James Kempf
Automating Building Energy Management for Accelerated Building Decarbonization: System Architecture and the Network Layer (eBook, PDF)
96,99 €
96,99 €
inkl. MwSt.
Sofort per Download lieferbar
0 °P sammeln
96,99 €
Als Download kaufen
96,99 €
inkl. MwSt.
Sofort per Download lieferbar
0 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
96,99 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
0 °P sammeln
James Kempf
Automating Building Energy Management for Accelerated Building Decarbonization: System Architecture and the Network Layer (eBook, PDF)
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Complete, up-to-date reference on system architecture for building energy management systems
Automating Building Energy Management for Accelerated Building Decarbonization delivers detailed technical information on building energy management control technology and guidelines to implementing and deploying building energy management systems. The book provides a detailed look at the system architecture of cloud-based building energy management systems, and a comprehensive review of technology for the networking layer, from the link layer through the application layer. Wired and wireless…mehr
- Geräte: PC
- mit Kopierschutz
- eBook Hilfe
- Größe: 10.39MB
Andere Kunden interessierten sich auch für
- Fuel Cell Technology (eBook, PDF)113,95 €
- Cross-Layer Design in Optical Networks (eBook, PDF)113,95 €
- P. E. GellingsExploring the Value of Electricity (eBook, PDF)87,95 €
- Przemyslaw KomarnickiGeneral Energy System (GES) of the Future (eBook, PDF)8,95 €
- Securing Electricity Supply in the Cyber Age (eBook, PDF)73,95 €
- Energy from the Biomass (eBook, PDF)619,95 €
- Geraldine MolinaBuilding Professionals Facing the Energy Efficiency Challenge (eBook, PDF)139,99 €
-
-
-
Complete, up-to-date reference on system architecture for building energy management systems
Automating Building Energy Management for Accelerated Building Decarbonization delivers detailed technical information on building energy management control technology and guidelines to implementing and deploying building energy management systems. The book provides a detailed look at the system architecture of cloud-based building energy management systems, and a comprehensive review of technology for the networking layer, from the link layer through the application layer. Wired and wireless link layer protocols, and Internet network layer protocols from the TCP/IP suite are thoroughly reviewed, and discussed in the context of deploying an in-building, operational technology network.
At the application layer, BACnet, for large commercial and government buildings, and Bluetooth Low Energy, Zigbee, and Matter, for smaller commercial and residential buildings, are discussed in detail, with focus on energy management and building decarbonization. The API standards OpenAPI 3.1 and AsyncAPI 3.0 are used to define example APIs for controlling an HVAC system, illustrating how to provide API abstractions that simplify the development of building energy management applications and services. Finally, a discussion of controlling onsite distributed energy resources, such as solar panels and on-site battery storage, through SunSpec Modbus, and communicating with the utility through OpenADR and IEEE 2030.5 provide a solid technical foundation for implementing communication services in demand response and flexible load applications.
Security is emphasized as a key property for the operational technology networks that run building energy systems up and down the stack. At the architectural level, security functions including data origin authentication, confidentiality protection, and key exchange are discussed in detail. Detailed information on security protocols including IPsec at the network layer, TLS at the transport layer, and Oauth2.0 at the application layer is presented. In addition, advice on deploying security solutions in building energy management networks is provided.
Throughout the book, QR codes provide access to short videos about topics where more depth is needed or that are only briefly covered. These allow the reader to view more information about important topics.
Automating Building Energy Management for Accelerated Building Decarbonization is an essential resource for managers, engineers, and other professionals involved in designing and building energy management services for commercial and residential buildings. It is also an excellent reference for university and training courses related to building decarbonization and renewable energy.
Automating Building Energy Management for Accelerated Building Decarbonization delivers detailed technical information on building energy management control technology and guidelines to implementing and deploying building energy management systems. The book provides a detailed look at the system architecture of cloud-based building energy management systems, and a comprehensive review of technology for the networking layer, from the link layer through the application layer. Wired and wireless link layer protocols, and Internet network layer protocols from the TCP/IP suite are thoroughly reviewed, and discussed in the context of deploying an in-building, operational technology network.
At the application layer, BACnet, for large commercial and government buildings, and Bluetooth Low Energy, Zigbee, and Matter, for smaller commercial and residential buildings, are discussed in detail, with focus on energy management and building decarbonization. The API standards OpenAPI 3.1 and AsyncAPI 3.0 are used to define example APIs for controlling an HVAC system, illustrating how to provide API abstractions that simplify the development of building energy management applications and services. Finally, a discussion of controlling onsite distributed energy resources, such as solar panels and on-site battery storage, through SunSpec Modbus, and communicating with the utility through OpenADR and IEEE 2030.5 provide a solid technical foundation for implementing communication services in demand response and flexible load applications.
Security is emphasized as a key property for the operational technology networks that run building energy systems up and down the stack. At the architectural level, security functions including data origin authentication, confidentiality protection, and key exchange are discussed in detail. Detailed information on security protocols including IPsec at the network layer, TLS at the transport layer, and Oauth2.0 at the application layer is presented. In addition, advice on deploying security solutions in building energy management networks is provided.
Throughout the book, QR codes provide access to short videos about topics where more depth is needed or that are only briefly covered. These allow the reader to view more information about important topics.
Automating Building Energy Management for Accelerated Building Decarbonization is an essential resource for managers, engineers, and other professionals involved in designing and building energy management services for commercial and residential buildings. It is also an excellent reference for university and training courses related to building decarbonization and renewable energy.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in D ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: For Dummies
- Seitenzahl: 683
- Erscheinungstermin: 30. Dezember 2024
- Englisch
- ISBN-13: 9781394203079
- Artikelnr.: 72713354
- Verlag: For Dummies
- Seitenzahl: 683
- Erscheinungstermin: 30. Dezember 2024
- Englisch
- ISBN-13: 9781394203079
- Artikelnr.: 72713354
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
James Kempf, PhD, is a Senior Consultant for Kempf and Associates Consulting, a teacher of blockchain and smart contracts at the University of California Santa Cruz Extension, and a Member of the IEEE Blockchain-Enabled Transactive Energy (BCTE) Initiative. Previously, he was Senior Principal Architect at Equinix where he led the Edge Services Innovation advanced development team and oversaw the architecture of Equinix Edge Metal as a service product.
