Design and Analysis of Structural
Design and Analysis of Structural
org International Engineering Research Journal (IERJ) Special Issue 2 Page 4599-4610, 2015, ISSN 2395-1621
ISSN 2395-1621
Design and Analysis of Structural
Frame Based on Design Codes for
Subsea Applications
#1
Ajinkya Kulkarni, #2RatnakarGhorpade
1
kulkarni.ajinkya38@gmail.com
2
ratnakar.ghorpade@mitpune.edu.in
#12
Mechanical Engineering Department, MIT,
Kothrud, Pune 411038,
Maharashtra, India
Subsea Technology in offshore oil and gas production is a highly specialized field of Article History
application with particular demands on Engineering and Simulation. Oil and gas
Received :18th November 2015
fields reside beneath many inland waters and offshore areas around the world.
Various components and subsystems are required to be lifted, transported and Received in revised form :
deployed to seabed for subsea applications. Different structural frames and baskets
19th November 2015
are used to carry these subsea components as payloads. A structural frame to carry
the Flying lead of 1200m length and weighing 2500kg is designed, and analyzed to Accepted : 21st November ,
evaluate the efficiency ratio according to DNV 2.7-3 and Eurocode 3 using FEA. In 2015
different phases, the effect of environmental loads, accidental loads and permanent
loads is studied. Different load cases according to DNV 2.7-3 - Normal Lifting, Sea Published online :
Transport, Impact, Drop and Retrieval are performed and the member verification is 22nd November 2015
carried out. The structural integrity of different connections or joints within the
structure is checked. Finally, the Optimization is carried out to minimize the
efficiency ratio and to reduce the weight. The structure was analyzed in Autodesk
RSA and calculations were performed in PTC Mathcad. For different load cases the
efficiency ratio of the structure was in between 0.220 to 0.904 but the efficiency ratio
for drop case was beyond limit i.e. 1.045 before optimization and 0.809 after
optimization.
Keywords- Subsea, FLDF, Lifting analysis, Sling cables, Joints, PO unit, Retrieval
I. INTRODUCTION of unit should not increase the 0.85 times the yield stress
value. It is also the intention that PO unit certified according
Subsea is a term to refer to equipment, technology and to DNV 2.7-3 will meet all relevant requirements in DNV
methods employed in offshore oil and gas rules for planning and execution of marine operations.In the
development industries. Oil and gas fields reside beneath Past, Authors have analyzed structures such as skids using
many inland waters and offshore areas around the DNV 2.7-1 regulations. Authors did the analysis for normal
world.Different equipmentare to be deployed to the sea bed lifting case and impact load case. [7]This paper presents
for this purpose and structures (frames or baskets) are design and analysis of FLDF (Flying Lead Deployment
needed to carry those equipment. For a structure to be used Frame) as per DNV regulations. Various lifting analysis
for subsea applications, its lifting analysis is important operations such as Normal Lifting, Sea Transport, Impact,
before sea-going. Structure has to go through stages like Drop and Retrieval have been formulated with the help of
Lifting, Transportation and Deployment. Lifting analysis FEA (Finite Element Analysis) using Autodesk RSA
involves the study of effects of environmental loads, (referred to as Robot). Robot is an integrated graphic
accidental loads and permanent loads in all these stages. program for modeling, analyzing and designing various
DNV (Det Norske Veritas) establishes the rules and types of structures.
guidelines regarding classification, quality assurance and
certification of sea going structures.DNV 2.7-3 addresses all
types of Portable Offshore (PO) units.The acceptance
criteria according to DNV 2.7-3 is the stress in any member
(a) (b)
Fig. 1 FLDF Model (a) CAD Model
in SOLIDWORKS (b) FE Model in
Autodesk RSA II. OPERATIONAL CLASS DECISION
TABLE I
RISK EVALUATION
I. MASS ESTIMATION Partial safety factor value γM0 = 1.18 or 1/0.85 shall be used
for Eurocode calculations purpose. [2]
A. Normal Lifting
The Design loading on all elements in a lift with lifting
slings are calculated based on F (in kN). For all PO units, F
is given by,
F = Max {DF*MGW*g, 2.5*MGW*g}
Where, DF is design factor. For R45 operational class and
MGW less than 50T, the value of the Design factor is-
calculated based on [5], based on geometry to weight
relation and wave conditions. Details of this calculation are
not in the scope of this paper.
DF = 4.91
Thus, the new mass estimates are tabulated in Table III.
