8VZZ001288T2120 A en SPlus Operations 2.1 SP2 Release Notes
8VZZ001288T2120 A en SPlus Operations 2.1 SP2 Release Notes
8VZZ001288T2120 A en SPlus Operations 2.1 SP2 Release Notes
ABB may have one or more patents or pending patent applications protecting the intellectual property in the
ABB products described in this document.
The information in this document is subject to change without notice and should not be construed as a com-
mitment by ABB. ABB assumes no responsibility for any errors that may appear in this document.
Products described or referenced in this document are designed to be connected and to communicate infor-
mation and data through network interfaces, which should be connected to a secure net-work. It is the sole
responsibility of the system/product owner to provide and continuously ensure a secure connection between
the product and the system network and/or any other networks that may be connected.
The system/product owners must establish and maintain appropriate measures, including, but not limited to,
the installation of firewalls, application of authentication measures, encryption of data, installation of antivirus
programs, and so on, to protect these products, the network, its system, and interfaces against security
breaches, unauthorized access, interference, intrusion, leakage, and/or theft of data or information.
ABB performs functionality testing on the products and updates that we release. However, system/product
owners are ultimately responsible for ensuring that any product updates or other major system updates (to
include but not limited to code changes, configuration file changes, third-party software updates or patches,
hardware change out, and so on) are compatible with the security measures implemented. The system/ prod-
uct owners must verify that the system and associated products function as expected in the environment in
which they are deployed.
In no event shall ABB be liable for direct, indirect, special, incidental or consequential damages of any nature or
kind arising from the use of this document, nor shall ABB be liable for incidental or consequential damages
arising from use of any software or hardware described in this document.
This document and parts thereof must not be reproduced or copied without written permission from ABB, and
the contents thereof must not be imparted to a third party nor used for any unauthorized purpose.
The software or hardware described in this document is furnished under a license and may be used, copied, or
disclosed only in accordance with the terms of such license.
This product meets the requirements specified in EMC Directive 2014/30/EU and in Low Voltage Directive
2014/35/EU.
The crossed–out wheeled bin symbol on the product and accompanying documents means that used
electrical and electronic equipment (WEEE) should not be mixed with general household waste. If you
wish to discard electrical and electronic equipment (EEE), please contact your dealer or supplier for
further information.
Disposing of this product correctly will help save valuable resources and prevent any potential negative effects
on human health and the environment, which could otherwise arise from inappropriate waste handling.
All rights to copyrights, registered trademarks, and trademarks reside with their respective owners.
Revision: A
TA BLE O F CO NT ENTS
Table of Contents
1 INTRODUCTION ........................................................................................................................... 1
1.1 Overview ........................................................................................................................................ 1
1.2 Executive Summary ..................................................................................................................... 2
1.3 Revision Record ............................................................................................................................3
1.4 Compatibility ................................................................................................................................3
1.5 Requirements............................................................................................................................... 4
1.5.1 General thoughts on hardware requirements .................................................... 4
1.5.2 Summary Table ...........................................................................................................5
1.5.3 Software Requirements Details ..............................................................................5
1.5.4 Hardware Serverless Configuration ...................................................................... 6
1.5.5 Hardware Server based Configurations .............................................................. 6
1.5.6 Hardware Clients ........................................................................................................ 7
3 Virtualization ............................................................................................................................ 24
3.1 Symphony Plus Servers............................................................................................................ 24
3.2 Redundancy architecture ........................................................................................................ 26
3.3 Network connectivity ................................................................................................................27
3.4 Equipment Lifecycle ..................................................................................................................27
3.5 Equipment Maintenance ......................................................................................................... 28
3.6 Cybersecurity ............................................................................................................................. 28
3.7 Virtual System Architectures – Matching Physical Machines Resources...................... 29
3.8 Virtual System Architectures – Resource Pooling Architecture ....................................... 31
3.9 Summary and Conclusion ....................................................................................................... 35
5 INSTALLATION .......................................................................................................................... 42
5.1 Installation .................................................................................................................................. 42
5.2 Upgrading................................................................................................................................... 42
5.3 Backup and Restore.................................................................................................................. 42
I
I NTR OD UCT IO N OV ERV I EW
1 INTRODUCTION
This document represents the release notes for S+ Operations 3.1 Service Pack 1. This docu-
ment provides a brief overview on functionality. The document contains additional notes that
may be valuable to customers and service personnel working with the product.
