专利摘要:
A method of configuring several client modules by a server module connected to each other via a daisy-chain Ethernet communication network, each client module comprising an Ethernet switch having a first communication port and a second communication port, so that the first port of a first client module is connected to a communication port of the server module and the first port of another client module is connected to the second port of an adjacent client module. The method comprises for each client module an initialization step in which the client module activates its first port and deactivates its second port, an identification step in which the client module communicates with the server module by its first port in order to receive an identifier, and an end of configuration step in which, once its identifier received, the client module activates its second port.
公开号:FR3040845A1
申请号:FR1558198
申请日:2015-09-04
公开日:2017-03-10
发明作者:Stephane Sinistro;Eric Suptitz
申请人:Schneider Electric Industries SAS;
IPC主号:
专利说明:

Technical field of the invention
The present invention relates to a method for automatically configuring addressing in a communication architecture comprising devices communicating with each other via a daisy-chain Ethernet communication network, ie the devices are connected to one another. waterfall (or garland).
A relevant application domain is, for example, the modular architecture of a telecontrol substation in an MV / LV substation of an electrical distribution network (MV: Medium Voltage or HTA, LV: Low Voltage or Low tension). Such a telecontrol station generally comprises different distinct functional modules that can provide voltage / current measurement functions at MV or LV equipment, quality monitoring and power grid management functions, signal detection functions, and more. defect, control / command of equipment, etc ...
State of the art
This type of modular architecture (or Modular RTU - Remote Terminal Unit) can also include a central server module in charge on the one hand to make a communication interface with a centralized supervision system and on the other hand manage different functional modules MV or LV customers.
The modules are, for example, physically placed adjacent to a DIN rail. The server module is placed at the top and the client modules are placed next to each other. A difficulty of this type of modular architecture is to be able to simply configure the different client modules, that is to say assign each module a physical address (what is its position on the row of the DIN rail) and then associate a IP address so that the server module can find the physical configuration of the row.
There are already existing protocols (such as DHCP, DPWS, DNS, ...) that allow to assign IP addresses or unique names to each module, however the recording of the physical position of the module requires a human operation ( press a button of the module during the commissioning phase, switch on an LED to recognize where is the module which corresponds to such MAC address, read on a label and copy in a Web page of the MAC address of the module, etc ...). Other documents, such as in particular FR2641629, US6688910, US8791646, already describe automatic or semi-automatic methods for identifying and allocating addresses on a communication network. These methods are not always simple and require for example the existence of a unique electronic serial number in each client module, an electrical measurement to determine the physical position of a client module, a pulse count to know the number of connected modules, etc ... Furthermore, the document US7139839 provides a communication bus between the different modules but also provides a separate addressing bus, in order to be able to automatically assign an identifier (for example a MAC address) to each customer module.
The object of the invention is therefore to provide a very simple and flexible automatic configuration method without the mentioned drawbacks and which allows a server module, after a commissioning phase, to know all the present connected client modules, their position / physical address on the row as well as their identification (IP address or MAC address).
The method according to the invention can be advantageously used during a first configuration of the architecture but also during a replacement of one of the modules, including a defective module.
Presentation of the invention
This goal is achieved by means of a method of configuring several client modules by a server module, the client modules and the server module being connected to each other via a daisy-chain Ethernet communication network. Each client module comprises an Ethernet switch having a first communication port and a second communication port, such that the first port of a first client module is connected to a communication port of the server module and the first port of another client module is connected to the second port of an adjacent client module. The method includes, for each client module:
An initialization step in which the client module activates its first port and disables its second port,
An identification step in which the client module communicates with the server module by its first port in order to receive an identifier from the server module,
An end of configuration step in which, once its identifier has been received, the client module activates its second port.
During the identification step, the client module sends a discovery request to the server module. Preferably, in the absence of response from the server module, the client module periodically sends a discovery request to the server module. Alternatively, the server module periodically sends an offer request on the communication network. For example, the queries are compliant with the DHCP standard. The invention also relates to a telecontrol system of an electrical distribution network comprising a server module and several client modules connected to each other via a daisy-chain Ethernet communication network, the telecontrol system being adapted to implement a such a method of configuration. The invention also relates to a client module comprising an Ethernet switch having two communication ports, the client module being adapted to be inserted in a telecontrol system to implement such a configuration method.
