Sélection de la langue

Search

Sommaire du brevet 2718721 

Énoncé de désistement de responsabilité concernant l'information provenant de tiers

Une partie des informations de ce site Web a été fournie par des sources externes. Le gouvernement du Canada n'assume aucune responsabilité concernant la précision, l'actualité ou la fiabilité des informations fournies par les sources externes. Les utilisateurs qui désirent employer cette information devraient consulter directement la source des informations. Le contenu fourni par les sources externes n'est pas assujetti aux exigences sur les langues officielles, la protection des renseignements personnels et l'accessibilité.

Disponibilité de l'Abrégé et des Revendications

L'apparition de différences dans le texte et l'image des Revendications et de l'Abrégé dépend du moment auquel le document est publié. Les textes des Revendications et de l'Abrégé sont affichés :

  • lorsque la demande peut être examinée par le public;
  • lorsque le brevet est émis (délivrance).
(12) Brevet: (11) CA 2718721
(54) Titre français: SYSTEME D'ACCES MULTIPLE EN PHASE ALEATOIRE AVEC MAILLAGE
(54) Titre anglais: RANDOM PHASE MULTIPLE ACCESS SYSTEM WITH MESHING
Statut: Accordé et délivré
Données bibliographiques
(51) Classification internationale des brevets (CIB):
  • H4B 1/707 (2011.01)
  • H4W 84/12 (2009.01)
(72) Inventeurs :
  • MYERS, THEODORE J. (Etats-Unis d'Amérique)
  • COHEN, LEWIS N. (Etats-Unis d'Amérique)
  • WERNER, DANIEL THOMAS (Etats-Unis d'Amérique)
  • HUGHES, MATTHEW (Etats-Unis d'Amérique)
  • BOESEL, ROBERT W. (Etats-Unis d'Amérique)
(73) Titulaires :
  • INGENU INC.
(71) Demandeurs :
  • INGENU INC. (Etats-Unis d'Amérique)
(74) Agent: BORDEN LADNER GERVAIS LLP
(74) Co-agent:
(45) Délivré: 2012-06-19
(86) Date de dépôt PCT: 2009-03-11
(87) Mise à la disponibilité du public: 2009-09-24
Requête d'examen: 2011-01-13
Licence disponible: S.O.
Cédé au domaine public: S.O.
(25) Langue des documents déposés: Anglais

Traité de coopération en matière de brevets (PCT): Oui
(86) Numéro de la demande PCT: PCT/US2009/036766
(87) Numéro de publication internationale PCT: US2009036766
(85) Entrée nationale: 2010-09-16

(30) Données de priorité de la demande:
Numéro de la demande Pays / territoire Date
12/189,505 (Etats-Unis d'Amérique) 2008-08-11
12/189,533 (Etats-Unis d'Amérique) 2008-08-11
12/189,609 (Etats-Unis d'Amérique) 2008-08-11
12/189,619 (Etats-Unis d'Amérique) 2008-08-11
12/276,971 (Etats-Unis d'Amérique) 2008-11-24
12/345,267 (Etats-Unis d'Amérique) 2008-12-29
12/345,374 (Etats-Unis d'Amérique) 2008-12-29
61/037,522 (Etats-Unis d'Amérique) 2008-03-18

Abrégés

Abrégé français

La présente invention concerne un procédé de communication à travers un réseau à accès multiple en phase aléatoire. Un signal qui a été étalé au moyen dun code de pseudo-bruit et déphasé par un déphasage aléatoire temporel et contenant une information de données utiles est reçu en provenance dun dispositif. Une destination est choisie pour linformation de données utiles en fonction dune caractéristique du réseau à accès multiple. Linformation de données utiles est transmise à la destination choisie.


Abrégé anglais


A method of communicating through a random phase multiple access network is
provided. A signal that has been
spread using a pseudo-noise code and offset by a random timing offset and that
contains payload data is received from a device. A
destination is selected for the payload data based on a characteristic of the
multiple access network. The payload data is
transmit-ted to the selected destination.

Revendications

Note : Les revendications sont présentées dans la langue officielle dans laquelle elles ont été soumises.


CLAIMS:
1. A method for communication through a multiple access communication
network, the method comprising:
receiving a first signal from a first device, wherein the first signal is
spread
using a first predetermined pseudo-noise (PN) code, wherein the first signal
is
configured to be transmitted after a first delay comprising a first random
number of
chips relative to a beginning of a slot, and further wherein the first signal
includes a
first payload data;
receiving a second signal from a second device, wherein the second signal is
spread using the first predetermined PN code, wherein the second signal is
configured to be transmitted after a second delay comprising a second random
number of chips relative to the beginning of the slot, and further wherein the
second
signal includes a second payload data, and further wherein at least a portion
of the
second signal is received while the first signal is being received;
selecting a first destination for the first payload data based on a first
characteristic of the multiple access communication network;
selecting a second destination for the second payload data based on a second
characteristic of the multiple access communication network; and
transmitting the first payload data to the selected first destination.
2. The method of claim 1, further comprising:
determining if the first destination and the second destination are identical;
and
transmitting the second payload data with the first payload data to the
selected first destination if the first destination and the second destination
are
identical.
3. The method of claim 1, wherein the first characteristic of the multiple
access
communication network is a seed value assigned to a device.
4. The method of claim 1, further comprising:
-37-

receiving a first communication signal on a broadcast channel including a
first seed value; and
selecting a second seed value based on the received first communication
signal.
5. The method of claim 4, further comprising communicating a request to
associate to a device based on the first seed value.
6. The method of claim 4, further comprising communicating a request to
associate to a device based on a power measurement of the received first
communication signal.
7. The method of claim 1, further comprising receiving a transmission from an
associated device.
8. The method of claim 7, further comprising determining a timing based on the
received transmission.
9. The method of claim 7, further comprising determining a transmission power
level based on the received transmission.
10. The method of claim 4, further comprising communicating a request to
associate to a second device based on one or more missed messages.
11. The method of claim 4, further comprising transmitting a second
communication signal on the broadcast channel with the selected second seed
value.
12. The method of claim 1, further comprising transmitting a broadcast channel
message permitting a neighboring device to engage in communication as a peer.
13. The method of claim 1, further comprising determining a frame timing or a
frequency drift from the received communication signal.
-38-

14. The method of claim 1, wherein the multiple access communication network
comprises a mesh network.
15. The method of claim 14, wherein the mesh network is based on the IEEE
802.11 set of standards.
16. An apparatus for communicating through a multiple access communication
network, the apparatus comprising:
a receiver configured to receive a first signal from a first device and a
second
signal from a second device, wherein the first signal is spread using a first
predetermined pseudo-noise (PN) code, wherein the first signal is configured
to be
transmitted after a first delay comprising a first random number of chips
relative to a
beginning of a slot, and further wherein the first signal includes a first
payload data,
wherein the second signal is spread using the first predetermined PN code,
wherein
the second signal is configured to be transmitted after a second delay
comprising a
second random number of chips relative to the beginning of the slot, and
further
wherein the second signal includes a second payload data, and further wherein
at
least a portion of the second signal is received while the first signal is
being
received;
a transmitter; and
a controller electrically coupled to the receiver and transmitter and operable
to direct reception of the first signal with the receiver, to select a first
destination for
the first payload data from one or more devices based on a characteristic of
the
multiple access communication network, and to direct transmission of the first
payload data to the first destination with the transmitter.
17. The apparatus of claim 16, wherein the characteristic of the multiple
access
communication network is a seed value assigned to a device.
18. The apparatus of claim 16, further comprising:
the controller operable to direct reception of a first communication signal on
a broadcast channel in a communication network including a first seed value;
to
select a second seed value based on the received first communication signal;
and
-39-

to direct the transmission of a second communication signal on the broadcast
channel in a communication network with the selected second seed value.
-40-

Description

Note : Les descriptions sont présentées dans la langue officielle dans laquelle elles ont été soumises.


CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
RANDOM PHASE MULTIPLE ACCESS SYSTEM WITH MESHING
FIELD
[0001] Embodiments of the present application relate to the field of
communications. More specifically, exemplary embodiments relate to random
phase
multiple access communication interface systems and methods with mesh
networking.
BACKGROUND
[0002] A number of modulation techniques have been developed for facilitating
communications in a network where multiple users are present. Such techniques
include
code division multiple access (CDMA), time division multiple access (TDMA),
and
frequency division multiple access (FDMA). CDMA is a spread-spectrum
technology that
uses pseudo-random number sequences to modulate incoming data, multiple
transmitters
transmitting on the same signal, and orthogonal codes (Walsh codes) to
correlate different
communication channels. TDMA uses time slots to coordinate multiple uplink
transmitters
that are transmitting in the same sub-slots. Users transmit in rapid
succession, one after the
other, each using his/her own time slot, allowing multiple stations to share
the same
transmission medium (e.g., radio frequency channel) while using only a portion
of the total
available bandwidth. FDMA allocates different users with different carrier
frequencies of
the radio spectrum.
[0003] In addition to modulation techniques, protocols exist for determining
how
network devices respond when two devices attempt to use a data channel
simultaneously
(called a collision). CSMA/CD (Carrier Sense Multiple Access / Collision
Detection) is
used by Ethernet networks to physically monitor the traffic on the line at
participating
stations. If no transmission is taking place at the time, the particular
station can transmit. If
two stations attempt to transmit simultaneously, this causes a collision,
which is detected by
all participating stations. After a random time interval, the stations that
collided attempt to
transmit again. If another collision occurs, the time intervals from which the
random
waiting time is selected are increased step by step. This is known as
exponential back off.
-1-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
[0004] There exist multiple topologies for networking devices together for
communication purposes. Some common ones used recently are point to point
communications, star patterns, and rings. A point to point network is the
simplest involving
only communication between two nodes along a single link. A star pattern
expands this by
adding many point to point connections to a gateway nodes. Any node can
communicate to
any other node through the gateway node. The star pattern breaks though when
there is a
problem with the gateway node. A ring pattern links all of the nodes together
with one link
to each neighboring node in a circular pathway. Data travels from a source
node through all
neighboring nodes to a destination node. A ring pattern has the advantage that
no single
point of failure will break communication to all the other nodes. However,
multiple points
of failure will break the link. A mesh pattern allows for reconfiguration
around broken
links as well as dynamic configuration of the network.
[0005] Existing mesh pattern networking systems and methods have a number of
disadvantages that limit the capabilities and functionalities of communication
systems using
them.
SUMMARY
[0006] An exemplary embodiment uses a random phase multiple access
communication interface. The interface can communicatively connect to systems
and
devices using spread spectrum modulation methods without the use of orthogonal
codes.
[0007] An exemplary random phase multiple access communication interface
communicatively connects systems and devices using spread spectrum modulation
methods.
The random selection of chip (or timing) offsets as a multiple access scheme
allows for non-
coordinated data transmission without needing to be assigned a unique "code."
All users
transmit using the same PN (pseudo noise) code such that a PN array despreader
at the
access point can be used. If two signals are received at the access point at
the same PN
offset(or the sum of the PN offset with the transmission delay in number of
chips yields the
same value for 2 or more transmissions), then a "collision" has occurred and
it may not be
possible to demodulate these 2 or more signals. The randomization of timing
offsets each
-2-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
time means that any "collisions" that occur only occur during that frame. A
retransmission
scheme and a new randomized offset is used to get through in the next attempt.
[0008] An exemplary embodiment includes a transmitter at the tag (uplink) and
a
method of transmitting signals from the tag to an access point. Each tag
includes its own
transmitter which transmits information in the form of frames. A frame can be
formed from
information provided on a channel having a fixed data rate. The data can be
spread using
the same pseudo-noise (PN) code with a randomly selected chip offset into the
PN code.
The transmitter also applies frequency rotation and sample clock correction to
match the
reference oscillator of the access point. A plurality of tags is associated
with a single access
point to form the network. Each of the plurality of tags transmits information
using the
same PN code along with a randomly selected chip offset into the PN code. The
phase is
randomly selected each frame over a large number of chips (i.e., 8192).
[0009] Another exemplary embodiment includes a transmitter at an access point
(downlink) and a method for transmitting signals from the access point to the
tags. The
access point transmitter can be similar to that of the tags. However, the
access point
transmitter uses a unique PN code for each of the tags with which it
communicates. The use
of distinct PN codes for each tag provides security and allows each tag to
ignore signals
which are directed toward other tags. The frames transmitted by the access
point also
include a preamble of approximately 9 symbols to allow for rapid acquisition
at the tags.
[0010] Another exemplary embodiment includes a demodulator at the tag and a
method for demodulating signals received by the tag. An automatic frequency
control
(AFC) derotator multiplication is applied to signals received at the tag. The
AFC derotator
multiplication is a 1 bit complex operation with a 1 bit complex output such
that gate count
is improved. The tag uses a PN array despreader that takes advantage of the
huge
computational savings in the 1 bit data path.
[0011] Another exemplary embodiment includes a demodulator at the access
point and a method for demodulating signals received at the access point. The
access point
demodulator has capacity to simultaneously demodulate several thousand or more
links
-3-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
received from tags. To demodulate such a large number of links, the access
point
demodulator includes a PN array despreader.
[0012] Another exemplary embodiment includes synchronization of the tag with a
master timing of the access point. The access point can periodically transmit
a broadcast
frame. During a `cold' timing acquisition, the tag uses its PN despreader to
analyze the
broadcast frames and identify the master timing of the access point. Cold
timing acquisition
is expected to occur one time when the tag is first introduced into the
system. After the
initial cold acquisition, the tag can perform a `warm' timing acquisition each
time the tag
wakes up to transmit or receive a signal. The warm timing acquisition utilizes
less power
than the cold timing acquisition.
[0013] In at least one exemplary embodiment, each tag separately generates a
PN
code. A gold code is an example of a PN code that is parameterizable such that
each user
has its own. As such, only data destined for a particular user is visible to
it. Using unique
PN codes, a tag does not process data that is not its own.
[0014] An exemplary method for communicating through a multiple access
communication interface includes receiving a first signal from a first tag,
where the first
signal is spread using a predetermined pseudo-noise (PN) code, and further
where the first
signal includes first payload data. A second signal is received from a second
tag. The
second signal is spread using the predetermined PN code, and the second signal
includes
second payload data. The first payload data from the first signal is
identified at least in part
with a PN array despreader. The second payload data from the second signal is
also
identified at least in part with the PN array despreader.
[0015] An exemplary system for communicating through a multiple access
communication interface includes a first tag, a second tag, and an access
point. The first tag
has a first transmitter configured to transmit first payload data in a first
signal, wherein the
first signal is spread using a predetermined pseudo-noise (PN) code. The
second tag has a
second transmitter configured to transmit second payload data in a second
signal, wherein
the second signal is spread using the predetermined PN code. The access point
is in
communication with the first tag and the second tag and includes a receiver
and a despread
-4-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
array. The receiver is configured to receive the first signal and the second
signal. The
despread array is configured to despread the first signal and the second
signal.
[00161 An exemplary access point for use in a multiple access communication
system includes a processor, a receiver in communication with the processor,
and a
transmitter in communication with the processor. The receiver is configured to
receive a
first signal from a first tag, wherein the first signal includes first payload
data, and further
wherein the first signal is spread using a predetermined pseudo-noise (PN)
code. The
receiver is also configured to receive a second signal from a second tag,
wherein the second
signal includes second payload data, and further wherein the second signal is
spread using
the predetermined PN code. The transmitter is configured to transmit a third
signal to the
first tag, wherein the third signal is spread with a second PN code, and
further wherein the
second PN code is specific to the first tag.
[00171 An exemplary mesh network embodiment uses micro-repeaters or access
points as routers to direct signals received from external devices. In the
embodiment, a
signal is received from a device where the signal has been spread using a PN
code that has
been offset by a random timing offset. The signal includes payload data. The
destination
for the payload data is selected based on a characteristic of the multiple
access
communication network. In one embodiment the characteristic of the multiple
access
communication network is a seed value that was selected during the
initialization procedure
of the network. Once a destination is selected, the payload data is
transmitted to the
destination.
[00181 Another exemplary embodiment exists in an apparatus designed for
communicating through a multiple access communication network. The apparatus
has three
primary components: a receiver, a transmitter and a controller. In the
embodiment, the
receiver is configured to receive a signal from another device. The received
signal is spread
using a PN code that has been offset by a random timing offset. The signal
includes
payload data. The controller is electrically coupled to the receiver and the
transmitter. The
controller directs reception of the signal and selects a destination for the
payload data based
on a characteristic of the multiple access communication network. In one
embodiment the
-5-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
characteristic of the multiple access communication network is a seed value
that was
selected during the initialization procedure of the network. The transmitter
is used to
transmit the payload data to the selected destination.
[0019] These and other features, aspects and advantages will become apparent
from the following description, appended claims, and the accompanying
exemplary
embodiments shown in the drawings, which are briefly described below.
BRIEF DESCRIPTION OF THE DRAWINGS
[0020] Fig. 1 is a diagram depicting an uplink transmitter according to an
exemplary embodiment.
[0021] Fig. 2 is a diagram depicting a downlink transmitter according to an
exemplary embodiment.
[0022] Fig. 3 is a diagram depicting slot structures and assignments in an
exemplary embodiment.
[0023] Fig. 4 is a diagram depicting a PN (pseudo noise) despread array in an
exemplary embodiment.
[0024] Fig. 5 is a flow diagram depicting operations performed in the tag
processing of a broadcast channel from a cold start in an exemplary
embodiment.
[0025] Fig. 6 is a flow diagram depicting operations performed in the tag
processing of a dedicated channel from a warm start in an exemplary
embodiment.
[0026] Fig. 7 is a diagram depicting a tag receive data path in an exemplary
embodiment.
[0027] Fig. 8 is a diagram depicting time tracking in an exemplary embodiment.
[0028] Fig. 9 is a diagram depicting an AFC (automatic frequency control)
rotation in an exemplary embodiment.
-6-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
[0029] Fig. 10 is a diagram depicting a dedicated communication finger in an
exemplary embodiment.
[0030] Fig. 11 is a flow diagram depicting operations performed during access
point receive processing in an exemplary embodiment.
[0031] Fig. 12 is a diagram depicting an access point receive data path in an
exemplary embodiment.
[0032] Fig. 13 is a diagram depicting asynchronous initial tag transmit
operations
in an exemplary embodiment.
[0033] Fig. 14 is a diagram depicting interactions between an access point and
a
tag in a slotted mode according to an exemplary embodiment.
[0034] Fig. 15 is a diagram depicting data transfer between an access point
and a
tag according to an exemplary embodiment.
[0035] Fig. 16 is a diagram depicting a mesh network formed with RPMA
devices.
[0036] Fig. 17 is a diagram depicting the association of a micro-repeater to a
mesh
network formed with RPMA devices.
[0037] Fig. 18 is a flow diagram and timeline illustrating operations
performed
during an acquisition process in accordance with an exemplary embodiment.
[0038] Fig. 19 is a diagram of locating a tag in an random-phase multiple
access
network according to an exemplary embodiment.
[0039] Fig. 20 is a diagram depicting the timing of communications signals
used
to determine a tag's location according to an exemplary embodiment.
[0040] Fig. 21 is a diagram depicting signal timing in a high capacity system
according to an exemplary embodiment.
-7-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
DETAILED DESCRIPTION
,[00411 Representative embodiments are described below with reference to the
accompanying drawings. It should be understood that the following description
is intended
to describe representative embodiments, and not to limit the invention defined
in the
appended claims.
[0042] Fig. I illustrates an uplink transmitter 10 which includes structures
such as
a convolution encoder, an interleave module, a modulator, a pseudo-noise
spreader, a filter,
a bank of taps, an automatic frequency control (AFC) rotator, and other such
structures.
These structures perform operations depicted in blocks 12, 14, 16, 18, 20, and
22. The
transmit path of uplink transmitter 10 is a coded and spread spectrum
waveform. In an
exemplary embodiment, the uplink transmitter 10 can be included in a tag that
communicates with an access point along with other tags using demodulated
communication channels. Additional, fewer, or different operations may be
performed by
the uplink transmitter 10 depending on the particular embodiment. The
operations may also
be performed in a different order than that shown and described. As used
herein, a tag can
refer to any communications device configured to receive signals from and/or
send signals
to an access point. The access point can refer to any communications device
configured to
simultaneously communicate with a plurality of tags. In an exemplary
embodiment, the
tags can be mobile, low power devices which run off a battery or other stored
power, and
the access point can be located in a central location and receive power from a
power source
such as a wall outlet or generator. Alternatively, the tags may plug into an
outlet and/or the
access point may run off of a battery or other stored power source.
[0043] In block 12, a data stream is received by a convolution encoder and
interleave module. In one embodiment, the data stream is 128 Bits including
the preamble.
Alternatively, data streams of other sizes may be used. Once received, the
data stream is
encoded using the convolution encoder. In an exemplary embodiment, the data
stream may
be encoded at a rate of '/2. Alternatively, other rates may be used. The data
stream can also
