














Conduct a criticality analysis by breaking selected pipes in the system, and viewing the generated report.
Tutorial resources
These downloadable resources will be used to complete this tutorial:
Transcript
00:03
The Vulnerability module of the Protector conducts a criticality analysis by breaking selected pipes in the system, one at a time,
00:12
and then determining if the pressures and flows can be satisfied with the pipe out of service.
00:19
A report showing the effects of each pipe break is generated at the completion of a Vulnerability analysis.
00:26
First, double-click the desired project .aprx file to open ArcGIS Pro.
00:34
Once the project starts, click the InfoWater Pro tab to open the InfoWater Pro ribbon.
00:41
In the Project panel, click Initialize.
00:45
Start by running a simulation for the current scenario.
00:49
On the InfoWater Pro ribbon, in the Analysis panel, click Run to open the Run Manager.
00:56
Click Run to run the simulation and create an output for the current scenario.
01:03
Close the Run Manager.
01:05
You can now access the Protector.
01:08
On the ribbon, in the Project panel, click Apps.
01:13
From the Apps Manager, select Protector, and then click Run to open the Protector app.
01:20
Switch to the Vulnerability tab.
01:24
Under Pipe Break Selection, enable Exclude Dead Ends, and select All to assess all pipes except dead ends in the model.
01:34
Under Simulation Data, click Select Time.
01:39
Use the slider to set the Desired Time to 06:00 hrs.
01:45
Click OK.
01:47
Under Save to Selection Set, from the Critical Pipes drop-down, select CRITICAL_PIPES.
01:54
From the Non-Critical Pipes drop-down, select NON_CRITICAL_PIPES.
01:60
Click Press. Criteria.
02:03
In the Edit Minimum Pressure Requirements dialog, verify that the Global Pressure Value is set to 20,
02:11
and that the Pressure Unit is set to psi.
02:15
Click OK.
02:17
Click Run to run the Vulnerability analysis and open the Vulnerability Report.
02:23
You can also click Report to view the Vulnerability Report after a run.
02:28
View the Status column to see which pipes passed or failed.
02:33
For those with a Status of “Fail”, you can investigate further.
02:38
If a pipe rupture caused the network to be hydraulically disconnected,
02:43
then an undesirable Flow Condition of “Cannot Supply Demand” is reported.
02:49
Otherwise, if the system remains hydraulically connected, a Flow Condition of “OK” is prompted.
02:57
If a pipe rupture results in a system that is hydraulically connected
03:02
but unable to deliver the minimum specified pressures, a Flow Condition of “OK” is reported.
03:09
In this case, the number of junction nodes that failed to meet the target pressures is displayed in the corresponding Pressure Violation field,
03:18
and the junction node with the maximum pressure violation is displayed in the Critical Node ID field.
03:26
Close the report.
03:28
Click Update Map to review the location of critical pipes by color:
03:33
Blue pipes are dead-end pipes.
03:36
Red pipes are critical pipes.
03:39
Green pipes are non-critical pipes.
03:43
Click Close to exit the Protector.
00:03
The Vulnerability module of the Protector conducts a criticality analysis by breaking selected pipes in the system, one at a time,
00:12
and then determining if the pressures and flows can be satisfied with the pipe out of service.
00:19
A report showing the effects of each pipe break is generated at the completion of a Vulnerability analysis.
00:26
First, double-click the desired project .aprx file to open ArcGIS Pro.
00:34
Once the project starts, click the InfoWater Pro tab to open the InfoWater Pro ribbon.
00:41
In the Project panel, click Initialize.
00:45
Start by running a simulation for the current scenario.
00:49
On the InfoWater Pro ribbon, in the Analysis panel, click Run to open the Run Manager.
00:56
Click Run to run the simulation and create an output for the current scenario.
01:03
Close the Run Manager.
01:05
You can now access the Protector.
01:08
On the ribbon, in the Project panel, click Apps.
01:13
From the Apps Manager, select Protector, and then click Run to open the Protector app.
01:20
Switch to the Vulnerability tab.
01:24
Under Pipe Break Selection, enable Exclude Dead Ends, and select All to assess all pipes except dead ends in the model.
01:34
Under Simulation Data, click Select Time.
01:39
Use the slider to set the Desired Time to 06:00 hrs.
01:45
Click OK.
01:47
Under Save to Selection Set, from the Critical Pipes drop-down, select CRITICAL_PIPES.
01:54
From the Non-Critical Pipes drop-down, select NON_CRITICAL_PIPES.
01:60
Click Press. Criteria.
02:03
In the Edit Minimum Pressure Requirements dialog, verify that the Global Pressure Value is set to 20,
02:11
and that the Pressure Unit is set to psi.
02:15
Click OK.
02:17
Click Run to run the Vulnerability analysis and open the Vulnerability Report.
02:23
You can also click Report to view the Vulnerability Report after a run.
02:28
View the Status column to see which pipes passed or failed.
02:33
For those with a Status of “Fail”, you can investigate further.
02:38
If a pipe rupture caused the network to be hydraulically disconnected,
02:43
then an undesirable Flow Condition of “Cannot Supply Demand” is reported.
02:49
Otherwise, if the system remains hydraulically connected, a Flow Condition of “OK” is prompted.
02:57
If a pipe rupture results in a system that is hydraulically connected
03:02
but unable to deliver the minimum specified pressures, a Flow Condition of “OK” is reported.
03:09
In this case, the number of junction nodes that failed to meet the target pressures is displayed in the corresponding Pressure Violation field,
03:18
and the junction node with the maximum pressure violation is displayed in the Critical Node ID field.
03:26
Close the report.
03:28
Click Update Map to review the location of critical pipes by color:
03:33
Blue pipes are dead-end pipes.
03:36
Red pipes are critical pipes.
03:39
Green pipes are non-critical pipes.
03:43
Click Close to exit the Protector.
The Vulnerability module of the Protector conducts a criticality analysis by breaking selected pipes in the system, one at a time, and then determining if the pressures and flows can be satisfied with the pipe out of service. A report showing the effects of each pipe break is generated at the completion of a Vulnerability analysis.
Start by running a simulation for the current scenario:
To access the Protector:
Blue pipes are dead-end pipes, red pipes are critical pipes, and green pipes are non-critical pipes.