The document summarizes a presentation on broadband over power line (BPL) technology given to the Washington Area CTO Roundtable. It provides an overview of BPL, describes how power lines can be used as a communications medium, discusses key aspects of BPL system architecture like frequency planning and components, and addresses challenges like the noisy power line channel environment. It also reviews the status of the BPL industry and big questions still facing commercialization efforts.
Broadband over power lines (BPL) is a method of power line communication that allows relatively high-speed digital data transmission over the public electric power distribution wiring..
seminar paper on BROADBAND OVER POWER LINES. It is the method of data transfer through the existing power lines.
"Wherever electricity is available there could be broadband"
Ausgrid is investing more than $1 billion in the Sydney CBD electricity network over five years to 2014. Ausgrid's Sydney CityGrid project involves constructing new substations, replacing and upgrading high-voltage cables and constructing a new tunnel to link into our existing network of CBD cable tunnels. These tunnels connect to form an 8 km ring under Sydney's CBD that interconnects Ausgrid's substations.
To provide a GRN P-25 coverage solution into these tunnels for Ausgrid's maintenance staff presented a challenge. Coverage is provided by utilising 'radio over fibre' repeater technology which rebroadcasts the NSW Government Radio Network from two dedicated base station sites located in two of Ausgrid's substations. Radiating cable, fixed to the ceiling of the tunnel, distributes the radio signals to the user in the tunnel, providing a method of communications deep underneath Sydney's CBD, where previously there was no way of communicating with the outside world.
Steve Harvey, Engineering Manager, Distributed Coverage and Capacity Solutions (DCCS), CommScope
Broadband over power lines (BPL) is a method of power line communication that allows relatively high-speed digital data transmission over the public electric power distribution wiring..
seminar paper on BROADBAND OVER POWER LINES. It is the method of data transfer through the existing power lines.
"Wherever electricity is available there could be broadband"
Ausgrid is investing more than $1 billion in the Sydney CBD electricity network over five years to 2014. Ausgrid's Sydney CityGrid project involves constructing new substations, replacing and upgrading high-voltage cables and constructing a new tunnel to link into our existing network of CBD cable tunnels. These tunnels connect to form an 8 km ring under Sydney's CBD that interconnects Ausgrid's substations.
To provide a GRN P-25 coverage solution into these tunnels for Ausgrid's maintenance staff presented a challenge. Coverage is provided by utilising 'radio over fibre' repeater technology which rebroadcasts the NSW Government Radio Network from two dedicated base station sites located in two of Ausgrid's substations. Radiating cable, fixed to the ceiling of the tunnel, distributes the radio signals to the user in the tunnel, providing a method of communications deep underneath Sydney's CBD, where previously there was no way of communicating with the outside world.
Steve Harvey, Engineering Manager, Distributed Coverage and Capacity Solutions (DCCS), CommScope
The Next Generation Mobile Networks Alliance feels that 5G should be rolled out by 2020 to meet business and consumer demands. In addition to providing simply faster speeds, they predict that 5G networks also will need to meet new use cases such as the Internet of Things (internet connected devices) as well as broadcast-like services and lifeline communication in times of natural disaster. Although updated standards that define capabilities beyond those defined in the current 4G standards are under consideration, those new capabilities have been grouped under the current ITU-T 4G standards. The U.S. Federal Communications Commission (FCC) approved the spectrum for 5G, including the 28 Gigahertz, 37 GHz and 39 GHz bands, on July 14, 2016. 5G research and development also aims at improved support of machine to machine communication, also known as the Internet of things, aiming at lower cost, lower battery consumption and lower latency than 4G equipment. To put it simply, the use cases for 4G networks has expanded well beyond the initial scope of the standard. 5G is what you get when you reset the standard/design to cope with the increase in scope.4G networks don’t just support mobile devices anymore. IOT (Internet of Things) devices are everywhere and the number of them is only going to increase. We’re seeing 4G modems in smart watches, in CCTVs and even in doorbells.
