A node in network is configured to buffer data received from other nodes across multiple channels. The node process a portion of the buffered data associated with a subset of those channels. When the node receives data on that subset of channels that includes a notification, the node then processes a larger portion of the buffered data associated with a larger number of channels. In doing so, the node may identify additional notifications include within data that was buffered but not previously processed. The node may also coordinate with other nodes in order to process buffered data upon identification of a notification.
A method for determining configuration of a communication device includes: storing, in a memory of the communication device, a plurality of configuration schemes, wherein each configuration scheme is associated with a geographic location; receiving, at the communication device, a data message from a first communicating device, wherein the data message indicates a first geographic location; identifying, in the memory of the communication device, a first configuration scheme associated with the first geographic location; and transmitting, by the communication device, a data transmission using the first configuration scheme.
A wireless mesh network includes heterogeneous types of nodes, including continuously-powered nodes and battery-powered nodes. The battery-powered nodes may reside in a sleeping state most of the time to conserve power. The various nodes in the network may communicate with one another by transmitting and receiving at scheduled times and on scheduled frequencies. The battery-powered nodes may become active during the scheduled transmit and receive times. Network management nodes may facilitate network formation by transmitting information that reflects the scheduled transmit and receive times across the network. Based on this data, the continuously-powered nodes and battery-powered nodes may establish communication links with one another.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer hardware; computer software; apparatus and
instruments for use in conducting, switching, transforming,
accumulating, regulating and/or controlling electricity,
namely, computer hardware and software for use in
monitoring, controlling, and providing facility management
of municipal and city devices, namely, streetlights,
streetlight controllers, light sensors, cameras, wireless
internet access points, and other city and municipal control
devices; software that allows municipalities and streetlight
maintenance companies to monitor and control use of
streetlights and light sensors; light sensors; electronic
street light and outdoor light controllers; wireless
communication networks for street light and outdoor light
controllers, namely telecommunications and data networking
hardware, namely, devices for transporting and aggregating
voice, data, and video communications across multiple
network infrastructures and communications protocols;
computer operating software for street light and outdoor
light controllers; radios; radiotelephones, cellular
telephones, power and signal boosters; cameras; video
cameras; ammeters; electric collectors; clinometers, namely,
gradient indicators, meters and counters; microprocessors;
electric and lighting control panels for streetlights and
streetlight controllers. Computer programming services; technical support in the
field of computing; research services and breakdown
diagnostic services pertaining to computers and computer
software; consulting services in the field of computer
networking, computer software and lighting; research,
development and engineering in the fields of lighting, urban
planning, technical project studies, and technical
assistance services; design, development and updating of
computer programs, software and lighting systems; design,
development, and updating of web sites; computer services
for others, namely, implementing and operating computer
networks comprised of computer hardware and software for
securing, monitoring and managing machine to machine
networks; computer services for others, namely, implementing
and operating computer networks comprised of computer
hardware and software for receiving and transmitting
energy-related information and requests between and among
commodity meters, securing, monitoring and managing utility
distribution equipment and monitoring customer utility
usage; computer software design; technical support, namely,
monitoring of network systems and troubleshooting in the
nature of diagnosing computer hardware and software
problems; design and development of computer systems for the
collection, storage and transmission of data; software as a
service (SAAS) services, namely, hosting software for use by
others for securing, monitoring and managing machine to
machine networks; software as a service (SAAS) services,
namely, hosting software for use by others for receiving and
transmitting energy-related information and requests between
and among utility meters, securing, monitoring and managing
utility distribution automation and demand response data and
monitoring customer utility usage; software as a service
(SAAS) services, namely, hosting software that allows
municipalities and streetlight maintenance companies to
monitor and control use of streetlights and light sensors,
cameras, wireless internet access points; computer services
for others, namely, implementing and operating computer
networks on behalf of cities for receiving and transmitting
energy-related information; network as a service services,
namely, implementing and operating computer networks
comprised of computer hardware and software on behalf of
cities for monitoring and controlling use of streetlights
and light sensors, cameras, wireless internet access points.
5.
TECHNIQUES FOR COLLECTING AND ANALYZING NOTIFICATIONS RECEIVED FROM NEIGHBORING NODES ACROSS MULTIPLE CHANNELS
A node in network is configured to buffer data received from other nodes across multiple channels. The node process a portion of the buffered data associated with a subset of those channels. When the node receives data on that subset of channels that includes a notification, the node then processes a larger portion of the buffered data associated with a larger number of channels. In doing so, the node may identify additional notifications include within data that was buffered but not previously processed. The node may also coordinate with other nodes in order to process buffered data upon identification of a notification.
Nodes within a wireless mesh network are configured to monitor time series data associated with a utility network, including voltage fluctuations, current levels, temperature data, humidity measurements, and other observable physical quantities. The nodes execute stream functions to process the recorded time series data and generate data streams. The node is configured to transmit generated data streams to neighboring nodes. A neighboring node may execute other stream functions to process the received data stream(s), thereby generating additional data streams. A server coupled to the wireless mesh network collects and processes the data streams to identify events occurring within the network.
Nodes within a wireless mesh network are configured to monitor time series data associated with a utility network (or any other device network). One or more servers coupled to the wireless mesh network configures a data ingestion cloud to receive and process the time series data from the nodes to generate data streams. The server(s) also configure a distributed processing cloud to perform historical analysis on data streams, and a real-time processing cloud to perform real-time analysis on data streams. The distributed processing cloud and the real-time processing cloud may interoperate with one another in response to processing the data streams. Specifically, the real-time processing cloud may trigger a historical analysis on the distributed processing cloud, and the distributed processing cloud may trigger real-time processing on the real-time processing cloud. Any of the processing clouds may encompass edge nodes configured to perform real-time processing and generate data streams.
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
8.
MESH NETWORK NODES CONFIGURED TO ALLEVIATE CONGESTION IN CELLULAR NETWORK
A plurality of nodes in a first network mitigate data restrictions on access points which are an interface between the first network and a second network. The access points advertise their access parameters to the second network to the nodes. The nodes maintain a list of the advertised access parameters of each access point. The nodes determine whether to transmit data to the second network according to a first transmission mode or a second transmission mode based on the data to be transmitted and the list of access parameters maintained by that node. In the first transmission mode, the node determines to transmit the data to a first access point having a lowest cost with that node. In the second transmission mode, the node determines to transmit the data to a second access point having fewer access restrictions to the second network than the first access point.
