CA1327399C - Method and apparatus for monitoring the operating environment of a computer system - Google Patents

Method and apparatus for monitoring the operating environment of a computer system

Info

Publication number
CA1327399C
CA1327399C CA000572682A CA572682A CA1327399C CA 1327399 C CA1327399 C CA 1327399C CA 000572682 A CA000572682 A CA 000572682A CA 572682 A CA572682 A CA 572682A CA 1327399 C CA1327399 C CA 1327399C
Authority
CA
Canada
Prior art keywords
sensor
computer system
sensors
alarm
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CA000572682A
Other languages
French (fr)
Inventor
Martin L. Fasack
Robert G. Voll
William A. Rutz
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bull HN Information Systems Inc
Original Assignee
Bull HN Information Systems Inc
Honeywell Bull Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=22130754&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CA1327399(C) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Bull HN Information Systems Inc, Honeywell Bull Inc filed Critical Bull HN Information Systems Inc
Application granted granted Critical
Publication of CA1327399C publication Critical patent/CA1327399C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3058Monitoring arrangements for monitoring environmental properties or parameters of the computing system or of the computing system component, e.g. monitoring of power, currents, temperature, humidity, position, vibrations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0751Error or fault detection not based on redundancy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0751Error or fault detection not based on redundancy
    • G06F11/0754Error or fault detection not based on redundancy by exceeding limits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0751Error or fault detection not based on redundancy
    • G06F11/0754Error or fault detection not based on redundancy by exceeding limits
    • G06F11/0757Error or fault detection not based on redundancy by exceeding limits by exceeding a time limit, i.e. time-out, e.g. watchdogs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0751Error or fault detection not based on redundancy
    • G06F11/0754Error or fault detection not based on redundancy by exceeding limits
    • G06F11/076Error or fault detection not based on redundancy by exceeding limits by exceeding a count or rate limit, e.g. word- or bit count limit
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/22Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
    • G06F11/2294Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing by remote test
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • G06F11/324Display of status information
    • G06F11/327Alarm or error message display
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • G06F11/324Display of status information
    • G06F11/328Computer systems status display
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging

Abstract

ABSTRACT

A method and apparatus for automatically monitoring the operating environment and other physical conditions around and in which a host computer system operates is disclosed.
Sensors located around a computer system, including inside equipment cabinets and under the floor where cabling and air are ducted, are used to collect data that is frequently and periodically collected and stored along with an indication of the time and date of collection. The stored data is checked against a list of environmental parameters for the location of each sensor and an indication given when measurements indicate an environmental condition is outside discrete limits and rates of change of conditions. The stored parameters may be changed at any time from a console of the computer system. The stored data is also used to prepare histograms that are used to indicate trends in environmental conditions that can point to potential problems that may then be remedied before actual problems arise, and to faulty computer system installation design.
Generation of histograms may be requested from remote locations via telephone links and then forwarded over the links to the remote locations for analysis. Trouble conditions indicated by out of parameter limits checking causes alarms to be given at the computer site and to be selectively sent to remote sites to initiate remedial action. In addition, a failsafe monitoring operation monitors the communications between the computer system and the monitoring apparatus to detect troubles.

Description

~` 1 327399 o .

1 METHOD AND APPARATUS FOR MONITORING ~HE
OPERATING ENVIRONMENT OF A COMPUTER SYSTEM

Field of the Invention This invention relates to computer system protection, and more particularly to equipment functioning with a computer system for monitoring the environment in which the computer system operates to provide early warning of environmental conditions that can damage components of the computer system.

Back~round of the Invention In the prior art, large computer systems and large installations of a number of smaller computer systems and related peripheral equipment have suffered component and/or system failures caused by improper environmental operating conditions Probably the most common of these failures is caused by excessive heat buildup in computer rooms and is caused by air conditioning system failure, or by improper air flow to some pieces of equipment. There exists little in the present art for minimiæing failures caused by improper operating environment conditions except, for example, computer system operating personnel manually monitoring computer room temperatures and taking action when the temperature rises beyond an acceptable level. The effectiveness of such manual monitoring is limited because the system operating personnel are not always present in the computer room, particularly at times like weekends, and because some computer installations are remote and do not have system personnel on site every day. In addition, such manual temperature monitoring is also limited because a ~. .

1 thermometer only reads the temperature at the spot at which it is mounted, and local "hot spotsR inside of particular equipment cabinets are not detected before failure of the equipment inside cabinets. In addition, before a piece of equipment fails, excessive temperatures inside a cabinet caused by a "hot spot~ cause a particular piece of equipment to operate as to introduce errors in the data output from the equipment, and from other equipment in the computer room that cooperate therewith.
Such computational problems and equipment failures caused by excessive temperatures are costly in terms of failed equipment that must be repaired or replaced, in terms of unreliable data output from the computer system, and in terms of computer system ~down time~. Accordingly, there is a need in the art for a computer system environment monitoring arrangement that can monitor different computer system environmental operating conditions at many points around and inside component parts of the computer system without constant human interaction. Such a monitoring arrangement should provide an output identifying what and where a potentially dangerous environmental operating conditions exist. This permits correction of problems before there is failure of equipment exposed to the excessive environmental operating condition, and minimizes errors caused by equipment subject to improper environmental operating conditions. In addition, there is a need in the art for a computer system environmental monitoring acrangement that can store data received from the outputs of a variety of sensors around and in a computer system. The stored data can be used to determine if rates of change of different environmental conditions are dangerous and need immediate attention. In addition, the stored data fcom the -` 132739~

1 sensors can be used to create histograms showing trends in the operating environment of the computer room and in individual pieces of equipment therein.

Summary of the Invention The above stated and other needs of the prior art are satisfied by the present invention which is a cGmputee environment monitoring system that cooperates with a host computer so that the host computer controls monitoring and analysis. This novel monitoring system utilizes a plurality of sensors of different types~ such as air flow and temperature sensors, located in many places around a computer room, such as in equipment cabinets and in air plenums. The signals output from the sensors are periodically scanned using a sensor interface device and the data from the sensors is stored by the host computer system.
When the outpu~ from any sensor exceeds a predetermined level, as determined by the host computer while running an analysis program, an alarm is given to make the computer system operating personnel aware of the condition while identifying the location and type of problem at the main console of the computer system. In addition, when rates of change of environmental conditions sensed by the sensors exceed predetermined rates, an alarm is given. Alarms from unattended computer installation site~ are forwarded to attended locations using an autodialer.

The host computer system stores the data received from the sensors of the computer environment monitoring system and can then use the data to develop a histogram for each sensor showing change trends in the environment monitored by each sensor. These histograms can be analyzed and show 1 3 2 7 3 9 ~ 72434-83 potential problems before they become actual problems. In this manner corrective actions may be taken before potential problems turn into real problems. Sensor his~ory data stored by the host computer system at unattended computer installation sites may be retrieved for analysis over a ~elephone line and modem connected to the unattended computer system. In addition, these histograms may be used to identify faulty computer installation designs so that installation design changes may be made before any problems occur.
In accordance with the present invention, there is provided a method for monitoring an operating environment of a computer system that includes a computer facility housing a central processor and memory for storage of data and programs, said method comprising the steps of: utilizing monitoring equipment for generatinq indicator signals indicating a state of a plurality of environmental condltions in and around said computer system including its environment using a like plurality of sensors; storing over a period of time said indicator signals periodically generated by said sensors along wlth signals indicating the date and tlme that each of said indicator signals were stored; checking said indicator ~ignals to determine if the environmental conditions they indicate exceed one or more predetermined levels including predetermlned rates of changeover a predetermined period of time and predetermined fixed levels;
providing an alarm indication when said checking indicates that any of said indicator signals has exceeded any of said predetermined levels; and producing a histogra~ for each sensor i , using the stored indicator signals from each sensor and the time and date signals associated therewith, said histograms indicating environmental trends in said computer system which can point to potential troubles in the operatlng environment of the computer system, which potential troubles may be rectified before they actually become troubles that cause damage to the computer system.
DescrlPtion of the Drawinq The invention will be better understood upon reading the following detailed description in conjunction with the drawing in which:
FIGURE 1 shows a block diagram schematic of the apparatus functioning with a host computer for monitoring the operating environment of a computer system;
FIGURE 2 is a pictorial representation showing part of a computer room and where environment monitoring and other types of sensors may be located therein;
FIGURE 3 is a table showing the contents of a portion of a working table in which is stored information regarding the associated sensor;
FIGURE 4 is a flow chart showing the steps in the operatlon of a scanning program used to obtain and ~tore the digitized outputs from sensors;

4a ' ` 1327399 1 FIGURE 5 is a flow chart showing the steps in analyzing stored data to determine if any sensor measurements indicate a situation for which alarms are to be energized; and FIGURE 6 is a flow chart showing the steps in an alarm reset program;

FIGURE 7 is a flow chart showing the steps in generating a histogram of the readings from a sensor: and YIGURE 8 is a flow chart showing the steps in operating a failsafe timer.

Detailed Description In Figure 1 is shown a detailed block diagram of the novel apparatus for monitoring the environment in which a computer system operates. The apparatus comprises a sensor interface device (SID) 10 which is preferably a commercially available SID2000 ava~lable from the Microswitch Division of Honeywell, Inc. in Freeport, Illinois. A plurality of sensors 11 through 14 are used to provide inputs to SID 10 regarding environmental and other conditions in which a host computer system 17 operates.
Sensors 11 - 14 are exemplary only and a wide variety of sensors may be utilized. For example, the sensors may monitor environmental conditions such as temperature, humidity, air flow, liquid level and airborne particulate matter. In addition, other types of sensors may monitor other conditions such as door openings and DC and ~C power supply voltage levels. All these types of sensors are well - 1~27~99 1 known in the art and are not described in detail herein.
When more sensors are used than can be handled by a single SID 10, more SID 10 devices may be added.

