Method of communicating information and corresponding device and system
11909849 ยท 2024-02-20
Assignee
Inventors
Cpc classification
H04L27/2643
ELECTRICITY
H04W4/20
ELECTRICITY
Y04S40/18
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
H04L27/2666
ELECTRICITY
H04L67/12
ELECTRICITY
H04L69/18
ELECTRICITY
International classification
H04L69/18
ELECTRICITY
Abstract
A communication circuit supports a first communication protocol and a second communication protocol that is different from the first communication protocol. A number of signals include first signals conveying first information messages and second signals conveying second information messages. The first information messages include a repetitive message having fixed repeated content and the second information messages include a non-repetitive message having variable content. The first signals and the second signals are transmitted via the communication circuit using the first communication protocol for the first signals and the second communication protocol for the second signals.
Claims
1. A method, comprising: having a plurality of signals, including first signals conveying first information messages and second signals conveying second information messages; determining that the first information messages comprise a repetitive message having fixed repeated content, and, based thereon, transmitting the first signals in accordance with a first communication protocol over a powerline communication, wherein the first communication protocol comprises frequency shift keying (FSK) modulation or spread frequency shift keying (S-FSK) modulation; and determining that the second information messages comprise a non-repetitive message having variable content, and, based thereon, transmitting the second signals in accordance with a second communication protocol over the powerline communication, wherein the second communication protocol is different than the first communication protocol, wherein the second communication protocol comprises phase-shift keying (PSK) modulation or quadrature amplitude modulation (QAM).
2. The method of claim 1, wherein the first communication protocol has a longest message length shorter than the longest message length of the second communication protocol.
3. The method of claim 1, wherein the first communication protocol comprises a single-carrier protocol and the second communication protocol comprises a multi-carrier protocol.
4. The method of claim 1, wherein the first communication protocol has a bandwidth occupancy narrower than the bandwidth occupancy of the second communication protocol.
5. The method of claim 1, wherein transmitting the first signals and the second signals comprises using a first signal strength for the first communication protocol and a second signal strength for the second communication protocol, the first signal strength being lower than the second signal strength.
6. The method of claim 1, wherein the plurality of signals comprises a set of the first signals and a set of the second signals, wherein the set of the first signals is less numerous than the set of the second signals.
7. The method of claim 1, wherein transmitting the first signals and the second signals comprises transmitting the first signals and the second signals via time domain multiplexing.
8. The method of claim 1, wherein transmitting the first signals and the second signals comprises transmitting the first signals and the second signals via frequency domain multiplexing.
9. The method of claim 1, wherein transmitting the first signals and the second signals comprises interleaving the first signals and the second signals.
10. The method of claim 1, wherein transmitting the first signals comprises transmitting the first signals using the first communication protocol with a fixed repetition rate.
11. A device, comprising: a first communication circuit configured to communicate first signals conveying first information messages in accordance with a first communication protocol, wherein the first information messages comprise a repetitive message having fixed repeated content, and wherein the first signals are communicated over a powerline communication; and a second communication circuit configured to communicate second signals conveying second information messages in accordance with a second communication protocol, wherein the second information messages comprise a non-repetitive message having variable content, wherein the second communication protocol is different than the first communication protocol, and wherein the second signals are communicated over the powerline communication, wherein the first communication protocol comprises FSK modulation and wherein the second communication protocol comprises phase-shift keying (PSK) modulation or quadrature amplitude modulation (QAM).
12. The device of claim 11, wherein the device comprises a modem.
13. The device of claim 11, wherein the first communication protocol has a longest message length shorter than the longest message length of the second communication protocol.
14. The device of claim 11, wherein the first communication protocol comprises a single-carrier protocol and the second communication protocol comprises a multi-carrier protocol.
15. The device of claim 11, wherein the first communication protocol has a bandwidth occupancy narrower than the bandwidth occupancy of the second communication protocol.
16. The device of claim 11, wherein sending uni-directional first signals and exchanging bi-directional second signals comprises using a first signal strength for the first communication protocol and a second signal strength for the second communication protocol, the first signal strength being lower than the second signal strength.
17. The device of claim 11, wherein the uni-directional first signals are less numerous than the bi-directional second signals.
18. The device of claim 17, wherein sending uni-directional first signals and exchanging bi-directional second signals comprises sending uni-directional first signals and exchanging bi-directional second signals via time domain multiplexing.
