2.0 System Description



Similar documents
Quick start: Panic Watch EU

WIRELESS MAGNETIC CONTACT

How To Make A Multi-User Communication Efficient

CS263: Wireless Communications and Sensor Networks

Z-Wave.Me Wall Controller

USING WIRELESS DIAGNOSTICS Application Note 31

Introduction to Z-Wave. An Introductory Guide to Z-Wave Technology

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

ECE 333: Introduction to Communication Networks Fall 2002

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Logging of RF Power Measurements

RECOMMENDATION ITU-R F (Question ITU-R 157/9) b) that systems using this mode of propagation are already in service for burst data transmission,

500r+ Installation and User Guide

Special Topics in Security and Privacy of Medical Information. Reminders. Medical device security. Sujata Garera

LIN (Local Interconnect Network):

ZME_05459 Wall Blind Control Set for Busch-Jaeger DURO 2000 Firmware Version : 1.8

Shadow TX(A) Shadow RX

SuperGuard VT-05 Vehicle Tracking Device

EECC694 - Shaaban. Transmission Channel

Interference Analysis

4310/4320 Wireless Position Monitor Burst Configuration and Diagnostics

EDK 350 (868 MHz) EDK 350U (902 MHz) EnOcean Developer Kit

GSM Channels. Physical & Logical Channels. Traffic and Control Mutltiframing. Frame Structure

Single channel data transceiver module WIZ2-434

ODYSSEY. Security System Owner s Manual. Kit No. 08E51-SHJ E55-SHJ American Honda Motor Co., Inc. - All Rights Reserved.

WA Manager Alarming System Management Software Windows 98, NT, XP, 2000 User Guide

Implementing Digital Wireless Systems. And an FCC update

KX 155A and KX 165A VHF Communication/Navigation Transceivers

A RF18 Remote control receiver MODULE

INTERNATIONAL TELECOMMUNICATION UNION

Radio sensor powered by a mini solar cell the EnOcean STM 110 now functions with even less light

WIRELESS INSTRUMENTATION TECHNOLOGY

Cisco Cable Radio Frequency (RF) FAQs

Inwall 4 Input / 4 Output Module

ICP-CC488. Installation Guide ICP-CC488 Control Panel

Process Control and Automation using Modbus Protocol

Protocolo IEEE Sergio Scaglia SASE Agosto 2012

Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual

Solution-16 Operators Manual ISSUE 1.60

DC-8706K Auto Dial Alarm System

OPERATING INSTRUCTIONS SECURITY SYSTEM KIT NO.: 08E51-EP American Honda Motor Co., Inc. - All Rights Reserved. 1

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Bidirectional wireless communication using EmbedRF

GSM Voice Auto Dialer & SMS Sender JC-999

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

PG-01instruction manual

8-bit Microcontroller. Application Note. AVR415: RC5 IR Remote Control Transmitter. Features. Introduction. Figure 1.

DT3: RF On/Off Remote Control Technology. Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch

Spectrum and Power Measurements Using the E6474A Wireless Network Optimization Platform

TELULAR SX4E PHONECELL WITH THE 8210 SPEECH MODEM APPLICATION NOTE

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

is the power reference: Specifically, power in db is represented by the following equation, where P0 P db = 10 log 10

LOCAL INTERCONNECT NETWORK (LIN)

MOTOROLA Radio Service Software RSS Software GP60 Series

Car Alarm Series 2 B 2 Buttons

Verifying Detection of Asset Tags in WLAN Controllers

Automatic Telephone Dialer TD-101(W)

How To Use An Adh8012 Gsm Gprs Module With A Gsm (Gsm) Gpros (Gsp) Gpls (Geo) Gsp (Gpl) Gs

AN141 SMBUS COMMUNICATION FOR SMALL FORM FACTOR DEVICE FAMILIES. 1. Introduction. 2. Overview of the SMBus Specification. 2.1.

FSLIMRF

Introduction to EDGE. 2.1 What Is EDGE?

DVB-T2 DIGITAL TV BOX

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

ZME_RC2 Z-Wave Remote Control

Flip-Flops, Registers, Counters, and a Simple Processor

Laser Scanner Programming Guide (SE923 laser engine)

SMS GSM Alarm Messenger

PowerShield SNMP Adaptor

Part Number Description Packages available

Light scene push button 8gang comfort flush-mounted xx

Dynamic Source Routing in Ad Hoc Wireless Networks

Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate?