In Figure 1 exemplary analog output sensors 11 and 12 are connected to inputs of input analog module 15, and exemplary direct contact output sensors 13 and 14 are connected to inputs of input direct current module 16.
Signals outputs from analog sensors 11 and 12 are in analog form and must be converted to digital form before being input to processor 18 within sensor interface device 10.
Input analog module 15 has a plurality of analog-to-digital converters and converts the analog signals input to it from analog sensors 11 and 12 into the required digital format.
Sensors 11 and 12 are exemplary only and a number of types of analog sensors may be connected to the inputs of module 15. Examples of the types of analog sensors that provide analog output signals are listed in the last paragraph.
However, in the prior art, sensors measuring a given environmental condition may be found that provide binary signal outputs rather than analog signal outputs. Binary signal output sensors have their outputs connected to an input direct current module.

In the preferred embodiment of the invention the temperature sensors may be Model TD2A sensors available from the Microswitch Division of Honeywell, Inc. These temperature sensors are nothing more than variable resistors and the outputs of the temperature sensors are not applied directly to an input analog module 15. To convert the resistance of the temperature sensors to a voltage for application to input analog module 15, a transmitter box (not shown), Model X82825 available from Microswitch 32739~

1 Division is used. The transmitter box converts the resistance output from a temperature sensor to a voltage which can then be digitized by module 15. Another analog output sensor is a humidity sensor which is a Model HMW20U
sensor available from Vaisala Corp. in Woburn, Massachusetts. Still another type of analog output sensor is an air flow indicator. Input analog module 15 is a Model SID-IAN-10-5 also available from the Microswitch Division of Honeywell, Inc.
The liquid level sensor that is used in the preferred embodiment of the invention is a Model D901 liquid detector available from Honeywell, Inc. in Newhouse, Scotland. The liquid level sensor is a zero to five volts direct current sensor so is connected to an input of input direct current module 16. An open door sensor is also a direct current sensor and is also connected to an input of direct current module 16. Open door sensors are widely available from many sources and provide an open or a closed contact when a door is opened. Module 16 responds to an open contact to output one binary number, and responds to a closed contact to output a second binary number to module 16. Direct current module 16 is a Model SID-IDC module available from the Microswitch Division of Honeywell, Inc.
Buffer module 29 is a Model SID-BUF ~uffer Module available from the Microswitch Division of Honeywell, Inc.
In addition, the stored program in memory 19 is also responsive to trouble indication signals received from host computer 27 to enable alarm functions. An output module 20 is responsive to alarm enable signals to activate alarms.
More particularly, output module 20 is a direct current module and closes contacts to activate a visual alarm 22, an 1 audible alarm 58, or an auto dialer 23 to send a pre-recorded message to a remote site. Output module 20 is a Model ORY-H module available from the Microswitch Division of Honeywell, Inc. Auto dialer 23 is configured to periodically place a pre-recorded trouble message call to a remote site until it is disabled from doing so.
Accordingly, after the personnel at the remote site receive the pre-recorded trouble message via telephone, they must dial back to auto dialer interface 54 and transmit a coded tone signal that stops auto dialer 23 from recalling the remote site. The receipt of the acknowledgement call back causes processor 18 to store an indication of the receipt of the same Host processor 27 queries processor 18 to determine if the acknowledgement call back has been received and, if the answer is affirmative, stores an indication including time and date of the call back message in an appropriate record in a history file in main memory 25.
Thiq provides a record that the alarm call was made and acknowledged. To permit auto dialer 23 to receive a call b~ck another module is needed. It is a Model X8670g autodialer interface 54 that is available from the Microswitch Division of Honeywell,Inc. and is connected between autodialer 23 and the telephone line.

A host computer system 17 is served by the environment monitoring equipment described in the previous paragraphs.
System 17 is shown in a very simple form since computer systems are so well known in the art. In this very simple form there is a host processor 27 which is accessed via an I/O processor in a manner well known in the art. Processor 27 has a main memory 25 associated therewith which may be made up of many of the types of memory presently used in computer systems. Main memory 25 is used to store programs 1 and data used in the normal operation of host processor 27.
In addition, main memory 25 is also used to store a number of program and data files ~or the operation of the environmental monitoring apparatus described herein. These data files include a sensor history file that is used to store the digitized sensor signals originally generated by sensors 11 through 14 and sent to host computer system 17 for storage and analysis, a sensor library file, a point table file, and a history file copy. The history file contains many individual records, one per sensor, to store the signals from the particular sensor.

Interface converter 30 is provided to perform a COmmUniCatiQn format translation function~ Converter 30 is a Model 422-232 converter available from California Networks Controls in Torrance, California. Digitized sensor data temporarily stored in buffer module 29 has its communication format converted by converter 30, and is output therefrom to a communications processor 24 which operates to pass the digitized sensor data to host computer system 17. Processor 24 is a Model DataNet 8 communication processor available from Honeywell Inc.

Digitized sensor data forwarded to host computer system 17 via its I/O processor 26 is stored in associated records in a history data file (HIST) and in a working copy table in main memory 25. There is record in the HIST file and working copy table for each sensor. A program named SCAN
also stored in main memory 25 controls obtaining and storing the digitized data from all active sensors. The SCAN
program also handles communications to console 28, and initiating any autodialer, visual and audible alarm enable requests to sensor interface device tSID) 10.

`-~ 1 327399 Periodically, responsive to the SCAN program stored in main memory 25, host processor 17 sends requests via circuits 26, 24, 30 and 29 to processor 18 in SID 10.
Processor 1~ responds to these requests to scan the sensors and send the data in binary form output from modules 15 and 16 to host processor 27. The sensor data is returned over the same communication path to host processor 27 which, under control of the SCAN program, stores the data in the appropriate records of the history data file in main memory 25. The time interval for requesting processor 18 to read and forward sensor data may vary from a short time such as one minute or less to a longer time such as five minutes or more as decided upon by the owner of host computer system 17. As digitized sensor data is received, host processor 27 under control of the SCAN program attaches the date and time that the data was received and stores them all in the appropriate records of the history file (HIST) in main memory 25. The newest five sets of sensor data are also stored in fields of a working copy table These files and their records are discussed in more detail further in this specification~

The signals passed back and forth between host computer system 17 and sensor interface device 10 is in a particular communication format as defined in the SID2000 specification sheets available from Honeywell - Microswitch Division. The communication format has a ficst field which contains a leading framing character of two bytes in length. The framing character is two colon symbols (::) when host computer 17 is sending a request to SID 10 When SID 10 is sending data or information to computer system 17 other symbols are used. Two pound symbols (##) are used as the - ln -.

1 leading framing character by SID 10 when responding to a sensor data request from host computer 17. Two dollar symbols ($$) are used as the leading framing character when SID 10 is sending an error message to host computer 17, and two percent symbols ~%~) are used as the leading framing character when SID 10 is sending other types of messages to computer system 17~

The second field of the communication format has two bytes that are for addressin5 purposes and are used only when there are more than one interface device 10, to identify a particular one of the devices 10. In addition, these two bytes are used only when a request is being sent to a device 10. When there is only one device 10 ~01~ is placed in this field. The third field is a command field having two bytes that is used to specify a command from host computer 17 for device 10 to perform. when device 10 transmits to computer 17, the third field has two zeros therein. The fourth and fifth fields each have two bytes, but these two fields are reserved and are not used at this time. The sixth field has two bytes that are used to - specify the number of bytes in the following data field.
The seventh field is the data field and has a length as specified by the sixth field. The data field is used to convey whatever data or other information is necessary to execute the command specified in field three. An example of the data is that read from a sensor. The eighth field is a checksum field of two bytes which is the twos complement of fields 2 through 7. The last and ninth field is for a trailing framing character to mark the end o the communication format. It is carriage return (C~R) when the . ~ 132739~

1 transmission is from SID 10 to host computer system 17, and is a question mark (?) when the transmission is from host computer system 17 to SID 10.

When the environment monitoring system is initially installed, a sensor library (SLIB) is created which contains numerous information about each kind of sensor and its alarm limit levels. The sensor library file has one record for each kind of sensor, and the makeup of a record is described further in the specification with reference to Figure 3.
Once the environment monitoring system is functioning the contents of the SLIB are transferred to working records.
There is a working record associated with each sensor. Each working copy table has information originally obtained from a point table (PTBL) file that is used to hold information transferred from the SLIB for the particular type of associated sensor plus the latest five readings from the particular sensor. In addition, all sensor readings, including the latest five readings, are stored in the appropriate records in history file (HIST) associated with the same sensor.

After the digitized sensor data, and date and time signals for each sensor are received, initially processed and stored in the HIST file and the working copy table, the SCAN program is ended and goes to sleep to be rerun any predetermined time later, which may advantaqeously be one minute. The SCAN program is described in greater detail further in this specification with reference to Figure 4.
Host processor 27 then runs an ANALYSIS, program to check the stored sensor data. To check the stored sensor data the sensor information in the point table (PTBL) is used. Each of the sensors 11 through 14 has a point table as part of 1 its working copy table as previously mentioned. The point table may be modified at any time from console 28 while the environmental monitoring equipment is in operation.