About the Author xvii
Preface xix
Acknowledgments xxiii
Acronyms xxv
1 Introducing Grid- interactive Efficient Buildings (GEBs) 1
1.1 Scope of the Building Decarbonization Problem 2
1.2 What Are Grid- Interactive Efficient Buildings (GEBs)? 4
1.3 How Do GEBs Advance the Goal of Energy Decarbonization? 5
1.4 Characterizing Building Loads in Commercial and Residential Buildings 6
1.4.1 The Three- Dimensional Load Flexibility Criteria Space 7
1.4.2 Types of Residential and Commercial Building Loads and How to Make
Them Flexible 7
1.5 The Role of the BEMS 11
1.6 Strategies for Decarbonization and Cost Reduction 12
1.6.1 Strategies Based on Load Flexibility 12
1.6.2 Strategies Based on Utilizing Generated and Stored Renewable Energy
from Onsite DERs 13
1.7 Building Energy Impact of Flexibility Strategies 14
1.8 GEBs as a Grid Resource 16
1.8.1 Grid Impact of Flexibility Strategies 18
1.9 Building Energy Efficiency Standards 20
1.9.1 Leadership in Energy and Environmental Design 20
1.9.2 Energy Star 21
1.10 Summary 22
References 25
2 Architecture of Building Energy Management Systems 29
2.1 BEMS Functional Architecture 30
2.1.1 The Network 32
2.1.2 Sensing and Actuating Devices 38
2.1.3 Device Network and Device Network Gateway 38
2.1.4 Building Gateway 39
2.1.5 Application Layer Router 40
2.1.6 Databases 40
2.1.7 Algorithmic Building Energy Management Supervisory Control 41
2.1.8 Utility and Weather Data Scraper 42
2.1.9 Utility Alerts and Notifications 42
2.1.10 API Servers 42
2.1.11 BEMS Dashboard Backend 44
2.1.12 Frontends 44
2.1.13 Alerts and Notifications 46
2.2 BAS Generations 46
2.2.1 Vendor and Equipment Specific Silos 48
2.2.2 Integration Overlays 49
2.2.3 Horizontal Integration 52
2.3 Cybersecurity Architecture 55
2.3.1 Threat Modeling 55
2.3.2 Trust Boundaries, Threat Boundaries, and Attack Surfaces 56
2.3.3 The Zero- Trust Architectural Principle 57
2.3.4 Security Services 58
2.3.5 Cryptographic Operations 59
2.3.6 Security Technologies 62
2.3.7 Security Reference Architecture 64
2.3.8 Commissioning Security 67
2.4 The Convergence of OT and IT Systems 68
2.5 Summary 69
References 70
3 Link-Layer Protocols 75
3.1 LAN and WLAN Link- Layer Protocols 76
3.2 IEEE 802.3 (Ethernet) 77
3.2.1 Ethernet Medium Access Control 77
3.2.2 Ethernet Frame Format 79
3.2.3 Ethernet Addressing 80
3.2.4 Ethernet over Power Line 82
3.3 IEEE 802.11 (Wi- Fi) 84
3.3.1 Wi- Fi Network Deployment Architectures 85
3.3.2 Wi- Fi Physical Layer 89
3.3.3 Wi- Fi Medium Access Control 91
3.3.4 Wi- Fi Frame Format 96
3.3.5 Wi- Fi Addressing 99
3.3.6 Wi- Fi Association Protocol 101
3.4 WPAN Link- Layer Protocols 105
3.5 Ieee 802.15.4 105
3.5.1 802.15.4 Network Architecture 106
3.5.2 802.15.4 Physical Layer 108
3.5.3 802.15.4 Medium Access Control 109
3.5.4 802.15.4 Frame Format 113
3.5.5 802.15.4 Addressing 116
3.6 Bluetooth Low Energy 117
3.6.1 BLE Stack Architecture 118
3.6.2 BLE Network Architecture 119
3.6.3 BLE Physical Layer 120
3.6.4 BLE Medium Access Control 121
3.6.5 BLE Frame Format 123
3.6.6 BLE Addressing 125
3.6.7 Establishing a Connection in BLE 125
3.7 LoRa and LoRaWAN 127
3.7.1 LoRaWAN Stack Architecture 128
3.7.2 LoRaWAN Network Architecture and Network Node Types 129
3.7.3 LoRaWAN Physical Layer 131
3.7.4 LoRaWAN MAC Layer and Device Node Types 132
3.8 Cellular IoT Link- Layer Protocols 133
3.8.1 LTE Cat m 134
3.8.2 NB- IoT 135
3.9 Selecting Link- Layer Technologies for a BEMS Network 136
3.9.1 Selecting a Device Network 136
3.9.2 Selecting a Building Backhaul LAN Technology 137
3.9.3 Selecting a WAN Technology 138
3.10 Summary 139
References 140
4 The IP Stack 145
4.1 The IP Network Layer 147
4.1.1 IP Routing Overview 147
4.1.2 Internet Network Architecture 149
4.1.3 ICMP, ARP, and Neighbor Discovery 150
4.2 IPv 4 151
4.2.1 IPv4 Packet Header 152
4.2.2 IPv4 Addressing 154
4.3 IPv 6 159
4.3.1 IPv6 Header 160
4.3.2 IPv6 Addressing 161
4.4 6LoWPAN 168
4.4.1 6LoWPAN Network Architecture 169
4.4.2 6LoWPAN Header 170
4.4.3 6LoWPAN Addressing 171
4.4.4 6LoWPAN Header Compression 172
4.4.5 6LoWPAN Packet Fragmentation and Reassembly 173
4.4.6 6LoWPAN Node Configuration 174
4.4.7 6LoWPAN Mesh Routing 177
4.4.8 6LoWPAN Mesh Router Configuration 179
4.5 Transport Layer 181
4.5.1 Transport Layer Ports 181
4.6 Udp 182
4.6.1 UDP Header 183
4.6.2 Quic 184
4.7 Transmission Control Protocol 184
4.7.1 TCP Header 185
4.7.2 Procedures for Establishing and Breaking a Connection 188
4.7.3 Congestion Control Mechanisms 191
4.8 Application Layer Protocols 191
4.9 Dns 192
4.9.1 DNS Names 193
4.9.2 DNS Architecture 194
4.9.3 DNS Packet Format 196
4.9.4 Name Resolution with DNS 199
4.10 Dhcp 200
4.10.1 DHCP Message Types 202
4.10.2 DHCP Packet Format 203
4.10.3 Node Configuration Using DHCP 205
4.11 Open- Source Tools for Monitoring BEMS IP Networks 208
4.11.1 Packet Tracing with Wireshark 208
4.12 Summary 209
References 210
5 Link Layer and IP Stack Protocol Security 217
5.1 Threats to Link Layer and IP Stack Protocols 218
5.2 Link Layer Security Protocols 219
5.3 EAP and RADIUS Protocols 221
5.3.1 EAP Network Architecture 221
5.3.2 EAP Protocol 222
5.3.3 RADIUS Protocol 224
5.3.4 Generic EAP/RADIUS Authentication Protocol 226
5.4 Ethernet Security 228
5.4.1 802.1X Network Architecture 229
5.4.2 EAPOL Protocol 230
5.5 Wi- Fi Security 232
5.5.1 The Robust Security Network Architecture 233
5.5.2 Overview of the Security Association Setup Process 234
5.5.3 Authentication Algorithm Selection and Parameter Configuration 235
5.5.4 Identity Authentication, Access Control, and Pairwise Master Key
Derivation 238
5.5.5 The Four- Way Handshake 242
5.5.6 Group Key Provisioning 245
5.5.7 Commissioning Security Overview 246
5.6 802.15.4 WPAN Security 247
5.6.1 Security Fields in the 802.15.4 Packet 248
5.6.2 Auxiliary Security Header 248
5.6.3 Calculation of the Frame Payload Field in Secured Frames 250
5.6.4 Bluetooth Low Energy Security 251
5.6.5 BLE Security Modes and Levels 251
5.6.6 Pairing and Bonding Procedure 253
5.6.7 Legacy Pairing Method 255
5.6.8 Pairing Exchange Payload Format 256
5.6.9 Confidentiality and Integrity Protection 259
5.6.10 Secure Connections Method 259
5.6.11 Access Control and Privacy 262
5.7 Public Key Certificates and the Public Key Infrastructure 263
5.7.1 X.509 Certificates 264
5.7.2 Public Key Infrastructure (PKI) 265
5.8 IP Stack Security Protocols 266
5.9 Ike 267
5.9.1 Overview of the IKEv2 Protocol 267
5.9.2 IKEv2 Header 268
5.9.3 IKEv2 Payload Elements 269
5.9.4 Example IKEv2 Protocol Exchange 272
5.10 IPSec 275
5.10.1 IPSec Reference Architecture 276
5.10.2 Authentication Header (AH) 279
5.10.3 Encapsulating Security Payload (ESP) 281
5.11 Tls 284
5.11.1 TLS Overview 285
5.11.2 TLS Record Protocol Messages 286
5.11.3 TLS Handshake Protocol Messages 287
5.11.4 Example TLS 1.3 Handshake Protocol Exchange 289
5.12 Virtual Private Networks 291
5.12.1 Open Source Tools for Deploying VPNs 293
5.12.2 Open Source IPsec VPNs 293
