enabling technologies development grant · pdf file(510) 643-1440 uc-ciee.org ... (aiss)c...

116
California Institute for Energy and Environment Energy Research and Development Division FINAL PROJECT REPORT ENABLING TECHNOLOGIES DEVELOPMENT GRANT PROGRAM Final Report 2002-2015 Appendix J JUNE 2015 CEC-500-2016-011-APJ Prepared for: California Energy Commission Prepared by: California Institute for Energy and Environment University of California

Upload: hakien

Post on 27-Mar-2018

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

California Institute forEnergy and Environment

California Institute forEnergy and Environment

E n e r g y R e s e a r c h a n d De v e l o p m e n t Di v i s i o n F I N A L P R O J E C T R E P O R T

ENABLING TECHNOLOGIES DEVELOPMENT GRANT PROGRAM Final Report 2002-2015 Appendix J

JUNE 2015 CEC-500 -2016-011-APJ

Prepared for: California Energy Commission Prepared by: California Institute for Energy and Environment University of California

Page 2: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

APPENDIX J Appendix J: Appendix 4: Network Agility and Management for Demand Response/Sensor Networks

Page 3: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

2087 Addison Street, 2nd Floor Berkeley, CA 94704-110

(510) 643-1440 uc-ciee.org

California Institute forEnergy and Environment

Network Agility and Management for Demand Response/Sensor Networks

Final Project Report September, 2007 Prepared by CyberKnowledge and University of California, Berkeley Prepared for CIEE Enabling Technologies Development Program Program Manager Gaymond Yee

Page 4: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

1.0 INTRODUCTION

1.1. Introduction: Future Proofing Demand Response Infrastructure

Demand Response (DR) is a set of mechanisms that provides electricity customers in both

retail and wholesale electricity markets with a choice whereby they can respond to dynamic

or time-based prices or other types of incentives by reducing and/or shifting usage,

particularly during peak periods, such that these demand modifications can address issues

such as pricing, reliability, emergency response, and infrastructure planning, operation,

and deferral. There is growing consensus at both the state and national levels of the

importance of Demand Responsiveness and the complementary role of energy efficiency in

achieving California and national energy policy imperatives.

Ongoing Demand Response Enabling Technology Development (DRETD) [Yee 2003]

research efforts are targeting New Thermostat and New Meter devices, equipped with

sensors and nominal communication capabilities, and designed for use in residential homes

[Arens-Wright]. Concomitantly, several of the Investor Owned Utilities (IOUs) in California

are at various stages in the deployment of the next generation of Advanced Metering

Infrastructure (AMI).

In order for the Utilities (IOUs) and the California Independent System Operators (CAISOs)

to deploy, provision and manage such devices, it is necessary to have an appropriate

service, network management and communication infrastructure that enables

communication with these meters and sensor nodes in the field in a scalable and reliable

fashion. There is often a large sunk investment in legacy communications/networking

infrastructure and back-end systems that support them. It is therefore very attractive for the

utilities and ISOs to seek an architecture that allows them to maximize their return on

investment. Ideally, for maximum cost-effectiveness, a network vision should

accommodate existing (legacy) infrastructure, while harvesting the benefits of evolving

communications technologies in three dimensions:

� Evolution in home networks and in-building networks that target

communication inside the home or enterprise;

� Evolution in wired/wireless access networks, in the form of medium-range

mesh networks, local area networks, and metropolitan area networks; and

� Evolution in wired/wireless backhaul networks and wide area networks.

16

Page 5: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

1.2. Project Objectives

The long-term goal of the research described here is to provide a basis for future-proofing

the Demand Response network, minimize stranded assets, and preserve investment in

software platforms, while enabling deployment of newer low cost hardware platforms in

an incremental fashion. More specifically, this research is aimed at exploring emerging

technologies in the domain of agile radios, with a view to leveraging these advances, as

well as ongoing potentially disruptive changes in spectrum regulatory policy, in the context

of the Demand-Response network architecture.

In order to progress towards these long term objectives, it is important to understand the

requirements of applications and systems in the Demand Response context, the overall

capabilities of emerging technologies and their projected timeline, and develop an

architecture that meets these capabilities.

1.3. Section Outline

This section provides a brief background for the current research effort, related to Network

Agility and Management. A brief background related to DR (Demand Response) and AMI

(Advanced Metering Infrastructure) is provided in Section 1.2. The project objectives are

described in Section 1.2. Background related to Sensor networks is provided in Section 1.4.

The problem that is addressed by this research is described in Section 1.5. Some of the

benefits of having Agile Nodes are summarized in Section 1.6. Section 1.7 summarizes the

overall organization of the remainder of this report.

1.4. Background: Sensor Network Architecture: Subsystems and Networks

Figure 2 depicts at a high level some of the subsystems and networks comprising the

Demand-Response Network Architecture that we will use as a basis for our discussion.

These are briefly described below.

� Sensors, Sensor Clusters and Sensor Networks.

To begin with, there is a collection of sensors and actuators at the user premises,

also referred to as the “Home/Enterprise Building” level. Examples include

temperature sensors, and a thermostat/control system that regulates the airflow in

heating/cooling ducts via registers and that controls various appliances such air

conditioners and water heaters.

Depending on the size of the installation, the number and types of sensors

deployed, their geographic distribution, and other relevant factors, it can be useful

to group together some of these sensors/actuators to form a number of sensor clusters

(and perhaps even a hierarchy of sensor clusters).

17

Page 6: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

� Cluster gateway node(s)

Each sensor cluster can have a cluster gateway node that acts as the proxy for that

cluster. Analogously, the entire sensor network at the building level can have a

network gateway node. In a residential context, a “neighborhood gateway node”

may serve a group of homes in a neighborhood.

� Building gateway node(s)

The Home/building control subsystem may be comprised of one or more building

gateway nodes, sensors for different attributes (such as temperature, light,

humidity, etc), and enterprise monitoring & control subsystems. Further, the

building network gateway node will typically have scaleable LAN/WAN

connectivity, usually via an appropriate access network, either wireless or wired.

Examples of typical access networks include

o Wired networks such as DSL, Cable, Leased line, Passive Optical Networks

(PONs)

o Wireless networks, such as 2/2.5/3/nG, …, and 802.11x networks, as well as

Mesh networks in the licensed and unlicensed bands.

� Backhaul Networks

The access networks provide connectivity to backhaul networks. Examples of

Backhaul networks include:

o Private Enterprise Networks, e.g., leased lines/Wide Area Networks.

o Public Internet

� Other Networks

Eventually, the backhaul networks provide a link to the enterprise networks owned

and operated by customers of the DR Network, such as Investor Owned Utilities

(IOUs) e.g., PG&E, Power generators and Independent System Operators (ISOs).

These customers need to be able to deploy, provision, manage, and control the

network services, broadcast or multicast pricing information, load characteristics,

etc., and (selectively) obtain data from various end users for local processing on

enterprise back end systems.

18

Page 7: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

Figure 1 Fragment of an Example AMI deployment for a utility (Courtesy SCE)

35

Demand-Response Network Architecture: Representative Subsystems & SubnetworksDemand-Response Network Architecture: Representative Subsystems & Subnetworks� Building level (“User premises”)

� Scalable Sensor clusters/ Sensor network

� Cluster gateway node(s)

� Building control subsystem with communication

� Building gateway node(s)– Home meter

– Enterprise monitoring & control system

� Scalable LAN/WAN connectivity in the building gateway node

� Access networks

� Wireless e.g., Mesh networks (Licensed/unlicensed bands), 2/2.5/3/nG, …

� Wired e.g., DSL, Cable, Leased line, PON, …

� Backhaul

� Private Enterprise Networks, e.g., leased lines/WANs, QoS

� Public Internet

� Other networks

� Enterprise networks

� SCADA networks

ClusterGateway

Node

SensorNodes

Sensor

Cluster

Network

Gateway

WAN

Client Data

Browsing/

Management/

Processing

Data Service

SCADA

Figure 2. Examples of Subsystems & Networks in a Sensor-Network Based DR Architecture

1.5. Problem Addressed. Relevance in the Demand-Response (DR) context

When Demand-Response (DR)/sensor networks are deployed in the field, they will employ

multiple sensors (e.g., temperature and light sensors), multiple devices (e.g., control

19

Page 8: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

thermostats, home meters), and multiple wired and wireless networks with various Air

Interface Standards (AISs)c (AIS’s are synonymous with wireless protocols). Further, the

number and nature of consumer/wireless electronics devices and associated wireless

infrastructure and standards continues to evolve at a rapid pace. It is necessary to have the

ability to design, deploy, provision, and manage these networks, services and devices on an

ongoing basis. The complexity of these tasks is vastly increased because of the need to

accommodate multiple, differing radio/air interface standards; the need to manage a

multiplicity of devices, many with configurable software, radios, and firmware; and the

need to accommodate different service deployment contexts (e.g., variations in the number

and nature of sensors and control/communication devices, different types and levels of

services provisioned, etc.).

This research relates to following enabling technologies in this context:

� Technologies that enable a (flexible) gateway node to serve as a bridge between the

growing variety of sensors on one hand, and the still expanding array of Wide Area

Networks (WANs) and Metropolitan Area Networks (MANs) on the other hand;

and in particular, technologies that enable Network/Spectrum (RF)/AIS Agility.d

� Technologies that support key aspects of Network Service Deployment &

Management. Some of the functionality we investigate in this context relates to

enhanced life-cycle management for devices, and the ability to remotely provision

devices.

1.6. Benefits of agile nodes in the context of DR networks: The 10x10 Target

It is useful to frame the potential benefits that may be gained from the development and

eventual deployment of the technology explored in this proposal in the context of the ten-

fold improvement in functionality and cost targeted by Demand Response Enabling

Technology projects.

Demand-Response Networks accrue several direct benefits from employing agile

communication nodes, including

c An Air Interface Standard or AIS is a term used to refer to a standard wireless protocol used for communicating

over a radio interface. Examples of Air Interface Standards in the unlicensed frequency bands include the IEEE

802.11b standard for wireless LANs operating in the 2.4GHz band, the IEEE 802.15.4 standard for low power

low data rate communications operating in the 2.4 GHz band, and the IEEE 802.11a standard for wireless LANs

in the 5 GHz band. Examples of AISs in the licensed frequency bands include the standards for cellular

technologies such as GSM, CDMA, WCDMA, CDMA2000, etc.

d AIS agility refers to agility with respect to Air Interface Standards (AISs), i.e., the ability to adapt to various

wireless protocols, and in particular, be able to communicate using more than one wireless protocol.

20

Page 9: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

� The ability to support configurable, software-defined radio nodes. This makes it

possible to ride the (reducing) cost curve in hardware deployments in new

buildings and homes, while enabling software service deployment platforms to be

reused. Additionally, this enables

o Software download of new, enhanced (1) radio functionality; (2) service

functionality;

o Policy defined management and operation of DR networks.

� The ability to leverage evolving new technology in agile radios.

� The ability to have access to a diversity of wireless channels, and use the best

available wireless/network channel.

� Improved redundancy at the system and network level, by virtue of having access

to more than one transit network for communication. These options can be used to

transmit and receive data, as well as to transmit and receive control signals.

� The ability to deploy and manage new services across such networks.

� The ability to adapt the network dynamically to reflect business processes and

network policy.

� The ability to leverage new spectrum policy that is projected to evolve significantly

over the next several years.

� The ability to obtain the best possible network rates.

Thus, the use of agile, software-defined radio nodes can provide a superior ability to

manage, upgrade and provision new services. The advantages of establishing an open,

modular, common service deployment platform include: broad acceptance of the

technology, and potential standardisation, resulting in lower development and acquisition

costs. In addition, this technology can help reduce stranded assets by supporting legacy

radio/sensor interfaces, while “future-proofing” deployments (within pragmatic limits) and

reducing operational costs by enabling software download of new radio functionality, and

enhanced services. As a consequence, the capabilities enabled by the proposed research

and the cost efficiencies obtained will meet the 10x10 functionality and cost improvements

goals of the DRETD project.

21

Page 10: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

Relevance to Demand-Response Research Opportunity Notice

As a point of reference, this proposal spans the following DR Enabling technologies listed

in the Network Management Research Opportunity Notice [Yee 2003].

� Channel Agility

o Technologies that can dynamically determine the best communications

medium, and adapt to the RF frequency (spectrum) of that medium.

� Adaptive Protocols

o Technologies that can dynamically determine the best communications

medium, and adapt to the protocols of that medium.

� Network Operation/Management

o Technologies to permit management of the network in a distributed manner.

1.7. Report Organization

The remainder of this report is structured as follows. Section 2 describes the project

research related to the investigation of stakeholder perspectives and use case scenarios,

leading to the articulation of system requirements. Section 3 summarizes the project

research related to Agile Radio Nodes. Section 4 delineates how agile networks can

interface to Utilities and Service Providers on the one side, and to sensor networks on the

other side. Section 5 reviews the benefits for California as a result of this research and its

follow on. Finally, a glossary and a set of appendices include a summary of background

information intended to improve the readability of this document.

22

Page 11: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

2.0 PROJECT OUTCOME: STAKEHOLDER PERSPECTIVES & SYSTEM

REQUIREMENTS

2.1. Introduction

This section examines representative scenarios that arise in different contexts related to

Demand Response systems, and that can arguably benefit from agile functionality. These

scenarios are then amalgamated to identify a useful set of features in a system that supports

network agility.

The goal of the work related to use case scenarios is

� To identify the representative stakeholders in the DR ecosystem, and to articulate

the perspectives of various participants or “actors” in the Demand Response

context, and

� To use these perspectives as a basis for defining the system level requirements and

technology capabilities that are needed in order to enable the envisioned use cases.

More specifically, our objective in this research is to identify the desired functionality

related to network agility and sensor/device management that benefits these use cases from

a DR perspective.

2.1.1. Section Outline

Section 2.2 provides a brief background relating to use cases in systems engineering.

Section 2.3 identifies representative stakeholders in the DR business ecosystem and

summarizes the perspectives of these stakeholders. Section 2.4 elaborates on the role and

usefulness of Agile systems in the context of DR/AMI.

2.2. Use Cases: Role in Systems Engineering

In software engineering and system engineering, use cases provide a technique for

capturing functional requirements of systems and systems-of-systems. Each use case

provides one or more scenarios that convey how the system should interact with the end

users or other systems to achieve a specific business goal or function.

The overall goal of developing use case scenarios is to assemble a set of desired system

attributes that need to be considered in developing a specification of system requirements,

capabilities of subsystem components, and a detailed system architecture.

Use cases focus on what the desired behavior should be, rather than how this behavior is

achieved; the latter, i.e., a description of how a desired function may be achieved, is a

23

Page 12: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

function of the system architecture, and requires a more detailed elaboration, analysis and

implementation process. The architectural elaboration entails trade-offs between various

dimensions/attributes of the design such as function, performance, cost, robustness,

power/energy consumed, etc. An overlay of this information with the evolution of

technology and the prioritized attributes of the system requirements can suggest a useful

architectural roadmap.

2.3. Representative Stakeholders and Perspective in the DR Ecosystem

Representative stakeholders relevant in the Demand Response context include the

following (Figure 3):

� Utilities/Service providers (such as PG&E, SCE, SDG&E, etc.) and CAISO

(California Independent System Operators)

� Communication Network Operators (providers of WANs, MANs, wired and

wireless networks)

� (Communication) Spectrum Regulators (e.g., FCC, NTIA)

� Energy Regulators (such as the CEC, CPUC)

� Home networking (Consumers)

� Equipment providers (such as thermostat manufacturers like Honeywell, GE, etc.)

� Component suppliers (third party hardware and software providers)

Demand-Response

(/AMI)

Consumer

(Residential,

Commercial)

Service Provider

{Utility, 3rd party}

Network Operator

{Utility, 3rd Party}

Equipment Vendor

{e.g., Thermostats,

Meters, …}

Component Vendor

{SW/HW

components}

Regulators

Energy: CEC, CPUC, …

Spectrum: FCC, NTIA, …

Network

Equipment

Vendors

System

Requirements

24

Page 13: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

Figure 3 Use Case Scenarios: Actors/Perspectives in the Demand Response Context

We have developed and/or investigated use case scenarios that are relevant from the

perspectives of some of these stakeholders. This section summarizes our research on these

perspectives.

The overall objective of our research task was to articulate and then aggregate the

requirements drawn from these perspectives. During a subsequent architectural analysis,

we will categorize these requirements in terms of the implementation trade-offs and cost-

performance benefits. Such requirements may be categorized based on their perceived

degree of “criticality” to stakeholders: must-have, nice-to-have, not needed. The envisioned

result is a set of functions that the system can support, and that is of interest to the

stakeholders.

2.3.1. Demand-Response (DR) Deployment Scenarios

Demand Response (DR) entails transmitting emergency signals (such as critical

peak pricing and mandatory curtailment signals) and price signals to the user, with the

expectation that the consumer will respond appropriately. It is planned that such signals

will be transmitted in real-time or near real-time. The intent is to enable the

utility/California ISO to communicate emergency and pricing signals to the user; the return

channel from the user to the utility can be used for confirmation and/or transmitting other

information of relevance, e.g., power usage data. As a consequence, in the Demand-

Response context, there is a need to have at least a 1-way (and preferably a 2-way)

communication between the utility and a control point at the customer premise/residence.

This control point/system will likely be a component in a distributed,

programmable control thermostat. At the time of the writing of this report, various

California utilities (IOUs) such as PG&E, SCE, SDG&E are contemplating potentially

disparate sets of technologies that might be rolled out in the context of an AMI

deployment.e This scenario suggests the need to have a somewhat harmonized operational

perspective from the standpoint of California ISOs. Even within the announced plans for

each specific utility, there is the possibility of multiple technologies being deployed.

e Private communication, from Ron Hofmann, Gaymond Yee, and other IOU stakeholders.

25

Page 14: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

Utility Owned

Consumer Owned

Private Fixed NetworksWAN/LAN

Anyintervalmeter

orpole-topcollector

PSTN/DSL/Cable/SatelliteWAN/LAN

2-way2-way

Any gateway (protocol xfr)

•Special box•Internet modem•Router

•Media PC•Security panel

• ……..

HAN Protocols³ZigbeeZ-wave

InsteonWi-Fi

EIA709HomePlugBluetooth

2-wayT24 PCT

RDS/FM or pager broadcast

1-way

2-way

HAN access using expansion port

Sub-meter

Appliances

Display Devices

1.e.g., 802.11b, proven mesh LAN protocol, etc.

2.To be determined

3.Up to 45 active protocols worldwide

Broadband TV, music

2-way

2-way

2-way

• interval energy• time

• billing start time• peak power• messages• acknowledgements

• price signals• reliability signals

RF-TX1

PLC-TX²

and/or

Third-Party Provider

Third-Party Provider

Third-Party Provider

Third-Party Provider

2-way

2-way

Figure 4 A Plausible deployment scenario for DR/AMI including a Gateway and PCT

(Programmable Communicating Thermostat) (Courtesy Ron Hofmann)

For example, in the case of SCE, the current vision calls for an AMI infrastructure

that will use ZigBee to communicate between the AMI Home Energy Meter (owned by

SCE) and the home network (potentially including some form of programmable control

thermostat). However, there is the realization that multiple technologies may very likely be

used within the home, and there is a need to extract the appropriate information from the

different devices that are relevant to SCE, and communicate this to the SCE AMI meter

using Zigbee. At this stage, SCE has not decided on the communication infrastructure that

will be used to connect AMI to the SCE backend, except to acknowledge that this will

require a substantial investment. PG&E is in the process of deploying AMI in its territory,

and is exploring various options for interfacing to the home network and evolving PCT

technology. Also, to the best of our knowledge, SDG&E’s strategy is somewhat similar to

that of SCE.

The perspectives discussed above suggest that there is a need for:

� Network and communication agility at many different levels; for example, at the

home gateway level and at the neighborhood gateway level. Agility in the home

gateway can allow for adaptation to specific home devices and communications

mechanisms in the home, and for the evolution of wireless protocols over time.

26

Page 15: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

Agility in the neighborhood gateway node can additionally enable adaptation to

various alternative backhaul channels; such agility has benefits because of

increased reliability due to additional backhaul channels, and because the

lowest cost channel can be chosen at any point in time. In addition, there is

benefit to having agile architectures in the infrastructure, for example in the

wireless basestations; indeed, wireless carriers are already in the process of

assessing and deploying such capability. Furthermore, even terminal devices

can benefit from agility in that many emerging portable devices need to support

multiple protocols, for example, WiFi, Bluetooth, Cellular (GSM, CDMA,

UMTS), Mobile TV, WiMAX, and UWB.

� A distributed, open architecture to support the different paradigms that are

likely to be adopted by the various stakeholders.