When an alarm condition occurs and a computer site is unattended an alarm signal is immediately sent to processor 18 that causes autodialer 23 to be activated and forward a recorded alarm message to a remote site as previously described. If the computer site is attended an alarm message is first ~iven at CRT 56 of console 28. When the visual alarm message at CRT 56 is not acknowledged before several readings from the sensor are received, the program then causes a visual alarm enable signal to be sent to processor 18 in SID 10. The visual alarm enable signal causes processor 18 to activate a major visual alarm 22, via output module 20 which may be a flashing light on a pillar or wall as represented in Figure 2. When the major visual alarm still does not cause the alarm condition to be acknowledged at console 28 within a predetermined period of time, an audible alarm enable signal is generated and forwarded to SID processor 18 which causes activation of audible alarm 58 via output module 20. This audible alarm is loud enough that it should get the attention of the maintenance personnel who should acknowledge it at console 28. Upon an alarm at any level being acknowledged at console 28, the subsequent alarms are not activated. In the worst case, if the loud audible alarm is not acknowledged at the attended computer site within a predetermined period of time, still another alarm enable signal is sent to processor 18 in SID 10 which causes autodialer 23 to be enabled to pass the alarm condition on to a remote location. Auto dialer 23 is set up so that when it is energized it initiates a telephone call to the remote attended site and ~ 13~7399 1 plays a pre-recorded message indicating the alarm. Auto dialer 23 will periodically recall the remote site to place the same alarm message call until it is disabled from doing so. To disable autodialer 23, the maintenance person at the remote site who receives the alarm message call dials back to auto dialer interface 54 and, when auto dialer interface 54 answers the call, sends a specific touch tone signal.
Auto dialer ~3 responds to the touch tone signal via control from autodialer interface 54 to stop repeating the alarm message call. Processor 1~ stores an indication of the message acknowledgement and the number of times that the call was repeated until acknowledged. Host processor 27 periodically interrogates SID processor 18 and retrieves this information which it then stores with a time and date stamp in the appropriate records of the history file, and in the working copy table in main memory 25 for the sensor that caused the alarm. Thereafter, it is up to the maintenance personnel at the remote site to initiate remedial action.

After the periodic collection and storage of each set of sensor data from all sensors via SID 10, host processor 27 under control of the ANALYSIS program first compares the most recently received sensor data, which is stored in the working copy table for each sensor, with the maximum, minimum and rate of change values stored in the previously described point table (PT~L) for the associated sensor.
Initially, some of the stored values in each point table are de~ault values, but the owner of the computer system may initially or at a later time set the default values to other values as they wish.

For sensors cuch as open door and liquid level there are no minimum and rate of change values. A water pipe or 3~7399 ., 1 the air conditionin~ system in the room in which computer system is located may become faulty and leak into an underfloor space below the computer system where all cabling and some conditioned air is routed. A liquid level sensor is located under the floor and detects the presence of the water. With water present there is a closed switch that causes a first binary digit to be output from input direct current module 16. When no water is detected there is a second binary digit output from direct current module 16.
These binar~ digits are zero and one. When host processor 27 under control of the ANALYSIS program checks the most recently stored binary number from each liquid level sensor and detects the first binary number it knows watee is present and action is taken. Host processor 27 first displays the alarm message at C~T 56. Subsequent alarm actions caused by non-acknowledgement of the alarm message are described in a previous paragraph.

Periodically, as desired, the maintenance personnel or system owner can initiate a request causing a histogram program to read out the stored sensor data in the senso records in the history file for all or specified ones of the sensors and create histograms showing how the data is changing over a specified period of time for the specified sensorC. The histogram is display~d on CRT 21 or other video terminals (not shown) that are connected to host computer system 17, and the histogram may also be routed to a printer 55 at the console for a hard copy printout.
Alternately, maintenance personnel at a remote site may place a data call via a telephone line to modem 31, be connected to host processor 27 via communication processor 24 and I/O processor 26, and request that the histogram program be run by processor 27. The resulting histogram is i... ~
13~7399 1 then transmitted via modem 31 to the remote site for display thereat. The maintenance personnel, either local or remote, analyze the histograms to determine the state of the environmental conditions being monitored and can identify potential environmental problems before they actually become problems causing damage and causing computer down time.
Remedial action may then be initiated to make changes that will prevent the problems from occurring. This maximizes up time for the computer system and also minimizes lost or damaged data caused by system components that have failed.

Other than monitor environmental conditions, sensors may also be used to monitor operating conditions within components of the host computer system For example, DC
lS voltage levels from power supplies, and AC power supply levels may be monitored to make sure that their outputs stay within defined voltage specifications. In addition, access doors to the computer room and particular pieces of computer equipment may be monitored to detect when they are opened.
Up to this point in the detailed description, all the records and files in main memory 25 used for the operation of the novel environment monitoring system have not been described. There is one record associated with each sensor.
Briefly, within each record it has been mentioned that there is stored sensor data collected from each of the sensors.
When there is no change in the level of the output from a sensor, all new readings are not stored until there is a change. Only readings once an hour are stored from the non-changing sensors until there is a change. Using the timeand date stamps on the stored readings the HISTOGRAM program can fill in the unchanged and unrecorded entries. There is also a sensor library (SLIB) file in which is stored data l and parameters regarding each of the types of sensors. The SLIB is only used initially to write the parameters into the point table (prBL) of the working copy table associated with each sensor. This parameter information is used by the SCAN
and ANALYSIS progra~s for converting raw digitized data received from a sensor into a value such as degrees Fahrenheit or Celsius. There is also a duplicate history file (HISC) into which the contents of the history file (HIST) are copied when they are to be used to prepare histograms to be transmitted to a remote site via telephone line. Further, there is a working copy table of which information from the the point table file is part and in which are stored in individual fields the current and previous four readings from each sensor. The collection and storage of readings from sensors in ~he working copy ~able and the records of the history file are described further in this specification with reference to Figure 3. As a new reading is received the oldest reading is eliminated from the particular working copy table. It is the sensor data in the working copy table that it is used for analysis to determine if a reading is out of bounds in a maximum direction, a minimum direction, or as a rate of change.
This analysis is described with reference to Figure 5.
There are also other files A file designated TCSL is used to store records of all requests made to the console, and a file designated FCSL is used to store records of all the responses received from the console. This is done because the scanning and storing of sensor data has the highest priority and to protect this priority all communications are handled through the TCSL and FCSL files.

In Figure 2 is shown a pictorial representation of a part of a ccmputer room and representatively shows where ` --~
13~73~9 l envlronment monitoring and other sensors would be located.
Large computer systems are typically installed in special constructed rooms that are generally kept closed, that have their own air conditioning systems to maintain a cool operating environment for the equipment that makes up the computer system, and that filters the air in the room.
Cooling is required because the computer equipment generates a lot of heat and, in a closed room~ the temperature would rise rapidly to temperatures that will cause equipment failures. Many computer rooms have raised floors so that cabling between pieces of equipment be out of sight under the floor. In addition, the under floor space is often used as a pressurized air plenum through which cooled air passes and then is vented next to or inside pieces of computer equipment. To do this~ part or all of the cooled air output from the air conditioning system is forced under the raised floor and there are vents through the floor at required points. This is representatively shown in Figure 2.

Representative computer equipment shown in Figure 2 are processor 40, input/output multiplexer 41, communication processor 42, console 43, AC power distribution panel 44, hard disk memory 45, magnetic tape drive 46, air conditioning unit 47, and motor/generator set 48. Also shown ar~ the SID 2000 apparatus 51 used for monitoring the environment of the computer system, a bell alarm 52, a visual alarm 59, and a plurality of sensors for monitoring the environment in the computer room.

As represented in Figure 2, air conditioning unit 47 takes room aie, cools it, and blows it into under floor space 49. There are a number of vents through floor 50 which allow the cooled air to rise up into the computer room ~ ~7~

1 at numerous locations such as shown by the arrows by console 43, hard disk unit 45 and tape drive 46. In addition, processor 40 and I/O multiplexer 41 have their own internal air circulation fans that circulate cooled room air through these equipment housings.

Temperature sensors are shown in Figure 2 as circles with a ~T~ in them and are located to monitor temperature inside the cabinets of processor 40, I/O multiplexer 41, communicatiQns processor 42, console 43, AC power distribution panel 44, hard disk unit 45, magnetic tape unit 46, and air conditicning unit 47. Temperature sensors are also placed on a pillar 53 and under floor 50. The temperature sensors monitor the equipment and room temperatures. Humidity sensors are shown as circles with an ~H~ in them and are located over processor 40, on pillar 53, and monitoring cooled exhaust air from air conditioning unit 47. ~umidity is monitored because if the air in the computer room is too dry static electricity problems arise that can damage the computer equipment and otherwise cause the loss of data. Air flow sensors are shown as ciecles with a ~Aw in them and are located inside the equipment housings of processor 40 and I/O multiplexer 41 to check that the cooling fans inside of these equipment housings are functioning. An air flow sensor is also located inside air conditioning unit to check that the circulation blower therein is functioning. AC voltage sensors are shown as circles with a ~V~ inside and one is located with AC power distribution panel 44 to monitor for AC power failures. DC
voltage sensors are also shown as circles with a "~ inside and one is located with motor-generator set 48, which provides emergency DC power to the computer equipment, to monitor its output voltage level. Airborne particle sensors ~ 327399 1 are shown as a circle with a ~P~ inside and are mounted on pillar 53 and inside hard disk memory unit 45, Airborne particles in the form of dust are very detrimental to disk drives and cause data drop outs. Liquid level sensors are shown as a circle with an ~L~ inside and one is located under floor 50 beneath air conditioning unit 47 to monitor for water leaking from this unit.

As previously described, when a trouble condition is d~tected and the initial alarm message at CRTs 56 and 21 is not acknowledged at console 28, the environment monitoring equipment Sl under control of host processor 27 first causes a visual alarm 22 and then audible alarm bell 52 to be energized to alert computer system maintenance personnel in the computer room. The maintenance personnel can look at CRT 56 which is a part of console 28, or at CRT 21, to find out what type of sensor and its location that caused the alarm to be generated, and can then investigate the matter and take remedial measures.
The sensor data stored in each point table record is shown in Figure 3 which is described hereinafter. The first field in the point table contains general identity and location information regarding the associated sensor. The second field contains a three digit number which is the channel address of the particular sensor. The first digit of the channel address indicates the particular sensor interface device 10 (SID) that the particular sensor is connected to. This is needed when there are so many sensors that more than one SID 10 is required to scan their outputs.
The second digit of the channel address indicates which interface module (ie. modules 15 and 16 in Figure 1) the particular sensor is interfaced through. Finally, the third 1 digit of the channel address indicates the particular input channel on the particular interface module identified by the second digit. With these three digits in the second field of the channel address the particular sensor identified thereby may be addressed automatically, or manually from console 28.