Centralized-RAN technology improves the wireless experienceAmphenol Telect
Telect builds its C-RAN technology on a rack-and-stack option with all Telect-manufactured products. The Centalized-RAN solution includes our racks and cabinets, power distribution, fiber distribution, and horizontal and vertical cable management.
Mobile data traffic is growing explosively and the industry is preparing for an astounding 1000x increase. Qualcomm is leading the charge through its compelling technologies and path breaking innovations in preparing the industry to meet this "1000x challenge." The solution to this formidable challenge is obviously is a combination of more resources such as more spectrum and more small cells, but also new ways of acquiring, deploying, operating and managing these resources. But it is not just about adding spectrum resources and small cells, the whole is much more than sum of its parts if can make all entities work efficiently together, to squeeze even more out of finite spectrum resources.
For more information please visit www.qualcomm.com/1000x
Download the presentation here: http://www.qualcomm.com/media/documents/1000x-mobile-data-challenge
In-building Solution (IBS) / Distributed Antenna System (DAS)
Small Cell Coverage within building premises
Signal is restricted inside the building
Antenna installed inside the building
Low Transmit Power of Antenna
Smaller Antenna size
Software defined radio technology : ITB research activitiesDr.Joko Suryana
A.Introduction
1.From 1G to 5G
2.5G, from Device to Data Center
B.Programmable Networks
1.Software Defined Radio Technology
2.From Software-Defined Radio to Software-Defined Networking
3.Project Example : Princeton Univ : Software-Defined Cellular Core networks and New York Univ USA : SDN-controlled LTE using SDR
C.SDR Projects at LTRGM ITB
1.SDR for 5G Physical Layer Design
2.SDR for AESA Radar Receiver
3.SDR for Nanosatellite Ground Station
4.SDR for Communication and Identification for IFX
The project manages to derive the range of operation of a user in interference based scenarios between Femtocells and Macrocells, in terms of Signal to Noise and Interference ratios. The simulation was carried out for both the uplink and the downlink scenario. It could be successfully concluded that the environment that the user is in plays an important part in performance evaluation of the user.
4G World Mobile Backhaul Summit. If you missed it in person, feel free to view it online.
Speakers:
Mark Casey, CFN Services, Incorporated
Mike Dodson, Utopian Wireless
Doug Smith, Digital Bridge
Dan Graf, Leap Wireless/Cricket Communications
If you have any questions please contact CFN Services at backhaul@cfnservices.com
The Next Generation Mobile Networks Alliance feels that 5G should be rolled out by 2020 to meet business and consumer demands. In addition to providing simply faster speeds, they predict that 5G networks also will need to meet new use cases such as the Internet of Things (internet connected devices) as well as broadcast-like services and lifeline communication in times of natural disaster. Although updated standards that define capabilities beyond those defined in the current 4G standards are under consideration, those new capabilities have been grouped under the current ITU-T 4G standards. The U.S. Federal Communications Commission (FCC) approved the spectrum for 5G, including the 28 Gigahertz, 37 GHz and 39 GHz bands, on July 14, 2016. 5G research and development also aims at improved support of machine to machine communication, also known as the Internet of things, aiming at lower cost, lower battery consumption and lower latency than 4G equipment. To put it simply, the use cases for 4G networks has expanded well beyond the initial scope of the standard. 5G is what you get when you reset the standard/design to cope with the increase in scope.4G networks don’t just support mobile devices anymore. IOT (Internet of Things) devices are everywhere and the number of them is only going to increase. We’re seeing 4G modems in smart watches, in CCTVs and even in doorbells.
Centralized-RAN technology improves the wireless experienceAmphenol Telect
Telect builds its C-RAN technology on a rack-and-stack option with all Telect-manufactured products. The Centalized-RAN solution includes our racks and cabinets, power distribution, fiber distribution, and horizontal and vertical cable management.
