Automating Building Energy Management for Accelerated Building Decarbonization: System Architecture and the Network Layer
Automating Building Energy Management for Accelerated Building Decarbonization: System Architecture and the Network Layer
Click to enlarge
Author(s): Kempf, James
ISBN No.: 9781394203062
Pages: 688
Year: 202501
Format: Trade Cloth (Hard Cover)
Price: $ 172.50
Dispatch delay: Dispatched between 7 to 15 days
Status: Available

About the Author xvii Preface xix Acknowledgments xxiii Acronyms xxv 1 Introducing Grid- interactive Efficient Buildings (GEBs) 1 1.1 Scope of the Building Decarbonization Problem 2 1.2 What Are Grid- Interactive Efficient Buildings (GEBs)? 4 1.3 How Do GEBs Advance the Goal of Energy Decarbonization? 5 1.4 Characterizing Building Loads in Commercial and Residential Buildings 6 1.4.1 The Three- Dimensional Load Flexibility Criteria Space 7 1.4.


2 Types of Residential and Commercial Building Loads and How to Make Them Flexible 7 1.5 The Role of the BEMS 11 1.6 Strategies for Decarbonization and Cost Reduction 12 1.6.1 Strategies Based on Load Flexibility 12 1.6.2 Strategies Based on Utilizing Generated and Stored Renewable Energy from Onsite DERs 13 1.7 Building Energy Impact of Flexibility Strategies 14 1.


8 GEBs as a Grid Resource 16 1.8.1 Grid Impact of Flexibility Strategies 18 1.9 Building Energy Efficiency Standards 20 1.9.1 Leadership in Energy and Environmental Design 20 1.9.2 Energy Star 21 1.


10 Summary 22 References 25 2 Architecture of Building Energy Management Systems 29 2.1 BEMS Functional Architecture 30 2.1.1 The Network 32 2.1.2 Sensing and Actuating Devices 38 2.1.3 Device Network and Device Network Gateway 38 2.


1.4 Building Gateway 39 2.1.5 Application Layer Router 40 2.1.6 Databases 40 2.1.7 Algorithmic Building Energy Management Supervisory Control 41 2.


1.8 Utility and Weather Data Scraper 42 2.1.9 Utility Alerts and Notifications 42 2.1.10 API Servers 42 2.1.11 BEMS Dashboard Backend 44 2.


1.12 Frontends 44 2.1.13 Alerts and Notifications 46 2.2 BAS Generations 46 2.2.1 Vendor and Equipment Specific Silos 48 2.2.


2 Integration Overlays 49 2.2.3 Horizontal Integration 52 2.3 Cybersecurity Architecture 55 2.3.1 Threat Modeling 55 2.3.2 Trust Boundaries, Threat Boundaries, and Attack Surfaces 56 2.


3.3 The Zero- Trust Architectural Principle 57 2.3.4 Security Services 58 2.3.5 Cryptographic Operations 59 2.3.6 Security Technologies 62 2.


3.7 Security Reference Architecture 64 2.3.8 Commissioning Security 67 2.4 The Convergence of OT and IT Systems 68 2.5 Summary 69 References 70 3 Link-Layer Protocols 75 3.1 LAN and WLAN Link- Layer Protocols 76 3.2 IEEE 802.


3 (Ethernet) 77 3.2.1 Ethernet Medium Access Control 77 3.2.2 Ethernet Frame Format 79 3.2.3 Ethernet Addressing 80 3.2.


4 Ethernet over Power Line 82 3.3 IEEE 802.11 (Wi- Fi) 84 3.3.1 Wi- Fi Network Deployment Architectures 85 3.3.2 Wi- Fi Physical Layer 89 3.3.


3 Wi- Fi Medium Access Control 91 3.3.4 Wi- Fi Frame Format 96 3.3.5 Wi- Fi Addressing 99 3.3.6 Wi- Fi Association Protocol 101 3.4 WPAN Link- Layer Protocols 105 3.


