IntelliGrid Architecture

 

 

Home

Parent Menu

IntelliGrid Project
Power Functions
IntelliGrid Environments
IntelliGrid Vision
Security Overview
Technical Analysis
Technology List
Additional Information
Printable Deliverables

Same Level Menu

Overview of Functions
Market Operations
Transmission Operations
Distribution Operations
HV Generation
Distributed Resources
Customer Services
List of IT Use Cases
List of Functions

Child Menu

 

Search IntelliGrid Site

Questions/Comments

Questions

 

Responses

 

 

Information Technology Management Services

1. Data Management and Technology Planning

A. Management of Databases, includes functions such as

B. Data Design and Modeling, includes functions such as

C. Data Recovery. Includes development and use of automated and manual techniques for

D. Data Integrity. Includes development and use of data management techniques for

E. Management of Database Operations. Includes development and use of techniques for

F. Data mining and retrieval. Includes development and use of techniques for

G. Data object modeling. Includes

H. New Data and DBMS Technology Planning

2. Security Planning and Management

A. Security Requirements Assessment Methodology, including Techniques for determining the types and levels of security required by each asset, prevention techniques, vulnerability assessment, and interdependency analysis

B. Security policies and techniques for determining requirements and implementing physical security countermeasures

C. Security policies and techniques for determining requirements and implementing cyber security countermeasures

D. Intrusion detection, mitigation, and recovery plan and techniques

E. Investigation and prosecution of a security attack

F. New Security Technology Planning

3. End System/Application Support and Management

A. End system and application requirements development. Collect and analyze computation, storage, and management requirements.

B. End system technology and architecture/platform planning. Specify appropriate computing, and system management technologies and architectures for applications, middleware, operating systems, and hardware. The task includes establishment and use of IT standards for:

C. Installation, deployment and certification of systems and applications

D. System Integration

E. Real-time system and application monitoring and management for applications, middleware, operating systems, and hardware. This includes development and use of techniques for

F. End System/application maintenance (planned and emergency)

G. Customer care, help desk and user support

H. Business object management. This includes management of SW constructs associated with real world objects such as a circuit breaker or a purchase order. Tasks include:

I. Workflow management. This includes design and development of workflow management systems as well as execution of management functions: monitoring, diagnosis and reporting.

J. New Communications Technology Planning

4. Network Management

A. User/business network requirement (QoS, availability, bandwidth, response time) development.

B. Network technology and architecture/platform planning. It includes establishment and use of new technologies for:

C. Network design and configuration. The task is to specify the logical network design and configuration that meet the architecture specifications and forecasted network demand growth.

D. Installation, deployment and certification of networks

E. Real-time network monitoring and management. This includes establishment and use of IT techniques for

F. Network element management. This includes

G. Network engineering. This task includes

H. Customer care and user support

I. New Network Technology Planning

5. Telecommunications Network Infrastructure Management

A. User/business telecommunications and data networking requirement development

B. Telecommunications Network Infrastructure technology and architecture planning. This includes establishment and use of IT standards for

C. Telecommunications Network infrastructure installation, deployment and certification

D. Real-time monitoring and management techniques for

E. Telecommunications Network Infrastructure management. This task includes:

F. Telecommunications Network Infrastructure New Technology Planning

6. Business, Financial and User Services

A. End-User Services -

B. Business and Financial Services -

C. Horizontal Services -

7. Architecture, SW, HW design, coding, testing

A. Establishment of policies for using standard methodologies (RMODP, OMG) for architecture and system design, and development

B. Requirements development, writing of the specification

C. Support for development of Requests for Proposals from external vendors

D. Support for bid evaluations of vendor proposals

E. Project Implementation support for external system development

F. In-house system development and modification

G. Architecture design, SW design development, testing and integration

H. Development and/or purchase of SW/HW platforms

I. Determination, purchase, integration and maintenance of Operating systems, component SW, middleware, DBMS, and SW development tools

J. Management of development teams, project implementation and coordination

K. Interaction with consultants, vendors and service providers


The Federated Systems Management Services Domain addresses issues that can be applied to the Power System domain activities to support their information technology requirements. The word "techniques" implies not only automation but also methodologies and human procedures.


1. Data Management and Technology Planning

The purpose is to meet the required data quality (integrity, accuracy), flexibility, scalability and availability. This task includes management of many large databases, with data exchanges across organizational boundaries, requiring frequent and timely access and updates.


