WO2009117290A2 - Système d’accès multiple en phase aléatoire avec maillage - Google Patents

Système d’accès multiple en phase aléatoire avec maillage Download PDF

Info

Publication number
WO2009117290A2
WO2009117290A2 PCT/US2009/036766 US2009036766W WO2009117290A2 WO 2009117290 A2 WO2009117290 A2 WO 2009117290A2 US 2009036766 W US2009036766 W US 2009036766W WO 2009117290 A2 WO2009117290 A2 WO 2009117290A2
Authority
WO
WIPO (PCT)
Prior art keywords
time
tag
signal
timing
communication
Prior art date
Application number
PCT/US2009/036766
Other languages
English (en)
Other versions
WO2009117290A3 (fr
Inventor
Theodore J. Myers
Lewis N. Cohen
Daniel Thomas Werner
Matthew Hughes
Robert W. Boesel
Original Assignee
On-Ramp Wireless, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US12/189,505 external-priority patent/US7526013B1/en
Priority claimed from US12/345,267 external-priority patent/US20090239550A1/en
Priority claimed from US12/345,374 external-priority patent/US7773664B2/en
Application filed by On-Ramp Wireless, Inc. filed Critical On-Ramp Wireless, Inc.
Priority to EP09723436A priority Critical patent/EP2266210A4/fr
Priority to JP2011500871A priority patent/JP2011519501A/ja
Priority to CN2009801184955A priority patent/CN102037657A/zh
Priority to CA2718721A priority patent/CA2718721C/fr
Publication of WO2009117290A2 publication Critical patent/WO2009117290A2/fr
Publication of WO2009117290A3 publication Critical patent/WO2009117290A3/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/69Spread spectrum techniques
    • H04B1/707Spread spectrum techniques using direct sequence modulation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/59Responders; Transponders
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J13/00Code division multiplex systems
    • H04J13/0074Code shifting or hopping
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5691Access to open networks; Ingress point selection, e.g. ISP selection