19. A method of communicating, the method comprising: sending uni-directional first signals toward a communication signal node using a first communication protocol over a powerline communication, wherein the uni-directional first signals include first information messages that comprise a repetitive message having fixed repeated content; and exchanging bi-directional second signals with the communication signal node using a second communication protocol that is different than the first communication protocol, wherein the bi-directional second signals include second information messages that comprise a non-repetitive message having variable content, and wherein the bi-directional second signals are exchanged over the powerline communication.
20. The method of claim 19, wherein the first communication protocol and the second communication protocol comprise different modulations for the uni-directional first signals and the bi-directional second signals, respectively.
21. The method of claim 20, wherein the first communication protocol comprises frequency shift keying (FSK) modulation or spread frequency shift keying (S-FSK) modulation and wherein the second communication protocol comprises phase-shift keying (PSK) modulation or quadrature amplitude modulation (QAM).
22. The method of claim 19, wherein the first communication protocol has a longest message length shorter than the longest message length of the second communication protocol.
23. The method of claim 19, wherein the first communication protocol comprises a single-carrier protocol and the second communication protocol comprises a multi-carrier protocol.
24. The method of claim 19, wherein the first communication protocol has a bandwidth occupancy narrower than the bandwidth occupancy of the second communication protocol.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) One or more embodiments will now be described, by way of example only, with reference to the annexed figures, wherein:
(2)
(3)
(4)
(5)
(6)
(7)
DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS
(8) In the ensuing description, one or more specific details are illustrated, aimed at providing an in-depth understanding of examples of embodiments of this description. The embodiments may be obtained without one or more of the specific details, or with other methods, components, materials, etc. In other cases, known structures, materials, or operations are not illustrated or described in detail so that certain aspects of embodiments will not be obscured.
(9) Reference to an embodiment or one embodiment in the framework of the present description is intended to indicate that a particular configuration, structure, or characteristic described in relation to the embodiment is comprised in at least one embodiment. Hence, phrases such as in an embodiment or in one embodiment that may be present in one or more points of the present description do not necessarily refer to one and the same embodiment. Moreover, particular conformations, structures, or characteristics may be combined in any adequate way in one or more embodiments.
(10) The references used herein are provided merely for convenience and hence do not define the extent of protection or the scope of the embodiments.
(11) By way of introduction to a detailed description of exemplary embodiments, one may refer to a solution as disclosed U.S. Pat. No. 8,743,908 B2, providing for the possible coexistence of two physical protocols in a same frame F, namely an old protocol OP used for a frame preamble and a new packet protocol NP. Coexistence of the two is based on the fact that the new protocol NP prepends (that is, adds to the beginning) its packet with the synchronization information of the old protocol. A similar approach is adopted in the HomePlug AV power line standard (see, for instance, https://en.wikipedia.org/wiki/HomePlug), in the Hybrid mode, to allow coexistence with old HomePlug 1.0.1 devices.
(12) According to the concept underlying the scheme represented in
(13) When considering two different physical communication protocols, say, Protocol 1 and Protocol 2, one of the two protocols may perhaps be generally better than the other: for instance Protocol 2 may be generally better than Protocol 1. However, in certain application scenarios, Protocol 1 may be better than Protocol 2 as Protocol 1 has particular characteristics: that is, while, in the general case, Protocol 2 may be better than Protocol 1, a limited scenario portion may exist where Protocol 1 may be better than Protocol 2.
(14) By way of explanation, one may consider, as an of example: a first communication protocol based on Frequency Shift Keying (FSK), such as Spread Frequency Shift Keying, S-FSK: as known to those of skill in the art, S-FSK is a FSK scheme involving frequencies widely spaced apart, a second communication protocol based on another modulation such as Phase Shift Keying (PSK) modulation or Quadrature Amplitude Modulation (QAM).
(15) At present, it is generally acknowledged and expected thatin a general contextPSK or QAM modulations will provide better performance. An indirect confirmation of this is provided by the number of communication specification that adopt PSK and/or QAM modulations.
(16) Specifications such as, for instance: the whole IEEE 802.11 series (wireless LAN), Long Term Evolution (LTE) wireless for mobile, IEEE 802.15.4 (Zigbee), G3-PLC, PRIME, HomePlug AV and HomePlug AV2 standards (power line communication), IEC 14443 (RFID), BlueTooth
are exemplary of the tendency of communication experts to select PSK and/or QAM modulations.
(17) On the other hand, it is noted that a protocol using S-FSK modulation may have interesting robustness properties in particular scenarios, such as in the presence of in-band narrow-band interference.
