Backing up a Load Control System

ABSTRACT

Systems and methods are disclosed for generating a backup of configuration information files at a system controller and storing this backup at a server via the use of a network device.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of U.S. Provisional Patent Application No. 62/640,390, filed Mar. 8, 2018, which is hereby incorporated by reference herein in its entirety.

BACKGROUND

A user environment, such as a residence or an office building for example, may be configured using various types of load control systems. A lighting control system may be used to control the lighting loads in the user environment. A motorized window treatment control system may be used to control the natural light provided to the user environment. A heating, ventilation, and air-conditioning (HVAC) system may be used to control the temperature in the user environment.

Each load control system may include various control devices, including input devices and load control devices. The load control devices may receive digital messages, which may include load control instructions, for controlling an electrical load from one or more of the input devices. The load control devices may be capable of directly controlling an electrical load. The input devices may be capable of indirectly controlling the electrical load via the load control device.

Examples of load control devices may include lighting control devices (e.g., a dimmer switch, an electronic switch, a ballast, or a light-emitting diode (LED) driver), a motorized window treatment, a temperature control device (e.g., a thermostat), an AC plug-in load control device, and/or the like. Examples of input devices may include remote control devices, occupancy sensors, daylight sensors, temperature sensors, and/or the like.

SUMMARY

A load control system may include configuration information this is stored in one or more files. It may be desirable to generate backups of the one or more files of the load control system and store the backups at a server, for example, that is separate from the load control system.

Accordingly, an apparatus may include at least one processor and at least one memory device that may be communicatively coupled to the at least one processor. The at least one memory device may be configured to store files and a current backup of the files, and may have stored thereon instructions that when executed by the at least one processor may direct the at least one processor to: receive a first message from a network device, and based at least in part on receiving the first message from the network device, determine whether a trigger point of a plurality of trigger points has occurred. Each of the plurality of trigger points may include a trigger level. The instructions, when executed by the at least one processor, may further direct the at least one processor to communicate a second message to the network device based at least in part on determining that a trigger point has occurred. The second message may include the trigger level of the determined trigger point, and the second message may include a request for the network device to request from the apparatus a backup of the files. The instructions, when executed by the at least one processor, may further direct the at least one processor to receive from the network device a third message that includes a command to generate a backup of the files. The third message may be received based at least in part on communicating the second message to the network device. Based at least in part on receiving the third message from the network device, the instructions, when executed by the at least one processor, may further direct the at least one processor to determine whether a backup of the files is being generated. Based at least in part on determining that a backup of the files is being generated, the instructions, when executed by the at least one processor, may further direct the at least one processor to communicate an error message to the network device. Based at least in part on receiving the third message from the network device, the instructions, when executed by the at least one processor, may further direct the at least one processor to determine whether the current backup is being communicated to a maximum number of other network devices. Based at least in part on determining that the current backup is currently being communicated to the maximum number of other network devices, the instructions, when executed by the at least one processor, may further direct the at least one processor to communicate an error message to the network device. Based at least in part on receiving the third message from the network device, the instructions, when executed by the at least one processor, may further direct the at least one processor to determine whether there is a change to one or more of the files since a time the current backup of the files was generated. Based in part on determining that there is a change to one or more of the files since the time the current backup of the files was generated, the instructions, when executed by the at least one processor, may further direct the at least one processor to determine a time difference between the time the current backup of the files was generated and a current time, compare the time difference to a stale time, and based at least in part on comparing the time difference to the stale time, determine whether to generate a backup of the files. Based at least in part on determining to generate a backup of the files, the instructions, when executed by the at least one processor, may further direct the at least one processor to generate a backup of the files, generate a signature of the generated backup, and communicate a copy of the generated backup to the network device. Based at least in part on determining not to generate a backup of the files, the instructions, when executed by the at least one processor, may further direct the at least one processor to determine whether the current backup was previously communicated to the network device, and based at least in part on determining that the current backup was previously communicated to the network device, communicate a message to the network device that the network device has the current backup, and based at least in part on determining that the current backup was not previously communicated to the network device, communicate a copy of the current backup to the network device. Based in part on determining that there is not a change to one or more of the files since the time the current backup of the files was generated, the instructions, when executed by the at least one processor, may further direct the at least one processor to determine whether the current backup was previously communicated to the network device, and based at least in part on determining that the current backup was previously communicated to the network device, communicate a message to the network device that the network device has the current backup, and based at least in part on determining that the current backup was not previously communicated to the network device, communicate a copy of the current backup to the network device.

Such an example apparatus may allow the apparatus to generate a backup of files and to store the backup at a server, where the apparatus and the server are not able to communicate messages and/or data with one another. In this fashion, the apparatus may be kept on a private network thereby adding to security of the apparatus. In addition, such an apparatus may generate and store a backup without impacting other tasks/operations the apparatus is configured to perform. In addition, such an apparatus may communicate with multiple network devices, any of which may cause the apparatus to need to generate a backup, and may generate and store a backup without impacting other tasks/operations the apparatus is configured to perform

The above advantages and features are of representative embodiments only. They are not to be considered limitations. Additional features and advantages of embodiments will become apparent in the following description, from the drawings, and from the claims.

BRIEF DESCRIPTION OF THE DRAWINGS

FIGS. 1A-1C are diagrams depicting perspective views of example environments for associating control devices.

FIG. 2 is a diagram of example discovery ranges for performing discovery and/or association of control devices.

FIG. 3 shows an example flowchart of an example discovery procedure for discovering and associating control devices.

FIG. 4 is a flow diagram of an example method for discovering and associating control devices.

FIG. 5 is a flow diagram of an example discovery procedure for discovering and associating control devices.

FIG. 6 is an example graphical user interface (GUI) that may be implemented for discovery and/or association of control devices.

FIG. 7 is an example GUI that may be implemented for discovery and/or association of control devices with a location.

FIGS. 8A-8J illustrate example GUIs that may be displayed by a visual display of a network device during an area configuration procedure.

FIGS. 9A-9C illustrate an example flowchart of an example discovery procedure for discovering and associating control devices.

FIG. 10 is a flowchart of an example area configuration procedure for associating control devices in a load control environment.

FIGS. 11A and 11B illustrate example GUIs that may be displayed by a visual display of a network device for configuring operational settings of an area.

FIGS. 12A-12C illustrate example GUIs that may be displayed by a visual display of a network device for configuring a control device of area.

FIG. 13 illustrates an example GUI displayed by a visual display of a network device for configuring a preset for a button of a control device in an area having more than one type of load control device.

FIGS. 14A-14H illustrate example GUIs that may be displayed by a visual display of a network device for monitoring, controlling, and adjusting the configuration of control devices in a load control environment.

FIGS. 15A and 15B illustrate a flowchart of an example control procedure for monitoring, controlling, and adjusting the configuration of control devices in a load control environment.

FIGS. 16A, 16B, and 16C illustrate a flowchart of an example procedure for backing up a load control system.

FIGS. 16D and 16E illustrate a flowchart of another example procedure for backing up a load control system.

FIG. 17 is a block diagram of an example system controller.

FIG. 18 is a block diagram of an example control-target device.

FIG. 19 is a block diagram of an example control-source device.

FIG. 20 is a block diagram of an example network device.

FIG. 21 is a block diagram of an example remote server.

DETAILED DESCRIPTION

FIG. 1A depicts a representative load control environment 100 (e.g., a load control area) comprising a load control system. The load control system may be commissioned for enabling control of electrical devices in the load control system. The commissioning of the load control system may include associating control devices, which may include control-source devices and/or control-target devices. As shown in FIG. 1A, rooms 102, 104, and 106 in a building may be installed with one or more control-target devices, e.g., load control devices for controlling the electrical loads within a room or building. Each load control device may be capable of directly controlling the amount of power provided to an electrical load and may be controlled by a control-source device. Example control-target devices may include lighting fixtures 108 a, 108 b, 108 c, 108 d in room 102; lighting fixtures 138 a, 138 b, 138 c, 138 d in room 104; and lighting fixtures 146 a, 146 b, 146 c, 146 d in room 106. Each lighting fixture may include a lighting load (e.g., an LED light source) and a respective lighting control device (e.g., an LED driver, ballast, dimming or switching module that may interface with a driver or ballast, or other lighting control device) for controlling the respective lighting load of the lighting fixture. Other example control-target devices may include a motorized window treatment 120 having a motor drive unit (e.g., including a motor) for controlling the position of covering material 122, a temperature control device (e.g., thermostat 136) for controlling an HVAC system, and/or an AC plug-in load control device 124 for controlling a plug-in electrical load, such as a floor lamp 126, a table lamp or another electrical device that is plugged in to the AC plug-in load control device 124. The AC plug-in load control device 120 may be plugged into an electrical receptacle 130.

Control devices (e.g., a control-source device and/or a control-target device) may communicate with each other and/or other devices via a wired and/or a wireless communication link. For example, the control devices may communicate via a radio frequency (RF) signal 172. The RF signal 172 may be transmitted via any known RF communication technology and/or protocol (e.g., near field communication (NFC); BLUETOOTH®; WI-FI®; ZIGBEE® a proprietary communication channel, such as CLEAR CONNECT™, etc.). A control device may be both a control-target and a control-source device.

A control-source device may be an input device that indirectly controls the amount of power provided to an electrical load by transmitting digital messages to the control-target device. The digital messages may include control instructions (e.g., load control instructions) or another indication that causes the control-target device to determine load control instructions for controlling an electrical load. Example control-source devices may include a remote control devices 116, 142, and 154, an occupancy sensor 112, a daylight sensor 150, a window sensor 180, and/or a network device 128. The control-source devices may include a wired or wireless device. The control-source devices may include a control device, such as a dimmer switch, an electronic switch, or the like.

The load control system 100 may be commissioned to enable control of electrical loads based on commands communicated between control devices (e.g., control-source devices and control-target devices) configured to control the electrical loads. For example, control devices may be associated with one another and association information may be stored thereon, or at other devices, which may be used to communicate and identify digital commands at associated devices for controlling electrical devices in the system. The association information may include the unique identifier of one or more of the associated devices. The association information may be stored at the control devices, or at other devices that may be implemented to enable communication and/or identification of digital commands between the control devices.

The remote control devices 116, 142, and 154 may be wireless devices capable of controlling a control-target device via wireless communications. The remote control devices 116, 142, and 154 may be attached to the wall or detached from the wall. Examples of remote control devices are described in greater detail in U.S. Pat. No. 5,248,919, issued Sep. 28, 1993, entitled LIGHTING CONTROL DEVICE; U.S. Pat. No. 8,471,779, issued Jun. 25, 2013, entitled WIRELESS BATTERY POWERED REMOTE CONTROL WITH LABEL SERVING AS ANTENNA ELEMENT; and U.S. Patent Application Publication No. 2014/0132475, published May 15, 2014, entitled WIRELESS LOAD CONTROL DEVICE, the entire disclosures of which are hereby incorporated by reference.

The occupancy sensor 112 may be configured to detect occupancy and/or vacancy conditions in the load control environment 100 in which the load control system is installed. The occupancy sensor 112 may transmit digital messages to control-target devices via the RF communication signals 172 in response to detecting the occupancy or vacancy conditions. The occupancy sensor 112 may operate as a vacancy sensor, such that digital messages are transmitted in response to detecting a vacancy condition (e.g., digital messages may not be transmitted in response to detecting an occupancy condition). The occupancy sensor 112 may enter an association mode and may transmit association messages via the RF communication signals 172 in response to actuation of a button 114 on the occupancy sensor 112. Examples of RF load control systems having occupancy and/or vacancy sensors are described in greater detail in U.S. Pat. No. 8,009,042, issued Aug. 10, 2011, entitled RADIO-FREQUENCY LIGHTING CONTROL SYSTEM WITH OCCUPANCY SENSING; U.S. Pat. No. 8,199,010, issued Jun. 12, 2012, entitled METHOD AND APPARATUS FOR CONFIGURING A WIRELESS SENSOR; and U.S. Pat. No. 8,228,184, issued Jul. 24, 2012, entitled BATTERY-POWERED OCCUPANCY SENSOR, the entire disclosures of which are hereby incorporated by reference.

The daylight sensor 150 may be configured to measure a total light intensity in the visible area of the load control environment 100 in which the load control system is installed. The daylight sensor 150 may transmit digital messages including the measured light intensity via the RF communication signals 172 for controlling control-target devices in response to the measured light intensity. The daylight sensor 150 may enter an association mode and may transmit association messages via the RF communication signals 172 in response to actuation of a button 152 on the daylight sensor 150. Examples of RF load control systems having daylight sensors are described in greater detail in U.S. Pat. No. 8,410,706, issued Apr. 2, 2013, entitled METHOD OF CALIBRATING A DAYLIGHT SENSOR; and U.S. Pat. No. 8,451,116, issued May 28, 2013, entitled WIRELESS BATTERY-POWERED DAYLIGHT SENSOR, the entire disclosures of which are hereby incorporated by reference.

The window sensor 180 may be configured to measure an exterior light intensity coming from outside the load control environment 100 in which the load control system is installed. The window sensor 180 may be mounted on a façade of a building, such as the exterior or interior of a window, to measure the exterior natural light intensity depending upon the location of the sun in the sky. The window sensor 180 may detect when direct sunlight is directly shining into the window sensor 180, is reflected onto the window sensor 180, or is blocked by external means, such as clouds or a building, and may send digital messages indicating the measured light intensity. The window sensor 180 may transmit digital messages including the measured light intensity via the RF communication signals 172. The digital messages may be used to control an electrical load via one or more control-target devices. The window sensor 180 may enter an association mode and may transmit association messages via the RF communication signals 172 in response to actuation of a button on the window sensor 180.

The load control environment 100 may include other types of control-source devices, such as, for example, temperature sensors, humidity sensors, radiometers, cloudy-day sensors, shadow sensors, pressure sensors, smoke detectors, carbon monoxide detectors, air-quality sensors, motion sensors, security sensors, proximity sensors, fixture sensors, partition sensors, keypads, multi-zone control units, slider control units, kinetic or solar-powered remote controls, key fobs, cell phones, smart phones, tablets, personal digital assistants, personal computers, laptops, timeclocks, audio-visual controls, safety devices, power monitoring devices (e.g., power meters, energy meters, utility submeters, utility rate meters, etc.), central control transmitters, residential controllers, commercial controllers, industrial controllers, or any combination of control-source devices.

The load control environment 100 may include a system controller 160 (e.g., a hub device) operable to transmit and/or receive digital messages via wired and/or wireless communications. For example, the system controller 160 may be configured to transmit and/or receive the RF communication signals 172, to communicate with one or more control devices (e.g., control-source devices and/or control-target devices). The system controller 160 may communicate digital messages between associated control devices, for example. The system controller 160 may be coupled to one or more wired control devices (e.g., control-source devices and/or control-target devices) via a wired digital communication link. The system controller 160 may be on-site at the load control environment 100 or at a remote location. Though the system controller 160 is shown as a single device, the load control environment 100 may include multiple system controllers and/or the functionality thereof may be distributed across multiple devices.

The system controller 160 may also, or alternatively, communicate via RF communication signals 170 (e.g., NFC; BLUETOOTH®; WI-FI®; cellular; a proprietary communication channel, such as CLEAR CONNECT™, etc.). The system controller 160 may communicate over the Internet 164, or other network, using RF communication signals 170. The RF communication signals 170 may be transmitted using a different protocol and/or wireless band than the RF communication signals 172. For example, the RF communication signals 170 may be transmitted using WI-FI® or cellular signals and the RF communication signals 172 may be transmitted using another RF communication protocol, such as BLUETOOTH®, ZIGBEE®, or a proprietary communication protocol. The RF communication signals 170 may be transmitted using the same protocol and/or wireless band as the RF communication signals 172. For example, the RF communication signals 170 and the RF communication signals 172 may be transmitted using WI-FI® or a proprietary communication protocol.

The system controller 160 may be configured to transmit and receive digital messages between control devices. For example, the system controller 160 may transmit digital messages to the control-target devices in response to the digital messages received from the control-source devices. The digital messages may include association information for being stored at the control devices or control instructions for controlling an electrical load. The control instructions may be used to control the electrical load of a control-target device or to control the electrical load according to control configuration information. The system controller 160 may receive control instructions from a control-source device and may perform a lookup of the control-target devices associated with the control-source device. The system controller 160 may send digital messages that include control instructions to the associated control-target devices for controlling electrical loads. The system controller 160 may store the association information from association messages communicated between control devices, or may query control devices for association information stored thereon.

Once a control-source device is associated with a control-target device, the control-source device may send digital messages to the control-target device to cause the control-target device to control an amount of power provided to an electric load. For example, the associated remote control device 116 may instruct the lighting control devices of the lighting fixtures 108 a, 108 b, 108 c, 108 d to increase or decrease the lighting level of the respective lighting loads, instruct the motorized window treatment 120 to raise or lower the covering material 122, instruct the AC plug-in load control device 124 to raise or lower the lighting level of the floor lamp 126, and/or instruct the temperature control device 136 to raise or lower the temperature in one or more rooms. The associated occupancy sensor 112 may send similar instructions to a control-target device based on the detection of an occupancy or vacancy condition within the room 102. The daylight sensor 150 may send similar digital messages to a control-target device based on the detection of an amount of natural light within the room 106.

The control devices, including a load control discovery device 190, may discover and/or perform association with the system controller 160. The control devices may send an association message to the system controller 160 and/or the system controller 160 may send an association message to the control devices. An identifier of the system controller 160 may be stored at the control devices for detecting communications from the system controller 160. An identifier of the control devices may be stored at the system controller 160 for detecting communications from other control devices.

The system controller 160 may include control configuration information according to which one or more control-target devices may be controlled. For example, control configuration information may include preset configurations. The system controller 160 may generate digital messages according to the preset configurations to set a dimming level of the lighting fixtures to a predefined level, to set a level of the covering material 122 to a predefined level, to set a dimming level of the lamp 126 to a predefined level, or to set a temperature of the temperature control device 136 to a predefined level. Different presets may be configured to control different control-target devices to control a corresponding electrical load differently. Example preset configurations may include bedtime preset for when a user is going to bed, a movie watching preset for when the user is watching television or a movie, an away preset for when a user is away from the building, a home preset for when the user is in the building, or other preset configurations a user may define for an occasion.

The control configuration information may include zone configurations. The zone configurations may define one or more zones in which control-target devices are defined for being controlled. The zones may be a group of control devices for being associated that have a group identifier. The control-target devices in different zones may be separately controlled by sending digital messages having control instructions for controlling each zone. Different zones may be identified by a zone identifier (e.g., group identifier) that may be stored at the system controller 160 and/or the control devices in the zone. Each zone may be defined as a location having a zone identifier that is a location identifier. Though the zone may be described herein as a location having a location identifier, other zone configurations may be similarly implemented as described herein for locations.

The load control environment 100 may include a network device 128. The network device 128 may perform wired and/or wireless communications. Examples of the network device 128 may include a wireless phone, a tablet, a laptop, a personal digital assistant (PDA), a wearable device (e.g., a watch, glasses, etc.), or another computing device. The network device 128 may be a user device operated by a user 132. The network device 128 may communicate wirelessly by sending digital messages on RF communication signals 170 (e.g., WI-FI® signals, WI-MAX® signals, cellular signals, etc.). The network device 128 may communicate digital messages in response to a user actuation of one or more buttons on the network device 128. Examples of load control systems having WI-FI®-enabled devices, such as smart phones and tablet devices, are described in greater detail in U.S. Patent Application Publication No. 2013/0030589, published Jan. 11, 2013, entitled LOAD CONTROL DEVICE HAVING INTERNET CONNECTIVITY; and U.S. Pat. No. 9,413,171, issued Aug. 9, 2016, entitled NETWORK ACCESS COORDINATION OF LOAD CONTROL DEVICES, the entire disclosures of which are incorporated herein by reference.

The network device 128 may communicate with the system controller 160 using digital messages transmitted via RF communication signals 170 (e.g., WI-FI® signals, WI-MAX® signals, cellular signals, etc.) to allow the network device 128 to associate control devices (e.g., control-source devices and/or control-target devices) and/or control electrical loads. When the RF communication signals 170 and the RF communication signals 172 communicate on the same communication protocol and/or the same band, the network device 128 may operate as the system controller 160, as described herein.

The network device 128 may execute an application locally for displaying information received from the system controller 160 and/or receiving user input for communicating information to the system controller 160. The network device 128 may comprise a visual display 110 for displaying information for the user 132 and may be configured to receive user inputs from the user 132. The system controller 160 may be accessed from the network device 128 via a web interface (e.g., a web browser) and/or via a control application (e.g., a load control application and/or configuration application) at the network device 128, for example. The user 132 may generate and store association information on the network device 128 for associating control-source devices and control-target devices.

The association information may be stored in the form of a table or database that associates a unique identifier (e.g., serial number) of a control-target device with a location and/or a unique identifier (e.g., serial number) of one or more control-source devices. The association information may include a device type identifier that indicates a device type of the control-target device (e.g., lighting control device, motorized window treatment, plug-in load control device, temperature control device, etc.) and/or a device type of the control-source devices (e.g., remote control device, occupancy sensor, daylight sensor, window sensor, etc.). The association information may be sent from the network device 128 to the system controller 160. The system controller 160 may store the association information. The system controller 160 may identify the association information corresponding to each control-target device by identifying the unique identifier of the control-target device and the corresponding associated devices (e.g., unique identifiers of the control-source devices) to transmit the association information to each control-target device for storage thereon. The system controller 160 may identify other information, such as control configuration information, corresponding to each control-target device and may transmit the information to each control-target device for storage thereon, such that the control-target devices may respond according to the information.

The control devices may be associated with a location for enabling control of electrical loads in the location. The control devices may also be associated with other control devices in the location for enabling the control of the electrical loads. For example, a control device may be associated with a location by storing a location identifier at the control device, such that the control device may detect digital messages sent to control devices in the identified location. The control device (e.g., control-target device) may be associated with other control devices (e.g., control-source devices) by storing an identifier of the control devices, such that the control device (e.g., control-target device) may detect digital messages sent from associated control devices (e.g., control-source devices) for controlling an electrical load. When a control-target device is associated with a control-source device, the control-target device may be responsive to the control-source device.

The location of control devices may be discovered relative to the location of other control devices in the load control environment 100. As shown in FIG. 1A, control devices (e.g., control-source devices and/or control-target devices) may send a message within a discovery range 134 that may be received by other control devices within the discovery range 134. The message may be a dedicated discovery message that may be identified by a receiving device as a discovery message or another message that may be transmitted in the load control environment 100 and may be interpreted as a discovery message. For example, the message may be an association message for associating devices in the load control environment 100, and/or the message may be a control message for controlling devices in the load control environment 100.

A control device that sends a discovery message (e.g., dedicated discovery message or a message otherwise interpreted as a discovery message) may be identified as a load control discovery device 190. The load control discovery device 190 may be a device that performs one or more activities. For example, the load control discovery device 190 may be a control-source device (e.g., a remote control device 116) that controls the amount of power provided to an electrical load by transmitting digital messages to the control-target device and/or a control device that sends a discovery message to one or more control devices.

The load control discovery device 190 may be a dedicated load control discovery device 190. For example, the dedicated load control discovery device 190 may be a device (e.g., a control device) that may be used for sending a discovery message to control devices and/or system controller 160 during a dedicated discovery mode. The dedicated discovery mode may be enabled for a period of time, may be enabled/disabled upon receipt of an indication by a user, and/or may be configured as a static mode on the dedicated discovery device. The discovery message may be a message used for discovering control devices and/or system controller 160. The discovery message may be a message used for one or more activities. For example, the discovery message may be a message configured to discover control devices and/or system controller 160, and the discovery message may be a message configured to associate a control device with another control device and/or the system controller 160. The discovery message may be a control message configured to discover control devices and to control a control device that receives the discovery message.

FIG. 1A shows an example in which a control-source device (e.g., remote control device 116) is assigned as the load control discovery device 190 that may send a discovery message within discovery range 134, though other control devices may also be assigned as the load control discovery device 190. The discovery range 134 may correspond to a transmission power (e.g., an adjustable transmission power) of the load control discovery device 190. The load control discovery device 190 may be preconfigured for a location. For example, the load control discovery device 190 may be stored as the load control discovery device for an identified location at the system controller 160, at the load control discovery device 190, and/or other devices at an identified location. The discovery message sent by the load control discovery device 190 may be received by other devices, such as other control devices and/or the system controller 160.

Devices may receive the discovery message and determine whether the discovery message is received at a signal strength that is above a reception power threshold (e.g., a predefined signal strength). The predetermined signal strength may be received from the system controller 160 and/or may be preconfigured at the time of manufacture. The control devices that receive the discovery message may report the receipt of the discovery message. The control devices that receive the discovery message may report the received signal strength of the discovery message. The control devices may report the receipt of the discovery message and/or the received signal strength to another control device (e.g., control-source device, control-target device, etc.). The control devices that receive the discovery message may report the receipt of the discovery message and/or the received signal strength to the system controller 160. The control device and/or the system controller 160 may store the control devices that receive the discovery message and provide an identifier of the control devices to the network device 128. The network device 128 may display the control devices to the user 132 for association with a location and/or other control devices.

As each control device may be associated with a location, the list of control devices in a given location may be recalled at the network device 128 (e.g., from direct storage or from the system controller 160. The control devices may be associated with other devices, disassociated with other devices, or disassociated with the location. The association and disassociation of devices may enable for configuration and/or reconfiguration of control devices in a defined area. Locations may be defined and/or redefined by discovering devices and updating associations. The control devices may be installed and/or associated by a different person than the user 132 that operates or manages the operation of the control devices in that space. The discovery of control-target devices by a control-source device may enable configuration or reconfiguration of a location to optimize the control of the control devices according to the use of the space. The use of a location may be changed, or may be different than originally identified in the plans (e.g., such as when the devices were installed in the rooms 102, 104, 106). As such, the discovery of devices within a discovery range 134 of a load control discovery device 190 may enable the user 132 to redefine associated devices for a given location.

Devices may receive the discovery message and determine whether the discovery message is received within a discovery range and/or a discovery zone. The discovery range may be partitioned into one or more discovery zones. The discovery zones may be identified by the received signal strength at which the discovery message may be received, and/or the discovery zones may be identified by another identifier, such as the transmission power of the discovery message and/or a threshold value (e.g., the reception power threshold value). The discovery messages may be transmitted within the discovery range and may identify a discovery zone within which devices may respond. The discovery zone may be identified by a received signal strength or range of received signal strengths for which control devices may respond if the discovery message is received at the identified signal strength.

The discovery message transmitted by the load control discovery device 190 may be a broadcast message that may be broadcast within the established discovery range 134. The discovery message may include information identifying the load control discovery device 190 from which the discovery message was transmitted. The discovery message may indicate the type of control device (e.g., remote control device, occupancy sensor, lighting control device, etc.), a unique identifier (e.g., serial number) that may identify the load control discovery device 190, the link address for communicating with the load control discovery device 190 directly, whether the device is a control-target device or a control-source device, and/or other information about the device.

The discovery range 134 may be dependent upon the transmission power and/or a range of transmission powers of the transmitting device. For example, the discovery range 134 may be based on a transmission power at which digital messages are transmitted from the load control discovery device 190 or a distance for which the digital messages are to be transmitted. The transmission power of the transmitting device may be adjustable in order to adjust the area of the discovery range 134.

