This section covers wireless network trends, key technologies, and problem statements for smart grid IoT.
This section covers system-level deep dive on key wireless network protocols of 6LoWPAN, RPL, and CoAP for smart grid IoT.
This section covers system-level examples for wireless networks on smart grid IoT. We will provide software- and system-level details for two system examples: 6LoWPAN-Contiki and sub-1GHz sensor to cloud industrial IoT gateway reference design.
This section summarizes the wireless network challenges and solutions for a smarter grid IoT training series.
This section covers what is meter tampering, why is this a problem for utility providers, and some common ways a meter is tampered.
The first line of defense against tampering by bypassing current, reversing connections, and disconnecting leads is the meter case. Due to this, it is common for utilities to require some form of intrusion detection system to detect when someone opens a case. In this section, we will cover how to detect someone trying to open the case of a meter.
For anti-tampering, it is common to try to detect the presence of a strong magnet. In this section, we will cover the use of hall sensors for low-power detection of strong magnetic fields in three dimensions. Details on our magnetic tamper detection reference design, TIDA-00839, will be provided as well as some of the design considerations that were kept in mind when creating this reference design.
In this section, we will cover how to harden a meter against these magnetic tamper attacks by using shunts for current sensors. For poly-phase implementations, I will go over how to use isolated delta sigma modulators to add the necessary isolation to use shunt current sensors and create magnetically immune poly-phase energy measurement systems. The TIDA-00601 and TIDA-01094 reference designs, which show how to implement a poly-phase isolated shunt measurement system, will be discussed as well as the associated AMC1304 high-side power supplies used in these designs.
In this section, a summary of the entire “Securing Smart Meters from Attack with TI Analog” training module would be covered. This summary would cover the “Detecting case tamper attacks using inductive switches “, “Detecting magnetic tampering using hall-effect sensors “, and “Hardening a meter against magnetic tamper attacks “ sections of the training series. Links will be provided for the reference designs and design tools that were discussed during this training series.
This module covers the architecture of the CLA, the resources at its disposal and the division of code into task blocks that are triggered by peripherals or through software. Each of these task blocks are atomic, in the sense that no other task may interrupt a running task. This makes operation of the CLA unconventional in comparison with standard CPUs.
The CLA is supported by a subset of the ANSI ‘C’ Compiler. You will learn the features, and more importantly, the limitations, of this compiler in this video. The video also covers the changes in the linker command file needed to support operations on the CLA
In this video we get into the actual workshop. I will take an existing project for the C28x, a simple example that samples an EPWM, runs it through a low pass filter, and then an FFT to get the frequency spectrum, and migrate it over to the CLA. You can download the project files here and I encourage to follow along as I go through the different steps and considerations during the migration process.
Once you have ported your code over to the CLA and successfully built your executable, it’s time to debug. The CLA pipeline is unprotected and is debugged through the main CPU; you cannot debug code on the CLA in the same manner you would on the C28x. This module goes over the different aspects of setting breakpoints, single stepping and setting up CCS views when debugging the CLA.
In the previous modules you would have learned the workings of the CLA, the implementation of the ‘C’ language, and its unique method of debugging. This video deals with some of the common issues users face when writing code for the CLA. It is a compilation, and investigation, of some of the most commonly asked questions on the forums and should help you get to working code quickly.
Power efficiency is a key requirement for applications today. These introductory trainings explain how to implement digital control loops by taking an analog compensator and converting it to the digital domain using C2000 MCUs.
For control applications, an understanding the fundamentals of control theory is required. These trainings provide a foundation for creating control applications and provide some advanced training on the spate space modelling paradigm.
The purpose of this module is to learn software development methodology and understand how to set up an Integrated Development Environment (IDE), to then import and export Code Composer Studio (CCS) projects, as well as critical debugging information to understand the memory usage and performance of the software on the processor.
The purpose of this course is to review basic electronic components and the electrical properties needed to interface sensors and actuators to a microcontroller. You will learn how to measure reactance of a capacitor and use your project to measure current and voltage. The electrical properties of the capacitor will help you design circuits that “filter” or remove noise from your robot.
This module serves as a brief introduction to the ARM Cortex-M microcontroller, assembly programming language and some debugging techniques. Understanding how the processor works is essential for the design of embedded systems, such as the one used in your robot.