The third field of each point table contains an entry indicating if the interface module 15 or 16 to which any particular sensor is connected is an intelligent module.
The four~h field of the point table contains information indicating if all sensors connected to the module identified in fields two and three are to be read out. The fifth field contains information identifying the particular sensor.
This identity is needed to convert raw data received from the sensors. For example, if the particular sensor is a temperature sensor a binary number indicating a voltage is returned from SID 10. Using the sensor identity information in the fifth field the voltage indicated by the binary number can be converted to a temperature. The sixth field operates in conjunction with the fifth field and indicates the units of the measurement for the sensor. For the example of the temperature sensor, the sixth field is used to indicate if the measurement is in Fahrenheit or Centigrade degrees. The information in the fifth and sixth fields is not required for outputs from sensors such as water present and door open sensors, but is required for analog output sensors such as the temperature and humidity sensors.
The seventh field of each point table contains a correction factor which is used to correct the converted reading. It can be understood that this information is 13273~

1 needed for readings from analog type sensors, such as a temperature sensor, but is not needed for water present or door open sensors.

The eighth field of each point table indicates an offset factor to be applied to each converted sensor reading. The ninth field indicates an absolute low value for the particular sensor. The tenth field indicates an absolute high value for the particular sensor. The use of the absolute high and low values in fields nine and ten is described in more detail further in the specification with reference to the CHECK program flow chart in Figure 5.
Briefly, when an alarm is given the rate of change is calculated using the five sets of data in the working copy table associated with the sensor that caused the alarm, and this calculated rate of change is then used to determine the time until the readings from the alarm causing sensor will reach the appropriate one of the absolute values. The eleventh field is used to indicate a chosen maximum slope or rate of change of the output of the associated sensor beyond which an alarm indication is to be given. When the rate of change of a sen~or readings exceed this stored value it is assumed that there is a problem. Host processor 27 under the control of the SCAN program uses the five sets of sensor data stored in the working copy table to calculate the recent rate of change of the output from the sensor and stores it for later use by the CHECR program which compares it to the figure stored in field eleven. If the calculated rate of change is greater in either a negative or positive direction than the stored value in field eleven the program selectively enables one of the previously mentioned alarms.
- 2~ -~2733~

l The twelfth field contains a number that indicates the chosen low level output from the sensor below which an alarm indication is first given at the CRT 56 at console 28. The thirteenth field similarly indicates the chosen high level output from the sensor and above which an alarm indication is first given at the CRT 56 of console 28. The CHECK
program compares the most recently received sensor data against the entries in fields twelve and thirteen to determine if an alarm should be given. Field fourteen is used to store a noise figure which is added or subtracted from sensor readings stored in the working copy table to dampen swings in readings caused by noise. This has the effect of reducing false alarms caused by noise conditions.

The fifteenth field of each point table is a single bit which indicates if the associated sensor is active or is disabled. If a sensor is determined to be defective after causing an erroneous alarm, to prevent subsequent erroneous alarms until the sensor is replaced or otherwise repaired, the sensor is disabled. That is, the output from the sensor is ignored because the entry in field fifteen indicates that the sensor is disabled. Maintenance personnel using a keyboard 57 at console 28 access the point table for the particular sensor and write into this fifteenth field that the sensor is disabled. After the sensor is replaced or otherwise repaired, the entry in field fifteen is changed to indicate that the sensor is again enabled.
..
In Figure 4 is shown a flow chart showing the steps of the SCAN program in collecting data from the sensors and storing same in the sensor records of the history file and in the working copy table before analysis. The program represented by this flow chart is repeatedly being run.

132~399 1 Typically, it is run once a minute, and collects data from all sensors. Accordingly, the program cycles once for all sensors and then is placed in a sleep state to be rerun about one minute later. The one minute figure is arbitrary and is a default sensor reading period that may readily be changed.

When the program represented by the flow chart in Figure 4 is started at block 118, the sensor interface device 10 (SID) shown in Figure 1 is queried and the digital data output from each sensor is serially transmitted to host processor 27 in computer system 17. This is represented by block 60 in Figure 4. The format of the communications has previously been described in this specification. Upon the data from each sensor being received it is first placed in the working copy table associated with the particular sensor, as shown by block 61. As previously mentioned there are only a total of five consecutive readings from the particular sensor stored in the working copy table and, upon receipt of a new reading, the oldest reading is eliminated.
As represented by decision block 62 field fifteen of the point table is checked to determine if the particular sensor (channel) is active. The parameters in the point table are the same as the sensor library which has previously been described with reference to Figure 3. If the answer is no, processing reverts back to block 60 and SID 10 is queried for the output of the next sensor. A channel may be inactivated by the system operator if the sensor is defective as previously described. If the answer to the active channel inquiry is yes, the time and date of the query is added to the sensor data in the working copy table as shown by block 63. The digitized sensor data, which is in raw form~ i5 then converted to an understandable form ~ 24 -1 using the parameter data stored in field seven of the point table portion of the working copy table associated with the sensor. This is represented by block 64 in Figure 4~ The data in converted form indicates, for example, a figure in s degrees, or air flow in cubic feet per minute. The converted data is then stored in the record in the history file for the particular sensor as shown by block 65. The newest sensor data is then compared with the previous sensor data to calculate the rate of change of the data, and this calculated rate of change figure is stored in the working table for the sensor. This calculation and storage is represented by block 66. Next the program checks if the sensor data just received, converted and s~ored is from the last of the sensors as represented by decision block 67. If the data is not from the last sensor the program cycles back to block 60 to repeat the steps just described for the next sensor. If the data was from the last sensor, sensor data collection is completed and will not be repeated for another minute.
Finally, as shown in decision block 68, a check is made to determîne if any acknowledgements of alarm indications have been recèived. If the answer to this determination is no, the program goes to sleep for one minute, per block 69, and then repeats the steps described above for all sensors.
However, if the check determines that an alarm acknowledgement has been recelved via console 28 or from a remote site via autodialer interface 54, the program hranches to another program represented by the flow chart in Figure 6 to determine which alarm has been acknowledged and then that alarm is reset. The branch is shown as the letter 1 A in a circle in Figure 4. The program represented by the flow chart in Figure 6 is described further in this specification.

In Figure 5 is shown the flow chart for the ANALYSIS
program that is run after sensor data has been received and stored by the SCAN program. The ANALYSIS program checks the newest data received from the sensors and stored in the working copy table against the maximum, minimum and rate of change parameters stored in the point table to determine if an alarm should be given and, if so, what type of alarm.
The parameters are selected by the owner of the computer system as previously mentioned. The stored parameters initially have a default value level but may be changed at any time as experience with the computer s~stem indicates is necessary. The program represented by the flow chart shown in ~igure 5 is run once for the received and stored data for each of the sensors, startinq after each new set of data is received from the sensors via SID 10.
When the ANALYSIS program starts at block 111, the first step is to read the newest sensor data ior a particular sensor from its work copy record, as shown by block 70. The program then retrieves the stored maximum sensor value, at and above which an alarm is to be given, copied from the point table file (PT~L3 into the sensor working copy table and compares it against the newest sensor data as shown at decision block 71. If the pre-stored maximum sensor level has been exceeded an error message is prepared for display at console 28~ This is done at block .

1 If the answer to the determlnation of whether or not the maximum sensor level has been exceeded is no, the program then branches to decision block 73 to check if the latest sensor reading is less than the stored minimum sensor level. If the latest sensor reading is lower than the stored minimum sensor level the program branches to block 74 and an appropria~e error message is prepared for display at console 28. However, if the latest sensor reading is not lower than the stored, minimum defaul~ value, the program branches to block 75 to check the rate of change of the last few sensor readings. To do this, the rate of change calculated at block 6~ of the SCAN program is read out and compared with the maximum rate of change stored in the work copy record for the particular sensor. If the calculated rate of change is not greater than the stored parameter, the program exits block 76 and comes to a stop at block 114 because the latest sensor reading does not exceed any default values. The program then goes back to block 111 and restarts to analyze the data from the next sensor. However, if the rate of change is greater than the stored default value~ the program goes to block 77 and prepares a eate of change error message.

When there has been an out of bounds determination made at one of blocks 71, 73 and 76 and an error message has been prepared, the program progresses to block 78 and checks the direction of change of the latest sensor reading with regards to the previous sensor readin~ and, if there is no direction of ch~nge, checks if the sensor reading value is remaining steady. The latest reading can be out of bounds but be the same as the previous sensor reading, less than - ~7 -132739~

1 the previous sensor reading, or greater than the previous sensor reading. Whatever the determination is from block 78, in block 79 a message is prepared indicating the result.

At block 80 the program takes the latest stored sensor reading and the previous readings stored in the working copy table and calculates the change rate in units/time.
Thereafter, at block 81, the program prepares a message indicating that rate of change to be displayed at CRT 56.
At block 82 the program uses the rate of change previously calculated and, if the maximum or minimum limits haven't been exceeded, calculates the time to reach those limits assuming that the rate of change doesn't vary in subsequent sensor readings. If the maximum or minimum limit has lS already been exceeded the program calculates what the sensor output would theoretically be in ten minutes if the rate of change doesn't vary in subsequent sensor readings. After either of these calculations is done the program goes to block 83 and prepares a message indicating the information just calculated in block 82.

After the calculations are made and messages prepared in blocks 79, 81 and 83, a counter located in the working copy table associated with the particular sensor is incremented by one.