Questions that need to be addressed in this context include, for example:

� Will the DR communication infrastructure use an existing mechanism, such as a

narrowband/broadband connection into the house; or will a “new” mechanism

be employed in the context of the Energy grid? Plausible examples that have

been considered include a paging network/system, and data embedded in FM

channels (RDS) that has been experimented with in the context of PCTs

(Programmable Communicating Thermostats).

� If so, how will this communication layer interface to the AMI/utilities?

� How will the CEC/CAISO/CPUC deal with the multiple networks and

mechanisms? What should be legislated and/or standardized? And conversely,

what should be left unspecified so as to encourage innovation and competition

in the industry?

2.3.2. Utilities and (Energy) Service Providers

From the perspective of service providers, the following capabilities are important.

� Capabilities for provisioning new services.

� Capabilities for remotely monitoring, managing and controlling components of

the network, including devices at home and the home meter.

� Capabilities for upgrading software in the network. Such software can be used

for upgrading device capabilities, customer services, as well as for “patching”

(repair) of bugs in equipment that has already been deployed in the field.

27

Page 16: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

If an agile software platform capability is available, then the associated set of capabilities

for upgrading/modifying software/radio characteristics, intelligently leveraging and

trading-off different channels of communication, etc. are important. Further, additional

service-specific capabilities defined by the service providers are also relevant.

2.3.3. Regulatory Perspective

There are two disparate sets of regulatory agencies whose charter and perspectives are

relevant in the context of network agility in DR networks.

� Energy regulatory agencies, such as the California Energy Commission (CEC) and

the California Public Utilities Commission (CPUC) are concerned with Energy

efficiency and Demand/Response capabilities, for instance, and need to be able

mandate/legislate appropriate policies and standards, and then oversee the roll out

of these mandates and all subsequent enforcement as appropriate.

o It is arguably beneficial to develop a vision, reference designs and proofs of

concept in order to first provide an initial demonstration of functionality that

is achievable and cost points that may be feasible, and second, to provide a

platform that can be used as a basis for further development by industry.

o The attendant technical needs relate to supporting Demand-Response

capabilities mentioned earlier, and also for supporting monitoring and

enforcements of aspects of security and privacy.

� Communication regulatory agencies, such as the Federal Communications

Commission (FCC) and National Telecommunication and Information Associationf

(NTIA) are chartered with regulating the wireless communication spectrum in use

within the USA. (Analogous agencies exist in other countries worldwide.)

o The FCC is interested in being able to specify and mandate/legislate

spectrum policies in various public, commercial and military domains.

Agile/cognitive radio architectures need to be both responsive to such

policies and respectful of primary users in any part of the spectrum.

o One of the main requirements for regulatory agencies such as the FCC is the

specification and certification of the radios. Having radio characteristics

modifiable in the field is an arena that is very nascent, and the modalities of

f NTIA is the President's principal adviser on telecommunications and information policy.

28

Page 17: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

certification need to be fully understood, and mechanisms to support the

agency charters need to be developed.

2.3.4. Consumer perspective

There continues to be an explosion in the number of consumer devices at home and the

enterprise, and a concomitant evolution in standards. From a consumer’s perspective, the

high level system requirements are related to ease of use, interoperability, the ability to

seamlessly switch between various networks (personal area networks, local area networks,

wide area networks, metropolitan area networks, and alternative networks), provide the

least cost anytime anywhere service, provide the required quality of service where needed

(e.g., in media and control interactions), and support the desired levels of privacy and

security at affordable price points. A number of these requirements can leverage agile radio

platforms, particularly when they meet the required cost points and power points. In the

interim, they can more immediately be used in infrastructure components, such as base

stations and home gateways.

2.3.5. Equipment Providers/Vendor Perspective

Vendors here nominally include end equipment vendors, as well as hardware and software

component suppliers for these vendors. From the perspective of a vendor, it is important to

be able to address the system level requirements, while having a reusable set of

components that can be leveraged in different markets. Typically, different markets are

characterized by variances in standards, and consequently the ability to adapt a common

set of building blocks to the varying set of local requirements is crucial for business

sustainability.

2.4. The Role of Agile Systems in the Demand-Response/AMI context

To make some of the preceding discussion more concrete, we delineate in this section a

basic scenario that has representative components of a Demand-Response infrastructure. In

the context of such a scenario, we illustrate different ways in which an agile radio platform

can be used.

Figure 5 depicts a residence (synonymously, customer premise) that includes home

gateway node, an energy meter normally located on the outside of the house/building that

is owned and controlled by the Utility/Energy service provider, and a thermostat within the

house (typically owned by the homeowner) that nominally controls existing heating and

cooling systems.

The vision for the Advanced Metering Infrastructure deployments being considered is that

the older generation of energy meters will be replaced by new next-generation energy

29

Page 18: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

Meters. It is envisioned that these new energy meters will be connected to the utility and

controlled by them, and provide benefits in various dimensions, including support for

automated meter reading, operations, maintenance and diagnostics, real-time or near real-

time meter reading, etc.

Next generation thermostats, envisioned to eventually replace existing thermostats, are

designed to accept inputs from sensors (such as temperature, humidity, lighting levels,

etc.), and have actuator outputs that control various household appliances such as HVAC

systems and pool pumps. Such devices are currently evolving in the research domain, and

are likely to be mature and be deployed in various forms over the next few years.

A short-to-intermediate term approach to enabling Demand Response for consumers that is

currently being considered entails the introduction of a “Programmable

Communicating/Control Thermostat” (PCT) that is designed to replace a conventional

thermostat. The PCT is designed to have a communication channel with the Utility/ISO.

This communication channel can be designed to be one-way (from the utility or CAISO to

the PCT) or two-way (i.e., consisting of a bi-directional channel between the utility/CAISO

to the PCT). DR related signals, such as pricing signals, as well as DR-emergency signals,

are communicated by the utility/CAISO to the PCT at the customer premises. The PCT is

then designed to take the appropriate action, e.g., monitor and/or control (via actuators)

HVAC equipment. In principle, the communication and control can potentially span a

much broader set of home appliances.

Given such a context, some of the utility plans and roadmaps project a communication link

between the meter and a gateway in the home network. In particular, the SCE (Southern

California Edison) plan requires a Zigbee link between the meter and a point within the

home. (Our understanding is that it is not mandated that this Zigbee link exist between the

gateway and all other devices, merely that the gateway should be able to talk to the AMI

meter.)

30

Page 19: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

Utility/Service Provider

Internet

EnergyMeter

Sensors

HouseholdAppliances

HomeNetwork Gateway

Node

Gateway

Node

Thermostat

(PCT)

Advanced Metering/Demand-Response (DR) Context

Figure 5. Advanced Metering Infrastructure and Demand Response Context

A typical residential gateway (or home gateway) is a hardware device that connects a home

network with a wide area network (WAN) or the Internet. The residential gateway

provides port translation, allowing all the computers in a small home network to share one

IP address and Internet connection. The residential gateway may sit between the modem

that interfaces to the external wide area network and the internal network; alternatively, a

modem may be integrated into the residential gateway. A residential gateway often

combines the functions of an IP router, multi-port Ethernet switch and WiFi access point.

Residential gateways that include routing capabilities are converged devices and

sometimes referred to as home routers or broadband routers with "broadband" in this case

referring not to the router function but the Internet access function.

Our focus here is on the capabilities of a home gateway node that has (or interfaces to) a

modem which connects to a wireless wide area and/or home area networks. Current

examples of wireless wide area networks supported include “broadband” wireless access

networks supporting either WiFi access or WiMAX protocols; they also include cellular

wide area networks, such as those provided by commercial cellular operators, e.g., GSM,

CDMA, WCDMA. (Niche applications interface to lower bandwidth paging networks or

other proprietary networks.) Traditionally, such a gateway node is designed to support a

single wide area access protocol on both the wide area and home network side (or

occasionally, a small number of preselected and hardwired frequencies and protocols). We

31

Page 20: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

refer to such a traditional gateway node as a non-agile wireless gateway, and suggest that

that the addition of agile functionality to such a node can be extremely valuable in the DR

context.

2.4.1. Communication Mechanisms using traditional (non-agile) Wireless

gateway

Figure 6 illustrates some of the communication mechanism(s) that would need to be

supported within a home by a conventional (non-agile) wireless gateway if it were

designed to communicate with representative sensors and other devices that have evolved

just over the past few years.

� A microclimate multi-sensor node (MEP410CA) that was introduced by Crossbow

(www.xbow.com) used a 433 MHz Radio, and a proprietary protocol. If this sensor

node were deployed in the house, the control gateway would need to have a radio

that implemented this proprietary protocol, using a radio in the 433 MHz band.

� Several manufacturers, such as Toshiba, have introduced, over the last few years,

appliances such as Washer-dryers, Air conditioners, and microwave ovens, which

include support for Bluetooth technology. In order to communicate with and

control such devices remotely, the Bluetooth standard would have to be supported

by the gateway. It is also relevant to note that Bluetooth standards themselves have

undergone several evolutions since they were introduced, and have gone through at

least three major changes. (The most recent of these involves the adoption of the Ultra

wide band technology as then next generation radio standard for Bluetooth

devices.)

� The third example shows a recent “MICA” mote that uses the ISM 2.4 GHz band, an

IEEE 802.15.4 radio, optionally running the Zigbee stack. In order to communicate

with this device, the gateway would need to support the IEEE 02.15.4 standard and

the Zigbee layer.

These examples highlight the fact that several “attractive” wireless technologies and

protocols have evolved, just over the last five years (during 2000-2005). If a conventional

non-agile gateway were to be used, it would be restricted to communicating over only one

of these protocols. More sophisticated non-agile gateways would at most be capable of

communicating with a small, fixed subset of such protocols. Furthermore, neither of these

classes of gateways would be capable of being upgraded after deployment, thus rendering

them of limited value once newer devices were added to the home.

32

Page 21: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

EnergyMeter

Sensors

HouseholdAppliances

HomeNetwork

?

DR

Gateway

?

DR

Node

•433 MHz Radio

•Proprietary Protocol

433 MHz

Proprietary

Radio Protocol

?

DR

Node

•2.4GHz ISM band

•IEEE 802.15.4/

ZigBee™ radio

2.4 GHz

IEEE 802.15.4 PHY

Zigbee Stack

TOSHIBA

Bluetooth Enabled

Dryer,

A/C, Microwave, …

?

DR

Node

2.4 GHz

Bluetooth Radio

& Protocol Stack

Others standards: e.g.,

2.4 GHz/5.x GHz

IEEE 802.11 a/b/g/I/n/…, Z-wave, …

Traditional (Non-Agile) DR Gateway Node: Communication within the Home.

Several (Incompatible) Deployment Alternatives just during (2000-05) would have resulted in “Stranded”

devices/HW/SW/…, meters, infrastructure, …

Figure 6. Communication within the home using non-agile gateway nodes:

Multiple protocols require multiple nodes, and flexibility after deployment is lost.

2.4.2. Residential Communication Mechanisms using Agile Wireless gateways

Figure 7 illustrates how a single agile gateway node can be used to communicate with the

array of disparate devices alluded to above, using an assortment of air interface standards

(in Figure 6). Such an agile gateway node would have to be provisioned with the ability to

communicate using the protocols of interest, namely the proprietary 433 MHz protocol for

the MEP410CA, Bluetooth, and Zigbee. It would also need to have a radio that is capable of

operating in the 433 MHz band, and the 2.4 GHz band.

The important point to note is that these capabilities can be provisioned after the initial

deployment of the gateway device, with the assumption that agile device is equipped with

adequately configurable radio capabilities, and is capable of being programmed remotely.

The significance of the ability to provision new radio capabilities and modify functionality

after deployment is that it mitigates the need for physical “truck-rolls” that are traditionally

required for this purpose. It also enables software upgrades to be provided when needed,

without requiring a physical visit to the customer premises, or by the customer to the utility

offices. Another measure of the importance of such a capability is the observation that

business plans in the communication and cable industry are often rendered unviable if

multiple visits are required to customer premises after initial installation. The elaboration

of such capabilities and scenarios, along with investigation of enabling technologies is the

task addressed by this project.

33

Page 22: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

EnergyMeter

Sensors

HouseholdAppliances

HomeNetwork

?

DR

Gateway

•433 MHz Radio

•Proprietary Protocol

433 MH

z

Proprie

tary

Radio P

rotocol

•2.4GHz ISM band

•IEEE 802.15.4/

ZigBee™ radio

2.4 GHz

IEEE 802.15.4 PHY

Zigbee Stack

TOSHIBA

Bluetooth Enabled

Dryer,

A/C, Microwave, …

Agile

DR

Node

2.4 GHz

Bluetooth Radio

& Protocol Stack

Others, e.g., 2.4 GHz/5.x GHz

IEEE 802.11 a/b/g/I/n/…

Multiple Protocols can be remotely provisioned/downloaded

� Dramatic reduction in “Stranded” devices/HW/SW/infrastructure, …

Agile DR Gateway Node: Communication within the Home

Figure 7 Communication within the Home using Agile DR Gateway Nodes:

A single agile node, appropriately provisioned, can communicate over multiple protocols

2.4.3. External Communications: Leveraging Radio/Network Agility

This figure illustrates the relevance and usefulness of radio and network agility in the

context of communications external to the home.

EnergyMeter

Sensors

HouseholdAppliances

HomeNetwork

?

DR

Gateway

?

DR

Node

•2.4 GHz Radio

•IEEE 802.11b

2.4 GHz

IEEE 802.11b

?

DR

Node

2.5/… GHz

IEEE 802.15.4 PHY

Zigbee Stack

?

DR

Node

PCs

Mobile

cellular or satellite link

•2.5/3.5/5.8

GHz Radio

•IEEE 802.16

•WiMAX

800-900 MHz

1.8-1.9 GHz

2G, 3G,

CDMA, WCDMA,

UMTS,

IEEE 802.11 a/b/g/I/n/…

(Non-Agile) DR Gateway Node: External Communications WAN/LAN/MAN

Several (incompatible) Deployment Alternatives (2000-05)

���� Stranded HW/SW, meters, infrastructure, …

34

Page 23: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

Figure 8. Applications of Agile Platform for communications external to the home

Several wide area and metropolitan area technologies have evolved over the last few years.

Examples include:

� Prevalent and evolving standards used for cell phones, in various bands spanning

800, 900, 1800-1900 MHz, such as GSM, CDMA2000, UMTS, and WCDMA to name

just a few.

� Metropolitan and local area networks based on various incarnations of 802.11

b/g/n/… technology in the ISM 2.4 GHz and 5 GHz bands.

� And more recently, WiMax technology in the 2.5 GHz, 3.6 GHz, and 5.8 GHz bands

is being promoted as an attractive alternative for deploying wireless wideband

services.

A conventional gateway design for a home/customer premises device would need to select

one technology for external communication, such as WiMax or 802.11g. It would then be

incapable of using other potential alternatives that might be evolved and potentially

provide better performance or lower cost.

As illustrated earlier in the case of communication needs within the home, having an agile

radio platform that supports network agility can alleviate the pain (financial and functional

costs) caused by this category of problems.

2.4.4. Summary: Agility is very relevant in the DR/AMI context

The scenarios considered above suggest that there is a significant advantage to be gained in

terms of future proofing, capital cost reduction, and ongoing operational costs if an agile

radio platform is used. The caveats are that technology needs to fully mature, and achieve

the needed cost and performance points. The specific trade-offs are dependent on the

context of deployment. We believe that this technology is appropriate for infrastructure

and longer-term deployments.

The requirements are for the agile radio platform to support the different frequency bands

of interest, and the potential networks of interest. At one extreme of this spectrum is a

completely general Software defined/cognitive radio, that supports a ultra wide frequency

bands of operation, and completely flexible baseband operation. At the other extreme are

fixed function radios. In between lie pragmatic points that reflect an engineering

compromise between what is cost-effective at a given point in time, while taking into

consideration the business requirements for the planned time scale(s) of deployment. For

example, some of the utilities believe that the life span of the AMI/DR infrastructure is on

35

Page 24: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

the order of 15-20 years (at least!). It is the thesis at Southern California Edison (SCE) that

the Zigbee standard will survive over the course of their envisioned deployment lifecycle of

15-20 years. However, there is a distinct possibility that Zigbee itself may not be that long

lived, and that it might be useful to incorporate additional flexibility in a system that

supports, for instance, operation on different protocols in the 2.4 GHz band and the

provision for software upgrades to modulation schemes.

A more ambitious approach would be to be to expand this to a 2 or more frequency bands

of pragmatic interest, and consider the technical challenges that arise in building solutions

in this context. This is the approach initially explored in this project.

2.4.4.1. DR and AMI Requirements: Agility in the Short-to-Intermediate term

In the intermediate term, it is arguably useful to be able to support agility in the 2.4 GHz

bands, between protocols such as 802.11b/g (WiFi), 802.15.4/Zigbee, Bluetooth and others.

Additionally, frequency agility that spans the 800/900 ISM band, with support for Zigbee

and other baseband/protocol stacks is beneficial; there are several proprietary standards

that are also prevalent in these bands. Other emerging alternatives include Ultrawideband

(UWB) technologies for indoor communication, and WiMAX for external communication.

Indeed, the new generation of Bluetooth radios has adopted one of the UWB standards for

their radio technology [Bluetooth-UWB].

2.5. Demand Response Use Case Scenarios: Summary

We include here a synopsis of use case scenarios that are drawn from a vision for Demand

Response over the next several years.

2.5.1.1. Account Provisioning

When the customer calls the utility to activate an account, the customer service

representatives nominally go through an automated pre-service interview. The interview

gathers the basic information to support their billing process. It also asks a few very simple

questions to identify any medical or other special circumstances that might exempt the

customer from the Stage 2 involuntary curtailment of their HVAC systems. Identifying

customer locations with critical medical information also allows the utility to assign a

higher priority to preventative maintenance and outage incidents.

If it is indicated that medical monitoring equipment would be present, the customer service

representative can authorize a medical exemption to Stage 2 involuntary curtailment of the

customer’s HVAC systems. This authorization may cause a capacitor-activated radio

frequency identification (RFID) tag to be printed on the new customer Service Initiation

Checklist. This RFID tag may potentially be designed to be good for one use after which it

would become inactive and unusable. The RFID tag in this scenario functions like an

36

Page 25: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

exemption key, however it would not become active until the PCT received its first

“Price/Test Signal”.

The Price/Test Signal was dispatched by the utility (or California ISO) several times each

hour. This signal provided the actual price included in the default CPP rate, so in effect it

acted like a real-time price. The signal also included location specific information designed

to allow the targeting of control and price/emergency actions on individual substations and

feeders, a time stamp to continually synchronize the PCT and data concentrators

supporting their advanced metering (AMI) data collection effort, and other maintenance

information used by utility field crews to support preventative and outage restoration.

The price signal information also was used to support utility and third party information

services like real-time customer displays of usage and actual cost.

The use of PCT’s and the ability to assign individual exemptions provided the utility with

tremendous flexibility to dispatch very limited HVAC curtailments, control a substantial

amount of load and generally avoid supply or congestion induced events that in the past

might require rotating outages. The involuntary HVAC curtailments dispatched in prior

Stage 2 alerts rarely reduced customer usage as much as the original air conditioner load

control programs.

Using basic occupancy information and the customer’s address, the utility may also be able

to call up the electricity usage history from her home or condo’s prior owner. This

information provided them with the information they needed to include estimated billing

and savings information on the Service Initiation Checklist they would send to the

customer.

2.5.2. Consumer Networking

The consumer electronics arena continues to be inundated with devices for a wide variety

of purposes. Examples include a rich spectrum of cell phones, audio and video players such

as the iPod™ and iPhone™, continually evolving home entertainment devices, new

variations of personal computers and storage appliances, as well as advanced home

automation controls and related appliances.

In addition to the proliferation of devices, there is increasing wireless connectivity and

sophistication in such connectivity.

A desirable top-level goal from a consumer’s perspective is to have seamless connectivity to

devices, and be able to access services and applications at any time, at any place, when the

need arises.

37

Page 26: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

The technical requirements entailed by this include capabilities such as handoffs between

vertical and horizontal air interfaces, as well as for quality of support, service discovery,

personalization, etc.

2.6. End-to-End reconfigurability

It is increasingly the case that a user (consumer or application) operates in heterogeneous

environments, including heterogeneous communications systems, and using

heterogeneous devices.

� Examples of heterogeneous environments include: home, enterprise, automobile,

shopping malls, trains, airplanes, etc.

� Examples of heterogeneous communications systems include: a wide variety of

wired, wireless, and optical technologies, such as WiFi, LANs, DSL, Cable, 2G, 3G,

4G systems, DVB, mesh networks, etc. supported by a variety of management

systems and operations systems.

� Examples of heterogeneous devices include: a spectrum of mobile phones, PDAs

(Personal Digital Assistants), personal computers, consumer networking and

entertainment devices, etc.

