The present invention relates to identifying location of luminaires or light fixtures for selective control thereof to provide a desired illumination in a space, such as a greenhouse, where light control is desired using a relatively large number of luminaires based on various factors, including external, e.g., natural, lighting conditions.
Typically, there are many luminaires in large spaces, such as halls, buildings or homes with multiple rooms. A lighting control system for individual control of each luminaire is desirable. Of course, the location and identity of luminaires are needed in order to control the desired luminaire to provide the desired illumination at the desired location. Manual commission of a lighting control system, such as manually providing information related to each luminaire, such as its identity and location, is a tedious and costly process.
For example, in greenhouses, a desire exists to improve the illumination by selectively switching on or off luminaires to adapt the quantity of artificial light to the needed quantity, e.g., as function of the external light conditions. For individual control of each luminaire, the luminaires are equipped with wireless nodes (one node per luminaire) to control the individual luminaires. The nodes form a wireless mesh network. Commands may be sent from any wireless control point to any node (and consequently any luminaire) in the network.
To send a command to a given luminaire, the identity of the luminaire must be known. In addition, for the user controlling the lamps or luminaire, the identity of the luminaire must be related to the location of the luminaire in the greenhouse so that a particular luminaire located at a particular location is addressed or controlled. Relating each luminaire to its location is a slow process due to the large quantity of luminaires in a greenhouse, or any other space with a large number of luminaires. Accordingly, there is a need for automatic commissioning of lighting control systems to automatically determine and associate the location of a luminaire to its identity.
One object of the present systems and methods is to overcome the disadvantages of conventional lighting control systems.
According to illustrative embodiments, a node detection system includes an array of nodes, wherein each node of the array of nodes has at least two directional antennas, such as two, three or four directional antennas configured to have antenna beams in as many directions, such as at least in two directions. The range of each antenna is limited to reach a neighboring operational node of the array of nodes for transmission of a message to the neighboring operational node. A controller is configured to receive messages from the array of nodes and determine the location of each node based on the messages.
Further areas of applicability of the present systems and methods will become apparent from the detailed description provided hereinafter. It should be understood that the detailed description and specific examples, while indicating exemplary embodiments of the systems and methods, are intended for purposes of illustration only and are not intended to limit the scope of the invention.
These and other features, aspects, and advantages of the apparatus, systems and methods of the present invention will become better understood from the following description, appended claims, and accompanying drawing where:
The following description of certain exemplary embodiments is merely exemplary in nature and is in no way intended to limit the invention, its applications, or uses. In the following detailed description of embodiments of the present systems and methods, reference is made to the accompanying drawings which form a part hereof, and in which are shown by way of illustration specific embodiments in which the described systems and methods may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the presently disclosed systems and methods, and it is to be understood that other embodiments may be utilized and that structural and logical changes may be made without departing from the spirit and scope of the present system.
For purposes of simplifying a description of the present system, the term “operatively coupled” and formatives thereof as utilized herein, such as “operationally coupled” and the like, refer to a connection between devices or portions thereof that enables operation in accordance with the present system. For example, an operative coupling may include one or more of a wired connection and/or a wireless connection between two or more devices that enables a one and/or two-way communication path between the devices or portions thereof.
The following detailed description is therefore not to be taken in a limiting sense, and the scope of the present system is defined only by the appended claims. The leading digit(s) of the reference numbers in the figures herein typically correspond to the figure number, with the exception that identical components which appear in multiple figures are identified by the same reference numbers. Moreover, for the purpose of clarity, detailed descriptions of well-known devices, circuits, and methods are omitted so as not to obscure the description of the present system.
Luminaires are provided that are part of a wireless network of nodes where different protocols and frequencies are used for wireless communication among a central controller and the various nodes. The IEEE 802.15.4 low power Wireless Personal Area Network (WPAN) standard is one of the most popular standards for communication within Wireless Sensor Networks (WSN). Another popular standard or protocol for wireless communication is the ZigBee™ standard which is based on the IEEE 802.15.4 standard. Wireless communication may be degraded for many reasons.
Experience, theoretical analysis and simulation show that the success probability of sending a packet strongly depends on the environment. One source of interference is referred to as multipath interference, where a radio wave from a source travels to a detector via two or more paths having different lengths, thus arriving with different delays or phases. The out-of-phase multipath signals arriving at a detector may degrade reception quality and cause loss of data. Multipath interference changes in time and leads to reception quality fluctuations ranging from 100% success to no reception at all.