(18) For example, in the case of a single carrier S-FSK system using two frequencies, if an interferer falls in the signal band at one of the two S-FSK frequencies, a S-FSK receiver may use the non-corrupted frequency to facilitate correct reception of a message even if the interferer is much stronger than the signal itself. Conversely, in the case of a PSK- or QAM-based single carrier system a strong narrow-band interferer falling in the signal band may cause the PSK or QAM receiver to be exposed to data corruption.
(19) The advantage of S-FSK modulation discussed above may be perceived and appreciated (only) in a particular scenariosuch as un-balanced SNRs within the two tones. This explains why keeping active two protocols may not be justified, at least at first sight: a priori, one cannot expect to be able to know at what time the scenario favorable to the S-FSK modulation will occur. Also, techniques which may predict and estimate noise may be cumbersome to introduce.
(20) Consequently, the above example referred to S-FSK modulation bears witness to the possibility of using two communication protocols concurrently and taking the benefits of both is an area still deserving investigation.
(21) In the following the general case of two different communication protocols, namely Protocol 1 and Protocol 2, will be considered by way of non-limiting example, being otherwise understood that the discussion (and the embodiments as well) can be extended to more than two protocols.
(22) Also, for the sake of simplicity and ease of explanation, one of the two protocols, hereafter referred as Protocol 2, may be deemed to be generally better than the other protocol, hereafter referred as Protocol 1, being otherwise understood that, in certain particular applications scenarios, Protocol 1 may be better than Protocol 2.
(23) These circumstances may occur in different application scenarios where the advantages associated with the embodiments may be appreciated.
(24) Those of skill in the art will otherwise appreciate that the scenarios discussed herein are merely exemplary and do not limit the scope of the embodiments; also, they are pretty different anda priorinot linked to one another.
(25) In this latter respect, it will be appreciated that features and/or elements discussed in connection with each one of these exemplary scenarios can be transposed to the other scenarios so that a certain feature and/or element discussed in connection with a certain one these scenarios is not to be understood as linked by way of necessity (only) to that scenario.
(26) For instance, a first possible application scenario to which embodiments may apply (as discussed in the following in connection with
(27) Such a solar system may comprise several (photovoltaicPV) solar panels SP1, SP2, . . . , SPk and an inverter I. The inverter I and the panels SP1, SP2, . . . , SPk may include each a communication unit including a modem. The modem may be a DC power line modem capable of communicating signals by re-using the underlying DC voltage lines or via a different physical medium.
(28) Another exemplary application scenario to which embodiments may apply (as discussed in the following in connection with
(29) The monitoring points may be placed in a home HP or outside. The monitoring points HM1, HM2, . . . , HMn may include cameras or sensors and a communication unit. The communication unit of each monitoring point may include a modem that communicates to a modem placed in the local unit LU the information obtained via sensors associated to the monitoring points HM1, HM2 . . . HMn. These modems may be AC power line modems capable of communicating signals by re-using the electrical lines in the home or via a different physical medium.
(30) The central unit CU may coincide with the local unit LU or may be located elsewhere in the case of remote monitoring; in that case the local unit could forward to the central unit a part or all the information gathered from the monitoring units.
(31) Still another exemplary application scenario to which embodiments may apply (as discussed in the following in connection with
(32) The system may include a series of observation points 1, 2, . . . , S. Each observation point may be equipped by different sensors or cameras and a communication unit. The observation points 1, 2, . . . , S may be connected to a central unit C that gathers the traffic information and the communication units in the observation points may include modems that communicate traffic information with a modem in the central unit C. The modems may be wireless modems or power line modems.
(33) Still another exemplary application scenario to which embodiments may apply (as discussed in the following in connection with
(34) One or more embodiments may be based on the recognition that certain types of communicationssuch as those which may occur, for instance, in the exemplary scenarios discussed in the foregoingmay include a subset of messages that are repetitive, that is convey the same information several times.
(35) Such messages can be in the form all is ok or continue to do it or I'm here or keep synchronized. For sure, other repetitive messages with different semantics can be envisaged, such messages being primarily confirmatory messages, whose informative content (entropy) is essentially related to the fact that the message is sent (and received) confirming that a certain situation/condition persists and/or is not (to be) changed.