The goal of a system that is reconfigurable from “End-to-end” is to provide a seamless

experience to the end user (consumer or application) by leveraging reconfigurability

(synonymously, agility) at different levels of the system.

38

Page 27: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

1CKI ©

Utility/Service Provider

Internet

EnergyMeter

Sensors

HouseholdAppliances

HomeNetwork

Gateway

Node

Agile

DR

Node

Heterogeneous Environments

Heterogeneous Devices

Heterogeneous Systems

Dynamic

Resource

Management

Ubiquitous AccessOther Access

NetworksIP

Infrastructure

Multiple

Administrative

Domains

WLAN

WiMaX

4G

DVB

DAB

Others

Services

End-to-end Reconfigurability –Leveraging Agility & Enabling a seamless experience

Figure 9 End-to-End reconfigurability: Leveraging Agility and Enabling a Seamless Experience

We next elaborate on the system requirements for End-to-End system configurability.

2.6.1. Service Level Agreements (SLAs)

A service level agreement permits the parties involved to establish the minimum

performance criteria for service provision and the actions that will take effect if the service

does not meet these criteria.

System requirements related to Service Level Agreements that are suggested include the

following:

1. It that recommended that a reconfigurability service level agreement be established

between different actors of the system.

2. It is necessary that a roaming agreement exist between network operators. For

example, if some information needs to be conveyed between two elements in the

system, such an agreement would ensure that there would be no disruption in the

event of an intermediate network segment being replaced, or swapped in or out,

whether for business or technical reasons.

39

Page 28: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

3. In the case of a software download within a network operator domain, it is

suggested that a Service Level Agreement should exist between the network

operator of the subscriber and the entity responsible for the software download.

4. An SLA agreement should exist between the network operator of the subscriber and

the software provider.

2.6.2. Security Capabilities

In case of upgrades of one or more elements of the system, the equipment reconfiguration

must be performed securely. Some system level requirements that are focused on security

are listed below.

� As an overarching requirement, it is essential that the reconfiguration process should be

performed securely.

� In the case of reconfigurable equipment reconfiguration, the subscriber must be

appropriately authenticated.

� In the case of a third party reconfigurable equipment upgrade, the reconfiguration

support service provider should be authenticated both by the equipment and the

subscriber.

� In the case of reconfigurable equipment upgrade, the equipment should be

authenticated by the entity responsible for the upgrade.

� In the reconfiguration process, all actors involved must be able to identify

themselves to each other.

� The equipment must be authorized to perform the reconfiguration process, either

implicitly or explicitly.

� (Privacy) The personal data, user profile and equipment profile stored in the

reconfigurable equipment must be protected from unauthorized access.

� There must be a way for the certification entity to be able to guarantee the software

is reliable, if required.

� There must be a process for the regulator(s) to investigate/evaluate the software, if

required.

� It must be possible to verify the origin of the software before the installation is

performed.

40

Page 29: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

� The integrity of the software to be downloaded must be verified before installation.

� Prior to installation, it must be verified that the software operates properly.

� The detection-control mechanism implemented in the reconfigurable equipment

must not be modified by entities not authorized to do so.

2.6.3. Interference related Capabilities

Protection from the possible interference coming from badly reconfigured equipment must

be provided. The specific requirements related to interference mitigation are listed below.

� In the case of the existing configuration of the reconfigurable equipment not being

supported (permitted) in a certain area, the equipment must not start a transmission

until it has received or gathered information on what frequency is usable.

� There must exist, at the system level, a mechanism to detect if a reconfigurable

equipment is causing interference with other equipments or is operating incorrectly.

� There must exist, at the system level, a mechanism to correct behavior where

reconfigurable equipment is causing interference with other equipment or is

operating incorrectly.

� A mechanism must be provided to the network operator for disconnecting or

shutting down the transmission of any equipment.

2.6.4. Download Capabilities

There must exist mechanisms that allow the equipment to obtain a software module and

download it in order to reconfigure to a new configuration in a new wireless network. This

section lists some of the mechanisms that are required.

� A mechanism must be implemented that enables to ask for user download approval

before download.

� There must exist a mechanism that enables the software download to be billed to

the user.

� In case of a massive download, a mechanism should be provided to the operator to

perform the scheduling and control of the download process in order to avoid

network congestion.

� At any time of the download process, it must be possible to stop the process.

� Analogously, at any time of the download process, it must be possible to suspend

the process so it can be resumed later. As a complementary capability, it must be

possible to resume an interrupted download.

41

Page 30: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

2.6.5. Equipment Reconfiguration

Reconfigurable equipment must be able to change its configuration including operating

parameters by means of software (such as frequency, modulation or transmitted power)

autonomously or without any external maintenance. Requirements in this context are listed

below.

� It is desirable that standardized (“Open”) interfaces exist that allow for the

development and provision of reconfiguration software for reconfigurable

equipment.

� Any user-specific preferences must be accessible by the user to modify the

reconfiguration possibilities.

� It must be verified that all the necessary software components for the

reconfiguration are available.

� It must be checked that the reconfigurable equipment will support the new

configuration before the reconfiguration process is initiated.

� The reconfiguration process of the network equipment must be performed and

controlled by the network operator.

� The software may require the approval of actors of the system before it is installed

in the equipment.

� After download, installation and reconfiguration, the successful completion of the

process must be verified.

� After successful installation, a test should be performed to check the new

configuration; the results of the test will confirm the new configuration (otherwise it

could initiate a recovery process).

� After the reconfiguration the reconfigured equipment must perform to

specifications with the rest of the system.

� In the case of equipment upgrade, the download must be rolled back to its previous

configuration if the upgrade does not succeed.

� The reconfigurable equipment must be able to return to a known stable

configuration.

� The reconfigurable equipment must be able to return to the original configuration.

� At any time of the reconfiguration process, it must be possible to suspend the

process so it can be resumed later.

� At any time of the reconfiguration process, it must be possible to cancel the process.

� The system shall include reconfigurable equipment management building on, and

compatible with, legacy device management.

� The capacity to reconfigure elements must not introduce performance degradations

compared to legacy equipment.

42

Page 31: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

� The system should accommodate different classes of capabilities in the network

elements so as to perform optimal or near optimal reconfiguration.

� A reconfigurable element should enable the equipment manufacturer to be

upgraded, if so permitted by the user profile.

� Information related to equipment capability (both static and dynamic) should be

accessible by the network.

� Open interfaces must be provided for ensuring future evolution and/or migration of

the system.

� There must be a mechanism for handling service synchronization and optimizing

service access time during equipment reconfiguration.

2.6.6. Reconfiguration Management Capabilities

The end-to-end reconfiguration control management actions are assumed to be carried out

by a Reconfiguration Manager. The reconfiguration process might be initiated either by the

user equipment or by the network. The Reconfiguration Manager is a virtual entity that is

not required to be an independent component, but that can be conceptualized is used in

order to facilitate the expression of the requirements.

� The reconfiguration of protocol stacks supporting a mode of operation must be

performed dynamically, without shutting down the processor or the operating

system.

� Reconfiguration execution should be transparent to the user.

� Reconfiguration must be performed without any loss of information and without

user perceived disruption.

� Both user equipment and network should be able to initiate a reconfiguration.

� The reconfiguration process must be coherent with the various profiles associated

with the equipment/network/user/ etc.

� The reconfiguration process must be executed in non-interruptible steps, thus

enabling cancel/stop/resume actions at each step.

� Open interfaces should exist that allow for the development and provision of

reconfiguration software for the overall system.

2.6.7. Service Adaptation Capabilities

Active services can be adapted to changes in the network status (e.g. congestion) or

modification of the network equipment (e.g. reconfiguration), or alteration of the access

network used by a network component (e.g. vertical handover). Service adaptation may

cause reconfiguration in equipment in an attempt to avoid major disruption on the

executed service.

43

Page 32: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

As a concrete example, if there is a lot of congestion in the 2.4 GHz band (due to a number

of simultaneously active devices, or noise in the channel caused due to a microwave oven

being used), an application or service may deem it appropriate to switch to a different

unlicensed band (such as the 900 MHz or 5 GHz band), or move to a licensed band such as

a cellular band. In such a case, the radio capabilities relating to the frequency bands of

operation need to be modified, as well as the protocol being used. Obviously, whenever

such a change is made, the concerned devices and processes must be notified and

“simultaneously” make the move.

Some of the important requirements in this context are listed here.

� Services must be dynamically adapted when a change in the system status occurs.

� Service adaptation may be context-driven, in that the service may trigger certain

adaptation actions exploiting context information.

� Based on the adaptation actions declared at its registration, context information

modification and system status change must be transmitted to the Service Provider,

in order to enable dynamical adaptation of the service.

� Service adaptation must be carried out in a manner that guarantees service

continuity.

� The user equipment should be able to establish simultaneously multiple

communication links using single or different radio access technologies in order to

access one or multiple services.

2.6.8. Vertical Handover Capabilities

Network equipment/elements should be able to move through different access networks

without loosing their active connections. For example, an application (such as transmission

of sensor data or metering information in the AMI infrastructure, or a voice call) must

continue to function independent of the underlying transport frequency and protocol being

used. Such vertical hand over can be equipment or network initiated. For example, the

gateway node may decide to communicate to the meter using a frequency and protocol that

is chosen locally; alternatively, the utility may choose to make this decision that must then

be obeyed by the AMI and gateway node.

� There must exist mechanisms that enable the transfer of the context of the

application/service for the seamless operation of 3rd party applications/services

when performing a vertical handover between different Network operators.

� The handover process must be completed in defined time slots depending at the

interfaces, without delays that may cause service interruption. Additionally, the

packet loss must be minimized. To accomplish this, different handover algorithms

may be available to be downloaded and executed.

44

Page 33: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

� Handover decision(s) should be based on contextual information (user/paying

capabilities, user/Quality of Service demands, system capabilities, system load) so

that a compromise could be found among the various profile parameters.

2.6.9. Service Provisioning Capabilities

Service provisioning refers to basic energy, telecommunication and entertainment services,

as well as value added services offered by operators or independent value added service

providers.

Desirable system requirements in such a context are listed below.

� Open APIs should exist for third trusted parties to register and make their

software/services available to the users. This would enable, for example, energy

services, security services, monitoring services, etc. to be offered by third party

providers so as to the leverage the basic infrastructure that will be built up for DR

and AMI.

� Service discovery should take into account the user and equipment profile. This

suggests that the functionality required by an end user and the capabilities of

various devices will vary, and the mechanisms for finding discovering these

capabilities should be correspondingly malleable. For instance, these capabilities

can be part of the discovery process that is conducted.

� A mechanism must be provided to the Service allowing it to know the capabilities of

the available access networks.

� Services should automatically customize according to the capabilities of the

available access networks.

� As much as possible billing information for the services used by a user should be

incorporated in one single bill per service.

� There must exist a mechanism allowing the system to know the location of the

reconfigurable equipment.

� The system must support and implement a partitioning framework for

applications/service provisioning and connectivity provisioning

2.6.10. System Monitoring Capabilities

The equipment and network must be able to monitor the current state of system operation

(traffic, used spectrum, available technologies) in order to be able to estimate available

resources and to facilitate the 'best' use of existing and available resources.

� The user equipment and the network should be able to detect variations in the

operating conditions and act in order to make the best use of resources.

The user equipment and the network should be able to detect the presence of other radio

access technologies in a certain area.

45

Page 34: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

2.7. Summary

The work described in this section has demonstrated that agile functionality is very useful

in the context of the emerging networks for Demand-response and Advanced Metering

Infrastructure. This is because they enable future proofing for RF technologies, and cost-

efficiencies by eliminating physical visits for the purpose of provisioning, upgrading, and

bug-fixing. The flavors of agility that are relevant in this context include: RF agility,

spectrum agility, and network agility. Based on representative use case scenarios, we

articulated some of the system level requirements that are useful in the long run to support

reconfigurable networks.

Research outcome

The stakeholder perspectives and use case scenarios investigated suggest that there is

substantial benefit to all stakeholders in having agile capability in radio nodes and the

overarching networks. In order to fully leverage agile nodes and networks, it is useful and

important to develop associated ancillary or related capabilities such as network and device

management and customer support, customer relationship management (CRM) etc. More

generally, we suggest enabling end-to-end reconfigurable systems, along with associated

support processes, systems, and tools.

Benefit to Stakeholders

From the perspective of network operators, system level reconfigurability enables a scalable

and reconfigurable infrastructure that optimizes resource usage. Having such an

infrastructure enables new applications and technologies to be offered more efficiently.

Additionally, it provides a high return on investment, and reduction of Capex and Opex

costs.

From the perspective of service and application providers, an end-to-end configurable

architecture offers open flexible platforms and associated execution environments. This in

turn enables the ability to deploy enhanced features, and a reduced time to

deployment/entering the marketplace.

The equipment manufacturers --including network equipment manufacturers-- benefit

from a wider market, and reusable components.

The spectrum regulators benefit from a consolidated framework wherein the wireless

environment should evolve. This includes easier access, better spectrum management, and

a context that supports follow-up and enforcement of ethical and technological rules.

Energy regulators can leverage configurability to implement demand response and energy

efficiency strategies to meet energy policy imperatives. It also reduces Capex and Opex for

46

Page 35: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

the utilities, and provides a method to match time constants in deployment to the time

constants in technology evolution and business processes.

Finally, end consumers benefit from mechanisms to achieve a harmonious trade off

between comfort and cost of energy, seamless connectivity, and access to services.

47

Page 36: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

3.0 PROJECT OUTCOME: AGILE RADIO FUNCTIONALITY

3.1. Introduction

Our research described in the preceding sections has demonstrated that Demand Response

networks can benefit significantly from the capabilities provided by network agility. We

next focus in greater detail on how such agile network capabilities can be achieved. Agile

radio nodes constitute a key building block for agile networks. The goal of the research

described in this section is to investigate and develop test-bed architectures for achieving

agile node functionality. The overall intent is to articulate a basis for more detailed design

exploration of agile radio nodes and agile networks (including cost-performance trade-

offs), and to develop a platform for prototyping specific architectures and implementations

that are relevant in a DR context. The actual exploration of specific designs suitable for

deployment is a topic for future work.

3.1.1. Section Outline

The notion of agile radio nodes is introduced in Section 3.2. Two aspects of agility, namely

agile (radio node) capability and the mitigation of interference with other nodes using

shared spectrum are discussed. The key components of an Agile radio node are described

in Section 3.3: these include an antenna (sub)system, an agile RF (Radio Frequency) Front

end, and a Base band processing engine. In order to enable exploration at the architectural

and application level, it is important to have a testbed platform that supports

experimentation at the proper levels of abstraction. We describe such an experimental

testbed platform (BEE2) in this Section. We also describe the associated framework that

enables the mapping of a configurable baseband engine onto the prototyping platform. The

design of an agile RF Front end for SDRs (Software Defined Radios) is described in greater

detail in Section Error! Reference source not found.. Section 3.5 elaborates on cognitive

techniques for interference avoidance, focusing in particular on interference mitigation

between UWB (UltraWideBand) and WiMax.

3.2. Agile Radio Functionality

3.2.1. What is Agility?

We use the term “agile radio” to refer to a radio platform that blends the attributes of

Software Defined Radios and Cognitive Radios.

A Software Defined Radio (SDR) is a radio whose communication characteristics are

defined and/or controlled via software. This basic ability can be leveraged to make a radio

adapt to different modulation schemes, and operate over multiple frequency bands.

“Cognitive Radios” are radios designed to enable opportunistic use of spectrum that might

48

Page 37: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

be unused at any instant in time, although such spectrum might be pre-allocated to a

primary (class of) user other than the current one. The Federal Communications

Commission (FCC) defines a Cognitive Radio (CR) as a radio that can change its transmitter

parameters based on interaction with the environment in which is operates.

3.2.2. Two faces of Agility: Agile Capability and Interference Mitigation

The research discussed here focuses on two aspects of agile radio functionality:

� The first aspect of this research relates to the requirements and architecture of an

agile wireless platform that has the capability to communicate over more than one

frequency band and/or air interface standard (synonymously, wireless protocol),

and that is able to support new protocols and standards in the field. The goal of this

effort is to articulate the major components of an agile radio platform.

� The second aspect of this research relates to the investigation of interference effects

between a wide band technology that allows for opportunistic sharing of spectrum,

and the “primary users” in regulated bands that may overlap this band. Our

research focuses on characterizing and mitigating certain aspects of interference that

can arise in this context: this is the “flip side” of the capability to communicate. In

particular, the thrust of the research effort is to investigate mechanisms to mitigate

interference effects between UWB and WiMax technologies.

3.2.3. Agile Radio Platform Components

At a high level, the components of a radio include: an antenna subsystem, a radio

frequency (RF) front end, and a digital baseband processing module.

� An antenna (subsystem) that serves to transform energy between electromagnetic

waves and electrical signals.

o A system that is intended to process a wide spectrum of frequencies needs

an antenna (or an antenna subsystem) that is capable of sensing the swath of

RF spectrum that is of interest, and converting this to an electrical signal that

can be further processed.

o In targeting an agile radio platform that can function over a range of

frequency bands, the antenna system must in principle be capable of

receiving the frequency band(s) of interest. Depending on the desired

functionality of the system, a broadband antenna/RF front-end system may

be needed.

49

Page 38: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

o Our initial architecture aims to target the 2.4 GHz frequency bands, with the

goal of expanding coverage in the 800-900 MHz frequency band.

� We have investigated two options in this context.

• The first uses one or more sets of antennas to span the

frequencies bands of interest.

• The second option uses a broadband antenna to cover the

entire band of interest.

� An RF Front end, that couples into the antenna (subsystem). The RF Front end for

the receiver module generates a digital output that is processed by the digital

subsystem. The RF Front end for the transmit module accepts input from the digital

baseband module and send the modulated signal to the antenna subsystem.

o Short-to-medium term options that we investigate focus on a set of RF front

end designs that span broad bands of frequencies centered around the

regions of interest.

o Longer-term alternatives that are in the early research stage involve filters

based on RFMEMs (Radio Frequency Micro-Electro-Mechanical systems)

technology.

� A Control and Digital baseband processing module, that couples in to the RF Front end.

o The research described here is focused on the design of an experimental

testbed, using a configurable processing engine as a building block.

Architectural elaborations are also described; however, specific baseband

implementations are beyond the scope of the current Phase I research effort.

o Longer-term alternatives are a cost-reduced version using custom silicon.

Mapping onto an experimental Platform

We employ a configurable platform for experimenting with the agile radio platform. In

particular, we leverage the Berkeley Emulation Engine (BEE2) that uses Field

Programmable Gate Array components (FPGA) to provide a scalable computing platform.

The baseband modulation schemes of interest can be mapped onto the BEE2 compute

engine. Antennas (or antenna subsystems) and analog front-end architectures that our

research has developed are interfaced to the BEE2 platform.

50

Page 39: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

3.2.4. Interference Mitigation: Cognitive Technology for Ultra-Wideband/WiMax

Coexistence

Cognitive radios have been advanced as a technology for the opportunistic use of under-

utilized spectrum wherein secondary devices sense the presence of the primary user and

use the spectrum only if it is deemed empty. A distinguishing aspect of cognitive radios is

the ability to sense the primary user and modify their transmission parameters to avoid

interference to the primary.

One of the example use cases that is relevant in the context of future Demand-Response

scenarios is the use of WiMax for external wide area connectivity and the use of UWB or

similar related technology inside the house for short-range communication.

In this research, we explore the use of cognitive technology to enable the operation of ultra-

wideband (UWB) devices in WiMax bands. In this particular example UWB devices must

incorporate cognitive technology to detect and avoid (DAA) WiMax devices in certain

regulatory domains.

We consider various options for detection and avoidance. We then describe the obstacles

faced in achieving robust detection and avoidance with an on-chip implementation of basic

DAA functionality. This implementation is based on the energy detector and can reliably

detect WiMax uplink transmissions.

We investigate the operation of a single cognitive technology enabled UWB device with a

WiMax system. This interaction also highlights the problem of dealing with listen before

speak primaries where secondary transmission could interfere by denying the primary

access to the medium.

3.3. Agile Radio Nodes

In this section, we discuss agile radio nodes –network nodes that can be agile/flexible

in their wireless communication interface. The term “agile radio nodes” is used here as a

generic term that subsumes both Software Defined Radios [SDR] and Cognitive Radios

[CR].7 Both of these areas have been the subjects of much research, discussion and debate in

recent years, and Software Defined Radios in various incarnations are anticipated to have a

significant impact in the commercial arena over the next few years.

7 “Software Defined Radios” are radios whose communication characteristics are defined and/or controlled via

software (see Section 3.3.1), “Cognitive Radios” are radios designed to enable opportunistic use of spectrum

that might be unused at any instant in time, although it might be pre-allocated to a primary user other than the

current one.