1.1 Overview
Operator effectiveness is fundamental to a plant’s performance. However, with fewer plant
operators, a generational shift in the operator workforce, and increasing complexity of plant
operations, this is becoming ever more challenging, but not insurmountable. Symphony Plus,
with its intuitive, easy-to-use human machine interface (HMI), leads operators to greater
awareness, faster response and better decisions. S+ Operations is designed for high perfor-
mance in every aspect involved: human machine interface, integrated operations, seamless
life cycle management, information management, alarm management, security, process opti-
mization, and flexible, scalable fault tolerant design.
Integrated operations
S+ Operations seamlessly integrates all plant devices and systems.
Information management
S+ Operations transforms data into meaningful information and presents it in intuitive user
specific desktop displays.
Alarm management
S+ Operations superior integrated alarm management system includes the industry’s leading
EEMUA191 – compliant alarm management analysis system.
Security
S+ Operations provides users with a secure and reliable operations environment with its
built-in security features.
Process optimization
S+ Operations combined with OPTIMAX® Plant Performance Package improves over all plant
productivity.
This release also includes many new usability improvements and bug fixes. A complete list of
improvements can be found in this release notes.
This release reintroduces Water Leakage management integration ability with Takadu.
The datasheet found in this document give an outline of the system capabilities of S+ Opera-
tions. Review carefully and discuss any deviation to it with your ABB product support.
Note: This release is intended for usage with SD Series, HR Series or older Harmony Rack. It
also supports native drivers as used in SCADA applications. System with Symphony Melody
or Procontrol cannot use this release. The support of these control systems will be
announced separately when available.
1.4 Compatibility
The compatibility related information with respect to S+ Operations software are as follows:
1.5 Requirements
1.5.1 General thoughts on hardware requirements
The hardware requirements for S+ Operations are dependent on the following factors:
– Special applications
The table below provides a summary of hardware configurations that were found to produce
good performance during the testing of S+ Operations.
History server:
For the History Server in large applications and in those demanding high historian perfor-
mance, it is required to use separate disks for programs, separate disks for the alarm/event
database and separate disks for real-time value database. In case a RAID is used this means 3
independent RAID 1 with at least 6 disks in total or a RAID 5 with at least 8 disks. For high
speed historians SSD disks shall be used. Further performance improvements can be archived
using separate RAID 10 for each of the databases.
CPU Small: Intel® Small: Intel® Intel® Xeon® Intel® I3 proces- Small: Intel®
Xeon® E3- Xeon® E3- Silver 4112, Xeon® sor Xeon® E3-
1270 v6, 1270 v6, 2.6GHz or Silver 4112, 1270 v6,
3.8GHz 3.8GHz, In- Intel Xeon 2.6GHz or 3.8GHz, Intel®
Large: In- tel® Xeon® E3-1225 v5, Intel Xeon Xeon® Silver
tel® Xeon® Silver 4114 3.3Ghz E3-1225 v5, 4114 2.2GHz
Silver 4114 2.2GHz or 3.3Ghz or Intel®
2.2GHz or Intel® Xeon® Xeon® Gold
Intel® Gold 5118, 5118, 2.3GHz
Xeon® Gold 2.3GHz
5118,
2.3GHz
All referenced operating systems, Office, Internet Explorer and SQL Server should always in-
clude the latest security patches and service packs as well as antivirus qualified by ABB. Refer
to Field Alert document “2VAA001442 Security Updates Validation Status for Symphony Plus”
for the latest information on approved security patches and antivirus definitions. This docu-
ment is accessible in ABB Solutions Bank for registered users with valid Sentinel subscription.
Note:
On Windows 10 LTSB 2016 client acting as an operations server the maximum number of
supported “Power Explorer” Clients is 5.
To prove that you are eligible to install SQL Server 2016, make sure that you have received the
order with SQL license stickers. As a proof of legal license, you are supposed to attach them
to all client computers.
Workstations should have at least 4 real cores, be either a Xeon processor v5 or later with at
least 3.5 GHz. At least 8 GB RAM. Hard disks size as required for application size and history
length1.
