AN0512 Channel capacity in ranging applications

Similar documents
RC1140-RC232 Firmware Product Change Notification

KW41Z IEEE and BLE Coexistence Performance

Radiocrafts Embedded Wireless Solutions

AN1203 Automatic start of CANopen slave devices

Radiocrafts Embedded Wireless Solutions

MBUS-CCT (Configuration and Communication Tool) User Manual

RC232 Configuration and Communication Tool (CCT) User Manual

Product Description. Applications. Features

SIGFOX-CCT (Configuration and Communication Tool) User Manual

nrf240x ShockBurst technology

RC232 Deployment Tool (DT) User Manual

AN1204 Configuration of CANopen devices via LSS

AN10428 UART-SPI Gateway for Philips SPI slave bridges

Multiple Access. Data Communications and Networking

Hints and tips when using RC1xx0 RF Modules

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

CMPE 257: Wireless and Mobile Networking

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

EE 122: Ethernet and

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Data Link Layer -2- Network Access

Chapter 6 Medium Access Control Protocols and Local Area Networks

Wireless Medium Access Control Protocols

RN-174. WiSnap M2 Super Module. Features. Description. Applications. ~ page 1 ~ rn-174-ds v1.1 6/1/2011

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

Simple frequency hopping with the nrf9e5 and nrf24e1

Data Link Layer -2- Network Access

INTEGRATED CIRCUITS ABSTRACT

Exercises of lecture Wireless Sensor Networks Winter 2006/2007 Sheet 4

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Data Link Layer: Collisions

Multiple Access Protocols

Random Assignment Protocols

MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Manual AMB8472-M Configurator Version 1.1

DASH7 ALLIANCE PROTOCOL - WHERE RFID MEETS WSN. public

Terminal I/O Profile Client Implementation Guide

CMPE 257: Wireless and Mobile Networking

nrf905 Evaluation Kit

RN-174. WiFly GSX Super Module. Features. Description. Applications. rn-174-ds v1.1 4/20/2011

WiMOD LR Base Host Controller Interface

TMR1202. General Description. TMR Bipolar Switch. Features and Benefits. Applications

LAN PROTOCOLS. Beulah A AP/CSE

Data Link Control Protocols

Table 1: Device summary Part numbers Device info (stored in register 0xF0 and 0xF1) Comment SPIRIT1QTR 0x0130 Cut 3.0

STEVEN R. BAGLEY PACKETS

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

CSMA/CD (Collision Detection)

Multimedia Communication Services Traffic Modeling and Streaming

WiMOD LR Base Plus Host Controller Interface

Wireless MACs: MACAW/802.11

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider

file:///c:/users/hpguo/dropbox/website/teaching/fall 2017/CS4470/H...

IPv6 Stack. 6LoWPAN makes this possible. IPv6 over Low-Power wireless Area Networks (IEEE )

ComAPI+ API Documentation

AN Reduce CPU overhead with Intelligence Interrupt Arbitration (I2A) feature. Document information

Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Multiple Access Links and Protocols

ECEN 5032 Data Networks Medium Access Control Sublayer

Mounting instruction Gateway M-Bus Master AMB8466-M-GMM Release 1.2

RN-171-EK Evaluation Board

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Chapter 11 Data Link Control 11.1

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

VHF variable capacitance double diode. Electronic tuning in FM radio applications.

4 rd class Department of Network College of IT- University of Babylon

RN0046 Release note. 1 Introduction. SimpleMAC library for STM32W108xx kits. About this release note

ECE/CSC 570 Section 001. Final test. December 11, 2006

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

Data Link Layer: Overview, operations

Chapter 12 Multiple Access 12.1

Redes de Computadores. Medium Access Control

PESDxU1UT series. 1. Product profile. Ultra low capacitance ESD protection diode in SOT23 package. 1.1 General description. 1.

