Design scheme of sewage treatment information integrated management system?

Sewage treatment is an industry that eliminates pollution, turns harm into benefit and benefits the people. The production and management data of sewage treatment plants are huge, and the relationship between the data is complex. If information management is not adopted according to the actual situation of sewage treatment, it will be difficult to ensure the reasonable operation of production, let alone improve the labor productivity of sewage treatment, reduce the cost of sewage treatment and meet the needs of rapid economic development in China. The design scheme of sewage treatment information integrated management system makes full use of the advantages of computer network, closely links management with production treatment, analyzes and sorts out production management data, and improves the overall work efficiency.

I. System objectives

The system objectives include: (1) establishing the network structure of workstations in various departments of the enterprise and forming the enterprise network information system. (2) Establish the information management of sewage treatment plant, realize the rational application of enterprise resources, make the annual plan of the enterprise, balance the material plan and capacity plan, and dynamically track the monthly production plan; Monitor the process operation and establish enterprise financial computerization, and comprehensively manage the four basic elements of the enterprise, such as manpower, equipment, materials and production methods, so as to provide accurate basis for the enterprise's production and operation decision. (3) Provide a comprehensive information inquiry system to provide decision makers with the basis for analysis and solution. (4) Establish the technical file database of sewage treatment industry. (5) Realize water quality monitoring and analysis. (6) Realize the management of factory affairs information. (7) Realize the sharing of enterprise information resources and equipment resources. (8) Establish enterprise office automation system. (9) Establish an information communication platform with external enterprises to gradually meet the e-commerce needs of enterprises.

Second, the information management system goal setting

Information management system mainly includes production data management and analysis, material inventory management, production planning, fixed assets management, equipment management, human resource management, quality management, comprehensive query, file management and other subsystem modules. The specific objectives of each system are as follows: (1) Data management and analysis. Collect production data in real time; Analyze the current production situation through production data; Manage historical production data. (2) Material inventory management. Improve the service level, ensure complete sets of equipment on time, according to quantity and variety, and meet the supply of various materials needed for production and operation economically and reasonably; Improve the level of inventory management, reduce the occupation of inventory funds and speed up the turnover of working capital; Reduce material consumption, reduce product cost and improve material utilization. (3) production plan. Guide the smooth progress of various production and business activities and realize the planning and control of the whole production and business activities; Using computer to process a large amount of information in the planning process makes the planning have good adaptability; Coordinate the gap between available resources and resource demand, that is, realize the optimal allocation management of resources; Arrange manufacturing resources reasonably and organize production with high efficiency and low consumption; Realize the query of related production plans through the network. (4) Management of fixed assets. Mainly deal with the accounting of fixed assets changes, depreciation accrual and fixed assets registration; Fixed assets items can be set at will as required. (5) Equipment management. Monitor equipment status and establish equipment file management. (6) Human resource management. (7) comprehensive inquiry. Query the data of each subsystem; Give different users different query rights. (8) File management. Category management, document file management, and scientific and technological file management; Modify, add, delete, insert, classify and adjust the serial number of all files according to the information such as year, classification number and storage period.

Third, the system planning scheme

(A) system design principles

Standardization and normalization of (1) system. The standardization and normalization of the system is the key step of information system construction. To realize information sharing, it is necessary to standardize information technology standards. (2) The practicability, stability and reliability of the system. The primary goal of system construction should be to meet the business needs of the work, and the construction scheme should be based on the actual acceptable capacity to avoid blind pursuit of new technologies. The software, hardware and information resources in the system must meet the requirements of reliability design, and the system must be able to run safely for a long time, that is, the design of the system must consider the system structure, design scheme, equipment selection, manufacturer's technical service and maintenance response ability, spare parts supply ability and so on. , so that the possibility of system failure is as small as possible, and emergency work plans and response measures are available for various possible emergencies. (3) Security of the system. Following the relevant information security standards, the system has a strong security defense mechanism, and should provide multi-mode, multi-level and multi-channel security measures to prevent illegal invasion and confidential information disclosure in various forms and ways and ensure the information security of the system. (4) Flexibility and expansibility of the system. With the rapid development of computer technology, the design of the system should make the network architecture smoothly transition to the new network architecture with minimum cost and be flexible to expand under the condition of ensuring software compatibility. The system should have strong adaptability, realize the separation of program and processing data, and do not need to modify the definition of application software, such as tables and data structures, which not only meets the requirements of superiors, but also meets the special needs of users themselves, and users can define and change them flexibly.

(2) Network structure

The network is mainly composed of two parts: intranet and information publishing system. According to the demand of enterprise user information management system, the advanced and mature fast Ethernet technology is adopted in the design of network system, and the high performance and reliability of the whole network system are realized with the best cost performance. In this way, users can also access this information system through the public network in other places. The goal of network design is: (1) The system adopts star network structure, and the damage of single machine has no influence on the whole system; (2) The system can run continuously with high fault tolerance technology; (3) star connection makes the station unrestricted, and the system will not stop when adding or subtracting stations; (4) Adopting practical client/server and browser/server structures; (5) The server adopts Windows NT system which is easy to manage; (6) The client adopts convenient and practical Windows 98, 2000 and XP.

