The present disclosure relates to the management of networked light fixtures.
Commercial buildings, highways, parks, and other spaces are increasingly being fit with energy efficient light fixtures (e.g., light emitting diode (LED)-based light fixtures). With light fixtures powered and controlled via a communication network, it is possible to provide building tenants, maintenance workers, and even visitors control over the light emitted in their space.
Techniques presented herein are directed to lighting management techniques for lighting functions of networked light fixtures. In accordance with one example, a light fixture in networked lighting system accepts a lighting request transmitted by a computing device. The light fixture determines whether the lighting request is a control message or a query message and performs one or more operations in response to the lighting request depending on whether the lighting request is a control message or a query message.
As shown in
In the specific example of
The lighting management system 70 manages switch 15 and all other switches (not shown) in the networked lighting system 10. The lighting management system 70 includes the processing, networking and storage elements that are necessary to support the lighting management and, in general, may only be accessible to the building management team.
Also included in switch 15 is a lighting controller 50 that assists in the management of attached light fixtures. Lighting controller 50 comprises a processor 55 and a memory 60 that includes control logic 65. Memory 60 may comprise read only memory (ROM), random access memory (RAM), magnetic disk storage media devices, optical storage media devices, flash memory devices, electrical, optical, or other physical/tangible memory storage devices. The processor 55 is, for example, a microprocessor or microcontroller that executes instructions for the control logic 65. Thus, in general, the memory 60 may comprise one or more tangible (non-transitory) computer readable storage media (e.g., a memory device) encoded with software comprising computer executable instructions and when the software is executed (by the processor 55) it is operable to perform lighting management operations described herein.
A subset of the PoE ports 20(1)-20(N) are connected, via respective Ethernet cables 26(1)-26(N), to one or more networked light fixtures. In the example of
Networked light fixture 30(1) includes a PoE interface 80, a fixture processor 85, an array 90 of light emitters, light emitter driver(s) 95, a memory 100, and a communications interface 110. Memory 100 comprises light fixture logic 105. The light emitter array 90 includes a plurality of light emitters, such as light emitting diodes (LEDs). The memory 100 may comprise ROM, RAM, magnetic disk storage media devices, optical storage media devices, flash memory devices, electrical, optical, or other physical/tangible memory storage devices. The fixture processor 85 is, for example, a microprocessor or microcontroller that executes instructions for the light fixture logic 105. Thus, in general, the memory 100 may include one or more tangible (non-transitory) computer readable storage media (e.g., a memory device) encoded with software comprising computer executable instructions for the light fixture logic 105, and when the software is executed (by the fixture processor 85) it is operable to perform lighting management operations described herein.
Communications interface 110 is a collection of elements that enable communication with one or more computing devices. The communications interface 110 may comprise, for example, a Wi-Fi interface, 3G interface, Bluetooth interface, a visible light communication (VLC) or Li-Fi interface, network interface port, etc. Li-Fi is a mechanism that uses visual light from light emitters, such as LEDs, as a medium for wireless communication. Li-Fi operates by flashing the light emitters (i.e., rapidly switching light emitters in a transmitting device on and off) in a coded manner. The flashes of light, which represent data, are detected at one or more photodiodes in a receiving device. As such, in examples in which the communications interface 110 operates as a Li-Fi interface, the communications interface 110 includes one or more photodiodes 112. If enabled for the transmission of data, the communications interface 110 may include light emitters or, alternatively, one or more of the emitters within light emitter array 90 may be used for Li-Fi communications.
As noted, the communications interface 110 is configured to receive signals from, and possibly transmit signals to, one or more computing devices.
As shown, computing device 120 comprises four different types of wireless interfaces, including Wi-Fi interface 125(1), 3G interface 125(2), Bluetooth interface 125(3), a VLC or Li-Fi interface 125(4), and/or a Near Field Communication (NFC) interface 125(5). Each of these interfaces may be used to communicate with light fixture 30(1), depending on the configuration of communications interface 110 of the light fixture. As noted above, a Li-Fi interface, such as Li-Fi interface 125(4), includes one or more light emitters that are switched on/off to transmit data to one or more photodiodes (e.g., photodiodes 112 in light fixture 30(1)). If Li-Fi interface 125(4) is enabled to receive data, then Li-Fi interface 125(4) includes or operates with one or more photodiodes to receive visual light from a transmitter in, for example, light fixture 30(1). Computing device 120 may also a network interface port (not shown) for a hardwire connection with a network interface port of the communications interface 110. NFC allows two devices placed within close proximity (e.g., a few centimeters) of each other to exchange data. As such, NFC could be useful to enable computing device 120 to communicate with lights by, for example, tapping the phone to a table lamp or other element.