Definitions

  • Embodiments of the present application relate to the field of communications. More specifically, exemplary embodiments relate to random phase multiple access communication interface systems and methods with mesh networking.
  • CDMA code division multiple access
  • TDMA time division multiple access
  • FDMA frequency division multiple access
  • CDMA is a spread-spectrum technology that uses pseudo-random number sequences to modulate incoming data, multiple transmitters transmitting on the same signal, and orthogonal codes (Walsh codes) to correlate different communication channels.
  • TDMA uses time slots to coordinate multiple uplink transmitters that are transmitting in the same sub-slots. Users transmit in rapid succession, one after the other, each using his/her own time slot, allowing multiple stations to share the same transmission medium (e.g., radio frequency channel) while using only a portion of the total available bandwidth.
  • FDMA allocates different users with different carrier frequencies of the radio spectrum.
  • CSMA/CD Carrier Sense Multiple Access / Collision Detection
  • Ethernet networks to physically monitor the traffic on the line at participating stations. If no transmission is taking place at the time, the particular station can transmit. If two stations attempt to transmit simultaneously, this causes a collision, which is detected by all participating stations. After a random time interval, the stations that collided attempt to transmit again. If another collision occurs, the time intervals from which the random waiting time is selected are increased step by step. This is known as exponential back off.
  • a point to point network is the simplest involving only communication between two nodes along a single link.
  • a star pattern expands this by adding many point to point connections to a gateway nodes. Any node can communicate to any other node through the gateway node. The star pattern breaks though when there is a problem with the gateway node.
  • a ring pattern links all of the nodes together with one link to each neighboring node in a circular pathway. Data travels from a source node through all neighboring nodes to a destination node.
  • a ring pattern has the advantage that no single point of failure will break communication to all the other nodes. However, multiple points of failure will break the link.
  • a mesh pattern allows for reconfiguration around broken links as well as dynamic configuration of the network.
  • An exemplary embodiment uses a random phase multiple access communication interface.
  • the interface can communicatively connect to systems and devices using spread spectrum modulation methods without the use of orthogonal codes.
  • An exemplary random phase multiple access communication interface communicatively connects systems and devices using spread spectrum modulation methods.
  • the random selection of chip (or timing) offsets as a multiple access scheme allows for non- coordinated data transmission without needing to be assigned a unique "code.” All users transmit using the same PN (pseudo noise) code such that a PN array despreader at the access point can be used. If two signals are received at the access point at the same PN offset(or the sum of the PN offset with the transmission delay in number of chips yields the same value for 2 or more transmissions), then a "collision" has occurred and it may not be possible to demodulate these 2 or more signals.
  • the randomization of timing offsets each time means that any "collisions" that occur only occur during that frame. A retransmission scheme and a new randomized offset is used to get through in the next attempt.
  • An exemplary embodiment includes a transmitter at the tag (uplink) and a method of transmitting signals from the tag to an access point.
  • Each tag includes its own transmitter which transmits information in the form of frames.
  • a frame can be formed from information provided on a channel having a fixed data rate.
  • the data can be spread using the same pseudo-noise (PN) code with a randomly selected chip offset into the PN code.
  • the transmitter also applies frequency rotation and sample clock correction to match the reference oscillator of the access point.
  • a plurality of tags is associated with a single access point to form the network.
  • Each of the plurality of tags transmits information using the same PN code along with a randomly selected chip offset into the PN code.
  • the phase is randomly selected each frame over a large number of chips (i.e., 8192).
  • Another exemplary embodiment includes a transmitter at an access point (downlink) and a method for transmitting signals from the access point to the tags.
  • the access point transmitter can be similar to that of the tags. However, the access point transmitter uses a unique PN code for each of the tags with which it communicates. The use of distinct PN codes for each tag provides security and allows each tag to ignore signals which are directed toward other tags.
  • the frames transmitted by the access point also include a preamble of approximately 9 symbols to allow for rapid acquisition at the tags.
  • Another exemplary embodiment includes a demodulator at the tag and a method for demodulating signals received by the tag.
  • An automatic frequency control (AFC) derotator multiplication is applied to signals received at the tag.
  • the AFC derotator multiplication is a 1 bit complex operation with a 1 bit complex output such that gate count is improved.
  • the tag uses a PN array despreader that takes advantage of the huge computational savings in the 1 bit data path.
  • Another exemplary embodiment includes a demodulator at the access point and a method for demodulating signals received at the access point.
  • the access point demodulator has capacity to simultaneously demodulate several thousand or more links received from tags.
  • the access point demodulator includes a PN array despreader.
  • Another exemplary embodiment includes synchronization of the tag with a master timing of the access point.
  • the access point can periodically transmit a broadcast frame.
  • the tag uses its PN despreader to analyze the broadcast frames and identify the master timing of the access point.
  • Cold timing acquisition is expected to occur one time when the tag is first introduced into the system. After the initial cold acquisition, the tag can perform a 'warm' timing acquisition each time the tag wakes up to transmit or receive a signal.
  • the warm timing acquisition utilizes less power than the cold timing acquisition.
  • each tag separately generates a PN code.
  • a gold code is an example of a PN code that is parameterizable such that each user has its own. As such, only data destined for a particular user is visible to it. Using unique PN codes, a tag does not process data that is not its own.
  • An exemplary method for communicating through a multiple access communication interface includes receiving a first signal from a first tag, where the first signal is spread using a predetermined pseudo-noise (PN) code, and further where the first signal includes first payload data.
  • a second signal is received from a second tag. The second signal is spread using the predetermined PN code, and the second signal includes second payload data.
  • the first payload data from the first signal is identified at least in part with a PN array despreader.
  • the second payload data from the second signal is also identified at least in part with the PN array despreader.
  • An exemplary system for communicating through a multiple access communication interface includes a first tag, a second tag, and an access point.
  • the first tag has a first transmitter configured to transmit first payload data in a first signal, wherein the first signal is spread using a predetermined pseudo-noise (PN) code.
  • the second tag has a second transmitter configured to transmit second payload data in a second signal, wherein the second signal is spread using the predetermined PN code.
  • the access point is in communication with the first tag and the second tag and includes a receiver and a despread array.
  • the receiver is configured to receive the first signal and the second signal.
  • the despread array is configured to despread the first signal and the second signal.
  • An exemplary access point for use in a multiple access communication system includes a processor, a receiver in communication with the processor, and a transmitter in communication with the processor.
  • the receiver is configured to receive a first signal from a first tag, wherein the first signal includes first payload data, and further wherein the first signal is spread using a predetermined pseudo-noise (PN) code.
  • the receiver is also configured to receive a second signal from a second tag, wherein the second signal includes second payload data, and further wherein the second signal is spread using the predetermined PN code.
  • the transmitter is configured to transmit a third signal to the first tag, wherein the third signal is spread with a second PN code, and further wherein the second PN code is specific to the first tag.
  • An exemplary mesh network embodiment uses micro-repeaters or access points as routers to direct signals received from external devices.
  • a signal is received from a device where the signal has been spread using a PN code that has been offset by a random timing offset.
  • the signal includes payload data.
  • the destination for the payload data is selected based on a characteristic of the multiple access communication network.
  • the characteristic of the multiple access communication network is a seed value that was selected during the initialization procedure of the network. Once a destination is selected, the payload data is transmitted to the destination.
  • the apparatus has three primary components: a receiver, a transmitter and a controller, hi the embodiment, the receiver is configured to receive a signal from another device.
  • the received signal is spread using a PN code that has been offset by a random timing offset.
  • the signal includes payload data.
  • the controller is electrically coupled to the receiver and the transmitter.
  • the controller directs reception of the signal and selects a destination for the payload data based on a characteristic of the multiple access communication network.
  • the characteristic of the multiple access communication network is a seed value that was selected during the initialization procedure of the network.
  • the transmitter is used to transmit the payload data to the selected destination.
  • Fig. 1 is a diagram depicting an uplink transmitter according to an exemplary embodiment.
  • Fig. 2 is a diagram depicting a downlink transmitter according to an exemplary embodiment.
  • Fig. 3 is a diagram depicting slot structures and assignments in an exemplary embodiment.
  • Fig. 4 is a diagram depicting a PN (pseudo noise) despread array in an exemplary embodiment.
  • Fig. 5 is a flow diagram depicting operations performed in the tag processing of a broadcast channel from a cold start in an exemplary embodiment.
  • Fig. 6 is a flow diagram depicting operations performed in the tag processing of a dedicated channel from a warm start in an exemplary embodiment.
  • Fig. 7 is a diagram depicting a tag receive data path in an exemplary embodiment.
  • Fig. 8 is a diagram depicting time tracking in an exemplary embodiment.
  • Fig. 9 is a diagram depicting an AFC (automatic frequency control) rotation in an exemplary embodiment.
  • Fig. 10 is a diagram depicting a dedicated communication finger in an exemplary embodiment.
  • Fig. 11 is a flow diagram depicting operations performed during access point receive processing in an exemplary embodiment.
  • Fig. 12 is a diagram depicting an access point receive data path in an exemplary embodiment.
  • Fig. 13 is a diagram depicting asynchronous initial tag transmit operations in an exemplary embodiment.
  • Fig. 14 is a diagram depicting interactions between an access point and a tag in a slotted mode according to an exemplary embodiment.
  • Fig. 15 is a diagram depicting data transfer between an access point and a tag according to an exemplary embodiment.
  • Fig. 16 is a diagram depicting a mesh network formed with RPMA devices.