(36) For instance, in the first exemplary application scenario discussed above (solar panel systems), the inverter I can periodically send to the panels SP1, SP2, . . . , SPk a repetitive message of the kind: power production active, which may be sent both for starting and continuing power generation. If the message is sent periodically, absence of the repetitive message after a certain period may indicate that power production should be halted.
(37) Conversely, non-repetitive messages may be variable in time, in that they may convey contents which vary over time. For instance, these messages may include panel temperature statistics, panel voltage or panel inclination to improve solar power capturing or similar quantities that may vary several times and with different granularity during the day. Essentially, non-repetitive messages convey informative content proper beyond the mere fact that the message is sent/received.
(38) In the second exemplary application scenario discussed in the foregoing (a house monitoring system) a repetitive message could be all is ok, no housebreaking. Again, this is a message whose informative content is essentially related to the fact that the message is actually sent (and received).
(39) In a house monitoring system, non-repetitive messages may be more variable in time and content. Such non-repetitive messages may convey informative content proper beyond the mere fact that the message is sent/received, for instance by conveying information on external and/or internal house atmosphere monitoring (temperature, pressure) for use, for instance, in house air-conditioning, soil moisture monitoring to provide the proper irrigation to an external garden, internal control and use of the household appliances. Also here, non-repetitive messages convey informative content proper beyond the mere fact that the message is sent/received.
(40) In the third exemplary application scenario discussed in the foregoing (a traffic monitoring system) a repetitive message could be no car accident or traffic unit (for instance the traffic lights) operating as expected or traffic unit activated. Once again, these are messages whose informative content is essentially related to the fact that they are sent (and received).
(41) Non-repetitive messages can again be more variable messages in time, whose contents may relate for instance to noise level parameters (for instance an index of the car concentration in the urban traffic monitored area) or to the level of pollution of the area including the characterization of the polluting substances or the road characteristics (ice presence, etc.). Once more, non-repetitive messages convey informative content proper beyond the mere fact that the message is sent/received.
(42) In the fourth exemplary application scenario discussed in the foregoing (is a smart street lighting system), the illumination controller IC may send a repetitive message of the form lights switched-on to the lampposts LP1, LP2, . . . , LPk, . . . , LPn, with the same message possibly sent both for activating and maintaining street lighting. Again, if the message is sent periodically, absence of the repetitive message after a certain period may indicate that lighting should be turned-off. Once again, these are messages whose informative content is essentially related to the fact that they are sent (and received).
(43) Conversely, non-repetitive messages may be variable in time and contents and include, for instance, environment light monitoring and sensing of car traveling through the street in order to optimize the light power and the illumination energy consumption. Once more, non-repetitive messages convey informative content proper beyond the mere fact that the message is sent/received.
(44) One or more embodiments may comprise dual-protocol modem circuits as exemplified in
(45) Such a dual-protocol modem 10, including a first section 101 operating with a first protocol (Protocol 1) and a second section 102 operating with a second protocol (Protocol 2), can be devised, designed and realizedon the basis of the disclosure of exemplary embodiments as provided hereinby relying on principles and criteria which are per se known to those of skill in the art. This makes it unnecessary to provide a more detailed description herein.
(46) One or more embodiments may be based on the recognition that: repetitive messages are intended and configured to be repeated over time with the same form or contents: as noted, the information conveyed by these messages is primarily related to the fact that these messages are sent/received (or not); non-repetitive messages are intended and configured to take a different form or convey different contents over time: as noted, the information conveyed by these messages is primarily related to the actual contents/information conveyed thereby.
(47) In that respect, it will be appreciated that even non-repetitive messages may be (temporarily) sent with identical contents a number of times in a row: this may be the case, for instance, of a parameter (for instance, temperature) remaining constant over two or more subsequent transmissions of the associated non-repetitive message or of re-transmission of a same non-repetitive message in case of unsuccessful communication. That is, the non-repetitive nature of a message as considered herein is primarily determined bythe capabilityof such a message to convey different, variable information contents over time.
(48) Stated otherwise: repetitive messages are repeatedly sent as invariable, (always) identical messages over time, non-repetitive are sent as variable messages, adapted (and expected) to vary over time.
(49) Also, as used herein, protocol is conformant to the conventional classical definition as provided at https://www.britannica.com/technology/protocol-computer-science, that is a set of rules or procedures for sending data between electronic devices, such as computers.
(50) Throughout this description of exemplary embodiments, reference is made for simplicity and ease of explanation to protocols (Protocol 1, Protocol 2) essentially identified and distinguished from each other due to the modulation adopted, for instance S-FSK and PSK or QAM, respectively.
