Training in
PI System Administration
Objectives
El propósito de esta capacitación es proporcionar un conocimiento práctico de las tareas necesarias para mantener un PI System y satisfacer las necesidades técnicas de sus usuarios. Esta formación abarca las herramientas de utilidad proporcionadas con el PI System, así como la configuración de etiquetas y del sistema. También cubre tareas comunes de administración, el flujo de datos dentro del PI System y los procedimientos básicos de solución de problemas.
The following services are performed.
- Pre-service checklist review.
- PI System Administration Course, interactive and remote.
- Provisioning of a pre-configured virtual learning environment hosted in Microsoft Azure to be used by students during the course.
- Preparation of documentation for the course, with a maximum of 12 students per class.
- The training material will be updated to the latest version of the Administration tools. If you need to conduct the class using an older version of the software, this should be specified when ordering the service, so that the appropriate documentation can be prepared.
- Training certificates for each student.
Course Content
The class will begin with the basics of PI System, where the question “What is PI System?” will be asked and answered.
Participants will then explore how data flows in the PI System and discover how data flows from the data source to the end user. They will also learn how to connect to a PI System.
Participants will go on to A great deal of time and attention is given to Asset Framework and Data Archive security and monitoring of your PI system. Explore the common configuration of PI interfaces, creating and managing PI Points, and the configuration of the PI Buffer Subsystem. All of this is designed to provide the system administrator with a good working knowledge of data collection mechanisms, with a special focus on future troubleshooting.
A great deal of time and attention is given to Asset Framework and Data Archive security and monitoring of your PI system.
Note: The instructor can change the content of the class to fit the requirements of the students. This means that they will spend more time on topics that are important to them and less time on topics that are less relevant to their situation.
Topics
1. PI System Basics: Components
- 1.1. Understanding important IT concepts
- 1.2. What is a PI system?
- 1.3. Architecture of a PI System
- 1.4. Basic elements of a PI System
- 1.5. What is a PI point?
- 1.6. Use of tag search
- 1.7. Collecting data
- 1.8. PI time
- 1.9. Basic examination of the PI system
2. PI interface management
2.1. How does PI System connect to the data sources?
2.2. PI interfaces
2.3. PI connectors
2.4. PI adapters
2.5. Custom applications
2.6. Exercise: choose a PI interface
2.7. Common PI interfaces
2.8. Define the components of a PI interface
2.9. Define the PI interface configuration utility
2.10. Guided activity: manage an existing PI interface with PI ICU
2.11. PI interface installation methodology
2.12. Group questions: IP interface architecture
2.13. Installing and configuring a PI interface for OPC DA
2.14. Configuration of a reliable PI interface
2.15. Group questions: data loss prevention
2.16. PI buffer subsystem definition
3. Data archivement management
- 3.1. Define the role of the Data Archive
- 3.2. Describe the subsystems of the data archive
- 3.3. Data flow through the data archive
- 3.4. Understanding exception and compression
- 3.5. Data Archive Files
4. Asset Framework Management
- 4.1. Introduction to Asset Framework (AF)
- 4.2. Define the role of the Asset Framework
- 4.3. Defining assets and attributes
- 4.4. Pi System Explorer
- 4.5. Targeted activity: organizing your PI Points into AF assets
- 4.6. Individual exercise: creating assets from templates with PI Builder
- 4.7. Guided activity: leverage your asset model in PI Vision
- 4.8. Components of an asset framework
- 4.9. Data flow when using the asset framework
- 4.10. AF architecture
- 4.11. Managing Asset Framework backups
5. PI System security management
- 5.1. Protection of a PI System
- 5.2. Describe the ports used for PI System communication
- 5.3. Authentication versus authorization
- 5.4. Data archive security
- 5.5. Asset framework security
6. Introduction to PI connectors
- 6.1. Defining the function of a PI connector
- Differences between PI interfaces and PI Connectors
- 6.3. Guided activity: explore the available PI Connectors
- PI Connector installation methodology
7. Monitoring of a PI system
- 7.1. Monitoring tools
- 7.2. Group questions: What do I need to monitor?
- 7.3. Outdated and bad points
8. Troubleshooting a PI System
- 8.1. Message logs
- 8.2. Group Exercise: Troubleshooting a PI System
9. Final Exam
- 9.1. Pi Management Review
- 9.2. Individual exercise: creation of a PI system
Course Customization
A customized training agenda can be provided upon request to meet the specific training needs of your organization. For more information, please contact PIPER Solutions sales.
Why apply for PI System Management Training from PIPER Solutions.
Our staff works closely with OSIsoft’s development, training and technical support teams to provide unique expertise and knowledge of OSIsoft products. In addition, our professionals receive ongoing training on all PI System tools.
Timeline
PIPER Solutions requires a minimum of 2 weeks notice to prepare course documentation, prepare Azure virtual machines and assign an instructor. PIPER Solutions will ship or deliver training materials on or before the first day of the course.
A typical timeline from service order to completion is:
At least two weeks prior to training:
Communication of prerequisites and dates of remote sessions with PIPER.
One week prior to training –
Preparation of Azure virtual machines.
Training Week –
Remote Training (3 days). We suggest having the class from Tuesday to Thursday.
Requirements
The client is responsible for providing a fully equipped classroom. The minimum requirements for a classroom are:
- One PC per person, with the minimum technical specifications of a 5th generation I3 Processor or higher, 4 GB RAM, 15 GB free hard disk space, TCP/IP networking, and Windows® 7 – Windows 10.
- If using Azure, students must be able to connect to virtual machines via remote desktop connection (required firewall ports must be open).
- If Azure cannot be used, there are a number of on-site software requirements that must be met. Your instructor will discuss these requirements with you and can also assist with Azure connectivity testing.
- The participant group should consist of individuals with the following skill set:
- Experience navigating a Microsoft Windows operating system.
- Some experience working with Microsoft Excel .
- Basic knowledge of PI System is recommended, but not required.
PIPER Solutions es un socio estratégico de AVEVA
AVEVA PI System™ Infrastructure Accreditation
The AVEVA PI System™ Infrastructure Accreditation recognizes partners that have a solid understanding of both the current business messaging around the AVEVA PI System infrastructure as well as a strong baseline technical knowledge of the full suite of AVEVA PI System™ products. Partners must have experience working on projects where the AVEVA PI System™ was used as part of the solution and must be able to describe the business impact of the implemented solution.
AVEVA PI System Installation Accreditation
The AVEVA PI System Installation Accreditation recognizes partners that have extensive experience installing and implementing AVEVA PI Systems in customer environments. Partners must have extensive knowledge of installation preparation, security guidelines, and configuration best practices for implementing a full AVEVA PI System.