5.12.3 Open- Source Layer 3 VPNs 294
5.13 Summary 296
References 297
6 Building Automation Stack for Large Commercial and Public Buildings 303
6.1 Introduction to the BACnet Protocol 304
6.2 The BACnet Stack Architecture 305
6.3 BACnet Link Layers 306
6.4 Ms/ Tp 307
6.4.1 MS/ TP Medium Access Control 308
6.4.2 MS/ TP Frame Format 308
6.4.3 MS/ TP Addressing 309
6.4.4 MS/ TP Frame Types 309
6.4.5 Bootstrapping the MS/ TP Link Layer 311
6.5 UDP/IPv4 Virtual Link Layer 313
6.5.1 UDP/IPv4 BVLL "Frame" Format 314
6.5.2 UDP/IPv4 BVLL Addressing 314
6.5.3 BBMD Internal Data Structures for Broadcast Control and Foreign
Device Registration 318
6.5.4 UDP/IPv4 BVLC Message Types 319
6.5.5 UDP/IPv4 BVLL Broadcast Example 321
6.6 BACnet Network Layer 323
6.6.1 BACnet Network Layer Header Format 323
6.6.2 BACnet Network Layer Addressing and Routing 324
6.6.3 Header Control field 326
6.6.4 Network Layer Management Message Types 326
6.6.5 Transmitting and Receiving Packets on BACnet Networks 331
6.6.6 Discovering a Router to a Remote Link 336
6.7 BACnet Application Layer 337
6.7.1 BACnet Objects and Object Types 337
6.7.2 Properties 338
6.7.3 Primitive, Collection, Enumeration, Sequence, and Choice Datatypes
342
6.7.4 Basic BACnet Object Types 345
6.7.5 Object Types Useful for BEMS Implementations 349
6.7.6 BACnet Event and Alarm Handling 360
6.7.7 BACnet Services 367
6.7.8 Protocol Implementation Conformance Statement (PICS) 373
6.8 BACnet Security 374
6.9 BACnet Interoperability 378
6.10 Other Protocols for Large Commercial and Public Building Automation
380
6.11 Summary 382
References 384
7 Building Automation Stacks for Residential and Small Commercial Buildings
389
7.1 Bluetooth Low Energy Application Layer 392
7.1.1 GAP and GATT Roles 393
7.1.2 UUIDs for Identifying Attributes 394
7.1.3 Att 394
7.1.4 Gatt 396
7.1.5 GATT Profiles, Services, and Characteristics for Energy Management
Applications 402
7.2 Zigbee 407
7.2.1 Zigbee Network Architecture 408
7.2.2 Zigbee Network Layer 412
7.2.3 Zigbee Security 417
7.2.4 Zigbee Application Layer and Application Support Sublayer 419
7.2.5 Zigbee Device Object 423
7.2.6 Zigbee Device Profile Clusters 424
7.2.7 Zigbee Cluster Library 425
7.2.8 Demand Response and Load Control (DLRC) Cluster 429
7.2.9 Example DRLC Cluster Event Message Exchange Scenarios 439
7.2.10 Smart Energy Profile 443
7.2.11 Interoperability Specifications 443
7.3 Matter 446
7.3.1 Thread 449
7.3.2 Matter Network Architecture 451
7.3.3 Matter Stack 453
7.3.4 Matter Data Model 454
7.3.5 Matter Fabrics and Nodes 456
7.3.6 Device Type Classification 457
7.3.7 Matter Interaction Model 457
7.3.8 Groups and Paths 458
7.3.9 Security 459
7.3.10 Device On- boarding 459
7.3.11 Matter Utility Clusters 462
7.3.12 Matter Energy Management Clusters 462
7.4 Other Smart Home Protocols 466
7.5 Summary 467
References 468
8 Application Protocols, APIs, and Architectures 473
8.1 What Is an API? 474
8.1.1 REST and RPC 475
8.2 Application Architectures 478
8.2.1 Client-Server Architecture 478
8.2.2 Event- Based Architecture 479
8.3 API Data Representation and Protocols 480
8.3.1 URIs, URNs, and URLs 481
8.3.2 HTTP and REST APIs 483
8.3.3 Mqtt 488
8.3.4 Other Message Bus Protocols for Event- Based Systems 496
8.3.5 Data Representation Languages 497
8.4 API Standards 501
8.4.1 An Example Application 502
8.4.2 OpenAPI 503
8.4.3 AsyncAPI 516
8.5 Other API Definition Frameworks 523
8.6 Zero Trust Security for APIs and Application Protocols 524
8.6.1 VPNs 524
8.6.2 Mutual TLS 525
8.6.3 Application Protocol Identity and Access Management 526
8.6.4 IAM Frameworks 532
8.6.5 Specifying IAM in OpenAPI and AsyncAPI Definitions 540
8.7 Summary 544
References 545
9 Managing DERs and the Utility Connection 551
9.1 DERs and Building- Integrated Microgrids 553
9.2 Modbus 554
9.2.1 Modbus TCP Message Format 555
9.2.2 Modbus Data Model 557
9.2.3 Modbus Function Codes and Message Types 558
9.2.4 Modbus Message Type Examples 559
9.3 SunSpec Modbus Profile 562
9.3.1 SunSpec Modbus Network Architecture 562
9.3.2 SunSpec Device Information Model Structure 563
9.3.3 Device Model Elements 563
9.3.4 SunSpec Device Information Model Stack 568
9.3.5 Model Encodings 569
9.3.6 Modbus Mapping 570
9.4 Other DER Communication Protocols 571
9.5 DER Manufacturer APIs 572
9.5.1 Enphase Enlighten API 573
9.5.2 Registering for a Developer Account and Obtaining IAM Credentials 574
9.5.3 Base URL and Request Header Format 575
9.5.4 Monitoring API 575
9.5.5 Commissioning API 582
9.5.6 Other Manufacturer Device Control APIs 583
9.6 The Utility Connection 584
9.7 OpenADR 585
9.7.1 OpenADR 3.0 Architecture 587
9.7.2 OpenADR 3.0 API 591
9.7.3 OpenADR 3.0 URL Format 591
9.7.4 OpenADR 3.0 Transport Layer Security and IAM 593
9.7.5 Creating a Subscription to an Energy Service Provider's Program and
Receiving Events 595
9.8 Ieee 2030.5 601
9.8.1 SunSpec Common Smart Inverter Profile (CSIP) 603
9.8.2 Protocol Overview 605
9.9 Other Protocols for Communicating Between the Utility and Flexible
Loads/DERs 608
9.9.1 Ansi/cta 2045 608
9.9.2 Dnp 3 609
9.10 Controlling Energy Use Based Directly on Reported Grid Marginal Carbon
Emissions 610
9.10.1 California MIDAS Server 612
9.11 Summary 616
References 617
Index 623
Preface xix
Acknowledgments xxiii
Acronyms xxv
1 Introducing Grid- interactive Efficient Buildings (GEBs) 1
1.1 Scope of the Building Decarbonization Problem 2
1.2 What Are Grid- Interactive Efficient Buildings (GEBs)? 4
1.3 How Do GEBs Advance the Goal of Energy Decarbonization? 5
1.4 Characterizing Building Loads in Commercial and Residential Buildings 6
1.4.1 The Three- Dimensional Load Flexibility Criteria Space 7
1.4.2 Types of Residential and Commercial Building Loads and How to Make
Them Flexible 7
1.5 The Role of the BEMS 11
1.6 Strategies for Decarbonization and Cost Reduction 12
1.6.1 Strategies Based on Load Flexibility 12
1.6.2 Strategies Based on Utilizing Generated and Stored Renewable Energy
from Onsite DERs 13
1.7 Building Energy Impact of Flexibility Strategies 14
1.8 GEBs as a Grid Resource 16
1.8.1 Grid Impact of Flexibility Strategies 18
1.9 Building Energy Efficiency Standards 20
1.9.1 Leadership in Energy and Environmental Design 20
1.9.2 Energy Star 21
1.10 Summary 22
References 25
2 Architecture of Building Energy Management Systems 29
2.1 BEMS Functional Architecture 30
2.1.1 The Network 32
2.1.2 Sensing and Actuating Devices 38
2.1.3 Device Network and Device Network Gateway 38
2.1.4 Building Gateway 39
2.1.5 Application Layer Router 40
2.1.6 Databases 40
2.1.7 Algorithmic Building Energy Management Supervisory Control 41
2.1.8 Utility and Weather Data Scraper 42
2.1.9 Utility Alerts and Notifications 42
2.1.10 API Servers 42
2.1.11 BEMS Dashboard Backend 44
2.1.12 Frontends 44
2.1.13 Alerts and Notifications 46
2.2 BAS Generations 46
2.2.1 Vendor and Equipment Specific Silos 48
2.2.2 Integration Overlays 49
2.2.3 Horizontal Integration 52
2.3 Cybersecurity Architecture 55