Metrics for Detection of DDoS Attacks

Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP

Bluetooth SMART Advertise-Only Beacon Reference Design

INTERNATIONAL TELECOMMUNICATION UNION

-Helping to make your life betterwww.person-to-person.net

swarm, onderlinge afstandsbepaling in een draadloos netwerk nanotron Technologies GmbH

computer radio control system

SPECIAL CONTROL BUTTON FUNCTIONS

Transport Layer Protocols

Date Rev. Details Author

Tebis application software

PAC1 Door Access Controller

Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things. Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson

HAC-LM Series Low Power Data Radio Module

Physical Layer, Part 2 Digital Transmissions and Multiplexing

Control/Communicator Installation Manual

ST815 Illumination Sensor with LCD

Bluetooth voice and data performance in DS WLAN environment

Wireless Home Security System

Dealer s Manual VHF FM MOBILE TRANSCEIVER

FEATURES DESCRIPTION APPLICATIONS BLOCK DIAGRAM. PT2272 Remote Control Decoder

VHF COMMUNICATION TRANSCEIVER

RS - SPM. Serial parallel translator module

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

SYSTEM 7000 IRIS+ USER MANUAL

CS488-R51I13A

STATUS POWER MONITOR ALARM SOS DISARM

Global Water Instrumentation, Inc.

Transcription:

2.0 System Description The wireless alarm system consists of two or more alarm units within a specified range of one another. Each alarm unit employs a radio transceiver, allowing it to communicate with other units in the system. When a unit detects an alarm condition, it sounds a horn and broadcasts an alarm message. Alarm units that are within range receive the alarm message, sound their horns, and then retransmit the message for other units to receive. This process continues until all of the units in the system have received the alarm message. This retransmission strategy allows a single alarm unit to ultimately trigger the alarms of all units in a given system. The alarm units communicate additional information in a similar fashion. All units have both a test and a reset button. When a user presses the test button on a given unit, it sounds its test horn and broadcasts the test message throughout the system. Pushing the reset button causes a unit to disable its horn and to initiate the transmission of a reset message so that all units in the system ultimately disable their respective alarms. An example of the retransmission strategy employed by the wireless alarm system is shown below in Figure 2.1. Figure 2.1: Example Operation of the Wireless Alarm System 2.1 Functional Specifications The wireless alarm units operate in one of eleven possible modes at any given time[6]. Each of the eleven modes of operation along with their respective purpose and function are discussed below. 2.1.1 Standby Units operate in standby mode when battery power is applied. In standby mode, units are capable of detecting an alarm condition, receiving messages, responding to user button presses, and testing the battery. In standby mode, units may transition to another mode 4

given the detection of a relevant condition. Possible modes to which units may transition are summarized in Figure 2.2. Note that the circles in the figure represent the modes of operation, while the labeled arrows represent the event which causes the transition. Figure 2.2: Possible Transitions from Standby Mode 2.1.2 Local Alarm and Remote Alarm Units transition into an alarm mode when an alarm condition is detected or when an alarm message is received from a remote unit. When in either the local or remote alarm modes, a unit sounds its horn and retransmits the alarm message for other units to receive. In addition, the unit s receiver is activated so that the unit can receive reset messages. Units exit the alarm mode during either a reset condition or a low battery condition. The causes of transition from the alarm modes to other modes are shown in Figure 2.3. Figure 2.3: Possible Transitions from Local and Remote Alarm Modes 5

2.1.3 Local Test and Remote Test The wireless alarm units offer testing capabilities to the user. The user can initiate system testing by pressing a test button on a single unit. When a unit s test button is pressed, the unit enters local test mode. While the test button is pressed, the unit sounds its horn and transmits a test message to other units. Units which receive the test message enter remote test mode. Units in local test mode enter a wait mode when the test button is released. Units in remote test mode enter a wait mode after sounding their horn, retransmitting the test message to other units, and listening for RF messages on the channel. If a unit in remote test mode receives a reset message, the unit transitions into remote reset mode. Figure 2.4 demonstrates these activities. Figure 2.4: Possible Transitions from Local and Remote Test Modes 2.1.4 Local Reset and Remote Reset Local reset mode is entered when a unit s reset button is pressed. Remote reset is entered when a unit receives a reset message from another unit. While in either local or remote reset mode, units can react to local alarm conditions. Under normal conditions, units go into wait mode following reset mode. Figure 2.5 demonstrates the possible transitions from reset mode to other modes. Note that in remote reset mode, units also test the battery voltage. Figure 2.5: Possible Transitions from Local and Remote Reset Modes 6