Nodes within a network are configured to communicate with one another on one or more television white space (TVWS) frequencies that may be subject to interference caused by nearby TV towers. In order to mitigate that interference, the nodes may be configured to communicate according to specific operating parameters. The operating parameters may be generated based on expected interference levels caused by the nearby TV towers or QOS metrics associated with available channels. The nodes may also update a private database to reflect the expected interference levels or measured QOS metrics for different channels.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer hardware; computer software and networking equipment, namely, network hardware and software for monitoring and managing machine to machine networks; computer software and networking equipment, namely, network hardware and software for data collection applications; computer software and networking equipment, namely, network hardware and software for monitoring and managing data in the public utilities, gas utilities, electric utilities and water utilities industries; computer database management software; computer software used for receiving and monitoring usage and distribution information from remote sensors and meters in the public utilities, gas utilities, electric utilities, water utilities, municipal infrastructure and other industries Computer services for others, namely, implementing and operating computer networks comprising computer hardware and software for monitoring and managing machine to machine networks; computer services for others, namely, implementing and operating computer networks comprising computer hardware and software for receiving and transmitting information and requests between and among commodity meters, monitoring and managing utility distribution equipment and monitoring utility usage; design and development of computer systems for the collection, storage and transmission of data; software as a service (SAAS) services, namely, hosting software for use by others for monitoring and managing machine to machine networks and for data collection; software as a service (SAAS) services, namely, hosting software for use by others for receiving and transmitting information and requests between and among utility meters, monitoring and managing utility distribution automation and demand response data and monitoring utility usage; software as a service (SAAS) services, namely, hosting software that allows utilities and municipalities to view and monitor energy consumption and distribution; software as a services (SAAS) services, namely, hosting data collection software for monitoring and reporting of any physical property or condition using computers and sensors
11.
SYSTEM AND METHOD FOR ENABLING A SCALABLE PUBLIC-KEY INFRASTRUCTURE ON A SMART GRID NETWORK
A method for enabling a scalable public-key infrastructure (PKI) comprises invoking a process of receiving a message for a device, identifying an association ID for the device, retrieving encrypted association keys stored on the server for communicating with the device, the encrypted association keys encrypted using a wrapping key stored on a Hardware Security Module (HSM). The method further comprises sending the message and the encrypted association keys to the HSM, unwrapping, by the HSM, the encrypted association keys to create unwrapped association keys, cryptographically processing the message to generate a processed message, deleting the unwrapped association keys, sending the processed message to the device, and invoking, concurrently and by a second application, the process.
An access point coupled to a node within a network is configured to combine channel maps provided by other access points to which the node is coupled, thereby reconciling any discrepancies between those channel maps. The access point may also combine channel maps associated with different regions that the node may occupy, thereby reducing the number of channel maps that must be transmitted to the node when the node travel between regions.
A permitting system for controlling devices in a system includes a permit issuing agent that receives a command to be sent to a device. Based upon at least one attribute of the command, the permit issuing agent identifies one or more business logic modules that is pertinent to the command. Each business logic module has a respectively different set of business rules associated with it. Each identified business logic module determines whether the command complies with the business rules associated with that module. If the command is determined to comply with the business rules of all of the identified business logic modules, the agent issues a permit for the command, and the permit is sent to the device for execution of the command.
A method for enabling a scalable public-key infrastructure (PKI) comprises invoking a process of receiving a message for a device, identifying an association ID for the device, retrieving encrypted association keys stored on the server for communicating with the device, the encrypted association keys encrypted using a wrapping key stored on a Hardware Security Module (HSM). The method further comprises sending the message and the encrypted association keys to the HSM, unwrapping, by the HSM, the encrypted association keys to create unwrapped association keys, cryptographically processing the message to generate a processed message, deleting the unwrapped association keys, sending the processed message to the device, and invoking, concurrently and by a second application, the process.
Systems and methods for identifying and targeting power outages are provided. Electric meters of a system receive electric power from power distribution equipment in a power distribution network and information that identifies the respective power distribution equipment from which the meters receive electric power. Communication nodes are associated with electric meters and receive, from neighboring communication nodes, information identifying each respective neighboring communication node and the information identifying the power distribution equipment from which respective electric meters, associated with neighboring communication nodes, receive electric power. A communication node of a particular electric meter can select a suitable communication node of a neighboring electric meter with which it can communicate. When the particular electric meter experiences a loss in power, it can then transmit an immediate regarding the loss in power to the selected communication node.
One embodiment of the present invention sets forth a technique for transmitting data in a frequency hopping spread spectrum (FHSS) wireless communication system. A multi-channel receiver is configured to receive data from one or more channels simultaneously. The multi-channel receiver enables efficient implementation of a transmission protocol in which multiple candidate nodes within a wireless mesh network are polled for availability to receive a packet of data. The packet of data is transmitted to one or more available nodes based on prevailing link conditions, thereby increasing the likelihood of successful delivery. Data flooding may be selectively implemented to further increase the likelihood of successful delivery.
One embodiment of the present invention sets forth a wireless communications system configured to efficiently operate within an arbitrarily and uniquely defined set of channels. Each one of the set of channels has an assigned digital radio transceiver instance configured to operate according to transmission requirements that are unique to the corresponding channel. A set of digital radio transceiver instances comprises a meta-transceiver, which enables communications to one or more other devices via one or more digital radio transceiver instances.
One embodiment of the present invention sets forth a technique for transmitting data in a listen before talk (LBT) wireless transmission regime. A digital radio receiver is configured to simultaneously receive and decode digital data transmissions from multiple radio channels. A digital radio transmitter is configured to listen to the multiple radio channels prior to transmitting digital data on a selected one of the multiple channels, based on locally determined channel occupancy. Optimal LBT efficiency is achieved within the set of multiple channels, thereby improving overall transmission efficiency between the transmitter and the receiver.
One embodiment of the present disclosure sets forth a technique for convergence and automatic disabling of access points in a wireless mesh network. Specifically, an access point within a wireless mesh network computes one or more network metrics to determine whether the metrics are unfavorable or favorable. If the network metrics are favorable, then the access point disables the access point's network connection. An access point turns the network connection back on based on whether a routing was lost for at least a preset amount of time, utilization of one or more neighboring access points is above a preset value, or one or more network metrics have degraded by a certain percentage value. One advantage of this approach is that cost savings may be achieved when the number of access points dynamically changes to accommodate varying communications conditions.
