Next Article in Journal
The Systematic Bias of Entropy Calculation in the Multi-Scale Entropy Algorithm
Next Article in Special Issue
Representation of a Monotone Curve by a Contour with Regular Change in Curvature
Previous Article in Journal
Variational Quantum Chemistry Programs in JaqalPaq
Previous Article in Special Issue
Hfinger: Malware HTTP Request Fingerprinting
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Selection of the Optimal Smart Meter to Act as a Data Concentrator with the Use of Graph Theory

Institute of Telecommunications and Computer Science, UTP University of Science and Technology in Bydgoszcz, Al. Prof. S. Kaliskiego 7, 85-796 Bydgoszcz, Poland
Submission received: 29 April 2021 / Revised: 20 May 2021 / Accepted: 21 May 2021 / Published: 24 May 2021

Abstract

:
Changing the construction of mart Meter (SM) devices, more specifically equipping them with more than one communication module, facilitates the elimination of a Transformer Station Data Concentrator (TSC) module, moving its function to one of the SMs. The opportunity to equip a chosen device in an additional communication module makes it possible to use it as an acquisition node. The introduction of this solution creates a problem with the optimum selection of the above-mentioned node out of all the nodes of the analyzed network. This paper suggests the criterion of its location and, as per the criterion, the way of conduct using the elements of the graph theory. The discussion is illustrated with the examples of the possibility to use the method for the optimization of the architecture of the network. The described method makes it possible to choose the location of a backup acquisition node as well as locate intermediary nodes (signal repeaters) in case of a failure (removal) of some SM devices. In the era of the common introduction of dispersed telemetric systems requiring an adequate level of performance and reliability of information transmission, the offered method can be used for the optimization of the structures of Smart Grids.

1. Introduction

Currently, a rapid growth of technologies based on computers with increasingly good parameters, a progressing miniaturization of electronic systems and the development of professional software and methods of information transfer are being observed. Wireless transmission technologies are becoming more and more important thanks to their low cost and quick deployment. Amongst them are wireless sensor networks (WSNs) [1]. They feature low transmitting power, very low energy consumption, are operated with the most recent monolithic transceivers, and their nodes cooperate directly with sensors of various measurable parameters.
The networks are widely used, for example, in municipal buildings as early warning systems for terrorist attacks or environmental contamination [2], for monitoring the environment (temperature, humidity, pollution level) [3], for industrial surveillance (providing information about the overall condition of machines used in the production process, e.g., vibration, fluid level, temperature of components, etc., received from sensors placed in hard-to-reach or inaccessible places) [4], for the control of traffic [5], and in medicine (allowing higher effectiveness of diagnosing and monitoring patients’ health without the need to connect them to medical devices with limited mobility, e.g.,wireless body sensor networks (WBSNs)) [6,7]. WSNs areused for the creation of smart cities, professionally known as Cyberville, Digital City, or Electronic Communities. Their most important features are digital and computerized management of energy production and distribution;, automatic smart security systems; lighting and heating control; management of car parks; fast data transmission using the latest wireless technologies in the 5G network; municipal serviceless meters and usage sensors with digital water, electricity, and gas distribution management systems; smart medical care systems remote life quality management and improvement such as systems of e-participation in various forms of cultural, sporting, leisure, and social activity; and surveillance systems, biometric systems, and safety systems for terrorist and criminal threats, etc. [8,9,10].
An example of the utilization of the WSN technology is the wireless scattered telemetry network intended for the last-mile service of the Smart Metering system. The term Smart Metering refers to smart power grids which provide the communication between producers and recipients of energy as well as with power repositories. The basic component of these networks is an expanded metering systemthat gives access to information about the power consumption. It consists of ICT systems transferring the measurements to decision points, as well as smart information, forecasting, and decision algorithms. The Smart Metering system makes it possible to transfer and process information important for a power grid, such as the power consumption by receivers and the production of energy from conventional and renewable sources. It ensures a high flexibility level of the power grid which in turn allows it to control the demand and supply of power quickly and optimally [11].
A data concentrator collecting the information from Smart Meter (SM) devices is one of the basic components of ICT systems [9]. Usually, it is installed next to an MV/LV transformer, hence its name Transformer Station Data Concentrator (TSC) [12]. TSC has the same role as an acquisition node in sensor networks. Similarly to sensor networks, in order to increase the range of the last-mile network operation, a multi-hop technique is used [13].
In the communication between the two above-mentioned components of the system, two basic transmission methods are used, wired and wireless. Amongst the wireless technologies, the most frequently used are radio transmission in the Industrial-Scientific-Medical (ISM) band (known as RF) and General Packet Radio Service (GPRS), available as one of the services offered by the Global System for Mobile Communications (GSM). SM devices equipped with GPRS communication modules are used only in countries with low population density such as Denmark or Sweden [13,14]. If the density is higher, the GPRS modules are installed only in TSCs, thus giving them access to IP networks.
Amongst the wired technologies, another two main techniques can be mentioned. These are Power Line Communication (PLC) and M-bus. The M-bus technology, designed for the reading of various kinds of metering devices, is used in Smart Metering only in last-mile network with direct hubs—Local Metering Concentrators (LMCs)—to which multiple SM devices can be connected through the use of M-bus [9,15,16]. LMC communicates with TSC by the use of the RF or the PLC technology. Modern SMs are equipped with M-buses and/or Modbus interfaces, which facilitate the installation of a few communication modules in one meter [17] thanks to the ongoing miniaturization of components, and equips the SMs in more than one LMC unit whereby each of them can use a different communication technique. Adopting such solutions makes it possible to realize and utilize last-mile networks more flexibly while increasing their security, reliability, quality, productivity, and the ease of migration process, e.g., from RF to PLC [18,19,20,21].
This article touches upon a new approach in the last-mile network structural solutions, i.e.,the elimination of TSC and moving its functions to an SM equipped with two LMC units, namely RF or PLC and GSM. The benefits of introducing this solution are lower network creation costs, the elimination of additional TC–SM connections, which are often unreliable due to the long distance between a transformer and an edge of a last-mile network, and there is no need for the maintenance of TSCs involving complex procedures, assuring the safety of transmission and service. However, moving functions from TSC to SM, apart from the above-mentioned benefits, also causes a problem—a solution for which the author offers in this paper. The solution consists of choosing a parameter of the optimal SM localization, which additionally works as a data concentrator.

