Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
playground:techspec [2025/11/13 15:01] – created rahulplayground:techspec [2025/11/13 15:29] (current) rahul
Line 1: Line 1:
- <font 16.0pt/Aptos,sans-serif;;inherit;;inherit>**Chapters of ISV Knowledge Repository</font> **+Here is a detailed playbook and analysis for developing a technical reference design for an open Advanced Metering Infrastructure (AMI) stack using COTS hardware in Nigeria. 
 +This playbook is structured as a phased approachfrom identifying the regulatory landscape to the final system audit and certification.
  
-  - [[https://wiki.smartvillage.ieee.org/informationdigest|**Introduction **(mostly from https://wiki.smartvillage.ieee.org/informationdigest]]**(Natalie//Rajan)** +== Phase 1Define the Ecosystem (Key Players== 
-      - +Success in Nigeria requires engaging a specific set of regulatory and commercial stakeholders. Your reference design must meet the requirements of each.
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Mission and Vision, History and Background, Scope</font> +
-      - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>ISV Pillars and Model, Solutions, Impact</font>+
  
-  - +^ **Category** ^ **Key Player** ^ **Role & Mandate in Your Project** ^ 
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>**ISV Organization (Editor//Rajan Kapur)**</font>      - +| **Primary Regulator** | **NERC** (Nigerian Electricity Regulatory Commission**The Rule Maker.** NERC issues all guidelines for the sector. Your entire AMI solution must comply with the **Nigerian Metering Code** and the **Meter Asset Provider (MAP) Regulations2018**. They are the ultimate approver of the system design. | 
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Introduction</font> +| **Technical Enforcement** | **NEMSA** (Nigerian Electricity Management Services Agency) | **The Hardware Inspector.** NEMSA is responsible for the hands-on testing and certification of all hardware. They enforce technical standards for all meters and electrical equipment. Your COTS hardware must pass their certification. | 
-      +| **Standards & Imports** | **SON** (Standards Organisation of Nigeria) | **The Gatekeeper.** SON sets general standards and manages the **SONCAP** (Standards Organisation of Nigeria Conformity Assessment Programme) for all imported goods. Your imported COTS hardware (metersDCUscomms modules) must have SONCAP certification. | 
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Executive Committee</font> +| **Cybersecurity & Data** | **ONSA** (Office of the National Security Adviser) | **The National Security Guardian.** ONSA designates "Critical National Information Infrastructure" (CNII). A national AMI system is CNII. You must comply with the **Cybercrimes Act2015** and have an incident response plan linked to **ngCERT** (Nigeria's CERT). | 
-      - +| **Cybersecurity & Data** | **NITDA** (National Information Technology Development Agency) | **The Data Privacy Guardian.** NITDA enforces the **Nigeria Data Protection Regulation (NDPR)**. Your reference design must have robust controls for handling customer dataensuring privacy and compliance. | 
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Regional Committees</font> +| **The "Customers"** | **DisCos** (Distribution Companies) | The 11 DisCos (e.g.Ikeja Electric, Eko Electric) are the primary adopters and operators of the AMI stack. The reference design must solve their commercial and technical challenges (e.g., ATC&C loss reduction). | 
-      - +| | **MAPs** (Meter Asset Providers) | NERC-licensed companies that financeprocure, and install meters. They are your primary commercial channel. Your reference design will likely be procured by a MAP (or a DisCo acting as one) to service a DisCo's needs. |
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Central Committees</font> +
-      - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Management Forum</font> +
-      - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Task Forces</font> +
-      - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Staff</font>+
  
-  - +== Phase 2Playbook for a COTS-Based Open AMI Stack == 
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>**Enterprise LifecycleApplication and Execution (Christie//)**</font>      +This is the step-by-step process for developing the reference design.
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Introduction **(Christie//Rajan CKGE_TMP_i ) CKGE_TMP_i **</font> +
-      - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Application Process</font>        - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Regional Committee **(Pradeep//Sanjay Patki)**</font> +
-        - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Project Development Committee **(Christie//Ola)**</font> +
-      - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Criteria/Process for Proposal/Project Selection **(Christie//Ola)**</font> +
-      - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Payment Service Agreements (PSAs) **(Christie//Mike)**</font>        - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>PSA</font> +
-        - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>EFTR and Invoicing</font> +
-      - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Reports, Tranche Payments, Change-Request, and Monitoring  **(Editor//Abdullateef Aliyu)**</font>+
  
-  - +=== Step 1Define the "Open" Architecture === 
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>**Enterprise LifecycleOperation (Editor//)**</font>      - +The core of your reference design is an "open" stack. In the AMI context"open" does not mean "open source" software. It means **vendor interoperability through open standards**. 
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Enterprise Governance **(//Ashok Das, Sanjay Patki, Monica Brown, Jude Numfor)**</font> +Your reference design must be built on these components:
-      - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Business Models **(//Ashok Das, Sanjay Patki, Monica Brown, Jude Numfor)**</font> +
-      - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Technology</font>        - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Solar Technology **(//Adam Sauer)**</font> +
-        - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Other Technologies **(//Rahul Bhargava)**</font> +
-        - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Safety, Quality, Reliability, and Standards (SQRS) **(//Bruno)**</font> +
-      - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Reports and Monitoring **(//Abdullateef)**</font>+
  
