions
Configuration Validation and Simulation
Simulating configuration changes in a test or virtual environment to predict the outcomes without affecting the live system.
Incremental or Phased Implementation
applying configuration changes in stages to minimize risks
Backup and Recovery Procedures
Creating backups of the current configuration before making changes.
Remote Management and Automation
Using remote access tools and automation scripts to perform configuration changes
Monitoring and Logging
Continuously monitor the system for unexpected behavior or performance degradation during and after a configuration change.
Rollback and Recovery Plans
Developing rollback plans to revert changes if issues arise
Documentation and Knowledge Management
Documenting every step of the configuration change for transparency and traceability
Change Identification and Assessment
Change Approval and Authorization
Planning and Preparation
Communication and Stakeholder Management
Testing and Validation
Implementation
Post-Implementation Review and Verification
Closure and Documentation
IMPLEMENTATION OF PLANNED MAJOR SYSTEM CHANGE (8)
Ensuring Operational Continuity
Facilitating Informed Decision-Making
Incident Management and Response
Compliance and Audit Requirements
Resource Management
Continuous Improvement
IMPORTANCE OF COORDINATION AND REPORTING (6)
Establishing Clear Communication Channels
Implementing Standard Operating Procedures (SOPs)
Using Real-Time Monitoring Systems
Conducting Regular Meetings and Briefings
Utilizing Centralized Reporting Systems
Defining Roles and Responsibilities
Maintaining Incident Logs and Documentation
Continuous Feedback and Improvement
HOW COORDINATION AND REPORTING ARE ACHIEVED (8)
Human-Machine Interface (HMI)
It is a user interface or dashboard that connects operators with the system monitoring and control (SMC) central system and its subordinate systems. It provides real-time data visualization, control options, and system insights, allowing operators to monitor performance and respond to issues efficiently.
Clarity and Simplicity
Consistency
Prioritization of Information
User Control and Feedback
Real-Time Monitoring and Visualization
Scalability and Flexibility
HMIs key principles (6)
Clarity and Simplicity
• The interface should present data clearly, avoiding unnecessary complexity.
• Important information (e.g., alerts, system status) must be prominent.
• Use familiar visual elements like graphs, charts, and color coding.
Consistency
• Maintains uniformity in design across the central and subordinate systems.
• Similar navigation patterns, color schemes, and control layouts improve operator efficiency.
Prioritization of Information
• Implements hierarchical data display: overview and detailed levels
• Critical alarms or faults should always take priority and be immediately visible.
User Control and Feedback
• Provide operators with intuitive controls and clear feedback for every action performed
• Display confirmation messages for critical commands
• Implement undo or fail-safe options for accidental actions
Real-Time Monitoring and Visualization
• Enable real-time data presentation using time-series graphs, live metrics, and animations
• Provide trend analysis and predictive insights when applicable
Scalability and Flexibility
• Ensure the HMI can adapt to increasing data volume and system complexity
• Customizable dashboards allow operators to monitor components specific to their responsibilities.
ROUTINE TASKS
These are essential to maintain system performance, ensure safety, and prevent failures. These tasks are typically performed at regular intervals, ranging from real time monitoring to periodic maintenance and reporting. The criticality of these tasks varies based on their impact on operations, system stability, and compliance.
Visual Ergonomics
Cognitive Load Management
Physical ergonomics
Alarm Management
User Training and Familiarity
Ergonomics Considerations for HMI Design
Checklists
Alarm Management and Response
Preventive Maintenance
Data Backup and Archiving
Configuration Management
Incident Management and Reporting
Performance Analysis and Reporting
User Access Management
Communication and Coordination
Compliance and Audit Preparation
ROUTINE TASKS (10)
TECHNOLOGY
It involves a suite of hardware, software and communications systems designed to monitor, analyze and manage the operations of complex infrastructures
CTMS stack
The CTMS interface profile is made up by a ___________ which can be described in terms of layers, each with a mapping to the seven layer OSI reference model as presented in the following table
WhatsUp Gold
________________ provides standards based monitoring of any network device, service, or application on TCP/IP and Windows networks. It lets you discover devices on your network, initiate monitoring of those devices, and execute actions based on device state changes, so you can identify network failures before they become catastrophic.
DISCOVERY AND MAPPING
Its roles-based discovery process searches for devices on your network and helps determine the type of device based on the device attributes.
POLLING/LISTENING
It actively polls devices to determine their status.
ACTIONS/ALERTS
It fires actions to notify you of changes on your network. Actions aid in problem resolution through assorted options such as email and cell phone alerts, or service restarts.