Mobile data traffic is growing explosively and the industry is preparing for an astounding 1000x increase. Qualcomm is leading the charge through its compelling technologies and path breaking innovations in preparing the industry to meet this "1000x challenge." The solution to this formidable challenge is obviously is a combination of more resources such as more spectrum and more small cells, but also new ways of acquiring, deploying, operating and managing these resources. But it is not just about adding spectrum resources and small cells, the whole is much more than sum of its parts if can make all entities work efficiently together, to squeeze even more out of finite spectrum resources.
For more information please visit www.qualcomm.com/1000x
Download the presentation here: http://www.qualcomm.com/media/documents/1000x-mobile-data-challenge
In-building Solution (IBS) / Distributed Antenna System (DAS)
Small Cell Coverage within building premises
Signal is restricted inside the building
Antenna installed inside the building
Low Transmit Power of Antenna
Smaller Antenna size
Software defined radio technology : ITB research activitiesDr.Joko Suryana
A.Introduction
1.From 1G to 5G
2.5G, from Device to Data Center
B.Programmable Networks
1.Software Defined Radio Technology
2.From Software-Defined Radio to Software-Defined Networking
3.Project Example : Princeton Univ : Software-Defined Cellular Core networks and New York Univ USA : SDN-controlled LTE using SDR
C.SDR Projects at LTRGM ITB
1.SDR for 5G Physical Layer Design
2.SDR for AESA Radar Receiver
3.SDR for Nanosatellite Ground Station
4.SDR for Communication and Identification for IFX
The project manages to derive the range of operation of a user in interference based scenarios between Femtocells and Macrocells, in terms of Signal to Noise and Interference ratios. The simulation was carried out for both the uplink and the downlink scenario. It could be successfully concluded that the environment that the user is in plays an important part in performance evaluation of the user.
4G World Mobile Backhaul Summit. If you missed it in person, feel free to view it online.
Speakers:
Mark Casey, CFN Services, Incorporated
Mike Dodson, Utopian Wireless
Doug Smith, Digital Bridge
Dan Graf, Leap Wireless/Cricket Communications
If you have any questions please contact CFN Services at backhaul@cfnservices.com
Kyeong Soo Kim, Academic Weeks Videoconference Session with Pakistan COMSATS Institute of Information Technology (CIIT), Swansea University, Swansea, Wales UK, Dec. 14, 2010.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
This presentation by Westermo’s Technical Lead Engineer Dakota Diehl is an integral part of the Westermo webinar held on May 28th 2020, covering best practices for computer networking solutions for energy systems. During this presentation, protocols and certifications for the energy market are discussed as well as data communication solutions for different energy segments - from generation to supply.
Tune in the webinar session here: https://www.westermo.com/news-and-events/webinars/computer-networking-solutions-for-energy-systems
Het nets up close - Webinar with ThinkSmallCell and IXIADavid Chambers
Slides from joint webinar by ThinkSmallCell and IXIA outlining the progress towards HetNets using Small Cells and the solution testing scenarios and capabilities required
Enabling the rise of the smartphone: Chronicling the developmental history at...Qualcomm Research
Today’s smartphones are a marvel of modern technology — handheld devices with vast computing power, incredible multimedia and AI capabilities, and blazing fast data rates that support mobile browsing, social media interaction, and more. From humble beginnings as a cellphone focused purely on voice communication, the capability and functionality of modern smartphones have advanced tremendously. This presentation chronicles Qualcomm’s role in the rise of the smartphone from its initial beginnings to becoming the largest computing platform in the world. It includes:
- Key technology developments that led to today’s smartphones
- The role of Moore’s Law in driving new innovations and additional integration into mobile processors
- Qualcomm’s critical role in advancing the smartphone’s capabilities through groundbreaking innovations and key technology developments
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
2. Current Communications Group / Current Technologies 2
Today’s agenda
BPL Overview
The Electricity Network
CT Overhead System Architecture
Power Line Channel
OFDM
Spectral Citizenship
Industry Status and Next Steps
Quiz
3. Current Communications Group / Current Technologies 3
What is BPL?