At block 84 the program then checks the count in the counter mentioned in the last paragraph. First, in block 85 the program checks if the count in the counter is greater than zero. When an alarm condition has been detected for the irst time, as described with the sensor reading checks performed in blocks 71, 73 and 76, the count in the counter goes from zero to one. The output from decision block 85 - 2~ -1 will be a yes and the program goes to block 86 which causes all previously prepared messages (blocks 72, 74, 77, 79, 81 and 83) to be displayed on CRT 56 of console 28. As previously described, a first alarm condition only results in a message being displayed on CRT 56. There are no other visual or audible alarms energized until subsequent times that an alarm condition is detected from the same sensor.
Alternately, if no alarm condition has been detected, at this point in the program the output from decision block 85 is a no and the program stops at block 112. The ANALYSIS
program will restart at block 111 if there remains a sensor, the latest readings of which have not been checked.

The next counter check is made at decision block 87 which checks if the count in the counter is greater than four. The count of four indicates that on subsequent reading and checking of the particular sensor an alarm condition has continued to be detected but not acknowledged.
As the counter is being incremented up to four, only the messages to CRT 56 are regenerated each time at block 86.
Until the counter reaches the count of five the program exits decision block 87 as a no and the program stops at block 112. However, when a count of five or greater is detected, the program goes to block 88 which causes the visual alarm lights 22 to be energized via SID 10 as previously described. These alarm lights 22 hopefully get the attention of the maintenance personnel who check the CRT
at the console to determine what and where the trouble i3.

If visual alarm 23 is not acknowledged at console 17, the counter in the working copy table is again ncremented to six. At this level the program goes to block ~0 which causes an audible alarm 58 to be enabled via SID 10 as - 2~ -~32~3~

1 previously described. When audible alarm 58 is not responded to, the count in the counter increments again and the output from decision block 91 is a yes. This causes autodialer 23 to be energized per block 92. The autodialer forwards a trouble message to another site as previously described. At this point the program has completed it steps and at block 113 it stops.

The program shown in flow chart form in Figure 5 and described above is repeated for each sensor. In this manner the data from each sensor is analyzed before the next time that the SCAN program shown in flow chart form in Figure 4 is run again to gather readings from all the sensors.

The sequence of alarms described hereinabove may be varied by those skilled in the art without departing from the teaching of the invention. For example, in setting up the system it may be decided to dispense with CRT messages, visual alarms and even audible alarms when there are certain problems. For example, if water is detected, after two or three sequential indications of same from a sensor, an autodialer may be enabled to call a plumber directly to come, locate and fix the problem. In addition, other types of alarms ~ay be used including in building hard-wire and/or radio pagers. Whatevec alarms are used, they may be operated in any sequence. The sequence of CRT message, visual alarm and audible alarm described above is only one combination.

In Figure 6 is shown the flow chart for the program branch shown as an A in a circle in Figure 3~ This program branch is used to reset alarms that have been acknowledged via console 28 at host computer system 17. The starting 13~7399 - 1 point into this program branch is also shown by the letter A
in a circle. ~he first step is to determine which sensor caused the alarm that has been acknowledged from console 28 of the computer system. This is done at block 93. After that determination has been made the program goes to block 94 and retrieves the count in the counter that is part of the working copy table associated with the sensor that caused the alarm that has been acknowledged. In decision block 95 the count in the counter is checked to determine if it is equal to or greater than six. If it greater than six it is known that autodialer 23 had been energized in block 92 of Figure 5. Accordingly, the program exits to block 96 and resets the autodialer.

If the count in the counter is not equal to or greater than six, the decision at block 95 is a no and the program goes to decision block 97. In block 97 the counter contents are again checked to see if they are equal to or greater than five. If the count is equal to or greater than five 2Q the program knows that the audible alarm had been energized in block 89 of Figure 5 and, accordingly, goes to block 98 to reset the audible alarm. Similarly, if the count in the counter was not high enough to energize the visual alarm, the count in the counter will be less than five. At this count the output from deciqion block 97 is a no and the program goes to decision block 99. At decision block 99 the program checks if the count in the counter is equal to or greater than four. If the count is equal to or greater than four the program goes to block 100 to reset the visual ala~m. If the count is less than four the program goes to block 101.

~32739~

1 No matter which alarm has been reset by one of blocks 96, 98 or 100, the program goes to block 101 to display an acknowledgment message at the CRT of the console indicating that the alarm has been acknowledged at console 28. Both the alarm messages and the acknowledgment are stored in the appropriate record in history file (HIST). The last step that is performed is at block 102 which resets the counter in the working copy table associated with the sensor that caused the alarm and that has been acknowledged. The program in Figure 6 then goes to sleep at block 115 until the SCAN program in Figure 3 is run again a minute later.

In Figure 7 is shown a flow chart for the program HISTOGRAM used to generate histograms using the stored sensor readings in the sensor records in the history file.
This program starts at block 116 when requested from console 28, from CRT 21, or remotely via modem 31. It could be changed, however, by one skilled in the art so that it is run periodically. As previously mentioned in this detailed specification, personnel at a remote site can also call in via a telephone line and modem 31 to read out the records of the history file for selected ones or all of the sensors.
This program represented by the flow chart would then be run at the remote site using the sensor data transferred over the telephone line to generate the histograms.

Typically, someone at console 28, CRT 21, or remotely via mode~ 31 requests that histograms be generated for one or more of the sensors. This starts the program shown in flow chart form in ~igure 7. Upon being started at block 116, the program first determines the memory addresses of the hi~h and low end extremes of each sensor in the associated record in the history file, as shown by block 132~3~9 1 103, and then determines the high and low address extremes of the data stored in each sensor record in the history file. Thereafter, the program must identify the sensors, the time limits, and what type of data is to be displayed with histograms. To do this, per block 105 the program inquires via prompts at CRT 56 at console 28 the identity of the sensors for which histograms are to be generated. The operator requesting that histograms be generated inputs this information via keyboard 57. At block 106 the program similarly inquires about the range of time over which the histograms are to cover, and also the time intervals for data readings to be displayed. Again this information is input via keyboard 57. If desired, by specifying time intervals larger than that at which the sensor readings are taken, not all data will be graphed on the histogram. Then, at block 107, the operator is requested to input the type of data that is to be displayed with the histograms. With all this information the program knows all the parameters needed to generate the requested histograms.
At block 108 the program uses the parameters input to it in the previous steps to read the appropriate data out of the records in the history file for the first selected sensor. At block 109 the data read out of the history file and the parameters input to the program are used to graph the histogram on an output device, There are many types of output devices such as CRT 57 and printer 55 at console 28, but there are many other types that may also be used. In addition to graphing the sensor data of the type and over 3~ the time range specified, at block 110 other lines are also drawn on the histograms. These other lines are the maximum and minimum limit levels and the rate of change limit level.

13273~9 1 After the histograms for the selected ones of the sensors are displayed the program stops at block 117 until it is called again.

A failsafe feature is also provided to check the operation of sensory interface device (SID) 10. If host processor 27 under control of the monitoring and analysis programs is unable to connect to SID 10 to request scanning or other functions, a signal in the form of a trouble message is given to the maintenance personnel via CRT 56 at console 28. To acknowledge receipt of the message the maintenance personnel are instructed to operate a particular key on keyboard 57 of console 28. The generation of the trouble message, the acknowledgement reply by key operation, and a time and date stamp are stored in the appropriate record of the history file for the sensor that caused the alarm. At the same time, SID 10 is ~onitoring to determine if it is unable to connect to eomputer system 17. If it cannot connect, it activates autodialer 23 to send a trouble message to a remote location so that the problem is brought to the attention of some maintenance personnel and remedial action taken. The failsafe operation is shown in more detail in Figure 8 which is described in the following paragraphs.
~5 In Figure 8 is shown a flow chart of the steps performed in implementing a failsafe timer in SID 10 processor 18 to monitor the communication path between SID
10 and host computer system 17. Upon initialization of the novel apparatus for monitoring the operating environment of a computer system, the program shown in Figure 8 is started at block 118. As part of the initialization~ and thereafter preceding every communication to SID 10, host processor 27 1 sends a command to SID 10 to reset a failsafe counter nmplemented with processorl8 to six-hundred. This is shown at block 119. Per block 120 the failsafe counter is decremented by the count of one every second. Thus, if the counter is not reset, it will count down to zero in ten minutes. Following each decrement the program checks to see if the counter has decremented to zero as shown at block 121. If the answer is no, the program returns to block 120 and the failsafe counter is decremented again. When host processor 27 accesses SID 10 it sends a command to processor 18 to reset the counter in the failsafe timer to six-hundred.

Only in the event that host processor 27 cannot access SID 10 within ten minutes, which means that there is a problem, does the failsafe counter finally decrement to zero. This is detected at block 121, and autodialer 23 is energized at block 122 to place its trouble call to the remote location. The failsafe timer program then stops at block 123 to wait until maintenance personnel locate and correct the trouble and the monitoring apparatus is reinitialized.

~efoce the expiration of the ten minute count down of the failsafe timer described in the previous paagraphs, host processor 27 will have also detected the failure to communicate Processor 27 places a message on CRT 56 at console, and on CRT 21 associated with communications peocessor 24 if the path is intact and processors 24 and 26 are functioning properly. The maintenance personnel can disable the autodialer until the trouble is cleared to stop the trouble message from being transmitted to the remote location.

~ ~2~9~

~ .

While what has been described herein is the preferred embodiment of the invention, it should be recognized that many changes may be made in the equipment without departing from the spirit and scope of the invention. For example, other information to be checked may be added to the point tables and then compared to outputs from the sensors. In addition, other types of sensors than those listed herein may be added. Further, many different types of host computers may be used and any alarm type and sequencing of alarms may be used.

