L ON M ARK ® Profiles - What Works Alex Chervet Echelon Corp.

Slides:



Advertisements
Similar presentations
CESG, Fall 2011, 5 th November 2011 Stuart Fowell, SciSys Device Virtualisation and Electronic Data Sheets.
Advertisements

HWg-Juno HW group is a manufacturer of IP-based sensors from Prague, Czech republic. HWg delivers remote monitoring & control solutions.
Supporting New Business Imperatives Creating a Framework for Interoperable Media Services (FIMS)
In this presentation you will:
September 20, 2002G2E 2002 GSA Technical Forum1 Best Of Breed (BOB) Standard.
VoipNow Core Solution capabilities and business value.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 15 Slide 1 Real-time Systems 2.
Using the NXT Light Sensor. 2 Connect One Light Sensor – 1 From My Files use Left / Right NXT buttons and get to View menu and push Orange button. From.
28.2 Functionality Application Software Provides Applications supply the high-level services that user access, and determine how users perceive the capabilities.
From the market leader in digital signage players
Introduction to System Analysis and Design
590ES1 Design of Plant Care System Mike Swift Steve Swanson Stefan Bjarni Sigurdsson.
Web Services Andrea Miller Ryan Armstrong Alex. Web services are an emerging technology that offer a solution for providing a common collaborative architecture.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
REAL-TIME SOFTWARE SYSTEMS DEVELOPMENT Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
Integration of Applications MIS3502: Application Integration and Evaluation Paul Weinberg Adapted from material by Arnold Kurtz, David.
Getting the O in I/O to work on a typical microcontroller Activating a FLASH memory “output line” Part 1 Main part of Laboratory 1 Also needed for “voice.
Energy Smart Room GROUP 9 PRESENTERS DEMO DATE SPECIAL THANKS TO ADVISOR PRESENTERS Thursday April 19, 2007 Department of Electrical and Systems Engineering.
Introduction to BACnet
Unit 3a Industrial Control Systems
Internet GIS. A vast network connecting computers throughout the world Computers on the Internet are physically connected Computers on the Internet use.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse 2.
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
Software Engineering Muhammad Fahad Khan
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse.
CS3500 Software Engineering How does a “program” differ from a “software system”? Program System Tens to hundreds of lines of code Thousands to millions.
REAL-TIME SOFTWARE SYSTEMS DEVELOPMENT Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
1 Sales Academy Training Inner Range Product Advantages, Competitors & The Future.
DESIGN & IMPLEMENTATION OF SMALL SCALE WIRELESS SENSOR NETWORK
How to connect non IP devices into the UPnP™v1 fabric Vijay Dhingra Director of Standards Echelon Corp.
OPC – OLE for PROCESS CONTROL By: Mugdha More. Swagata Bhaumik.
VTT-STUK assessment method for safety evaluation of safety-critical computer based systems - application in BE-SECBS project.
Experts in Chem-Feed and Water Treatment An Overview of Possibilities Dulcometer Disinfection Controller ( DDC )
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 2Slide 1 Chapter 2 Computer-Based System Engineering As modified by Randy Smith.
Introduction to Robo Pro
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
2A – Acquisition and Automation technology Application Features Summary.
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
Forging new generations of engineers
1 Introduction to Middleware. 2 Outline What is middleware? Purpose and origin Why use it? What Middleware does? Technical details Middleware services.
1 Click to edit Master title style ROCKWELL COLLINS STEP VISION Jack R. Harris Director, Advanced Manufacturing Technology Rockwell Collins
Topics of presentation
Overview What is Arduino? What is it used for? How to get started Demonstration Questions are welcome at any time.
Opening Remarks This information is confidential and is not to be provided to any third party without Vicon Industries Inc. prior written consent.
REAL-TIME SOFTWARE SYSTEMS DEVELOPMENT Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
The Alternative Larry Moore. 5 Nodes and Variant Input File Sizes Hadoop Alternative.
March 2004 At A Glance NASA’s GSFC GMSEC architecture provides a scalable, extensible ground and flight system approach for future missions. Benefits Simplifies.
Embedded Design Using ARM For Strong Room Security System
® IBM Software Group © 2004 IBM Corporation Developing an SOA with RUP and UML 2.0 Giles Davies.
Thoughts on KeySec John Viega
©2008 R. Gupta, UCSD COSMOS Summer 2008 Peripheral Interfaces Rajesh K. Gupta Computer Science and Engineering University of California, San Diego.
ATIS’ Service Oriented Networks (SON) Activity Andrew White, Nokia Siemens Networks DOCUMENT #:GSC15-PLEN-81r1 FOR:Presentation SOURCE:ATIS AGENDA ITEM:PLEN.
Carnegie Mellon University © Robert T. Monroe Management Information Systems Cloud Computing I Cloud Models and Technologies Management.
HOME SECURITY WITH PLC’S Brandon Ballou EKU, Dept. of Technology, CEN/CET.
1 Prof. Dr. Nizamettin AYDIN
© 2009 IBM Corporation IBM Manufacturing Integration Framework Cristina Morariu Brasov, 15 March 2012.
Service Oriented Architecture Enabling the Agile and Flexible Business of the 21 st Century.
LonWorks Introduction Hwayoung Chae.
An Overview When Connecting to Yaskawa Drives Date: 8/14/06, Rev: PP.AFD.26.
Monitoring Dynamic IOC Installations Using the alive Record Dohn Arms Beamline Controls & Data Acquisition Group Advanced Photon Source.
to Help Meet Interoperability Standards for the
Module 4 Remote Login.
Programmable Logic Controllers (PLCs) An Overview.
NGMN & Open Source Sudhagar Chinnaswamy Principal Software Engineer.
ATIS’ Service Oriented Networks (SON) Activity
Input-Output-Process Demo
Hierarchical IOT Protocol
Intelligent HVAC Control
Introduction and Overview
NFMT Quick Fire Presentation: Solving Your Peace of Mind Problem Presenter: Cam Rogers Director of International & Western US Sales June 12, 2019.
Presentation transcript:

L ON M ARK ® Profiles - What Works Alex Chervet Echelon Corp.