“Broadband over Power Line” refers to high speed (multi-megabit)
unlicensed digital carrier current radio systems moving data over the
medium voltage (MV) and low voltage (LV) segments of a power line
network
– “in home” refers to operations akin to the LAN side of conventional networks
operating at the customer premise
– “access” refers to operations akin to the WAN side operating on the MV and LV
segments of the utility network
– The electric meter is the demarcation point
A very attractive new business opportunity built between a Rock and Hard
Place
– The “rock” is FCC Part 15 Regulations
– The “hard place” is either noise or attenuation of the existing power networks
4. Current Communications Group / Current Technologies 4
Why Is BPL Attractive?
Power lines are our most ubiquitous infrastructure
– In appropriate business relationships, their use can be essentially free
Effective Broadband competition
– Potential 3rd
provider into home
– Existing wires – lower cost of deployment
Potential for Enhanced Utility Services
– Adds “smart” capabilities to an otherwise “dumb” network
5. Current Communications Group / Current Technologies 5
Electricity Distribution Basics
Introduction
Power Plant Step-Up
Transformer
High Voltage
Lines
(69kV – 765 kV)
Substation Medium Voltage
Lines
(4kV – 46 kV)
Low Voltage
Lines
(120/240 V)
Generation Transmission
Example Companies
DistributionDistribution
From the transmission lines, the
voltage is stepped down at a
substation and distributed to
end-users over the local power grid
From the transmission lines, the
voltage is stepped down at a
substation and distributed to
end-users over the local power grid
Distribution
7. Current Communications Group / Current Technologies 7
Key Architectural Choices For BPL System
Bypass Transformer or Pierce Transformer (MV to LV connectivity )
– Bypassing transformer allows lower and more predictable signal loss; piercing
requires no equipment
– Safety is paramount and bypass equipment is new for utilities
Signal Repetition
– Regenerating data packets at various points allows greater reach at the
expense of lower bandwidth and greater latency
Frequency Plan
– Selection of operating frequencies for backbone and service links
– FDD vs. TDD
– Coexistence with licensed services
Bandwidth and latency
– Desired service offerings
– Latency sensitive applications – voice and gaming
8. Current Communications Group / Current Technologies 8
HomePlug®
CPE
HomePlug®
CPE
4
SolutionsSolutions
Internet
VoIP
CT Coupler®CT Coupler®
2
CT Backhaul-
Point®
CT Backhaul-
Point®
1
CT Bridge®CT Bridge®
3
CT View®
Management
System
CT View®
Management
System
5
ComponentsComponents
Medium-
voltage
lines
5
Low-voltage
lines
Backhau
l
2
1
2
3
4 4 4
CT Overhead System Architecture
9. Current Communications Group / Current Technologies 9
CT Bridge®
CT Coupler®
CT
Backhaul-
Point®
CT Overhead Installation
11. Current Communications Group / Current Technologies 11
Power Line Is A Hostile Channel for Communications
Power lines are full of
channel impairments
– Impedance Mismatch
– Unterminated Stubs
– Crosstalk
– Conducted Noise
– Ingress Noise
– Attenuation
– Frequency Selective
Characteristics
– Pesky high
voltage/current
– Variation over time
– Variation with weather
-90
-80
-70
-60
-50
-40
-30
-20
0 4 8 12 16 20 24 28
Channel Spectral Characteristics Post Ferrite Choke Insertion
Horizontal scale = Frequency (MHz)
Vertical Scale = Through Response (dB)
12. Current Communications Group / Current Technologies 12
OFDM Offers Superior Performance for BPL Applications
OFDM
Spread
Spectrum
Techniques (FH
and DS)
Single Carrier
Spectral
Efficiency
Good Moderate Moderate
Robustness
Against Channel
Distortions
Excellent Poor Good
Robustness
Against
Impulsive Noise
Fair Fair Good
Ability to adapt
to channel
changes
Excellent Fair Good
EMC Aspects Good Good-Excellent Poor
Implementation
Costs
(Equalizers, etc.)