2. Research Method

For the analysis of telemetric networks, parts of the graph theory were used [22]. The topology of such networks can be defined by a formula describing geometrical random graphs [9]:
G = ( V , E , R )
where V is a set of vertices, E is a set of edges, and R is set of radii determining the transmission range.
Each vi vertex of the G graph represents a single network node. Each node is surrounded by a circle of radius ri depicting the range of the signal emitted by a node’s transmitter. All nodes in the circle surrounding the node (assuming omnidirectional antennas are used) can freely communicate with the surrounded node bidirectionally and are considered directly adjacent, as it is shown in Figure 1.
The below formula [23] defines a set of nodes in the transmission range of a given node:
B r ( x ) = y : x y < r , x , y V
where Br(x) is a set of nodes within the transmission range, x and y are the localization of the nodes, and ri is the radius of the signal range.
The edge set E contains all edges of the G graph and represents direct paths connecting any chosen vertices and all their adjacent items within the circle, representing the communication range of each node.
It is assumed that the edges do not have to represent bidirectional connections, which means that the presence of edges (x,y) does not mean that edges (y,x) exist. The assigned measurable value between two vertices of a graph, such as distance, angle, and amount of energy in the node or probability, can be assigned to the edge as its weight, provided that it can have different values for edges (x,y) and (y,x). The definition of asymmetric edges is expressed with the Formula (3):
E = x , y , d : y B r ( x ) d = x y , x , y V
where E is a set of asymmetric edges and d is the measure of the asymmetry of weights.
A graph obtained this way, describing the whole connection topology of the network, is called a maximum power graph (in real-life conditions when first determining the connection topology, the transmitters work with maximum power). The structure of this graph has to be reduced because of the presence of many redundant connections, which are undesirable due to their transmitting of identical information, leading to collisions, unnecessary power consumption, and the increase in the final network emissivity. The reduction in these connections leads to the creation of a minimum spanning tree whose root is an acquisition node in which all the information consistent with the network’s function are collected.
The configuration of the discussed network can be presented with a graph with an adjacency matrix [24]. To explain the way of conduct, a graph describing an example of a virtual network is shown in Figure 2. The edges of the graph correspond to the links connecting its nodes—that is, the nodes intermediary to the transmission and acting commutatively.
The network shown in Figure 2 is described by an adjacency matrix (Ms):
M s = 0 1 1 0 0 1 0 0 0 0 0 0 1 0 0 1 1 0 0 0 0 0 0 0 1 0 0 0 0 1 0 0 1 1 0 0 0 1 0 0 1 0 0 1 0 0 0 0 0 1 0 1 0 1 1 1 0 0 0 0 1 0 1 0 1 0 0 0 1 0 0 0 0 0 0 0 1 0 0 1 1 0 1 0 0 0 0 1 1 0 1 0 0 0 0 1 0 0 1 0 0 1 1 0 0 1 1 0 0 0 1 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 1 0 1 1 0 1 0 0 0 0 0 0 0 1 0 0 1 0
By exponentiating the (Ms) matrix, we obtain a set of paths created by the edges connecting the graph nodes, whose length corresponds to the power of the matrix. The process is carried on until it is confirmed that all the nodes are interconnected and the maximum power of the (Ms) matrix is the diameter of the analyzed graph. By the analysis of the obtained components of the matrix, minimum lengths of the paths connecting chosen nodes (created by the smallest number of edges) are determined, and their number is calculated, as well.
Table 1 includes the calculated lengths of minimum paths connecting the nodes of the analyzed graph, and Table 2 shows the numbers of these paths.
For example, there are four minimum paths connecting node 4 with node 9, which consist of three edges.
However, on the basis of the obtained results, it is not possible to determine which edges of the set create individual paths. To define a configuration of every path, each edge is given a name, presented in Table 3 and in Figure 3.
By performing the exponentiation of the sign matrix according to the rule of matrix exponentiation, sets of minimum paths are obtained together with their structure. It is shown in Table 4.
While reviewing the components in Table 4, it is clearly visible that the numbers and the lengths of the minimum paths connecting the nodes are consistent with the calculation results presented in Table 1 and Table 2.

