[go: up one dir, main page]

CN118055373A - Converged communication system and monitoring method - Google Patents

Converged communication system and monitoring method Download PDF

Info

Publication number
CN118055373A
CN118055373A CN202410300952.9A CN202410300952A CN118055373A CN 118055373 A CN118055373 A CN 118055373A CN 202410300952 A CN202410300952 A CN 202410300952A CN 118055373 A CN118055373 A CN 118055373A
Authority
CN
China
Prior art keywords
terminal
access
node
operation data
sink node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410300952.9A
Other languages
Chinese (zh)
Inventor
刘锐
张艳珍
李智
潘鑫
赵世民
姜世锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Taiyue Tiancheng Technology Co ltd
Original Assignee
Beijing Taiyue Tiancheng Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Taiyue Tiancheng Technology Co ltd filed Critical Beijing Taiyue Tiancheng Technology Co ltd
Priority to CN202410300952.9A priority Critical patent/CN118055373A/en
Publication of CN118055373A publication Critical patent/CN118055373A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/38Services specially adapted for particular environments, situations or purposes for collecting sensor information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a converged communication system and a monitoring method, which relate to the technical field of communication of the Internet of things, wherein the converged communication system comprises a terminal, a sink node, an access node and a monitoring platform which are sequentially connected; the terminal comprises a first terminal which is accessed to the sink node in a wireless narrowband communication mode and a second terminal which is accessed to the sink node in a wireless broadband communication mode; the terminal is used for monitoring operation data of the transformer substation; the access node is used for carrying out security detection on the accessed terminal, allowing the terminal to access after the security detection passes, receiving the operation data sent by the accessed terminal, carrying out state analysis on the operation data, and reporting the analysis result to the monitoring platform. The fusion communication system and the monitoring method can meet the requirements of high-speed and real-time transmission of operation data, and further improve the monitoring efficiency of the transformer substation.

