Services | Aveva | Training

Training in
PI System Administration

Objectives

Objectives The purpose of this training is to provide a working knowledge of the tasks necessary to maintain a PI System and meet the technical needs of its users. This training covers the utility tools provided with the PI System, as well as tag and system configuration. It also covers common administration tasks, data flow in the PI System and basic troubleshooting procedures.

Objectives

The following services are performed.

  • Pre-service checklist review.
  • PI System Administration Course, interactive and remote.
  • Provisioning of a pre-configured virtual learning environment hosted in Microsoft Azure to be used by students during the course.
  • Preparation of documentation for the course, with a maximum of 12 students per class.
    • The training material will be updated to the latest version of the Administration tools. If you need to conduct the class using an older version of the software, this should be specified when ordering the service, so that the appropriate documentation can be prepared.
  • Training certificates for each student.

Course Content

The class will begin with the basics of PI System, where the question “What is PI System?” will be asked and answered.

Participants will then explore how data flows in the PI System and discover how data flows from the data source to the end user. They will also learn how to connect to a PI System.

Participants will go on to A great deal of time and attention is given to Asset Framework and Data Archive security and monitoring of your PI system. Explore the common configuration of PI interfaces, creating and managing PI Points, and the configuration of the PI Buffer Subsystem. All of this is designed to provide the system administrator with a good working knowledge of data collection mechanisms, with a special focus on future troubleshooting.

A great deal of time and attention is given to Asset Framework and Data Archive security and monitoring of your PI system.

Note: The instructor can change the content of the class to fit the requirements of the students. This means that they will spend more time on topics that are important to them and less time on topics that are less relevant to their situation.

Topics

  • 1.1. Understanding important IT concepts
  • 1.2. What is a PI system?
  • 1.3. Architecture of a PI System
  • 1.4. Basic elements of a PI System
  • 1.5. What is a PI point?
  • 1.6. Use of tag search
  • 1.7. Collecting data
  • 1.8. PI time
  • 1.9. Basic examination of the PI system

  • 2.1. How does PI System connect to the data sources?
  • 2.2. PI interfaces
  • 2.3. PI connectors
  • 2.4. PI adapters
  • 2.5. Custom applications
  • 2.6. Exercise: choose a PI interface
  • 2.7. Common PI interfaces
  • 2.8. Define the components of a PI interface
  • 2.9. Define the PI interface configuration utility
  • 2.10. Guided activity: manage an existing PI interface with PI ICU
  • 2.11. PI interface installation methodology
  • 2.12. Group questions: IP interface architecture
  • 2.13. Installing and configuring a PI interface for OPC DA
  • 2.14. Configuration of a reliable PI interface
  • 2.15. Group questions: data loss prevention
  • 2.16. PI buffer subsystem definition

  • 3.1. Define the role of the Data Archive
  • 3.2. Describe the subsystems of the data archive
  • 3.3. Data flow through the data archive
  • 3.4. Understanding exception and compression
  • 3.5. Data Archive Files

  • 4.1. Introduction to Asset Framework (AF)
  • 4.2. Define the role of the Asset Framework
  • 4.3. Defining assets and attributes
  • 4.4. Pi System Explorer
  • 4.5. Targeted activity: organizing your PI Points into AF assets
  • 4.6. Individual exercise: creating assets from templates with PI Builder
  • 4.7. Guided activity: leverage your asset model in PI Vision
  • 4.8. Components of an asset framework
  • 4.9. Data flow when using the asset framework
  • 4.10. AF architecture
  • 4.11. Managing Asset Framework backups

  • 5.1. Protection of a PI System
  • 5.2. Describe the ports used for PI System communication
  • 5.3. Authentication versus authorization
  • 5.4. Data archive security
  • 5.5. Asset framework security

  • 6.1. Defining the function of a PI connector
  • Differences between PI interfaces and PI Connectors
  • 6.3. Guided activity: explore the available PI Connectors
  • PI Connector installation methodology

  • 7.1. Monitoring tools
  • 7.2. Group questions: What do I need to monitor?
  • 7.3. Outdated and bad points

  • 8.1. Message logs
  • 8.2. Group Exercise: Troubleshooting a PI System

  • 9.1. Pi Management Review
  • 9.2. Individual exercise: creation of a PI system

Course Customization

A customized training agenda can be provided upon request to meet the specific training needs of your organization. For more information, please contact PIPER Solutions sales.

Why apply for PI System Management Training from PIPER Solutions.

Our staff works closely with OSIsoft's development, training and technical support teams to provide unique expertise and knowledge of OSIsoft products. In addition, our professionals receive ongoing training on all PI System tools.

Timeline

PIPER Solutions requires a minimum of 2 weeks notice to prepare course documentation, prepare Azure virtual machines and assign an instructor. PIPER Solutions will ship or deliver training materials on or before the first day of the course.

A typical timeline from service order to completion is:

At least two weeks prior to training: communication of prerequisites and dates of remote sessions with PIPER.

One week prior to training - Preparation of Azure virtual machines.

Training Week - Remote Training (3 days). We suggest having the class from Tuesday to Thursday.

Each session lasts 8 hours.

Requirements

The client is responsible for providing a fully equipped classroom. The minimum requirements for a classroom are:

  • One PC per person, with the minimum technical specifications of a 5th generation I3 Processor or higher, 4 GB RAM, 15 GB free hard disk space, TCP/IP networking, and Windows® 7 - Windows 10.
  • If using Azure, students must be able to connect to virtual machines via remote desktop connection (required firewall ports must be open).
  • If Azure cannot be used, there are a number of on-site software requirements that must be met. Your instructor will discuss these requirements with you and can also assist with Azure connectivity testing.
  • The participant group should consist of individuals with the following skill set:
    • Experience navigating a Microsoft Windows operating system.
    • Some experience working with Microsoft Excel
    • .
    • Basic knowledge of PI System is recommended, but not required.

Suggested Services

.

The following training or equivalent experience is recommended before applying for this training course:

Training in PI System Visualization Tools.

Learn more
Sitemap

Perú Headquarters

Jr. Camilo Blass 299, 6001
Call: +51 976 222 093
contacto@pipersolutions.com

Privacy & Terms

Política de privacidad de datos