US20180159590A1 - Radio frequency leakage detection in a cable plant - Google Patents
Radio frequency leakage detection in a cable plant Download PDFInfo
- Publication number
- US20180159590A1 US20180159590A1 US15/872,623 US201815872623A US2018159590A1 US 20180159590 A1 US20180159590 A1 US 20180159590A1 US 201815872623 A US201815872623 A US 201815872623A US 2018159590 A1 US2018159590 A1 US 2018159590A1
- Authority
- US
- United States
- Prior art keywords
- antenna
- location
- leakage
- mobile
- test
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000001514 detection method Methods 0.000 title abstract description 11
- 238000012360 testing method Methods 0.000 claims abstract description 111
- 238000012545 processing Methods 0.000 claims description 13
- 238000013500 data storage Methods 0.000 claims description 2
- 238000006243 chemical reaction Methods 0.000 claims 1
- 241000196324 Embryophyta Species 0.000 description 43
- 238000000034 method Methods 0.000 description 37
- 230000015654 memory Effects 0.000 description 13
- 238000010586 diagram Methods 0.000 description 12
- 230000008859 change Effects 0.000 description 10
- 230000006870 function Effects 0.000 description 7
- 238000004458 analytical method Methods 0.000 description 5
- 238000004891 communication Methods 0.000 description 5
- 238000005259 measurement Methods 0.000 description 5
- 230000010363 phase shift Effects 0.000 description 5
- 230000000979 retarding effect Effects 0.000 description 5
- 230000007704 transition Effects 0.000 description 5
- 238000004364 calculation method Methods 0.000 description 3
- 230000007547 defect Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 229910052701 rubidium Inorganic materials 0.000 description 3
- IGLNJRXAVVLDKE-UHFFFAOYSA-N rubidium atom Chemical compound [Rb] IGLNJRXAVVLDKE-UHFFFAOYSA-N 0.000 description 3
- 239000007787 solid Substances 0.000 description 3
- 241001465754 Metazoa Species 0.000 description 2
- 238000013459 approach Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 235000015111 chews Nutrition 0.000 description 2
- 230000007797 corrosion Effects 0.000 description 2
- 238000005260 corrosion Methods 0.000 description 2
- 230000007423 decrease Effects 0.000 description 2
- 230000005672 electromagnetic field Effects 0.000 description 2
- 238000009413 insulation Methods 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 230000009467 reduction Effects 0.000 description 2
- 230000008439 repair process Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 238000012935 Averaging Methods 0.000 description 1
- 208000013201 Stress fracture Diseases 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 229910052792 caesium Inorganic materials 0.000 description 1
- TVFDJXOCXUVLDH-UHFFFAOYSA-N caesium atom Chemical compound [Cs] TVFDJXOCXUVLDH-UHFFFAOYSA-N 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 239000004020 conductor Substances 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000000670 limiting effect Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000000116 mitigating effect Effects 0.000 description 1
- 230000005404 monopole Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000002829 reductive effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000010998 test method Methods 0.000 description 1
- 238000012956 testing procedure Methods 0.000 description 1
- 238000012549 training Methods 0.000 description 1
- 230000032258 transport Effects 0.000 description 1
- 238000013024 troubleshooting Methods 0.000 description 1
- 239000013585 weight reducing agent Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B3/00—Line transmission systems
- H04B3/02—Details
- H04B3/46—Monitoring; Testing
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R29/00—Arrangements for measuring or indicating electric quantities not covered by groups G01R19/00 - G01R27/00
- G01R29/08—Measuring electromagnetic field characteristics
- G01R29/0807—Measuring electromagnetic field characteristics characterised by the application
- G01R29/0814—Field measurements related to measuring influence on or from apparatus, components or humans, e.g. in ESD, EMI, EMC, EMP testing, measuring radiation leakage; detecting presence of micro- or radiowave emitters; dosimetry; testing shielding; measurements related to lightning
- G01R29/0835—Testing shielding, e.g. for efficiency
-
- G01R31/025—
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/08—Locating faults in cables, transmission lines, or networks
- G01R31/081—Locating faults in cables, transmission lines, or networks according to type of conductors
- G01R31/083—Locating faults in cables, transmission lines, or networks according to type of conductors in cables, e.g. underground
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/50—Testing of electric apparatus, lines, cables or components for short-circuits, continuity, leakage current or incorrect line connections
- G01R31/52—Testing for short-circuits, leakage current or ground faults
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S13/00—Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
- G01S13/02—Systems using reflection of radio waves, e.g. primary radar systems; Analogous systems
