The present invention relates to a method for determining the configuration of a danger warning system comprising a central station and appliances connected thereto via a signal line, in which danger warning system each appliance has an isolator switch, a unique identification number and a communication address, and the appliances, disconnectable via the isolator switches, can be started sequentially.
In this context “appliances” should be understood to mean, in particular, hazard detectors, but they may also be actuators, such as optical or acoustic alarm transmitters, relays, alarm displays, transmission appliances for transmitting alarms and the like. When “detectors” are referred to in the following description, this should not, in any case, be understood in a restrictive manner.
Such methods, known by the terms chain synchronization or daisy chain, have long been used for determining the arrangement of detectors purely on a stub line or purely on a ring line. In EP-A-0 093 872 a method of this type is described in which, upon activation of the system, all the detectors are disconnected by a change in voltage of the signal line and then are reconnected to the signal line in a time-staggered manner by the switches in such a manner that each detector additionally reconnects a subsequent detector to the line voltage after a predetermined time delay. The detectors contain address memories which are loaded in a predetermined sequence by the central station with the communication addresses of the individual detectors.
In the method described in EP-A-0 093 872 the treatment of branches can be problematic because, after the isolator switch located before a branch has been closed, two detectors or, in the case of multiple branches, more than two detectors suddenly start simultaneously, especially if they do not yet have a unique communication address. Here, it must be assumed that in exchanges of detectors between different signal lines double communication addresses are possible even for pre-addressed detectors.
EP-A-0 485 878 describes a method for determining the configuration of detectors of a danger warning system in which, prior to allocating the communication address to the detectors, the central station must perform a large number of steps, which demands a relatively large amount of time. Determination of the position of a newly-installed detector by restarting the whole system is time-consuming, especially with relatively large networks, and certainly is not efficient. Apart from that, this method does not function with symmetrical branches.
EP-A-0 880 117 describes a method for automatically locating detectors in which the detectors are equipped with means for communicating with neighboring detectors. To locate a detector, all the detectors open their disconnectors and the detector to be located transmits a corresponding message which is received only by its neighbors. The disconnectors are then closed and it is determined which detectors these neighbors are, enabling unambiguous determination of the position of the detector which is to be located. This method is relatively fast, but requires all detectors to be equipped with the communication means mentioned.
It is one possible object of the invention to specify a method for determining the configuration of a danger warning system which, even in the case of branched topologies, enables the configuration of the line network to be determined and which functions more quickly and more simply than the known methods.
The inventors propose that, upon starting, the appliances log on sequentially to the central station and, in the event of simultaneous logging-on of more the one appliance, only the logging-on of one of these appliances is accepted.
A first preferred embodiment is characterized in that the appliances log on to the central station with their communication address, and in that, in the event of simultaneous logging-on by appliances with different communication addresses, the communication addresses are distinguished by an arbitration method and the two different communication addresses are sequentially registered.
A second preferred embodiment of the method is characterized in that the appliances log on to the central station with their communication address, and in that, in the event of simultaneous logging-on by appliances with identical communication addresses, the collision of these identical communication addresses is identified and resolved.
A third preferred embodiment of the method is characterized in that the appliances log on to the central station with their identification numbers, and in that sequential logging-on is ensured by an arbitration procedure via the identification number and a unique communication address is allocated to the appliances via the identification number.
A first alternative method of achieving the object is characterized in that, upon starting, the communication addresses of all appliances are polled by the central station and newly-added communication addresses are thereby identified, and in that, in the event of multiple occupancy of communication addresses, the collision of these identical communication addresses is identified and resolved.
A second alternative method of achieving the object is characterized in that, upon starting, the identification numbers of the newly-started appliances are polled by the central station and a unique communication address is allocated to each appliance found.
The inventors further propose a danger warning system with a program-controlled central station to which a plurality of appliances are connected in parallel via a signal line, each of which appliances includes at least a sensor, an isolator switch, evaluation electronics with at least a memory and an individual and unalterable serial number allocated by the manufacturer. The danger warning system is characterized in that the central station includes units to execute the process steps mentioned.
A preferred embodiment of the danger warning system is characterized in that the appliances mentioned are formed by hazard detectors and/or actuators, such as optical or acoustic alarm transmitters, and/or relays and/or alarm displays and/or transmission appliances for transmitting alarms.
These and other objects and advantages of the present invention will become more apparent and more readily appreciated from the following description of the preferred embodiments, taken in conjunction with the accompanying drawings of which:
Reference will now be made in detail to the preferred embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to like elements throughout.