be interleaved using the interleave module. An encoded symbols stream is
output to a block
14 in which a differential binary phase shift keying (D-BPSK) modulator is
used to
-8-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
modulate the encoded symbols stream. In alternative embodiments, other
modulation
schemes may be used. At block 16, the modulated stream is applied to a PN
spreader. In an
exemplary embodiment, the PN spreader can use a common network gold code
channel
using a selected spreading factor. The spreading factor can be a member of the
set {64,
128, 256,..., 8192}. Alternatively, any other code and/or spreading factor may
be used.
Each of the tags at a given spreading factor is spread by the same PN code
with a randomly
selected chip offset. The large range of possible randomly selected chip
offsets increases
the probability that a particular frame will not collide (or, in other words,
have the same
chip timing at the access point) with another frame from another transmitter.
The
probability of collision in the limit of approaching capacity may become non-
negligible
(-10 % or less) and can be solved via retransmission of the same frame at a
differently
drawn random offset. The PN spreader is described in more detail below with
reference to
Fig. 4. In an exemplary embodiment, an output of block 18 can have a rate of 1
bit at 1
mega-chip per second (Mcps). Alternatively, other rates may be used.
[00441 At block 18, the data stream is upsampled by a 4 x oversample filter
and
time tracking logic is used to ensure that all of the frames land at the same
sample rate
consistent with the frequency reference of the AP. Block 18 receives a sample
slip/repeat
indicator as an input. In one embodiment, an output of block 18 may have a
real frequency
of approximately 4 megahertz (MHz). At block 20, an automatic frequency
control (AFC)
rotation is done including a frequency offset to match the access point's
timing offset,
ensuring that all of the frames from all of the users lands near the same
frequency
hypothesis. In one embodiment, an output of block 20 may have a complex
frequency of
approximately 4 MHz. At block 22, a delay is imposed from the start slot until
the correct
access slot occurs. In addition, a random chip delay is imposed on the signal.
In an
exemplary embodiment, the random chip delay can be from 0 to the spreading
factor
minus 1. Alternatively, a different random chip delay may be used. The slot
access can be
described by A(i,j) where i is related to the spreading factor as 2'(13 -i)
and j is the sub-slot
number corresponding to non-overlapping slots. Depending upon the selected
spreading
factor, there are generally multiple transmit opportunities in a given slot.
For the uplink, the
access slot can be randomly selected along with a chip offset from 0 to
spreading factor
minus 1. As such, the probability of collision between uplink users is
minimized, while
-9-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
allowing for re-selection for cases where there are collisions. After the
signal has been
delayed, the signal can be transmitted to an access point.
100451 Fig. 2 illustrates a downlink transmitter 30 including structures such
as a
convolution encoder, an interleave module, a modulator, a pseudo-noise
spreader, a filter, a
bank of taps, and other such structures. Using transmitter 30, the access
point (AP)
transmits multiple channels each destined for a particular tag or user. These
structures
perform operations depicted in blocks 32 through 54. Blocks 32 to 40 and
blocks 42 to 50
represent distinct data paths that can be replicated for additional data
flows. In an
exemplary embodiment, blocks 32-38 can perform operations similar to the
operations
described with reference to Fig. 1 on a first data stream. Similarly, blocks
42-48 can
perform operations similar to the operations described with reference to Fig.
1 on an nth
data stream, where n can be any value. The input to block 36 can be a gold
code specific to
the tag which is to receive the first data stream, and the input to block 46
can be a gold code
specific to the tag which is receive the nth data stream. Alternatively, other
codes such as a
broadcast gold code, a non-gold code, or other may be used to spread the first
data stream
and/or the nth data stream. The output of block 38 and/or block 48 can be
weighted in
blocks 40 and 50 in case the data links corresponding to the first data stream
and the nth
data stream are of unequal power. Once weighted, the paths are summed in a
block 52. A
hard decision is also made in block 52 where all positive numbers are mapped
to 0 and all
negative numbers are mapped to 1. Alternatively, a different hard decision may
be made.
In one embodiment, an output of block 52 may have a rate of I bit at 10 Mcps.
Alternatively, other rates may be used. The sum output from block 52 is
upsampled using a
4 x chip filter in block 54. In one embodiment, an output of block 54 can have
a real
frequency of 40 MHz. Alternatively, other frequencies may be used. Not shown
is a
transmission on an adjacent frequency that is a single set of broadcast frames
at a maximum
downlink spreading factor of 2048. Alternatively, a different maximum downlink
spreading
factor may be used.
[00461 Fig. 3 illustrates slot structures and assignments. In at least one
embodiment, data stream 70 includes slot 72, slot 74, and slot 76. Slot 72 is
an AP-to-tags
communication, slot 74 is a tags-to-AP communication, and slot 76 is an AP-to-
tags
-10-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
communication. In an exemplary embodiment, each of the slots can have a
duration of 2.1
seconds. Alternatively, any other duration may be used and/or different slots
may have
different durations. The data stream 70 can be implemented in a half-duplex
communication scheme such that at any given time, either the AP is
transmitting and the
tags are receiving, or the tags are transmitting and the AP is receiving. In
alternative
embodiments, other communication schemes may be used. As shown in Fig. 3, data
channel 80 depicts processing gain options for data in slot 72. If a data link
closes at a
particular gain, the tag only needs to be ready to receive (in AP to tags
mode) during the
duration of the slot with the corresponding gain. In transmit mode, the slot
selection
governs the transmission from the tag to the access point such that the tag
can minimize its
on time in the power consuming transmit mode. For example, a gain of 18 dB
only needs a
1.6 ms slot (A7,o). Data channel 82 depicts processing gain options for data
in slot 74. As
can be seen, the power used by a tag can be selected such that each data link
arrives at the
AP at the same power.
[00471 There is a symmetry between processing a large number of simultaneous
waveforms on the AP side, and the processing of the relative few waveforms on
the tag
side. Automatic frequency control (AFC), time-tracking drift, and frame timing
are known
on the AP side due to the fact that the AP is the master of these parameters.
However, AFC,
time-tracking drift, and frame timing may be determined at acquisition on the
tag side. The
PN array despreader performs the brute force operation associated with both,
which is an
efficient implementation for exploring acquisition hypothesis/demodulating.
Another
aspect of this is that this large power-consuming circuit (when active),
though running
continuously on the AP (which shouldn't matter because it can be plugged into
the wall), is
only running during a "cold" acquisition on the tag which should happen
rarely. Cold
acquisition and warm acquisition are described in more detail with reference
to Figs. 5 and
6, respectively.
[00481 Fig. 4 illustrates a PN (pseudo noise) despread array, which
facilitates both
the acquisition of a single waveform on the tag, and brute-force demodulation
of multiple
waveforms on the AP. In an exemplary embodiment, the PN despread array can
perform a
1 bit dot product of many chip-spaced timing hypotheses simultaneously.
-11-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
[00491 A PN despread core element can be a simple counter that is incremented
or
not incremented each clock depending on whether the input is a 0 or a 1. Since
it is a
complex data path, there are two counters: one for I (in-phase) and one for Q
(quadrature-
phase). Multiplication by a complex exponential is generally a set of 4 rather
large scalar
multipliers (4 x 1000 gates is typical) coupled to a complex exponential
table. In contrast, a
one bit complex multiplier is basically a simple truth table, such as the
example table shown
below, where the negative denotes the inverse (0-1 and 1- 0). This truth table
can be
implemented using just a few gates.
Phase 0 1 2 3
I' I -Q -I Q
Q' Q I -Q -I
[00501 Fig. 4 depicts a PN despread array 100. There can be many
instantiations
(e.g., 256 or more in one embodiment) of pairs of counters for the complex
despread
operation. The PN despread array 100 can be fed at chip rate with adjacent
instantiations of
PN despread elements 102, 104, and 106 working on timing hypotheses that are a
chip
apart. The 1 bit complex data is sent from a block 114 to elements 102, 104,
and 106 where
it is combined with a PN signal from PN generator 110. PN signal generator 110
can be
hardware that outputs the same sequence of Os and 1 s with which the AP is
spreading the
data. In the case of element 102, the derotated data is combined (more
specifically, I bit
complex multiplied) with the PN signal at a combiner 122a. Real and imaginary
parts of
this combination are separately input into counters 11 8a and 120a. The
counters 118a and
120a shift the bit stream out upon receipt of a reset signal 112. More
specifically, the data
in the counters is valid just prior to the reset signal. The reset signal
forces zeros into both
counters. The multiplexer 108 allows for output of the currently valid
counters for that
finger that has uniquely finished its despreading operation at that particular
clock. Other
elements in the PN despread array 100 operate similarly. Element 104 receives
derotated
data from block 114 and combines it with a PN signal after a delay is imposed
by delay
block 11 6a in element 102. The combination is entered into counters 118b and
120b, which
gets shifted out of the counters upon a signal from the reset signal 112 with
an imposed
delay from a delay block 124a. Likewise, element 106 receives derotated data
from
-12-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
block 114 and combines it with a PN signal after a delay is imposed by delay
block 11 6b in
element 104. The combination is entered into counters 118c and 120c, which
gets shifted
out of the counters upon a signal from the reset signal 112 with an imposed
delay from a
delay block 124b.
[00511 After a number of clocks corresponding to the spreading factor, the PN
despread element 102 has valid data which is selected for output by a
multiplexer 108.
Every clock thereafter, the adjacent despread element 104 or 106 is available
until all data
has been output which can occur during the number of clocks corresponding to
the
spreading factor plus a number of PN despread instantiations. The PN code that
governs the
operation of this mechanism can be a gold code parameterized by a value. In
alternative
embodiments, other PN codes may be used.
[00521 Fig. 5 illustrates operations performed in the tag modem processing of
a
broadcast channel to demodulate the access point's transmit waveform.
Additional, fewer,
or different operations maybe performed depending on the particular
embodiment. The
operations may also be performed in a different sequence than that shown and
described.
[00531 Upon the initial power-up of the tag, no parameters are known regarding
the waveform except for the broadcast channel PN sequence (e.g., the
particular gold code
or other code parameter). Additionally, the tag may not know with sufficient
precision what
the relative frequency offset is between the AP and the tag due to oscillator
variance
between the AP and the tag. Fig. 5 depicts a scanning mode where the range of
uncertainty
of parts-per-million (ppm) drift between the AP and the tag are explored. In
an
operation 150, an iteration is made over two slots to enable the tag to tune
to a broadcast
channel. For example, processing can begin asynchronous to slot timing. During
exploration of one half of the hypotheses, the broadcast channel can be
active, and during
exploration of the other half of the hypothesis the broadcast channel can be
inactive. In a
first iteration, all hypotheses can be explored using a first slot timing with
an asynchronous
starting point. If no energy is found in the first iteration, a second
iteration is performed. In
the second iteration, the asynchronous starting point can have a one slot
offset from the
asynchronous starting point used in the first iteration. As such, hypotheses
that were
-13-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
explored while the broadcast channel was active can be explored while the
broadcast
channel is active. Once the energy is found, the tag can tune to the broadcast
channel. In an
exemplary embodiment, operation 150 can represent a starting point for `cold
acquisition.'
In an operation 152, a coarse automatic frequency control (AFC) is
initialized. In one
embodiment, this initial value is set to a most negative value such as -10 ppm
offset. Using
a known gold code generated PN sequence for the broadcast channel, in an
operation 154,
non-coherent metrics for all Cx4 spaced hypotheses for a given coarse AFC
hypothesis are
calculated. For example, if the spreading factor has a length of 2048, the non-
coherent
metric for 8192 hypotheses can be calculated.
[00541 In operations 156 and 158, the coarse AFC hypothesis is incremented
until
the end of the ppm range. For each coarse AFC hypothesis, the hardware
depicted in Fig. 7
is used to undo the frequency offset represented by the current hypothesis.
The PN
despread array is used to generate the despread output of 8 successive
symbols.
Alternatively, other numbers of symbols may be used. A non-coherent sum of
these 8
symbols is then calculated. A set of N (8 in the one embodiment) top metrics
along with
their associated parameters are maintained in a data structure. As the
flowchart of Fig. 5
indicates, the entire range of oscillator ppm uncertainty along all the timing
hypotheses at
chip x 4 resolution are explored with the expectation that the winning (i.e.,
valid) one will
be represented in the data structure. Along with the most valid hypothesis
there generally
tends to be lesser multi-path reflections, adjacent AFC coarse frequency
hypotheses where
appreciable energy accumulation is still present, as well as entirely invalid
hypotheses that
have generated anomalously large metrics due to noise variance.
[00551 The non-coherent metrics for all chip x 4 timing hypotheses for each
coarse AFC can be communicated to a data structure. In an operation 160, the
data
structure keeps track of the greatest non-coherent metrics (e.g., coarse AFC
value, chip x 4
timing hypothesis, non-coherent metric value). The "finalists" are assigned to
the N
dedicated fingers in an operation 162. Each finger may be uniquely
parameterized by a chip
x 4 timing value and a coarse AFC hypothesis which is independent of the
current coarse
AFC hypothesis governing the PN despread array. Since frame timing is
initially unknown,
each despread symbol that is output by the dedicated finger is hypothesized to
be the last in
-14-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
the frame. Thus, the buffered 256 symbols undergo differential demodulation
and an
additional set of iterations based on multiplying by a constant complex value
to perform
fine AFC correction, as shown in operations 164 and 166. An output of
operation 164 can
be a complex cross product from each dedicated finger. In operation 166, a
symbol-by-
symbol multiplication by a constant complex rotation (as determined by the
fine AFC
hypothesis) can be iteratively applied to a postulated frame of information to
determine
which (if any) of the selection of complex rotation constant values uncovers a
frame which
passes a cyclic redundancy check (CRC). This can be a brute-force operation
where a
cyclic redundancy check (CRC) may be performed for each hypothesis. For any
valid CRC,
a payload from the signal can be sent to MAC, and network parameters can be
considered to
be known.
[0056] In an operation 168, other slot timing hypothesis are tried. In an
exemplary embodiment, the coarse AFC hypotheses associated with the most
successful
CRCs can be nominal starting coarse AFC hypotheses. Once the entire range of
coarse
AFC hypothesis are explored, the tag notes a variable called Nominal-Coarse-
AFC which
is the relevant state information used in future transactions which greatly
narrows the range
of coarse AFC hypothesis searches because the part-to-part variation of
oscillator ppm