-  - +  * **Smart Meters (COTS):** The endpoint devices. 
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>**Initiatives**</font>      - +    * **COTS Principle:** Sourced from any vendor (e.g.MOJEC, Landis+Gyr, Itron) whose meter is NEMSA-certified. 
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>CKGE_TMP_i Past Projects  CKGE_TMP_i (**Kevin Lobo//)**</font> +    * **Open Principle:** The meter must be fully compliant with the **DLMS/COSEM (IEC 62056)** standard. This is non-negotiable. It ensures any DLMS-compliant Head-End System can read the meter, regardless of the vendor. 
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>For each completed project:</font>+  * **Communication Network (COTS):** This has two parts. 
 +    * **Neighborhood Area Network (NAN):** Connects meters to a data concentrator. 
 +      * **COTS Principle:** Use off-the-shelf, standards-based communication modules. Common COTS options are **Power Line Communication (PLC)** (e.g., G3-PLC, PRIME) or **RF Mesh** (e.g., Wi-SUN). 
 +    * **Wide Area Network (WAN):** Connects data concentrators to the central HES. 
 +      * **COTS Principle:** Use standard public or private telecom infrastructure. The most common COTS solution in Nigeria is **GPRS/3G/4G/LTE** via COTS-enabled SIM cards in the concentrator. 
 +  * **Data Concentrator Unit (DCU) (COTS):** 
 +    * **COTS Principle:** A ruggedized, off-the-shelf industrial gateway/computer. 
 +    * **Open Principle:** The DCU must act as a DLMS/COSEM client to talk to the meters and a DLMS/COSEM server to talk to the HES. It aggregates data and manages the NAN. 
 +  * **Head-End System (HES(Software):** 
 +    * **COTS Principle:** This is typically commercial software (e.g., from vendors like Siemens, Oracle, or AMI specialists) that runs on standard COTS servers (e.g., Intel-based, running Linux/Windows). 
 +    * **Open Principle:** The HES must be "meter agnostic." It must use DLMS/COSEM to communicate with any certified COTS meter and DCU. It manages data collectionremote disconnect/connect, and tariff updates. 
 +  * **Meter Data Management System (MDMS) (Software):** 
 +    * **COTS Principle:** Commercial software running on COTS servers. 
 +    * **Open Principle:** The MDMS must have standard-based Application Programming Interfaces (APIs), often based on **IEC 61968/61970 (Common Information Model)**, to integrate with other utility systems (billing, ERP, GIS). It receives validated data from the HES for storage, analysis, and billing.
  
-  -      -        - +=== Step 2: Select Hardware & Meet NEMSA/SON Certification === 
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Name, Region, Timeline, Team Members, etc.</font> +This phase focuses on the physical hardware (metersDCUs).
-        - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Objective</font> +
-        - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Impact</font> +
-        - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Major Hurdles/Challenges</font> +
-        - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>How Challenges Were Overcome</font> +
-        - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Lessons Learned</font>+
  
-  -      - +  * **Source COTS Hardware:** Identify manufacturers of meters, DCUs, and communication modules that are DLMS-compliant. 
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>CKGE_TMP_i Current Projects  CKGE_TMP_i (**Nicole Kawaako//**)</font> +  * **Achieve SONCAP (Imported Goods):** For any hardware importedyou must go through the SON-accredited conformity assessment process in the country of origin to get a SONCAP certificate. This is required for customs clearance. 
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>For each ongoing project:</font>+  * **Achieve NEMSA Certification (The Critical Test):** Your hardware cannot be deployed without NEMSA certification. The process involves: 
 +    * **Type Test Certification:** You submit samples of your new meter model to a **National Meter Test Station (NMTS)**. NEMSA tests the meter's design, accuracyand anti-tamper features against the Nigerian Metering Code and IEC standards. This is the main certification for your COTS hardware model. 
 +    * **Acceptance Test:** When a DisCo or MAP receives a batch (e.g., 1,000 meters), NEMSA may test a random sample from that batch before they can be installed. 
 +    * **Routine Test:** In some cases, every single unit may be tested for accuracy. 
 +**Playbook Action:** Your reference design must specify COTS hardware that is already on NEMSA's list of "Type Test Certified" meters or budget for the time and cost of an 18-month Type Test process for any new hardware.
  