The danger warning system represented in
In the case of the danger warning system illustrated it is assumed that each detector Mr, has a communication address and a unique identification number. The latter has been allocated to the respective detector by the manufacturer; it is unalterable and occurs precisely once.
As already mentioned in the introduction to the description, a detector M should be understood to mean not only a hazard detector but quite generally an addressable appliance installed in a signal line. Apart from a hazard detector, this may be an actuator, such as an optical or acoustic alarm transmitter, a relay, an alarm display, a transmission appliance for transmitting alarms, and the like.
In order to determine the configuration of the detectors Mn on the network formed by the signal line ML and the stub line SL, the detectors Mn, which are disconnectable via the isolator switches S, are started sequentially by the central station Z, a unique communication address being optionally allocated to the detectors. In addition, information from the detectors Mn, if present, such as detector type, an identification number such as a serial number or an existing communication address, can be read into the central station Z for complete determination of the configuration of the detectors on the network. Whenever a detector Mn has closed an isolator switch S and logged on, the next successive detector closes its isolator switch upon a command from the central station Z. After each closing of an isolator switch S the central station Z waits until no more detectors Mr, log on, and then also knows how many detectors are connected directly behind the one which last closed its isolator switch S. If only one detector has logged on after the last closing of an isolator switch S, no branch is present; if two detectors have logged on there is a single branch, and so on.
The treatment of branches is especially problematic if the detectors at a branch do not already have a unique communication address. In addition, it must be assumed that, through exchange of detectors between different lines, double communication addresses are possible even in the case of pre-addressed detectors, which must be prevented under all circumstances. To master a situation of this kind, therefore, the system must be able to identify that a branch is present, that is, that a plurality of detectors have been started. For this purpose the following methods are proposed:
1. The detectors transmit their communication addresses to the central station Z, which, upon receiving two or more communication addresses simultaneously, prevents the simultaneous logging-on of a plurality of detectors with different communication addresses by an arbitration procedure. In the arbitration procedure the addresses are compared bitwise and the detector which has one bit set, for example, is preferred. This detector then receives a command from the central station Z and closes its isolator switch. Then the communication address of the detector not preferred in the arbitration is read into the central station Z; the detector receives a command from the central station Z and closes its isolator switch S. Then the next detector logs on, and so on.
2. The detectors transmit their communication addresses to the central station Z, which identifies the simultaneous arrival of two identical communication addresses as a collision and resolves the collision. The resolution is effected in that the central station Z allocates an invalid communication address to all the detectors involved in the collision, whereupon the detectors with an invalid communication address log on again according to variant 3 (
3. The detectors log on to the central station Z with their identification number. Sequential logging-on is ensured by an arbitration procedure of the type described and unique communication addresses are allocated to the detectors via the identification numbers.
4. The communication addresses of all detectors are polled by the central station Z, whereby newly-added detectors are identified. Multiple occupancy of communication addresses is identified as a collision and the collision is resolved in the manner already described.
5. The identification numbers of the newly-started detectors are polled by the central station Z (in practice not all possible identification numbers can be polled, because the time required for a large number of multidigit identification numbers would be too long), a method based on a binary search tree being appropriate. A unique communication address is then allocated to each detector found. ,
By using one of the methods described, all detectors directly connected to branch origins are known and starting of each branch can be continued sequentially, so that finally the topology of the whole network can be recorded.
When the danger warning system illustrated in
Once the detector M3 has logged on, the detector M4 logs on to the central station Z, then the detector M5, etc. When the detector M10 has logged on, no further detectors log on and the central station Z now knows the configuration of the network of the fire danger warning system. If, for example, because of an exchange of a detector during maintenance/revision work, the detector M8 had the communication address 3, the central station Z would identify when that detector logged on that the communication address 3 was already allocated to the detector M3, and would readdress the detector M8 with a free communication address.
As already mentioned, multiple branching can also be identified with the method described; self-evidently, a limb of a branch may itself contain a branch.
The invention has been described in detail with particular reference to preferred embodiments thereof and examples, but it will be understood that variations and modifications can be effected within the spirit and scope of the invention covered by the claims which may include the phrase “at least one of A, B and C” as an alternative expression that means one or more of A, B and C may be used, contrary to the holding in Superguide v. DIRECTV, 69 USPQ2d 1865 (Fed. Cir. 2004).
Number | Date | Country | Kind |
---|---|---|---|
05005564.9 | Mar 2005 | EP | regional |
This application is based on and hereby claims priority to PCT Application No. PCT/EP2006/060600 filed on Mar. 9, 2006 and European Application No. EP05005564 filed on Mar. 15, 2005, the contents of which are hereby incorporated by reference.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP06/60600 | 3/9/2006 | WO | 00 | 5/23/2011 |