5 Ieee 802.15.4 105 3.5.1 802.15.4 Network Architecture 106 3.5.


2 802.15.4 Physical Layer 108 3.5.3 802.15.4 Medium Access Control 109 3.5.


4 802.15.4 Frame Format 113 3.5.5 802.15.4 Addressing 116 3.6 Bluetooth Low Energy 117 3.


6.1 BLE Stack Architecture 118 3.6.2 BLE Network Architecture 119 3.6.3 BLE Physical Layer 120 3.6.4 BLE Medium Access Control 121 3.


6.5 BLE Frame Format 123 3.6.6 BLE Addressing 125 3.6.7 Establishing a Connection in BLE 125 3.7 LoRa and LoRaWAN 127 3.7.


1 LoRaWAN Stack Architecture 128 3.7.2 LoRaWAN Network Architecture and Network Node Types 129 3.7.3 LoRaWAN Physical Layer 131 3.7.4 LoRaWAN MAC Layer and Device Node Types 132 3.8 Cellular IoT Link- Layer Protocols 133 3.


8.1 LTE Cat m 134 3.8.2 NB- IoT 135 3.9 Selecting Link- Layer Technologies for a BEMS Network 136 3.9.1 Selecting a Device Network 136 3.9.


2 Selecting a Building Backhaul LAN Technology 137 3.9.3 Selecting a WAN Technology 138 3.10 Summary 139 References 140 4 The IP Stack 145 4.1 The IP Network Layer 147 4.1.1 IP Routing Overview 147 4.1.


2 Internet Network Architecture 149 4.1.3 ICMP, ARP, and Neighbor Discovery 150 4.2 IPv 4 151 4.2.1 IPv4 Packet Header 152 4.2.2 IPv4 Addressing 154 4.


3 IPv 6 159 4.3.1 IPv6 Header 160 4.3.2 IPv6 Addressing 161 4.4 6LoWPAN 168 4.4.1 6LoWPAN Network Architecture 169 4.


4.2 6LoWPAN Header 170 4.4.3 6LoWPAN Addressing 171 4.4.4 6LoWPAN Header Compression 172 4.4.5 6LoWPAN Packet Fragmentation and Reassembly 173 4.


4.6 6LoWPAN Node Configuration 174 4.4.7 6LoWPAN Mesh Routing 177 4.4.8 6LoWPAN Mesh Router Configuration 179 4.5 Transport Layer 181 4.5.


1 Transport Layer Ports 181 4.6 Udp 182 4.6.1 UDP Header 183 4.6.2 Quic 184 4.7 Transmission Control Protocol 184 4.7.


1 TCP Header 185 4.7.2 Procedures for Establishing and Breaking a Connection 188 4.7.3 Congestion Control Mechanisms 191 4.8 Application Layer Protocols 191 4.9 Dns 192 4.9.


1 DNS Names 193 4.9.2 DNS Architecture 194 4.9.3 DNS Packet Format 196 4.9.4 Name Resolution with DNS 199 4.10 Dhcp 200 4.


10.1 DHCP Message Types 202 4.10.2 DHCP Packet Format 203 4.10.3 Node Configuration Using DHCP 205 4.11 Open- Source Tools for Monitoring BEMS IP Networks 208 4.11.


1 Packet Tracing with Wireshark 208 4.12 Summary 209 References 210 5 Link Layer and IP Stack Protocol Security 217 5.1 Threats to Link Layer and IP Stack Protocols 218 5.2 Link Layer Security Protocols 219 5.3 EAP and RADIUS Protocols 221 5.3.1 EAP Network Architecture 221 5.3.


2 EAP Protocol 222 5.3.3 RADIUS Protocol 224 5.3.4 Generic EAP/RADIUS Authentication Protocol 226 5.4 Ethernet Security 228 5.4.1 802.


1X Network Architecture 229 5.4.2 EAPOL Protocol 230 5.5 Wi- Fi Security 232 5.5.1 The Robust Security Network Architecture 233 5.5.2 Overview of the Security Association Setup Process 234 5.


