You are on page 1of 44

Model Storage and Data Structures

• Data: It is a collection of information/files. Data


can be represented by the code 1 or 0.This is
called bit (Binary digit).

• Data is a collection of names, numerical


values,chrecters,codes,instructions etc.

• Information is organized as group of bits usually 8


bits. This eight bits is known as byte.
• Data base: It is defined as a collection of data in
a single location so that it can be used by
different users for different applications.

• The major functions of data base are:


• To manipulate data on screen
• To interact with user
• To determine the properties like A,V,MI
• To provide additional information like mfg specifications.

• A data base not only stores the data but also


facilitates to view the data depending upon the
needs of the user.
Data structure

• It is a diagrammatic representation of a data


base. It shows the record types used and the
relationship between them.
Data structure for interactive
modeling
• The data structure should allow interactive
manipulation like addition, modification and deletion
of data.

• The data structure should support multiple types of


data like geometric,dimensions,labels,tool paths,
finite elements and so on.

• It should allow properties like line style,colour to


associated with geometric elements.
• It should allow association between data
elements where this is important to the model.

• It should provide facilities to retrieve the parts of


data structure released by deletion or other
modifications.

• It should be compact to minimize disk storage


and main memory requirements.
CAD/CAM Data Exchange
• Transferring data between dissimilar CAD/CAM
system must embrace the complete product
description stored in its database.

• Four types of modeling data make up this


description.
• Shape
• Non shape
• Design
• Manufacturing
Shape data
• It consists of both geometrical and topological
information as well as part features.
• Geometrical information: Entity attributes such
as font, color and layer.
• Topological information: Products described via
Solid modeling.
• Features allow high-level concept
communication about parts.
• Ex: Hole,flange,web,chamfer etc..
Non shape data

• It includes graphics data such as shaded


images, and model global data as measuring
units of the database.
Design data

• It has to do with the information that


designers generate from geometric models
for analysis purposes.

• Mass property and finite element mesh data


belong to this type of data.
Manufacturing data

• It consists of information as tooling, NC tool


paths,tolerencing,process planning, tool
design, and bill of materials.
• BMP ? Windows bitmap format
• TIFF/TIF Tagged Image Format
• GIF Graphics Interchange Format
• JPEG Joint Photographic Experts
Group
• MPEG Motion Picture Expert Group
IGES
• IGES is the first standard exchange format
developed to address the concept of
communicating product data among dissimilar
CAD/CAM system.
IGES
• This system invested in developing special purpose
software for the design,analysis,manufacturing, and
testing of their products.

• IGES has been used for a dual purpose:

• Transfer of modeling data within corporate dissimilar systems

• Digital communication between the company and its suppliers


and customers.
IGES
• IGES has been revised a few times since its version
1.0 was released in 1980.

• Versions 2.0,3.0, and 4.0 each contains refinements


and extensions over its predecessor.

• Each version must remain upwards compatible with


the previous version for practical purpose.
IGES
• Version 2.0 has solved the problem of IGES large file
lengths due primarily to the ASCII character.

• Version 3.0 introduces the compressed ASCII format


that reduces the IGES file size to one third of its
previous size to address the storage size and
telecommunications costs.

• Version 4.0 has extended IGES capabilities to solid


modeling (CSG rep.scheme only) for the first time.
IGES
• The representations of regularized Boolean
operations (U,I and D) and primitives
(block,wedge,cylinder etc) have been established.

• The finite element modeling and analysis application,


version 4.0 has expanded IGES to describe nodal
(Temp and Disp) and element (stress and strain)
results.

• Extension of IGES to the B-rep scheme will be in


version 5.0.
IGES standard- Outline
• Start section
• Global section
• Directory section
• Parameter data section
• Termination
IGES-Testing and Verification

• The common methods of verification of IGES


processors are:

• Reflection test

• Transmission test

• Loopback test
IGES
• Reflection test : In this test, an IGES file created by a
systems preprocessor is read by its own
postprocessor to create another model.

• Transmission test : IGES file of a model created by a


source system preprocessor is transferred to a target
system whose postprocessor is used to recreate the
model on the target system.
IGES

• Loopback test: In this test, an IGES file created by


the source system is read by the target system
which, in turn creates another IGES file and then
transfers this file back to the source system to read it.

