Innovating The Next Big Thing April 18, 2014 ph.gif
ph.gif
Sections

Analyst Insights
Enterprise Insights
Network & Information Security
Enterprise Mobility
Remembering 9/11
About

Next Innovator Group

TechnologyInnovator
• NextInnovator
EnterpriseInnovator
SecurityInnovator
DefenseInnovator
WirelessInnovator 
• HPinnovator
EnergyInnovator
TransportationInnovator
SMBinnovator (beta)

Contact

• NextInnovator(at)Live.com

Writers Wanted

Writers Wanted

Feedjit Live Web Stats


Next Innovators

Ghost City
Frontline Sentinel
• Innovation Insights
WebInno
Over the River
Enderle Group
Security Insights Blog 
McAfee Audio Parasitics
Rethinking Security
Ovum
iSuppli
Canalys
• eMarketer 
• CRM Help Desk SW 
Rethink Research
The Gadgeteer
Master the Moment

McAfee AudioParasitics


 
Barry's Books

 

Ads

ph.gif ph.gif
Enterprise Insights M2M Interoperability: Protocols Evolve to Meet Grid Requirements
Mar 11, 2012 – Tony Paine

There has been lots of discussion about how best to add the ‘smart’ into smartgrid – starting first with M2M interoperability between generation, distribution, transmission, and consumption within the electrical infrastructure. The Department of Energy calculates that our electrical grid comprises about 10,000 generating units with a generation capacity in excess of 1,000,000 megawatts of energy and over 300,000 miles of transmission lines. With a growing environmentally-conscious population and an increasing demand for energy, there needs to be serious M2M interoperability considerations when it comes to preparing for future requirements to support the grid’s infrastructure. 
 
M2M interoperability or connectivity technologies will be able to assist utility companies and technology providers to maximize use of their existing infrastructure. With costs estimated in the trillions once the grid is completed, and expenditures forecasted even higher if current generation plants and distribution facilities be shut down and replaced, it is certain that the population will not bear the cost to tear down buildings and homes to take advantage of the smart grid. Additionally, it is not feasible to start from the beginning and create a single standard or protocol to unify the elements of this ecosystem. Therefore our only option is to leverage what is already in place and retrofit pre-existing systems in a way that they interoperate and provide us with data to make smarter decisions.

The first step in creating a smarter grid was investing in an Advanced Metering Infrastructure (AMI). This technology enables utility companies to monitor energy usage in hourly intervals, which in turn provides them with the ability to base charges on whether energy is consumed during peak or non-peak times. It also enables consumers to determine the price of energy at any point in time. Smart meters have the ability to report power outages and quality of service through using an exchange of information between utility companies and consumers via the use of a protocol. Protocols help define the structure and transfer of information between entities.


A paradigm shift is underway in utilizing open protocols that provide M2M interoperability among vendors. The Internet Protocol Suite, which has global acceptance, will be the foundation for communications. Internet Protocols only provide lower-level communications interoperability at the network and transport layers. This in itself is important, because it allows vendors to select standardized components (such as Ethernet or Wi-Fi) to incorporate into their systems. These components can then be plugged into an existing infrastructure that is already connecting different players in the smart grid ecosystem. It is on top of these layers that systems and devices must build their application-level requirements, specifying the data and corresponding structure that will be exchanged.


The practice of creating application-level protocol requirements is not new to the power and building automation space. The power industry has its share of existing protocols allowing for M2M connectivity. In North America, DNP3 (Distributed Network Protocol) is used heavily in process automation for electric utilities, exchanging information between control centers, Remote Terminal Units (RTUs), and Intelligent Electronic Devices (IEDs). In Europe, the IEC 61850 protocol has been adopted and has similar functionality and characteristics as DNP3.

The building automation and control networks space includes BACnet, which is widely used in HVAC systems, lighting, security, and fire detection applications. In order to turn a building into a smarter building, the existing control and automation systems must interoperate with the smart grid.

Manufacturers are one of the largest consumers of energy. In order to automate the manufacturing process, M2M communications must occur among these various components. Much like the different components in a smart grid, each component utilizes its own protocol (which may be open and sometimes proprietary). The manufacturing industry was instrumental in creating OPC (Open Connectivity) as a standard. OPC is an abstraction layer between the different components and their underlying protocols. The latest version of OPC is known as OPC Unified Architecture (UA), and provides some of the same features that are required of the smart grid. OPC and UA helps retrofit proprietary-based systems into more open based systems and enables M2M communications, data sharing and real-time automated decision making. Power, building, and manufacturing markets’ standards and protocols are being evaluated closely to support the grid. Leveraging these protocols or building interoperable gateways will accelerate the grid’s creation.

Tony Paine is President and CEO of Kepware Technologies.


» Send this article to a friend...
» Comments? Tell us what you think...
» More Enterprise Insights articles...