Other simulations for IEEE 802.15.4 nodes show that communication becomes difficult with more than 40 nodes. Further, beyond 100 nodes, packets no longer arrive at the intended destination, e.g., a detector or a receiver, or are no longer successfully received by the detector or receiver. In view of such reception degradation, the deployment of IEEE 802.15.4 needs additional measures to make it work in a wireless network or an environment with large number of nodes or luminaires (where at least one luminaire is connected to one node). One such network or environment is a greenhouse with 10,000 to 40,000 luminaires (and nodes) within one greenhouse of 100 meters by 400 meters, for example.
In one embodiment, directional antennas are used to limit the number of transmission paths. Further, limited range communication is used to limit the number of paths and the probability of interference between senders or transmitters. For example, directional antenna gains and transmission power of each node are configured for reaching a one-hop neighboring node.
In the case where a one-hop neighboring node is missing or non-operational, then a central processor or controller (550 in
Higher frequencies are used for communication between nodes since higher frequencies provide for smaller antennas and lower range. For example, communication in a frequency range at or around the 17 GHz frequency domain will enormously increase the probability of successful transmission between neighboring nodes. The directed or directional antenna for 17 GHz is a few Milli-Meters (mm), where for 2.4 GHz it is several Centi-Meters (cm). The smaller antenna leads to less sensitivity to mechanical damage. Further, the range of the 17 GHz is reduced, such as limited to a few meters, which means that only 1 hop or at most two hop neighbors (or nodes) may be reached in a greenhouse, thus significantly reducing the multi sender interference. Thanks to the limited range and limited angular coverage in the 17 GHz range, automatic topology discovery of the luminaires becomes less of a technology challenge, than would be the case with the 2.4 GHz IEEE 802.15.4 radio protocol.
By limiting the range of each antenna to a desired distance, such as enough distance to reach only one neighboring working node in an array or grid of nodes, e.g., one or two hops from one node to the neighboring node, the wireless array mimics or behaves like a wired array where neighboring nodes are connected by wires. In case a neighboring node is missing or faulty, which may be detected from mapping results that are not expected, then the controller 550 may be configured to increase the range, e.g., by increasing the power of nodes surrounding the missing or faulty node to achieve two hops in order to reach a neighboring working node. Of course, the range may be increased to any desired number of hops, such as three hops in case there are two missing or faulty nodes. It should be understood that although the present systems, devices and methods, are described in a greenhouse environment, any other environment with multiple nodes is also suitable where typically multipath interference degrades communication, for example.
Typically, a luminaire has a housing, which may be rectangular, for example, and includes a local controller or a ballast, for example. According to one embodiment, a directional antenna may be attached to at least four sides of the housing or ballast, such as to each of the four sides of the housing or ballast. The effect is that each antenna emits its radio signal perpendicular to the side of the ballast in a horizontal direction. Of course, any shape luminaires may be used, and at least four directional antennas may be provided on each luminaire in orthogonal position, such as front, back, (or up, down,) right and left, as shown by the coordinate system 210 in
A node may have neighbors in two directions, forming a line of nodes 100, as shown in
The algorithm (e.g. instructions executable by the processor 550) may be divided in two phases. First, for a row 220, the relative location of each luminaire or wireless node 240 along the row 220 is determined. The problem is the absence of nodes, and the possibility that a message arrives not only at the one hop neighbor, but also arrives at the neighbor which is two or more hops away. The assumption is that the arrival of a message at the n-hop neighbor implies that the message arrives also at the n−1 hop neighbor, provided both (the n and the n−1 neighbor) exist. This is depicted in
In
Suppose the identifier in the message is unequal to the identifier of the receiving node. On reception of a message on the right (left) antenna with (F, B), then the receiving node performs the following operations:
(1) increments the forward counter F and sends the message to its left (right) antenna, and
(2) increments the backward counter B and sends the message over its right (left) antenna.
