DCP COMMAND …bringing two-way communications to your DCPs.

Slides:



Advertisements
Similar presentations
Arctic IEC-104 Gateway Jari Lahti, CTO.
Advertisements

Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
HTTP Cookies. CPSC Application Layer 2 User-server state: cookies Many major Web sites use cookies Four components: 1) cookie header line of HTTP.
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
Slide 1 Industrial Automation - Customer View - Training PhW - CANopen_en 02/ 2002 CANopen QUIZ CANopen QUIZ.
1 Fox Valley Fire & Safety’s Wireless Radio Network Our customers experience reduced monitoring costs; normally 25% or more. Eliminates expensive phone.
May 2004Iridium Users Workshop, Seattle National Data Buoy Center’s Experiences with Real-Time Data Retrieval from Remote Stations using Iridium; and Data.
SSH: An Internet Protocol By Anja Kastl IS World Wide Web Standards.
Dynamic routing Routing Algorithm (Dijkstra / Bellman-Ford) – idealization –All routers are identical –Network is flat. Not true in Practice Hierarchical.
A CHAT CLIENT-SERVER MODULE IN JAVA BY MAHTAB M HUSSAIN MAYANK MOHAN ISE 582 FALL 2003 PROJECT.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
Introduction to TCP/IP
OUTLINE WHAT ? HOW ? WHY ? BLUEPOST Poster and Message Content Specified by the User Displaying the Poster Content on a Monitor Sending Messages to.
PPP (Point to Point protocol).  On WAN connection, the protocol depends on the WAN technology and communicating equipment:  Examples:  HDLC –  The.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
Point-to-Point Access: PPP. In a network, two devices can be connected by a dedicated link or a shared link. In the first case, the link can be used by.
Emergency Data Distribution Network Proposal to add an independent GOES DCS Reception and Distribution System to complement the NESDIS Wallops Island Facility.
Slide 1 / 20 Industrial Automation - Custumer View - Services PhW - Modbus_en 06/ 2002 Modbus training.
1 GOES DCS Status and Information Dan Schwitalla – th Meeting of the STIWG– 18 – 20 May 2009.
DCP COMMAND …bringing two-way communications to your DCPs.
1 EDDN Status and Information Dan Schwitalla – 2009 USGS STIWG/TWG – 6-8 May 2014.
 It defines the format of the frame to be exchanged between devices.  It defines how two devices can negotiate the establishment of the link and the.
Data Communications and Networks
FTP (File Transfer Protocol) & Telnet
Page 19/13/2015 Chapter 8 Some conditions that must be met for host to host communication over an internetwork: a default gateway must be properly configured.
Unicast Routing Protocols  A routing protocol is a combination of rules and procedures that lets routers in the internet inform each other of changes.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Introduction – Part II.
6.1. Transport Control Protocol (TCP) It is the most widely used transport protocol in the world. Provides reliable end to end connection between two hosts.
© 2002, Cisco Systems, Inc. All rights reserved..
Core 3: Communication Systems. There are three terms that we will consider in relation to the speed of communication. Bits per second (bps) Baud Rate.
Follow the Data Data (and information) move from place to place in computer systems and networks. As it moves it changes form frequently. This story describes.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
TCP/IP TCP/IP LAYERED PROTOCOL TCP/IP'S APPLICATION LAYER TRANSPORT LAYER NETWORK LAYER NETWORK ACCESS LAYER (DATA LINK LAYER)