It can be seen that the method relies on an asymmetrical use of the two communication ports of the Ethernet switch of the client modules, which makes it possible to identify each client module sequentially by the server module. Indeed, as long as an identifier is not assigned to a client module, it does not activate its second communication port, which does not allow the client modules downstream to exchange with the server module.
BRIEF DESCRIPTION OF THE FIGURES Other features and advantages will appear in the following detailed description with reference to the appended drawings, in which: FIG. 1 represents an exemplary architecture of a telecontrol system comprising a server module and four modules; clients, - Figures 2, 3 and 4 show successive phases of the configuration method implemented in the architecture of Figure 1.
Detailed description of an embodiment
With reference to FIG. 1, a telecontrol system comprises a server module 1 and a plurality of client modules. The different modules are connected to each other by an Ethernet IP (Internet Protocol) communication network with a physical connection of daisy-chain type 4, ie the modules are connected in cascade (or garland). Each client module 10, 11, 12, 13 has an Ethernet switch which is provided with two communication ports, hereinafter referred to as the first port and the second port. The first ports are called 10a, respectively 11a, 12a and 13a and the second ports are called 10b, respectively 11b, 12b and 13b. The Ethernet switch of a client module is capable of routing the messages between the first port and the second port and vice versa.
All the modules are physically interconnected by a connection device 5 which makes it possible to easily connect and disconnect each module with its adjacent neighbor or neighbors (that is to say, his previous neighbor and his next neighbor). According to a particular embodiment, the connection device is in the form of a U-shaped jumper 5 and having two connectors for example RJ45 type connected by a cable. In Figure 1, a single jumper 5 has been shown for reasons of simplification, but obviously there is also a jumper between the ports 10b and 11a, between 11b and 12a and between 12b and 13a.
In a simple manner, the modules 1, 10, 11, 12, 13 can be placed in a chain side by side and fixed for example on a DIN rail 6, the server module 1 being placed at one end of the chain. Thus, a communication port 2 of the server module 1 is connected with the first port 10a of the first client module 10, placed next to the server module 1. The server module 1 may also include one or more other communication ports 3, for connect to a supervisor or central computer.
The second port 10b of the first client module 10 is connected to the first port of the client module 11 adjacent to the module 10. Thus, the second ports of all the client modules 10, 11, 12, 13 are connected to the first ports of the next client module in the chain, subject of course that such a client module exists. Similarly, the first ports of the client modules 11, 12, 13 other than the first client module 10 are connected to the second port of a previous client module.
In the example of FIG. 1, the first client module 10 is placed next to the server module and, during the configuration process, will therefore automatically be allocated the physical address 1 corresponding to its physical position on the row. Similarly, the client module 11, placed next to the module 10, will be assigned the physical address 2, and so the client module 12 the physical address 3, the client module 13 the physical address 4. Indeed , given the cascade connection mode, the client module 10 will be the first to exchange with the server module 1 during the configuration process, then the module 11, etc. Preferably, for each new client module the server module 1 increments the physical address to be assigned.
Such a modular architecture is very simple to implement and can thus easily include a large number of modules connected in this way, for example 24 modules.
Advantageously, when replacing a faulty client module 12 for example, the control system will restart the configuration process so that the new replacement module 12 can be seen very simply automatically assign the physical address 3, without need an intervention on this replacement module. The same applies when the control system has to add a new functional client module.
The procedure of the configuration process is as follows:
FIG. 2 represents the first step of the configuration process, called the initialization step, in which all the client modules 10, 11, 12, 13 go into an unconfigured state, activate their first port 10a, 11a, 12a, 13a and disable their second port 10b, 11b, 12b, 13b (disabled port: indicated in black in the figures). Given the architecture of the communication network in daisy-chain, this means that at startup only the first client module 10 is able to exchange with the server module 1. The other client modules can not, since the second port 10b of the first module 10 is disabled.