  • Fig. 17 is a diagram depicting the association of a micro-repeater to a mesh network formed with RPMA devices.
  • Fig. 18 is a flow diagram and timeline illustrating operations performed during an acquisition process in accordance with an exemplary embodiment.
  • Fig. 19 is a diagram of locating a tag in an random-phase multiple access network according to an exemplary embodiment.
  • Fig. 20 is a diagram depicting the timing of communications signals used to determine a tag's location according to an exemplary embodiment.
  • Fig. 21 is a diagram depicting signal timing in a high capacity system according to an exemplary embodiment.
  • Fig. 1 illustrates an uplink transmitter 10 which includes structures such as a convolution encoder, an interleave module, a modulator, a pseudo-noise spreader, a filter, a bank of taps, an automatic frequency control (AFC) rotator, and other such structures. These structures perform operations depicted in blocks 12, 14, 16, 18, 20, and 22.
  • the transmit path of uplink transmitter 10 is a coded and spread spectrum waveform.
  • the uplink transmitter 10 can be included in a tag that communicates with an access point along with other tags using demodulated communication channels. Additional, fewer, or different operations may be performed by the uplink transmitter 10 depending on the particular embodiment. The operations may also be performed in a different order than that shown and described.
  • a tag can refer to any communications device configured to receive signals from and/or send signals to an access point.
  • the access point can refer to any communications device configured to simultaneously communicate with a plurality of tags.
  • the tags can be mobile, low power devices which run off a battery or other stored power, and the access point can be located in a central location and receive power from a power source such as a wall outlet or generator. Alternatively, the tags may plug into an outlet and/or the access point may run off of a battery or other stored power source.
  • a data stream is received by a convolution encoder and interleave module.
  • the data stream is 128 Bits including the preamble.
  • data streams of other sizes may be used.
  • the data stream is encoded using the convolution encoder.
  • the data stream may be encoded at a rate of Vi. Alternatively, other rates may be used.
  • the data stream can also be interleaved using the interleave module.
  • An encoded symbols stream is output to a block 14 in which a differential binary phase shift keying (D-BPSK) modulator is used to modulate the encoded symbols stream. In alternative embodiments, other modulation schemes may be used.
  • D-BPSK differential binary phase shift keying
  • the modulated stream is applied to a PN spreader.
  • the PN spreader can use a common network gold code channel using a selected spreading factor.
  • the spreading factor can be a member of the set ⁇ 64, 128, 256, ..., 8192 ⁇ . Alternatively, any other code and/or spreading factor may be used.
  • Each of the tags at a given spreading factor is spread by the same PN code with a randomly selected chip offset.
  • the large range of possible randomly selected chip offsets increases the probability that a particular frame will not collide (or, in other words, have the same chip timing at the access point) with another frame from another transmitter.
  • the probability of collision in the limit of approaching capacity may become non-negligible ( ⁇ 10 % or less) and can be solved via retransmission of the same frame at a differently drawn random offset.
  • the PN spreader is described in more detail below with reference to Fig. 4.
  • an output of block 18 can have a rate of 1 bit at 1 mega-chip per second (Mcps). Alternatively, other rates may be used.
  • Block 18 receives a sample slip/repeat indicator as an input.
  • an output of block 18 may have a real frequency of approximately 4 megahertz (MHz).
  • AFC automatic frequency control
  • an output of block 20 may have a complex frequency of approximately 4 MHz.
  • a delay is imposed from the start slot until the correct access slot occurs.
  • a random chip delay is imposed on the signal.
  • the random chip delay can be from 0 to the spreading factor minus 1.
  • a different random chip delay may be used.
  • the slot access can be described by A(i,j) where i is related to the spreading factor as 2 A (13-i) and j is the sub-slot number corresponding to non-overlapping slots.
  • the access slot can be randomly selected along with a chip offset from 0 to spreading factor minus 1. As such, the probability of collision between uplink users is minimized, while allowing for re-selection for cases where there are collisions.
  • the signal After the signal has been delayed, the signal can be transmitted to an access point.
  • Fig. 2 illustrates a downlink transmitter 30 including structures such as a convolution encoder, an interleave module, a modulator, a pseudo-noise spreader, a filter, a bank of taps, and other such structures.
  • the access point (AP) uses transmitter 30, the access point (AP) transmits multiple channels each destined for a particular tag or user.
  • These structures perform operations depicted in blocks 32 through 54.
  • Blocks 32 to 40 and blocks 42 to 50 represent distinct data paths that can be replicated for additional data flows.
  • blocks 32-38 can perform operations similar to the operations described with reference to Fig. 1 on a first data stream.
  • blocks 42-48 can perform operations similar to the operations described with reference to Fig.
  • the input to block 36 can be a gold code specific to the tag which is to receive the first data stream
  • the input to block 46 can be a gold code specific to the tag which is receive the nth data stream.
  • other codes such as a broadcast gold code, a non-gold code, or other may be used to spread the first data stream and/or the nth data stream.
  • the output of block 38 and/or block 48 can be weighted in blocks 40 and 50 in case the data links corresponding to the first data stream and the nth data stream are of unequal power. Once weighted, the paths are summed in a block 52.
  • a hard decision is also made in block 52 where all positive numbers are mapped to 0 and all negative numbers are mapped to 1. Alternatively, a different hard decision may be made.
  • an output of block 52 may have a rate of 1 bit at 10 Mcps. Alternatively, other rates may be used.
  • the sum output from block 52 is upsampled using a 4 x chip filter in block 54.
  • an output of block 54 can have a real frequency of 40 MHz. Alternatively, other frequencies may be used. Not shown is a transmission on an adjacent frequency that is a single set of broadcast frames at a maximum downlink spreading factor of 2048. Alternatively, a different maximum downlink spreading factor may be used.
  • Fig. 3 illustrates slot structures and assignments.
  • data stream 70 includes slot 72, slot 74, and slot 76.
  • Slot 72 is an AP-to-tags communication
  • slot 74 is a tags-to-AP communication
  • slot 76 is an AP-to-tags communication.
  • each of the slots can have a duration of 2.1 seconds. Alternatively, any other duration may be used and/or different slots may have different durations.
  • the data stream 70 can be implemented in a half-duplex communication scheme such that at any given time, either the AP is transmitting and the tags are receiving, or the tags are transmitting and the AP is receiving. In alternative embodiments, other communication schemes may be used. As shown in Fig.
  • data channel 80 depicts processing gain options for data in slot 72. If a data link closes at a particular gain, the tag only needs to be ready to receive (in AP to tags mode) during the duration of the slot with the corresponding gain. In transmit mode, the slot selection governs the transmission from the tag to the access point such that the tag can minimize its on time in the power consuming transmit mode. For example, a gain of 18 dB only needs a 1.6 ms slot (A 7; o).
  • Data channel 82 depicts processing gain options for data in slot 74. As can be seen, the power used by a tag can be selected such that each data link arrives at the AP at the same power.
  • AFC Automatic frequency control
  • time-tracking drift time-tracking drift
  • frame timing may be determined at acquisition on the tag side.
  • the PN array despreader performs the brute force operation associated with both, which is an efficient implementation for exploring acquisition hypothesis/demodulating.
  • Fig. 4 illustrates a PN (pseudo noise) despread array, which facilitates both the acquisition of a single waveform on the tag, and brute-force demodulation of multiple waveforms on the AP.
  • the PN despread array can perform a 1 bit dot product of many chip-spaced timing hypotheses simultaneously.
  • a PN despread core element can be a simple counter that is incremented or not incremented each clock depending on whether the input is a 0 or a 1. Since it is a complex data path, there are two counters: one for I (in-phase) and one for Q (quadrature- phase).
  • Multiplication by a complex exponential is generally a set of 4 rather large scalar multipliers (4 x 1000 gates is typical) coupled to a complex exponential table.
  • a one bit complex multiplier is basically a simple truth table, such as the example table shown below, where the negative denotes the inverse (0- ⁇ 1 and 1 ->0). This truth table can be implemented using just a few gates.
  • Fig. 4 depicts a PN despread array 100.
  • the PN despread array 100 can be fed at chip rate with adjacent instantiations of PN despread elements 102, 104, and 106 working on timing hypotheses that are a chip apart.
  • the 1 bit complex data is sent from a block 114 to elements 102, 104, and 106 where it is combined with a PN signal from PN generator 1 10.
  • PN signal generator 110 can be hardware that outputs the same sequence of Os and Is with which the AP is spreading the data.
  • the derotated data is combined (more specifically, 1 bit complex multiplied) with the PN signal at a combiner 122a. Real and imaginary parts of this combination are separately input into counters 118a and 120a.
  • the counters 118a and 120a shift the bit stream out upon receipt of a reset signal 112. More specifically, the data in the counters is valid just prior to the reset signal. The reset signal forces zeros into both counters.
  • the multiplexer 108 allows for output of the currently valid counters for that finger that has uniquely finished its despreading operation at that particular clock. Other elements in the PN despread array 100 operate similarly.
  • Element 104 receives derotated data from block 114 and combines it with a PN signal after a delay is imposed by delay block 116a in element 102. The combination is entered into counters 118b and 120b, which gets shifted out of the counters upon a signal from the reset signal 112 with an imposed delay from a delay block 124a. Likewise, element 106 receives derotated data from block 114 and combines it with a PN signal after a delay is imposed by delay block 116b in element 104. The combination is entered into counters 118c and 120c, which gets shifted out of the counters upon a signal from the reset signal 112 with an imposed delay from a delay block 124b.
  • the PN despread element 102 After a number of clocks corresponding to the spreading factor, the PN despread element 102 has valid data which is selected for output by a multiplexer 108. Every clock thereafter, the adjacent despread element 104 or 106 is available until all data has been output which can occur during the number of clocks corresponding to the spreading factor plus a number of PN despread instantiations.
  • the PN code that governs the operation of this mechanism can be a gold code parameterized by a value. In alternative embodiments, other PN codes may be used.
  • Fig. 5 illustrates operations performed in the tag modem processing of a broadcast channel to demodulate the access point's transmit waveform. Additional, fewer, or different operations may be performed depending on the particular embodiment. The operations may also be performed in a different sequence than that shown and described.
  • Fig. 5 depicts a scanning mode where the range of uncertainty of parts-per-million (ppm) drift between the AP and the tag are explored.