Description

Converged communication system and monitoring method
Technical Field
The invention relates to the technical field of communication of the Internet of things, in particular to a converged communication system and a monitoring method.
Background
The monitoring terminal equipment arranged on the transformer substation site has the conditions of different data volume, different time intervals and different data importance degrees in the uploaded data, and the reporting requirements of the data are different. The variety of the data to be monitored in the transformer substation is various, so that the monitoring requirement of the transformer substation data is difficult to meet, and meanwhile, the monitoring efficiency is reduced due to the defects of electromagnetic interference and the like in the transformer substation.
Disclosure of Invention
Accordingly, an objective of the present invention is to provide a converged communication system and a monitoring method for alleviating the above-mentioned problems.
In a first aspect, an embodiment of the present invention provides a converged communication system, where the converged communication system includes a terminal, a sink node, an access node, and a monitoring platform that are sequentially connected; the terminal comprises a first terminal which is accessed to the sink node in a wireless narrowband communication mode and a second terminal which is accessed to the sink node in a wireless broadband communication mode; the terminal is used for monitoring the operation data of the transformer substation after accessing the converged communication system, and sending the monitored operation data to the access node through the sink node; the access node is used for carrying out security detection on the accessed terminal, allowing the terminal to be accessed after the security detection passes, receiving the operation data sent by the accessed terminal, carrying out state analysis on the operation data, and reporting an analysis result to the monitoring platform.
With reference to the first aspect, the embodiment of the present invention provides a first possible implementation manner of the first aspect, where the sink node includes a narrowband access unit and a broadband access unit; the narrowband access unit is used for accessing the first terminal, and the broadband access unit is used for accessing the second terminal.
With reference to the first possible implementation manner of the first aspect, the embodiment of the present invention provides a second possible implementation manner of the first aspect, where the wireless narrowband communication manner is a narrowband LORA communication manner, and the wireless broadband communication manner is a broadband WAPI communication manner; the sink node adopts a wired Ethernet to perform network interaction with the access node; the access node adopts a wired Ethernet to perform network interaction with the monitoring platform.
With reference to the second possible implementation manner of the first aspect, the embodiment of the present invention provides a third possible implementation manner of the first aspect, where the step of performing, by the access node, security detection on the accessed terminal includes: responding to the access request of the first terminal forwarded by the sink node, and extracting the identity of the first terminal carried in the access request of the first terminal; detecting whether the identity of the first terminal is in a preconfigured allowed access list or not; and if so, sending a response message allowing access to the sink node, and forwarding the response message to the first terminal through the sink node so as to allow the first terminal to access.
With reference to the third possible implementation manner of the first aspect, an embodiment of the present invention provides a fourth possible implementation manner of the first aspect, where the foregoing access node is further configured to: if the identity of the first terminal is detected not to be in a pre-configured allowed access list, judging whether the identity of the first terminal is in a pre-configured forbidden access list or not; if yes, sending an access prohibition message to the first terminal through the sink node; if not, the identity of the first terminal is sent to a rechecking terminal.
With reference to the fourth possible implementation manner of the first aspect, an embodiment of the present invention provides a fifth possible implementation manner of the first aspect, where the foregoing access node is further configured to: if the access permission message returned by the rechecking terminal is received, a response message for permitting access is sent to the first terminal through the sink node, and the identity of the first terminal is added to the access permission list; and if the access prohibition message returned by the rechecking terminal is received, sending the access prohibition message to the first terminal through the sink node, and adding the identity of the first terminal to the access prohibition list.
With reference to the second possible implementation manner of the first aspect, an embodiment of the present invention provides a sixth possible implementation manner of the first aspect, where the step of performing, by the access node, security detection on the accessed terminal further includes: responding to the access request of the second terminal forwarded by the sink node, and acquiring the authentication key information matched with the second terminal which is preset; authenticating the second terminal by adopting the authentication key information; if the authentication is passed, sending a message allowing access to the second terminal through the sink node; and if the authentication does not pass, sending a message for prohibiting access to the second terminal through the sink node.
With reference to the second possible implementation manner of the first aspect, an embodiment of the present invention provides a seventh possible implementation manner of the first aspect, where the first terminal is configured to perform data interaction according to a preset period; the second terminal is configured to report the operation data in real time.
With reference to the seventh possible implementation manner of the first aspect, the embodiment of the present invention provides an eighth possible implementation manner of the first aspect, where the first terminal is configured to send, according to a preset period, collected first operation data of the substation to the sink node; the sink node is used for forwarding the first operation data to the access node so that the access node performs state analysis on the first operation data and reports an analysis result to the monitoring platform; the second terminal is used for responding to second operation data of the transformer substation and sending the second operation data to the sink node; the sink node is further configured to forward the second operation data to the access node, so that the access node performs state analysis on the second operation data, and report an analysis result to the monitoring platform.
In a second aspect, an embodiment of the present invention further provides a monitoring method, which is applied to the converged communication system in the first aspect, where the converged communication system includes a terminal, a sink node, an access node, and a monitoring platform that are sequentially connected; the method comprises the following steps: after the terminal is accessed to the converged communication system, the terminal monitors operation data of the transformer substation and sends the monitored operation data to the access node through the sink node; and carrying out security detection on the accessed terminal through the access node, allowing the terminal to be accessed after the security detection passes, receiving the operation data sent by the accessed terminal, carrying out state analysis on the operation data, and reporting an analysis result to the monitoring platform.
In a third aspect, an embodiment of the present invention further provides an electronic device, including a memory, a processor, and a computer program stored in the memory and capable of running on the processor, where the processor executes the computer program to implement the steps of the method described in the first aspect.