Workstations should be using Xeon Silver processors with at least 2.6 GHz. At least 8-16 GB
RAM as required by number of tags. Hard disks as required for application size and history
length1.
Servers with Intel Xeon v6 or later with at least 2.3. At least 8 GB RAM. Hard disks as required
for application size and history length1.
Servers should be a Xeon Silver or Gold processor with at least 2.3 Ghz and 16 GB RAM. Hard
disks as required for application size1. In case of integrated history more hard disks are re-
quired. Refer to section Volume estimation of hard disks for History Server. But typically, such
a server needs 1 system disk and 2 separate physical (not just partitions) hard disks for his-
torical data storage. In case of RAID configuration disks are typically doubled.
Servers or workstations should be either a Xeon v6 processor with at least 2.4 Ghz or Xeon
Silver or Gold processors with at least 2.2 Ghz. For large Alarm/Event databases 16 GB RAM is
recommended. Hard disks as required for application size and history length 1.
For maximum performance systems should have separated disks for programs, separate
event history and separate real time values (3 separate hard disks, not only partitions).
1
See the section on Volume estimation of hard disks for History Server
If a high volume of clients (office and PowerExplorer clients) or a high demand of history
functions is expected, then the performance can be improved by:
Solid state disks usage: optimize on those with a high reliability and throughput (read/write).
In case a high number of alarms and events must be recorded (100k/day), it is recommended
that the event database is stored on SSD disks.
RAID usage:
RAID 1 (or RAID 10) can be applied by doubling the number of hard disks (so min. 6 disks for
high performance historian server or RAID 10 then 12 disks). RAID 5 must use a high number
of disks to be effective in terms of performance and reliability (at least >8 disks).
The maximum possible signal-recording rate relates to the sum of all changes of all tags per
second. Typically, a power plant unit with 20k tags and well-defined dead bands (0.1%-0.5%
dead band and 0.5-1 seconds scan rate) uses about 50-200 GB/year disk space.
Event history:
As a calculation basis, S+ Operations Historian consumes approximately 1.2 GB of storage
space for every 1 million events. A typical power station with 10,000 alarm & events/ day con-
sumes about 4.4 GB of disk space per year.
Servers should be a Xeon E3 v6 with 3.6 Ghz, or Xeon Silver or Gold processor with at least 2.3
Ghz and 8-16 GB RAM. Processor, hard disk and memory type must be determined by applica-
tion size.
Workstations should have at least 4 real cores, be either a Xeon processor v5 or later with at
least 3.5 GHz. At least 8 GB RAM. Hard disks size as required for application size.
For high performance clients optimizing display call-up times, use processors with high cycle
speed such as Intel Core Intel Xeon E3-1225 v5, 3.3 Ghz or Intel® Xeon® Gold 5122, 3.6GHz.
2 DATA SHEET
AC800M 12 Controllers
AC800M 12 Controllers
All facts below are as recommended, tested and rationalized during standard test proce-
dures. Exceeding requirements are sometime possible and shall be discussed with product
sales.
Architecture Recommended
and tested con-
figurations
Application 0 1 2
Server
Composite
Clusters 1 2 4
Hierarchical
Clusters 1 2 4
Hardware
Database
Alarm Handling
RT Calculations
S+ Calculations
Operator Inter-
face
Pocket Portal
Security
Harmony Pro-
cess Events
Summaries
OPC
OPC HDA
Server
SQL Transmit-
ter
Printing
Communication
Information
Management
Database
Alarm Com- Standard Format Win Tools (CF File), Excel (XLSX)
ments
Alarm Handling
Tones Types of Audible Tones Beep, Wave file (one shot or continu-
ous), Horn (via external activation).
Human Interface
Security
Process Events
Summaries
Online Hist.
SOE Sequence of Events Logging SQL DB, Standard Text File, Custom Ex-
cel Work-sheet
Ext. Interfaces
OPC OPC Interface OPC Server and OPC Client (DA 1.x, 2.0,
AE1.x, HDA 1.x)
Hardware
Host PC Custom
(Dell and HP suggested).
Communication
3 Virtualization
When planning to run S+ Operations in a virtual environment, the following sizing of servers
and network components that will provide the underlying foundation to run the application is
required.