Suppose the identifier in the message is equal to the identifier of the receiving node. On reception, the receiving node stores the message when the B and F value are equal. B and F being equal indicates that the forward and backward hops are equal which is correct and acceptable, resulting in storage if the node identification in the message is the same identification (ID) as the receiving node. If B and F values are not equal, then there is missing hop or node, and the message is rejected and not stored despite the message ID being the same as the receiving node ID. When a message is already stored in a receiving node, then the receiving node keeps the message with the highest B, F value, where B=F and the message ID is the same as the ID of the receiving node.
Accordingly, in
The result of phase one for determination of the left location value [L] for node “F” in one row at a time is worked out in
The final result of phase one for determination of left and right location values [L,R] for nodes in one row, determined one row at a time, is shown in the lower part of
The procedure or algorithm may be optimized by not sending (B, F) messages with B≧F, such as the underlined messages shown in
Once the left and right locations [L, R] of each node in one row (or column) is determined, then the second phase of the algorithm determines the row (or column) number for each node and corrects for missing nodes.
The location of each node [L, R] is expressed as hop count from the left most and right most node. The hop count is always smaller or equal than the column count. By sending the [L, R] coordinates down the rows over a column, they can be compared with the [L, R] coordinates of the lower nodes (in the lower rows). By taking the maximum of both [L, R] values of the node in the current row and the node in the lower row, the location coordinates [L, R] may be found for each node. It should be understood that columns and rows may be used interchangeably and merely designate two directions in a grid or matrix and may be orthogonal to each other.
For example, assume that node B has coordinates [0,4]. As shown in the array 400 of
Suppose the lower node in the same column does not exist (e.g., N does not exist), then the message (e.g., [1,3]) is first sent to the right or to the left and then sent down to a node that exists in the lower row. However the hop count right or left is not necessarily equal to the location count. Consequently, for messages to the right only, the right count may be adapted or changed, while the adaptation for the left count is undetermined. This is shown in
The algorithm works as follows. A node sends a message with its location in a row [L, R] and identifier (e.g., “D” for node D), forward hop count (or left value (L) in this illustrative example) and backward hop count (or right value (R) in this illustrative example) (F, B) and row hop count RC. The latter three, namely, forward hop, backward hop and row hop counts F, B, RC are initialized to 0. A node sends this message to the left, right and down and increases the corresponding hop counter. In particular, when the message is sent to the left or forward, then the left or forward hop counter or count F is increased by one; when the message is sent to the right or backwards then the right or backward hop count B is increased by one; and when the message is sent to the lower row, then the row hop count RC is increased by one.
On reception of a message by a node having the same identity or identifier as the identifier of the message, then the message is stored. When a message is already present, then the [L, R] location is updated as explained by keeping the maximum values, and the maximum of the row hop count is also stored. When the message is new or the content of the message is adapted, then the message is sent on with the latest values according to the following rules. For a message arriving from the row above the current row, then the message is sent over the left, the right and down, with corresponding hop counters incremented by one. For a message arriving from the right (left), the message is sent on to the left (right), and down with corresponding hop counters adapted, such as increasing the left counter F by one when the message is sent to the left with one hop, and increasing the row hop counter RC by one when the message is sent down to the row below.
At the lowest or most down nodes (i.e., the last row at the bottom), the messages are collected and sent on to the processor (550 in
All messages with left hop, right hop, identifier, L value and R value and row count are sent on to the lowest row and, from there, sent on to the controller or processor 550 which may be PC, PDA or any device having a controller or processor. Within the PDA or PC, an entry is created for each identifier that arrives in a message. The entry contains the L value, R value, and an end hop count. For all messages of each identifier, the largest L, R and row numbers are stored.
Ordering the entries in two dimensions, over the row number and over the L value (or R value), for example, a map of node identifier to location is obtained. The L value (or R value) represents the column number, and the row_counter the row number. From this table it is possible to send a message from the PDA/PC to a given node, identified with column and row, by using the corresponding identifier using standard routing techniques. Scanning each row for the presence of all L-values, a missing L-value indicates a missing node.
Storing the messages according to identifier in each node is done for efficiency purposes. When a message with a given identifier arrives, and the same identifier with the same values is stored in the node, the receiving node does not need to send on the message. Consequently, the number of identical messages is significantly reduced at the expense of memory space in the node.
