Deployment of intermediate-range devices using a short-range mobile device

ABSTRACT

Disclosed herein are wireless devices operable at intermediate wireless at ranges of thousands of meters, utilizing packets that include a preamble and a data payload. Devices may be such things as keypads, door latches, occupancy monitors, sprinkler controllers and other devices needing a communications link. Devices include an intermediate-range transceiver and a separate deployment wireless interface accessible from a mobile device such as a cellular telephone or portable tablet. Devices can be registered in a database and deployed for use by means of an application running on the mobile device. A scannable label bearing a code can be affixed to a wireless device providing a means of tracking, identifying and verifying a device through the deployment process. Detailed information on various example embodiments of the inventions are provided in the Detailed Description below, and the inventions are defined by the appended claims.

BACKGROUND

In recent history, relatively inexpensive electronic devices have become available to ordinary property-owners that wish to monitor and control various aspects of their properties. A recent concept called the “Internet of Things” imagines home-related electronic devices that can be reached through the Internet, by which an environment can be controlled, e.g. lighting, temperature, digital video recorders, and many other “smart” devices. That kind of device ordinarily requires a connection to a network switch or hub, which connection can be wired or wireless.

Wireless connections to such smart devices are often desired, particularly in existing constructions, avoiding the laying of wires in existing walls and other structures. Technologies serving this purpose include low-wattage devices that communicate using the 2.4 GHz 802.11b/g “WiFi” protocol, and other more-recent and similar protocols such as Zigbee and Z-Wave. These protocols generally permit data rates of 100 k bytes per second or more, allowing for devices that transmit and forward audio and video data in substantial real-time. However with high data rates come a vulnerability to interference from other devices operating on the same radio bands, and accordingly devices using these short-range protocols are generally limited to service within a single residence or building within a distance of less than 100 meters.

Recent technologies have been developed that permit operation to an intermediate range, communicating between points that are several miles or more away, for example using the LoRaWAN protocol. In this type of network, interference reduction is achieved by using frequencies in the UHF band and by including redundancies in communication, using for example multiple sampling, multiple frequency (spread-spectrum) techniques, and/or error-tolerant protocols. The use of the UHF band avoids interference from over-the-horizon sources, while at the same time avoiding some attenuation-of-signal from water-vapor, precipitation, buildings and other physical obstructions. These redundancies and protocols necessarily reduce the data throughput such that audio and video data cannot be streamed in good quality or in real-time.

An exemplary use of intermediate-range communication is in the recent deployment of wireless utility meters. Having a utility meter that can be read without a person traveling to and visually looking at it is a substantial cost savings for a utility. For such a use a meter communicates two items of information, which are an identifier for the meter and the meter reading itself; the utility takes a pair of such items and generates a bill for a utility subscriber. Because utility bills are ordinarily generated once per month, the amount of data from a single meter is usually on the order of a few tens of bytes in that period. Thus tens or even hundreds of thousands of meters can share a single intermediate-range channel, largely without interference from other devices.

The unsuitability of existing systems at intermediate ranges for large numbers of devices, for example in the Internet-Of-Things, is an unsolved problem. Turning now to FIG. 2, two proximal short-range networks are conceptually shown, such as those constructed from devices communicating through the 802.11g protocol, for example using the Zigbee specification. In the example two property owners each operate a hub “H” servicing multiple devices “D”, and as shown in the figure the circumference of effective communication 10 of each hub is proximal so as to create a zone of interference 11. Communication with the devices in that zone can be affected by communications with a non-subscribing hub, so as to introduce possible packet transmission collisions and interference. However, because these networks are short-range, the zone of interference 11 is relatively small, and the frequency of collisions and interference is likewise negligible. Proximal operators of such networks can experience impacts, but because of the short-range and the short transmission time of packets, these impacts are minor and usually acceptable.

In contrast and as shown in FIG. 3, three intermediate-range networks are located in similar proximity, each with a hub “H” and subscribing devices “D”. Because of the greater distance of communication provided, most devices “D” are located in zones of interference 11, and many devices may be located in regions 12 where several hubs are located within range. Thus where intermediate-range networks are to be used, most communication between hubs and devices and also inter-device communications should be expected to take place under conditions of interference, especially when located within a city or other populated area. Utility meter reading and other existing installations using the LoRa or LoRaWAN protocols manage this congestion by being the only network in the radio locality on a particular frequency, and by infrequent packet transmission on the order of once per week or month such that collisions between devices aren't likely. Utility meters are configured and installed by the utility provider, who can limit the number of end-devices within a locality to ensure network reliability. Because the provider is the only consumer of the applicable bandwidth resources, it can effectively control interference and manage congestion.

Unavailable on the consumer market today are hubs and end-devices that can operate at intermediate ranges. The short-range “WiFi” 802.11b/g network is now so popular that in most urban areas there is a router within communicative range no matter where a person finds himself; most households using the Internet now have one, purchased from a retailer. If the range of those routers and the devices they service were to be extended to an intermediate range, the result would be a collapse of system functionality from overwhelming interference. Thus, in order to bring intermediate-range devices to the ordinary consumer, further development is needed.

The existing intermediate-range techniques, however, aren't conducive for applications where interactivity is need. For a channel sharing thousands of meters, it isn't necessary to resolve collisions between devices in a matter of milliseconds, because data transmissions can be delayed without significant impacts. In another example, an irrigation controller will ordinarily keep a set of sprinklers on for minutes at a time, and a delay of multiple seconds or even minutes is tolerable. In contrast, a person activating a light switch, for example, will not accept activation of lights with perhaps more than a one-second delay. Where a person enters a code on a keypad to enter a building, he expects a controlled lock to deactivate in real-time. In general, the existing intermediate-range technologies are fault-susceptible and not reliable for such interactivity, particularly where multiple devices share a common communications frequency or channel.

Interactivity issues for battery-powered devices can be even worse. For these devices, it is generally undesirable to keep a receiver continuously powered, and worse to repeatedly being awakened from a sleep mode to process and discriminate packets destined for other devices. The LoRaWAN Class A and B protocols address this by having end-devices turn off their receivers for long periods of time, waking up periodically to interact with a network gateway. Such a device may remain asleep for seconds, minutes or even hours, and thus cannot be made responsive to incoming queries. Furthermore, these protocols are susceptible to collisions from co-transmitting devices, which may require backing off interactions with a hub, and no time of reception can be guaranteed. Thus absent from the field of the invention is a system that can provide adequate and reliable service for groups of sensed and controlled remote devices at intermediate ranges.

BRIEF SUMMARY

Disclosed herein are wireless devices operable at intermediate wireless at ranges of thousands of meters, utilizing packets that include a preamble and a data payload. Devices may be such things as keypads, door latches, occupancy monitors, sprinkler controllers and other devices needing a communications link. Devices include an intermediate-range transceiver and a separate deployment wireless interface accessible from a mobile device such as a cellular telephone or portable tablet. Devices can be registered in a database and deployed for use by means of an application running on the mobile device. A scannable label bearing a code can be affixed to a wireless device providing a means of tracking, identifying and verifying a device through the deployment process. Detailed information on various example embodiments of the inventions are provided in the Detailed Description below, and the inventions are defined by the appended claims.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 depicts a network topology utilizing multiple end-devices and an interactive hub.

FIG. 2 depicts potential interference in two proximal short-range wireless networks.

FIG. 3 depicts potential interference in three proximal intermediate-range wireless networks.

FIG. 4 shows an exemplary wireless data packet structure that includes a preamble and a variable payload.

FIG. 5 illustrates an exemplary frequency-sequence table usable in digital spread-spectrum communications between a hub and an end-device.

FIG. 6 depicts typical power states of an end-device through the course of reception of one kind of intermediate-range wireless packet.

FIG. 7 shows an exemplary set of discrete and orthogonal wireless channels for communication between a hub and a set of end-devices.

FIG. 8 shows an exemplary circuit architecture suitable for an ordinary end-device.

FIG. 9 shows an exemplary circuit architecture suitable for a hub having one transmitter and a number of receivers for simultaneous operation on differing channels.

FIG. 10 illustrates the operation of a wireless device on one side of a DSS communication link having a microcontroller and a transceiver.

FIG. 11 depicts a procession of packets including a synchronization directive of successive SIS channel switching.

FIG. 12 depicts a representative accumulated emissions on a frequency spectrum for a transmitter operating using a single DSS channel and preamble-based packets.

FIG. 13 shows traversal of a microcontroller through an exemplary set of states using an spectrum-impact-smoothed channel set.

FIG. 14 depicts a sequence of packets streamed from a left device to a right device including a first packet with a streaming directive.

FIG. 15 depicts a time-slotted schedule of SIS channels relative to a point of synchronization in a first packet initiating a stream.

FIG. 16 depicts an exemplary state machine of a stream-receiving wireless device managing timer interrupts.

FIG. 17 depicts an exemplary state machine of a stream-transmitting wireless device observing a time-slotted SIS channel schedule.

FIG. 18 depicts an exemplary state machine of a stream-receiving wireless device managing packet-completion interrupts.

FIG. 19 depicts the initialization of an exemplary state machine of a stream-receiving wireless device observing a time-slotted SIS channel schedule.

FIG. 20a depicts components of an exemplary intermediate-range wireless device having a dedicated wireless deployment port.

FIG. 20b depicts components of an exemplary intermediate-range wireless device having a dedicated wireless deployment port and divided between an application and a wireless board.

FIG. 21 shows a process of deploying two intermediate-range wireless devices using five stages.

FIG. 22 depicts an exemplary intermediate-range wireless device that can be configured as one side of a Weigand bridge.

FIG. 23 depicts the circumstances of registering an intermediate-range wireless device using a mobile device.

FIG. 24a shows the steps of registration in the deployment of an intermediate-range wireless device having a dedicated deployment port using a mobile device that accesses a database over a separate network connection.

FIG. 24b shows the steps in final deployment by an installer of an intermediate-range wireless device having a dedicated deployment port using a mobile device that accesses a database over a separate network connection.

