Where will IoT Take You?
Join companies like Cox Communications, Comcast, and Google to unlock powerful insights through digital transformation.
Join companies like Cox Communications, Comcast, and Google to unlock powerful insights through digital transformation.
In our first few posts we examined LPWAN and provided an overview of the various LPWAN technologies.
This is the fourth installment in our series providing the definitive guide to a class of IoT connectivity known as LPWAN (low-power wide-area networks).
The first post was an overview of LPWAN, including what it is and the benefits of LPWAN technologies compared to other IoT connectivity options. The second post examined the various LPWAN options and players in the space. The third post gave an overview of one of those options, Ingenu's RPMA. Now we’ll deeper technical dive into RPMA technology.
Ultimately, you’ll know whether LPWAN is right for your IoT application and, if it is, how to best move-forward.
A fair warning: no technical drill down would be complete without, well, getting technical. That being said, we will do our best to explain this well enough that anyone who wants to understand will.
In the RPMA overview article we centered around two main ideas for RPMA—coverage and capacity—and the factors that branch off of them. In that article, we talked about how coverage is what you need to in order to provide the network.
From a network provider perspective, a wireless technology’s coverage per base station determines the cost to deploy a network, because the number of base stations needed to cover an area directly affects cost. And of course, as users, we simply expect coverage to be there, reliably. Any shortcuts here and we, as users, take our business elsewhere.
Interestingly, coverage also impacts battery life which we’ll dive into a bit more later. Capacity is what determines how many devices can connect to a given tower and thus its profitability for a network provider. For the user, capacity is what determines how well the network works, how secure it is, and how rich the users’ experience is. In this article we’ll take each of these factors and show how RPMA’s performance in each is a direct result of technical choices when developing the technology.
RPMA’s physical layer uses a technology called Direct Sequence Spread Spectrum (DSSS). It started off being implemented in highly secure military applications and was made commercially available in 3G cellular technology (e.g. CDMA, W-CDMA).
As found in this article, there are several ways to deal with interference. One way is to find spectrum with no interference, that’s called licensed spectrum and is very expensive. Another way is to send the signal more powerful than the noise. A third approach is to blend in with the noise--and this is what DSSS does:
Some wireless protocols [like DSSS] simply blend in with the noise. The signal is scrambled in a way that makes it look like noise, even though it isn’t. You take the message and a unique string of characters (or gold code) and run them through a special mathematical function. The function then scrambles the message in a way that to anyone receiving it on their end, it looks just like noise. It’s randomized, scrambled, such that it can be unscrambled on the other end only if you have that code. So if you are some random person looking at the frequency range on which that message has been sent—and who doesn’t love doing that in their spare time right?—all you’ll see is static. The noise floor will have raised just a hair, almost imperceptibly.
RPMA’s implementation of DSSS is pretty extreme. The tradeoff that spreading presents is that the more a message is spread the longer it takes to receive the message. CDMA was able to successfully do it and still support voice—which requires very little delay or latency—within milliseconds. Since the link data rate of LPWA IoT devices require data rates significantly below voice data rates, Ingenu was able to spread the signal even more when developing RPMA. In other words, it takes longer for a message to get through (in the order of seconds rather than milliseconds) and that message is smaller than those spread on 2G. Of course, increasing latency in some way is an approach that all LPWAN technologies make and really defines the class of technology.
As such, Ingenu was in position to crank that “knob” really hard. That knob is called processing gain and is simply the increase in link budget one gets by allowing for spreading the signal more. Link budget is an important concept that helps compare various wireless technologies’ ability to provide coverage regardless of the underlying approach or even band (like 900 MHz vs 2.4 GHz) as it accounts for all of this. To borrow from Wikipedia:
A link budget accounts for all of the gains and losses from the transmitter, through the medium (free space, cable, waveguide, fiber, etc.) to the receiver in a telecommunication system. It accounts for the attenuation of the transmitted signal due to propagation, as well as the antenna gains, feedline and miscellaneous losses.
In short, link budget is how you compare coverage capability between any two wireless technologies. Like a financial budget, the more you have, the more you have to spend. And in the case of link budget, the more you have, the more you have to spend on wider or deeper coverage. Ingenu claims to have the most link budget out of all the LPWAN technologies, with 177 dB. What’s nice about link budget is it’s a technical metric that cuts through any marketing hype. It is what it is and accounts for all gains and losses.
To see how RPMA uses the processing gain “knob” in an extreme way, it helps to compare to cellular CDMA. Whereas cellular CDMA and W-CDMA have 18 dB of “processing gain” or 64 chips per coding symbol, the DSSS Ingenu implements has 39 dB of “processing gain” or 8192 chips per coding symbol. In simpler terms, the RPMA waveform can be spread 128 times as much as cellular CDMA. However, RPMA doesn’t necessarily spread every signal to this extreme, it is simply available for use. This flexibility is what helps provide reliability in RPMA’s protocol. Most of the time RPMA transmits using the lowest amount of spreading, but when necessary, as more interference is present, RPMA simply spreads the signal out more. Much of RPMA’s coverage comes from this extreme use of processing gain in its implementation of DSSS.
One of the advantages that DSSS offers and that RPMA leverages fully is that signals sent over the protocol look like noise to one another. They also look like noise to other users of the same frequency. This is what makes DSSS inherently “immune” to interference because it works and looks like interference already. It isn’t completely immune, obviously, but it can deal with much more noise and interference than other LPWAN technologies. In fact, RPMA can detect signals even when it is 2000x quieter than the noise itself. Most technologies, including other LPWAN technologies must have signals louder than the noise, while RPMA can have the signal 2000x quieter than the noise. This is part and parcel of choosing DSSS and extreme spreading. That isn’t the whole story of course, but it’s a good foundation to build on. This ability to send and detect many signals simultaneously without impairing each other explains how RPMA is able to have such high capacity.
From the same article mentioned before:
Paradoxically, because the signals look like noise to each other as well, you can actually send many, many messages at the same time on the same frequency without them interfering with one another. …So while each individual message may take longer, you can send an entire batch of messages simultaneously and ultimately get more messages through over the same time period than by the other means.
RPMA takes full advantage of this and demodulates 1000 messages at the same time. This is the “multiple access” or “MA” part of RPMA.
Now we’ll get a bit more into the nitty gritty on exactly how RPMA demodulates so many messages simultaneously.
RPMA uses a 1 MHz channel and divides it into time slots called frames. These frames are very long when compared to traditional cellular frames that tend to be measured in tens of milliseconds, not seconds. Since RPMA was designed for these small data transactions, Ingenu chose a Time Division Duplex (TDD) approach. RPMA precisely understands the uplink channel conditions—how much interference there is— by measuring the downlink channel just before sending a message. This is uniquely possible for RPMA due to a fundamental phenomenon known as “channel reciprocity,” which is only valid in TDD approaches where the uplink frequency is the exact same as the downlink frequency. Even slight changes in frequency can have very different channel conditions. If conditions are bad, RPMA increases the spreading and transmit power, if they are good, it decreases the spreading and transmit power.
Controlling the transmit power RPMA uses is called open loop power control. In open loop power control, the endpoint measures the downlink received power and uses that to determine the uplink transmit power without any explicit signaling from the access point/base station. This is important because even very slight changes in frequency can have very different channel conditions. Not knowing the precise channel conditions can lead to a big hit in uplink capacity (when signals come in too strong) or reliability of the data (when signals come in too weak).
Transmit power control combined with the 1000 simultaneous message overlap enabled by DSSS gives RPMA its capacity. The way the transmit power control improves capacity is very important because it also impacts battery life and scalability—or the ability to service more devices by adding base stations. When the RPMA protocol performs its open loop power control it is adjusting the uplink transmit power to be just enough to get the signal through but not so much that it uses capacity on base stations other than the one with the best channel conditions. This improves battery life because endpoints only use as much power as necessary and no more. It improves capacity because it only takes up capacity on the base station it is communicating with.
The RPMA slot is visualized in the figure. The downlink slot comes first and the uplink slot adjusts its power based on the signal strength of the downlink message. Because the base station always transmits downlink at the same power, the receive strength of the downlink message is used to calculate how clear the channel is and thus how much power the uplink message should be sent with. If the channel is clear the signal comes in at a greater power and comes in with lower power if not as clear.
While this article can’t detail every part of RPMA, there are a few important technology choices that contribute to the outcomes discussed in our overview article. First, the RPMA protocol operates on the 2.4 GHz band. This is concerning to many, but as hopefully made clear, is not an issue because of the inherent immunity to interference that DSSS has.