- G01S13/06—Systems determining position data of a target
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S5/00—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
- G01S5/02—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S5/00—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
- G01S5/02—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
- G01S5/0246—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves involving frequency difference of arrival or Doppler measurements
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S5/00—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
- G01S5/02—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
- G01S5/0249—Determining position using measurements made by a non-stationary device other than the device whose position is being determined
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/38—Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
- H04B1/40—Circuits
- H04B1/50—Circuits using different frequencies for the two directions of communication
- H04B1/52—Hybrid arrangements, i.e. arrangements for transition from single-path two-direction transmission to single-direction transmission on each of two paths or vice versa
- H04B1/525—Hybrid arrangements, i.e. arrangements for transition from single-path two-direction transmission to single-direction transmission on each of two paths or vice versa with means for reducing leakage of transmitter signal into the receiver
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B17/00—Monitoring; Testing
- H04B17/30—Monitoring; Testing of propagation channels
- H04B17/309—Measuring or estimating channel quality parameters
- H04B17/354—Adjacent channel leakage power
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/08—Locating faults in cables, transmission lines, or networks
Definitions
- Provisional Patent Application No. 62 / 054 , 529 (filed Sep. 24 , 2014 ) entitled “VARIOUS COMMUNICATION SYSTEMS AND METHODS”, and U.S. Provisional Patent Application No. 62 / 146 , 848 (filed on Apr. 13 , 2015 ) entitled “SIGNAL LEAKAGE DETECTION USING SYNTHETIC PHASED ARRAYS”, all of which are hereby incorporated by reference.
- This disclosure relates to the field of Radio Frequency (RF) signal detection, and in particular, to detecting RF leaks from a cable plant of a cable system operator.
- RF Radio Frequency
- Radio Frequency (RF) signals transmitted over coaxial cables to provide television and data services to customers.
- RF signals do not cause interference when in compliance with Federal Communication Commission (FCC) rules that limit interference.
- FCC Federal Communication Commission
- the RF signals can leak. Cable signal leaks occur when the RF signals transmitted within the cable system are not contained within the cable plant. Cable signal leaks may be caused by loose connectors, damaged cables, unshielded housings, or unterminated cables.
- a cable plant uses many of the same frequencies to transmit programming as licensed to over-the-air broadcasters. Cable operators are considered by the FCC to be secondary users of these frequencies, so they are precluded from interfering with licensed users who are the primary users of these frequencies.
- Cable signal leakage can interfere with the over-the-air services that are using the same frequencies as the cable plant near the vicinity of an RF leak. This can interfere with ham radio operators, cellular radio, emergency responders, and aircraft navigation systems. When interference from the cable plant occurs, it can hamper or endanger others.
- the FCC has set maximum individual signal leakage levels for cable systems.
- the FCC is stricter with signal leakage levels for cable systems that interfere with aeronautical and/or navigation communications. Therefore, the FCC requires cable operators to have a periodic, on-going program to inspect, locate, and repair RF leaks in their cable plants. However, locating RF leaks in a cable plant can be difficult and time consuming, due to the complexity and size of a typical cable plant.
- Radio Frequency (RF) signals transmitted over coaxial cables to provide television and data services to customers.
- RF Radio Frequency
- RF signals do not cause interference when the shielding integrity is good, but sometime damage occurs. Damage may be caused by corrosion, animal chews, craft error, or mechanical stress.
- cable signals may leak out causing interference with wireless services.
- Many of the RF frequencies used inside the coaxial cable are the same frequencies used for a variety of wireless communication services, such as aviation signals, Ham radio signals, broadcast signals and wireless LTE (long term evolution) 2-way communications.
- LTE long term evolution
- One limitation with legacy leakage detection equipment is that when a distance between the leakage signal's source and a receiving antenna is not known, it is not possible to calculate if the field strength exceeds FCC limits at a test distance, which may be at 3 meters or 30 meters. Thus, there is a need to know measurement distance to calculate if a detected leak exceeds FCC limits.