In a fourth aspect, embodiments of the present invention also provide a computer-readable storage medium, on which a computer program is stored, which when being executed by a processor performs the steps of the method according to the first aspect.
The embodiment of the invention has the following beneficial effects:
The converged communication system and the monitoring method provided by the embodiment of the invention can be used for accessing the first terminal accessed in a wireless narrowband communication mode and the second terminal accessed in a wireless broadband communication mode in the converged communication system, monitoring the operation data of the transformer substation after the terminal is accessed in the converged communication system, sending the monitored operation data to the access node through the convergent node, and the access node is used for carrying out safety detection on the accessed terminal, allowing the terminal to be accessed after the safety detection is passed, receiving the operation data sent by the accessed terminal, carrying out state analysis on the operation data, and reporting an analysis result to the monitoring platform, so that the operation data of the transformer substation is monitored.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
In order to make the above objects, features and advantages of the present invention more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are needed in the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the description below are some embodiments of the invention and that other drawings may be obtained from these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic structural diagram of a converged communication system according to an embodiment of the present invention;
fig. 2 is a flowchart of a narrowband communication access method according to an embodiment of the present invention;
fig. 3 is a flow chart of a width communication access method according to an embodiment of the present invention;
FIG. 4 is a flow chart of a monitoring method according to an embodiment of the present invention;
Fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The wireless technology enables the equipment to establish network connection between terminal equipment of the transformer substation and realize communication between the terminal equipment under the condition that a cable is not needed, the cable is not needed to be laid in the transformer substation, the work such as trench construction is avoided, and the layout and construction cost is effectively reduced.
However, in the transformer substation, part of sites have the defects that the signals of operators cannot cover or signals are unstable, meanwhile, the channel utilization rate is low, the communication cost is high, the electromagnetic interference in the received station is serious and the like, and the monitoring requirement of the data of the transformer substation is difficult to meet.
Based on the above, the fusion communication system and the monitoring method provided by the embodiment of the invention can effectively alleviate the technical problems.
For the sake of understanding the present embodiment, a detailed description will be given of a converged communication system disclosed in the present embodiment.
In a possible implementation manner, the embodiment of the present invention provides a converged communication system, which is shown in fig. 1 and includes a terminal 10, a sink node 20, an access node 30 and a monitoring platform 40 that are sequentially connected.
In fig. 1, the terminals in the embodiment of the present invention include a first terminal 101 that accesses a sink node in a wireless narrowband communication manner and a second terminal 102 that accesses the sink node in a wireless broadband communication manner; in consideration of the fact that more data needs to be monitored in the transformer substation, the number of the first terminals and the second terminals in the embodiment of the present invention may be multiple, and the number of the sink nodes and the access nodes may also be multiple, where, for convenience of explanation, in fig. 1, two first terminals and two second terminals, and an embodiment of one sink node and one access node are shown respectively, in actual use, the number of the first terminals and the second terminals may be set according to actual use conditions, and each access node may also correspond to multiple sink nodes, or multiple access nodes are connected to a monitoring platform, and so on, specifically, in terms of actual use conditions, the embodiment of the present invention is not limited to this.
Further, the terminal is configured to monitor operation data of the substation after accessing the converged communication system, and send the monitored operation data to the access node via the sink node; the access node is used for carrying out security detection on the accessed terminal, allowing the terminal to access after the security detection passes, receiving operation data sent by the accessed terminal, carrying out state analysis on the operation data, and reporting an analysis result to the monitoring platform.
When in actual use, according to the application condition of the transformer substation site, various data with different data sizes, different time intervals and different data importance degrees need to be considered when the terminal is arranged, the monitoring and reporting requirements of the data are different, and meanwhile, the data communication anti-interference is a problem that the terminal is arranged in the transformer substation and needs to be considered mainly. Therefore, in the embodiment of the invention, the first terminal which is connected with the sink node in a wireless narrowband communication mode and the second terminal which is connected with the sink node in a wireless broadband communication mode are adopted to meet the requirements of monitoring and communication of data in the transformer substation. The embodiment of the invention is actually a wide-narrow band fusion communication system, and the scheme of the wide-narrow band fusion not only meets the reliability requirement of monitoring data transmission in a complex electromagnetic environment, but also meets the requirement of high-speed and real-time transmission of the monitoring data.
Therefore, the converged communication system provided by the embodiment of the invention can be used for accessing the first terminal accessed in a narrowband communication mode and the second terminal accessed in a broadband communication mode in the converged communication system, monitoring the operation data of the transformer substation after the terminal is accessed in the converged communication system, sending the monitored operation data to the access node through the aggregation node, and the access node is used for carrying out safety detection on the accessed terminal, allowing the terminal to be accessed after the safety detection is passed, receiving the operation data sent by the accessed terminal, carrying out state analysis on the operation data, and reporting an analysis result to the monitoring platform, so that the operation data of the transformer substation is monitored.
In an actual use, in the embodiment of the present invention, the first terminal is configured to perform data interaction according to a preset period; the second terminal is configured to report the operation data in real time.
Specifically, the terminal with the requirements of large data volume and high real-time performance is accessed by adopting a wireless broadband communication mode, namely, the second terminal in the embodiment of the invention is used for monitoring and reporting the operation data with the requirements of large data volume and high real-time performance, namely, the second terminal can report the operation data in time under any condition, such as the operation data of an online monitoring local discharge sensor, a switch relay, an access controller and the like.
The operation data reported at a fixed interval with low power consumption is generally transmitted in a wireless narrowband communication mode, that is, the first terminal in the embodiment of the invention is used, so that the first terminal can be configured to perform data interaction according to a preset period, that is, perform data interaction after periodically performing dormancy and awakening, so as to meet the requirement of low power consumption, for example: and monitoring and reporting data of a temperature and humidity sensor, a water immersion water level sensor, an SF6 micro water density sensor and the like.
