Menu
Is free
check in
the main  /  Navigators / Man machine interface ACS TP lecture. Brief description of the interfaces of the ACS TP

Man machine interface ACS TP lecture. Brief description of the interfaces of the ACS TP

Introduction

Modern methods of designing ACS users have developed in the framework of the systemotechnical design concept, due to the accounting of the human factor restricted to solving the problems of coordination
"Entrances" and "outputs" of man and car. At the same time, when analyzing dissatisfaction with ASU users, it is possible to identify that it is often explained by the lack of a single, comprehensive approach to the design of interaction systems.

The use of a systemic approach allows to take into account the many factors of the most different nature, to allocate those that have the greatest impact from the point of view of the existing system-wide objectives and criteria, and find ways and methods of effective impact on them.
The systemic approach is based on the use of a number of basic concepts and regulations, among which it is possible to distinguish the concepts of the system, subordinviance of the goals and criteria for subsystems system-wide goals and criteria, etc. The systematic approach allows us to consider the analysis and synthesis of various in nature and complexity of objects from a single point of view, while detecting the most important characteristic features of the system functioning and considering the most significant factors for the entire system. The value of the systemic approach is especially large in the design and operation of systems such as automated control systems (ACS), which are essentially human-machine systems, where a person performs the role of a management entity.

The design approach in design is a comprehensive, interconnected, proportional consideration of all factors, paths and methods for solving a complex multifactorial and multivariate problem design interface design. Unlike classical engineering and technical design, using the system approach, all factors of the designed system are taken into account - functional, psychological, social and even aesthetic.

Automation of management inevitably entails the implementation of a systematic approach, as it assumes the presence of a self-regulating system with entries, outputs and control mechanism. The very concept of the interaction system indicates the need to consider the environment in which it must function. Thus, the interaction system should be considered as part of a more extensive system - ACU of real-time, while the latter is the system of controlled medium.

Currently, it can be considered proven that the main task of designing the user interface is not to rationally "enter" a person in the control circuit, but in order, on the basis of the object management tasks, develop a system of interaction between the two equal partners (man-operator and hardware and software complex
ACS), rationally controlling the control object.
SUBJECT AREA

So, it is obvious that the person operator is a closer link of the control system, i.e. The subject of the management, and the APC (hardware-software complex) ACS is a tool tool to implement its management (operational) activity, i.e. Control object. By definition, V.F. Vada, ACS is a hybrid intelligence in which the operational (managerial) composition and AIC ACS are equal partners in solving complex management tasks.

The rational organization of labor operators AWP is one of the most important factors that determine the effective functioning of the system as a whole. In the overwhelming majority of cases, management work is an indirect activity of a person, since in the conditions of ACS it leads to control, "without seeing" a real object. There is an object information model (information display tools) between the real object of control and man operator. Therefore, the problem of designing not only means of displaying information, but also the means of interaction of the person operator with technical means ACS, i.e. The problem of designing the system that we should name the user interface.

The interface of human interaction with technical equipment ACS can be structurally depicted (see Fig.1.). It consists of APK and interaction protocols. The hardware and software package provides functions:

1. Conversion of data circulating in ACS AIC into information models displayed on monitors (soy - information display tools);

2. Regeneration of information models (im);

3. Ensuring the person's dialogue interaction with the ACC TC;

4. Transformation of the effects coming from Cho (human-operator) to the data used by the control system;

5. Physical implementation of interaction protocols (matching data formats, error control, etc.).

The purpose of the protocols is to ensure the mechanism of reliable and reliable delivery of messages between the human-operator and soybean, and therefore, between the Cho and the management system. The protocol is a rule that defines interaction, a set of information exchange procedures between the actual time-executable processes. These processes (the functioning of the APC ACS and the operational activity of the management entity) are characterized, firstly, the absence of fixed temporary relations between the onset of events and, secondly, the lack of interdependence between events and actions during their occur.

The protocol functions are related to the exchange of messages between these processes. Format, the content of these messages form the logical characteristics of the protocol. The rules for execution of procedures determine the actions that perform processes together participating in the implementation of the Protocol. The set of these rules is a protocol procedural characteristic. Using these concepts, we can now formally define a protocol as a set of logical and procedural characteristics of the communication mechanism between processes. The logical definition is syntax, and the procedural semantics of the protocol.

Generating an image using an APC allows you to get not only two-dimensional proceeds on the plane of the image, but also to implement the picture three-dimensional schedule Using planes and second-order surfaces with transmission texture texture.

Depending on the view of the displayed image, you should select the requirements for the alphabet to them, according to the method of forming symbols and varieties of the use of image elements. The alphabet used characterizes the type of model, its visual capabilities. It is determined by the class of solved tasks, is set by the number and type of characters, the amount of brightness gradations, the orientation of the symbols, the frequency of the image of the image, etc.

The alphabet should ensure that any information models are built within the displayed class. It is also necessary to strive to reduce the reduction of the alphabet.

Methods for generating a sign are classified in accordance with the elements used by the elements and are divided into modeling, synthesizing and generating. For a sign that is formed on the CRT screen, the matrix format is preferred.

Monitor monitor allows the user to build an image of a system mode, which is formed on the basis of training, training and experience (conceptual model), therefore, it is possible to compare this image with the image of theoretical in accordance with the situation.
The requirement of adequacy, isomorphism, similarities of the spatial-temporal structure of the displayed control objects and the environment determines the efficiency of the model.

Image playback is based on its digital presentation, which is contained in the memory block, called the regeneration buffer.

Fig. 1. Information and logical interaction interface scheme.

Information model: input and output information

The information model, being an information source for the operator, on the basis of which it generates an image of a real situation, as a rule, includes a large number of elements. Given the different semantic nature of the elements used, the information model can be represented as a set of interrelated elements:

D ^ (dn), where Rj is a plurality of elements of the information model of the j-th group, n \u003d 1, ... n; k \u003d 1, ... k.

The number of groups of elements of the information model is determined by the degree of detail of the description of states and conditions for the functioning of the control object. As a rule, the element of the information model is associated with any parameter of the control object. Along with this, the graphical type information model can be considered as a complex graphic image. Elements of the information model here act as image elements. Any image consists of a certain set of graphic primitives, which are an arbitrary graphic element with geometric properties. Liters (alphanumeric and any other characters) can be used as primitives.

A combination of graphic primitives, which the operator can manipulate as one whole, is called the segment of the displayed information. Along with the segment, the concept of a graphic object is often used, under which a lot of primitives have the same visual properties and status, as well as identified by one name.
When organizing the processing process in the display systems, we will manipulate the following concepts:

6. Static information is relatively stable in content information used as a background. For example, the coordinate grid, plan, image of the area, etc.

7. Dynamic information - information, variable at a specific time interval by content or position on the screen. Really dynamic information is often the function of some random parameters.

Such division is considered severely conditional. Despite this, when designing real Systems Display information is solved without difficulty.

When creating complex ACS, the value of software development is given, because exactly software Create an intelligence of a computer, solving complex scientific tasks, managing the most complicated technological processes. Currently, when creating such systems, the role of the human factor is significantly increasing, and therefore ergonomic support of the system. The main task of ergonomic support is to optimize the interaction between the person and the machine not only during operation, but also in the manufacture, and during the disposal of technical components. So, when systematizing the user interface design approach, some basic functional tasks and principles of construction can be solved, which should solve the modern programming language and with which Delphi is successfully coped with:

The principle of the minimum work effort having two aspects:

8. Minimizing resource costs by the software developer, which is achieved by creating a certain methodology and technology of creating inherent in conventional production processes;

9. Minimizing the cost of resources from the user, i.e. Cho must only perform the work that is necessary and cannot be performed by the system, there should be no repetition of the work already done, etc.

The task of maximal understanding. Those. Cho should not engage, for example, searching for information, or the information issued to the screen should not require transcoding or additional interpretation by the user.

The user must memorize as fewer information as possible, as this reduces the Cho property to make operational solutions.

The principle of maximum concentration of the pointer on the task is solved and localization of error messages.
What to understand under the interface

The user interface means communication between man and a computer. General user access is the rules that explain the dialogue in terms of common elements, such as the rules for submitting information on the screen, and the rules of interactive technology are such as the rules for responding to a person-operator on what is presented on the screen. In this course project, we will consider the IBM Adjustment Standard, developed in conjunction with Microsoft for the RS-AT Class Class.