DETAILED DESCRIPTION

Shown in FIG. 1 is an exemplary intermediate-range system employing a hub-type topology. A hub 1 is placed within wireless range of end-devices 2 a-n, communicating 3 over the airwaves at a distance of up to 10 km or more, depending upon environmental conditions. In many cases, end-devices 2 are electronic devices that accept commands and transmit information to a controlling hub 1. Included in hub 1 and each of end-devices 2 a-n is a processor, software for performing the functions of the device, and an RF transceiver. Hub 1 could be an ordinary personal computer with an RF adapter or card installed, or it might simply look like a box with an antenna and a port or interface permitting configuring and monitoring; it is foreseen that a manufacturer would likely supply a hub 1 in a ready-to-use state such that an installer need not open its case or install any software. In one configuration, hub 1 is connectable to a personal computer 4, for example through a USB interface, computer 4 having installed thereon software functional to configure and monitor the hub 1. In another configuration, hub 1 has a network port whereby communications may be had with network 5. These communications may be through any conceivable type or protocol. In one example a hub 1 sends messages through a TCP/IP sockets-based protocol to a proprietary server existing on the network 5. In another example, hub 1 has software that permits it to be seen as an HTTP server from any device on network 5. Thus in some installations, hub 1 may be connected directly to and accessible from the Internet, allowing for access from any Internet-connected device. The antenna of hub 1 will typically be elevated and located in an obstruction-free locality to maximize signal-strength with end-devices 2.

End-devices 2 are preferably manufactured in an unconfigured state, ready for pairing with a hub 1, each device having a unique identity (UID) to discriminate it from others. Such end-devices 2 can be of varying types, providing many kinds of control and sensing functions. In one example, an end-device has an infra-red motion sensor built in, includes programming to record the time of the last motion event, and may also include programming to initiate a notification packet to a hub 1 upon a motion-sensing event. In another example, an end-device includes a keypad whereby a person can enter a code, upon which a message is sent to hub 1 containing a sequence of keypresses. Such an end-device may be paired with another device which activates and deactivates a door latch, by way of messaging from hub 1, and the hub contains programming and configuration to read the keypad end-device and control the latch end-device as correct codes are entered. In a further example, several end-devices 2 are located throughout a building, sensing the temperature at various locations. Another end-device 2 controls a central-air system, providing heating and cooling to the building at the direction of hub 1 without human intervention based upon thermostat data forwarded through hub 1. The kinds of end-devices 2 that can be employed are virtually limitless, so long as they are electronic and provide either a control or a sensing function while staying within the available data throughput limitations.

Intermediate-Range Packets and Transferrence Basics.

Described herein are electronic devices that are functional at intermediate ranges even in populated or congested areas, providing for simple installation by an ordinary home- or business-owner, as will presently be described and shown. These devices can be made reliable enough to use in failure-intolerant situations, such as security systems, even where an RF spectrum is congested. Remote devices can be made to operate on battery power, use low-power transmitters, and in many cases made to operate through the sending of a single bit per packet. Equipment can be made to fit in a hand-held enclosure, e.g. with a small omnidirectional antenna operating in the UHF frequency band. It is sometimes the case that a low-data rate network device will be desired to be placed in a location where power is available, but where neither network cabling nor a WiFi network is available. This kind of application is particularly suitable for intermediate-range equipment. One kind of intermediate-range technology is known as “LoRa”, descriptions of which are publicly available from the LoRa Alliance of San Ramon, Calif., which maintains a website at www.lora-alliance.org.

Shown in FIG. 4 is the structure of a simple data packet which may be used in communication between a hub and an end-device, a sub-type of which is used in the LoRa protocol. The structure has three parts, which are a preamble 20, a data payload 22, and an optional address 21. Payload 22 is generic and can contain many kinds of data as desired, depending upon the functions provided by an end-device. Payload 22 will often contain a command or a response, for example a command to open a latch or a response that a power switch is presently in an “on” state. Address 21 discriminates between devices operating on the same communications channel, and may not be needed where a single hub and end-device pair are the sole devices operating on that channel. (A description of what defines a channel appears below.) Preamble 20 is present to provide synchronization for a radio-frequency receiver, at a hub or an end-device, at a programmed frequency such that the receiving device can decode the contents of the packet. A preamble is preferably a fixed, identifiable and unnatural pattern that can be recognized by a simple state machine without starting a general-purpose processor. The packet structure of FIG. 4 can be transmit using many modulation techniques; LoRa devices use frequency shift keying for interference immunity, although other modulations can be used in accordance with the dictates of a particular operating environment.

Packets can be transmit over a single carrier frequency, if desired, but because of benefits including resistance to noise and reduced impacts on particular parts of a frequency spectrum, spread-spectrum modulation has become popular. In this modulation technique, a sequence of frequencies is provided at a transmitter and a receiver; although in traditional encrypting systems the sequence might be generated by a pseudo-random generator with a secret seed and function parameters (which still can be used), for noise resistance and spreading of Tx power all that is needed is a sequence of frequencies uniformly spread over a given available set. This can be accomplished by the inclusion of a table as shown in FIG. 5, containing a sequence of n frequencies. In the example, each frequency F_(x) is indexed by a sequence number I_(n), such that the current operational frequency can be determined as a function of time from a point of synchronization, for example the end 23 of the preamble of a packet as in FIG. 4. The arrangement of frequencies in a sequence may be incremental, random, or in any order desired, keeping in mind that use of each frequency an equal number of times will result in the desired uniformity.

The transmission of a packet using this modulation technique is as shown in FIG. 6, beginning with the preamble at a known initial frequency F₀. The preamble is preferably not just a square wave, but a pattern whereby synchronization point 23 can be positively determined. The transmitter then sequences through the frequencies at a known period, mirrored by the receiver. For noise and interference immunity the sequence period is preferably much shorter than the time needed for each bit or symbol, but longer periods can be used to achieve a spreading of power across a spectrum. The sequence period should preferably be much shorter than the time of preamble transmission, such that preambles are easy to distinguish.

The power consumption of a transmitter is necessarily high during packet transmission, most of the power likely being consumed by the Tx output stage circuitry. A receiver, on the other hand, can implement a power-conserving procedure. Referring again to FIG. 6, the processor of a receiving device maintains itself in a state of sleep 25 while processing and receiving activities aren't underway; this can be particularly important for certain kinds of devices, especially for end-devices reliant upon battery-power, such as those with solar cells. A receiving device has built thereinto its receiving circuit an automated preamble recognizer; when recognition occurs a signal is sent to a processor to awaken and enter an active state of packet decoding 26. In the example of FIG. 6 an address is used, and the receiving processor performs functions needed to determine if the address in the packet is for its device. If an address is decoded and the packet is determined to be destined for another device, the processor can reset and go back to a sleeping state 25. For maximal power savings, therefore, an address is preferred to be toward the front of a packet, where it will be transited across a channel first before a data body. Where an address is matched, or where an address isn't used, a processor enters states of receiving and processing incoming data 27 and post-receipt processing 28 as needed. So in order to keep the processor of a particular device in a non-active state, it is important to positively discriminate the receipt of preambles of packets directed to the device from the preambles of other devices.

Multi-Channel Intermediate-Range Implementations.

Existing intermediate-range networks use a common initial DSS frequency and/or channel for communications with devices in that network. This method has the advantage of making setup extremely simple. By this method, other networks may use other initial frequencies or channels, thereby discriminating between members of their respective networks. As such networks change to include interactive devices or grow to large numbers of member devices, the possibility of congestion, collisions and interference becomes a greater concern.

Now turning to FIG. 8, a basic circuit is shown typical of many present intermediate-range network devices, which can support either single- or multiple-channel operation. The main parts of this circuit are a microcontroller 30 and an RF transceiver 32 connected to an antenna 34 located in a position to provide clear communications to other devices. A transceiver 32 may be essentially some analog radio-frequency circuits combined with a logic state machine that permits automatic operation for all or part of a packet transmission or reception. The use of transceiver 32 may leave the microcontroller 30 with additional processing capacity for such things as reading sensors, managing control circuits, etc., which may happen at the same time that packets are transiting a communications channel. Communication between the microcontroller and the transceiver is by way of data lines 39 and interrupt lines 40, by which microcontroller 30 manages the functions of transceiver 32 and transfers packet information received and to be sent. Transceiver has a packet buffer 45 sufficient to store all or part of a single packet, read- and write-accessible through data lines 39. Data lines 39 can be varied according to need or capabilities of a transceiver used, while interrupt lines 40 signal to the microcontroller events such as the start or completion of reception of an incoming packet. Were transceiver 32 to be a Semtech SX127× (introduced below), for example, data would be transferred by way of a single-bit wide serial bus using address locations to control registers and access a packet buffer, and data lines 39 would include single lines for in, out, clock and sync. In that example, a packet completion interrupt would be generated by a transition on the DIO0 line. When transceiver 32 is configured for operation on a channel orthogonal to those used by other end-devices, such interrupts would not occur when those end-devices communicate and microcontroller 30 would be left free to sleep or engage in other processing activity.

Microcontroller 30 also contains a packet buffer 44, which is typically larger than the transceiver buffer 45. As packets are to be transmitted, the microcontroller transfers them to the transceiver by way of data lines 39, typically one at a time. Packets received are correspondingly transferred from buffer 45 over the data lines and stored for processing in buffer 44. Apart from this packet data, setup commands are also sent by microcontroller 30 to program the transceiver for proper operation on a channel, once at initialization for single-channel operation and subsequently with or between packets where more than one channel is used. Where microcontroller 30 has been programmed for multi-channel operation, each packet within buffer 44 may carry with it a channel on which it is to be sent, or parameters thereof.

In an implementation using the Semtech SX127× and digital spread-spectrum, microcontroller 43 also contains a frequency table 43, as described above for FIG. 5. For that implementation, the transceiver 32 has storage only for two frequency settings, which are the one presently in use and the one to be used when it is time for a hop to a new frequency. The transceiver generates interrupts to the microcontroller indicating it is ready to receive the new frequency setting, which is subsequently sent over data lines 39 before the frequency hop is to occur. An alternate configuration would put frequency table 43 entirely on the transceiver 32, but for this example a simplified transceiver is used that does not.