In embodiments having the central controller 550, other devices may also be provided, such as a central memory 565, display 570, input/output devices and any other desired device. The central controller 550 may be operationally coupled to the central memory 565, the display 570, a wired connection 575 such as for access to the Internet or other networks, or connection to other devices, and a user input device 580. The memory 565 may be any type of device for storing application data as well as other data related to the described operations. The application data and other data are received by the processor 550 for configuring the processor 550 to perform operation acts in accordance with the present system. The operation acts may include powering on, searching for nodes, scanning, etc. Details of the system 500 are not introduced to simplify the discussion herein although would be apparent to a person of ordinary skill in the art. The system 500, depending on exactly the application, may include the user input or interface 580 and the display 570 to facilitate particular aspects of those embodiments although are not required for operation. For example, a user may provide user inputs via the user interface 580 to turn on/off or activate/deactivate various component of the system 500, turn on nodes and make adjustments as desired. The display 570 may be configured to display various data, such as a mapping of the nodes indicating node identities and respective locations, as well as showing missing or defective nodes, and any other desired information.
The operational acts of the processor 550 may further include controlling the display 570 to display any other content such as any content that would be applicable to the system 500, such as a user interface for control through a touch sensitive display, for example. The user input device 580 may be hardware or soft devices displayed on the touch sensitive display and may include a keyboard, mouse, trackball or other device. The display 570 and/or user input device 580 may be stand alone or be a part of a system, such as part of a personal computer, personal digital assistant, mobile phone, set top box, television or other device for communicating with the processor 550 via any operable link. The user input device 580 may be operable for interacting with the processor 550 including enabling interaction within the user interface and/or other elements of the present system. Clearly the processor 550, the memory 565, display 570, antenna 560 and/or user input device 580 may all or partly be a portion of an antenna device or other device for operation in accordance with the present system.
The methods of the present system are particularly suited to be carried out by a computer software program, such program containing modules corresponding to one or more of the individual steps or acts described and/or envisioned by the present system. Such program may of course be embodied in a computer-readable medium, such as an integrated chip, a peripheral device or memory, such as the memory 565 or other memory coupled to the processor 550.
The memory 565 and other memories configure the processor 550 to implement the methods, operational acts, and functions disclosed herein. The memories may be distributed, for example between the various nodes and the processor 550, where additional processors may be provided, may also be distributed or may be singular. The memories may be implemented as electrical, magnetic or optical memory, or any combination of these or other types of storage devices. Moreover, the term “memory” should be construed broadly enough to encompass any information able to be read from or written to an address in an addressable space accessible by the processor 550. With this definition, information accessible through the wired connection 575 (e.g., wired connection to a network such as the Internet), and/or through a wireless connection via the antenna 560, for example, is still within the memory 560, for instance, because the processor 550 may retrieve the information from one or more of the operable connections 560, 575 in accordance with the present system.
The processor 550 is operable for providing control signals and/or performing operations in response to input signals from the user input device 580 as well as in response to other devices of a network and executing instructions stored in the memory 565. The processor 550 may be an application-specific or general-use integrated circuit(s). Further, the processor 550 may be a dedicated processor for performing in accordance with the present system or may be a general-purpose processor wherein only one of many functions operates for performing in accordance with the present system. The processor 550 may operate utilizing a program portion, multiple program segments, or may be a hardware device utilizing a dedicated or multi-purpose integrated circuit. Further variations of the present system would readily occur to a person of ordinary skill in the art and are encompassed by the following claims.
Of course, it is to be appreciated that any one of the above embodiments or processes may be combined with one or more other embodiments and/or processes or be separated and/or performed amongst separate devices or device portions in accordance with the present system.
A second approach is further described below for commissioning algorithms that serve to allocate a position expressed in column and row to each node. In the second approach, various algorithms to determine node locations (e.g., row and/or column counts) are used, where each node stores its location in its node memory. The node locations are updated and the maximum counts between stored and received (row and/or columns) counts are stored in the node memory indicating the node location. Thus, the node location of a node, determined by the node itself, is stored in the memory of that node and there is no need for the central processor 550 to produce a mapping of node identities to node locations. Further, there is no need to store the node identities and locations, or any such mapping, in the central memory 565 shown in
The complexity of the algorithm depends on the fault hypothesis and the range of the radio. The radio knows four directions up, down, left and right. The range of the radio is expressed in the number of hops. An x-neighbor is a neighbor in the x-direction, with x in {up, down, left, right}. One hops means: message reaches direct neighbor. Two hops means: message reaches neighbor and the neighbor's neighbor. Isolated faulty node means that the node is faulty but all its neighbors are correct.
