Network commissioning of transport infrastructure peripherals

文档序号:538423 发布日期:2021-06-01 浏览:7次 中文

阅读说明:本技术 运输基础设施外围设备的网络调试 (Network commissioning of transport infrastructure peripherals ) 是由 S.科斯基宁 M.皮罗宁 A.科伊维斯托 M.马蒂拉 A.兰塔梅基 M.海斯卡宁 于 2018-10-16 设计创作,主要内容包括:公开了运输基础设施控制网络中的运输基础设施外围设备的调试。在该布置中,外围设备通过网络元件附接到运输基础设施控制网络或直接附接到控制器。当已经建立连接时,发起用于识别和准许适当访问权限的过程。因此,可以使用常见的网络技术用以传输对于电梯操作至关重要的信息。(Commissioning of transport infrastructure peripherals in a transport infrastructure control network is disclosed. In this arrangement, the peripheral devices are attached to the transport infrastructure control network through the network element or directly to the controller. When a connection has been established, a process for identifying and granting the appropriate access rights is initiated. Thus, common network technologies can be used to transmit information critical to elevator operation.)

1. A method for commissioning transport infrastructure equipment in a transport infrastructure control network, the method comprising:

receiving identity requests from the network element at the elevator and escalator peripherals;

responding to the received identity request;

receiving an access challenge from the network element at the elevator and escalator peripherals;

responding to the received access challenge; and

access grant messages are received at the elevator and escalator peripherals.

2. The method of claim 1, wherein the method further comprises transmitting a service request to a service resource.

3. A method for commissioning transport infrastructure setup peripherals in a transport infrastructure control network, the method comprising:

determining the identities of elevator and escalator peripheral devices;

performing access inquiry requests for elevator and escalator peripherals; and

providing access to the transport infrastructure control network.

4. The method of claim 3, wherein the determining, performing, and providing further comprises:

transmitting identity requests to peripheral equipment of the elevator and the escalator;

receiving a response to the transmitted identity request;

transmitting the received response to the transport infrastructure control network controller;

receiving an access challenge request from the transport infrastructure control network controller;

transmitting the received inquiry request to the elevator and escalator peripherals;

receiving responses to the challenge requests from the elevator and escalator peripherals;

transmitting the received response to the query request to the transport infrastructure control network controller;

receiving an access grant message from the transport infrastructure control network controller; and

transmitting the received access grant message to the elevator and escalator peripherals.

5. The method of claim 4, wherein the method further comprises:

receiving a request for a service from a transport infrastructure control network peripheral device;

transmitting the received request to the transport infrastructure control network controller;

receiving a service response from the transport infrastructure control network controller; and

transmitting the service response to the transport infrastructure control network peripheral device.

6. A computer program comprising computer executable computer program code, wherein the computer program code is configured to perform the method according to any of the preceding claims 1-5 when the computer program is executed in a computing device.

7. An elevator and escalator peripheral comprising:

at least one processor (27) configured to execute computer program code;

at least one memory (28) configured to store computer program code and associated data; and

at least one network connection (29) configured to connect the elevator peripheral device to a data communication network, wherein

The elevator peripheral device is configured to perform the method of claim 1 or 2.

8. The elevator and escalator peripheral device of claim 7, wherein the peripheral device is one of: destination operating panel, speakers, display, media screen, and device requiring authentication.

9. A transport infrastructure control network element comprising:

at least one processor (24) configured to execute computer program code;

at least one memory (25) configured to store the computer program code and associated data; and

at least one network connection (26) configured to connect the elevator peripheral device to a data communication network, wherein

The elevator peripheral device is configured to perform the method of claim 3, 4, or 5.

10. An elevator system comprising:

at least one elevator connected to a transport infrastructure control network;

the at least one elevator peripheral according to claim 7 or 8, wherein the peripheral is configured to transmit a query using the transport infrastructure control network;

the at least one network element of claim 9, wherein the network element is configured to route data communications between the elevator peripheral and a transport infrastructure control network controller.