TABLE III
MASS ESTIMATES FOR LIFTING CASE
Mass value Mass used in
Fig. 2 Equally Distributed Payloads on FLDF
after DF calculations for
Maximum Gross Weight (MGW) is the maximum mass of
contingency (T) Normal Lifting (T)
the PO unit including payload. MGW is the sum of Tare
Tare Weight 11.55 56.71
Weight and the Payload. Where, Payload is the mass of the
equipment carried by the PO unit and Tare Weight is the Outer Drum
1.54 7.56
mass of an empty unit and equals to the combined mass of Payload
4.91
primary and secondary structure. For FLDF the Tare Weight Inner Drum
1.21 5.94
of the original model is 10.5T and Payload is 2.5T. Out of Payload
these 2.5T, Outer drums carry 1400kg; Inner drums carry MGW 14.3 70.213
1100kg weight. Thus MGW becomes 13T.After completing
the FE model, its mass is measured and compared with the
original design. The weight of the FE model is 5.57T and
the Tare weight of original frame is 10.5T. This difference
is because of removing secondary structure. The Tare
weight value is matched by scaling the density of the
material. The force density of the material S355 is increased
from 75,550N/m3 to 142,413N/m3. Mass estimate based on
CAD model may differ from the mass of an actual real
structure, so mass contingencies should be included to
account for inaccuracies and uncertainties in the mass
estimates. Here, 10% contingency (CF=1.1) is used for mass
Fig. 3 FE Modelling for Normal Lifting case
estimation. [1] For Normal Lifting case, the sling angle with the vertical
TABLE II
is 30˚, length of the cable is 4m, diameter of the cable
MASS ESTIMATES AND CONTINGENCY section is 18mm and material used is steel. Sling strength
Mass used in and selection is not the scope of this work. The master link
Original is pinned.
Basis CF calculations
Mass (T) After calculations, the maximum vonMises stress is
(T)
Solid obtained at upper bar of the outer drum and it is 345MPa.
Tare Weight Work 10.5 11.55 B. Impact Loading
s Impact loads may occur during lift off or set down of PO
Units and they are a result of the relative velocitiesbetween
Outer Drum
1.4 1.1 1.54 transport vessel deck and the hanging load. Impacts loads
Payload
Input occur randomly and are of very shortduration. Due to the
Inner Drum
1.1 1.21 inherent uncertainties in the input parameters it is not
Payload
considered feasible to calculate these loads accurately.For
MGW 13.0 14.3 R45 operational class, [1]
III. LIFTING ANALYSIS
FHI = 0.08*2.5*MGW*g = 28.05kN
FVI = 0.08*F = 55.084kN
According to DNV 2.7-3, three different methods are To study the Impact loads, the cables are removed and
fixed support is applied at the position of padeyes. The
available for design analysis. Those are Eurocode, Elastic
vertical impact force is applied at the middle of the
FEA and Limit FEA method. In this paper, Eurocode
analysis method is used. Design calculations are performed horizontal bar at the bottom and horizontal impact force is
according to Eurocode 3 (EN-1993-1-1) for steel structures. applied at the outermost bar of the outer drum.
DNV says, The vonMises stress produced due to the design For vertical impact, the global maximum von Mises stress
loads shall not exceed 0.85 times the yield stress, i.e. The is obtained at upper bar of the outer drum. It is 70.5MPa.
(a) (b)
Fig 5 FE Modelling (a) Vertical Impact Test (b) Horizontal Impact Test
TABLE IV
EFFICIENCY RATIO FOR DIFFERENT STAGES IN LIFTING ANALYSIS
S, Mises Eurocode
Sr. Run Time
Stage Efficiency Efficiency
No. Stress (MPa) Class of section (Sec)
ratio ratio
1 Normal Lifting 345 1.15 1 0.672 42
2 Sea Transport 315 1.051 1 0.886 71
3 Horizontal Impact 153.5 0.511 1 0.287 36
4 Vertical Impact 70.5 0.235 3 0.220 34
5 Drop 375 1.247 1 1.045 39
6 Retrieval 221 0.735 1 0.904 97
TABLE V
MEMBERS HAVING LEAST EFFICIENCY RATIO IN ALL CASES
Bar No. Normal Lifting Sea Transport Vertical Impact Horizontal Impact Drop Retrieval
8 0.043 0.007 0.026 0.05 0.076 0.04
40 0.043 0.007 0.021 0.055 0.076 0.04
From Table VI, it is seen that for drop case, still the
efficiency ratio is above one. To bring it below 1, code
group design operation is performed using Autodesk Robot. Fig. 14Efficiency ratio for different cross sections under code group design
First the members having efficiency ratio above 1 are
listed. From analysis of drop case, it is seen that C section IV.
bars at the bottom are having maximum efficiency ratio.