The discovery range 134 may also, or alternatively, be dependent on a threshold. For example, the discovery range 134 may be dependent on a reception power threshold of the receiving device. For example, the discovery range 134 may be dependent upon the signal strength at which the control devices receive digital messages from the load control discovery device 190. The signal strength may be a signal strength indicated as a received signal strength indicator (RSSI) at each of the receiving devices. The RSSI may be defined as a measure of the power level that a receiving device is receiving digital messages from the transmitting device. The receiving devices may each compare the RSSI of a received message to the reception power threshold (which may be stored in memory in each receiving device) and may respond to the received message if the RSSI is greater than the reception power threshold. The reception power threshold of each receiving device may be adjustable in order to adjust the area of the discovery range 134. For example, the discovery message may include a reception power threshold to which the receiving control device may compare the RSSI of the received signal (e.g., the discovery message).

The discovery range 134 may be partitioned into multiple discovery zones having different RSSI values and/or ranges. For example, the discovery range 134 may be broken up into discovery zones that each correlate to different groups of devices (e.g., devices that receive the discovery message at the same signal strength and/or within the same range of signal strengths). Selecting control devices within a particular discovery zone or zones may limit the number of devices transmitting a response at the same time to reduce or preclude interference from occurring between devices located within different discovery zones. The control devices in different zones that respond to discovery messages may be aggregated by selecting control devices from more than one discovery zone. The control devices in different zones may be displayed to the user 132 and/or provided to the control devices independently, e.g., based upon the location of the control devices in the different zones.

As shown on FIG. 1A, the transmission power of the load control discovery device 190 may define the discovery range 134. The discovery range 134 may be defined according to a minimum signal strength (e.g., minimum RSSI) to a maximum signal strength (e.g., maximum RSSI). The minimum signal strength may define the outer edge of the discovery range 134. The maximum signal strength may define an inner region (e.g., region inside of the discovery range 134), inside of which devices may be prevented from responding to the discovery message. The maximum signal strength may be set such that the inner region is relatively smaller (e.g., zero feet from the load control discovery device 190). The transmission of the discovery message at the load control discovery device 190 may begin at the inner region, e.g., the load control discovery device may begin transmission at zero feet from the load control discovery device 190, and incrementally transmit beyond zero feet from the load control discovery device 190.

Control devices within the discovery range 134 may respond to a discovery message transmitted from the load control discovery device 190. Each control device may calculate the RSSIs of each respective discovery message received. One or more control devices may organize the control devices according to the RSSIs of each respective discovery message received. The system controller 160 and/or the network device 128 may organize the control devices. For example, system controller 160 and/or the network device 128 may organize the control devices according to the RSSIs of each respective discovery message received. Control devices that receive the discovery message in a signal having an RSSI above the reception power threshold may be within the discovery range 134, and control devices that receive the discovery message in a signal having an RSSI below the reception power threshold may be outside the discovery range 134.

The load control discovery device 190 may be a control device (e.g., control-source or control-target) that is pre-installed in the load control system for performing load control. As the load control discovery device 190, and/or the control devices for being discovered, may communicate using a different protocol than the network device 128, the system controller 160 may identify the responses to the discovery message and provide the discovered devices to the network device 128. The use of the control devices that are installed for performing load control as the load control discovery device 190 may reduce the number of devices used to perform discovery and/or association.

The discovery range 134 may be affected by interference. For example, a wall, floor, or ceiling separating rooms 102, 104, 106 may cause interference. A control device receiving the discovery message within a same discovery range and/or a same discovery zone as another control device may cause interference. Interference may degrade the signal strength of a discovery message. Such degradation may reduce the discovery range 134 of a discovery message transmitted from a load control discovery device 190, e.g., among rooms 102, 104, and/or 106. As shown in FIG. 1A, the discovery range 134 may be degraded by the wall between room 102 and 104, as well as by the ceiling and floor between the room 102 and 106, such that the discovery range 134 projects further into the room 102 in which there exists less interference. Even though the discovery range 134 is illustrated by a circle in FIG. 1A, the discovery range 134 may define an area other than a circular area.

The RSSI or signal strength may be one discovery criteria that may be used to discover devices in the load control environment 100. One or more discovery criteria may be used to discover devices in the load control environment 100. The discovery criteria may include an amount of time since power up of the device. If a control device was powered up before or after the amount of time indicated in the discovery criteria, the control device may be filtered out of the discovered devices. The control devices may start an internal timer upon being powered up and may identify when the threshold amount of time for being discovered has been met. In another example, the control devices may provide the amount of time since the internal timer began and another device, such as the system controller 160 or the network device 128, may identify when the threshold amount of time for being discovered has been met.

The discovery criteria may include a load state of an electronic load controlled by a control device. For example, the load state may be an on/off state of an electrical load controlled by a load control device. The load state may be the dimming level, or a dimming level range, of a lighting load. The control devices may identify a load state of an electrical load and identify when the load state has been met for discovery. In another example, the control devices may provide the load state to another device, such as the system controller 160 or the network device 128, which may identify when the load state for being discovered has been met. The load state being included in the discovery criteria may allow the user 132 to adjust the load state of electrical loads using devices the user 132 wishes to discover. For example, the user 132 may change the on/off state of the lighting fixtures 108 a and 108 b to the “on” state for being discovered and the user 132 may leave the on/off state of the lighting fixtures 108 c and 108 d in the “off” state for being filtered out by the discovery criteria.

The discovery criteria may include an occupancy state or a level of activity identified by an occupancy sensor, such as occupancy sensor 112. For example, the occupancy sensor 112 may identify an occupancy condition or a vacancy condition, which may be used for discovering the occupancy sensor 112. The occupancy sensor 112 may identify different levels of activity. For example, the occupancy sensor may identify major motion events (e.g., above a predefined level of motion) and minor motion events (e.g., below a predefined level of motion) within the visible area of the occupancy sensor 112. The major motion events or minor motion events may be used to discover the occupancy sensor 112. The occupancy sensor 112 may send a response message upon identifying the defined occupancy sate or the defined level of activity. The occupancy state and/or the level of activity may be used to discover devices other than occupancy sensors. The occupancy state and/or the level of activity may be identified by the occupancy sensor 112 and the occupancy sensor 112 may send a discovery message to devices within a discovery range. The discovery message from the occupancy sensor 112 may identify the occupancy state and/or level of activity identified at the occupancy sensor 112.

The discovery criteria may include devices that have been previously associated with a location and/or device. For example, the discovered devices may include devices that have been previously discovered and/or previously stored in association information at another device. The discovery message may include a request for associated devices and the identifier of the associated devices may be returned in response. The discovery message may include the identifier of a particular device (e.g., a previously discovered device) and the discovery message may ask the control devices whether they are already associated with the device. The response to the discovery message may include an answer to the request, or the devices that are unassociated with the identified control device may not respond.

The discovery criteria may be stored at the control devices for deciding whether to respond to discovery messages according to the defined criteria. Each discovery criteria may be responded to independently, or a combination of criteria may be identified for response. The discovery criteria may be updated at the load control devices in update messages from the system controller 160 and/or the network device 128. The discovery criteria may be defined at the network device and sent to the control devices for determining whether to respond to a discovery message. The discovery message may define the discovery criteria for being responded to when identified at the control devices.

The discovery message may request the control devices to provide identified discovery criteria and the system controller 160 and/or the network device 128 may filter out discovered devices based on the discovery criteria provided by the control devices. For example, the discovery message may request the control devices to provide an RSSI at which the discovery message is received, an amount of time since power up, a load state, and/or an occupancy state or a level of activity identified by an occupancy sensor. The control device may provide the requested information, or null values where the requested information is unidentified at the control device, and the sys and/or one or more criteria may be provided to the system controller 160 and/or the network device 128 for filtering discovered devices.

One of the discovery criteria may be used to discover the devices initially and the criteria may be further filtered based on other criteria. For example, the control devices that receive the discovery message with a certain signal strength (e.g., RSSI) may be used to generate the initial dataset. The initial dataset may be further filtered using the other discovery criteria. The discovery criteria may be provided to a user 132 on the network device 128 for selection to further filter the number of discovered devices in a dataset. The discovery criteria may be provided sequentially to a user 132 and/or in a randomly generated order. Instructions may be provided to the user 132 on the network device 128 to instruct the user 132 in the manner to further filter the discovered devices. For example, the network device 128 may instruct the user 132 to enter the room 102 to discover devices in the room 102. The network device 128 may instruct the user 132 to enter the room 102 to discover devices in the room 102. The network device 128 may instruct the user 132 to make a major motion near the devices to be discovered, such that the occupancy sensor 112 may detect the major motion event and send a digital message that is used by the system controller 160 and/or the network device 128 for filtering discovered devices. The discovery criteria may be user-selected for limiting the number of discovered devices.

The transmission of the discovery message may be triggered by actuation of a button on the load control discovery device 190 and/or receipt of a discovery trigger message. For example, the load control discovery device 190 may be identified as remote control device 116. The load control discovery device 190 may be identified as a dedicated load control discovery device. The user 132 may actuate a button (e.g., for a predefined period of time), a sequence of buttons, and/or perform other commands on the load control discovery device 190 to transmit the discovery message. Actuation of a button for different periods of time may cause the load control discovery device 190 to be set to different modes. For example, actuating a button for three seconds on load control discovery device 190 (e.g., remote control device 116) may cause load control discovery device 190 to be set to an association mode, in which load control discovery device 190 may send an association message to control-target devices. Actuating a button for six seconds on load control discovery device 190 (e.g., remote control device 116), in the example, may cause load control discovery device 190 to be set to a discovery mode, in which load control discovery device 190 may send a discovery message to control-target devices. The load control discovery device 190 may also, or alternatively, receive a discovery trigger message from the system controller 160 or the network device 128. The network device 128 may receive an actuation of a button by the user 132 and may transmit a discovery trigger message to the load control discovery device 190 or an indication to the system controller 160 to transmit the discovery trigger message.

The transmission of the discovery message may be performed by sensors in the load control environment. For example, the load control discovery device may be an occupancy sensor that may transmit digital messages upon identification of an occupancy condition (e.g., occupied room) and/or a vacancy condition (e.g., unoccupied room). The occupancy condition and/or the vacancy condition may be interpreted by other devices as a discovery message (e.g., when the devices are in a discovery mode). A user may enter or leave a room to trigger transmission of a discovery message in a location of the occupancy sensor to discover devices in that location.

The control devices receiving the discovery message from the load control discovery device 190 may be two-way communication devices (e.g., the lighting control devices in the lighting fixtures 108 a, 108 b, 108 c, 108 d, the motorized window treatment 120, the AC plug-in load control device 124, etc.) that may receive the discovery message and may acknowledge receipt of the discovery message to the system controller 160. The control devices may identify the discovery message as being from the load control discovery device 190 and may store an indication of receipt of the discovery message. The control devices may identify the discovery message by a device identifier of the load control discovery device 190 that is unassociated with the control devices, a device identifier of the load control discovery device 190 that is associated with the control devices and identified as the load control discovery device 190, and/or a discovery message identifier. The control devices may store the signal strength (e.g., received signal strength indication (RSSI)) at which the discovery message is received and/or the control devices may store a threshold value (e.g., the reception power threshold value). The control devices may report the signal strength to one or more other devices, and/or the control devices may report to one or more devices whether the signal strength is below or above the reception power threshold. For example, the control devices may report the signal strength to other control devices, to network device 128, and/or to system controller 160. The control devices may also, or alternatively, report whether the signal strength is below or above the reception power threshold. The receipt of the discovery message may be reported if the signal strength (e.g., the RSSI) is above the threshold (e.g., the predefined reception power threshold).

The control devices that are one-way communication devices (e.g., the occupancy sensor 112, the window sensor 180, daylight sensor 150, remote control device 154, remote control device 142, etc.) may be unable to receive the discovery message. The one-way communication devices may transmit a discovery message to the load control discovery device 190 and/or the system controller 160 for being detected and/or associated. The discovery messages may include the identifier of the transmitting device. To transmit the discovery message, the user 132 may actuate a button on the one-way communication device. The user 132 may actuate a button 118 on the remote control device, a button 144 on the remote control device 142, a button 156 on the remote control device 154, a button 152 on the daylight sensor 150, a button 114 on the occupancy sensor 112, and/or the like. To trigger the transmission of discovery information at the daylight sensor 150, the user 132 may also, or alternatively, transmit a laser signal identifiable by the daylight sensor 150. Though some control devices may be described as two-way communication devices, any control device may include a button for transmitting a discovery message.

As the load control discovery device 190 may receive messages from control devices, the two-way communication devices may also send a discovery message or a response to the discovery message transmitted from the load control discovery device 190. The load control discovery device 190 may determine the signal strength at which the messages from the control devices are received. The load control discovery device 190 may internally record the identified devices and/or the signal strengths. The load control discovery device 190 may provide the identified devices and/or the signal strengths to the system controller 160 and/or the network device 128. Though certain devices may be described as one-way communication devices or two-way communication devices, the devices may be configured for either one-way or two-way communication.

The system controller 160 and/or the network device 128 may be used to coordinate the discovery and association of control devices in a location. The user 132 may actuate a button on the network device 128 to discover devices in a location and the network device 128 may request discovery information from the system controller 160. The system controller 160 may receive the request and may transmit a digital message to put the control devices in a discovery mode. The digital message that puts the control devices in the discovery mode may be the same message as the discovery trigger message for triggering the discovery message at the load control discovery device 190, or may be a different message. Once in the discovery mode, the control devices may know to listen for the discovery message. The user 132 may actuate a button on a control device to enter the discovery mode. For example, the user may actuate a button or buttons (e.g., for a predefined period of time) on the load control discovery device 190 to send a digital message to the system controller 160 and/or other control devices to enter the discovery mode.

The control devices may transmit a digital message to the system controller 160 to acknowledge receipt of the discovery message. The digital messages may include the device identifier of the load control discovery device 190 and/or a signal strength at which the discovery message was received. The digital messages may be sent to the system controller 160 in response to a request from the system controller 160 (e.g., after the system controller 160 receives the discovery message itself). The request from the system controller 160 may include a request to acknowledge receipt of a message from a device having the device identifier of the load control discovery device 190 and/or the received signal strength of the message. The request from the system controller 160 may include a request to acknowledge receipt of the discovery message from the load control discovery device 190 and/or the received signal strength of the message if the discovery message was received at a signal strength above a predefined threshold (e.g., the reception power threshold). The request from the system controller 160 may include a request for device identifiers of unassociated devices from which messages have been received (e.g., since entering the discovery mode) and/or the received signal strength of the messages. The request from the system controller 160 may include a request for device identifiers of load control discovery devices from which messages have been received (e.g., since entering the discovery mode) and/or the received signal strength of the message.

The system controller 160 may provide the discovered devices to the network device 128 for display to the user 132. The system controller 160 may organize the discovered devices for display to the user 132 for performing association. The system controller 160 may organize the discovered control devices in an organized dataset (e.g., ascending or descending list) that is organized by the signal strength at which the discovery message was received at each device. The system controller 160 may remove any devices from the dataset that receive the discovery message at a signal strength below a predefined threshold (e.g., the reception power threshold). The system controller 160 may include a predefined number of devices in the dataset that have the greatest signal strength. The system controller 160 may send the organized dataset to the network device 128 for displaying to the user 132.

Though the coordination of discovery and/or association of control devices is described herein as being performed at the system controller 160, such functionality may be implemented in the control devices themselves. One or more control devices (e.g., lighting control devices in the lighting fixtures 108 a, 108 b, 108 c, 108 d, remote control device 116, etc.) may be used to coordinate the discovery and/or association of control devices (e.g., control devices within a location). A central control device or control devices may receive the request to put the control devices in a discovery mode and may transmit a digital message to put the control devices in the discovery mode. The digital message may be sent to control devices neighboring the central control device or control devices. The digital message that puts the control devices in the discovery mode may be the same message as the discovery trigger message for triggering the discovery message at the load control discovery device 190, or may be a different message. Once in the discovery mode, the control devices may know to listen for the discovery message. The central control device or control devices may collect the discovery information (e.g., acknowledgement of receipt of the discovery message and/or the signal strength at which the discovery message was received) from the other control devices and may provide the discovery information to the network device 128. The central control device or control devices may receive association information from the network device 128 and send the association information, or relevant portions thereof, to the other control devices.

The network device 128 may organize the discovered devices for display to the user 132 for performing association. The network device 128 may organize the discovered control devices in an organized dataset (e.g., ascending or descending list) that is organized by the signal strength at which the discovery message was received at each device. For example, the network device 128 may first display control devices that received the discovery message with the highest RSSIs, followed in descending order by the devices that received the discovery message with lower RSSIs. The network device 128 may remove any devices from the dataset that received the discovery message at a signal strength below a predefined threshold (e.g., the reception power threshold). The network device 128 may include a predefined number of devices in the dataset that have the greatest signal strength.

The user 132 may select control devices (e.g., lighting control devices in the lighting fixtures 108 a, 108 b, 108 c, 108 d) from the discovered devices displayed on the network device 150. The selected control devices may be associated with the load control discovery device 190 that was used to discover the control devices with the discovery range 134. The network device 150 may generate association information regarding the load control discovery device 190 and the selected control devices in response to the inputs received from the user 132. The selected control devices may also be associated with a control device (e.g., a control-source device) other than the load control discovery device 190.

The user 132 may configure association information and/or control configuration information for discovered control devices at the network device 128. The discovered control devices may be associated with one or more location identifiers that identify locations in the load control environment 100. The locations may be identified by the user 132 (e.g., from a list of predefined locations) or may be a predefined location or locations associated with the load control discovery device 190 (e.g., the location in which the load control discovery device is installed).

The network device 128 may access the association information stored at the system controller 160. The association information may include device identifiers of the discovered devices, location identifiers of the discovered devices, and/or identifiers of associated control devices. The user 132 may disassociate discovered control devices from previously associated control devices by making selections on the network device 128. The user 132 may associate discovered control devices with other control devices by making selections on the network device 128.

The user 132 may access the control configuration information stored at the system controller 160. The user 132 may edit currently stored control configuration information for discovered control devices by making selections on the network device 128. The user 132 may generate and store control configuration information for discovered control devices by making selections on the network device 128.

The network device 128 may transmit the association information and/or control configuration information to the system controller 160 (e.g., upon actuation of a button by the user 132). The system controller 160 may store the updated association information and/or control configuration information thereon. The system controller 160 may transmit the association information and/or control configuration information to the control devices to update the association information and/or control configuration information stored at the control devices. The system controller 160 may broadcast the updated association information and/or control configuration information to the control devices for the control devices to identify updated corresponding association information and/or control configuration information, if any, for being stored locally thereon.

FIG. 1B shows the example load control environment 100 having a control-target device being identified as the load control discovery device 190. For example, the lighting control device in the lighting fixture 108 a may be identified as the load control discovery device 190 at the system controller 160 and/or at the lighting control device 108 itself. The load control discovery device 190 may be predefined for a location or switched between control devices. The load control discovery device 190 may be switched between control devices via a command from the network device 128 (e.g., a command from the network device 128 to the system controller 160). The user 132 may select the control device to be identified as the load control discovery device 190, and the identifier of the selected control device may be stored as the load control discovery device 190 (e.g., at the system controller 160, the network device 128, the control device identified as the load control discovery device 190, and/or other control devices). The lighting control device of the lighting fixture 108 a may be identified as the load control discovery device 190 to discover a different set of control devices than the remote control device 116 that was identified as the load control discovery device 190 in FIG. 1A.

The organized dataset of discovered devices may be deleted, reorganized, and/or rebuilt after the load control discovery device 190 is switched. For example, the organized dataset may be deleted if a load discovery device 190 is disassociated from one or more control devices, and/or if the load control discovery device 190 is configured in a manner that would affect signal strengths at which the control devices receive the discovery message from a different load control discovery device 190.

The organized dataset may also be reorganized, e.g., if control devices are associated and/or disassociated with the load control discovery device 190, and/or if signal strengths at which the control devices receive the discovery message from a different load control discovery device 190 change over time. For example, the organized dataset may be reorganized to account for a device being associated with another load control discovery device 190, wherein the discovery messages received from an associated load control discovery device 190 has a signal strength that is greater than, or less than, discovery messages from previously associated load control discovery devices. The organized dataset may be reorganized if the same control devices are disassociated from a load control discovery device, e.g., if a load control discovery device is removed from a room or control devices are associated with another load control discovery device.

The organized dataset of discovered devices may be rebuilt. The rebuilt organized dataset may be in addition to, or, in place of, pre-existing organized datasets. For example, the organized dataset may be rebuilt if one control device is removed as the load control device, and another control device is assigned as the load control device. The organized dataset may be rebuilt, e.g., to account for the load control device having associations that are different than previous associations.

The discovery range 134 for different types of load control discovery devices may be the same or different. The user 132 may establish the discovery range 134 at the network device 128 or the discovery range 134 may be predefined. If the discovery range 134 is established at the network device 128, the established range may be communicated to the system controller 160, and/or the load control discovery device 190 for being stored thereon.

Any control device (e.g., control-source devices and/or control-target devices) may be identified as the load control discovery device 190. The control devices may be assigned as the load control discovery device 190 at the system controller 160, at the network device 128, and/or at the control device itself. The load control discovery device 190 may be switched between control devices. As shown in FIG. 1B, the load control discovery device 190 may be switched among the lighting control device of the lighting fixture 108 a, the lighting control device of the lighting fixture 108 b, the lighting control device of the lighting fixture 108 c, the lighting control device of the lighting fixture 108 d, the motorized window treatment 120, the occupancy sensor 112, the AC plug-in load control device 124, and/or other control devices. For example, the load control discovery device 190 may be switched from the lighting control device of the lighting fixture 108 a to the lighting control device of the lighting fixture 108 d to discover and associate devices in a different location within the room 102. The load control discovery device 190 may be switched between control devices via a command from the network device 128. For example, the load control discovery device 190 may be switched between control devices in response to the user 132 selecting one of the control devices on the network device 128. The network device 128 may send a message to the system controller 160. The system controller 160 and/or the network device 128 may send a message to the remote control device 116, which was previously assigned as the load control discovery device 190 as shown in FIG. 1A, that the device has been unassigned as the load control discovery device 190. The system controller 160 and/or the network device 128 may send a message to the lighting control device of the lighting fixture 108 a that the device has been assigned as the load control discovery device 190. The load control discovery device 190 may be switched between control devices by the user 132 actuating a button (e.g., button 114 on the occupancy sensor) on the respective control device for being assigned as the load control discovery device 190.

The discovery range 134 may be calculated from the load control discovery device 190, such that identifying different control devices as the load control discovery device 190 may allow for discovery of different devices. As described above, the load control discovery device 190 may switch among control devices (e.g., from a previous load control discovery device to another load control discovery device). As the load control discovery device 190 switches among control devices, the discovery messages may be transmitted within the discovery range 134 of different control devices. For example, if the load control discovery device 190 switches from the remote control device 116 to the lighting control device of the lighting fixture 108 a, the center of the discovery range 134 may move from the location of the remote control device 116 to the lighting control device of the lighting fixture 108 a (e.g., in response to a user selection of the control device for being assigned as the load control discovery device 190 on the network device). As the load control discovery device 190 may be a movable device (e.g., remote control device 116, which may be detachable from the wall and carried by the user 132), the discovery range 134 may move with the same load control discovery device 190.

The discovery message may be sent multiple times. For example, the discovery message may be sent multiple times to identify the control devices located within a moving discovery range 134 and/or to identify control devices that were previously unidentified due to interference. The control devices identified as a result of the transmission of multiple messages may be aggregated. The aggregated control devices may be provided to the user 132. For example, the aggregated control devices may be provided to the user 132 via network device 128. Control devices that previously responded to discovery messages may be ignored when responding to subsequent discovery messages. The control devices may respond to a first discovery message received and omit response thereafter, or respond to each received discovery message. Subsequent discovery messages may identify control devices that previously responded to a discovery message, e.g., to prevent the discovered control devices from having to respond again.

There may be more than one load control discovery device 190. A load control discovery device 190 may be defined for different groups of control devices, such as different groups of control devices in a physical space. For example, a control device located in a first portion of room 102 may be identified as the load control discovery device 190 to discover control devices in the first portion of the room 102 and another control device located in a second portion of the room 102 may be identified as another load control discovery device to discover control devices in the second portion of the room 102. In another example, a control device in each of rooms 102, 104, and 106 may be identified as a respective load control discovery device for the room in which the device is located. The control device that is most centrally located in the room, or a portion of a room, may be identified as the load control discovery device 190.

Digital messages may be sent to the control devices to instruct the control devices to identify themselves and/or corresponding electrical loads, such that the user 132 may identify the control devices for being assigned as the load control discovery device 190. The identified control devices may be the discovered control devices at a location. The user 132 may actuate a button on the network device 128 to instruct a control device to perform an identification. The identification message may be sent from the system controller 160 to the identified device. The identified control device may receive the identification message and control an electrical load according to control instructions for identifying the device. The system controller 160 may know the type of control device for being identified and may send the control instructions corresponding to the type of control device. The system controller 160 may send a generic identification message that may be detected by the identified device, and the control instructions may be looked up locally.

The user 132 may actuate a button on control devices to assign control devices as the load control discovery device 190. For example, the user 132 may actuate a button 118 (e.g., for a predetermined period of time) on the remote control device 116 or the load control discovery device 190 to send a digital message to the system controller 160 to instruct the system controller 160 to identify the remote control device 116 as the load control discovery device 190. The identification message may be sent from the system controller 160 to the identified control device. The remote control device 116 or the load control discovery device 190 may also, or alternatively, communicate with the control devices directly to request identification. The identified device may receive the identification message and control an electrical load according to control instructions for identifying the device.

The user 132 may actuate a button (e.g., for a predetermined period of time) on the remote control device 116 or the load control discovery device 190 to identify (e.g., by flashing or otherwise identifying the device) another control device as the load control discovery device 190 or to assign the identified control device as the load control discovery device 190. This may allow the user 132 to iterate through control devices and select a control device as the load control discovery device 190. The control devices that are iterated through for being identified as the load control discovery device 190 may be control devices that have been discovered during the discovery mode or other devices (e.g., devices within the discovery range of the remote control device 116 or the load control discovery device 190).

Different control devices may perform identification differently. Load control devices may increase and/or decrease an amount of power provided to a corresponding electrical load. Lighting control devices in the lighting fixtures may turn on, turn off, raise a dimming level, lower a dimming level, or flash a respective lighting load. Motorized window treatment 120 may raise the level of the covering material 122 up or down, or wiggle with window treatment at the current level. AC plug-in load control device 124 may turn on, turn off, raise, lower, or flash the floor lamp 126, or otherwise increase and/or decrease an amount of power provided to an electrical load controlled by the plug-in load control device 124. Control devices may also, or alternatively, include an LED that may be turned on, turned off, or flashed for identification.

After a control device has been identified, the user 132 may select the identified device on the network device 128 for identifying the control device as the load control discovery device 190. The user 132 may identify different control devices as the load control discovery device 190 and discover different devices by moving the established discovery range 134 within a location or to different locations.