– Redundancy architecture
– Network connectivity
– Equipment Lifecycle
– Equipment Maintenance
– Cybersecurity
This section provides information and guidelines for engineers designing a S+ Operations
system in a virtual environment. Due to the dynamic nature of virtualization, evolving tech-
niques for its deployment and the special requirements imposed by a Distributed Control
System that at its core has personnel and equipment safety embedded at the forefront, it is
highly recommended that ABB be engaged early on in any virtualization design.
The number of Symphony Plus servers is typically determined by the functionality required to
monitor and control the process. As such, typically the following servers are used:
– S+ Operations
– S+ Operations Historian
– S+ Calculations
– At times, these functions may be combined into a single server, such as:
The benefits are obviously a reduction in the number of physical machine components, at the ex-
pense of increasing its computing resources. Similarly, this also has an impact on the virtualization
architecture, which would run a reduced number of virtual machines, but each defined with an in-
creased set of resources.
When configuring and defining physical machines to run these functions, the capabilities and limita-
tions of the physical sub-systems in a server are taken into account. In a virtual environment, how-
ever, it is the performance of the virtual machine's resources which are used. To properly account
for such, it is advisable to list all the Symphony Plus servers and note their functionality. This will
account for the resources required by each of the Operating Systems, plus the resources required
by each of the Symphony Plus servers for their intended function.
Actions:
– Count number of Symphony Plus Servers
– From the appropriate Symphony Plus manual determine what resources are needed if
they are to be satisfied by a physical machine.
This refers to determining the degree to which the plant will require resources of the Sym-
phony Plus system. Although determining system sizing is beyond the scope of this manual,
some examples are shown below:
S+ Operations Server:
– Number of tags
Calculation Engine:
– Number of calculations
– Scanner Servers:
Operations Workstations:
– Number of monitors
From this plant characterization, a given set of physical resource requirements will be deter-
mined. These requirements are to be added to the requirements for each of the nodes deter-
mined in step one.
From the appropriate Symphony Plus manual, determine what resources are needed, as if
they are to be satisfied by a physical machine.
Duplicating the system in a virtual architecture is akin to duplicating the number of physical
servers, should have the system been designed as a physical system in which all server func-
tions are carried out by individual physical machines. It must be noted that Symphony Plus is
not only a highly available system, but also a real-time redundant system in which a single
failure does not cause loss of data, even in the face of real-time operation.
This design requirement has been thoroughly tested within the redundancy mechanisms of
the Symphony Plus application, in a design that is either entirely physical, or which mimics
the physical deployment. In other words, real-time redundancy via mechanisms other than
those provided by Symphony Plus are not supported, such as vMotion, High Availability or any
other similar technologies.
This does not mean that vMotion, High Availability or other techniques cannot be applied to
further increase the resiliency and availability of the system. It means that these technolo-
gies are to be thought of for different reasons, such as increasing the system availability, eas-
ing maintenance, or other non-real-time requirements.
Based on Symphony Plus documentation, determine what resources are needed to imple-
ment the desired redundancy. Some redundancy schemes are N+1, N+2, etc.
At other times, other ancillary functions may also be desired, such as Out-Of-Band manage-
ment or Disaster Recovery. These requirements all add to the architecture of a virtual envi-
ronment, just like it does in a physical environment. However, because of the possibility of
aggregation, it is important to define what type of network design will be implemented in
the virtual environment, and tally the traffic expected on each interface. This traffic is also
the result of the plant's characterization, discussed in the previous section.
To properly design the system, it is to be noted that some traffic which in a physical environ-
ment necessarily leaves and enters a network interface, may, in a virtual environment remain
within the host. This improves performance of the system, for some operations. But for
some operations, it places more requirements on the physical network interface, because of
the aggregated traffic. Thus, a tally of what traffic comes into and out of the network inter-
faces is required:
From the appropriate Symphony Plus manual, determine network requirements and tally:
This will determine if a single network interface is required, or whether multiple interfaces
need to be aggregated, or even if ports of high speed are needed, such as 10 Gbps, or 40
Gbps, etc.
Finally, although almost all network switches have the required fabric speeds required for
systems of the type typically deployed in a DCS, it is important to make sure the bandwidth
calculated within this section matches up with the specifications of the network switch.