One embodiment of the present invention sets forth a hybrid femtocell device comprising a femtocell access point and a metrology device, such as a commercial power meter. Each hybrid femtocell device is configured to connect to a backhaul network either via a local network connection or via a neighboring hybrid femtocell. A hybrid femtocell device may be advantageously installed in place of a conventional power meter to operate as both a conventional femtocell access point providing cellular coverage for a targeted location, as well as a smart power meter.
One embodiment of the present invention sets forth a technique for efficiently interconnecting interrogator elements. The interrogator elements are configured to perform a read or write data operation to a second interrogator element. Two-way communications between interrogator elements is facilitated by read and write operations in this way. A data backhaul network may be advantageously implemented as a wireless mesh network, comprising a plurality of interrogator elements, to transmit data from each interrogator element to a server for processing. Transmitted data may be metering data.
A method and system of operating a utility node to communicate in a wireless utility network are provided. A utility node in the wireless utility network discovers at least two access points each respectively constituting an interface between a wide area network and the wireless utility network. The node discovers at least two access points constituting an interface between the two networks, registers with the discovered access points, and obtains at least two unique network addresses each respectively associated with a corresponding one of the access points with which the node has registered. The node provides the at least two addresses to a back office server which is communication with the wide area network to provide the back office server with at least two routes to reach the node. The at least two routes are respectively associated with a corresponding one of the access points with which the node registered.
Securing the manufacturing supply chain with digital certificates. A token is coupled to a manufacturing station and enabled via a personal identification number. The token includes a counter limiting the maximum number of certificates to be signed, and compares a serial number of a digital certificate to a tracked serial number. In some embodiments, the token is linked to a particular manufacturing station once the token is enabled.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
24.
Updating routing and outage information in a communications network
After power is restored to a node in a utility network, that node employs one or more of its neighboring nodes as proxies to route a message to a central control facility of the utility. The message contains information about the restored node, and possibly one or more of its neighbor nodes. This information may include reboot counters, the amount of time that the node was down, momentary outages or power fluctuations, and/or the time of power restoration. The node that creates and initially sends the message can be the restored node itself, or another node that recognizes when a restored node has recently come back online.
A method and system of operating a utility node to communicate in a wireless utility network are provided. A utility node in the wireless utility network discovers at least two access points each respectively constituting an interface between a wide area network and the wireless utility network. The node discovers at least two access points constituting an interface between the two networks, registers with the discovered access points, and obtains at least two unique network addresses each respectively associated with a corresponding one of the access points with which the node has registered. The node provides the at least two addresses to a back office server which is communication with the wide area network to provide the back office server with at least two routes to reach the node. The at least two routes are respectively associated with a corresponding one of the access points with which the node registered.
To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.
G06F 21/20 - by restricting access to nodes in a computer system or computer network
G06F 21/22 - by restricting access to, or manipulation of, programmes or processes
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
27.
SYSTEM AND METHOD OF MONITORING PACKETS IN FLIGHT FOR OPTIMIZING PACKET TRAFFIC IN A NETWORK
Systems and methods of optimizing packet flow in a network are disclosed. An internetwork has a first network and plural second networks. A respective packet-in-flight counter is established for each one of the plural second networks and a respective maximum packet-in-flight indication for each one of the plural second networks. The respective packet-in-flight counter for each one of the plural second networks when a request packet is sent from any node in the first network to any node in that one of the plural second networks, or a response packet is received from any node that one of the plural second networks. it is determined whether a second request packet can be sent from any node in the first network to any of the plurality of nodes in one of the plural second networks, based on processing a value of the respective packet-in-flight counter for that one of the plural second networks and a value of the respective maximum packet-in-flight indication for that one of the plural second networks. The respective maximum packet-in-flight indication for each one of the plural second networks is adjusted based on a statistic that is indicative of roundtrip time for request packets sent from any node of the first network to any of the plurality of nodes in that one of the plural second networks.
A utility network communication device is provided to detect whether anomalous events occur with respect to at least one node in a utility network. The communication device has recorded therein threshold operating information and situational operating information. The threshold operating information includes data indicative of configured acceptable operating parameters of the nodes in the utility network based on respective locational information of the nodes. The situational information includes data indicative of configured operation data expected to be received from nodes in the utility network during a predetermined time period, based on a condition and/or event occurring during the predetermined time period. The communication device receives operation data from nodes in the network, and determines whether the received operation data from a node in the network constitutes an anomalous event based on a comparison of the received operation data with (i) the threshold operating information defined for the node and (ii) the situational information. The communication device outputs notification of any determined anomalous event.
Systems and methods for controlling for distributing power to electric vehicles. The system includes a vehicle charging key ("VCK") that is operable to communicate with both a vehicle and a utility communications network. The VCK includes a processor, a memory, and one or more radios for communicating with the vehicle and the utility communications network. The VCK receives information from the vehicle, such as location information and vehicle battery state-of-charge ("SOC") information, and transmits the information to a back office system ("BOS"), such as a utility provider or a credit card company. The BOS generates utility pricing or charging information based on, for example, time of day, and transmits the utility pricing information back to the VCK. A transaction module of the VCK receives payment information from a user that includes a payment selection. The payment selection includes a payment type (e.g., credit card, prepaid account, utility account, etc.). The VCK transmits the payment information to the BOS, and the BOS responds with a charge authorization signal.
Techniques are disclosed by which RF mesh networks can identify utility distribution topologies by using power line communication combined with wireless networking to identify the mapping of transformers and other distribution equipment at a back office system server. At a specified time, an item of distribution equipment signals a unique identifier by introducing a phase shift in the electric power being delivered by that equipment. A meter node detects and decodes these temporal shifts to obtain an identifier of equipment supplying the power to it. Upon ascertaining this identification, the meter node sends an acknowledgment to thereby register with that equipment. The association of the particular customer's premises with the equipment is also sent to a back office system, to enable a map of the correspondence between meter and the equipment to be generated.
H02J 13/00 - Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the networkCircuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
H04B 3/54 - Systems for transmission via power distribution lines
31.