As the control devices in room 104 and room 106 are outside of the established discovery range 134, these control devices may be unable to receive a discovery message from the load control discovery device 190. As shown in FIG. 1C, the established discovery range 134 may be configurable. For example, the established discovery range 134 may be configurable by adjusting (e.g., incrementally increasing or decreasing) the signal strength (e.g., transmission power) of the load control discovery device 190, and/or by adjusting (e.g., increasing or decreasing) a threshold value (e.g., the reception power threshold value). The discovery range 134 may be increased (e.g., incrementally increased) as the transmission power of the load control discovery device 190 is increased and/or as the reception power threshold is decreased. As the discovery range 134 is increased, the number of control devices within the discovery range may increase. As shown in FIGS. 1A and 1B, the discovery range 134 may be adjusted to the adjusted discovery range 158. Using the established adjusted discovery range 158, the load control discovery device 190 may discover and/or associate other control devices that come within the adjusted discovery range 158, such as the temperature control device 136 and/or remote control device 154.

Though FIG. 1C shows the adjusted discovery range 158 as a larger discovery range than the discovery range 134, the discovery range 134 may also be adjusted to a smaller discovery range, which may include less control devices. The discovery range 134 may be made smaller to avoid discovering control devices in other locations, such as room 104 and/or room 106 when attempting to discover devices in room 102. The user 132 may adjust the discovery range or move the discovery range to another location depending on the size of the room or the location of various control devices to discover the control devices within a location. When the discovery range is increased, decreased, and/or moved, the display provided on the network device 128 may update accordingly. For example, when the discovery range is moved from one location to another location, the network device 128 may show the control devices in the updated discovery range. In addition, or alternatively, when the discovery range is moved from one location to another location, an aggregation of the control devices from each of the discovery ranges may be identified. The devices may be displayed on the network device in an ordered list according to signal strength.

The temperature control device 136 and/or remote control device 154 may be detected by sending a discovery message within the adjusted discovery range 158. The daylight sensor 150, the lighting control devices of the lighting fixtures 146 a, 146 b, 146 c, 146 d, and the lighting control devices of the lighting fixtures 138 a, 138 c may also be in the adjusted discovery range 158. The lighting control devices of the lighting fixtures 138 b, 138 d and the remote control device 142 may be outside of the adjusted discovery range 158 and may not receive discovery messages transmitted within the adjusted discovery range 158. The control devices outside of the discovery range 158 may transmit (e.g., upon actuation of a button or receipt of a trigger message) discovery information to the load control discovery device 190 and/or the system controller 160, as control devices outside of the discovery range 158 may have a greater transmission power, for example.

A discovery range may be selected that corresponds to the size of the location in which devices are to be discovered. For example, the transmission power of the load control discovery device 190 may be adjusted (e.g., increased or decreased) such that the transmission power of the load control discovery device 190 corresponds to a size of a location. A control device with a greater transmission power may be identified as the load control discovery device 190, to increase the discovery range in larger rooms. Each location may have a size identifier that indicates the size of each respective location. The transmission power of the load control discovery device 190 may be assigned, or a control device with a corresponding transmission power may be identified as the load control discovery device 190, to enable the discovery of control devices in a location having the identified size. The system controller 160 and/or the network device 128 may store the transmission power of the control devices and perform the assignment of the load control discovery device 190 based on the transmission power of the control devices and the size of the location. The size of the location may be entered on the network device 128.

The transmission power of the load control discovery device 190 and/or other control devices may be adjusted (e.g., increased or decreased) by a predetermined amount during the discovery mode. The adjusted (e.g., increased and/or decreased) transmission power may be greater than and/or less than the transmission power of the load control discovery device 190 and/or control devices in operation for controlling electrical loads. The adjusted transmission power during the discovery mode may enable the control devices and/or load control discovery device 190 to discover more and/or less devices, while preserving the power at the control devices and/or load control discovery device 190 during other usage (e.g., communication of load control messages). The adjusted transmission power may be sent from the network device 128 (e.g., directly, or via the system controller 160).

The load control discovery device 190 may communicate with the control devices via one or more intermediary devices. For example, discovery messages may be received at a control device and the acknowledgement and/or signal strength may be communicated via one or more other control devices in the system. The one or more intermediary devices may be used to ensure a greater likelihood that the acknowledgement and/or signal strength are received at the load control discovery device 190. When the control device is transmitting a discovery message to the load control discovery device 190 (e.g., for a one-way communication device), the signal strengths at which each message is received at an intermediary device may be appended to the messages being communicated. The load control discovery device 190 and/or the system controller 160 may add the signal strengths together to determine the relative distance of the control devices.

A control device may interact with other control device and/or store information (e.g., location information, signal strength information, device identifiers, as well as other identification information) of the other control devices. For example, control devices may store information about neighboring control devices to enable the control devices to forward information of the neighboring devices. The neighboring control devices may be the control devices from which digital messages are received with a predefined signal strength. Neighboring control devices may be configured by the network device 128 and/or the system controller 160 and may be communicated to control devices for being stored thereon.

A control device may receive a discovery message and store the signal strength related to the received discovery message. The control device may communicate the signal strength at which the discovery message was received to neighboring devices, which may forward the signal strength to other devices, such as the system controller 160. Control devices that receive the discovery message may also, or alternatively, forward the discovery message to neighboring devices, such that control devices outside of the discovery range 134 may still be discovered. The control device may add the signal strength at which a digital message is received from a neighboring device to the signal strength at which the discovery message was received and report the combined signal strength to the system controller 160.

Control devices may be ordered and/or grouped, according to respective signal strengths. For example, a control device that determines a signal strength of a received discovery message may determine assumed signal strengths of other control devices, based on the control device's determined signal strength. Neighboring control devices may be assumed to have similar signal strengths. Assumed signal strengths of the control devices may be dependent upon where the control devices for which the signal strengths that are being assumed are located within a predefined distance of the source (e.g., the load control discovery device 190) of the discovery message. For example, by determining signal strengths of a control device's neighboring control devices, the system controller 160 may directionally calculate the difference between a control device that is −50 dB away from the system controller 160 and a control device that is −50 dB away from the system controller 160 and −20 dB from control devices that were selected as having satisfactory signal strengths.

Existing association information may be discovered by system controller 160 and/or the load control discovery device 190. The control devices may send association information (e.g., associated device identifiers) that indicates the devices with which the control devices are associated. The association information may be in the discovery messages or in response requests for discovery information. The network device 128 may make a request for a specific control-source device identifier to determine whether a control-target device is associated with a specific control-source device.

The system controller 160 may discover one or more control devices within a broadcast control group. A broadcast control group may include one or more control devices of an identified device type, one or more control devices within a defined location, and/or one or more control devices that share another group characteristic. The group characteristic may be a discovery criteria on which control devices may be filtered for discovery. The control devices in a broadcast control group may be controlled at the same time by the system controller 160. The control devices that are included in a broadcast control group may receive a group identifier and store the group identifier such that the control devices included within the broadcast control group may respond to digital messages that are sent to the group and include the group identifier. For example, the system controller 160 may create a lighting control device group that includes lighting control devices of the lighting fixtures 108 a, 108 b, 108 c, and 108 d. The system controller 160 may instruct the lighting control devices of the lighting fixtures 108 a, 108 b, 108 c, and 108 d in the lighting control device group to turn on or off, as a group.

Multiple load control discovery devices 190 may be implemented to perform discovery and/or association of control devices. Each of the load control discovery devices 190 may transmit discovery messages to the same devices and/or different devices. The system controller 160 may receive the device identifiers of discovered control devices and/or the signal strength associated with the discovered devices and remove duplicate device identifiers. The system controller 160 may keep the associated signal strength of a device identifier that is the greatest signal strength. The system controller 160 may organize the device identifiers (e.g., in an ascending or descending list by signal strength) after the duplicate device identifiers have been removed, or the system controller 160 may remove the organized device identifiers that have the lower signal strengths.

The system controller 160 may discover when the established discovery range 134, 158 overlaps with the established range of another load control discovery device 190. For example, the system controller 160 may discover that the established discovery range 134, 158 overlaps with the established range of another load control discovery device 190 when the system controller 160 receives duplicate information from the same device. The system controller 160 may adjust one or more of the discovery ranges to avoid the overlap or may indicate the overlap to the user 132 on the network device 128.

The load control discovery devices may be in communication with one another (e.g., directly in communication with one another or via the system controller 160). The load control discovery device 190 may discover an overlap of established discovery range 134, 158 with the established range of another load control discovery device 190 when the load control discovery device 190 receives a discovery message. The load control discovery device 190 may adjust the discovery range 134, 158 or indicate the overlap to the system controller 160 and/or the network device 128.

FIG. 2 is a diagram depicting example discovery ranges for performing discovery and/or association of control devices. As shown in FIG. 2, the established discovery range 208 may be adjustable. A user may increase or decrease the established discovery range 208 (e.g., between −3 dBm and −9 dBm) to discover and/or associate control devices within a larger or smaller area. The established discovery range 208 may be measured from a load control discovery device 202. The established discovery range 208 may be determined based on the distance the load control discovery device 202 is configured to transmit and/or receive information. The established discovery range 208 may be determined by adding to, or subtracting from, the distance that the load control discovery device 202 is configured to transmit and/or receive information.

The discovery range 208 may be established by adjusting the signal strength (e.g., transmission power) of the signal transmitted by the load control discovery device 202, and/or by adjusting a threshold value (e.g., the reception power threshold value). For example, the signal strength may be increased or decreased between −9 dBm and −3 dBm. The reception power threshold value may be increased or decreased, e.g., from −9 dBm to −7 dBm. The load control discovery device 202 may broadcast discovery messages to, and/or receive messages from, control devices within the established discovery range 208 and/or within the predefined reception power threshold. The load control discovery device 202 may determine the control devices within the established discovery range 208 and/or the reception power threshold based on the response messages received from control devices. Other devices, such as a system controller, a network device, or a control device receiving the discovery message, may determine whether the control device is within the established discovery range 208 and/or the reception power threshold based on the response message received from control device.

The discovery range 208 may be established (e.g., at the load control discovery device 202, the system controller, or the network device) by disregarding information received from control devices outside of the discovery range 208. For example, the load control discovery device 202 may have a static signal strength of −3 dBm and the established discovery range 208 may be −9 dBm. In this case, the load control discovery device 202 may broadcast a discovery message to, and response messages may be received from, control devices within the −3 dBm area. The distance of each control device may be determined based on the received signal strength of messages from the control device. When the received signal strength of a control device is below a threshold (e.g., the reception power threshold), the control device may be determined to be outside of the established discovery range 208 (e.g., between −9 dBm and −3 dBm) and may be disregarded as a discovered device.

FIG. 3 shows an example flowchart of an example discovery procedure 300 as described herein. The discovery procedure 300 may allow for discovery and/or association of one or more control devices (e.g., control-source devices and/or control-target devices) for one or more areas in a building, for example. The discovery procedure 300 may be performed for specific areas in a building to enable association of one or more control-source devices in an area with one or more control-target devices in that area such that the control-source devices may control the control-target devices in that area, and may further include configuring a system controller such that the system controller may control the discovered devices (e.g., automatically through scheduled programs, through user input via a network device, etc.) in each specific area.

Discovery procedure 300 may be implemented using one or more devices, such as one or more control devices 302 and/or 304 (e.g., control-source devices and/or control-target devices), a system controller 306, and/or a network device 308. The network device 308 may interface/communicate over a communications network with the system controller 306 over a web based interface, for example, that is provided by the system controller 306 (although other interfaces may be used). The system controller 306 may in turn communicate with control devices 302 and/or 304 over a communications network that may be the same or different network as used by the network device 308. The control devices 304 may be control-source devices (e.g., one or more remote control devices, occupancy sensors, a daylight sensors, window sensors, etc.) and/or control-target devices (e.g., one or more lighting control devices of lighting fixtures, motorized window treatments, temperature control devices, AC plug-in load control devices, etc.). One of the control devices 304 may be assigned as the load control discovery device 302, which may be operable to communicate with the other control devices 304 and/or the system controller 306. The procedure 300 may include additional, fewer, or other devices and/or messages as discussed herein. The procedure 300 may include steps in other orders.

As shown in FIG. 3, an association mode trigger message may be communicated, at 320, to the system controller 306 to put the system controller 306 in an association mode. The system controller 306 may alternatively be put in association mode by actuation of a button on the system controller 306 and/or by an association mode trigger message received from another device, such as a control device 304, for example. During the association mode at the system controller 306, the system controller 306 may listen for discovery messages from load control discovery devices.

A discovery message may be communicated, at 322, from a load control discovery device 302. The discovery message may include the unique identifier of the load control discovery device 302. Communication of the discovery message by the load control discovery device 302 by may be triggered by actuation of a button on the load control discovery device 302, receipt of a discovery trigger message from another device (e.g., from the system controller), or another trigger. The discovery message communicated at 322 may be a broadcast message received by the one or more control devices 304 and/or the system controller 306. In response to receiving the discovery message, the one or more control devices 304 may compute an RSSI value of the discovery message. In response to receiving the discovery message communicated at 322, the system controller 306 may broadcast a query message at 324 looking for devices that have received the discovery message from the load control discovery device 302. The query message may include a unique identifier of the load control discovery device 302 and may request devices to respond indicating whether the devices received the discovery message from the identified load control discovery message. The query for the discovered devices may include discovery criteria for discovering control devices that meet the discovery criteria. The discovery criteria may include the RSSI or signal strength at which the discovery message was received, an amount of time since power up of the device, a load state (e.g., on state, off state, dimming level, etc.) of an electronic load controlled by a control device, an occupancy state or a level of activity identified by an occupancy sensor, identification of a previously associated location and/or device, and/or another discovery criteria. The discovery criteria may be used to narrow down a large group of devices to reduce a group of discovered devices that may be communicating at the same time on the network. The discovery criteria may also be user selected to enable the user to reduce the list of devices being discovered for association.

In addition to comparing the identifiers as received in the discovery message and query message to determine if they should respond to the query, the control devices 304 that also meet the discovery criteria may respond to the query at 326. The response may include the computed RSSI value and a unique identifier of the control device. Each control device may communicate its respective response message at a random time. Though the discovery criteria may be described as being in the query message sent at 324, the discovery criteria may be indicated in the discovery message sent at 322 or may be otherwise pre-stored in the control devices 304. The system controller 306 may identify the control devices 304 that responded at 326 and generate an organized dataset of the discovered control devices for being sent to the network device 308. The organized dataset may be a list of the discovered devices in an ascending or descending order based on RSSI value. The organized dataset may include the unique identifier of each of the discovered devices, or a subset thereof. The devices may be relatively organized by signal strength of the RSSI value or according to other discovery criteria.

The system controller 306 may provide the discovered devices, at 328, to the network device 308. The discovered devices may be provided via a display on a web interface, or the discovered devices may be provided, at 328, via other digital messages that are used to display an interface locally at the network device 308. Though the system controller 306 may be described as generating the organized dataset of the discovered devices, the discovered devices may be provided, at 328, to the network device 308 with the responses to the discovery criteria and/or the network device 308 may generate the organized dataset of the discovered devices locally.

The network device 308 may generate association information that includes an association of the discovered devices. For example, the network device 308 may receive user selections of control-source devices and control-target devices for being associated for a defined area. The network device 308 may also, or alternatively, receive user selections of control-source devices or control-target devices for being associated with the load control discovery device 302 that is assigned for a defined area. The association information may be sent to the system controller 306 at 330 for being stored locally thereon. The association information, or portions thereof, may be sent at 332 to the control devices 304 for enabling communication of messages between associated devices.

As described in the discovery procedure 300, a load control discovery device 302 may be used to send a discovery message to control devices 304 in a given area and the discovered devices may be displayed to a user on a network device 308 for commissioning the system. The association information, or portions thereof, may be used by the system controller 306 for relaying digital messages to the appropriate devices within the load control system. The association information may be used by the control devices 304 for identifying messages to which the control devices 304 may respond. The load control discovery device 302 may be a control device capable of sending and/or receiving digital messages for controlling an electrical load. The load control discovery device 302 may be assigned based on the device's proximity within an area (e.g., to discover devices in the area to which the load control discovery device has a relatively closer proximity). The use of a control device in the system for discovering other devices and enabling the display of the discovered devices on the network device 308 in a manner that indicates the relative proximity of the devices according to the discovery criteria enables for efficient discovery and association of devices while commissioning of the system.

FIG. 4 is a block diagram depicting an example method 400 for discovery and association of control devices. As shown in FIG. 4, the method 400 may begin at 402. At 404, a discovery trigger message may be transmitted. The discovery trigger message may be sent by a system controller, such as the system controller 160, 306. For example, the discovery trigger message may be sent by the system controller 160, 306 upon receipt of an indication from a network device 128, 308. The control devices 304 may identify the discovery trigger message and enter a discovery mode to listen for discovery messages, or a separate message may be sent from the system controller 160, 306 to enter the control devices 304 into a discovery mode.

The transmission of the discovery message may be identified at 406. The discovery message may be identified by the system controller 160, 306 upon receipt. The system controller 160, 306 may request acknowledgement of receipt of the discovery message at 408. The control devices 304 that received the discovery message, or received the discovery message above a predefined threshold (e.g., the reception power threshold), may acknowledge receipt of the discovery message by communicating a digital message with the identifier of the control device 304 and/or the signal strength at which the discovery message was received (e.g., the RSSI) at 408.

The system controller 160, 306 may identify the discovery messages received at the load control discovery device 190, 202, 302 at 410. For example, the one-way communication devices may communicate a discovery message that includes the device identifier of the transmitting device to the load control discovery device 190, 202, 302 to be discovered. The load control discovery device 190, 202, 302 may store the signal strength at which the discovery messages are received and may provide the device identifiers of the control devices 304 from which the messages were received and the corresponding signal strengths to the system controller 160, 306. In another example, the system controller 160, 306 may identify the discovery messages received from the one-way communication devices and the signal strength at which the devices were received. Though method 400 may describe the identification of discovery messages and coordination of control devices 304 as being performed at the system controller 160, 306, such functionality may be implemented by other devices (e.g., by the control devices 304, etc.).

At 412, the system controller 160, 306 may organize the discovered control devices 304 into an organized dataset. The organized dataset may be a list of device identifiers and/or the corresponding signal strengths. The identifiers of the discovered devices may be ordered according to signal strength (e.g., ordered from highest signal strength to lowest signal strength). The system controller 160, 306 and/or the network device 128, 308 may remove the control devices 304 that have a corresponding signal strength that is below a predefined threshold (e.g., the reception power threshold) from the organized dataset. The system controller 160, 306 and/or the network device 128, 308 may include the control devices 304 that have a corresponding signal strength that is above a predefined threshold in the organized dataset. The organized dataset may be determined by the network device 128, 308 or the organized dataset may be provided to the network device 128, 308 at 414 by the system controller 160, 306. For example, the organized list of device identifiers and/or the corresponding signal strengths may be provided to the network device 128, 308.

The system controller 160, 306 may receive association information from the network device 128, 308 at 416. Control devices 304 may be associated with one another via a command on the network device 128, 308. For example, the network device 128, 308 may have a push button (e.g., soft button or hard button) for associating one control device (e.g., control-source device) with another control device (e.g., control-target device). The network device 128, 308 may provide a push button for control devices that have signal strengths above a predefined threshold. A user may associate a control device with another control device by selecting the respective control devices displayed on the network device 128, 308, and/or the user selecting the associate push button on network device 128, 308.

The association information received from the network device 128, 308 may include associations of device identifiers with location identifiers. The association information may also include associations between control devices 304. The system controller 160, 306 may also, or alternatively, receive control configuration information from the network device 128, 308 that includes preset control instructions for identified control devices 304. The system controller 160, 306 may associate the control devices 304 at 418. For example, the system controller 160, 306 may store the association information locally and/or transmit associated device identifiers to control devices 304 for being stored locally thereon. The control configuration information may also be stored at the system controller 160, 306 and/or at the corresponding control devices 304. The method 400 may end at 420.

FIG. 5 is a block diagram depicting an example method 500 for discovery and association of control devices. As shown in FIG. 5, the method 500 may begin at 502. At 504, a discovery trigger may be received. The discovery trigger may be received, e.g., as a message by the load control discovery device 190, 202, 302 and/or as an actuation of a button of the load control discovery device 190, 202, 302. The discovery trigger may indicate the discovery range for transmitting discovery messages or the discovery range may be preconfigured. For example, the discovery message may indicate the size of the location in which the control devices are being discovered, or the discovery range may be explicitly identified. The discovery range may be established by configuring a wireless signal to cover a defined area or by disregarding information obtained from outside of the defined area, for example.

The load control discovery device 190, 202, 302 may transmit, at 506, discovery messages. The load control discovery device 190, 202, 302 may transmit the discovery messages at an identified transmission power (e.g., identified in the discovery trigger message, predefined locally, etc.). Discovery messages may include an identifier of the load control discovery device 190, 202, 302 and/or a location identifier for a defined location. The discovery messages may include a discovery message identifier identifying the message as a discovery message. The discovery message may be the association message for the control device identified as the load control discovery device 190, 202, 302. The discovery message may identify a discovery range from the discovery trigger message and/or local storage. The discovery messages may be sent directly from a load control discovery device 190, 202, 302. For example, the load control discovery device 190, 202, 302 may send the discovery messages to control devices 304 in response to the load control discovery device 190, 202, 302 receiving the discovery trigger message at 504.

The load control discovery device 190, 202, 302 may receive discovery messages from control devices 304 at 508. For example, the load control discovery device 190, 202, 302 may receive discovery messages from one-way communication devices and/or control devices outside of the discovery range. The discovery messages may also, or alternatively, be sent in response to a request from the load control discovery device 190, 202, 302. The discovery messages may include a device identifier of the control device 304 from which the discovery messages are transmitted. The discovery messages may be the association message from the control devices 304.

The load control discovery device 190, 202, 302 may identify and store the signal strength at which the discovery messages are received from the control devices 304 at 510. The signal strengths may be identified by an RSSI at which the discovery messages are received. At 512, the control device identifiers of the control devices 304 from which the discovery messages have been received may be provided to the system controller 160, 306. The signal strengths at which the discovery messages are received at the load control discovery device 190, 202, 302 may also be provided to the system controller 160, 306. The control device identifiers and/or the signal strengths may be provided in response to a request from the system controller 160, 306. The control device identifiers and/or the signal strengths may also, or alternatively, be provided to the network device 128, 308 (e.g., in response to a request) when the network device 128, 308 and the load control discovery device 190, 202, 302 communicate via the same communication signals. The signal strengths may be organized in a list (e.g., ordered from highest signal strength to lowest signal strength) at the system controller 160, 306. The control devices 304 and/or signal strengths may be provided in the organized list (e.g., ordered from highest signal strength to lowest signal strength) to the network device 128, 308.

The system controller 160, 306 may receive association information and/or control configuration information from the network device 128, 308 and store the association information and/or control configuration information at 514. The association information and/or control configuration information may be configured by user selections at the network device 128, 308. The system controller 160, 306 may send the updated association information and/or control configuration information to the respective devices. The system controller 160, 306 may use the association information and/or control configuration information to send digital messages to control electrical loads in a load control environment. The method 500 may end at 516.

Though the signal strengths may be implemented in the method 500 as the discovery criteria for discovering control devices, other discovery criteria may also, or alternatively, be implemented. The system controller 160, 306 may discover an initial set of control devices using an initial discovery criteria. The system controller 160, 306 and/or the network device 128, 308 may further filter the discovered devices using subsequent discovery criteria. The discovery criteria may be prompted to the user at the network device 128, 308 and the discovered devices may be further filtered based on each criteria selected by the user.

FIG. 6 depicts an example graphical user interface (GUI) 602 that may be used to perform associations of control devices at a network device, such as network device 128, 308. As shown in FIG. 6, the example GUI 602 may present options for selection by a user. Though the options may be presented to a user via buttons in the GUI 602, the options may be presented via drop-down lists, check boxes, etc. The options may include an option for selecting a device, an option for assigning the device as a load control discovery device 190, 202, 302 an option for assigning the device with another device, an option for assigning the device with a location, and/or an option for identifying the device. Devices may relate to control devices (e.g., control-source devices and/or control-target devices).

The GUI 602 may include a list of discovered control devices 630. The list of discovered control devices 630 may be displayed in response to selection of a discovery button 604. The discovery button 604 may be selected for requesting (e.g., to the system controller 160, 306 and/or the load control discovery device 190, 202, 302) discovery of control devices within a discovery range 606. Devices in the discovery range 606 may be organized in an organized dataset according to signal strength. For example, the control devices may be ordered on the network device 128, 308 according to signal strengths (e.g., ordered from highest signal strength to lowest signal strength). The network device 128, 308 may display the control devices that have a corresponding signal strength that is above a predefined threshold in the organized dataset. The control devices may be displayed with a corresponding signal strength indicator 608 that indicates the relative signal strength of the discovered control devices 630. The discovered control devices 630 may be displayed to indicate the device type and/or whether the device is a control-target device and/or a control-source device. The load control discovery device 190, 202, 302 may be included in the discovered control devices 630 for being associated with locations and/or devices.

The GUI 602 may display a corresponding load control discovery device assignment button 632 for one or more of the discovered control devices 630. The load control discovery device assignment button 632 may be selected by a user to assign the corresponding discovered control device 630 as the load control discovery device 190, 202, 302 at the network device 128, 308. The network device 128, 308 may communicate messages to other devices (e.g., system controller 160, 306, the identified load control discovery device 190, 202, 302, other control devices, etc.) to identify the assigned control device 630 as the load control discovery device 190, 202, 302. For example, assigning the remote control device 116 as load control discovery device 190, 202, 302 may designate that remote control device 116 be transmitter and/or originator of a discovery message, as described herein.

A control device that has been assigned as the load control discovery device 190, 202, 302 may be removed from being the load control discovery device 190, 202, 302 by selecting the load control discovery device assignment button 632. When the load control discovery device assignment button 632 is selected for an identified load control discovery device 190, 202, 302, the network device 128, 308 may communicate messages to other devices (e.g., system controller 160, 306, the identified load control discovery device 190, 202, 303, other control devices, etc.) to remove the identification of the control device 630 as the load control discovery device 190, 202, 302.

The user may select the discovery range 606 for the load control discovery device 190, 202, 302. The discovery range 606 may be established using a dropdown box or other button (not shown) on the GUI 602. Referring again to FIG. 1, assigning the remote control device 116 as the load control discovery device 190, 202, 302 may designate that the discovery range 134 be centered on the remote control device 116. For example, if the load control discovery device assignment button 632 is selected that corresponds to the remote control device, the discovery range 134 may be sent to the system controller 160, 306 and/or the remote control discovery device 116 for calculating the transmission power or receive threshold for the discovery range of discovery messages transmitted from the load control discovery device 190, 202, 302. The options for the discovery range 606 may change depending on the type of device or devices being assigned as the load control discovery device 190, 202, 302. The discovery range 606 may be configurable based on the transmission power of the device listed and/or selected as the load control discovery device 190, 202, 302. For example, if the device listed and/or selected is capable of transmitting and/or receiving transmissions up to a distance of twenty feet, the discovery range 606 may be established between zero and twenty feet, or at a predefined number of locations corresponding to the selected device.