Further, in order to achieve the access of the first terminal and the second terminal, the sink node in the embodiment of the present invention includes a narrowband access unit and a broadband access unit; the narrowband access unit is used for accessing the first terminal, and the broadband access unit is used for accessing the second terminal.
In a specific implementation, in the embodiment of the present invention, the above wireless narrowband communication mode is a narrowband LORA communication mode, and the wireless broadband communication mode is a broadband WAPI (WIRELESS LAN Authentication AND PRIVACY information) communication mode; further, the sink node adopts a wired Ethernet to perform network interaction with the access node; the access node adopts a wired Ethernet to perform network access interaction with the monitoring platform.
The LORA communication mode belongs to one of wireless communication technologies, and adopts a CSS (CHIRP SPREAD Spectrum modulation) spread spectrum modulation technology, so that the receiving sensitivity can be improved to the maximum efficiency, and meanwhile, the LORA communication mode has the characteristics of long communication distance, low power consumption, strong anti-interference capability and the like. The WAPI communication mode can transmit the data in a key mode, so that the safety of the converged communication system is improved.
Therefore, the first terminal and the second terminal can respectively adopt a narrow-band LORA communication mode and a broadband WAPI communication mode to transmit the operation data obtained by monitoring to the sink node.
The sink node is usually realized by one or more sink devices, generally has functions of network communication relay, data and instruction forwarding, subordinate device management scheduling and the like, and adopts a wired Ethernet to carry out network access interaction, control instruction issuing, monitoring data reporting and the like with the access node.
The access node has functions of building management, equipment scheduling, data receiving and the like of the whole wireless network in the converged communication system, and can process and calculate the operation data reported by the terminal and the sink node, for example, the reported operation data is subjected to state analysis according to a pre-configured mathematical model so as to monitor whether the operation state representation is met or not, and the like, and the result is reported to the monitoring platform according to the communication specification requirement.
In addition, the access node can also complete the management and the scheduling of the broadband convergence network, receive the control instruction of the monitoring platform to configure each terminal, and complete the network communication frequency point allocation, the scheduling of the communication time slots of the same-layer terminals or devices, the terminal data reporting period configuration, the wireless transmitting power configuration and the like.
Based on the above functions, the access node in the embodiment of the present invention is also responsible for performing security detection on the accessed terminal, where the security detection process performed on the accessed terminal is usually performed when the terminal accesses the converged communication system for the first time, and includes access detection of the first terminal and access detection of the second terminal.
Specifically, the process of access detection for the first terminal includes the following:
(1) Responding to an access request of a first terminal forwarded by an aggregation node, and extracting an identity of the first terminal carried in the access request of the first terminal;
(2) Detecting whether the identity of the first terminal is in a preconfigured allowed access list or not;
(3) If so, sending a response message allowing access to the sink node, and forwarding the response message to the first terminal through the sink node so as to allow the first terminal to access.
Specifically, based on the above detection process, when the first terminal accesses for the first time, the first terminal may send an access request to the sink node, and the sink node forwards the access request to the access node for processing. Meanwhile, the access node is preconfigured with an allowed access list to record the identity of the first terminal allowed to access the converged communication system, such as an EID electronic identity, and the like, and generally, when the first terminal is arranged, the identity of the first terminal can be directly added into the allowed access list, so that when the first terminal is accessed for the first time, access detection can be performed on the first terminal, and the overall safety is improved.
In addition, besides the allowed access list, the access node is further configured with a forbidden access list, that is, the forbidden access list records the identity of the terminal forbidden to access the converged communication system. In practical use, the allowed access list is equivalent to a white list, the forbidden access list is equivalent to a black list, and the access node can detect the accessed terminal according to the white list and the black list.
If the access node detects that the identity of the first terminal is not in a pre-configured allowed access list, judging whether the identity of the first terminal is in a pre-configured forbidden access list or not; if yes, sending a forbidden access message to the first terminal through the sink node; if not, the identity of the first terminal is sent to the rechecking terminal.
The rechecking terminal can be a terminal used by operation and maintenance personnel, and the access terminal can be rechecked manually. Specifically, if the access node receives the access permission message returned by the rechecking terminal, the access node sends a response message for permitting access to the first terminal through the sink node, and adds the identity of the first terminal to an access permission list; and if the access prohibition message returned by the rechecking terminal is received, the access prohibition message is sent to the first terminal through the sink node, and the identity of the first terminal is added to the access prohibition list.
Therefore, the access node can judge whether the terminal accessing the converged communication system through different modulation modes is permitted to join the network of the converged communication system according to the setting of the white list and the black list and the manual rechecking mode. In general, after the sink node joins the network of the converged communication system, the access node may also issue the configuration information of its downlink working channel to the sink node, that is, the access node may complete the process of setting up, scheduling and configuring the network of the whole converged communication system by controlling the configuration of the accessed terminal and the downlink working frequency point, the configuration of the data reporting period, and the like.
For easy understanding, fig. 2 shows a flow chart of narrowband communication access, and shows main flows of an access node, a sink node and a terminal in the narrowband communication access process. As shown in fig. 2, the method comprises the following steps:
(1) And (3) power-on process: the equipment corresponding to the access node and the sink node and the terminal are electrified;
(2) The sink node obtains the time slot time allocated by the upper node according to the broadcast frame content of the upper node (such as an access node), and initiates a random access request in an idle time slot of the upper node, and the sink node joins the access node network;
In this process, the access node may interact with the sink node, such as the random access response, random join response, etc. process shown in fig. 2.
(3) After the sink node joins the network of the converged communication system, the access node issues a node channel working configuration to the sink node, so that the sink node can respond to the network layer response after the configuration is successful.
In this process, if the access node has other configuration data to be issued, for example, the synchronous acquisition configuration of the first terminal or the second terminal, etc., the network layer may be continuously used for issuing until the configuration is completed.