Claims (7)

1. A method for monitoring an operating environment of a computer system that includes a computer facility housing a central processor and memory for storage of data and programs, said method comprising the steps of:
utilizing monitoring equipment for generating indicator signals indicating a state of a plurality of environmental conditions in and around said computer system including its environment using a like plurality of sensors;
storing over a period of time said indicator signals periodically generated by said sensors along with signals indicating the date and time that each of said indicator signals were stored;
checking said indicator signals to determine if the environmental conditions they indicate exceed one or more predetermined levels including predetermined rates of changeover a predetermined period of time and predetermined fixed levels;
providing an alarm indication when said checking indicates that any of said indicator signals has exceeded any of said predetermined levels; and producing a histogram for each sensor using the stored indicator signals from each sensor and the time and date signals associated therewith, said histograms indicating environmental trends in said computer system which can point to potential troubles in the operating environment of the computer system, which potential troubles may be rectified before they actually become troubles that cause damage to the computer system.
2. The method in accordance with claim 1 further comprising the steps of:
periodically reading the indicator signals generated by each of said sensors; and transferring said indicator signals to said memory to be used to produce said histograms.
3. The method in accordance with claim 2 further comprising the step of storing predetermined parameters used in checking said indicator signals.
4. The method in accordance with claim 3 wherein said transferring step comprises the step of:
converting the form of the indicator signals to a form to be sent over a communications link; and transmitting said converted indicator signals over said communications link to said computer system to be stored in said memory.
5. The method in accordance with claim 4 further comprising the step of transmitting said alarm indication to a remote location to indicate trouble with said computer system.
6. The method in accordance with claim 5 further comprising the step of transmitting said histograms to said remote location.
7. The method in accordance with claim 6 wherein said step of providing an alarm indication comprises the steps of:
providing a trouble condition display at a video terminal that is part of said computer system;
providing a visual alarm display in the area where said computer system is located after said trouble condition display is not acknowledged within a first predetermined period of time; and providing an audible alarm in the area where said computer system is located after said visual alarm display is not acknowledged within a second predetermined period of time.
CA000572682A 1987-07-21 1988-07-21 Method and apparatus for monitoring the operating environment of a computer system Expired - Fee Related CA1327399C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US07/076,235 US4823290A (en) 1987-07-21 1987-07-21 Method and apparatus for monitoring the operating environment of a computer system
US07/076,235 1987-07-21

Publications (1)

Publication Number Publication Date
CA1327399C true CA1327399C (en) 1994-03-01

Family

ID=22130754

Family Applications (1)

Application Number Title Priority Date Filing Date
CA000572682A Expired - Fee Related CA1327399C (en) 1987-07-21 1988-07-21 Method and apparatus for monitoring the operating environment of a computer system

Country Status (4)

Country Link
US (1) US4823290A (en)
EP (1) EP0352340B1 (en)
AU (1) AU613384B2 (en)
CA (1) CA1327399C (en)