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Rahman 1. Application

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Programming Assignment 3: Transmission Control Protocol

CS 3640: Introduction to Networks and Their Applications

Radiocrafts Embedded Wireless Solutions

WiMOD LoRaWAN EndNode Modem HCI Specification

Reminder: Datalink Functions Computer Networking. Datalink Architectures

CS 640 Introduction to Computer Networks Spring 2009

MultiTech Conduit AEP + RE866

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Low forward voltage Ultra small SMD plastic package Low capacitance Flat leads: excellent coplanarity and improved thermal behavior.

IP4220CZ6 Dual USB 2.0 Integrated ESD protection to IEC level 4

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Low Cost Networks, ZigBee TM &

Computer Networks. Wireless LANs

ECE 158A: Lecture 13. Fall 2015

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

RE866 Interface User Guide

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Broadband system applications i.e. WCDMA, CATV, etc. General purpose Voltage Controlled Attenuators for high linearity applications

Transcription:

AN0512 Channel capacity in ranging applications 1.0 NA-15-0356-0021-1.0

Document Information Document Title: Document Version: 1.0 Current Date: 2015-09-08 Print Date: 2015-09-08 Document ID: Document Author: Disclaimer NA-15-0356-0021-1.0 Nanotron Technologies GmbH believes the information contained herein is correct and accurate at the time of release. Nanotron Technologies GmbH reserves the right to make changes without further notice to the product to improve reliability, function or design. Nanotron Technologies GmbH does not assume any liability or responsibility arising out of this product, as well as any application or circuits described herein, neither does it convey any license under its patent rights. As far as possible, significant changes to product specifications and functionality will be provided in product specific Errata sheets, or in new versions of this document. Customers are encouraged to check the Nanotron website for the most recent updates on products. Trademarks All trademarks, registered trademarks, and product names are the sole property of their respective owners. This document and the information contained herein is the subject of copyright and intellectual property rights under international convention. All rights reserved. No part of this document may be reproduced, stored in a retrieval system, or transmitted in any form by any means, electronic, mechanical or optical, in whole or in part, without the prior written permission of nanotron Technologies GmbH. Copyright 2015 nanotron Technologies GmbH. MLA Page 2 Doc ID NA-15-0356-0021-1.0 2015 All Rights Reserved

Contents 1. Introduction... 4 2. Ranging operation... 4 2.1. Default ranging operation and its variants... 4 2.2. Basic ranging operation air time... 4 2.3. Length of the packets involved in ranging... 5 3. Channel capacity... 6 4. Coexistence of multiple swarms in the same area... 6 5. Recommendations... 8 6. References... 9 Figure 2-1: Default ranging cycle... 4 Figure 4-1: Ranging cycle without result broadcast... 7 Figure 4-2: Ranging cycle with an ACK lost... 7 Figure 4-3: Scenario where one of the nodes is in privacy mode... 7 Table 2-1: Air time of a ranging operation for different modes... 5 Table 3-1: Number of ranging cycles per second for different modes... 6 2015 All Rights Reserved Doc ID: NA-15-0356-0021-1.0 Page 3