Thus all the bars having C section are grouped together.All FLDF is an R45 class structure, with MGW = 13T. The
the channel sections in the Eurocode database i.e. UAP, efficiency ratio is calculated according to Eurocode using
UPE, UPN and UPAF are selected and asked for calculation Autodesk RSA tool. Initially the efficiency ratio for drop
of efficiency ratio of the group members for each of the case is above 1. Thus, optimization process is performed
sections selected. and efficiency ratio for drop case brings to 0.801
The results are summarized in table VII.
V. CONCLUSION
CONFIDENTIALITY STATEMENT
Copyright of all material including photographs, drawings and images in
this document remains vested in Aker Solutions and third party contributors
as appropriate. Accordingly, neither the whole nor any part of this
document shall be reproduced in any form nor used in any manner without
express prior permission and applicable acknowledgements. No trademark,
copyright or other notice shall be altered or removed from any reproduction.
REFERENCES
[1] DNV 2.7-3 Standard for certification Portable offshore Unit, May 2011
[2] Eurocode 3 BS 1993-1-1_2005 Design of steel structures - General
rules and rules for buildings
[3] Eurocode 3 BS EN 1993 -1-8_2005 Design of steel structures – Design
of joints
[4] API RP 2GEO Geotechnical and foundation design considerations,
First Edition, April 2011
[5] DNV RP H103 Modelling and Analysis of Marine Operations, April
2011
[6] Eurocode 1991-1-7 Actions on structures - Accidental Actions
Web delivered services and applications have dedicated container, an isolated virtual computing
increased in both popularity and complexity over the past environment. We use the container ID to accurately
few years. Daily tasks, such as banking, travel, and social associate the web request with the subsequent DB queries.
networking, are all done via the web. Such services typically Thus, Double Guard can build a causal mapping profile by
employ a web server front end that runs the application user taking both the web server and DB traffic into account.
interface logic, as well as a back-end server that consists of
a database or file server. Due to their ubiquitous use for II. RELATED WORK
personal and/or corporate data, web services have always
been the target of attacks. These attacks have recently
become more diverse, as attention has shifted from attacking Double guard and its classification:-
the front end to exploiting vulnerabilities of the web Double Guard is a system used to detect attacks in multitier
applications in order to corrupt the back-end database web services [1] [2].A network Intrusion Detection System
system (e.g., SQL injection attacks). can be classified into two types: anomaly detection and
misuse detection. Anomaly detection first requires the IDS
A plethora of Intrusion Detection Systems (IDSs) to define
currently examine network packets individually within both and characterize the correct and acceptable static form and
the web server and the database system. However, there is dynamic behaviour of the system, which can then be used to
very little work being performed on multitier Anomaly detect abnormal changes or anomalous behaviours. The
Detection (AD) systems that generate models of network boundary between acceptable and anomalous forms of
behavior for both web and database network interactions. In stored code and data is precisely definable. Behaviour
such multitier architectures, the back-end database server is models are built by performing a statistical analysis on
often protected behind a firewall while the web servers are historical data or by using rule-based approaches to specify
remotely accessible over the Internet. Unfortunately, though behaviour patterns. An anomaly detector then compares
they are protected from direct remote attacks, the back-end actual usage patterns against established models to identify
systems are susceptible to attacks that use web requests as a abnormal events [1] [2] [3].
means to exploit the back end. Methodology:-
To protect multitier web services, Intrusion This approach can create normality models of isolated user
detection systems have been widely used to detect known sessions that include both the web front-end (HTTP) and
attacks by matching misused traffic patterns or signatures. A back-end (File or SQL) network transactions [1] [3]. It
class of IDS that leverages machine learning can also detect employs a light-weight virtualization technique [1] [3] to
unknown attacks by identifying abnormal net-work traffic assign each users web session to a dedicated container, an
that deviates from the so-called “normal” behavior isolated virtual computing environment. It uses the
previously profiled during the IDS training phase. container ID to accurately associate the web request with the
Individually, the web IDS and the database IDS can detect subsequent
abnormal network traffic sent to either of them. However, DB queries. Double Guard forms container-based IDS with
we found that these IDSs cannot detect cases wherein multiple input streams to produce alerts. The correlation of
normal traffic is used to attack the web server and the input streams provides a better characterization of the
database server. system for anomaly detection because the intrusion sensor
has a more precise normality model that detects a wider
For example, if an attacker with non admin range of threats[1] [2] [3] [4].