  • an iteration is made over two slots to enable the tag to tune to a broadcast channel. For example, processing can begin asynchronous to slot timing.
  • the broadcast channel can be active, and during exploration of the other half of the hypothesis the broadcast channel can be inactive.
  • all hypotheses can be explored using a first slot timing with an asynchronous starting point. If no energy is found in the first iteration, a second iteration is performed. In the second iteration, the asynchronous starting point can have a one slot offset from the asynchronous starting point used in the first iteration. As such, hypotheses that were explored while the broadcast channel was active can be explored while the broadcast channel is active. Once the energy is found, the tag can tune to the broadcast channel.
  • operation 150 can represent a starting point for 'cold acquisition.
  • a coarse automatic frequency control (AFC) is initialized.
  • this initial value is set to a most negative value such as -10 ppm offset.
  • non-coherent metrics for all Cx4 spaced hypotheses for a given coarse AFC hypothesis are calculated. For example, if the spreading factor has a length of 2048, the non-coherent metric for 8192 hypotheses can be calculated.
  • the coarse AFC hypothesis is incremented until the end of the ppm range.
  • the hardware depicted in Fig. 7 is used to undo the frequency offset represented by the current hypothesis.
  • the PN despread array is used to generate the despread output of 8 successive symbols. Alternatively, other numbers of symbols may be used. A non-coherent sum of these 8 symbols is then calculated.
  • a set of N (8 in the one embodiment) top metrics along with their associated parameters are maintained in a data structure.
  • the non-coherent metrics for all chip x 4 timing hypotheses for each coarse AFC can be communicated to a data structure.
  • the data structure keeps track of the greatest non-coherent metrics (e.g., coarse AFC value, chip x 4 timing hypothesis, non-coherent metric value).
  • the "finalists" are assigned to the N dedicated fingers in an operation 162.
  • Each finger may be uniquely parameterized by a chip x 4 timing value and a coarse AFC hypothesis which is independent of the current coarse AFC hypothesis governing the PN despread array. Since frame timing is initially unknown, each despread symbol that is output by the dedicated finger is hypothesized to be the last in the frame.
  • the buffered 256 symbols undergo differential demodulation and an additional set of iterations based on multiplying by a constant complex value to perform fine AFC correction, as shown in operations 164 and 166.
  • An output of operation 164 can be a complex cross product from each dedicated finger.
  • a symbol-by- symbol multiplication by a constant complex rotation (as determined by the fine AFC hypothesis) can be iteratively applied to a postulated frame of information to determine which (if any) of the selection of complex rotation constant values uncovers a frame which passes a cyclic redundancy check (CRC).
  • CRC cyclic redundancy check
  • This can be a brute-force operation where a cyclic redundancy check (CRC) may be performed for each hypothesis.
  • CRC cyclic redundancy check
  • a payload from the signal can be sent to MAC, and network parameters can be considered to be known.
  • the coarse AFC hypotheses associated with the most successful CRCs can be nominal starting coarse AFC hypotheses.
  • Nominal_Coarse_AFC is the relevant state information used in future transactions which greatly narrows the range of coarse AFC hypothesis searches because the part-to-part variation of oscillator ppm deviation is much larger than the oscillator drift over the coarse of a minute or so.
  • Fig. 6 illustrates operations performed in the tag processing of a dedicated channel from a warm start which is to say where relevant state information is known. For example, frame timing can be known and a much tighter range of coarse AFC hypothesis may be explored. The modem begins its processing sufficiently early so that valid finger assignments are made prior to the end of the 9 symbol preamble. Alternatively, any other number of symbols may be used.
  • an operation 200 there is no need to iterate over a two slot timing hypothesis because the frame timing is known. Instead of using a broadcast channel, a dedicated channel is used.
  • a coarse AFC hypothesis is scanned.
  • the coarse AFC can be scanned over a small range to account for small frequency drift since the last time accessed.
  • a non-coherent metric for all chip x 4 spaced hypotheses is calculated.
  • the coarse AFC hypothesis is incremented until the end of the small ppm range.
  • a data structure keeps track of the greatest non-coherent metrics (e.g., coarse AFC value, chip x 4 timing hypothesis, non-coherent metric value, etc.)
  • dedicated fingers are assigned based on the data structure.
  • symbol cross products are created using current DBPSK and previous DBPSK.
  • An output of operation 214 can be a complex cross product from each dedicated finger.
  • frames are interleaved and decoded.
  • the payload can be sent to a medium access control (MAC) layer.
  • MAC medium access control
  • other slot timing hypothesis are tried.
  • coarse AFC hypotheses associated with the most successful CRCs can be nominal starting coarse AFC hypotheses.
  • Fig. 7 illustrates a tag receive data path depicting the tag's demodulation processing in accordance with an exemplary embodiment.
  • the one-bit complex samples are buffered in a sample buffer 220 such that enough data is present to make reliable detection of valid energy.
  • Exemplary values are provided in the sample buffer block 220. For example, one embodiment buffers 9 symbols. In alternative embodiments, other values may be used.
  • the samples may be input from the I channel and Q channel into this ping-pong buffer scheme at the synchronous sample rate of chip x 2 or 2 MHz. Alternatively, other rates may be used.
  • these samples are used to explore the various coarse AFC hypothesis. Based on the current coarse AFC hypothesis, time-tracking is performed at chip x 4 resolution. Since the same timing reference is used to drive both the carrier frequency and the sample clocks on both the AP and the tag, a coarse AFC hypothesis with a known carrier frequency can uniquely map to a known rate of time tracking.
  • the sample buffer 220 receives communication signals over the I channel and the Q channel. These signals are sent to time tracking logic 222 and dedicated fingers 234.
  • the time tracking logic 222 also receives a coarse AFC hypothesis and the logic 222 may reset to zero at chip x 4 parity.
  • the time tracking logic 222 can have two blocks, one with counters initialized to zero for even chip x 4 parity, and one with counters initialized to midrange (i.e., 2 ⁇ 25) for odd chip x 4 parity.
  • the output of time tracking logic 222 is provided to a block 224 in which virtual chip x 4 phases are applied.
  • Block 224 also can receive parity from an acquisition state machine.
  • Automatic frequency control (AFC) rotation logic 226 is applied to an output of block 224.
  • AFC Automatic frequency control
  • Fig. 8 illustrates an exemplary embodiment of the two blocks of time tracking logic 222 described with reference to Fig. 7.
  • Stream 250 is a communication stream with an even chip x 4 parity.
  • Stream 252 is a communication stream with an odd chip x 4 parity.
  • Fig. 8 depicts the time-tracking operation where each different shading represents a different chip x 4 spaced sequence. Samples are either inserted or repeated at a rate directly depending on which current AFC hypothesis is being explored, multiplied by a known ratio between the sample rate and the carrier frequency. This can be used as a locked clock assumption to collapse a 2-dimensional space down to a single dimension. The value N depicted has a fractional component which is book-kept to allow for sufficient time-tracking precision. A particular parity of the 4 possible chip x 4 phases is selected at a given time. The resultant chip rate sequence is then derotated in a 1-bit data path as shown in Fig. 9.
  • Fig. 9 depicts the functionality of the AFC (automatic frequency control) rotation logic 226 of Fig. 7 which operates on one of the 4 virtual chip x 4 phases 224 at a given time.
  • Fig. 9 depicts a one-bit derotation mechanism. This derotation mechanism is designed to undo the AFC rotation due to the relative carrier drift between the receiver and transmitter for the postulated coarse AFC hypothesis. Since it's a one-bit transform (represented by the truth table illustrated above), the 90 degree resolution of the process is +/- 45 degrees relative to the continuum of values of the phase due to the AFC drift from the relative oscillator offset.
  • the AFC rotation logic 226 can also receive coarse AFC hypotheses as an input.
  • the PN despreading array 228 (Fig. 7) performs its despread operation for chip spaced hypothesis.
  • the PN despreading array 228 may receive current coarse AFC hypotheses, timing parity, timing phase, spreading factor, and/or gold code selection as inputs.
  • the sum is non-coherently accumulated for better metric reliability with the running sum stored in the non-coherent accumulation buffer 230.
  • the size of the buffer is based on the number of despread elements.
  • the PN dispreading array 228 may have 256 despread elements such that a pass through the sample buffer completes the non-coherent metric for 256 hypotheses.
  • the metric may be completed for other numbers of hypotheses.
  • a signal-to-noise ratio (SNR) metric may be used in transmission power control of the tag and for power control feedback to the AP.
  • the hypotheses with the largest metrics are stored in a top N path data structure 232 which is used to control the assignment of the dedicated fingers 234.
  • the top N paths can be N records including timing hypotheses, timing parity, coarse AFC hypotheses, etc.
  • Fig. 10 illustrates a dedicated communication finger.
  • Each dedicated finger has access to each of the 4 phases of chip x 4 samples with a chip x 4 selector 260 set as part of the parameters of the finger assignment.
  • Each finger has its own dedicated PN generator 262 and AFC generator 264 which is used to despread.
  • the dedicated finger accumulates into the symbol accumulator 266 based on the coarse AFC hypothesis, its chip x 4 timing phase, the dependent variable of time-tracking rate, and then outputs a complex variable every spreading factor number of clocks.
  • the dedicated fingers 234 illustrated with reference to Fig. 7 can also receive inputs from the sample buffer 220, and a PN code selection.
  • the output from the dedicated fingers 234 goes through a bit-width squeezer 236 that reduces the bit-widths for efficient storage in the frame buffer 238 without sacrificing performance.
  • the ouput from the bit- width squeezer 236 is provided to the frame buffer 238, which may be a circular buffer mechanism which allows for the general case of processing a 256 symbol frame as if the current symbol is the last symbol of the frame.
  • this memory structure can support the specific processing of a frame with the known last symbol.
  • Frame buffer 238 outputs the hypothesized frames to the rest of the receive chain.
  • a cross product multiplication block 240 performs the multiplication of the current symbol with the complex conjugate of the previous symbol which is the conventional metric for D-BPSK demodulation.
  • a residual frequency drift may cause the D-BPSK constellation to be rotated by a fixed phase.
  • the role of the fine AFC multiply block 242 is to take a brute-force approach and try different possible phase rotations such that at least one fine AFC hypothesis yields a valid CRC as it passes through a de-interleaver and viterbi decoder 244.
  • the fine AFC multiply block 242 can also receive fine AFC hypotheses as inputs.
  • the output from the de-interleaver and Viterbi decoder 244 is provided to a CRC checker 246. If the CRC is valid, the payload is sent up to the MAC layer.
  • Fig. 11 depicts exemplary operations performed during access point receive processing. Additional, fewer, or different operations may be performed depending on the embodiment. Further, the operations can be performed in a different order than that which is described here.
  • the AP performs a brute-force operation checking all possible chip x 2 timing hypothesis, spreading factors, and access slots within spreading factors. This allows for uncoordinated access by the tag. Fortunately, since the AP is the master of frame-timing and AFC carrier reference (all tags can compensate both their carrier drift and sample clock to meet the AP 's timing), the processing burden on the AP is drastically reduced since the AP need not explore the dimensionality of coarse AFC hypothesis or unknown frame timing.
  • the flowchart of Fig. 11 shows an example of the ordering of iterating upon all possible chip x 2 timing offset, spreading factors from the set [8192,4096,...,64], and access slot numbers for spreading factors less than the maximum.
  • the AP then performs the similar fine AFC search that the tag performs to allow for a small amount of frequency drift between the timing sources of the tag and the AP to occur since the last transaction. All valid CRCs are passed up to the MAC layer.
  • the flowchart of Fig. 11 illustrates the searching of a multi-dimensional space. In an outermost loop, all possible spreading factors are searched. In an exemplary embodiment, there may be 8 spreading factors [64, 128, 256, 512, 1024, 2048, 4096, 8192].
  • spreading factors and/or numbers of spreading factors may be used.
  • all possible sub-slots for a given spreading factor are searched. For example, there may be 128 possible sub-slots for a 64 chip spreading factor and a single degenerate sub-slot for a 8192 chip spreading factor.
  • all possible chip x 2 timing phases within a given sub-slot are searched. As described in more detail below, the various loops are illustrated by the arrows in Fig. 11.
  • one coarse AFC value is used.
  • the one coarse AFC value can be 0 since compensation is performed by the tags.
  • a largest spreading factor e.g., 8192
  • the largest spreading factor may be larger or smaller than 8192.
  • access slots are processed within a spreading factor. This process may be degenerate in the case in which there are 8192 spreading factors.
  • despreading is performed for all chip x 2 spaced hypotheses at the current spreading factor. For example, 16,384 despread operations maybe performed if the spreading factor has a length of 8192.
  • despread is performed for all elements unless the spreading factor is less than the frame buffer number (e.g., 256). In an operation 278, the spreading factor is reduced in half and processing continues. In an operation 280, a determination is made regarding whether the spread factor has been reduced to 64. In alternative embodiments, other predetermined values may be used. If the spread factor has not been reduced to 64 (or other predetermined value), processing continues at operation 276. If the spread factor has been reduced to 64, the system waits for a next sample buffer to fill in operation 282. Once the next sample buffer is filled in operation 282, control returns to operation 272. In an operation 284, a frame buffer of despread elements is obtained.
  • the frame buffer number e.g., 256
  • the frame buffer may be complete after 256 symbols are output from a single pass by the PN despread array.
  • a pass through may produce 256 timing hypotheses each having 256 symbols, hi alternative embodiments, the PN despread array may have more or fewer stages.
  • a cross product of the current despread DBPSK symbol with the previous symbol is calculated in an operation 286.
  • the cross product may involve 256 symbols for up to 256 frames. Alternatively, other numbers of symbols and/or frames may be used.
  • the current frame is decoded and phase multipled based on the AFC hypothesis.
  • CRCs are checked and for any valid CRC, the payload is sent out of the physical layer (PHY) and up to the medium access control (MAC).
  • PHY physical layer
  • MAC medium access control
  • the CRCs may be checked for 256 times the number of fine AFC hypothesis for each pass of a 256 despread array.
  • the process is performed for a subsequent slot as illustrated by the arrow from block 282 to block 272.
  • Fig. 12 depicts an access point (AP) receive data path.
  • AP access point
  • an entire frame at the largest spreading factor may be stored in a ping-pong buffer scheme in a sample buffer 300.
  • This buffer scheme can be a substantial amount of memory (e.g., 16.8 Mbits) and in at least one embodiment, it may be stored in a dedicated off-chip memory device.
  • the sample buffer block 300 includes exemplary values. In alternative embodiments, other values may be used.
  • the time tracking logic and the AFC rotation logic may not be used since the AP is the master time reference.
  • the sample buffer 300 passes frames to a PN despreading array 302, which can perform brute force testing as described previously herein.
  • the PN despreading array 302 may include 256 despread elements. Alternatively, any other number of despread elements may be used.
  • the PN despreading array 302 may also receive current timing parity (which may be chip x 2 resolution only), hypothesis phase, and/or spreading factor as inputs.
  • An output from the PN despreading array 302 is provided to a bit width squeezer 304.
  • the bit width squeezer 304 reduces the size of the frames, which are then sent to a frame buffer 306.
  • the frame buffer block 306 includes exemplary values. In alternative embodiments, other values may be used. Depending on the embodiment, the frame buffer 306 may also be stored in a dedicated off-chip memory device.
  • a non-coherent accumulation 308 is used to determine an SNR metric such as signal strength for use in transmission power-control feedback to the tag.
  • Fig. 13 illustrates asynchronous initial tag transmit operations, including two types of interactions which result in data transfers from the tag to the AP.
  • slots 320 represent tag slots and slots 322 represent access point slots.
  • Cold Start is where the tag is coming into the system without any relevant state information and "warm start” is where the tag is aware of the system information such as slot timing and a reduced range of coarse AFC hypothesis to explore.
  • the tag begins seeking access at a slot- asynchronous point in time.
  • Fig. 13 depicts a time where the tag begins attempting to acquire the broadcast channel when the AP isn't even transmitting it (slot 1).
  • the tag's processing explores the valid coarse AFC hypothesis during a period of time that the AP is transmitting the broadcast frame.
  • Fig. 13 depicts this occurring during slot 2.
  • the non-coherent energy metric causes a dedicated finger to explore the correct chip x 4 timing and coarse AFC hypothesis.
  • the finger with the correct hypothesis continually treats each new symbol as the last symbol of the frame and pushes these hypothesized frames through the receive chain where the CRC check indicates failure.
  • the valid frame timing is achieved as the CRC check indicates success.
  • the tag has the same relevant state information that a tag entering at a "warm- start” would have and continues to complete the same processing that a "warm-start” tag would undergo.
  • a tag enters the interaction depicted in slot 6 ("Warm Start") either by a transition through a "Cold Start” procedure or directly upon tag wake-up if relevant state information is appropriately maintained. At this point, the tag makes a measurement of the received strength of the broadcast frame and uses this information to determine the transmit power and spreading factor that the tag subsequently transmits at in slot 7.
  • the tag transmits it's message based on: 1) using the measured received broadcast channel signal strength and selecting the minimum spreading factor that can be used to close the link, which minimizes the tag's on time and is best for minimizing power consumption; 2) using the measured received broadcast channel signal strength and the formerly selected spreading factor, the tag transmits at the optimality condition of reception at the AP which is that all user's are received by the AP at very similar values of energy per bit to spectral noise density ratio (Eb/No); 3) for all but the maximum spreading factor, randomly selecting the slot access parameter j; and 4) randomly selecting the chip offset value from 0 to spreading factor -1 such that "collisions" at the AP are minimized and random selection at each transmission allows "collisions" to be resolved in subsequent transmission opportunities.
  • Eb/No energy per bit to spectral noise density ratio
  • the AP processes all the signals received during slot 7 and sends a positive acknowledgement back during slot 10.
  • the AP either aggregates several ACKs into a single channel characterized by a gold code, or sends a dedicated message to the tag using its dedicated gold code channel. Note that the former method requires some registration procedure (not shown) to assign the channel. In either case, the tag updates its chip x 4 timing using the preamble of the message.
  • Fig. 14 illustrates a simple interaction between an access point and a tag in a slotted mode.
  • the simple interaction involves no data for the tag and a relatively static channel.
  • timeline 330 represents tag processing during the slots and timeline 332 represents access point processing during slots.
  • the nature of the system is that the tag spends a maximum possible time in a low-power state - a state where system timing is maintained via a low-power, low- frequency crystal oscillator which is typically 32 kHz.
  • a maximum tolerable latency upon AP initiated interaction is identified (i.e., this is the rate cycling in and out of the low power state for the tag to check if any AP action is pending).
  • Fig. 14 shows the relatively simple interaction of a tag coming out of it's low power state to check if the AP is wanting to initiate a transaction. This occurs at a slot phase and rate agreed upon between the AP and the tag during registration.
  • the tag would typically enter a "warm start" where the frame timing and coarse AFC hypothesis are known to within a tight range.
  • the tag makes a measurement of the received broadcast channel power.
  • Fig. 14 shows the scenario where that power has not changed considerably since the last interaction with the AP. This means that the last transmit power/spreading factor that the AP transmitted at is sufficient to close the link.
  • the tag attempts to acquire on the preamble and then demodulate the frame using its dedicated gold code.
  • a typical scenario is the AP not having sent information and the tag immediately goes back to sleep.
  • Fig. 15 depicts a more complicated interaction which involves data transfer and dynamically changing propagation between an access point and a tag according to an exemplary embodiment.
  • timeline 340 represents tag processing during the slots and timeline 342 represents access point (AP) processing during the slots.
  • AP access point
  • the AP has information to send and the propagation of the channel has changed considerably since the last AP transaction.
  • the current broadcast channel power measurement has changed such that the tag knows that the subsequent transmission would not be appropriate if it transmits at the same transmit power/spreading factor as last time.
  • the tag will send a re-registration message using the protocol explained in Fig. 13 to alert the AP to use a new transmit power/spreading factor appropriate to the current channel conditions.
  • the new information governs the transmission and reception of the frame occurring in slot N+5.
  • the tag generates an acknowledgement (ACK) message governed by the protocol of Fig. 13 to indicate a successful transmission. If the ACK is successfully received, the transaction is considered complete. Otherwise, the tag attempts a retransmission.
  • ACK acknowledgement
  • Fig. 16 illustrates how tags may be connected together into a multiple access communication network that can be a mesh network.
  • Tag 350 has a communication link to micro-repeater 351 which itself connects to other micro-repeaters 352 and 353 before connecting to access point 354.