Interface components

At the practical level, the interface is a set of standard techniques for interaction with technology. On theoretical level, the interface has three main components:

1. The way to communicate a machine with a person operator.

2. The method of communication of the person-operator with the machine.

3. Method of user representation of the interface.

Machine to the user

The method of communication machine with the user (presentation language) is determined by the machine application (application program).
The application controls access to information, information processing, reporting in the form of a user-friendly.

User to Machine

The user must recognize the information that the computer represents is to understand (analyze) it, and move to the answer. The answer is implemented through interactive technology, the elements of which may be such actions as a choice of an object using a key or mouse. All this amounts to the second part of the interface, namely the language of action.

As a user thinks

Users may have an idea of \u200b\u200bthe machine interface that he does and how to work. Some of these ideas are formed by users as a result of work experience with other machines, such as a printing device, calculator, video games, as well as a computer system. A good user interface uses this experience. More advanced views are formed from user experience with the interface itself. The interface helps users to develop views that can be used further when working with other application interfaces.

Consistent Interface

The key to create an effective interface is the fast, as far as possible, the development of a simple conceptual interface model operators. Total user access does it through consistency. The concept of consistency is that when working with a computer, the user has a waiting system of identical reactions to the same actions, which constantly reinforces the user interface model. Consistency, providing a dialogue between a computer and a person-operator, can reduce the amount of time required by the user as in order to learn the interface and to use it to perform work.

Consistency is the property of an interface to strengthen custom representations. Another component of the interface is the property of its concreteness and visibility. This is carried out by using a panel plan, using colors and other expressive techniques. Ideas and concepts then acquire a physical expression on the screen with which the user is directly communicating.

Consistency - three dimensions:

To say that the interface is consistent - it's like saying that something is more than something. We are forced to ask: "More than what?". When we say that the interface is consistent, we are forced to ask: "Considered with what?". It is necessary to mention some dimension.

The interface can be matched with three broad categories or dimensions: physical, syntactic and semantic.

4. Physical consistency refers to hardware: keyboard circuits, keys location, mouse use. For example, physical consistency for the F3 key will take place if it is always in the same place regardless of the use of the system. Similarly, there will be a physically consistent choice of a button on the mouse, if it is always located under the index finger.

5. Syntax consistency refers to the sequence and order of the appearance of items on the screen (view language) and the sequence of requests for requirements (actions language).

For example: Syntactic consistency will occur if you always place the panel header in the center and on top of the panel.

6. Semantic consistency refers to the value of the elements that make up the interface. For example, what does the "output" mean? Where users do "out" and then what happens?

Intersystem consistency

General user access contains definitions of all elements and interactive technology. But these definitions can be made in different ways due to the technical capabilities of specific systems. So, the common interface cannot be identical for all systems.

The coherence of composite systems is a balance between the consistency of the physical, syntactic, semantic and desire to gain the advantages of the optimal capabilities of the system.

Benefits of the consistent user interface

The agreed interface brings to users and developers to save time and money. Users benefit from if they need less time to learn how to use applications, and then when operating it will take less time to perform work. Additional benefits for the user will be reflected in their attitudes.

The agreed interface reduces the user error level, increases the sense of satisfaction from the task and contributes to ensuring that the user felt more comfortably with the system.

The agreed user interface brings benefits and application developers, allowing you to highlight common blocks of elements for the interface through the standardization of interface elements and interactive technology. These building blocks can allow programmers to create and change applications easier and quickly. For example, due to the fact that one and also the panel can be used in many systems, applications developers can use the same panels in various projects.

Although the user interface establishes the rules for interface elements and interactive technology, it allows a fairly high degree of flexibility. For example, the interface defines five types of panels, but it is assumed that the specific use panels can be used. Common user access recommends the use of specific panels, but if this is not possible, you should use specific items of certain panels.


Interface

MS-Windows provides users with a graphical interface shell (GUI), which provides standard user and programmer. (GUI) offers a more complex and friendly user environment than a command-managed DOS interface. Work in Windows is based on intuitive principles. You can easily switch with the task of the task and exchange information between them. However, application developers are traditionally faced with programming difficulties, since the organization of Windows environment is extremely difficult.

Delphi - language and programming environment related to the class RAD-
RAPID Application Development - "Fast Application Development Tool") CASE - technology. Delphi made the development of powerful applications
Windows rapid process that gives you pleasure. Applications
Windows, to create a large amount of human effort, for example in C ++, can now be written by one person using Delphi.

The Windows interface provides a complete transfer of CASE technologies to an integrated system for creating an application system on all phases of the life cycle and system design.

Delphi has a wide range of features, ranging from the designer of forms and ending with the support of all formats of popular databases. Wednesday eliminates the need to program such components
Windows general purpose, as tags, pictograms and even dialog panels.
Working in Windows, you have repeatedly seen the same "objects" in many diverse applications. Dialog panels (for example Choose File and Save
File) are examples of repeatedly used components built directly in Delphi, which allows you to adapt these components to the existing task so that they work exactly as required by the application. There are also predefined visual and non-physical objects, including buttons, objects with data, menus, and already built dialog panels. Using these objects, you can, for example, to provide data input with just multiple presses of the mouse buttons without resorting to programming. This is a visual implementation of Case technologies in modern application programming. The part that is directly related to the programming user interface system received the name visual programming

Benefits from the design of AWP in Windows Wednesday using Delphi:

10. The need to re-enter data is eliminated;

11. The coherence of the project and its implementation is ensured;

12. Improving the performance of development and portability of programs.

Visual programming seems to add a new dimension when creating application creation, allowing you to depict these objects on the monitor screen until the program is performed. Without visual programming, the display process requires writing a code fragment creating and defining an object "at the place". To see the encoded objects was possible only during the program execution. With this approach, the achievement that objects look and behaved in a predetermined manner becomes a tedious process that requires repeated software corrections with a subsequent proof of the program and observing the fact that it turned out.

Thanks to the means of visual development, you can work with objects, holding them before your eyes and getting the results almost immediately. The ability to see objects as they appear during the execution of the program, relieves the need for a multitude of operations manually, which is characteristic of work in an environment that does not possess visual means - regardless of whether it is object-oriented or not. After the object is placed in the form of the visual programming environment, all attributes are immediately displayed as a code that matches the object as a unit executed during the program.

Placing objects in Delphi is associated with closer relations between objects and the real program code. Objects are placed in your form, while the code that meets objects is automatically recorded in the source file. This code is compiled, providing significantly higher performance than a visual medium that interprets information only during the program execution.

Three main parts of the interface development are as follows: design panel, dialog design and windows presentation. For general
User access must also be taken into account conditions
Architecture of application systems. There are also other conditions: whether the input devices are keys in key or indicable and will be symbolic or graphic applications.

Design design panel

We will establish the main terms relating to the development of the panel.

The screen is the surface of a computer workstation or a terminal, which is located information intended for the user.
The panel is a predetermined grouping information that is structured in a specific way and is located on the screen. Common
Custom access sets five panel schemes called panel types. You must use various panel types to present different types of information. Five panel types are as follows:

9. Information;

10. List;

11. Logical.

You can also mix parts of these panel types to create mixed panels. Each panel should be submitted as some space, divided into three main parts, each of which contains a separate type of information:

12. Action menu and downstream menu;

13. The body of the panel;

14. Function keys area.

In fig. 2 Presents the position of three panel areas.
| Menu Action |
| |
| Body panel |
| |
| Function keys area |

Fig. 2. Three panel areas.

The action menu occurs on the top of the panel. This gives users access to a group of actions that support the application. The action menu contains a selection list. possible actions. When users choose, in the form of a descending menu, a list of possible actions appears on the screen. The desired menu is an extension of the action menu.

The word "actions" in the "Menu" does not imply that all commands must be verbs. Nouns are also allowed. The value of the action in the term "Menu" comes from the fact that the selection of the menu item is performed by the application through user actions. For example, in text editor Selecting "Fonts" The action menu is nouns and allows the user to require font selection actions.

Some panels will have actions menu, and others are not.

The action menu and the downstream menu provide two wonderful benefits for users.

The first advantage is that these actions become visible for users and can be requested for implementation by means of simple interactive equipment. "Request" means an initiation of action.
The method with which the operator's person initiates an action, consists in pressing the function key, in the selection in the downlink menu or printing (input) of the command. The actions menu and the downstream menu provide visuality, which helps users to find the required actions without the need to memorize and print the name of the action.

The second advantage is that the choice in the action menu leads to a downlink call, i.e. They never serve as an immediate action. Users see that the implementation of such actions does not lead to incorrigible consequences, and they do not arise from the wrong action.