51

Page 40: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

We begin by briefly reviewing the notion of Agile Radio nodes in Demand

Response networks, focusing specifically on Software Defined Radio (SDR) nodes. We

introduce the various flavors of Agile Radio Nodes; comment on why and where they are

useful, and specifically on where they may play a role in Demand Response Networks.

3.3.1. What is a Software Defined Radio (SDR)?

Some of the basic components of a radio, as depicted in Figure 10, consist of analog

radio and human interfaces, along with an assembly of hardware (analog and digital) and

software components that perform various signal processing and general-purpose

computation tasks. A Software (Defined) Radio is a radio system whose functionality is

partially implemented in software.8 Examples where this technology is used include

cellular base-stations and access points, mobile terminals (cellular phones), as well as many

other emerging applications.

MODEM

More

Advanced

Capability

Messaging/Networking/GeneralPurpose

Processing

RF Front End Expanding digital component Analog/Human Interface

RF

Audio/Video

Human

Interface

Figure 10 Radio Components: Evolution of the Analog-Digital and Hardware-Software

Boundaries

3.3.1.1. Flavors of Software Defined Radios

In an attempt to categorize the spectrum of implementations of the general notion of

Software (Defined) Radios, the Software Defined Radio Forum9 (a consortium of groups

8 As a historical footnote, it is worth recalling that early radio systems were implemented entirely in hardware

with analog components. The Analog-Digital and Hardware-Software Boundary continues to evolve over time,

and as semiconductor CMOS technology evolves; the general trend is to reduce the number of analog

components (versus digital components), and to increase the software components (compared to hardware

components). It should be noted that no functional radio system can be implemented without hardware, and

that analog functionality is necessary at both the RF and the human interface.

9 www.sdrforum.org

52

Page 41: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

interested in Software Defined Radio technology) has defined five tiers of “Software

Radios”, spanning the spectrum from implementations that employ exclusively hardware

components to systems that employ hardware components only at the edges, with software

being used for the rest.

Tier 0: Hardware Radio (HR). The radio is implemented using hardware

components only and cannot be modified except through physical intervention.

Tier 1: Software Controlled Radio (SCR). Only the control functions of an SCR are

implemented in software - thus only limited functions are changeable using software.

Typically this extends to inter-connects, power levels etc. but not to frequency bands and/or

modulation types etc.

Tier 2: Software Defined Radio (SDR). SDRs provide software control of a variety

of modulation techniques, wide-band or narrow-band operation, communications security

functions (such as hopping), and waveform requirements of current and evolving

standards over a broad frequency range. The frequency bands covered may still be

constrained at the front-end requiring a switch in the antenna system.

Tier 3: Ideal Software Radio (ISR). ISRs provide dramatic improvement over an

SDR by eliminating the analog amplification or heterodyne mixing10 prior to digital-analog

conversion. Programmability extends to the entire system with analog conversion only at

the antenna, speaker and microphones.

Tier 4: Ultimate Software Radio (USR). USRs are defined for comparison purposes

only. A USR accepts fully programmable traffic and control information and supports a

broad range of frequencies, air-interfaces & applications software. It can switch from one

air interface format to another in milliseconds, use GPS to track the user’s location, store

money using smartcard technology, or provide video so that the user can watch a local

broadcast station or receive a satellite transmission

10 Heterodyning is the process of “beating together” or mixing two different frequencies to obtain an output at

some other, related frequency. The mixing of two frequencies f1 and f2 results in the creation of two new

frequencies, one at the sum of the two frequencies mixed (f1 + f2), and the other at their difference (f1 -f2). A

superheterodyne receiver converts any selected incoming frequency by heterodyne action to a pre-selected

common intermediate frequency, for example, 455 kilohertz (AM receivers) or 10.7 megahertz (FM receivers),

and provides amplification and selectivity, or filtering.

53

Page 42: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

The interesting developments from a pragmatic point of view are in “Tier 2

Software Radios” as described above; such radios are referred to as Software Defined

Radios, henceforth abbreviated SDRs.

3.3.1.2. Benefits of Software Defined Radios

In essence, Software Defined Radio (SDR) technology is a collection of hardware

and software technologies that enable reconfigurable system architectures for wireless

networks and user terminals. Software Defined Radios (SDRs) provide an efficient and

comparatively inexpensive solution to the problem of building multi-mode, multi-band,

multi-functional wireless devices that can be enhanced using software upgrades.11 As such,

SDRs can really be considered an enabling technology that is applicable across a wide

range of areas within the wireless domain. SDR-enabled devices (e.g., handhelds) and

equipment (e.g., wireless network infrastructure) can be dynamically programmed in

software to reconfigure the characteristics of equipment. In other words, the same piece of

"hardware" can be modified to perform different functions at different times. This allows

manufacturers to concentrate development efforts on a common hardware platform.

Similarly, it permits network service providers (also called “operators”) to differentiate

their service offerings without having to support a myriad number of terminal devices.

Finally, users of SDR enabled devices have a piece of scalable hardware that is at once

compatible at a global scale and robust enough to deliver a "pay as you go" feature set.

3.3.2. Software Defined Radios in Demand Response Networks

Figure 11 highlights some locations in a demand response network where Software

Defined Radios can be deployed. In particular, as suggested in the illustration, SDRs can be

profitably leveraged in sensor cluster gateway nodes and neighborhood gateway nodes, as

well as in the communication infrastructure. They are currently unlikely to be used in the

leaf level sensor nodes because of the extremely stringent constraints on cost and power

that are imposed on such nodes, and because of the absence of a predominant need for RF

agility in the end sensor nodes deployed within a home.

For example, a Software Defined Radio node that supports multi-mode operation can

support IEEE 802.15.4 [IEEE802.15.4] (and Zigbee Radios [Zigbee]), IEEE 802.11b (WiFi)

[IEEE 802.11] or Bluetooth all of which operate in the 2.4 gigahertz band. Multi-band

11 Multi-band operation refers to the ability to operate in multiple frequency bands. Multi-mode operation refers

to the ability to communicate using more than one protocol, e.g., Bluetooth and IEEE 802.11. Multi-functional

devices are capable of supporting more than one function, such as a combination of the functions associated

with a phone, camera and PDA.

54

Page 43: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

operations can also be useful, and may be used to support commonly used frequency

bands such as 2.4 GHz, 5 GHz, and 800/900 MHz. These capabilities can be leveraged by

the gateway node for local area communications (using IEEE 802.11), sensor networks (e.g.,

using IEEE 802.15.4 and Zigbee devices), as well as backhaul communications using wide

area networks.

Cluster

Gateway

Node

Sensor

NodesSensor

Cluster

Network

Gateway

WAN

Client Data

Browsing/

Management/

Processing

Data Service

SCADA

Emerging technology

related to Software

Defined / Cognitive Radios

creates considerable

incentives for introducing

agility in some of the radio

nodes e.g. Gateways,

Wireless Infrastructure,

Terminals, …

SDR

SDR

SDR

Figure 11 Potential Roles for Software Defined Radios in Demand Response Networks

3.3.3. Antennas

The wireless revolution is creating new performance demands for antennas. Original

Equipment Manufacturers (OEMs) are increasingly requiring antennas that feature higher

gain, smaller physical size, and more versatility. We have explored the use of both regular

as well as broadband antennas in the design, in preparation for the experiments in a follow

on second phase of this project. While our initial experiments will use standard antennas,

we delineate below a representative example of a category of alternative antenna

technologies that are of interest in the context of this research.

3.3.3.1. Meander Line Antennas

Meander Line Antenna (MLA) technology supports a design that allows electrical coupling

of the fields of different segments of the antenna lines to significantly enhance their

performance. This enables one to combine smaller antenna radiating elements with a

meander line structure and geometry to achieve broadband performance in a small

envelope. The can yield an antenna that can resonate broadband and produce circular as

well as horizontal and vertical polarization and achieve higher gain—typically 1-4 dB

greater than traditional antennas.

55

Page 44: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

The expectation is that such antennas are smaller and can be embedded directly within

various devices requiring a small form factor. In addition, they potentially feature better

gain and improved efficiency, resulting in longer battery life. Furthermore, MLA

technology enables the design of ultra broadband antennas capable of operating at multiple

frequencies and in a variety of modes.

Narrowband and Broadband MLA

MLA antennas may be configured into two distinct classes. The narrowband class exhibits

improved compactness for a given operating bandwidth. The broadband class enables

improved bandwidth capability, capable of covering multiple octaves without the need for

tuning. Both classes achieve performance very near to the theoretical Chu-Harrington

limit—indicating that they are approaching the smallest size for the exhibited bandwidth.

Volumetric Efficiency

One of the advantages of a Meander Line Antenna over more conventional antennas is high

volumetric efficiency. A comparative measure of an antenna’s volumetric efficiency (size) is

often expressed on a volume versus bandwidth graph in relation to the theoretically

determined limit. The so-called Chu-Harrington relationship establishes the limiting values

of bandwidth versus volume for a 100 percent efficient antenna—one that radiates all of the

power applied to its feed terminals. Compared to other antennas, the narrowband MLA is

demonstrated to provide more effective use of physical volume for narrow bandwidths (~

10–15%). This is easily seen in Figure 12 below.

56

Page 45: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

Figure 12 MLA comparison of size versus bandwidth.

(The narrowband MLA antennas illustrated are at the leftmost portion of the graph indicating small

frequency bands associated with the various wireless services. The MLA antennas shown exhibit a

smaller physical volume for a given bandwidth as compared with other antennas shown on the

graph. The MLA achieves its performance gains through an effective and complete utilization of the

antenna volume.)

Multi-mode Operation

Another advantage of the MLA is the ability to achieve multi-mode operation in one

antenna structure. The MLA can be used in two radiation modes that can be excited

simultaneously or that can be individually selected electrically.

57

Page 46: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

The fundamental mode is that of a monopole—the so-called “monopole mode” producing

a linear polarized radiation field resembling that of two closely spaced monopole antennas.

In the monopole mode, the primary antenna current is perpendicular to the antenna

ground plane.

The second mode of operation is the “loop mode” where the primary antenna current is

parallel to the antenna ground plane and the maximum radiation is perpendicular to the

ground plane. The loop mode can be used for satellite communications since one or the

other linear or circular polarization may be obtained through the use of a “crossed”

radiating structure.

Applications and Significance

MLA technology exhibits features suited to many applications, such as mobile handsets;

wireless data including laptops, PC cards and access points; and UWB.

Portable and Handsets

The MLA is well suited to portable wireless products due to its small size and performance

characteristics. Handsets often require worldwide GSM operation with Global Positioning

System (GPS) operating at 1575 MHz for location of the user in emergency (911) situations.

The broadband MLA is able to cover all three required bands simultaneously—having

coverage from 800-2500 MHz in a size 0.8 x 0.5 x 1.25 inches.

The lower limit of the bandwidth is determined by the antenna volume, which can be

reduced to 0.4 x 0.25 x 0.625 inches if the requirement for 850 MHz band coverage is

dropped.

An example of an antenna size designed to operate in the CDMA and GPS bands is 23 mm

(W) x 13 mm (L) x 8 mm (H). A normal antenna such as half-wave dipole or a monopole

antenna requires half-wave or quarter-wave length in physical antenna size. However, the

maximum dimension in the MLA antenna is only 23 mm which is less than 0.07 wave

length for the CDMA band (824~894 MHz).

Coverage of the different frequency bands is also possible with multi-band conventional

antenna designs. A disadvantage of currently used multi-band embedded antennas is

detuning when held in proximity to the body. It is common to observe resonance shifts

completely out of band with some embedded cellular handset antennas resulting in an

attenuation of up to 24 dB (measured). The broadband MLA, however, does not exhibit

measurable proximity detuning under similar conditions.

58

Page 47: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

MLA handset antennas also feature reduced specific absorption rate (SAR) due to their

distributed near-field radiation. It has been shown statistically that signal strengths can be

increased on the average by as 2-3 dB with the use of embedded, reduced SAR antennas

such as the MLA. The advantage gained is due in part to a reduction of absorption of the

radiated signal by the human body. Studies show that conventional high SAR antennas,

such as the dipole and its derivatives, lose approximately 40–50% of their radiated signal to

absorption in the head.

The increased effective gain available with low SAR antennas provides a number of

advantages in addressing problems that are currently experienced by cellular users and

service providers. The advantages are:

� Improved reception quality at the cellular tower receiver results in

o Fewer dropped calls

o Improved customer satisfaction (lower churn)

� Lower power consumption in the handset

o Provides for longer battery life

o Allows smaller batteries to be used and increases the overall life of the

battery, resulting in lower cost to the end user

� Significant improvement of voice quality near the edge of the cell

o Provides better reception in border areas

� Potentially larger cell sites possible

o Decreased cost for service providers due to reduction in the number of cells

3.3.3.2. Triband Cellular + WLAN Antenna

The figure below illustrates a Meander Line Antenna that operates in the 800-

900/1800/1900/2400 bands spanning frequency bands of interest in the ISM, and cellular

band ranges. In contrast, many current generation cell phones employ multiple antennas to

cover broad frequency ranges.

59

Page 48: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

Figure 13 Example Triband + Cellular antenna

3.3.3.3. WLAN 802.11a/b antenna

An example antenna that operates in the 2.44 GHz, 5.25 Ghz, and 5.8 GHz bands is shown

in the figure below.

Figure 14 Triband 802.11b/a/HiperLAN2 antenna

60

Page 49: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

3.3.3.4. Ultra Wide Band Antenna

An example Meander Line Antenna shown below spans the 3.1-10 GHz range, and is useful

in the context of UWB applications.

Figure 15. UWB Antenna

3.3.3.5. Summary

We have summarized representative technologies that can be used to build antenna

solutions that can potentially reduce the size of devices and improve performance. While

we have detailed some of the options relating to Meander Line Antennas, advances in the

general area are enabling antennas to be developed that achieve higher gain, allow multiple

frequency operation, provide directional control over mobile handset emissions, provide

wider bandwidth for ever increasing data rate requirements, and are less obtrusive.

Other emerging technologies will be researched for a plausible follow on phase of this

project.

3.4. Agile Radio Testbeds. RF Front End

In the preceding sections, we have described the major components of an agile radio node,

and discussed some of the attractive emerging technologies in the realm of antennas. The

output of an antenna subsystem needs to be interfaced to an analog front end of the agile

61

Page 50: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

radio node. In this section, we describe the research we have performed in designing a

Radio Frequency front end (RF Front End) that supports radio operation over a broad

swath of frequencies. We have integrated this RF Front End with a configurable digital

baseband engine to provide an overall platform for experimenting with and prototyping

agile radio nodes, and this work is also described in this section.

3.4.1. Main tasks

The key objectives targeted by the project are the following:

� Definition of the architecture and elements of an agile radio platform

� A mapping of these elements on onto a configurable testbed architecture that

provides a basis for experimentation in Phase II.

Ideally, a prototyping platform for agile radios needs to support the ability to have

different antennas, configurable RF Front ends, and a configurable baseband processing

engine (or compute platform). Furthermore, it must enable mapping specific designs onto

the platform in a reasonably painless fashion, and simulation of the system in a real time

with the ability to interface to real time analog interfaces. These simulations involve

significant amounts of real time complex digital signal processing is needed, and the need

to have a real-time (or near-real time) closed loop with the environment.

Our experimental platform leverages BEE2 [BEE2], a configurable computing platform that

is undergoing development at BWRC. Such platforms are necessary because the simulation

of an agile radio node behavior, let alone a network containing multiple nodes, cannot be

currently be done in anything approaching real time using PC-based platforms: a speed up

of at least a factor of 100-1000 is needed in order for this to achieved, even if the issue of

interfacing to real time analog signals is ignored.

The RF Front end is designed as an adapter card for the BEE2; this card communicates its

output to the BEE2 digital engine where baseband processing can be performed. Similarly,

on the transmitter side, the BEE2 reconfigurable computing engine is used for the baseband

computations, and the output is fed to the RF Frontend transmitter.

The longer term goal of the research (not within the scope of the current Phase I project) is

to develop a (set of) detailed baseband architecture(s) and identify components that can

eventually be mapped into an appropriate combination of software and silicon, so as to

facilitate subsequent cost reduction and volume deployment.

An illustration of the RF Front End system with test drivers and monitors is shown in

Figure 16.

62

Page 51: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

Figure 16 An Illustration of the RF Front End and TestBed

A picture of the working hardware for the RF Front end is shown in Figure 17.

Figure 17 Prototype of a Broadband RF Front End

63

Page 52: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

3.4.2. A Platform for Prototyping Agile Radio Testbeds Using BEE2

3.4.2.1. The BEE2 Platform

Figure 18Figure 18 illustrates BEE2, a configurable platform that can serve as a basis for the

digital signal processing and control computations that need to be performed in the agile

radio platform.

100BaseT

USB

40GBps

20GBps

18, 10GBps

InfinibandInterfaces

5, Virtex 2

Pro FPGA

4GB DDR RAM, 12.8 GBPs

Linux +

IP stack

Figure 18 Illustration of an Experimental Configurable Platform (BEE2)

The BEE2 platform is designed as a rapid prototyping environment for at/near real time

high performance DSP/RF systems. It enables systems (in particular, Digital Signal

Processing Systems) to be specified at a “high level” using a methodology based on

systems specified using Flow diagrams, Simulink, and code blocks, with a dual design flow

for mapping to FPGAs/ASICs. It has been successfully used for many chip designs, and

later used for high-end reconfigurable computing applications, such as DSP and ASICs

oriented towards radio astronomy applications, and as a platform for reconfigurable

computing.

The BEE2 Platform shown in the figure contains five FPGAs, 20 GBytes of DDR2, 64 GBytes

per sec of memory bandwidth, 180 GBits of full duplex IO bandwidth, serial

interconnections, transceivers, optical fiber connections, and 18 XAUI (10Gbit) ports. The

only high speed I/O is through the XAUI connection.

64

Page 53: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

The BEE2 is highly scalable due to the reliance on gigabit serial I/O for inter-board

communication. This scalable system architecture allows the BEE2 to support a broad

variety of applications.

3.4.2.2. Agile Radio TestBed Components

This section describes a set of flexible wireless testbeds using the BEE2 (Berkeley Emulation

Engine 2), shown in Figure 19. Both wide-band and narrow-band testbeds have been

developed. The wide-band testbed is modular and scalable and includes an Interface

Breakout Board (IBOB) for connecting frontend boards to the BEE2, ADC, DAC, and analog

I/O boards. These frontends operate on two frequency bands of interest - one is in the

TV/ISM band from 500MHz-1GHz. The second band is at 2.45GHz with a bandwidth of

500MHz band. The narrow-band system has 2.4GHz reconfigurable RF modems. One can

connect up to 16 radios and antennas in parallel to the BEE2 system. Phase synchronization

and digital synchronization are provided with the narrow-band testbed to enable multi-

antenna testing. Both the wide-band and narrow-band testbeds have fiber link interfaces to

the BEE2.

BEE2

IBOB

Analog I/O

IDAC

IADC

Analog I/O

5 VP70 Virtex2 Pro18 XAUI ports

DRAM

Interface to

specializeddevices

Analog/Digital InterfacesTransceivers

Wideband Configurable TestBed (400-500MHz)

Specialized Interface for Narrow Band (20MHz) MIMO/Cognitive Radio

XilinxADC

DAC

Analog

I/O

Cognitive Radio Analog

Figure 19 Block Diagram of the Radio TestBed Components

This section provides an overview of the hardware, programming environment, and

applications of the narrow and wide-band testbeds using BEE2.

The agile radio front end testbeds connect to the BEE2. A fiber link interface is used for

connection between the BEE2 and radios. This fiber link allows radios and antennas to be

moved upto 1/3rd of a mile from the BEE2. The wide-band testbed is a modular design with

transceivers, an Interface Breakout Board, custom boards for wide-band, high speed ADC

and DAC, and an analog frontend. I/Q processing is done digitally. The narrow-band

65

Page 54: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

system consists of a reconfigurable 2.4GHz radio modem. I/Q may be done in analog or

digitally.

3.4.2.3. The Wide-Band Testbed

The wide-band testbed targets broad-band radio applications by using the Interface

Breakout Board (IBOB) interface with high-performance ADC and DAC cards connected to

an RF front-end.

The BEE2 has limited I/O options, depending almost exclusively on the Gigabit serial

interfaces for high-bandwidth off-board I/O. To support specialized I/O needs, the

Interface Breakout Board (IBOB) was developed (Figure 20), providing an on-board Xilinx

2VP50 for preprocessing capability as well as multiple interfaces. The interfaces include

ZDOKs (40 LVDS pairs each running at 256 MHz or 40.96GBits per sec) and XAUI (20

GBits per sec full duplex, 10/100 ethernet, RS232, and 80x GPIO).