Where a transceiver 32 and microcontroller 30 pair is incorporated into an end-device, at least one of a sensor 36 or a controller 38 will be included. Sensor 36 could be virtually any sensor, examples of which are a temperature probe, a keypad, a lighting sensor, an entryway closure detector, a motion detector, and a camera. Controller 38 could control a latch, a power switch, a thermostat, a motor speed controller, and many other things. Sensor 36 and controller 38 are connected to microcontroller 30 through data lines 41 and 42, which lines may be of any needed configuration, analog or digital. Where a transceiver 32 and microcontroller 30 pair is incorporated into a hub, sensor 36 and controller 38 may be omitted. Instead, a connection to a host processor or network 48 would be included, permitting configuration of and interactions with end-devices at intermediate-range.

While functioning as an end-device, one microcontroller 30 paired with one transceiver 32 are sufficient to operate in an ordinary way. Transceiver 32 is capable of being configured for a desired channel and transmitting or receiving packets to and from a hub, though not at the same time. End-devices do not typically have a need to do both concurrently, so this is usually not an issue. However there are advantages to incorporating multiple transceivers in a hub, as will be presently explained.

FIG. 9 illustrates one configuration that may be used in a hub, providing multiple transceiver functionality. Here a microcontroller 30 is connected to n transceivers 34 a through 34 n by way of an interrupt gate 50 and data bus 51. Included within data bus 51 are sufficient multiplexing circuits to allow the microcontroller 30 to individually address each transceiver. In the example where the Semtech SX127× transceivers are used, this may be done by dropping the NSS pin of the individual transceiver to be attended to. Interrupt gate 50 combines the interrupt signals of each of the transceivers such that any interrupt in the group interrupts the microcontroller, and code therein can identify the particular transceiver flagging the interrupt and take appropriate action. In the drawing gate 50 is an OR logic gate, which suffices when all interrupt lines are low in a normal (non-interrupt) state; gate 50 could be AND logic gate if the reverse were true (lines normally high with low signal indicating an interrupt), or gate 50 could be a combination of logic circuits if needed. Now in practice it may be there are a sufficient number of interrupt inputs and general I/O pins on microcontroller 30 such that gate 50 and bus 51 aren't needed, particularly where the number of transceivers n is kept small, allowing for the microcontroller to communicate using parallel lines duplicating the setup and methods of FIG. 8.

The exemplary hub of FIG. 9 has the capability of transmitting and receiving wirelessly with end-devices at the same time, through antennas 34 a and 34 b. Antenna 34 b is connected as an input to each of transceivers 32 b through 32 n, allowing each transceiver to receive on a different channel as programmed from the microcontroller 30. Depending upon the type of transceiver used, each transceiver may be isolated through filters and amplifiers (not shown) such that the proper impedance at the operational frequency range is preserved. Note that such a tying of transceivers to a common antenna makes them ineffective for concurrent operations in a transmitting mode; therefore microcontroller 30 would be configured to keep them in receiving-mode only. In contrast antenna 34 a and transceiver 32 a are configured to transmit and receive, having no sharing of antenna resources. Consideration should be given to shielding and to the distance between an antenna that may be used for transmitting and others that may be used for reception, such that potential interference is avoided.

The example shown in FIG. 9 has the capability of transmitting and receiving at the same time, with n−1 receivers monitoring one channel each. Transceiver 32 a can be transmitting while all of 32 b-n are ready to receive packets as they may transit n−1 channels. Microcontroller 30 may use the transceiver capable of free transmit operation 32 a to perform interactive communication with an end-device without channel reprogramming, alternating between sending and receiving over the same channel. Alternatively, when using interactive communication with a particular end-device, microcontroller 30 may command transceiver 32 a to switch to different channels as needed for transmissions to other end-devices, allowing one of transceivers 32 b-n to receive the next packet from the particular end-device. If this is done, it is preferred that any transceivers configured to receive on the same channel be turned off, so as to avoid the discarding of packets produced at the hub. Assuming interactions with an end-device are symmetric in length, in theory the setup shown in FIG. 9 will support up to two concurrent interactive sessions with two end-devices while at the same time monitoring n−2 other lone-channel end-devices for alerting packets sent spontaneously, or more than that number of end-devices where such channels are shared (using the asynchronous mode described below, for example.)

In practice, the constraints on the number of transceivers that can be used will depend upon several factors. One of these is the speed of data bus 51 against the efficiency of commanding transceiver setup, and sending and receiving packet data. As most of the transceivers of the setup of FIG. 9 are used to receive, this limitation would be experienced in two main ways. First, it is possible to flood the system with incoming spontaneous packets such that they cannot be retrieved with sufficient speed across bus 51. The second way comes into play when single receivers 32 are each used to monitor multiple channels, for example when the number of monitored channels exceeds n−1. The reprogramming of a transceiver 32 across the bus 51 requires some time, and if that time exceeds the packet preamble length, packets will fail to be received. Where more than two channels are monitored by a single transceiver 32, the dwell time on a channel (to detect whether a packet transmission is in progress by an end-device) may further exacerbate this problem.

Another limitation of the setup of FIG. 9 relates to the use of a single transmitter. For example, interactive communication can be had with not more than two end-devices where that communication is symmetric. Thus if an event occurs that requires a simultaneous response to multiple end-devices, some of those responses may be delayed beyond a timeout period. This problem can be mitigated through the addition of more transceiver/antenna pairs, if those antennas can be placed at a sufficient distance from the receiving ones and if regulations allow. Note that although end-devices can be constructed with multiple transceivers, as in FIG. 9, it is expected that one transceiver will be sufficient for all but the most exceptional circumstances.

Wireless Channels, Orthogonality and Communications Principles.

A wireless frequency spectrum can be segmented into definite channels that reduce interference and avoid unnecessary receiver power-up events on non-destination devices. Such channels are preferably “orthogonal” to each other as well, meaning that communication on one channel is very unlikely or practically impossible to interfere with communication on another. In one of the simplest channel designation schemes, each channel is assigned a unique and available center frequency per channel, for example as was done on the now-obsolete analog television spectrum. A one-to-one relationship is made between transmitters and frequencies in a radio locality, and all devices are to use only their assigned spectrum and nothing outside. For example, the 902-928 MHz ISM band could be divided into 52 500 kHz-wide channels, or 208 125 kHz-wide ones. Given that an intermediate network supporting ordinary consumers might have a range of many kilometers and thousands of end-devices, that is considered an insufficient number to avoid interference. Therefore further methods of discrimination are preferably used.

Introduced now are certain transceivers made for the LoRa protocol, commercially available from Semtech Corporation, which are identified as the SX127× product line. Note that there are transceivers available from other manufacturers that are equally suitable; these Semtech ones are used in this description merely out of convenience as a basis for discussion. The SX127× products are designed to be coupled to a microcontroller handling communication channel configuration and packet management, and have settings for a carrier frequency, signal bandwidth and the number of “chips” per symbol (6 settings), a chip being the smallest datum used in communication. Each combination of those represents substantially a unique channel orthogonal to others, potentially permitting collision-free communication where there is no more than one transmitting device per channel. Using such combinations, two channels may share a common carrier frequency or DSS carrier sequence, while still maintaining orthogonality. Other settings can be used to make additional channels having “partially-orthogonality” including an address, a bit rate, a CRC rate, an encoding type (Manchester/whitening/none), and others according to the manufacturer specifications; note however that the use of partially-orthogonal channels can result in processor-awakening events for packets destined for unintended end-devices, although they can be greatly reduced.

Upon identification of a useful set of channel combinations, a table can be constructed as shown in FIG. 7, each channel having a unique combination of settings useful for communication. In this example, each channel is assigned a spread-spectrum frequency sequence (F S), a spreading factor (SF), and a bit rate (BR) of communication. In one configuration, available frequency sequences are spread evenly over channel assignments, such that the preamble for each channel is sparsely or uniquely used—that is a device transmitting a packet on an assigned channel would use the first frequency in the sequence while transmitting the preamble, followed by the use of other frequencies in sequence. Other channel combinations can be varied in accordance with needs present, for example a frequency sequence could be replaced with an operating frequency where spread-spectrum communication was not used.

Upon determining a set of channel combinations, assignments can be made for individual devices. Again some devices are tolerant of long latencies, and no special treatment of these is required. Other devices serve better being on a channel that is free or substantially free of conflicts. The assignment of a channel to a hub and an end-device requires a setting at both, and this could be made by a manufacturer or its representative at the time of installation.

Frequency Sequence Processions and Spectrum Impact Smoothed Channel Sets.

Where packets carrying a preamble such as that shown in FIG. 6 are used, the impact to the frequency F₀ in the usable spectrum is larger than the impact to other frequencies F_(a) through F_(n) generally. This effect is caused in large part by the long time used in transmitting the preamble, during which time the transmitter must remain on the same frequency F₀ for synchronization as compared to the other successive frequencies used. The longer the preamble with respect to the packet, the more exaggerated is this effect. Additionally, the frequencies at the end of the sequence toward F_(n) are used less frequently, due to the end of packet usually occurring in the middle of the frequency sequence, which may be exaggerated by short packets. As seen over time, if a frequency sequence is used continuously the impact on the spectrum of usable frequencies will be as depicted in FIG. 12, with accumulated emissions over time ET focused on the preamble frequency F₀ and an uneven impact ramping down through the frequency sequence.

This focused impact can be avoided through rotation of channels, each having a different frequency sequence and a unique F₀ used in a preamble relative to the other channels used in the rotation, hereinafter referred to as a spectrum-impact-smoothed (SIS) channel set. So looking back to FIG. 7, an SIS set maintaining the same bit rate and spreading factor could be fashioned from channels 0, 2, 4 and so forth, and another sequence could be ordered 1, 3, 5, etc., provided that the channels in each sequence included an F₀ unique to the others in that sequence. Within the set of sequences, where each frequency used occupies each sequential position no more than once through the channel set, the smoothing effect can be increased, although that is not necessary. Using the representation of FIG. 5, if there are n=72 frequencies usable in a DSS sequence, each would occupy the I₀/F_(a) position exactly once through all sequences to make an SIS channel set of 72 channels. Preferably, each frequency would also occupy each I₁/F_(b) through I₇₁/F_(n) position exactly once as well to maximize the evening effect in the spectrum.

