Learn about data collection operations
- Last UpdatedFeb 25, 2025
- 2 minute read
PI Connectors (connectors) and OMF applications add new data to the PI System by scanning data sources and discovering data items. Data streams from connectors and OMF applications are routed through a PI Connector Relay (relay) to PI Server destinations (Data Archive and PI AF). The relay automatically creates PI points and assets based on what the connectors and OMF applications detect. Points and assets are updated as connectors and OMF applications scan for changes.
You use PI Data Collection Manager to configure and monitor the flow of data, which includes a data source, connector or OMF application, relay, and destination. PI Data Collection Manager is a browser-based management application for enabling connectors and OMF applications to send data through relays to PI Systems. In a typical configuration, each connector with individual data sources or OMF application is installed on a different host. For connectors, you configure data sources from PI Data Collection Manager or the PI Connector Administration site. Connectors can send data to one or more relays which you configure from PI Data Collection Manager. An OMF application can send data to one relay that you also configure from PI Data Collection Manager. From PI Data Collection Manager, you then specify the data you want to send to a PI Server destination. Finally, you use PI Data Collection Manager to monitor the health of the data flow.
The following figure is an example of a simple data collection operation. In this image, a control network contains a connector with its own data source. The connector feeds data into the relay installed on a separate secured host within a demilitarized zone (DMZ), which is not connected to the Internet. The relay transfers the data to one or more PI Server destinations that are behind a company firewall (two are shown), and creates elements and event frames in PI AF servers and PI points in Data Archive servers. The relay also communicates with PI Data Collection Manager in the DMZ, where you specify and administer all settings for configuring data flow.
Your own configuration could include multiple connectors, OMF applications, relays, and PI Servers, and could have fewer firewalls.
Note: The ports shown in the figure are for steady-state operation. Other ports may also need to cross the firewalls when connectors or relays are initially registered with PI Data Collection Manager. For a configuration summary on ports that each application listens to, see Security configuration summary.
PI Data Collection Manager may also be positioned in the control network rather than in the DMZ. For more information on positioning PI Data Collection Manager in the control network versus the DMZ, see Learn how to position with PI Data Collection Manager.