3. Determining the Optimal Position for the Acquisition Node of a Telemetry Network

So far, the analysis was made with the assumption that the probability of realization of a correct transmission by each node is 1, which is in contradiction to reality, and the parameter is especially important for radio networks.
It is known that radio links are less resistant to external interference than fiber-optic or cable links, and a radio wave carrying information is subject to suppression depending on the distance between a transmitter and a receiver. The dependency is partially described by the free space signal suppression value formula FSL (Free Space Loss):
F S L = 32.44   dBm + 20 log f + 20 log d
where f is the transmission frequency in MHz and d is the distance between a transmitter and a receiver in km [25].
By assuming the same level of radio signal emission, e.g., 0 dBm, the same sensitivity of the receivers and the use of omnidirectional antennas (which causes the increase in the suppression value by 40 dBm of the signal reaching the receiver), the parameter RSSI (Received Signal Strength Indicator) was determined on the basis of the dependency shown in Figure 4, taken from paper [26], and PER (Packet Error Ratio) parameter values were found (it was assumed that 433 MHz radio frequency was used).
In the analyzed case, assuming the distances between the nodes are as shown in Table 5 (they are correlated with the data presented in Figure 1), the RSSI and PER values were determined.
Table 5 includes the RSSI values resulting from the distance between the network nodes linearly. The possibility that suppressing signals for a given link can vary for individual directions of information transmission was not taken into consideration.
To check the construction of the structure after including different signal suppression depending on the information transfer direction, it was assumed that the values of the probability of a return transmission from the target nodes to the source nodes reaches the values given in Table 6 (the ‘←’ sign means the change of the information transfer direction).
By using the data from Table 6 and assuming that the data of the information transfer direction from the source nodes to the target nodes are above the diagonal of the table, and from the target nodes to the source nodes are below the diagonal, the probability values were calculated and are presented in Figure 5.
The way of conduct described in the previous part of the paper was used for the determination of the optimal position of the acquisition node of the network, i.e., the node whose average probability of the realization of a correct transmission is the highest in comparison with the other nodes. For this purpose, the probability values for both transmission values were multiplied. They corresponded to individual paths connecting the nodes of the graph (for example, nodes 0 and 5) and the obtained values were averaged. It is shown in Table 7.
On the basis of the data presented in the table above, it was concluded that the optimal localization for an acquisition node was node 4.
Table 8 includes the set of minimum length paths, taking into consideration the presence of parallel, internodal paths (the parallel paths are the paths consisting of the same number of edges connecting the same nodes—source and target).
In Figure 6, the image of the obtained graph describing the network created by the minimum length paths is shown.
Thanks to the analysis of the elements in Table 8, a minimum spanning tree was created; its root is node 4, so by removing the redundant connections, paths were chosen that ensured the highest probability of a correct transmission. The set of paths creating the minimum spanning tree is included in Table 9.
In Figure 7,the obtained minimum spanning tree is shown.
The described way of conduct can be used for the analysis of a situation caused by a failure of individual links due to which the graph describing the obtained tree becomes a disconnected graph resulting in isolated nodes. When there are two parallel paths connecting chosen nodes created by various combinations of edges (in the examples 4—0, 4—8, and 4—9), the graph stays connected. Thanks to the proposed method, that is, the analysis of the matrix powers (Ms), it is possible to determine a set of emergency connections and avoid a connection shortage. The set of paths used in case of a link failure is included in Table 10.
The determined set of paths can be saved in routing memories of individual nodes and used to support transmission in case of a failure of certain links.