(51) Those of skill in the art will otherwise appreciate that, in one or more embodiments, Protocol 1 and Protocol 2 may be identified and distinguished from each other (only or also) for other features, such asjust to mention two by way of exampleword length and/or encoding.
(52) In one or more embodiments, the second physical communication protocol (Protocol 2) may be a protocol that in the general case is deemed to be particularly suited for use in a certain context (for instance, because it offers generally better communication performance, is more flexible, etc.).
(53) Conversely, in one or more embodiments, the first physical communication protocol (Protocol 1) may be a protocol that, while tailored to support repetitive messages, may be less performant in general (weaker communication characteristics) or less flexible (for instance because it only supports transmission of a limited number of bits). In particular scenarios (the S-FSK capabilities with in-band narrow band interferer discussed in the foregoing may be a case in point) the first physical communication protocol (Protocol 1) may however offer appreciable advantages compared to Protocol 2.
(54) In various operational contexts as those presentedjust by way of possible examplesin
(55) Even without wishing to be bound to any specific theory in that respect, a possible reason for this may lie in that message repetition may somehow palliate the drawbacks/limitations of Protocol 1, thus improving the performance level of Protocol 1.
(56) By way oftentativeexplanation, one may consider the common practice of encoding information sent over communication channels.
(57) Channel encoding is a procedure wherein, in order to protect a message from the effect of channel attenuation and selectivity and noise, controlled redundancy is added by the sender to a message.
(58) For instance, channel encoding can be represented by the following equation:
I=(b.sub.0, b.sub.1, . . . b.sub.n)=>C=(c.sub.0, c.sub.1, . . . , c.sub.m) where: I is the original information to be transmitted and b.sub.j are bits, j=0,1, . . . , n, C is the encoded information where c.sub.k are bits that depend on I and k=0,1, . . . , m with m>n.
(59) At the receiver, the added redundancy is used to correct the errors introduced by the channel and noise.
(60) As is well known to those of skill in the art, there are many ways to add redundancy, for instance an element of C may be the linear combination of some elements of I. A simple method to add redundancy is considering a repetition code that can be obtained by
I=(b.sub.0, b.sub.1, . . . b.sub.n)=>C=(b.sub.0, b.sub.1, . . . b.sub.n, n.sub.0,b.sub.1, . . . b.sub.n, . . . , b.sub.0, b.sub.1, . . . b.sub.n) i.e., the information I is repeated many times according to a certain repetition factor r.
(61) The benefit of coding may be measured, for instance, in terms of SNR gain, i.e. the capability to handle a lower signal-to-noise ratio at the receiver. For instance, repetition codes in a flat channel with additive white Gaussian noise (AWGN) may exhibit a SNR gain which increases with the increase of the repetition factor r: If r=2, the SNR gain is 3 dB If r=4, the SNR gain is 6 dB
(62) In general, If r=m, the SNR gain is 10*log.sub.10(m) dB where log.sub.10, is the logarithm with base 10.
(63) On the other hand, repetition codingby itself, in generalmay be regarded as (largely) inefficient insofar as it may drastically reduce throughput.
(64) At least to some extent, one or more embodiments may be regarded as taking advantage of repetition to render a generally less robust protocol (Protocol 1) at least as robust as another protocol (Protocol 2). For instance a Protocol 1 based upon S-FSK modulation may become even more robust than a Protocol 2 based on PSK or QAM.
(65) As noted, repetition coding is however inefficient per se, due to a possible throughput reduction.
(66) One or more embodiments as exemplified herein somehow go against such a general appreciation by noting that, in various operational contexts as those presentedjust by way of possible examplesin
(67) For instance, knowing that these messages are repeated identically (e.g. as confirmatory messages of a continuing condition or state) may facilitateespecially if these messages are repeated with a certain, fixed perioda Protocol 1 receiver in increasing receiver robustness by combining various occurrences of (identical) information received repeatedly.
(68) For instance, in the case of repetition taking place with a given period, the receiver may synchronize on that periodby resorting to known techniques, such as e.g. PLL trackingand search the expected information (only) during particular time windows.
(69) Also, the fact that repetitive messages are repeatedly sent as invariable, identical signals over time may facilitate receiver operation: the receiver may in fact already know what such repeated signals (expectedly selected from a set including few signals, possibly even just one signal) will look like, with the ensuing possibility of adopting, for instance, matched filter processing or the like.