AddThis Social Bookmark Button

Comments
blog comments powered by Disqus

Search EnterpriseInnovator

ph.gif ph.gif
Support This Site



Newest Articles

• 4/1 Innovation Insights: Geospatial Technologies and Humanitarian Goals: Can Geospatial Technologies Inspire Sympathy?
• 3/25 Ovum: Ovum comments: SAP and Adobe to jointly resell Adobe Marketing Cloud
• 3/24 McAfee Blog: Online Tax Time Scams: How to Avoid
• 3/24 McAfee Blogs: McAfee SIEM Enables Cloud Security and Reduces time and resources for Compliance demands for DTS
• 3/24 Ovum: Ovum forecasts CSPs’ capex to remain flat, while telecom vendors face a tough marketplace
• 3/24 Gartner Says a Thirty-Fold Increase in Internet-Connected Physical Devices by 2020 Will Significantly Alter How the Supply Chain Operates
• 3/24 Gartner Says Healthcare Providers in Middle East & Africa To Spend US $ 2.8 Billion on IT In 2014
• 3/21 McAfee Blog: Google Docs Phishing Campaign is Frighteningly Accurate
• 3/20 HP Security Products Blog: Happiness is…securing your app before you launch it!
• 3/20 Wireless Watch: Google and Samsung both start with the watch, but then wearables agendas diverge
• 3/20 Faultline: Vivendi picks the devil it knows best in French bunfight over mobile
• 3/20 Faultline: All singing and dancing TV Connect live with OTT, mobile, dongles, RDK
• 3/20 Gartner Says European CRM Budgets Remain Strong Despite Economic Uncertainty
• 3/19 Ovum: Increase in financial markets IT spending points to end of credit crunch
• 3/19 Gartner Says the Internet of Things Will Transform the Data Center
• 3/19 Gartner Says 70 Percent of CIOs Will Change Their Technology and Sourcing Relationships in the Next Two to Three Years
• 3/19 HP Security Products Blog: Big announcements for 4th Annual HP Government Summit
• 3/18 McAfee Blogs: Smartphone Kill Switch Could Become Federal Law
• 3/18 McAfee Blogs: Anxious About Summer Already? Create a Family Gadget Plan
• 3/18 McAfee Blogs: What is a Denial-of-Service Attack?
• 3/18 McAfee Blogs: Four Pillars Build the Foundation of Successful SIEM
• 3/17 McAfee Blogs: Online relationships are Anamorphic Illusions
• 3/17 McAfee Blogs: Experian ID Theft Exposed 200 Million Consumer Records
• 3/17 McAfee Blogs: Adaptive Threat Prevention – Reducing Attack Discovery to Containment in Milliseconds
• 3/17 Gartner Says Worldwide External Controller-Based Disk Storage Market Grew Five Percent in Fourth Quarter of 2013
• 3/13 McAfee Blogs: Anonymous, Syrian Electronic Army Lead Recent Hacktivist Actions
• 3/13 Ovum: Analyst view: EE’s ranking in RootMetrics study reflects its strategy for being one-step-ahead
• 3/13 Gartner Says Middle East & Africa IT Infrastructure Spending will Reach $3.5 Billion in 2014
• 3/13 eMarketer: Desktop Search to Decline $1.4 Billion as Google Users Shift to Mobile
• 3/13 Wireless Watch: Carrier aggregation reaches out to TDD and unlicensed spectrum
• 3/13 Wireless Watch: Carrier SDN needs to unify every network layer to maximize returns
• 3/12 McAfee Blogs: Analyzing the Uroburos PatchGuard Bypass
• 3/12 Ovum: Analyst View: Ovum sees security transformation underway
• 3/12 Ovum: Analyst view: MEPs voted for stronger protection for EU citizens’ personal data
• 3/12 Gartner Says New U.S. Government Rules Will Require IT Leaders to Consider How IT Infrastructure Can Help Promote Employment Opportunities for People with Disabilities
• 3/11 McAfee Blogs: Threats Timeline Tracks Recent Security Breaches
• 3/11 Ovum: Analyst view: Ifetel declares Telmex and Televisa as dominant in their respective markets in Mexico
• 3/11 Gartner Acquires Software Advice
• 3/11 Gartner Announces Customer 360 Summit 2014
• 3/11 eMarketer: AOL Rebounds as Programmatic, Video Push Double-Digit Growth
• 3/11 HP Security Products Blog: Consumers need security intelligence, too
• 3/10 Wireless Watch: WiFi Revisited - The effects of WiFi Offload
• 3/10 McAfee Blogs: Timeline of Bitcoin Events Demonstrates Online Currency’s Volatility
• 3/10 McAfee Blogs: Threat Intelligence Exchange: An Old Dog with Plenty of New Tricks
• 3/10 McAfee Blogs: Network Security Perspective: Point-of-Sale, Data Loss, and the Black Market
• 3/10 eMarketer: Mobile to Surpass Newspapers for UK Ad Spending
• 3/10 Canalys: Technology channel partners set for business transformation in 2014
• 3/9 McAfee Blogs: Welcome to the New McAfee Labs Quarterly Threats Report
• 3/9 Gartner Says Public Cloud Services in the Middle East and North Africa Region on Pace To Total $620 Million In 2014
• 3/7 HP Security Products Blog: How to prevent vulnerabilities in WiFi access points

AddThis Feed Button

Barry's Books


Ads

ph.gif
ph.gif Top ph.gif

© 2008 EnterpriseInnovator. All rights reserved.