4. The Analysis of the Possibility to Ensure the Operation of a Network after Node Removal

In practice, due to changes in networks (for example, by replacing the energy meters with devices working in a different technology), ‘holes’ appear, which causes the graphs describing these networks to be disconnected. In such cases, a signal repeater is often installed in place of one of the nodes. Its task is only to mediate in the transmission of signals between sensors and an acquisition node. Using such a solution is led by the use of an already existing infrastructure enabling the supply of power to the repeater. There is also a case of choosing a location for the repeater. In this case, the proposed method of network analysis can work as well.
To explain the accepted way of conduct, the analysis of a more complex network was used. The network is shown in Figure 8.
By following the rules described above, the optimum location of the acquisition node was determined to be node 17.
It was assumed that for some reasons, nodes 2, 6, 7, and 10 had been excluded which caused nodes 0,1, 3, and 5 to lose the possibility to contact the acquisition node. This is shown in Figure 9.
By analyzing the changed structure of the network, it was divided into two parts. One related to the fifth node (Figure 10a) and one associated with the remaining nodes 0, 1, and 3 (Figure 10b).
The sets of virtual shortest paths connecting the isolated nodes are given in Table 11.
The data in Table 11 show that when it comes to node 5, it is clear for a signal repeater to be installed in node 10.
The situation presented in Figure 10b is more difficult to analyze. In that case, it should be verified which of the edges creating the paths ensure obtaining the maximum probability of a correct transmission.
Even a superficial scan of the network scheme shows that placing a repeater in node 9 is futile, so the focus was moved towards node 6 or 7. The set of minimum length paths for nodes 0, 1, and 3 is presented in Table 12.
The configurations of paths connecting individual nodes with the acquisition node ensuring the highest probability of a successful transmission were analyzed: from node 0—e1, e15, e27; from node 1—e2, e9, e15, e27; from node 3—e9, e15, e27. Each of the above-mentioned paths is connected with node 6, so it is therefore the location of an intermediary node.

5. Discussion

The proposed method allows for the determination of the best location ofan SM device for an additional role as a concentrator, thanks to which it is possible to eliminate a TSC module as well as redundant connections between the TSC and its adjacent SM modules. The absence of need for the installation of TSC lowers the cost of the network construction and its location maintenance (that is a transformer station MV/LV). It leads to the avoidance of time-consuming, complex, and expensive procedures. The removal of unreliable links between the TSC and the SM modules, resulting from a long distance between them, causes the improvement of the reliability and traffic parameters of the network. Improvement of the traffic parameters allows for more frequent reading, which is crucial in energy consumption forecasting. One additional benefit is the possibility to perform more frequent reading of the meters, which is particularly crucial, for example, in Smart Grid systems, with distributed generation, increase in the number of SMs in a last-mile network, and therefore the extension of the operating area of the network.
Sometimes, in order to improve the traffic parameters of a network, it is necessary to divide it into several subnetworks. The division of networks within the structure using TSC was possible only if the main network was extended with a new transformer. The proposed method makes it possible to determine the best location for the SMs, which are also supposed to work as concentrators in particular subnetworks. The paper also proves that the proposed method can be used for finding a place for backup concentrators and repeaters.

6. Conclusions

All the presented solutions referred to last-mile networks using the RF technology. Thanks to the introduction of the ITU-T recommendations defining the PLC interfaces for Smart Metering [27,28,29], the technology can be used in many areas of a Smart Grid [30]. Currently, the author is working on the adaptation of the proposed method for networks based on the G3 PLC [28] and PRIME [29] interfaces. In this case, it is necessary to develop a method for the calculation of the PER values for the links using PLC (not only RSSI, but also Signal to Noise Ratio (SNR) and a way to describe the topology of a network (in case of a three-phase mains, the installed SM devices for transmission can use three common media or only one of them).