- Embodiments described herein provide for the detection of RF leaks in a coaxial cable of a cable plant utilizing various analytical techniques that are applied to the RF signals emitted from the RF leaks. These analytical techniques provide information about an RF leak that reduces the amount of effort and time that may be required to locate the RF leak in the cable plant.
- One embodiment comprises a mobile device that is configured to detect RF leaks emanating from a coaxial cable of a cable plant.
- the mobile device includes an antenna that is configured to receive an RF signal from an RF leak in the coaxial cable.
- the mobile device further includes a quadrature demodulator that is configured to demodulate the RF signal to generate In-phase and Quadrature (IQ) data, and a controller.
- the controller is configured to determine changes in a phase angle of the RF signal based on the IQ data generated as the mobile device is in motion.
- the controller is further configured to identify that the mobile device is travelling toward the RF leak responsive to determining that the phase angle is advancing, and to identify that the mobile device is travelling away from the RF leak responsive to determining that the phase angle is retarding.
- Another embodiment comprises a method for detecting RF leaks emanating from a coaxial cable of a cable plant.
- the method comprises receiving, by an antenna of a mobile device, an RF signal from an RF leak in the coaxial cable.
- the method further comprises demodulating the RF signal to generate IQ data, and determining changes in a phase angle of the RF signal based on the IQ data generated as the mobile device is in motion.
- the method further comprises identifying that the mobile device is travelling towards the RF leak responsive to determining that the phase angle is advancing, and identifying that the mobile device is travelling away from the RF leak responsive to determining that the phase angle is retarding.
- Another embodiment is a non-transitory computer readable medium embodying programmed instructions which, when executed by a processor of a mobile device, detects RF leaks emanating from a coaxial cable of a cable plant.
- the instructions direct the processor to receive, by an antenna of the mobile device, an RF signal from an RF leak in the coaxial cable.
- the instructions further direct the processor to demodulate the RF signal to generate IQ data, and to determine changes in a phase angle of the RF signal based on the IQ data generated as the mobile device is in motion.
- the instructions further direct the processor to identify that the mobile device is traveling towards the RF leak responsive to determining that the phase angle is advancing.
- the instructions further direct the processor to identify that the mobile device is traveling away from the RF leak responsive to determining that the phase angle is retarding.
- Embodiments described herein provide for the detection of RF leaks in coaxial network utilizing various analytical techniques that are applied to RF signals emitted from the RF leaks, or probing RF signals applied to the coaxial network to discover shielding defects. These analytical techniques provide information about shielding defects that reduce the amount on time and effort that may be required to locate and repair the shielding defect.
- a mobile test antenna receives a leakage test signal radiated from a leakage antenna created by a shield break in the cable plant.
- the antenna is connected to a mobile receiver with a complex demodulator producing in-phase (I) and quadrature (Q) samples periodically.
- I-Q samples which contain information about the magnitude and phase of one or more leakage antennas, are inserted into a Fourier transform, which produce Doppler frequency components for each leakage antenna.
- the Doppler frequency components may each be processed with an arc cosine function to reveal bearing angles to each leakage antenna, as well as strength of the leakage signal. After the mobile antenna moves a distance, the intersection of another bearing angle with the first bearing angle reveals the position of the leaks.
- a second mobile test antenna is used to resolve whether the leak is on the left or right side of the drive path.
- a mobile transmit antenna connected to a mobile test signal transmitter, transmits a leakage signal which is received by a leakage antenna and relayed over cable line to a stationary receiver.
- the position of the mobile transmit antenna during the test may be sent wirelessly to a stationary receiver, so the latitude and longitude of the leakage antennas can be determined.
- a second mobile transmitting antenna is used to resolve left-right ambiguity.
- a single antenna with a position reporting capability is moved by a technician, and I-Q field strength is recorded along with position as the antenna is moved.
- the result is a spatial map of electromagnetic field in a space that is analyzed for the leakage source.
- FIG. 1 is a block diagram of a mobile device that detects RF leaks emanating from a coaxial cable of a cable plant in an exemplary embodiment.
- FIG. 2 is flow chart of a method for detecting RF leaks emanating from a coaxial cable of a cable plant in an exemplary embodiment.