(4) The access node performs network access interaction with the terminal;
in this process, the access node may respond to the access request of the first terminal according to the preconfigured allowed access list and the forbidden access name, for example, the access node sends a response message for allowing access to the sink node, so that the sink node forwards the response message to the first terminal, or the access node sends a forbidden access message to the sink node, and sends a response for prohibiting access message to the first terminal via the sink node, and so on.
Further, for the first terminal that is allowed to access, the first terminal may also be added to the network topology of the converged communication system.
(5) The access node issues a configuration instruction to the first terminal according to the requirement;
In this process, for the first terminal allowed to access, the access node may perform configuration, such as configuring a communication parameter of a sensor, etc., specifically, may issue a configuration instruction to the sink node, and then the sink node converts the configuration instruction into a configuration execution of a terminal layer, such as converting into a configuration instruction of a MAC layer, and after forwarding to the first terminal, the first terminal may receive the configuration instruction and perform configuration.
(6) The first terminal reports the monitored operation data.
After the first terminal is added into the converged communication system, actions such as data reporting, dormancy awakening, network topology change and the like are completed by receiving instructions such as scheduling, configuration and the like issued by the access node, so that the functional requirements of low power consumption, data monitoring and periodic reporting of operation data are met.
Further, in the embodiment of the present invention, the process of access detection for the second terminal includes the following contents:
Responding to an access request of a second terminal forwarded by the sink node, and acquiring authentication key information matched with the second terminal in advance; authenticating the second terminal by adopting authentication key information; if the authentication is passed, sending a message allowing access to the second terminal through the sink node; and if the authentication does not pass, sending a message for prohibiting access to the second terminal through the sink node.
Specifically, the access procedure of the second terminal is actually an access procedure of a broadband WAPI communication mode, and in order to realize the access of the second terminal, in the embodiment of the present invention, the network topology of the converged communication system includes the following three entities:
(1) The authentication requester entity ASUE (Authentication SUpplicant Entity), before accessing the service, in this embodiment of the present invention, is an entity that requests an authentication operation before accessing the converged communication system, and in this embodiment of the present invention, the entity resides in the second terminal.
(2) The authenticator entity AE (Authenticator Entity) is an entity that provides authentication operations for authenticating a requester entity (e.g., a second terminal in an embodiment of the present invention) prior to accessing a service. The entity typically resides in the device of the sink node or the device of the access node in embodiments of the invention.
(3) The authentication service unit ASU (Authentication Service Unit), whose basic functions are to manage the user certificate and authenticate the user identity by pre-sharing the secret key and license certificate, is an important component in the WAI (WLANAuthentication Infrastructure) authentication infrastructure based on public key cryptography. The certificate managed by the ASU includes the public key and signature of the certificate issuer (ASU) and the public key and signature of the certificate holder STA (Station) and AP (Access Point), and uses the elliptic curve specific to WAPI as the digital signature algorithm. The entity typically resides in the device of the access node of an embodiment of the invention.
Based on the above entity, in the embodiment of the present invention, the process of access detection for the second terminal is actually a process of authentication and key management for WAPI, and the process of access detection for the second terminal generally includes two authentication modes, namely, two modes based on certificates and on pre-shared keys, and if adopting the authentication mode based on certificates, the whole process includes certificate authentication, unicast key negotiation and multicast key notification; if the authentication mode of the pre-shared key is adopted, the whole process is unicast key negotiation and multicast key notification.
Further, for easy understanding, fig. 3 shows a flow chart of access in a wide communication manner, and a procedure of access detection of the second terminal is described, as shown in fig. 3, including a procedure of certificate authentication, unicast key negotiation, and multicast key notification.
As shown in fig. 3, the interaction process of certificate authentication includes:
(1) Authenticating the activation packet;
(2) Access authentication request packets;
(3) Certificate authentication request packets;
(4) Certificate authentication response packets;
(5) Access authentication response packets.
Further, the interaction process of unicast key negotiation includes:
(1) Unicast key negotiation request packets;
(2) Unicast key negotiation response packets;
(3) Unicast key negotiation acknowledgement packets.
Further, the interaction process of the multicast key notification includes:
(1) Multicast key advertisement packets;
(2) The multicast key responds to the packet.
In particular, in which manner, the configuration may be performed in advance, that is, in the above-described process of obtaining the authentication key information matched with the second terminal that is configured in advance in the embodiment of the present invention, a specific authentication manner is recorded in the authentication key information, and the authentication manner may be configured in advance according to the actual situation, which is not limited in the embodiment of the present invention.
Based on the broadband WAPI communication mode, the data transmission rate can reach tens to hundreds of megabytes per second, and based on the communication mode, the monitored operation data can be reported in high speed and real time by various second terminals with large data volumes, such as local discharge sensors, cameras and the like. Moreover, the communication mode can be connected with reporting data at any time, such as opening and closing, starting and stopping control and the like, and can issue and respond control instructions with high requirements on real-time performance, so that the broadband WAPI communication mode can timely complete the process of instruction interaction.
Further, for the first terminal and the second terminal which are allowed to be accessed after the security detection is passed, the operation data of the transformer substation can be monitored according to a configured monitoring mode, and the monitored operation data is reported.
Specifically, the first terminal is configured to send, to the sink node, the collected first operation data of the substation according to a preset period, where all the data, for example, the periodically collected data of the temperature and humidity sensor, the water logging level sensor, the SF6 micro water tightness sensor, and the like, may be used as the first operation data; the aggregation node is used for forwarding the first operation data to the access node so that the access node performs state analysis on the first monitoring data and reports an analysis result to the monitoring platform.
Further, the second terminal is used for responding to second operation data of the transformer substation and sending the second operation data to the sink node; the second operation data in the embodiment of the present invention is actually real-time operation data, for example, the operation data of the above-mentioned on-line monitoring local discharge sensor, switch relay, access controller, etc., and the sink node is further configured to forward the second operation data to the access node, so that the access node performs a state analysis on the second operation data, and report an analysis result to the monitoring platform.