2 Agenda How to build a closed proprietary system Why be closed? How to build an open system Why be open? Using open standards in a closed or proprietary fashion

3 Agenda (cont.) Using open standards in an open, interoperable fashion Network Variables Creating and publishing open interfaces Open interfaces are not enough –Being a good network citizen

4 How to build a closed system Use special hardware –“Homebrew” bit-shifting interface Use standard hardware in a non-standard way –RS-232 running at 5500 baud Create your own protocol (e.g. AlexTalk) Use a standard protocol as the transport but create your own unique message format –Application messages instead of NVs

5 Why be closed? It allows you to make simplifying assumptions about your system –My system will only ever have 10 devices, 9 of the devices always talk back to the master, … Closed systems make it more difficult for your customers to choose one of your competitors as a future supplier or for service needs

6 How to build an open system Don’t do the things listed on slide #4 Publish your interface Don’t use system specific definitions –Up / Down / Pass / Nudge chime Don’t force people to adopt your semantics –Use L ON M ARK definitions, not your own. Allows a single set of semantics to apply across industries

7 Why be open? Your customers are demanding it! Using open systems allows you and your customers to assemble “best of breed” products into the final design Open systems provide a platform that is easily leveraged into the next generation of your design –The software interface that was supplied to customer “A” is the same interface that will be asked for by customer “B”.

8 Why be open? (cont.) Open systems offer multiple sources of supply and greater economies of scale - which lead to lower costs You can react quickly to customer needs by utilizing off-the-shelf products –May require a business shift from pure manufacturing to a combination of manufacturing and system integration –Only manufacture parts/components where you add significant value - focus on your core competencies

9 Watch out for these people! Using open systems in a closed or proprietary fashion –Usually motivated by the belief that they can “lock-in” their customers Example –A manufacture might claim they are “open” because they use LonWorks as their network protocol. However, if the content of the LonTalk packets is unpublished or controlled by a single vendor, the system is not truly open

1010 What L ON M ARK is about interoperableUsing open standards in a truly open, interoperable fashion –Although the concepts set forth by L ON M ARK could be applied to any networking technology, L ON M ARK profiles assume an IEEE-1473L implementation TM

1 Command Vs. Information based systems

1212 “Command-Based” systems Motion DetectorLamp ON/OFF Command The decision to turn the lamp ON or OFF is made in the motion detector. This system applies a master/slave approach to control. The master (motion detector) commands everything in the system.

1313 Adding a device is difficult! Motion Detector Lamp ON/OFF Command Alarm Bell If the motion detector is commanding everything in the system, adding a new device (the Alarm Bell) requires a software change in the motion detector. The motion detector now has to send commands to the alarm horn as well as the light! Sound Alarm Command Alarm

1414 “Information-Based” systems Key Pad Key Code Control Knob 0% - 100% Motion Detector Motion Lamp Brightness Room Occupied Alarm Bell Sensors “publish” information, and actuators “subscribe” to the information which interests them! Feedback Alarm Arm / Disarm Intruder

1515 “Information-Based” systems Key Pad Control Knob 0% - 100% Motion Detector Motion Lamp Brightness Room Occupied Alarm Bell Key Code The details of how devices are connected or “bound” together are abstracted by LonWorks. Binding can occur at any time without affecting the application program in the device! Feedback Alarm Arm / Disarm Intruder

1616 Defining an open software interface

1717 Use Network Variables SNVT_angle SNVT_lev_cont SNVT_speed SNVT_temp Network Variables (Semantics defined by L ON M ARK ) Temperature, Degrees Celsius, , 0.1 degree Speed, Meters/Sec, , 0.1 m/s Continuous Level, Percent, %, 0.5% Phase/Rotation, Radians, , rads Network Variables provide semantic information about their data Connections can be defined at any time

Room Temp Set Point Temp Set Point Temp Sensor (Made in USA) Setpoint Display (Made in Canada) Boiler System (Made in Europe) Engineering units are defined

1919 Object Name & Number Mandatory Network Variables Optional Network Variables Manufacturer Specific Network Variables Configuration Properties Hardware Outputs Hardware Inputs Config Props L ON M ARK functional profiles

2020 Sample Profile “Chime”

2121 Chime - proposed elevator profile SNVT_Chime nviChime SNVT_lev_cont nviChimeVol Configuration Properties Mandatory Network Variables Optional Network Variables Object Type 4 Audible Signal “The chime object interacts with the elevator control system or other L ON M ARK node…” “The chime can output one of five signals: fast tone for floor passing, one tone for up, two tones for down, nudging, fire service.”

2 The Code network input SNVT_chime nviChime; typedef enum { up = 1, down = 2, pass = 3, nudge = 4, fireserv = 5, enable = 6, disable = 7 }(S)NVT_Chime; network input SNVT_lev_cont nviChimeVol; Proposed SNVT contains elevator specific enumerations! Enable/Disable has nothing to do with the actual tone. This should be handled using a third NV. Possibly okay, but why not use SNVT_Sound_db, it was meant to define audio volume.

2323 Configuration Properties Mandatory NVs Optional NVs Object Type 4 Chime - a better solution SNVT_Switch nviPlay Configuration Properties Audible Signal SNVT_sound_db nviVol SNVT_Switch nvEnable SNVT_Freq nviFreq SNVT_Millisecond nviDuration SNVT_Switch nvEnableFb