- FIG. 3 is a flow chart of another method for detecting an RF leak emanating from a coaxial cable plant in an exemplary embodiment.
- FIG. 4 illustrates a first spatial cone along an x-axis in an exemplary embodiment.
- FIG. 5 is a flow chart of a method of determining a bearing to an RF leak emanating from a coaxial cable of a cable plant in an exemplary embodiment.
- FIG. 6 illustrates a second spatial cone along a y-axis in an exemplary embodiment.
- FIG. 7 illustrates two possible bearings to an RF leak in an exemplary embodiment.
- FIG. 8 illustrates a third spatial cone along a z-axis in an exemplary embodiment.
- FIG. 9 illustrates the mobile device of FIG. 1 in another exemplary embodiment.
- FIG. 10 is a flow chart of another method for determining a bearing to an RF leak emanating from a coaxial cable of a cable plant in an exemplary embodiment.
- FIG. 11 is a flow chart of a method for determining if multiple RF leaks exist in a coaxial cable of a cable plant in an exemplary embodiment.
- FIG. 12 is a block diagram of the mobile device of FIG. 1 in another exemplary embodiment.
- FIG. 13 is a flow chart of another method for detecting RF leaks emanating from a coaxial cable of a cable plant in an exemplary embodiment.
- FIG. 14 is a block diagram of the mobile device of FIG. 1 in another exemplary embodiment.
- FIG. 15 illustrates spatial cones that are not located at the origin in an exemplary embodiment.
- FIG. 16 is a block diagram of an exemplary computing system in which a computer readable medium provides instructions for performing the methods described herein.
- FIG. 17 illustratively represents a system utilizing a single receive antenna for locating leakage antennas, in an embodiment.
- FIG. 18 illustratively represents a system utilizing a two transmit antennas for locating leakage antennas, in an embodiment.
- FIG. 19 is a diagram showing two Doppler frequency vs. distance plots to determine if leak is on the left or right, in an embodiment.
- FIG. 20 illustratively represents moving an antenna in a space to determine from the mapped electromagnetic field in that space where leakage antennas are located, in an embodiment.
- FIG. 1 is a block diagram of a mobile device 100 that detects RF leaks emanating from a coaxial cable of a cable plant in an exemplary embodiment.
- a coaxial cable 102 is illustrated in FIG. 1 that is part of a cable plant.
- Coaxial cable 102 includes an inner conductor (not shown) that is surrounded by a tubular insulation layer (not shown). The tubular insulation layer is surrounded by a tubular outer shield (not shown).
- coaxial cable 102 is utilized by a cable operator to distribute television and/or data services to customers.
- Cable operators typically transmit using some of the same frequencies over coaxial cables (e.g., coaxial cable 102 ) that are licensed for over-the-air broadcasts.
- a cable plant may utilize frequencies of up to about 1 gigahertz (GHz), which may interfere (if there are RF leaks) with any number of critical radio services in the US, such as local fire departments (154.28 MHz), local and state search and rescue (155.160 MHz), National Guard (163.4875 MHz), the US Air Force (311.00 MHz), and many others.
- GHz gigahertz
- coaxial cable 102 in FIG. 1 is illustrated with an RF leak 104 that is detectable by mobile device 100 .
- RF leak 104 may be caused by damage to coaxial cable 102 .
- Some examples of the types of damage that may occur at coaxial cable 102 include broken tubular outer shields, loose connectors, damaged RF gaskets on housings, etc.
- RF leak 104 generates an RF signal 110 , which corresponds with an RF test signal 106 that is transmitted along coaxial cable 102 .
- RF test signal 106 may be a Continuous Wave (CW) test signal in some embodiments.
- RF test signal 106 may be an 800 megahertz (MHz) CW signal that is injected along coaxial cable 102 to allow mobile device 100 to detect RF leak 104 .
- RF test signal 106 may include pilot signals that are used for automatic gain and slope control of data signals transmitted by coaxial cable 102 .
- RF test signal 106 may also include data signals utilized by a cable plant to provide television and/or data services to customers in some embodiments.
- mobile device 100 includes an antenna 108 that is capable of receiving RF signal 110 that is generated by RF leak 104 .
- Antenna 108 includes any electrical device that is able to convert RF signal 110 into an electrical current and/or voltage.