The action menu and the downlink menu provides a two-level hierarchy of actions. You can provide an additional level using pop-ups that appear when the operator is selected in the downlink menu. Then, when the operator makes a choice in the pop-up window, a series of pop-up windows may appear as actions are performed. Common
Custom access recommends you to limit the number of levels of pop-up windows up to three, since many users have difficulty understanding the menu hierarchy with many levels.

The panel body is under the action menu and above the function keys. Each panel you create will have a body that can be divided into several areas if your application needs to be shown more than one information group at the same time, or users are allowed to enter or update more than one information group in the same time. time.

The panel body can also contain a command area in which users print application or system commands, and a message area in which messages appear.

The command area is a means of providing users with a command interface, which is an alternative to the requests from the action menu and the downstream menu. The message area gives you a place to host messages on the screen, other than for windows, as it is important that messages do not come across information on the panel or with a request for action.

The function keys area is located at the bottom of the panel and the operator can select its placement in a short or long form or not place at all. It contains a list of function keys. Some panels can contain both the action menu and the header of the function keys. It is necessary to enable the function keys area for all panels, although the user can refuse their shielding. See fig. 3 WHERE A general view of the user panel is presented.
| Communication Communication |
| Select one of the following types of communication: |
| 1. Receiving mail |
| 2. Acceptance of messages |
| 3. Departure of mail |
| 4. Postal magazine |
| 5. Operations |
| 6. Post status |
| ESC \u003d Cancel | F1 \u003d Help | F3 \u003d Exit |

Fig. 3. The panel with the area of \u200b\u200bthe function keys. The area of \u200b\u200bthe function keys is shielded in a short form and contains the elections of cancellation, help and

Panel elements are the smallest parts of the panel design.
Some elements are exclusively to certain panel areas, while others can be used in different areas.

Common user access provides a certain number of characters and visual designations, such as pseudo-pillars and contact buttons that you can, apply to users, with which of the selection fields or actions they work.

Design Principles: Object - action

The partitioning of the panel on the area that contain information objects or actions elections is based on the principle of the object-action of the panel design. This principle allows users to first make a choice of an object on the body of the panel, and then select an appropriate action to work with the selected object from the action menu or from the function keys.

This object-effective compliance allows you to form from the action menu and downlink menu, including only those that are valid for the corresponding objects. The application of the object's concept is facilitated by minimizing the number of modes, a large number of which sometimes delivers inconvenience users and makes the application difficult to explore and use. The principle of object-action is preferable, but in most cases the connection can also be applied, in which the operator selects objects and steps in the reverse order.

User work with panel

The user works with the panel elements using the selection cursor, one of the selection forms of which is the color strip used to highlight the selection fields and input fields. The selection cursor shows where and with what the user is going to work. Users move the cursor over the panel using the keyboard or mouse.

Direct interaction

The general user access includes such design concepts as a concept of step-by-step tip, visual replica and interactive technology.
but experienced users may not require such a level of ease of use. They may require more direct interaction with the application. For users, general user access also contains fast interactive technologies, such as:

15. Assigning function keys.

16. Accelerated exit from high-level actions.

17. Using mnemonics and numbers to select objects and actions.

18. The command area allows the user to enter the application and system commands.

19. The use of the mouse accelerates the choice of actions.

Building dialogue

The dialogue is a sequence of requests between user and computer: user request, response and computer request, final computer action.

While the user and computer exchange messages, the dialogue under the control of the operator moves one of the paths provided by the application. Essentially, the user is moving through the application using specific actions that are part of the dialogue. These dialogs do not necessarily require information processing computer; They can only cause the transition from one panel to another or from one application to another if more than one application works. Dialogs also control what happens to the information that users are printed on a specific panel; If you should save it or remember when users decide to go to another application panel.

So, the dialogue consists of two parts:

Each step of the dialogue is accompanied by the solution to save or not save new information.

With the help of several directions of the dialogue, the operator is given the possibility of alternative advances in their decisions, including common dialogs as input, cancellation and output. General dialogs are a set of such actions defined in
Common user access that are common in all applications. With some of these modes, the user can move:

22. Forward one step (entry action);

23. Back one step (cancellation action);

24. Back to a specific point of the application (action of functional output);

25. Leave the application (exit mode from the application).

Actions of the entrance and cancellation, as dialogue steps, usually represent the operator a new panel or can represent the same panel, but with significant changes. At various points of the removal and output dialog, it is performed equally regardless of how many output points have an application. Some applications have only one output point, while others are somewhat. The combination of several common dialogs is illustrated in Fig. four.

Here are illustrated by the possibilities of navigating a typical dialogue when switching from the panel to the panel, which are displayed by rectangles. Operations
Forward and back are scrolling operations, and not navigational, and are used to move inside the panels.

Fig. 4. Dialogs.

Holding and saving information

While users are navigating the application, something must occur with information variable in the panel. It can be held at the level of the panel or can be saved.

Hold information belongs to the information on the application panel level. When users are returned to the dialog through the panel cancellation, the application cancels or saves any changes to the information on the panel.
Hold information can be shielded in the form of default values \u200b\u200bwhen the user will view this panel next time. But this does not mean that the information will be saved. Each application decides to hold or save similar information.

Saving information means room room in the memory area asked by the operator. Navigation actions, leading user by application, do not save information until the user specifies exactly that these actions should end with the maintenance of information.

If the user's actions can lead to a loss of specific information, general user access recommends that you need to confirm from the user, that they do not want to save information, or allow them to save information, or cancel the latest request and return one step back.

Your application can work in window mode. This means that the panel is located in separate limited parts of the screen, which are called windows. A system of windows mode allows the user to divide the screen on the windows containing its own panel. Using several windows at once, the user can simultaneously monitor several panels of one or different applications on the screen.

If the screen contains one or two windows, the user may not see the entire panel in each window. It depends on the size of the window.
The user can move or resize each window to accommodate the information you need. Also, users can scroll through the content of the windows by moving information on the panel inside the screen area limited by the window.

Winds mode features are provided operating system or its service and toolsOtherwise, applications themselves must implement this mode.

Three types of windows

The primary window is a window from which the user and the computer starts their dialog. For example, in a text editor, the primary window contains the text to be edited. In the electronic table editor, the primary window contains a table. In systems without the possibility of creating windows, the entire screen should be considered the primary window. Each primary window may contain as many panels as necessary, one by one to conduct a dialogue. Users can switch the primary window to another primary or secondary window.

Secondary windows are caused from primary windows. These are such windows in which users and a computer lead a dialog parallel to the dialogue in the primary window. For example, in a text editor, the secondary window may contain a panel with which the user changes the document format, and in the primary window contains editable information. Secondary windows are also used to provide supporting information that refers to dialogue in primary windows. Users can switch from the primary windows to the secondary windows and vice versa. Primary and secondary windows have title strips at the top of the window. The header is correlated with the window through the applications.

Pop-up windows are a sections of the screen in which the shielded panel is located, which extends the user dialog through the primary and secondary windows. Pop-up windows are associated with other windows and appear when the application wants to expand the dialog with another window. One of the use of pop-up windows is to transmit various messages. Before continuing the dialogue with some window, the user must complete its work with the pop-up window associated with it.

Input Devices: Keyboard, Mouse and Other

Common user access supports the consistent use of the keyboard and mouse, or any other device acting as a mouse. We will further assume that the mouse is the main indicating device.

Users should be ready to switch between the keyboard and the mouse almost at any stage of the dialog without the need to change the application modes. One device can be more efficient than another in a known situation, therefore, the user interface allows users to make the ability to easily switch from one device to another.

All personal computer applications must take into account the use of the mouse. However, applications on unprogrammed terminals cannot support the mouse. On these terminals, the mouse support is not obligatory.

Keypad support

We will take for a standard de facto general user access, designed to meet one type of keyboard, namely, an extended IBM keyboard.

You must assign key application functions according to the rules and specifications of the IBM standard. Key assignment belong to IBM keyboard
Enhanced Keyboard. For the keyboards of other types, appropriate technical documentation is used, for example, a variable IBM Modifiable keyboard
Keyboard.

Key assignment rules:

26. Annexes can use any keys, including as keys pressed without shift, as well as combinations with SHIFT +, CTRL + and

Alt +, if a programmable workstation or an unprogrammed terminal allows applications to these keys. You should avoid using any keys assigned by the operating system, which will be run by the application.