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the author.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Raghavendra, C.S.; Sivalingam, K.M.; Znati, T. Wireless Sensor Network; Springer: New York, NY, USA, 2004; p. 426. [Google Scholar]
  2. Bello, L.L.; Lombardo, A.; Milardo, S.; Patti, G.; Reno, M. Experimental Assessments and Analysis of an SDN Framework to Integrate Mobility Management in Industrial Wireless Sensor Networks. IEEE Trans. Ind. Inform. 2020, 16, 5586–5595. [Google Scholar] [CrossRef]
  3. Steere, D.; Baptista, A.; McNamee, D.; Pu, C.; Walpole, J. Research Challenges in Environmental Observation and Forecasting Systems. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston, MA, USA, 6–11 August 2000; Association for Computing Machinery: New York, NY, USA, 2000; pp. 292–299. [Google Scholar] [CrossRef] [Green Version]
  4. Zabłudowski, Ł.; Marciniak, B.; Lutowski, Z.; Bujnowski, S. Quality Parameters in Wireless Distributed Control Systems. Solid State Phenom. 2014, 223, 231–237. [Google Scholar] [CrossRef]
  5. Leow, W.; Ni, D.; Pishro-Nik, H. A Sampling Theorem Approach to Traffic Sensor Optimization. IEEE Trans. Intell. Transp. Syst. 2008, 9, 369–374. [Google Scholar] [CrossRef]
  6. Chiang, S.-Y.; Kan, Y.-C.; Chen, Y.-S.; Tu, Y.-C.; Lin, H.-C. Fuzzy Computing Model of Activity Recognition on WSN Movement Data for Ubiquitous Healthcare Measurement. Sensors 2016, 16, 2053. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  7. Laurijssen, D.; Saeys, W.; Truijen, S.; Daems, W.; Steckel, J. Synchronous Wireless Body Sensor Network Enabling Human Body Pose Estimation. IEEE Accesss 2019, 7, 49341–49351. [Google Scholar] [CrossRef]
  8. Kirimtat, A.; Krejcar, O.; Kertesz, A.; Tasgetiren, M.F. Future Trends and Current State of Smart City Concepts: A Survey. IEEE Access 2020, 8, 86448–86467. [Google Scholar] [CrossRef]
  9. Guo, J.; Ding, X.; Wu, W. A Blockchain-Enabled Ecosystem for Distributed Electricity Trading in Smart City. IEEE Internet Things J. 2021, 8, 2040–2050. [Google Scholar] [CrossRef]
  10. Garakani, H.G.; Moshiri, B.; Safavi-Naeini, S. Cyber Security Challenges in Autonomous Vehicle: Their Impact on RF Sensor and Wireless Technologies. In Proceedings of the 2018 18th International Symposium on Antenna Technology and Applied Electromagnetics (ANTEM), Waterloo, ON, Canada, 19–22 August 2018; pp. 1–3. [Google Scholar]
  11. Morello, R.; De Capua, C.; Fulco, G.; Mukhopadhyay, S.C. A Smart Power Meter to Monitor Energy Flow in Smart Grids: The Role of Advanced Sensing and IoT in the Electric Grid of the Future. IEEE Sens. J. 2017, 17, 7828–7837. [Google Scholar] [CrossRef]
  12. Petrusevski, I.; Živanović, M.; Rakić, A.; Popović, I. Novel AMI architecture for real-time Smart Metering. In Proceedings of the 2014 22nd Telecommunications Forum Telfor (TELFOR), Belgrade, Serbia, 25–27 November 2014; pp. 664–667. [Google Scholar] [CrossRef]
  13. Miao, H.; Chen, G.; Zhao, Z.; Zhang, F. Evolutionary Aggregation Approach for Multihop Energy Metering in Smart Grid for Residential Energy Management. IEEE Trans. Ind. Inform. 2021, 17, 1058–1068. [Google Scholar] [CrossRef]
  14. Stefan, M. Automation of Smart Grid Operations Through Spatio-Temporal Data-Driven Systems. Ph.D. Thesis, Technical Faculty of IT and Design, Aalborg University, Aalborg, Denmark, 2019; p. 134. [Google Scholar]
  15. Polak, M. Experiences of Smart Grid Implementation in Sweden. RynekEnergii 2014, 91, 252–256. [Google Scholar]
  16. Rinaldi, S.; Ferrari, P.; Flammini, A.; Sisinni, E.; Vezzoli, A. Uncertainty Analysis in Time Distribution Mechanisms for OMS Smart Meters: The Last-Mile Time Synchronization Issue. IEEE Trans. Instrum. Meas. 2018, 68, 693–703. [Google Scholar] [CrossRef]