Background

The following description relates to transportation infrastructure, such as elevators and escalators. More particularly, the description relates to commissioning of peripheral devices in a transport infrastructure control network.

Modern elevators are network-connected devices that can access resources from one or more external entities to provide service to the elevators and escalators for the benefit of passengers. In addition to improving passenger comfort and efficiency, network connectivity may also be used for some other purpose, such as entertainment or data collection.

A common approach for providing network connectivity is to use specially designed dedicated network technologies that are configured to reliably and timely provide safety and elevator control related messages to receiving network components. In many cases, these special purpose private networks use technology that is compatible with the old cables and old technology of the elevators. Special purpose private networks are easy to configure and maintain. Therefore, they have been the preferred solution and are constantly being developed.

Today, network connectivity is not only relevant for external devices connected to the elevator system. It is even possible to use a data communication network to connect some components that are relevant or even essential for the normal operation of the elevator or escalator bank.

In this description, these components are referred to as applications. The application may be implemented as hardware or software. Many hardware-related applications also include software, and software applications may be executed in a server or central computing resource. Thus, an application may be described as an entity that provides a service to a requesting client. An example of an application is a group controller. An example of a client is a destination operating panel installed in an elevator arrangement.

Current elevators use a network arrangement referred to in this description as a Transport Infrastructure Control Network (TICN). The TICN may be a combination of wired and wireless network solutions.

TICN is used to connect elevators and escalators and other transportation infrastructure components together. In particular, they are used for connecting Elevator Escalator Peripherals (EEPDs) to an elevator arrangement. When a new peripheral device, discussed here as an example of a client entity, is added to an elevator or escalator arrangement, the peripheral device must be detected and connected to the network appropriately. The same applies when an already existing peripheral device needs to be disconnected and then reconnected to the arrangement. Other possible reorganization-related tasks may create further demands.

Even though TICN is most commonly used for data communication in connection with elevators and escalators, it can also be used for controlling e.g. access doors (access gates), display panels etc. TICN does not have to be coupled with elevators and escalators and TICN can only be used for e.g. access doors. In the present application, TICN is understood to be a separate physical network originally designed only for transport infrastructure purposes.

As discussed above, attaching peripherals and other devices to a TICN may require a complex configuration process. Conventionally, the configuration process can be made easier by using pre-configured devices; however, in modern elevator arrangements this is a difficult task, since the elevator system may be part of a complex and constantly changing building network. Furthermore, these devices are often installed in access-restricted spaces. An example of such a confined space is an elevator hoistway. Generally, working in the elevator hoistway requires special qualification (special qualification) of the elevator environment.

Disclosure of Invention

In the following description, a mechanism for commissioning elevator and escalator peripherals in a transport infrastructure control network is disclosed. In this arrangement, the peripheral devices are attached to the transport infrastructure control network through the network element or directly to the controller. When a connection has been established, a process for identifying and granting the appropriate access rights is initiated. Thus, common network technologies can be used to transmit information critical to elevator operation.

In one aspect, a method for commissioning transport infrastructure peripherals in a transport infrastructure control network is disclosed. The method comprises the following steps: receiving identity requests from the network element at the elevator and escalator peripherals; responding to the received identity request; receiving an access challenge (access challenge) from the network element at the elevator and escalator peripherals; responding to the received access challenge; and receiving access grant messages at the elevator and escalator peripherals.

According to this aspect, it is possible to add elevator and escalator peripherals to the transport infrastructure control without pre-configuration or field configuration. Further, the method may be used to reconfigure devices in a transport infrastructure control network when one or more peripheral devices, network elements or other components in the transport infrastructure control network have been changed. The change may be a change in the configuration of the entire device or device.

In an embodiment, the method further comprises transmitting the service request to a service resource. After configuration, the elevator and escalator peripherals can send service requests (such as the application mentioned above) to the service resource and receive responses to the service requests.

