Professional Documents
Culture Documents
Schneider Electric
One High Street
North Andover, MA 01845
(978) 975-9600
Fax: (978) 975-9782
http://www.schneider-electric.com/buildings
November, 2010
Contents
Chapter 1
7
9
10
11
11
12
13
13
15
15
15
15
16
16
17
18
18
18
20
20
20
22
22
23
23
23
24
24
24
25
25
27
28
5
Table of Contents
Installation ....................................................................................
Distributed Control .......................................................................
Monitoring and Maintenance .......................................................
Maintenance considerations .......................................................
Chapter 2
Appendix A
28
28
29
30
The Andover Continuum Wireless Solution ......................
33
Andover Continuum Wireless Technology ....................................
34
Overview ........................................................................................
34
Continuum Wireless Devices .......................................................
35
Wireless Adapter .........................................................................
35
Wireless Repeater .......................................................................
36
Wireless Maintenance Tool ..........................................................
37
Wireless Adapter Display ...........................................................
38
Wireless Adapter Table ..............................................................
39
Adapter Service Cable and Service Software ............................
39
Preventing RF Interference with Other Wireless Devices .........
39
Schneider Electric Wireless Adapter/Repeater RF Channel Considerations ...........................................................................................
40
Guidelines for CyberStation Wireless Control ..............................
42
CyberStation Wireless CommPort Control .................................
42
Setting the CommPort ................................................................
42
Performing a Learn Process .......................................................
44
CyberStation Control of Wireless Network Traffic .....................
45
Wireless Network Traffic and Data Collection Methods ..........
45
Wireless Network Traffic and APDU Timeouts ........................
46
CyberStation Control of Guaranteed Alarms (BACnet) .............
46
Guidelines for Designing Your Wireless Solution .........................
48
Major Design Factors ....................................................................
49
Site Surveys ..................................................................................
49
Adapter and Repeater Placement ................................................
50
New Wireless Installations ..........................................................
51
Replacing Older Networks ...........................................................
51
6 Schneider Electric
54
57
8 Schneider Electric
Chapter 1
Introduction to Wireless
10 Schneider Electric
LANs
When many of us boot up our computer, we are automatically
connected to our companys or organizations LAN. Most LANs cover a
small geographical area, such as a building or campus, and include
individual PCs and workstations that are referred to as nodes. Each
node has its own CPU and can execute programs individually, while
also having the option of using programs and accessing data from
servers anywhere on the network.
LANs are capable of transmitting data at very fast rates, but the
distances are limited, and there is also a limit to the number of
computers that can be attached to a single LAN.
There are many different types of LANs. The following characteristics
differentiate one LAN from another:
z
11
Internet
The Internet is a network of networks in which users at any one
computer can, if they have permission, send and receive information to
or from any other computer connected to the Internet.
The Internet is a public, cooperative, and self-sustaining facility
accessible to hundreds of millions of people worldwide. Physically, the
Internet uses a portion of the existing public telecommunications
networks.
Technically, the Internet uses a set of protocols called TCP/IP
(Transmission Control Protocol/Internet Protocol). Private sections of
the Internet, such as intranets and extranets, also use the TCP/IP
protocol.
The most commonly used features of the Internet are:
12 Schneider Electric
Wireless Terminology
Wireless technology is based upon embedding RF components (lowcost, low-power radios and microcontrollers) directly into a product.
Embedded RF uses high quality, low-cost, radio frequency integrated
circuit (RFIC) technology.
The following definitions describe some basic wireless terminology:
z
13
14 Schneider Electric
Background noise
All communication depends on separating the useful radio signal from
the background noise, and when there is a lot of background noise, it is
difficult to get signal through.
The ambient noise level is due primarily to atmospheric conditions and
local noise sources. In actual deployments the noise floor is varying
constantly, and the intensity of the noise can rise and fall by tens of
decibels. Very often, this is the major reason for changes in link quality.
15
16 Schneider Electric
Network Topologies
A wireless network can have different topologies, or organizations,
depending on the ways in which messages need to flow from one node
to another. A topology is established, based on answers to fundamental
questions, such as:
z
Star networks
Mesh networks
17
Point to Point
A point-to-point link, also called a wireless bridge, connects two nodes.
It serves as a wireless replacement for a single communication cable, as
shown below.