A. Management of Databases, includes functions such as

Capacity planning

Tablespace management

Permissions, access control and quotas


B. Data Design and Modeling, includes functions such as

Indexing

Development and use of object modeling techniques

Data modeling for typical data objects

Data modeling for non standard data such as geographical information system maps, images, video, and oscillographic data


C. Data Recovery. Includes development and use of automated and manual techniques for

Data replication

Management of alternate sources of data

Logging and archiving

Backup, offline storage

Disaster recovery


D. Data Integrity. Includes development and use of data management techniques for

Data synchronization across interfaced systems

Consistency checking, validation and data correction

Handling logs and auditing.

Data cleansing

Data anonymity

Data purging


E. Management of Database Operations. Includes development and use of techniques for

Data editing and updating policies and procedures

ETL Data management ETL (Extract / Translate / Load) operations.

Database population

Report generation and data collection forms

Handling data across organizational boundaries ( consistency, integrity)

Data transformation

Database mediation and integration

Development of forms and schedules for providing raw data by other departments (planners, engineering, maintenance, construction, etc.)

Discovery and automated interfacing with non-utility data objects, such as the methodology proposed by ebXML

Storage, retrieval and streaming of video and audio data

Two stage commit and rollback


F. Data mining and retrieval. Includes development and use of techniques for

On Line Transaction Processing (OLTP) which involves real-time processing and retrieval of data and may extend data bases across organizational boundaries.

On Line Analytical Processing (OLAP) which involves retrieval and processing and presentation of data from different points of view.

Sorting/selecting, and retrieving large amounts of historical data

Data warehouse, data mining

Adhoc querying

Knowledge management

Document management


G. Data object modeling. Includes

Developing object models

Instantiating object models

Mapping of instantiated object models

Data self-discovery

Object browsing capabilities

Automated data discovery

Developing data exchange models

Validating object models and instantiations


This appears to be specific to applications. Are these generic "federated" objects such as those that may be used for geospatial representations? Joe

-- Joe Hughes - 24 Apr 2003


H. New Data and DBMS Technology Planning

Investigation, planning, recommendation, implementation and support of new technologies in data modeling, data storage, data retrieval, and data management. Examples include the latest OLAP systems for more efficient data retrieval and presentation, or the storage area networks (SAN) for more efficient distributed data repository and management.


2. Security Planning and Management

The purpose is to meet the security requirements of the user community, network, data and applications. Includes policies, techniques, and management for:


Security policies should be prepared in concert with the applications. The applications can be used to help define whats at risk: threats and vulnerabilities, then security policies can be implemented in a way that is appropriate to the application.

-- Joe Hughes - 08 Apr 2003


I suggest that we follow guidelines coming from authoritative sources such as Common Criteria and FIPs guidelines to the extent possible. We face substantial challenges when it comes to Federating security policies and this will probably have to be done by enterprise application. Developing an overall generic approach to security that can then be appropriately developed by application is suggested.

-- Joe Hughes - 24 Apr 2003


A. Security Requirements Assessment Methodology, including Techniques for determining the types and levels of security required by each asset, prevention techniques, vulnerability assessment, and interdependency analysis

Systematically identify critical assets;

For each asset, conduct assessments on attractiveness to attackers, impact of successful attack, and vulnerability to attacks;

carry out critical consequence analyses; and evaluate the public health and safety, economic, and social impacts of infrastructure disruptions

Security Policy management

Development of Security policies

Establish policy for corrective action when vulnerability is discovered.

Assess the likelihood that the vulnerability was exploited

Establish procedures for reporting / communicating vulnerability to get repaired (may involve reporting exposure to regulators).

Establish policies for granting and revoking authority - and determine the duration required to fully implement change.

Security training of employees

Security monitoring of employees

Repercussions for employees for not following security policies

Assess and monitor information exposure to ensure compliance with security policies and procedures

Periodic re-assessment of security requirements


B. Security policies and techniques for determining requirements and implementing physical security countermeasures

Security policies addressing physical security

Access control and staff identification

Locks, guards, fences, guard dogs, lights, etc.

