A   B   C   D   E   F   G   H   I   K   L   M   P   Q   R   S   T   U   V  

storage-ring

Paper Title Other Keywords Page
MOY03 Surveying Software Technology for Accelerator Control Systems controls, survey, electron, linac 16
 
  • T. Friedrich, M. Törngren
    KTH/MD, Stockholm
  Virtually all accelerator based research facilities nowadays use a mixture of software libraries, tools, protocols and development techniques to address the facilities’ various control system requirements efficiently. Many of these technologies are open-source and shared between laboratories to various extents. Motivated by the planning of MAX-lab’s new light source project, the MAX IV facility, we have conducted a state-of-the-art survey of these technologies, which will serve as a knowledge base for upcoming design decisions. This paper provides a summary of the topics and conclusions of our survey. In this scope the survey compares software technologies with respect to user features (scientific analysis and operation requirements), quality requirements (integration, performance, services, reliability, security, safety), and other issues. Control system design goals are beneficial long-term effects on feature opportunities, software development and maintenance costs.  
slides icon Slides  
 
MOW04 The Database of the VEPP-4 Accelerating Facility Parameters controls, collider, power-supply, diagnostics 40
 
  • S. E. Karnaev, E. A. Simonov
    BINP SB RAS, Novosibirsk
  • E. V. Goman, O. A. Plotnikova
    BINP, Novosibirsk
  The new PostgreSQL database is developed for systematization and unification of the data archiving and observation at the VEPP-4 facility. About three thousands parameters are set and checked for the VEPP-4 control. The current values are read from the control and measuring electronics and stored into the many files with different time of storing. The storing intervals vary from one second for the pulse systems to several minutes for the slowly changing parameters. Parameters are transfer to the database as soon as they are renewed in the source files. Twelve independent processes running under Linux provide the permanent data transfer from the files with current values to the database. The graphical interface is developed for user’s access to the database. It provides observation of the stored data in graphical or textual form and monitoring of the current parameter values. The interface allows us to observe any collection of parameters in a single or in different windows for any period of time.

* 4th International Workshop on Personal Computers and Particle Accelerator Controls (PCaPAC'02), 14-17 October 2002, Frascati(RM), Italy

 
slides icon Slides  
 
TUX02 Experiences with PVSS II as an Overall SCADA System for ANKA controls, radiation, synchrotron, diagnostics 46
 
  • W. Mexner, K. Cerff, M. Hagelstein, T. Spangenberg
    FZK, Karlsruhe
  The control system of the synchrotron radiation source ANKA at Forschungszentrum Karlsruhe was segmented into several autonomous parts. The storage ring have been controlled by the ACS control system, the infrastructure facilities by the supervisory control and data acquisition system (SCADA) named IGSS, and several autonomous PLC based interlock systems for the accelerators and beam lines. Each system required special knowledge for maintenance and failure diagnostics. In order to improve the manageability and to reduce cost, the SCADA system PVSS II has been chosen as a supervisory control system, integrating each of the individual parts. As the interface is open and easy to handle the integration was straightforward. The majority of the existing control systems have been integrated with limited man power during a one year period followed by a continuous optimization process. The new system with a common look and feel for beam lines and machine was quickly accepted by beam line scientists, technicians and operators.  
slides icon Slides  
 
TUX03 Evolution and Status of the e-Logbooks at the ESRF controls, power-supply, synchrotron, radio-frequency 49
 
  • L. Hardy, J. M.C. Chaize, O. Goudard
    ESRF, Grenoble
  • S. D. Cross, D. R. Fraser, N. V. Hurley
    St James Software, Cape Town
  In 2004 the ESRF moved to electronic logbooks. Such logbooks should be configurable enough to be used in several situations: document management, exchange of technical information and, in the Control Room, as a powerful tool for storing and retrieving information at a glance. The St James software company developed such a product which met our constraints and which is easy to configure. Moreover, this product can be tailored and evolved with time by its users and allows automatic access to control system parameters. After gaining experience with several logbooks using the old version 4 system, a new more user-friendly version which offers extensive customisation possibilities has been launched. This new version, J5, has already been interfaced to the ESRF control system (Tango) through a Python binding. This allows automatic triggering of records on specific events and the generation of automatic reports from the history database system. J5 can use an LDAP server for security management.  
slides icon Slides  
 
TUY02 Embedded Device Control controls, feedback, power-supply, booster 58
 
  • L. R. Dalesio
    BNL, Upton, New York
  The embedded device controller network is seen as an open-source, two tier framework that allows device controllers to control distributed devices at a 5 kHz rate. This network provides timing and data transmission to support a network of 200 input devices to be read into 30 cell controllers, resolve 200x200 control matrices, send the new outputs to the controllers and settle in 200 usecs. It also supports identification of system conditions at a resolution of 2 usecs and a reaction to system conditions in under 20 μs. This paper discusses the plan for development, characterization, and deployment.  
slides icon Slides  
 
WEZ02 The Canadian Light Source Control System - A Case Study in the Use of Single Board Computers and Industrial PC Equipment for Synchrotron Control controls, synchrotron, electron, booster 157
 
  • E. Matias, D. Beauregard, R. Berg, D. Chabot, T. Wilson, G. Wright
    CLS, Saskatoon, Saskatchewan
  Since 2000 the Canadian Light Source (CLS) control system architecture has been based on to the use of small single board computers for equipment control running the RTEMS operating system. CLS has started to migrate to a new off-the-shelf single board computer platform (based on the Moxa embedded computer platform. In 2001 CLS also adopted the use of fibre optic bridges and industrial PC equipment in place of VME slot zero controllers. Today this continues to be the basis of our higher performance data acquisition and control applications. This paper outlines the lessons learned from nearly eight years of operational use of the this technology.  
slides icon Slides  
 
THX03 TCP/IP Vulnerabilities of Embedded-System Implementations controls, monitoring, synchrotron, linac 224
 
  • T. Sugimoto, M. Ishii, T. Masuda, T. Ohata, T. Sakamoto, R. T. Tanaka
    JASRI/SPring-8, Hyogo-ken
  TCP/IP is established as a de facto standard network-communication protocol. Development of the TCP/IP enables us to build a large-scale distributed control system. Recent accelerator-control system consists of many TCP/IP devices; not only computers, but also embedded devices such as digital multimeters, oscilloscopes, multi-channel analyzers, and so on. Since these embedded devices are designed with limited hardware resources, most devices use subset of the TCP/IP components. The limited resources and components therefore cause many problems such as vulnerabilities of TCP/IP implementations. In SPring–8, by increasing the number of network-connected instruments with latent vulnerabilities, more trouble have arisen such as packet flooding and unexpected response delaying. One of the most serious trouble is hang-up of pulse-motor controllers* based on embedded operating system. To determine cause of the trouble, network-connected instruments were inspected using basic TCP/IP tools and security scanners. As a result, we successfully found vulnerabilities of embedded implementation. In this presentation, the cause of vulnerabilities in embedded systems will be discussed.

* T. Masuda et. al., Proceedings of PCaPAC2005, WEP30 (2005)

 
slides icon Slides