PROFIBUS Bus Monitor Monitor Features
Transport Layer: UDP, TCP
DINO PDR 17 October 2015 DINO Communication System Zach Allen Hosam Ghaith Mike Li.
Signaling Fifth Meeting. SundayMondayTuesday Sixth meeting Seventh meeting.
Argos-3 Test program DBCP WorkshopLa Jolla - October 2006 Argos-3: Update and Test Program.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
COMPUTER COMMUNICATION & NETWORKS Presented by MUTAASA AHMED.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Ethernet Network Fundamentals – Chapter 9.
…bringing two-way communications to your DCPs DCP COMMAND.
WWW: an Internet application Bill Chu. © Bei-Tseng Chu Aug 2000 WWW Web and HTTP WWW web is an interconnected information servers each server maintains.
3.2 Software Fundamentals. A protocol is a formal description of digital message formats and the rules for exchanging those messages in or between computing.
Project to Develop GOES DCS User Requirements TWG Presentation By Ernest Dreyer October 28, 2009.
Cisco 2 - Routers Perrine. J Page 112/19/2015 Chapter 8 TCP/IP Error Message Some of the conditions that must be met in order for host to host communication.
Video Streaming Transmission Over Multi-channel Multi-path Wireless Mesh Networks Speaker : 吳靖緯 MA0G WiCOM '08. 4th International.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
TCP/IP Illustrated, Volume 1: The Protocols Chapter 6. ICMP: Internet Control Message Protocol ( 월 ) 김 철 환
CIm -IE775 computer Integrated manufacturing Industrial & Manufacturing Enterprise Department The Wichita State University
1. Introduction and Background Network Performance and Quality of Service.
Computer Networks 0111-ICMP Gergely Windisch
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Week-7 (Lecture-1) Internet Protocols: TCP/IP, Client Server: Protocol: Specification in networking and Communications It defines the procedures to be.
Summary of DCS Manufacturers Meeting March 22/23, 2004 Peter Woolner Mitretek Systems
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
THE OSI MODEL By: Omari Dasent.
Recall IPv4 Datagram Format
Chapter 11 - Part 2 Data Link Control.
Chapter 3: Open Systems Interconnection (OSI) Model
Lecture 7 Exercise 7 1. Explain what are the connection-oriented communication and the connectionless communication. Give some examples for each of the.
Follow the Data Data (and information) move from place to place in computer systems and networks. As it moves it changes form frequently. This story.
Integrated Program Management
Computer Networks Protocols
Presentation transcript:

DCP COMMAND …bringing two-way communications to your DCPs

Before its too late!

DCP COMMAND

How does it work? The DCP COMMAND operates through the existing satellites on the old DCP I channels. The uplink originates at Wallops Island. A gateway at Wallops provides a way for users to send commands to their DCPs. The gateway performs authentication and security to control and regulate what commands are given to DCPs. In the field, a DCP COMMAND receiver connects to your DCP. The receiver listens for COMMANDS and communicates to the DCP using a standard protocol/interface. The command format allows for individual and group addresses. This allows a single command to affect all the DCPs in a group. The protocol supports predefined commands for common operational and maintenance functions. All manufacturer DCPs can support the same commands. A file transfer command allows for vendor specific data to be sent to a DCP. Replies are made on DCP channels set aside for DCP COMMAND or on normal DCP Channels

How much can you save with two-way? One customer with a 2 way system estimates they send 1 command a week for every 50 sites. If each command eliminates the need to visit the site and it costs $250 on average to visit a site, remote commands in a system of 200 stations, save $1,000/week, $52K/yr. Scale this to the entire GOES DCS with 20,000 active sites, the system is likely to have 400 commands a week for a saving of $100,000/wk -- $5,200,000/yr.

DCP COMMAND makes the impossible possible… DCS is currently trying to free up 100 bps channels for their reassignment as 300 baud channels. Currently it takes months even years to get a channel reassigned. Imagine doing the entire system in a day. DCP COMMAND makes it possible! DCS may already be too big to manage without DCP COMMAND and it is only getting larger!

What would You Do with 2- way communications to your DCPs? Request missing data? Request additional data? Adjust transmission settings? Change alarm thresholds? Adjust data collection settings? Perform Remote Diagnostics? Request special transmissions?

Other possible uses … Want more timely data during floods and other extreme events? With DCP COMMAND you can get current data from DCPS when you want it. Need to communicate with a technician in the field? DCP COMMAND let’s you do it. Want a digital picture from a DCP? DCP COMMAND can give it to you.

Is it safe and reliable? The communications protocol is designed to insure the DCP receives error free messages. The system will never pass to the DCP a command that has not been checked for errors and authenticated. Error checking includes error detection codes with an undetected error rate of less than 1 error in 10 ^10 bits. That’s less than 1 error in the lifetime of the system. The communication link is designed to operate with low gain antenna and use a minimum of power.

How is DCP COMMAND different from DCPI? More throughput baud vs 100 baud More data – up to 64K bytes vs 12 bits More reliability – error rate vs high error rates More security – message authentication Predefined and standard functions We could live without DCPI – we can’t live without DCP COMMAND!

Schedule Jan 2007 – Complete specifications for DCP COMMAND Receivers. Jun 2007 – Complete specifications for gateway system. Jan 2008 – Complete Prototype Receiver/DCP and Gateway development. Jun 2008 – Complete demonstrations, verification and validation tests. Jan 2009 – Complete Beta Receiver/DCP and Gateway development. Jun 2009 – Complete verification and validation tests.

What can you do? Complete the questionnaire Talk with us about your own needs and concerns. Get behind the effort Realize that this is our last chance to get two-way because of NTIA