As shown on FIG. 6, the GUI 602 may include a device association button 634 for one or more of the discovered control devices 630. The device association button 634 may be selected by a user to associate the corresponding discovered control device 630 with other control devices. For example, the device association buttons 634 that correspond to the remote control device and the motorized window treatment may be selected to associate the device identifiers of the discovered remote control device and the motorized window treatment. The network device 128, 308 may communicate messages to other devices (e.g., the system controller 160, 306, the associated devices, other control devices, etc.) to identify the association.

The GUI 602 may identify control-source devices and control-target devices and may allow association between control-source devices and control-target devices. The GUI 602 may disallow association between the same type of devices (e.g., control-source devices and control-source devices, control-target devices and control-target devices, etc.).

The device association button 634 may be selected by a user to disassociate previously associated control devices 630. When the device association button 634 is selected for discovered control devices 630 that are already associated or selected for being associated, the association may be removed and the network device 128, 308 may communicate messages to other devices (e.g., the system controller 160, 306, the associated devices, other control devices, etc.) to remove the association. The associated devices may be indicated such that the user may remove the associations.

The discovered control devices 630 may be selected to identify other association information for the selected control device. For example, the discovered control devices 630 may be selected to identify device identifiers of devices with which the selected control device is currently associated, which may include undiscovered devices. The user may select one or more of the device identifiers and the device association button 634 of a corresponding discovered control device 630 to associate or disassociate the discovered control device 630 with the selected devices. The network device 128, 308 may communicate messages to other devices (e.g., the system controller 160, 306, the associated devices, other control devices, etc.) to update the association information.

The GUI 602 may include a location association button 636 for one or more of the discovered control devices 630. The location association button 636 may be selected by a user to associate the corresponding discovered control device 630 with a location. For example, referring again to FIG. 1, remote control device 116 may be associated with a conference room (e.g., conference room A), a living room, etc. The location may be a preconfigured location (e.g., such as the predefined location of the load control discovery device 190, 202, 302) or the user may be prompted to select the location for assignment. The network device 128, 308 may communicate messages to other devices (e.g., the system controller 160, 306, the associated devices, other control devices, etc.) to identify the association with the location. The location association may be included in the association information for a device and may be updated with the device association.

The location association button 636 may be selected by a user to disassociate a discovered control device 630 with previously associated locations. When the location association button 636 is selected for discovered control devices that are already associated with a location or are selected for being associated with a location, the association may be removed and the network device 128, 308 may communicate messages to other devices (e.g., the system controller 160, 306, the associated devices, other control devices, etc.) to remove the association with the location.

The discovered control devices 630 may be selected to identify other locations with which the discovered control devices 630 are associated. For example, the discovered control devices 630 may be selected to identify location identifiers of locations with which the selected control device is currently associated. The user may select one or more of the location identifiers and the device association button 634 of a corresponding discovered control device 630 to associate or disassociate the discovered control device 630 with the selected location. The network device 128, 308 may communicate messages to other devices (e.g., the system controller 160, 306, the associated devices, other control devices, etc.) to update the association information.

The GUI 602 may include a device identification button 638 for one or more of the discovered control devices 630. The device identification button 638 may be selected by a user to identify the corresponding discovered control device 630 to the user. Selection of the device identification button 638 for a corresponding device may cause the network device 128, 308 to send a digital message to the system controller 160, 306 and/or the device for which the device identifies itself to the user. The digital message may include load control instructions that correspond to the control device for controlling an electrical load (e.g., controlling a corresponding electrical load, turning on an LED on the device, turning off an LED on the device, flashing the LED on the device, performing an audible identification, etc.) to identify the device. Alternatively, the digital message may be a request for the device to identify itself and the system controller 160, 306 and/or the device may determine the load control instructions locally.

The device may be identified for configuration and/or association. For example, upon selecting the device identification button 638 corresponding to the remote control device on the GUI 602, the remote control device may be instructed to identify itself to a user. The remote control device may identify itself visually or audibly. A light control device may identify itself by flashing a corresponding lighting fixture. A thermostat may identify itself by flashing an indicator light, providing a message on the thermostat display, and/or providing an identification via the HVAC system controlled by the thermostat. The thermostat may provide an indication via the HVAC system by turning the HVAC system on or off, increasing or decreasing the temperature of the HVAC system, or the like. A motorized window treatment may identify itself by moving the corresponding covering material that it controls.

Though the GUI 602 includes a corresponding button 632, 634, 636, 638 for each of the discovered control devices 630 to identify selection of the corresponding function for an identified device, the GUI 602 may include one or more load control discovery device assignment buttons 632, device association buttons 634, location association buttons 636, and/or device identification buttons 638. For example, the GUI 602 may include a single load control discovery device assignment button 632, device association button 634, location association button 636, and/or device identification button 638, which correspond to the discovered control devices 630 and/or an identified location. The discovered control devices 630 may be displayed as buttons to be selected to identify the device and the buttons 632, 634, 636, 638 may be selected to indicate the corresponding function for the identified device.

FIG. 7 depicts an example graphical user interface (GUI) 700 that may be used to perform location association at a network device, such as the network device 128, 308 for example. The GUI 700 may be used to select a location 714 with which a discovered control device may be associated or disassociated. For example, the GUI 700 may be displayed at the network device 128, 308 upon selecting location association button 636 (shown in FIG. 6). Different locations 714 may be displayed on the GUI 700 for being associated with control devices. The locations 714 may be displayed by name and/or by identifier.

The locations 714 may be displayed to indicate the identity and/or category of the location. For example, as shown in FIG. 7, the locations 714 may include conference rooms (e.g., conference room A 702, conference room B 704, conference room C 706, etc.), cafeteria 708, offices (e.g., office A 710, office B 712, etc.), and/or the like. The locations 714 may be presented as buttons that a user may select for associating a discovered control device with one or more of the locations 714.

FIGS. 8A-8J illustrate example graphical user interfaces (GUIs) that may be displayed by a visual display of a network device (e.g., the visual display 110 of the network device 128 shown in FIG. 1) during an area configuration procedure. The GUIs may be displayed via a web interface (e.g., generated by a system controller or other remote device) and/or a control application executed by the network device. The area configuration procedure illustrated in the GUIs may allow a user to associate one or more control-source devices (e.g., input devices, such as the remote control device 116, the remote control device 142, the remote control device 154, the occupancy sensor 112, and/or the daylight sensor 150 shown in FIG. 1) with one or more control-target devices (e.g., the lighting control devices in the lighting fixtures shown in FIG. 1, the motorized window treatment 120, the plug-in load control device 124, the temperature control device 136 shown in FIG. 1) in a specific area.

As shown in FIG. 8A, a user interface 800 may be displayed during an area configuration procedure on a network device. The user interface 800 may allow the user to select an option 802 (e.g., a “Create an area” option) on the network device to create an area in a load control system. The area may be defined for associating and controlling devices in the system. The network device may assign a name (e.g., a unique name) to the area being configured. The network device may receive a name in an area name text field 812 of an area name screen 810 as shown in FIG. 8B.

The network device may receive the type of control-source device (e.g., the type of input device) to associate with one or more of the control-target devices (e.g., the lighting control devices of the lighting fixtures) in the defined area from an input device selection screen 820, shown in FIG. 8C. For example, the network device may display the input device selection screen 820 from which the user may select a remote control device option 822 (e.g., a Pico® remote control device option), an occupancy sensor option 824, or a daylight sensor option 826. The remote control device option 822 may allow a user to select a type of remote control device to be added to the defined area. The occupancy sensor option 824 may allow a user to select a type of occupancy sensor to be added to the defined area. The daylight sensor option 826 may allow a user to select a type of daylight sensor to be added to the defined area. The types of devices may be predefined for each option as devices that may be configurable within the system. The input device selection screen 820 may include an option 828 indicating that none of indicated devices may be included in the area. If none of the indicated devices are included in the area, the network device may request the system controller to again query the control devices to identify devices that received the discovery message. The signal strength of the query may be changed to incorporate a larger range in an attempt to discover other devices.

The input device options may allow the user to select the type of device to be assigned as the load control discovery device. The network device may display a button actuation instruction screen 830, as shown in FIG. 8D, to assign the device as the load control discovery device and/or transmit a discovery message. The button actuation instruction screen may include an image 832 illustrating to the user instructions for entering the discovery mode for the selected device. The image 832, for example, may instruct the user to actuate a button of the selected input device after which the user may press and hold the appropriate button of the input device located in the area. For example, if the remote control device option 822 is selected on the input device selection screen 802, the image 832 of the button actuation instruction screen 830 may be an image of a remote control device (e.g., a 5-button Pico® remote control device) instructing the user to press and hold the bottom button of the remote control device for the defined period of time (e.g., six seconds), as shown in FIG. 8D. The selected device may send a discovery message upon performance of the instructions for discovering control devices in the area.

The network device may display one or more alternate device options 834 for the identified device type. The alternate device options 834 may each be selected to change the image 832 on the button actuation instruction screen 830 to an image of the selected remote control device and corresponding instructions for the device. The remote control devices may have a different number of buttons and appropriate instructions for the identified remote control device may be displayed. If the occupancy sensor option 824 or the daylight sensor option 826 is selected on the device input selection screen 820, the image 832 of the button actuation instruction screen 830 may be an image of an occupancy sensor or a daylight sensor, respectively, with appropriate instructions for actuating a button on each of those sensor devices.

The network device may receive and display a list of control devices within a discovery range of the input device. The list of control devices may include a number of different types of control devices, or the types of control devices may be displayed on separate screens. As shown in FIG. 8E, the list of discovered control devices may include a list of lighting fixtures comprising the lighting control devices that responded to the transmitted discovery message. The network device may display a fixture identification screen 840 (e.g., upon the user selecting to view the list of fixtures to be added) having a list 842 of fixture identifiers 844. Though a fixture identification screen 840 is provided as an example, screens of other discovered control devices or a generic control device screen may similarly be displayed.

The list 842 of fixture identifiers 844 may be displayed in an order determined by decreasing signal strength based on the proximity of the fixtures to the input device on which the button was actuated (e.g., as described herein). The fixture identifier 844 of the lighting control device characterized by the highest signal strength may be located at the top of the list 842. The network device may display additional fixtures upon identification of the selection of the more fixtures option 843. The additional fixtures may be the next set of fixtures in the list of fixtures organized according to signal strength. The lists of fixtures may be cycled through until returning to the original list of fixtures that include the fixtures that received the discovery message with the highest signal strength.

The network device may receive an indication to identify of one of the lighting control devices in a lighting fixture by a user selection of the flash option 845 next to the corresponding fixture identifier 844 for that lighting control device in the list 844. The network device may send a message to the system controller, or directly to the lighting control device, to cause the lighting control device to flash the lighting load in the lighting fixture. Other identification options may be displayed and/or selected to otherwise identify control devices displayed in a list.

The user may select one or more of the lighting control devices to be associated with the selected input device by selecting a selection icon 846 next to the fixture identifier 844 for the respective lighting control devices in the list 842. As shown in FIG. 8F, when the network device receives a selection of one of the selection icons 846 in the list 842, the selection icon may change to a check icon 848 indicating that the lighting control device having that fixture identifier 844 is selected to be associated with the identified input device. The network device may receive a selection of the flash option 845 to confirm each lighting control device to be associated with the input device. The user may confirm that the lighting control devices are in a present area (e.g., in the load control environment 100 and/or room 102 shown in FIG. 1).

When the user has selected the lighting control devices in the lighting fixtures to associate with the identified input device (e.g., on which the button was actuated), the network device may receive a selection of a next option 849 on the fixture identification screen 840. The network device may identify the selected fixture identifiers of the lighting control devices in the lighting fixtures to associate with the input device. The input device and the selected fixture identifiers may be stored in association information at the network device. The network device may send the association information to the system controller and/or the identified devices (e.g., or control-target devices) in the association information for storage thereon. Though the next option 849 may be identified for generating association information and/or sending the association message to other devices, the association information may be generated and/or sent for a device upon selection of a corresponding selection icon 846.

If the lighting control devices in the selected lighting fixtures are not already included in the presently defined area, the network device may add the fixture identifiers to a list of fixture identifiers for the defined area. The network device may add an input device identifier of the input device to a list of input device identifiers for the defined area and store association information regarding the association between the input device and the lighting control devices in the selected lighting fixtures. A system controller (e.g., the system controller 160 shown in FIG. 1) may also build and store the list of fixture identifiers, the list of input devices, and the association information.

After the association information has been generated for an input device in a defined area, the network device may allow the user to associate other types of control-target devices with the identified input device, select another input device to add to the defined area for generating association information, or define another area. For example, the user may actuate a button on an occupancy sensor to identify the occupancy sensor as the load control discovery device and send a discovery message from the occupancy sensor. The occupancy sensor may be associated with one or more discovered control devices in the area.

As shown in FIG. 8G, the network device may receive and display a list (e.g., the list 842) of lighting control devices in lighting fixtures within a discovery range of the occupancy sensor. The network device may include an already-associated indication 850 below the fixture identifiers 844 of the load control devices of those lighting fixtures that were previously associated with an input device. For example, the already-associated indication 850 may indicate that the load control devices in the lighting fixtures were previously associated with a remote control device. The already-associated indication 850 may identify to the user the fixture identifiers 844 of the load control devices in the lighting fixtures that may be associated with the occupancy sensor. For example, the user may wish to associate the occupancy sensor with the load control devices in the lighting fixtures that were previously associated with the remote control device. The network device may receive a selection of the selection icons 846 next to the fixture identifiers 844 having the already-associated indication 850, such that the check icons 848 are displayed, as shown in FIG. 8H. The already-associated indication 850 may also, or alternatively, indicate the location with which the control devices may already be associated. The already-associated indication 850 may be displayed to identify the fixtures that are already configured for a given area, as such information may be unapparent from the list of fixtures 842, as the list may identify the devices in order of signal strength at which the discovery message was received.

The area configuration procedure may be repeated for each area of a building. To associate an input device in an area (e.g., a presently-configured area) that is adjacent to a previously-configured area, the network device may display information regarding control devices, such as load control devices in the lighting fixtures, in the previously-configured area (e.g., the previously-associated or already-assigned lighting fixtures). The network device or the system controller may identify control devices for previously-configured areas and allow for user selection of previously configured devices for association.

As shown in FIG. 8I, the network device may display fixture identifiers 844′ of lighting control devices in previously-associated lighting fixtures in the previously associated device list 842′ on the fixture identification screen 840. The previously associated control devices may be displayed without performing additional discovery of the devices, or the previously discovered devices may be displayed if discovered in response to a discovery message. The previously discovered messaged may be omitted from the device list 842 of discovered devices. If the network device identifies a selection of the fixture identifier 844′ of a load control device in one of the previously associated lighting fixtures, the network device and/or the system controller may add the identified device to the association information for the input device in the defined area.

As shown in FIG. 8J, the network device may display a warning window 850 to allow the user to confirm that the user wants to associate the input device with the load control device in the previously associated lighting fixture. The warning window 850 may be overlaid on top of the screens for adding the fixtures, or may be provided in a separate screen. If the network device identifies a selection of a confirm option 852 on the warning window 850, the network device may remove the fixture identifier of the load control device in the previously associated lighting fixture from the list 842′ of fixture identifiers for the previously-configured area and add the fixture identifier to the list 842 of fixture identifiers for the presently-configured area. If the user selects a cancel option 854 on the warning window 850, the network device may maintain the lists of fixture identifiers for the previously-configured area and the presently-being-configured area.

The display configuration on the display screens illustrated in FIGS. 8A-8J may enable association of control devices in a load control environment. The display screens may be presented sequentially as user selections are identified at the network device, or in another order than displayed. The display configuration may enable an area configuration procedure to define or redefine control areas within a load control system after installation of the devices, and the control areas may be defined according to the devices being used for control and their respective locations. As many control devices may be installed in the load control system, many devices and options for configuring those devices may be provided to a user when commissioning the load control system or otherwise updating the configuration of the load control system. The display configuration illustrated in FIGS. 8A-8J may be used to optimize the limited display area on the network device.

FIGS. 9A-9C show a further example flowchart of an example area configuration procedure 900 as described herein that may allow a user (e.g., user 132 of FIG. 1) to configure one or more control-source devices (e.g., one or more remote control devices, occupancy sensors, a daylight sensors, window sensors, etc.) and control-target devices (e.g., one or more lighting control devices of lighting fixtures, motorized window treatments, temperature control devices, AC plug-in load control devices, etc.) for one or more areas in a building, for example. Such configuration may include, for each area in a building, associating one or more control-source devices in the area with one or more control-target devices in that area such that the control-source devices may control the control-target devices in that area. The configuration may further include configuring a system controller such that the system controller may control the devices (e.g., automatically through scheduled programs, through user input via a network device, etc.) in each area.

As described herein, configuration procedure 900 may be implemented using one or more devices, such as a control-source device 902, one or more control-target devices 904, a system controller 906, and/or a network device 908. The network device 908 may interface/communicate over a communications network with the system controller 906 over a web based interface, for example, that is provided by the system controller 906 (although other interfaces may be used). The system controller 906 may in turn communicate with control devices 904 over a communications network that may be the same or different network as used by the network device 908. The system controller 906 may be in communication with the control-source device 902 and/or one or more control-target devices 904. The control-source devices 902 may be assigned as the load control discovery device, which may be in communication with the control-target devices 904 and/or the system controller 906. The procedure 900 may include additional, fewer, or other devices and/or messages as discussed herein. The procedure 900 may include steps in other orders.

Beginning at 920, an area or location may be created at the network device 908 and the area may be defined at the system controller 906 by being sent to the system controller 906. The area may be created by a user, via the network device 908 (such as through a graphical user interface), which may instruct the system controller 906 that the user wishes to create/define an area. The defined area may correspond to a specific area (such as room 102 of FIG. 1). The system controller 906 may assign this area the name received in the message at 920. The system controller 906 may define within a database, for example, the area according to the identifier in the message received at 920.

At 922, the network device 908, e.g., in response to user selection, may instruct the system controller 906 to add a control-source device to the defined area. In response, at 924, the system controller 906 may present to the user, via the network device 908, a list of possible control-source devices that the user may add to the area. At 926, the network device 908 may send, e.g., in response to user selection, a selected type of control-source device. The selected type of control-source device may correspond to the control-source device 902 (e.g., as a remote control device or sensor), which may be installed in the defined area.

Responsive to selecting a type of control-source device, at 928 the system controller 906 may instruct the user, e.g., via the network device 908, to actuate control-source device 902 located in the defined area, such as by pressing a button on the device, etc. At 930, the system controller 906 (e.g., automatically or via request by the user via the network device) may communicate/transmit on the network a discovery trigger message to one or more control-target devices 904 that may be in communication range of the system controller 906. Upon receipt of the message, a control-target device 904 may enter a discovery mode in which it will listen for a discovery message. Some control-target devices 904 may be in the area being configured (e.g., area 102) and other control-target devices 904 may be in other areas (e.g., area 104 shown in FIG. 1) that may not currently be configured. Control-target devices 904 installed in the area being configured (e.g., area 102) and control-target devices 904 located in other areas (e.g., area 104) not yet being configured, for example, may receive the discovery trigger message and enter discovery mode to listen for a discovery message.

At 932, a discovery message may be transmitted from the control-source device 902. For example, the user may actuate a button or combination of buttons on the control-source device 902 located in the defined area, or a trigger message may be sent to the control-source device 902 (such as by the system controller 906). Upon receiving an actuation or trigger message, the control-source device 902 may communicate/transmit a discovery message on the network. The discovery message may be a broadcast message. As described herein, the discovery message may include a unique identifier of the control-source device, a device type of the control-source device, an indication of the message type, etc. The system controller 906 and control-target devices 904 in transmission range, for example, of the control-source device 902 may receive the discovery message. The control-target devices 904 installed in the specific area being configured (e.g., area 102) and control-target devices 904 located in other areas (e.g., area 104) not currently being configured, for example, may receive the discovery message at 932.

Responsive to receiving the discovery message, the control-target devices 904 may compute an RSSI value of the discovery message as received by the device. Responsive to receiving the discovery message, at 933 the system controller 906 may communicate to the user, e.g., via the network device 908, that control-source device 902 has been detected. The message identifying the detection of the control-source device may include specific information on the device (e.g., information included in the discovery message, such as device type, unique identifier, discovery criteria, etc.). At 934, the system controller 906 may communicate/transmit on the network to control-target devices 904, that may be in communication range of the system controller 906, a request for acknowledgement of receipt of discovery message. This message may include the unique identifier of control-source device 902 as a request for acknowledgment of receipt of the discovery message from the identified control-source device 902.

Responsive to receiving the request for acknowledgement message from the system controller 906, each respective control-target device 904 may determine whether it received a discovery message and if so, compare the identifier in the discovery message to the identifier in the request for acknowledgement message. If the identifiers match, the control-target device 904 may communicate/transmit an acknowledgement message to the system controller 906, as shown in FIG. 9B at 936. If the identifiers do not match, a control-target device may fail to respond (e.g., to reduce network traffic) or may respond with a negative acknowledgement. As described herein, the acknowledgement message may include a unique identifier of the respective control-target device 904, a device type of the control-target device 904, the respective computed RSSI value, etc. According to a further example, each control-target device 904 may compute/determine a respective random value and transmit its respective acknowledgement message relative to the computed random value. Such a process may result in the control-target devices 904 communicating their respective acknowledgement messages at random times relative to one another, thereby reducing and/or precluding network interference/contention resulting from the devices transmitting at substantially the same time and the system controller 906 missing one or more messages.

At 936, the system controller 906 may receive from one or more control-target devices 904 the communicated acknowledgement messages. The system controller 906 may wait a pre-configured time duration since communicating the request for acknowledgement message to ensure reception of each of the communicated acknowledgement messages. At 938, the system controller 906 may communicate/present to the user, e.g., via the network device 908, information on the control-target devices 904 from which the system controller 906 received an acknowledgement message. This information may include the unique identifier of the respective control-target devices 904, the type of the respective control target devices 904, etc. As discussed herein, the system controller 906 may report/list each of the control-target devices 904 from which it received an acknowledgement message.

As noted elsewhere herein, control-target devices 904 may be detected that are in the area being configured (e.g., area 102) and control-target devices 904 may be detected that are located in other areas (e.g., area 104). In order assist the user in identifying/distinguishing the control-target devices of interest, the system controller 906 may filter the control target-devices 904 by RSSI value to show the user the control-target devices that are relatively closer to the control-source device from which the discovery message was transmitted. The control-target devices 904 with higher/stronger RSSI values have a greater likelihood of being in the area currently being configured. The filtering may include ordering the list of control-target devices 904 by RSSI value (e.g., in a decreasing order), showing those control-target devices with a determined RSSI value above a predefined reception power threshold, and/or showing the top “X” control-target devices having the highest RSSI value, etc. Other variations are possible.

Assuming, for example, that the system controller 906 reports to the network device 908 multiple control-target devices 904 and the user is unable to discern which control-target devices 904 in the area being configured (e.g., area 102) correspond to ones present on the network device, the user, e.g., via the network device 908, may select one or more of the listed control-target devices 904 and instruct the system controller 906 at 940 to cause the selected control-target device(s) 904 to identify themselves to the user. The control-target devices 904 may identify themselves by conveying an audible and/or visual signal to the user. This may include for example, the control-target device 904 itself providing the signal (e.g., make an audible sound, blink an LED(s)), or the control-target device 904 causing its corresponding load to provide a signal (e.g., light turn on, turn off, or blink, shade move up/down, etc.).

Upon receiving the request from the user, at 942 the system controller 906 may communicate/transmit over the network one or more messages to the noted control-target device(s) 904 instructing the control-target device(s) 904 to provide identification. Responsive to the message, the noted control-target device(s) 904 may provide an audible and/or visual signal to the user. At 944, the user, e.g., via the network device 908, may instruct the system controller 906 to cause one or more of control-target devices 904 selected at 940 to stop conveying an audible and/or visual signal to the user. Upon receiving the request, at the system controller 906 may communicate over the network one or more messages at 946 to the noted control-target device(s) 904 instructing the control-target devices to stop providing a signal. Responsive to the message, the control-target device(s) may stop providing an audible and/or visual signal to the user. The identification of the devices may assist the user in associating the correct devices at the network device 908.

At 948, the user, e.g., via the network device 908, may provide association information to the system controller 906. The association information may be provided to instruct the system controller 906 to associate control-source device 902 with one or more control-target devices 904 presented to the user at 938, for example, and to associate the control-source device and one or more control-target devices with the defined area (e.g., are 102).

Upon receiving the request, at 950 the system controller 906 may store in a database, for example, the association information (e.g., identifier, type, etc.) on the control-source device 902 and the noted one or more control-target devices 904, an indication that the control-source device 902 and one or more control-target devices 904 are associated such that the control-source device 902 may control the one or more control-target devices 904, and that the control-source device 902 and one or more control-target devices 904 are associated with the defined area (e.g., are 102). The system controller 906 may communicate association information to the one or more control-target devices 904 noted by the user at 950. The association information may include various pieces of information that a control-target device 904 may store within its memory/database. The information may include, for example, the identifier of the control-source device 902 thereby instructing the control-target device 904 to listen for and act on control messages (e.g., dim/raise light, raise/lower shade, etc.) communicated by the control-source device 902, an identifier of the system controller 906 thereby instructing the control-target device 904 to listen for and act on control messages (e.g., dim/raise light, raise/lower shade, etc.) communicated by the system controller 906, an indication of the area to which the control-target device has been assigned, etc. The information may include, for example, one or more identifiers that associate the control-target device 902 with one or more broadcast control groups. A control group may allow, for example, the system controller 906 to broadcast a control message using the respective identifier. Control-target devices 904, upon receiving such a message and recognizing its part of the group, may act upon the message. For example, such messages may be used to dim each dimmable ballasts/driver in a given area.

As shown in FIG. 9C, at 952 the network device 908 may send control configuration information to the system controller 906. The control configuration information may be configured by the user at the network device 908. In response to such information, at 954 and/or 956 the system controller 906 may communicate via the network one or more control configuration information messages to the control-source device 902 and/or control target device(s) 904.

As a result in part of the messages at 952, 954, 956, for example, at 958 the control-source device 902 may control the one or more associated control-target devices. For example, assuming the control-source device 902 is a remote control, actuation of a button(s) on the device by the user may cause the device to communicate a message on the network. The associated on or more control target devices 904, being configured to listen for messages from the control-source device 902, may receive the message and perform the noted instruction.

At 960, as the user associates the control-source device 902 and control-target device(s) 904 and associates the devices with the defined area (e.g., area 102), the user may use the network device 908 to configure the system controller 906 to control one or more control target device(s) 904. For example, the user may configure the system controller 906 to automatically control one or more control-target devices 904 (e.g., automatically control lighting control devices of lighting fixtures to dim the fixtures at a set time). The system controller 906 may be configured in response to control configuration information received from the network device 908 at 960. In response to such configurations, when a set time occurs for example, the system controller 906 may communicate control instructions, at 962, via the network one or more control messages to one or more control-target devices 904. The one or more control target devices 904, being configured to listen for messages from the system controller 906, may receive the message and perform the noted instruction. In response to such commands, the system controller 906 may communicate via the network one or more configuration messages to the one or more lighting control devices to dim the lighting fixtures. Other configuration examples are possible.