Various scenarios are described where range is one or two hops, with no faulty node or isolated faulty nodes and with or without message losses. The number of hops may be detected from the strength of received signal, for example, where a signal received with lower power indicates that the signal traveled more than one hop, such as being a two-hop signal. Further, a range identifier may be included in the message by the receiver to indicate that the signal is received with 2-hops. It is assumed that all nodes are switched on before the algorithm is executed.
This case is the simplest one. Each node has a pair [column_counter, row_counter], which are initialized to (0, 0).
Each node sends a message with the entry row_hops, initialized to 0, in the right direction. On reception of a message, ms, from the left direction, the value of ms.row_hops is incremented with one and the value of row_counter is set equal to MAX(ms.row_hops, row_counter). The message with the incremented value is sent on in the right direction.
The same process is repeated to calculate the column_counter value. Each node sends a message with the entry column_hops, initialized to 0, in the up direction. On reception of a message, ms, from the low direction, the value of ms.column_hops is incremented with one and the value of column_counter is set equal to MAX(ms.column_hops, column_counter). The end result is shown in the array 600 of
In this case, algorithm 1 will execute equally well. Suppose a packet is received at the neighbor and the two hop neighbor. The message from the neighbor with the incremented hop count will reach the two hop neighbor as well. As the two hop neighbor will take the maximum of the received values the end result is the same as shown in
This case is more difficult. Suppose we execute the column- and the row-part of the algorithm, then the message will start and stop not only at the end points but also at the faulty nodes. In the array 700 shown in
Each node sends a message with the entry row_hops, initialized to 0, in the right direction. On reception of a message, ms, from the left direction and ms.row_hops<row_counter, the message is rejected. If ms.row_hops≧row_counter the value of ms.row_hops is incremented with one and the value of row_counter is set equal to MAX(ms.row_hops, row_counter). The message with the incremented value is sent on in the right, up and down direction. On reception of a message, ms, from the up (down) direction, the value of ms.row_hops is compared with the value of row_counter. When ms.row_hops>row_counter, row_counter is set equal to ms.row_hops, and the message is sent on in the right direction.
The same process is repeated to find the column_counter value. Each node sends a message with the entry column_hops, initialized to 0, in the up direction. On reception of a message, ms, from the down direction and ms.column_hops<column_counter, the message is rejected. If ms.column_hops≧column_counter the value of ms.column_hops is incremented with one and the value of column_counter is set equal to MAX(ms.column_hops, column_counter). The message with the incremented value is sent on in the up, left and right direction. On reception of a message, ms, from the left (right) direction, the value of ms.column_hops is compared with the value of column_counter. When ms.column_hops>column_counter, column counter is set equal to ms.column_hops, and the message is sent on in the up direction.
It can be seen from
In this case the problem persists and the execution of algorithm 1 would have resulted in the labeling 800 shown in
Each node sends a message with the entry row_hops, initialized to 0, in the right direction. On reception of a message, ms, from the left direction and ms.row_hops<row_counter, the message is rejected. If ms.row_hops>row_counter the value of ms.row_hops is incremented with one and the value of row_counter is set equal to MAX(ms.row_hops, row_counter). The message with the incremented value is sent on in the right, up and down direction. On reception of a message, ms, from the up (down) direction, the value of ms.row_hops is compared with the value of row_counter. When ms.row_hops≧row_counter, row_counter is set equal to ms.row_hops, and the message is sent on in the right, up and down direction.
The same process is repeated to find the column_counter value. Each node sends a message with the entry column_hops, initialized to 0, in the up direction. On reception of a message, ms, from the down direction and ms.column_hops<column_counter, the message is rejected. If ms.column_hops≧column_counter the value of ms.column_hops is incremented with one and the value of column_counter is set equal to MAX(ms.column_hops, column_counter). The message with the incremented value is sent on in the up, left and right direction. On reception of a message, ms, from the left (right) direction, the value of ms.column_hops is compared with the value of column_counter. When ms.column_hops>column_counter, column_counter is set equal to ms.column_hops, and the message is sent on in the up, right and left direction.