Frequency sequences can be generated and stored beforehand, or generated on the fly as needed. In a simple example, 72 adjacent ordered frequencies are available for use, and a set of SIS channels are generated by choosing a unique starting preamble frequency F₀ having the same position in the order as the channel number, each frequency in the sequence rising though the order and wrapping around as needed. In another example, an order is generated randomly, assigning one channel to each preamble frequency. In yet another example, a simple calculation or a pseudo-random number generator uses the channel number and the number in sequence to arrive at a frequency as needed. In the example shown in FIG. 5, the frequency used for the preamble is left unused for the remainder of a packet transmission, assisting in the equalization of frequency impacts where short packets are the norm. That is not required; a preamble frequency F₀ can be repeated, particularly where traversal through a sequence is also repeated where a packet is long.

As described above, the synchronization of frequency hopping through a series of frequencies can be done through detection of the end of a preamble. Two sides of a communication link will also need to be synchronized with respect to a channel, as traversal proceeds through an SIS set. That synchronization can be to any event shared between the sides, such as the traversal of a packet of a particular type or carrying a particular identity. In one example, a timeout period is used for synchronization: where a packet hasn't traversed the link for a specified period of time, both sides synchronize on the initial channel of an SIS set. This may also provide a fail-safe mechanism for dropped packets, allowing resynchronization in case of error.

In one implementation, two sides of a communications link utilizing an SIS set switches channel following every packet traversing the link, without further direction or instruction. The devices on both sides of the link follow a set of rules, including an order of traversal through the SIS channel set used. In one variation, the channels are used in an incremental order using a simple index variable, proceeding through channel 0, channel 1, channel 2 and so forth with each packet, wrapping around back to zero when all channels have been used. In another variation, the order of channels used follows a pattern stored in memory in a table or other structure. In yet another variation, a next channel is calculated using a pseudo-random formula using an incrementing index or the index of the channel currently being used, retaining other communication parameters such as bit rate, spreading factor, etc. In yet another variation, a microcontroller performs a calculation to evaluate the emissions impact on frequencies used since the beginning of traversal through the SIS channel set, and the next channel is selected to have a preamble frequency impacted less than the others since traversal began, thus maximizing the evening effect. A next SIS channel may generally be determined using a computation deterministic from information residing in the memory of both devices. In yet another variation, a next SIS channel is determined using a computation deterministic from information in a previously exchanged packet. The determination and of a next channel can have wide variation, as well as the timing of procession through a channel set, and what is important is that both devices in a communications link use cooperative rules and iterate through an SIS channel set in the same order.

FIG. 10 illustrates in further detail the operation of a device on one side of a communications link using DSS communication, the device including a transceiver 82 of a type including the Semtech 127× transceiver in conjunction with a microcontroller 81. Transceiver 82 includes a register FC for the current frequency being used in transmission, a register FN for the next frequency to be used, and a packet buffer PB containing the contents of a packet being transmitted, as well as other programmable registers used in setup and operation. To initiate a packet exchange, the microcontroller 81 identifies a frequency sequence of a channel 83 (which may be that of an SIS channel), and transfers the first frequency value f₀ and the next frequency value f_(a) to those registers on the transceiver as shown. If the exchange is a transmission to the device on the other side of the link, all or part of the contents of a packet will also be transferred to the packet buffer on the transceiver 82. When the registers on the transceiver 82 are loaded and communications setup has been completed, the transceiver is commanded to initiate communication.

For both transmission and reception, as DSS communication proceeds transceiver 82 frequency hops, moving the value of the next frequency FN to the current frequency FC. Before the time of the succeeding hop, microcontroller 81 is interrupted, and a succeeding frequency value is transferred to FN from the identified frequency sequence 83. Eventually the packet exchange will complete, and microcontroller 81 will be interrupted to do whatever post-processing is needed, including a reading of the transceiver's packet buffer PB if a packet was received.

As introduced above, synchronization of a traversal through a set of SIS channels may simply occur for each packet, channel switches occurring therebetween. Another method of synchronization is depicted in FIG. 11, wherein a “left” device synchronizes SIS channel switching with a “right” device over a wireless link through information contained in transmitted packets. Proceeding down the page, both devices are initially synchronized on channel 00, the right device in a listening mode prepared to receive a packet. The left device transmits a packet 101 on channel 0. Packet 101 includes a preamble, the address of the right device “RR”, and a payload portion. Contained within that payload is a directive 101 a to change to channel 01. Following the exchange of packet 101, the right device transmits an acknowledgment 102 to the left device on channel 00, which serves as confirmation that the right device will listen for future packets on the new channel as directed. Following the exchange of packet 102, both the left and the right devices are synchronized on channel 01.

The left device may send another packet 103 containing a directive 103 a to change to channel 2. This packet is not received by the right device, so no acknowledgment is returned and a timeout 104 occurs. In such an event, the left device may resend 105 the packet containing the same directive 103 a, until that directive is received and acknowledged 106 by the right device. Should an acknowledgment packet not be received by the left device, both devices may timeout and revert back to a default channel. As continuing to transmit the same packet would increase the impact on the preamble frequency of the current channel in use, it is preferable to limit the number of retries to a predetermined number.

It may be desirable to use the current SIS channel for transmissions from both devices while communicating, so as to equalize the spectrum impacts of transmissions from both devices at the same time, although that is not necessary. One device, such as the right device in the example of FIG. 11, may utilize a separate channel for acknowledgments or packets generally, or may even use an independent SIS channel selection for transmissions to another device on the other side of a link.

Depicted in FIG. 13 are the states of a state machine suitable for implementation in a microcontroller utilizing an SIS channel set, in a configuration shown in FIG. 10. After initialization or during normal operation, the microcontroller may determine that it is time 120 to send or receive a packet to or from the device at the other side of the communications link. If more than one transceiver is available to use, then one of them may be selected at this point. In this implementation, the next step is to determine a value next_channel, which is to be the succeeding SIS channel used. Where the device receives a channel directive by way of packets, this determination may be omitted.

The transceiver is then programmed 124 with a current frequency FC and a next frequency FN for DSS frequency hopping, to be done as in FIG. 6, coming from the current channel frequency sequence. This programming may be done through lookup in a table, or by computation, as desired. An index into the frequency sequence is set 126 to FSI=2, pointing to the third frequency in the sequence.

The machine then must take some extra actions if the device is sending a packet 128. These actions are to build a packet in a buffer 130, in accordance with whatever protocols are used by the present and remote devices. If the present device is determining the next channel for the remote device, part of this built packet may contain a directive to move to the next_channel determined earlier. The built packet is then copied to the transceiver 132, the state is set to transmitting 134, and a command is sent to the transceiver to transmit the packet in its buffer 138. If the device is merely receiving packets 128, then the state can be set to that 136 and the transceiver commanded to receive 140, having been properly configured with all necessary communications parameters.

Following the commanding of the transceiver, a sleeping state 142 may be entered. Now it is to be understood that this state could shutdown the microcontroller entirely until something further happens, or this state could indicate that the processor is free to manage other tasks. For example, a device implementing a sensing function that reports only when prompted may sleep for long periods of time, awakening only to manage long timeouts and other maintenance functions. In another example, a device managing multiple transceivers such as a hub may leave the state in sleep for the present transceiver, turning to manage other transceivers or functions as needed. Regardless, for discussion purposes the state machine may remain in a state of sleep until certain events happen.

While in sleep mode, interrupts 150 will be generated by the transceiver. When they are, there are several state paths that can be taken. If the next frequency register FN has been copied to the current frequency register FC, it will be dry 152 and need to be reloaded. If that has occurred, the next frequency in the sequence will be set 154, and the index incremented 156. If the index exceeds the number of channels in an SIS sequence, it may be set to 0 (the preamble frequency) or 1, avoiding re-use of the preamble frequency. If the packet has been fully exchanged 158, the main thread may be awakened 160 to exit the state of sleep. If the interrupt occurred for some other cause, such as the expiration of a timer or an alarm event, other processing 162 may occur in response. Interrupt processing will end 164, and the microcontroller may return to a state of sleep or may proceed in an awakened state.

When awakened, the current channel will be rotated 144 with the next channel determined earlier, and any post-processing needed may be done 146. That post-processing may include retrieving and decoding a packet if one was received by the transceiver, and may further include the setting of a current_channel, when directed from the device on the other side of a link.

To avoid timeouts that cause a reversion back to a default channel, periodic packets may be sent at an interval less than the timeout period, which packets may be simple “ping” packets.

The teachings regarding SIS channel sets can be applied to two devices in a simple point-to-point fashion, or to multiple devices in varying interactions such as hubs and end-devices. Where a hub is used, a frequency sequence index may be kept for multiple devices, such that spectrum impacts can be smoothed with respect to individual of those devices.

SIS Channel Sequencing by Scheduled Transitions.

Where sufficient timing resources are available, the overhead associated with channel directives and corresponding acknowledgments can be avoided, while still maintaining SIS channel synchronization over time. Such timing resources are often available on a microcontroller 30, although they can be located elsewhere. One kind of timing resource is an interrupt-generating timer, which may be thought of as a count-down clock that interrupts the present processing occurring on a microcontroller for substantially instantaneous handling. Another timing resource is a free-running counter, which is a counter automatically incremented on the passage of each period of resolution, which may be thought of as a counter measuring the time of passage since reset as measured in microseconds or some other period. Modern microcontrollers often have this kind of resource available through registers located at a pre-specified address, a read operation reading the count-up or count-down time of the resource and a write operation sometimes setting a time of alarm or interrupt. The use of these resources vary depending upon the microcontroller used, which may ordinarily be found in provided documentation.

Now turning to FIG. 14, a left and a right device are in communicative proximity, each device capable of transmitting packets to the other. The left device may transmit infrequently to the right device, however in this example, the left device sometimes has a need to transmit a stream of packets to the right device at a higher rate, introducing the possibility of a focused spectrum impact as described above. Where a left device is to use a sequence of SIS channels, a packet 200 containing a streaming directive SD may be transmitted to the right device. Here packets of an ordinary format are used, here containing a preamble, and address of the intended destination device, and other information such as a CRC, etc. Streaming directive SD may simply be a flag contained in the payload that signals to the right device that an SIS sequence will be used in following packets. Alternatively, streaming directive SD may contain other information, such as the identity of a sequence to be used, timing information, and other information such as communication parameters. An acknowledgment packet 202 may be sent to the left device confirming receipt of packet 200, which practice may avoid a left device proceeding with a stream transmission not received due to a dropped packet 200.