In summary, the converged communication system in the embodiment of the invention adopts the technical scheme of converged wireless communication of long-distance transmission in a narrowband communication mode and large data transmission in a wideband communication mode, so that the first terminal and the second terminal respectively communicate with the sink node and the access node in the narrowband communication mode and the wideband communication mode, and the terminal communication can be optimally configured according to actual use requirements; meanwhile, the access node equipment and the monitoring platform adopt wired network communication, so that the reliability requirement of the monitored operation data transmission in the complex electromagnetic environment can be met, and the requirements of high-speed and real-time transmission of the operation data can be met.
Meanwhile, the converged communication system in the embodiment of the invention provides a reliable wireless communication network, which can solve the problems of unified convergence, unified access, no-signal networking, reliability improvement and the like of terminal data of transformer substation on-line monitoring, realize unified access, data analysis and data forwarding of various terminals, meet the requirements of flexible networking and coverage of different scenes, realize intensive, standardized management and interconnection of professional data of the transformer substation, combine the value of deep mining data in practical application, improve the real-time perception of state information, autonomous early warning and intelligent decision-making capability of a power grid, and realize effective sharing with resources and data.
Further, on the basis of the above embodiment, the embodiment of the present invention further provides a monitoring method, which is applied to the above converged communication system, where the above converged communication system includes a terminal, a sink node, an access node, and a monitoring platform that are sequentially connected; specifically, as shown in fig. 4, a flowchart of a monitoring method includes:
step S402, after a terminal is accessed to the converged communication system, monitoring operation data of a transformer substation through the terminal, and sending the monitored operation data to an access node through a sink node;
Step S404, the access node performs security detection on the accessed terminal, allows the terminal to access after the security detection passes, receives the operation data sent by the accessed terminal, performs state analysis on the operation data, and reports the analysis result to the monitoring platform.
The monitoring method provided by the embodiment of the invention has the same technical characteristics as the fusion communication system provided by the embodiment, so that the same technical problems can be solved, and the same technical effects can be achieved.
Further, the embodiment of the invention also provides an electronic device, which comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the processor realizes the steps of the method when executing the computer program.
Embodiments of the present invention also provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the above method.
Further, an embodiment of the present invention provides a schematic structural diagram of an electronic device, as shown in fig. 5, where the electronic device includes a processor 51 and a memory 50, where the memory 50 stores computer executable instructions that can be executed by the processor 51, and the processor 51 executes the computer executable instructions to implement the above method.
In the embodiment shown in fig. 5, the electronic device further comprises a bus 52 and a communication interface 53, wherein the processor 51, the communication interface 53 and the memory 50 are connected by the bus 52.
The memory 50 may include a high-speed random access memory (RAM, random Access Memory), and may further include a non-volatile memory (non-volatile memory), such as at least one disk memory. The communication connection between the system network element and at least one other network element is achieved via at least one communication interface 53 (which may be wired or wireless), and the internet, wide area network, local network, metropolitan area network, etc. may be used. Bus 52 may be an ISA (Industry Standard Architecture ) bus, a PCI (PERIPHERAL COMPONENT INTERCONNECT, peripheral component interconnect standard) bus, or EISA (Extended Industry Standard Architecture ) bus, among others. The bus 52 may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, only one bi-directional arrow is shown in FIG. 5, but not only one bus or type of bus.
The processor 51 may be an integrated circuit chip with signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in the processor 51 or by instructions in the form of software. The processor 51 may be a general-purpose processor, including a central processing unit (Central Processing Unit, abbreviated as CPU), a network processor (Network Processor, abbreviated as NP), and the like; but may also be a digital signal Processor (DIGITAL SIGNAL Processor, DSP), application Specific Integrated Circuit (ASIC), field-Programmable gate array (FPGA) or other Programmable logic device, discrete gate or transistor logic device, discrete hardware components. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be embodied directly in the execution of a hardware decoding processor, or in the execution of a combination of hardware and software modules in a decoding processor. The software modules may be located in a random access memory, flash memory, read only memory, programmable read only memory, or electrically erasable programmable memory, registers, etc. as well known in the art. The storage medium is located in a memory and the processor 51 reads the information in the memory and in combination with its hardware performs the method described above.
The computer program product of the converged communication system and the monitoring method provided by the embodiments of the present invention includes a computer readable storage medium storing program codes, and the instructions included in the program codes may be used to execute the method described in the foregoing method embodiment, and specific implementation may refer to the method embodiment and will not be described herein.
In addition, in the description of embodiments of the present invention, unless explicitly stated and limited otherwise, the terms "mounted," "connected," and "connected" are to be construed broadly, and may be, for example, fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present invention will be understood by those skilled in the art in specific cases.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
In the description of the present invention, it should be noted that the directions or positional relationships indicated by the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc. are based on the directions or positional relationships shown in the drawings, are merely for convenience of describing the present invention and simplifying the description, and do not indicate or imply that the devices or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and thus should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: the above examples are only specific embodiments of the present invention for illustrating the technical solution of the present invention, but not for limiting the scope of the present invention, and although the present invention has been described in detail with reference to the foregoing examples, it will be understood by those skilled in the art that the present invention is not limited thereto: any person skilled in the art may modify or easily conceive of the technical solution described in the foregoing embodiments, or perform equivalent substitution of some of the technical features, while remaining within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention, and are intended to be included in the scope of the present invention. Therefore, the protection scope of the invention is subject to the protection scope of the claims.