27. If the application is translated into other languages, you should not assign combinations of alphanumeric keys with Alt. However, if possible, users can assign various functions to these keys.

28. To change the source keys, use them in conjunction with the ALT, CTRL and SHIFT keys. The ALT, CTRL and SHIFT keys are not used independently.

29. Do not reassign or duplicate key assignment.

30. Users are given the ability to change the key assignment as an additional feature of the application. Users must be able to assign actions and parameters to any function keys, as well as change their designation on the screen.

31. If some feature is assigned function key Equally in multiple applications, you should assign this key. this feature In all applications.

32. If users are pressed at the level of the current panel key, there should be no effect if something else is not specified.
Conclusion

In modern conditions, the search for the optimal solution to the organization of the interaction interface acquires the nature of the complex task, the solution of which is significantly complicated by the need to optimize the functional interaction of operators among themselves and with the technical means of the ACS in the conditions of a changing nature of their professional activities.

In this regard, I would like to emphasize the particular relevance of the problem of modeling the interaction of Cho with technical means ACS. Today there was a real possibility using modeling on modern multifunctional means of processing and displaying information such as
Delphi specify the type and characteristics of the information models used, identify the main features of the future activity of operators, formulate requirements for the parameters of the hardware and software interaction interface, etc.

Speaking about the problems of human interaction with the TC ACU and the practical implementation of the interaction interface, it is impossible to lower such an important question as unification and standardization. The use of typical solutions, a modular design principle of designing systems and processing information acquires an increasing scale, which, however, is quite natural.

Of course, it should be specially emphasized in the implementation of these tasks. user interfaceWhat is the Windows interface. No products of other firms available today do not provide simultaneous ease of use, performance and flexibility to such an extent as Delphi. This language filled the gap between the 3rd and 4th generation languages, connecting their strengths and creating a powerful and productive development environment.

LITERATURE

Organization of human interaction with technical means ACS, Volume 4:
"Displaying information", editorial office V.N. Echtherikova, Moscow, "Higher School"
1993.
Organization of human interaction with technical means ACS, Volume 7:
"System design of human interaction with technical means", editorial office V.N.Stweryakova, Moscow, "Higher School" 1993.
"Cybernetic dialog systems", I.P. Kuznetsov.
Recommendations on the Sessive Interface, Microsoft, Editorial
1995
John Matcho, David R. Folkner. "Delphi" - per. from English - M.: Binin, 1995

Introduction 2.

Subject 3.

Information model: Input and output 6

Functional tasks that solves Delphi when designing an interface
7

What to understand under the interface 8

Interface components 8.

Machine to user 8

User to Machine 8

As a user thinks 8
Consistent Interface 9.

Consistency - three dimensions: 9

Intersystem consistency 10.

Benefits of the consistent user interface 10

Software and hardware: Implementation and Creation of Custom
Interface 11.

Development of panel design 13
Design Principles: Object - Action 16

User work with panel 16

Direct interaction 16.

Construction of dialogue 16.
Holding and saving information 19
Windows 19.

Three types of windows 20
Input Devices: Keyboard, Mouse and Other 20

Keyboard support 21.

Modern methods of designing ACS users have developed within the framework of the systemotechnical design concept, due to the accounting of the human factor, it limited to solving the problems of coordination of the "entrances" and "human outlets" of a person and car. At the same time, when analyzing dissatisfaction with ASU users, it is possible to identify that it is often explained by the lack of a single, comprehensive approach to the design of the interaction systems submitted as a complex, interconnected, proportional consideration of all factors, paths and methods for solving a complex multifactorial and multivariate interaction interface design. Meaning functional, psychological, social and even aesthetic factors.

Currently, it can be considered proven that the main task of designing the user interface is not to rationally "enter" a person in the control circuit, but in order, on the basis of the object management tasks, develop a system of interaction between the two equal partners (man-operator and hardware-software complex ACS), rational control object control. The operator's person is a closing link of the control system, i.e. control. APK (hardware and software complex) ACS is instrumental realizationhis (operator) management (operational) activity, i.e. object control. By definition, V.F. Vada, ACS is a hybrid intelligence in which the operational (managerial) composition and AIC ACS are equal partners in solving complex management tasks. The interface of human interaction with technical equipment ACS can be structurally depicted (see Fig.1.).

Fig. 1. Information and logical interaction interface scheme

The rational organization of labor of the ACS operators is one of the most important factors that determine the effective functioning of the system as a whole. In the overwhelming majority of cases, management work is an indirect activity of a person, since in the conditions of ACS it leads to control, "without seeing" a real object. Between the actual control object and the human operator is information model of the object (information display tools). Therefore, the problem of designing not only means of displaying information, but also the means of interaction between the human operator with technical means ACS, i.e. Problem designing a system that we should call user interface.

It consists of APK and interaction protocols. The hardware and software package provides functions:

    transformation of data circulating in ACS ACS, information models displayed on monitors (soy - information display means);

    regeneration of information models (im);

    ensuring the human dialogue interaction with the ACSA;

    transformation of the effects coming from Cho (human-operator) to the data used by the control system;

    physical implementation of interaction protocols (matching data formats, error control, etc.).

The purpose of the protocols is to ensure the mechanism of reliable and reliable delivery of messages between the human-operator and soybean, and therefore, between the Cho and the management system. Protocol - This is a rule that defines interaction, a set of information exchange procedures between parallel to the processes in real time. These processes (the functioning of the APC ACS and the operational activity of the management entity) are characterized, firstly, the absence of fixed temporary relations between the onset of events and, secondly, the lack of interdependence between events and actions during their occur.

The protocol functions are related to the exchange of messages between these processes. Format, the content of these messages form the logical characteristics of the protocol. The rules for execution of procedures determine the actions that perform processes together participating in the implementation of the Protocol. The set of these rules is a protocol procedural characteristic. Using these concepts, we can now formally define a protocol as a set of logical and procedural characteristics of the communication mechanism between processes. The logical definition is syntax, and the procedural semantics of the protocol.

The image generation using the APC allows you to get not only two-dimensional images on the plane of the image, but also to implement picture three-dimensional graphics using planes and second-order surfaces with the transmission texture of the image surface.

When creating complex ACS, the value of software development is given, because It is the software that create an intelligence of a computer, solving complex scientific tasks, managing the most complicated technological processes. Currently, when creating such systems, the role of human factor A is significantly increasing, therefore ergonomic support of the system. The main task of ergonomic support is to optimize the interaction between the person and the machine not only during operation, but also in the manufacture, and during the disposal of technical components. Thus, when systematizing the user interface design approach, some basic functional tasks and principles of construction, which the system should solve.

The principle of the minimum work effortthe developer of software and a user who has two aspects:

    minimizing resource costs by the software developer, which is achieved by creating a certain methodology and technology of creating inherent in conventional production processes;

    minimizing the cost of resources from the user, i.e. Cho must only perform the work that is necessary and cannot be performed by the system, there should be no repetition of the work already done, etc.

The task of maximum mutual understandinguser and apk in the face of the software developer. Those. Cho should not be engaged, for example, searching for information, or the information issued to a video monitoring device should not require transcoding or additional interpretation by the user.

The user must memorize as few informationSince this reduces the Cho property to make operational solutions.

Principle of maximum concentration User on the task solved and localization of error messages.

Principle of accounting for professional skills Man operator. This means that when developing a system based on some of the information specified in the technical task of the original data on a possible contingent of candidates, the "human component" is designed to meet the requirements and features of the entire system and its subsystems. The formation of the conceptual model of the interaction of man and technical means ACS means awareness and mastering algorithms of the functioning of the subsystem "Man - TECHNICAL TOO" and mastering professional skills of interaction with computers.

Key for creating effective interface concludes in fast, as much as possible, presentation by the operator of a simple conceptual interface model. Total user access does it through consistency. The concept of consistency is that when working with a computer, the user has a waiting system of identical reactions to the same actions, which constantly reinforces the user interface model. Consistency, providing a dialogue between a computer and a person-operator, can reduce the amount of time required by the user as in order to learn the interface and to use it to perform work.

Consistency is the property of an interface to strengthen custom representations. Another component of the interface is property of its concreteness and visibility. This is carried out by using a panel plan, using colors and other expressive techniques. Ideas and concepts then acquire a physical expression on the screen with which the user is directly communicating.

In practice, high-level user interface design precesses initial design that allows you to identify the required functionality of the application being created, as well as the features of its potential users. The specified information can be obtained by analyzing the technical task on the automated control system (ACS) and the Operation Manual (RE) on the management object, as well as information coming from users. To this end, a survey of potential operators and operators operating on a non-automatic management facility are produced.