Computing device 120 further comprises a processor 130, a user interface 135, and a memory 140. Memory 140 comprises wireless lighting control logic 145. User interface 135 may take many different forms and may include, for example, a keypad, keyboard, mouse, touchscreen, display screen, etc.
Memory 140 may comprise ROM, RAM, magnetic disk storage media devices, optical storage media devices, flash memory devices, electrical, optical, or other physical/tangible memory storage devices. The processor 130 is, for example, a microprocessor or microcontroller that executes instructions for the wireless lighting control logic 145. Thus, in general, the memory 140 may comprise one or more tangible computer readable storage media (e.g., a memory device) encoded with software comprising computer executable instructions and when the software is executed (by the processor 130) it is operable to manage aspects of networked lighting system 10 through a connection, such as a wireless connection, with a light fixture.
It is also to be appreciated that
The lighting management techniques presented herein support intelligent network control of lighting functions in a space by providing active control loops for the settings of individual light fixtures, improving energy efficiency, etc. The lighting management techniques also enforce building management codes, such as exit and emergency lighting, minimum light illumination levels, etc., allow dynamic lighting policies that change, for example, upon time and season, provide conflict resolution between different lighting requests from multiple users, enable lighting access control, and provide users with the ability to control light fixtures through wireless communication with a light fixture. These and other features of the lighting management techniques are described in greater detail below with reference to the arrangement of
In accordance with certain examples, the lighting management techniques support a robust lighting request mechanism that enables a user to query (i.e., determine) or control (i.e., set) various lighting attributes of a light fixture. As used herein, lighting attributes refer to the various controllable/adjustable settings of a light fixture, such as light emitter status (e.g., on/off), emitted colors (e.g., white, red, green, blue or combinations thereof), emitted white light temperature, power settings, etc. For example, the lighting request mechanism may be used on lighting illumination to query or control the illumination level of the lighting. The lighting request mechanism could also be used to query or control the color of the lighting, query or control the lighting power use, and/or query or control whether lighting recurrence should be supported.
The lighting management techniques support the input of the location of the light when, for example, a light fixture is installed. The lighting management techniques may be subsequently used to query the location of the light fixture. Additionally, each light fixture 30(1)-30(4) may have a unique identifier (ID). The ID of the lighting can be used in many applications, such as localization. The lighting management techniques presented herein may be used to set or query the light fixture ID.
In certain examples, lighting management system 70 and or switch 15 could initiate lighting requests to the light fixtures 30(1)-30(4). In other examples, the lighting requests may be initiated by computing device 120 through a connection between the computing device and a light fixture. For example, computing device 120 could wirelessly connect to the networked lighting system 10 via a light fixture using, for example, Wi-Fi, Li-Fi, etc. and could send lighting requests for query or control of a local or remote light fixture. As used herein, a “local” light fixture refers to a light fixture that communicates directly with a computing device. A “remote” light fixture refers to a light fixture that is connected to a computing device via (though) another light fixture and part of the networked lighting system.
In the example of
Alternatively, the lighting request 160 may be a query message (i.e., a request for identification of one or more lighting attribute of the light fixture 30(1)). In such examples, the fixture processor 85 executes the light fixture logic 105 to process the lighting request 160 and send a response 165 back to the computing device 120. In such examples, the response 165 includes the requested lighting attributes.
In one specific use case of the arrangement of
If the lighting request 170 is a control message that includes light control setting(s), then the switch 15 identifies the operations to be performed by the light fixture 30(1) and generates a lighting request 175 that encodes the light control settings for execution at light fixture 30(1). In other words, the processor 55 of lighting controller 50 executes the control logic 65 to process the lighting request 170 and generate a message 175 that is sent to the light fixture 30(1) and that causes the light fixture to implement the light control settings included in the lighting request 175. The light fixture 30(1) may generate and send a response 180 to switch 15. The response 180 may be a confirmation of execution of the light control settings. The switch 15 may then generate and send a response 185 that is forwarded to computing device 120 via the light fixture 30(1).