Claims (10)

1. The converged communication system is characterized by comprising a terminal, a sink node, an access node and a monitoring platform which are sequentially connected;
The terminal comprises a first terminal which is accessed to the sink node in a wireless narrowband communication mode and a second terminal which is accessed to the sink node in a wireless broadband communication mode;
The terminal is used for monitoring the operation data of the transformer substation after accessing the converged communication system, and sending the monitored operation data to the access node through the sink node;
The access node is used for carrying out security detection on the accessed terminal, allowing the terminal to be accessed after the security detection passes, receiving the operation data sent by the accessed terminal, carrying out state analysis on the operation data, and reporting an analysis result to the monitoring platform.
2. The converged communication system of claim 1, wherein the sink node comprises a narrowband access unit and a broadband access unit;
The narrowband access unit is used for accessing the first terminal, and the broadband access unit is used for accessing the second terminal.
3. The converged communication system of claim 2, wherein the wireless narrowband communication mode is a narrowband LORA communication mode and the wireless broadband communication mode is a broadband WAPI communication mode;
the sink node adopts a wired Ethernet to perform network interaction with the access node;
the access node adopts a wired Ethernet to perform network interaction with the monitoring platform.
4. A converged communication system in accordance with claim 3, wherein the step of the access node performing security detection on the accessed terminal comprises:
Responding to the access request of the first terminal forwarded by the sink node, and extracting the identity of the first terminal carried in the access request of the first terminal;
Detecting whether the identity of the first terminal is in a preconfigured allowed access list or not;
And if so, sending a response message allowing access to the sink node, and forwarding the response message to the first terminal through the sink node so as to allow the first terminal to access.
5. The converged communication system of claim 4, wherein the access node is further configured to:
if the identity of the first terminal is detected not to be in a pre-configured allowed access list, judging whether the identity of the first terminal is in a pre-configured forbidden access list or not;
if yes, sending an access prohibition message to the first terminal through the sink node;
if not, the identity of the first terminal is sent to a rechecking terminal.
6. The converged communication system of claim 5, wherein the access node is further configured to:
If the access permission message returned by the rechecking terminal is received, a response message for permitting access is sent to the first terminal through the sink node, and the identity of the first terminal is added to the access permission list;
And if the access prohibition message returned by the rechecking terminal is received, sending the access prohibition message to the first terminal through the sink node, and adding the identity of the first terminal to the access prohibition list.
7. A converged communication system of claim 3, wherein the step of the access node performing security detection on the accessed terminal further comprises:
Responding to the access request of the second terminal forwarded by the sink node, and acquiring the authentication key information matched with the second terminal which is preset;
Authenticating the second terminal by adopting the authentication key information;
If the authentication is passed, sending a message allowing access to the second terminal through the sink node;
and if the authentication does not pass, sending a message for prohibiting access to the second terminal through the sink node.
8. A converged communication system in accordance with claim 3, wherein the first terminal is configured to perform data interaction in a preset period;
the second terminal is configured to report the operation data in real time.
9. The converged communication system of claim 8, wherein the first terminal is configured to send the collected first operation data of the substation to the sink node according to a preset period;
the sink node is used for forwarding the first operation data to the access node so that the access node performs state analysis on the first operation data and reports an analysis result to the monitoring platform;
the second terminal is used for responding to second operation data of the transformer substation and sending the second operation data to the sink node;
The sink node is further configured to forward the second operation data to the access node, so that the access node performs state analysis on the second operation data, and report an analysis result to the monitoring platform.
10. A monitoring method, characterized in that the method is applied to the converged communication system of any one of claims 1 to 9, wherein the converged communication system comprises a terminal, a sink node, an access node and a monitoring platform which are connected in sequence;
The method comprises the following steps:
after the terminal is accessed to the converged communication system, the terminal monitors operation data of the transformer substation and sends the monitored operation data to the access node through the sink node;
And carrying out security detection on the accessed terminal through the access node, allowing the terminal to be accessed after the security detection passes, receiving the operation data sent by the accessed terminal, carrying out state analysis on the operation data, and reporting an analysis result to the monitoring platform.
CN202410300952.9A 2024-03-15 2024-03-15 Converged communication system and monitoring method Pending CN118055373A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410300952.9A CN118055373A (en) 2024-03-15 2024-03-15 Converged communication system and monitoring method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410300952.9A CN118055373A (en) 2024-03-15 2024-03-15 Converged communication system and monitoring method