BEE2 XAUIIBOB

Figure 20 IBOB: Interface Breakout Board with XAUI connection to the BEE2 Processor Board

The custom ADC and DAC boards in Figure 21 connect to the IBOB through high speed

ZDOC connectors. Each ZDOC connector has 40 LVDS pairs, 36 differential pairs for IO

and 4 pairs for clock. The IADC has a high speed ADC with a sampling rate of 1Gsps (or 2

Gsps in interleaved mode). Each ADC has 8 bit resolution. The high speed DAC has a

sample rate of 1.2Gsps, a bandwidth of 550MHz, and a resolution at 10 bits.

66

Page 55: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

IADC and IDAC

BEE2

IDAC

IADC

IBOB

IADC•1Gsps Sampling Rate, 2Gsps Interleaved mode•Dual ADC with 8-bit resolution•Atmel PN: AT84AD001B

•500mVpp Input

•Single-ended clock input

•3-wire serial interface, 16-bit Data,

3-bit Address

•Zdok interface to iBOB

IDAC•Sample rate 1.2Gsps•Full bandwidth of DAC: 550MHz •10 bit resolution •PN: Atmel TS86101G2B

•IDAC output: differential full scale output

voltage, 100 ohm termination, 2v P-P

•Integrated 4:1 Mux for easy interface to

FPGA

•Differential data inputs; LVDS pair Zdok

interface to iBOB

•Digital I/Q processing

XAUI

ZDOC

ZDOC

BEE2

IBOB

Cognitive

Radio

Analog

IDAC

IADC

Analog I/O

Analog I/OWideband Configurable

Figure 21 IADC and IDAC with high speed connections

3.4.3. RF Frontend System

The wide-band experiments include two bands of interest. One frontend supports TV and

ISM bands from 600MHz to 1GHz, and a second 500 MHz bandwidth front-end centers

around 2.45GHz. The 2.45 GHz ISM band front-end, used for sensing experiments, is

designed with a conventional mixer, whereas subsampling is used for the TV/ISM band

frontend.

CX4 or

fiber

Figure 22 RF Frontend Radio Boards: Analog I/O, IADC, and IBOB, which connect to BEE2 via

optical fiber.

67

Page 56: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

3.4.3.1. Programming Environment

The highly reconfigurable BEE2 platform and related interfaces depend on a high-level

programming environment to fully utilize the capabilities of the testbeds described

previously. A block-diagram-based programming model was selected and extended to

include support for high-level operating system interfaces and debugging abstractions.

3.4.3.2. Programming Model and Support – Programming with Block-Diagrams

Traditionally, FPGA-based systems are configured using hardware description languages

such as Verilog or VHDL, requiring detailed knowledge of the reconfigurable platform.

Rather than requiring a wireless testbed user to learn low-level HDL programming

techniques, the Matlab Simulink block-diagram editor [Mathworks] was employed instead.

This environment is familiar to many architectural, signal processing, and hardware

designers, making it a natural unified environment for programming the BEE2 and related

system components.

The BEE Platform Studio [Chang] was developed around the Xilinx System Generator

blockset and tools, combined with the Xilinx EDK Embedded microprocessor design tools

[Xilinx]. A library of BEE-specific blocks (Figure 23) is used to provide a high-level

abstraction for several FPGA building blocks, allowing the designer to easily add

microprocessor register or memory interfaces to a signal processing design by selecting a

library component, and configuring the function using Simulink component property

menu selections.

Programming Model and Support

• Simulink Xilinx System Generator Library

• Custom BEE2 Library Blocksets

• Software programmable registers

• BEE Platform Studio

68

Page 57: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

Figure 23 The Simulink Block-Diagram-Based Programming environment with library

components for microprocessor and I/O interfaces.

Once a design is described in Simulink, it can be compiled and mapped onto the BEE2 or

other platform using the BEE Platform Studio. The compiler sets platform-specific

parameters for the Xilinx System Generator tool flow, which is used to generate the

hardware description for the dataflow blocks. CPU interfaces are identified in the design,

and a set of files is generated with a complete description of the embedded CPU. This

description is automatically compiled to produce FPGA bit files and embedded software

header files.

3.4.4. The BORPH FPGA Operating System

Conventional FPGA design flows often require designers to manually develop

corresponding software interfaces to interact with the executing FPGA designs during

runtime. This effort is greatly simplified by the unified hardware/software run-time

environment provided by the BORPH operating system. By extending a Linux kernel,

BORPH provides a UNIX process and file system abstraction for the user-defined

hardware. User FPGA designs are executed in the BORPH run-time system as special

hardware processes that are identical to any other conventional UNIX process except they are

executed on FPGAs. User defined hardware constructs such as named registers, embedded

memories, and attached DRAMs can then be accessed through BORPH’s ioreg virtual file

system. For instance, assume that a user design contains a 32-bit register named

“FILTER_EN.” To set a bit in the register, the user can run the shell command:

$echo 1 > /proc/123/hw/ioreg/FILTER_EN

By using the underlying UNIX file system to represent user defined hardware constructs,

BORPH allows designers to easily access the running FPGA without the need to develop

any design specific interfaces.

On a BEE2 platform, up to four simultaneous hardware processes, one on each User

FPGA, are supported. Combining the block-diagram programming style in Simulink with

the convenience of BORPH, the designer is able to quickly develop FPGA applications

without becoming an experienced FPGA or embedded system designer.

69

Page 58: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

The BORPH FPGA OS

Simplifies the interface to using the BEE2 boards

Mixed hardware/software inter-process communication with BORPH

Read/write hardware registers thru Linux filesystem

e.g. shell command:$cat data.in | hw_filter - > data.out

$echo 1 > /proc/123/hw/ioreg/FILTER_ENABLE

Linux + BORPH OS• /proc/<pid>/hw/ioreg• Socket

• Shared File• Pipe/FIFO• Signal

HWProcess

2

SW

ProcessA

SW

Process

B

HW

Process

1

Figure 24 The BORPH FPGA Operating System

3.4.4.1. BDB: The BEE Debugger

Debugging of a design is performed using a custom, integrated framework which utilizes

debug components inserted into the hardware netlist in combination with an external

remote user interface. Layered on top of the BORPH operating system, the designer can

use the BEE Debugger, BDB to easily add hardware trace variables to the Simulink design,

and record related signal activity at near real-time speeds to on-board DRAM during

design operation. In addition, though BORPH, the user can control the debugging process

from any location over the network. Beyond the simple convenience of being decoupled

from the hardware location, this also allows debugging to take place in the original design

environment (i.e. Matlab/Simulink), which greatly improves bug detection and data

analysis compared to traditional hardware capture techniques.

70

Page 59: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

Master debug

controller

Control FPGA

User FPGA

BORPH

User

Design

Variable Logic

Clock

BufferControl

Network

DRAMBreakpoint Logic

Automatic generation of in-fabric variable networkRead/Write access to all data

User-defined assertion checking

Integrated core debug controllerThrottles user design clock for manual single-stepping

and automated breakpointing

Off-chip interface via BORPH

Remote MATLAB debug clientAllows back-annotation to Simulink design

Figure 25 BDB: A system with inserted debugging trace variables and debug controller block

3.4.4.2. Cognitive Radio

Cognitive radios have been envisioned as a mechanism for the opportunistic reuse of

spectrum. These radios “sense” for the presence of the primary user and use the spectrum

only if it is deemed empty. If a frequency band is deemed empty, these radios can transmit

in the band at a power level which ensures minimal interference to the primary radio. This

kind of reuse is illustrated in Figure 26, where PU1-4, are primary users using their

respective bands. CR1 is able to transmit in the empty band between PU3 and PU4. Compare

this to the transmission of CR2, CR2 is unable to sense for the presence of PU2 and starts

transmission. This transmission interferes with PU2 and is undesirable.

Cognitive Radio:

•Sense the spectral environment over a wide bandwidth

•Transmit in “white space” & Adapt bandwidth and power

•Detect if primary user appears

•Move to new white space

PS

D

Frequency

PU1

PU2

PU3

PU4

CR1

CR2

Primary

Cognitive

Figure 26 Cognitive Radio: sensing the spectral environment

71

Page 60: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

As the discussion above illustrates, one of the key aspects of a cognitive radio is the ability

to reliably detect the presence of primary users. Furthermore it should do this while

ensuring that its ability to find an empty band is not diminished (One can imagine a

cognitive radio that always says that a primary is present. Such a radio always ‘detects’ a

primary but is never able to use the band). Using the testbed described earlier, we

investigated various aspects of cognitive radio operation.

Performance of various single band sensing algorithms:

The testbed was used to measure the performance of various single radio sensing

algorithms: Energy detection, Coherent detection and Feature detection. The

experimentation used the Agilent Signal generator to generate an appropriate primary

signal. This signal was captured by the using the 2.4GHz narrow-band frontend. Since the

narrow-band front-end has two antenna ports, one of the ports was always terminated and

used for noise measurements. The strength of the primary was varied and the number of

samples needed for achieving a target probabilitiy of missed detection and probability of

false alarm was measured. These experiments allowed us to verify/observe a number of

issues with detection:

� For energy detection the number of samples needed to achieve target detection

performance scales as O(SNR-2). For pilot detection this scaling is O(SNR-1)

� The energy detector suffers from noise uncertainty. If the PSD (power spectral

density) of noise is not known exactly, then the target performance cannot be met

irrespective of the number of samples used [Cabric et al].

� The FFT (Fast Fourier transform) acts as a partially coherent detector for sinusoidal

primaries.

� Coherent detector performance is limited by frequency mismatch between the

transmitter and receiver.

� Feature detector performance is also limited by frequency mismatch between

transmitter and receiver. This can be overcome by using a two stage detector

[Tkachenko et al].

Performance of cooperative sensing

Since single radio performance is limited by noise uncertainty, multiple radios can be used

to improve performance. To conduct these experiments we positioned the receiver at a

number of places in the BWRC as shown in Figure 27. At each location a number of

measurements were made a few wavelengths apart. Cooperation among radios a few

wavelengths apart allowed us to get diversity over multipath. Cooperation among radios

further apart allowed us to get diversity over shadowing.

72

Page 61: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

Cognitive Radio: Experimental Setup

Location (11,9)

Location (16,3)

Central combining and processing

Fiber provides 1/3 mile separation between radios and platform

Sensing radio

Sensing radio

Sensing PHY/MAC processors

Indoor wireless

experiments

inside BWRC determining

spatial sensing

characteristics

54 locations on a 2m by 2m grid

BEE2

IBOBIDAC

IADCAnalog I/O

Analog I/O

Analog

I/O

Cognitive Radio Analog

ADC

DACXilinx

Figure 27 Experimental Cognitive Radio Set up to measure gains from cooperative sensing

Performance of multiband sensing

For a single radio, we need to set the target detection level to be very low in order to ensure

that we can detect the signal even when the cognitive radio is severely shadowed. In

multiband sensing we aim to determine the shadowing environment of the radio and then

set the detection level dynamically. To do this we utilize the fact that multiple transmitters

are positioned on the same place tower (especially for TV channels) and that shadowing

across frequencies is highly correlated. Thus a detector can sense for channels on nearby

frequencies and use these channels to dynamically set the detection level for the channel in

question.12

3.4.5. Agile Radio Testbed: Summary

This section has described a flexible wireless testbed with associated software support, I/O,

and network level support. The BEE2 programming environment includes Simulink that is

used as the base programming model, BORPH as the run-time OS, and BDB for debugging.

We use specialized library modules for our hardware abstraction. For testbed interfaces,

high speed gigabit per second digital interfaces are provided by XAUI connectors. The

platforms provide both wide-band and narrow-band RF frontends in both the TV and ISM

12 We are currently in the process of verifying the multiband algorithm using measurements of TV channels in

the bay area. For this we are utilizing the wide-band frontend which allows us to measure all TV channels

between 500MHz and 800MHz. The measurements are being made at various locations in Berkeley. At these

locations we can measure the TV channels from Mt Sutro and Mt San Bruno.

73

Page 62: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

bands including ADCs and DACs. The Interface Board, IBOB, provides multiple high

speed connection options for connecting various frontends to the BEE2. For emulating a

network of radios, we can connect upto 18 radios to the BEE2 via the optical connections.

3.4.5.1. Software Defined Radio RF Front End (RFFE): Research Tasks

The research tasks performed in this context included the following:

1. Design of SDR RF Front End Analog Hardware

We have a working RF frontend which consists of connectorized RF Blocks such as

mixers, filters, amps, etc.

2. Design of SDR Digital Hardware.

We have designed, built, and tested the ADC (Analog-to-Digital converter), DAC

(Digital-to-Analog converter), IBOB, and BEE2.

3. Design of the SDR Software skeleton.

o We have created Simulink designs for both receiving and transmitting.

o The receiver simulink design includes receiving an analog signal from the

RF analog frontend, processing thru an ADC, brought over a ZDOC

connector, and into a Xilinx for baseband processing on the IBOB.

o The transmitter design includes the processing and control of the signal

from the IBOB’s Xilinx, thru a ZDOC connector onto a DAC board. The

signal is then processed thru the DAC board. The analog signal is the

output of the system.

o We have used existing simulink libraries in our matlab designs.

o We use BORPH for system control. Software programs have been written to

control the system parameters such as the clock. We produce plots of the

system frequency response. BOTPH provides mixed hardware/software

inter-process communication.

4. Loop Test of the System

o A loop test of the system was successfully completed. This included a

received analog signal from the RF frontend. The analog signal was then

processed thru the ADC, across a ZDOC connector, onto a Xilinx FPGA on

the IBOB. From the Xilinx the digital signal was processed across a XAUI

connector onto an optical transceiver and optical cable. The other side of the

cable contained another optical transceiver where the signal was then

processed onto another Xilinx on an IBOB board. From here, the signal was

74

Page 63: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

routed onto a DAC board thru a ZDOC connector. The output of the DAC

was the analog signal which matched the input analog signal.

Figure 28 Data flow and Input/output for the Prototype tested

3.4.5.2. Front End Analog Hardware

The protocols that are currently being considered in context of Demand-Response

and Home Area Networks include WiFi and ZigBee, which lie in the 2.4 GHz and

900 MHz ISM bands. As a consequence, we selected the following frequency bands

for an initial experiment in the design of the RF Front end analog hardware.

� 2.45GHz band: 2.2GHz – 2.7GHz Receiver

� 2.45GHz band: 2.2GHz – 2.7GHz Transmitter

� TV + ISM band: 600MHz - 1GHz Receiver

� TV + ISM band: 600MHz - 1GHz Transmitter

This choice has the benefit of including the bands of interest for DR/HAN contexts, while

also allowing bands that overlap with Analog TV and WiMAX.

The details of the front end analog hardware design are described in the Appendix.

IDAC

Existing

Board Atmel

TS86101

IBOB

Existing

Board Xilinx

XC2VP50

IBOB

Existing

Board Xilinx

XC2VP50

Analog

Receiver

IADC

Existing

Board Atmel

AT84AD001

Analog

Transmitter

Source

Scope

75

Page 64: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

Figure 29 2.45GHz +/- 250MHz Receiver Design using minicircuits

2.45GHz +/-250MHz Receiverwith iADC and iBOB

Figure 30 Receiver with iBOB and iADC

The illustrations above indicate the SDR broadband front designs that have been coupled

into the system.

Front End Matlab Designs

For both the receiver and transmitter designs, the blocks used were assembled from the

Simulink Xilinx System generator library, custom BEE2 library blocksets, and software

programmable registers.

76

Page 65: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

3.5. Cognitive techniques for Interference avoidance

3.5.1. Abstract

Cognitive radios have been advanced as a technology for the opportunistic use of under-

utilized spectrum wherein secondary devices sense the presence of the primary user and

use the spectrum only if it is deemed empty. The distinguishing aspect of cognitive radios

is the ability to sense the primary user and modify their transmission parameters to avoid

interference to the primary.

In this section we explore the use of cognitive technology to enable the operation of ultra-

wideband (UWB) devices in WiMax bands. In this particular example UWB devices must

incorporate cognitive technology to detect and avoid (DAA) WiMax devices in certain

regulatory domains.

We start by discussing various options for detection and avoidance. We then describe the

obstacles faced in achieving robust detection and avoidance with an on-chip

implementation of basic DAA functionality. This implementation is based on the energy

detector and can reliably detect WiMax uplink transmissions. Finally, we describe an

empirical set up for the operation of a single cognitive technology enabled UWB device

with a WiMax system. This interaction also highlights the problem of dealing with listen

before speak primaries where secondary transmission could interfere by denying the

primary access to the medium.

3.5.2. Introduction

Ultra-wideband (UWB) technology is termed as such since it occupies large swathes of

spectrum and uses very low power to communicate. UWB’s intended use is in the 3-

10GHz bands for short range (~10m) communications for implementing Wireless Personal

Area Networks (WPAN) [WiMedia Specs]. WiMax (Worldwide interoperability for

Microwave access), on the other hand, is the commercialization of the IEEE 802.16 standard

and is meant to provide high speed wireless data services over a much wider area (~5

miles) [Abichar et al 2005] . The target bands for WiMax deployment are the 2.4GHz,

3.5GHz and 5.8GHz bands. The 3.5GHz band is free in most countries except the United

States. Operation of WiMax in the 3.5GHz band is susceptible to interference from UWB

devices operational in band group 1 (3.168GHz to 4.752GHz) as per the WiMedia

specifications [WiMedia Specs]. This is particularly true in Europe, Korea and Japan as

illustrated in Figure 31.

The usage models of WiMax and UWB are both centered around laptop cards and hence an

UWB device could potentially interfere with reception at the WiMax Customer Premise

Equipment (CPE) (See Figure 32. Potentially disruptive interference between WiMax and

77

Page 66: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

UWB occurs when the WiMax equipped Customer Premise Equipment (CPE) is in close

proximity of an UWB communication pair. (See Figure 32). However since the two services

occupy different spatial scales, if the transmissions of UWB are properly coordinated they

could complement each other. The traditional regulatory mechanism to handle interference

is to separate contenders in space or in frequency. Thus regulators would impose artificial

limits on transmissions to minimize interference. This approach precludes dynamic

spatial/temporal reuse of the spectrum. Furthermore, with all frequency bands being

allocated multiple times over, new spectrum is not readily available for such allocation.

Thus by declaring that all new users of the spectrum are secondary users and requiring that

they must detect and avoid (DAA) the primary user, the regulators are opening up

spectrum for opportunistic use. In the absence of DAA functionality, UWB devices would

have to forfeit the band designated as ‘DAA required’ in Figure 31 which would greatly

reduce the spectrum available for communication.

In this section, we first describe the detection problem, profiling both downlink and uplink

detection. We then explain various avoidance techniques and justify the adopted approach

of using a ‘notch filter’. Following this, we explain on-chip detection functionality as well as

the various practical problems in implementing robust detection. Finally, we describe

research plans for investigating coexistence results with an actual WiMax system.

78

Page 67: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

Figure 31. Overlapped frequency allocation for WiMax and ultra-wideband (UWB)

79

Page 68: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

Figure 32. Potentially disruptive interference between WiMax and UWB occurs when the WiMax

equipped Customer Premise Equipment (CPE) is in close proximity of an UWB communication

pair.

The details of the design and research related to Detection and Avoidance are contained in the

Appendix.

3.5.3. Example configuration for cognitive radio engine

Figure 6 shows the infrastructure required to connect the UWB chip to the BEE2 board. The

IBOB (Infiniband Break out Board) provided the optical connection from the IBOB board to

the BEE2 board.

High speed

Parallel(ZDOK)

Infiniband

Break out Board(IBOB)

BEE2

Infiniband connection

WiMedia complaint

RF/Baseband

UWB chip with DAA

Figure 6: BEE2 with the Infiniband Break-out board (IBOB)

80

Page 69: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

3.6. Summary

3.6.1. Summary of Accomplishments

Agile radio nodes constitute a key building block for agile networks. This section

summarized research related to platform for implementing Agile Radio functionality,

leveraging configurable building blocks.

The key components of an Agile radio node include: an antenna subsystem, an agile RF

Front end, and a Base band processing engine.

� We identified technologies that enable compact, small sized antennas that are

capable of wideband performance; an example of such a technology is the class of

Meander Line Antennas. Advances in this arena will enable antennas to be

developed that achieve higher gain, allow operation over multiple frequencies,

provide directional control over mobile handset emissions, provide wider

bandwidth for ever increasing data rate requirements, and are less obtrusive.

� We described the design of an agile RF Front end for SDRs (Software Defined

Radios). Further, we also presented the details of a laboratory prototype for a

broadband RF Front end. As a demonstration, we have implemented a template

that spans the 700MHz – 1GHz band; a design for the 2.2-2.7 GHz band has also

been developed.

� We also defined a configurable platform that provides a basis for prototyping

architectures of agile radio nodes. Specifically, we have described a prototyping

platform that leverages BEE2, a reconfigurable compute platform. More broadly,

such a platform can be augmented to serve as the basis for experimenting with agile

networks by emulating networks that contain multiple nodes.

In addition to designing a platform for enabling agile radio capability, we also investigated

the mitigation of interference with other nodes that may be using shared spectrum. In

particular, we have developed cognitive techniques for interference avoidance, focusing in

particular on interference mitigation between UWB and WiMax.

3.6.2. Suggestions for Follow on Research

The prototyping platform we have developed here can be used as the basis for further

research and for prototyping solutions that are important in the DR context. For example,

the goals here include designing specific radio nodes and networks that support DR

requirements for envisioned deployment scenarios. In particular, this would entail

identifying the spectral ranges of interest, the protocols of interest, and implementing these

requirements on the RF and baseband platform with a view to investigating the feasibility

of certain cost-performance points. In addition, it would involve implementing interfaces to

81

Page 70: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

sensor networks and the DR/AMI/network infrastructure. More ambitious programs can

also be developed to leverage the research we have described here.

In summary, our research discussed here underlines the usefulness of network agility in

the DR/AMI/HAN context, and provides a basis for developing a more specific prototyping

effort in the next phase of research.

82

Page 71: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

4.0 INTERFACING AGILE NETWORKS

4.1. Introduction

When agile nodes and networks are introduced into the context of Demand-

Response/AMI/HAN systems, it is important to be able to amalgamate them into the

overall network architecture. In order to do this, it is necessary to have an interface for the

Demand-response Services network on the one hand, and to the Sensors and sensor

networks that may be deployed at home or in the business premises. This is depicted in the

figure below. This section delineates the nature of these interfaces, and defines an

architecture that incorporates the interface.

Agile

Gateway

Node/Network

DR/

Network

Services

Interface

Sensor

Network

Services

Interface

Figure 33 Interfacing Agile Networks

4.2. NETWORK SERVICES AND MANAGEMENT

A utility or third part service provider has a need to

� Define the Demand Response and other energy/information services that are offered

to a customer;

� Provision the specific service that is chosen by the customer;

� Provide support for the service, as well as associated consumer products and

infrastructure for the lifetime of the service.

o This requires supports for related activities such as monitoring, update,

management, and software download.

83

Page 72: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

Service definition is normally done by the utility service providers, using conventional

strategies that take into account customer requirements, use case scenarios, priori

experience, and business case projections.

The service provisioning process normally involves installing (and/or enabling) the

appropriate set of devices/functions in the devices. A familiar analogy in a communications

context is the process of provisioning a cable or phone service. When a new service is

requested, the Set-top box/phone (client terminal device) is installed at the customer site,

and then registered into the back-end system and network data bases. In addition to the

basic ability to receive video, place and receive calls, each set-top box is associated with a

variety of attributes (or service parameters). In the case of phone service, these might

include, for example: local area calling, vs. local and long distance, the specific rate plan

assigned to or chosen by a specific customer, etc. In addition, at the time of initial

provisioning or at a subsequent time, the phone company can enable or disable various

features such as Caller ID, 3-way calling, etc. In the case of cable TV service, this may

include the ability to download Pay-per-view movies, of a certain type, up to a limited

budget, etc.

In a similar fashion, when the consumer is initially provided a demand response service,

the service needs to be provisioned. This may involve, for example, initiating DR capability,

coordinating meter readings, setting policies, etc. The menu of services may change over

time. Further, new services/capabilities and value added features may be added over time,

e.g., the ability of a customer to view energy usage, report problems/outage. It is

conceivable that non-energy related services, such as security services, could be provided

by a utility, although this is outside the scope of this research.

4.2.1. Network Services Delivery

Network Services Delivery and Management involve the delivery, provisioning,

deployment and ongoing management of network services, and in our case, DR related

services.

This is enabled via a software platform & a basic set of services that are provided via an

abstracted interface. This can be an Application Programming Interface (API) or a web

services interface. Components of this API will be running on the utility/service provider

network side, and in the home network.

84

Page 73: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

Webpad/

Browser/

PC/ TV/ PCT...

Internet

Gateway

Utility/ …

Service Delivery

Platform (SDP)

Meter

Home Gateway

(Gateway running

SDP)

Figure 34 Example deployment of Service Delivery Platform (Software)

4.2.2. Platforms hosting the Service delivery components

To enable managed services at the point-of-use, such as a home or automobile, we

need a “gateway” device, capable of storing and running service application software. The

Gateway may be a general-purpose computer (such as a PC), a special purpose device

(such as a residential gateway, set-top box, media server or automobile multimedia

gateway), or a virtual resource in the operators network.

4.2.3. Requirements/attributes of a service delivery platform

The desirable capabilities of a network service delivery platform are that it should:

� Enable services gateways that need zero-administration

� Support secure remote operation by a service aggregator

� Enable multiple services to cooperatively share a common services gateway

� Support any combination of remote and local networks

� Be usable in home, small business, home office, industrial applications

(additionally, in the automobile).

Additional requirements of a platform include the following:

� Reliability. Large scale deployments fail without very high reliability

85

Page 74: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

� Portability. The platform must be portable across different hardware platforms, and

have an open architecture. This enables third party developers to create additional

components and services.

� Adaptability. The platform should enable the configuration to adapt to users and

operator needs over time

� Security. The platform should protect service providers from each other, and from

the user and malicious intruders.

� Quality of service. The platform should be able to guarantee a certain quality of

service.

� Scalability. Different contexts and applications may impose very different

configurations for their deployment of a framework. The platform must be

adequately scalable to support such variability.

4.2.4. Lifecycle management support

The service platform should provide support for the entire life cycle of the service process.

That is, it should enable the service to be installed, started, stopped, updated, and

ultimately uninstalled if needed.

� There should be a provision of having a registry of services available, and of those

provisioned. Appropriate notification mechanisms should enable both human and

programmatic interfaces.

� For scalable deployment, Package and version management of software on the

devices should be supported.

� An open remote management architecture is useful, because it can leverage the

ability to interface with other management modules.

� A strict separation of specifications and implementations is critical to maintain in a

platform, since over the lifespan of any such system, there will inevitably be

multiple implementations involved.

4.2.5. Service Delivery Platforms: Background

The term Service Delivery Platform (SDP) refers to a recently embraced architectural style

applied to telecommunications infrastructure problems. We are here suggesting an

expanded usage in the context of Energy and related information services, including

Demand Response. The goal of a Service Delivery Platform is to enable rapid development

and deployment of new converged services, from basic phone services to complex

audio/video conferencing for multiplayer games (MPGs), to Energy and other value added

86

Page 75: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

services. SDPs typically provide a service control environment, a service creation

environment, a service orchestration and execution environment, and abstractions for

media control, presence/location, integration, and other low-level communications

capabilities.

It is possible for a service delivery platform to feature a unified directory of customers

which provide a metadata architecture for all existing customer databases, including

business, consumer, broadband or mobile. This can be leveraged in the context of DR and

other Energy services. SDPs are applied to both consumer and business applications, with

the latter set often focused on the integration of telecom and IT capabilities. Although traditional telecommunications companies like Nortel, Avaya, Ericsson and

Alcatel-Lucent have provided communications integration interfaces and infrastructure

since the early to mid 1990s, the cost-saving success of IP-based open systems, such as

VoIP systems as replacements for proprietary PBX systems and desktop phones, has

prompted a shift in industry focus from proprietary systems to open, standard

technologies. This has also opened the door of the telecom closet to traditional IT vendors

like IBM, HP, Oracle, Redhat and BEA Systems who are developing or have developed

SDPs of their own. This strong focus on open environments has also given systems

integrators the opportunity to offer turnkey pre-packaged, integrated SDP solutions. In

addition new consortia of telecommunications new software product companies are also

emerging. By offering pre-integrated software products consortia offer an alternative

means for operators to create SDPs based on key product elements - such as convergent

billing and content/partner relationship management.

Suggested deployments can leverage open platforms as well as Java based platforms for

applications that are not that real-time sensitive.

4.3. SENSOR NETWORK SERVICES

4.3.1. Summary

A sensor network interface should enable a user (or application) to access the services

provided by a sensor network. It is desirable, indeed important, for such an interface to be

independent of the specific implementation employed, and in particular the

implementation details of the sensor hardware and software; this is to support a

heterogeneous set of sensors, and to allow for evolution in the sensors that are deployed.

There are significant benefits to making such services be available via a standard web

services interface. At the network level, it is useful to leverage a protocol such as IPv6, since

this provides for addressability at the sensor node level; using standard IP protocols also

enables a plethora of existing management tools to be used.

87

Page 76: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

From a systems perspective, the services provided by a sensor/actuator network should be

easily accessible and manageable by users/other programs. Historically, given the manner

of evolution of sensors, sensor platforms and sensor networks, most applications have

tended to use customized hardware platforms, embedded software and custom drivers. It

was then recognized that it was important to have an operating system abstraction, in order

to ease some of the pain of programming individual nodes at the assembly language level.

As a result of this, operating systems such as TinyOS [Culler et al] have been developed,

and ported to a number of hardware platforms. Industrial counterparts of such operating

systems also continue to evolve. It is nevertheless obvious that the abstraction needs to be

both standardized, as well as raised to the next level. Potential ways to do this are to

abstract the services offered at the level of sensor networks (rather than individual sensor

nodes), and adopt a standard protocol for communicating with such networks and services.

Low-power wireless personal area networks (LoWPANs) comprise devices that conform to

the IEEE 802.15.4-2003 standard by the IEEE [IEEE802.15.4]. IEEE 802.15.4 devices are

characterized by short range, low bit rate, low power and low cost. Many of the devices

employing IEEE 802.15.4 radios will be limited in their computational power, memory,

and/or energy availability.

For completeness, we provide in an appendix a brief overview of LoWPANs and describe

how they can benefit from IP and in particular IPv6 networking. (Our treatment derives

from ongoing standards body activities in the IETF and other organizations.) It describes

LoWPAN requirements with regards to the IP layer and above, and spells out the

underlying assumptions of IP for LoWPANs. We also identify some problems associated

with enabling IP communication with devices in a LoWPAN, and goals to address these in

a prioritized manner.

88

Page 77: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

5.0 Benefits to California

We summarize below the potential impact of the proposed work on Operating and Capital

Expenditure savings, benefits in the context of Demand-response networks, consumer

benefits, and benefits to the California Electric market.

Operating Expenditure Savings

It is a well-established fact in the telecommunications community that a visit to a customer

site by a maintenance/service professional for the purpose of installation or maintenance—

sometimes referred to as a “truck roll”—entails a cost of $100-200+ per visit (depending on

various associated costs and overhead). It has also been observed that for consumer related

services such as DSL, Cable modems, etc.—and utility DR/PCT/AMI deployments fall into

this category for residences—operational costs that involve more than one site visit on

average adversely impact the business case for such deployments, often to the point of

making them infeasible in practice (unless the customer is made to pay for these costs). The

implication of this observation is that unless technology similar to that proposed in this

project is leveraged in the context of DR/AMI, the business cases for deployments in the

arenas of demand response and energy efficiency may be severely impacted, and impede a

cost effective implementation of energy policy imperatives in the state.

Capital Expenditure Savings

The ability to remote provision services and upgrade capabilities after deployment avoids

the expense inherent in procuring and provisioning new premises infrastructure

equipment such as gateways and control thermostats. This can results in significant

savings, which can again be passed through to the consumer.

Benefits for Demand-Response Networks

Demand-Response Networks accrue several direct benefits from employing agile

communication nodes, including

� The ability to support configurable, software-defined radio nodes. This makes it

possible to ride the (reducing) cost curve in hardware deployments in new

buildings and homes, while enabling software service deployment platforms to be

reused. Additionally, this enables

o Software download of new, enhanced functionality, specifically (1) radio

functionality and (2) service functionality;

o Policy defined management and operation of DR networks.

o The ability to leverage evolving new technology in agile radios.

� The ability to have access to a diversity of wireless channels, and use the best

available wireless/network channel.

89

Page 78: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

� Improved redundancy at the system and network level, by virtue of having access

to more than one transit network for communication. These options can be used to

transmit and receive data, as well as to transmit and receive control signals.

� The ability to deploy and manage new value added services across such networks.

� The ability to adapt the network dynamically to reflect business processes and

network policy.

� The ability to leverage new spectrum policy that is projected to evolve significantly

over the next several years.

� The ability to obtain the best possible network rates.

Thus, the use of agile, software-defined radio nodes can provide a superior ability to

manage, upgrade and provision new services. The advantages of establishing an open,

modular, common service deployment platform include: broad acceptance of the

technology, and potential standardisation, resulting in lower development and acquisition

costs. In addition, this technology can help reduce stranded assets by supporting legacy

radio/sensor interfaces, while “future-proofing” deployments and reducing operational

costs by enabling software download of new radio functionality, and enhanced services.

Potential Consumer Benefits

The potential impact of project to the electricity consumer is indirect, and projected to be

along multiple dimensions. The consumer will have the freedom to purchase new home

electronic gadgets and have the comfort of knowing that they can work with key parts of

the installed infrastructure. In addition, we anticipate that the consumer will significantly

benefit from the energy information services and related services that are enabled, and that

these will in turn engender improved energy efficiency and demand responsiveness. Based

on initial estimations and empirical observations in related investigations at the University

of California at Berkeley, the DR based energy efficiency mechanisms that will be deployed

in this context can yield a potential savings ranging from 5 per cent to 30-49 per cent

depending on energy consumption and conservation patterns and weather patterns.

Benefit to the California electric market

It has been established that the California electric consumption patterns are such that there

can be as much as a 50% spike in peak demand during the (relatively few) very hot days

during summer. This translates into a spike in demand from a nominal load in the 30

90

Page 79: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

Gigawatt range to peak loads in the range of 45 Gigawatts. m Enablement of demand

response capability will significantly assist in the reduction in capital and operating

expenditure that is incurred by addressing the energy problem on the supply side to

provide for peak capacity. It is also projected to dramatically improve the reliability of the

grid.

In view of these figures, observations and empirical evidence, we believe that the combined

deployment of Demand response technology, energy efficiency, and energy information

services that this project is intended to enable, will have a compounding benefit—in

economic as well as environmental terms—both to the end consumer at home and in the

enterprise, as well as to California.

General Benefits

The adaptability and future proofing of resulting systems will provide benefits for all of the

stakeholders in the energy ecosystem: state policy making and regulatory agencies such as

the California Energy Commission and Public Utilities Commission can legislate and

implement policies designed to mitigate peak power requirements on the energy grid

(thereby reducing capital expenditure for new power plants and ongoing operational

expenditure associated with operating these plants); utilities and Independent System

Operators will benefit by having technology that enables them to comply with regulatory

requirements, support dynamic real time pricing and emergency curtailment signals,

improve grid reliability, and bolster their existing business cases for advanced metering

infrastructure; equipment vendors will benefit from a set of reusable platform components

that can enable cost-effective products for their customers; and end consumers will benefit

from reduced energy consumption (and therefore reduced energy bills) while maintaining

desired comfort levels.

m These figures were obtained from conversations with the California Energy Commission, Commissioner Art

Rosenfeld, Ron Hofmann, and other consultants and authors; they are also documented in parts in various

publications from the DRRC.

91

Page 80: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

Glossary

AAA Authentication, Authorization, and Accounting

A/D Analog to Digital

AES Advanced Encryption Standard

AMI Advanced Metering Infrastructure

AMR Automatic Meter Reading

ANSI America National Standards Institute

BPL Broadband over powerline

CATV Cable TV

CCMP Counter-Mode/CBC-MAC Protocol

CDMA Code Division Multiple Access

CDPD Cellular Digital Packet Data

CEC California Energy Commission

CFAA Computer Fraud and Abuse Act

CIEE

UCOP

California Institute for Energy and Environment, Office of the President,

University of California

CPUC California Public Utilities Commission

DR Demand Response

DSL Digital Subscriber Line

ECPA Electronic Communications Privacy Act

EM Electromechanical

EPRI Electric Power Research Institute

ESP Energy Service Provider

92

Page 81: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

GPRS General Packet Radio Service

GSM Global System for Mobile Communications

HVAC Heating, Ventilation, and Air Conditioning

iDEN Integrated Digital Enhanced Network

IECSA Integrated Energy and Communications Systems Architecture

IEEE Institute of Electrical and Electronics Engineers

IPSec IPSec is a framework of open standards developed by the Internet Engineering

Task Force (IETF). IPSec provides security for transmission of sensitive

information over unprotected networks such as the Internet.

ISO International Organization for Standardization

ISOs Independent Service Operators

LAN Local-Area Network

LEO Low Earth Orbit

MAC Message Authentication Code (Also used as an abbreviation for Medium Access

Protocol in the context of networking.)

NG Next Generation

NIST National Institute of Standards and Technology

NOC Network Operating Center

PG&E Pacific Gas & Electric

PON Passive Optical Networks

SCE Southern California Edison

SDG&E San Diego Gas & Electric

SDR Software Defined Radio

SPP Statewide Pricing Pilot

U.C. University of California

93

Page 82: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

VPN Virtual Private Network

WEP Wired Equivalent Protection

WiFi Wireless Fidelity, IEEE 802.11 standard

WLAN wireless local area network

94

Page 83: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

6.0 References

[Abichar 2005] Z. Abichar, Yanlin Peng, and J.M. Chang. WiMax: The Emergence of

Wireless Broadband. IT Professional, 8(4):44 – 48, July 2005

[Arens-Wright] Ed Arens, Paul Wright, et al. New Thermostat and Meter DRETD Project,

UC Berkeley, 2004.

[Bellare et al 98] M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. .Relations Among

Notions of Security for Public-Key Encryption Schemes. In Proceedings of CRYPTO '98.

[Blass & Zitterbart 2005] E.-O. Blass and M. Zitterbart. .Efficient Implementation of Elliptic

Curve Cryptography for Wireless Sensor Networks. Technischer Bericht, Telematics

Technical Reports TM-2005-1, Mar 2005 (ISSN 1613-849X).

[BORPH]

[So 2007] Hayden Kwok-Hay So, BORPH: An Operating System for FPGA-Based

Reconfigurable Computers, Ph.D. Thesis, University of California, Berkeley, 2007.

[Camera et al 2005] K. Camera, H. K.-H. So, R. W. Brodersen, "An Integrated Debugging

Environment for Reprogrammble Hardware Systems," Sixth International Symposium

on Automated and Analysis-Driven Debugging, Monterey, CA., September 19-21, 2005

[Cabric et al 2006] D. Cabric, A. Tkachenko, R.W. Brodersen, “Spectrum Sensing

Measurements of Pilot, Energy, and Collaborative Detection”, IEEE Military

Communications Conference (MILCOM), Oct. 2006

[CommonCriteria] Common Criteria,

http://www.commoncriteriaportal.org/public/files/ccintroduction.pdf.

[Chan et al 2004] H. Chan, A. Perrig, and D. Song. .Key distribution techniques for sensor

networks. In Wireless sensor networks, 2004, pp. 277.303. Kluwer Academic Publishers,

Norwell, MA, USA.

[Chang 2005]Chen Chang, "Design and Applications of a Reconfigurable Computing

System for High Performance Digital Signal Processing," Ph.D. Thesis, Advisor:

Robert Brodersen, University of California, Berkeley, 2005

[DRETD] Demand Response Enabling Technology Development Project,

http://ciee.ucop.edu/dretd/

95

Page 84: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

[CR]

[FCC NPRM 2003] FCC, Notice of Proposed Rule Making and Order, ET Docket No. 03-322,

Dec 30, 2003

[FCC SPTF 2002] FCC Spectrum Policy Task Force, “Report of the Spectrum Efficiency

Working Group,” November 15, 2002

[FIPS] Federal Information Processing Standard (FIPS) 197: Advanced Encryption

Standard. (See also http://csrc.nist.gov/cryptval/140-2.htm)

[Goldwasser and Micali 84] S. Goldwasser and S. Micali. .Probabilistic Encryption. Journal

of Computer and System Sciences 28:270.299, April 1984.

[Hu & Perrig 2004] Y. Hu and A. Perrig. .A Survey of Secure Wireless Ad Hoc Routing.

IEEE Security & Privacy, special issue on Making Wireless Work, 2(3):28-39, IEEE,

May/June 2004.

[Hu et al 2003] Y. Hu, A. Perrig, and D. Johnson. .Packet Leashes: A Defense against

Wormhole Attacks in Wireless Ad Hoc Networks. In Proceedings of the Twenty-Second

Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM

2003), vol. 3, pp. 1976-1986, IEEE, San Francisco, CA, April 2003.

[Hu et al 2003b] Y. Hu, A. Perrig, and D. Johnson. Rushing Attacks and Defense in Wireless

Ad Hoc Network Routing Protocols. Proceedings of the 2003 ACM Workshop on

Wireless Security (WiSe 2003), pp. 30-40, ACM, San Diego, CA, September 2003.