Reference is now made to an example variation to configuration procedure 900 of FIGS. 9A-9C. As mentioned above, the system controller 906 may report/list each control-target device 904 from which it received an acknowledgement message. However, as noted above a user may detect control-target devices in the area being configured (e.g., area 102) and in other areas (e.g., area 104). As noted, it may be desirable to assist the user in identifying/distinguishing the control-target devices 904 of interest. Alternatively and/or in addition, as noted above as control-target devices 904 communicate acknowledgement messages, there may be network interference if a large number of devices communicate the message, even if random transmission is used. According to an example variation to procedure 900, the process may proceed similar to the process described above through step 933. However, at 934 the system controller 906, when communicating the request for acknowledge message, may include in the message a discovery range or band that may correspond to a minimum and a maximum RSSI value, for example (e.g., 10 to −50 dBm). As an additional criteria for a control-target device 904 communicating an acknowledgement message to the system controller 906, the respective control-target device 904 may determine whether its respective RSSI value is within the noted range. The control-target device 904 may communicate the acknowledgement message as described in step 936 to the system controller 906 if its respective RSSI value is within the range. Again, messages may be communicated at random times. Mechanisms other than a range may be used. For example, the system controller 906 may communicate a single value (e.g., −50 dBm) and a control-target device 904 may communicate the acknowledgement message to the system controller 906 if its respective RSSI value is higher than the value.

The system controller 906 may again wait a pre-configured time duration since communicating the request for acknowledgement message to receive acknowledgement messages from the control-target devices. If at the end of the time duration, the system controller 906 fails to receive an acknowledgement messages from the control-target devices 904 (or less than a predefined threshold number), the system controller 906 may repeat step 934 and may automatically communicate on the network a subsequent (e.g., second) request for acknowledge message but with the discovery range modified. Alternatively, the system controller 906 may report the lack of responses to the user, e.g., via the network device 908 and cause the user to initiate the system controller 906 to communicate a subsequent request for acknowledge message. The modified range may be a range that is inclusive (in whole or part) of the previously communicated range, or may be a range that is successive to the prior range (e.g., the prior range may be 10 to −50 dBm and the next range may be −51 dBm to −54 dBm, etc.).

Similar to step 936, responsive to receiving the subsequent request for acknowledgement message from the system controller 906, a respective control-target device 904 may determine whether its respective RSSI value is within the modified range specified in the subsequent request for acknowledgement message and communicate an acknowledgement message to the system controller 906 if its respective RSSI value is within the modified range. Again, messages may be communicated at random times. The system controller 906 may again wait a pre-configured time duration since communicating the subsequent request for acknowledgement message to receive acknowledgement messages from the control-target devices 904. If at the end of the time duration the system controller 906 has failed to receive an acknowledgement message from the control-target devices 904, the system controller 906 may again repeat step 934 and may automatically communicate on the network an additional (e.g., third) request for acknowledgement message but with the discovery range again modified, (e.g., the first range may be 10 to −50 dBm, the second range may be −51 dBm to −54 dBm, and the third range may be −55 to −57 dBm, etc.), etc. Assuming the system controller 906 does receive acknowledgement messages from the control-target devices 904, the process may continue as similarly discussed at step 938.

According to a further aspect of this example, the user may determine that one or more control-target devices of interest are not being shown in the discovered devices provided to the user via the network device 908 at 938 (e.g., because the control-target device 904 did not respond with an acknowledgement message at step 936). Here, the user, e.g., via the network device 908, may instruct the system controller 906 to find additional control-target devices 904. In response to such a request, the system controller 906 may communicate on the network another request for acknowledgement message as similarly communicated at step 934, but with the discovery range modified as discussed above.

FIG. 10 is a flowchart of an example area configuration procedure 1000 for associating control-source devices with control-target devices in a load control area (such as the load control environment 100 shown in FIG. 1). The area configuration procedure 1000 may be implemented using one or more devices, such as a network device, a system controller, one or more control devices, etc. The area configuration procedure 1000 may allow a user (e.g., the user 132 shown in FIG. 1) to associate one or more control-source devices (e.g., input devices) with one or more control-target devices in a specific area. The area configuration procedure 1000 may be repeated for different areas of a building.

The area configuration procedure 1000 may start at 1002, such as when the user selects a “Create an area” option on an area creation screen, such as the area creation screen 800 shown in FIG. 8A. The user may assign a name (e.g., a unique name) to the area presently being configured at 1004. The user may choose the type of control-source device (e.g., the type of input device) to associate with one or more of the control-target devices (e.g., the lighting control devices of the lighting fixtures) in the area at 1006. For example, the network device may display an input device selection screen, such as the input device selection screen 820 shown in FIG. 8C, from which the user may select a control device option. The control device options may be different types of control-source devices for adding to the area.

At 1008, a button on the input device may be actuated to put the input device in an association and/or discovery mode. The network device may display a button actuation instruction screen, such as the button actuation instruction screen 830 shown in FIG. 8D, to instruct the user how to put the input device in an association and/or discovery mode. After the button on the input device is actuated appropriately at 1008, the network device may receive and display, at 1010, a list of control devices within a discovery range of the input device. The network device may display a control device identification screen, which may include a list of control-source and/or control target devices. The control device identification screen may be similar to the fixture identification screen 840 shown in FIG. 8E. The list of control devices may be displayed in an order determined by increasing or decreasing signal strength based on the proximity to the input device on which the button was actuated at 1008.

When the network device receives a selection of each of the control devices to associate with the input device, the network device may associate the selected control devices with the input device at 1012 of the area configuration procedure 1000. If the selected control devices are not already included in the present area at 1014, the network device may add the fixture identifiers to a list of fixture identifiers for that area at 1016. The network device may add an input device identifier of the input device to a list of input device identifiers for that area at 1018 and store association information regarding the association between the input device and the selected control devices at 1020. Though steps are described as being performed by a network device herein, a system controller or a control device may also build and store the list of control devices, the list of input devices, and the association information.

If the area configuration procedure 1000 is incomplete at 1022 (e.g., if there are more input devices to associate with the control devices in the present area), the area configuration procedure 1000 may loop around to allow the network device to receive selections of another input device to associate with one or more of the control-target devices in the area at 1006. For example, the user may actuate a button on another control-source device to associate the control-source device with one or more control-target devices in the area. When the user has completed configuration of the present area at 1022, the area configuration procedure 1000 may exit. The area configuration procedure 1000 may be repeated for each area of a building.

FIGS. 11A and 11B illustrate example graphical user interfaces (GUIs) that may be displayed on a visual display of a network device (e.g., the visual display 110 of the network device 128 shown in FIG. 1) for configuring operational settings of an area (e.g., during or after the area configuration procedure 1000). The GUIs may be displayed via a web interface (e.g., generated by a system controller or other remote device) and/or a control application executed by the network device. The network device may be configured to display a device settings screen 1100. The device settings screen 1100 may display configuration options (e.g., an area occupancy configuration option 1102 and an area tuning configuration option 1104) for configuring the present area. The configuration options may be displayed on the device settings screen 1100 depending upon the types of input devices that have been associated with the control-target devices in the area. For example, if the at least one remote control device and at least one occupancy sensor have been associated with the load control devices in the lighting fixtures in the area, the area occupancy configuration option 1102 and the area tuning configuration option 1104 may be displayed on the device settings screen 1100 as shown in FIG. 11A. If at least one daylight sensor is associated with the control-target devices in the area, such as the lighting control devices in the lighting fixtures, an area daylighting configuration option 1106 may be displayed on the device settings screen 1100 as shown in FIG. 11B.

In response to the selection of the area occupancy configuration option 1102, the network device may display an area occupancy configuration screen (not shown) that allows for adjustment of the occupancy settings (e.g., sensitivity, timeouts, etc.) for the area. In response to the selection of the area tuning configuration option 1104, the network device may display an area tuning configuration screen (not shown) that allows for adjustment of the dimming range settings (e.g., high-end trim, low-end trim, etc.) for the area. In response to the selection of the area daylighting configuration option 1106, the network device may display an area daylighting configuration screen (not shown) that allows for adjustment of the daylighting settings (e.g., daylighting gain, etc.) for the area.

The device settings screen 1100 may display a list 1108 of previously discovered and/or associated control devices. The network device may receive a selection of one of the input devices in the list 1108 of previously discovered and/or associated control devices. The list 1108 of previously discovered and/or associated control devices may include the devices for a common area or for different areas. The selection of a previously discovered and/or associated control device may allow for configuration information (e.g., association information and/or control configuration information) to be displayed and/or modified for storage.

FIGS. 12A-12C illustrate example graphical user interfaces (GUIs) that may be displayed on a visual display of a network device (e.g., the visual display 110 of the network device 128 shown in FIG. 1) for configuring a control device of an area (e.g., during or after the area configuration procedure 1000). The GUIs may be displayed via a web interface (e.g., generated by a system controller or other remote device) and/or a control application executed by the network device.

The network device may display a control device configuration screen 1200 that displays configuration options for configuring a presently-selected control device. For example, the control device configuration screen may display configuration options for configuring presently-selected remote control device (such as the remote control device 130) as shown in FIG. 12A. The control device configuration screen 1200 may be displayed upon selection of a previously discovered and/or associated control device in the list 1106 displayed in FIGS. 11A and 11B. The network device may receive a name for the control device and assign the name to the control device presently being configured, e.g., by entering a name in a control device name text field 1202. The network device may receive instructions for program the operation of the control device by user selection of a programming option 1204. The control device configuration screen 1200 may include an associated device identifier 1206 that indicates the number of associated devices controlled by the input device currently being configured. The control device configuration screen 1200 may include an identification button 1208 that causes instructions to be sent to the associated devices controlled by the input device for the associated devices to identify themselves. For example, lighting control devices in associated lighting fixtures may be instructed to flash a corresponding lighting load.

The network device may display a control device programming screen 1210 in response to a selection of the programming option 1204. As shown in FIG. 12B, the control device programming screen 1210 may display a preset intensity adjustment window 1212, which may allow for the adjustment of a preset intensity for the lighting control devices of the lighting fixtures of the area. During a control operation, the lighting control devices may control the intensities of the controlled lighting loads to the preset intensity in response to an actuation of a preset button of the remote control device presently being programmed. The preset intensity adjustment window 1212 may include a single slider control 1214 for adjusting (e.g., simultaneously adjusting) the preset intensities of each of the lighting control devices of the lighting fixtures in the area (e.g., adjusting the preset intensities of each of the lighting control devices in the area at one time to a single level). The preset intensity adjustment window 1212 may include a raise icon 1216 for raising the preset intensity by a predetermined amount (e.g., in response to a single actuation of the raise icon), and a lower icon 1218 for lowering the preset intensity by a predetermined amount (e.g., in response to a single actuation of the raise icon).

The control device programming screen 1210 may display an individual device configuration option 1219 (e.g., a “Set by fixture” option) to allow for adjustment of the preset intensities of the load control devices of each of the individual lighting fixtures in the area. As shown in FIG. 12C, the network device may display a preset adjustment screen 1220 in response to a selection of the individual device configuration option 1219. The preset adjustment screen 1220 may display separate preset intensity adjustment windows 1222A, 1222B for each of the lighting control devices in the lighting fixtures in the area (e.g., two fixtures as shown in FIG. 12C). Each preset intensity level adjustment window 1222A, 1222B may include a slider control 1224A, 1224B for adjusting the preset intensity of the lighting control device of the respective lighting fixture. Each preset intensity adjustment window 1222A, 1222B may include a raise icon 1226A, 1226B for raising the preset intensity by a predetermined amount and a lower icon 1228A, 1228B for lowering the preset intensity by a predetermined amount. In response to an actuation of preset button of the remote control device during a control operation, the lighting control devices may each control the intensity of the controlled lighting load to the respective preset intensity set in the preset adjustment screen 1220. The preset intensities may be stored at the network device, the system controller, and/or the lighting control devices themselves. The preset adjustment screen 1220 may display a fixture group level control option 1229 (e.g., “Same level for group of fixtures” option) to provide for returning to the control device programming screen 1210 to allow for adjustment of each of the preset intensities of the load control devices of the lighting fixtures in the area in response to the single slider control 1214 of the preset intensity adjustment window 1212.

FIG. 13 illustrates another example graphical user interface (GUI) that may be displayed on a visual display of a network device (e.g., the visual display 110 of the network device 128 shown in FIG. 1) for configuring a preset for a button of a control device in an area having more than one type of load control device. The GUI may be displayed via a web interface (e.g., generated by a system controller or other remote device) and/or a control application executed by the network device.

The area being configured may include one or more load control devices. For example, the area may include one or more of the following types of load control devices: lighting control devices of dimmable lighting fixtures (e.g., dimmed lights), lighting control devices of switched lighting fixtures (e.g., switched lights), contact closure output (CCO) devices, and controllable receptacles. The network device may display a preset programming screen 1300, which may allow for the adjustment of preset settings for the load control devices of the area. During a control operation, the load control devices may control the controlled electrical loads according the preset settings in response to an actuation of the button of the remote control device, or other control-source device, that is presently being programmed. The preset programming screen 1300 may display multiple preset adjustment windows 1302A, 1302B, 1302C, 1302D for each of the different types of load control devices in the area.

As shown in FIG. 13, the preset programming screen 1300 may display a dimmed lights preset adjustment window 1302A to allow for the adjustment of a preset intensity level for the lighting control devices of the dimmable lighting fixtures of the area. The dimmed lights preset adjustment window 1302A may include a slider control 1304A for adjusting the preset intensity level of each of the lighting control devices of the dimmable lighting fixtures in the area. The dimmed lights preset adjustment window 1302A may include a raise icon 1306A for raising the preset intensity level by a predetermined amount and a lower icon 1308A for lowering the preset intensity level by a predetermined amount.

The preset programming screen 1300 may display a switched lights preset adjustment window 1302B for the adjustment of the preset state of the lighting control devices of the switched lighting fixtures, a contact closure output preset adjustment window 1302C for the adjustment of the preset state of contact closure output devices, and a receptacle preset adjustment window 1302D for the adjustment of the preset state of controlled receptacle devices. The switched lights preset adjustment window 1302B, the contact closure output preset adjustment window 1302C, and the receptacle preset adjustment window 1302D may each display preset state options 1305B, 1305C, 1305D. For example, the display preset state options 1305B, 1305C, 1305D may be on, off, and unaffected as shown in FIG. 13.

FIGS. 14A-14H illustrate further example graphical user interfaces (GUIs) that may be displayed on a visual display of a network device (e.g., the visual display 110 of the network device 128 shown in FIG. 1) for monitoring, controlling, and adjusting the configuration of the control devices in a load control area (e.g., such as the load control environment 100 shown in FIG. 1). For example, the GUIs shown in FIGS. 14A-14H may be displayed after the operation of the control devices in the load control area has been initially configured as described above. The GUIs may be displayed via a web interface (e.g., generated by a system controller or other remote device) and/or a control application executed by the network device.

The network device may be configured to display a “system controller selection” screen 1400 (e.g., a hub selection screen) as shown in FIG. 14A (one will recognize that the phrase “system controller selection” screen is used herein for description purposes only and other terms and/or phrases may be used to refer to this screen). The load control environment may include multiple system controllers (e.g., such as multiples of the system controller 160 shown in FIG. 1). The system controller selection screen 1400 may display a list 1402 of indications of system controllers 1404 (e.g., hub devices) to which the network device may connect to in order to monitor, control, and adjust the configuration of the control devices in the load control environment. For example, the load control environment may include a system controller per floor of a building and the system controllers may be named according the respective floor, as shown in the example of FIG. 14A. The system controller selection screen 1400 may also include an “add a system controller” option 1406, which may be selected to add a new system controller to the load control environment and subsequently configure control devices in multiple rooms for the new system controller. Each indication of a system controller in the list 1402 may be selectable by a user.

Upon detecting that one of the system controllers 1404 from the list 1402 on the system controller selection screen 1400 is selected by a user (such as the “2^(nd) Floor system controller”), the network device may connect to the selected system controller (if not already connected) and display a “home dashboard” screen 1410 for the selected system controller as shown in FIG. 14B (one will recognize that the phrase “home dashboard” screen is used herein for description purposes only and other terms and/or phrases may be used to refer to this screen). Again, the selected system controller may generate the home dashboard screen 1410 (and the other screens described below) such as by acting as a web server, or the network device may generate the home dashboard screen 1410 (and the other screens described below) via a control application executed by the network device, etc. although one will recognize that other configurations are possible. The home dashboard screen 1410 may list a number of selectable functions (or operations or commands) that may be selected by a user, such as, for example, a “rooms/areas” function 1412, an “energy” function 1414, a “schedules” function 1416, and a “load shed” function 1418 (again, these phrases are for description purposes only; e.g., rooms/areas function 1412 may be referred to as rooms function). One will recognize that these functions are examples and other, additional, and/or fewer functions may be displayed on the home dashboard screen 1410. The home dashboard screen 1410 may also include a selectable back control 1415 at the top of the home dashboard screen 1410 (although the back control 1415 may situated at other locations within the home dashboard screen 1410) (back control 1415 (and other back controls described herein) may be in the form of a selectable icon or button (here an “>”), for example, although other icons, symbols, and forms may be used, such as selectable text). The network device may be configured to display the system controller selection screen 1400 in response to detecting an actuation of the back control 1415 at the top of the home dashboard screen 1410. In one aspect, the system controller selection screen 1400 and/or the home dashboard screen 1410 may be viewed as and referred to as a type of “home” or base screen.

Upon detecting a selection of the rooms/areas function 1412, the network device may display a “rooms/areas” screen 1420 as shown in FIG. 14C (one will recognize that the phrase “rooms/areas” screen is used herein for description purposes only and other terms and/or phrases may be used to refer to this screen such as “rooms” screen). The rooms/areas screen 1420 may display a list 1422 of rooms and/or areas 1424 (e.g., indications of multiple rooms and/or areas), each of which may be selected to allow for monitoring, controlling, and/or adjusting the configuration of the control devices in the respective rooms/areas (one will recognize that an area may include a room). The rooms/areas screen 1420 may include a new room/area option 1426, which may be selected to configure a new room or area (e.g., as described above with reference to FIGS. 8A-8J). The rooms/areas screen 1420 may also include a back control 1425, a selection/actuation of which by a user may cause the network device to display the home dashboard screen 1410.

Upon detecting a selection of one of the rooms/areas 1424 from the list 1422 on the rooms/areas screen 1420 (such as “Conference Room 2C”), the network device may display a “room dashboard” screen 1430 for the selected room/area as shown in FIG. 14D (one will recognize that the phrase “room dashboard” screen is used herein for description purposes only and other terms and/or phrases may be used to refer to this screen). The room dashboard screen 1430 may list a number of functions (or operations or commands) that may be selected by a user, such as, for example, an “energy” function 1432 (e.g., a monitoring function), a “control lights” function 1434 (e.g., a control function), and a “devices and settings” function 1436 (e.g., an adjusting configuration function) (again, the phrases “energy” function, “control lights” function, and “devices and settings” function are for description purposes only). One will recognize that these functions are examples and other, additional, and/or fewer functions may be displayed on the room dashboard screen 1430. The room dashboard screen 1430 may also include a back control 1435 a selection/actuation of which by a user may cause the network device to display the rooms/areas screen 1420.

Whenever the network device has navigated to a screen past the rooms/areas screen 1420 as described below, the network device may be configured to display a selectable “Go To Rooms” control (such as control 1439) on the visual display of the network device. The network device may be configured to display the rooms/areas screen 1420, for example, in response to detecting an actuation of the “Go To Rooms” control on any screen past the areas/rooms screen 1420 (one will recognize that the “Go To Rooms” control may consistently take a user to a screen other than the areas/rooms screen 1420, such as, for example, the system controller selection screen 1400 or the home dashboard screen 1410. Other examples are possible). For example, as shown in FIG. 14D, the room dashboard screen 1430 may include a “Go To Rooms” control 1439 at the bottom of the screen, a selection/actuation of which by a user may cause the network device to display the rooms/areas screen 1420. One will recognize that while the “Go To Rooms” control 1439 is shown at the bottom of screen 1430, it may be situated at other locations on the screen. According to one example as shown and described herein, each time the “Go To Rooms” control is displayed on various screens, it may be shown consistently in the same location (for example, at the bottom right corner of the screen). According to another example, the “Go To Rooms” control may be displayed at one or more different locations across various screens. One will also recognize that labels other than “Go To Rooms” (such as other word phrases, etc.) may be used to label the control, and that the “Go To Rooms” control may take other forms, such as a selectable icon, symbol, or button, for example.

Upon detecting a selection of the energy function 1432 on the room dashboard screen 1430, the network device may display a “room energy” screen 1440 as shown in FIG. 14E (one will recognize that the phrase “room energy” screen is used herein for description purposes only and other terms and/or phrases may be used to refer to this screen, such as energy screen). The room energy screen 1440 may display information regarding the energy usage and/or savings of the electrical loads in the room/area that was selected on the rooms/areas screen 1420 and to which the room dashboard screen 1430 pertains. The room energy screen 1440 may include a back control 1445, a selection/actuation of which by a user may cause the network device to display the room dashboard screen 1430, and may further include a “Go To Rooms” control 1449, a selection/actuation of by a user which may also cause the network device to display the rooms/areas screen 1420.

Upon detecting a selection of the control lights function 1434 on the room dashboard screen 1430, the network device may display a “room control” screen 1450 as shown in FIG. 14F (one will recognize that the phrase “room control” screen is used herein for description purposes only and other terms and/or phrases may be used to refer to this screen, such as control screen). The room control screen 1450 may display controls (e.g., buttons, linear sliders, rotary knobs, etc.) for receiving control inputs for controlling the control devices and/or electrical loads in the room/area that was selected on the rooms/areas screen 1420 and to which the room dashboard screen 1430 pertains. For example, the room control screen 1450 may display an on button 1452, a raise button 1454, a lower button 1456, and an off button 1455. In response to detecting an actuation of one of the buttons 1452, 1454, 1456, 1458 of the room control screen 1450, the network device may transmit one or more messages that indicate the actuated button to the system controller, which may then transmit one or more messages including commands for controlling the control device(s) and/or electrical load(s) in the selected room/area. The system controller may be configured to turn the lighting fixtures (e.g., all of the lighting fixtures) on and off in response to actuations of the on button 1452 and the off button 1458, respectively. The system controller may be configured to increase and decrease the intensity of the lighting fixtures (e.g., all of the lighting fixtures) in response to actuations of the raise button 1454 and the lower button 1456, respectively. The room control screen 1450 may include a back control 1455, a selection/actuation of which by a user may cause the network device to display the room dashboard screen 1430, and may further include a “Go To Rooms” control 1459, a selection/actuation of which by a user may cause the network device to display the rooms/areas screen 1420.

Upon detecting a selection of the devices and settings function 1436 on the room dashboard screen 1430, the network device may display a “devices and settings” screen 1460 as shown in FIG. 14G (one will recognize that the phrase “devices and settings” screen is used herein for description purposes only and other terms and/or phrases may be used to refer to this screen, such as devices screen or settings screen). The device and settings screen 1460 may display selectable configuration options (or commands or operations) (e.g., a “room occupancy” configuration option 1462, a “room daylighting” configuration option 1464, and a “room tuning” configuration option 1466 as similarly described herein, although, other, additional, or fewer options may be displayed) for adjusting the configuration of the selected room/area (again, the phrases “room occupancy” configuration option, “room daylighting” configuration option, and “room tuning” configuration option are for description purposes only). The configuration options that may be displayed on the device settings screen 1460 may depend upon the types of input devices that have been associated with the control devices in the room/area. For example, if at least one remote control device and at least one occupancy sensor have been associated with the load control devices in the lighting fixtures in the room/area, the room occupancy configuration option 1462 and the room tuning configuration option 1466 may be displayed on the devices and settings screen 1460. If at least one daylight sensor is associated with the control-target devices in the room/area, such as the lighting control devices in the lighting fixtures, the room daylighting configuration option 1464 may be displayed on the device and settings screen 1460. One will recognize that other examples are possible.

The device and settings screen 1460 may display a list 1468 of previously discovered and/or associated control devices in the selected room/area. The network device may receive a selection of one of the control devices in the list 1468 of previously discovered and/or associated control devices. The list 1468 of previously discovered and/or associated control devices may include the devices for a common area or for different areas. The selection of a previously discovered and/or associated control device may allow for configuration information (e.g., association information and/or control configuration information) to be displayed and/or modified for storage. The device and settings screen 1460 may include a back control 1465, a selection/actuation of which by a user may cause the network device to display the room dashboard screen 1430, and may further include a “Go To Rooms” control 1469, a selection/actuation of which by a user may cause the network device to display the rooms/areas screen 1420.

In response to detecting the selection of the room occupancy configuration option 1462, the network device may display a “room occupancy” configuration screen 1470 that may include a number of configuration options (or commands or operations or controls) that allow for adjustment of the occupancy settings (e.g., sensitivity, timeout, etc.) for the selected room/area as shown in FIG. 14H (one will recognize that the phrase “room occupancy” configuration screen is used herein for description purposes only and other terms and/or phrases may be used to refer to this screen, such as “configuration” screen). In response to detecting the selection of the room tuning configuration option 1466, the network device may display a “room tuning” configuration screen (not shown) that may include a number of configuration options (or commands or operations or controls) that allow for adjustment of, for example, the dimming range settings (e.g., high-end trim, low-end trim, etc.) for the selected room/area (one will recognize that the phrase “room tuning” configuration screen is used herein for description purposes only and other terms and/or phrases may be used to refer to this screen, such as “configuration” screen). In response to detecting the selection of the room daylighting configuration option 1464, the network device may display a “room daylighting” configuration screen (not shown) that may include a number of configuration options (or commands or operations or controls) that allow for adjustment of, for example, the daylighting settings (e.g., daylighting gain, etc.) for the selected room/area (one will recognize that the phrase “room daylighting” configuration screen is used herein for description purposes only and other terms and/or phrases may be used to refer to this screen, such as “configuration” screen). Each of the room tuning configuration screen and the room daylighting configuration screen (which again are not shown in the figures) may include a back control, a selection/actuation of which by a user may cause the network device to display the device and settings screen 1460, and may further include a “Go To Rooms” control, a selection/actuation of which by a user may cause the network device to display the rooms/areas screen 1420.

Referring to FIG. 14H, the room occupancy configuration screen 1470 may display a number of configuration options (e.g., programming options) for the occupancy settings in the selected room/area. The room occupancy configuration screen 1470 may display a “status” option 1472 that may allow for adjustment of the status of the occupancy sensor(s) in the selected room/area (e.g., between enabled or disabled). The room occupancy configuration screen 1470 may display one or more “controlled device” options 1474. In response to detecting a selection of one of the controlled device options 1474, the network device may display a “controlled device” configuration screen (not shown) that may allow for choosing the types of control devices that may be controlled by the occupancy sensor(s) in the selected room/area. The room occupancy configuration screen 1470 may display one or more “occupancy settings” options 1476. In response to a detecting a selection of one of the occupancy settings options 1476, the network device may display an “occupancy settings” configuration screen (not shown) that may allow for adjusting the occupancy settings of the occupancy sensor(s) (e.g., the sensitivity, timeout, etc.) of the selected room/area. The room occupancy configuration screen 1470 may display an “occupancy groups” option 1478. In response to detecting a selection of the occupancy groups options 1478, the network device may display an “occupancy groups” configuration screen (not shown) that may allow, for example, for configuring which control devices (such as which lighting fixture or fixtures) of the selected room/area are responsive to a given occupancy sensor or sensors of the selected room/area (one will recognize that room occupancy configuration screen 1470 may include other, additional, and/or fewer configuration options). Each of the controlled device configuration screen, the occupancy settings configuration screen, and the occupancy groups configuration screen may include a back control, a selection/actuation of which may cause the network device to display the room occupancy configuration screen 1470, and may further include a “Go To Rooms” control, a selection/actuation of which by a user may cause the network device to display the rooms/areas screen 1420.