2.3.1 Threat Modeling 55
2.3.2 Trust Boundaries, Threat Boundaries, and Attack Surfaces 56
2.3.3 The Zero- Trust Architectural Principle 57
2.3.4 Security Services 58
2.3.5 Cryptographic Operations 59
2.3.6 Security Technologies 62
2.3.7 Security Reference Architecture 64
2.3.8 Commissioning Security 67
2.4 The Convergence of OT and IT Systems 68
2.5 Summary 69
References 70
3 Link-Layer Protocols 75
3.1 LAN and WLAN Link- Layer Protocols 76
3.2 IEEE 802.3 (Ethernet) 77
3.2.1 Ethernet Medium Access Control 77
3.2.2 Ethernet Frame Format 79
3.2.3 Ethernet Addressing 80
3.2.4 Ethernet over Power Line 82
3.3 IEEE 802.11 (Wi- Fi) 84
3.3.1 Wi- Fi Network Deployment Architectures 85
3.3.2 Wi- Fi Physical Layer 89
3.3.3 Wi- Fi Medium Access Control 91
3.3.4 Wi- Fi Frame Format 96
3.3.5 Wi- Fi Addressing 99
3.3.6 Wi- Fi Association Protocol 101
3.4 WPAN Link- Layer Protocols 105
3.5 Ieee 802.15.4 105
3.5.1 802.15.4 Network Architecture 106
3.5.2 802.15.4 Physical Layer 108
3.5.3 802.15.4 Medium Access Control 109
3.5.4 802.15.4 Frame Format 113
3.5.5 802.15.4 Addressing 116
3.6 Bluetooth Low Energy 117
3.6.1 BLE Stack Architecture 118
3.6.2 BLE Network Architecture 119
3.6.3 BLE Physical Layer 120
3.6.4 BLE Medium Access Control 121
3.6.5 BLE Frame Format 123
3.6.6 BLE Addressing 125
3.6.7 Establishing a Connection in BLE 125
3.7 LoRa and LoRaWAN 127
3.7.1 LoRaWAN Stack Architecture 128
3.7.2 LoRaWAN Network Architecture and Network Node Types 129
3.7.3 LoRaWAN Physical Layer 131
3.7.4 LoRaWAN MAC Layer and Device Node Types 132
3.8 Cellular IoT Link- Layer Protocols 133
3.8.1 LTE Cat m 134
3.8.2 NB- IoT 135
3.9 Selecting Link- Layer Technologies for a BEMS Network 136
3.9.1 Selecting a Device Network 136
3.9.2 Selecting a Building Backhaul LAN Technology 137
3.9.3 Selecting a WAN Technology 138
3.10 Summary 139
References 140
4 The IP Stack 145
4.1 The IP Network Layer 147
4.1.1 IP Routing Overview 147
4.1.2 Internet Network Architecture 149
4.1.3 ICMP, ARP, and Neighbor Discovery 150
4.2 IPv 4 151
4.2.1 IPv4 Packet Header 152
4.2.2 IPv4 Addressing 154
4.3 IPv 6 159
4.3.1 IPv6 Header 160
4.3.2 IPv6 Addressing 161
4.4 6LoWPAN 168
4.4.1 6LoWPAN Network Architecture 169
4.4.2 6LoWPAN Header 170
4.4.3 6LoWPAN Addressing 171
4.4.4 6LoWPAN Header Compression 172
4.4.5 6LoWPAN Packet Fragmentation and Reassembly 173
4.4.6 6LoWPAN Node Configuration 174
4.4.7 6LoWPAN Mesh Routing 177
4.4.8 6LoWPAN Mesh Router Configuration 179
4.5 Transport Layer 181
4.5.1 Transport Layer Ports 181
4.6 Udp 182
4.6.1 UDP Header 183
4.6.2 Quic 184
4.7 Transmission Control Protocol 184
4.7.1 TCP Header 185
4.7.2 Procedures for Establishing and Breaking a Connection 188
4.7.3 Congestion Control Mechanisms 191
4.8 Application Layer Protocols 191
4.9 Dns 192
4.9.1 DNS Names 193
4.9.2 DNS Architecture 194
4.9.3 DNS Packet Format 196
4.9.4 Name Resolution with DNS 199
4.10 Dhcp 200
4.10.1 DHCP Message Types 202
4.10.2 DHCP Packet Format 203
4.10.3 Node Configuration Using DHCP 205
4.11 Open- Source Tools for Monitoring BEMS IP Networks 208
4.11.1 Packet Tracing with Wireshark 208
4.12 Summary 209
References 210
5 Link Layer and IP Stack Protocol Security 217
5.1 Threats to Link Layer and IP Stack Protocols 218
5.2 Link Layer Security Protocols 219
5.3 EAP and RADIUS Protocols 221
5.3.1 EAP Network Architecture 221
5.3.2 EAP Protocol 222
5.3.3 RADIUS Protocol 224
5.3.4 Generic EAP/RADIUS Authentication Protocol 226
5.4 Ethernet Security 228
5.4.1 802.1X Network Architecture 229
5.4.2 EAPOL Protocol 230
5.5 Wi- Fi Security 232
5.5.1 The Robust Security Network Architecture 233
5.5.2 Overview of the Security Association Setup Process 234
5.5.3 Authentication Algorithm Selection and Parameter Configuration 235
5.5.4 Identity Authentication, Access Control, and Pairwise Master Key
Derivation 238
5.5.5 The Four- Way Handshake 242
5.5.6 Group Key Provisioning 245
5.5.7 Commissioning Security Overview 246
5.6 802.15.4 WPAN Security 247
5.6.1 Security Fields in the 802.15.4 Packet 248
5.6.2 Auxiliary Security Header 248
5.6.3 Calculation of the Frame Payload Field in Secured Frames 250
5.6.4 Bluetooth Low Energy Security 251
5.6.5 BLE Security Modes and Levels 251
5.6.6 Pairing and Bonding Procedure 253
5.6.7 Legacy Pairing Method 255
5.6.8 Pairing Exchange Payload Format 256
5.6.9 Confidentiality and Integrity Protection 259
5.6.10 Secure Connections Method 259
5.6.11 Access Control and Privacy 262
5.7 Public Key Certificates and the Public Key Infrastructure 263
5.7.1 X.509 Certificates 264
5.7.2 Public Key Infrastructure (PKI) 265
5.8 IP Stack Security Protocols 266
5.9 Ike 267
5.9.1 Overview of the IKEv2 Protocol 267
5.9.2 IKEv2 Header 268
5.9.3 IKEv2 Payload Elements 269
5.9.4 Example IKEv2 Protocol Exchange 272
5.10 IPSec 275
5.10.1 IPSec Reference Architecture 276
5.10.2 Authentication Header (AH) 279
5.10.3 Encapsulating Security Payload (ESP) 281
5.11 Tls 284
5.11.1 TLS Overview 285
5.11.2 TLS Record Protocol Messages 286
5.11.3 TLS Handshake Protocol Messages 287
5.11.4 Example TLS 1.3 Handshake Protocol Exchange 289
5.12 Virtual Private Networks 291
5.12.1 Open Source Tools for Deploying VPNs 293
5.12.2 Open Source IPsec VPNs 293
5.12.3 Open- Source Layer 3 VPNs 294
5.13 Summary 296
References 297
6 Building Automation Stack for Large Commercial and Public Buildings 303
6.1 Introduction to the BACnet Protocol 304
6.2 The BACnet Stack Architecture 305
6.3 BACnet Link Layers 306
6.4 Ms/ Tp 307
6.4.1 MS/ TP Medium Access Control 308
6.4.2 MS/ TP Frame Format 308
6.4.3 MS/ TP Addressing 309
6.4.4 MS/ TP Frame Types 309
6.4.5 Bootstrapping the MS/ TP Link Layer 311
6.5 UDP/IPv4 Virtual Link Layer 313
6.5.1 UDP/IPv4 BVLL "Frame" Format 314
6.5.2 UDP/IPv4 BVLL Addressing 314
6.5.3 BBMD Internal Data Structures for Broadcast Control and Foreign
Device Registration 318
6.5.4 UDP/IPv4 BVLC Message Types 319
6.5.5 UDP/IPv4 BVLL Broadcast Example 321
6.6 BACnet Network Layer 323
6.6.1 BACnet Network Layer Header Format 323
6.6.2 BACnet Network Layer Addressing and Routing 324
6.6.3 Header Control field 326
6.6.4 Network Layer Management Message Types 326
6.6.5 Transmitting and Receiving Packets on BACnet Networks 331
6.6.6 Discovering a Router to a Remote Link 336
6.7 BACnet Application Layer 337
6.7.1 BACnet Objects and Object Types 337
6.7.2 Properties 338
6.7.3 Primitive, Collection, Enumeration, Sequence, and Choice Datatypes
342
6.7.4 Basic BACnet Object Types 345
6.7.5 Object Types Useful for BEMS Implementations 349
6.7.6 BACnet Event and Alarm Handling 360
6.7.7 BACnet Services 367
6.7.8 Protocol Implementation Conformance Statement (PICS) 373
6.8 BACnet Security 374
6.9 BACnet Interoperability 378
6.10 Other Protocols for Large Commercial and Public Building Automation
380
6.11 Summary 382
References 384
7 Building Automation Stacks for Residential and Small Commercial Buildings
389
7.1 Bluetooth Low Energy Application Layer 392
7.1.1 GAP and GATT Roles 393