  17. Zhou, J.; Hu, R.Q.; Qian, Y. Scalable Distributed Communication Architectures to Support Advanced Metering Infrastructure in Smart Grid. IEEE Trans. Parallel Distrib. Syst. 2012, 23, 1632–1642. [Google Scholar] [CrossRef] [Green Version]
  18. Bouhafs, F.; Mackay, M.; Merabti, M. Towards a Unified Smart Grid ICT Infrastructure; Springer: New York, NY, USA, 2014; p. 95. [Google Scholar] [CrossRef]
  19. Hyun, D.; Lee, Y.; Moon, Y.A. Study on the Composite Power Line Communication Network. In Communications in Computer and Information Science; Slezak, D., Kim, T., Chang, A.C., Vasilakos, T., Li, M., Sakurai, K., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; Volume 56, pp. 547–554. [Google Scholar] [CrossRef]
  20. Sensus and GE Combine Forces to Create Residential Meter with FlexNet Communications. Available online: https://sensus.com/news-events/news-releases/sensus-and-ge-combine-forces-to-create-residential-meter-with-flexnet-communications/ (accessed on 20 April 2021).
  21. Aloui, A.; Ben Rhouma, O.; Rebai, C. PLC and RF Communications Evaluation For Smart Grid Application In Rural Configuration. In Proceedings of the 2019 IEEE 19th Mediterranean Microwave Symposium (MMS), Hammamet, Tunisia, 31 October–2 November 2019; pp. 1–4. [Google Scholar] [CrossRef]
  22. Deo, N. Graph Theory with Applications to Engineering and Computer Science; Dover Publications: Dover, UK, 2016; p. 496. [Google Scholar]
  23. Penrose, M. Random Geometric Graphs; Oxford University Press: Oxford, UK, 2003; p. 344. [Google Scholar] [CrossRef] [Green Version]
  24. Graham, R.L.; Knuth, D.E.; Patashnik, O. Concrete Mathematics: A Foundation for Computer Science, 2nd ed.; Addison-Wesley: Boston, MA, USA, 1994; p. 657. [Google Scholar]
  25. Faruque, S. Radio Frequency Propagation Made Easy; Springer: Cham, Switzerland, 2015; p. 103. [Google Scholar] [CrossRef]
  26. Boryna, B.; Dubalski, B.; Kiedrowski, P.; Zabłudowski, A. Errors Nature in Indoors Low Power 433 MHz Wireless Network. In Image Processing and Communications Challenges 2. Advances in Intelligent and Soft Computing; Choraś, R.S., Ed.; Springer: Berlin/Heidelberg, Germany, 2010; Volume 84, pp. 373–378. [Google Scholar] [CrossRef]
  27. International Telecommunication Union, Telecommunication Standardization Sector of ITU, ITU-T Recommendation. G.9902: Narrowband Orthogonal Frequency Division, Multiplexing Power Line Communication Transceivers for ITU-T G.hnem Networks; International Telecommunication Union: Geneva, Switzerland, 2014. [Google Scholar]
  28. International Telecommunication Union, Telecommunication Standardization Sector of ITU, ITU-T Recommendation. G.9903: Narrowband Orthogonal Frequency Division, Multiplexing Power Line Communication Transceivers for G3-PLC Networks; International Telecommunication Union: Geneva, Switzerland, 2014. [Google Scholar]
  29. International Telecommunication Union, Telecommunication Standardization Sector of ITU, ITU-T Recommendation. G.9904: Narrowband Orthogonal Frequency Division, Multiplexing Power Line Communication Transceivers for PRIME Networks; International Telecommunication Union: Geneva, Switzerland, 2013. [Google Scholar]
  30. Hoffmann, S.G. Layer-2 security for PLC—A comparison between ITU-T G.9903 and IEEE 1901.2. In Proceedings of the 2016 International Symposium on Power Line Communications and Its Applications (ISPLC), Bottrop, Germany, 20–23 March 2016; pp. 173–178. [Google Scholar] [CrossRef]
Figure 1. An example of a graph describing the topology of a network.