After this initialization step, the client modules 10, 11, 12, 13 go to an identification step in which the client modules try to communicate with the server module 1 by their first port 10a, 11a, 12a, 13a in the purpose of receiving an identifier from the server module 1.
For this, the identification step has two possible variants: a) according to a first variant, the client modules 10, 11, 12, 13 send a discovery request (for example of the DHCP Discovery type) 10d, 11d, 12d , 13d to the server module which is in "listen" mode. If the server module receives such a request, it then responds to the client module sending the discovery request by an offer request 1e (for example DHCP Offer type).
If a client module sending a discovery request does not receive a response from the server module after a certain predetermined time, then it periodically re-issues its discovery request 10d, 11d, 12d, 13d and remains in the step Identification. b) according to a second variant, it is no longer the client modules which periodically initiate the exchanges with the server module 1, but the server module 1 which regularly issues a request for an offer (for example of the DHCP Offer type) on the network of servers. communication. If it receives a response to this request, it means that there is still on the network at least one client module to configure.
This second variant can be simpler because it prevents client modules from constantly sending discovery requests unnecessarily, as long as they are not really able to discuss with the server module.
When a client module receives an offer request from the server module 1 and this client module is not in the configured state, then it responds to the server module 1 with a request, for example of the DHCP Request type. and the server module 1 will then be able to send back to the client module a recognition request (of the DHCP ACK type) which gives it an identifier, this identifier comprising a physical address and an IP address, as well as any other parameters.
When a client module is thus assigned an identifier by the server module 1, it then goes into a so-called end of configuration step, in which it is positioned in configured mode and activates its second communication port. Thus, the next client module in the chain can then begin to exchange with the server module 1 since its discovery request can be received by the server module 1.
In FIG. 3, it can thus be seen that the client module 10, having received an identifier, is in the configured state and has activated its second port 10b, which now allows the client module 11 adjacent to the module 10 to communicate with the module server 1. It can therefore receive a discovery request 11 d of the client module 11 and send him a 1e offer request, the Ethernet switch of the client module 10 is now able to route the messages.
In FIG. 4, the server 1 could assign an identifier to the client module 11, which has now activated its second port 11b so as to allow exchanges between the server 1 and the adjacent client module 12.
When the server module 1 no longer receives a discovery request from client modules 10, 11, 12, 13, or when it no longer receives a response to an offer request, this means that all the client modules are configured 10 , 11, 12, 13 and have activated their second communication port, thus ending the configuration process.
Optionally, LEDs representative of the on / off state of each communication port of a module allow a user to follow in a simple way where is the process of configuring a telecontrol system.
权利要求:
Claims (8)
[1" id="c-fr-0001]
A method of configuring a plurality of client modules (10, 11, 12, 13) by a server module (1), the client modules and the server module being connected to each other via a daisy-type Ethernet communication network (4). chain, each client module comprising an Ethernet switch having a first communication port (10a, 11a, 12a, 13a) and a second communication port (10b, 11b, 12b, 13b), so that the first port (10a) of a first client module (10) is connected to a communication port (2) of the server module (1) and the first port of another client module (11, 12, 13) is connected at the second port of an adjacent client module, characterized in that the method comprises for each client module: an initialization step in which the client module activates its first port and deactivates its second port, an identification step in which the client module communicates with the server module through its first port for the purpose of e receive an identifier from the server module, an end of configuration step in which, once its identifier received, the client module activates its second port.
[2" id="c-fr-0002]
2. Configuration method according to claim 1, characterized in that, during the identification step, the client module sends a discovery request to the server module.
[3" id="c-fr-0003]
3. Configuration method according to claim 2, characterized in that during the identification step and in the absence of response from the server module, the client module periodically sends a discovery request to the server module.
[4" id="c-fr-0004]
4. Configuration method according to claim 1, characterized in that the server module periodically sends an offer request on the communication network.