7.1.2 UUIDs for Identifying Attributes 394
7.1.3 Att 394
7.1.4 Gatt 396
7.1.5 GATT Profiles, Services, and Characteristics for Energy Management
Applications 402
7.2 Zigbee 407
7.2.1 Zigbee Network Architecture 408
7.2.2 Zigbee Network Layer 412
7.2.3 Zigbee Security 417
7.2.4 Zigbee Application Layer and Application Support Sublayer 419
7.2.5 Zigbee Device Object 423
7.2.6 Zigbee Device Profile Clusters 424
7.2.7 Zigbee Cluster Library 425
7.2.8 Demand Response and Load Control (DLRC) Cluster 429
7.2.9 Example DRLC Cluster Event Message Exchange Scenarios 439
7.2.10 Smart Energy Profile 443
7.2.11 Interoperability Specifications 443
7.3 Matter 446
7.3.1 Thread 449
7.3.2 Matter Network Architecture 451
7.3.3 Matter Stack 453
7.3.4 Matter Data Model 454
7.3.5 Matter Fabrics and Nodes 456
7.3.6 Device Type Classification 457
7.3.7 Matter Interaction Model 457
7.3.8 Groups and Paths 458
7.3.9 Security 459
7.3.10 Device On- boarding 459
7.3.11 Matter Utility Clusters 462
7.3.12 Matter Energy Management Clusters 462
7.4 Other Smart Home Protocols 466
7.5 Summary 467
References 468
8 Application Protocols, APIs, and Architectures 473
8.1 What Is an API? 474
8.1.1 REST and RPC 475
8.2 Application Architectures 478
8.2.1 Client-Server Architecture 478
8.2.2 Event- Based Architecture 479
8.3 API Data Representation and Protocols 480
8.3.1 URIs, URNs, and URLs 481
8.3.2 HTTP and REST APIs 483
8.3.3 Mqtt 488
8.3.4 Other Message Bus Protocols for Event- Based Systems 496
8.3.5 Data Representation Languages 497
8.4 API Standards 501
8.4.1 An Example Application 502
8.4.2 OpenAPI 503
8.4.3 AsyncAPI 516
8.5 Other API Definition Frameworks 523
8.6 Zero Trust Security for APIs and Application Protocols 524
8.6.1 VPNs 524
8.6.2 Mutual TLS 525
8.6.3 Application Protocol Identity and Access Management 526
8.6.4 IAM Frameworks 532
8.6.5 Specifying IAM in OpenAPI and AsyncAPI Definitions 540
8.7 Summary 544
References 545
9 Managing DERs and the Utility Connection 551
9.1 DERs and Building- Integrated Microgrids 553
9.2 Modbus 554
9.2.1 Modbus TCP Message Format 555
9.2.2 Modbus Data Model 557
9.2.3 Modbus Function Codes and Message Types 558
9.2.4 Modbus Message Type Examples 559
9.3 SunSpec Modbus Profile 562
9.3.1 SunSpec Modbus Network Architecture 562
9.3.2 SunSpec Device Information Model Structure 563
9.3.3 Device Model Elements 563
9.3.4 SunSpec Device Information Model Stack 568
9.3.5 Model Encodings 569
9.3.6 Modbus Mapping 570
9.4 Other DER Communication Protocols 571
9.5 DER Manufacturer APIs 572
9.5.1 Enphase Enlighten API 573
9.5.2 Registering for a Developer Account and Obtaining IAM Credentials 574
9.5.3 Base URL and Request Header Format 575
9.5.4 Monitoring API 575
9.5.5 Commissioning API 582
9.5.6 Other Manufacturer Device Control APIs 583
9.6 The Utility Connection 584
9.7 OpenADR 585
9.7.1 OpenADR 3.0 Architecture 587
9.7.2 OpenADR 3.0 API 591
9.7.3 OpenADR 3.0 URL Format 591
9.7.4 OpenADR 3.0 Transport Layer Security and IAM 593
9.7.5 Creating a Subscription to an Energy Service Provider's Program and
Receiving Events 595
9.8 Ieee 2030.5 601
9.8.1 SunSpec Common Smart Inverter Profile (CSIP) 603
9.8.2 Protocol Overview 605
9.9 Other Protocols for Communicating Between the Utility and Flexible
Loads/DERs 608
9.9.1 Ansi/cta 2045 608
9.9.2 Dnp 3 609
9.10 Controlling Energy Use Based Directly on Reported Grid Marginal Carbon
Emissions 610
9.10.1 California MIDAS Server 612
9.11 Summary 616
References 617
Index 623
About the Author xvii
Preface xix
Acknowledgments xxiii
Acronyms xxv
1 Introducing Grid- interactive Efficient Buildings (GEBs) 1
1.1 Scope of the Building Decarbonization Problem 2
1.2 What Are Grid- Interactive Efficient Buildings (GEBs)? 4
1.3 How Do GEBs Advance the Goal of Energy Decarbonization? 5
1.4 Characterizing Building Loads in Commercial and Residential Buildings 6
1.4.1 The Three- Dimensional Load Flexibility Criteria Space 7
1.4.2 Types of Residential and Commercial Building Loads and How to Make
Them Flexible 7
1.5 The Role of the BEMS 11
1.6 Strategies for Decarbonization and Cost Reduction 12
1.6.1 Strategies Based on Load Flexibility 12
1.6.2 Strategies Based on Utilizing Generated and Stored Renewable Energy
from Onsite DERs 13
1.7 Building Energy Impact of Flexibility Strategies 14
1.8 GEBs as a Grid Resource 16
1.8.1 Grid Impact of Flexibility Strategies 18
1.9 Building Energy Efficiency Standards 20
1.9.1 Leadership in Energy and Environmental Design 20
1.9.2 Energy Star 21
1.10 Summary 22
References 25
2 Architecture of Building Energy Management Systems 29
2.1 BEMS Functional Architecture 30
2.1.1 The Network 32
2.1.2 Sensing and Actuating Devices 38
2.1.3 Device Network and Device Network Gateway 38
2.1.4 Building Gateway 39
2.1.5 Application Layer Router 40
2.1.6 Databases 40
2.1.7 Algorithmic Building Energy Management Supervisory Control 41
2.1.8 Utility and Weather Data Scraper 42
2.1.9 Utility Alerts and Notifications 42
2.1.10 API Servers 42
2.1.11 BEMS Dashboard Backend 44
2.1.12 Frontends 44
2.1.13 Alerts and Notifications 46
2.2 BAS Generations 46
2.2.1 Vendor and Equipment Specific Silos 48
2.2.2 Integration Overlays 49
2.2.3 Horizontal Integration 52
2.3 Cybersecurity Architecture 55
2.3.1 Threat Modeling 55
2.3.2 Trust Boundaries, Threat Boundaries, and Attack Surfaces 56
2.3.3 The Zero- Trust Architectural Principle 57
2.3.4 Security Services 58
2.3.5 Cryptographic Operations 59
2.3.6 Security Technologies 62
2.3.7 Security Reference Architecture 64
2.3.8 Commissioning Security 67
2.4 The Convergence of OT and IT Systems 68
2.5 Summary 69
References 70
3 Link-Layer Protocols 75
3.1 LAN and WLAN Link- Layer Protocols 76
3.2 IEEE 802.3 (Ethernet) 77
3.2.1 Ethernet Medium Access Control 77
3.2.2 Ethernet Frame Format 79
3.2.3 Ethernet Addressing 80
3.2.4 Ethernet over Power Line 82
3.3 IEEE 802.11 (Wi- Fi) 84
3.3.1 Wi- Fi Network Deployment Architectures 85
3.3.2 Wi- Fi Physical Layer 89
3.3.3 Wi- Fi Medium Access Control 91
3.3.4 Wi- Fi Frame Format 96
3.3.5 Wi- Fi Addressing 99
3.3.6 Wi- Fi Association Protocol 101
3.4 WPAN Link- Layer Protocols 105
3.5 Ieee 802.15.4 105
3.5.1 802.15.4 Network Architecture 106
3.5.2 802.15.4 Physical Layer 108
3.5.3 802.15.4 Medium Access Control 109
3.5.4 802.15.4 Frame Format 113
3.5.5 802.15.4 Addressing 116
3.6 Bluetooth Low Energy 117
3.6.1 BLE Stack Architecture 118
3.6.2 BLE Network Architecture 119
3.6.3 BLE Physical Layer 120
3.6.4 BLE Medium Access Control 121
3.6.5 BLE Frame Format 123
3.6.6 BLE Addressing 125
3.6.7 Establishing a Connection in BLE 125
3.7 LoRa and LoRaWAN 127
3.7.1 LoRaWAN Stack Architecture 128
3.7.2 LoRaWAN Network Architecture and Network Node Types 129
3.7.3 LoRaWAN Physical Layer 131
3.7.4 LoRaWAN MAC Layer and Device Node Types 132
3.8 Cellular IoT Link- Layer Protocols 133
3.8.1 LTE Cat m 134
3.8.2 NB- IoT 135
3.9 Selecting Link- Layer Technologies for a BEMS Network 136
3.9.1 Selecting a Device Network 136