Figure 1. An example of a graph describing the topology of a network.
Entropy 23 00658 g001
Figure 2. An example of a telemetry network.
Figure 2. An example of a telemetry network.
Entropy 23 00658 g002
Figure 3. Edge marking.
Figure 3. Edge marking.
Entropy 23 00658 g003
Figure 4. The chart of the dependency of link quality in the function of the level of the signal reaching the receiver.
Figure 4. The chart of the dependency of link quality in the function of the level of the signal reaching the receiver.
Entropy 23 00658 g004
Figure 5. The calculated probability values of obtaining a correct transmission.
Figure 5. The calculated probability values of obtaining a correct transmission.
Entropy 23 00658 g005
Figure 6. The image of the obtained graph.
Figure 6. The image of the obtained graph.
Entropy 23 00658 g006
Figure 7. The image of a minimum spanning tree.
Figure 7. The image of a minimum spanning tree.
Entropy 23 00658 g007
Figure 8. The analyzed network before nodes failure.
Figure 8. The analyzed network before nodes failure.
Entropy 23 00658 g008
Figure 9. An image of the network after the nodes failure.
Figure 9. An image of the network after the nodes failure.
Entropy 23 00658 g009
Figure 10. The structures after the exclusion of the chosen nodes. (a) related to the fifth node; (b) associated with the remaining nodes i.e., 0, 1 and 3.
Figure 10. The structures after the exclusion of the chosen nodes. (a) related to the fifth node; (b) associated with the remaining nodes i.e., 0, 1 and 3.
Entropy 23 00658 g010
Table 1. The lengths of the minimum paths (the number of edges).
Table 1. The lengths of the minimum paths (the number of edges).
11
212
3213
42121
512121
6322212
73231121
823132112
9231432231
103323221211
1143322321221
Node012345678910
Table 2. The numbers of the minimum paths.
Table 2. The numbers of the minimum paths.
11
211
3112
42111
512111
6411212
73221111
824132111
9111842231
103123111211
1162211221111
Node012345678910
Table 3. Adopted edge marking.
Table 3. Adopted edge marking.
Edgeabcdefghijk
Nodes0–10–20–51–31–42–52–82–93–43–74–5
Edgelmnoprstuvw
Nodes4–64–75–86–76–86–107–118–98–109–1010–11
Table 4. Minimum paths configurations.
Table 4. Minimum paths configurations.
Node01234567891011
0-abadae
ck
cael
ckl
cnp
bgp
adj
ckm
aem
cn
bg
bhbhv
cnu
bgu
adjs
aems
cnuw
bguw
bhvw
ckms
1a-abdeek
ac
eldj
em
elp
ekn
acn
abg
abhelrdjs
ems
2bab-bad
fki
fkfgpfkm
gpo
ghhv
gu
hvw
guw
3addbad
fki
-iikil
jo
jilp
jop
ikn
ilpt
iknt
ikfh
ikrv
jorv
jopt
jswv
dabh
ilr
jor
jsw
js
4ae
ck
efki-klmLp
kn
lpt
lrv
knt
kfh
lrms
5cek
ac
fikk-kl
np
kmnnt
fh
nunuw
kms
6ael
ckl
cnp
bgp
elgpil
jo
lkl
np
-oppt
rv
rrw
os
7adj
ckm
aem
dj
em
fkm
gpo
jmkmo-opopt
swv
or
sw
s
8cn
bg
elp
ekn
acn
abg
gilp
jop
ikn
lp
kn
npop-tuuw
9bhabhhilpt
iknt
ikfh
ikrv
jorv
jopt
jswv
dabh
lpt
lrv
knt
kfh
nt
fh
pt
rv
opt
swv
t-vvw
10bhv
cnu
bgu
elrhv
gu
ilr
jor
jsw
lrnuror
sw
uv-w
11adjs
aems
cnuw
bguw
bhvw
ckms
djs
ems
hvw
guw
Jsmsnuw
kms
rw
os
suwvww-
Table 5. The determined RSSI and PER values.
Table 5. The determined RSSI and PER values.
Edgeabcdefghijk
d(m)48.636.4534.0229.1626.7336.4551.0355.8934.0233.0434.02
RSSI
(dBm)
−95.38−92.88−92.28−90.94−90.19−92.88−95.80−96.59−92.28−92.03−92.28
PER0.89220.93470.93540.95790.96200.93470.85920.85920.93540.95050.9354
Edgelmnoprstuvw
d(m)19.4443.7431.5937.9138.8833.0531.5926.7323.3338.8836.45
RSSI
(dBm)
−87.42−94.47−91.64−93.22−93.44−92.03−91.64−90.19−89.01−93.44−92.88
PER0.97230.90920.95130.93470.92990.95050.95130.96200.96570.93470.9347
Table 6. The assumed RSSI and PER values for the second transmission direction.