After determining the goals and tasks facing them, go to the next design stage. This stage is associated with the preparation of custom scenarios. The script is a description of the actions performed by the user as part of solving a specific task on the way to achieve its goal. Obviously, it is possible to achieve some goal, solving a number of tasks. Each of them, the user can solve in several ways, therefore, several scenarios should be formed. The more they are, the lower the likelihood that some key objects and operations will be missed.

At the same time, the developer has information necessary to formalize the functionality of the application. And after the formation of the scenarios, the list of individual functions becomes a known list. The appendix feature is represented by a functional block with the corresponding on-screen form (forms). It is possible that several functions are combined into one function block. Thus, at this stage, the required number of screen forms is set. It is important to determine the navigation relationships of function blocks. In practice, the most suitable number of connections for one block equal to three is established. Sometimes, when the function of execution of functions is rigidly defined, a procedural connection can be installed between the corresponding function blocks. In this case, their screen forms are called sequentially one of the other. Such cases take place not always, so navigation connections are formed either, based on the data processing logic with which the application works, or based on user representations (card sorting). Navigation links between individual function blocks are displayed on the navigation system diagram. Navigation capabilities in the appendix are transmitted through various navigation elements.

The main navigation element of the application is the main menu. The role of the main menu is also because it provides dialogue in the User application system. In addition, the menu indirectly performs the function of learning the user to work with the application.

The generation of the menu begins with the analysis of the application functions. For this, within each of them, individual elements are distinguished: operations performed by users, and objects over which these operations are carried out. Therefore, it is known which functional blocks should allow the user to carry out what operations over what objects. Allocation of operations and objects is convenient to hold on the basis of user scenarios and application functional. Selected items are grouped into general sections of the main menu. The grouping of individual elements occurs in accordance with the views on their logical connection. In this way, the main menu can have cascading menusfalling out when choosing any section. The cascade menu confesses the primary section of the list of subsections.

One of the menu requirements is their standardization, the purpose of which is the formation of a sustainable user model of working with the application. There are requirements extending from standards of standardization that relate to the placement of sections headers, the content of partitions of frequently used in different applications, form headers, organization of cascading menus, etc. The most general standardization recommendations are as follows:

    groups of functionally related sections are separated by separators (features or empty);

    not used in the names of sections of phrases (preferably no more than 2 words);

    section names start with a capital letter;

    the names of the menu partitions associated with the call of dialog boxes are completed by ellipsis;

    the names of the menu partitions to which the cascading menus include, finish with the arrow;

    use keys quick access To individual partitions menu. They are highlighted by underline;

    admit to use " hotkeys", The corresponding key combinations are displayed in the menu partition headers;

    allow you to enable in the icon menu;

    modified color shows the unavailability of some menu sections during operation with the application;

    adjust to make inaccessible sections invisible.

Inaccessibility of some menu sections is caused by the following. The main menu is static and is present on the screen for the entire time of working with the application. Thus, when working with different screen forms (interacting with different function blocks), not all menu sections make sense. Such sections are taken inaccessible. Therefore, depending on the context of user-solved tasks (sometimes from the context of the user itself), the main menu of the application looks differently. About the similar differing external representations The menu is customary to say as various menu states. In contrast to the schema of the navigation system, prepared earlier and necessary, mainly developer, with the menu, the user enters into direct interaction. The menu defines the number of windows and their type. The entire interface is accompanied by warnings windows, prompts, wizard windows that task the sequence of user actions when performing some necessary operations.

Download Document

State Standard of the SSR Union

INTERFACE
For automated
Management systems
Dispersed objects

GENERAL REQUIREMENTS


K.i Didenko, Cand. tehn sciences; Yu.V. Rosen; K.G. Carnukh; Ppm Gafanovich, Cand. tehn sciences; KM Usenko; J.A. Gusev; L.S. Lanina; S.N. Kiyko

Deposed by the Ministry of Instrument Making, Automation Tools and Control Systems

Member of the Collegium N.I. Gorleikov

Approved and put into effect by the Resolution of the USSR State Committee on Standards of March 30, 1984 No. 1145

State Standard of the SSR Union


until 01.01.90

Failure to comply with the standard is prosecuted by law.

This standard applies to an interface regulating general rules Organization of interaction between local subsystems in the composition automated systems Management of dispersed objects using a trunk communication structure (hereinafter - the interface).

In terms of physical implementation, the standard applies to the interfaces of aggregate means using electrical signals to transmit messages.

1. Appointment and scope

1.1. The interface is intended for the organization of communication and exchange of information between local subsystems as part of automated technological management systems, machines and equipment in various industries and non-industrial sphere.


interface with operational technological staff;

conign with the control computing complexes of the upper tier in hierarchical systems.

2. Main characteristics

2.1. The interface implements a bit-serial synchronous method for transmitting digital data signals over a two-wire trunk channel.

2.2. The total attenuation of the signal between the output of the transmitting and input of the host station must be no more than 24 dB, while the attenuation made by the communication line (main channel and the discharge) must be no more than 18 dB, made by each line of communication with the line, not more than 0, 1 dB.

Note. When using the RK-75-4-12 cable, the maximum length of the communication line (including the length of the taps) is 3 km.


(New edition, change No. 1).

2.5. Two-phase modulation with phase coding should be applied to represent signals.

2.6. For the code protection of the transmitted messages should be applied cyclic code with producing polynomial X. 16 + X. 12 + X. 5 + 1.

2.7. In order to eliminate random errors, the possibility of re-transmitting messages between the same local subsystems should be provided.

2.8. Message transmission between local subsystems should be carried out by means of a limited set of functional bytes, the sequence of which is set by the message format. The interface sets two types of message formats (features. 1).

Format 1 has a fixed length and is designed to transmit only interface messages.

Format 2 includes a variable in length of the information part intended for data transmission.

The format 2, depending on the transmission rate (low-speed or high-speed range), should be viewed 2.1 or 2.2, respectively.

Types of message formats

Format 1.

2.9. Message formats must include the following functional bytes:

synchronizing CH;

address of the called local subsystem AV;

code of the function of the KF;

own address of the local subsystem AU;

number of data bytes in the information part of DS, DS1 or DS2;

dN1 informational bytes - DNP;

bytes of control codes KB1 and KB2.

2.8, 2.9.

2.9.1. Synchronizing software byte serves to designate the beginning and end of the message. Synchronizing byte assigned code? 111111?.

2.9.2. Byte Addresses AB subsystem Defines the local subsystem that the message is sent.

2.9.3. Byte of the functions of the KF function determines the operation that is performed in this communication cycle. The purpose of discharges inside byte kf is shown. 2.

The structure of byte kf

2.9.4. KF codes and the corresponding operations performed are specified in the table.

Baita designation

Function code

Executable operation

Group transfer (with total addressing)

Recording-reading

Centralized survey controllers

Transfer control of the main channel

Return control of the main channel. Message with a common address is not accepted

Return control of the main channel. Message with the general address is made

Decentralized survey controllers. The lack of a request to capture the channel. Message with a common address is not accepted

Request for capturing the main canal. Message with a common address is not accepted

Request for capturing the main canal. Message with the general address is made

Marker transfer

Confirmation of the message reception

Confirmation of the issuance of the message

Confirmation of reception and subsequent issuance of the message. Answers to a centralized survey

The lack of a request to capture the channel. Message with a common address is not accepted

The lack of a request to capture the channel. Message with the general address is made

Request for capturing channel. Message with a common address is not accepted

Request for capturing channel. Message with the general address is made

Zero discharge determines the view of the message (call-response) transmitted through the trunk channel.

The discharge 1 takes a single value when the subsystem is employed (for example, the formation of data buffer).

The discharge 2 takes a single value if the format message 2 is transmitted in this cycle.

The discharge 3 takes a single value in a re-sent message to the same local subsystem in case of an error or no response.

(Modified edition, change No. 1).

2.9.5. The own address of the local subsystem that generates the AC message is issued to inform the response address called the subsystem and control the correctness of its choice.

2.9.6. Byte, the DS determines the length of the information part in format 2.1, while the value of the binary code of the byte of the DS determines the number of bytes of the day. The exception is the code ????????, which denotes that 256 information bytes are transmitted.

Bytes of DS1, DS2 determine the length of the information part in format 2.2.

(Modified edition, change No. 1).