3.9.2 Selecting a Building Backhaul LAN Technology 137
3.9.3 Selecting a WAN Technology 138
3.10 Summary 139
References 140
4 The IP Stack 145
4.1 The IP Network Layer 147
4.1.1 IP Routing Overview 147
4.1.2 Internet Network Architecture 149
4.1.3 ICMP, ARP, and Neighbor Discovery 150
4.2 IPv 4 151
4.2.1 IPv4 Packet Header 152
4.2.2 IPv4 Addressing 154
4.3 IPv 6 159
4.3.1 IPv6 Header 160
4.3.2 IPv6 Addressing 161
4.4 6LoWPAN 168
4.4.1 6LoWPAN Network Architecture 169
4.4.2 6LoWPAN Header 170
4.4.3 6LoWPAN Addressing 171
4.4.4 6LoWPAN Header Compression 172
4.4.5 6LoWPAN Packet Fragmentation and Reassembly 173
4.4.6 6LoWPAN Node Configuration 174
4.4.7 6LoWPAN Mesh Routing 177
4.4.8 6LoWPAN Mesh Router Configuration 179
4.5 Transport Layer 181
4.5.1 Transport Layer Ports 181
4.6 Udp 182
4.6.1 UDP Header 183
4.6.2 Quic 184
4.7 Transmission Control Protocol 184
4.7.1 TCP Header 185
4.7.2 Procedures for Establishing and Breaking a Connection 188
4.7.3 Congestion Control Mechanisms 191
4.8 Application Layer Protocols 191
4.9 Dns 192
4.9.1 DNS Names 193
4.9.2 DNS Architecture 194
4.9.3 DNS Packet Format 196
4.9.4 Name Resolution with DNS 199
4.10 Dhcp 200
4.10.1 DHCP Message Types 202
4.10.2 DHCP Packet Format 203
4.10.3 Node Configuration Using DHCP 205
4.11 Open- Source Tools for Monitoring BEMS IP Networks 208
4.11.1 Packet Tracing with Wireshark 208
4.12 Summary 209
References 210
5 Link Layer and IP Stack Protocol Security 217
5.1 Threats to Link Layer and IP Stack Protocols 218
5.2 Link Layer Security Protocols 219
5.3 EAP and RADIUS Protocols 221
5.3.1 EAP Network Architecture 221
5.3.2 EAP Protocol 222
5.3.3 RADIUS Protocol 224
5.3.4 Generic EAP/RADIUS Authentication Protocol 226
5.4 Ethernet Security 228
5.4.1 802.1X Network Architecture 229
5.4.2 EAPOL Protocol 230
5.5 Wi- Fi Security 232
5.5.1 The Robust Security Network Architecture 233
5.5.2 Overview of the Security Association Setup Process 234
5.5.3 Authentication Algorithm Selection and Parameter Configuration 235
5.5.4 Identity Authentication, Access Control, and Pairwise Master Key
Derivation 238
5.5.5 The Four- Way Handshake 242
5.5.6 Group Key Provisioning 245
5.5.7 Commissioning Security Overview 246
5.6 802.15.4 WPAN Security 247
5.6.1 Security Fields in the 802.15.4 Packet 248
5.6.2 Auxiliary Security Header 248
5.6.3 Calculation of the Frame Payload Field in Secured Frames 250
5.6.4 Bluetooth Low Energy Security 251
5.6.5 BLE Security Modes and Levels 251
5.6.6 Pairing and Bonding Procedure 253
5.6.7 Legacy Pairing Method 255
5.6.8 Pairing Exchange Payload Format 256
5.6.9 Confidentiality and Integrity Protection 259
5.6.10 Secure Connections Method 259
5.6.11 Access Control and Privacy 262
5.7 Public Key Certificates and the Public Key Infrastructure 263
5.7.1 X.509 Certificates 264
5.7.2 Public Key Infrastructure (PKI) 265
5.8 IP Stack Security Protocols 266
5.9 Ike 267
5.9.1 Overview of the IKEv2 Protocol 267
5.9.2 IKEv2 Header 268
5.9.3 IKEv2 Payload Elements 269
5.9.4 Example IKEv2 Protocol Exchange 272
5.10 IPSec 275
5.10.1 IPSec Reference Architecture 276
5.10.2 Authentication Header (AH) 279
5.10.3 Encapsulating Security Payload (ESP) 281
5.11 Tls 284
5.11.1 TLS Overview 285
5.11.2 TLS Record Protocol Messages 286
5.11.3 TLS Handshake Protocol Messages 287
5.11.4 Example TLS 1.3 Handshake Protocol Exchange 289
5.12 Virtual Private Networks 291
5.12.1 Open Source Tools for Deploying VPNs 293
5.12.2 Open Source IPsec VPNs 293
5.12.3 Open- Source Layer 3 VPNs 294
5.13 Summary 296
References 297
6 Building Automation Stack for Large Commercial and Public Buildings 303
6.1 Introduction to the BACnet Protocol 304
6.2 The BACnet Stack Architecture 305
6.3 BACnet Link Layers 306
6.4 Ms/ Tp 307
6.4.1 MS/ TP Medium Access Control 308
6.4.2 MS/ TP Frame Format 308
6.4.3 MS/ TP Addressing 309
6.4.4 MS/ TP Frame Types 309
6.4.5 Bootstrapping the MS/ TP Link Layer 311
6.5 UDP/IPv4 Virtual Link Layer 313
6.5.1 UDP/IPv4 BVLL "Frame" Format 314
6.5.2 UDP/IPv4 BVLL Addressing 314
6.5.3 BBMD Internal Data Structures for Broadcast Control and Foreign
Device Registration 318
6.5.4 UDP/IPv4 BVLC Message Types 319
6.5.5 UDP/IPv4 BVLL Broadcast Example 321
6.6 BACnet Network Layer 323
6.6.1 BACnet Network Layer Header Format 323
6.6.2 BACnet Network Layer Addressing and Routing 324
6.6.3 Header Control field 326
6.6.4 Network Layer Management Message Types 326
6.6.5 Transmitting and Receiving Packets on BACnet Networks 331
6.6.6 Discovering a Router to a Remote Link 336
6.7 BACnet Application Layer 337
6.7.1 BACnet Objects and Object Types 337
6.7.2 Properties 338
6.7.3 Primitive, Collection, Enumeration, Sequence, and Choice Datatypes
342
6.7.4 Basic BACnet Object Types 345
6.7.5 Object Types Useful for BEMS Implementations 349
6.7.6 BACnet Event and Alarm Handling 360
6.7.7 BACnet Services 367
6.7.8 Protocol Implementation Conformance Statement (PICS) 373
6.8 BACnet Security 374
6.9 BACnet Interoperability 378
6.10 Other Protocols for Large Commercial and Public Building Automation
380
6.11 Summary 382
References 384
7 Building Automation Stacks for Residential and Small Commercial Buildings
389
7.1 Bluetooth Low Energy Application Layer 392
7.1.1 GAP and GATT Roles 393
7.1.2 UUIDs for Identifying Attributes 394
7.1.3 Att 394
7.1.4 Gatt 396
7.1.5 GATT Profiles, Services, and Characteristics for Energy Management
Applications 402
7.2 Zigbee 407
7.2.1 Zigbee Network Architecture 408
7.2.2 Zigbee Network Layer 412
7.2.3 Zigbee Security 417
7.2.4 Zigbee Application Layer and Application Support Sublayer 419
7.2.5 Zigbee Device Object 423
7.2.6 Zigbee Device Profile Clusters 424
7.2.7 Zigbee Cluster Library 425
7.2.8 Demand Response and Load Control (DLRC) Cluster 429
7.2.9 Example DRLC Cluster Event Message Exchange Scenarios 439
7.2.10 Smart Energy Profile 443
7.2.11 Interoperability Specifications 443
7.3 Matter 446
7.3.1 Thread 449
7.3.2 Matter Network Architecture 451
7.3.3 Matter Stack 453
7.3.4 Matter Data Model 454
7.3.5 Matter Fabrics and Nodes 456
7.3.6 Device Type Classification 457
7.3.7 Matter Interaction Model 457
7.3.8 Groups and Paths 458
7.3.9 Security 459
7.3.10 Device On- boarding 459
7.3.11 Matter Utility Clusters 462
7.3.12 Matter Energy Management Clusters 462
7.4 Other Smart Home Protocols 466
7.5 Summary 467
References 468
8 Application Protocols, APIs, and Architectures 473
8.1 What Is an API? 474
8.1.1 REST and RPC 475
8.2 Application Architectures 478
8.2.1 Client-Server Architecture 478
8.2.2 Event- Based Architecture 479
8.3 API Data Representation and Protocols 480
8.3.1 URIs, URNs, and URLs 481
8.3.2 HTTP and REST APIs 483
8.3.3 Mqtt 488
8.3.4 Other Message Bus Protocols for Event- Based Systems 496
8.3.5 Data Representation Languages 497
8.4 API Standards 501
8.4.1 An Example Application 502
8.4.2 OpenAPI 503
8.4.3 AsyncAPI 516
8.5 Other API Definition Frameworks 523
8.6 Zero Trust Security for APIs and Application Protocols 524