Additionally, the 2.4 GHz band has some very favorable regulatory conditions. Other approaches, like those used by RPMA’s competitors, have time limits in both FCC and ETSI areas along with several others. Because RPMA uses DSSS and has a wide enough channel (1 MHz) it may transmit as long as it needs to. This allows it to do the extreme spreading described earlier. Other protocols must be on only 1% of the time (in ETSI domains like Europe) or less than 400ms (in FCC domains like the United States or Australia). Additionally, because the RPMA channel is only 1 MHz wide, it is able to fit snugly in between the Wi-Fi channels. In other words, RPMA is a neighbor to Wi-Fi, they aren’t trying to squat on the same land—or frequency in this case. RPMA can have 11 channels outside of the Wi-Fi bands. And even if they did share the same frequency, because RPMA looks like noise to everyone else on the band, it’s able to still operate alongside Wi-Fi if the need ever arose.
A couple of other important protocol pieces are important as well. All RPMA protocols use something called forward error correction (also known as channel coding) as well as interleaving, and industry standard convolutional coding. Here are some definitions as provided by Wikipedia:
Forward error correction (FEC) or channel coding is a technique used for controlling errors in data transmission over unreliable or noisy communication channels. The central idea is the sender encodes the message in a redundant way by using an error-correcting code (ECC).
In telecommunication, a convolutional code is a type of error-correcting code that generates parity symbols via the sliding application of a boolean polynomial function to a data stream. The sliding application represents the 'convolution' of the encoder over the data, which gives rise to the term 'convolutional coding.' The sliding nature of the convolutional codes facilitates trellis decoding using a time-invariant trellis. Time invariant trellis decoding allows convolutional codes to be maximum-likelihood soft-decision decoded with reasonable complexity.
Interleaving is frequently used in digital communication and storage systems to improve the performance of forward error correcting codes. Many communication channels are not memoryless: errors typically occur in bursts rather than independently. If the number of errors within a code word exceeds the error-correcting code's capability, it fails to recover the original code word. Interleaving ameliorates this problem by shuffling source symbols across several code words, thereby creating a more uniform distribution of errors. Therefore, interleaving is widely used for burst error-correction.
These three in combination provide incredible robustness to interference that happens in bursts, or sudden blasts of interference. This is also how each and every message is acknowledged. RPMA uses a Reed-Solomon decoder, which, for simplicity, means that the message stops sending after enough is sent for the entire message to be decoded. This drastically reduces the amount of time a message is sent, improves robustness and thus improves coverage and battery life simultaneously.
In summary, RPMA does multiple things to be robust to noisy, interference prone environments:
These combine to give RPMA robustness that also directly impacts capacity and battery life. Battery life is improved because the message does not need to be resent and also may be sent using a lower transmit power. It improves capacity for the same reasons. These also provide built-in message acknowledgement for every message.
Let’s dive just a little deeper and take a look at the “random” part of Random Phase Multiple Access. As will be explained, the key to this protocol is in the “R”, random. By random, we do not mean pseudo-random which is a term typically used in spread spectrum which means a sequence that looks random, but is actually agreed upon by both ends of the link. We mean fully random. Part of RPMA’s secret sauce is the fact that there is no need for any coordination between the ends of the link (the base station and the endpoint) – in other words, RPMA needs no scheduling.
Let’s start with the endpoint’s role in the RPMA protocol. You will see that none of the steps below require any scheduling coordination between each end of the link:
The result as shown in figure below: RPMA is capable of supporting demodulation of typically 1,000+ unscheduled and fully overlapping signals.
Remember, the base station has no knowledge of the intentional delays that the individual endpoints are adding. Thus, the base station tries to demodulate signals at every possible chip delay possibility (or hypothesis). In other words, each chip offset time that is possible must be treated as if a signal is actually coming. Each chip hypothesis is de-spread, de-interleaved, Viterbi decoded, and then checked via a cyclic redundancy check (CRC) by the base station. Again from Wikipedia:
A cyclic redundancy check (CRC) is an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data.
The difference of this scheme to a more conventional scheme is that more often than not, the CRC will indicate failure. In a conventional scheme, that usually means that the attempted transmission was received in error. In our system, it usually means that there actually was no attempted transmission that happens to land at that particular chip offset. This “blind demodulation” yields protocol efficiency and simplicity for the entire communication system.
It is wasteful of battery resources to power a transmitter to operate at the highest spreading factor in all cases. Typically, a far smaller amount of “processing gain” than maximum is required to close the link. The maximum 8192 spreading factor should be reserved only for those few percent of endpoints that may need the full link budget some fraction of the time.
One other advantage of minimizing spreading factor and hence, maximizing data rate, is Doppler robustness. As explained by Wikipedia:
The Doppler effect (or the Doppler shift) is the change in frequency or wavelength of a wave (or other periodic event) for an observer moving relative to its source.
This impacts wireless technologies that are moving by essentially changing the channel on the transmission! It’s like turning on the radio and the channel keeps changing. Robustness to the Doppler effect is what gives RPMA mobility support. The signal is able to get through fast enough that there isn’t time to shift.
To review the RPMA scheme:
Note that the processing requirement of the base station has now become considerably more intense. There must be additional outer loops where multiple spreading factors are attempted: in powers of two from 512 to 8192 and at all possible sub-slots associated with each spreading factor. As a result, the base station doesn't need to know in advance which spreading factor the node will select because the base station brute-forces its way through all spreading factors, at all sub-slots, and at all chip x 2 arrival hypothesis.
The same figure above shows multiple signals from various users at a variety of spreading factors all being received simultaneously by the base station. The result is a simple capacity model: ~1000 PDUs received per frame regardless of:
RPMA is a bi-directional protocol, and we’ve only discussed the uplink side. RPMA actually has two downlink channels. The first is a broadcast channel (BCH), which is used for code downloads for things like firmware upgrades (including security upgrades). The second is the dedicated channel (DCH) for RPMA’s high capacity downlink. It's noteworthy that RPMA’s ever-present broadcast channel provides additional capacity that is always available for broadcasting information such as firmware downloads, multicasting information to multiple destinations simultaneously, and asynchronously interacting by the network with a node. Thus, broadcast/multicast/paging capacity is always available in addition to the dedicated channel capacity.
The above figure shows this resultant frame structure. The frame structure contains 4 sub-slots as shown. This is required because the maximum downlink spreading factor is 2048. Thus, to create a 50% duty cycle, RPMA chose a frame structure with four consecutive sub-slots on the downlink. The BCH is thus 4 “messages” signaled back-to-back at the fixed maximum spreading factor and known gold code. Thus, the BCH serves as that predictable and understood waveform that the node may acquire upon.
The endpoint will signal what downlink DCH spreading factor (SF) is required on a frame-by-frame basis in the range of 16 chips per coding symbol to 2048 chips per coding symbol at the most robust modulation. By minimizing the spreading factor of the DCH, the maximum amount of data may be packed into the frame. Relatively few endpoints require the most robust 2048 chip-modulation mode and a conservative average SF is 32 chips per coding symbol.
Downlink capacity is very precious. To preserve that capacity, the network must always know which base station the endpoint is listening to at any given moment such that a network-initiated request can be successfully received by that endpoint so that multiple base stations aren’t trying to send to the same endpoint and thus reduce the overall network capacity.
There are other parts of the technology that we simply don’t have time to dive into. Some of these include:
As this article has shown, RPMA is a sophisticated LPWAN technology. Its use of extreme spreading while using DSSS give category leading link budget and thus its coverage. DSSS combined with forward error correction, interleaving, and convolutional coding enable robustness to interference. The RPMA channel, at 1 MHz is also placed as a neighbor to Wi-Fi and fits in between Wi-Fi channels. Even if they were on the same channel the nature of DSSS and how it makes its signals look like noise means RPMA is able to comfortably exist in very heavy interference areas.
The DSSS used by RPMA allows for many signals to be sent and received simultaneously (because they look like noise to each other) and puts the “multiple access” or MA in RPMA. This multiple access scheme combined with very precise transmit power control give RPMA its capacity and scalability. Transmit power control and the use of its robustness features (FEC, etc) extend its battery life as the signal is transmitted very quickly using less battery. These also have message acknowledgement as an inherent feature so that status of every message is known. The flexible spreading factors that transmit power control enable also provide robustness to the Doppler effect that results when transmitters are moving. This is what enables RPMA’s mobility support.
January 15, 2020