This group of standards, created by the OPC Foundation, provides COM specifications for communicating data from devices and applications that provide historical data, such as databases. The specifications provides for access to raw, interpolated and aggregate data (data with calculations).
OPC Historical Data Access, also known as OPC HDA, is used to exchange archived process data. This is in contrast to the OPC Data Access (OPC DA) specification that deals with real-time data. OPC technology is based on client / server architecture. Therefore, an OPC client, such as a trending application or spreadsheet, can retrieve data from an OPC compliant data source, such as a historian, using OPC HDA.
Similar to the OPC Data Access specification, OPC Historical Data Access also uses Microsoft's DCOM to transport data. DCOM also provides OPC HDA with full security features such as user authentication and authorization, as well as communication encryption services. OPC HDA Clients and Servers can reside on separate PCs, even if they are separated by a firewall. To do this, system integrators must configure DCOM properly as well as open ports in the firewall. If using the Windows firewall, users only need to open a single port.
Famous quotes containing the words historical, data and/or access:
“What is the historical function of Parliament in this country? It is to prevent the Government from governing.”
—George Bernard Shaw (18561950)
“This city is neither a jungle nor the moon.... In long shot: a cosmic smudge, a conglomerate of bleeding energies. Close up, it is a fairly legible printed circuit, a transistorized labyrinth of beastly tracks, a data bank for asthmatic voice-prints.”
—Susan Sontag (b. 1933)
“The Hacker Ethic: Access to computersand anything which might teach you something about the way the world worksshould be unlimited and total.
Always yield to the Hands-On Imperative!
All information should be free.
Mistrust authoritypromote decentralization.
Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
You can create art and beauty on a computer.
Computers can change your life for the better.”
—Steven Levy, U.S. writer. Hackers, ch. 2, The Hacker Ethic, pp. 27-33, Anchor Press, Doubleday (1984)