Home>ASME standards>ASME B31.8S-2014 pdf download

ASME B31.8S-2014 pdf download

ASME B31.8S-2014 pdf download.Managing System Integrity of Gas Pipelines.
This methodology may not be applicable or sufficient for nonflammable gases, for toxic gases, for heavier- than-air flammable gases, for lighter-than-air flammable gases operating above 1,450 psig (10 MPa), for gas mix- tures subject to a phase change during decompression, or for gases transported at low temperatures, such as may be encountered in arctic conditions. For gases outside the range of para. 3.2.1, the user must demonstrate the applicability of the methods and factors used in the determination of the potential impact area. 3.2.3 Performance-Based Programs — Other Considerations. In a performance-based program, the operator may consider alternate models that calculate impact areas and consider additional factors, such as depth of burial, that may reduce impact areas. 3.2.4 RankingofPotential Impact Areas. The opera- tor shall count the number of houses and individual units in buildings within the potential impact area. The potential impact area extends from the extremity of the first affected circle to the extremity of the last affected circle (see Fig. 3.2.4-1). This housing unit count can then be used to help determine the relative consequences of a rupture of the pipeline segment. The ranking of these areas is an important element of risk assessment. Determining the likelihood of failure is the other important element of risk assessment (see sections 4 and 5). 3.3 Consequence Factors to Consider When evaluating the consequences of a failure within the impact zone, the operator shall consider at least the following: (a) population density 9 (b) proximity of the population to the pipeline (including consideration ofmanmade or natural barriers that may provide some level of protection) (c) proximity of populations with limited or impaired mobility (e.g., hospitals, schools, child-care centers, retirement communities, prisons, recreation areas), particularly in unprotected outside areas (d) property damage (e) environmental damage
4.2 Data Requirements The operator shall have a comprehensive plan for collecting all data sets. The operator must first collect the data required to perform a risk assessment (see section 5). Implementation of the integrity manage- mentprogramwilldrive the collectionand prioritization of additional data elements required to more fully understand and prevent/mitigate pipeline threats. 4.2.1 Prescriptive IntegrityManagement Programs. Limited data sets shall be gathered to evaluate each threat for prescriptive integrity management program applications. These data lists are provided in Nonmandatory Appendix A for each threat and summa- rized in Table 4.2.1-1. All of the specified data elements shall be available for each threat in order to perform the risk assessment. If such data are not available, it shall be assumed that the particular threat applies to the pipeline segment being evaluated. 4.2.2 Performance-Based Integrity Management Programs. There is no standard list of required data elements that apply to all pipeline systems for perform- ance-based integrity management programs. However, the operator shall collect, at a minimum, those data elements specified in the prescriptive-based program requirements. The quantity and specific data elements will vary between operators and within a given pipeline system. Increasingly complex risk assessment methods applied in performance-based integrity man- agement programs require more data elements than those listed in Nonmandatory Appendix A. Initially, the focus shallbe oncollecting the data neces- sary to evaluate areas of concern and other specific areas of high risk. The operator will collect the data required to perform system-wide integrity assessments, and any additional data required for general pipeline and facility risk assessments. This data is then integrated into the initial data. The volume and types of data will expand as the plan is implemented over years of operation.
4.5 Data Integration Individual data elements shall be brought together and analyzed in their context to realize the full value of integrity management and risk assessment. A major strength of an effective integrity management program lies in its ability to merge and utilize multiple data elements obtained from several sources to provide an improved confidence that a specific threat may or may not apply to a pipeline segment. It can also lead to an improved analysis of overall risk.

Related PowerPoint Templates

Template Categories
Popular Tags