Automatic enrollment – Echelon ISI User Manual

Page 94

Advertising
background image

ISI Programmer’s Guide

92

for the device and all devices that it is connected to using the isiOpen and

isiCreate requests.

To support controlled enrollment for monitoring, a controller must also recreate
monitored connections to a device when the device overwrites on clears any

connections created by the controller. There are two cases where this may

happen. A device that supports connection replacement may overwrite a
controller connection by creating a new connection that replaces the controller

connection. Any device may overwrite a controller connection by resetting the
device to factory defaults, clearing all connections. Either case can occur if the

device supports manual enrollment and the user manually adds the device to a

connection, or if the device supports automatic enrollment and the device
automatically joins a connection. In the first case, the controller can monitor all

CSMO and CSMA messages, and silently add itself to the connection if the

connection will overwrite a monitored connection. A controller silently adds itself
by not issuing a CSMA message, but otherwise doing all the steps described in

Enrolling in a Connection

in Chapter 2 to enroll in a connection. In the second

case, the controller repeats the procedure described above to create a monitored
connection using controlled enrollment. The controller can also periodically

recover the connections from all devices in the network to ensure any monitoring

connections are still intact. If the controller discovers any missing monitoring
connections, it can recreate them. This periodic traffic should be minimized to

reduce network overhead. For example, sending one request every 10 seconds to
recover a connection should be sufficient.

Automatic Enrollment

Automatic enrollment, as described in

Enrolling in a Connection

in Chapter 2,

provides an easy way for a controller and monitored device to work together to

support event-driven updates. This provides a method that requires fewer
network transactions than controlled enrollment, and no wait states, at a cost of

at least a few hundred bytes on the monitored devices. This method requires the

monitored device to support automatic connections and connection replacement,
and also requires the device to be more involved in creating the monitored

connection, since the monitored device will determine which network variables on

the device will be connected to the controller.

For a controller to use automatic enrollment for monitoring, the controller
becomes the automatic connection host for data used by the controller. Standard

ISI profiles define standard functional profiles called

monitor points

that

controllers can use to request data to be monitored from monitored devices, and

that devices can identify as connections offered for monitoring use.

For a device to support automatic enrollment for monitoring, when a monitored

device receives a monitor point automatic invitation, the device application
follows these steps:

1. If the device supports automatic enrollment for monitoring and also

supports connection extension, the device extends the existing connection

by accepting the connection invitation. If the extension fails, the device
proceeds with the next step.

Advertising