In one aspect, a method for commissioning elevator and escalator peripherals in a transport infrastructure control network is disclosed. The method comprises determining the identity of the elevator and escalator peripherals; performing access inquiry requests for elevator and escalator peripherals; and providing access to a transport infrastructure control network.

According to this aspect, it is possible to add elevator and escalator peripherals to the transport infrastructure control network without pre-configuration or field configuration.

In an embodiment, a method for commissioning transport infrastructure peripherals in a transport infrastructure control network is disclosed. The method comprises the following steps: transmitting identity requests to peripheral equipment of the elevator and the escalator; receiving a response to the transmitted identity request; transmitting the received response to the transport infrastructure control network controller; receiving an access challenge request from a transport infrastructure control network controller; transmitting the received inquiry request to peripheral equipment of the elevator and the escalator; receiving responses to the challenge requests from the elevator and escalator peripherals; transmitting the received response to the query request to the transport infrastructure control network controller; receiving an access grant message from a transport infrastructure control network controller; and transmitting the received access grant message to the elevator and escalator peripherals.

According to this embodiment it is possible to add elevator and escalator peripherals to the transport infrastructure control network without pre-configuration or field configuration. Further, the method may be used to reconfigure devices in a transport infrastructure control network when one or more peripheral devices, network elements or other components in the transport infrastructure control network have been changed. The change may be a change in the configuration of the entire device or device.

In an embodiment, the method further comprises: receiving a request for a service from a transport infrastructure control network peripheral device; transmitting the received request to a transport infrastructure control network controller; receiving a service response from the transport infrastructure control network controller; and transmitting the service response to the transport infrastructure control network peripheral device. After configuration, the elevator and escalator peripherals can send service requests (such as the application mentioned above) to the service resource and receive responses to the service requests.

In an aspect, a computer program comprising computer executable computer program code is disclosed, wherein the computer program code is configured to perform the above method when the computer program is executed in a computing device.

In one aspect, an elevator and escalator peripheral device is disclosed. Elevator and escalator peripheral equipment includes: at least one processor (27) configured to execute computer program code; at least one memory (28) configured to store computer program code and associated data; and at least one network connection (29) configured to connect the elevator peripheral device to a data communication network. The elevator peripheral is configured to perform the method as described above.

In an embodiment, the elevator and escalator peripheral device according to this aspect is one of the following: destination operating panel, speakers, display, media screen, and device requiring authentication. The above process is particularly useful for devices that require authentication and appropriate access rights management to access services in a transport infrastructure control network.

In one aspect, a transport infrastructure control network element is disclosed. The transport infrastructure control network unit comprises: at least one processor (24) configured to execute computer program code; at least one memory (25) configured to store computer program code and associated data; and at least one network connection (26) configured to connect the elevator peripheral device to a data communications network. The elevator peripheral is configured to perform the above-described method.

In one aspect, an elevator system is disclosed. The elevator system comprises at least one elevator connected to a transport infrastructure control network; at least one elevator peripheral device as described above, wherein the peripheral device is configured to transmit the query using a transport infrastructure control network as described above and at least one network element, wherein the network element is configured to route data communications between the elevator peripheral device and the transport infrastructure control network controller. At least one elevator in the elevator system comprises usual elevator components such as hoisting machines, ropes etc., elevator control systems etc., which can be connected to the transport infrastructure control network directly or through additional control components.

The above disclosed methods, devices and systems provide an efficient way to attach new devices to a transport infrastructure control network. The person attaching the equipment to the transport infrastructure control network does not necessarily need additional information or skill, so a mechanic qualified for hoistway-side work can install new components. Another advantage of the arrangement disclosed above is that it is possible to use the same principle when changing equipment in an elevator system, e.g. due to a fault, an update or a planned maintenance change.

