1 / 10

R enesas U biquitous N etwork Layer for M etering Applications (RUN-M) overview

R enesas U biquitous N etwork Layer for M etering Applications (RUN-M) overview. Building blocks for AMR infrastructures. Renesas provides all Building blocks (picture) for a typical AMM infrastructure Customers just focus on the “What” rather than on the “How” (to communicate)

tadhg
Télécharger la présentation

R enesas U biquitous N etwork Layer for M etering Applications (RUN-M) overview

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Renesas Ubiquitous Network Layer forMetering Applications (RUN-M) overview

  2. Building blocks for AMR infrastructures • Renesas provides all Building blocks (picture) for a typical AMM infrastructure • Customers just focus on the “What” rather than on the “How” (to communicate) • All building blocks extensively tested in the field • State of the art technology, fitting to today’s requirements • Short Time to market Application Reliable Network Control Intelligent Network Layer RUN-M SW mechanisms for access and error handling PLC optimized DLL Highly robust modulation technology DCSK (Spread Spectrum) proven to be the most robust

  3. Building Blocks – Physical Layer Highly robust modulation technology • DCSK modulation (Differential Code Shift Keying) • High Performance Spread Spectrum Technology • Most robust modulation available • Powerful Error Correction Code and packet Detection Schemes • Adaptive Packet detection -> solves False Locks issues • Extremely robust transmission mode • Clock recovery algorithm -> allows low accuracy crystal • Extremely robust against all characteristic power line phenomena • Spectral distortion • Narrow band and Harmonic interferences (even if time varying) • Pulses and spikes • Impedance modulation • Attenuation Proven as most robust technology available today

  4. Building Blocks – Data Link Layer SW mechanisms for access and error handling • Network address and node address • Configuration for CENELEC A, B, ARIB, FCC • CSMA/CA (Carrier Sense Multiple Access / Collision Avoidance) • Channel prioritization • Adaptive back off • Acknowledgement (configurable) • Re-transmissions (configurable) • Broadcast • Multi-hop broadcast (number of hops configurable) • Frame fragmentation and re-assembly • Packet filtering (configurable) • Control of line quality (by PHY) • Realtime handling by RTOS • Cross network communication (CNC) • Imposter detection

  5. Building Blocks- Network Layer Reliable Network Control • Tree based Network structure • Intelligent Network Setup • Join-On-Power-On : Join algorithm to ensure best possible connection, quality and lowest communication overhead • Intelligent failure handling • Self Healing Capabilities: If node loses parent it will rejoin • Dynamic reconfiguration • Network Configuration Recovery by EEPROM • Intelligent repeating mechanisms • Always ensuring best quality and low communication overhead • Tree based routing (multistage routing and repeating of messages) • Multiple message types • Unicast : Message sent to a particular node • Levelcast: Message send to all nodes at a particular level • Broadcast: Message send to entire network • Security features • Stub mechanism for Network Layer encryption • Detection and resolution of address conflicts

  6. Level 0 Concentrator Level 1 N101 N102 N1255 N201 N202 Level 2 Level 3 N301 Level 7 Tree based Network structure • Tree network structure • Up to 7 levels tree depth • Up to 255 nodes in each level • Allows 1.785 network particpants • Network is controlled by a main device (Concentrator) • Concentrator is the only device located on level 0

  7. Intelligent network setup ? Concentrator 0x0001 • New node sends join request to the network • Gets reply from all nodes which can listen and which can accept more children • Node analyses best offer securing • Best quality • Low traffic • New node connects with address 0x203 to 0x103 Node 0x0101 Node 0x0102 Node 0x0103 Node 0x0203 Node 0x0201 Node 0x0202 Node XXXX Join request Node 0x0301 Node 0x0302 Node 0x0303

  8. Node 0x0201 Node 0x0202 Node 0x0301 Node 0x0302 Self healing Concentrator 0x0001 • Each node in the network can check its parent availabiliy • The nodes will than connect to an alternative node (router) in case the parent node is offline Node 0x0101 Node 0x0102 Node 0x0103 Node 0x0201

  9. Routing downwards the network • A path is always secured up and downwards the Network Concentrator 0x0001 Concentrator 0x0001 Node 0x0101 Node 0x0101 Node 0x0103 Node 0x0103 Node 0x0102 Node 0x0102 Node 0x0201 Node 0x0202 Node 0x0201 Node 0x0202 Node 0x0301 Node 0x0301 0x0301

More Related