Biometrics, smart card, RFID

Electronic keys and locking devices

Fiber optic vibration sensor, motion sensor and others

Backup and alternative paths

Backup control center

Backup systems and bunker sites

Backup data at physically different sites

Alternative communication paths

Alternative communications media

Alternative communications interfaces

Alarm system (sensors and control panels)

Video surveillance and control system

Motion detection cameras

Video cameras

Digital video recording equipment

Matrix switching and control

Remote video transmission


C. Security policies and techniques for determining requirements and implementing cyber security countermeasures

Assessment of possible countermeasures for each type and level of security vulnerability

Assessment of most cost-effective techniques across groups of assets

Handling of legacy systems and applications in implementing security

Data authentication, integrity, confidentiality

Supervisory computer security and firewalls

Key management and certification

Secure communication architectures and protocols

Secure internet (SSL, IPsec)


D. Intrusion detection, mitigation, and recovery plan and techniques

Intrusion detection methodologies

Integrate and analyze data and information from different sensors, detectors, and other sources to make rapid determinations of the magnitude of an emergency, either physical or cyber and implement contingency plan to reduce the impacts of disruptions on the grid

Spare parts database management

Development and execution of methods for Distributed Denial of Service attacks (DDOS)

Recovery plans

Security management techniques to mitigate impacts during a security attack

Detection of intrusion

Detection of attack

Methods for countering attacks in progress

Methods for ameliorating impact of breach

Security managers respond and mitigate the physical and cyber disruptions

Security management techniques after a security attack

Assessment of damage

Assessment and correction of security vulnerabilities

Determination of legal and financial processes against attackers

Security techniques to collect and distribute threat information


E. Investigation and prosecution of a security attack

Logging, recording, and audit trails

Security issues for legal procedures


F. New Security Technology Planning

This includes investigation, planning, recommendation, implementation and support of the new security technologies such as distributed denial of service (DDOS) attacks.


3. End System/Application Support and Management

The purpose is to meet the availability, reliability, performance, scalability and economics required by the application and the end systems. Applications include domain, management, financial and business application functions such as data acquisition, control of field devices, RTP calculation, fault analysis, Load Tap Changer calculations in the IED, sensor analog-to-digital conversions, etc. An end system includes HW, Operating System, middleware, application SW, DBMS SW, libraries, components, etc. Examples of end systems are SCADA systems, EMS systems, building automation systems, Market Web servers, planning systems, substation automation systems, Intelligent Electronic Devices (IED), and sensors. Supporting infrastructure includes Middleware, Operating Systems, and Hardware


A. End system and application requirements development. Collect and analyze computation, storage, and management requirements.


B. End system technology and architecture/platform planning. Specify appropriate computing, and system management technologies and architectures for applications, middleware, operating systems, and hardware. The task includes establishment and use of IT standards for:

Inter-application interfacing and communications technologies such as message brokers and RPC oriented infrastructures.

System implementation, validation, and certification

Maintenance of systems

Monitoring systems and applications


C. Installation, deployment and certification of systems and applications


D. System Integration

Application integration (internal)

Integration with eCommerce interfaces (external)


E. Real-time system and application monitoring and management for applications, middleware, operating systems, and hardware. This includes development and use of techniques for

Monitoring the status of systems and applications,

Detection and recovery from failures and performance problems,

Disaster recovery and business continuity,

Logging and recording of status and problems.


F. End System/application maintenance (planned and emergency)

Testing and diagnosis

Technician scheduling and repair

Report generation


G. Customer care, help desk and user support


H. Business object management. This includes management of SW constructs associated with real world objects such as a circuit breaker or a purchase order. Tasks include:

Design and development of business objects and management systems

Monitoring and reporting of status of business objects.


I. Workflow management. This includes design and development of workflow management systems as well as execution of management functions: monitoring, diagnosis and reporting.


J. New Communications Technology Planning

This includes investigation, recommendation, implementation and support for the latest computing technologies such as intelligent agents, latest middleware and platforms.


4. Network Management

This is to meet the communications network accessibility, reliability, availability, resiliency, performance, manageability, and economics requirements of the domain functions. It includes management of routers, switches as well as routing and policy administration. The task includes


A. User/business network requirement (Qo S, availability, bandwidth, response time) development.


B. Network technology and architecture/platform planning. It includes establishment and use of new technologies for:

Network architecture,

Network management

Network signaling and control

Data/payload delivery mechanisms

Implementation, validation, and certification of networks


C. Network design and configuration. The task is to specify the logical network design and configuration that meet the architecture specifications and forecasted network demand growth.


D. Installation, deployment and certification of networks


E. Real-time network monitoring and management. This includes establishment and use of IT techniques for

Monitoring the status of networks

Responding to failures, performance problems, etc.