In a virtual environment, there are several ways to deal with this need. One is to replace com-
ponents with more up-to-date specifications. This method, however, may require that the
virtual system be taken offline. To avoid such, another avenue is available: to have additional
resources added to the system. This is possible because in a virtual environment, the modifi-
cation of the host does not mean that any of the virtual machines is modified. In this case,
they are simply given more resources. It is the underlying hypervisor's function and ability to
treat its resources as components that can easily be added.
However, resources cannot be added to a host, unless the host is prepared to receive them.
Thus, the virtual machine host must be sized properly for the desired lifecycle.
Identify long term plant requirements and determine what additional features will be re-
quired throughout the life expectancy of the system. Then determine storage, network and
memory requirements as per the sections above
Tally these requirements and add them as required resources that the Virtual Machine host
will be required to support in the future.
– Processors
– Memory
– Storage
In this case, one must account for the required storage to relocate the virtual machines.
From each application's specifications, determine the amount of storage required and tally
it. These requirements include:
3.6 Cybersecurity
In particular, this section refers to Disaster Recovery. ABB's standard Disaster Recovery appli-
cation is Rapid Recovery, which creates on-line periodic backups of all nodes. This recurrent
and permanent on-line backup method relies on a reliable and agile network, which is best
served by a separate network infrastructure specifically for Disaster Recovery. Determining
the amount of data to be backed up is very complex because Disaster Recovery software pro-
vides two algorithms to reduce the amount of data being stored in their backup repositories:
Compression
Performs compression on the data being stored, by removing most redundant data and in-
stead adding error correction and data protection.
De-duplication:
Avoids having to store multiple copies of the same data from different nodes on the system.
Because of these two mechanisms, computing the amount of data to be stored is extremely
complex. At times, compression and de-duplication can achieve compression ratios close to
90% and so it is best to follow the recommendations for storage of the Disaster Recovery ap-
plication separately.
However, the main requirement for Disaster Recovery is to have a resilient and agile network,
with plenty of bandwidth to quickly supply data to the Disaster Recovery backup server. It is
this requirement which (for optimal operation) mandates the use of a separate network with
enough bandwidth to transfer data quickly. It is best to have at least a 1 Gbps network di-
rectly from the virtual machine hosts to the Disaster Recovery server.
From the previous section, determine the approximate amount of storage required and ag-
gregate it.
Affect the total storage requirement by a factor of 50%. This conservative figure is the
amount of data that will be stored in the Disaster Recovery server repository.
However, only a fraction of this data will be sent over to the Disaster Recovery server. That
is because the Disaster Recovery agent only sends the data that has changed and not every
disk sector or bit. It is this value which will determine network bandwidth requirement.
A possible architecture then is to design and apply resources based on the requirements laid
out for a physical infrastructure.
The hardware resources (shown within the orange box) are identified and managed by the
Hypervisor. The configuration of each Virtual Machine (shown as vertical stacks of resources)
mimics what would be an otherwise physical system, with actual disk resources defined
within the software as individual RAID containers, each assigned to a given virtual machine.
– The same principles and calculations applied to select hardware for physical machines can
be used to design the virtual machines,
– Simple to configure the virtual host, because its specifications are the sum of the specifi-
cations of each individual physical server or workstation,
– Provides ample resources for sudden, unexpected, random and hard to determine work-
loads,
– Because no specialized hardware is used, the system is very cost effective and compact in
size, especially for small virtual deployments,
– All resources are contained in the same host, making it simple to deploy.
– Hypervisor efficiencies, are not considered and as a result, the system becomes over-de-
signed,
– The hosting server’s physical limits become a limiting factor in system growth,
– The hosting server’s physical limitations also impose an upper limit on the size of the vir-
tual infrastructure,
– The advantages of more specialized disk technologies, with higher efficiencies, reliability
and resiliency cannot be realized.
In this approach, the virtual machine host is considered as a pool of resources, which will be
made available to each of the virtual machines. These resources are then consumed as the
virtual machines run, and as each virtual machine workload varies over time. Furthermore,
this architecture does not need to follow any design technique, which in an individual physi-
cal server would be considered.