Point to Multipoint
Point-to-multipoint links, also called a hub and spoke, have one centralpoint node that controls communication with all of the other wireless
nodes in the network. Signals in point-to-multipoint communication
converge at the central-point node. The reliability of this
communication depends on the quality of the RF link between the
central point and endpoint. Point-to-point communication is used in
star network topology. (See Star Network Topology, later in this
section.)
18 Schneider Electric
flows through the hub. The following diagram shows star network
topology.
19
20 Schneider Electric
21
Low power consumption low-power radios and microcontrollers are imbedded directly into a product
The design objectives for control and sensing networks are reliability,
adaptability, scalability and redundancy.
The following sections describe these important design considerations:
z
Reliability
Adaptability
Scalability
Redundancy
Self-configuring
Self-healing
22 Schneider Electric
Scalability
Any network, wired or wireless, should scale gracefully as the number
of nodes increases. A mesh network is scalable by adding freestanding
repeater nodes in the middle of the network. A mesh network can
handle hundreds of nodes.
Since the operation of a mesh network does not depend on a central
control point, adding multiple data collection points or gateways is not
that different than adding another node to the mesh.
Redundancy
In a mesh network, the degree of redundancy is essentially a function
of node density. In an ideal mesh network, a node should have several
overlapping neighbors so that each device has two or more paths for
sending data. This is an easier way of obtaining redundancy than is
possible in most other types of systems.
Self-Configuring
A network should not need a person to tell it how to move a packet from
one end to the other. A mesh network is self-organizing and does not
require manual configuration.
Because it is self-configuring, adding new gear or relocating gear is as
simple as installing a wireless node and turning it on. The network
discovers the new node and automatically incorporates it into the
network without the need for a system administrator.
23
Self-Healing
Mesh networks are both self-configuring and self-healing. If a device in
a mesh network fails, messages are sent around it via other devices.
Loss of one or more nodes does not necessarily affect its operation.
A mesh network is also self-healing because human intervention is not
necessary for re-routing messages.
Proactive discovery
On-demand discovery
Dynamic routing
Proactive discovery
Proactive discovery causes routes to be discovered before messages
need to be routed. They assume that link breakages and performance
changes are always happening and are structured to continuously
discover and reinforce optimal linkages.
24 Schneider Electric
On-demand discovery
On-demand discovery networks, by contrast, only establish routes that
are requested by higher-level software, and only discover routes when
needed. This allows nodes to conserve power and bandwidth and keeps
the network fairly free of traffic.
However, if between transmissions the link quality between nodes has
degraded, it can take on-demand networks longer to reconfigure and
deliver a message.
25
26 Schneider Electric
Dynamic routing
Dynamic routing takes advantage of the broadcast nature of the
wireless medium. Messages are forwarded to the ultimate destination
using the path of least resistance. Upon receiving a packet
transmission, the neighbor that has the least cost to the ultimate
destination, forwards the packet first, while the other neighbors,
receiving the repeated packet do not forward the transmission. The
updated cost is included in the transmission, so nodes that have an
equal or greater cost do not forward the packet. Cost refers to the
number of hops (and signal strength) to reach a specified destination.
The illustration below shows an example of dynamic routing.
27
Installation
The most obvious benefit of installing a wireless system is the cost
savings from not having to install wiring. Using an RF communication
link to emulate wire saves greatly on the cost of wiring.
Another benefit of installing a wireless system is the speed of
deployment. Wired systems can take days or weeks to be properly
installed, isolated, or commissioned. Wireless networks require only
the nodes to be installed, savings hours or days for each instrument
installed. Other instruments can be added as required, without the
need for expensive, disruptive cabling and labor.
Finally, since wireless mesh networks are self-configuring, you
eliminate the need for high level system administration.
Distributed Control
Wireless, multi-hop, mesh networks provide a unique opportunity to
use distributed control.
The control of the wireless system is distributed throughout the
network, allowing intelligent peers to communicate directly to other
points on the network without having to be routed through some
central point.
28 Schneider Electric
29
Maintenance considerations
Another benefit of wireless systems is that maintenance personnel can
directly connect to diagnostic output without running wires. For
example, this could eliminate a huge task in the case of a tank level
sensor in a large storage tank, or a temperature probe at the top of a
tower stack.