When neighboring faulty nodes are placed in a row or a column, the algorithm works perfectly (provided that there is no network separation), as shown in the results 1000 of algorithm 3 shown in
For the radio part, high frequencies are used in order to substantially limit the communication range of each node, such as to few meters for only 1 hop or two hops to its neighbors. If necessary, certain nodes or certain portions of the certain nodes may be configured for longer range communication, such as end nodes having portions configured for communication with the central controller 550 which may be at longer distance then a few meters. Of course, intermediary nodes may be provided to facilitate communication between the nodes of the array 510 and the central controller 550. Illustratively, a 17 GHz transceiver system is provided in each node of the array and other nodes, such as intermediary nodes and the central controller 550. The power consumption may be around 20 mW, where the data rate may be 10 Mbit/s, and the turn-on time of several μs.
As shown in
It should be noted that the same radio architecture may be used for communications with other low-power radios without the master device with On-Off Key (OOK) signaling. On the receiver side, an orthogonal Phase Shift Keying (FSK) or Optical Phase Shift Keying (OFSK)/OOK modulation may be employed together with the direct-down conversion architecture. Orthogonal FSK is a special type of binary FSK (BFSK), where the modulation index of FSK is 1. OOK and binary FSK are two mostly used modulation schemes in Wireless Sensor Networks (WSN). OOK is very simple and basic, while FSK provides more design benefits besides simplicity. Therefore, in the transceiver system 1100 supports both modulation schemes are supported. Two important factoids about OFSK may be added.
Firstly, FSK tone frequency is selected with a balance between the requirements of bandwidth efficiency favoring closely spaced channels and low tone frequency, and the role of flicker noise in direct-conversion receiver architecture that favor large tone frequency. In one embodiment, with a data rate of 10 Mbit/s, a modulation index is chosen to be 1 results in two tones at 5M and 15M, which provides enough headroom to get rid off the problem of DC-offsets and flicker noise (corner frequency is about 200 KHz in QUBIC4X).
Secondly, the bandwidth of OFSK signal in is about two times of data rate 20 MHz, which is suitable for the 200 MHz bandwidth at 17 GHz free band. With proper channel spacing, about 8 channels are available, given the opportunity to adopt frequency spectrum spread in the future to improve energy efficiency.
The direct-conversion architecture is chosen for simplicity and high integration. Any DC-offsets and flicker noise problems may be solved by proper selection of FSK tone frequency above. 17 GHz RF signals are collected by a small on-chip patch antenna (about 4 mm by 4 mm) shown in
The output of the LNA is directly connected to the input of sub-harmonic mixer. The RF path is single-ended, and we generate 8 phases Local Oscillator (LO) signals with a phase step of 45 degree from 0 to 315 degrees. These 8 phases LO signals can be divided into two groups:
The same Radio Frequency (RF) signal is mixed with two groups of LO signals separately in two sub-harmonic mixers to generate I/Q differential Intermediate Frequency (IF) outputs. Considering that a high quality single to differential converter in the RF path is much more difficult to achieve and is power consuming, it is preferable that all the phase generation be in the LO path where 8 different phase LO signals around 8.6 GHz are needed. This may be achieved by first using a passive polyphase filter after differential resonator based on BAW device and then an interpolation network to generate 8 phases from the quadrature inputs. Sufficient amplitude and phase accuracy may be maintained by proper circuit design and layout.
Finally, in the IF part, a low pass filter (LPF) and automatic gain control (AGC) IF amplifier are included to perform channel selection and signal amplification to provide proper signal magnitude to be directly handled by the following frequency demodulator. In this architecture all the demodulation functions are performed in analog domain eliminating analog to digital converters (ADCs), which may add some extra power consumption. OOK demodulation is achieved by a square root detector, which calculates the square root of the amplitude of I/Q signals and compares it with a threshold voltage to decide base band signals to be 1 or 0. A frequency detector is used to complete OFSK demodulation. This method is insensitive to DC-offsets and I/Q mismatch.