2.1.5 Low Battery Alarm units enter a low battery mode when the battery voltage becomes too low. During low battery mode, units sound a horn to indicate the low battery condition. Variations in voltage may cause units in low battery mode occasionally to transition to other modes. However, as battery conditions worsen, units remain in low battery mode until the battery is completely depleted. 2.1.6 Wait The wait mode is entered after the transmission of a reset message or a test message. During wait mode, units continue to test for alarm conditions and for low battery voltage. However, the receiver of a unit in wait mode is disabled so that feedback will not cause continuous retransmission of messages. Units enter standby mode after a time delay. The operation of units in wait mode is shown in Figure 2.6. Figure 2.6: Possible Transitions from Wait Mode 2.1.7 Remote AUX2 and Remote AUX3 The remote AUX2 and remote AUX3 modes are reserved for future applications in the alarm system. Since they are not currently used, their functionality is not discussed. 2.2 Technical Specifications Each wireless alarm unit has a radio transceiver for communication with other units. The EIRP is -41.10 ± 4 dbm, while the receiver sensitivity is -105.5 dbm. Binary messages are transmitted at a carrier frequency of 418 MHz. An amplitude shift keying (ASK) digital modulation scheme is employed. The modulation scheme uses two signal states, mark and space. The presence of the carrier signal denotes a mark, while absence of the carrier denotes a space. The binary messages are Manchester encoded such that a one symbol is represented by a mark to space, while a zero symbol is represented by a space to mark. Information in the alarm system is transmitted at 1 kbps. Messages are 16 bits long and have the format shown in Figure 2.7. The most significant bit of each message is transmitted first. 7

Figure 2.7: Message Format of the Wireless Alarm System The first eight bits of each word are reserved for the message type. Message types, and their respective codes are summarized below in Table 2.1. Table 2.1: Wireless Alarm System Message Codes Message Binary Code Type ALARM 10111000 TEST 00011101 RESET 01000111 AUX2 11100010 AUX3 01110100 The next five bits of data are reserved for the system identification number. Each alarm unit has five dip switches which can be configured to allow up to thirty-two alarm systems to operate independently in close proximity of one another. In order for an alarm unit to consider a received message to be valid, the system identification code in the message must match the dip switch settings of the receiving unit. The last three bits in every data word are a fixed pattern, 110. 2.3 Transceiver Operation The wireless alarm units share a common radio channel for communication. To prevent message collisions, a Carrier Sense Multiple Access (CSMA) scheme is used. When a unit is ready to transmit, it senses the channel by checking the output of its receiver for Manchester encoded data. If the unit determines that the channel is idle, it transmits its message continuously for 24 seconds. It is apparent that if two units detect the channel idle at the same time, the continuous retransmissions are pointless, as both units will transmit simultaneously and their messages will collide. To alleviate this problem, each unit employs a holdoff timer. When a unit senses the channel, its receiver is enabled, and receiver output is only tested each time the holdoff timer expires. It is desirable for each unit to have a different value in its holdoff timer at any given point in time. Each unit s holdoff timer is initialized when power is applied to the unit. The holdoff timer increments every 93.75 ms and expires every 6 sec. In order to preserve battery life, the receiver in each unit is only enabled periodically. The time interval or receive window during which alarm units can receive and decode a 8

message lasts for 93.75 ms every 18.84375 s. This is depicted below in Figure 2.8. Note from the figure that the receiver is actually activated for a period of 187.5 ms every 18.75 s. However, the first half of this interval is reserved to allow the receiver to stabilize. The decoder is not enabled until the second half of this time period. Figure 2.8: Timing of Receiver Activation The validity of a received message is determined by three criteria. First, the message must be received two or more consecutive times during the receive window. In addition, the system ID field must match the settings of the receiving unit s dip switches. Thirdly, the message must contain a valid message field. Invalid messages are simply ignored. 2.4 System Delays It was previously mentioned that receivers in the wireless alarm system wake up only periodically. Although this periodic wakeup feature allows the units to conserve battery life, it also causes system delays. The time required for a remote unit within range of an originating unit to begin sounding its alarm is the unit to unit alarm/test latency. The maximum unit-to-unit alarm/test latency is specified as 18.75 s, while the typical value is 9.38 s. The time required for the last unit in a serial array of units to sound its alarm is the alarm/test propagation time. The maximum and typical alarm/test propagation times are given by equations (2.1) and (2.2). Maximum: 30( N 2) + 18. 75sec Typical: 27( N 2) + 9. 38sec where N is the number of units in the system. (2.1) (2.2) The alarm propagation interval is defined as the time delay from when the first unit in a system begins sounding its alarm to when the last unit in the system completes its transmissions of the alarm message. The alarm propagation interval is given by equation (2.3). Maximum: 6 + 24N sec where N is the number of units in the system. (2.3) 9