Drawings

The accompanying drawings, which are included to provide a further understanding of the network commissioning of elevators and escalator peripherals and constitute a part of this specification, illustrate example embodiments and together with the present description help to explain the principles of network commissioning of elevators and escalator peripherals. In the drawings:

figure 1 is a block diagram of an example transport infrastructure control network,

fig. 2 is a block diagram of an example transport infrastructure control network, where transport infrastructure control network peripherals are connected to network elements,

FIG. 3 is a flow chart of an example method of the present transport infrastructure control network commissioning arrangement, and

fig. 4 is a signaling diagram of an example method of the present transport infrastructure control network commissioning arrangement.

Detailed Description

Reference will now be made in detail to embodiments, examples of which are illustrated in the accompanying drawings.

In the following description, an elevator is taken as an example. The arrangement is also applicable to escalators and systems including both elevators and escalators.

In fig. 1, a block diagram of an example transport infrastructure control network is shown. The example of fig. 1 is provided to better understand the general working environment for network commissioning of elevator and escalator peripherals.

In this system, a transport infrastructure control network TICN 10 is shown. The TICN is a network capable of connecting various devices together. The connected device may be a computing device, a modern internet-connectable device, an internet of things device, or the like. The network may be implemented using ethernet, which is a common networking technology. The TICN may be supplemented with other wired or wireless network connections, such as a mobile communication network, a wireless local area network, etc. Typically, the network technology used is selected from network technologies implemented in the field for other purposes. Since ethernet is currently the dominant technology, it is assumed in the following description that ethernet is used.

In fig. 1, TICN 10 further comprises a TICN controller 11, which controller 11 is configured to control the TICN and in this example also serves as a gateway to external devices. The gateway functionality need not necessarily be in the same component. TICN 10 also includes network element a 12 and network element B13. Network elements a and B may be dedicated devices or devices typical of the network technology used. For example, in the case of ethernet, common ethernet and internet technologies may be used. Thus, the network elements a and B may be common switches, bridges, VPN devices or similar devices connected to each other or directly to the TICN controller 11.

In fig. 1, a plurality of elevator and escalator peripherals 14-16 are connected to network elements a and B. The peripheral devices belong to different layers. Elevator and escalator peripherals 14-16, also referred to as clients, request services from applications. In the example of fig. 1, four tier 1 devices 14, two tier 2 devices 15, and two tier 3 devices 16 are shown. In fig. 1, three resources 17-19 belonging to different layers are shown. The resources shown in fig. 1 are also referred to as applications that provide services to requesting clients.

The different levels are determined according to the installation of the elevator or escalator. One example of such an arrangement is that the layer 1 network represents a critical network of elevator (lift) operations (e.g., signal action). The layer 2 network represents a manufacturer network in which the elevator manufacturer media/sensor devices communicate with, for example, an elevator manufacturer cloud service. The layer 3 network represents a partner network in which partner devices communicate with partner resources. For example, the logical separation of layers in a network may be accomplished using VLANs. The number of layers is not limited to three, but may vary based on installation.

In fig. 2, an example illustrating a case is shown in which the EEPD 23 joins the TICN by connecting to the TICN controller 20 via network element a 21 and network element B22. In fig. 2, network element B22 is shown in more detail and further comprises at least one processor 24, at least one memory 25 and at least one network interface 26. Accordingly, the EEPD 23 further comprises at least one processor 27, at least one memory 28 and at least one network interface 29.

When the EEPD is connected to network element B22, the network processor 24 of network element B22 is configured to determine the identity of the joined peripheral device 23. The at least one memory 25 of network element B includes computer program code and associated data executed by the processor 24 for performing identity determination of the EEPD 23 that has been connected to network element B22 using the network interface 26.

Accordingly, the network processor 27 of the EEPD 23 is configured to provide a response to the identity determination request. The at least one memory 28 of the EEPD 23 includes computer program code and associated data executed by the processor 27 for performing identity determination of the EEPD 23 that has been connected to the network element B22 using the network interface 29.