Table 6. The assumed RSSI and PER values for the second transmission direction.
Edge← a← b← c← d← e← f← g← h← i← j← k
PER0.97230.90920.95130.93470.92990.95050.95130.96200.96570.93470.9347
Edge← l← m← n← o← p← r← s← t← u← v← w
PER0.89220.93470.93540.95790.96200.93470.85920.85920.93540.95050.9354
Table 7. The resulting probability of obtaining a correct transmission.
Table 7. The resulting probability of obtaining a correct transmission.
Node01234567891011Pawr
0 0.8670.8500.7770.7770.8900.6690.6700.7430.7020.6560.5620.7421
10.867 0.7370.8950.8950.7770.7760.7780.6700.7830.6890.6360.7931
20.8500.737 0.6810.7770.8880.7310.6570.8170.8270.7360.6440.7587
30.7770.8950.681 0.9030.7900.7900.8880.7050.5860.6790.7260.7655
40.7770.8950.7770.903 0.8740.8680.8500.7770.6530.7710.6950.8035
50.8900.7770.8880.7900.874 0.7770.7430.8900.7350.8040.6550.8021
60.6690.7760.7310.7900.8680.777 0.8950.8950.7640.8880.7540.8001
70.6700.7780.6570.8880.8500.7430.895 0.8010.6480.7550.8170.7731
80.7430.6700.8170.7050.7770.8900.8950.801 0.8270.9030.7900.8016
90.7020.7830.8270.5860.6530.7350.7640.6480.827 0.8880.7770.7446
100.6560.6890.7360.6790.7710.8040.8880.7550.9030.888 0.8740.7859
110.5620.6360.6440.7260.6950.6550.7540.8170.7900.7770.874 0.7209
Table 8. The set of minimum length paths obtained with the assumption that the acquisition node is node 4.
Table 8. The set of minimum length paths obtained with the assumption that the acquisition node is node 4.
Node0123567891011
Set of Pathsae
ck
EfkIKlmlp
kn
lpt
lrv
knt
kfh
lrms
Ppath0.7770.8950.7770.9030.8740.8680.8500.7770.6530.7710.695
Where: Set of Paths, the set of all minimum length paths; Ppath, the probability of the realization of transmission between nodes.
Table 9. The set of paths creating the minimum spanning tree.
Table 9. The set of paths creating the minimum spanning tree.
Node0123567891011
CminckEfkiKlMnkvrlrlsm
Ppathtree0.7780.8950.7770.9030.8740.8680.8500.7780.6850.7710.695
Where: Cmin, the configuration of a minimum path; Ppathtree, the probability of the realization of transmission.
Table 10. The set of paths used in case of a link failure.
Table 10. The set of paths used in case of a link failure.
Link FailureNode0123567891011
ESets of PathsckDifkIKlmnkvrlrlsm
FckEbckIKlmnkvrlrlsm
KaeEbaeICaelmlpvrlrlsm
IckEfkJmKlmnkvrlrlsm
LckEfkIKommnkkntunkSm
MckEfkIKlolnkvrlunkWrl
RckEfkIKlmnkkntunkSm
SckEfkIKlmnkvrlrlWrl
Table 11. The sets of the shortest paths (for the node 5).
Table 11. The sets of the shortest paths (for the node 5).
NodePathsPpath
5e12, e20, e110.6570
e6, e5, e11, e220.6706
e12, e24, e31, e350.7900
Table 12. The set of minimum length paths (nodes 0, 1, 3).
Table 12. The set of minimum length paths (nodes 0, 1, 3).
NodePathsPpath
0e1, e15, e270.78192
e1, e16, e290.68325
e1, e14, e220.72990
1e3, e18, e290.66908
e2, e9, e15, e270.71395
e2, e9, e14, e220.66645
3e9, e15,e270.81298
e9, e14,e220.75889
e9, e16,e290.71039
e8, e18,e290.71623
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kiedrowski, P. Selection of the Optimal Smart Meter to Act as a Data Concentrator with the Use of Graph Theory. Entropy 2021, 23, 658. https://0-doi-org.brum.beds.ac.uk/10.3390/e23060658

AMA Style

Kiedrowski P. Selection of the Optimal Smart Meter to Act as a Data Concentrator with the Use of Graph Theory. Entropy. 2021; 23(6):658. https://0-doi-org.brum.beds.ac.uk/10.3390/e23060658

Chicago/Turabian Style

Kiedrowski, Piotr. 2021. "Selection of the Optimal Smart Meter to Act as a Data Concentrator with the Use of Graph Theory" Entropy 23, no. 6: 658. https://0-doi-org.brum.beds.ac.uk/10.3390/e23060658

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop