Method and apparatus for a parallel frequency-mask trigger
10006949 ยท 2018-06-26
Assignee
Inventors
Cpc classification
International classification
Abstract
The frequency-mask trigger unit comprises n trigger machines, where n2, in order to evaluate a total of n signal paths. In this context, the n trigger machines are connected to an evaluation unit. For this purpose, at least one trigger range is transferred to the n trigger machines. Moreover, a plurality of result vectors of a signal under analysis transformed into the frequency domain are transferred via the n signal paths to the n trigger machines. Finally, each of the n trigger machines checks whether at least one of the plurality of result vectors of the signal under analysis transformed into the frequency domain infringes the at least one trigger range.
Claims
1. A method for operating a frequency-mask trigger unit, in order to evaluate a signal under analysis via a plurality of signal paths, wherein the signal under analysis has been converted into the frequency domain, the method comprising: providing at least one trigger range to a plurality of trigger machines; transmitting each of a plurality of result vectors of the signal under analysis via the plurality of signal paths to a respective one of the trigger machines, wherein each signal path connects an output of one of a plurality of transformation units to an input of a respective one of the trigger machines; determining, by each of the transformation units, a Fast Fourier Transform (FFT) via a filter and a delay device; identifying an interferer occurring within an edge region in a spectrum determined by each of the transformation units; and determining, by each of the trigger machines, whether at least one of the plurality of result vectors infringes the at least one trigger range.
2. The method according to claim 1, further comprising: providing a trigger status of each of the trigger machines to an evaluation unit once the respective trigger machine has determined whether the respective result vector infringes the at least one trigger range.
3. The method according to claim 1, further comprising: delaying at least one of the result vectors by at least one system-clock pulse relative to the other result vectors, so that they do not arrive synchronously at the plurality of trigger machines.
4. The method according to claim 1, further comprising a one of the following steps: storing each of the result vectors that is determined as infringing the at least one trigger range in at least one storage unit; and generating a timestamp for each of the result vectors and storing the result vectors with the respective timestamps in at least one storage unit, wherein the timestamp of each of the result vectors that is determined as infringing the at least one trigger range is stored separately in the at least one storage unit.
5. The method according to claim 1, wherein: a plurality of signals under analysis are evaluated via the plurality of signal paths, wherein each of the plurality of signals under analysis has been converted into the frequency domain; and a plurality of result vectors of the plurality of signals under analysis are transmitted via the plurality of signal paths to the plurality of trigger machines.
6. The method according to claim 1, wherein: the plurality of signal paths are evaluated in parallel; and/or the plurality of result vectors provide a time reference to one another; and/or each of the trigger machines processes a respective one of the result vectors; and/or a number of vector elements in each result vector corresponds to the length of the FFT in the transformation units; and/or a trigger status of each of the trigger machines is provided to the evaluation unit once the respective trigger machine has evaluated a last vector element of the respective result vector with regard to the at least one trigger range; and/or the at least one trigger range comprises either a mask that defines an area within a spectrum, or a line, and the at least one trigger range is infringed whenever a vector element of at least one result vector either is disposed within the area defined by the mask, or undershoots or overshoots the line.
7. A frequency-mask trigger unit, for evaluating a signal under analysis via a plurality of signal paths, the frequency-mask trigger unit comprising: a plurality of trigger machines connected to an evaluation unit; and a plurality of transformation units, each configured to configured to determine a Fast Fourier Transform (FFT) via a filter and a delay device; and wherein each signal path connects an output of one of the plurality of transformation units to an input of a respective one of the trigger machines, wherein an interferer occurring within an edge region in a spectrum determined by each of the transformation units is identified, wherein the trigger machines are configured to receive a plurality of result vectors of the signal under analysis via the plurality of signal paths, and wherein each of the trigger machines is configured to determine whether at least one of the plurality of result vectors infringes the at least one trigger range.
8. The frequency-mask trigger unit according to claim 7, wherein each of the trigger machines provides a trigger status to the evaluation unit once the respective trigger machine has determined whether the respective result vector infringes the at least one trigger range.
9. The frequency-mask trigger unit according to claim 7, further comprising: a delay unit configured to delay at least one of the result vectors by at least one system-clock pulse relative to the other result vectors, so that they do not arrive synchronously at the plurality of trigger machines.
10. The frequency-mask trigger unit according to claim 7, further comprising: at least one storage unit; wherein the evaluation unit is configured either (1) to store each of the result vectors that is determined as infringing the at least one trigger range in the at least one storage unit, or (2) to generate a timestamp for each of the result vectors and to store the result vectors with the respective timestamps in the at least one storage unit, wherein the timestamp of each of the result vectors that is determined as infringing the at least one trigger range is stored separately in the at least one storage unit.
11. The frequency-mask trigger unit according to claim 7, wherein: a plurality of signals under analysis are evaluated via the plurality of signal paths, wherein each of the plurality of signals under analysis has been converted into the frequency domain; and a plurality of result vectors of the plurality of signals under analysis are transmitted via the plurality of signal paths to the plurality of trigger machines.
12. The frequency-mask trigger unit according to claim 7, wherein: the trigger machines are arranged in a manner facilitating evaluation of the plurality of signal paths in parallel; and/or the plurality of result vectors provide a time reference to one another; and/or each of the trigger machines is configured to process a respective one of the result vectors; and/or a number of vector elements in each result vector corresponds to the length of the FFT in the transformation units; and/or each trigger machine provides a trigger status to the evaluation unit once it has evaluated a last vector element of the respective result vector with regard to the at least one trigger range; and/or the at least one trigger range comprises either a mask that defines an area within a spectrum, or a line, and the at least one trigger range is infringed whenever a vector element of at least one result vector either is disposed within the area defined by the mask, or undershoots or overshoots the line.
13. A non-transitory computer-readable storage medium carrying one or more sequences of one or more instructions which, when executed by one or more processors, cause an apparatus to at least perform the following steps: providing at least one trigger range to a plurality of trigger machines; transmitting each of a plurality of result vectors of a signal under analysis via a plurality of signal paths, wherein each signal path connects an output of one of a plurality of transformation units to an input of a respective one of the trigger machines, wherein the signal under analysis has been converted into the frequency domain; determining, by each of the transformation units, a Fast Fourier Transform (FFT) via a filter and a delay device; identifying an interferer occurring within an edge region in a spectrum determined by each of the transformation units; and determining, by each of the trigger machines, whether at least one of the plurality of result vectors infringes the at least one trigger range.
14. The non-transitory computer-readable storage medium according to claim 13, wherein the apparatus is caused to further perform: providing a trigger status of each of the trigger machines to an evaluation unit once the respective trigger machine has determined whether the respective result vector infringes the at least one trigger range.
15. The non-transitory computer-readable storage medium according to claim 13, wherein the apparatus is caused to further perform: delaying at least one of the result vectors by at least one system-clock pulse relative to the other result vectors, so that they do not arrive synchronously at the plurality of trigger machines.
16. The non-transitory computer-readable storage medium according to claim 13, wherein the apparatus is caused to further perform a one of the following steps: storing each of the result vectors that is determined as infringing the at least one trigger range in at least one storage unit; and generating a timestamp for each of the result vectors and storing the result vectors with the respective timestamps in at least one storage unit, wherein the timestamp of each of the result vectors that is determined as infringing the at least one trigger range is stored separately in the at least one storage unit.
17. The non-transitory computer-readable storage medium according to claim 13, wherein: a plurality of signals under analysis are evaluated via the plurality of signal paths, wherein each of the plurality of signals under analysis has been converted into the frequency domain; and a plurality of result vectors of the plurality of signals under analysis are transmitted via the plurality of signal paths to the plurality of trigger machines.
18. The non-transitory computer-readable storage medium according to claim 13, wherein: the plurality of signal paths are evaluated in parallel; and/or the plurality of result vectors provide a time reference to one another; and/or each of the trigger machines processes a respective one of the result vectors; and/or a number of vector elements in each result vector corresponds to the length of the FFT in the transformation units; and/or a trigger status of each of the trigger machines is provided to the evaluation unit once the respective trigger machine has evaluated a last vector element of the respective result vector with regard to the at least one trigger range; and/or the at least one trigger range comprises either a mask that defines an area within a spectrum, or a line, and the at least one trigger range is infringed whenever a vector element of at least one result vector either is disposed within the area defined by the mask, or undershoots or overshoots the line.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) Various exemplary embodiments of the invention are described by way of example below with reference to the drawings. Identical subject matters provide the same reference numbers. In detail, the corresponding figures of the drawings show:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
DETAILED DESCRIPTION
(14)
(15) The at least one storage unit 2 can be, for example, a random access memory, which is embodied within the measuring device 1 and provides a very fast data rate. Special flash memories can also be used. As will be explained in greater detail below, the spectrum of the signal 6 under analysis is determined in the central data-processing unit 3 and compared within the frequency-mask trigger unit 50 with at least one adjustable trigger range.
(16) A high-frequency signal 6 under analysis is amplified in its amplitude by an amplifier 7. Following this, the amplified high-frequency communications signal 6 is filtered through a bandpass 8, before it is digitized by an analog-digital converter 9. The digitized high-frequency signal is then stored in the storage unit 2. For example, the storage unit 2 is structured as a fast ring memory. If the signal 6 under analysis is a signal 6 which is broadcast, for example, from a base station, an attenuation element or a coupler, at the output of which a signal with substantially smaller amplitude is present, is used instead of an amplifier 7.
(17)
(18) It is evident that the signal 6 under analysis is transformed into the frequency domain by means of the n transformation units 21.sub.1, 21.sub.2 to 21.sub.n arranged in parallel. As a result of the overlapping, an interferer which occurs within the edge region in one of the spectrum calculated by a transformation unit 21.sub.1, 21.sub.2 to 21.sub.n is less strongly attenuated and can still be securely identified, so that it is possible to speak of a gap-free observation, that is, a real-time observation. At the output of the n transformation units 21.sub.1, 21.sub.2 to 21.sub.n, the result vectors 22.sub.1, 22.sub.2, 22.sub.3, 22.sub.4 are output on the n parallel signal paths 20.sub.1, 20.sub.2 to 20.sub.n.
(19)
(20) As will be explained in greater detail below, the frequency-mask trigger unit 50 according to example embodiments of the invention checks whether at least one of the plurality of result vectors 22.sub.1, 22.sub.2 to 22.sub.m of the signal 6 under analysis transformed into the frequency domain infringes the at least one trigger range.
(21)
(22) An analog-digital converter 9 digitizes the signal 6 under analysis with a sampling rate of, for example, 300 MHz and stores the digitized signal 6 under analysis in the at least one storage unit 2. The at least one storage unit 2 is further connected to a synchronization unit 40. The synchronization unit 40 is once again connected to the individual parallel transformation units 21.sub.1, 21.sub.2, 21.sub.3. As a result of the synchronization, the identical vector elements of the different result vectors 22.sub.1, 22.sub.2, 22.sub.3 are disposed at the output of the different parallel transformation units 21.sub.1, 21.sub.2 and 21.sub.3 with the same vector index with pulse synchronized relative to one another. Simplifications in filtering (resampling), for example, are achieved as a result of the synchronization, because the same filter coefficient can be used on all result vectors 22.sub.1, 22.sub.2, 22.sub.3, and different filter coefficients need not be loaded within one system-clock pulse for the individual result vectors 22.sub.1, 22.sub.2, 22.sub.3. Moreover, a decimation of the individual result vectors 22.sub.1, 22.sub.2, 22.sub.3 to form a single result vector 22.sub.1, 22.sub.2, 22.sub.3 is very readily realized, because no further intermediate buffering is necessary, in order to wait until the same vector element is present in all result vectors 22.sub.1, 22.sub.2, 22.sub.3.
(23)
(24) Following this, the filtered result vectors 22.sub.1, 22.sub.2, 22.sub.3 at the output of the filter unit 51 are supplied via the signal paths 20.sub.1, 20.sub.2, 20.sub.3 to the input of a delay unit 52. At the output of the delay unit 52, the filtered result vectors 22.sub.1, 22.sub.2, 22.sub.3 are present with a delay relative to one another. It is evident that the individual result vectors 22.sub.1, 22.sub.2, 22.sub.3, which are transmitted on the different signal paths 20.sub.1, 20.sub.2, 20.sub.3 provide a time offset relative to one another.
(25) In the exemplary embodiment from
(26)
(27) At least one trigger range is supplied to the three trigger machines 61.sub.1, 61.sub.2, 61.sub.3. This at least one trigger range can be entered by a user with the entry unit 5. However, this one trigger range can also be loaded by the trigger machines 61.sub.1, 61.sub.2, 61.sub.3 from the at least one storage unit 2. Within the at least one storage unit 2, different trigger ranges can be stored. Dependent upon the type of signal 6 under analysis, the trigger machines 61.sub.1, 61.sub.2, 61.sub.3 load the corresponding trigger range from the at least one storage unit 2. If the signal 6 under analysis is, for example, a Global System for Mobile Communications (GSM) signal, the trigger machines 61.sub.1, 61.sub.2, 61.sub.3 naturally only load from the at least one storage unit 2 a trigger range which covers the frequency range in which GSM networks are normally operated.
(28) Such a trigger range can be, for example, a mask, which is defined in the spectrum and can be described in frequency and amplitude by an area. It is also possible for the at least one trigger range to be only a line which is drawn over a given frequency range with a given amplitude. Altogether, several trigger ranges can be plotted. In this context, the trigger ranges can also be displayed on the screen unit 4.
(29) Furthermore, each of the trigger machines 61.sub.1, 61.sub.2, 61.sub.3 checks, for every vector element of every result vector 22.sub.1, 22.sub.2, 22.sub.3, whether the vector element infringes the trigger range or not. The vector elements are the sampled values of the digitized signal 6 under analysis transformed into the frequency domain. The vector elements are also the individual frequency bins which provide a given amplitude. A vector element infringes the trigger range, if the trigger machine 61.sub.1, 61.sub.2, 61.sub.3 determines that the vector element is disposed within a region defined by a mask, or overshoots or undershoots the line which is defined in frequency and amplitude and represents the trigger range. In this context, each trigger machine 61.sub.1, 61.sub.2, 61.sub.3 determines whether vector elements within the result vectors 22.sub.1, 22.sub.2, 22.sub.3 infringe the trigger range. Accordingly, it is also possible for each trigger machine 61.sub.1, 61.sub.2, 61.sub.3 to determine which vector element within the result vectors 22.sub.1, 22.sub.2, 22.sub.3 infringes the trigger range. As soon as each of the trigger machines 61.sub.1, 61.sub.2, 61.sub.3 has checked the last vector element of the result vector 22.sub.1, 22.sub.2, 22.sub.3 against the trigger range, the trigger status is transferred to the evaluation unit 60. If one of the L vector elements within a result vector 22.sub.1, 22.sub.2, 22.sub.3 infringes the at least one trigger range, the corresponding trigger machine 61.sub.1, 61.sub.2, 61.sub.3 outputs the message to the evaluation unit 60 that the trigger has been released. If none of the L vector elements of the result vectors 22.sub.1, 22.sub.2, 22.sub.3 infringes the at least one trigger range, the corresponding trigger machine 61.sub.1, 61.sub.2, 61.sub.3 either outputs no message to the evaluation unit 60, or the message that the trigger has not been released.
(30) In view of the fact that the individual result vectors 22.sub.1, 22.sub.2, 22.sub.3 are delayed by at least one system-clock pulse by comparison with the vector elements 22.sub.1, 22.sub.2, 22.sub.3 which are disposed on other signal paths 20.sub.1, 20.sub.2, 20.sub.3, as described in
(31) In view of the fact that all result vectors 22.sub.1, 22.sub.2, 22.sub.3 which infringe the at least one trigger range are stored in the at least one storage unit 2, these are still available for subsequent evaluation.