- Mobile device 100 also includes a quadrature demodulator (QD) 112 , that generates IQ data 114 .
- Quadrature demodulation is sometimes referred to as IQ demodulation, or complex demodulation.
- QD 112 demodulates RF signal 110 , and generates both an in-phase component (I) and a quadrature component (Q) of RF signal 110 relative to a frequency source (not shown) used for demodulation.
- RF test signal 106 is a 800 MHz CW test signal
- the QD 112 may utilize an 800 MHz frequency source to demodulate RF signal 110 and generate IQ data 114 , which would represent changes in the phase and magnitude of RF signal 110 .
- QD 112 in this embodiment includes any electronic device that is able to demodulate RF signal 110 , and to generate both an in-phase and a quadrature component for RF signal 110 .
- IQ data 114 is proved to a controller 116 , which is able to analyze IQ data 114 to enable mobile device 100 to detect information about RF leak 104 .
- controller 116 may be able to analyze IQ data 114 to identify whether mobile device 110 is moving toward or away from RF leak 104 , may be able to analyze IQ data 114 to determine a bearing and/or a location of RF leak 104 , may be able to analyze IQ data 114 to identify frequency shifts in RF signal 110 etc.
- controller 116 may utilize any electronic device that is capable of performing such functionality. While the specific hardware implementation of controller 116 is subject to design choices, one particular embodiment may include one or more processors 118 coupled with a memory 120 .
- Processor 118 includes any electronic device that is able to perform functions.
- Processor 118 may include one or more Central Processing Units (CPU), microprocessors, Digital Signal Processors (DSPs), Application-specific Integrated Circuits (ASICs), etc.
- CPU Central Processing Unit
- DSP Digital Signal Processor
- ASIC Application-specific Integrated Circuits
- processors include Intel® CoreTM processors, ARM® processors, etc.
- Memory 120 includes any electronic device that is able to store data. For instance, memory 120 may store IQ data 114 during processing.
- Memory 120 may include one or more volatile or non-volatile Dynamic Random Access Memory (DRAM) devices, FLASH devices, volatile or non-volatile Static RAM devices, hard drives, Solid State Disks (SSDs), etc.
- DRAM Dynamic Random Access Memory
- SRAM Solid State Disks
- Some examples of non-volatile DRAM and SRAM include battery-backed DRAM and battery-backed SRAM.
- Mobile device 100 in some embodiments includes a display 122 , which allows a user (not shown in FIG. 1 ) to interact visually with mobile device 100 .
- Display 122 includes any electronic device that is capable of displaying information to a user.
- One example of display 122 includes a Liquid Crystal Display (LCD), which may include a touch interface that allows the user to control mobile device 100 .
- LCD Liquid Crystal Display
- RF test signal 106 is transmitted along coaxial cable 102 during the testing process.
- RF test signal 106 may be introduced at a downstream portion of the cable plant relative to coaxial cable 102 , may include pilot or training signals utilized by the cable plant, and/or may include data signals provided by the cable plant to customers.
- FIG. 2 is flow chart of a method 200 for detecting RF leaks emanating from a coaxial cable of a cable plant in an exemplary embodiment.
- Method 200 will be discussed with respect to mobile device 100 , although method 200 may be performed by other systems, not shown.
- the steps of the flow charts described herein may include other steps that are not shown. Also, the steps of the flow charts described herein may be performed in an alternate order.
- Mobile device 100 begins the testing phase of coaxial cable 102 by receiving RF signal 110 at antenna 108 (see step 202 of FIG. 2 ). To do so, a user may carry mobile device 100 proximate to coaxial cable 102 , a user may be driving nearby coaxial cable 102 with mobile device 100 in a vehicle, etc.
- the RF signal 110 is demodulated by QD 112 to generate IQ data 114 , which is provided to processor 118 of controller 116 .
- RF test signal 106 may comprise a CW test signal at a known frequency.
- QD 112 may use a reference source at the known frequency to demodulate RF signal 110 , with IQ data 114 representing the in-phase (I) and quadrature (Q) differences between RF signal 110 and the source.
- RF test signal 106 may comprise a broadband test signal having a pre-determined pattern.
