ADDER

Author(s):  
A. N. Brysin ◽  
Yu. A. Zhuravleva ◽  
A. S. Mikaeva ◽  
S. A. Mikaeva

The article describes an electronic multifunctional adder for electricity metering SEM-3. The authors give the technical characteristics, the device and the principle of its operation. The presented adder is designed to monitor and account for the consumption of electricity generation and power directly from consumers, as well as in automated centralized accounting and control systems, and is designed for round-the-clock operation. The adder can collect and transmit information over six independent serial interfaces. The adder with a builtin GSM module provides bidirectional information exchange via cellular modem communication with remote devices and the transfer of accumulated data to the upper level of the automated electricity metering system. It provides bidirectional exchange of information over a local network with a PC over the built-in 10/100 Base-T Ethernet interface.

2021 ◽  
Vol 94 ◽  
pp. 144-155
Author(s):  
E. P. Grabchak ◽  
◽  
E. L. Loginov ◽  

Introduction. One of the most important tasks in achieving reliability and safety of power supply as an element of ensuring technospheric security is the modernization of automated information and control systems for the transmitting and receiving sides, which ensures resistance against known types of attacks. The aim of the study is to solve the problem of secure information exchange within the framework of automated information and control systems, taking into account the low security of technological communication channels of power facilities to achieve the reliability and safety of power supply as an element of ensuring technospheric security based on the development of intelligent methods for detecting dangerous influences and intrusions to neutralize information security threats in relation to commands to control power equipment. Research methods. Within the framework of the study, general scientific and special methods of scientific knowledge were used, including analysis, synthesis, generalization, which were based on the main provisions and patterns of behavior of systems and information theory. Research results. It is proposed to create innovative algorithms for controlling power equipment, built on the basis of libraries of reference commands and reference sequences of commands used to replace commands intentionally or accidentally distorted by erroneous bits, as well as diagnosing vulnerabilities of information and control systems to ensure the correctness of the process of controlling power equipment. Conclusion. The listed technologies will make it possible to create a new class of efficient algorithms for power equipment control, built on the basis of intelligent methods for detecting dangerous influences and intrusions to neutralize information security threats in relation to control commands based on the analysis of high-level behavioral characteristics of the protected information and control system with the function of controlling the transition of the controlled system to the next a condition that depends on the exact correspondence of the generated commands to the reference commands and the reference sequence of commands, which will ensure the correctness of the control process of power equipment. Key words: energy, information and control networks, reliability, security, power supply, algorithms, monitoring, protection, information.


2020 ◽  
Author(s):  
Roberto Rigolin F. Lopes ◽  
Pooja Hanavadi Balaraju ◽  
Paulo H. Rettore ◽  
Peter Sevenich

This paper introduces a hierarchy of queues complementing each other to handle ever-changing communication scenarios in tactical networks. The first queue stores the QoS-constrained messages from command and control systems. These messages are fragmented into IP packets, which are stored in a queue of packets (second) to be sent to the radio buffer (third), which is a queue with limited space therefore, open to overflow. We start with the hypothesis that these three queues can handle ever-changing user(s) data flows (problem A) through ever-changing network conditions (problem B) using cross-layer information exchange, such as buffer occupancy, data rate, queue size and latency (problem A|B). We introduce two stochastic models to create sequences of QoS-constrained messages (A) and to create ever-changing network conditions (B). In sequence, we sketch a control loop to shape A to B to test our hypothesis using model A|B, which defines enforcement points at the incoming/outgoing chains of the system together with a control plane. Then, we discuss experimental results in a network with VHF radios using data flows that overflows the radio buffer over ever-changing data rate patterns. We discuss quantitative results showing the performance and limitations of our solutions for problems A, B and A|B.


2020 ◽  
Author(s):  
Roberto Rigolin F. Lopes ◽  
Pooja Hanavadi Balaraju ◽  
Paulo H. Rettore ◽  
Peter Sevenich

This paper introduces a hierarchy of queues complementing each other to handle ever-changing communication scenarios in tactical networks. The first queue stores the QoS-constrained messages from command and control systems. These messages are fragmented into IP packets, which are stored in a queue of packets (second) to be sent to the radio buffer (third), which is a queue with limited space therefore, open to overflow. We start with the hypothesis that these three queues can handle ever-changing user(s) data flows (problem A) through ever-changing network conditions (problem B) using cross-layer information exchange, such as buffer occupancy, data rate, queue size and latency (problem A|B). We introduce two stochastic models to create sequences of QoS-constrained messages (A) and to create ever-changing network conditions (B). In sequence, we sketch a control loop to shape A to B to test our hypothesis using model A|B, which defines enforcement points at the incoming/outgoing chains of the system together with a control plane. Then, we discuss experimental results in a network with VHF radios using data flows that overflows the radio buffer over ever-changing data rate patterns. We discuss quantitative results showing the performance and limitations of our solutions for problems A, B and A|B.


2018 ◽  
Vol 2 ◽  
pp. 9-16
Author(s):  
A. Al-Ammouri ◽  
◽  
H.A. Al-Ammori ◽  
A.E. Klochan ◽  
A.M. Al-Akhmad ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document