8.6.1 VPNs 524
8.6.2 Mutual TLS 525
8.6.3 Application Protocol Identity and Access Management 526
8.6.4 IAM Frameworks 532
8.6.5 Specifying IAM in OpenAPI and AsyncAPI Definitions 540
8.7 Summary 544
References 545
9 Managing DERs and the Utility Connection 551
9.1 DERs and Building- Integrated Microgrids 553
9.2 Modbus 554
9.2.1 Modbus TCP Message Format 555
9.2.2 Modbus Data Model 557
9.2.3 Modbus Function Codes and Message Types 558
9.2.4 Modbus Message Type Examples 559
9.3 SunSpec Modbus Profile 562
9.3.1 SunSpec Modbus Network Architecture 562
9.3.2 SunSpec Device Information Model Structure 563
9.3.3 Device Model Elements 563
9.3.4 SunSpec Device Information Model Stack 568
9.3.5 Model Encodings 569
9.3.6 Modbus Mapping 570
9.4 Other DER Communication Protocols 571
9.5 DER Manufacturer APIs 572
9.5.1 Enphase Enlighten API 573
9.5.2 Registering for a Developer Account and Obtaining IAM Credentials 574
9.5.3 Base URL and Request Header Format 575
9.5.4 Monitoring API 575
9.5.5 Commissioning API 582
9.5.6 Other Manufacturer Device Control APIs 583
9.6 The Utility Connection 584
9.7 OpenADR 585
9.7.1 OpenADR 3.0 Architecture 587
9.7.2 OpenADR 3.0 API 591
9.7.3 OpenADR 3.0 URL Format 591
9.7.4 OpenADR 3.0 Transport Layer Security and IAM 593
9.7.5 Creating a Subscription to an Energy Service Provider's Program and
Receiving Events 595
9.8 Ieee 2030.5 601
9.8.1 SunSpec Common Smart Inverter Profile (CSIP) 603
9.8.2 Protocol Overview 605
9.9 Other Protocols for Communicating Between the Utility and Flexible
Loads/DERs 608
9.9.1 Ansi/cta 2045 608
9.9.2 Dnp 3 609
9.10 Controlling Energy Use Based Directly on Reported Grid Marginal Carbon
Emissions 610
9.10.1 California MIDAS Server 612
9.11 Summary 616
References 617
Index 623
Preface xix
Acknowledgments xxiii
Acronyms xxv
1 Introducing Grid- interactive Efficient Buildings (GEBs) 1
1.1 Scope of the Building Decarbonization Problem 2
1.2 What Are Grid- Interactive Efficient Buildings (GEBs)? 4
1.3 How Do GEBs Advance the Goal of Energy Decarbonization? 5
1.4 Characterizing Building Loads in Commercial and Residential Buildings 6
1.4.1 The Three- Dimensional Load Flexibility Criteria Space 7
1.4.2 Types of Residential and Commercial Building Loads and How to Make
Them Flexible 7
1.5 The Role of the BEMS 11
1.6 Strategies for Decarbonization and Cost Reduction 12
1.6.1 Strategies Based on Load Flexibility 12
1.6.2 Strategies Based on Utilizing Generated and Stored Renewable Energy
from Onsite DERs 13
1.7 Building Energy Impact of Flexibility Strategies 14
1.8 GEBs as a Grid Resource 16
1.8.1 Grid Impact of Flexibility Strategies 18
1.9 Building Energy Efficiency Standards 20
1.9.1 Leadership in Energy and Environmental Design 20
1.9.2 Energy Star 21
1.10 Summary 22
References 25
2 Architecture of Building Energy Management Systems 29
2.1 BEMS Functional Architecture 30
2.1.1 The Network 32
2.1.2 Sensing and Actuating Devices 38
2.1.3 Device Network and Device Network Gateway 38
2.1.4 Building Gateway 39
2.1.5 Application Layer Router 40
2.1.6 Databases 40
2.1.7 Algorithmic Building Energy Management Supervisory Control 41
2.1.8 Utility and Weather Data Scraper 42
2.1.9 Utility Alerts and Notifications 42
2.1.10 API Servers 42
2.1.11 BEMS Dashboard Backend 44
2.1.12 Frontends 44
2.1.13 Alerts and Notifications 46
2.2 BAS Generations 46
2.2.1 Vendor and Equipment Specific Silos 48
2.2.2 Integration Overlays 49
2.2.3 Horizontal Integration 52
2.3 Cybersecurity Architecture 55
2.3.1 Threat Modeling 55
2.3.2 Trust Boundaries, Threat Boundaries, and Attack Surfaces 56
2.3.3 The Zero- Trust Architectural Principle 57
2.3.4 Security Services 58
2.3.5 Cryptographic Operations 59
2.3.6 Security Technologies 62
2.3.7 Security Reference Architecture 64
2.3.8 Commissioning Security 67
2.4 The Convergence of OT and IT Systems 68
2.5 Summary 69
References 70
3 Link-Layer Protocols 75
3.1 LAN and WLAN Link- Layer Protocols 76
3.2 IEEE 802.3 (Ethernet) 77
3.2.1 Ethernet Medium Access Control 77
3.2.2 Ethernet Frame Format 79
3.2.3 Ethernet Addressing 80
3.2.4 Ethernet over Power Line 82
3.3 IEEE 802.11 (Wi- Fi) 84
3.3.1 Wi- Fi Network Deployment Architectures 85
3.3.2 Wi- Fi Physical Layer 89
3.3.3 Wi- Fi Medium Access Control 91
3.3.4 Wi- Fi Frame Format 96
3.3.5 Wi- Fi Addressing 99
3.3.6 Wi- Fi Association Protocol 101
3.4 WPAN Link- Layer Protocols 105
3.5 Ieee 802.15.4 105
3.5.1 802.15.4 Network Architecture 106
3.5.2 802.15.4 Physical Layer 108
3.5.3 802.15.4 Medium Access Control 109
3.5.4 802.15.4 Frame Format 113
3.5.5 802.15.4 Addressing 116
3.6 Bluetooth Low Energy 117
3.6.1 BLE Stack Architecture 118
3.6.2 BLE Network Architecture 119
3.6.3 BLE Physical Layer 120
3.6.4 BLE Medium Access Control 121
3.6.5 BLE Frame Format 123
3.6.6 BLE Addressing 125
3.6.7 Establishing a Connection in BLE 125
3.7 LoRa and LoRaWAN 127
3.7.1 LoRaWAN Stack Architecture 128
3.7.2 LoRaWAN Network Architecture and Network Node Types 129
3.7.3 LoRaWAN Physical Layer 131
3.7.4 LoRaWAN MAC Layer and Device Node Types 132
3.8 Cellular IoT Link- Layer Protocols 133
3.8.1 LTE Cat m 134
3.8.2 NB- IoT 135
3.9 Selecting Link- Layer Technologies for a BEMS Network 136
3.9.1 Selecting a Device Network 136
3.9.2 Selecting a Building Backhaul LAN Technology 137
3.9.3 Selecting a WAN Technology 138
3.10 Summary 139
References 140
4 The IP Stack 145
4.1 The IP Network Layer 147
4.1.1 IP Routing Overview 147
4.1.2 Internet Network Architecture 149
4.1.3 ICMP, ARP, and Neighbor Discovery 150
4.2 IPv 4 151
4.2.1 IPv4 Packet Header 152
4.2.2 IPv4 Addressing 154
4.3 IPv 6 159
4.3.1 IPv6 Header 160
4.3.2 IPv6 Addressing 161
4.4 6LoWPAN 168
4.4.1 6LoWPAN Network Architecture 169
4.4.2 6LoWPAN Header 170
4.4.3 6LoWPAN Addressing 171
4.4.4 6LoWPAN Header Compression 172
4.4.5 6LoWPAN Packet Fragmentation and Reassembly 173
4.4.6 6LoWPAN Node Configuration 174
4.4.7 6LoWPAN Mesh Routing 177
4.4.8 6LoWPAN Mesh Router Configuration 179
4.5 Transport Layer 181
4.5.1 Transport Layer Ports 181
4.6 Udp 182
4.6.1 UDP Header 183
4.6.2 Quic 184
4.7 Transmission Control Protocol 184
4.7.1 TCP Header 185
4.7.2 Procedures for Establishing and Breaking a Connection 188
4.7.3 Congestion Control Mechanisms 191
4.8 Application Layer Protocols 191
4.9 Dns 192
4.9.1 DNS Names 193
4.9.2 DNS Architecture 194
4.9.3 DNS Packet Format 196
4.9.4 Name Resolution with DNS 199
4.10 Dhcp 200
4.10.1 DHCP Message Types 202
4.10.2 DHCP Packet Format 203
4.10.3 Node Configuration Using DHCP 205
4.11 Open- Source Tools for Monitoring BEMS IP Networks 208
4.11.1 Packet Tracing with Wireshark 208
4.12 Summary 209
References 210
5 Link Layer and IP Stack Protocol Security 217
5.1 Threats to Link Layer and IP Stack Protocols 218
5.2 Link Layer Security Protocols 219
5.3 EAP and RADIUS Protocols 221
5.3.1 EAP Network Architecture 221
5.3.2 EAP Protocol 222
5.3.3 RADIUS Protocol 224
5.3.4 Generic EAP/RADIUS Authentication Protocol 226
5.4 Ethernet Security 228