1. Introduction The behavior of a swarm bee alone in a certain area is very simple; it sends a short ID notification message (from now on referred as blink) to announce itself every period of time. When a neighbor appears the interaction between devices starts. At that moment the channel occupancy passes from one blink every period of time to two blinks and the two corresponding ranging operations that are automatically triggered. If a third swarm device appears in the area the number of blinks will become three and the number of automatic ranging operations will increase up to 6, as each blink will trigger the two swarm devices receiving it to initiate the ranging operation. As we can see the number of messages in the air grows exponentially with the number of devices. Thus, it is important to set the swarm devices properly to avoid unnecessary transmissions, as well as to have an idea of the channel occupancy of our system. With this we can understand the limitations of our application. In this document we show what a ranging operation consist of and how long it takes. We will use this data to estimate the channel capacity. In we will finish with some recommendations to keep the channel occupancy under control and boost the performance of our application. 2. Ranging operation 2.1. Default ranging operation and its variants Figure 2-1 shows a default ranging operation. default means that the two swarm devices involved in the process have default settings. It consist of a ranging cycle (symmetrical double-sided two way ranging, SDS- TWR) plus the blink that triggers it and a last packet to broadcast the result. Figure 2-1: Default ranging cycle Node B sends a NodeIDBoradcast (blink). Swarm bee A receives the blink and decides to start a ranging operation with node B. For that it send a RangingRequest to node B. Node B acknowledges the request (ACK) and accepts it by sending its answer 1. After receiving and ack to answer 1 from node A, node B sends its answer 2. When node A receives the answer 2, it acknowledges it (ACK), uses all the values it gathered to estimate the distance and sends the result both through the UART and over the air, as a broadcasted message ( RangingResultBroadcast ). All nodes receiving the RangingResultBroadcast will also pass it to their host though the UART. At the RX (on) level of Figure 2-1 two slightly different levels can be seen. The upper one indicates that the node is in receive mode while the lower one indicates that the device is not only in receive mode but actually receiving information. This default behavior can be modified. For certain applications the user could, for instance, disable the broadcasted message used to announce the estimated distances between pairs of nodes. It could also be possible that the user is more interested in triggering the ranging operation from the host and not automatically by the devices blink. In this case the blink would not be part of the ranging operation. 2.2. Basic ranging operation air time The timing of the different packets exchanged during the ranging operation was measured and presented in our application note AN0501 [1]. We use the values shown in that document to estimate the air time per ranging cycle. The air time of a ranging cycle will be the addition of the times of RangingRequest, Answer1 and Answer2 and the three corresponding ACKs over the air. As it is shown in [1] the transmission time of each packet depends of the transmission mode selected. There are four variants: 80/1 (80 MHz bandwidth and 1 µs per symbol) and FEC off, 80/1 and FEC on, 80/4 (80 MHz bandwidth and 4 µs per symbol) and FEC off and 80/4 and FEC off. Table 2-1 reflects the air time of a ranging operation for the 4 transmission modes. The 3 scenarios considered are a ranging cycle, a ranging cycle triggered by a blink and a ranging cycle triggered by a blink and with the broadcast of the result (default ranging operation). The calculation Page 4 Doc ID NA-15-0356-0021-1.0 2015 All Rights Reserved

was done with standard packets, without taking into account that some of the packets involved in the process can have a variable payload and, subsequently, variable length. Table 2-1: Air time of a ranging operation for different modes 80/1, FEC off 80/1, FEC on 80/4, FEC off 80/4, FEC on SDS-TWR 1.45 ms 2.05 ms 4.92 ms 7.2 ms Ranging + blink 1.95 ms 2.84 ms 6.82 ms 10.24 ms Ranging + blink + result broadcast 2.58 ms 3.86 ms 9.26 ms 14.26 ms 2.3. Length of the packets involved in ranging The timing showed in the previous section depends also on the length of each packet transmitted. The packets consist of a fix part, or header, and a variable part, or payload. The payload of each of them is different depending on its function: NodeIDBroadcast (blink): SWARM_TYPE 1 byte SWARM_VERSION 1 byte SWARM_DC 1 byte SWARM_SPSA 1 byte SWARM_WAKEUP_REASON 1 byte SWARM_LENGTH 1 byte SWARM_SENSOR_DATA_LENGTH 1 byte SWARM_SENSOR_DATA - BATTERY 3 bytes GPIO 2 bytes TEMPERATURE 3 bytes ACCELERATION 7 bytes TIMESTAMP 5 bytes ESC 1 byte This makes a total of 28 bytes. When the MEMS data is disabled, the temperature and acceleration data is not added to the packet and the payload is only 18 bytes. Additionally, user data can be added to the NodeIDBraodcast using the API command FNIN (see [2] ). The length of the user data can be such that the maximum payload length is 128. RangingRequest: By default it only includes 12 bytes of ranging data. The user can include application data (user data) by using the API command FRAD (see [2] ). The extra data can have up to 116 bytes of length, so that the maximum payload is also 128 bytes. Answer1: It only includes 12 bytes of ranging data. This is fixed and cannot be changed. Answer2: It only includes 12 bytes of ranging data. This is fixed and cannot be changed. RangingResultBroadcast: It is similar to the NodeIDBroadcast packet but instead of user data it includes the ranging result. Ranging result: SOURCE_ID 6 bytes DESTINATION_ID 6 bytes ERROR_CODE 1 byte DISTANCE 4 bytes This means (28 + 18) = 46 bytes when the sensors are enabled and (18 + 18) = 36 bytes when the sensors are disabled. 2015 All Rights Reserved Doc ID: NA-15-0356-0021-1.0 Page 5