deviation is much larger than the oscillator drift over the coarse of a minute
or so.
[0057] Fig. 6 illustrates operations performed in the tag processing of a
dedicated
channel from a warm start which is to say where relevant state information is
known. For
example, frame timing can be known and a much tighter range of coarse AFC
hypothesis
may be explored. The modem begins its processing sufficiently early so that
valid finger
assignments are made prior to the end of the 9 symbol preamble. Alternatively,
any other
number of symbols may be used.
[0058] In an operation 200, there is no need to iterate over a two slot timing
hypothesis because the frame timing is known. Instead of using a broadcast
channel, a
dedicated channel is used. In an operation 202, a coarse AFC hypothesis is
scanned. In an
exemplary embodiment, the coarse AFC can be scanned over a small range to
account for
small frequency drift since the last time accessed. Using a known gold code
generated PN
-15-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
sequence unique to the tag, in an operation 204, a non-coherent metric for all
chip x 4
spaced hypotheses is calculated. In operations 206 and 208, the coarse AFC
hypothesis is
incremented until the end of the small ppm range. In an operation 210, a data
structure
keeps track of the greatest non-coherent metrics (e.g., coarse AFC value, chip
x 4 timing
hypothesis, non-coherent metric value, etc.) In an operation 212, dedicated
fingers are
assigned based on the data structure. In an operation 214, symbol cross
products are created
using current DBPSK and previous DBPSK. An output of operation 214 can be a
complex
cross product from each dedicated finger. In an operation 216, frames are
interleaved and
decoded. For any valid CRC, the payload can be sent to a medium access control
(MAC)
layer. In an operation 218, other slot timing hypothesis are tried. In an
exemplary
embodiment, coarse AFC hypotheses associated with the most successful CRCs can
be
nominal starting coarse AFC hypotheses.
[00591 Fig. 7 illustrates a tag receive data path depicting the tag's
demodulation
processing in accordance with an exemplary embodiment. As shown, the one-bit
complex
samples are buffered in a sample buffer 220 such that enough data is present
to make
reliable detection of valid energy. Exemplary values are provided in the
sample buffer
block 220. For example, one embodiment buffers 9 symbols. In alternative
embodiments,
other values may be used. The samples may be input from the I channel and Q
channel into
this ping-pong buffer scheme at the synchronous sample rate of chip x 2 or 2
MHz.
Alternatively, other rates may be used. At the fast asynchronous clock, these
samples are
used to explore the various coarse AFC hypothesis. Based on the current coarse
AFC
hypothesis, time-tracking is performed at chip x 4 resolution. Since the same
timing
reference is used to drive both the carrier frequency and the sample clocks on
both the AP
and the tag, a coarse AFC hypothesis with a known carrier frequency can
uniquely map to a
known rate of time tracking.
[00601 The sample buffer 220 receives communication signals over the I channel
and the Q channel. These signals are sent to time tracking logic 222 and
dedicated fingers
234. The time tracking logic 222 also receives a coarse AFC hypothesis and the
logic 222
may reset to zero at chip x 4 parity. The time tracking logic 222 can have two
blocks, one
with counters initialized to zero for even chip x 4 parity, and one with
counters initialized to
-16-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
midrange (i.e., 2^25) for odd chip x 4 parity. The output of time tracking
logic 222 is
provided to a block 224 in which virtual chip x 4 phases are applied. Block
224 also can
receive parity from an acquisition state machine. Automatic frequency control
(AFC)
rotation logic 226 is applied to an output of block 224.
[0061] Fig. 8 illustrates an exemplary embodiment of the two blocks of time
tracking logic 222 described with reference to Fig. 7. Stream 250 is a
communication
stream with an even chip x 4 parity. Stream 252 is a communication stream with
an odd
chip x 4 parity. Fig. 8 depicts the time-tracking operation where each
different shading
represents a different chip x 4 spaced sequence. Samples are either inserted
or repeated at a
rate directly depending on which current AFC hypothesis is being explored,
multiplied by a
known ratio between the sample rate and the carrier frequency. This can be
used as a
locked clock assumption to collapse a 2-dimensional space down to a single
dimension.
The value N depicted has a fractional component which is book-kept to allow
for sufficient
time-tracking precision. A particular parity of the 4 possible chip x 4 phases
is selected at a
given time. The resultant chip rate sequence is then derotated in a 1-bit data
path as shown
in Fig. 9.
[0062] Fig. 9 depicts the functionality of the AFC (automatic frequency
control)
rotation logic 226 of Fig. 7 which operates on one of the 4 virtual chip x 4
phases 224 at a
given time. Fig. 9 depicts a one-bit derotation mechanism. This derotation
mechanism is
designed to undo the AFC rotation due to the relative carrier drift between
the receiver and
transmitter for the postulated coarse AFC hypothesis. Since it's a one-bit
transform
(represented by the truth table illustrated above), the 90 degree resolution
of the process is
+/- 45 degrees relative to the continuum of values of the phase due to the AFC
drift from the
relative oscillator offset.
[0063] The AFC rotation logic 226 can also receive coarse AFC hypotheses as an
input. The PN despreading array 228 (Fig. 7) performs its despread operation
for chip
spaced hypothesis. The PN despreading array 228 may receive current coarse AFC
hypotheses, timing parity, timing phase, spreading factor, and/or gold code
selection as
inputs. As the values are output for a given symbol, the sum is non-coherently
accumulated
-17-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
for better metric reliability with the running sum stored in the non-coherent
accumulation
buffer 230. The size of the buffer is based on the number of despread
elements. In an
exemplary embodiment, the PN dispreading array 228 may have 256 despread
elements
such that a pass through the sample buffer completes the non-coherent metric
for 256
hypotheses. Alternatively, other numbers of despread elements may be used, and
the metric
may be completed for other numbers of hypotheses. A signal-to-noise ratio
(SNR) metric
may be used in transmission power control of the tag and for power control
feedback to the
AP. The hypotheses with the largest metrics are stored in a top N path data
structure 232
which is used to control the assignment of the dedicated fingers 234. The top
N paths can
be N records including timing hypotheses, timing parity, coarse AFC
hypotheses, etc.
[00641 Fig. 10 illustrates a dedicated communication finger. Each dedicated
finger has access to each of the 4 phases of chip x 4 samples with a chip x 4
selector 260 set
as part of the parameters of the finger assignment. Each finger has its own
dedicated PN
generator 262 and AFC generator 264 which is used to despread. The dedicated
finger
accumulates into the symbol accumulator 266 based on the coarse AFC
hypothesis, its chip
x 4 timing phase, the dependent variable of time-tracking rate, and then
outputs a complex
variable every spreading factor number of clocks. The dedicated fingers 234
illustrated
with reference to Fig. 7 can also receive inputs from the sample buffer 220,
and a PN code
selection.
[00651 Referring again to Fig. 7, the output from the dedicated fingers 234
goes
through a bit-width squeezer 236 that reduces the bit-widths for efficient
storage in the
frame buffer 238 without sacrificing performance. The ouput from the bit-width
squeezer 236 is provided to the frame buffer 238, which may be a circular
buffer
mechanism which allows for the general case of processing a 256 symbol frame
as if the
current symbol is the last symbol of the frame. When frame timing is known,
this memory
structure can support the specific processing of a frame with the known last
symbol.
[00661 Frame buffer 238 outputs the hypothesized frames to the rest of the
receive
chain. A cross product multiplication block 240 performs the multiplication of
the current
symbol with the complex conjugate of the previous symbol which is the
conventional metric
-18-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
for D-BPSK demodulation. A residual frequency drift may cause the D-BPSK
constellation
to be rotated by a fixed phase. The role of the fine AFC multiply block 242 is
to take a
brute-force approach and try different possible phase rotations such that at
least one fine
AFC hypothesis yields a valid CRC as it passes through a de-interleaver and
viterbi decoder
244. The fine AFC multiply block 242 can also receive fine AFC hypotheses as
inputs.
The output from the de-interleaver and Viterbi decoder 244 is provided to a
CRC checker
246. If the CRC is valid, the payload is sent up to the MAC layer.
[0067] Fig. 11 depicts exemplary operations performed during access point
receive processing. Additional, fewer, or different operations may be
performed depending
on the embodiment. Further, the operations can be performed in a different
order than that
which is described here. The AP performs a brute-force operation checking all
possible
chip x 2 timing hypothesis, spreading factors, and access slots within
spreading factors.
This allows for uncoordinated access by the tag. Fortunately, since the AP is
the master of
frame-timing and AFC carrier reference (all tags can compensate both their
carrier drift and
sample clock to meet the AP's timing), the processing burden on the AP is
drastically
reduced since the AP need not explore the dimensionality of coarse AFC
hypothesis or
unknown frame timing.
[0068] The flowchart of Fig. 11 shows an example of the ordering of iterating
upon all possible chip x 2 timing offset, spreading factors from the set
[8192,4096,...,64],
and access slot numbers for spreading factors less than the maximum. The AP
then
performs the similar fine AFC search that the tag performs to allow for a
small amount of
frequency drift between the timing sources of the tag and the AP to occur
since the last
transaction. All valid CRCs are passed up to the MAC layer. The flowchart of
Fig. 11
illustrates the searching of a multi-dimensional space. In an outermost loop,
all possible
spreading factors are searched. In an exemplary embodiment, there may be 8
spreading
factors [64, 128, 256, 512, 1024, 2048, 4096, 8192]. Alternatively, other
spreading factors
and/or numbers of spreading factors may be used. In a second loop, all
possible sub-slots
for a given spreading factor are searched. For example, there may be 128
possible sub-slots
for a 64 chip spreading factor and a single degenerate sub-slot for a 8192
chip spreading
factor. In a third loop, all possible chip x 2 timing phases within a given
sub-slot are
-19-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
searched. As described in more detail below, the various loops are illustrated
by the arrows
in Fig. 11.
100691 In an operation 270, one coarse AFC value is used. In an exemplary
embodiment, the one coarse AFC value can be 0 since compensation is performed
by the
tags. In an operation 272, a largest spreading factor (e.g., 8192) is used as
a starting point.
In alternative embodiments, the largest spreading factor may be larger or
smaller than 8192.
In an operation 274, access slots are processed within a spreading factor.
This process may
be degenerate in the case in which there are 8192 spreading factors. In an
operation 276,
despreading is performed for all chip x 2 spaced hypotheses at the current
spreading factor.
For example, 16,384 despread operations maybe performed if the spreading
factor has a
length of 8192. Despread is performed for all elements unless the spreading
factor is less
than the frame buffer number (e.g., 256). In an operation 278, the spreading
factor is
reduced in half and processing continues. In an operation 280, a determination
is made
regarding whether the spread factor has been reduced to 64. In alternative
embodiments,
other predetermined values may be used. If the spread factor has not been
reduced to 64 (or
other predetermined value), processing continues at operation 276. If the
spread factor has
been reduced to 64, the system waits for a next sample buffer to fill in
operation 282. Once
the next sample buffer is filled in operation 282, control returns to
operation 272. In an
operation 284, a frame buffer of despread elements is obtained. In an
exemplary
embodiment, the frame buffer may be complete after 256 symbols are output from
a single
pass by the PN despread array. In one embodiment, for a 256 stage PN despread
array, a
pass through may produce 256 timing hypotheses each having 256 symbols. In
alternative
embodiments, the PN despread array may have more or fewer stages. A cross
product of
the current despread DBPSK symbol with the previous symbol is calculated in an
operation
286. In one embodiment, the cross product may involve 256 symbols for up to
256 frames.
Alternatively, other numbers of symbols and/or frames may be used. In an
operation 288,
the current frame is decoded and phase multipled based on the AFC hypothesis.
In an
operation 290, CRCs are checked and for any valid CRC, the payload is sent out
of the
physical layer (PHY) and up to the medium access control (MAC). As an example,
the
CRCs may be checked for 256 times the number of fine AFC hypothesis for each
pass of a
-20-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
256 despread array. Upon completion of the process for a given slot, the
process is
performed for a subsequent slot as illustrated by the arrow from block 282 to
block 272.
[00701 Fig.. 12 depicts an access point (AP) receive data path. Unlike the
tag, an
entire frame at the largest spreading factor may be stored in a ping-pong
buffer scheme in a
sample buffer 300. This buffer scheme can be a substantial amount of memory
(e.g., 16.8
Mbits) and in at least one embodiment, it may be stored in a dedicated off-
chip memory
device. The sample buffer block 300 includes exemplary values. In alternative
embodiments, other values may be used. Unlike the tag, the time tracking logic
and the
AFC rotation logic may not be used since the AP is the master time reference.
The sample
buffer 300 passes frames to a PN despreading array 302, which can perform
brute force
testing as described previously herein. The PN despreading array 302 may
include 256
despread elements. Alternatively, any other number of despread elements may be
used.
The PN despreading array 302 may also receive current timing parity (which may
be chip x
2 resolution only), hypothesis phase, and/or spreading factor as inputs. An
output from the
PN despreading array 302 is provided to a bit width squeezer 304. The bit
width squeezer
304 reduces the size of the frames, which are then sent to a frame buffer 306.
The frame
buffer block 306 includes exemplary values. In alternative embodiments, other
values may
be used. Depending on the embodiment, the frame buffer 306 may also be stored
in a
dedicated off-chip memory device. The rest of the system is similar to the
tag's receive
processing where fine AFC hypothesis are iterated upon (operations 310 and
312) with all
payloads with valid CRCs being passed up to the AP's MAC (operations 314 and
316). A
non-coherent accumulation 308 is used to determine an SNR metric such as
signal strength
for use in transmission power-control feedback to the tag.
100711 Fig. 13 illustrates asynchronous initial tag transmit operations,
including
two types of interactions which result in data transfers from the tag to the
AP. For purposes
of illustration and discussion, slots 320 represent tag slots and slots 322
represent access
point slots. "Cold Start" is where the tag is coming into the system without
any relevant
state information and "warm start" is where the tag is aware of the system
information such
as slot timing and a reduced range of coarse AFC hypothesis to explore.
-21-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
[00721 In the "Cold Start" scenario, the tag begins seeking access at a slot-
asynchronous point in time. Fig. 13 depicts a time where the tag begins
attempting to
acquire the broadcast channel when the AP isn't even transmitting it (slot 1).
Eventually,
the tag's processing explores the valid coarse AFC hypothesis during a period
of time that
the AP is transmitting the broadcast frame. Fig. 13 depicts this occurring
during slot 2. At
this point, the non-coherent energy metric causes a dedicated finger to
explore the correct
chip x 4 timing and coarse AFC hypothesis. The finger with the correct
hypothesis
continually treats each new symbol as the last symbol of the frame and pushes
these