In response to a selection and/or adjustment of one of the configuration options of the room occupancy configuration screen 1470, the room daylighting configuration screen, the room tuning configuration screen, and/or subsequent configurations screens, the network device may transmit a message that indicates the adjusted configuration setting to the system controller, which may then transmit one or more messages for adjusting the configurations of the control devices and/or electrical loads in the selected room/area.

The room occupancy configuration screen 1470 may include a back control 1475 a selection/actuation of which by a use may cause the network device to display the device and settings screen 1460, and may further include a “Go To Rooms” control 1479, a selection/actuation of which by a user may cause the network device to display the rooms/areas screen 1420.

One will recognize that the screens shown in FIGS. 14A-14H are merely examples and that other examples are possible. One will also recognize that the “tree” of screens shown in FIGS. 14A-14H may include additional nested screens that may each include a back control and a “Go To Rooms” control as similarly described herein.

According to a further example, any of the example screens shown if FIGS. 14A-14H (and/or any addition nested screens that may be further accessed from these screens) may also include a selectable “home” control (not shown in the figures) a selection/actuation of which by a user may cause the network device to display, for example, the system controller selection screen 1400 as shown in FIG. 14A or the home dashboard screen 1410 as shown in FIG. 14B. The “home” control may take the form of a word or phrase, like “home”, or the form of a selectable icon, symbol, or button, for example. Other examples are possible.

As can be seen from the discussion of FIGS. 14A-14H, once a user selects a system controller 1404 from the system controller selection screen 1400 of FIG. 14A, and then subsequently selects from home dashboard screen 1410 of FIG. 14B the rooms/areas function 1412, the user may be shown the rooms/areas screen 1420 as shown in FIG. 14C. From here, a user may wish to select a first one of the displayed rooms/area 1424 to monitor, control, and adjust the configuration of the control devices in the room/area, and then similarly select still others of the displayed rooms/areas etc., to monitor, control, and adjust the configuration of the control devices in those respective rooms/areas. As described herein, as a user selects a room/area and navigates through a nested tree of screens such as those shown in FIGS. 14D-14H and then desires to return to the rooms/areas screen 1420 as shown in FIG. 14C for example to select another room, the user may simply select the “Go To Rooms” control from the screen currently being displayed to quickly and easily return to the rooms/areas screen 1420 of FIG. 14C in a single action. This is compared, for example, to the user having to make multiple selections of a back control to back out of the nested screens to get back to the rooms/areas screen 1420 of FIG. 14C. Having to use a back control in this fashion may create confusion to a user and be inefficient. For example, a user may not recall where in the nested tree of screens that the rooms/areas screen 1420 of FIG. 14C is and thus may not know how to navigate back to the screen. The “Go To Rooms” control addresses at least this problem. In addition to the “Go To Rooms” control, each screen may also have a “home” type control (as discussed above) that when selected by a user takes a user back to a main/home screen, such as system controller selection screen 1400 as shown in FIG. 14A or the home dashboard screen 1410 as shown in FIG. 14B. However, a disadvantage of a home control as a way to get back to the rooms/areas screen 1420 is that the user again then needs to make one or more additional selections to get back to the desired rooms/areas screen 1420. Hence, for an intermediate screen, such as rooms/areas screen 1420, of a series of nested tree-like screens that a user may wish to interact with multiple times, the “Go To Rooms” control may provide an efficient manner of getting to this screen once a user is deep within a nested tree of screens. One will recognize that the “Go To Rooms” control may have applications other than load control systems as described herein.

Turning now to FIGS. 15A and 15B, these figures illustrate a flowchart of an example control procedure 1500 for monitoring, controlling, and adjusting the configuration of the control devices in a load control area (e.g., such as the load control environment 100 shown in FIG. 1). The control procedure 1500 may be executed by using one or more devices, such as a network device (e.g., the network device 128) for displaying graphical user interfaces (GUIs) on a visual display of the network device and transmitting messages to a system controller and/or the control devices for controlling and/or configuring the control devices.

The control procedure may start at 1510. The network device may display a system controller selection screen (e.g., the system controller selection screen 1400 shown in FIG. 14A) at 1512. The system controller selection screen may display a list of system controllers (e.g., such as multiples of the system controller 160 shown in FIG. 1) to which the network device may connect to monitor, control, and adjust the configuration of the control devices in the load control area. The network device may continue to display the system controller selection screen until selection of a system controller is detected at 1514.

When a system controller is selected at 1514, the network device may display a home dashboard screen (e.g., the home dashboard screen 1410 shown in FIG. 14B) at 1516. The home dashboard screen may list a number of functions that may be selected such as, for example, a rooms/areas function, an energy function, a schedules function, and a load shed function (selection of the energy function, schedules function, and load shed function are not shown in FIGS. 15A and 15B). The home dashboard screen may also include a back control for causing the network device to display the system controller selection screen at 1512. The network device may continue to display the home dashboard screen until one of the functions is selected or the back control is selected at 1520. When the back control is selected at 1520, the network device may display the system controller selection screen at 1512.

Regarding the rooms/areas function on the home dashboard screen, once a selection is detected at 1518, the network device may display a rooms/areas screen (e.g., the rooms/areas screen 1420 as shown in FIG. 14C) at 1522. The rooms/areas screen may display a list of rooms/areas that may be selected to allow for monitoring, controlling, and/or adjusting the configuration of the control devices in the respective rooms/areas. The rooms/areas screen may also include a back control for causing the network device to display the home dashboard screen. The network device may continue to display the rooms/areas screen until one of the rooms is selected at 1524 or the back control is selected at 1526. When the back control is selected at 1526, the network device may display the home dashboard screen at 1516.

When selection of one of the rooms/areas on the rooms/areas screen is detected at 1524, the network device may display a room dashboard screen for the selected room/area (e.g., the room dashboard screen 1430 as shown in FIG. 14D) at 1528. The room dashboard screen may list a number of functions that may be selected, such as, for example, an energy function (e.g., a monitoring function), a control lights function (e.g., a control function), and a devices and settings function (e.g., an adjusting configuration function). The room dashboard screen may include a back control a selection of which at 1536 may cause the network device to display the rooms/areas screen at 1522. The room dashboard screen may also include a “Go To Rooms” control a selection of which at 1538 may cause the network device to display the rooms/areas screen at 1522 The network device may continue to display the room dashboard screen until one of the functions is selected at 1530, 1532, or 1534, the back control is selected at 1536, or the “Go To Rooms” control is selected at 1538. When selection of the back control is detected at 1536 or selection of the “Go To Rooms” control is detected at 1538, the network device may display the rooms/areas screen at 1522.

When selection of the energy function on the room dashboard screen is detected at 1530, the network device may display a room energy screen for the selected room/area (e.g., the room energy screen 1440 as shown in FIG. 14E) at 1540. The room energy screen may display information regarding the energy usage and savings of the electrical loads in the selected room/area. The room energy screen may include a back control and a “Go To Rooms” control. The network device may continue to display the room energy screen until selection of the back control is detected at 1542 or selection of the “Go To Rooms” control is detected at 1544. When the back control is selected at 1542, the network device may display the room dashboard screen at 1528. When the “Go To Rooms” control is selected at 1544, the network device may display the rooms/areas screen at 1522.

When selection of the control lights function on the room dashboard screen is detected at 1532, the network device may display a room control screen for the selected room/area (e.g., the room control screen 1450 as shown in FIG. 14F) at 1546. The room control screen may display controls (e.g., buttons, linear sliders, rotary knobs, etc.) for controlling the control device and/or electrical loads in the selected room/area. The room control screen may include a back control and a “Go To Rooms” control. The network device may continue to display the room control screen until a control input is received at 1548, the back control is selected at 1550, or the “Go To Rooms” control is selected at 1552. When a control input is received from a user at 1548 (e.g., in response to an actuation of the controls on the room control screen), the network device may, at 1554, transmit a message that indicates the actuated control to the system controller, which may then transmit one or more messages including commands for controlling the control device(s) and/or electrical load(s) in the selected room/area. When selection of the back control is detected at 1550, the network device may display the room dashboard screen at 1528. When selection of the “Go To Rooms” control is detected at 1552, the network device may display the rooms/areas screen at 1522.

When selection of the devices and settings function on the room dashboard screen is detected at 1534, the network device may display a devices and settings screen for the selected room (e.g., the devices and settings screen 1460 as shown in FIG. 14G) at 1556. The devices and settings screen may display configuration options (e.g., a room occupancy configuration option, a room daylighting configuration option, and/or a room tuning configuration option) for configuring the selected room/area. The device and settings screen may also display a list of previously discovered and/or associated control devices in the selected room/area. The display of the devices and settings screen may include a back control and a “Go To Rooms” control. The network device may continue to display the devices and settings screen until selection of one of the configuration options is detected at 1558, selection of the back control is detected at 1560, or selection of the “Go To Rooms” control is detected at 1562. When selection of the back control is detected at 1560, the network device may display the room dashboard screen at 1528. When selection of the “Go To Rooms” control is detected at 1562, the network device may display the rooms/areas screen at 1522.

When selection of one of the configuration options on the devices and settings screen is detected at 1558, the network device may display a configuration screen for the selected configuration option (e.g., such as the room occupancy configuration screen 1470 as shown in FIG. 14H) at 1564. For example, if selection of a room occupancy configuration option is detected, the room occupancy configuration screen 1470 as shown in FIG. 14H may be displayed and may show a number of configuration options for occupancy settings in the selected room/area. The configuration screen for the selected configuration option may include a back control and a “Go To Rooms” control. The network device may continue to display the configuration screen for the selected configuration option until selection of a configuration input is received at 1566, selection of the back control is detected at 1568, or selection of the “Go To Rooms” control is detected at 1570. When a configuration input is received at 1566, the network device may, at 1572, transmit a message that indicates the adjusted configuration setting to the system controller, which may then transmit one or more messages for configuring the control devices in the selected room/area. When selection of the back control is detected at 1568, the network device may display the devices and settings screen at 1556. When selection of the “Go To Rooms” control is detected at 1570, the network device may display the rooms/areas screen at 1522.

One will recognize that control procedure 1500 is an example, and other examples are possible that may include the use of a “Go To Rooms” control as described herein.

As described herein, a user may use a network device to communicate with a system controller in order to configure a load control system. Configuring a load control system may result in the creation of configuration information that is stored in one or more files. (One will recognize that the information may be stored in one file or multiple files. For description purposes only, it will be assumed that the configuration information is stored in multiple files). These files may be stored at the system controller in memory of the system controller, and may be stored as flat files, as one or more database files as part of a database management system, etc. although other examples are possible (one will recognize that portions of the configuration information may also be communicated to various control-source devices and control-target devices of the load control system, as applicable, for the operation of such devices) (For description purposes only, it will be assumed that the configuration information is stored in multiple database files). As described herein configuration information may include association information. Association information may include defined areas (e.g., rooms) of a load control environment, load control devices associated with respective defined areas, and information defining associations between control-source devices and control-target devices, or in other words, information that defines which control source devices control which control target devices and how these devices may communicate, such as network addresses. Configuration information may also include timeclock event information, or in other words, commands the system controller may automatically send to control-target devices a set times and dates in order to control the control-target devices. Configuration information may also include configuration options and/or control configuration information, which may include occupancy settings for occupancy sensors (e.g., sensitivity, timeouts, etc.), daylighting settings for daylight sensors (e.g., daylighting gain, etc.), preset control instructions that define how a control target device(s) should respond to an actuation of a preset button(s) of a control-source device (e.g., a remote control device as described with respect to FIGS. 12A-12C, and 13), and zone configurations that may define one or more zones in which control-target devices are defined for being controlled, for example. One will recognize that configuration information may include other types of information. Once configuration information at the system controller is defined, a user via a network device may adjust the configuration information, which may include for example, adding more areas and/or control-source devices and/or control-target devices to the load control system, removing defined areas from the load control system, removing control-source devices and/or control-target devices from a defined area, and/or disassociating control devices that may be associated. Adjusting the configuration information may also include adjusting timeclock event information and configuration options. According to further aspects of a load control system as described herein, multiple different users via different network devices may simultaneously and/or at different times access the system controller via their respective network devices, each user configuring the load control system, such as different parts of the system (such as different areas of a load control environment). One will recognize that these are merely examples, and a system controller/load control system may include other, different, and/or additional configuration information.

As may be discerned herein, the configuration information that is stored within the database files of the system controller may be complex and somewhat time consuming to create. As a result, if a system controller were to experience a hardware failure that requires the system controller be replaced by a new system controller, for example, it may be a non-trivial task for a user(s) via a network device(s) to redefine the load control system (i.e., re-create the configuration information stored within the failed system controller). As one example, because a user may need to recreate the configuration information, it may take some time before a fully functional load control system is once again up and running. Accordingly, it may be desirable for a system controller to create or generate a backup file (also referred to herein as a backup or backup copy) of its configuration information files and in addition, for a copy of this backup file to be stored at a location(s)/computing system or server that is physically separate from the system controller, such as a remote server (the term “remote” is used here to refer to a server or computing system that is separate from the system controller). In addition, because the configuration information is subject to change, it may be desirable for a system controller to create or generate a backup file of its configuration information files as the changes occur, for example. In this fashion, if a system controller were to experience a hardware failure that requires the system controller be replaced by a new system controller, the backup copy of the configuration information of the failed system controller may be loaded into the new system controller, thereby allowing quicker restoration of a fully functional load control system. As described herein, the system controller creating or generating a backup file of its configuration information files may include making copies of the configuration information files within the memory of the system controller, may include condensing these copies into one backup file (e.g., a zip file) (or possibly multiple files), may include condensing or compressing the backup file (or files), may include encrypting all or a portion of the backup file (or files), etc., or some combination thereof. Further examples are possible.

As described herein, the system controller may communicate over a first communications network with control devices of the load control system. As further described herein, the system controller and a network device may communicate over a second communications network that is possibly different from the first communications network. The network device and the system controller may have access to a public network, such as the Internet for example, via this second communications network. In such a configuration, the system controller may create a backup file of its configuration information files and communicate on the second communications network with a remote server to store a copy of the backup file on the remote server, for example. According to another example, the second communications network may alternatively be a private network that does not have access to a public network. This second communications network may be specifically utilized for purposes of a network device and the system controller being able to communicate as described herein, and not a network that includes other systems, such as a remote server for storing backups. One example of such a configuration is to configure the system controller to act as an access point, such as a wireless access point, and to provide the second communications network. In this configuration, a network device(s) may connect to the second communications network provided by the system controller and thereafter communicate with the system controller as described herein to configure, monitor, and control the load control system. One will recognize that other forms of private networks may be configured and used. One advantage of such a private network is that it may provide a degree of security to the system controller, preventing unauthorized access from devices from a public network. However, one disadvantage of such a configuration is that by not having access to a public network or to a remote server on a private network, for example, the system controller may have no mechanism for storing a copy of a backup of the configuration information files on a system/server separate from the system controller. As further described below, a network device may act as a conduit to such a remote server. For example, the network device may request the system controller to generate a backup of the configuration information files. In response to that request, the system controller may serve or communicate or deliver a copy of the backup to the network device. The network device may thereafter communicate or deliver the backup to the remote server.

Referring now to FIGS. 16A-16C, there is shown an example flowchart of an example procedure or process 1600 by which a system controller 1684 may create a backup file of its configuration information files and store a copy of the backup on a remote server 1690 that is separate from the system controller (e.g., separate in that the system controller and the remote server may not be able to directly communicate with one another via a network). According to this example, the system controller 1684 may be part of a load control system that also includes control-source devices and control-target devices (not shown) as described herein. The system controller 1684 may communicate via a first communications network with the control devices of the load control system as described herein. According to a further aspect of this example, the system controller 1684 may communicate with one or more network devices, such as network device 1680, via a second communications network (such as a private network as described above), that is separate from the first communications network (one will recognize that as a still further example, the first and second communication networks may be the same network). According to a still further aspect of this example, the network device may communicate with a remote server 1690 via a third communications network (such as a public network), that is separate from the first and second communications networks (e.g., separate in that the remotes server may not be able to access and/or communicate messages on the first and/or second communications networks via the third communications network). The network device 1680 may be configured to communicate on both the second and third communications networks at the same time (e.g., similar to how mobile phones may communicate on cellular and WiFi based networks) or at different times.

According to this example of FIGS. 16A-16C, the system controller 1684 may include a server application that may execute as one or more software-based processes that provide features and functions described herein. As one example, the processes may include a server process 1686 and a platform process 1688, for example, although other, additional, and/or different processes may be used to provide features and functions described herein. According to one example, the system controller may be configured as a web server, allowing the network device 1680 to interface with the system controller as a web client, and to configure, control, and monitor the load control system via the web client. In such an example, the system controller 1680 may generate GUIs provided to a user 1632 via the web client of the network device. In this fashion, the network device may display information received from the system controller and/or may receive user inputs from a user 1632 for communicating information and commands to the system controller for the user to configure, monitor, and control a load control system as described herein. According to this example, the system controller 1684 may also or alternatively be configured to allow a network device 1680 to execute a control application and interface with the system controller through this application. For example, the control application may be initiated or launched by a user 1632 of the network device 1680. Once initiated, the control application may execute as one or more software-based processes, including a control process 1682, although one will recognize that other, additional, and different processes may be used to provide features and functions described herein. In such an example, the control process 1682 may generate GUIs provided to the user 1632. In this fashion, the control process 1682 may display information (e.g., through GUIs generated by the control process) received from the system controller 1684 and/or may receive user inputs from a user (though such GUIs) for communicating information and commands to the system controller for the user to configure, monitor, and control a load control system as described herein. According to this example, a user interfacing with the system controller 1684 via a web client on a network device may not cause the system controller to generate backups of the configuration information files, as described below. The system controller may only generate backup files of the configuration information files when a user is interfacing with the system controller via the control application of the network device(s). The example procedure of FIGS. 16A-16C is described from the perspective of the network device 1680 interfacing with the system controller 1684 via a control application. Regarding the remote server 1690, it may be a standard computing server that includes a storage application that may execute as one or more software-based processes that provide backup features described herein. As one example, the processes may include a storage process 1692, for example, although other, additional, and/or different processes may be used to provide features and functions described herein. As further described below, the system controller 1684 may generate a backup of the configuration information files and serve or deliver a copy of this backup to the network device 1680. The remote server 1690, via the storage process 1692, may thereafter receive a copy of the backup from the network device 1680 and store the backup within a memory storage system, for example.

Turning now to FIG. 16A, the server process 1686 of the system controller 1684 may include a one or more defined “trigger points”, which may be viewed as events. The server process may monitor for the occurrence of these trigger points (or events) as the network device 1680 interacts/communicates with the system controller. Upon determining that a trigger point or event has occurred at the system controller, the server process 1686 may communicate a message to the control process 1682 of the network device 1680. The message may include a command for the control process 1682 to request that the server process 1686 generate a backup as described below. Each trigger point of the server process 1686 may include a defined trigger level, such as a value from 0 to 4, for example. The trigger level may provide an indication of “importance” or “priority” of the trigger point, where a level 0 is more important (or higher priority) than a level 1, the level 1 is more important than a level 2, the level 2 is more important than a level 3, and the level 3 is more important than a level 4. One will recognize that these levels are merely examples and other indications of levels/importance may be used including fewer or additional levels. As one example, one of the defined trigger points may include that a user 1632 has successfully logged into the system controller 1684 from the network device 1680 (where successfully logging in may include providing a user name and/or password, for example). This trigger point may have a level of 1. As another example, one of the defined trigger points may include that the user 1632 of the network device has selected a backup feature (such as backup feature via a GUI), that causes the control process 1682 to communicate a message to the server process 1686 that includes a command to generate a backup and deliver or serve that backup to the network device. This trigger point may have a level of 0. As one example, this backup select feature may be the only trigger point having this level 0 such that when the user requests a backup be generated, it is always generated as described below. As another example, one of the defined trigger points may include that the control process 1682 has automatically generated (such as based on a timeclock schedule) and communicated a message to the server process 1686 that includes a command to generate a backup and to deliver or serve that backup to the network device. This trigger point may have a level of 1. As another example, certain changes to the configuration information of the system controller may have associated trigger points. For example, removing a control-source device or a control-target device from the load control system may have an associated trigger point having a level of 3. Adding or creating a new area within the load control system and possibly adding one or more control devices to the area may have an associated trigger point having a level of 1. Removing an area from the load control system that has at least one control device may have an associated trigger point having a level of 3. Changing the preset settings of a remote control device may have an associated trigger point having a level of 2. Changing the dimming range settings (e.g., high-end trim, low-end trim, etc.) for an area/lighting control device(s) may have an associated trigger point having a level of 3. Changing the daylighting settings for an area/daylight sensor(s) may have an associated trigger point having a level of 3. Changing an occupancy sensor from being an occupancy sensor to a vacancy sensor may have an associated trigger point having a level of 2. Changing a sensitivity setting or timeout setting, for example, of an occupancy sensor may have an associated trigger point having a level of 3. Activating and/or deactivating load shedding may have an associated trigger point having a level of 4. Changing load shedding settings may have an associated trigger point having a level of 1. Adding and/or deleting a timeclock event may each have an associated trigger point having a level of 3, or may have a higher level, such as 1. Updating the time, date, or enabled/disabled status of a timeclock event may have an associated trigger point having a level of 3. Modifying how control devices are controlled during a timeclock event may have an associated trigger point having a level of 1. These are merely examples and other, additional, and different examples of trigger points and levels are possible.

Turning now to step 1602 of FIG. 16A, a user 1632 via the control process 1682 may log into the system controller (step 1602A). Logging into the system controller may require one or messages be passed between the system controller and the network device. Once logged in, the user via a GUI provided by the control process, for example, may select a backup feature that may allow the user to specifically instruct the system controller to generate a backup and/or serve or communicate or deliver or provide (each of these terms may be used interchangeably herein) a backup to the network device. Upon selection of this backup feature, the control process 1682 may communicate a message to the server process 1686, where the message may include a command for the server process to generate and/or serve or deliver a backup (step 1602 b) (One will recognize that in communicating a message between the network device 1680 and system controller 1684 as discussed at each step or operation of process 1600, and/or in communicating a message between the network device 1680 and the remote server 1690 as discussed at each step or operation of process 1600, multiple messages may be actually communicated. For ease of description, the discussion of process 1600 may refer to one message at each step or operation. Nonetheless, one will recognize that multiple messages may be communicated.) As another example, the control process may execute a timer that is started when the user logs into the system controller. At set times that may be configurable by the user 1632 (such as every 30 minutes), the control process may automatically communicate a message to the server process 1686, where the message may include a command for the server process to generate and/or serve a backup to the network device (step 1602 c). As another example, through a GUI provided by the control process 1682, the control process may cause the server process 1686 (e.g., as a result of a user interacting with the GUI) to make one or more changes to the configuration information, and to store these changes to one or more database files of the system controller (step 1602 d) (i.e., update the configuration information files). As noted, as any of these events (1602 a-1602 d) occur, the server process 1686 may monitor the events and at step 1604, determine that a trigger point(s)/defined event has occurred. Upon detecting or determining that a trigger point(s) has occurred, at step 1606 the server process may communicate a message to the control process 1682. The message may include a command. The command may be a request or suggestion or indication for the control process to request that the server process generate a backup file of the configuration information files and/or provide/serve a copy of the current backup file or a new backup file (as described below) to the network device. This message at step 1606 may also include the trigger level(s) associated with the trigger point(s) that caused the server process to generate the message at step 1606. In one aspect this message may be viewed as the system controller suggesting to the network device that the network device may want to have the system controller generate and/or serve/deliver a backup of the configuration information files to the network device. By having the system controller/server process 1686 generate the message at step 1606, the server process may be viewed as leaving to the network device/control process 1682 the actual decision as to whether or not the server process should generate and/or serve/deliver a backup. In one aspect, the features the system controller provides within a load control system may be viewed as time sensitive. For example, the system controller may assist in communicating a command from a control-source device to a control-target device, and/or may communicate one or more commands to one or more control-target devices in response to a timeclock event. Processing such commands in a timely manner may be necessary with respect to a user's perception of the operation of the load control system, for example. The system controller generating a backup or repeatably generating backups of the configuration information files and serving such backups to the network device may affect the timeliness of such load control commands because of limited computing resources, for example. By having the system controller provide an indication to the network device that a backup may be needed but then leaving the actual decision as to whether or not one is done/generated may allow a user of the network device to control the extent to which the system controller is burdened with backup processing.

As noted above, the user 1632 may also communicate with the system controller via a web client of the network device. When interacting with the system controller in this fashion, the server process 1686 may continue to monitor for trigger points and may continue to generate the message at step 1606 when a trigger point occurs. According to this example, the web client may be configured to ignore the message at step 1606, thereby never causing the system controller to generate a backup as described below. Alternatively, the server process 1686 may not generate the message at step 1606 when a user 1632 is communicating with the system controller via a web client of the network device.

Upon receiving the message at step 1606, the control process 1682 at step 1608 may determine whether or not a backup should be generated at the system controller and/or served or communicated to the network device. The control process may make this determination either through a manual process that involves the user 1632, and/or make this determination in an automated/automatic manner that does involve the user 1632. As an example of the manual process, upon receiving the message at step 1606, the control process may provide an indication to the user 1632 of the network device 1680. That indication may indicate that the system controller is suggesting that a backup be generated and stored at the remote server 1690. For example, a GUI based window may displayed to the user via the network device. The window may include two options that the user may select from, such as “proceed with backup” and “do not proceed with backup”. Based on these options, the user 1632 of the network device may either decide to continue or not to continue with the generation and/or serving of a backup, such as by selection of one of the options. Other examples are possible. If the user decides not to continue with the generation of the backup, the process shown in FIGS. 16A-16C may end. Alternatively, if the user decides to continue with the generation of the backup, the control process 1682 may communicate at step 1610 a message to the server process 1686, where the message may include a command to generate a backup and/or to provide/serve a backup to the network device.