The power consumption of a classical Phase Lock Loop (PLL) may be as high as 40% of the total power consumption and turn-on times are of the order of 100 μs. Therefore, based on current technologies, the above PLL-based methods are unachievable for low power budgets of a few Milli-Watts (mW), and short turn-on times of a few microseconds (μs). Alternatively, the design of a transceiver solution may not require a PLL. The local oscillator may be derived from a resonator such as bulk acoustic wave (BAW) device or a cavity-typed resonator. It is desirable to use a bulk acoustic wave (BAW) resonator as the frequency reference since this has the advantage of a very short turn-on time, such as a few μs. Very low phase noise figures may readily be achieved by BAW resonator. As to frequency accuracy, in a production process, the absolute frequency accuracy of BAW filters is expected to be as good as ±0.3%. In the 17 GHz band, this translates to a frequency error of ±49 MHz, which means that the radio will be able to make a “legal” transmission without further tuning or calibration (i.e. within the 200 MHz band). To further enhance the frequency accuracy, a master-slave network configuration may be helpful, which is described below.
This asymmetrical link with master-slave devices may be used for communication between the luminaire and a sensor attached to a plant associated with the luminaire. The sensor may communicate with the master device, in this case one of the luminaires in order to send information on humidity, temperature, light intensity etc. for processing by the master. The absolute frequency accuracy and robustness of this system may be further improved by using proper network configuration, such as a master-slave asymmetrical link system 1200, as shown in
As shown in
In the same way, the master device will sense the presence of the other devices (ULPs) that send on different frequencies fRFn. The absolute frequency accuracy problem is solved and the system becomes more robust. The master device allocates a time slot for the transmissions (depending on the required data rate) and a time slot is also allocated for the master to re-join the link, if necessary. In this way, the ULP devices contain minimum processing power, and are simply timers together with the receive and transmit (Rx/Tx) functions. The protocol may be TDMA-based and scheduling of the devices may avoid collisions and simultaneous operation of the ULPs. As in a ZigBee™ system, two ULPs may initiate a peer-to-peer virtual data transfer 1230 via the master device.
On the transmitter side, the transmitter (Tx) shares the same oscillator with the receiver and is turned-on/off by the data to provide an OOK modulation. The simplicity of this type of transmitter is without equal. As the transmitter is operating at a switching mode during data transmission, theoretically it will reduce transmitter power consumption compared to that consumed by an FSK transmitter (because the FSK transmitter must be on 100% of the time when data is being transmitted). In addition, since OOK signals only contain “0” and “1”, so the linearity of the Power Amplifier (PA) 1190 shown in
Non-linear PAs may be employed to increase PA efficiency. Moreover, the bias of the transmitter may be stable within a single bit period (0.1 μs) so that it may support data rated up to 10 MHz. The potential weak point of this OOK transmitter is that the peak current of PA may be higher than that of the FSK transmitter when they have the same average output power. This is not a problem here since by proper link budget calculation, the transmitter output power may be chosen to be relatively smaller to reduce PA peak current. In addition, energy scavenging techniques (such as using capacitor techniques to allow high peak currents, and proper choice of battery) may also be adopted to provide a transient high current surpass peak current limitation of typical battery in the very short transmitting period.
The different Tx/Rx modulation formats may be solved in the master-slave network configuration discussed before. The ULP node transmits OOK signals to master, where data are first demodulated and then modulated to OFSK signals. Then, the master sends the OFSK signals to ULP nodes, which may receive and demodulate it in the receiver path. Besides this OFSK modulation, the above transceiver architecture may also support direct communication between two ULP slave nodes using OOK modulation. In this way, a very simple low power transceiver architecture is achieved supporting both OOK and OFSK modulation schemes.
In light with the requirements for wireless communications at millimeter-waves for luminaires, the antenna has small dimensions and sufficiently narrow beam.
Communication between modules will be delivered by the antenna system. This system comprises antenna arrays pointed horizontally and vertically. The horizontal arrays are used for wireless communication between modules and the vertical arrays are used for the communication with the sensors placed on the ground for sensing environmental conditions, such as temperature, humidity, light levels and the like. As shown in
The high frequency is necessary to fit the array system size in the luminaire's small area. The size of the antenna array is dependent on the frequency used to generate the radiating waves and that defines its size. At 17 GHz, the half wavelength of a single radiator in air is 8.82 mm and if the radiator is supported by a substrate with a dielectric constant of 4, then the radiator size will have half of its original size.