Intranet/network open platform

Intranet is an enterprise internal network, which can be independent and self-sufficient, and can also become a part of Intranet through access very conveniently. Intranet technology is based on Web technology. Since it came out, it has rapidly developed into a collection with many intranet service functions. One of its advantages is that its protocols and technical standards are open, not limited to any hardware platform or operating system, and it can support multiple models and operating system platforms at the same time. The Web uses HTTP hypertext transfer protocol, and the document format used is HTML, which ensures the consistency of data in various platforms and different browsers. The web browser has a very friendly user interface, and anyone can roam in the ocean of information just by moving the mouse. Compared with any existing office automation software, it has incomparable advantages.

(4) System software

(1) operating system Windows NT Server. The system provides a complete solution for the computing environment of various organizations. From file printing operations to intranet and Internet services and mission-critical application support, all services are embedded in the operating system. From the basic point of view, Windows NT Server is designed as the most integrated, complete and convenient server operating system, and provides necessary evaluation, reliability and manageability for mission-critical applications. (2) Database system SQLServer 2000. SQL Server 2000 is a comprehensive distributed management framework, which centrally manages all database servers in an organization. Through enhanced Windows-based management tools and powerful server-based job scheduling, multiple servers can be intuitively controlled and remote operations composed of distributed environment commands can be automatically executed. Considering the integration with Internet, SQL Server also provides a high-performance web information access mechanism. Its new component, Web Assistant, can use SQL data to promote Web services in many ways, allowing company data to be distributed on private Internet or World Wide Web. (3) Client system software. The client operating system can adopt Windows NT Workstation 4.0 or Windows 98 Chinese version.

(5) System security strategy

Modern enterprise information system needs strong security monitoring ability, which can not only resist external invasion, but also control the authority of internal users according to the confidentiality of information. MRP2 adopts the overall security strategy of the system to ensure the maximum safe operation of the information system from the aspects of user awareness, network system and application system.

(1) The design principle of system security policy is a system engineering to ensure the security of network system. System design alone can not completely solve the problem, but also needs the close cooperation of network system managers and users. Therefore, when considering the security strategy of MRP2, we should follow the following principles: enhance the security awareness of leaders at all levels, system managers and all users, formulate system security management norms, supervise their implementation and check them regularly; Provide network security protection measures; Provide application system security protection measures.

(2) On the one hand, the intranet connected with the Internet has good openness, resource sharing, universal protocol and convenient interconnection, but it also brings serious security problems. When we open the intranet to the outside world, we must protect the confidential information of enterprises from the invasion of competitors, hackers and lawless elements. Therefore, it is necessary to solve the security control problem at the network level. Generally, it can be considered from three aspects. The first is system security. System security includes administrator's account and password, database access rights, email and other issues. In terms of operating system and database management system, manufacturers have fully considered security issues, and the key is how users strengthen management, such as access to important occasions, the quality of system administrators, and account management strategies. The second is information security. Mainly used for special information encryption. The third is network security. Firewall technology is usually used to ensure this. Firewall is a method to isolate the internal network from the external network. It can ensure the communication between the intranet and the outside world and reduce the invasion of external viruses. Firewalls are usually implemented in two ways-packet filtering-based firewalls and proxy-based firewalls. Most routers support firewall software, which is suitable for the whole network.

(3) System-level security policy. The first is the password. Password identification is a low-cost, easy-to-implement user identification technology, which is widely used in information systems. In the password identification mechanism, the information system assigns a user ID and a user password to each user. User identification uniquely identifies the user and is public; Passwords are used to verify the identity of users and are confidential. If a user wants to register in the system, he must first submit his user ID and password to the system. The system will judge whether he is a registered user according to his technical ID, and then decide whether to register him according to his password. The second is access control. Access control technology is to realize the sharing of resources under the condition of protecting the security of resources, and stipulate the access rights of users (reading, writing, saving, deleting, etc. ) to files, databases and devices in the form of access control lists. Third, make full use of Windows NT's security strategy. Including domain user management, server mirroring and disk mirroring technology (to ensure data security) and so on. The fourth is the proxy security policy. This policy can prevent unauthorized users from connecting to the Intranet. Combined with NT user authentication, administrators can set who uses the intranet and which services. Block access to restricted sites by IP address or domain. Fifth, make full use of the security strategy provided by the data management system. Including user authentication, setting access rights to the database, etc.

For more information about project/service/procurement bidding, and to improve the winning rate, please click on the bottom of official website Customer Service for free consultation:/#/? source=bdzd