hypothesized frames through the receive chain where the CRC check indicates
failure. At
the end of slot 4, the valid frame timing is achieved as the CRC check
indicates success. At
this point, the tag has the same relevant state information that a tag
entering at a "warm-
start" would have and continues to complete the same processing that a "warm-
start" tag
would undergo.
[00731 A tag enters the interaction depicted in slot 6 ("Warm Start") either
by a
transition through a "Cold Start" procedure or directly upon tag wake-up if
relevant state
information is appropriately maintained. At this point, the tag makes a
measurement of the
received strength of the broadcast frame and uses this information to
determine the transmit
power and spreading factor that the tag subsequently transmits at in slot 7.
The tag
transmits it's message based on: 1) using the measured received broadcast
channel signal
strength and selecting the minimum spreading factor that can be used to close
the link,
which minimizes the tag's on time and is best for minimizing power
consumption; 2) using
the measured received broadcast channel signal strength and the formerly
selected spreading
factor, the tag transmits at the optimality condition of reception at the AP
which is that all
user's are received by the AP at very similar values of energy per bit to
spectral noise
density ratio (Eb/No); 3) for all but the maximum spreading factor, randomly
selecting the
slot access parameter j; and 4) randomly selecting the chip offset value from
0 to spreading
factor -1 such that "collisions" at the AP are minimized and random selection
at each
transmission allows "collisions" to be resolved in subsequent transmission
opportunities.
[00741 During slots 8 and 9, the AP processes all the signals received during
slot 7 and sends a positive acknowledgement back during slot 10. The AP either
aggregates
-22-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
several ACKs into a single channel characterized by a gold code, or sends a
dedicated
message to the tag using its dedicated gold code channel. Note that the former
method
requires some registration procedure (not shown) to assign the channel. In
either case, the
tag updates its chip x 4 timing using the preamble of the message.
[00751 Fig. 14 illustrates a simple interaction between an access point and a
tag in
a slotted mode. In an exemplary embodiment, the simple interaction involves no
data for
the tag and a relatively static channel. For purposes of illustration and
discussion, timeline
330 represents tag processing during the slots and timeline 332 represents
access point
processing during slots. The nature of the system is that the tag spends a
maximum possible
time in a low-power state - a state where system timing is maintained via a
low-power, low-
frequency crystal oscillator which is typically 32 kHz. To support this, a
maximum
tolerable latency upon AP initiated interaction is identified (i.e., this is
the rate cycling in
and out of the low power state for the tag to check if any AP action is
pending). Fig. 14
shows the relatively simple interaction of a tag coming out of it's low power
state to check
if the AP is wanting to initiate a transaction. This occurs at a slot phase
and rate agreed
upon between the AP and the tag during registration.
[00761 The tag would typically enter a "warm start" where the frame timing and
coarse AFC hypothesis are known to within a tight range. The tag makes a
measurement of
the received broadcast channel power. Fig. 14 shows the scenario where that
power has not
changed considerably since the last interaction with the AP. This means that
the last
transmit power/spreading factor that the AP transmitted at is sufficient to
close the link. In
slot 3, the tag attempts to acquire on the preamble and then demodulate the
frame using its
dedicated gold code. A typical scenario is the AP not having sent information
and the tag
immediately goes back to sleep.
[00771 Fig. 15 depicts a more complicated interaction which involves data
transfer and dynamically changing propagation between an access point and a
tag according
to an exemplary embodiment. For purposes of illustration and discussion,
timeline 340
represents tag processing during the slots and timeline 342 represents access
point (AP)
processing during the slots. Here, the AP has information to send and the
propagation of
-23-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
the channel has changed considerably since the last AP transaction. The
current broadcast
channel power measurement has changed such that the tag knows that the
subsequent
transmission would not be appropriate if it transmits at the same transmit
power/spreading
factor as last time. Thus, the tag will send a re-registration message using
the protocol
explained in Fig. 13 to alert the AP to use a new transmit power/spreading
factor
appropriate to the current channel conditions. The new information governs the
transmission and reception of the frame occurring in slot N+5. The tag
generates an
acknowledgement (ACK) message governed by the protocol of Fig. 13 to indicate
a
successful transmission. If the ACK is successfully received, the transaction
is considered
complete. Otherwise, the tag attempts a retransmission.
[00781 Fig. 16 illustrates how tags may be connected together into a multiple
access communication network that can be a mesh network. Tag 350 has a
communication
link to micro-repeater 351 which itself connects to other micro-repeaters 352
and 353 before
connecting to access point 354. The communication links between these elements
are bi-
direction, half-duplex links that use the same communication protocol as
outlined above.
Communication may originate at tag 350, be transmitted to micro-repeater 351,
be further
transmitted sequentially through micro-repeaters 352 and 353 before arriving
at access
point 354. Communication may also originate at access point 354, be
transmitted to micro-
repeater 353, be further transmitted though micro-repeaters 352 and 351 before
arriving at
tag 350. This is only one illustration of how packets could be transmitted
using the
networking system. Many other topologies are possible with this networking
system. The
precise protocol implemented to set up an embodiment could be based on any
meshing
protocol such as IEEE 802.11, IEEE 802.16, other industry standard protocols
or a new
meshing protocol designed for another application.
[00791 An exemplary device in the network may receive a signal that is spread
using a predetermined pseudo-noise code (PN code) that may be the same PN code
used by
other devices in the network, but wherein the signal has a random timing
offset. The signal
can include payload data that has been spread destined for another device. A
controller on
the device, coupled to the receiver and a transmitter, may then select an
appropriate
destination for the payload data based on a characteristic of the network.
That characteristic
-24-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
may be a seed value determined as described below. Once selected, the device
may
transmit the payload data to the selected destination.
[0080] The device may also receive more than one signal before transmitting it
on.
A second signal may be received from the same or another device. That signal
may also be
spread using a predetermined pseudo-noise code, wherein the signal has a
random timing
offset. The signal can include additional payload data that has been spread
destined for
another device. The device may select an appropriate destination for the
payload data based
on another characteristic of the network. When the two destinations are
identical, the
device may transmit the two payloads together to the destination.
[0081] The network can be formed dynamically through the following
representative embodiment. Each device in the network has a seed value. For
example, the
access point may have a seed value of 0. Each subsequent device has a seed
value that
equals the number of connections it is away from the access point. For
example, in Figure
16, micro-repeater 353 is one connection away from the access point 354 and so
has a seed
value equal to 1; micro-repeater 351 is three connections away from the access
point 354 so
has a seed value equal to 3.
[0082] Each micro-repeater and the access point can transmit on a broadcast
channel. Initially, only the access point is transmitting on the broadcast
channel. As each
micro-repeater associates with the network, the micro-repeater can then
transmit a broadcast
channel to other devices. For example, in Figure 16, access point 354 and
micro-repeaters
353, 352, and 352 can all transmit on the broadcast channel because they are
associated with
the network. The seed value of each device is transmitted in messages on the
broadcast
channel. A device may then receive a communication signal on a broadcast
channel which
includes a seed value. Hence, an unassociated micro-repeater can select its
own seed value
to the seed value based on the received seed value.
[0083] Fig. 17 illustrates how a particular micro-repeater could associate
with the
network. Micro-repeater 360 begins the association process by listening to the
broadcast
channel. Micro-repeaters 361, 362, 363, 364, and 365 are also in the area. The
access point
366 is also nearby. The strongest link that micro-repeater 360 can receive is
link 367.
-25-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
Other links shown can also be received by micro-repeater 360. Micro-repeater
360 tends to
acquire initially on the strongest signal received, which is link 367. Through
a process like
the one above, micro-repeater 360 obtains frame timing and relative reference
crystal
deviation from the network timing. Micro-repeater 360 switches to receive mode
to acquire
all of the other links that it can. Micro-repeater 360 may select the micro-
repeater with the
lowest seed over a certain threshold. Micro-repeater 360 may use other
factors, such as a
power measurement of the received links, to determine which micro-repeater to
select.
[00841 Once micro-repeater 360 determines which other micro-repeater it
associates with, it may then transmit to micro-repeater 362 for permission to
associate via
link 368. Micro-repeater 362 may then respond to grant association. Micro-
repeater 360
may now receive the grant from the now associated Micro-repeater 362.
[00851 Once association is granted other messages may be transmitted between
the
micro-repeaters. Micro-repeaters with lower numbered seed values may transmit
various
messages to micro-repeaters with higher numbered seed values including those
needed to
keep timing, frequency compensation, transmission power levels, automatic
frequency
control (AFC) and sample timing compensation consistent through the network.
For
example, in Figure 17, micro-repeater 362 could transmit AFC compensation
messages to
micro-repeater 360. All micro-repeaters may transmit control messages to
appropriately
power control transmissions from associated micro-repeaters. Micro-repeaters
362 and 360
can both transmit power control transmission to each other. Failure to receive
one or more
consecutive messages from upstream micro-repeaters may trigger the micro-
repeater to go
back into acquisition mode, send a request to associate with another micro-
repeater, and
potentially find a different micro-repeater to associate with. If micro-
repeater 360 stops
receiving some number of consecutive messages from micro-repeater 362, it may
go back
into acquisition more and associate with a potentially different micro-
repeater. After the
micro-repeater has associated with the network, it transmits on the broadcast
channel
advertising its own seed to other devices seeking to join the network
including other micro-
repeaters or tags. The messages broadcast by the micro-repeater may be at a
set broadcast
power so as to allow as many devices as possible to determine if this micro-
repeater is
available for networking. For example, after association, micro-repeater 360
may now
-26-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
transmit on the broadcast channel to advertise itself to other devices seeking
to join the
network.
[00861 Upstream communication originating from a tag is passed from each
micro-repeater to the micro-repeater it is associated with that has a lower
seed value. For
example, in Figure 16, micro-repeater 352 passes traffic originating at tag
350 and received
from micro-repeater 351 on to micro-repeater 353 enroute to access point 354.
Ultimately,
the micro-repeaters with a seed value of 1 transmit the message to the access
point. Micro-
repeater 353 passes tag originating traffic on to access point 354. Tags may
communicate
with whichever micro-repeater requires the least transmit power so as to save
battery life,
even if this results in communicating with a micro-repeater with a higher seed
value. Tag
350 may be able to communicate to either micro-repeater 352 or 351, but tag
350 may pick
to communicate with micro-repeater 351 based on needing the least transmit
power to
communicate with micro-repeater 351. Communications, regardless of direction,
are
transmitted using a gold code that corresponds to the seed value of the
destination.
100871 Downstream communication may be routed by each micro-repeater to the
micro-repeater closer to the tag. Micro-repeater 353 passes traffic
originating at access
point 354 that is bound for tag 350 on to micro-repeater 352. This information
maybe
captured in a data structure during upstream communication from the tag to the
access point
that has previously passed through the micro-repeater. Many known methods of
routing can
be used with a system embodied under the claimed invention. In one routing
method,
entries for particular routes in the data structure may contain both an
identification of the
device and the seed value of the next communication link that leads to the
device. Micro-
repeater 353 may have entries for a route to tag 350 in a data structure.
Entries in the data
structure may also note when the device is in direct communication with the
micro-repeater.
Micro-repeater 351 could note that it is in direct communication with tag 350.
The gold
code used to pass on a routed message depends on entries in the data
structure. The micro-
repeater may transmit using either a gold code corresponding to a further
downstream
micro-repeater or a gold code corresponding directly to the device. Hence,
micro-repeater
351 would communicate with tag 350 using a gold code that corresponds directly
to the
device. Messages received for devices that are not known in the data structure
may need to
-27-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
be transmitted back upstream. When the access point has no record of the
device, the
access point may either wait for a message from the tag or may issue a
broadcast channel
message seeking the tag directly.
[00881 Tag communication to micro-repeaters may be essentially unchanged from
the direct tag to access point topology described above. Broadcast messages
that tags use
for initialization may be broadcast using an agreed upon network wide gold
code that is
independent of the micro-repeater seed. Hence, when tag 350 attempts to
associate with the
network, it may use a network wide gold code. Power control communications can
be
performed with the micro-repeaters just as the tag could perform these with an
access point
as explained above.
[00891 It may be desirable to have the tag itself act as a micro-repeater
under
certain circumstances. To accomplish this, the tag may transmit a broadcast
channel
message that advertises its presence to other tags and permits neighboring
devices to engage
in communication as a peer. Hence, if tag 350 were to act as a micro-repeater,
tag 350
could transmit a broadcast channel message advertising itself to other tags.
The two tags
could then function in much the same way that a micro-repeater and tag
normally function.
In one embodiment, a tag may only issue broadcast channel messages a
particular
percentage of the time.
[00901 Fig. 18 is a flow diagram and timeline illustrating operations
performed
during an acquisition process in accordance with an exemplary embodiment. In
alternative
embodiments, additional, fewer, and/or different operations may be performed.
Further, the
use of flow diagrams herein is not meant to be limiting with respect to the
order of
operations performed. At a time 400', the tag can be in the sleep state. At a
time 405, the
tag can enter the awake state to perform preamble processing. In an
illustrative
embodiment, the tag can enter the awake state at least one worst case
determination period
prior to an upcoming communication event. As such, the tag can have sufficient
time to
acquire the timing and frequency of the access point even if worst case drift
occurred during
the sleep state. As an example, if the worst case determination period is five
seconds, the
