13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Automated Meter Read<strong>in</strong>g and SCADA Application 229necessary. We assume also, that p is uniform with<strong>in</strong> the radio range and thesame for all nodes <strong>in</strong> the network. Then, we have proved that the maximumvalue for medium number of transmissions is:NT MAX = 1 · NH (5)1 − pAga<strong>in</strong> NT depends on NH directly. So, f<strong>in</strong>d<strong>in</strong>g the short paths to the UCsold be the basis of topology management and performance optimization. Wehave developed a custom algorithm to f<strong>in</strong>d these paths, but any other would bepossible [9,10,11,12,13,14] (most of these are designed for po<strong>in</strong>t to po<strong>in</strong>t communication).However, ASCADA def<strong>in</strong>es the UC at the application layer as thema<strong>in</strong> node. It is often present as a transmitter or receiver. Topologies describedpreviously make use of these properties to m<strong>in</strong>imize multiple hops and createpreference paths to the UC (based on a m<strong>in</strong>imum hops criteria). Moreover, sensornetworks usually select paths based either on power or quality l<strong>in</strong>k criteria[15,16]. Because a m<strong>in</strong>imum number of transmissions is the objective, our selectedcriteria quantify these transmissions as close as possible to reality. Let i, jbe two neighbor nodes. We def<strong>in</strong>e as pseudo-range from node i to the UC throughj :ρ ij = d j + nt ij d j = m<strong>in</strong> ( )ρ jx ∀x (6)Where d ij is the m<strong>in</strong>imum pseudo-range between j and UC, and nt ij is themedium number of transmissions between i and j, then, equation 6 assures thelocation of a short path follow<strong>in</strong>g a reasonable l<strong>in</strong>k quality along it, and loopfree.3 Augmented Scada Application OptimizationNodes always know the path to root through the parent node, but any selectedalgorithm must allow the root node (UC) to have an approximate image ofcurrent tree topology. This way, packets from nodes to the root do not conta<strong>in</strong><strong>in</strong>formation about rout<strong>in</strong>g. Conversely, messages from root to nodes generallyuse an explicit rout<strong>in</strong>g scheme, so packets must conta<strong>in</strong> <strong>in</strong>formation about thepath. Packet header size must be optimized because radio frames should be asshort as possible to reduce the transmission error ratio, effective bandwidth, etc.We propose <strong>in</strong> the paper to optimize application services <strong>in</strong> such a way sothat message traffic and rout<strong>in</strong>g header size are m<strong>in</strong>imal. In the follow<strong>in</strong>g, wesummarize all these application services:AMR services:– AMR Read : Root sends a read message to a node to read data or check ameter.– AMR Poll: Root sends a message to read data from all meters <strong>in</strong> a node.– AMR Collect: Root sends a message aga<strong>in</strong>, to read data from all nodes of asubtree.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!