Powerline carrier zero-crossing transformer mapping with asymmetric RF return path
Techniques are disclosed by which RF mesh networks can identify utility distribution topologies by using power line communication combined with wireless networking to identify the mapping of transformers and other distribution equipment at a back office system server. At a specified time, an item of distribution equipment signals a unique identifier by introducing a phase shift in the electric power being delivered by that equipment. A meter node detects and decodes these temporal shifts to obtain an identifier of equipment supplying the power to it. Upon ascertaining this identification, the meter node sends an acknowledgment to thereby register with that equipment. The association of the particular customer's premises with the equipment is also sent to a back office system, to enable a map of the correspondence between meter and the equipment to be generated.
A utility network interface device (2) is provided for operation with a utility network. The utility network interface device includes a detector (20) configured to produce a state signal upon occurrence of a prescribed state that interferes with the ability of a utility meter (130), with which the utility network interface (2) device is associated, to measure consumption of a commodity and/or report consumption of the commodity. The utility network interface device also includes a control unit (6) configured to detect a tampering with the utility meter in accordance with the state signal produced by the detector. The control unit is also configured to detect a tampering with a software component of the utility meter. The control unit automatically controls a notification unit to output (9), external to the utility meter, notification of the tampering detected by the control unit, in response to the detection of the tampering. Also provided are a utility network including the utility network interface device, a method of operating a utility network interface device, and a computer- readable recording medium having a computer program recorded thereon for operating a utility network interface device.
Forward error correction is used in conjunction with detection of a start frame delimiter (SFD) to provide flexibility and to reduce missed instances of an SFD. Candidate SFDs in an incoming signal are identified using a lower- than- normal detection threshold, and corresponding markers are stored in a buffer. For each stored marker, a physical layer header following the candidate SFD is decoded with error-correction techniques, to determine whether uncorrectable errors exist. If so, the candidate is discarded and the next candidate is evaluated. If no uncorrectable errors exist, the candidate is declared a valid SFD, and the remaining signal is decoded. Dual detection thresholds can be employed in networks that permit both error-encoded and non-coded packets. A technique for selecting SFD patterns that facilitate higher performance is also disclosed.
A wireless communication network system includes a plurality of nodes. Each node from the plurality of nodes includes a plurality of communication modules. Each module includes a modem and is configured to operate according to a communication protocol. Each communication module is configured to monitor its own communication parameter data and to cooperate with companion modules of a node by sharing communication parameter data, for instance through a coordination unit. Each communication module is further configured to allow, preferably according to a predefined set of rules, communication using a protocol of one communication module by utilizing a band associated with a companion module. The sharing of communication parameter data between modules may be continuous sharing or periodic sharing.
Devices and methods for securely upgrading devices, such as field upgradeable units (110), are disclosed. In response to receiving an update object (320), a device may determine whether a predefined location of memory includes a predetermined value. Based on the value in the predefined location, the device may store the received update object in a verification portion (319) of the memory. After verifying the authenticity of the update object, the device may copy the update object from the verification portion of the memory to an inactive portion (310). The inactive portion of the memory can be swapped with an active portion (305) of the memory, such that the inactive portion becomes active.
After power is restored to a node in a utility network, that node employs one or more of its neighboring nodes as proxies to route a message to a central control facility of the utility. The message contains information about the restored node, and possibly one or more of its neighbor nodes. This information may include reboot counters, the amount of time that the node was down, momentary outages or power fluctuations, and/or the time of power restoration. The node that creates and initially sends the message can be the restored node itself, or another node that recognizes when a restored node has recently come back online.
Systems and methods of optimizing packet flow in a network are disclosed. An internetwork includes plural networks, each network having plural non-router nodes and at least one router node. The non-router nodes of a first network can be configured to perform congestion control. The non-router node establishes a packet rate value for a packet queue associated with a second network of the internetwork. A total number of packets not greater than the packet rate value are removed from the packet queue. The removed packets are sent to a node in the second network.
Systems and methods of optimizing packet flow in a network are disclosed. An internetwork includes plural networks, each network having plural non-router nodes and at least one router node. The non-router node of a first network can be configured to perform congestion control. The non-router node sends a request packet to a node in a second network. The value of a packet-in-flight counter associated with the network is adjusted when the request packet is sent to the second network node and when a response packet is received from the second network node. The non-router node determines whether another request packet can be sent to another network in the internetwork based on a value of the packet-in-flight counter.
Methods and devices are disclosed for dynamically fragmenting packets transmitted in a communications network. Fragments are generated by splitting a packet based on a value of a fragment size parameter. A first fragment is sent to a receiving node. As the sending node, a transmission success parameter is determined that indicates whether the first fragment was successfully received. Based on the value of the transmission success parameter, a link quality parameter value representing a chance a second fragment having the same size as the first fragment will be successfully received by the receiving node is updated. The sending node compares the value of the link quality parameter and a value of a quality threshold parameter and changes the value of the fragment size parameter based on a result of the comparison.
A method of routing in a network includes dividing a time corresponding to a predetermined maximum registration age of a first node registered with a second node into a number of first time intervals and second time intervals. The first time intervals each have a predetermined duration and the second time intervals each have a duration greater than the predetermined duration of the first time intervals. Each of the first and second time intervals are assigned a metric designating a cost associated with a path between the first node and the second node. The metric increases in value for each of the first and second time intervals as registration age increases. The second node sends a message including the metric associated with the time interval during which it is transmitted.
A system and method analyzes resource consumption without requiring sensors at every device for which consumption is analyzed. Data rates used to provide resource use information may be increased or decreased based on user actions.
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
42.
RAPID DISSEMINATION OF BULK INFORMATION TO WIDELY DISPERSED NETWORK NODES
Bulk information is transferred to nodes in a communication network having a plurality of widely dispersed nodes. The information can be an image, content, or configuration information. The information is uni-cast to a selection of nodes by a central node or server (BOS), to seed the information at certain nodes (S) in the network. The information is then distributed by these seed nodes to every other node (N) in the network. A first algorithm selects which nodes should be seeded with information by the central node. A second algorithm distributes information in the network on a query basis.