tag can enter the awake state at least five seconds prior to a communication
event. In one
-28-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
embodiment, the worst case determination period can also account for timing
drift with
respect to when the tag should wake up. For example, if the worst case
determination
period is three seconds and the worst case drift of the timing is 1 second,
the tag may wake
up at least four seconds prior to the communication event to ensure that the
tag has
sufficient time to determine the timing and frequency. The worst case
determination period
can also account for arrival of the preamble such that the tag wakes up at the
earliest
possible time that the preamble could arrive given worst case timing drift. In
another
illustrative embodiment, entry into the awake state may also be sufficiently
close to the start
of the communication event (i.e., not too far in advance) such that identified
timing and
frequency values are accurate or close to accurate when the communication
event
commences.
[0091] The preamble processing can be performed in the context of a slotted
frame
structure that includes a preamble 410, a broadcast channel 415, and a data
channel 420.
The preamble processing can include filling a sample buffer with at least a
portion of
preamble 410 as illustrated in an operation 425. In one embodiment, the number
of
preamble symbols placed into the sample buffer can be the length of the
preamble plus
additional symbols to cover timing error. However, in high signal-to-noise
(SNR) ratio
conditions, the preamble processing time may be reduced by collecting less
preamble
symbols (down to length 2) in the sample buffer. Given a high SNR, the
preamble
processing can still be highly accurate using a smaller number of symbols. The
sample
buffer can be locked once an adequate number of symbols is received.
[0092] Upon acquisition of at least a portion of the preamble, the preamble
processing also includes finger accumulation, differential binary phase shift
keying
(DBPSK), and correlation, which are performed in an operation 430. In a
representative
embodiment, soft outputs from the DBPSK process can be correlated against a
known
sequence. If the correlation results in a high correlation, the search can be
successful and
the timing and frequency of the access point can be determined. High
correlation can be
relative to a predetermined standard, a prior preamble search, etc. Upon
determination of
the timing and frequency, the tag can enter the sleep state until the tag has
to enter the
awake state for the upcoming communication event.
-29-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
[0093] In one embodiment, the search/determination performed in operation 430
may be based on a narrow range of timing offsets and/or frequency offsets
based on the
assumption that a small amount of drift occurred during the sleep state. The
search can be a
two-dimensional search in which the timing and frequency are simultaneously
determined.
The search can also be centered around a nominal timing value and/or a nominal
frequency
value. The nominal values can be based on the assumption that no drift
occurred relative to
the most recent prior communication event. Alternatively, any other nominal
values may be
used.
[0094] If the correlation results from operation 430 result in an unsuccessful
search, the tag may not enter the sleep state, and an extended search may be
performed in an
operation 435. The extended search can be performed over a large range of
timing offsets
and/or frequency offsets. Even if the extended search is performed, there is
still sufficient
time to complete the search and/or return to the sleep state prior to the
upcoming
communication event because the tag entered the awake state early enough to
cover the
worst case scenario. In an illustrative embodiment, the tag can wake up early
enough such
that the sleep state can still be entered regardless of the magnitude of the
search that is
performed. In an alternative embodiment, a single continuous search may be
performed
until the timing and frequency values are determined. For example, the search
can be
centered around the nominal values and expanded outward until a sufficient
correlation is
obtained. Regardless of how the search is conducted, the search can be
terminated upon a
successful determination of the timing and frequency and the tag can enter the
sleep state,
time permitting. As such, the amount of time in the sleep state following the
initial
acquisition of the timing and frequency can depend on the amount of time that
it takes to
acquire the timing and frequency. More time spent in the sleep state results
in additional
power/battery conservation because less power is drawn during the sleep state.
The results
of the search performed in operation 430 and/or operation 435 can be an
initial timing value
(or offset) and an initial frequency value (or offset).
[0095] At a time 440, the tag enters the awake state for a communication
event. In
an operation 445, the sample buffer is filled with one or more symbols of a
preamble. In an
operation 450, preamble processing (or a search) is performed. The search,
which can be
-30-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
centered around the initial timing value and the initial frequency value, can
be a rapid,
abbreviated search because only a short amount of time has passed since the
determination
of the initial timing value and the initial frequency value. As a result, no
or minimal drift
can be expected to have occurred during the sleep state following
determination of the
initial frequency value and the initial timing value. The abbreviated search
can be
conducted over a limited range of frequency and timing values. Alternatively,
the search
may center around the initial timing value and initial frequency value and be
expanded
outward until the actual timing and frequency values are determined. In an
operation 455,
the communication event is performed.
[0096] As a result of the processes and operations described with reference to
Fig. 18, the battery life of the tag can be extended. Resources are conserved
because the tag
remains in the awake state for a minimal amount of time and in the sleep state
for a
maximal amount of time. Further, the tag is still able to function in case of
a worst case
drift scenario caused by an environmental change or other factor. However, in
most cases,
it is expected that the drift may be minimal and the acquisition can be
rapidly achieved. It is
important to understand that any of the embodiments described herein may be
implemented
as computer-readable instructions stored on a computer-readable medium. Upon
execution
by a processor, the computer-readable instructions can cause a computing
device to perform
operations to implement any of the embodiments described herein.
[0097] The location of individual tags can be determined in reference to the
location of other devices in the network. Referring to Fig. 19, a diagram of
locating a tag in
an random-phase multiple access network according to an exemplary embodiment
is shown.
Tag 400 is the device for which its location will be determined. Tag 400 is in
communication with devices 401, 402, 403 and 404. Devices 401, 402, 403 and
404 may
consist of micro-repeaters, access points, or other tags configured for
communication with
tag 400.
[0098] In a representative embodiment, the devices 401, 402, 403 and 404
include
a transmitter for transmitting a ranging request signal. The ranging request
signal is spread
using a first predetermined pseudo-noise (PN) code and has a first random
timing offset.
-31-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
The devices 401, 402, 403 and 404 also include a receiver for receiving a
ranging response
signal.
[0099] The tag 400 includes a receiver for receiving the ranging request
signal and
a transmitter for transmitting the ranging response signal. The ranging
response signal is
spread using a second predetermined pseudo-noise (PN) code and has a second
random
timing offset. Alternatively, the devices and tag can be configured vice-
versa.
Additionally, the first predetermined pseudo-noise (PN) code and the second
predetermined
pseudo-noise (PN) code can be the same code.
[0100] A controller controls the location operation. The controller can be
part of
the devices 401, 402, 403 and 404, the tag 400, or any micro-repeaters, access
point, or any
other tag. The controller does not have to be part of the same physical device
as the
transmitter and receiver that actually transmits and receives the ranging
request signal and
ranging response signal. Hence, the controller can be coupled to the devices
and/or tag
physically, electrically, or communicatively. The controller can control the
ranging
requests of many different devices. The controller triggers the transmission
of the ranging
request signal. The controller waits for the reception of the ranging response
signal and
calculates a propagation delay. The controller can be implemented in various
ways such as
an integrated circuit on a tag or access point, or as software on a access
point or server.
[0101] Referring to Fig. 20, a diagram depicting the timing of communications
signals used to determine a tag's location according to an exemplary
embodiment is shown.
At a beginning of a ranging request 510, a first device starts transmitting a
ranging request
signal. The first device can be, for example, an access point. At a second
device reception
time 520, after a propagation time (Tprop), a second device begins to receive
the ranging
request signal. The second device can be, for example, a tag. Alternatively,
the first device
can be a tag and the second device can be an access point. After a request
period 530 (Tbn),
the first device stops transmitting the ranging request signal. Reception of
the ranging
request signal at the second device is complete after a second propagation
time 540 (Tpiop).
After a response delay 550 (Dn,In), at a beginning of a ranging response 560,
the second
device begins transmitting the ranging response to the first device. At a
first device
-32-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
reception time 570, after a propagation time (Tprop), the first device begins
to receive the
ranging response signal. A ranging time 580 (Tn,m) is the time from the
beginning of a
ranging request 510 to the first device reception time 570. The propagation
delays, Tprop,
are directly proportional to the distance from the first device to the second
device and can
be calculated with the following formula:
Tn,m = Tbrr + Tprop + Dn,m + Tprop
Tprop = (Tn,m - Tbrr - Dn,m )/2
[01021 This propagation delay calculation can be used in triangulation
calculation
techniques as known in the art. For example, the propagation delay can be
multiplied by the
speed of light (c) to obtain a distance (d). Multiple readings from different
first devices can
be used to scribe circles, centered on the first devices, with radius d. The
circles will
approximately intersect at the location of the second device The calculations
can be
performed at any entity in the network that the devices can communicate with.
For
example, the calculations can be performed at the tag, micro-repeaters, access
points, or
other tags. Additionally, various attributes of the ranging request signal and
ranging
response signal can be used to determine the ranging time. For instance, the
times at the
beginning and end of the ranging request signal and ranging response signal
can be
averaged.
[01031 The response delay 550 (Dn,m) includes a time required for the second
device to process the ranging request. The time required for the second device
to process
the ranging request can be known or transmitted back to the first device as
part of the
ranging response signal. The response delay 550 (Dn,m) can also include extra
time to avoid
interference or collisions. For instance, the response delay 550 (Dn,m) can
include a random
delay. The second device can use a random delay, or a random delay can be
selected when
collisions have occurred. The second device transmits the value of the random
delay at the
second device to the first device. The value of the random delay can be
included in the
ranging response signal. The controller can also assign or seed random delays
to the second
devices.
-33-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
[0104] Likewise, the response delay 550 (Dn,m) can include a pseudo-random
delay. The second device can use a pseudo-random delay, or a pseudo-random
delay can be
selected when collisions have occurred. The second device transmits the value
of the
pseudo-random delay at the second device to the first device. The value of the
pseudo-
random delay can be included in the ranging response signal.
[0105] Additionally, the first device can delay for a first device delay time
before
transmitting the ranging request signal. The first device delay time includes
delay that
occurs at the first device and/or delay from the controller to the first
device. The delay from
the controller to the first device can be significant where the controller and
first device are
not physically part of the same device. The first device delay time can be
included in the
calculation of the propagation delay.
[0106] The first device delay can include a predetermined time. The
predetermined time can be a predetermined time interval that corresponds to
the correct
access slot or sub-slot for the first device or second device. The
predetermined time can be
included in the calculation of the propagation delay.
[0107] The first device delay can include a random delay before the first
device
starts transmitting a ranging request signal in order to avoid interference or
collisions. The
first device can use a random delay, or a random delay can be selected when
collisions have
occurred. The controller can also assign or seed random delays to a group of
first devices
that are attempting to locate a second device. The random delay can be
included in the
calculation of the propagation delay.
[0108] Likewise, the first device can wait a pseudo-random delay before the
first
device starts transmitting a ranging request signal in order to avoid
interference or
collisions. The first device can use a pseudo-random delay, or a pseudo-random
delay can
be selected when collisions have occurred. The controller can also assign or
seed pseudo-
random delays to a group of first devices that are attempting to locate a
second device. The
pseudo-random delay can be included in the calculation of the propagation
delay.
-34-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
[0109] Referring to Fig. 21, a diagram depicting signal timing in a high
capacity
system according to an exemplary embodiment is shown. Each device may delay a
different Dn,m amount of time before transmissions. A micro-repeater or access
point may
delay an amount before transmission of the ranging request. Or a communication
tag may
delay an amount before responding to the ranging request. The exact amount of
the Dn,m
delay may be a random amount of time, and the amount of time delayed may be
included
with the response. Alternatively, the Dn,m delay may be a pseudo-random amount
of time
determined in advance and distributed to each tag. With this alternative
system, location
information would be calculable at only a single secure location.
[0110] It is important not to desensitize each link between a tag where the
location
is to be determined and the device which will be issuing the ranging request.
Desensitization occurs where a high power ranging request transmission
overwhelms a
lower power ranging request transmission. One possible solution is to employ
deterministic
set partitioning. In deterministic set partitioning each device issuing a
ranging request is
categorized into one of a number of groups. Each device in a particular group
would then
transmit its ranging request only while others of that group were
transmitting.
Subsequently, devices from another group would transmit their ranging
requests.
[0111] For example, in Figure 19, suppose that the link between tag 400 and
device 403 were weaker than the link between tag 400 and device 404. Using
deterministic
set partitioning, each of the devices 401-404 would be in a different group.
Thus device
403 would transmit at a different time than device 404 and would not have its
signal
overwhelmed by device 404.
[0112] In certain circumstances, deterministic set partitioning may lead to
situations where one tag can only communicate with devices that are in the
same group. In
such situations, a second randomized delay factor can be introduced to devices
in the same
group. This randomized delay factor would be transmitted to the device
performing the
location calculation. Alternatively, a pseudo-random delay factor could be
used which is
known only to the device performing the location calculation, hence improving
the security
of the location determination operation.
-35-