2.9.7. DN data bytes represent the information part of the format message 2. Data coding should be set by the normalizing documents on the mating local subsystems.

2.9.8. CB1 control bytes, CB2 form the control part and are used to determine the accuracy of the transmitted messages.

3. Interface structure

3.1. The interface provides the ability to build dispersed systems with a main communication structure (damn 3).

Local subsystem connection structure

L.C.1 - LCN. - local subsystems; MK - trunk canal; PC. - Resistor Agreement

3.2. All conjugated local subsystems must be connected to the trunk channel through which information is exchanged.

3.3. To interfacitate local subsystems with a trunk channel in their composition, communication controllers should be provided. Communication controllers must be carried out:

transformation of information from the form of representation adopted in the local subsystem into the form required for transmission over the trunk channel;

adding and highlighting synchronization marks;

recognition and receiving messages addressed to this local subsystem;

formation and comparison of control codes to determine the accuracy of the received messages.

3.4. Messaging between local subsystems should be organized as cycles. Under the cycle is understood as the transfer procedure into a trunk channel of one message 1 or 2. Several interconnected cycles form the transmission process.

3.5. The transmission process should be organized by an asynchronous principle: the local subsystems sent to the trunk channel should receive answers (with the exception of group operations).

4. Interface functions

4.1. The interface sets the following types of functions that differ in control levels that occupy local subsystems in the messaging process:

passive reception;

reception and response;

decentralized management of the main channel;

request for capturing the main channel;

central control of the main channel.

(Modified edition, change No. 1).

4.2. The composition of the interface functions implemented by the local subsystem is determined by the composition of the problem solved by this subsystem and its functional characteristics.

4.3. The type of local subsystem is determined by the function of the highest level from among those provided. The local subsystem is considered active relative to the function that it executes in the current cycle.

4.4. In accordance with the composition of the implemented interface functions, the following types of local subsystems differ:

passive managed subsystem;

managed subsystem;

control subsystem;

initiative control subsystem;

leading subsystem.

4.4.1. The passive driven subsystem only performs identification and reception of the messages addressed to it.

4.4.2. The managed subsystem makes receiving messages addressed to it and forms a response message in accordance with the received function code.

4.4.3. The control subsystem must have the ability to:

take the exchange management on the trunk channel in centralized and decentralized modes;

form and transmit messages on the trunk channel;

accept and analyze response messages;

return or transmit control of the main channel after the transmission process is completed.

(Modified edition, change No. 1).

4.4.4. The initiative control subsystem besides the function according to claim 4.4.3, must have the ability to generate a request signal to capture the trunk channel, receive and send the corresponding messages when performing the search procedure of the request subsystem.

4.4.5. The presenter of the subsystem coordinates the work of all local subsystems in the central control mode of the main channel. She carries out:

arbitration and transfer control by the main channel of one of the local subsystem managers;

central management of all local subsystems;

monitoring the operation of the active management local subsystem;

transfer messages with a common address for all (or several) local subsystems.

Only one subsystem that has an active function of the host can be connected to the trunk channel.

(Modified edition, change No. 1).

5. Messaging order

5.1. Each reporting cycle of the trunk channel must begin with the synchronization of all subsystems associated via the interface.

5.1.1. To perform synchronization, the host or active control subsystem must be transferred to the trunk channel synchronizing byte of the CH. It is allowed to transmit sequentially somewhat synchronizing bytes. Additional synchronizing bytes are not included in the message format.

5.1.2. After performing the synchronization of all subsystems, the host or active control subsystem transmits a 1 or 2 message to the trunk channel, including their own SH.

5.1.3. All bytes, with the exception of control KB1 and KB2, are transmitted to the main channel, starting with the younger discharge.

KB1 bytes, CB2 are transmitted from the older discharge.

5.1.4. To exclude from the sequence of the bit transmitted to the trunk channel, which coincides with the CN byte code, each message must be converted in such a way that after 5 the following characters "1" should include one additional character "0". The receiving subsystem this character must be excluded from the message.

5.1.5. After sending the message, including the terminal byte, the transmitting subsystem should transmit at least 2 bytes of the CH to complete the reception operations, after which the transmission cycle ends.

5.2. The main channel management procedure determines the sequence of activation of one of the controls of the subsystems to execute the message transfer process. Subsystems associated via the interface can function in centralized control of the main channel.

5.2.1. The central control procedure of the main channel provides for the presence of a leading subsystem, which coordinates the interaction of subsystems by managing the transfer of control of the main channel.

5.2, 5.2.1. (New edition, change No. 1).

5.2.2. When managing the main channel control, the host subsystem assigns an active control subsystem to execute the message transfer process. To do this, the presenter of the subsystem must send the format 1 message to the selected control subsystem with the CF6 function code.

5.2.3. The control subsystem after making a message with the CF6 function code should be active and can be performed in one transmission process multiple messaging cycles. The number of exchange cycles should be monitored and limited to the leading subsystem.

5.2.4. After transmitting the control of the main channel, the host subsystem must activate the passive reception function and turn on the control countdown. If during the set time (the response time should not be more than 1 ms) Assigned Active Subsystem does not begin to transmit messages over the trunk channel, the master of the subsystem repeats the control subsystem of the format 1 message with the CF6 function code and a sign of re-transmission.

5.2.5. If and when you repeatedly use the control subsystem does not start sending messages (does not become active), the presenter of the subsystem defines it as faulty and implements the procedures provided for such a situation.

5.2.6. Upon completion of the transmission process, the active control subsystem must perform the refund function of the main channel control. To do this, it must send the leading subsystem message with the CF7 or KF8 function code.

5.2.7. The procedure for decentralized management of the main channel involves consistent transmission of the function by active to other control subsystems by transferring a marker. The subsystem adopted a marker is active.

5.2.8. For the initial capture of the marker, all subsystems associated with a trunk channel should include interval timers, and the values \u200b\u200bof the time intervals must be different in various subsystems. A subsystem having a higher priority must be assigned to a smaller time interval.

5.2.9. If, after your own time interval of the subsystem, the main channel is free, this subsystem should consider itself the owner of the marker and start the transmission process as the active control subsystem.

5.2.10. After the transmission process is completed, the active control subsystem must pass the control of the main channel to the next control subsystem with an address of AB \u003d AC + 1, for which it should issue a marker, activate the passive reception function and turn on the control countdown.

As a marker, a message of format 1 (damn 1) is used with the CF13 function code and the AV address.

If during the set time, the subsystem marker does not start the transmission process, transmitting it to the subsystem should attempt to transfer to the marker subsystems with subsequent addresses of AV \u003d AC + 2, AU \u003d AC + 3, etc. As long as the marker is not accepted. The address of the subsystem adopted a marker must be memorized by this subsystem as follow-up before re-initial capture.

5.2.11. Any active subsystem that has discovered unauthorized output to the communication channel must perform actions on 5.2.8.

5.2.12. In the mode of decentralized controlling the main channel, all subsystems must have an active function of passive reception. In the case of a mestery of the marker (for example, if the active control subsystem fails), the mechanism of initial marker capture (paragraphs 5.2.8, 5.2.9) must be opened (paragraphs 5.2.8, 5.2.9) and the functioning should be recovered.

5.2.13. Any subsystem that owns the marker and received the active function of the lead, can capture the central control of the main channel and maintain it to the abolition of the active function assigned to it.

5.2.7 - 5.2.13. (Additionally introduced, change No. 1).

5.3. In centralized management mode, the control of the main channel control can be organized on requests from initiative management subsystems.

5.3.1. Subsystems must have an active function of capturing a trunk channel to organize control on requests.

5.3.2. Two ways to organize the search for the subsystem requesting access to the main channel is centralized and decentralized.

5.3, 5.3.1, 5.3.2. (New edition, change No. 1).

5.3.3. With a centralized survey, the leading subsystem must consistently interview all initiative control subsystems connected to the trunk channel. The presenter of the subsystem must send each initiative control subsystem of the format 1 message with the CF5 function code.

The initiative control subsystem must send a response message to the leading subsystem with one of the CF21-KF24 function codes depending on its internal state. The sequence of operations in the central survey procedure is shown. four.

5.3.4. The decentralized survey provides a quick process of determining the initiative control subsystems that have established an access request to the trunk channel. The presenter of the subsystem should apply only to the first in turn of the initiative control subsystem with the format 1 message and the CF9 function code.

Each initiative control subsystem must perceive the message addressed to it and send its message to the trunk channel addressed to the next one in turn of the subsystem. The resulting message should pass one of the CF9 function codes - KF12, which characterizes the state of this subsystem. The procedure of the decentralized survey illustrates the features. five.