5.4.1 802.1X Network Architecture 229
5.4.2 EAPOL Protocol 230
5.5 Wi- Fi Security 232
5.5.1 The Robust Security Network Architecture 233
5.5.2 Overview of the Security Association Setup Process 234
5.5.3 Authentication Algorithm Selection and Parameter Configuration 235
5.5.4 Identity Authentication, Access Control, and Pairwise Master Key
Derivation 238
5.5.5 The Four- Way Handshake 242
5.5.6 Group Key Provisioning 245
5.5.7 Commissioning Security Overview 246
5.6 802.15.4 WPAN Security 247
5.6.1 Security Fields in the 802.15.4 Packet 248
5.6.2 Auxiliary Security Header 248
5.6.3 Calculation of the Frame Payload Field in Secured Frames 250
5.6.4 Bluetooth Low Energy Security 251
5.6.5 BLE Security Modes and Levels 251
5.6.6 Pairing and Bonding Procedure 253
5.6.7 Legacy Pairing Method 255
5.6.8 Pairing Exchange Payload Format 256
5.6.9 Confidentiality and Integrity Protection 259
5.6.10 Secure Connections Method 259
5.6.11 Access Control and Privacy 262
5.7 Public Key Certificates and the Public Key Infrastructure 263
5.7.1 X.509 Certificates 264
5.7.2 Public Key Infrastructure (PKI) 265
5.8 IP Stack Security Protocols 266
5.9 Ike 267
5.9.1 Overview of the IKEv2 Protocol 267
5.9.2 IKEv2 Header 268
5.9.3 IKEv2 Payload Elements 269
5.9.4 Example IKEv2 Protocol Exchange 272
5.10 IPSec 275
5.10.1 IPSec Reference Architecture 276
5.10.2 Authentication Header (AH) 279
5.10.3 Encapsulating Security Payload (ESP) 281
5.11 Tls 284
5.11.1 TLS Overview 285
5.11.2 TLS Record Protocol Messages 286
5.11.3 TLS Handshake Protocol Messages 287
5.11.4 Example TLS 1.3 Handshake Protocol Exchange 289
5.12 Virtual Private Networks 291
5.12.1 Open Source Tools for Deploying VPNs 293
5.12.2 Open Source IPsec VPNs 293
5.12.3 Open- Source Layer 3 VPNs 294
5.13 Summary 296
References 297
6 Building Automation Stack for Large Commercial and Public Buildings 303
6.1 Introduction to the BACnet Protocol 304
6.2 The BACnet Stack Architecture 305
6.3 BACnet Link Layers 306
6.4 Ms/ Tp 307
6.4.1 MS/ TP Medium Access Control 308
6.4.2 MS/ TP Frame Format 308
6.4.3 MS/ TP Addressing 309
6.4.4 MS/ TP Frame Types 309
6.4.5 Bootstrapping the MS/ TP Link Layer 311
6.5 UDP/IPv4 Virtual Link Layer 313
6.5.1 UDP/IPv4 BVLL "Frame" Format 314
6.5.2 UDP/IPv4 BVLL Addressing 314
6.5.3 BBMD Internal Data Structures for Broadcast Control and Foreign
Device Registration 318
6.5.4 UDP/IPv4 BVLC Message Types 319
6.5.5 UDP/IPv4 BVLL Broadcast Example 321
6.6 BACnet Network Layer 323
6.6.1 BACnet Network Layer Header Format 323
6.6.2 BACnet Network Layer Addressing and Routing 324
6.6.3 Header Control field 326
6.6.4 Network Layer Management Message Types 326
6.6.5 Transmitting and Receiving Packets on BACnet Networks 331
6.6.6 Discovering a Router to a Remote Link 336
6.7 BACnet Application Layer 337
6.7.1 BACnet Objects and Object Types 337
6.7.2 Properties 338
6.7.3 Primitive, Collection, Enumeration, Sequence, and Choice Datatypes
342
6.7.4 Basic BACnet Object Types 345
6.7.5 Object Types Useful for BEMS Implementations 349
6.7.6 BACnet Event and Alarm Handling 360
6.7.7 BACnet Services 367
6.7.8 Protocol Implementation Conformance Statement (PICS) 373
6.8 BACnet Security 374
6.9 BACnet Interoperability 378
6.10 Other Protocols for Large Commercial and Public Building Automation
380
6.11 Summary 382
References 384
7 Building Automation Stacks for Residential and Small Commercial Buildings
389
7.1 Bluetooth Low Energy Application Layer 392
7.1.1 GAP and GATT Roles 393
7.1.2 UUIDs for Identifying Attributes 394
7.1.3 Att 394
7.1.4 Gatt 396
7.1.5 GATT Profiles, Services, and Characteristics for Energy Management
Applications 402
7.2 Zigbee 407
7.2.1 Zigbee Network Architecture 408
7.2.2 Zigbee Network Layer 412
7.2.3 Zigbee Security 417
7.2.4 Zigbee Application Layer and Application Support Sublayer 419
7.2.5 Zigbee Device Object 423
7.2.6 Zigbee Device Profile Clusters 424
7.2.7 Zigbee Cluster Library 425
7.2.8 Demand Response and Load Control (DLRC) Cluster 429
7.2.9 Example DRLC Cluster Event Message Exchange Scenarios 439
7.2.10 Smart Energy Profile 443
7.2.11 Interoperability Specifications 443
7.3 Matter 446
7.3.1 Thread 449
7.3.2 Matter Network Architecture 451
7.3.3 Matter Stack 453
7.3.4 Matter Data Model 454
7.3.5 Matter Fabrics and Nodes 456
7.3.6 Device Type Classification 457
7.3.7 Matter Interaction Model 457
7.3.8 Groups and Paths 458
7.3.9 Security 459
7.3.10 Device On- boarding 459
7.3.11 Matter Utility Clusters 462
7.3.12 Matter Energy Management Clusters 462
7.4 Other Smart Home Protocols 466
7.5 Summary 467
References 468
8 Application Protocols, APIs, and Architectures 473
8.1 What Is an API? 474
8.1.1 REST and RPC 475
8.2 Application Architectures 478
8.2.1 Client-Server Architecture 478
8.2.2 Event- Based Architecture 479
8.3 API Data Representation and Protocols 480
8.3.1 URIs, URNs, and URLs 481
8.3.2 HTTP and REST APIs 483
8.3.3 Mqtt 488
8.3.4 Other Message Bus Protocols for Event- Based Systems 496
8.3.5 Data Representation Languages 497
8.4 API Standards 501
8.4.1 An Example Application 502
8.4.2 OpenAPI 503
8.4.3 AsyncAPI 516
8.5 Other API Definition Frameworks 523
8.6 Zero Trust Security for APIs and Application Protocols 524
8.6.1 VPNs 524
8.6.2 Mutual TLS 525
8.6.3 Application Protocol Identity and Access Management 526
8.6.4 IAM Frameworks 532
8.6.5 Specifying IAM in OpenAPI and AsyncAPI Definitions 540
8.7 Summary 544
References 545
9 Managing DERs and the Utility Connection 551
9.1 DERs and Building- Integrated Microgrids 553
9.2 Modbus 554
9.2.1 Modbus TCP Message Format 555
9.2.2 Modbus Data Model 557
9.2.3 Modbus Function Codes and Message Types 558
9.2.4 Modbus Message Type Examples 559
9.3 SunSpec Modbus Profile 562
9.3.1 SunSpec Modbus Network Architecture 562
9.3.2 SunSpec Device Information Model Structure 563
9.3.3 Device Model Elements 563
9.3.4 SunSpec Device Information Model Stack 568
9.3.5 Model Encodings 569
9.3.6 Modbus Mapping 570
9.4 Other DER Communication Protocols 571
9.5 DER Manufacturer APIs 572
9.5.1 Enphase Enlighten API 573
9.5.2 Registering for a Developer Account and Obtaining IAM Credentials 574
9.5.3 Base URL and Request Header Format 575
9.5.4 Monitoring API 575
9.5.5 Commissioning API 582
9.5.6 Other Manufacturer Device Control APIs 583
9.6 The Utility Connection 584
9.7 OpenADR 585
9.7.1 OpenADR 3.0 Architecture 587
9.7.2 OpenADR 3.0 API 591
9.7.3 OpenADR 3.0 URL Format 591
9.7.4 OpenADR 3.0 Transport Layer Security and IAM 593
9.7.5 Creating a Subscription to an Energy Service Provider's Program and
Receiving Events 595
9.8 Ieee 2030.5 601
9.8.1 SunSpec Common Smart Inverter Profile (CSIP) 603
9.8.2 Protocol Overview 605
9.9 Other Protocols for Communicating Between the Utility and Flexible
Loads/DERs 608
9.9.1 Ansi/cta 2045 608
9.9.2 Dnp 3 609
9.10 Controlling Energy Use Based Directly on Reported Grid Marginal Carbon
Emissions 610
9.10.1 California MIDAS Server 612
9.11 Summary 616
References 617
Index 623