Fair Poor
Poor (Equalizers
required)
13. Current Communications Group / Current Technologies 13
OFDM Signal Generation
•OFDM carriers are closely
spaced
•Note each carrier is placed
at the nulls of other carriers
OFDM systems are
practical with DSP
techniques
Single chip engines
available
Image: http://www.ert.rwth-
aachen.de/Projekte/Theo/OFDM/node6.html
Image: Communications Systems Design, Dec 2000
14. Current Communications Group / Current Technologies 14
OFDM System Example: Homeplug
Homeplug is a standard for power line networking
– Used as the LV modem in Current’s solution
84 carriers from 4.5-21 MHz – notches for amateur radio bands
-10
0
10
20
30
40
50
0 4 8 12 16 20 24 28
• Raw Throughout
14 Mbps
• Effective
throughput 6-7 Mbps
• DES encryption
• Products Widely
Available and Low
Cost
15. Current Communications Group / Current Technologies 15
Spectral Citizenship
Some parties have expressed concern over potential interference to
licensed radio users
– Amateur radio operators most vocal opponents
BPL power limits set by FCC Part 15 limits
– Formal FCC BPL R&O issued in October 2004
– Limits same as millions of other devices
– Verification/Certification must be done in situ
– Limits are extremely low
– Any resultant interference must be resolved by BPL operator
Current’s Approach to Interference
– Avoidance is most effective mitigation technique
– Only one device on a link transmits at a time
– No overlap with amateur, broadcast, satellite frequencies
– Largest BPL deployment in North America
– No interference complaints
16. Current Communications Group / Current Technologies 16
Status of BPL Industry
3 Commercial US Deployments
– Manassas, VA – Municipal utility – Main.Net
– Cincinnati, OH – Cinergy & Current Communications JV – Current Technologies
– Emmaus, PA – Pennsylvania Power & Light – Main.net and Amperion
30+ trial
deployments
in US
Commercial
deployments
in Germany,
Spain, Korea,
Chile, Brazil,
Image: Network
World, 23 Aug
2004
17. Current Communications Group / Current Technologies 17
Big Questions for BPL Industry
Technical
– Verify scale - Technology works effectively. It now needs to demonstrate large
scale operation
Non-technical
– Business Models - Industry business models need to be verified and shown to
work in actual commercial deployment
– Regulatory - BPL industry needs to show that regulatory issues can be handled
similar to other industries (cross-subsidization, etc.)
18. Current Communications Group / Current Technologies 18
Quiz
Calculate the temperature rise that a hard MV line fault to ground
would create if the energy was entirely dumped into 100 pounds of
water
Assume:
1. MV phase-to-phase voltage is 13.2 KV
2. The substation recloser will allow 10,000 amps for 10 cycles
Useful facts:
1. 1 joule almost exactly equals 1 watt-second
2. 1 joule equals approximately 0.24 calories
Hint: use CGS units
19. Current Communications Group / Current Technologies 19
Quiz solution
The total energy Q dissipated as heat:
Q = (phase-ground voltage) * (current) * (time interval) [watt-seconds]
Q = (13.2 KV / 1.732) * (10,000 amps) * (160 msec) * (0.24) [calories]
Q = 2.93E06 calories
If that total energy is dumped into 100 pounds of water:
dT = Q / (mass of water * specific heat)
dT = 2.93E06 / (100 [lbs] * 454 [grams/lb] * 1 [cal/gram/deg C])
dT = 64.5C or 148F
It’s also interesting to note that:
dT/dt = (64.5/0.16) or about 400 degrees C / sec !