Publications (1)

Publication Number Publication Date
CN118055373A true CN118055373A (en) 2024-05-17

Family

ID=91051703

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410300952.9A Pending CN118055373A (en) 2024-03-15 2024-03-15 Converged communication system and monitoring method

Country Status (1)

Country Link
CN (1) CN118055373A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN120224340A (en) * 2025-05-30 2025-06-27 国网上海市电力公司 A broadband and narrowband convergence node device and a method for determining its position

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN211043537U (en) * 2019-09-10 2020-07-17 国网江苏省电力有限公司南京供电分公司 Substation equipment state monitoring system based on ubiquitous power internet of things
CN215071803U (en) * 2021-03-26 2021-12-07 四川洪辉电力科技有限公司 Online monitoring system of transformer substation
CN115549027A (en) * 2022-11-24 2022-12-30 中国电力科学研究院有限公司 A system and method for on-line monitoring of platen status
CN115915136A (en) * 2022-11-02 2023-04-04 国网电力科学研究院有限公司 Adaptive access method, device and system for Internet of things wireless terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN211043537U (en) * 2019-09-10 2020-07-17 国网江苏省电力有限公司南京供电分公司 Substation equipment state monitoring system based on ubiquitous power internet of things
CN215071803U (en) * 2021-03-26 2021-12-07 四川洪辉电力科技有限公司 Online monitoring system of transformer substation
CN115915136A (en) * 2022-11-02 2023-04-04 国网电力科学研究院有限公司 Adaptive access method, device and system for Internet of things wireless terminal
CN115549027A (en) * 2022-11-24 2022-12-30 中国电力科学研究院有限公司 A system and method for on-line monitoring of platen status

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN120224340A (en) * 2025-05-30 2025-06-27 国网上海市电力公司 A broadband and narrowband convergence node device and a method for determining its position

Similar Documents

Publication Publication Date Title
Milarokostas et al. A comprehensive study on LPWANs with a focus on the potential of LoRa/LoRaWAN systems
Al-Turjman et al. Small cells in the forthcoming 5G/IoT: Traffic modelling and deployment overview
Hassan et al. NB-IoT: Concepts, applications, and deployment challenges
CN112104732B (en) Power transmission line monitoring system and monitoring method
CN104243595B (en) A kind of power information acquisition system and its method based on IPv6
TWI797274B (en) Communication method and device based on relay equipment, terminal and base station
CN103941651A (en) Intelligent household system based on Internet and control method
CN112583796B (en) A method, system, IoT management platform and storage medium for terminal equipment to access power Internet of Things
CN112492583B (en) Cloud edge end cooperation-based software defined wireless sensor network management method
Ding et al. The use of ZigBee wireless communication technology in industrial automation control
CN118055373A (en) Converged communication system and monitoring method
CN103944756A (en) Method for controlling wireless access point equipment based on OpenFlow protocol
Nagai et al. Sub-1 ghz frequency band wireless coexistence for the internet of things
CN111917182B (en) A method and system for direct data transmission between dual-master stations in a low-voltage distribution network
Palomar et al. Household energy demand management
WO2018232967A1 (en) Method and system for detecting Internet of Things terminal equipment based on access node
WO2018233044A1 (en) Filter gateway based internet of things data filtering method and system
Sivaneasan et al. A new routing protocol for PLC-based AMR systems
Chugulu et al. Communication architecture for automatic faults detection and clearance in secondary distribution power grid: the case of Tanesco
CN105162253A (en) Wireless communication system for intellectualization of primary equipment
CN112104653B (en) Trusted computing management method and device for charging system and storage medium
KR101766888B1 (en) Smart meter and method for operating thereof
Palomar et al. After reading this chapter you should be able to:• Understand the demand-side management (DSM) umbrella term for the current energy efficiency of the demand side.• Identify the technical components and applications related to the organization and management of energy demand at home.•
Kulkarni et al. Applications of Internet of Things for Microgrid
Yang et al. MAC protocols design for smart metering network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination