Documente Academic
Documente Profesional
Documente Cultură
Research Article
E-mail: rtxu@bjtu.edu.cn
Abstract: Low-energy critical infrastructure monitoring (LECIM) networks is essential for the monitoring of infrastructure facilities
in smart cities. One critical requirement of an LECIM network is its wide coverage of up to several kilometres by using a star
topology instead of the tree or mesh networks. In meeting this requirement, this study develops a system with a transceiver of
extremely high receiver sensitivity based on the IEEE 802.15.4k physical layer specifications. To reduce the energy
consumption, the modulation schemes suitable for low complexity detection are chosen for the data transmission in the design.
Also, an efficient parallel preamble and payload data detection are adopted at the access point of the proposed LECIM to
acquire concurrent packets from respective nodes. Meanwhile, a data-aided dynamic timing adjustment scheme is proposed for
data field detection to rapidly and adaptively synchronise to the long duration of data packet. Furthermore, a testbed is
implemented using a software-defined radio to demonstrate the effectiveness of the proposed system design.
scheme with coherent detection is difficult to be implemented for according to the time reversal property of discrete-time Fourier
LPWA systems. In other words, the performance of coherent transform [15]. (ℱ(B))∗ can be calculated once at initialisation
demodulation cannot be guaranteed even with small frequency stage and stored for future computation. Once
offset. Since the packets from EDs arrive randomly, the AP cannot Ok, k = 0, …, L pLs − 1 is achieved, an ordering index set
decode the data before successfully detecting the preamble. P = (p0, …, pN ) with 0 ≤ p0 < ⋯ < pN < L pLs and |O p | ≥ G can
i
To overcome the effect of frequency or phase offset, DPSK or
GFSK is chosen as the modulation scheme in our system design. be obtained to find the possible beginnings of concurrent packets,
Although there exists performance degradation due to non-coherent where G is the pre-defined threshold. The preamble detection
demodulation in case of either DPSK or GFSK, the DSSS PHY can process continues on [a2 a3], [a3 a4], ⋯.
work properly with acceptable frequency offset under very low Fig. 3a presents the procedure of preamble detection. The local
SNR. Moreover, FSK is often adopted as the physical modulation maxima of Ok with |Ok | ≥ G can be found based on P. Denote I as
for WSNs and also can be used in our system. the local maxima index vector. If the values of successive elements
in P are too close, i.e. pk − pk − 1 < 2Ls, the value of pk with respect
2.3 Receiver design to the maximum of |Ok| is stored and the search process continues.
The receiver esign with the key modules is discussed in this Otherwise, the index is recorded as the position of a new peak
subsection. The non-coherent detection is used for symbol maxima, i.e. a possible beginning of packet. In the algorithm,
demodulation. Then, a parallel preamble detection scheme is pN + 1 = − 1 at the initialisation stage is used to indicate the end of
designed to find the beginning of each packet. To decode the traffic iteration as shown in Fig. 3a.
data, a data-aided dynamic timing adjustment algorithm is also Several assumptions have been made here for the RX design,
proposed to obtain the optimal sampling time. The MAC protocol i.e. (i) the possible different packets within one chip period cannot
for multiple access scheme is discussed and the implementation be distinguished. In other words, we assume that the arrival time
challenges are investigated. difference of packets from different EDs is at least one chip T c.
Also, one of the multiple replicas of signals from the same ED due
(i) Demodulation: For DPSK and FSK, the differential detection is to multipath is kept, which has the largest correlation output. It is
usually applied without the requirement of exact phase estimation obvious that a collision may occur if the EDs transmit packets
information. However, the cross-term of noise component in synchronously and the multiple packets arrive at the receiver
differential detector may be greatly increased and cannot be within one chip. (ii) The successive indexes in P are due to
omitted in very low SNR, which degrades the detection oversampling. (iii) The EDs communicate with AP
performance [14, ch. 4]. Therefore, the non-coherent detection is asynchronously. In other words, the MAIs can be negligible
because of the large spreading factor.
IET Commun., 2017, Vol. 11 Iss. 6, pp. 823-830 825
© The Institution of Engineering and Technology 2017
Fig. 2 Diagram of the correlator for preamble detection
(a) The structure of moving correlator, (b) the schematic of correlator
Fig. 3b shows an example of how to search the peak. The local with Lw ≤ Ls and perfect chip timing information can be achieved
maxima, i.e. p3, p6, p8, is selected as the beginnings of preamble. with the proposed scheme. Let Δtm the random timing offset and
The preamble detection is running sequentially to speed up the the initial sampling offset ℒ0 = 0. Then, 2Lw + 1 de-spreading
computation and avoid the competition of computer resources. The
values for each symbol can be expressed by
fork function is used to create a child process for peak search once
L pLs symbols are feed from demodulator, i.e. the preamble search Lb − 1
1
is conducted on [a1 a2], [a2 a3], ⋯ one by one. Finally, the c^l, m =
Lb ∑ bkel + kLs + mLb + ℒm
beginnings of PSDU from multiple EDs can be obtained based on k=0
the element values of vector I. Lb − 1
(4)
2
Suppose that the preamble beginning is at moment i0. The lT c
= cm A R
Ls
+ Δtm + ∑ bknl k ,
probability of false alarm Pf is defined as k=1
Pr ( | Ol + kL | ≥ G, ∃k ≠ i0) and the probability of missing Pm is
s
where A is related to the path loss, R(Δt) is the auto-correlation
specified by Pr ( | Ol + kL | < G). The threshold G can be optimised
s function of pulse shaping filter at the random offset Δt, and nl, k is
based on Pf and Pm. In our proposed scheme, the event of false the noise component. If the effect of noise is ignored, the sampling
alarm can be detected and discarded through cyclic redundancy offset can be reduced to
check (CRC) of PSDU. However, the event of missing a preamble
is fatal to an LPWA system. As a result, the threshold has to be −T c T c
configured optimally to make the value of Pm as lower as possible ,
2Ls 2Ls
and an acceptable Pf . In other words, too large Pf may lead much
additional computation complexity. and expressed by
proposed. Suppose the sampling offset window is inside [ − Lw, Lw] interleaver. A pruned bit reversal interleaving algorithm is adopted
in the standard and it is easy to be programmed. The Viterbi the ability to receive multiple concurrent packets instead of
algorithm is adopted in convolutional decoding. discarding collision packets.
(iv) Multiple access scheme: According to IEEE 802.15.4k For random multiple access scenarios, the performance
specification, Gold code is adopted as the spreading code. Due to degradation due to MAI can be given by [16, eq.(5.70)]
the low cross-correlation of Gold code, the AP can distinguish
packets from different EDs and decode the data packets arriving 1
Dg = (6)
concurrently. When the transmission power of different EDs is 1 + ((K − 1)/L p)(α Eb /N 0) (1/(K − 1))∑Kk = 2 αk /α1
2 2
1
configured to a suitable level based on the path loss measurement,
the network can work properly in the random multiple access
scenarios. This random access scheme can reduce the complexity where αk denotes the channel gain of user k, K is the number of
and overhead. Moreover, the throughput can be improved due to users, and α21Eb /N 0 is the SNR of single user without considering
the MAI. For an LPWA system, the degradation Dg may be processing and a low-power sub-1 GHz RF module. The MCU has
neglected because of the large L p. In other words, the packets can ARM core CPU and abundant communication interfaces. The
be decoded correctly if the difference of received power from PSDU is first encoded by a convolutional forward error correction
different EDs can be controlled to a pre-defined threshold. We have code with rate 1/2, constraint length 7. Then, the encoded data is
to properly configure the transmit power of EDs to reduce the near- fed into an interleaver using a pruned bit reversal interleaving
far effect. Moreover, the data from EDs can be distinguished and algorithm [3]. After bit-to-symbol mapper, the symbols are
decoded when the packets arrive at AP concurrently. spreaded with a Gold code sequence. The SHR including a
preamble and SFD is spreaded and inserted before data payload.
Finally, the packet is modulated and the baseband signal is sent to
3 Testbed and prototype design RF module for emission. The seed of Gold code generator in
3.1 Hardware transmitter and receiver should be configured the same for correct
detection. In our transmitter design, GFSK is adopted in PHY
We have developed a testbed based on GNU radio and Ettus USRP modulation since it can minimise the effect of frequency offset at
to evaluate the performance of the proposed LPWA transceiver the expense of little performance degradation.
design for IEEE 802.15.4k network. Fig. 4 shows the whole system
architecture including AP and EDs. All the baseband signal 3.2 Network deployment
processing algorithms are programmed by C/C++ in Linux
operating systems. The testbed can be used for performance Fig. 5 shows an example of the network deployment. The AP can
validation and field test. be configured as multiple baseband RXs with multiple physical
In our testbed, an AP consists of an industrial personal parameters, e.g. different spreading factor, different seed of Gold
computer (IPC) for baseband signal processing and an Ettus USRP code and so on. The AP can collect all the packets from EDs with
B210 as RF part. The packet frames from EDs are detected and different PHY configuration within its serving areas. If needed,
delivered to service centre for various applications. At the same more than a single AP can be deployed in an LPWA network but
time, AP transmits a sounding signal in the frequency band close to with the same PHY parameters. Then, the data from the same ED
one of reverse link, i.e. from EDs to AP, for path loss estimation. can be received by multiple APs and combined at the server.
The IPC is assembled with high-performance multi-core CPU and
runs the programme for both transmit and receive signal processing 4 Experiment results and analysis
of 802.15.4k DSSS PHY. The USRP B210 provides a fully
integrated, single-board, dual channel transceiver with continuous All the data are collected during the field trial. The AP wipe
frequency coverage from 70 MHz to 6 GHz. It combines a single- antenna is installed in the roof of high building located in the
chip direct-conversion transceiver providing up to 56 MHz of real- campus of Beijing University of Posts and Telecommunications
time bandwidth, and USB 3.0 connectivity with convenient bus (BUPT). The antenna gain is 10 dBi, while a 10 m RF cable is used
power. The transmit power of B210 can be digitally configured up to connect the antenna to USRP device located in the office. The
to 15 dBm and the frequency accuracy is 2 ppm. The sampling data main parameters of DSSS PHY in the experiments are given in
from B210 is feed into AP for baseband signal processing. After Table 1.
demodulation, the AP initialises the preamble detection to find the
presence of data packets. Once a preamble has detected, de- 4.1 Coverage performances
spreading is applied to PSDU data with the aid of timing
recovering. After de-interleaver, convolutional decode, PSDU To precisely evaluate the performances of the communication
decode and CRC check, the payload is passed to MAC layer for distance and receiver sensibility, only one ED is used to
further processing. communicate with the AP in the test cases. Fig. 6a shows the
The EDs send the sensing information to an AP using DSSS positions of 14 test places around BUPT during our field trial, there
PHY. Each ED includes of a low-power MCU for control/signal is no line-of-sight between the TX and RX. The ED transmit power
6 References
[1] Akyildiz, I., Wang, X.: ‘A survey on wireless mesh networks’, IEEE
Commun. Mag., 2005, 43, (9), pp. S23–S30
[2] IEEE 802.15.4 Std: ‘Wireless medium access control (MAC) and physical
layer (PHY) specifications for low-rate wireless personal area networks (LR-
WPANs)’ (IEEE Computer Society Press, 2003), pp. 1–679
[3] ‘IEEE Draft Standard for Local and metropolitan area networks Part15.4:
Low-Rate Wireless Personal Area Networks (WPANs) Amendment Physical
Layer Specifications for Low Energy, Critical Infrastructure Monitoring
Networks (LECIM)’, IEEE P802.15.4k/D5, April, 2013
[4] Tada, Y., Kato, S.: ‘A star-topology sensor network system for agriculture
using 802.15.4k Standard’. Proc. IEEE 24th International Symp. on Personal,
Indoor and Mobile Radio Communications: International Workshop on
Wireless Sensor Networks Standardization and Applications, 2013, pp. 4449–
4454
[5] Ith, V., Baykas, T., Kato, S.: ‘Improving preamble detection performance of
IEEE P802.15.4k DSSS PHY’. Proc. 2013 IEEE 24th Annual International
Symp. on Personal, Indoor, and Mobile Radio Communications (PIMRC),
2013, pp. 63–67
Fig. 8 The experiment results of multiple random access [6] Jin, Y., Ameen, M.A., Liu, H., et al.: ‘Interference mitigation study for low
(a) Correlation values of preamble detection in case of multiple EDs, (b) Measured C/I energy critical infrastructure monitoring applications’. Proc. 2012
values of field trial in case of two EDs International Symp. on the Communications and Information Technologies
(ISCIT), 2012, pp. 962–966
[7] Sum, C.-S., Kojima, F., Harada, H.: ‘Energy consumption evaluation for
4.2 Multiple access performance power saving mechanisms in recent IEEE 802.15.4 low-rate wireless personal
area networks’. Proc. 2013 IEEE International Conf. on the Communications
Fig. 8a shows the partial correlation values of preamble detection. (ICC), 2013, pp. 4449–4454
In this test, three EDs send packets almost at the same time and the [8] Gebremedhin, B.G., Haapola, J., Iinatti, J.: ‘Performance evaluation of IEEE
received signals are concurrently overlapped in time domain. It is 802.15.4k priority channel access with DSSS PHY’. Proc. 21th European
Wireless Conf., Budapest, Hungary, 2015, pp. 1–6
obvious that all the three beginnings of preamble sequences are [9] Xiong, X., Zheng, K., Xu, R., et al.: ‘Low power wide area machine-to-
detected within the same search window. Moreover, the payload machine networks: key techniques and prototype’, IEEE Commun. Mag.,
data for respective EDs can be distinguished from the unique 2015, 53, (9), pp. 64–71
identification of each ED. The enlarging segment also validates the [10] Dhillon, H.S., Huang, H., Viswanathan, H.: ‘Wide-area wireless
communication challenges for the internet of things’, IEEE Commun. Mag.,
proposed preamble detection algorithm in Section 2.3. 2017, 55, (2), pp. 168–174
To evaluate the near-far effect, we have recorded the C/I values [11] Centenaro, M., Vangelista, L., Zanella, A.: ‘Long-range communications in
from two EDs with different transmit power to simulate the near unlicensed bands: the rising stars in the IoT and smart city scenarios’, IEEE
and far instances. Fig. 8b shows the C/I from field test with Wireless Commun., 2016, pp. 60–67
[12] Nagaraj, S., Khan, S., Schlegel, C., et al.: ‘Differential preamble detection in
respective to packet number (same as time sequence). The transmit packet-based wireless networks’, IEEE Trans. Wirel. Commun., 2009, 8, (2),
power of the first ED is kept to be constant, while the transmit pp. 599–607
power of the second ED is increased step by step. It is clear that the [13] Jiang, Y., Ting, W.C., Verahrami, F.B., et al.: ‘A carrier frequency estimation
transmit power of the second ED has almost no effect on the C/I of method of MPSK signals and its systolic VLSI implementation’. Proc.
CISS'99: 33rd Annual Conf. on Information Sciences and Systems, John
the first ED even when the difference of received power is >20 dB. Hopkins University, Baltimore, MD, March 17–19, 1999, pp. 142–146
The results validate the degradation due to MAI as shown in (6), [14] Sklar, B.: ‘Digital communications: fundamental and applications’ (Prentice
i.e. the near-far effect has little influence on performance of Hall, 2006, 2nd edn.)
detector due to the large spreading factor. Thus, our proposed MAC [15] Oppenheim, A.V., Willsky, A.S.: ‘Signals and systems’ (Prentice-Hall, 1996,
2nd edn.)
scheme for DSSS PHY is practical, i.e. the AP can detect all time [16] Haykin, S., Moher, M.: ‘Modern wireless communications’ (Prentice Hall,
superimposed packets from multiple EDs. The MAC protocol 2005)