(70) The Protocol 1 receiver may thus be relieved of the burden of unnecessary activity between a message and its repetition.
(71) Also, as noted previously, Protocol 1 may exhibitin certain circumstances, e.g. in-band interfererscertain intrinsic advantages compared to Protocol 2, so that Protocol 1 can be in fact used also for important messages (that are repetitive).
(72) This is because Protocol 1 may see its robustness improved in comparison with Protocol 2 by benefitting from message repetition, while also possibly retaining certain original advantages in particular scenarios. At the same time, original advantages of Protocol 2 are preserved in sending non-repetitive messages insofar as they are unaffected by the adoption of Protocol 1 for repetitive messages.
(73) One or more embodiments may facilitate using, for repetitive messages, a protocol (Protocol 1) which does not involve a large bandwidth and/or a high signal power to be sent and, particularly, a protocol whichin comparison to Protocol 2involves a narrower bandwidth and/or a lower signal power to be sent, which may be (even largely) beneficial in terms of communication resources. For instance, in one or more embodiments Protocol 1 may be selected as a protocol involving a low power, thus reducing power absorption, which may be suited for transmission e.g. from sensors powered via harvester circuits.
(74) This by also taking into account that, in scenarios such as those exemplified herein, repetitive messages/signals may be predominant (even largely) over non-repetitive messages/signals, in that repetitive messages/signals may be transmitted most of the time (e.g. at relatively short intervals from one another) and non-repetitive messages/signals transmitted less frequently (e.g. at relatively long intervals from one another), if not only seldom or rarely.
(75) For instance, in one or more embodiments, Protocol 1 may be a single-carrier protocol (that is, a protocol involving signal transmission over a single carrier), while Protocol 2 may be a multi-carrier protocol (that is, a protocol involving signal transmission over a two or more carriers).
(76) Also, in one or more embodiments, Protocol 1 (used for repetitive messages) and Protocol 2 (used for non-repetitive messages) may coexistthat is can be both supportedon a same carrier or system by resorting to various solutions known to those of skill in the art: Time Division Multiplexing (TDM) or Frequency Division Multiplexing (FDM) are exemplary of such solutions.
(77) Turning again to
(78) Such a repetitive message can be identically sent both for starting and for continuing power production, with the direction (command) to halt power production possibly conveyed by discontinuing the periodical transmission of that signal.
(79) Of course, such a repetitive message may convey the same semantics with a different arrangement (like power injection uninterrupted) selected out of a gamut of possible options.
(80) As schematically represented in
(81) In one or more embodiments, Protocol 1 may have a fixed number of bits sent while Protocol 2 may be more general purpose, for instance with variable granularity with the number of bits sent.
(82) Also, Protocol 1 may have a limited set of possible messages/message lengths out of which the repetitive messages can be selected.
(83) In one or more embodiments, Protocol 2 may be a more sophisticated protocol admitting a wide variety of possible non-repetitive messages to choose from, possibly with variable message lengths.
(84) By way of example, Protocol 1 may be based on a first modulation, for instance, S-FSK modulation and Protocol 2 may be based on a second modulation, for instance PSK or QAM modulations.
(85) Also, Protocol 1 may be devised for uni-directional communication (for instance, only from the inverter modem 10I to the panel modems 10SP1, 10SP2, . . . , 10SPk).
(86) Conversely, Protocol 2 may be devised for bi-directional communication, e.g. with panel modems 10SP1, 10SP2, . . . , 10SPk capable of answering requests from the inverter 10I or simply acknowledging the reception of inverter messages. Also, as schematically represented in
(87) As noted, both Protocol 1 and Protocol 2 messages may be carried by DC-power lines from the solar panels to the inverter.
(88) The second exemplary application scenario discussed in the foregoing comprises a house monitoring system of a house property HP includingin a manner known per sehouse monitoring units HM1, HM2, . . . , HMn as well as a local unit LU in the house possibly communicating with a central unit CU, e.g. at the police department or a (private) surveillance center SC.
(89) In one or more embodiments, these units may be equipped with respective dual-protocol modems (not expressly visible in the figures for simplicity).
(90) For instance, as exemplified in
(91) For instance, if the message is sent using a periodicity known both at the sender and at the receiver, the receiver in the local unit LU may detect that something is not OK if the message is not received at the expected time (the expected time may be different for the different house monitoring units HM1, HM2, . . . , HMn).