- RF test signal 106 may comprise pre-defined Orthogonal Frequency Division Multiplexed (OFDM) test patterns, such as pilot subcarriers used in Data Over Cable Service Interface Specification (DOSCIS®) used by a customer's cable modem to adapt to changing channel conditions.
- OFDM Orthogonal Frequency Division Multiplexed
- Processor 118 analyzes IQ data 114 , and determines changes in a phase angle of RF signal 110 generated as mobile device 100 is in motion (see step 206 ). For instance, processor 118 may monitor changes in the phase angle as the user carries mobile device 100 along coaxial cable 102 . Changes to the phase angle result from mobile device 100 moving with respect to RF leak 104 . For instance, if RF test signal 106 is an 800 MHz CW signal, then a wavelength of RF signal 110 generated by RF leak 104 is about 37.5 centimeters (cm). As mobile device 100 is moved closer to RF leak 104 , the phase angle of RF signal 110 advances.
- processor 118 would be able to determine that the phase angle of RF signal 110 advances by about (10/37.5)*360 degrees, or about 96 degrees. In like manner, if mobile device 100 is moved 10 cm directly away from RF leak 104 , then processor 118 would be able to determine that the phase angle of RF signal 110 is retarding by about 96 degrees. However, it is not necessary that mobile device 100 be traveling directly toward or away from RF leak 104 in order to identify changes in the phase angle of RF signal 110 .
- processor 118 determines that the phase angle of RF signal 110 is retarding, then processor 118 will identify that mobile device 100 is traveling away from RF leak 104 (see step 208 ). For instance, processor 118 may indicate such on display 122 in some embodiments. If processor 118 determines that the phase angle of RF signal 110 is advancing, then processor 118 will identify that mobile device 100 is traveling towards RF leak 104 (see step 210 ). For instance, processor 118 may indicate such on display 122 in some embodiments.
- mobile device 100 may include a highly stable frequency source.
- mobile device 100 may include a Rubidium-based frequency standard and/or an oscillator locked to a Global Positioning System (GPS) signal, which may be used by QD 112 to demodulate RF signal 110 .
- GPS Global Positioning System
- FIG. 3 is a flow chart of another method 300 of detecting an RF leak emanating from a coaxial cable plant in an exemplary embodiment.
- Method 300 will be discussed with respect to mobile device 100 , although method 300 may be performed by other systems, not shown.
- information about RF leak 104 can be determined by determining phase changes in RF signal 110 when mobile device 100 changes locations and constraining possible bearings to RF leak 104 based on a relationship between changes in the phase angle and the distance between the locations.
- mobile device 100 is located at a first location, which for purposes of discussion is the origin (0,0) of an x-y coordinate system.
- a first location which for purposes of discussion is the origin (0,0) of an x-y coordinate system.
- an angle ⁇ 1 can be computed which will describe a first spatial cone along the x-axis in 3-dimensions.
- An apex angle of the first spatial cone will be twice ⁇ 1 , and will be at the origin.
- ⁇ 1 is calculated based on a relationship between the actual phase change of RF signal 110 between (0,0) and (0+ ⁇ x, 0), and the phase change that would be expected if mobile device 100 was moved directly towards RF leak 104 .
- Processor 118 analyzes IQ data 114 generated at a first location (0,0) to determine a first phase angle of RF signal 110 based on IQ data 114 generated at the first location (see step 302 of FIG. 3 ).
- Mobile device 100 is moved to a second location (0+ ⁇ x, 0), and processor 118 determines a second phase angle of RF signal 110 based on IQ data 114 generated at the second location (see step 304 ).
- the distance between the origin (0,0) and (0+ ⁇ x, 0) can be determined by mobile device 100 (e.g., utilizing an accelerometer, GPS signals, etc.), and used to calculate an expected phase shift in RF signal 110 that would occur if RF leak 104 were located along the x-axis.
- RF test signal 106 is an 800 MHz CW test signal
- the wavelength would be 37.5 cm. Therefore, one would expect that if mobile device 100 was moved 37.5 cm along the x-axis, that a phase rotation between the first phase determined at (0,0) and the second phase determined at (0+ ⁇ x, 0) would be 360 degrees. If the phase difference between (0,0) and (0+ ⁇ x, 0) were instead only 270 degrees, then ⁇ 1 is related to 270/360. In particular, ⁇ 1 may be calculated as the Arc cosine of (270/360), which is 41.4 degrees.