-  -      -        +=== Step 3: Meet NERC System-Level Audit === 
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Name, Region, Timeline, Team Members, etc.</font> +NERC audits the entire solutionnot just the hardwareThis "audit" is part of the **MAP/DisCo procurement and approval process**.
-        - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Objective</font> +
-        - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Expected Impact</font> +
-        - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Progress Made So Far and Projections</font> +
-        - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Major Hurdles/Challenges</font> +
-        - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>How Challenges Are Being Addressed</font> +
-        - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Additional Resources Needed</font> +
-        - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Lessons Learned So Far</font>+
  
-  +  * **The "Audit" Event:** When a MAP or DisCo wants to deploy your reference designthey submit a technical and commercial proposal to NERC. 
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>**Resources (//)**</font>      - +  * **NERC's Checklist:** NERC will evaluate your design's documentation against: 
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Proposal Writing Help</font> +    * **The Nigerian Metering Code:** Does your stack meet all technical specifications for AMI? 
-      - +    * **MAP Regulations:** Does the solution enable the functions required by MAPs (e.g.remote reading, remote disconnection, load management, tariff updates)? 
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Learning ModulesTechnical GuidelinesResearch Papers</font> +    * **Interoperability:** Is it truly open? You must prove DLMS/COSEM compliance for all relevant components. A **DLMS User Association certification** for your components is the strongest proof. 
-      - +    * **Data & Security:** Has a cybersecurity audit been planned or completed? (See Step 4). 
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Workshop Materials</font> +    * **Scalability:** Can the HES/MDMS architecture handle the number of meters (e.g.100,000 or 1,000,000+)? 
-      - +**Playbook Action:** The technical reference design document itself is the primary tool for passing this audit. It must be exceptionally detailedwith clear compliance matrices mapping your design features to NERC's regulations.
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>Regional Rules and Regulations</font>+
  
-  - +=== Step 4: Meet Cybersecurity & Data Privacy Audits === 
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>**Best Practices (//Recent volunteer – name escapes me)**</font>+This is a system-level audit that runs parallel to the NERC approval. It is critical and often overlooked.
  
-  - +  * **Legal Framework:** 
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>**Lessons Learned (Mureithi Kivuti//)**</font>+    * **Cybercrimes Act2015:** Your system will be **CNII**. You must protect it from breaches. 
 +    * **Nigeria Data Protection Regulation (NDPR):** Your MDMS will hold personal data (name, address, consumption). You must protect it. 
 +  * **The Audit Process:** 
 +    * An independent auditor (or a regulator like NITDA) will audit your system. 
 +    * The audit will be based on international standards: **ISO 27001** (for the Information Security Management System) and the **NIST Cybersecurity Framework** (for technical controls). 
 +  * **Reference Design Requirements:** Your design must include: 
 +    * **Technical Controls:** End-to-end encryption, role-based access control, network firewalls, and system hardening. 
 +    * **Data Privacy:** Proof of how customer data is anonymized, encrypted at rest, and protected from unauthorized access, per NDPR. 
 +    * **Incident Response Plan:** A formal plan that details how you will detect and respond to a breach, including the mandatory step of **reporting the incident to ngCERT**. 
 +**Playbook Action:** Your reference design must have a dedicated "Cybersecurity & Data Privacy" volume, detailing the controls and compliance with ISO 27001, NIST, and the NDPR.
  
-  - +== Summary: Certification & Audit Checklists == 
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>**Student Activities (//Toby Cumberbatch)**</font> +Use these checklists as a guide for your reference design.
- +
-  - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>**Membership (Salamatu//Salamatu Sani)**</font> +
- +
-  - +
- <font 12pt/Aptos,sans-serif;;inherit;;inherit>**Marketing (//Monica)**</font>+
  
 +=== Hardware (Meter/DCU) Certification Checklist ===
 +^ **Item** ^ **Certifying Body** ^ **What It Is** ^ **Why It's Needed** ^
 +| **Type Test Certificate** | **NEMSA** | Lab test of a sample meter model. | **Mandatory.** No meter model can be deployed without this. |
 +| **SONCAP Certificate** | **SON** | Conformity assessment for imports. | **Mandatory** for clearing customs with imported hardware. |
 +| **DLMS/COSEM Certificate** | **DLMS User Assoc.** | Proof of interoperability. | **Not legally mandatory, but essential.** This is your only proof that your stack is "open." NERC will demand this. |
  
 +=== System (Solution) Audit Checklist ===
 +^ **Audit Type** ^ **Governing Body** ^ **Key Document/Standard** ^ **What is Audited?** ^
 +| **Technical Solution Audit** | **NERC** | Nigerian Metering Code, MAP Regulations | The entire AMI stack's functionality (remote read, disconnect, etc.), scalability, and compliance with regulations. |
 +| **Cybersecurity Audit** | **ONSA / NITDA** | Cybercrimes Act, 2015, NIST/ISO 27001 | Protection of the system (CNII) from cyberattacks. |
 +| **Data Privacy Audit** | **NITDA** | Nigeria Data Protection Regulation (NDPR) | Protection of customer personal data (PII) within the MDMS. |
 +| **Incident Reporting** | **ONSA / ngCERT** | Cybercrimes Act, 2015 | The existence of a formal plan to report all security incidents to the national CERT. |