(92) The modem in the local unit LU may use Protocol 1 to run a similar repetitive message communication with a modem in the central unit CU. As noted, the central unit CU may be located at a police department or at a private surveillance center, thus facilitating generating real time alarms (as exemplified in
(93) As exemplified in
(94) In one or more embodiments, Protocol 1 may have a fixed number of bits sent while Protocol 2 may be more general purpose, for instance with variable granularity with the number of sent bits.
(95) Again, Protocol 1 may have a limited set of possible messages/message lengths out of which the repetitive messages can be selected.
(96) In one or more embodiments, Protocol 2 may be a more sophisticated protocol admitting a wide variety of possible non-repetitive messages to choose from, possibly with variable message lengths.
(97) By way of example, Protocol 1 may be based on a first modulation, for instance, S-FSK modulation and Protocol 2 may be based on a second modulation, for instance PSK or QAM modulations.
(98) Also, Protocol 1 may be devised for uni-directional communication from the house monitoring units HM1, HM2, . . . , HMn to the local unit LU and/or from the local unit LU to the central unit CU.
(99) Protocol 2 may accommodate bi-directional communication, with the house monitoring units HM1, HM2, . . . , HMn and the local unit LU exchanging for instance domotics messages.
(100) One or more embodiments may contemplate using Protocol 1 for repetitive messages from the local unit LU to the house monitoring units HM1, HM2, . . . , HMn, an example being a message with semantics surveillance camera(s) active, which again may be used both to turn on the camera(s) addressed and to keep it/them turned on.
(101) For instance, the modems in the monitoring units HM1, HM2, . . . , HMn, may use an in-home power line to communicate with the modem in the local unit LU.
(102) The third exemplary application scenario considered in the foregoing comprises a traffic monitoring system includingagain in a manner known per sevarious traffic observation points (cameras, for examples) 1, 2, 3, . . . , S and a central traffic monitoring unit or center C.
(103) In one or more embodiments, these units may be equipped with respective dual-protocol modems (not expressly visible in the figures for simplicity).
(104) In one or more embodiments, as exemplified in
(105) In one or more embodiments, as exemplified in
(106) Once more, in one or more embodiments, Protocol 1 may have a fixed number of bits sent while Protocol 2 may be more general purpose, for instance with variable granularity with the number of sent bits.
(107) Again, Protocol 1 may have a limited set of possible messages/message lengths out of which the repetitive messages can be selected.
(108) In one or more embodiments, Protocol 2 may be a more sophisticated protocol admitting a wide variety of possible non-repetitive messages to choose from, possibly with variable message lengths.
(109) By way of example, Protocol 1 may be based on a first modulation, for instance, S-FSK modulation and Protocol 2 may be based on a second modulation, for instance PSK or QAM modulations.
(110) Also, Protocol 1 may be devised for uni-directional communication from the traffic observation points 1,2, . . . , S to the central unit.
(111) Protocol 2 may accommodate bi-directional communication, e.g. with the central unit C gathering road and car traffic parameters and possibly sending information to be transferred to signs/displays to assist drivers.
(112) The fourth exemplary application scenario considered in the foregoing comprises a smart street lighting system, includingagain in a manner known per sea number of light radiation sources (e.g. lamp posts) LP1, LP2, . . . , LPk, . . . , LPn controllable by an illumination controller IC in illuminating a street, a road, a square, and so on.
(113) Also in this scenario, the light radiation sources LP1, LP2, . . . , LPk, . . . , LPn and the controller IC In one or more embodiments may be equipped with respective dual-protocol modems (again not expressly visible in the figures for simplicity).
(114) In one or more embodiments, as exemplified in
(115) In one or more embodiments, such a message can be sent with a regular time periodicity starting from a determined hour of the day (for instance after sunset).
(116) In one or more embodiments, as exemplified in
(117) Protocol 2 may also facilitate selective communication of the illumination controller IC even with selected ones of the lampposts, for instance, as exemplified in
(118) Once more, Protocol 1 may have a limited set of possible messages/message lengths out of which the repetitive messages can be selected.
(119) In one or more embodiments, Protocol 2 may be a more sophisticated protocol admitting a wide variety of possible non-repetitive messages to choose from, possibly with variable message lengths.
(120) By way of example, Protocol 1 may be based on a first modulation, for instance, S-FSK modulation and Protocol 2 may be based on a second modulation, for instance PSK or QAM modulations.
(121) Also, Protocol 1 may be devised for uni-directional communication from the illumination controller IC to the lampposts LP1, LP2, . . . , LPk, . . . , LPn.
