Abstract:
The service phase of the electrical connection to a customer endpoint device located within a power distribution system is determined by various techniques. At the feeder level, the system may be programmed to induce momentary power interruptions, thereby causing missed zero crossings at the customer endpoint devices. The pattern of these interruptions is a controlled one, designed specifically to avoid causing noticeable disruption even to sensitive devices, but to be unusual enough that it is statistically unlikely to be naturally occurring. The monitoring of the zero crossing information is used to determine the phase of the service line to the customer endpoint devices.
Abstract:
To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.
Abstract:
A method and system for providing a network and routing protocol for utility services are disclosed. In one embodiment, a computer-implemented method comprises discovering a utility network, wherein a utility device (for example, a constant powered meter) sends network discovery messages to find the utility network. Neighboring meters are discovered and the device listens for advertised routes for one or more networks from the neighbors. The device is then registered with one or more utility networks, receiving a unique address for each network registration. Also illustrated in this invention disclosure is how each device of a class of devices (for example, battery powered meter) finds and associates itself with another device (for example, constant powered meter). The constant powered meter also registers its associate battery powered meter with the utility networks. The constant powered meter registers itself with the access points and the upstream nodes in the path out of each network. Each upstream node can independently make forwarding decisions on both upstream and downstream packets i.e. choose the next hop according to the best information available to it. The constant powered meter can sense transient link problems, outage problems, and traffic characteristics. It uses the information to find the best route out of and within each network. Each network device thus maintains multi-egress, multi-ingress network routing options both for itself and the device(s) associated with it.
Abstract:
A method and system for providing a network protocol for utility services are disclosed are disclosed. In one embodiment, a computer-implemented method determines whether a measured real signal strength differs from a an accepted real signal strength by a configurable control limit parameter. In the event the measured real signal strength exceeds either an upper or lower bound based upon the configurable control limit parameter a determination is made whether there has been an unacceptable number of measured real signal strengths that exceed either an upper or lower bound based upon the configurable control limit parameter. In the event there has been an unacceptable number of measured real signal strengths that exceed either an upper or lower bound, which may include reaching or exceeding a configurable out of bound incidence limit, then a determination is made to calculate a new accepted real signal strength.
Abstract:
Forward error correction is used in conjunction with detection of a start frame delimiter (SFD) to provide flexibility and to reduce missed instances of an SFD. Candidate SFDs in an incoming signal are identified using a lower-than-normal detection threshold, and corresponding markers are stored in a buffer. For each stored marker, a physical layer header following the candidate SFD is decoded with error-correction techniques, to determine whether uncorrectable errors exist. If so, the candidate is discarded and the next candidate is evaluated. If no uncorrectable errors exist, the candidate is declared a valid SFD, and the remaining signal is decoded. Dual detection thresholds can be employed in networks that permit both error-encoded and non-coded packets. A technique for selecting SFD patterns that facilitate higher performance is also disclosed.
Abstract:
A utility network interface device is provided for operation with a utility network. The utility network interface device includes a control unit configured to detect a tampering with a software component of a utility meter with which the utility network interface device is associated. The utility network interface device also includes a notification unit configured to output, external to the utility meter, a visual indication constituting notification of the tampering detected by the control unit. The control unit is configured to automatically control the notification unit to output the external notification of the tampering in response to the detection of the tampering. Also provided are a utility network including the utility network interface device, a method of operating a utility network interface device, and a computer-readable recording medium having a computer program recorded thereon for operating a utility network interface device.
Abstract:
A utility network interface device is provided for operation with a utility network. The utility network interface device includes a detector configured to produce a state signal upon occurrence of a prescribed state that interferes with the ability of a utility meter, with which the utility network interface device is associated, to measure consumption of a commodity and/or report consumption of the commodity. The utility network interface device also includes a control unit configured to detect a tampering with the utility meter in accordance with the state signal produced by the detector. The control unit automatically controls a notification unit to output, external to the utility meter, notification of the tampering detected by the control unit, in response to the detection of the tampering. Also provided are a utility network including the utility network interface device, a method of operating a utility network interface device, and a computer-readable recording medium having a computer program recorded thereon for operating a utility network interface device.
Abstract:
Methods and devices are disclosed for dynamically fragmenting packets transmitted in a communications network. Fragments are generated by splitting a packet based on a value of a fragment size parameter. A first fragment is sent to a receiving node. As the sending node, a transmission success parameter is determined that indicates whether the first fragment was successfully received. Based on the value of the transmission success parameter, a link quality parameter value representing a chance a second fragment having the same size as the first fragment will be successfully received by the receiving node is updated. The sending node compares the value of the link quality parameter and a value of a quality threshold parameter and changes the value of the fragment size parameter based on a result of the comparison.
Abstract:
A method and system for providing a network and routing protocol for utility services are disclosed. In one embodiment, a computer-implemented method comprises discovering a utility network, wherein a utility device (for example, a constant powered meter) sends network discovery messages to find the utility network. Neighboring meters are discovered and the device listens for advertised routes for one or more networks from the neighbors. The device is then registered with one or more utility networks, receiving a unique address for each network registration. Also illustrated in this invention disclosure is how each device of a class of devices (for example, battery powered meter) finds and associates itself with another device (for example, constant powered meter). The constant powered meter also registers its associate battery powered meter with the utility networks. The constant powered meter registers itself with the access points and the upstream nodes in the path out of each network. Each upstream node can independently make forwarding decisions on both upstream and downstream packets i.e. choose the next hop according to the best information available to it. The constant powered meter can sense transient link problems, outage problems, and traffic characteristics. It uses the information to find the best route out of and within each network. Each network device thus maintains multi-egress, multi-ingress network routing options both for itself and the device(s) associated with it.
Abstract:
A method of updating routing information in a network where reboot information of other nodes in the network is used to determine whether a given node has recent route updates. If the reboot information indicates the given node has not recently rebooted, then routing information from that given node is used to update the routing information of the comparing node. The reboot information may be a reboot counter which is incremented by a node in response to the node going through a reboot process. When a node reboots, it may request the reboot counter from neighboring nodes. The received reboot counter is compared to the stored reboot counter for at least one node. The rebooting node may choose to receive routing information from a node which has not had its reboot counter changed from the stored reboot counter. In the event none of the neighboring nodes have an unchanged reboot counter, requests may be made for the reboot counters of other nodes, which may be compared to the corresponding stored reboot counters, until the rebooting node discovers a node which has not recently rebooted according to the reboot counter, and may then download routing information from that node.