Alarm State Machine Analysis and Framework Design

Source: Internet
Author: User
Document directory
  • 1. Concepts
  • 2. Model Creation
  • 1. Analysis of alarm features
  • 2 main purpose
  • 1. Main Functions of the alarm module Manager
  • 2. alarm module
1. Model Establishment 1. Concept 2. Model Establishment

The most common and simplest state machine of motion control should be the alarm state machine. The alarm state machine model is as follows:

 

Chart 1 alarm state machine status transition chart

Is a simplified model of the system alarm status, divided into two states:

N

:
In this status, the system is in the normal status and no alarm is reported.

W:

The system is in the alarm status.

There are two input symbols:

True:
Alarm trigger signal, indicating a fault in the system

False:
When the signal is sent, it indicates that the system is normal and can run without an alarm.

The status conversion table is as follows:

Chart 2 alarm state machine conversion table

The action trigger table is as follows:

 

Chart 3 alarm state machine action trigger table

Second Model Analysis 1 alarm Feature Analysis

Among the motion control devices, there may be several or dozens or even hundreds of Alarm types, which may also come from the upper or lower position. For alarm processing, most of the processing methods are the same, that is, once an alarm is triggered, the device stops and notifies the user. Generally, you also need to create logs for this process. All the processes are not difficult and easy to implement for program implementation. It seems that building a model is a bit redundant. Actually, it is not because:

1) alarms are classified

According to the Severity Score: There are warning alarms, which do not affect user operations and equipment operation, but may indicate that a certain type of fault may occur or play a suggestive role; there is a fault alarm, this type of alarm often causes the device to stop.

According to the alarm Source: there is a data alarm or software alarm; there is a peripheral device alarm.

2) different alarm handling methods are specifically targeted.

The alarm methods in the system are different. Some only inform the alarm, and then do not do any processing, such as some screen alarms. Some cannot perform certain functions of the device, but other functions can be executed, such as manual operations. However, some require that the device be locked. Unless the alarm is cleared, no operation is allowed, such as an emergency stop alarm. Some alarms are only displayed on the terminal and recorded on the terminal. Some alarms need to be reported to the server. The server can detect the status of the device through the alarm, so that the server can make some reasonable response and processing to the device.

2 main purpose

The state machine model is used to analyze the alarm process, mainly to abstract the process. Abstract encapsulation of each part of the Code, so that the same alarm program framework can be used even if the system is different, thus reducing the workload of repeated code development.

Three-Frame Design

From the figure above, we can see that the framework for designing such a requirement can be divided into two parts: the alarm module manager and the alarm module. The model module contains two types of actions: Signal Generator and action trigger.

1. Main Functions of the alarm module Manager

Manage each alarm module and some auxiliary modules, such as the Log System

2. alarm module

It mainly includes:

1) Alarm information

2) Signal Generator

Scans input signals, or generates input signals after logical processing or integrated Computing Based on various conditions

3) action trigger

The action trigger corresponds to the table corresponding to icon 3 and executes the corresponding alarm trigger action.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.