3. Channel capacity Using the data in Table 2-1, we can do a simplified estimation to get an idea of the channel capacity. A first estimation is done for the ranging cycle using transmission mode 80/1 and FEC off and with the default packet length. A blinking rate of one second is assumed. The reasoning followed is: - The ranging cycle consists of several consecutive packets. The total accumulative air time used for one SDS-TWR ranging cycle is the addition of the air time of all the packets, about 1.45 ms. We will consider one ranging cycle as one 1.45 ms event. - There is a total of 1000 ms / 1.45 ms ~ 689 ranging slots per second = theoretical capacity. - Since ranging events (= access to the medium air interface) are totally random, one could use ALOHA statistics: Between 17 and 19% of the theoretical capacity could be used providing the over-all load is not more than 50% of the total. This means between 117 and 131 ranging events per second are going to be successful providing the total number of attempts does not exceed 344 per second. - Conclusion: Expect a capacity of about 117 ranging events per second while limiting the total number of attempts to 344 or less. The same methodology is followed when the ranging operation is triggered by a blink and the ranging result is broadcasted. We will take into account the air time for the RangingResultBroadcast and the NodeIDBroadcast. According to this values, the expected capacity, in ranging events per second, providing the over-all load is no more than 50% is shown in the following table: Table 3-1: Number of ranging cycles per second for different modes 80/1, FEC off 80/1, FEC on 80/4, FEC off 80/4, FEC on SDS-TWR 117 83 35 24 Ranging + blink 87 60 25 17 Ranging + blink + result broadcast 66 44 18 12 4. Coexistence of multiple swarms in the same area As already explained, when multiple tags with the default configuration share the same area the number of packets in the air grows fast. And with the increase of the number of packets on the air, the probability of packet collisions will also increase. Even when our application is far below the maximum capacity of the channel, the probability of packets colliding exist. But, what happens when a packet is lost over the air? Except for the NodeIDBoradcast and the RangingResultBroadcast, all the packets that intervene in a ranging operation should be acknowledge by the receiver. If they are not, they are retransmitted up to three times. If, after a third retransmission, no answer is received from the receiver node, the transmitting device will stop. When a device sends a RangingRequest and it receives an ACK, it starts a timer. If the timer expires and the ranging operation has not been completed, the node aborts it and pass a RRN to the host indicating time-out error. This timer initializes at a fixed value of 7ms for the transmission mode 80/1 and 13ms for the mode 80/4, and cannot be changed by the user. The following figures show different scenarios in which one of the packets involved in the ranging is lost or not transmitted. Figure 4-1 shows the scenario in which the rangingresultbraodcast option has been disabled. After receiving the answer2, node A sends the acknowledgement (ACK), estimates the distance and passes it to the host as a RRN. Page 6 Doc ID NA-15-0356-0021-1.0 2015 All Rights Reserved