Pooling resources requires then having information on the capabilities, not of each compo-
nent that makes up a sub-system, but rather of the sub-system. This approach has the merit
of using each sub-system’s state of the art performance and capabilities to the fullest.
It also allows taking full advantage of the highly specialized capabilities of the hypervisor op-
erating system, such as overprovisioning of the system, as will be described later.
– CPUs: Processing power is pooled on the host and assigned to each virtual machine on an
as-needed basis. This sub-system is highly linear in nature and requires simply adding up
all available cores to determine available capability. As cores are utilized, they are sub-
tracted from the pool.
– Memory: Amount of DRAM and bandwidth is pooled on the host and, similarly to what
happens with the CPUs, it is assigned to each virtual machine as needed. This is a linear
resource which means that total memory on the host determines maximum capability of
the system, and as it is consumed it is subtracted from the pool.
– Disks: This sub-system is significantly more complex than CPU and RAM. There are two
main specifications that must be considered: performance and storage.
• Performance: This resource determines the capability of the virtual machine to per-
form. It is the main factor that determines what workload each application can sus-
tain.
Disk performance is specified by IOPS and Mbps figures, with each of these figures being ad-
ditive to determine maximum system capabilities.
As IOPS and Mbps resources are utilized, they are subtracted from the pool.
The difficulty with this resource is not how much is available (because that is calculated by
simple addition), but how much of it is used, how it varies over time and how much is re-
quired to be in reserved for peak conditions.
• Storage: This resource determines amount of data that can be held and number of ap-
plications that can be installed on the virtual machines. It does not determine how well
the system operates.
Total storage capacity is simply the sum of all available disks and becomes the pools
total available resource. As storage is consumed by applications storing data or appli-
cations being installed, capacity is subtracted from the pool.
The disk sub-system now, can be design in such a manner as to not require any specific type
of configuration, so long as it provides the level of performance needed by the applications.
The following techniques can be used to design the disk sub-system (list is not exclusive nor
exhaustive):
– iSCSI
– Fiber Channel
It is important to note that in all cases, virtual machines are neither aware nor require to be
constrained by a design. All that is required is that the performance and storage require-
ments be satisfied by the disk sub-system.
– Network: Because of the nature of Ethernet this is one resource that is not additive. Hav-
ing additional Network Interface Cards (NICs) does not provide additive receive or trans-
mit bandwidth. But neither is the need for this resource additive either.
Because in the virtual host all virtual machines are (or can be) “connected” via the hypervi-
sor’s virtual switch, what in a physical environment is traffic into and out of the server, be-
comes data exchanged internal in the virtual machine host – data which never leaves the
boundaries of the hosting server. The more virtual machines running in the virtual machine
host, the less traffic must traverse the physical NIC.
This does not mean there isn’t traffic into or out of the virtual machine host. Such traffic is
(or may be) traffic to thin clients, operator workstations, redundant servers or any other ma-
chine which consumes or provides data to virtual machines running in the host. It is this traf-
fic which must be accounted for when considering how much will traverse the NIC.
Latency of the network can be minimized by increasing the number of NICs, by providing mul-
tiple paths for different virtual machines to have greater access to network resources outside
of the physical host. Other network techniques such as Link Aggregation can also be used,
which will provide greater resources to the pool.
The dynamic and random nature of the utilization of Ethernet network resources means
these resources are not linear. However, techniques similar to those used for physical net-
work systems can be used to determine required network resources available to the host
pool, to be made available to virtual machines within the host.
– Power Supplies: Power supply capacity and power consumption of the system is linear,
which means the resource is additive and the consumption of each virtual machine can
simply be subtracted from the pool. However, predicting the exact power consumption of
the system is extremely complex.
Because this is not a sub-system than can be easily modeled, it is best to consult with the
manufacturer of the physical host, to determine power supply requirements.
– The virtual machine host architecture can be designed independently of the architecture
of each virtual machine, without regard for the requirements of early physical systems,
– Because of this independence, each virtual machine host sub-system can take full ad-
vantage of state of the art techniques for making resources available to the virtual ma-
chines,
– Without the constraints of a design philosophy, hypervisor efficiencies are fully realized,
such as the overprovisioning of any resource within its pool. This is especially useful for
improved memory, CPU and disk resource utilization,
– Designing the virtual machine host becomes more complex. This also translates to an in-
creased learning curve for maintenance,
– Care must be exercised to no overprovision the system to the point where it is not capable
of addressing sudden, increased peak workloads,
– Over the life of the system, operating and maintenance expenses are significantly lower,
but, in the short term, capital expenses may be higher.