  • the communication links between these elements are bi- direction, half-duplex links that use the same communication protocol as outlined above.
  • Communication may originate at tag 350, be transmitted to micro-repeater 351, be further transmitted sequentially through micro-repeaters 352 and 353 before arriving at access point 354.
  • Communication may also originate at access point 354, be transmitted to micro- repeater 353, be further transmitted though micro-repeaters 352 and 351 before arriving at tag 350.
  • An exemplary device in the network may receive a signal that is spread using a predetermined pseudo-noise code (PN code) that may be the same PN code used by other devices in the network, but wherein the signal has a random timing offset.
  • the signal can include payload data that has been spread destined for another device.
  • a controller on the device coupled to the receiver and a transmitter, may then select an appropriate destination for the payload data based on a characteristic of the network. That characteristic may be a seed value determined as described below. Once selected, the device may transmit the payload data to the selected destination.
  • the device may also receive more than one signal before transmitting it on.
  • a second signal may be received from the same or another device. That signal may also be spread using a predetermined pseudo-noise code, wherein the signal has a random timing offset.
  • the signal can include additional payload data that has been spread destined for another device.
  • the device may select an appropriate destination for the payload data based on another characteristic of the network. When the two destinations are identical, the device may transmit the two payloads together to the destination.
  • the network can be formed dynamically through the following representative embodiment.
  • Each device in the network has a seed value.
  • the access point may have a seed value of 0.
  • Each subsequent device has a seed value that equals the number of connections it is away from the access point.
  • micro-repeater 353 is one connection away from the access point 354 and so has a seed value equal to 1 ;
  • micro-repeater 351 is three connections away from the access point 354 so has a seed value equal to 3.
  • Each micro-repeater and the access point can transmit on a broadcast channel. Initially, only the access point is transmitting on the broadcast channel. As each micro-repeater associates with the network, the micro-repeater can then transmit a broadcast channel to other devices. For example, in Figure 16, access point 354 and micro-repeaters 353, 352, and 352 can all transmit on the broadcast channel because they are associated with the network.
  • the seed value of each device is transmitted in messages on the broadcast channel.
  • a device may then receive a communication signal on a broadcast channel which includes a seed value.
  • an unassociated micro-repeater can select its own seed value to the seed value based on the received seed value.
  • Fig. 17 illustrates how a particular micro-repeater could associate with the network.
  • Micro-repeater 360 begins the association process by listening to the broadcast channel.
  • Micro-repeaters 361, 362, 363, 364, and 365 are also in the area.
  • the access point 366 is also nearby.
  • the strongest link that micro-repeater 360 can receive is link 367.
  • Other links shown can also be received by micro-repeater 360.
  • Micro-repeater 360 tends to acquire initially on the strongest signal received, which is link 367.
  • micro-repeater 360 obtains frame timing and relative reference crystal deviation from the network timing.
  • Micro-repeater 360 switches to receive mode to acquire all of the other links that it can.
  • Micro-repeater 360 may select the micro-repeater with the lowest seed over a certain threshold.
  • Micro-repeater 360 may use other factors, such as a power measurement of the received links, to determine which micro-repeater to select.
  • micro-repeater 360 may then transmit to micro-repeater 362 for permission to associate via link 368.
  • Micro-repeater 362 may then respond to grant association.
  • Micro-repeater 360 may now receive the grant from the now associated Micro-repeater 362.
  • Micro-repeaters with lower numbered seed values may transmit various messages to micro-repeaters with higher numbered seed values including those needed to keep timing, frequency compensation, transmission power levels, automatic frequency control (AFC) and sample timing compensation consistent through the network.
  • AFC automatic frequency control
  • micro-repeater 362 could transmit AFC compensation messages to micro-repeater 360. All micro-repeaters may transmit control messages to appropriately power control transmissions from associated micro-repeaters.
  • Micro-repeaters 362 and 360 can both transmit power control transmission to each other.
  • micro-repeater 360 stops receiving some number of consecutive messages from micro-repeater 362, it may go back into acquisition more and associate with a potentially different micro-repeater. After the micro-repeater has associated with the network, it transmits on the broadcast channel advertising its own seed to other devices seeking to join the network including other micro- repeaters or tags.
  • the messages broadcast by the micro-repeater may be at a set broadcast power so as to allow as many devices as possible to determine if this micro-repeater is available for networking. For example, after association, micro-repeater 360 may now transmit on the broadcast channel to advertise itself to other devices seeking to join the network.
  • Upstream communication originating from a tag is passed from each micro-repeater to the micro-repeater it is associated with that has a lower seed value.
  • micro-repeater 352 passes traffic originating at tag 350 and received from micro-repeater 351 on to micro-repeater 353 enroute to access point 354.
  • the micro-repeaters with a seed value of 1 transmit the message to the access point.
  • Micro- repeater 353 passes tag originating traffic on to access point 354.
  • Tags may communicate with whichever micro-repeater requires the least transmit power so as to save battery life, even if this results in communicating with a micro-repeater with a higher seed value.
  • tag 350 may be able to communicate to either micro-repeater 352 or 351, but tag 350 may pick to communicate with micro-repeater 351 based on needing the least transmit power to communicate with micro-repeater 351. Communications, regardless of direction, are transmitted using a gold code that corresponds to the seed value of the destination.
  • Micro-repeater 353 passes traffic originating at access point 354 that is bound for tag 350 on to micro-repeater 352. This information may be captured in a data structure during upstream communication from the tag to the access point that has previously passed through the micro-repeater. Many known methods of routing can be used with a system embodied under the claimed invention. Pn one routing method, entries for particular routes in the data structure may contain both an identification of the device and the seed value of the next communication link that leads to the device. Micro- repeater 353 may have entries for a route to tag 350 in a data structure.
  • Entries in the data structure may also note when the device is in direct communication with the micro-repeater.
  • Micro-repeater 351 could note that it is in direct communication with tag 350.
  • the gold code used to pass on a routed message depends on entries in the data structure.
  • the micro- repeater may transmit using either a gold code corresponding to a further downstream micro-repeater or a gold code corresponding directly to the device. Hence, micro-repeater
  • the access point 351 would communicate with tag 350 using a gold code that corresponds directly to the device. Messages received for devices that are not known in the data structure may need to be transmitted back upstream. When the access point has no record of the device, the access point may either wait for a message from the tag or may issue a broadcast channel message seeking the tag directly.
  • Tag communication to micro-repeaters may be essentially unchanged from the direct tag to access point topology described above. Broadcast messages that tags use for initialization may be broadcast using an agreed upon network wide gold code that is independent of the micro-repeater seed. Hence, when tag 350 attempts to associate with the network, it may use a network wide gold code. Power control communications can be performed with the micro-repeaters just as the tag could perform these with an access point as explained above.
  • the tag may transmit a broadcast channel message that advertises its presence to other tags and permits neighboring devices to engage in communication as a peer.
  • tag 350 could transmit a broadcast channel message advertising itself to other tags.
  • the two tags could then function in much the same way that a micro-repeater and tag normally function.
  • a tag may only issue broadcast channel messages a particular percentage of the time.
  • Fig. 18 is a flow diagram and timeline illustrating operations performed during an acquisition process in accordance with an exemplary embodiment. In alternative embodiments, additional, fewer, and/or different operations may be performed. Further, the use of flow diagrams herein is not meant to be limiting with respect to the order of operations performed.
  • the tag can be in the sleep state.
  • the tag can enter the awake state to perform preamble processing.
  • the tag can enter the awake state at least one worst case determination period prior to an upcoming communication event. As such, the tag can have sufficient time to acquire the timing and frequency of the access point even if worst case drift occurred during the sleep state.
  • the tag can enter the awake state at least five seconds prior to a communication event.
  • the worst case determination period can also account for timing drift with respect to when the tag should wake up. For example, if the worst case determination period is three seconds and the worst case drift of the timing is 1 second, the tag may wake up at least four seconds prior to the communication event to ensure that the tag has sufficient time to determine the timing and frequency.
  • the worst case determination period can also account for arrival of the preamble such that the tag wakes up at the earliest possible time that the preamble could arrive given worst case timing drift.
  • entry into the awake state may also be sufficiently close to the start of the communication event (i.e., not too far in advance) such that identified timing and frequency values are accurate or close to accurate when the communication event commences.
  • the preamble processing can be performed in the context of a slotted frame structure that includes a preamble 410, a broadcast channel 415, and a data channel 420.
  • the preamble processing can include filling a sample buffer with at least a portion of preamble 410 as illustrated in an operation 425.
  • the number of preamble symbols placed into the sample buffer can be the length of the preamble plus additional symbols to cover timing error.
  • the preamble processing time may be reduced by collecting less preamble symbols (down to length 2) in the sample buffer. Given a high SNR, the preamble processing can still be highly accurate using a smaller number of symbols.
  • the sample buffer can be locked once an adequate number of symbols is received.
  • the preamble processing Upon acquisition of at least a portion of the preamble, the preamble processing also includes finger accumulation, differential binary phase shift keying (DBPSK), and correlation, which are performed in an operation 430.
  • DBPSK differential binary phase shift keying
  • soft outputs from the DBPSK process can be correlated against a known sequence. If the correlation results in a high correlation, the search can be successful and the timing and frequency of the access point can be determined. High correlation can be relative to a predetermined standard, a prior preamble search, etc.
  • the tag Upon determination of the timing and frequency, the tag can enter the sleep state until the tag has to enter the awake state for the upcoming communication event.