- the apex angle of the first spatial cone is therefore 2 ⁇ 1 , or 82.8 degrees, which is calculated based on the phase difference and the distance between the first location and the second location (see step 306 ).
- a first spatial cone 402 is illustrated in FIG. 4 , which is located at (0,0) and lies along the x-axis.
- the apex angle for first spatial cone 402 is 2 ⁇ 1
- RF leak 104 lies along a surface generated by first spatial cone 402 .
- Fist spatial cone 402 therefore confines possible locations of RF leak 104 to its surface. Similar calculation can be performed along the y-axis to generate a second spatial cone and the z-axis to generate a third spatial cone that further constrains the possible locations of RF leak 104 .
- FIG. 5 is a flow chart of a method 500 of determining a bearing to an RF leak emanating from a coaxial cable of a cable plant in an exemplary embodiment.
- Method 500 will be discussed with respect to mobile device 100 , although method 500 may be performed by other systems, not shown.
- an angle ⁇ 2 can be computed which will describe a second spatial cone along the y-axis in 3-dimensions.
- An apex angle of the second spatial cone will be twice ⁇ 2 , and will be at the origin.
- ⁇ 2 is calculated based on a relationship between the actual phase change of RF signal 110 between (0,0) and (0, 0+ ⁇ y), and the phase change that would be expected if mobile device 100 was moved directly towards RF leak 104 .
- the y-axis is orthogonal to the x-axis, and the second spatial cone further constrains possible locations of RF leak 104 along a surface of the second spatial cone.
- Mobile device 100 is moved to a third location (0, 0+ ⁇ y), and processor 118 determines a third phase angle of RF signal 110 based on of IQ data 114 at the third location (see step 502 ).
- the distance between the origin (0,0) and (0, 0+ ⁇ y) can be determined by mobile device 100 , and used to calculate an expected phase shift in RF signal 110 that would occur if RF leak 104 were located along the y-axis. For instance, if RF test signal 106 is an 800 MHz CW test signal, then the wavelength would be 37.5 cm.
- ⁇ 2 is related to 200/360.
- ⁇ 2 may be calculated as the Arc cosine of (200/360), which is 56.3 degrees.
- the apex angle of the second spatial cone is therefore 2 ⁇ 2 , or 102.6 degrees, which is calculated based on the phase difference and the distance between the first location and the third location (see step 504 ).
- a second spatial cone 602 is illustrated in FIG. 6 .
- the apex angle for second spatial cone 602 is 2 ⁇ 2 .
- processor 118 is able to determine bearings to RF leak 104 that are based on the intersection between first spatial cone 402 and second spatial cone 602 , which occurs along lines 604 - 605 in FIG. 6 .
- a bearing to RF leak 104 will lie on one of lines 604 - 605 .
- Processor 118 may indicate bearings to RF leak 104 on display 122 in some embodiments. If the elevation along a z-axis of RF leak 104 is known, then the elevation may be used to determine which lines 604 - 605 are the correct bearing.
- FIG. 7 illustrates two possible bearings to an RF leak in an exemplary embodiment.
- First spatial cone 402 and second spatial cone 602 have been removed for clarity, leaving behind lines 604 - 605 that represent possible bearings to RF leak 104 .
- an angle ⁇ 3 can be computed which will describe a third spatial cone along the z-axis in 3-dimensions.
- An apex angle of the third spatial cone will be twice ⁇ 3 , and will be at the origin.
- ⁇ 3 is calculated based on a relationship between the actual phase change of RF signal 110 between (0,0,0) and (0,0,0+ ⁇ z), and the phase change that would be expected if mobile device 100 was moved directly towards RF leak 104 .
- the z-axis is orthogonal to both the x-axis and the y-axis, and the third spatial cone further constrains possible locations of RF leak 104 along a surface of the third spatial cone.
- Mobile device 100 is moved to a third location (0,0,0+ ⁇ z), and processor 118 determines a fourth phase angle of RF signal 110 based on IQ data 114 at the third location (see step 506 of FIG. 5 ).
- the distance between the origin (0,0,0) and (0,0,0+ ⁇ z) can be determined by mobile device 100 , and used to calculate an expected phase shift in RF signal 110 that would occur if RF leak 104 were located along the z-axis. For instance, if RF test signal 106 is an 800 MHz CW test signal, then the wavelength would be 37.5 cm.