Information relating to electrical energy usage for a given account is associated with a time segment that corresponds to a period when the electrical energy was received from an electrical energy distribution system. Electrical energy generation carbon impact information is retrieved for the corresponding time segment specifying when the electrical energy was received from an electrical energy distribution system. A carbon credit is calculated according to the retrieved electrical energy generation carbon impact information, and the retrieved electrical energy usage information associated with the time segment. The calculated carbon credit is then used to update a display of carbon credit related information, such as account balance, rate of carbon credit usage, currently applicable "cost" for carbon credit usage. Notifications can be provided to the consumer if any of this information crosses a threshold value. In addition, or alternatively, the carbon credit related information can be used to automatically control the operation of devices that consume electrical energy.
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
44.
TRANSPARENT ROUTING IN A POWER LINE CARRIER NETWORK
Meter nodes in a power line carrier (PLC) network may reliably communicate with an access point by alternate routes using additional media where available. A utility network may include one or more subnetworks. Each subnetwork may include one or more meter nodes and an access point configured to communicate with the meter nodes using PLC. Meter nodes operate as relays for other meter nodes to communicate with the access point. Some or all meter nodes may be configured to communicate using a power line carrier communications link and another communications link. The network may also include a node external to the subnetwork, e.g., a utility server. The access point may be configured to communicate with the node external to the subnetwork in addition to the meter nodes.
A meshed networking of access points in a utility network provides a more efficient and cost effective arrangement for communicating data between meters and the utility by linking the access points of multiple subnetworks for purposes of communicating with the utility. As a result, each individual subnetwork is not required to directly communicate with the utility. For those access points that are relieved of the need to directly communicate with the utility, the communication mechanism, e.g., cellular modem, can be eliminated, or deactivated, to thereby reduce capital expenditures and/or operational costs. Additionally, links to a WAN can be selectively activated or disabled to provision bandwidth, for example, on demand, to react to changing conditions in the subnetworks.
H04W 40/22 - Communication route or path selection, e.g. power-based or shortest path routing using selective relaying for reaching a BTS [Base Transceiver Station] or an access point
Communications among multiple nodes via a shared power line medium are carried out by dividing the available frequency spectrum in the shared power line medium into plural non-overlapping channels. A first channel is assigned to a first group of nodes, and a second channel, different from the first channel, is assigned to a second group of nodes. Communications between the first group of nodes can occur simultaneously with communications between the second group of nodes via the shared power line medium. Time slots may be assigned for the communications between the first group of nodes that occurs simultaneously with the communications between the second group of nodes via the shared power line medium. The simultaneous communications between different groups of nodes via a shared power line medium may be implemented using a frequency-hopping spread spectrum technique.
Rather than using a large number of transceivers (transmitter/receiver pairs) operating in parallel, Access Points with multiple channels are used to aggregate, or stack, transmitted response communications, e.g., transmitting multiple acknowledgements (ACKs) in a single packet to one or more sources of received packets. The method includes sending on a plurality of channels, by each of a plurality of respective first nodes, a communication to a second node, receiving on the plurality of channels, by the second node, the communication from each of the plurality of first nodes and sending, by the second node, a transmission that contains a response to each communication that was successfully received from each of the plurality of first nodes. The response to each of the plurality of first nodes is part of a single message sent by the second node.
H04L 1/16 - Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
48.
DETERMINING ELECTRIC GRID ENDPOINT PHASE CONNECTIVITY
The service phase of the electrical connection to a customer endpoint device located within a power distribution system is determined by various techniques. At the feeder level, the system may be programmed to induce momentary power interruptions, thereby causing missed zero crossings at the customer endpoint devices. The pattern of these interruptions is a controlled one, designed specifically to avoid causing noticeable disruption even to sensitive devices, but to be unusual enough that it is statistically unlikely to be naturally occurring. The monitoring of the zero crossing information is used to determine the phase of the service line to the customer endpoint devices.
H02J 13/00 - Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the networkCircuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
49.
BEACONING TECHNIQUES IN FREQUENCY HOPPING SPREAD SPECTRUM (FHSS) WIRELESS MESH NETWORKS
Methods include those by which nodes in a Frequency Hopping Spread Spectrum (FHSS) wireless network may be flexibly configured for beacon transmission and reception. The method may allow for any node to synchronize to any other node's given frequency to receive one or more beacon (broadcast) packets from that node at the designated period. The method may include sending, by a first node, a message to one or more neighbor nodes and responding, by the one or more neighbor nodes, with a message to the first node, the response message including a beacon frequency, a beacon transmit time and information about the current hopping sequence. The first node periodically programs its receiver to the beacon frequency at the beacon transmit time and uses the hopping sequence to receive information including at least one of routing information and timing updates for hopping channel synchronization from the one or more neighbor nodes.
A system that provides a cryptographic unit that generates secret keys that are not directly accessible to software executed by a controller. The cryptographic unit can include a restrictor device, a finite state machine, a random number generator communicatively and a memory. The memory stores values generated by the random number generator. The restrictor device and the finite state machine include hardware logic that restricts access or changes to the contents of the memory.
To provide security in a wireless utility network, different levels of trust are used to securely enroll new nodes through other nodes acting as proxies. A node's security state with respect to another node in the network is categorized into one of several trust levels. A node responds to certain requests, actions or messages based on its trust level with the other entity. Initially, a node is not trusted. A first trust level is established based on a digital certificate that is stored in a node when the node is manufactured. A second trust level is established based on a second digital certificate obtained from a certifying authority while a node is in the first trust level. A node with a verified second certificate can be fully enrolled in the network and participate as a network node with minimal or no constraints.
Methods and systems for providing a network and routing protocol for utility services are disclosed. A method includes discovering a utility network. Neighboring nodes are discovered and the node listens for advertised routes for networks from the neighbors. The node is then registered with one or more utility networks, receiving a unique address for each network registration. Each upstream node can independently make forwarding decisions on both upstream and downstream packets, i.e., choose the next hop according to the best information available to it. The node can sense transient link problems, outage problems and traffic characteristics. Information is used to find the best route out of and within each network. Each network node maintains multi-egress, multi-ingress network routing options both for itself and the node(s) associated with it. The node is capable of several route maintenance functions utilizing the basic routing protocol and algorithms.
Methods and systems for providing a network and routing protocol for utility services are disclosed. A method includes discovering a utility network. Neighboring nodes are discovered and the node listens for advertised routes for networks from the neighbors. The node is then registered with one or more utility networks, receiving a unique address for each network registration. Each upstream node can independently make forwarding decisions on both upstream and downstream packets, i.e., choose the next hop according to the best information available to it. The node can sense transient link problems, outage problems and traffic characteristics. Information is used to find the best route out of and within each network. Each network node maintains multi-egress, multi-ingress network routing options both for itself and the node(s) associated with it. The node is capable of several route maintenance functions utilizing the basic routing protocol and algorithms.