The above architecture shows a couple of servers where all resources are local to the server.
However, a different architecture is also possible, where the disk resources are located out-
side of the servers, as a shared sub-system.
The above architecture shows the conceptual layout of a virtual system utilizing off-server
shared storage. The shared storage may be designed as a completely independent sub-sys-
tem, with state of the art techniques.
– Any type of RAID array, designed to meet the requirements of the application and its
workload,
– Any type of off-server storage connection, be it iSCSI, Fiber Channel or Network Attached
Storage (NAS),
– Shared storage built into converged infrastructure servers, or standalone chassis specifi-
cally for hosting disks and disk controllers.
Although many different virtualization techniques can be used, care must be exercised to re-
tain the real-time capabilities of Symphony Plus without compromised. For this reason, it is
recommended that ABB be engaged early in the development, design and implementation of
any virtualization architecture.
4.1 Improvements
Following improvements are done compared to previous release.
• Usability improvements
– X-Y plot capability is introduced, there are three patterns supported by X-Y plot
function:
o Single Points, display shows on point
o Multi Points, displays historical data and up to present data by points
o Continuous curves, displays historical data and up to present data by a line
– Capability to calculate moving average of input analog signals (only for Harmony
Connectivity) on real time values
– Digital Signal Trend: Digital value style display which consist of Tag number, de-
scription, process value and engineering unit in tabular format. Frame sizes and
font sizes are stretched according to window size and number of signals.
– Improvements in Event list of Pocket Portal
– Print Preview tool improvements
– Alarm List improvements
– Favorites improvements
– Real time summary improvements
– Trend improvements
– Pop up menu display improvements
– Possibility to configure background color of alarm list, favorites, Real time sum-
mary, trend display, trend summary, Enhanced maintenance tag UI, Pop Up menu,
Window Manager, Operating Parameter, Relational information and Digital Signal
Trend. It is also possible to define theme and apply.
– Remote Operations improvements
– Possibility to define redundancy at Group level for S+ Calculations.
Operator action
from a faceplate
20180417- Operator action from a faceplate causes duplicate en-
causes duplicate
497782 tries in the event list
entries in the
event list
Harmony faceplate
are not usable if Harmony faceplate are not usable if trace verbose is en-
187768
Trace verbose is abled for enabled
enabled
PRCBTN com-
mands from Con-
Solution:
nectivity server
(where event im- MsgCollector writes only tracking events to the Even-
189929
porter is not run- tImporter file if the following system setting under
ning) are not rec- APPS\HistInterface is set to YES.
orded into
WriteTrackingEventsOnly (REG_SZ)
Historian
DataExpt does not Data Export faceplate does not report inserted string
137961
report saved string that Is also stored in an atom.
Workaround:
Power Explorer:
Stops responding In display header configuration, ensure FWD and BCK is
for a while if user not set to NULLPAGE and is set to empty in case of
185040 proper display is not set.
uses “Left arrow”
or “Right arrow”
keys
Workplace launch
Workplace launch with two monitors configured takes
196372 with two monitors
more than 5 minutes
takes time
Solution:
Values Inserted in
a Tag does not Values Inserted in a Tag does not propagate to Non-
191558
propagate to Non- Source Mask Node of Multi Server System
Source Mask Node
RCM faceplate
177547 doesn’t show over- RCM faceplate doesn’t show override indication
ride indication
Specifications
tuned using Block
details\Tune Block
application of S+
177021 Operations are not
aligned with S+
Engineering Oper-
ations Engineering
database
Online DB men-
tioned below are
not aligned with
S+ Engineering
Operations Engi-
neering database
USB
User Fa-
161945 vorite
Operator
Note
Trend
Group
Custom
DB
DB Snap-
shot
5 INSTALLATION
5.1 Installation
Follow the detailed instructions mentioned in installation guide
5.2 Upgrading
Follow the detailed instructions mentioned in installation guide
www.abb.com/powergeneration