Alternatively, the lighting request 170 may be a query message requesting identification of one or more lighting attributes of the light fixture 30(1). In such examples, the processor 55 of lighting controller 50 executes the control logic 65 to process the lighting request 170 and generate the lighting request 175 that is sent to the light fixture 30(1). In this case, the lighting request 175 acts as a trigger such that, n response, the light fixture 30(1) generates and sends a response 180 back to the switch 15 that includes the requested lighting attributes. The switch 15 may then generate and send a response 185 that includes the requested lighting attributes. The response 185 is forwarded to computing device 120 via the light fixture 30(1). The example of
If the lighting request 190 is a control message that includes light control setting(s), then the switch 15 identifies the operations to be performed by the light fixture 30(1) and generates a lighting request 195 that encodes the light control settings for execution at light fixture 30(1). In other words, the processor 55 of lighting controller 50 executes the control logic 65 to process the lighting request 190 and generate another message 195 that is sent to the light fixture 30(1) and that causes the light fixture to implement the light control settings included in the lighting request 190. The light fixture 30(1) may generate and send a response 200 that is forwarded to the computing device 120 back along the same route (i.e., via switch 15 and the lighting management system 70)). The response 200 may be a confirmation of execution of the light control settings and may be re-generated/modified at each hop.
Alternatively, the lighting request 190 may be a query message requesting identification of one or more lighting attributes of the light fixture 30(1). In such examples, the processor 55 of lighting controller 50 executes the control logic 65 to process the lighting request 190 and generate the lighting request 195 that is sent to the light fixture 30(1). In response, light fixture 30(1) generates and sends the response 200 that includes the requested lighting attributes and which is forwarded to the computing device 120 back along the same route (i.e., via switch 15 and the lighting management system 70)). As noted, the response 200 may be re-generated/modified at each hop.
The example of
In certain examples, the lighting request 210 is a control message that includes light control setting(s) for one or more of the light fixtures 30(1)-30(4). In this example, the lighting request 210 identifies which light fixtures to control, what lighting attributes to control, etc. The switch 15 authenticates the lighting request 210 and, if the message is accepted, the switch 15 sends an acknowledgment (ACK) message 215 to light fixture 30(1) acknowledging the receipt of the lighting request 210. The acknowledgement message 215 may be forwarded to the computing device 120.
Using the lighting request 210, the switch 15 identifies the involved light fixtures (i.e., the light fixtures that are to perform some operation) and the operations to be performed by each of the involved light fixtures. The switch 15 generates one or more lighting requests 220 that each encodes the light control settings of one or more of the involved light fixtures 30(1). In other words, the processor 55 of lighting controller 50 executes the control logic 65 to process the lighting request 210 and generate one or more lighting requests 220 that are sent to, in this example, light fixtures 30(1)-30(4) to cause the light fixtures to implement the light control settings identified in the lighting request 210.
As noted above,
In addition to the query/control mechanisms described above, the lighting management techniques may also support access control mechanisms that limit the ability of users to change the attributes of light fixtures. For example, shown in
The indication 244 of the attributes that each user can control may be an actual list of the controllable attributes. In other examples, the indication 244 of the attributes that each user can control may be a level or type/class control designation that corresponds to the lighting attributes that the user can control. For example, members of the building management team may be associated with a level of control (e.g., level one) that enables them to change all lighting attributes for all light fixtures. A typical employee may be associated with a level of control (e.g., level five) that enables him/her to change only minimal settings within or close to his/her workspace (e.g., turn limited number of light fixtures on/off, dim a limited number of light fixtures, etc.).
In certain examples, an access control list may change dynamically. For example, if user “A” and user “B” reserve a conference room between 1-3 PM, then both user A and user B could be dynamically added to the access control lists of the light fixtures in the conference room for the period between approximately 1 and 3 PM, thereby enabling both users control over the light fixtures in the conference during the meeting. After 3 PM, users A and B could be removed from the access control list of the light fixtures in that conference room unless requested otherwise.