(122) Conversely, Protocol 2 may accommodate bi-directional communication, with the illumination controller IC and the lampposts LP1, LP2, . . . , LPk, . . . , LPn, exchanging more sophisticated information, possibly related to sensors installed on the lampposts LP1, LP2, . . . , LPk, . . . , LPn. The modem in the illumination controller IC and the modems in the lampposts LP1, LP2, . . . , LPk, . . . , LPn may be connected using the already existing power line backbone of the lighting system.
(123) In one or more embodiments, a method may comprise: providing a communication circuit (for instance, a modem such as 10) for transmitting (for instance, sending and/or receiving) signals conveying information messages, the communication circuit supporting a first communication protocol (for instance, portion lot in
(124) In one or more embodiments, the first communication protocol and the second communication protocol may comprise different modulations for the first signals and the second signals, respectively.
(125) In one or more embodiments, the first communication protocol may comprise FSK modulation, optionally S-FSK modulation.
(126) In one or more embodiments, the second communication protocol may comprise modulation selected out of PSK modulation and QAM modulation.
(127) In one or more embodiments: the first communication protocol may have a longest message length shorter than the longest message length of the second communication protocol, and/or the first communication protocol and the second communication protocol may comprise a single-carrier protocol and a multi-carrier protocol, respectively, and/or the first communication protocol may have a bandwidth occupancy narrower than the bandwidth occupancy of the second communication protocol.
(128) One or more embodiments may comprise transmitting the first signals and the second signals via the communication circuit using for the first communication protocol a signal strength lower than the signal strength used for the second communication protocol.
(129) One or more embodiments may comprise including in the signals a set of the first signals and a set of the second signals, wherein the set of the first signals is less numerous than the set of the second signals.
(130) One or more embodiments may comprise transmitting the first signals and the second signals via the communication circuit via time domain and/or frequency domain multiplexing.
(131) In one or more embodiments, transmitting the first signals and the second signals via the communication circuit may comprise interleaving the first signals and the second signals.
(132) One or more embodiments may comprise transmitting the first signals via the communication circuit using the first communication protocol with a fixed repetition rate.
(133) In one or more embodiments, a device (for instance, a modem such as 10) may comprise a communication circuit configured (see, for instance, the two circuit sections 101 and 102 of the modem 10 of
(134) In one or more embodiments, the device may comprise a modem.
(135) In one or more embodiments, a communication system, may comprise at least one first node (for instance, I, LU, C, IC, or, respectively, SP1, SP2, . . . , SPk; HM1, HM2, . . . , HMn; 1, 2, . . . , S; LP1, LP2, . . . , LPk, . . . , LPn) and at least one second node (for instance, SP1, SP2, . . . , SPk; HM1, HM2, . . . , HMn; 1, 2, . . . , S; LP1, LP2, . . . , LPk, . . . , LPn or, respectively, I, LU, C, IC,), the at least one first node and at least one second node equipped with a device according to one or more embodiments.
(136) In one or more embodiments, a method of operating a system according to one or more embodiments may comprise: sending uni-directional first signals using the first communication protocol towards the at least one first node from the at least one second node (for instance towards I, LU, C, IC from SP1, SP2, . . . , SPk; HM1, HM2, . . . , HMn; 1, 2, . . . , S; LP1, LP2, . . . , LPk, . . . , LPn or, vice-versa, towards SP1, SP2, . . . , SPk; HM1, HM2, . . . , HMn; 1, 2, . . . , S; LP1, LP2, . . . , LPk, . . . , LPn from I, LU, C, IC), exchanging bi-directional second signals using the second communication protocol between the at least one first node and the at least one second node.
(137) One or more embodiments may relate to a combined (for instance, dual-protocol) communication signal comprising (for instance, in a frequency-domain or time-domain multiplexing scheme, e.g. by interleaving the first signals and the second signals) first signals conveying first information messages and second signals conveying second information messages, wherein the first information messages comprise at least one repetitive message having fixed repeated content and the second information messages comprise at least one non-repetitive message having variable content, wherein the combined communication signal comprises a multi-protocol signal including a first communication protocol for the first signals and a second communication protocol for the second signals, the second communication protocol different from the first communication protocol.
(138) Without prejudice to the underlying principles, the details and embodiments may vary, even significantly, with respect to what has been described by way of example only, without departing from the extent of protection.
(139) The extent of protection is determined by the annexed claims.