  • the search/determination performed in operation 430 may be based on a narrow range of timing offsets and/or frequency offsets based on the assumption that a small amount of drift occurred during the sleep state.
  • the search can be a two-dimensional search in which the timing and frequency are simultaneously determined.
  • the search can also be centered around a nominal timing value and/or a nominal frequency value.
  • the nominal values can be based on the assumption that no drift occurred relative to the most recent prior communication event. Alternatively, any other nominal values may be used.
  • the tag may not enter the sleep state, and an extended search may be performed in an operation 435.
  • the extended search can be performed over a large range of timing offsets and/or frequency offsets. Even if the extended search is performed, there is still sufficient time to complete the search and/or return to the sleep state prior to the upcoming communication event because the tag entered the awake state early enough to cover the worst case scenario.
  • the tag can wake up early enough such that the sleep state can still be entered regardless of the magnitude of the search that is performed.
  • a single continuous search may be performed until the timing and frequency values are determined.
  • the search can be centered around the nominal values and expanded outward until a sufficient correlation is obtained. Regardless of how the search is conducted, the search can be terminated upon a successful determination of the timing and frequency and the tag can enter the sleep state, time permitting. As such, the amount of time in the sleep state following the initial acquisition of the timing and frequency can depend on the amount of time that it takes to acquire the timing and frequency. More time spent in the sleep state results in additional power/battery conservation because less power is drawn during the sleep state.
  • the results of the search performed in operation 430 and/or operation 435 can be an initial timing value (or offset) and an initial frequency value (or offset).
  • the tag enters the awake state for a communication event.
  • the sample buffer is filled with one or more symbols of a preamble.
  • preamble processing (or a search) is performed.
  • the search which can be centered around the initial timing value and the initial frequency value, can be a rapid, abbreviated search because only a short amount of time has passed since the determination of the initial timing value and the initial frequency value. As a result, no or minimal drift can be expected to have occurred during the sleep state following determination of the initial frequency value and the initial timing value.
  • the abbreviated search can be conducted over a limited range of frequency and timing values. Alternatively, the search may center around the initial timing value and initial frequency value and be expanded outward until the actual timing and frequency values are determined.
  • the communication event is performed.
  • the battery life of the tag can be extended. Resources are conserved because the tag remains in the awake state for a minimal amount of time and in the sleep state for a maximal amount of time. Further, the tag is still able to function in case of a worst case drift scenario caused by an environmental change or other factor. However, in most cases, it is expected that the drift may be minimal and the acquisition can be rapidly achieved. It is important to understand that any of the embodiments described herein may be implemented as computer-readable instructions stored on a computer-readable medium. Upon execution by a processor, the computer-readable instructions can cause a computing device to perform operations to implement any of the embodiments described herein.
  • Tag 400 is the device for which its location will be determined.
  • Tag 400 is in communication with devices 401, 402, 403 and 404.
  • Devices 401, 402, 403 and 404 may consist of micro-repeaters, access points, or other tags configured for communication with tag 400.
  • the devices 401, 402, 403 and 404 include a transmitter for transmitting a ranging request signal.
  • the ranging request signal is spread using a first predetermined pseudo-noise (PN) code and has a first random timing offset.
  • the devices 401, 402, 403 and 404 also include a receiver for receiving a ranging response signal.
  • PN pseudo-noise
  • the tag 400 includes a receiver for receiving the ranging request signal and a transmitter for transmitting the ranging response signal.
  • the ranging response signal is spread using a second predetermined pseudo-noise (PN) code and has a second random timing offset.
  • PN pseudo-noise
  • the devices and tag can be configured vice-versa.
  • the first predetermined pseudo-noise (PN) code and the second predetermined pseudo-noise (PN) code can be the same code.
  • a controller controls the location operation.
  • the controller can be part of the devices 401, 402, 403 and 404, the tag 400, or any micro-repeaters, access point, or any other tag.
  • the controller does not have to be part of the same physical device as the transmitter and receiver that actually transmits and receives the ranging request signal and ranging response signal.
  • the controller can be coupled to the devices and/or tag physically, electrically, or communicatively.
  • the controller can control the ranging requests of many different devices.
  • the controller triggers the transmission of the ranging request signal.
  • the controller waits for the reception of the ranging response signal and calculates a propagation delay.
  • the controller can be implemented in various ways such as an integrated circuit on a tag or access point, or as software on a access point or server.
  • a diagram depicting the timing of communications signals used to determine a tag's location is shown.
  • a first device starts transmitting a ranging request signal.
  • the first device can be, for example, an access point.
  • a second device reception time 520 after a propagation time (T prop ), a second device begins to receive the ranging request signal.
  • the second device can be, for example, a tag.
  • the first device can be a tag and the second device can be an access point.
  • Tb n - After a request period 530 (Tb n -), the first device stops transmitting the ranging request signal.
  • Reception of the ranging request signal at the second device is complete after a second propagation time 540 (T prop ).
  • T prop After a response delay 550 (D n>m ), at a beginning of a ranging response 560, the second device begins transmitting the ranging response to the first device.
  • T prop At a first device reception time 570, after a propagation time (T prop ), the first device begins to receive the ranging response signal.
  • a ranging time 580 (T n,m ) is the time from the beginning of a ranging request 510 to the first device reception time 570.
  • the propagation delays, T prop are directly proportional to the distance from the first device to the second device and can be calculated with the following formula:
  • Tn, m ⁇ Tbrr + Tp ro p + D n , m + Tp rO p Tprop (Tn, m " T ⁇ rr " Dn,m )'2
  • This propagation delay calculation can be used in triangulation calculation techniques as known in the art. For example, the propagation delay can be multiplied by the speed of light (c) to obtain a distance (d). Multiple readings from different first devices can be used to scribe circles, centered on the first devices, with radius d. The circles will approximately intersect at the location of the second device.
  • the calculations can be performed at any entity in the network that the devices can communicate with. For example, the calculations can be performed at the tag, micro-repeaters, access points, or other tags. Additionally, various attributes of the ranging request signal and ranging response signal can be used to determine the ranging time. For instance, the times at the beginning and end of the ranging request signal and ranging response signal can be averaged.
  • the response delay 550 (D n>m ) includes a time required for the second device to process the ranging request.
  • the time required for the second device to process the ranging request can be known or transmitted back to the first device as part of the ranging response signal.
  • the response delay 550 (D n m ) can also include extra time to avoid interference or collisions.
  • the response delay 550 (D n , m ) can include a random delay.
  • the second device can use a random delay, or a random delay can be selected when collisions have occurred.
  • the second device transmits the value of the random delay at the second device to the first device.
  • the value of the random delay can be included in the ranging response signal.
  • the controller can also assign or seed random delays to the second devices.
  • the response delay 550 can include a pseudo-random delay.
  • the second device can use a pseudo-random delay, or a pseudo-random delay can be selected when collisions have occurred.
  • the second device transmits the value of the pseudo-random delay at the second device to the first device.
  • the value of the pseudorandom delay can be included in the ranging response signal.
  • the first device can delay for a first device delay time before transmitting the ranging request signal.
  • the first device delay time includes delay that occurs at the first device and/or delay from the controller to the first device.
  • the delay from the controller to the first device can be significant where the controller and first device are not physically part of the same device.
  • the first device delay time can be included in the calculation of the propagation delay.
  • the first device delay can include a predetermined time.
  • the predetermined time can be a predetermined time interval that corresponds to the correct access slot or sub-slot for the first device or second device.
  • the predetermined time can be included in the calculation of the propagation delay.
  • the first device delay can include a random delay before the first device starts transmitting a ranging request signal in order to avoid interference or collisions.
  • the first device can use a random delay, or a random delay can be selected when collisions have occurred.
  • the controller can also assign or seed random delays to a group of first devices that are attempting to locate a second device. The random delay can be included in the calculation of the propagation delay.
  • the first device can wait a pseudo-random delay before the first device starts transmitting a ranging request signal in order to avoid interference or collisions.
  • the first device can use a pseudo-random delay, or a pseudo-random delay can be selected when collisions have occurred.
  • the controller can also assign or seed pseudorandom delays to a group of first devices that are attempting to locate a second device. The pseudo-random delay can be included in the calculation of the propagation delay.
  • Fig. 21 a diagram depicting signal timing in a high capacity system according to an exemplary embodiment is shown. Each device may delay a different D n m amount of time before transmissions.
  • a micro-repeater or access point may delay an amount before transmission of the ranging request.
  • a communication tag may delay an amount before responding to the ranging request.
  • the exact amount of the D n,m delay may be a random amount of time, and the amount of time delayed may be included with the response.
  • the D n , m delay may be a pseudo-random amount of time determined in advance and distributed to each tag. With this alternative system, location information would be calculable at only a single secure location.
  • deterministic set partitioning may lead to situations where one tag can only communicate with devices that are in the same group.
  • a second randomized delay factor can be introduced to devices in the same group. This randomized delay factor would be transmitted to the device performing the location calculation.
  • a pseudo-random delay factor could be used which is known only to the device performing the location calculation, hence improving the security of the location determination operation.