As an alternative to and/or in addition to the manual process just described, upon receiving the message at step 1606, the control process 1682 at step 1608 may automatically make a determination of whether or not the system controller should generate a backup and/or serve the backup to the network device. Here, the control process may include a filter or threshold that is run against the trigger level(s) delivered with message from the server process at step 1606. If the message at step 1606 includes multiple trigger levels, the filter may be run against the lowest trigger level. As one example, the filter may include a filter level that has a value from 0 to 4, for example. One will recognize that these levels are merely examples and other indications of levels may be used including a broader and/or narrower range of levels (such as 0 to 5). The filter level value may be configurable by the user 1632 (such as through a GUI based option). As part of the filter, the control process 1682 may compare the trigger level with the filter level. If the trigger level is less than or equal to (or just less than) the filter value, the control process may determine that a backup should be generated/served. Alternatively, if the trigger level is greater than (or greater than or equal to) the filter value, the control process may determine that a backup should not be generated/served. If the control process decides not to continue with the generation of the backup, the process shown in FIGS. 16A-16C may end. Alternatively, if the control process decides to continue with the generation of the backup, the control process may communicate at step 1610 a message to the server process, where the message may include a command to generate a backup and/or to provide or serve a backup to the network device. Through the use of the filter level, a user 1632 may configure the control process 1682 to control when a backup should be generated/served. For example, if the user sets the filter level to 4, the control process may always request a backup be generated/served (i.e., the case where backups are generated when the trigger level is less than or equal to the filter value). Alternatively, if the filter level is set to 0, the control process may only request that a backup be generated when the trigger level is 0, or in other words, should rarely be generated/served assuming few trigger points have a trigger level of 0 (again, the case where backups are generated when the trigger level is less than or equal to the filter value). By setting the filter level to 2, the control process may only request that a backup be generated when the trigger level is 2 or less (again, the case where backups are generated when the trigger level is less than or equal to the filter value). Here, the user may be indicating that when certain “less” important changes are made to the configuration information, for example, no backup should be generated/served. As a further example, the control process may allow the user to disable the filter thereby resulting in the control process never requesting that a backup be generated/served. One will recognize that these are merely examples and other mechanisms may be used for the control process to automatically determine whether a backup should or should not be generated based on trigger levels.

Referring now to step 1610, as noted the control process 1682 at this step may communicate a message to the server process, where the message may include a command to generate a backup and/or to provide/serve a backup to the network device. The message may also include a signature of the last backup the control process received from the system controller 1684 and successfully uploaded or communicated to the remote server 1690 and/or the signature of a backup the control process received from the system controller 1684 and is attempting and/or will attempt to upload to the remote server 1690. If the control process does not have a stored signature, it may leave this value/field blank in the message communicated at step 1610.

In particular, each time the system controller generates a backup of the configuration information files, the system controller may associate a signature with the backup that may uniquely identify the backup. The system controller may store in its memory both the backup together with its signature. As one example, the signature may be a hash value that is generated by applying a hash function (e.g., a SHA-1, SHA-2, or SHA-3 hash function) to the backup. As another example, the signature may be a timestamp. This timestamp may have the form YYYY-MM-DD HH:MM:SS (Year-Month-Day Hour:Minute:Second), or may be in RFC3339Nano format, possibly without the nanosecond precision (e.g., RFC3339Nano=“2006-01-02T15:04:05.999999999Z07:00”), although other forms may be used. Here, each time the system controller saves configuration information to a database file, the system controller may update a timestamp of the configuration information file with the current date/time. These timestamps may be used as the signature. For example, assuming that the configuration information is stored in one file, the system controller may use the timestamp of the file as the signature associated with the backup of the file. As another example, assuming that the configuration information is stored in multiple files, the system controller may use the timestamp of the most recently updated file as the signature associated with the backup of these files. As a still further example, assuming that the configuration information is stored in one file, the system controller may apply a hash function to the timestamp of the file, and use the resulting hash value as the signature associated with the backup of the file. As another example, assuming that the configuration information is stored in multiple files, the system controller may apply a hash function to the timestamp of the most recently updated file and use the resulting hash value as the signature associated with the backup of the files. As a further example, assuming that the configuration information is stored in multiple files, the system controller may form a string using the timestamp of each file (e.g., “YYYY-MM-DD HH:MM:SS YYYY-MM-DD HH:MM:SS . . . ”), and may apply a hash function to the string of timestamps, with the resulting hash value being the signature associated with the backup of the files (this string may also include names for each file, with the hash function being applied to the timestamps and names; again, other variations may be used). One will recognize that other examples of a signature are possible/may be used. Each time that a backup is served or delivered to the control process 1682 by the server process 1686, the server process may also provide the signature associated with the backup. The control process 1682 may store or record this signature within memory (e.g., non-volatile and/or volatile memory) of the network device. In this fashion, the control process 1682 may record the last “version” of the backup received from the server process 1686 of the system controller 1684. (One will recognize that the network device 1680 may communicate with multiple different system controllers and may store a signature for each system controller each time that a backup is served or delivered to the control process 1682 by that system controller). Each time the control process 1682 receives another/new backup from the server process 1686, the control process may again store the signature associated with that new backup, replacing the prior backup and its corresponding signature with the new backup and its corresponding signature.

According to one example, the system controller 1684 may store in memory at any given time one backup of the configuration information files (and as noted above, also store a signature for this backup, for example, in addition to a creation time as discussed below, etc.). This backup may be stored in volatile or non-volatile memory of the system controller 1684. This backup may be referred to herein as the current backup or the prior backup or the last/latest backup. Each time the system controller generates a new backup of the configuration information files, it may replace/overwrite the current backup with the new backup, thus saving the new backup to memory (together with its signature, etc.) and deleting the current backup. The new backup then becomes the current or prior backup. One will recognize that this is an example, and the system controller may alternatively store more than one version of a backup at a time.

Turning now to step 1612, in response to receiving the message from the control process 1682 at step 1610, the server process 1686 may determine whether the system controller is currently generating a backup (i.e., a new backup). As one example and as noted above, multiple network devices may be simultaneously communicating with the system controller in a similar fashion as described for network device 1680. As a result of these interactions with different respective network devices, the server process (or an instance of this process for each network device) may be instructed by a respective network device to generate a backup. One will appreciate that this is only one example as to why the system controller may be generating a backup upon receiving the message at step 1610 from network device 1680. If the server process determines that a backup is currently being generated, the server process may communicate a message at step 1614 to the control process. That message may include, for example, a code such as an error code that indicates to the control process that the server process is not going to generate and/or server/deliver a backup to the network device 1680. The process 1600 may then end. Alternatively, the process may proceed to another step, such as step 1616 or step 1622 and attempt to deliver the current backup to the network device. Oher examples are possible.

Alternatively, if at step 1612 the server process determines that a backup is not currently being generated, the server process at step 1616 may determine if the system controller is currently serving or delivering or communicating a copy of a backup (i.e., a copy of the current backup) to another network device (i.e., a network device other than network device 1680). If so, the server process may also determine how many network devices are currently being served a copy of the backup. Again, generating a backup and serving a backup to a network device may consume resources (such as processing time/resources) of the system controller that may detract the system controller from operating in a timely manner within the load control system. Hence, it may be desirable to limit the number of network devices to which the system controller may simultaneously serve a copy of a backup. The number of network devices may be a predefined maximum number/threshold. This number may be for example, one at a time, two at a time, etc. If the server process determines at step 1616 that a maximum number of network devices are being served a copy of the backup, the server process may communicate a message at step 1618 to the control process. That message may include, for example, a code such as an error code that indicates to the control process that the server process is not going to generate and/or server/deliver a backup to the network device 1680. The process 1600 may then end.

Alternatively, if at step 1616 the server process determines that a maximum number of network devices (or none at all) are not currently being served a copy of the current backup, the server process may proceed in different variations. As one example, if the server process is serving a copy of the current backup to at least one other network device (i.e., less than the maximum number), the server process may proceed to step 1622 (FIG. 16B) and also determine whether a copy of the current backup should be served to network device 1682. Alternatively, even if the server process is serving a copy of the current backup to another network device (or to none at all), it may proceed to step 1620 (FIG. 16B) and may determine if a backup should be generated (i.e., the system controller may continue to both serve a copy of the current backup to the other network devices, and start generating a new backup to possibly be served to network device 1680, not deleting, for example, the current backup until it is completely served to the other network devices). Beginning with step 1620 a of step 1620, the server process may determine if the configuration information within the configuration information file(s) has changed since the last/latest backup was generated. (As noted above, the control process 1682 may request that a backup be generated as a result of different trigger points, including ones that do not include changes to the configuration information, such as the user 1632 requesting a backup. Hence, it is possible that a backup request be received from the control process 1682 even though the configuration information files have not changed since the last time a backup was generated). As one example, the server process may make the determination of whether the configuration information has changed by comparing the signature of the last/latest (i.e., current) backup generated by the system controller to a signature that may result from a backup of the current configuration information files. Again, the latest/current backup, together with its signature may be maintained in memory (such as non-volatile memory) of the system controller (as discussed below, each time the system controller generates another or new backup together with its signature, it may remove or delete the prior backup, along with this prior backup's signature). If the server process determines that the signatures are the same, the server process may determine that a backup does not need to be generated, and may proceed to step 1622. Alternatively, if the server process determines that the signatures are different, the server process may determine that a backup needs to be generated and may proceed to step 1620 b. As another example, the server process may compare the signature provided by the control process 1682 at step 1610 with a signature that may result from a backup of the current configuration information files. If the server process determines that the signatures are the same, the server process may determine that a backup does not need to be generated, and may proceed to step 1622. Alternatively, if the server process determines that the signatures are different, the server process may determine that a backup needs to be generated and may proceed to step 1620 b. Referring to another specific example discussed above where the signature of a backup may be the timestamp of the most recently updated configuration information file making up the backup (without hashing the timestamp) the server process may compare this timestamp-based signature of the most recent/latest backup with the timestamp of each of the configuration information files. If any file has a timestamp newer (or just different) than the signature of the most recent/latest backup, the server process may determine at step 1620 a that the configuration information has changed and that a backup of the configuration information files should be generated, with the server process proceeding to step 1620 b. Alternatively, if the timestamp of the most recently updated configuration information file is the same as the timestamp-based signature of the most recent/latest backup, the server process may proceed to step 1622. As another similar example where the signature of a backup may be the timestamp of the most recently updated configuration information file making up the backup (without hashing the timestamp), the server process may compare the timestamp-based signature of the most recent backup with the timestamp of the newest configuration information file. If they are different, the server process may determine at step 1620 a that the configuration information has changed and that a backup of the configuration information files should be generated, with the server process proceeding to step 1620 b. Otherwise, the control process may proceed to step 1622. One will recognize that other examples are possible/may be used on how to determine whether or not a backup should be generated.

Turning now to step 1620 b, prior to the server process generating a backup, the server process may next determine the last time a backup was generated (i.e., a time that the current backup was generated) using a creation time associated with the most recently generated/current backup (e.g., each time the system controller generates and saves a backup, the system controller may associate a current date/time (i.e., a timestamp) with the backup file, as may be the case when any file is created or updated for example). The server process 1686 may compare the creation time associated with the most recently generated/current backup to a current date/time (collectively referred to as a current timestamp) as may be maintained by the system controller. As an example, the current timestamp may be relative to when the message at step 1610 is received from the control process and as may be recorded by the server process as the message is received (nonetheless, one will recognize that the server process may record a current timestamp at some other point in time). Upon comparing the creation time of the current backup to the current timestamp, the server process may determine a difference between these timestamps and may further compare this difference to a “stale time”. The stale time may be a predefined time duration/threshold. If the server process determines that the difference between the creation time of the current backup and the current timestamp is less than (or less than or equal to), for example, the stale time, the server process may determine not to generate a backup, and may proceed to step 1622. Alternatively, if the server process determines that the difference between the creation time of the backup and the current timestamp is greater than (or greater than or equal to), for example, the stale time, the server process may determine to generate a backup, and proceed to step 1620 c and the generation of a backup. By using a “stale time” in this fashion, the server process may prevent the system controller from generating multiple backups in a short duration of time. If the system controller were to create multiple backups in a short duration of time, resources (such as processor resources) may be diverted to generating backups and not to the efficient operation of the load control system, for example. The stale time may be a value that can be configured by user 1632, for example.

Assuming a backup is to be generated, turning to step 1620 c the server process may communicate a message to the platform process 1688, where the message may include a command to generate a backup. The message may be communicated, for example, via inter-process communications. In response to receiving the message at 1620 c, the platform process at step 1620 d may generate a backup of the current configuration information files and save the backup within memory (e.g., non-volatile memory) of the system controller, replacing and/or deleting a prior backup. Again, as the backup file is saved, a creation time may be associated with the backup file. At step 1620 e, the platform process may next generate a signature for the new backup, as described herein, and save the signature within memory (e.g., non-volatile memory) of the system controller, replacing and/or deleting the signature of the prior backup. Again, the new backup may now be referred to as the current backup. Thereafter, at step 1620 f, the platform process 1688 may communicate a message to the server process 1686 indicating that a new backup has been generated. The message may include a location within memory of the backup. The message may also include the signature associated with the backup, for example, and its creation time, for example.

Turning now to step 1622, assuming a new backup was not generated at step 1620, for example, the server process 1686 may determine whether the network device 1680 has received the most recent/latest/current backup stored at the system controller. The server process may make this determination by comparing the signature of the most recent/latest backup stored at the system controller with the signature provided by the control process 1682 to the server process 1686 at step 1610 (assuming one was provided). If the server process determines that the signatures are the same, the server process at step 1624 may communicate a message to the control process 1682 that no backup is needed as the network device has a copy of the most recent backup.

Alternatively, if at step 1622 the server process determines that (i) the signature of the most recent/latest/current backup stored at the system controller is different from the signature provided by the control process 1682 to the server process 1686 at step 1610, or that (ii) the control process did not provide a signature at step 1610, and/or that (iii) a new backup was generated at step 1620, the server process at step 1626 may serve or communicate or provide a copy of the backup to the control process (this copy being either the current backup if one was not generated, or the new backup if one was generated). How a copy of the backup is served or communicated or provided between the system controller and the network device may vary. As one example, the server process may send a copy of the backup to the control process/network device. As another example, the server process may cause the control process to retrieve a copy of the backup from the server process/system controller. One will recognize that other variations are possible/may be used. As part of communicating the backup to the control process at step 1626, the server process may also send the signature of the backup. Thereafter at step 1628, the control process may store within memory of the network device the backup, and the signature of the backup, replacing or deleting any prior backup that may be stored at the network device and its respective signature.

Turning now to FIG. 16C, once receiving a copy of a backup from the server process, the control process 1682 may next attempt to upload or communicate or provide the backup to the remote server 1690. Prior to attempting the upload, the control process may first wait a predetermined period of time (referred to herein as a wait time or wait period) (step 1630). This time period may be a user configurable period of time. During this period of time, the control process may continue to receive messages from the server process similar to the message received at step 1606, i.e., a command from the server process for the control process to request that the server process generate a backup file. As one example, this may occur because the user 1632 may continue to make changes to the configuration information, causing the server process 1686 to detect a trigger point at step 1604 and generate the message at step 1606. If such a message is received during the wait time, the control process may continue back to step 1608 as described above for example, determining if there is a new backup it needs to receive from the system controller and receiving that new backup if necessary, replacing the prior one stored in the network device's memory (i.e., the one that has not yet been uploaded to the remote server). One advantage of this wait time is that if configuration information files are being changed by the user 1632 over a short duration of time (e.g. less than the wait time), the network device may not need to continuously upload new backups to the remote server 1690. Rather, once updates to the configuration information files slow down or cease, the network device may receive a final backup copy from the system controller and upload it to the remote server.

Assuming at step 1630 the wait time expires, the control process may next attempt to upload the backup stored in the network device's memory to the remote server 1690. In one aspect, the network device 1680 may not be connected to the third communications network at the time this attempt is made and thus may be unable to communicate with the remote server 1690. This may be the case, for example, if the network device is not in range of a public cellular network. In this case, the control process may continue to operate as described herein, possibly receiving one or more new backups from the system controller, over writing prior ones stored in the network device's memory. Once the network device is connected to the third communications network, for example, the control process may determine whether it needs to upload the backup to the remote server, as the remote server may already have the backup or a newer/more recent backup. This may occur, for example, because another network device may have already completed an upload of the same backup that the network device 1680 is attempting to upload to the remote server (or the other network device may have already completed an upload of a more recent backup than the backup the network device 1680 is attempting to upload). Again, this may occur for example because the network device 1680 may not have immediate access to the remote server.

According to one example, at step 1633 the control process 1682 may determine a hash/hash value, for example, of the backup file it is attempting to upload (e.g., an MD5 sum/hash of the entire file) (this hash value may also be referred to herein as a signature and may be a second signature that is different from the signature produced by the system controller when generating a backup. The signature produced by the system controller may be referred to herein as a first signature). One will recognize that other values/signatures may be used. At step 1634, the control process 1682 may communicate a message to the storage process 1692 of the remote server 1690, where the message may include the computed hash (i.e., the second signature) and a request as to whether the storage process has already received and/or stored a backup with the computed hash/second signature (the message may include other and/or additional values including for example, the creation time of the backup and/or the first signature of the backup as determined by the system controller). Upon receiving the message at step 1634, the storage process at step 1636 may determine whether it has stored a backup with the computed hash/second signature. The storage process may do this in various ways including, for example, comparing the computed hash/second signature as provided by the control process 1682 to a computed hash/second signature of one or more backups stored at the remote server for the system controller 1684 (as one example, the remote server may partition its storage/memory on a system controller basis such that backups are stored and thus searchable on a system controller basis). At step 1638, the storage process may communicate a message back to the control process 1682 where the message may include an indication as to whether or not the backup is already stored at the remote server. This message may include the signature (i.e., the first signature as determined by the system controller) of the most recent backup stored at the remote server. If the message at step 1638 indicates that the remote server already has the backup the network device is attempting to upload, the control process may purge/delete from its memory the backup currently stored therein (step 1640). It may continue to store within memory (e.g., non-volatile memory) of the network device the first signature of the backup just purged from memory, for use of this value as described herein (e.g., with respect to steps 1610 and 1620 a). As another example, the control process may store the signature (i.e., a first signature) as returned by the storage process at step 1638. This returned first signature may be used as discussed above with respect to steps 1610 and 1620 a, for example. In other words, as the network device requests a future backup from the system controller, it will pass this returned first signature to the system controller, which will use the signature to determine if a backup needs to be generated/served to the network device. Process 1600 may then end.

Alternatively, if the message at step 1638 indicates that the remote server does not have the backup the network device is attempting to upload, example process 1600 may continue in one of several variations. As one example, if the storage process 1692 indicates at step 1638 that it does not have a copy of the backup the network device 1680/control process 1682 is attempting to upload but that it has a more recent/newer backup (as determined from creation times, for example), the control process may not upload the backup, purging/deleting the backup from its memory (step 1640), and continuing to store the signature (i.e., first signature) of that backup or the signature (i.e., a first signature) as returned by the storage process at step 1638. Process 1600 may then end. Alternatively, if the remote server does not have the backup the network device is attempting to upload, regardless of whether it has a more recent backup for the system controller 1160, the control process may proceed to step 1642 where the control process may upload a copy of the backup stored at the network device to the storage process 1692. How a copy of the backup is uploaded or communicated between the remote server and the network device may vary. As one example, the control process/network device may send a copy of the backup to the storage process/remote server. As another example, the control process may cause the storage process to retrieve a copy of the backup from the control process/network device. One will recognize that other variations are possible/may be used. As part of communicating the backup to the storage process at step 1640, the control process may also send the first signature of the backup and the computed hash/second signature of the backup. Thereafter at step 1644, the storage process may store within memory/a storage system of the remote server the new backup from the network device 1680, the first signature of the backup, and/or the computed hash/second signature of the backup. At the network device, the control process 1682 may purge/delete from its memory the backup just uploaded to the remote server (step 1646). The control process may continue to store within memory of the network device the signature (i.e., first signature) of the backup just uploaded to the remote server or the signature returned by the remote server at step 1638 (such as if the uploaded backup is older than a backup already stored at the remote server). In general, the control process may continue to periodically attempt to upload a backup stored within memory of the network device until that backup is purged.

One will recognize that this is one example of how a network device 1680 may upload a backup to the remote server 1690 and that other examples are possible/may be used. For example, once the wait time expires at step 1630, for example, the control process 1682 may first communicate a message to the storage process 1692 of the remote server 1690, where the message may include a request for the storage process to return the creation time of the most recent backup stored at the remote server for the system controller 1684. In response to that message, the storage process may communicate a message to the control process, where the message may include the creation time of the most recent backup stored at the remote server. The message may also include the signature (i.e., a first signature) of that backup. The control process 1682 may compare the creation time returned by the storage process to the creation time of the backup the control process is seeking to upload to the remote server. If the creation time of the backup the control process is seeking to upload to the remote server is the same as or older than the creation time of the most recent backup stored at the remote server, the network device may have an out of date backup or the same backup already at the remote server. In this case, the control process may purge/delete from its memory the backup currently stored therein. It may continue to store within memory of the network device the signature (i.e., first signature) of the backup just purged from memory, for use of these values as described herein. As another example, the control process may store the signature (i.e., first signature) of the most recent backup stored at the remote server.

Alternatively, if the creation time of the backup the control process is seeking to upload to the remote server is newer than the creation time of the most recent backup stored at the remote server, the control process may upload a copy of the backup stored at the network device to the storage process. As part of communicating the backup to the storage process, the control process may also send the first signature of the backup and the creation time of the backup. Thereafter, the storage process may store within memory of the remote server the new backup, the first signature of the backup, and the creation time of the backup. At the network device, the control process may purge/delete from its memory the backup just uploaded to the remote server. The control process may continue to store within memory of the network device the first signature and the creation time of the backup just uploaded to the remote server.

As another alternative, the storage process 1692 and the control process 1682 may skip steps 1633-1646 and the control process may just upload the backup to the storage process. In this example, the storage process may determine whether the uploaded backup is newer than the one it is currently storing and only store the uploaded backup when newer (e.g., based on creation times). As another alternative, the storage process may store all backups received from a network device. One will recognize that other variations are possible/may be used.

One will recognize that a load control environment may include multiple load control systems (e.g., each covering different areas of the load control environment), with each load control system having its own system controller, such as a first and a second system controller. The network device 1680 may interface with the first system controller, and receive a backup, and a signature (i.e., a first signature) and creation time for this backup, from the first system controller. The network device may thereafter store the signature and creation time and upload the backup to the remote server 1690. This upload may occur at the time the network device receives the backup from the first system controller, or at a later time if the network device is not in communications with the remote server. After interfacing with the first system controller, the network device 1680 may then interface with the second system controller and receive a different backup, and a signature (i.e., a first signature) and creation time for this backup, from the second system controller. The network device may thereafter store the signature and creation time for this backup from the second system controller, while also maintaining the signature and creation time for the backup from the first system controller. The network device may upload the backup from the second system controller to the remote server 1690, which may occur at the time the network device receives the backup or at a later time if the network device is not in communications with the remote server. One will also recognize that the remote server 1690 may store each backup, signature, and/or creation time from the first and second system controllers separately (i.e., not overwrite one with the other). The remote server may also separately store every backup it receives from a given system controller, as may be the case as a network device receives over time different backups from the system controller and uploads each to the remote server. Other variations are possible/may be used.

While process 1600 has been described as a sequence of steps or operations, one will recognize that the order of the steps/operations may vary, not all steps/operations may be necessary, and process 1600 may include additional and/or other process steps/operations.

Referring now to FIGS. 16D-16E, reference is made to another example process 1650 that may be performed, for example, by a system controller (e.g., system controller 1684) and a network device (e.g., network device 1680) as described herein. While this example is described as a sequence of operations or steps, not all operations/steps may be necessary, additional and/or other operations/steps may be included, and the order of the operations/steps may vary. According to this example, the system controller may have stored within its memory one or more files, such as configuration information files, and a current backup of these file(s). Process 1650 may start at step 1651. Thereafter, at step 1652 the system controller may receive a first message from a network device. This message may be for example, any messages described in relation to step 1602 of process 1600. Based at least in part on receiving the first message from the network device, at step 1653 the system controller may determine whether a trigger point (or several trigger points) of one or more of several defined trigger points has occurred (e.g., been triggered). Each of the trigger points may include a trigger level. If a trigger point has not occurred, process 1650 may end at step 1654. Alternatively, if a trigger point(s) has occurred, the system controller at step 1655 may communicate a second message to the network device. The second message may include the trigger level(s) of the determined trigger point(s). The second message may include a request or command for the network device to request from the system controller a backup of the file(s). Based at least in part on communicating the second message to the network device, the system controller at step 1656 may receive from the network device a third message that includes a command for the system controller to generate a backup of the file(s). Based at least in part on receiving the third message from the network device, at step 1657 the system controller may determine whether a backup of the file(s) is currently being generated. If a backup of the is currently being generated, the system controller may proceed to step 162 and communicate a message (e.g., an error message) to the network device, and process 1650 may end at step 1662.

Alternatively, if at step 1657 the system controller determines that a backup of the files is not currently being generated, the system controller may proceed to step 1658 and may determine whether it is currently (e.g., is in the process of) communicating the current backup to a maximum number (e.g., which may be one or more) of other network devices. If the system controller is in the process of communicating the current backup to the maximum number of other network devices, the system controller may proceed to step 1659 and may communicate an error message to the network device. Thereafter, process 1650 may end at step 1660. Alternatively, if at step 1658 the system controller determines that it is not in the process of communicating the current backup to the maximum number of network devices (possibly none at all), the system controller may proceed to step 1663 (as another and/or additional example, if the system controller is in the process of communicating the current backup to at least one other network device, but not the maximum number of network devices, the system controller may skip step 1663 and proceed to step 1667; in other words, the system controller may determine whether the current backup should be communicated to the network device).

Assuming the system controller proceeds to step 1663, it may next determine whether there is a change to one or more of the files since a time the current backup of the file(s) was generated. If the system controller determines that there is a change to one or more of the files since the time the current backup of the file(s) was generated, the system controller may proceed to step 1664 and may determine a time difference between the time the current backup of the file(s) was generated and a current time. The system controller at step 1665 may then compare the time difference to a stale time. Based on comparing the time difference to the stale time, at step 1666 (FIG. 16E) the system controller may determine whether to generate a backup of the file(s) (e.g., as similarly discussed at step 1620 b). For example, if the time difference is less than the stale time, the system controller may determine not to generate a backup of the file(s), and if the time difference is greater than the stale time, the system controller may determine to generate a backup of the file(s). If the system controller at step 1666 determines that a backup of the file(s) should be generated, it may proceed to step 1668 and may generate a backup of the file(s). At step 1669, the system controller may next generate and store a signature (e.g., a first signature) of the generated backup. At step 1670, the system controller may communicate a copy of the generated backup to the network device, possibly together with the generated signature. Thereafter, the network device may upload (step not shown) the generated backup to a remote server (such as remote server 1690). Process 1650 may then end at step 1671.

Alternatively, if at step 1666 the system controller determines not to generate a backup of the file(s), the system controller may proceed to step 1667 and may determine whether the current backup was previously communicated to the network device. If the system controller determines that the current backup was previously communicated to the network device, the system controller may proceed to step 1672 and communicate a message to the network device where that message may include an indication that the network device has the current backup. Thereafter, the process 1650 may end at step 1673. Alternatively, if at step 1667 the system controller determines that the current backup was not previously communicated to the network device, the system controller at step 1674 may communicate a copy of the current backup (and its signature) to the network device. Thereafter, the network device may upload (step not shown) the current backup to the remote server (such as remote server 1690). Process 1650 may then end at step 1675.

Returning to step 1663 (FIG. 16D), if the system controller determines that there is not a change to one or more of the files since the time the current backup of the files was generated, the system controller may again proceed to step 1667 and proceed as described above.