Methods and systems for providing a network and routing protocol for utility services are disclosed. A method includes discovering a utility network. Neighboring nodes are discovered and the node listens for advertised routes for networks from the neighbors. The node is then registered with one or more utility networks, receiving a unique address for each network registration. Each upstream node can independently make forwarding decisions on both upstream and downstream packets, i.e., choose the next hop according to the best information available to it. The node can sense transient link problems, outage problems and traffic characteristics. Information is used to find the best route out of and within each network. Each network node maintains multi-egress, multi-ingress network routing options both for itself and the node(s) associated with it. The node is capable of several route maintenance functions utilizing the basic routing protocol and algorithms.
Methods and systems for providing a network and routing protocol for utility services are disclosed. A method includes discovering a utility network. Neighboring nodes are discovered and the node listens for advertised routes for networks from the neighbors. The node is then registered with one or more utility networks, receiving a unique address for each network registration. Each upstream node can independently make forwarding decisions on both upstream and downstream packets, i.e., choose the next hop according to the best information available to it. The node can sense transient link problems, outage problems and traffic characteristics. Information is used to find the best route out of and within each network. Each network node maintains multi-egress, multi-ingress network routing options both for itself and the node(s) associated with it. The node is capable of several route maintenance functions utilizing the basic routing protocol and algorithms.
The functionality of communications standards and protocols that are application-layer specific are overlaid on an IP -based infrastructure, by employing an IP DNS server as the registration host for IP and other communications standards based and protocol based communications. Communication can occur at either the IP layer or the communications standards or protocol application layer. At the IP layer, a host application can interrogate network nodes. To extend this service to other communications standards or protocol communications, device registration and resolve services are implemented on the DNS server. Similar to the manner in which an IP -based service uses a native, IP -based DNS resolve request, a host can utilize a resolution request against the communications standards and protocol- enabled DNS server for standards and protocol application-layer interrogation of endpoints.
A network interface device includes a transceiver capable of connecting a utility meter to a wireless network, and a visual indicator capable of displaying a status of a connection between the utility meter and the wireless network. The visual indicator can be an LED, whose display state indicates the status of network connectivity. Alternatively, the visual indicator can be an integrated digital display of the meter that is typically used to indicate a metering parameter, such as total consumption or rate of consumption.
Methods are disclosed for generating a data packet at a sending node of the network that conforms to a media access control (MAC) layer protocol for network communications. The data packet includes a MAC header and a data segment, wherein data in said data segment is encoded as a type-length-value element identifying a value for an operating parameter of the network. The data packet is transmitted from the sending node to a receiving node. At the receiving node, the data packet is processed at the MAC sublayer of network protocols to retrieve said element and determine the value for the operating parameter. Operating parameters within the receiving node are adjusted to conform to the determined value of the operating parameter.
Techniques are disclosed in which a parameter used for scrambling packet data is changed. If the initial scrambling of a packet causes a killer packet to be generated, the packet is re-scrambled using a different value for the parameter, so that a killer packet is avoided. In a network that employs frequency-hopping spread spectrum communications, a channel identifier can be employed as an input to the scrambling algorithm. In this implementation, a given packet of data will be transmitted on one channel with a first sequence of bits when it is scrambled, and on another channel with a different sequence of bits. If the scrambled packet for one of these channels results in a killer packet, it is statistically unlikely that it will also be a killer packet when it is re-transmitted on the other channel.
A method of updating routing information in a network, where reboot information of other nodes in the network is used to determine whether a given node has recent route updates. If the reboot information indicates the given node has not recently rebooted, then routing information from that given node is used to update the routing information of the comparing node. The reboot information may be a reboot counter which is incremented by a node in response to the node going through a reboot process. When a node reboots, it may request the reboot counter from neighboring nodes. The received reboot counter is compared to the stored reboot counter for at least one node. The rebooting node may choose to receive routing information from a node which has not had its reboot counter changed from the stored reboot counter. In the event none of the neighboring nodes have an unchanged reboot counter, requests may be made for the reboot counters of other nodes, which may be compared to the corresponding stored reboot counters, until the rebooting node discovers a node which has not recently rebooted according to the reboot counter, and may then download routing information from that node. After power is restored to a node in a utility network, that node employs one or more of its neighboring nodes as proxies to route a message to a central control facility of the utility.
An apparatus for monitoring the presence of voltage (90,96) on the load side (18) of a utility meter socket includes a circuit for detecting the presence of voltage (90,96) on the load side output (18) of the socket and a communication device (55) connected to the circuit to transmit data relating to the presence of voltage on the load side output (18) to the utility. Also provided is a method of monitoring the voltage on the load side (18) of the utility, the method including installing an electric utility Disconnect Monitor Node into a utility meter socket, detecting the presence of voltage (90,96) on the load side output (18) of the utility meter socket, and transmitting data relating to the presence of voltage on the load side output (56,58).
H02J 13/00 - Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the networkCircuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
A networked automatic meter reading system includes a plurality of meters that measure commodity usage and monitor quality parameters for transmission to a utility over a two-way local area network (LAN) to a remotely located gateway node. The gateway node transmits this data to the utility over a commercially available fixed wide area network (WAN). The meter can also provide direct communication to the utility over a commercially available network interface that plugs into the meter, bypassing the local area network communication link and gateway node. The meter also provides an interface to an in-premises network that communicates with consumer devices in a household or other facility. The gateway performs routing analysis of packets to determine preferred routing paths, and disseminates this information to the meters.
A method for generating and using frequency-hopping sequences in frequency-hopping spread spectrum (FHSS) networks, such that no additional network overhead is required to convey a device's hopping sequence to another device, is disclosed. Furthermore, a method to maximize the number of unique hopping sequences, without increasing the random access memory (RAM) requirements on the network devices, is disclosed.
An automatic meter reading (AMR) data communication network for relaying meter commodity information includes a commodity provider node, a gateway node configured to communicate with the commodity provider node, and meter nodes configured to measure commodity characteristic data and communicate with the gateway node and with other meter nodes. A source node of the meter nodes generates a data packet that includes meter commodity information to be relayed to the commodity provider node, and when a first meter node of the meter nodes receives the source data packet, the first meter node relays the source data packet to a second node. The second node can include another meter node, a repeater node, the gateway node, or the commodity provider node. In an embodiment, the first meter node determines whether the data packet specifies a relay path for relaying the source data packet to the commodity provider node.