5.3.5. The host subsystem after launching a decentralized survey activates the passive reception function and receives all messages sent by the initiative control subsystems. This allows the leading subsystem after the end of the decentralized survey, to have information about access requests to the trunk channel in all initiative management subsystems.

The process of centralized survey subsystem

The process of decentralized survey of the subsystem

The initiative control subsystem in the decentralized survey chain in the circuit of a decentralized survey should address its message to the presenter of the subsystem, which means the end of the procedure for a decentralized survey.

5.3.6. If any subsystem displays messages to the trunk channel after accessing it, the presenter must be activated and send it a re-message identical to the previous one. In the absence of a response (or errors) on a repeated call, the leading subsystem launches a decentralized survey with the following in turn of the subsystem, and this subsystem from the survey is excluded.

5.4. The data transfer procedure can be performed as one of the following processes:

group record;

record reading.

5.4.1. Group recording must be performed by the master subsystem. When executing a group recording, the presenter of the subsystem is in the main channel of the format 2 message, in which the code 11111111 (255) and the CF function code is recorded as an AV address.

5.4.2. All subsystems that respond to the group address must take a message from the main channel and fix the status meaning that the message with the common address is taken. Response messages with group recording of receiving subsystems are not issued.

5.4.3. Confirmation of the reception of a group message is carried out in the process of a centralized or decentralized survey, as well as when returning the control of the main channel, for which the CF1, KF8, KF2 - KF2 and KF21 - CF24 bits are enabled.

5.4.4. In the process of recording, the master subsystem or the active control subsystem sends a message 2 message to the CF2 function code 2 to a specific manageable subsystem to receive a specific controlled subsystem, the address of which is listed in the av. After issuing the message, the active control subsystem includes a control countdown and a response message is waiting.

5.4.5. The addressed subsystem identifies its address and accepts the message sent to it. In the event that the message is taken without an error, the receiving subsystem must issue a response to the trunk channel as a message of format 1 with the CF18 function code.

5.4.6. If an error is detected in the adopted message, the receiving subsystem should not issue an answer.

5.4.7. The active control subsystem in the absence of a response during the control time interval must re-execute the transmission of the same message.

5.4.8. If there is no response to a repeated message, this subsystem is considered to be a faulty and the active control subsystem must execute the procedure prescribed for such a situation (inclusion of alarm system, the exclusion of the subsystem from the circulation, the inclusion of the reserve, etc.).

5.4.9. In the central control mode of the main channel, the control and controlled subsystem dialog must be constantly monitored by the master subsystem that performs the passive reception function at this time.

(New edition, change No. 1).

5.4.10. The reading process should begin by sending the active control subsystem of the format 1 message with the CF3 function code.

5.4.11. The subsystem, which is addressed to this message, in the case of its serviceable reception, should be given a response message 2 with the CF19 function code.

5.4.12. In the event that the subsystem cannot issue data for the set timeout time, it must after accepting a message with the reading function to fix the subsystem's employment feature and proceed to the formation of an array of data for issuing.

5.4.13. This controlled subsystem must remember the address of the active control subsystem subsystem (which data is prepared) and in response messages to other managers of employment to other control subsystems are prepared.

5.4.14. To read the prepared data, the active control subsystem must again refer to the controlled subsystem with the format 1 with the CF3 function code. If the data by this time is prepared, the controlled subsystem must submit a response message 2 with the CF19 function code.

The subsystem employment feature should be removed only after passing the response message of format 2.

5.4.15. If the response message is accepted by the active control subsystem without an error, the reading process is completed.

5.4.16. If an error or the absence of an answer is detected, the active control subsystem repeats the appeal, and then takes measures similar to those shown in PP. 5.4.7, 5.4.8.

5.4.17. Recording reading is a combination of processes according to PP. 5.4.4 - 5.4.15.

5.4.18. The active control subsystem sends a message 2 message to the trunk channel with the CF4 function code.

5.4.19. The addressed subsystem must adopt a message directed and form a response.

5.4.20. Response message B. this process It must be represented by format 2 (contain read data) and have the CF20 function code.

5.4.21. Control of the accuracy of the transmitted messages and the actions undertaken by the active control subsystem should be similar to the record and reading and reading processes.

6. Physical implementation

6.1. The physically interface is implemented in the form of communication lines forming a trunk channel, and communication controllers that provide direct connection to communication lines.

6.2. Communication controllers must be performed in the form of functional nodes that are part of the subsystem, or in the form of structurally isolated devices.

6.3. The rules of the interface and interaction of communication controllers with the functional part of the subsystem by this standard are not regulated.

6.4. For the main channel communication lines, a coaxial cable with a wave resistance of 75 ohms should be applied.

6.5. The coaxial cable must be loaded at both ends with matching resistors with resistance (75 ± 3.75) OM. The power of matching resistors should be at least 0.25 W.

The matching resistors should be connected to the ends of communication lines using RF connectors.

Grounding or connection of communication lines with device enclosures in mating subsystems is not allowed.

6.6. Atoquence of the main channel line should be no more than 18 dB for a speed of 500 kbps.

6.7. The total attenuation made by each branch from the line of communication of the trunk channel should not exceed 0.1 dB, including attenuation, determined by the quality of the docking point, attenuation on the branch and attenuation, depending on the input-output parameters of the coordination schemes.

6.8. Branch from the main channel line must be made by a coaxial cable with a wave resistance of 75 ohms. The length of each branch is not more than 3 m. The total length of all branches is included in the total length of the main channel. Connection to the communication line should be carried out using RF connectors. Disconnecting any of the subsystems should not lead to a communication lines.

6.9. Communication controllers must contain reception-transmit amplifiers providing:

the sensitivity of the reception, no worse ............................................ ............. 240 mV

output level ................................................. ........................... from 4 to 5 V

output resistance .................................................. .............................. (37.50 ± 1.88) Ohm

6.10. The generation of electrical signals for transmission to the trunk channel is made by modulating the clock frequency by the signals of the transmitted message. Each bit of the transmitted message corresponds to a complete period of the clock frequency, with the front and rear edges of the transmitted signal must match the transition through the zero clock frequency (damn 6). The correspondence of the symbols taken from the main channel, the meaningful states are set as follows:

the symbol "0" corresponds to the opposite phase relative to the previous symbol,

Industrial data networks are one of the main elements of modern ACS TP. The emergence of industrial communication protocols laid the initiation of territorially distributed control systems capable of covering many technological installations, combine entire workshops, and sometimes plants. Today, the sphere of industrial communications is developing with seven-world steps: more than 50 standards of communication networks are known specially adapted for industrial applications, new progressive data transmission technologies appear each year. This is not surprising, because it is the communication networks that determine the quality, reliability and functionality of ACS TP as a whole.

Data networks used in TP ACS can be divided into two classes:

  1. Fieldbuses (field buses);
  2. Network top level (operator level, Terminal Buses).


1. Field tires

The main function of the fieldbus is to provide network interaction between controllers and remote peripherals (for example, input / output nodes). In addition, various instrumentation and actuators (field devices) are connected to the field bus (Field Devices), equipped with appropriate network interfaces. Such devices are often called intelligent field devices, as they support high-level network metabolism protocols.

As already noted, there are many standards of field tires, the most common of which are:

  1. PROFIBUS DP;
  2. PROFIBUS PA;
  3. Foundation fieldbus;
  4. Modbus RTU;
  5. HART;
  6. DeviceNet.

Despite the nuances of the implementation of each of the standards (data transfer rate, frame format, physical environment), they have one common feature - used by the network exchange algorithm based on the classical principle of Master-Slave or its small modifications. Modern field tires satisfy strict technical requirements, thereby becoming possible to exploit them in heavy industrial conditions. These requirements include:

1. Deterministration. Under this implies that the transfer of messages from one network node to another takes a strictly fixed segment of time. Office networks built using Ethernet technology is an excellent example of a non-deterministic network. The algorithm of access to the shared medium according to the CSMA / CD method does not determine the time for which the frame from one node of the network will be transferred to another, and, strictly speaking, there are no guarantees that the frame will reach the addressee. For industrial networks it is unacceptable. The transfer time must also be limited and generally, taking into account the number of nodes, data transfer rates and the length of the messages, can be designed in advance.

2. Support for large distances. This is a significant requirement, because the distance between the control objects can sometimes reach a few kilometers. The applied protocol must be focused on using a large amount of extent.