Abstract

La présente invention concerne un procédé de communication à travers un réseau à accès multiple en phase aléatoire. Un signal qui a été étalé au moyen d’un code de pseudo-bruit et déphasé par un déphasage aléatoire temporel et contenant une information de données utiles est reçu en provenance d’un dispositif. Une destination est choisie pour l’information de données utiles en fonction d’une caractéristique du réseau à accès multiple. L’information de données utiles est transmise à la destination choisie.
PCT/US2009/036766 2008-03-18 2009-03-11 Système d’accès multiple en phase aléatoire avec maillage WO2009117290A2 (fr)

Priority Applications (4)

Application Number Priority Date Filing Date Title
EP09723436A EP2266210A4 (fr) 2008-03-18 2009-03-11 Système d accès multiple en phase aléatoire avec maillage
JP2011500871A JP2011519501A (ja) 2008-03-18 2009-03-11 メッシングを伴うランダム位相マルチアクセスシステム
CN2009801184955A CN102037657A (zh) 2008-03-18 2009-03-11 通过网格化的随机相位多址系统
CA2718721A CA2718721C (fr) 2008-03-18 2009-03-11 Systeme d'acces multiple en phase aleatoire avec maillage

Applications Claiming Priority (16)

Application Number Priority Date Filing Date Title
US3752208P 2008-03-18 2008-03-18
US61/037,522 2008-03-18
US12/189,609 2008-08-11
US12/189,505 2008-08-11
US12/189,505 US7526013B1 (en) 2008-03-18 2008-08-11 Tag communications with access point
US12/189,619 US7593383B1 (en) 2008-03-18 2008-08-11 Uplink transmitter in a random phase multiple access communication system
US12/189,533 US7593452B1 (en) 2008-03-18 2008-08-11 Despreading spread spectrum data
US12/189,609 US7782926B2 (en) 2008-03-18 2008-08-11 Random phase multiple access communication interface system and method
US12/189,619 2008-08-11
US12/189,533 2008-08-11
US12/276,971 2008-11-24
US12/276,971 US7848272B2 (en) 2008-03-18 2008-11-24 Slotted mode acquisition
US12/345,374 2008-12-29
US12/345,267 US20090239550A1 (en) 2008-03-18 2008-12-29 Random phase multiple access system with location tracking
US12/345,374 US7773664B2 (en) 2008-03-18 2008-12-29 Random phase multiple access system with meshing
US12/345,267 2008-12-29

Publications (2)

Publication Number Publication Date
WO2009117290A2 true WO2009117290A2 (fr) 2009-09-24
WO2009117290A3 WO2009117290A3 (fr) 2009-12-23

Family

ID=43123523

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2009/036766 WO2009117290A2 (fr) 2008-03-18 2009-03-11 Système d’accès multiple en phase aléatoire avec maillage

Country Status (5)

Country Link
EP (1) EP2266210A4 (fr)
JP (1) JP2011519501A (fr)
CN (1) CN102037657A (fr)
CA (1) CA2718721C (fr)
WO (1) WO2009117290A2 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111900958A (zh) * 2020-06-19 2020-11-06 上海美仁半导体有限公司 随机数产生电路、芯片及家用电器

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5745485A (en) * 1995-06-19 1998-04-28 Aloha Networks, Inc. Dual code multiple access for wireless data networks
US6597675B1 (en) * 1997-04-30 2003-07-22 Telefonaktiebolaget Lm Ericsson (Publ) Random access in a mobile telecommunications system
EP1134939A1 (fr) * 2000-03-14 2001-09-19 Lucent Technologies Inc. Procédé d'acheminement de messages dans un réseau mobile ad-hoc
US7006428B2 (en) * 2000-07-19 2006-02-28 Ipr Licensing, Inc. Method for allowing multi-user orthogonal and non-orthogonal interoperability of code channels
US6912211B2 (en) * 2001-01-26 2005-06-28 At&T Corp. CDMA to packet-switching interface for code division switching in a terrestrial wireless system
US6996086B2 (en) * 2001-04-26 2006-02-07 Telefonaktiebolaget Lm Ericsson (Publ) Radio access network with meshed radio base stations
JP3826893B2 (ja) * 2003-03-26 2006-09-27 ソニー株式会社 無線通信システム
JP2006173691A (ja) * 2004-12-13 2006-06-29 Hitachi Ltd 無線通信システム
JP2006174155A (ja) * 2004-12-16 2006-06-29 Oki Electric Ind Co Ltd 無線基地局およびその無線中継方法
US7769380B2 (en) * 2006-12-20 2010-08-03 King Fahd University Of Petroleum And Minerals Method for reducing the rate of registration in CDMA-based mobile networks

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
None
See also references of EP2266210A4

Also Published As

Publication number Publication date
CN102037657A (zh) 2011-04-27
EP2266210A2 (fr) 2010-12-29
CA2718721A1 (fr) 2009-09-24
CA2718721C (fr) 2012-06-19
WO2009117290A3 (fr) 2009-12-23
EP2266210A4 (fr) 2011-07-27
JP2011519501A (ja) 2011-07-07

Similar Documents

Publication Publication Date Title
CA2748626C (fr) Systeme d'acces multiple a phase aleatoire avec maillage
AU2009225884B2 (en) Random phase multiple access communication interface system and method
CA2757948C (fr) Controle dynamique de l'energie
US7742775B2 (en) Random phase multiple access system with location tracking
US9294930B2 (en) Combined unique gold code transmissions
US8160122B2 (en) Method and system for uplink communication
CA2718721C (fr) Systeme d'acces multiple en phase aleatoire avec maillage

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200980118495.5

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09723436

Country of ref document: EP

Kind code of ref document: A2

WWE Wipo information: entry into national phase

Ref document number: 2718721

Country of ref document: CA

Ref document number: 2011500871

Country of ref document: JP

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2009723436

Country of ref document: EP