One will recognize that process 1650 is example and other examples are possible. One will also recognize that the use of first, second, etc. in this example and elsewhere herein is meant to distinguish between different messages, signatures, etc., for example, and not meant to imply a minimum or maximum number of such messages, signatures etc., for example, or necessarily an order of messages, etc.

Turning to FIG. 17, there is shown a block diagram illustrating an example system controller 1700 as described herein. The system controller 1700 may include the system controller 160 shown in FIGS. 1A-1C, the system controller 306 shown in FIG. 3, the system controller 906 shown in FIGS. 9A-9C, and/or the system controller 1684 shown in FIGS. 16A-16C, for example. The system controller 1700 may include one or more general purpose processors, special purpose processors, conventional processors, digital signal processors (DSPs), microprocessors, microcontrollers, integrated circuits, programmable logic devices (PLD), field programmable gate arrays (FPGA), application specific integrated circuits (ASICs), or any suitable controller or processing device or the like (hereinafter collectively referred to as processor(s) or control circuit(s) 1702). The control circuit 1702 may be configured to execute one or more software-based applications that include instructions that when executed by the control circuit may configure the control circuit to perform signal coding, data processing, power control, input/output processing, or any other function, process, and/or operation for example that enables the system controller 1700 to perform as described herein. One will recognize that functions, features, processes, and/or operations described herein of the system controller 1700 may also and/or alternatively be provided by firmware and/or hardware in addition to and/or as an alternative to software-based instructions. The control circuit 1702 may store information in and/or retrieve information from the memory 1704, including configuration information/configuration information file(s), backup file(s), creation times, and signature(s) as described herein. Memory 1704 may also store software-based instructions for execution by the control circuit 1702 and may also provide an execution space as the control circuit executes instructions. Memory 1704 may be implemented as an external integrated circuit (IC) or as an internal circuit of the control circuit 1702. Memory 1704 may include volatile and non-volatile memory modules/devices and may be non-removable memory modules/devices and/or a removable memory modules/devices. Non-removable memory may include random-access memory (RAM), read-only memory (ROM), a hard disk, or any other type of non-removable memory storage. Removable memory may include a subscriber identity module (SIM) card, a memory stick, a memory card, or any other type of removable memory. One will appreciate that the memory used to store configuration information file(s), and/or backup file(s), and/or software-based instructions, etc. may be the same and/or different memory modules/devices of the system controller. As one example, configuration information file(s) and software-based instructions may be stored in non-volatile memory modules/devices while backup(s) may be stored in volatile and/or non-volatile memory modules/devices.

The system controller 1700 may include one or more communications circuits/network interface devices or cards 1706 for transmitting and/or receiving information. The communications circuit 1706 may be configured to perform wireless and/or wired communications. The system controller 1700 may also, or alternatively, include one or more communications circuits/network interface devices/cards 1708 for transmitting and/or receiving information. The communications circuit 1708 may be configured to perform wireless and/or wired communications. Communications circuits 1706 and 1708 may be in communication with control circuit 1702. The communications circuits 1706 and/or 1708 may include radio frequency (RF) transceivers or other communications modules configured to perform wireless communications via an antenna(s). The communications circuit 1706 and communications circuit 1708 may be configured to perform communications via the same communication channels or different communication channels. For example, the communications circuit 1706 may be configured to communicate (e.g., with a network device, over a network, etc.) via a wireless communication channel (e.g., BLUETOOTH®, near field communication (NFC), WIFI®, WI-MAX®, cellular, etc.) and the communications circuit 1708 may be configured to communicate (e.g., with control devices and/or other devices in the load control system) via another wireless communication channel (e.g., WI-FI® or a proprietary communication channel, such as CLEAR CONNECT™).

The control circuit 1702 may be in communication with an LED indicator(s) 1712 for providing indications to a user. The control circuit 1702 may be in communication with an actuator(s) 1714 (e.g., one or more buttons) that may be actuated by a user to communicate user selections to the control circuit 1702. For example, the actuator 1714 may be actuated to put the control circuit 1702 in an association mode and/or communicate association messages from the system controller 1700.

Each of the modules within the system controller 1700 may be powered by a power source 1710. The power source 1710 may include an AC power supply or DC power supply, for example. The power source 1710 may generate a supply voltage Vcc for powering the modules within the system controller 1700. One will recognize that system controller 1700 may include other, fewer, and/or additional modules.

FIG. 18 is a block diagram illustrating an example control-target device 1800, e.g., a load control device, as described herein. The control-target device 1800 may be a dimmer switch, an electronic switch, an electronic ballast for lamps, an LED driver for LED light sources, an AC plug-in load control device, a temperature control device (e.g., a thermostat), a motor drive unit for a motorized window treatment, or other load control device. The control-target device 1800 may include one or more communications circuits/network interface devices or cards 1802. The communications circuit 1802 may include a receiver, an RF transceiver, and/or other communications module configured to perform wired and/or wireless communications via communications link 1810. The control-target device 1800 may include one or more general purpose processors, special purpose processors, conventional processors, digital signal processors (DSPs), microprocessors, microcontrollers, integrated circuits, programmable logic devices (PLD), field programmable gate arrays (FPGA), application specific integrated circuits (ASICs), or any suitable controller or processing device or the like (hereinafter collectively referred to as processor(s) or control circuit(s) 1804). The control circuit 1804 may be configured to execute one or more software-based applications that include instructions that when executed by the control circuit may configure the control circuit to perform signal coding, data processing, power control, input/output processing, or any other function, feature, process, and/or operation for example that enables the control-target device 1800 to perform as described herein. One will recognize that functions, features, processes, and/or operations. described herein for the control-target device 1800 may also and/or alternatively be provided by firmware and/or hardware in addition to and/or as an alternative to software-based instructions. The control circuit 1804 may store information in and/or retrieve information from the memory 1806. For example, the memory 1806 may maintain a registry of associated control devices and/or control configuration information. Memory 1806 may also store software-based instructions for execution by the control circuit 1804 and may also provide an execution space as the control circuit executes instructions. Memory 1806 may be implemented as an external integrated circuit (IC) or as an internal circuit of the control circuit 1804. Memory 1806 may include volatile and non-volatile memory modules/devices and may be non-removable memory modules/devices and/or a removable memory modules/devices. Non-removable memory may include random-access memory (RAM), read-only memory (ROM), a hard disk, or any other type of non-removable memory storage. Removable memory may include a subscriber identity module (SIM) card, a memory stick, a memory card, or any other type of removable memory. The control circuit 1804 may also be in communication with the communications circuit 1802.

The control-target device 1800 may include a load control circuit 1808. The load control circuit 1808 may receive instructions from the control circuit 1804 and may control an electrical load 1816 based on the received instructions. The load control circuit 1808 may send status feedback to the control circuit 1804 regarding the status of the electrical load 1816. The load control circuit 1808 may receive power via a hot connection 1812 and a neutral connection 1814 and may provide an amount of power to the electrical load 1816. The electrical load 1816 may include any type of electrical load.

The control circuit 1804 may be in communication with an actuator 1818 (e.g., one or more buttons) that may be actuated by a user to communicate user selections to the control circuit 1804. For example, the actuator 1818 may be actuated to put the control circuit 1804 in an association mode or discovery mode and may communicate association messages or discovery messages from the control-target device 1800. One will recognize that control-target device 1800 may include other, fewer, and/or additional modules.

FIG. 19 is a block diagram illustrating an example control-source device 1900 as described herein. The control-source device 1900 may be a remote control device, an occupancy sensor, a daylight sensor, a window sensor, a temperature sensor, and/or the like. The control-source device 1900 may include one or more general purpose processors, special purpose processors, conventional processors, digital signal processors (DSPs), microprocessors, microcontrollers, integrated circuits, programmable logic devices (PLD), field programmable gate arrays (FPGA), application specific integrated circuits (ASICs), or any suitable controller or processing device or the like (hereinafter collectively referred to as processor(s) or control circuit(s) 1902). The control circuit 1902 may be configured to execute one or more software-based applications that include instructions that when executed by the control circuit may configure the control circuit to perform signal coding, data processing, power control, input/output processing, or any other function, feature, process, and/or operation for example that enables the control-source device 1900 to perform as described herein. One will recognize that functions, features, processes, and/or operations described herein for the control-source device 1900 may also and/or alternatively be provided by firmware and/or hardware in addition to and/or as an alternative to software-based instructions. The control circuit 1904 may store information in and/or retrieve information from the memory 1904. Memory 1904 may also store software-based instructions for execution by the control circuit 1902 and may also provide an execution space as the control circuit executes instructions. Memory 1904 may be implemented as an external integrated circuit (IC) or as an internal circuit of the control circuit 1904. Memory 1904 may include volatile and non-volatile memory modules/devices and may be non-removable memory modules/devices and/or a removable memory modules/devices. Non-removable memory may include random-access memory (RAM), read-only memory (ROM), a hard disk, or any other type of non-removable memory storage. Removable memory may include a subscriber identity module (SIM) card, a memory stick, a memory card, or any other type of removable memory.

The control-source device 1900 may include one or more communications circuits/network interface devices or cards 1908 for transmitting and/or receiving information. The communications circuit 1908 may transmit and/or receive information via wired and/or wireless communications via communications circuit 1908. The communications circuit 1908 may include a transmitter, an RF transceiver, and/or other circuit configured to perform wired and/or wireless communications. The communications circuit 1908 may be in communication with control circuit 1902 for transmitting and/or receiving information.

The control circuit 1902 may also be in communication with an input circuit(s) 1906. The input circuit 1906 may include an actuator(s) (e.g., one or more buttons) and/or a sensor circuit (e.g., an occupancy sensor circuit, a daylight sensor circuit, or a temperature sensor circuit) for receiving input that may be sent to a control-target device for controlling an electrical load. For example, the control-source device may receive input from the input circuit 1906 to put the control circuit 1902 in an association mode and/or communicate association messages from the control-source device. The control circuit 1902 may receive information from the input circuit 1906 (e.g., an indication that a button has been actuated or sensed information). Each of the modules within the control-source device 1900 may be powered by a power source 1910. One will recognize that control-source device 1900 may include other, fewer, and/or additional modules.

FIG. 20 is a block diagram illustrating an example network device 2000 as described herein. The network device 2000 may include the network device 128 shown in FIGS. 1A-1C, the network device 308 shown in FIG. 3, the network device 908 shown in FIGS. 9A-9C, and/or the network device 1680 shown in FIGS. 16A-16C, for example. The network device 2000 may include one or more general purpose processors, special purpose processors, conventional processors, digital signal processors (DSPs), microprocessors, microcontrollers, integrated circuits, programmable logic devices (PLD), field programmable gate arrays (FPGA), application specific integrated circuits (ASICs), or any suitable controller or processing device or the like (hereinafter collectively referred to as processor(s) or control circuit(s) 2002). The control circuit 2002 may be configured to execute one or more software-based applications that include instructions that when executed by the control circuit may configure the control circuit to perform signal coding, data processing, power control, input/output processing, or any other function, feature, process, and/or operation for example that enables the network device 2000 to perform as described herein. One will recognize that functions, features, processes, and/or operations described herein may also and/or alternatively be provided by firmware and/or hardware in addition to and/or as an alternative to software-based instructions. The control circuit 2002 may store information in and/or retrieve information from the memory 2004, including backup file(s), creation times, hash values, and signature(s) as described herein. Memory 2004 may also store software-based instructions for execution by the control circuit 2002 and may also provide an execution space as the control circuit executes instructions. Memory 2004 may be implemented as an external integrated circuit (IC) or as an internal circuit of the control circuit 2002. Memory 2004 may include volatile and non-volatile memory modules/devices and may be non-removable memory modules/devices and/or a removable memory modules/devices. Non-removable memory may include random-access memory (RAM), read-only memory (ROM), a hard disk, or any other type of non-removable memory storage. Removable memory may include a subscriber identity module (SIM) card, a memory stick, a memory card, or any other type of removable memory. One will appreciate that the memory used to store backup file(s), and/or software-based instructions, etc. may be the same and/or different memory modules/devices of the network device. As one example, software-based instructions may be stored in non-volatile memory modules/devices while backup(s) may be stored in volatile and/or non-volatile memory modules/devices.

The network device 2000 may include one or more communications circuits/network interface devices or cards 2008 for transmitting and/or receiving information. The communications circuit(s) 2008 may perform wireless and/or wired communications. The communications circuit(s) 2008 may include an RF transceiver or other circuit capable of performing wireless communications via one or more antennas. Communications circuit(s) 2008 may be in communication with control circuit 2002 for transmitting and/or receiving information.

The control circuit 2002 may also be in communication with a display(s) 2006 for providing information to a user, such as user 132 or 1632. The control circuit 2002 and/or the display 2006 may generate GUIs for being displayed on the network device 2000. The display 2006 and the control circuit 2002 may be in two-way communication, as the display 2006 may include a touch screen module configured to receive information from a user and provide such information to the control circuit 2002. The network device may also include an actuator(s) 2012 (e.g., one or more buttons) that may be actuated by a user to communicate user selections to the control circuit 2002.

Each of the modules within the network device 2000 may be powered by a power source 2010. The power source 2010 may include an AC power supply or DC power supply, for example. The power source 2010 may generate a supply voltage Vcc for powering the modules within the network device 2000. One will recognize that network device 2000 may include other, fewer, and/or additional modules.

FIG. 21 is a block diagram illustrating an example remote server 2100 as described herein. The remote server 2100 may include the remote server 1690 shown in FIGS. 16A-16C, for example. The remote server 2100 may include one or more general purpose processors, special purpose processors, conventional processors, digital signal processors (DSPs), microprocessors, microcontrollers, integrated circuits, programmable logic devices (PLD), field programmable gate arrays (FPGA), application specific integrated circuits (ASICs), or any suitable controller or processing device or the like (hereinafter collectively referred to as processor(s) or control circuit(s) 2102). The control circuit 2102 may be configured to execute one or more software-based applications that include instructions that when executed by the control circuit may configure the control circuit to perform signal coding, data processing, power control, input/output processing, or any other function, feature, process, and/or operation that enables the remote server 2100 to perform as described herein. One will recognize that functions, features, processes, and/or operations described herein may also and/or alternatively be provided by firmware and/or hardware in addition to and/or as an alternative to software-based instructions. The control circuit 2102 may store information in and/or retrieve information from the memory 2104, including backup file(s), signature(s), and creation time(s), hash value(s), etc. as described herein. Memory 2104 may also store software-based instructions for execution by the control circuit 2102 and may also provide an execution space as the control circuit executes instructions. Memory 2104 may be implemented as an external integrated circuit (IC) or as an internal circuit of the control circuit 2102. Memory 2104 may include volatile and non-volatile memory modules/devices and may be non-removable memory modules/devices and/or a removable memory modules/devices. Non-removable memory may include random-access memory (RAM), read-only memory (ROM), a hard disk, or any other type of non-removable memory storage. Removable memory may include a subscriber identity module (SIM) card, a memory stick, a memory card, or any other type of removable memory.

The remote server 2100 may include one or more communications circuits 2108 for transmitting and/or receiving information. The communications circuit(s) 2108 may perform wireless and/or wired communications. The communications circuit(s) 2208 may include an RF transceiver or other circuit configured to perform wireless communications via one or more antennas. Communications circuit(s) 2108 may be in communication with control circuit 2102 for transmitting and/or receiving information.

The control circuit 2102 may also be in communication with a display(s) 2106 for providing information to a user. The processor 2102 and/or the display 2106 may generate GUIs for being displayed on the remote server 2100. The display 2106 and the control circuit 2102 may be in two-way communication, as the display 2106 may include a touch screen module configured to receive information from a user and provide such information to the control circuit 2102. The remote server 2100 may also include an actuator(s) 2112 (e.g., one or more buttons) that may be actuated by a user to communicate user selections to the control circuit 2102.

Each of the modules within the remote server 2100 may be powered by a power source 2110. The power source 2110 may include an AC power supply or DC power supply, for example. The power source 2110 may generate a supply voltage Vcc for powering the modules within the remote server 2100. One will recognize that remote server 2100 may include other, fewer, and/or additional modules.

In addition to what has been described herein, the methods and systems may also be implemented in a computer program(s), software, and/or firmware based instructions incorporated in/stored on one or more computer-readable media for execution by a control circuit(s), for example. Examples of computer-readable media include electronic signals (transmitted over wired or wireless connections) and tangible/non-transitory computer-readable storage media. Examples of tangible/non-transitory computer-readable storage media include, but are not limited to, a read only memory (ROM), a random-access memory (RAM), removable disks, and optical media such as CD-ROM disks, and digital versatile disks (DVDs).

Although features and elements may be described herein in particular combinations, each feature or element may be used alone or in any combination with the other features and elements. While this disclosure has been described in terms of certain embodiments and generally associated methods, alterations and permutations of the embodiments and methods will be apparent to those skilled in the art. Accordingly, the above description of example embodiments does not constrain this disclosure. Other changes, substitutions, and alterations are also possible without departing from the spirit and scope of this disclosure. 

What is claimed is:
 1. An apparatus comprising: at least one processor; at least one memory device communicatively coupled to the at least one processor and configured to store one or more files and a current backup of the one or more files, and wherein the least one memory device further has stored thereon instructions that when executed by the at least one processor direct the at least one processor to: receive a first message from a network device; based at least in part on receiving the first message from the network device, determine whether a trigger point of a plurality of trigger points has occurred, wherein each of the plurality of trigger points comprises a trigger level; based at least in part on determining that a trigger point has occurred, communicate a second message to the network device, wherein the second message comprises the trigger level of the determined trigger point, and wherein the second message comprises a request for the network device to request from the apparatus a backup of the files; based at least in part on communicating the second message to the network device, receive from the network device a third message comprising a command to generate a backup of the files; based at least in part on receiving the third message from the network device, determine whether a backup of the files is being generated; based at least in part on determining that a backup of the files is being generated, communicate an error message to the network device; based at least in part on receiving the third message from the network device, determine whether the current backup is being communicated to a maximum number of other network devices; based at least in part on determining that the current backup is currently being communicated to the maximum number of other network devices, communicate an error message to the network device; based at least in part on receiving the third message from the network device, determine whether there is a change to one or more of the files since a time the current backup of the files was generated; based in part on determining that there is a change to one or more of the files since the time the current backup of the files was generated: determine a time difference between the time the current backup of the files was generated and a current time; compare the time difference to a stale time; based at least in part on comparing the time difference to the stale time, determine whether to generate a backup of the files; based at least in part on determining to generate a backup of the files: generate a backup of the files; generate a signature of the generated backup; and communicate a copy of the generated backup to the network device; based at least in part on determining not to generate a backup of the files: determine whether the current backup was previously communicated to the network device; based at least in part on determining that the current backup was previously communicated to the network device, communicate a message to the network device that the network device has the current backup; and based at least in part on determining that the current backup was not previously communicated to the network device, communicate a copy of the current backup to the network device; and based in part on determining that there is not a change to one or more of the files since the time the current backup of the files was generated: determine whether the current backup was previously communicated to the network device; based at least in part on determining that the current backup was previously communicated to the network device, communicate a message to the network device that the network device has the current backup; and based at least in part on determining that the current backup was not previously communicated to the network device, communicate a copy of the current backup to the network device.
 2. An apparatus comprising: at least one processor; at least one memory device communicatively coupled to the at least one processor and configured to store at least one file and a current backup of the at least one file, and wherein the least one memory device further has stored thereon instructions that when executed by the at least one processor direct the at least one processor to: receive from a network device via a communications network a message comprising a command to at least one of generate a backup of the at least one file or provide to the network device a backup of the at least one file; based at least in part on receiving the message from the network device, determine whether there is a change to the at least one file since a time the current backup of the at least file was generated; based in part on determining that there is a change to the at least one file since the time the current backup of the at least one file was generated, determine whether to generate a new backup of the at least one file; and based at least in part on determining to generate the new backup of the at least one file: generate the new backup of the at least one file; and communicate via the communications network a copy of the generated new backup to the network device.
 3. The apparatus of claim 2, wherein the instructions, when executed by the at least one processor, further direct the at least one processor to: based at least in part on determining not to generate the new backup of the at least one file: determine whether the current backup was previously communicated to the network device; and based at least in part on determining that the current backup was previously communicated to the network device, communicate a message to the network device that the network device has the current backup.
 4. The apparatus of claim 3, wherein the instructions, when executed by the at least one processor, further direct the at least one processor to: based at least in part on determining that the current backup was not previously communicated to the network device, communicate via the communications network a copy of the current backup to the network device.
 5. The apparatus of claim 4, wherein the at least one memory device is further configured to store a signature of the current backup; wherein the message received from the network device comprises a signature of a backup communicated to the network device prior to the apparatus receiving the message from the network device; and wherein to determine whether the current backup was previously communicated to the network device comprises to compare the signature received from the network device in the message to the signature of the current backup stored in the at least one memory device.
 6. The apparatus of claim 2, wherein to determine whether to generate the new backup of the at least one file comprises to: determine a time difference between the time the current backup of the at least one file was generated and a current time; compare the time difference to a stale time; based at least in part on comparing the time difference to the stale time, determine whether the time difference is greater than the stale time; based at least in part on determining that the time difference is greater than the stale time, determine to generate the new backup of the at least one file; and based at least in part on determine that the time difference is less than the stale time, determine not to generate the new backup of the at least one file.
 7. The apparatus of claim 6, wherein the instructions, when executed by the at least one processor, further direct the at least one processor to: based at least in part on determining not to generate the new backup of the at least one file: determine whether the current backup was previously communicated to the network device; based at least in part on determining that the current backup was previously communicated to the network device, communicate a message to the network device that the network device has the current backup; and based at least in part on determining that the current backup was not previously communicated to the network device, communicate via the communications network a copy of the current backup to the network device.
 8. The apparatus of claim 7, wherein the at least one memory device is further configured to store a signature of the current backup; wherein the message received from the network device comprises a signature of a backup communicated to the network device prior to the apparatus receiving the message from the network device; and wherein to determine whether the current backup was previously communicated to the network device comprises to compare the signature received from the network device in the message to the signature of the current backup stored in the at least one memory device.
 9. The apparatus of claim 2, wherein the instructions, when executed by the at least one processor, further direct the at least one processor to: based in part on determining that there is not a change to one or more of the files since the time the current backup of the files was generated: determine whether the current backup was previously communicated to the network device; and based at least in part on determining that the current backup was previously communicated to the network device, communicate a message to the network device that the network device has the current backup.
 10. The apparatus of claim 9, wherein the instructions, when executed by the at least one processor, further direct the at least one processor to: based at least in part on determining that the current backup was not previously communicated to the network device, communicate via the communications network a copy of the current backup to the network device.
 11. The apparatus of claim 10, wherein the at least one memory device is further configured to store a signature of the current backup; wherein the message received from the network device comprises a signature of a backup communicated to the network device prior to the apparatus receiving the message from the network device; and wherein to determine whether the current backup was previously communicated to the network device comprises to compare the signature received from the network device in the message to the signature of the current backup stored in the at least one memory device.
 12. The apparatus of claim 2, wherein the instructions, when executed by the at least one processor, further direct the at least one processor to: receive a first message from the network device; based at least in part on receiving the first message from the network device, determine whether one or more of a plurality of defined events occurred at the apparatus; based at least in part on determining that one or more of a plurality of the defined events occurred at the apparatus, communicate via the communications network a second message to the network device, wherein the second message comprises an indication for the network device to request from the apparatus a backup of the at least one file; and based at least in part on communicating the second message to the network device, receive from the network device the message comprising the command to at least one of generate the backup of the at least one file or provide to the network device the backup of the at least one file.
 13. The apparatus of claim 12, wherein to determine whether one or more of the plurality of defined events occurred at the apparatus comprises to determine at least one of: that a user logged into the apparatus from the network device, that the user modified via the network device a configuration of a load control environment controlled by the apparatus, or that the network device communicated a message to the apparatus to request a backup of the at least one file.
 14. The apparatus of claim 12, wherein each of the plurality of defined events has a corresponding level, and wherein the second message comprises the level corresponding to at least one of the one or more of the plurality of the defined events determined to have occurred at the apparatus.
 15. The apparatus of claim 14, wherein the network device is configured to use the level contained in the second message to determine whether to communicate to the apparatus the message comprising the command to at least one of generate the backup of the at least one file or provide to the network device the backup of the at least one file.
 16. The apparatus of claim 15, wherein the network device is configured to compare the level contained in the second message to a user defined filter level in order to determine whether to communicate to the apparatus the message comprising the command to at least one of generate the backup of the at least one file or provide to the network device the backup of the at least one file.
 17. The apparatus of claim 2, wherein the instructions, when executed by the at least one processor, further direct the at least one processor to: based at least in part on receiving the message from the network device, determine whether a backup of the at least one file is being generated as a result of a command received from another network device that is different from the network device from which the message is received.
 18. The apparatus of claim 17, wherein the instructions, when executed by the at least one processor, further direct the at least one processor to: based at least in part on determining that a backup of the at least one file is being generated, communicate a message to the network device that indicates a backup will not be provided to the network device.
 19. The apparatus of claim 2, wherein the instructions, when executed by the at least one processor, further direct the at least one processor to: based at least in part on receiving the message from the network device, determine whether a backup of the at least one file is being communicated to at least one other network device that is different from the network device from which the message is received.
 20. The apparatus of claim 19, wherein the instructions, when executed by the at least one processor, further direct the at least one processor to: based at least in part on determining that a backup of the at least one file is being communicated to at least one other network, communicate a message to the network device that indicates a backup will not be provided to the network device.
 21. The apparatus of claim 19, wherein the instructions, when executed by the at least one processor, further direct the at least one processor to: based at least in part on determining that a backup of the at least one file is being communicated to at least one other network device, determine a number of network devices to which the backup is being communicated; compare the number to a threshold; and based at least in part on the number being more than the threshold, communicate a message to the network device that indicates a backup will not be provided to the network device.
 22. The apparatus of claim 21, wherein the instructions, when executed by the at least one processor, further direct the at least one processor to: based at least in part on the number being less than the threshold: determine whether the current backup was previously communicated to the network device; based at least in part on determining that the current backup was previously communicated to the network device, communicate a message to the network device that the network device has the current backup; and based at least in part on determining that the current backup was not previously communicated to the network device, communicate via the communications network a copy of the current backup to the network device.
 23. The apparatus of claim 21, wherein the instructions, when executed by the at least one processor, further direct the at least one processor to: based at least in part on the number being less than the threshold, determine whether there is a change to the at least one file since the time the current backup of the at least file was generated.
 24. The apparatus of claim 2, wherein the network device is configured to communicate to a server via a second communications network a copy of the generated new backup received from the apparatus, wherein the second communications network is different from the communications network from which the network device received the generated new backup from the apparatus.
 25. A tangible computer readable medium having stored thereon instructions that when executed by at least one processor direct the at least one processor to: receive from a network device via a communications network a message comprising a command to at least one of generate a backup of at least one file stored on a memory device or provide to the network device a backup of the at least one file; based at least in part on receiving the message from the network device, determine whether there is a change to the at least one file since a time a current backup stored on the memory device of the at least file was generated; based in part on determining that there is a change to the at least one file since the time the current backup of the at least one file was generated, determine whether to generate a new backup of the at least one file; and based at least in part on determining to generate the new backup of the at least one file: generate the new backup of the at least one file; and communicate via the communications network a copy of the generated new backup to the network device. 