Following either of a packet containing a streaming directive 200 or acknowledgment 202, the left device may send a sequence of packets 206, in a number defined by the protocol and operation of the particular devices involved. For example, where a block of data is to be sent immediately, the number of packets 206 would generally be sufficient to transmit all of that data, up to the capacity of the channel within the time needed to pass through an SIS channel sequence. If the amount of data exceeds that capacity, additional groups of packets 200, 202 and 206 may be transmitted as needed. The left device and the right device have configured thereto a point of synchronization 204 whereby both devices can determine the times of SIS channel succession with acceptable accuracy relative to the other. In this example, and as may be used in the Semtech 127× transceivers, the point of synchronization 204 is the time of packet completion of the packet 200, which may be through the generation of an interrupt to a microcontroller.

Now turning to FIG. 15, the succession of SIS channels occurs at a regular interval P, beginning at the point of synchronization 204. This succession happens regardless of whether packets are transited or not, rather both devices observe the succession on a timed basis. Each packet is transmitted entirely using the SIS channel in effect at the start of that packet. So, for example, the transmission of the packet labeled LS₁ is initiated during the first channel period P while the SIS sequence is in channel Ch₁, and even though the packet transmission extends into the next period, the transceivers of both devices remain programmed for that channel. After a transiting packet has been completed, the transceivers are permitted to be programmed for a succeeding channel. Although the example of FIG. 15 shows packets to be a certain size relative to the channel period P, packets can be shorter or longer in duration, such that it may be that several packets are transmitted during a period P, or one packet transmission spans two or more time periods, which will depend upon the communications parameters used.

Within channel periods P, the exemplary method presented herein includes two uncertainty periods 208 and 210, coming immediately before and after the transition from one SIS channel to the next in sequence. During these periods, the left device is not allowed to initiate a packet transmission. These periods of uncertainty are used to avoid errors in communication due to one device being configured for one channel while the other device is on a different one. The period 208 is set sufficiently long to cover the time needed for the right device to detect a packet-in-progress, which may be the time needed to transit the number of symbols or bits in a preamble sequence with a predetermined accuracy. The period 210 is designed to be sufficiently long so as to cover the time needed for either device to program a transceiver to a succeeding channel. Both periods should allow for additional time as needed for other events, such as for the processing of interrupts. Additionally, the uncertainty period 208 may vary depending upon the symbol rate used, which may depend upon a spreading factor used. Alternatively, the period 208 may be set for the slowest rate to be used, or the longest useful duration. Periods 208 and 210 may also be combined into one, and corresponding modifications made to state machines and methods such as those described below.

Further in FIG. 15, the left device has two packets, LS₂ and LS₃ shown in dashed lines, ready for transmittal during uncertainty periods 208 and 210. The left device may simply wait until the periods have uncertainty have passed, and then both devices will be synchronized again in their SIS channel. Because no data is transmitted during such a waiting period, it is preferable that the uncertainty periods be confined as short as possible. Furthermore, the duration of uncertainty periods should be set with some allowance for such things as clock drift and short interrupt procedures at both sides, and may be set in practice against actual hardware in real-world conditions.

Skipping ahead in the drawings to FIG. 17, a state machine is shown which may be used in a left-sided device to stream data to a right-sided device utilizing an SIS channel sequence. For these states it is assumed that one transceiver is available for each device, and for simplicity of explanation the assumption is made that no other devices are communicated with. Where it is desired that a device will communicate with more than one other device, the states shown may generally be duplicated for each pair.

Whenever a new packet has been assembled and is ready to be transmitted 230, a query is first made 232 as to whether the transceiver is busy or open for use. It is possible that a transceiver will be engaged in the reception of a packet from another device, which can be difficult to anticipate, and it is possible that a previous packet is being transmitted, from an earlier transiting or from another cause. When the transceiver is clear, it may be reserved for use or otherwise locked, buffers loaded with the contents of the assembled packet, and the first frequencies F₀ and F₁ of the current DSS sequence of channel CH loaded 234.

The method of the machine of FIG. 17 on the left and stream-producing side makes use of a free-running counter and two boundary values FRB1 and FRB2. Referring back to FIG. 15, FRB1 contains the value of the free-running counter upon entry of uncertainty period 208 in the present period P, and FRB2 contains the value of the free-running counter upon exit of uncertainty period 210 in the next period P. The precise values of the free-running counter and these boundary values will depend upon the hardware used, that is the frequency of incrementing, the use of the same number of bits in values, etc. The index of the current SIS channel in sequence is maintained in CH, and for the machine shown simply iterates through the available channels.

Following a loading of the transceiver 234, a check 236 is made for presence in uncertainty period 210, which is known by the condition of the free-running counter being less than FRB2. The machine remains in this state while this condition is true. It is to be recognized that the busy-waiting shown need not be employed, rather instructions to sleep for short periods, timers, idle instructions and other means may be used to reduce power consumption where desired. From state 236 a test is made 238 for presence in uncertainty period 208, known by the condition of the free-running counter being greater than the FRB1 value. When not present in that period, the state machine proceeds to initiate a transmission 242 and the machine managing SRS channels on the left/streaming side may exit 254.

Where the device remains in the uncertainty period 208, the left side will need to move to the next SIS channel in sequence and wait out the expiration of uncertainty period 210. This occurs in state 240—here where the SIS channels are traversed sequentially the current channel CH is incremented. Having changed channels, the P value is added to the boundary values FRB1 and FRB2 to reflect the new periods of uncertainty in the future. The specific value of P is generally the number of counts or increments on the free-running counter during the period P as shown in FIG. 15.

Once operations in state 240 are complete, the machine moves to one of two destinations. The left and right devices will eventually run out of SIS channels in the sequence; the value MaxCH is the final channel in that sequence. If the value of the current channel CH remains on a valid channel, the state machine returns back to load the new channel parameters 234 and wait for the expiration of the period bounded by FRB2 236. Otherwise, the value of the current channel CH has exceeded MaxCH, and the machine depicted in FIG. 17 resets to start a new SRS channel sequence. Using an alternative method, the devices may be allowed to use SIS channels more than once in a sequence, by either returning CH to 0 or another previous value, or by a reduction function that returns a channel identifier from a counter or index in sequence. In those alternatives, an SIS sequence may be terminated by a limit on the number of channel switches, a limit on the time in a sequence, or an interval of communication inactivity among other things.

Where a reset is indicated, the machine of FIG. 17 proceeds 244 to load the transceiver with the first frequencies F₀ and F₁ of the first channel, and optionally load the packet buffer and other communications parameters as needed. The packet buffer may be loaded to include a packet with a new sequence directive as in packet 200 in FIG. 14, which may be helpful to signal the right device to initiate new timing. Transmission is then initiated 246. The values of FRB1 and FRB2 are reset to the new uncertainty period boundaries at P−T_(su) and R_(au), respectively, where T_(su) is the interval of uncertainly period 208 and R_(au) of period 210 as measured by the free-running counter. As shown, the current channel CH is assigned to 1, although additional packets could be transmitted on the initial channel, if desired.

The machine then sleeps 250, pending the completion of the packet transmission. The point of synchronization 204 used in the machine of FIG. 17 as shown is the same as that of FIGS. 14 and 15, that is the end of the packet containing a channel directive. That being the case, the free-running counter is started 252 and the state sequence ends 254. It is to be understood that if implemented in a microcontroller, other processing tasks may be engaged during the time of sleep 250, but it is preferred that the microcontroller be immediately responsive to the event of packet transmission completion, so the free-running counter is started substantially without delay. Where a stream is first being initialized, the steps 244 through 252 may be sequenced through substantially as shown. Also not shown are states and steps for processing an acknowledgment 202 in FIG. 14, and possibly retransmittal of an LSI packet 200 and reinitiation of an SIS channel sequence where an acknowledgment is not received.

The left/streaming device may use a free-running counter as described above. The right/receiving device presented herein uses timer interrupts and is more complex. The right-side device includes a state that indicates whether it is in a state where an SIS channel streaming operation can be initiated, or whether one is presently in progress. At various times, that initial state may be engaged through the process shown in FIG. 19. An event causes the right side to initialize streaming 256. The transceiver is first set 257 to the first frequencies F₀ and F₁ on the initial channel Ch₀. The transceiver is then enabled to receive a new packet, including programming to generate an interrupt on the completion of that new packet. The state variable is then set 258 to indicate that a new reception of streamed packets on an SIS channel sequence is ready to initiate.

Continuing in FIG. 18, an interrupt will eventually occur signaling the completion of a packet 260. This interrupt may or may not be a synchronization event, 204 as shown in FIGS. 14 and 15. The state variable is immediately examined 262 to identify whether a new SIS streaming sequence is ready to start. If yes, a countdown timer is started with a period of P, the same P discussed above for the left/streaming device in terms of timer counts. The right/receiving device may then clear the interrupt produced by the packet completion, and the packet decoded 266. If desired, a small amount of time may be subtracted reflecting the expected processing between the completion of the packet and the starting of the timer. It is preferred that this processing be kept to a minimum so as not to introduce errors in the SIS channel synchronization between the left and the right devices.

At the time state 268 is entered, a timer will have been started either from the start of the latest packet or the last SIS channel transition (as will become clear shortly), and the packet generating the interrupt has been decoded and found to be valid. At this time the packet may be checked for a streaming directive. If the packet contains one, the transceiver is initialized 270 with the first frequencies F₀ and F₁ on the next channel Ch₁, the current channel CH is set to the same, and the state variable is changed from “init” to “sequencing”, avoiding the restarting of a timer at state 264. As discussed above, the move from channel 0 at this point is simply a design choice and is not necessary. The received packet may then be processed normally 272.

If at state 268 the received packet does not contain a stream directive, the state variable is checked 274 whether the right device is in “init” or “streaming”. If the state variable is “init”, the right device remains in a readiness state for the starting of a stream, and does not need a timer. The countdown timer is stopped 276, which is the same timer that was started at state 264. The received packet may then be processed normally 272.

If at 274 the state is not “init”, then a streaming operation is in process, and the possibility exists that the processing from the packet reception to the present covered the expiration of an earlier-set timer, perhaps masked by the packet complete interrupt. If the timer has not expired, then the regular interrupt procedure (discussed shortly) will handle the next expiration and no further action is needed as to SIS channel management, and the received packet may be processed 272. Where a timer has expired, and the state is “sequencing”, a countdown timer needs to be restarted 282. In one method, the passage through the machine from the interrupt 260 is assumed to be inconsequential, and the timer is set to countdown using the usual value P. In another method, compensation is made for delays in the restarting of the timer. If the timer continues to count after expiration, that value can be subtracted from P when it is reset. Where a timer stops upon expiration, a free-running counter can be used to detect the amount of delay and any amount in compensation to be applied, by subtracting the value of the free-running counter at the time of timer reset and the present time.