A wireless network has a server that includes a server controller that controls the receipt and transmission of packets via a server radio. The server controller selects a route to nodes in the wireless network, and provides communication between the wireless network and at least one other network. A plurality of nodes in the wireless network include a node controller that controls the receipt and transmission of packets via a node radio, and selects a route to the server. A route included in a transmitted packet is selected as a preferred route based upon lowest path cost. The lowest path cost is determined on the basis of ambient noise level information associated with links along a given path in the wireless utility network.
H04W 40/10 - Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources based on available power or energy
H04W 40/12 - Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality
H04W 40/24 - Connectivity information management, e.g. connectivity discovery or connectivity update
66.
METHOD AND SYSTEM OF ROUTING IN A UTILITY SMART-GRID NETWORK
A wireless utility network contains a plurality of utility nodes that communicate within a wireless utility network. A gateway to the wireless utility network communicates with the utility nodes in the wireless utility network, and connects the wireless utility network to at least one other network. A packet is transmitted from one utility node to another utility node according to a route included in the transmitted packet. The route included in the transmitted packet is updated with received network information to determine an updated path cost of the included route and compared to alternate routes to select a preferred route based upon path cost. The selected preferred route is included in the packet and the packet is transmitted to another node according to the selected preferred route.
A utility meter may be read by sending a request to read the meter from a meter reading application, which may be located on a utility server or on an access point to a network, to a communications module associated with the utility meter. The communications module initiates a session with the utility meter, makes requests fro data from the associated utility meter, receives the responses to requests for data from the utility meter, and terminates the session after receiving all the requested data from the meter. It then formats the responses with the data received from the utility meter, and transmits the formatted response to the meter reading application.
A method and system for providing a network and routing protocol for utility services are disclosed. In one embodiment, a computer-implemented method comprises discovering a utility network, wherein a utility device (for example, a constant powered meter) sends network discovery messages to find the utility network. Neighboring meters are discovered and the device listens for advertised routes for one or more networks from the neighbors. The device is then registered with one or more utility networks, receiving a unique address for each network registration. Also illustrated in this invention disclosure is how each device of a class of devices (for example, battery powered meter) finds and associates itself with another device (for example, constant powered meter). The constant powered meter also registers its associate battery powered meter with the utility networks. The constant powered meter registers itself with the access points and the upstream nodes in the path out of each network. Each upstream node can independently make forwarding decisions on both upstream and downstream packets i.e. choose the next hop according to the best information available to it. The constant powered meter can sense transient link problems, outage problems, and traffic characteristics. It uses the information to find the best route out of and within each network. Each network device thus maintains multi-egress, multi-ingress network routing options both for itself and the device(s) associated with it.
A method and system for providing a network and routing protocol for utility services are disclosed. In one embodiment, a computer-implemented method comprises discovering a utility network, wherein a utility device (for example, a constant powered meter) sends network discovery messages to find the utility network. Neighboring meters are discovered and the device listens for advertised routes for one or more networks from the neighbors. The device is then registered with one or more utility networks, receiving a unique address for each network registration. Also illustrated in this invention disclosure is how each device of a class of devices (for example, battery powered meter) finds and associates itself with another device (for example, constant powered meter). The constant powered meter also registers its associate battery powered meter with the utility networks. The constant powered meter registers itself with the access points and the upstream nodes in the path out of each network. Each upstream node can independently make forwarding decisions on both upstream and downstream packets i.e. choose the next hop according to the best information available to it. The constant powered meter can sense transient link problems, outage problems, and traffic characteristics. It uses the information to find the best route out of and within each network. Each network device thus maintains multi-egress, multi-ingress network routing options both for itself and the device(s) associated with it.
A method and system for providing a network and routing protocol for utility services are disclosed. In one embodiment, a computer-implemented method comprises discovering a utility network, wherein a utility device (for example, a constant powered meter) sends network discovery messages to find the utility network. Neighboring meters are discovered and the device listens for advertised routes for one or more networks from the neighbors. The device is then registered with one or more utility networks, receiving a unique address for each network registration. Also illustrated in this invention disclosure is how each device of a class of devices (for example, battery powered meter) finds and associates itself with another device (for example, constant powered meter). The constant powered meter also registers its associate battery powered meter with the utility networks. The constant powered meter registers itself with the access points and the upstream nodes in the path out of each network. Each upstream node can independently make forwarding decisions on both upstream and downstream packets i.e. choose the next hop according to the best information available to it. The constant powered meter can sense transient link problems, outage problems, and traffic characteristics. It uses the information to find the best route out of and within each network. Each network device thus maintains multi-egress, multi-ingress network routing options both for itself and the device(s) associated with it.
A method and system for providing a network protocol for utility services are disclosed are disclosed. In one embodiment, a computer-implemented method determines whether a measured real signal strength differs from a an accepted real signal strength by a configurable control limit parameter. In the event the measured real signal strength exceeds either an upper or lower bound based upon the configurable control limit parameter a determination is made whether there has been an unacceptable number of measured real signal strengths that exceed either an upper or lower bound based upon the configurable control limit parameter. In the event there has been an unacceptable number of measured real signal strengths that exceed either an upper or lower bound, which may include reaching or exceeding a configurable out of bound incidence limit, then a determination is made to calculate a new accepted real signal strength.
A J-Pole antenna disclosed including: shunt segment extending out of the plane of the J-Pole antenna. A shunt segment extending out of the plane of the J-pole antenna aids in attaching the antenna to a connector and allowing for a reduction in the size of the antenna and connector. The shunt segment also makes the antenna shorter while preserving the same gain and impedance performance as a conventional J-Pole antenna. A connector plate and connector may be used with the antenna having the shunt segment extending out of the plane of the J-Pole antenna. A protective enclosure may be used with the J-Pole antenna and allowing a radiating antenna segment of the J-Pole antenna to extend from the protective enclosure.
One example embodiment provides a method and system where a node in a utility network assigns an IP network address to an in-premise device which communicates to the utility node over an in-premise network which is not IP based. The utility node proxies the assigned IP address to the utility network, allowing other nodes on the utility network to address and communicate with the in-premise device.