CA 02718721 2010-09-16
WO 2009/117290 PCT/US2009/036766
[01131 The foregoing description of exemplary embodiments has been presented
for purposes of illustration and description. It is not intended to be
exhaustive or to limit the
present invention to the precise form disclosed, and modifications and
variations are
possible in light of the above teachings or may be acquired from practice of
the present
invention. The embodiments were chosen and described in order to explain the
principles
of the present invention and its practical application to enable one skilled
in the art to utilize
the present invention in various embodiments and with various modifications as
are suited
to the particular use contemplated. In addition, one or more flow diagrams
were used
herein. The use of flow diagrams is not intended to be limiting with respect
to the order in
which operations are performed.
-36-

Dessin représentatif
Une figure unique qui représente un dessin illustrant l'invention.
États administratifs

2024-08-01 : Dans le cadre de la transition vers les Brevets de nouvelle génération (BNG), la base de données sur les brevets canadiens (BDBC) contient désormais un Historique d'événement plus détaillé, qui reproduit le Journal des événements de notre nouvelle solution interne.

Veuillez noter que les événements débutant par « Inactive : » se réfèrent à des événements qui ne sont plus utilisés dans notre nouvelle solution interne.

Pour une meilleure compréhension de l'état de la demande ou brevet qui figure sur cette page, la rubrique Mise en garde , et les descriptions de Brevet , Historique d'événement , Taxes périodiques et Historique des paiements devraient être consultées.