Having noticed the expiration of the timer, the present SIS channel is incremented 284. If the current channel exceeds MaxCH, the SIS channel sequence has ended. In that event 286, the countdown timer is stopped, the current channel CH is set to zero, and the state variable is returned to “init”. Either way, the transceiver 278 is set to receive incoming packets on the current channel CH, and the content of the incoming packet is processed 272.

FIG. 16 depicts a state machine concerned with managing SIS channel sequencer timer interrupt events. Upon receiving a timer interrupt 212, the first step 214 is to restart the countdown timer to expire at the period P and to clear the interrupt for further possible processing. If a check 216 against the state variable shows the right device is not presently sequencing, the interrupt processor waits for the transceiver to clear any busy condition 218, and then proceeds 224 to stop the countdown timer, set the current channel CH to 0, the state value returned to “init”, set the transceiver to receive packets on the initial channel, and enable interrupts on packet completion. This path through the machine may be expected not to occur unless timer events are generated on some other mechanism other than the SIS channel sequencer. The steps listed in state 224 operate to reset the channel sequence generally.

If at check 216 the state is found to be sequencing, the current channel CH is incremented. Next, if the current channel CH has exceeded the MaxCH value, the sequence has run its course and the machine resets branches through states 218 and 224 as described above. Otherwise, the machine waits 222 for the transceiver to clear any busy condition, and then sets the transceiver 228 to receive a packet on the current channel CH.

It is to be understood that the methods using free-running counters and timers described above can be applied to either a left/streaming or a right/receiving device, and that the implementation observing SIS channel switching based upon regular times can be varied from the examples presented herein according to the knowledge of a person of ordinary skill in the art.

Deployment of End-Devices Using a Dedicated Short-Range Communications Port

Now shown in FIG. 20a is an exemplary wireless device 60 deployable at intermediate ranges, that when combined with another may serve in a control or sensing function. Device 60 includes a microcontroller 61 in combination with non-volatile memory 62 into which settings may be stored. This exemplary device 60 includes three wired interfaces implementing the functions of the device, which ports are a control interface 63, a sensing interface 64, and a communications interface 65. Control interface 63 may include a number of lines, digital or analog, as needed to control a separate device. In one example implementing a control for a door latch or a blower fan, control interface 63 is a single digital line pulled up or down for a relay or a magnetic switch. In another example, control interface 63 outputs an analog voltage to control the speed of a motor or the intensity of a lamp. In another example, control interface 63 outputs a variable current controlling the power of a heating element. In a further example, control interface 63 includes several lines to control several devices or several operational functions of a single or group of devices.

Sensing interface 64 implements an input to device 60, inputting information that may be processed or transmitted to another device. In one example, sensing interface 64 is a set of digital ports connectable to the lines of a keypad matrix. In another example, sensing interface 64 is a voltage input connectable to a thermistor circuit. In a further example, sensing interface 64 is a set of ports each connectable to a different sensor, those sensors being either identical or of differing kinds. Communication interface 65 may be used to connect device 60 to another device or service, which may include a sensing or control function there, which interface is ordinarily wired. Note that it is only necessary to include one of these functional interfaces to implement a remote control or sensing function, and also that these interfaces may be duplicated in a single device to implement several sensing or control functions as desired. Further, these interfaces may be varied from the examples above to suit a particular application or need.

Exemplary device 60 also includes three communication ports, implemented as an intermediate-range transceiver 66, a wireless deployment port 67, and a wired administrative port 68, all of which may be covered or otherwise hidden in the final product form of the device. The administrative port 68 provides a means of programming and interacting with the microcontroller 61, and is present for the manufacturing process of device 60 and otherwise bringing the device into a state whereby it may be deployed by an installer. Administrative port 68 ordinarily provides a wired means of writing firmware to the device 60 and to perform functional testing at the time of manufacture, although port 68 can be omitted if microcontroller 61 is programmed in some other way. Transceiver 66 implements the intermediate-range wireless communication described above.

Deployment port 67 is a wireless communications port separate from transceiver 66 used for the deployment process, as will shortly be described. While transceiver 66 communicates at an intermediate-range distance, deployment port 67 operates with a shorter range, which is that needed for an installer to conduct the deployment procedure. In one example, deployment port 67 is implemented with a point-to-point Bluetooth transceiver at a range of about 10 meters or less. Deployment port may use other protocols, including but not limited to Near Field Communication, sonic or even optical communication. As there may be multiple devices being deployed at the same time within intermediate-range, there can be interference and confusion during the deployment process where an intermediate-range transceiver is used. Therefore the exemplary device uses a deployment port 67 that ordinarily limits the range of communication between a device used in deployment and a device being deployed to that convenient to the physical area used by an installer. A device may include other elements providing desired functions, including for example a display, indicators, input switches or a speaker.

Shown in FIG. 20b is an alternative configuration of a device employing the same functionality as 60, however this device is composed of an application board 60 a and a radio board 60 r, joined by an interface 70 through interface ports 69 a and 69 r. In one embodiment, ports 69 a and 69 r are comprised of a plug and a socket, which when connected form a unitary body that is the equivalent of device 60. Each board includes a microcontroller 61 a and 61 r, its own non volatile memory 62 a and 62 r, and administrative port 68 a and 68 r. Interfaces 63-65 appear on the application board, and ports 66 and 67 are included in the radio board. Where a generic protocol is provided for interface 70, an application board 60 a may be interchanged with one of a different kind, providing a different control or sensing function in combination with a single radio board 60 r. In this way a single kind of radio board 60 r may be manufactured in a line of control and sensing devices, the functionality of each in the line depending upon which kind of application board 60 a mated thereto.

Now devices exist that implement a sensing or control function at wired or short-range distances; the devices discussed here generally do so by a wireless link at intermediate-range distances. To achieve that, two devices 60 or their counterparts are deployed in a way that they communicate with each other wirelessly and send information across that link appropriate to the control and sensing functions that are implemented. FIG. 21 displays a typical process of implementing that from manufacturing to use, now described in further detail.

The first step in the process of implementation is to manufacture the devices, which may entail attaching or soldering a number of electronic components onto a printed circuit board. A part of this process is to place programming into the device to permit it to function appropriately, and also to place a unique unit identifier (“UID”) into the non-volatile memory of the device so that the device may be individually tracked and maintained. Where there is more than one board in the device, such as in the configuration of 20 b, more than one UID may be used, which might for example be an application board UID, a radio board UID, and a device UID. Ordinarily the device will undergo a functional test to verify the absence of non-correctable problems, and an entry will be made to record that in a database using one or more of the UIDs. The device may optionally be labeled with its UID or a code corresponding to its UID, to enable it to be identified through visual examination without the use of a probe. The device is then considered to be shippable to another party as a properly functioning product.

The second step in the process of implementation that may be undertaken is that of registration. This step is generally provided where the entity that provides a device is different from the entity that manufactures it, providing for the tracking of devices and a point of registration and administration for a customer or installer. Upon receipt of a device, a provider of that device creates a record for it using the device's UID, which may authorize it for use or sale. Where the manufacturer provides a device to a customer directly, registration may be performed at the time of manufacture and this step may be omitted.

Continuing in FIG. 21, the third step of implementation is to register a device at the site of installation. This is most conveniently done at the time a device is physically installed on-site, but may be done earlier if desired. This registration will include a record of the other devices a registered device is to communicate with using a transceiver 66, which record is preferably made to a database maintained by the device provider over the Internet. That database may be the same one used in step 2, which database may be accessed by the provider, the installer and the maintainer of the device as desired. A part of the implementation of a device to installation may be the creation of a record of the purchase or other use by a customer of a particular device, e.g. a record stating that a device was acquired for the use of a particular customer for use in a particular way. For example, if a device were a keypad to be positioned at an entryway, the record might include the UID of the keypad, a notation that it had been authorized for use by a purchaser, and a notation that it would be communicating with a central controller located inside a building at a particular place.

The fourth step of implementation is to deploy the device in an installation. This will generally involve wiring the device in its installed state, that is to a source of power and a control or a sensing mechanism, where that is not included in the device itself. Devices operating at intermediate ranges will also generally require the configuring of communications parameters, that is the particular channels, frequencies, bit rates, spreading factors, addresses, frequency sequence tables and other items that permit communication orthogonal to other devices operating in the same area, as explained above. Further involved in this step will be device configuration for operation, such as particular access codes, digital certificates, encryption keys, control or sensing parameters and other items needed to enable operation of the particular devices that are being installed. As a part of this fourth step, it is preferred that the particular condition of a device as installed be recorded in a database, such as the database used in the second or third steps, providing information to a troubleshooter in the event of a functional issue. Once deployment has been made, the device will be ready for use.

In this exemplary method of implementation, it is preferred that the first step be performed using the administrative interface 68 at the time a device is programmed. The second through fourth steps may be performed through an administrative interface 68, but it is preferred that the deployment interface 67 is used avoiding the need for a specialized probe or attachment. It is especially preferred that the deployment interface 67 be implemented using a wireless connection conforming to the Bluetooth protocol, permitting those steps to be performed using an ordinary mobile device including that functionality. Of course where intermediate-range wireless communications are used, the ordinary operation of a device will be conducted through transceiver 66 after deployment, leaving interfaces 67 and 68 available as needed.

Now turning to FIG. 22, the front face of a cover of an exemplary intermediate-range wireless device 72 is shown, of the form shown in and described for FIG. 20b . This device operates as one side of a Wiegand bridge, that is an intermediate-range wireless link that bridges a wired connection conforming to the Wiegand protocol common in access control equipment, such that wires are not required to be run the full distance between the Wiegand-conforming access control devices. The cover is divided between two halves, a first half 73 housing a radio board 60 r and a second half 74 housing an application board. An antenna 75 is formed into the radio board 73, appearing externally to the cover. Indicator lights 76 are provided which show various aspects of operation, here including transmit, receive, strength of signal to a device on the other side of a wireless link, and a power supply connection. Terminal blocks 77 are provided to which a wired connection can be made to an ordinary Wiegand-conforming device such as a card reader. An identifying label 78 provides a visual UID on the cover, here in the form of a scannable QR code. Looking back to FIG. 20b , exemplary device 72 implements communication port 65 and omits control and sensing ports 63 and 64. In essence, the cabling between two ordinary Wiegand devices may be cut, a pair of wireless devices 72 being inserted at the cut, and when properly deployed the wireless devices replace the wired connection between the Wiegand devices.