30 Schneider Electric
31
32 Schneider Electric
Chapter 2
The Andover Continuum Wireless
Solution
33
34 Schneider Electric
Workstation
Ethernet
bCX Controller
Wireless
Adapter
Wireless
Adapter
i2/b3 Controller
Wireless
Adapter
Wireless
Repeater
Wireless
Repeater
i2/b3 Controller
Wireless
Adapter
Wireless
Adapter
Wireless
Adapter
i2/b3 Controller
i2/b3 Controller
i2/b3 Controller
(i2 or b3).
Wireless Adapter
As a Wireless Adapter, the device is attached to the RS-485 Service
(Comm) Port of the BACnet/Infinet bCX1 controllers, Infinet II (i2)
field bus controllers, and BACnet (b3) field bus controllers. This allows
the field bus controller to communicate with other controllers across a
wireless mesh network.
35
INPUT POWER
24
VAC40
50/60
VA
12-28
HZ
VDC 25
W
LINK/AC
T 10/10
0Mbp
s
ETHERNET
10/100
BASE T
N( )
L ( )
RD
BACNET (GREEN)
INFINET
(YELLOW)
CPU
SERVICE
PORT
T
D
RESTART
M
M
P
PORT
1
RS-232
(DTE)
DC
D
RTS
RD
T
D
xP EXP
PORT
2 VD
4 4C00m
A
COMM
RS-48
5
SHL
D
R
T
Controller
Wireless
Adapter
Wireless Repeater
As a Wireless Repeater, the device is used to provide redundant links
between Wireless Adapters connected to field bus controllers. When
used as a Wireless Repeater, the device is not connected to a controller,
and can be installed anywhere.
A repeater may be needed when there are long distances between
wireless-enabled controllers, to add additional network paths for
redundancy, or to compensate for obstacles, such as pipes or walls that
can attenuate or weaken the wireless signal between controllers.
The repeater requires a 3.3 5 VDC 5%, 75 mA power supply.
Note: To order the Repeater power supply from Schneider Electric, use
36 Schneider Electric
37
The following illustration shows the graphical user interface for the
WMT.
38 Schneider Electric
39
Because IEEE 802.11 RTS messages are protocol-specific, they are not
understood by IEEE 802.14.5 nodes and vice versa. However, if an
802.11 node and an 802.14.5 node transmit at the same time on the
same channel, they will interfere with each other. This is how
interference between the two networks can occur.
Testing shows the two factors that affect the performance of IEEE
802.14.5 networks in the presence of Wi-Fi are:
z
40 Schneider Electric
41
The comm port on your on your network controller must have the
Default Mode set to Wireless.
The software must Learn (discover and integrate) all the network
controllers into a Continuum network.
42 Schneider Electric
43
Note: The baud rate settings on this tab are not enabled. The baud
Click the Learn button to discover controllers that have been deployed
with Wireless Adapters. When the learn process completes, youll be
able to see the controllers on the Field Bus Controllers tab of the
CommPort editor.
44 Schneider Electric
Data collection
COV The COV method (available only for BACnet objects, such as
AnalogInput, AnalogOutput, and AnalogValue) is generally more
efficient when values do not change frequently. If, for example, values
change three or four times per minute, COV typically increases
network traffic. But if, for example, values change three or four times
per day, COV typically minimizes traffic.
For more information on COV, please see the Continuum online help
for the AnalogInput, AnalogOutput, and AnalogValue object editors.
45
46 Schneider Electric
On the Delivery tab, click the Add Recipient button to open the
Recipients Configuration dialog, as shown in the following
illustration.
47
48 Schneider Electric
Consideration
Distance between
nodes
Transmitter power
Proximity to other
wireless devices
Obstacles to RF
transmission
Power requirements
Site Surveys
The following list presents some general guidelines for surveying a site
for a wireless mesh network:
z
49
50 Schneider Electric
Save additional time and labor because the wireless mesh network
is self-configuring and self-correcting.
51
52 Schneider Electric
Appendix A
Frequently Asked Questions About
Wireless Controls and Dos and
Dont s
53
Appendix A: Frequently Asked Questions About Wireless Controls and Dos and Dont s
54 Schneider Electric
Appendix A: Frequently Asked Questions About Wireless Controls and Dos and Dont s
55
Appendix A: Frequently Asked Questions About Wireless Controls and Dos and Dont s
56 Schneider Electric
Appendix A: Frequently Asked Questions About Wireless Controls and Dos and Dont s
57
Appendix A: Frequently Asked Questions About Wireless Controls and Dos and Dont s
58 Schneider Electric