Logging and recording status and problems

Collecting and analyzing measurements for network reengineering and capacity planning


F. Network element management. This includes

Performance management

Fault management and recovery

Maintenance (planned and emergency),

Testing/diagnostic

Technician scheduling

Repair

Report generation and process management

Disaster recovery/business continuity


G. Network engineering. This task includes

Addressing and routing,

Policy management,

Configuration,

Traffic and Qo S Engineering


H. Customer care and user support


I. New Network Technology Planning

This includes investigation, recommendation, implementation and support of the latest networking technologies, such as multi-protocol label switching (MPLS) for routing, traffic engineering and Qo S, or WIFI for wireless data access, or resilient routing schemes.


5. Telecommunications Network Infrastructure Management

This task is to meet the requirements for the telecommunications network infrastructure including configuration, accessibility, reliability, availability, resiliency, performance, manageability, and economics required by the domain functions. Examples: management of the leased lines, fiber optic systems, microwave, use of cellular and wireless service providers, Internet and internet service provider, telecommunication service provider, data service provider, etc.


Please refresh.

-- Project.Guest - 10 May 2004


A. User/business telecommunications and data networking requirement development

Service Level Agreements development

Oversight of externally provided telecommunications and networking facilities


B. Telecommunications Network Infrastructure technology and architecture planning. This includes establishment and use of IT standards for

Communications technologies: SONET, Fiber, microwave, fixed and mobile wireless,

Qo S and resilient technologies,

Management technologies.


C. Telecommunications Network infrastructure installation, deployment and certification


D. Real-time monitoring and management techniques for

Monitoring the status of the telecommunications network infrastructure

Providing resiliency and recovering from failures, performance problems, etc.


E. Telecommunications Network Infrastructure management. This task includes:

Monitoring and measurement for capacity planning

Performance management

Fault management and recovery

Inventory/Asset and order management

Maintenance (planned and emergency)

Testing/diagnostic

Technician scheduling

Repair

Report generation and process management

Disaster recovery/business continuity


F. Telecommunications Network Infrastructure New Technology Planning

This is to investigate, recommend, implement and support latest communications technologies such as dense wavelength division multiplexing (DWDM), or use of more resilient protocols/equipment.


6. Business, Financial and User Services

These services are independent of domain activities and are provided to people and business functions. They impact network management, security management and data management functions.


A. End-User Services -

Account management : computer and network account, password,

Employee services: home office, remote access,...

Billing for computing use

Trouble shooting : IT helpdesk,

Management of interactive people-people communications: voice, multimedia (MM), video/audio conferencing, traditional and future telecomm services.

Web applications, employee portals

Tools/system maintenance and upgrades (for the operating system, common software: word processing), license management

Email management

Messaging Services (SMS, real-time messaging, audio/text messaging)

Call Center management and support

Planning, implementation and support for new technology, such as new web services, or voice over IP (Vo IP).


B. Business and Financial Services -

Financial analysis and trading

Forecasting

E-business, development and management of portals (b-to-e and e-to-e)

E-commerce

HR services (payroll and personnel)

Special interfaces for Fire/Police/FEMA (automated and manual, systems and procedures)

Backup control center architecture support

IT Asset Management

Customer billing

Non-Repudiation Services

Determine policies and procedures for verification of obligations (Independent third parties may be involved as a escrow service) - e.g. assured time stamps.

Determine exposure and assess ability to verify commitments.


C. Horizontal Services -

Time service

Directory service,

Life cycle service,

Clustering service,

Federation service,

Storage service,

Trading service


7. Architecture, SW, HW design, coding, testing

Need to manage project teams, coordinate requirements development, assist in management of system specification, request for proposals from external vendors, bid evaluation, internal system development and/or oversight of external system development, develop/enhance systems, communications platforms, services, management systems, etc. It includes:


A. Establishment of policies for using standard methodologies (RMODP, OMG) for architecture and system design, and development


B. Requirements development, writing of the specification


C. Support for development of Requests for Proposals from external vendors


D. Support for bid evaluations of vendor proposals


E. Project Implementation support for external system development


F. In-house system development and modification


G. Architecture design, SW design development, testing and integration


H. Development and/or purchase of SW/HW platforms


I. Determination, purchase, integration and maintenance of Operating systems, component SW, middleware, DBMS, and SW development tools


J. Management of development teams, project implementation and coordination


K. Interaction with consultants, vendors and service providers



 

 

IntelliGrid Architecture
Copyright EPRI 2004