5.3 Authentication Algorithm Selection and Parameter Configuration 235 5.5.4 Identity Authentication, Access Control, and Pairwise Master Key Derivation 238 5.5.5 The Four- Way Handshake 242 5.5.6 Group Key Provisioning 245 5.


5.7 Commissioning Security Overview 246 5.6 802.15.4 WPAN Security 247 5.6.1 Security Fields in the 802.15.


4 Packet 248 5.6.2 Auxiliary Security Header 248 5.6.3 Calculation of the Frame Payload Field in Secured Frames 250 5.6.4 Bluetooth Low Energy Security 251 5.6.


5 BLE Security Modes and Levels 251 5.6.6 Pairing and Bonding Procedure 253 5.6.7 Legacy Pairing Method 255 5.6.8 Pairing Exchange Payload Format 256 5.6.


9 Confidentiality and Integrity Protection 259 5.6.10 Secure Connections Method 259 5.6.11 Access Control and Privacy 262 5.7 Public Key Certificates and the Public Key Infrastructure 263 5.7.1 X.


509 Certificates 264 5.7.2 Public Key Infrastructure (PKI) 265 5.8 IP Stack Security Protocols 266 5.9 Ike 267 5.9.1 Overview of the IKEv2 Protocol 267 5.9.


2 IKEv2 Header 268 5.9.3 IKEv2 Payload Elements 269 5.9.4 Example IKEv2 Protocol Exchange 272 5.10 IPSec 275 5.10.1 IPSec Reference Architecture 276 5.


10.2 Authentication Header (AH) 279 5.10.3 Encapsulating Security Payload (ESP) 281 5.11 Tls 284 5.11.1 TLS Overview 285 5.11.


2 TLS Record Protocol Messages 286 5.11.3 TLS Handshake Protocol Messages 287 5.11.4 Example TLS 1.3 Handshake Protocol Exchange 289 5.12 Virtual Private Networks 291 5.12.


1 Open Source Tools for Deploying VPNs 293 5.12.2 Open Source IPsec VPNs 293 5.12.3 Open- Source Layer 3 VPNs 294 5.13 Summary 296 References 297 6 Building Automation Stack for Large Commercial and Public Buildings 303 6.1 Introduction to the BACnet Protocol 304 6.2 The BACnet Stack Architecture 305 6.


3 BACnet Link Layers 306 6.4 Ms/ Tp 307 6.4.1 MS/ TP Medium Access Control 308 6.4.2 MS/ TP Frame Format 308 6.4.3 MS/ TP Addressing 309 6.


4.4 MS/ TP Frame Types 309 6.4.5 Bootstrapping the MS/ TP Link Layer 311 6.5 UDP/IPv4 Virtual Link Layer 313 6.5.1 UDP/IPv4 BVLL "Frame" Format 314 6.5.


2 UDP/IPv4 BVLL Addressing 314 6.5.3 BBMD Internal Data Structures for Broadcast Control and Foreign Device Registration 318 6.5.4 UDP/IPv4 BVLC Message Types 319 6.5.5 UDP/IPv4 BVLL Broadcast Example 321 6.6 BACnet Network Layer 323 6.


6.1 BACnet Network Layer Header Format 323 6.6.2 BACnet Network Layer Addressing and Routing 324 6.6.3 Header Control field 326 6.6.4 Network Layer Management Message Types 326 6.


6.5 Transmitting and Receiving Packets on BACnet Networks 331 6.6.6 Discovering a Router to a Remote Link 336 6.7 BACnet Application Layer 337 6.7.1 BACnet Objects and Object Types 337 6.7.


2 Properties 338 6.7.3 Primitive, Collection, Enumeration, Sequence, and Choice Datatypes 342 6.7.4 Basic BACnet Object Types 345 6.7.5 Object Types Useful for BEMS Implementations 349 6.7.


6 BACnet Event and Alarm Handling 360 6.7.7 BACnet Services 367 6.7.8 Protocol Implementation Conformance Statement (PICS.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...