Families Citing this family (157)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4967712A (en) * 1987-11-12 1990-11-06 Injection Research Specialists, Inc. Two-cycle engine with electronic fuel injection
US4901701A (en) * 1987-11-12 1990-02-20 Injection Research Specialists, Inc. Two-cycle engine with electronic fuel injection
DE3852927T2 (en) * 1987-11-26 1995-06-29 Fujitsu Ltd Emergency monitoring system with infrared processing.
US5105370A (en) * 1988-04-14 1992-04-14 Fike Corporation Environmental detection system useful for fire detection and suppression
US4937763A (en) * 1988-09-06 1990-06-26 E I International, Inc. Method of system state analysis
US5128881A (en) * 1988-09-09 1992-07-07 Saum Enterprises, Inc. Means and methods for predicting hold time in enclosures equipped with a total flooding fire extinguishing system
JPH0290335A (en) * 1988-09-28 1990-03-29 Hitachi Ltd Remote operation control system for computer system
JPH07101474B2 (en) * 1988-10-20 1995-11-01 ニッタン株式会社 Monitoring alarm device
US5068798A (en) * 1989-03-03 1991-11-26 Precision Systems, Inc. Process environment monitoring system
US5270945A (en) * 1989-03-03 1993-12-14 Precision Systems, Inc. Process environment monitoring system
JPH03182185A (en) * 1989-12-11 1991-08-08 Fujitsu Ltd Infrared monitoring system
US5216623A (en) * 1990-06-06 1993-06-01 M. T. Mcbrian, Inc. System and method for monitoring and analyzing energy characteristics
IT1243877B (en) * 1990-10-30 1994-06-28 Eurodomestici Ind Riunite DEVICE FOR CHECKING THE FUNCTIONING OF A REFRIGERATOR, SUCH AS A DOMESTIC REFRIGERATOR, A FREEZER OR SIMILAR
US5115225A (en) * 1990-11-13 1992-05-19 Compaq Computer Corporation Disk drive unit overheating warning system
US5230074A (en) * 1991-01-25 1993-07-20 International Business Machines Corporation Battery operated computer power management system
US5230055A (en) * 1991-01-25 1993-07-20 International Business Machines Corporation Battery operated computer operation suspension in response to environmental sensor inputs
JPH0774984B2 (en) * 1991-06-10 1995-08-09 インターナショナル・ビジネス・マシーンズ・コーポレイション System resource utilization measurement method and data processing system
JPH0816877B2 (en) * 1991-06-10 1996-02-21 インターナショナル・ビジネス・マシーンズ・コーポレイション Method and system for real-time capture and reduction of resource data for data processing system
WO1993006695A1 (en) * 1991-09-23 1993-04-01 Z-Microsystems Enhanced security system for computing devices
US5337413A (en) * 1992-02-06 1994-08-09 Tandem Computers Incorporated Environment monitoring system for standard interface bus computer systems
US5477417A (en) * 1992-08-28 1995-12-19 Kabushiki Kaisha Toshiba Electronic equipment having integrated circuit device and temperature sensor
JP2764717B2 (en) * 1992-09-28 1998-06-11 株式会社堀場製作所 Measurement system
US5287292A (en) * 1992-10-16 1994-02-15 Picopower Technology, Inc. Heat regulator for integrated circuits
US5553235A (en) * 1992-10-23 1996-09-03 International Business Machines Corporation System and method for maintaining performance data in a data processing system
US5432932A (en) * 1992-10-23 1995-07-11 International Business Machines Corporation System and method for dynamically controlling remote processes from a performance monitor
US5483468A (en) * 1992-10-23 1996-01-09 International Business Machines Corporation System and method for concurrent recording and displaying of system performance data
US5506955A (en) * 1992-10-23 1996-04-09 International Business Machines Corporation System and method for monitoring and optimizing performance in a data processing system
US5325156A (en) * 1992-11-20 1994-06-28 Xerox Corporation Service call initiation and feedback interface for a reprographic machine
US5481481A (en) * 1992-11-23 1996-01-02 Architectural Engergy Corporation Automated diagnostic system having temporally coordinated wireless sensors
ES2070744B1 (en) * 1993-05-11 1998-01-16 Univ De Castilla La Mancha Lab PROCEDURE AND EQUIPMENT FOR RECOGNITION AND ANALYSIS OF THE EFFECTS OF A REPRODUCIBLE PROCESS ON ONE OR SEVERAL MAGNITUDES THAT ARE OBSERVED IN SPACE AND IN TIME.
US5513359A (en) * 1993-07-23 1996-04-30 International Business Machines Corporation Desktop computer having a single-switch suspend/resume function
AU732436B2 (en) * 1993-07-26 2001-04-26 Lenovo (Singapore) Pte. Ltd. Desktop computer system having multi-level power management
DE4326680C1 (en) * 1993-08-09 1995-02-16 Siemens Ag Method and device for monitoring the temperature of an electrical generator
US5586250A (en) * 1993-11-12 1996-12-17 Conner Peripherals, Inc. SCSI-coupled module for monitoring and controlling SCSI-coupled raid bank and bank environment
US5422806A (en) * 1994-03-15 1995-06-06 Acc Microelectronics Corporation Temperature control for a variable frequency CPU
US5485142A (en) * 1994-04-08 1996-01-16 The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration Remote monitor alarm system
US5555191A (en) * 1994-10-12 1996-09-10 Trustees Of Columbia University In The City Of New York Automated statistical tracker
GB2295299B (en) * 1994-11-16 1999-04-28 Network Services Inc Enterpris Enterprise network management method and apparatus
US6108637A (en) * 1996-09-03 2000-08-22 Nielsen Media Research, Inc. Content display monitor
US5892690A (en) * 1997-03-10 1999-04-06 Purechoice, Inc. Environment monitoring system
CA2412347C (en) * 1997-03-12 2008-08-05 Verticore Communications Ltd. Information display system
US5796952A (en) * 1997-03-21 1998-08-18 Dot Com Development, Inc. Method and apparatus for tracking client interaction with a network resource and creating client profiles and resource database
US6643696B2 (en) 1997-03-21 2003-11-04 Owen Davis Method and apparatus for tracking client interaction with a network resource and creating client profiles and resource database
US5955946A (en) * 1998-02-06 1999-09-21 Beheshti; Ali Alarm/facility management unit
CA2266225C (en) * 1998-03-20 2008-01-29 Sensors & Software Inc. Microprocessor and microcontroller stabilized geophysical instruments
US6148418A (en) * 1998-06-22 2000-11-14 Holtek Semiconductor Inc. Computer environment monitor device
US6203191B1 (en) 1998-10-28 2001-03-20 Speculative Incorporated Method of junction temperature determination and control utilizing heat flow
DE19853785C5 (en) * 1998-11-21 2004-10-07 Beteiligungen Sorg Gmbh & Co Kg Method and measuring arrangement for determining changes in the operating state of refractory materials on containers carrying molten glass
US6317839B1 (en) 1999-01-19 2001-11-13 International Business Machines Corporation Method of and apparatus for controlling supply of power to a peripheral device in a computer system
US6453266B1 (en) * 1999-01-29 2002-09-17 International Business Machines Corporation Peak detecting shock gauge and damage diagnostic for mobile and handheld computers
US6281803B1 (en) * 1999-03-16 2001-08-28 Warren Frederick Davis Control mat monitoring and warning apparatus and method
US6369706B1 (en) 1999-05-10 2002-04-09 Gateway, Inc. System and method for protecting a digital information appliance from environmental influences
AUPQ206399A0 (en) 1999-08-06 1999-08-26 Imr Worldwide Pty Ltd. Network user measurement system and method
DE19942430A1 (en) 1999-09-06 2001-03-08 Sperling Axel Operating environment control device for computers with component-specific monitoring and control
WO2001018624A1 (en) * 1999-09-08 2001-03-15 Hörmann KG Antriebstechnik Method for detecting the operational state of a border element of a building or an enclosure that is displaced by a drive system
US6480809B1 (en) * 1999-09-23 2002-11-12 Intel Corporation Computer system monitoring
US7330886B2 (en) * 1999-10-27 2008-02-12 American Power Conversion Corporation Network appliance management
US6714977B1 (en) * 1999-10-27 2004-03-30 Netbotz, Inc. Method and system for monitoring computer networks and equipment
US7159022B2 (en) * 2001-01-26 2007-01-02 American Power Conversion Corporation Method and system for a set of network appliances which can be connected to provide enhanced collaboration, scalability, and reliability
US7392309B2 (en) * 1999-10-27 2008-06-24 American Power Conversion Corporation Network appliance management
EP1252735B1 (en) 2000-01-12 2011-08-24 Jupiter Media Metrix, Inc. System and method for estimating prevalence of digital content on the world-wide-web
DE60137122D1 (en) 2000-03-09 2009-02-05 Smartsignal Corp ANGLE-LIKE OPERATOR WITH GENERAL LENSING
US6957172B2 (en) 2000-03-09 2005-10-18 Smartsignal Corporation Complex signal decomposition and modeling
US7739096B2 (en) * 2000-03-09 2010-06-15 Smartsignal Corporation System for extraction of representative data for training of adaptive process monitoring equipment
US6952662B2 (en) * 2000-03-30 2005-10-04 Smartsignal Corporation Signal differentiation system using improved non-linear operator
US6556939B1 (en) * 2000-11-22 2003-04-29 Smartsignal Corporation Inferential signal generator for instrumented equipment and processes
JP4184613B2 (en) * 2001-01-10 2008-11-19 株式会社東芝 Deterioration diagnosis method
US6725180B2 (en) * 2001-01-12 2004-04-20 Ingersoll-Rand Company Environmental monitoring system
US7233886B2 (en) * 2001-01-19 2007-06-19 Smartsignal Corporation Adaptive modeling of changed states in predictive condition monitoring
US8271626B2 (en) 2001-01-26 2012-09-18 American Power Conversion Corporation Methods for displaying physical network topology and environmental status by location, organization, or responsible party
US7302313B2 (en) 2001-02-07 2007-11-27 Aircuity, Inc. Air quality monitoring systems and methods
US20020183971A1 (en) * 2001-04-10 2002-12-05 Wegerich Stephan W. Diagnostic systems and methods for predictive condition monitoring
US7539597B2 (en) 2001-04-10 2009-05-26 Smartsignal Corporation Diagnostic systems and methods for predictive condition monitoring
AUPR505601A0 (en) * 2001-05-17 2001-06-07 Traffion Technologies Pty Ltd Method of optimising content presented to a user within a communications network
US6975962B2 (en) * 2001-06-11 2005-12-13 Smartsignal Corporation Residual signal alert generation for condition monitoring using approximated SPRT distribution
US6782351B2 (en) 2001-09-11 2004-08-24 Purechoice, Inc. Air quality monitoring and space management system coupled to a private communications network
US6912386B1 (en) * 2001-11-13 2005-06-28 Nokia Corporation Method for controlling operation of a mobile device by detecting usage situations
US6721672B2 (en) 2002-01-02 2004-04-13 American Power Conversion Method and apparatus for preventing overloads of power distribution networks
US7181510B2 (en) * 2002-01-04 2007-02-20 Hewlett-Packard Development Company, L.P. Method and apparatus for creating a secure embedded I/O processor for a remote server management controller
US6718277B2 (en) 2002-04-17 2004-04-06 Hewlett-Packard Development Company, L.P. Atmospheric control within a building
US7308614B2 (en) 2002-04-30 2007-12-11 Honeywell International Inc. Control sequencing and prognostics health monitoring for digital power conversion and load management
US6850426B2 (en) 2002-04-30 2005-02-01 Honeywell International Inc. Synchronous and bi-directional variable frequency power conversion systems
US7779026B2 (en) * 2002-05-03 2010-08-17 American Power Conversion Corporation Method and apparatus for collecting and displaying network device information
US8271778B1 (en) 2002-07-24 2012-09-18 The Nielsen Company (Us), Llc System and method for monitoring secure data on a network
US20040054938A1 (en) * 2002-09-17 2004-03-18 Belady Christian L. Controlling a computer system based on an environmental condition
AU2003900398A0 (en) * 2003-01-31 2003-02-13 Red Sheriff Limited Method and system of measuring and recording user data in a communications network
DE602004024296D1 (en) * 2003-04-14 2010-01-07 American Power Conv Corp EXPANDABLE SENSOR MONITORING, WARNING PROCESSING AND NOTIFICATION SYSTEM AND METHOD
EP1616236B1 (en) * 2003-04-14 2016-11-23 Schneider Electric IT Corporation Method and system for journaling and accessing sensor and configuration data
WO2004090679A2 (en) 2003-04-14 2004-10-21 Netbotz, Inc. Environmental monitoring device
US8566292B2 (en) 2003-04-14 2013-10-22 Schneider Electric It Corporation Method and system for journaling and accessing sensor and configuration data
US7627651B2 (en) * 2003-10-27 2009-12-01 American Power Conversion Corporation System and method for network device communication
WO2005064561A1 (en) * 2003-12-03 2005-07-14 Jeld-Wen, Inc. Remote monitoring system
US20050251339A1 (en) * 2004-05-05 2005-11-10 St- Infonox Methods and systems for monitoring environments
US7339490B2 (en) * 2004-06-29 2008-03-04 Hewlett-Packard Development Company, L.P. Modular sensor assembly
US8132225B2 (en) * 2004-09-30 2012-03-06 Rockwell Automation Technologies, Inc. Scalable and flexible information security for industrial automation
US7711814B1 (en) 2004-12-13 2010-05-04 American Power Conversion Corporation Method and system for remote monitoring of a power supply device with user registration capability
US8145748B2 (en) 2004-12-13 2012-03-27 American Power Conversion Corporation Remote monitoring system
US7764184B2 (en) * 2004-12-22 2010-07-27 Hewlett-Packard Development Company, L.P. Apparatus and system for monitoring environmental factors in a computer system
US7409310B1 (en) 2005-01-21 2008-08-05 Z Microsystems, Inc. System and method for tracking operational data in a distributed environment
US20060168975A1 (en) * 2005-01-28 2006-08-03 Hewlett-Packard Development Company, L.P. Thermal and power management apparatus
US7885795B2 (en) 2005-05-02 2011-02-08 American Power Conversion Corporation Methods and systems for managing facility power and cooling
US7881910B2 (en) 2005-05-02 2011-02-01 American Power Conversion Corporation Methods and systems for managing facility power and cooling
US8322155B2 (en) * 2006-08-15 2012-12-04 American Power Conversion Corporation Method and apparatus for cooling
US9568206B2 (en) * 2006-08-15 2017-02-14 Schneider Electric It Corporation Method and apparatus for cooling
US8327656B2 (en) * 2006-08-15 2012-12-11 American Power Conversion Corporation Method and apparatus for cooling
US8275577B2 (en) 2006-09-19 2012-09-25 Smartsignal Corporation Kernel-based method for detecting boiler tube leaks
US8684802B1 (en) * 2006-10-27 2014-04-01 Oracle America, Inc. Method and apparatus for balancing thermal variations across a set of computer systems
US8311774B2 (en) * 2006-12-15 2012-11-13 Smartsignal Corporation Robust distance measures for on-line monitoring
US7681404B2 (en) 2006-12-18 2010-03-23 American Power Conversion Corporation Modular ice storage for uninterruptible chilled water
US20080142068A1 (en) * 2006-12-18 2008-06-19 American Power Conversion Corporation Direct Thermoelectric chiller assembly
US20080155441A1 (en) * 2006-12-22 2008-06-26 Long Bruce T Method for performing a data center hardware upgrade readiness assessment
US20080173089A1 (en) * 2007-01-19 2008-07-24 Seagate Technology Llc Transducing system with integrated environmental sensors
US8425287B2 (en) * 2007-01-23 2013-04-23 Schneider Electric It Corporation In-row air containment and cooling system and method
US7705721B1 (en) * 2007-03-13 2010-04-27 Network Appliance, Inc. Apparatus and method for sensing and responding to environmental conditions of a computer system at non-uniform polling intervals
DK2147585T3 (en) 2007-05-15 2017-01-16 Schneider Electric It Corp PROCEDURE AND SYSTEM FOR HANDLING EQUIPMENT AND COOLING
GB2462554B (en) * 2007-05-31 2011-11-16 Nielsen Co Methods and apparatus to model set-top box data
US7894944B2 (en) * 2007-07-06 2011-02-22 Microsoft Corporation Environmental monitoring in data facilities
CA2656853A1 (en) * 2008-03-03 2009-09-03 Satellite Systems And Solutions, Inc. Method and apparatus for mitigating environmental impact due to fluid leaks
US20100011062A1 (en) * 2008-07-14 2010-01-14 St-Infonox, Inc. Automated bioremediation system
US20110154270A1 (en) * 2008-08-29 2011-06-23 Yasuyuki Sonoda Image display system, image display device, program, and recording medium
US8209056B2 (en) * 2008-11-25 2012-06-26 American Power Conversion Corporation System and method for assessing and managing data center airflow and energy usage
US20120133510A1 (en) 2010-11-30 2012-05-31 Panduit Corp. Physical infrastructure management system having an integrated cabinet
US9778718B2 (en) * 2009-02-13 2017-10-03 Schneider Electric It Corporation Power supply and data center control
US8560677B2 (en) * 2009-02-13 2013-10-15 Schneider Electric It Corporation Data center control
US9519517B2 (en) * 2009-02-13 2016-12-13 Schneider Electtic It Corporation Data center control
US8355890B2 (en) * 2009-05-08 2013-01-15 American Power Conversion Corporation System and method for predicting maximum cooler and rack capacities in a data center
US8219362B2 (en) 2009-05-08 2012-07-10 American Power Conversion Corporation System and method for arranging equipment in a data center
US8249825B2 (en) * 2009-05-08 2012-08-21 American Power Conversion Corporation System and method for predicting cooling performance of arrangements of equipment in a data center
EP2263533A1 (en) 2009-06-18 2010-12-22 Deutsche Telekom AG Enhancing security and emergency functionalities in mobile phones based on detection of physical shocks
US8397088B1 (en) 2009-07-21 2013-03-12 The Research Foundation Of State University Of New York Apparatus and method for efficient estimation of the energy dissipation of processor based systems
US8972217B2 (en) 2010-06-08 2015-03-03 Schneider Electric It Corporation System and method for predicting temperature values in a data center
US8509959B2 (en) 2010-08-12 2013-08-13 Schneider Electric It Corporation System and method for predicting transient cooling performance for a data center
US8996180B2 (en) 2010-09-17 2015-03-31 Schneider Electric It Corporation System and method for predicting perforated tile airflow in a data center
US8825451B2 (en) 2010-12-16 2014-09-02 Schneider Electric It Corporation System and methods for rack cooling analysis
US8688413B2 (en) 2010-12-30 2014-04-01 Christopher M. Healey System and method for sequential placement of cooling resources within data center layouts
US9223905B2 (en) 2011-03-25 2015-12-29 Schneider Electric It Corporation Systems and methods for predicting fluid dynamics in a data center
US8990536B2 (en) 2011-06-01 2015-03-24 Schneider Electric It Corporation Systems and methods for journaling and executing device control instructions
US8725307B2 (en) 2011-06-28 2014-05-13 Schneider Electric It Corporation System and method for measurement aided prediction of temperature and airflow values in a data center
US8803681B2 (en) * 2011-09-09 2014-08-12 Favepc Inc. Object finder
US9158310B2 (en) 2011-12-14 2015-10-13 International Business Machines Corporation Integrating a data center thermal control system and individual fan controllers for controlling a thermal environment in a data center room
US8600915B2 (en) 2011-12-19 2013-12-03 Go Daddy Operating Company, LLC Systems for monitoring computer resources
US8719196B2 (en) 2011-12-19 2014-05-06 Go Daddy Operating Company, LLC Methods for monitoring computer resources using a first and second matrix, and a feature relationship tree
AU2011383606A1 (en) 2011-12-22 2014-07-17 Schneider Electric It Corporation System and method for prediction of temperature values in an electronics system
CN104137105B (en) 2011-12-22 2017-07-11 施耐德电气It公司 Impact analysis on temporal event to the temperature in data center
DE102011089897A1 (en) 2011-12-23 2013-06-27 Continental Automotive Gmbh sensor system
US9176508B2 (en) 2012-01-09 2015-11-03 International Business Machines Corporation Managing workload distribution among computing systems to optimize heat dissipation by computing systems
US20130326105A1 (en) * 2012-06-05 2013-12-05 Wen-Chuan Yang Processor with real-time signal transmission and storage
US9219928B2 (en) 2013-06-25 2015-12-22 The Nielsen Company (Us), Llc Methods and apparatus to characterize households with media meter data
US10193377B2 (en) * 2013-10-30 2019-01-29 Samsung Electronics Co., Ltd. Semiconductor energy harvest and storage system for charging an energy storage device and powering a controller and multi-sensor memory module
US9277265B2 (en) 2014-02-11 2016-03-01 The Nielsen Company (Us), Llc Methods and apparatus to calculate video-on-demand and dynamically inserted advertisement viewing probability
CN104216378A (en) * 2014-09-05 2014-12-17 南通北城科技创业管理有限公司 Intelligent environmental monitoring system
US10102313B2 (en) 2014-12-30 2018-10-16 Schneider Electric It Corporation Raised floor plenum tool
US10219039B2 (en) 2015-03-09 2019-02-26 The Nielsen Company (Us), Llc Methods and apparatus to assign viewers to media meter data
US9848224B2 (en) 2015-08-27 2017-12-19 The Nielsen Company(Us), Llc Methods and apparatus to estimate demographics of a household
US10791355B2 (en) 2016-12-20 2020-09-29 The Nielsen Company (Us), Llc Methods and apparatus to determine probabilistic media viewing metrics
CN112912854A (en) * 2018-11-07 2021-06-04 惠普发展公司,有限责任合伙企业 Receiving thermal data and generating system thermal levels
US20220259947A1 (en) * 2021-02-18 2022-08-18 Yantai Jereh Petroleum Equipment & Technologies Co., Ltd. Monitoring system and method for wellsite equipment