privileges can log in to a web server using normal-user Possible Attacks:-
access credentials, he/she can find a way to issue a Some of the important attacks are generally used by
privileged database query by exploiting vulnerabilities in the attackers for hacking i.e. SQL injection, Direct DB Attack
web server. Neither the web IDS nor the database IDS ,Hijack future session attack, Privilege escalation[1] [2] [3]
would detect this type of attack since the web IDS would [5]and D-DOS attack [1].
merely see typical user login traffic and the database IDS
would see only the normal traffic of a privileged user. This
type of attack can be readily detected if the database IDS Algorithm Used:-
can identify that a privileged request from the web server is In order to detect such attacks algorithms which are being
not associated with user-privileged access. Unfortunately, used are Static model building algorithm [1] [2] [3] [4].
within the current multithreaded web server architecture, it
is not feasible to detect or profile such causal mapping Limitations:-
between web server traffic and DB server traffic since Vulnerabilities Due to Improper Input Processing :-
traffic cannot be clearly attributed to user sessions.
Once the malicious user inputs are normalized, Double
We present Double Guard, a system used to detect attacks in Guard cannot detect attacks hidden in the values [1].
multitier web services. Our approach can create normality
models of isolated user sessions that include both the web Possibility Of Evading Double Guard :-
front-end (HTTP) and back-end (File or SQL) network
transactions. To achieve this, we employ a light-weight It is possible for an attacker to discover the mapping
virtualization technique to assign each user’s web session to patterns by doing code analysis or reverse engineering, and
issue expected web requests prior to performing malicious Attacks such as SQL injection do not require compromising
database queries [1]. the web server. Attackers can use existing vulnerabilities in
the web server logic to inject the data or string content that
Distributed DOS attacks:- contains the exploits and then use the web server to relay
these exploits to attack the back-end database [fig 2]. Since
Previous Double Guard system was not designed to mitigate our approach provides a two-tier detection, even if the
D-DOS attacks. These attacks can also occur in the server exploits are accepted by the web server, the relayed contents
architecture without the back-end database. Denial-of- to the DB server would not be able to take on the expected
service attacks are common and fashionable these days. In structure for the given web server request.
denial-of service attack, attacker tries to prevent legitimate
users from using a service or shutting down a service owing
to some implementation vulnerability crashing the machine
[1].
System architecture:-
This is the system architecture design. In this, first the client
sends a request for price and other information related to a
particular product then that request is analyzed in order to
identify if the request is HTTP request or a query and this is
done using static model building algorithm.
system, usually one or more web servers. Such an attack Step 5: Forward AQ and AR to virtual server to
is often the result of multiple compromised systems validate.
flooding the targeted system with traffic.
Step 6: If attack identified then virtual system
automatically terminate the HTTP request.
Step 9: Exit.
VII.CONCLUSION
REFERENCE
[1].Mixing Le, Angelos Stavros, Member, IEEE, and Brent
ByungHoon Kang, Member, IEEE, IEEE Transactions on
dependable and secure computing, Double Guard: Detecting
Intrusions in Multitier Web Applications, VOL. 9,NO. 4,
March, 2014.
[2]. Mr. Chaudhari Hitesh Kumar, Prof. Ajay V. Nadargi,
Mr. Bodade Narendra, Mr. Shinde Sushil , Double Guard:
Detecting Intrusions in Multi-tier Web applications,
International Journal of Advanced Research in Computer
and Communication Engineering Vol. 4, Issue 2, February
2015.
[3].K.Karthika, K.Sripriyadevi, To Detect Intrusions in
Multitier Web Applications by using Double Guard
Approach., International Journal of Scientific and
Engineering Research Volume 4, Issue 1, January-2013.
[4]. ShapnaRani.E, G.Sathesh Kumar, Mythili.R,
Karthick.R. Intrusion Detection System for Multitier Web
Applications Using Double Guard, International Journal of
Engineering And Computer Science ISSN: 2319-7242
Volume 2 Issue 7 (July 2013), Page No. 2162-2166.
[5].Niraj Gaikwad, Swapnil Kandage, Dhanashri Gholap,
Double Guard: Detecting and Preventing Intrusions in
Multitier Web Applications, Networks and Systems, 2(2),
February March 2013, International Journal of Networks
and system.