The access control list mechanism may be combined with the query/control mechanism described above. For example, a user wishing to query all or some of the light fixtures in a conference room may use a computing device to send queries to the selected light fixtures. However, responses may only be generated by light fixtures in which the user is identified in the associated access control list has having the authority to query the light fixture to modify or obtain the attributes of the light fixture.
Along with the access control mechanism, the lighting management techniques presented herein are configured to support consensus-based user control of light fixtures. In accordance with one consensus-based user control example, a period of time for users to input their choices for lighting attributes of selected light fixtures may be defined. During this period, users send lighting requests to the switch 15, lighting management system 70, or other central entity that identifies the associated user's selected lighting attributes for the selected light fixtures. The central entity holds the lighting requests and, after the consensus period is timed out, the central entity calculates, based on all valid inputs (i.e., lighting requests received from authorized users), light control settings for the light fixtures. The central entity may then generate a new lighting request that is sent to the light fixtures that causes the light fixtures to take the appropriate action.
As noted, in the consensus-based user control of light fixtures, multiple lighting requests may be received and some may be in conflict with one another (e.g., some messages request to change the light fixtures to a “warmer” white light color, while other messages request to change the light fixtures to a “cooler” white light color). As such, the lighting management techniques presented herein include conflict resolution capabilities that may be used to resolve conflicts in received lighting requests. For example, users A and B may both request to change the brightness of the same light. If the timing difference between when the requests are received is below a selected or predefined time interval, then a conflict resolution mechanism may be triggered.
In one example, if both users A and B request a change, the switch could take the (weighted) average of the inputs of A and B (e.g., the decision policy can be defined by the management team such that, for example, the users with more power can have more weight when calculating the average). In other examples, the switch could reject the conflicted requests, and notify both users A and B with the rejection information of both users.
The lighting management techniques presented herein may also support management override of lighting attributes. For example, an authorized user may send lighting requests to set the attributes of a light fixture, but the lighting request includes light control settings that, for example, violate the building code or the rules set by the management team. As such, the central entity or a light fixture may be configured to reject the lighting request. The central entity or a light fixture may also send a rejection report to the user or to the management team for further review. In certain examples, the lighting request submitted by the authorized user may be held and forwarded.
Presented herein are lighting management techniques supporting lighting functions of networked light fixtures. The lighting management techniques provide active control loops for the settings of individual light fixtures to, for example, improve energy efficiency. The lighting management techniques also provide intelligence to lighting in a space and enable enforcement of building management codes, such as exit and emergency lighting, and minimum light illumination levels. The lighting management techniques may also enable the use of dynamic lighting policies (e.g., policies that change upon time and season) and provide the ability to resolve conflicts between different lighting requests from multiple users.
To summarize, in one form, a method is provided comprising: accepting, at a light fixture in networked lighting system, a lighting request, wherein the light fixture comprises a local processor and a plurality of light emitters; determining, at the light fixture, whether the lighting request is a control message or a query message; and performing, at the light fixture, one or more operations in response to the lighting request depending on whether the lighting request is a control message or a query message.
In another form, an apparatus, comprising: one or more network interface devices; a plurality of light emitters; a memory; and a processor that: accepts a lighting request, determines whether the lighting request is a control message or a query message, and performs one or more operations in response to the lighting request depending on whether the lighting request is a control message or a query message.
In still another form, one or more computer readable storage media are provided encoded with software comprising computer executable instructions and when the software is executed operable to: accept, at a light fixture in networked lighting system, a lighting request, wherein the light fixture comprises a local processor and a plurality of light emitters; determine, at the light fixture, whether the lighting request is a control message or a query message; and perform, at the light fixture, one or more operations in response to the lighting request depending on whether the lighting request is a control message or a query message.
Although the techniques are illustrated and described herein as embodied in one or more specific examples, it is nevertheless not intended to be limited to the details shown, since various modifications and structural changes may be made within the scope and range of fixtures
This application is a continuation of U.S. application Ser. No. 14/563,396, filed Dec. 8, 2014, the entirety of which is incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
Parent | 14563396 | Dec 2014 | US |
Child | 15050672 | US |