[5" id="c-fr-0005]
5. Configuration method according to one of claims 2 to 4, characterized in that the requests are in accordance with the DHCP standard.
[6" id="c-fr-0006]
6. Configuration method according to claim 1, characterized in that the identifier of a client module comprises an IP address and a physical address.
[7" id="c-fr-0007]
7. Telecontrol system of a power distribution network comprising a server module (1) and several client modules (10, 11, 12, 13) connected to each other via a daisy-chain Ethernet communication network (4), characterized in that the telecontrol system is adapted to implement a configuration method according to one of the preceding claims.
[8" id="c-fr-0008]
8. Client module (10, 11, 12, 13) of a telecontrol system comprising an Ethernet switch having a first communication port (10a, 11a, 12a, 13a) and a second communication port (10b , 11b, 12b, 13b), characterized in that the client module is adapted to implement a configuration method according to one of claims 1 to 6.
类似技术:
公开号 | 公开日 | 专利标题
EP3139574A1|2017-03-08|Automatic addressing method in an ethernet communication architecture
US20080201785A1|2008-08-21|Cable modem location analyzing device
EP3373558B1|2019-09-04|Communication method for maintaining an application session between a terminal and an application server
FR2994516A1|2014-02-14|DEVICE AND METHOD FOR PROVIDING SERVICES IN A COMMUNICATION NETWORK
EP3391561B1|2020-11-18|Control of access to an on-line service via a li-fi network
FR3019435A1|2015-10-02|METHOD FOR ROUTING DATA BY INTERNET ACCESS BOX
EP3787344A1|2021-03-03|Method for configuring a system for extending wireless communication coverage and a system for extending wireless communication coverage implementing said method
EP3024201B1|2019-09-04|Method for assigning a network address to a network terminal device, associated network, connection device, addressing server and terminal device
EP2583429B1|2018-01-17|Method and system for communication based on ws-discovery
EP3228115A1|2017-10-11|Technique for accessing at least one adminstration server
WO2015044565A1|2015-04-02|Methods for configuring and managing an ip network, corresponding devices and computer programs
EP3706502A1|2020-09-09|Method for connecting a network repeater, associated computer program product, network repeater and access set
US20200287784A1|2020-09-10|Priority based selection of time services
EP0629934A1|1994-12-21|Address allocation method operating unit and equipment therefor
EP3881523A1|2021-09-22|Method and system for managing dhcp servers
EP2579545B1|2017-05-17|Method of assigning a public network address to equipment with a private network address
EP3518464A1|2019-07-31|Network port type identification method, apparatus and storage medium
WO2018202985A1|2018-11-08|Technique for executing a service in a local area network through a wide area communication network
WO2005081497A1|2005-09-01|Method for connecting a domestic system to a remote server
FR2923973A1|2009-05-22|TELECOMMUNICATION METHOD FOR CONFIGURING EQUIPMENT
WO2008031967A2|2008-03-20|Method of supervising a session for accessing a service set up by a client terminal by means of a dynamic configuration protocol
EP2230821A1|2010-09-22|Method for configuring a station connected to an IP communication network
WO2010109121A2|2010-09-30|Technique for allocating an address to a private network
FR2943872A1|2010-10-01|METHOD FOR TRANSMITTING A SELF-DIAGNOSTIC REQUEST FROM A MULTISERVICE HOUSING TO A SERVER OF A HIGH-SPEED NETWORK AND HOUSING USING SUCH A METHOD
EP2229751A1|2010-09-22|Method and device for the wake-on-lan of a device connected to a network
同族专利:
公开号 | 公开日
US20170070564A1|2017-03-09|
FR3040845B1|2018-05-18|
CN106506712A|2017-03-15|