96

Page 85: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

[Hughes 2003] Joe Hughes, The Integrated Energy and Communications Systems

Architecture (IECSA) Project, Electric Power Research Institute June 4, 2003,

http://ciee.ucop.edu/dretd/

[ICP] http: //www.epri-intelligrid.com/

intelligrid/docs/intelligrid_Consumer_Portal_Project_Plan_November_2004.pdf

[ICP-CPS] Intelligrid Consumer Portal FAQ_and_Survey, April 4, 2005. From http:

//www.epri-intelligrid.com/

[IECSA 2003] Integrated Energy and Communications Systems Architecture. Initial

Applications Scope and Stakeholder Identification, Task 1 Final Report, 2003.

[IEEE 802.11i] IEEE 802.11i Std 802.11i, July 2004

[IEEE 802.1X ] IEEE 802.1X-Rev Draft 10.0, June 2004

[IEEE 802.11i] IEEE Standard for Information technology- Telecommunications and

information exchange between systems- Local and metropolitan area networks- Specific

requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical

Layer (PHY) specifications Amendment 6: Medium Access Control (MAC) Security

Enhancements. IEEE Std 802.11i- 2004, Vol., Iss., 2004 pp. 1.175.

[IEEE 802.15.4] IEEE standard for information technology - telecommunications and

information exchange between systems - local and metropolitan area networks specific

requirements part 15.4: wireless medium access control (MAC) and physical layer

(PHY) specifications for low-rate wireless personal area networks (LR-WPANs). IEEE

Std 802.15.4-2003, Vol., Iss., 2003 pp.1.670.

[ITU] http://www.itu.org

97

Page 86: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

[Jo et al. 2005] Young-Min Jo et al. Development of a Compact Internal Antenna for Commercial

CDMA/GPS Folder Type Handsets, SkyCross Inc. Technical report, Jan. 2005.

[Johnson Controls] Johnson Controls. Wireless Temperature Sensing System. Lit. Code No.

LIT-1171100. Available at http://cgproducts.johnsoncontrols.com/metfipdf/1171100.pdf

[Karlof & Wagner 2003] C. Karlof and D. Wagner. .Secure Routing in Sensor Networks:

Attacks and Countermeasures. Ad Hoc Networks, vol 1, issues 2.3 (Special Issue on

Sensor Network Applications and Protocols), pp. 293-315, Elsevier, September 2003.

[Mathworks] http://www.mathworks.com

[Mishra 06] S.M. Mishra, A. Sahai, and R.W. Brodersen. Cooperative Sensing Among

Cognitive Radios. In Proc. of the IEEE International Conference on Communications

(ICC), 2006

[Mishra et al 2006] S.M. Mishra, R. Tandra, A. Sahai, “The case for Multiband Sensing”,

Proc. Of the 45th Annual Allerton Conference on Communication, Control, and

Computing.

[Mitola 2001] Joseph Mitola III, “Cognitive Radio for Flexible Mobile Multimedia

Communications,” Mobile Networks and Applications, Volume 6, Number 5, Sept. 2001

[Network Management RON] Demand Response Enabling Technology Development

Project: Network Management Research Opportunity Notice, June 4, 2003,

http://ciee.ucop.edu/dretd/

[Neuman & Ts'o 1994] B.C. Neuman and T. Ts'o. .Kerberos: An Authentication Service for

Computer Networks. In IEEE Communications, 32(9):33-38. September 1994.

[Newsome et al. 2004] J. Newsome, E. Shi, D. Song and A. Perrig. .The Sybil Attack in

Sensor Networks: Analysis and Defenses. In Proc, of IPSN 2004, Berkeley, CA, April

2004.

[NSA] http://www.nsa.gov/

[OpenAMI] Advanced Metering Infrastructure. http://www.OpenAMI.org

98

Page 87: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

[Parno et al 2005] B. Parno, A. Perrig and V. Gligor. .Distributed Detection of Node

Replication Attacks in Sensor Networks. In Proceedings of the 2005 IEEE Symposium

on Security and Privacy, May 2005.

[PCAST CIP 1998] PCAST Letter on Critical Infrastructure Protection, President’s

Committee of Advisors on Science and Technology, 10 December 1998,

http://www.ostp.gov/html/pcastcip.html A National R&D Institute for Information Infrastructure

Protection (I3P), Institute for Defense Analyses, April 2000, IDA Paper P-3511 White Paper

on the Institute for Information Infrastructure Protection, Office of Science and Technology

Policy, 11 July 2000

[Poon, Brodersen & Tse 2003]. Ada S. Y. Poon, Robert W. Brodersen and David N. C. Tse,

“Degrees of Freedom in Spatial Channels: A Signal Space Approach”, submitted to

IEEE Trans. on Information Theory, August 2003.

[Sahai 06] A. Sahai, R. Tandra, S.M. Mishra, and N.K.Hoven. Fundamental Design

Tradeoffs in Cognitive Radio Systems. In Proc. of the First International Workshop on

Technology and Policy for Accessing Spectrum, (TAPAS), 2006.

[Sastry & Wagner 2004] N. Sastry and D. Wagner. Security Considerations for IEEE 802.15.4

Networks. ACM Workshop on Wireless Security (WiSE 2004). October 1, 2004.

[Semantic Web] The W3C Semantic Web, http://www.w3.org/.

[SDR Forum] Software Defined Radio Forum, http://www.sdrforum.org

[So 2007] Hayden Kwok-Hay So, BORPH: An Operating System for FPGA-Based

Reconfigurable Computers, Ph.D. Thesis, University of California, Berkeley, 2007.

[Trs Systems] Trs Systems Inc. WT1630A, B, C WirelessWall Temperature Sensors., Rev. 6.

Available at http://www.trssys.com/specifications/WT1630%20rev6.PDF

99

Page 88: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

[TCG] Trusted Computing Group, https://www.trustedcomputinggroup.org.

[Tandra 05] R. Tandra and A. Sahai. Fundamental limits on detection in low SNR under

noise uncertainty. In Proc. of the WirelessCom 05 Symposium on Signal Processing, 2005.

[Tkachenko et al 2006a] A. Tkachenko, D. Cabric, R.W. Brodersen, "Cyclostationary Feature

Detector Experiments Using Reconfigurable BEE2," International Conference on Dynamic

Spectrum Access Networks, April 2007.

[Tkachenko et al 2006b] Artem Tkachenko, Danijela Cabric, R.W. Brodersen, “Cognitive

Radio Experiments using Reconfigurable BEE2” Asilomar Conference on Signals, Systems, and

Computers, November 2006

[Wagner 2004] D. Wagner. Resilient Aggregation in Sensor Networks. 2004 ACM

Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), October 25, 2004.

[Wander et al 2005] A. Wander, N. Gura, H. Eberle, V. Gupta, S. Shantz. Energy Analysis of

Public-Key Cryptography for Wireless Sensor Networks. In Third IEEE International

Conference on Pervasive Computing and Communication (PerCom 2005)., March 2005.

[WiMedia Specs] Javier del Prado Pavn, Sai Shankar N, Vasanth Gaddam, Kiran Challapali,

and Chun-Ting Chou. The MBOA-WiMedia specification for ultra wideband distributed

networks. IEEE Communications Magazine, 44(6):128 – 134, June 2006

[Xilinx] http://www.xilinx.com

[Zhang and Zheng 1997] X.M. Zhang and Y. Zheng. Cryptographically resilient functions. In

IEEE Transactions on Information Theory, 43(5):1740--1747, September 1997.

100

Page 89: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-1

7.0 APPENDIX

7.1. A review of some OSI-related networking terms

For completeness, this Appendix briefly reviews the seven-layer Open System

Interconnection (OSI) reference model.

The Open System Interconnection (OSI) reference model describes how information from a

software application in one computer moves through a network medium to a software

application in another computer. The OSI reference model is a conceptual model composed

of seven layers, each specifying particular network functions. The model was developed by

the International Organization for Standardization (ISO) in 1984; it is often used as a

primary architectural model for intercomputer communications, although there are

normally some variations with the TCP/IP stack that had a parallel and earlier history of

evolution in the US and ARPANET. The OSI model divides the tasks involved with moving

information between networked computers into seven smaller, more manageable task

groups. A task or group of tasks is then assigned to each of the seven OSI layers. Each layer

is reasonably self-contained so that the tasks assigned to each layer can be implemented

independently. This enables the solutions offered by one layer to be updated without

adversely affecting the other layers.

Figure 35. The Layers of the OSI Model

The following list details the seven layers of the Open System Interconnection (OSI)

reference model:

101

Page 90: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-2

� Layer 7—Application Layer

This layer supports application and end-user processes. Communication

partners are identified, quality of service is identified, user authentication and

privacy are considered, and any constraints on data syntax are identified.

Everything at this layer is application-specific. This layer provides application

services for file transfers, e-mail, and other network software services. Telnet

and FTP are applications that exist entirely in the application level.

� Layer 6—Presentation Layer

This layer provides independence from differences in data representation (e.g.,

encryption) by translating from application to network format, and vice versa.

The presentation layer works to transform data into the form that the

application layer can accept. This layer formats and encrypts data to be sent

across a network, providing freedom from compatibility problems. It is

sometimes called the syntax layer.

� Layer 5—Session Layer

This layer establishes, manages and terminates connections between

applications. The session layer sets up, coordinates, and terminates

conversations, exchanges, and dialogues between the applications at each end. It

deals with session and connection coordination.

� Layer 4—Transport

This layer provides transparent transfer of data between end systems, or hosts,

and is responsible for end-to-end error recovery and flow control. It ensures

complete data transfer.

� Layer 3—Network

This layer provides switching and routing technologies, creating logical paths,

known as virtual circuits, for transmitting data from node to node. Routing and

forwarding are functions of this layer, as well as addressing, internetworking,

error handling, congestion control and packet sequencing.

� Layer 2—Data link

102

Page 91: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-3

At this layer, data packets are encoded and decoded into bits. It furnishes

transmission protocol knowledge and management and handles errors in the

physical layer, flow control and frame synchronization. The data link layer is

divided into two sublayers: The Media Access Control (MAC) layer and the

Logical Link Control (LLC) layer. The MAC sublayer controls how a computer

on the network gains access to the data and permission to transmit it. The LLC

layer controls frame synchronization, flow control and error checking.

� Layer 1—Physical

This layer conveys a logical bit stream over a physical medium -- e.g., electrical

signal (over a wire), light (over an optical fiber) or radio signal (for wireless

transmission) -- through the network at the electrical and mechanical level.

The physical layer defines the electrical, mechanical, procedural, and functional

specifications for activating, maintaining, and deactivating the physical link

between communicating network systems. Physical layer specifications define

characteristics such as voltage levels, timing of voltage changes, physical data

rates, maximum transmission distances, and physical connectors.

The seven layers of the OSI reference model can be divided into two categories: upper

layers and lower layers.

The upper layers of the OSI model deal with application issues and generally are

implemented in software. The highest layer, the application layer, is closest to the end user.

Both users and application layer processes interact with software applications that contain

a communications component. The term upper layer is sometimes used to refer to any layer

above another layer in the OSI model.

The lower layers of the OSI model handle data transport issues. The physical layer and the

data link layer are implemented in hardware and software. The lowest layer, the physical

layer, is closest to the physical network medium (the network cabling, for example) and is

responsible for actually placing information on the medium.

103

Page 92: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-4

7.2. IPv6 or IPng (IP Next generation)

IPv6 is short for "Internet Protocol Version 6". IPv6 is the "next generation" protocol designed by the IETF

(The Internet Engineering Task Force) to replace the current version Internet Protocol, IP Version 4

("IPv4"). The IP v6 specifications are in RFC 2460.

Most of today's Internet uses IPv4, which is now over twenty years old. IPv4 has been remarkably resilient

in spite of its age, but it is beginning to have problems. Most importantly, there is a growing shortage of

IPv4 addresses, which are needed by all new machines added to the Internet.

IPv6 fixes a number of problems in IPv4, such as the limited number of available IPv4 addresses. It also

adds many improvements to IPv4 in areas such as routing and network auto configuration. IPv6 is

expected to gradually replace IPv4, with the two coexisting for a number of years during a transition

period.

The figures below show the packet structure, and the differences between IPv4 and IPv6.

104

Page 93: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-5

Figure 36. IPv4 vs IPv6 Comparison

Streamlined

� Fragmentation fields moved out of base header

� IP options moved out of base header

� Header checksum eliminated

� Header length field eliminated

105

Page 94: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-6

� Length field excludes IPv6 header

� Alignment changed from 32 to 64 bits

Revised

� Time to live � hop limit

� Protocol � next header

� Precedence and TOS � traffic class

� Addresses increased 32 bits � 128 bits

Extended

• Flow label field added

Figure 37. IPv6 Header Options

106

Page 95: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-7

Figure 38 IPv6 Packet Format

107

Page 96: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-8

7.3. XML

The Extensible Markup Language (XML) is a general-purpose markup language; more precisely, XML is a

general-purpose specification for creating custom markup languages. It is classified as an extensible

language because it allows its users to define their own “tags”. Its primary purpose is to facilitate the

sharing of data across different information systems, particularly via the Internet [Bray et al 2006].

It is a simplified subset of the Standard Generalized Markup Language (SGML), and is designed to be

relatively human-legible. By adding semantic constraints, application languages can be implemented in

XML.

[Bray et al 2006] Bray, Tim; Jean Paoli, C. M. Sperberg-McQueen, Eve Maler, François Yergeau (September

2006). Extensible Markup Language (XML) 1.0 (Fourth Edition) - Origin and Goals.

7.4. SOAP

SOAP originally stood for Simple Object Access Protocol, and was also later used as an abbreviation for

Service Oriented Architecture Protocol, but is now simply SOAP. SOAP is a protocol for exchanging

XML-based messages over computer networks, normally using HTTP/HTTPS. SOAP forms the foundation

layer of the Web services stack, providing a basic messaging framework that more abstract layers can build

on.

There are several different types of messaging patterns in SOAP, but by far the most common is the

Remote Procedure Call (RPC) pattern, in which one network node (the client) sends a request message to

another node (the server), and the server immediately sends a response message to the client.

7.5. REST

Representational State Transfer (REST) is a style of software architecture for distributed hypermedia

systems such as the World Wide Web. The term was introduced in the doctoral dissertation in 2000 by Roy

Fielding, one of the principal authors of the Hypertext Transfer Protocol (HTTP) specification, and has

come into widespread use in the networking community. REST strictly refers to a collection of network

architecture principles that outline how resources are defined and addressed. The term is often used in a

looser sense to describe any simple interface that transmits domain-specific data over HTTP without an

additional messaging layer such as SOAP or session tracking via HTTP cookies. These two meanings can

conflict as well as overlap. It is possible to design any large software system in accordance with Fielding's

REST architectural style without using the HTTP protocol and without interacting with the world wide

web. It is also possible to design simple XML+HTTP interfaces that do not conform to REST principles, and

instead follow a Remote Procedure Call model.

108

Page 97: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-9

7.6. Details of the RF Front End Design

In this section, we include some of the design details pertaining to the Agile radio testbed design that are

not elaborated upon in the main body of the report.

7.6.1. Front End Analog Hardware

The protocols that are currently being considered in context of Demand-Response and Home Area

Networks include WiFi and ZigBee, which lie in the 2.4 GHz and 900 MHz ISM bands. As a

consequence, we selected the following frequency bands for an initial experiment in the design of

the RF Front end analog hardware.

� 2.45GHz band: 2.2GHz – 2.7GHz Receiver

� 2.45GHz band: 2.2GHz – 2.7GHz Transmitter

� TV + ISM band: 600MHz - 1GHz Receiver

� TV + ISM band: 600MHz - 1GHz Transmitter

This choice has the benefit of including the bands of interest for DR/HAN contexts, while also allowing

bands that overlap with Analog TV and WiMAX.

2.45GHz +/- 250MHz Receiver Design

The salient aspects of this design are described below.

� The signal is split into I and Q digitally in the iBOB or BEE2. This can thus be described as “Real

sampling” design.

� The receiver operates in the 2200MHz – 2700Mhz range, and has a 500MHz bandwidth

� The input is down-converted to baseband, and digitized at 1.6 Gsps (Giga Samples per second) by

iADC

� 1.2 GHz processing thru iDAC, upconverted to center frequency fc = 2.45GHz

� Existing Simulink and Verilog libraries are used to implement the hardware on iBOB or BEE2

� Digital signals received into or transmitted from Block RAMs on BEE2. Digital signals in Block

RAMs ready for processing.

109

Page 98: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-10

2.45GHz +/-250MHz Receiver

BEE2

Existing

Board

Gain

VLFX-500

DC-500MHz

ZX05-30W

300MHz-4GHz

Mixer

Band Pass Filter

Frequency

Synthesizer

Frequency

synthesizer

Analog Devices EVAL-ADF4106EBZ1

withV600ME05 (VCO 1500-2350MHz)

800MHz

(1.6Gsps data rate)

Note:All part nos: Minicircuits unless otherwise indicated

High

Pass

Filter

Low

Pass

Filter

iADC

Existing

Board

Atmel

AT84AD001

iBOB

Existing

Board

Xilinx

XC2VP50

Low

Pass

Filter

VHF-1910+

2200-4400MHz

fco 1910MHz

SLP-2950

DC-2700MHz

fco 2950MHz

+12v

GND

Analog Devices EVAL-ADF4106EBZ1

withV585ME40-L (VCO 800-1650MHz)

+9v (battery) +9v (battery)

SHM031707

ZX60-3018G

20-3000MHz

20dB gain

Gain

+12v

GND

2.2GHz GND

+5v

Figure 39 2.45GHz +/- 250MHz Receiver Design Block Diagram

Figure 40 2.45GHz +/- 250MHz Receiver Design using minicircuits

110

Page 99: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-11

2.45GHz +/-250MHz Receiverwith iADC and iBOB

Figure 41 Receiver with iBOB and iADC

SDR Frontend

2.4GHz +/-300MHz Receiver v1.0

SDR Frontend

2.4GHz +/-300MHz Receiver v1.0

Band-

pass

ADC

Existing

Board

IBOB

Existing

Board

BEEII

Existing

Board

GainOptional

gain

Splitter

0 degree

MixerLow Pass Filter

VLF-225

ZX05-30W

Mixer

Mitek AFD3-02302708

ZX60-3018GZX10-2-42

Splitter

90 degree

Frequency

Synthesizer

Frequency

synthesizer

Analog Devices EVAL-ADF4360-1EB1

Or

Valon Technology

2400MHz +10dBm

800MHz

0dBm

Notes:

All part nos: Minicircuits

unless otherwise indicated

ZX10Q-2-27

Figure 42 Broadband receiver design at 2.4 GHz

111

Page 100: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-12

SDR Frontend

2.4GHz +/-300MHz Transmitter v1.0April 28, 2006

SDR Frontend

2.4GHz +/-300MHz Transmitter v1.0April 28, 2006

DAC

Existing

Board

IBOB

Existing

Board

BEEII

Existing

Board

Splitter

0 degree

MixerLow Pass Filter

VLF-225

ZX05-30W

Mixer

Mitek AFD3-02302708

ZX60-3018GZX10-2-42

Splitter

90 degree

Frequency

Synthesizer

Frequency

synthesizer

Analog Devices EVAL-ADF4360-1EB1

Or

Valon Technology

2400MHz +10dBm

800MHz

0dBm

Notes:

All part nos: Minicircuits

unless otherwise indicated

ZX10Q-2-27

Bandpass Gain Optional

Gain

Figure 43 Broadband Transmitter Design at 2.4 GHz

The illustrations above indicate the SDR broadband front designs that have been coupled into the system.

Front End Matlab Designs

For both the receiver and transmitter designs, the blocks used were assembled from the Simulink Xilinx

System generator library, custom BEE2 library blocksets, and software programmable registers.

The transmitter design shown in the figure depicts the signal flow path from the Optical Transceiver via

the XAUI ports to the IBOB, and then onto the IBOB � DAC� analog out.

112

Page 101: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-13

Figure 44 The transmitter design – Optical Transceiver -> XAUI -> IBOB -> DAC-> analog out

The Receiver Design – Analog signal flows from the RF analog frontend -> ADC -> IBOB-> Xaui connector

to optical transceiver. The ADC, IBOB, and XAUI connector all have different clock rates. The signal

needed to be controlled thru each step.

113

Page 102: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-14

Figure 45 Fragments of the Transceiver design

114

Page 103: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-15

Figure 46 The Receiver Design. Analog Signal path from RF Analog Front end to ADC, IBOB, Xaui connector to

the Optical tranceiver

7.7. Cognitive techniques for Interference avoidance

This section of the Appendix contains details relating to the implementation of Detection and Avoidance techniques in

the context of our Cognitive radio research (but that were not included in the main body of the report).