The antenna array may also comprise other kind of radiators without compromising the topology of the array system and its functionality. The generic approach allows the adaptation of radiator elements as well as the array systems with what will be useful when other hostile or hazardous environments are encountered.
Of course, as it would be apparent to one skilled in the art of communication in view of the present description, various elements may be included in the system or network components for communication, such as transmitters, receivers, or transceivers, antennas, modulators, demodulators, converters, duplexers, filters, multiplexers etc. The communication or links among the various system components may be by any means, such as wired or wireless for example. The system elements may be separate or integrated together, such as with the processor. As is well-known, the processor executes instructions stored in the memory, for example, which may also store other data, such as predetermined or programmable settings related to system control.
Various modifications may also be provided as recognized by those skilled in the art in view of the description herein. The operation acts of the present methods are particularly suited to be carried out by a computer software program. The application data and other data are received by the controller or processor for configuring it to perform operation acts in accordance with the present systems and methods. Such software, application data as well as other data may of course be embodied in a computer-readable medium, such as an integrated chip, a peripheral device or memory, such as the memory or other memory coupled to the processor of the controller.
The computer-readable medium and/or memory may be any recordable medium (e.g., RAM, ROM, removable memory, CD-ROM, hard drives, DVD, floppy disks or memory cards) or may be a transmission medium (e.g., a network comprising fiber-optics, the world-wide web, cables, and/or a wireless channel using, for example, time-division multiple access, code-division multiple access, or other wireless communication systems). Any medium known or developed that can store information suitable for use with a computer system may be used as the computer-readable medium and/or memory.
Additional memories may also be used. The computer-readable medium, the memory, and/or any other memories may be long-term, short-term, or a combination of long- and -short term memories. These memories configure the processor/controller to implement the methods, operational acts, and functions disclosed herein. The memories may be distributed or local and the processor, where additional processors may be provided, may be distributed or singular. The memories may be implemented as electrical, magnetic or optical memory, or any combination of these or other types of storage devices. Moreover, the term “memory” should be construed broadly enough to encompass any information able to be read from or written to an address in the addressable space accessed by a processor. With this definition, information on a network, such as the Internet, is still within memory, for instance, because the processor may retrieve the information from the network.
The controllers/processors and the memories may be any type. The processor may be capable of performing the various described operations and executing instructions stored in the memory. The processor may be an application-specific or general-use integrated circuit(s). Further, the processor may be a dedicated processor for performing in accordance with the present system or may be a general-purpose processor wherein only one of many functions operates for performing in accordance with the present system. The processor may operate utilizing a program portion, multiple program segments, or may be a hardware device utilizing a dedicated or multi-purpose integrated circuit. Each of the above systems utilized for identifying the presence and identity of the user may be utilized in conjunction with further systems.
Finally, the above-discussion is intended to be merely illustrative of the present system and should not be construed as limiting the appended claims to any particular embodiment or group of embodiments. Thus, while the present system has been described in particular detail with reference to specific exemplary embodiments thereof, it should also be appreciated that numerous modifications and alternative embodiments may be devised by those having ordinary skill in the art without departing from the broader and intended spirit and scope of the present system as set forth in the claims that follow. The specification and drawings are accordingly to be regarded in an illustrative manner and are not intended to limit the scope of the appended claims.
In interpreting the appended claims, it should be understood that:
a) the word “comprising” does not exclude the presence of other elements or acts than those listed in a given claim;
b) the word “a” or “an” preceding an element does not exclude the presence of a plurality of such elements;
c) any reference signs in the claims do not limit their scope;
d) several “means” may be represented by the same or different item or hardware or software implemented structure or function;
e) any of the disclosed elements may be comprised of hardware portions (e.g., including discrete and integrated electronic circuitry), software portions (e.g., computer programming), and any combination thereof;
f) hardware portions may be comprised of one or both of analog and digital portions;
g) any of the disclosed devices or portions thereof may be combined together or separated into further portions unless specifically stated otherwise; and
h) no specific sequence of acts or steps is intended to be required unless specifically indicated.
Number | Date | Country | Kind |
---|---|---|---|
08101719.6 | Feb 2008 | EP | regional |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/IB09/50604 | 2/13/2009 | WO | 00 | 8/12/2010 |