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3277458A (en) * 1963-06-26 1966-10-04 Thomas L Greenwood Condition and condition duration indicator
US3596264A (en) * 1969-03-13 1971-07-27 Holley Carburetor Co Multichannel frost ice and snow detecting device
US3688292A (en) * 1970-02-16 1972-08-29 Robertshaw Controls Co Analog telemetry system having frequency signal transmission
US3931619A (en) * 1970-09-14 1976-01-06 Manuel S. Moore Overtemperature monitor and integrator apparatus
US3740718A (en) * 1971-06-01 1973-06-19 Westinghouse Electric Corp Control apparatus for an environmental data system
GB1536046A (en) * 1976-06-30 1978-12-20 Ibm Data processing system power control
US4163216A (en) * 1977-08-29 1979-07-31 Arpino R System for transmitting airport weather information
JPS6014399B2 (en) * 1978-05-04 1985-04-12 ホーチキ株式会社 Physical change monitoring device
US4372692A (en) * 1979-09-17 1983-02-08 Trustees Of Dartmouth College Electronic device to record temperatures and the time of occurrence
US4356475A (en) * 1980-09-12 1982-10-26 Siemens Aktiengesellschaft System containing a predetermined number of monitoring devices and at least one central station
US4315296A (en) * 1980-10-14 1982-02-09 Semco Instruments, Inc. Reliable over-temperature control circuit
GB2100482A (en) * 1981-05-15 1982-12-22 Mars Ltd Computer testing device
US4575806A (en) * 1982-03-26 1986-03-11 Gould, Inc. Precision temperature measuring system
CA1193317A (en) * 1982-05-07 1985-09-10 Canadian General Electric Company Limited Thermal model for electrical apparatus
JPS5977596A (en) * 1982-10-27 1984-05-04 ニツタン株式会社 Environmental abnormality detection alarm system
US4600962A (en) * 1983-02-03 1986-07-15 Sentec Inc. Apparatus for monitoring and protecting a device against a plurality of fault conditions
US4592002A (en) * 1983-12-13 1986-05-27 Honeywell Inc. Method of digital temperature compensation and a digital data handling system utilizing the same
US4602872A (en) * 1985-02-05 1986-07-29 Westinghouse Electric Corp. Temperature monitoring system for an electric generator
US4698756A (en) * 1985-07-16 1987-10-06 Westinghouse Electric Corp. Generator stator winding diagnostic system
US4737917A (en) * 1986-07-15 1988-04-12 Emhart Industries, Inc. Method and apparatus for generating isotherms in a forehearth temperature control system

Also Published As

Publication number Publication date
EP0352340B1 (en) 1995-06-07
US4823290A (en) 1989-04-18
EP0352340A1 (en) 1990-01-31
AU613384B2 (en) 1991-08-01
AU2000888A (en) 1990-01-25

Similar Documents

Publication Publication Date Title
CA1327399C (en) Method and apparatus for monitoring the operating environment of a computer system
US4668939A (en) Apparatus for monitoring disturbances in environmental conditions
CA1219049A (en) Fault diagnostic distributed processing method and system
US5061916A (en) Event driven remote graphical reporting of building automation system parameters
RU2101224C1 (en) System of remote control of lifts in separate buildings
US4658243A (en) Surveillance control apparatus for security system
CN109374053A (en) A kind of Internet of Things computer lab management platform based on event-driven response
JP2000207318A (en) Remote maintenance system
JP2001141290A (en) Air conditioner and its monitoring device
JPH02178557A (en) Abnormal state diagnosis system for air conditioner facility
AU666794B2 (en) Data processing system
JP3480662B2 (en) Facility management equipment
JP3446889B2 (en) Data collection system
JP3236735B2 (en) Fire alarm
JP3480881B2 (en) Remote monitoring device
JPH04332227A (en) Failure information transmission destination control system
Harris Built-In-Test to support remote system maintenance
JP3248655B2 (en) Remote monitoring device
JP2001117635A (en) Monitor device
JPH0879856A (en) Remote supervisory equipment
KR950011190B1 (en) Crime prevention and remote checking system using catv network
JP3490363B2 (en) Lifetime deterioration monitoring device
JP3016934B2 (en) Test equipment for remote monitoring system
JP3034679B2 (en) Fire alarm system
JPH0664663B2 (en) Abnormal signal hold system

Legal Events

Date Code Title Description
MKLA Lapsed