Fig. 3 discloses a method of explaining the present transport infrastructure control network commissioning arrangement. Although the method of fig. 3 is explained from the perspective of EEPD, the skilled person will also understand how to apply it in a network element. The signaling example of fig. 4 may be used to support an understanding of how the method is applied in a network element.

When the EEPD is connected to the TICN, it first receives an identity request from the network element, step 30. In some embodiments, the identity request is implemented with an authentication server/service. For example, it is possible that the network element only provides an initial request to start the process, and the authentication service involves the rest of the identity check. An embodiment of the identity request as a whole may involve several sub-signals that change between the identity service and the EEPD via the network element. The EEPD responds to a network element, such as network element a or B of fig. 1 or 2, step 31. The response includes at least the identity of the EEPD. After the response has been sent, the EEPD receives the access challenge, step 32. The access challenge includes a challenge related to authentication. In addition to such an access challenge, the challenge message may also comprise other information, for example information about the encryption of the connection. The EEPD responds to the network element, step 33. In response to the access response, the EEPD will receive an access grant or deny message, step 34. Finally, the EEPD may transmit the actual service request, step 35.

The method of fig. 3 discloses the method from the perspective of EEPD, where EEPD communicates only with the network element closest to EEPD. The network element acts as an intermediary and it distributes the request to the correct entities, such as TICN controllers and corresponding resources or applications.

In a typical embodiment of the method discussed with respect to fig. 3, after the peripheral device has been granted access to the network, the one or more network elements to which the peripheral device is connected typically receive dynamic configuration from the authentication service. The configuration may be, for example, a setting to connect a peripheral device to a certain logical network segment. All other settings that may be necessary for the overall network operability and that need to be applied in the network elements participating in the communication are equally applicable.

In fig. 4, a signaling diagram is disclosed. The signaling diagram shows rows 40-45 from the perspective of network element B. Network element B is similar to network element B of fig. 1 and 2 and is connected to the TICN controller via network element a.

When network element B detects that an EEPD is connected to the network element (line 40), it issues an identity request (line 41). EEPD responds to the identity request and network element B receives the identity response. After receiving the identity response, network element B transmits an access request to the TICN controller to which network element B is logically connected (line 42). This may occur at one or more network elements, such as network element a shown in the figure.

In response to the access request, the TICN controller issues an access challenge. The access challenge is received at network element B and then further transmitted to the EEPD (line 43). The EEPD generates a response to the challenge and transmits it to network element B. Network element B further transmits it to the TICN (line 44). If the response to the challenge is correct, the TICN controller transmits an access grant message to network element B, which then transmits it to the EEPD (line 45).

The above-described method may be implemented as computer software executed in a computing device that may be connected to a network for carrying a TICN. When the software is executed in a computing device, it is configured to perform the inventive method described above. The software is embodied on a computer readable medium so that it may be provided to a computing device (such as the EEPD or network element a or B of fig. 1 and 2).

As mentioned above, the components of the exemplary embodiments can include computer-readable media or memory for holding instructions programmed according to the teachings of the embodiments and for holding data structures, tables, records, and/or other data described herein. Computer-readable media may include any suitable media that participates in providing instructions to a processor for execution. Common forms of computer-readable media may include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, any other suitable magnetic medium, a CD-ROM, CD + -R, CD + -RW, DVD-RAM, DVD + -RW, DVD + -R, HD DVD-R, HD DVD-RW, HD DVD-RAM, Blu-ray disc, any other suitable optical medium, a RAM, a PROM, an EPROM, a flash-EPROM, any other suitable memory chip or cartridge, a carrier wave, or any other suitable medium from which a computer can read.

It is obvious to the person skilled in the art that with the advancement of technology the basic idea of network commissioning of elevator and escalator peripherals can be implemented in various ways. Thus, the network commissioning of elevators and escalator peripherals and embodiments thereof are not limited to the above examples; instead, they may vary within the scope of the claims.

12页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:电梯控制盘

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!