(32)
(33)
(34) Following this, the method step S.sub.2 is implemented. Within method step S.sub.2, a plurality of result vectors 22.sub.1, 22.sub.2 to 22.sub.n from a signal 6 under analysis transformed into the frequency domain is transferred via n signal paths 20.sub.1, 20.sub.2 to 20.sub.n to the n trigger machines 61.sub.1, 61.sub.2 to 61.sub.n.
(35) Following this, method step S.sub.3 is performed. Within method step S.sub.3, a check is carried out to determine whether at least one of the plurality of result vectors 22.sub.1, 22.sub.2, 22.sub.n to 22.sub.m of the signal 6 under analysis transformed into the frequency domain infringes the at least one trigger range. This is implemented by each of the n trigger machines 61.sub.1, 61.sub.2 to 61.sub.n.
(36)
(37)
(38)
(39) Within method step S.sub.6.sub._.sub.2, timestamps are generated by the evaluation unit 60 for all result vectors 22.sub.1, 22.sub.2, 22.sub.n to 22.sub.m. These timestamps indicate, for example, at which time the result vectors 22.sub.1, 22.sub.2, 22.sub.n to 22.sub.m have been supplied to the frequency-mask trigger unit 50 according to example embodiments of the invention. Furthermore, all result vectors 22.sub.1, 22.sub.2, 22.sub.n to 22.sub.m are stored in the at least one storage unit 2. Additionally, the timestamp of the result vector which has infringed the at least one trigger range is stored again in the at least one storage unit 2 by the evaluation unit 60. In a subsequent evaluation, all result vectors 22.sub.1, 22.sub.2, 22.sub.n to 22.sub.m of which the timestamp corresponds to the additionally stored timestamps can be loaded from the storage unit 2. This means that, in the subsequent evaluation, result vectors 22.sub.1, 22.sub.2, 22.sub.n to 22.sub.m which are disposed directly before or after the result vector 22.sub.1, 22.sub.2, 22.sub.n to 22.sub.m which infringes the at least one trigger range can also be observed, whereas these result vectors 22.sub.1, 22.sub.2, 22.sub.n to 22.sub.m themselves have not infringed a trigger range. This would not be possible with the method step from S.sub.6.sub._.sub.1, whereas the method step S.sub.6.sub._.sub.2 requires more storage space in the at least one storage unit 2.
(40)
(41) It is further advantageous that all trigger machines 61.sub.1, 61.sub.2 to 61.sub.n are structured in an identical manner and determine all possible trigger statuses for every signal path 20.sub.1, 20.sub.2 to 20.sub.n independently from one another.
(42) One advantage with the delay of the n signal paths 20.sub.1, 20.sub.2 to 20.sub.n is that, within one system-clock pulse, only one trigger status is transmitted to the evaluation unit 60. If there are n signal paths 20.sub.1, 20.sub.2 to 20.sub.n and every trigger machine 61.sub.1, 61.sub.2 to 61.sub.n can output k different trigger statuses, the evaluation unit 60 would have to be capable of processing n.Math.k different messages per system-clock pulse from the n trigger machines 61.sub.1, 61.sub.2 to 61.sub.n. Here, it is very evident that the necessary computational cost within the evaluation unit 60 can be significantly reduced through the introduction of the delay unit 52 according to example embodiments of the invention, because the latter only needs to be able to process one trigger status per system-clock pulse.
(43) The signal path 20.sub.1, 20.sub.2 to 20.sub.n is a connection across which data can be transmitted. If the signal under analysis is sampled with a resolution of twelve bits, the signal path also comprises at least so many individual connections, in order to transmit the twelve bits, that is, the sampling value, within one system-clock pulse.
(44) Within the scope of the invention, all of the features described and/or illustrated can be combined with one another as required. In particular, the dependent claims relating to the method can also be combined with the device claims relating to the frequency-mask trigger unit and vice versa.