3. Protection against electromagnetic tips. Long lines are particularly susceptible to the adverse effect of electromagnetic interference emitted by various electric units. Strong interference in the line can distort the transmitted data beyond recognition. For protection against such interference, special shielded cables are used, as well as fiber, which, by virtue of the light nature of the information signal, is generally insensitive to electromagnetic tips. In addition, in industrial networks, special methods of digital data encoding should be used, which prevent their distortion in the transmission process or, at least, to effectively detect distorted data by the receiving node.

4. Hardened mechanical design of cables and connectors. Here, too, there is nothing surprising, if you imagine, in what conditions it is often necessary to put communication lines. Cables and connectors must be durable, durable and adapted for use in the most difficult conditions (including in aggressive atmospheres, in an increased level of vibration, humidity).

By type of physical data transmission medium, field tires are divided into two types:

  1. Field tires built on the basis of a fiber optic cable. The advantages of using fiber optic are obvious: the possibility of building extended communication lines (length of up to 10 km or more); Large bandwidth; insensitivity to electromagnetic interference; The possibility of laying in explosive zones. Disadvantages: relatively high cable cost; The complexity of the physical connection and connecting cables. These works must be carried out by qualified specialists.
  2. Field tires built on the basis of the copper cable. As a rule, it is a two-wire "twisted pair" type cable with special insulation and shielding. Benefits: acceptable price; Ease of laying and performing physical connections. Disadvantages: subject to electromagnetic filing; limited length of cable lines; Ligger compared to fuel bandwidth.

An example of a module that ensures the connection of the SIMATIC S7-300 controller to the PROFIBUS DP network with fiber optic cable, is the CP 342-5 FO communication processor. To connect S7-300 to the PROFIBUS DP network with copper cable, you can use the CP 342-5 module.


2. top-level networks

The top-level network of the ACS TP is used to transfer data between controllers, servers and operator workstations. Sometimes such networks include additional nodes: the central archive server, the server of industrial applications, engineering station, etc. But these are options.

What networks are used at the top level of ACS TP? Unlike the standards of field tires, there is no special diversity here. In fact, most top-level networks used in modern ACS TP are based on Ethernet Standard (IEEE 802.3) or more fast variants Fast Ethernet and Gigabit Ethernet. In this case, as a rule, the TCP / IP communication protocol is used. In this regard, the network of the operator layer is very similar to ordinary LANs used in office applications. The wide industrial use of Ethernet networks is due to the following obvious moments:

1) Industrial top-level networks combine many operator stations and servers, which in most cases are personal computers. Ethernet standard is great for organizing similar LANs; To do this, it is necessary to provide each computer only network adapter (NIC, Network Interface Card). Many modern controllers have communication modules to connect to Ethernet networks (for example, CP 343-1 communication processor allows you to connect S7-300 to Industrial Ethernet network).

2) There is a large selection of inexpensively on the market. communication equipment For Ethernet networks, including specially adapted for industrial applications.

3) Ethernet networks have a high data transfer rate. For example, the Gigabit Ethernet standard allows you to transmit data at a speed of up to 1 Gb per second when using a twisted pair of category 5. How will it seek on, big bandwidth Network becomes Extreme an important point For industrial applications.

4) Using at the top level ACS TP Ethernet network provides the possibility of a simple docking network of ACS TP with local Network Plant (or enterprises). As a rule, the existing LAN plant is based on the Ethernet standard. The use of a single network standard allows you to simplify the integration of TP ACS into the general network of the enterprise.

However, industrial over-level industrial ACS networks have its own specificity due to the conditions of industrial use. Typical requirements for such networks are:

1. Big bandwidth and data transfer rate. The volume of traffic directly depends on many factors: the number of archived and visualized technological parameters, the number of servers and operator stations used applied applications, etc. Unlike field networks of the hard requirement of deterministicity, there is no: strictly speaking, no matter how much time will take the transfer of messages from one node to another - 100 ms or 700 ms (naturally, it does not matter while it is in reasonable limits). The main thing is that the network can generally cope with the total traffic for a certain time. The most intense traffic goes through the network sites connecting servers and operator stations (clients). This is due to the fact that at the operator station, technological information is updated on average once per second, and several thousand can be transmitted technological parameters. But here there are no rigid temporary restrictions: the operator will not notice if the information is updated, say, every one and a half seconds instead of the one. At the same time, if the controller (with a scan cycle of 100 ms) will face a 500-Milisecond delay in the receipt of new data from the sensor, this may lead to incorrect operation of control algorithms.

2. Failure tolerance. It is achieved, as a rule, by reserving communication equipment and communication lines according to the circuit 2 * n so that in case of failure of a switch or channel break, the control system is capable of shortening (not more than 1-3 c) to localize the refusal location, perform automatic Perestroika topology and redirect traffic to backup routes.

3. Compliance with network equipment with industrial operating conditions. Under this implies such important technical measures as: - protection of network equipment from dust and moisture; - Advanced temperature range of operation; - increased cycle of life; - the possibility of convenient mounting on a DIN rail; - low-voltage nutrition with the possibility of reservation; - Durable and wear-resistant connectors and connectors.

The functions of industrial network equipment are practically no different from office analogs, however, due to special execution, it costs somewhat more expensive. Figure 1 shows for example the photograph of network switches of industrial design, providing support for the redundant network topology.

Fig.1 Industrial switches Scalance X200 manufactured by Siemens (left) and LM8TX from Phoenix Contact: Installation on DIN Rake

Speaking about industrial networks built on the basis of Ethernet technology, the term Industrial Ethernet is often used, thereby hinting at their industrial purpose. There are now extensive discussions about the allocation of Industrial Ethernet in a separate industrial standard, but at the moment Industrial Ethernet is only a list of technical recommendations for the organization of networks in production conditions, and is, strictly speaking, informalized addition to the physical level specification of the Ethernet standard.

There is another point of view on what Industrial Ethernet is. The fact is that in recent times there are many communication protocols based on the Ethernet standard and optimized to transmit the data critical to the time. Such protocols are conventionally called real-time protocols, bearing in mind that with their help, you can organize data exchange between distributed applications that are critical to the execution time and require a clear time synchronization. The ultimate goal is to achieve relative determination during data transmission. As an example, Industrial Ethernet can be given:

  • PROFINET;
  • Ethercat;
  • Ethernet PowerLink;
  • Ether / ip.

These protocols modify the standard TCP / IP protocol in varying degrees, adding new network exchange algorithms, diagnostic functions, self-correcting methods, and synchronization functions. In this case, the channel and physical levels of Ethernet remain unchanged. This allows you to use new data transmission protocols in existing networks Ethernet using standard communication equipment.

Software ACS MS It is a client-server solution built on the MS SQL Server platform of versions 2005 and higher and ensuring the separation of data access rights metrological service enterprises. The versions of the MS ACS complex are provided for working with a single and distributed database (database volume - up to 150,000 s). The MS ACS functionality provides accounting, planning, maintenance control, analysis of the dashboard state. Special task "Accompanying SI" for a testing laboratory allows minimizing labor costs for data entry and paperwork on service results. User's right to work in various sections of data are configured by the ACS administrator, depending on the specifics of the metrological service organization.


The MS ACS interface allows you to receive, depending on the task, any information section data and form reports on them. The universal filter is supplemented with a simplified sampling function. The following degrees of freedom are provided in setting up the screen form: Definition of the required set of tabs, columns, as well as the order of their following and width, sorting data for any combination of columns and any data selection in the table. Events MK, repairs, failures, then displayed on the screen in table forms, with the ability to analyze accumulated statistics.

The electronic passport Si in addition to the main accounting information and maintenance regulations, contains:

  • The history of events in operation.
  • List of component devices (in case it is a passport for a kit or channel).
  • Links to passports of channels or complexes (if the device is included in the channel).
  • Set of measured parameters.
  • The number of precious metals.
  • Additional characteristics of C.

The administrator of the ACS MS determines the accounting policies and adjusts the image of the passport, hiding unnecessary fields and tabs.

Graphs of metrological control and repairs can be formed using calibration (repair) cycles. The schedule is formed. Based on graphs and tariffs stored in the database, scheduled maintenance costs are calculated. Main costs for maintenance are calculated based on graphs and time standards stored in the database.

Reports in ACS MS are formed using the FastReport generator; set and column width, font, color, etc.; Reports are stored in RTF, XLS, HTML formats. Report library included in the package of MS ACS can be supplemented by user requests.