EP3139574A1|2017-03-08|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
US5914957A|1996-12-19|1999-06-22|Otis Elevator Company|Automatic node configuration with identical nodes|
WO2003085899A1|2002-04-10|2003-10-16|Philips Intellectual Property & Standards Gmbh|Automatic, successive configuring of slave modules in a data bus network|
US20090213763A1|2008-02-22|2009-08-27|Dunsmore Richard J|Method and system for dynamic assignment of network addresses in a communications network|
FR2641629B1|1989-01-11|1994-09-02|Merlin Gerin|METHOD FOR AUTOMATICALLY ADDRESSING STANDARD MODULAR BLOCKS AND ASSEMBLY FOR CARRYING OUT SAID METHOD|
US6688910B1|1999-02-10|2004-02-10|Avaya Technology Corp.|System and method for automatic addressing of devices in a dedicated telecommunications system|
EP1409700A2|2001-07-18|2004-04-21|DeveloGen Aktiengesellschaft für entwicklungsbiologische Forschung|System for producing clonal or complex populations of recombinant adenoviruses, and the application of the same|
US7139839B2|2001-11-26|2006-11-21|Schneider Automation Inc.|Method and apparatus for assigning a network node address|
US7649912B2|2005-04-27|2010-01-19|Rockwell Automation Technologies, Inc.|Time synchronization, deterministic data delivery and redundancy for cascaded nodes on full duplex ethernet networks|
WO2008057019A1|2006-11-09|2008-05-15|Telefonaktiebolaget L M Ericsson |Arrangement and method relating to identification of hardware units|
US7782800B2|2006-12-22|2010-08-24|Texas Instruments Incorporated|Discovery, detection, and management of daisy-chain system topology|
US8805949B2|2008-01-16|2014-08-12|Netapp, Inc.|System and method for populating a cache using behavioral adaptive policies|
ES2532517T3|2008-03-13|2015-03-27|Eldolab Holding B.V.|Method and apparatus for repeating lighting information in a butterfly chain bus structure|
EP2222018A1|2009-02-24|2010-08-25|Alcatel Lucent|A method of centralized ethernet network shutdown|
US9960872B2|2012-03-08|2018-05-01|Marvell International Ltd.|Systems and methods for performing a soft-block of a queue based on a size of a remaining period of a guard band|
EP2785020A1|2013-03-29|2014-10-01|Televic Rail NV|Method and system for distributing location-based addresses in a network|GB2568725B|2017-11-24|2021-08-18|Ge Aviat Systems Ltd|Method and apparatus for initializing a controller module|
GB2568724B|2017-11-24|2021-08-18|Ge Aviat Systems Ltd|Method and apparatus for initializing a controller module|
US10826782B2|2018-10-30|2020-11-03|Ge Aviation Systems Limited|Method and apparatus for initializing a controller module|
EP3780558A1|2019-08-14|2021-02-17|Schneider Electric Industries SAS|Addressing of slave devices using iterative power activation|
法律状态:
2016-07-18| PLFP| Fee payment|Year of fee payment: 2 |
2017-03-10| PLSC| Search report ready|Effective date: 20170310 |
2017-08-09| PLFP| Fee payment|Year of fee payment: 3 |
2018-08-08| PLFP| Fee payment|Year of fee payment: 4 |
2019-08-07| PLFP| Fee payment|Year of fee payment: 5 |
2020-09-25| PLFP| Fee payment|Year of fee payment: 6 |
2021-09-27| PLFP| Fee payment|Year of fee payment: 7 |
优先权:
申请号 | 申请日 | 专利标题
FR1558198A|FR3040845B1|2015-09-04|2015-09-04|AUTOMATIC ADDRESSING METHOD IN AN ETHERNET COMMUNICATION ARCHITECTURE|
FR1558198|2015-09-04|FR1558198A| FR3040845B1|2015-09-04|2015-09-04|AUTOMATIC ADDRESSING METHOD IN AN ETHERNET COMMUNICATION ARCHITECTURE|
EP16178953.2A| EP3139574A1|2015-09-04|2016-07-12|Automatic addressing method in an ethernet communication architecture|
US15/212,635| US20170070564A1|2015-09-04|2016-07-18|Automatic addressing method in an ethernet communication architecture|
CN201610676755.2A| CN106506712A|2015-09-04|2016-08-16|Automatic addressing method in ethernet communication architectural framework|
[返回顶部]