• This test checks the pre and postprocessors of both


the source and the target system
PDES

• Product Data Exchange using Step

• STEP : Standard for the Transfer and


Exchange of Product model data.
STEP - (Standard For The Exchange
Of Product Model Data)
LIMITATIONS:
• IGES was not developed using formal language, nor based
on information modeling methodologies, and therefore
there was vagueness in the specification.
• It doesn’t clearly distinguish between logical specification
of the standard, the application requirement and physical
specification for the storage of data in exchange files.
• It does not provide sufficient conformance clauses or test
sets for testing how the implementation from different
CAD vendors confirm to the standard.
• STEP uses a formal model for the data
exchange, which is described using an
information modeling language called
EXPRESS that was developed specially for
STEP. In IGES the specification describes
the format of the physical file which stores
all of the geometric and other data. In STEP
this data is described in the EXPRESS
language which then maps to the physical
file.
CALS
• Continuous Acquisition and life cycle
support

Earlier name:
Computer aided Acquisition and Logistics
support
Basics of computer networking
• BIG QUESTION ?????????

How will the computer be


identified in a network? If two or more
computers want to talk at the same time,
how do you ensure all the conversations are
understood?
Necessity
• File sharing
• Hardware sharing
• Program sharing
• User communication
• Multiplayer games and etc….
Benefits
• Allows more efficient management of
resources
• Keeps the information reliable up to date
• Speeds up the data sharing
• Allows work group to communicate more
efficiently
• Greatly expands a business marketing and
customer service capability.
Networking softwares
• Microsoft networking
• Windows 2000 server
• Linux
• Sun solaris system
• Cisco
Network topology
• A physical topology of a network refers to
the configuration of the cables, computers
and other peripherals.
Linear Bus
Advantages & Dis-advantages
• Advantage:
* easy to connect a peripheral or a computer to a linear bus.
* requires less cable length than star topology.
Disadvantages:
* entire network shuts down if there is a break in the main cable.
* terminators are required at both the ends ofthe back bone cable.
* difficult to identify the problem if the entire network shuts
down.
* not to be meant to use as stand alone solution in a large
building.
Star topology
Advantages & Dis-advantages
• Advantage:
* easy to install and wire.
* no disruptions to the network while connecting or
removing devises.
Disadvantages:
* requires more cable length than linear topology.
* if the hub fails, nodes attached are disabled.
* more expensive than linear bus topologies because
of cost of concentrators.
* not to be meant to use as stand alone solution in a
large building.
Tree topology
Advantages & Dis-advantages
• Advantage:
* point to point of wiring of individual segments.
* supported by several hardware and software
vendors.
Disadvantages:
* overall length of each segment is limited by type of
cabling used.
* if the back bone line fails, the entire segment goes
down.
* more difficult to configure and wire than other
topologies.
Star wired ring
Ethernet protocol
• Ethernet uses an access method called CSMA/CD (carrier
sense multiple access / collision detection). This is system
where each computer listens to the cable before sending
anything through the network. If the network is clear, the
computer will transmit. If some other node is already
transmitting on the cable, the computer will wait and try
again when the line is clear. Sometimes, two computers
attempt to transmit at the same instant. When this happens
a collision occurs. Each computer then backs off and waits
a random amount of time before attempting to retransmit.
With this access method, it is normal to have collision.
However, the delay caused by the collisions and
retransmitting is very small and does not normally effect
the speed of transmission on the network. Data transfer
speed ranges from 10 – 1000 Mbps.
LOCAL TALK
It is a network protocol that was developed by apple
computer Inc. for Machintosh computers. The
method used is called CSMA/CA( carrier sense
multiple access with collision avoidance). Local
talk adaptors and special twisted pair cable can be
used to connect a series of computers through the
serial port. The operating system allows the
establishment of a peer - peer network without the
need for the additional software. Data transfer rate
is only 230Kbps.
Token ring
• This was developed by IBM. The access method used
involves token- passing. In token ring the computers are
connected so that the signal travels around the network
from one computer to another in a local ring. A single
electronic token moves around the ring from one computer
to the next. If a computer doesnot have information to
transmit, it simply passes the token on to the next work
station. If a computer wishes to transmit and receive an
empty token, it attaches the data to the token. The token
then proceeds around the ring until it comes to the
computer for which the data is meant. At this point the data
is captured by the receiving computer. The token ring
protocol requires a star – wired ring using twisted pair or
fiber optic cable. It can operate at transmission speed of 4-
16 Mbps.

You might also like