Historique d'événement

Description Date
Lettre envoyée 2024-03-11
Paiement d'une taxe pour le maintien en état jugé conforme 2023-09-06
Inactive : TME en retard traitée 2023-09-06
Lettre envoyée 2023-03-13
Paiement d'une taxe pour le maintien en état jugé conforme 2022-09-06
Inactive : TME en retard traitée 2022-09-05
Requête pour le changement d'adresse ou de mode de correspondance reçue 2022-03-18
Lettre envoyée 2022-03-11
Inactive : Lettre officielle 2021-11-29
Inactive : TME en retard traitée 2021-09-10
Requête pour le changement d'adresse ou de mode de correspondance reçue 2021-09-10
Inactive : Rép. reçue: TME + surtaxe 2021-09-10
Paiement d'une taxe pour le maintien en état jugé conforme 2021-09-10
Lettre envoyée 2021-03-11
Inactive : TME en retard traitée 2020-08-31
Paiement d'une taxe pour le maintien en état jugé conforme 2020-08-31
Lettre envoyée 2020-03-11
Requête visant le maintien en état reçue 2020-03-11
Représentant commun nommé 2019-10-30
Représentant commun nommé 2019-10-30
Lettre envoyée 2019-07-30
Inactive : Lettre officielle 2019-07-30
Lettre envoyée 2019-07-30
Inactive : Transferts multiples 2019-07-24
Lettre envoyée 2019-03-11
Inactive : TME en retard traitée 2019-03-11
Lettre envoyée 2018-03-12
Accordé par délivrance 2012-06-19
Inactive : Page couverture publiée 2012-06-18
Inactive : Lettre officielle 2012-04-16
Inactive : Supprimer l'abandon 2012-03-21
Réputée abandonnée - les conditions pour l'octroi - jugée non conforme 2011-11-09
Préoctroi 2011-11-08
Inactive : Taxe finale reçue 2011-11-08
Inactive : Correspondance - PCT 2011-10-31
Inactive : CIB désactivée 2011-07-29
Un avis d'acceptation est envoyé 2011-05-09
Lettre envoyée 2011-05-09
month 2011-05-09
Un avis d'acceptation est envoyé 2011-05-09
Inactive : Approuvée aux fins d'acceptation (AFA) 2011-05-06
Lettre envoyée 2011-02-23
Inactive : CIB attribuée 2011-02-22
Inactive : CIB enlevée 2011-02-22
Inactive : CIB enlevée 2011-02-22
Inactive : CIB en 1re position 2011-02-22
Inactive : CIB attribuée 2011-02-22
Inactive : CIB attribuée 2011-02-22
Inactive : CIB attribuée 2011-02-22
Avancement de l'examen jugé conforme - PPH 2011-02-17
Modification reçue - modification volontaire 2011-02-17
Avancement de l'examen demandé - PPH 2011-02-17
Requête d'examen reçue 2011-01-13
Exigences pour une requête d'examen - jugée conforme 2011-01-13
Toutes les exigences pour l'examen - jugée conforme 2011-01-13
Inactive : CIB expirée 2011-01-01
Inactive : Page couverture publiée 2010-12-17
Inactive : Réponse à l'art.37 Règles - PCT 2010-11-23
Inactive : Demande sous art.37 Règles - PCT 2010-11-17
Inactive : Réponse à l'art.37 Règles - PCT 2010-11-17
Inactive : Notice - Entrée phase nat. - Pas de RE 2010-11-17
Inactive : CIB en 1re position 2010-11-15
Inactive : CIB attribuée 2010-11-15
Demande reçue - PCT 2010-11-15
Exigences pour l'entrée dans la phase nationale - jugée conforme 2010-09-16
Demande publiée (accessible au public) 2009-09-24

Historique d'abandonnement

Date d'abandonnement Raison Date de rétablissement
2011-11-09

Taxes périodiques

Le dernier paiement a été reçu le 2012-03-12

Avis : Si le paiement en totalité n'a pas été reçu au plus tard à la date indiquée, une taxe supplémentaire peut être imposée, soit une des taxes suivantes :

  • taxe de rétablissement ;
  • taxe pour paiement en souffrance ; ou
  • taxe additionnelle pour le renversement d'une péremption réputée.

Les taxes sur les brevets sont ajustées au 1er janvier de chaque année. Les montants ci-dessus sont les montants actuels s'ils sont reçus au plus tard le 31 décembre de l'année en cours.
Veuillez vous référer à la page web des taxes sur les brevets de l'OPIC pour voir tous les montants actuels des taxes.

Titulaires au dossier

Les titulaires actuels et antérieures au dossier sont affichés en ordre alphabétique.

Titulaires actuels au dossier
INGENU INC.
Titulaires antérieures au dossier
DANIEL THOMAS WERNER
LEWIS N. COHEN
MATTHEW HUGHES
ROBERT W. BOESEL
THEODORE J. MYERS
Les propriétaires antérieurs qui ne figurent pas dans la liste des « Propriétaires au dossier » apparaîtront dans d'autres documents au dossier.
Documents

Pour visionner les fichiers sélectionnés, entrer le code reCAPTCHA :



Pour visualiser une image, cliquer sur un lien dans la colonne description du document (Temporairement non-disponible). Pour télécharger l'image (les images), cliquer l'une ou plusieurs cases à cocher dans la première colonne et ensuite cliquer sur le bouton "Télécharger sélection en format PDF (archive Zip)" ou le bouton "Télécharger sélection (en un fichier PDF fusionné)".

Liste des documents de brevet publiés et non publiés sur la BDBC .

Si vous avez des difficultés à accéder au contenu, veuillez communiquer avec le Centre de services à la clientèle au 1-866-997-1936, ou envoyer un courriel au Centre de service à la clientèle de l'OPIC.


Description du
Document 
Date
(yyyy-mm-dd) 
Nombre de pages   Taille de l'image (Ko) 
Description 2010-09-15 36 1 762
Dessins 2010-09-15 20 469
Revendications 2010-09-15 10 342
Dessin représentatif 2010-09-15 1 9
Abrégé 2010-09-15 1 69
Page couverture 2010-12-16 1 39
Revendications 2011-02-16 4 123
Dessin représentatif 2012-05-24 1 6
Page couverture 2012-05-27 1 40
Rappel de taxe de maintien due 2010-11-14 1 112
Avis d'entree dans la phase nationale 2010-11-16 1 194
Accusé de réception de la requête d'examen 2011-02-22 1 176
Avis du commissaire - Demande jugée acceptable 2011-05-08 1 165
Avis du commissaire - Non-paiement de la taxe pour le maintien en état des droits conférés par un brevet 2024-04-21 1 555
Quittance d'un paiement en retard 2019-03-10 1 165
Quittance d'un paiement en retard 2019-03-10 1 165
Avis concernant la taxe de maintien 2018-04-22 1 178
Avis concernant la taxe de maintien 2019-04-22 1 184
Courtoisie - Certificat d'enregistrement (document(s) connexe(s)) 2019-07-29 1 106
Courtoisie - Certificat d'enregistrement (document(s) connexe(s)) 2019-07-29 1 107
Avis du commissaire - Non-paiement de la taxe pour le maintien en état des droits conférés par un brevet 2020-04-21 1 545
Avis du commissaire - Non-paiement de la taxe pour le maintien en état des droits conférés par un brevet 2021-04-26 1 536
Avis du commissaire - Non-paiement de la taxe pour le maintien en état des droits conférés par un brevet 2022-04-21 1 541
Avis du commissaire - Non-paiement de la taxe pour le maintien en état des droits conférés par un brevet 2023-04-23 1 550
PCT 2010-09-15 12 469
Correspondance 2010-11-16 1 23
Correspondance 2010-11-22 1 40
Correspondance 2010-11-16 3 95
Correspondance 2011-10-30 3 92
Correspondance 2012-02-23 2 69
Correspondance 2011-11-07 1 29
Correspondance 2012-04-29 6 303
Paiement de taxe périodique 2019-03-10 1 26
Paiement de taxe périodique 2020-03-10 1 28
Paiement de taxe périodique 2020-08-30 1 28
Paiement de taxe périodique 2021-09-09 1 28
Taxe périodique + surtaxe 2021-09-09 4 136
Changement à la méthode de correspondance 2021-09-09 3 68
Courtoisie - Lettre du bureau 2021-11-28 1 193
Changement à la méthode de correspondance 2022-03-17 3 93
Paiement de taxe périodique 2022-09-04 1 28