Now discussed in further detail, an intermediate-range wireless device having a separate deployment interface may be deployed using an ordinary mobile device, for example a cellular telephone or a tablet, over a Bluetooth connection. This kind of deployment may be conducted substantially on a tabletop, as shown in FIG. 23, through a mobile application installed to such a mobile device. That mobile application displays instructions and status to a person making a deployment, and transfers information between deploying devices and servers and/or databases as will presently be discussed.

Now turning to FIG. 24a , the second step in the procedure of implementation discussed above is that of registration 310. It is to be recognized that this can be accomplished through the use of an administrative port 68, but for this implementation this step will be accomplished by means of a mobile device 302. Access to database 304 from mobile device 302 may be by way of an 802.11b or n “WiFi” point over the Internet, by a cellular carrier data plan, or by another network link as desired. First, a user starts a mobile application specially adapted for the registration procedure, and at some point before accessing the database 304 he will log in or otherwise authenticate himself. Database 304 and a server by which it can be accessed may be configured in numerous ways, but in essence it provides the means to retain and return information specific to individual devices 300. A connection is initially made 312 to a device 300 being registered through the deployment interface 67. The Bluetooth communication standard provides a convenient deployment interface, because it is included in most modern mobile devices and is relatively inexpensive to include in a device 300. When using that standard, connections are ordinarily made through the process of “pairing” as follows. First, the person registering a device 300 will apply power, and activate a switch or other input to place the device into discovery mode. A screen or indicator lights may be included with the device to inform the person as to the state of the device. The mobile application will search for devices of the kind being deployed, and will pair with one device 300 found in the radio vicinity. This pairing will be maintained until the registration is complete, upon which the application will release the device into a normal operational mode. Connections made in site registration, deployment and otherwise in the course of implementation using the deployment port may be practically the same. Although the exemplary deployment interface is one of Bluetooth, others can be substituted such as Near Field Communication, recognizing that a short-range interface will avoid interference from other devices at intermediate ranges from a mobile device 302.

Upon connection 312, a unit identifier (UID) of the device 300 will be provided 314 to the mobile application 302, which may be performed by a request from that application over the deployment port. The UID may be for the deploying device 300, or for one or more of its boards or other components. It is best if a UID is unique to each device 300 manufactured. In some embodiments, the UID is associated with a label code or QR code affixed to a label of each device 300. In one example, the mobile application 302 may obtain the UID of a device 300 by scanning the QR code affixed to the label of the device 300 and accessing a database 304. In some cases, this may allow for easy access to the UIDs (for easy registration, for example) of lots of devices 300. Upon possession of a UID, mobile device 302 then accesses 316 the database 304, which creates or verifies an entry 318 reflecting device registration activity. That entry 318 may contain an access log including the identity of a person performing device registration and other information. In the exemplary method, a label code “LC” is created or assigned for each UID stored in database 304, after which a report 320 of the database entry is returned to the mobile device 302 confirming registration. Also in the exemplary method, a label image containing the label code is provided to mobile device 302 for printing and affixing 322 to the now-registered device. A label image may be in any convenient format, including JPEG or PDF. Label 78 in FIG. 22 is one example. In an alternate method, labels with label codes are pre-printed and the operator of mobile device 302 provides the label code of the label he is affixing to the deploying device 300 with its UID, which is recorded in entry 318. Where that is done, the entering of a label code may be through a scanning operation by mobile device 302.

Upon the affixing of a label 322 bearing a label code and an entry 318 in the database 304 containing that label code and the UID of a device 300, a way of verification becomes available against tampering. Should label 322 be affixed to another device 300, that can be detected by a reference to database 304, which would contain an entry with a different combination of codes. It is also preferable that the UID of a deploying device be concealed from a mobile device 302 operator, preserving evidence of tampering should it occur. The lack of an entry 318 for a UID or a label code may indicate that an unauthorized device is attempting to be used, which might happen if a device were stolen, for example. In succeeding operations using mobile device 302, discussed below, it is generally preferred to check the entry 318 for a label code against the corresponding UID of a device on the making of an initial connection, and raising a warning or error condition should a non-matching pair be encountered.

At the time of device registration 310, the device to be deployed 300 may be exercised by hardware and software tests to ensure that the device leaves the custody of the reseller or provider in a normal, operable condition. The result of those tests may be saved to a record 318 or a related one as desired.

Now proceeding further in FIG. 24a , site registration 330 for a registered device may be undertaken. Whereas device registration 310 might be typically performed at a reseller before device 300 is enclosed in a box or other package, site registration 330 will typically be performed at or near the site where the device is to be deployed for use. Each of the steps of device registration 310, site registration 330 and deployment 360 (to be discussed shortly) may be performed on different mobile devices 302 or the even the same one as desired, and the application installed to a mobile device 302 need minimally only include that needed to perform the appropriate steps. Thus, a mobile application may be distributed that permits all of the steps depicted in FIGS. 24a and 24b to be performed, or alternatively a separate application may be released only to a reseller's staff for device registration 310, and a separate application provided to installers for the steps of site registration 330 and deployment 360, or even a separate mobile application for all three steps as desired.

In the exemplary site registration 330 depicted, the first step is for the operator of the mobile device 302 to log in 332, thus establishing the identity of the operator in the site registration to be performed. It is preferred that the operator be known and confirm his identity, so as to maintain a check against unauthorized or improper registration. Deployment of devices typically involves a setup of two or more devices in communication and interaction with each other. A part of site registration ordinarily includes this setup, as directed by the installers of the devices 300. Thus a doorframe keypad device may be set up to interact with a central controller operating a magnetic door latch, a motion sensor may report to a central logger, a fire sensor to an alarm, etc. The steps in the box 334 are performed for each device to be deployed.

The one of those steps is to scan 336 the label 322 into the mobile device 302, such that the mobile application can determine the label code earlier applied. The mobile application connects 338 with the device 300 in the way described above through the deployment port, upon which a UID of the device is returned 340. The UID and label code retrieved and scanned are then submitted to the database 304, upon which a log entry can be made noting the identity of the operator against the particular device being registered on-site. The identity of the operator may indicate the identity of the receiving entity, which may provide verification that a device reached its appropriate destination. In one alternative, a check is made of the operator's identity against the label code or a UID of the device, or both, and if the device is determined to be in unauthorized hands, site registration and deployment is terminated.

Upon recognizing a device, portions of its configuration may be set. In the example, this is done through a mating command 344 that indicates which other device or devices the device under registration is to have interaction. This interaction configuration may include the specific addresses, identities and communication parameters needed, which may include the specification of channels, frequency hopping tables, spreading factors, etc. as discussed above. The mating command will ordinarily include a selection of another device relative to a first which can be made in several ways. In a first way, the procedure in the box 334 may be performed twice, and the operator may press an on-screen button indicating that the last two devices are to be mated. In a second way, the operator may be presented with a selection box of registered devices scanned during the current application session. In a third way, the mobile device may request from the database 304 all or a subset of devices 300 registered by the operator or his organization, and the operator may select from the list that is returned. Other methods of specifying the mating of devices may be employed. A check may be made for compatibility of devices to be mated by the mobile application, a server or at another location at about this time, or later if desired.

Note, however, that a device 300 need not be programmed at this step. Rather, database 304 can be updated to include an entry 346 of the identity of two devices, which may conveniently be two label codes which may be displayed to an operator or installer. In an alternative, the entry 318 containing two for more device identifications may be updated to include the identity of other mated devices. At the time of site registration, communications parameters may also be set and stored in record 346; an alternative embodiment of the mobile application provides for a review of communications parameters to verify the appropriateness of those settings. When a mating has been performed at the database 304 as requested 344, a confirmation may be returned to the mobile device 302 and displayed.

The exemplary deployment process suggests that devices to be deployed 300 can be located to a single table or other location for the site registration process 330, by the same operator/individual if desired. The final locations of devices being deployed 300 may be diverse, in different locations of the same building, in different buildings or even at distances of kilometers. It may be desired to have several individuals do the final deployment on a group of devices, each having their own mobile device. The description here may speak of steps in the deployment process being performed by a single mobile device, but that is for simplicity of explanation and is not required.

Now proceeding to FIG. 24b , deployment 360 of a device 300 ordinarily begins with the physical installation 362 of the device. It is preferred that devices be made in a power-off safe configuration that renders any control mechanisms free of dangerous or unsecured hazards, not only for power-failure events, but also to protect the installers and persons at a site. A physical installation ordinarily involves positioning a device in its operational position, and wiring power, antennas, and any busses or peripheral devices to be used. The installer may then use his mobile device 302 to log in 364 to the server and its database 304. It is preferred that this login procedure be authenticated, that is the person being provided with personal means of proving his identity. In one example, this is by means of a password. In another example, this is by means of identity of the mobile device, which may be a cellular telephone having a specific telephone number. In another example, an installer authenticates by means of fingerprints or face recognition. In another example, the installer receives by email or other message temporary login credentials valid for a limited period of time. Where automatic confirmation of personal identity is not needed, an installer may be permitted to enter a name, perhaps with a picture of a drivers license or other identification.

Following authentication 364 and in the exemplary deployment procedure, the installer performs a set of steps 366 for each device being deployed. First, using the camera built into the mobile device 302, the installer captures 368 an image of the label 322 on the device 300. The mobile application may then extract the label code. The exemplary deployment procedure provides for pictures to be taken of the installation of device 300. As directed by the mobile application, the installer takes images 370 from various perspectives and views of the device 300 as mounted and any cables or other attachments. The mobile application further gathers circumstantial information 372, which may include a geophysical location and notes of the installer. Included in the exemplary steps 366 is the making of a connection 374 between the mobile device 302 and the device being installed 300, using the deployment port, which permits the UID(s) on the device to be read.