7.7.1. Abstract

Cognitive radios have been advanced as a technology for the opportunistic use of under-utilized spectrum

wherein secondary devices sense the presence of the primary user and use the spectrum only if it is

deemed empty. The distinguishing aspect of cognitive radios is the ability to sense the primary user and

modify their transmission parameters to avoid interference to the primary.

In this section we explore the use of cognitive technology to enable the operation of ultra-wideband (UWB)

devices in WiMax bands. In this particular example UWB devices must incorporate cognitive technology to

detect and avoid (DAA) WiMax devices in certain regulatory domains.

115

Page 104: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-16

We start by discussing various options for detection and avoidance. We then describe the obstacles faced in

achieving robust detection and avoidance with an on-chip implementation of basic DAA functionality.

This implementation is based on the energy detector and can reliably detect WiMax uplink transmissions.

Finally, we describe an empirical set up for the operation of a single cognitive technology enabled UWB

device with a WiMax system. This interaction also highlights the problem of dealing with listen before

speak primaries where secondary transmission could interfere by denying the primary access to the

medium.

7.7.2. Introduction

Ultra-wideband (UWB) technology is termed as such since it occupies large swathes of spectrum and uses

very low power to communicate. UWB’s intended use is in the 3- 10GHz bands for short range (~10m)

communications for implementing Wireless Personal Area Networks (WPAN) [WiMedia Specs]. WiMax

(Worldwide interoperability for Microwave access), on the other hand, is the commercialization of the

IEEE 802.16 standard and is meant to provide high speed wireless data services over a much wider area

(~5 miles) [Abichar et al 2005] . The target bands for WiMax deployment are the 2.4GHz, 3.5GHz and

5.8GHz bands. The 3.5GHz band is free in most countries except the United States. Operation of WiMax in

the 3.5GHz band is susceptible to interference from UWB devices operational in band group 1 (3.168GHz

to 4.752GHz) as per the WiMedia specifications [WiMedia Specs]. This is particularly true in Europe, Korea

and Japan as illustrated in Figure 31.

The usage models of WiMax and UWB are both centered around laptop cards and hence an UWB device

could potentially interfere with reception at the WiMax Customer Premise Equipment (CPE) (See Figure

32. Potentially disruptive interference between WiMax and UWB occurs when the WiMax equipped

Customer Premise Equipment (CPE) is in close proximity of an UWB communication pair. (See Figure 32).

However since the two services occupy different spatial scales, if the transmissions of UWB are properly

coordinated they could complement each other. The traditional regulatory mechanism to handle

interference is to separate contenders in space or in frequency. Thus regulators would impose artificial

limits on transmissions to minimize interference. This approach precludes dynamic spatial/temporal reuse

of the spectrum. Furthermore, with all frequency bands being allocated multiple times over, new spectrum

is not readily available for such allocation. Thus by declaring that all new users of the spectrum are

secondary users and requiring that they must detect and avoid (DAA) the primary user, the regulators are

opening up spectrum for opportunistic use. In the absence of DAA functionality, UWB devices would have

to forfeit the band designated as ‘DAA required’ in Figure 31 which would greatly reduce the spectrum

available for communication.

In this section, we first describe the detection problem, profiling both downlink and uplink detection. We

then explain various avoidance techniques and justify the adopted approach of using a ‘notch filter’.

Following this, we explain on-chip detection functionality as well as the various practical problems in

116

Page 105: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-17

implementing robust detection. Finally, we describe research plans for investigating coexistence results

with an actual WiMax system.

Figure 47. Overlapped frequency allocation for WiMax and ultra-wideband (UWB)

117

Page 106: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-18

Figure 48. Potentially disruptive interference between WiMax and UWB occurs when the WiMax equipped

Customer Premise Equipment (CPE) is in close proximity of an UWB communication pair.

7.7.3. Detection

The detection problem for UWB can be formulated as a binary hypothesis testing problem, where the aim

is to distinguish between the ‘signal present’ hypotheses and the ‘signal absent’ hypotheses.

When the ‘signal present’ hypotheses is true, the WiMax signal is present together with noise. The WiMax

signal could be a downlink transmission from the basestation to the CPE or uplink transmission from CPE

to the base station or could include both if WiMax employs time division duplexing between uplink and

downlink transmissions.

The key parameters in evaluating a detection algorithm are the probability of missed detection (PMD) and

the probability of false alarm (PFA). Probability of missed detection is the probability that the detection

algorithm is unable to detect the presence of a primary signal. Probability of false alarm on the other hand,

is the probability that noise triggered the detection algorithm into falsely believing the presence of a

primary signal. We would like to minimize both.

7.7.4. Downlink Detection

The downlink detection problem is similar to the digital TV detection problem being studied by the IEEE

802.22 group and other research efforts. In the presence of a WiMax basestation, the downlink will be

present with a very high activity factor which enables faster detection. However, if the UWB device is far

from the base station, detection of the downlink signal requires high detection sensitivity (Detection

sensitivity is defined as the minimum received power per unit bandwidth (dBm/MHz) that can be detected

while achieving the target PMD) which can be achieved only with large sensing times For a given target PMD,

the detection sensitivity of the receiver can be calculated based on the distribution function of the loss (path

118

Page 107: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-19

loss, multipath, shadowing [Mishra 06]. An easier way to calculate downlink detection sensitivity

requirements, would be to set the sensitivity equal to that of a typical WiMax receiver ($\sim$-

100dBm/MHz) and budget an additional 10-20dB fading margin. Cooperative sensing can help reduce the

fading margin to this level [Mishra 06].

7.7.5. Uplink Detection

Detecting the uplink is relatively easier since the subscriber station is close to the UWB device. If the

downlink and uplink transmissions are time multiplexed, calculating the sensitivity is straight-forward. In

this case, channel reciprocity holds and the detection and interference ranges are tightly coupled (This

assumes no spatial selectivity). The thermal noise floor in a 1MHz band is -114dBm. Typical Interference-

to-Noise Ratio (INR) requirements at a WiMax receiver is around 6dB. Assuming a receiver noise figure of

5dB, this gives us a maximum interference limit of -115dBm. Since the UWB transmission device has a FCC

imposed power limit of -41dBm/MHz, a 74dB (-41-(-115) = 74) isolation is needed between the WiMax CPE

and UWB devices. Typical WiMax CPE's transmit at 21dBm in a 20MHz band (~8dBm per MHz). With a

74dB isolation, this translates into a detection sensitivity of -66dBm/MHz.

In the case where the uplink and the downlink are separated in frequency, the multipath characteristics of

the two may be completely different. On the other hand, shadowing correlation between downlink and

uplink frequencies is fairly high (0.66-0.9). Together we can budget an additional 20 dB for multipath and

shadowing mismatch. Hence in this case we will need to detect a signal of -86dBm/MHz.

As opposed to downlink detection, uplink detection confirms the presence of an actual WiMax CPE.

Unfortunately, a CPE may never transmit if it cannot hear the downlink in the first place. Hence

mechanisms are needed in the UWB device to ensure that the downlink signal can be heard by the CPE.

The problem that the CPE may never transmit if it does not hear the downlink, falls under the general

problem of dealing with primary devices which follow the listen before talk protocol. Interference to the

primary in this case is different from the traditional additive interference; a secondary does not interfere

with a primary's transmission but with its access to the medium. Another case of the same would be

cognitive radios operating in the ISM bands where WiFi radios are the de facto primary users. Since WiFi

radios employ Carrier Sense Multiple Access (CSMA) protocol, they will not transmit if they hear another

secondary device and hence may never access the medium.

7.7.6. Avoidance

The avoidance problem requires a UWB device to cease transmission and/or reduce transmit power in the

bands where a WiMax link is detected. Avoidance techniques fall under one of the two classes - Receiver

Aware or Receiver Unaware. In the first class of techniques, the receiver is aware of the changes in the

transmission parameters (e.g. the receiver knows which subcarriers are not used) and may use the

knowledge to improve its link performance. In the second class, the receiver is unaware of the

modifications and tries to reconstruct information lost by exploiting the redundancy due to channel

119

Page 108: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-20

coding. The following is a list of possible avoidance techniques specific to the UWB implementation based

on the WiMedia standard (WiMedia specifies OFDM modulation using a 128-point FFT):

Band Dropping: Each band group (a band group consists of three 528MHz wide frequency bands) is

utilized for UWB communication by hopping between the three bands. If WiMax is detected on any one of

the bands, the UWB devices could switch to a two-band hopping sequence. The switching is directed by

the MAC layer at both the transmitter and receiver.

Subcarrier Nulling: In this approach, the transmitter does not send data on subcarriers that need to be

avoided. The receiver may or may not know about the existence of the nulled subcarriers. The effect of

subcarrier nulling on the UWB spectrum is shown in Figure 3. Even with 48 subcarriers nulled, the

maximum attenuation possible is 22dB, due to the sidelobes of the neighboring subcarriers (those close to

the nulled subcarriers) filling up the `notch'.

Windowing: The problem with subcarrier nulling is that the sidelobes of the sinc impulse (due to the

rectangular window, each subcarrier is convolved with a sinc impulse in the frequency domain) are not

attenuated enough. One way around this problem is to smoothen the time domain waveform by using a

raised cosine filter. The receiver does not need to be aware of the windowing function being used. Our

simulations reveal that a combination of subcarrier nulling and a raised cosine window, can yield a

maximum attenuation of 25dB (this is true even with raised cosine roll-off factor (β) equal to 1).

Unfortunately, using the raised cosine filter violates the WiMedia specifications which require a null

postfix.

Cancellation Carriers: Another way to combat the problem is to use a few subcarriers adjacent to the

subcarriers being avoided to suppress the sidelobes of the transmitted spectrum. This technique is

sometimes referred to as `active interference cancelation'. The information on the subcarriers that have

been `spoiled' can be recovered by channel decoding. A system of linear equations has to be solved to

compute the coefficients of the cancellation carriers which requires on-chip matrix inversion -- an area

intensive proposition. Cancellation carriers can achieve large attenuation levels.

Notch Filter: The transmitter implements a digital notch filter in the time domain (post IFFT) so as to notch

out the corresponding subcarriers. Again, the location of the notch may or may not be available to the

receiver. The digital notch filter overcomes the deficiency of subcarrier nulling by removing the sidelobes.

Attenuation of around 40dB at the DAC input can be achieved by using a notch filter of sufficient order.

However, the actual notch depth at the RF output, as with any of the nulling/notching techniques

described earlier, is limited by the precision of the DAC and the non-linearities/phase noise of the RF.

Figure 3(b) shows the actual spectrum of the UWB signal with a notch of width 13 subcarriers. The

attenuation achieved is greater than 27dB.

For the purposes of DAA, notch filtering was the avoidance method of choice since it did not violate the

WiMedia specifications and required minimal change to the hardware.

120

Page 109: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-21

If the avoidance algorithm achieves a maximum of x dB reduction in transmitted power, then the UWB

device can transmit with reduced power as long as the detected uplink signal is less then -86+x dBm/MHz.

With a well calibrated sensing device, such an estimate of the power of the detected signal is reasonable to

expect if the received signal is above the detection sensitivity.

121

Page 110: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-22

Fig. 3 (a) UWB spectrum with multiple subcarriers nulled. Attenuation from subcarrier nulling is limited to 20-

22dB. (b) Actual UWB spectrum with a notch width of 13 subcarriers and a notch depth of 27dB. As opposed

to subcarrier nulling, a notch filter can achieve a depth greater than 27dB for all notch widths (5/13/21

subcarriers).

7.7.7. WiMax Detection: Design and Implementation

Traditionally, cognitive radios have been envisioned with separate sensing radios. UWB DAA functionality

on the other hand, needs to be implemented on-chip and sensing has to be interleaved with transmission

and reception. The reasons for this are the following:

• The silicon cost of implementing additional DAA functionality needs to be minimized. Many of the

modules of the traditional receiver (for e.g. the FFT in the OFDM-based WiMedia UWB system)

need to be reused.

• A separate sensing radio attempting to sense while UWB transmission is also on in the same band,

needs a mechanism to subtract the transmitted waveform from the sensor results. This is a difficult

task. Uncertainty about the power of noise and interference can limit the detection sensitivity

Energy Detection

In the case of the Energy Detector, we only make assumptions about the average power of the primary

signal. To facilitate analysis, we assume that the signal is a white Gaussian process with a variance equal to

the average power. The Gaussian assumption allows us to derive the sufficient statistics for this detection

problem which turns out to be the normalized power in the received signal. The decision rule then

compares the energy estimate of the observed sequence with a threshold (γ). We set the value of this

threshold to meet the required probability of detection (PD) and probability of false alarm (PFA). Since the

decision involves a comparison of the power of the signal with the power of noise, any uncertainty in the

power of noise can limit detector performance since we will need to budget for worse case scenarios. This

performance limitation due to noise uncertainty is discussed in [Tandra 05] where the authors show that

noise uncertainty can limit the minimum signal level that can be detected. Hence noise estimation is key to

ensuring that the target PMD and PFA are met.

The key guiding principles for the development of an energy detection algorithm were the following:

• Ensure that the target values of PMD and PFA are met over the entire 1.584 GHz spectrum range.

• Engineer the detection parameters to eliminate the case where a WiMax signal on a given frequency

was not detected while a false alarm was triggered on another frequency.

• Minimize implementation complexity while ensuring that the target detection sensitivity of -86

dBm/MHz.

Figure 4(a) shows the on-chip detection engine. The Analog-to-Digital converter samples the incoming

analog input at 528MHz. The Fast-Fourier-Transform (FFT) transforms the complex output into frequency-

122

Page 111: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-23

domain, with 128 frequency bins, each 4.125MHz wide. The PSD Estimate Engine integrates the energy in

each bin over a specified integration period. The maximum integration period is 20µs which is much

smaller than the length of a typical WiMax packet (2ms-20ms). In the transmit direction the data is

converted into a time-domain waveform by the Inverse Fourier Transform (IFFT) module. This waveform

is run through a notch filter which takes out those frequency components where WiMax services have been

detected.

Figure 4(b) shows the spectrum capture for a -80dBm sinusoidal signal via the on-chip energy detector. The

capture highlights some of the practical technical difficulties in implementing energy detection. These

issues are discussed in the following:

• Noise and Interference Estimation: As stated earlier, the biggest problem in energy detection is

adequate noise and interference estimation (especially from other secondaries). In [Sahai 06], it has

been suggested that guard bands around the primary be used for interference estimation. As long

as guard bands are within a coherence bandwidth of the primary spectrum, interference estimation

within the guard bands will be highly correlated to the interference in the primary band. [Sahai 06]

also requires that the interference estimation bands be more than a Doppler shift away from

primary signal. In the case of WiMax, where primary is static, the Doppler shift should be zero. For

our implementation, if we suspect that the primary signal is present on subcarriers n, … n+i, then

we use the remaining subcarriers 1 … n-1, n+i+1 … nmax as an estimate of the noise and interference

in the system. This causes the detection sensitivity to vary with time but keeps false alarm rate low.

• Dealing with Spurious Tones: Spurious tones as seen in Figure 4(b) on subcarriers 0 and 64 can

affect the noise estimation process (The spurious tone on subcarrier 0 is due to carrier leakage at the

mixer stage in the RF). The location of the spurious tones can be determined by calibration on

power-up. Hence we need to replace each bin suspected of spurious tones with an average of the

bins surrounding it. As opposed to ignoring the bins, this averaging allows the detection of WiMax

signals even within the subcarriers housing spurious tones.

• Detecting narrowband signals - the need for averaging: Some WiMax deployments can be at

bandwidths as small as 1.25MHz. Such narrowband signals are hard to detect when they straddle

the boundary of two subcarriers. To allow the detection of such signals we need to average across

adjacent bins. Again, this lowers the detection capability in average but eliminates the case with

narrowband signals are missed.

• Dealing with the Baseband filter: In Figure 4(b) we see the effect on the baseband filter in shaping

the noise and the signal. The baseband filter shape has to be compensated for before the detection

process can start.

123

Page 112: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-24

• Bin Size: Since the FFT size is fixed by the Wimedia standard, the noise bandwidth per bin is fixed

at 4.125MHz. This means that large bandwidth signals are easier to detect than sinusoidal signals.

• Automatic Gain Control (AGC): Figure 4(c) illustrates the transfer function for a tone at 3.3GHz.

Due to the presence of the baseband filter this transfer function is frequency specific. On the lower

left corner, the transfer function flattens since the gain is at a maximum. On the right top corner, the

flattening of the transfer function occurs since the AGC algorithm would not reduce the gain

beyond a certain value. So, for this implementation the linear range of operation (wherein we can

estimate the WiMax power) is limited to 25dB. This implies that even if our avoidance algorithm

could provide attenuation beyond 25dB we would be unable to use the additional attenuation since

our estimate of the WiMax power is not accurate beyond this point.

7.7.8. Practical Detection Algorithm and Results

The final detection algorithm took into account the factors listed above but had to compromise on

detection capability to reduce memory and run-time costs.

Here are some of the salient features of the algorithm implemented on the PowerPC of a Xilinx Virtex-II

Pro FPGA:

• Detection of each subcarrier occurs by using all other subcarriers as an estimate of noise. For the

actual implementation we used a single mean as a noise estimate for all tones. This sacrifices

detection sensitivity but leads to simpler code for the FPGA.

• We employ a two level detection scheme. In the first level, candidate subcarriers are selected.

Adjacent subcarriers are grouped together and these groups of subcarriers were treated as

candidate primary systems. At the second level, the candidate system with `significantly' larger

power than the others was selected as the primary system. Based on the bandwidth of the selected

primary, the appropriate notch width (5/13/21 subcarrier wide) was chosen.

• The threshold values for selecting candidate subcarriers and the final primary system were

optimized to achieve a PMD of 0.1.

Table I shows Matlab and experimental detection results for various WiMax bandwidths. The theoretically

calculated sensitivity for 64 symbols over a bin bandwidth of 4.125MHz is -110dBm [Sahai 06]. The device

has a noise figure of 6dB which implies that there is a further 14dB sensitivity loss due to baseband filter

compensation, conservative threshold setting, spurious tones and errors in noise/interference estimation.

Furthermore, there is a further loss of 3-4dB from moving the detection algorithm from floating point

implementation to fixed point implementation in C on the PowerPC.

124

Page 113: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-25

7.7.8.1. Towards Coherent Detection

Energy detection suffers from noise uncertainty, spurious tones and filter compensation effects. To achieve

lower detection levels (especially to sense the downlink), we need to exploit features of the WiMax packet.

One such feature is the packet preamble. IEEE 802.16d specifies two kinds of preambles: the long and short

preamble. The long preamble consists of two WiMax OFDM symbols. In the first symbol every 4th

subcarrier is loaded with a PN sequence. In the time domain, this leads to replication which is easy to

identify with cross correlation. On correlating the received sequence with the known preamble, 4 peaks

separated by 64 symbols are clearly identifiable. Figure 5(a) shows the structure of the long and short

preambles while Figure 5(b) shows the 256 point auto-correlation of the long preamble with a cyclic prefix

of 16 symbols.

Figure 4(a) also shows the proposed architecture of the Coherent Detection Engine. The bandwidth and

center frequency detection engine programs the downsampler and filter blocks to downsample the

candidate primary signals and remove aliases. The on-chip memory is fast but limited. Down sampling the

signal reduces the number of samples that need to be stored. The downsampled signals are correlated in

the Correlation Engine with known patterns and the results are analyzed on the FPGA.

For now, we only use Matlab simulations to evaluate coherent detection sensitivity for given values of PMD

and PFA. Our simulations show that for PMD and PFA of 0.1 and 0.1 respectively, coherent PMD = 0.9 or 0.1

detection can detect signals as low as -120.5dBm/MHz.

125

Page 114: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-26

Figure 4. (a) Detection Engine implemented on-chip. The DAA functionality is implemented on a UWB RF/digital

baseband chip fabricated in TSMC 0.13um process technology. The chip contains 2 RF/ADC receiver chains, operating at

1.2V and measures 18mm2 in silicon area. The DAA relevant area (FFT/Notch filter) is around 1mm2. (b) Spectrum

capture of a -81dBm tone (c) Energy Detection transfer function at 3.3 GHz

126

Page 115: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-27

Figure 5: (a) WiMax (IEEE 802.16d) long and short preambles (b) 256 point autocorrelation of the long preamble (Cyclic

prefix length = 16 symbols) which amounts to a processing gain of 24dB

127

Page 116: ENABLING TECHNOLOGIES DEVELOPMENT GRANT · PDF file(510) 643-1440 uc-ciee.org ... (AISs)c (AIS’s are synonymous with wireless ... radios, and firmware; and the need to accommodate

B-28

Table 1 Detection sensitivity for WiMax signals of various bandwidths and center frequencies

128