H04Q 9/00 - Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom
74.
METHOD AND SYSTEM OF PROVIDING IP-BASED PACKET COMMUNICATIONS IN A UTILITY NETWORK
One example embodiment provides a method and system where a node in a utility network registers with one or more access point devices associated with one or more local area utility networks. The utility node generates a unique network address using a network address prefix of a network address associated with the access point device. The utility node registers with a DNS server. Messages sent to the utility node are routed through the access point corresponding to the received prefix used to generate the unique network address for the utility node. The network address for the utility node and access point may be IPv6 addresses and the network address prefix may be an IPv6 prefix, or may be an IPv4 address.
One example embodiment provides a method and system where a node in a utility network receives a block of IPv6 network addresses from an access point in the utility network. The utility node allocates an IP network address from the block of IPv6 network addresses received from the access point to an in-premise device which communicates to the utility node over an in-premise network which is not IP based. The utility node proxies the allocated IP address to the utility network, allowing other nodes on the utility network to address and communicate with the in-premise device.
ABSTRACT One example embodiment provides a method and system where a node in an IPv6 utility network communicates with an IPv6 destination node through and IPv4 network. IPv6 utility nodes are reachable through at least one access point. IPv6 packets to be transmitted between an IPv6 access point an and an IPv6 destination node through a IPv4 communications network are encapsulated in IPv4 packets for transmission through the IPv4 communications network. Packets received after transmission through the IPv4 communications network at the destination node are extracted to retrieve the IPv6 packet.
One example embodiment provides a method and system where LAN nodes in an IPv6 utility network are able to communicate with an IPv6 node through and IPv4 network. An access point associated with an IPv6 LAN in the utility network establishes an explicit or configured tunnel to an IPv6 node or and IPv6 network through and IPv4 network. In one preferred embodiment the IPv6 node is a back office system communicating through an IPv4 WAN with the IPv6 node in the utility network LAN using the access point in the LAN. The access point communicates with the back office system through the IPv4 WAN to establish a '6 in 4' tunnel through the IPv4 WAN. A tunnel broker may maintain the '6 in 4' tunnel through the IPv4 WAN between the access point and the back office system.
The present invention provides a system including a utility network including a product distribution pathway for delivering a product, a plurality of electronic utility devices associated with the utility network to monitor at least one parameter associated with the product distribution pathway, and a management processor in communication with the devices and operable to poll at least a subset of the electronic utility devices in response to an input to evaluate performance of one of the utility network and the system in response to information relating to the at least one parameter. The evaluation can include a rule-based analysis of one of the parameter and the information relating to the parameter.
The present invention provides a system including a utility network including a product distribution pathway for delivering a product, a plurality of electronic utility devices associated with the utility network to monitor at least one parameter associated with the product distribution pathway, and a management processor in communication with the devices and operable to poll at least a subset of the electronic utility devices in response to an input to evaluate performance of one of the utility network and the system in response to information relating to the at least one parameter. The evaluation can include a rule-based analysis of one of the parameter and the information relating to the parameter.
The present invention provides a system including a utility network including a product distribution pathway for delivering a product, a plurality of electronic utility devices associated with the utility network to monitor at least one parameter associated with the product distribution pathway, and a management processor in communication with the devices and operable to poll at least a subset of the electronic utility devices in response to an input to evaluate performance of one of the utility network and the system in response to information relating to the at least one parameter. The evaluation can include a rule-based analysis of one of the parameter and the information relating to the parameter.
H02J 13/00 - Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the networkCircuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
81.
FLOW-THROUGH PROVISIONING IN UTILITY AMR/AMI NETWORKS
A system associated with a utility network having product distribution pathways, including a device management module for automatically provisioning at least a subset of a plurality of electronic utility devices associated with the pathways based on configuration state information received from the subset of the plurality of electronic utility devices and a comparison of the received configuration state information and predefined configuration state information.
09 - Scientific and electric apparatus and instruments
11 - Environmental control apparatus
37 - Construction and mining; installation and repair services
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Apparatus and instruments for conducting, switching,
transforming, accumulating, regulating or controlling
electricity, scientific (other than for medical use),
nautical, surveying, photographic, cinematographic, optical,
weighing, measuring, signalling, checking (supervision),
life-saving and teaching (apparatus and instruments);
apparatus for recording, transmitting and reproducing sound
and images; data processing and computer equipment; fire
extinguishers; radios; amplifiers; loud-speakers; audio
cassette and compact disc appliances; radiotelephones,
cellular telephones, emitter-receiver appliances; boosters;
electric batteries; ammeters; electric theft prevention
installations; anti-theft warning apparatus; electric
collectors, balancing apparatus, junction boxes for starting
(electricity); electric cables and wires; circuit breakers;
electric coils; electric terminals and switches;
clinometers, gradient indicators and meters/counters;
microprocessors; control panels (electricity); stage
lighting regulators; all such goods for lighting apparatus. Lighting apparatus and installations; waterproof lighting
apparatus; guard devices for lighting; electric light bulbs;
light bulbs; lamps; electric discharge tubes for lighting;
burners for lamps; lamp globes; lamp mantles; lamp
reflectors; lamp hanging supports; lamp pipes; lamp glasses;
ultraviolet ray lamps not for medical purposes; laboratory
lamps; safety lamps; electric lamps; sockets for electric
lights; lanterns for lighting; Chinese lanterns; luminous
tubes for lighting; torches for lighting; light bulbs for
directional signals for vehicles; lighting apparatus for
vehicles; reflectors for vehicles; germicidal lamps for
purifying air, filaments for electric lamps, light
diffusers. Installation, repair and construction services especially
for electrical and lighting systems, public works, public
lighting; consulting on lighting. Leasing access time to a database server centre;
correspondence exchange services including correspondence
exchange services via computers or via telephony and
telecommunications apparatus and instruments and on the
Internet and/or Web; provision of online access; information
transmission via computer networks online; rental of access
time to the Internet. Computer programming services; non-business professional
consulting; technical support in the field of computing;
research services and breakdown diagnostic services;
consulting in connection with software and lighting,
technical research on lighting, urban planning, technical
project studies, technical assistance services; design,
development and updating of computer programs, software and
lighting systems; development (design) and updating of Web
sites; quality control; database reconstruction.