Any or all of the information gathered in operations 368-376 may be provided 378 to the database 304, which may be incorporated into an entry for the device 318 earlier made. In one alternative, before an update is made to the entry 318, a check is made of the label ID and a UID of the device under deployment against the entry, and if the label code does not match that recorded for the UID retrieved 376, deployment is disallowed in the mobile application. It may be that a label bearing a code 322 will deteriorate or fall off over time. In an alternative, a mobile application is permitted to proceed, printing a new label with a new code, with a notification to a manufacturer or reseller of the event so appropriate action can be taken.

Assuming all is in order, the mobile device receives 380 information 346 from the database, including the intermediate-range communications parameters needed for the device being deployed to communicate with its mated device(s). That information is passed forward 382 to the deploying device over the deployment interface 67. Other information may be passed forward, including but not limited to authorization codes, security codes, and parameters needed to enable the deploying device 300 to function, which information may originate in the database 304, from the mobile application of the mobile device 302, or elsewhere as desired.

As part of the deployment process, various tests may be commanded 384. One of these tests is a functional test, the same or similar to that performed at manufacturing. Another of these tests is a communications test to verify the intermediate-range communications link with a mated device using the transceiver 66 of the device; this test would ordinarily be performed on the last device to be deployed in a mated set, so all devices were properly configured for communication. Test results may be produced by the device 300, transmitted 386 to the mobile device 302 through the deployment interface 67, and optionally a log entry made in database 304 containing those results, which may assist in confirming the proper deployment of the device or in troubleshooting activities.

In an alternative, during the times a mobile device is in communication with a device 300, a firmware update procedure may be performed. That procedure is typically performed by requesting from the device 300 a version number, a checksum or other identifying characteristic, and if a newer firmware revision is available it is downloaded to the device 300 from mobile device 302 over the deployment interface.

Now although certain systems, products, components, functions and methods have been described above in detail for specific applications, one of ordinary skill in the art will recognize that these functions and methods are adaptable to other systems and products. Likewise, although the described functions have been described through the use of block and state diagrams, flowcharts, and software and hardware descriptions, one of ordinary skill in the art will recognize that most of the functions described herein may be implemented in software or hardware. State machines described herein may likewise be implemented completely in logic, as software executable on a general-purpose or embedded processor, or as a mixture of both. Some of the descriptions herein refer to specific protocols and modulation types, which are only exemplary; other protocols and types may be substituted as desired in accordance with the inventive concepts. More specifically, it is to be understood that although the accompanying description makes reference to the LoRa and LoRaWAN protocols and designs, the inventions described herein may be used in other kinds of intermediate-range networks, RF bands and using other equipment. The exact configurations described herein need not be adhered to, but rather the diagrams and architectures described herein may be varied according to the skill of one of ordinary skill in the art. Therefore, the inventions disclosed herein are to be fully embraced within the scope as defined in the claims. It is furthermore understood that the summary description and the abstract are provided merely for indexing and searching purposes, and do not limit the inventions presented herein in any way. 

What is claimed:
 1. A method of registering and deploying intermediate-range wireless communications devices using a mobile device, the intermediate-range wireless communications device having a deployment transceiver, the mobile device having a short-range wireless transceiver operable to communicate with the intermediate-range wireless communications device through the deployment transceiver, the mobile device having a network connection by which a database may be accessed, said method comprising the steps of: installing to a mobile device having a short-range wireless transceiver a mobile application; executing the installed mobile application; at the mobile device, connecting to and interacting with a first intermediate-range wireless communications device using the short-range wireless transceiver; at the mobile device, retrieving a unit identifier of a connected intermediate-range wireless communications device; creating an entry in the database containing a retrieved unit identifier of a connected intermediate-range wireless communications device, the entry further having associated with the unit identifier a label code; at the mobile device, scanning a label bearing a label code affixed to an intermediate-range wireless communications device; verifying that the combination of a scanned label code and a retrieved unit identifier has a corresponding entry in the database; receiving the selection of a second intermediate-range wireless communications device to be mated to the first intermediate-range wireless communications device; commanding the mating of the second intermediate-range wireless communications device to the first intermediate-range wireless communications device; creating an entry in the database containing an identifier for each of the first and second intermediate-range wireless communications devices in combination with point-to-point communications parameters; physically installing the first intermediate-range wireless communications device, said installing including mounting and wiring the first intermediate-range wireless communications device into an operable state; at the mobile device, taking images of the first intermediate-range wireless communications device as installed, and transmitting those images to be stored in the database; receiving at the mobile device communications parameters earlier stored to the database for the first intermediate-range wireless communications device; and transferring from the mobile device to the first intermediate-range wireless communications device communications parameters to be used in communicating with the second intermediate-range wireless communications device.
 2. The method of claim 1, further comprising the steps of: at the mobile device, entering circumstantial information; and transmitting entered circumstantial information from the mobile device to the database.
 3. The method of claim 1, further comprising the step of: at the mobile device, sending a command to the first intermediate-range wireless communications device to perform a functional test.
 4. The method of claim 1, further comprising the step of: at the mobile device, sending a command to the first intermediate-range wireless communications device to perform a communications test with the second intermediate-range wireless communications device.
 5. The method of claim 1, wherein: the databases accessed are implemented as two or more logical databases, and said method accesses each of those logical databases in two or more steps.
 6. The method of claim 5, wherein the two or more logical databases reside on separate servers.
 7. The method of claim 1, further comprising the step of affixing a label bearing a label code to an intermediate-range wireless communications device.
 8. The method of claim 1, further comprising the step of creating a log of information transmitted in interactions between the mobile device and the first intermediate-range wireless communications device.
 9. The method of claim 1, wherein the communications parameters transferred from the mobile device to the first intermediate-range wireless communications device specify at least one of an operating frequency, a bit rate, a spreading factor, an address, and a frequency hopping sequence.
 10. The method of claim 1, wherein the communications parameters transferred from the mobile device to the first intermediate-range wireless communications device include an encryption key.
 11. The method of claim 1, further comprising the step of transferring an image of a label to the mobile device for printing.
 12. A method of registering and deploying intermediate-range wireless communications devices using a mobile device, the intermediate-range wireless communications device having a deployment transceiver, the mobile device having a short-range wireless transceiver operable to communicate with the intermediate-range wireless communications device through the deployment transceiver, the mobile device having a network connection by which a database may be accessed, said method comprising the steps of: installing to a mobile device having a short-range wireless transceiver a mobile application; executing the installed mobile application; at the mobile device, authenticating an operator or installer to access the database; at the mobile device, connecting to and interacting with a first intermediate-range wireless communications device using the short-range wireless transceiver; at the mobile device, retrieving a unit identifier of a connected intermediate-range wireless communications device; at the mobile device, scanning a label bearing a label code affixed to an intermediate-range wireless communications device; optionally verifying that the combination of a scanned label code and a retrieved unit identifier has a corresponding entry in the database; receiving the selection of a second intermediate-range wireless communications device to be mated to the first intermediate-range wireless communications device; commanding the mating of the second intermediate-range wireless communications device to the first intermediate-range wireless communications device; creating an entry in the database containing an identifier for each of the first and second intermediate-range wireless communications devices in combination with point-to-point communications parameters; physically installing the first intermediate-range wireless communications device, said installing including mounting and wiring the first intermediate-range wireless communications device into an operable state; at the mobile device, taking images of the first intermediate-range wireless communications device as installed, and transmitting those images to be stored in the database; receiving at the mobile device communications parameters earlier stored to the database for the first intermediate-range wireless communications device; and transferring from the mobile device to the first intermediate-range wireless communications device communications parameters to be used in communicating with the second intermediate-range wireless communications device.
 13. The method of claim 12, wherein the step of receiving the selection of a second intermediate-range wireless communications device to be mated to the first intermediate-range wireless communications device is performed by the entry of an operator from a list of identified intermediate-range wireless communications devices.
 14. The method of claim 12, wherein the step of receiving the selection of a second intermediate-range wireless communications device to be mated to the first intermediate-range wireless communications device is performed by site registering the second intermediate-range wireless communications device after the first intermediate-range wireless communications device.
 15. A method of deploying intermediate-range wireless communications devices using a mobile device, the intermediate-range wireless communications device having a deployment transceiver, the mobile device having a short-range wireless transceiver operable to communicate with the intermediate-range wireless communications device through the deployment transceiver, the mobile device having a network connection by which a database may be accessed, said method comprising the steps of: installing to a mobile device having a short-range wireless transceiver a mobile application; executing the installed mobile application; at the mobile device, connecting to and interacting with a first intermediate-range wireless communications device using the short-range wireless transceiver; at the mobile device, retrieving a unit identifier of a connected intermediate-range wireless communications device; at the mobile device, scanning a label bearing a label code affixed to an intermediate-range wireless communications device; verifying that the combination of a scanned label code and a retrieved unit identifier has a corresponding entry in the database; receiving the selection of a second intermediate-range wireless communications device to be mated to the first intermediate-range wireless communications device; physically installing the first intermediate-range wireless communications device, said installing including mounting and wiring the first intermediate-range wireless communications device into an operable state; at the mobile device, taking images of the first intermediate-range wireless communications device as installed, and transmitting those images to be stored in the database; receiving at the mobile device communications parameters earlier stored to the database for the first intermediate-range wireless communications device; transferring from the mobile device to the first intermediate-range wireless communications device communications parameters to be used in communicating with the second intermediate-range wireless communications device; and transferring from the mobile device to the first intermediate-range wireless communications device operational parameters to be used in communicating with the second intermediate-range wireless communications device.
 16. The method of claim 15, further comprising the step of recording the geophysical location of the mobile device at the time of deployment of the first intermediate-range wireless communications device.
 17. The method of claim 15, further comprising the step of disallowing the mating of an intermediate-range wireless communications device where the step of verifying that the combination of a scanned label code and a retrieved unit identifier fails.
 18. The method of claim 15, further comprising the step of creating a log of information transmitted in interactions between the mobile device and the first intermediate-range wireless communications device.
 19. The method of claim 15, wherein the communications parameters transferred from the mobile device to the first intermediate-range wireless communications device specify at least one of an operating frequency, a bit rate, a spreading factor, an address, and a frequency hopping sequence.
 20. The method of claim 15, wherein the label code comprises a QR code. 