Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
I&C Safety Guide DRAFT 20110803.doc
Скачиваний:
13
Добавлен:
01.02.2015
Размер:
720.38 Кб
Скачать

Digital computer systems and digital equipment

8.59. SSR 2/1 requirement 63 states:

If a system important to safety at the nuclear power plant is dependent upon computer based equipment, appropriate standards and practices for the development and testing of computer hardware and software shall be established and implemented throughout the lifetime of the system, and in particular the software development cycle. The entire development shall be subject to an appropriate quality management system.

Digital computer system functions

8.60. The use of computer-based systems for NPP I&C functions provides advantages that include functional flexibility to provide complex functions, improved plant monitoring and operator interfaces, low physical size and low cabling needs. They can have test and self-check functions that improve reliability.

8.61. Chapters 2 and 6 give guidance on quality management systems for all I&C systems including computer based systems. Chapter 10 gives guidance on software development for I&C systems.

8.62. Computer-based systems should behave deterministically with regard to functions and timing.

8.63. The design of computer systems should ensure that the system will meet the system’s design basis response time and accuracy requirements in all specified operating conditions.

8.64. Response time and accuracy of computer-based systems are heavily influence by sample rate and processor speed.

8.65. The full scope of individual component failures (e.g., computer processors) should be addressed in the design and analysis of computer-based systems.

8.66. Digital computer systems may use one set of equipment to perform numerous system functions. A disadvantage of this is that if one component goes out of service, several functions might fail simultaneously.

8.67. Failure of data communication channels or computers could prevent all data communication or all computer control. It is therefore necessary for the operators to be able to shut down the plant, and to be certain it has shut down, if this is a credible failure in the design basis.

8.68. Specific skilled staff should be available during operation to allow controlled software and configuration data changes to be made when necessary to computer based systems.

8.69. Loss of power or restart of a computer-based system should not result in modification of configuration data.

Fault detection and self-supervision

8.70. Computer based systems should detect and report their faults and failures in a timely manner.

8.71. Computer based systems should be provided with an alarm covering major redundancy failures.

8.72. When a fault in a system or equipment is detected by self-supervision, appropriate action should be taken.

8.73. Actions taken upon detection of faults by self-supervision should be identified in the system or equipment functional specification, and should be subject to the design requirements and verification appropriate to the importance to safety.

8.74. Fault detection and self-supervision features should not adversely affect the ability of a computer system to perform its safety function, and should not cause spurious actuations of the safety function.

Data communication

8.75. Data communications systems should behave deterministically with regard to functions and timing.

8.76. Data communication channels should satisfy the recommendations for independence given in paragraphs 7.21-7.47.

8.77. The design of the data communications should provide for detection and rejection or correction of invalid, inauthentic, and corrupted data.

8.78. If communications systems encrypt data or use proprietary protocols, these features must not prevent detection of errors.

8.79. The design should ensure that errors and failures of transmission and of the data communication equipment are detected and that suitable alarms are provided to the operators and records made for analysis of performance.

8.80. It is necessary to consider both operational and security implications of alarms and failures when determining what is to be alarmed and recorded. It might not be necessary, or practical to alarm and record every error or failure. Errors that are consistent with the expected normal behaviour of the communications technology or protocol need to be recorded, but need not be alarmed.

8.81. Checking of data communication should be done as a continuous process on each message sent and received by means of an automatic self-check function.

8.82. Features for the detection and correction of errors can be used to improve the reliability of signal transmission.

8.83. Self-checking methods should be appropriate for the use of the data and the frequency of demand for the safety functions being performed by the system.

8.84. Data communications technology should be chosen and suitably configured to ensure that it is capable of meeting, under all possible conditions of data loading, the design basis reliability and time response requirements.

8.85. The selection and use of more complex technology might offer functional advantages but might also introduce additional failure modes and validation difficulties.

8.86. Where data communication is used to execute operator actions, the design should ensure that the longest time from operating the control to receipt of confirmation of its action is acceptable to the operators.

8.87. Data links should be redundant to the extent necessary for systems supported by the data links to meet their design basis reliability requirements.

Communications features in safety systems

8.88. In systems performing safety functions, the processors that perform safety calculations or logic should be distinct and separate from those that perform communication handshaking or interrupt functions.

8.89. Often this recommendation is accomplished by using two processors that share data via carefully controlled access to shared memory. One processor is dedicated to performing the safety function and the other is dedicated to data communications tasks.

8.90. Separation of calculation and logic functions from communications and interrupt functions prevent errors in these later functions from disrupting the deterministic processing of safety calculations or logic functions. This separation, sometimes called buffering, ensures that faults and failures on the communication originating outside the safety division do not propagate to the processors that implement safety functions within the division, thus maintaining the integrity of the safety functions.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]