Figure 4-1: Ranging cycle without result broadcast Figure 4-2 shows the scenario in which one of the ACK gets lost. Node B does not receive any ACK for its answer1, so it sends it for a second time. When the ACK is finally received, node B continues the normal process. Figure 4-2: Ranging cycle with an ACK lost In the scenario depicted in Figure 4-3 node B is in privacy mode. After sending its blink it receives a RangingRequest from node A and acknowledges it. However, it does not want to perform the ranging so it does not send Answer 1. After a while, the timer at node A will time-out and node A will pass a RRN to the host indicating the error. Figure 4-3: Scenario where one of the nodes is in privacy mode 2015 All Rights Reserved Doc ID: NA-15-0356-0021-1.0 Page 7

5. Recommendations Taking into account the different aspects shown in this document, there are some recommendations that can by followed in order to boost the application s performance: Sending more blinks than necessary triggers unnecessary ranging operations and may cause the channel saturation causing that the actual number of estimated ranges is less than the required. For this reason it is recommended to adjust the blinking rate to the application requirements. It is not always necessary that a device react to the blinks of other devices. Using device classes the swarm bee s can be set so that only ranges to devices from a determined class. For instance the devices can be configured in such a way that, in a collision avoidance application with workers and vehicles, they range between workers and vehicles but not among workers. The data transmission inside the blink and the broadcast messages is very interesting feature for some applications. However, if the information is no longer needed, it is recommended to clear the register, so that no useless data is sent. Until now we have assumed that the devices transmit whenever they have to. When the area is highly populated, sometimes the message will get through and arrive to the destination, other times it will collide with other packets originated by other devices. This means that the devices need to retransmit again, and, thus, waste channel capacity. To have a more efficient use of the channel the listen before talk technique is recommended. This is set using the CSMA command of the API. When the devices perform CSMA, a swarm bee that wants to transmit will first listen to the channel and, if there is another device transmitting, it will wait. After a while it will listen again, then it will detect that the air interface is silent and it will transmit its message. In this way collisions and retransmissions will be avoided. There are two CMSA modes available in swarm devices: symbol detection and energy detection. The symbol detection prevents the swarm device from transmitting when other swarm devices are doing it. When other radio systems working in the same frequency band are present in the area, for instance WiFi, it is more convenient to select CSMA in energy detection mode. This mechanism prevents the nodes from transmitting when the energy detected in the channel is higher than a certain threshold. Thus, it avoid collisions not only with swarm devices but also with any other transmitting device. Page 8 Doc ID NA-15-0356-0021-1.0 2015 All Rights Reserved

6. References [1] AN0501 swarm bee Ranging Operation Time v1.1, Nanotron Technologies [2] swarm API Description v2.1, Nanotron Technologies 2015 All Rights Reserved Doc ID: NA-15-0356-0021-1.0 Page 9

Document History Date Author Version Description 9/8/2015 MLA 1.0 Initial version Page 10 Doc ID NA-15-0356-0021-1.0 2015 All Rights Reserved

Life Support Policy These products are not designed for use in life support appliances, devices, or systems where malfunction of these products can reasonably be expected to result in personal injury. Nanotron Technologies GmbH customers using or selling these products for use in such applications do so at their own risk and agree to fully indemnify nanotron Technologies GmbH for any damages resulting from such improper use or sale. About Nanotron Technologies GmbH Today nanotron s embedded location platform delivers locationawareness for safety and productivity solutions across industrial and consumer markets. The platform consists of chips, modules and software that enable precise real-time positioning and concurrent wireless communication. The ubiquitous proliferation of interoperable location platforms is creating the location-aware Internet of Things. Further Information For more information about products from nanotron Technologies GmbH, contact a sales representative at the following address: nanotron Technologies GmbH Alt-Moabit 60 10555 Berlin, Germany Phone: +49 30 399 954 0 Fax: +49 30 399 954 188 Email: sales@nanotron.com Internet: www.nanotron.com