- ⁇ 3 is related to 250/360.
- ⁇ 3 may be calculated as the Arc cosine of (250/360), which is 46 degrees.
- the apex angle of the third spatial cone is therefore 2 ⁇ 3 , or 92 degrees, which is calculated based on the phase difference and the distance between the first location and the fourth location (see step 508 ).
- a third spatial cone 802 is illustrated in FIG.
- third spatial cone 802 which is located at (0,0,0) and lies along the z-axis.
- the apex angle for third spatial cone 802 is 2 ⁇ 3
- processor 118 determines line 604 is a bearing of RF leak 104 based on an intersection 804 between first spatial cone 402 , second spatial cone 602 , and third spatial cone 802 (see step 510 ).
- Processor 118 may indicate the bearing on display 122 of mobile device 100 in some embodiments.
- FIG. 9 illustrates mobile device 100 in another exemplary embodiment.
- mobile device 100 includes a member 902 that is configured to rotate about an axis 904 .
- antenna 108 is mounted to member 902 at a radius 906 from axis 904 , and rotates about axis 904 as member 902 rotates.
- a phase angle 908 of RF signal 110 advances and retards.
- FIG. 10 is a flow chart of another method 1000 for determining a bearing to an RF leak emanating from a coaxial cable of a cable plant in another exemplary embodiment.
- Processor 118 determines a maximum rate of change (e.g., the first derivative) of phase angle 908 that is generated as antenna 108 rotates about axis 904 (see step 1002 of FIG. 10 ).
- a bearing angle ⁇ b of RF leak 104 can be determined by processor 118 based on a position of antenna 108 at the maximum rate of change as member 902 rotates (see step 1004 ).
- a tangent from the direction of rotation at point B, where the slope of phase 908 is at a maximum, can be determined from ⁇ b . Tangent point A will be 180 degrees opposed.
- a bearing from mobile device 100 to RF leak 104 may be indicated on display 122 by processor 118 in some embodiments.
- mobile device 100 performs an Inverse Fast Fourier Transform (IFFT) on IQ data 114 to generate IFFT data, and attempts to determine if multiple RF leaks are present in coaxial cable 102 .
- FIG. 11 is a flow chart of a method 1100 for determining if multiple RF leaks exist in a coaxial cable of a cable plant in an exemplary embodiment.
- RF test signal 106 is a wideband RF signal. Some other examples of RF test signal 106 include chirps, sin(x)/x waveforms, pseudo-noise sequences, and Zadoff-Chu sequences.
- processor 118 performs an IFFT on samples of IQ data 114 to generate IFFT data (see step 1102 ).
- Processor 118 determines if at least two RF sources are indicated in the IFFT data (see step 1104 ). If only one RF source is indicated, then method 1100 ends. If at least two RF sources are indicated, then processor 118 determines if a phase of each of the RF sources corresponds as mobile device 100 changes locations (see step 1106 ). Even if two RF sources are identified in the IFFT data, one RF source may be a reflection of another RF source. If the phases correspond, then processor determines that only one RF leak exists in coaxial cable 102 (see step 1108 ). However, if the phases do not correspond, then processor 118 determines that at least two RF leaks exist in coaxial cable 102 (see step 1110 ).
- RF test signal 106 may DOCSIS® pilot signals that are typically transmitted by coaxial cable 102 while providing television and/or data services to customers.
- the pilot signals do not carry data, and are utilized to characterize the RF channel in coaxial cable 102 .
- mobile device 100 captures a full set of pilot subcarrier signals at the subcarrier frequencies of the pilot signals, and combines the pilot signals into an OFDM frame.
- Processor 118 is then able to perform an IFFT on IQ data 114 for the OFDM frame, which generates one or more impulse responses.
- the delays of the different impulses will vary from each other as mobile device 100 changes locations. If the delay changes of the individual impulses are tracked as the antenna is moved, each leak can be individually identified and a spatial cone may be created for each leak.
- FIG. 12 is a block diagram of mobile device 100 in another exemplary embodiment.
- mobile device 100 is able to process IQ data 114 while mobile device 100 is in motion, and determine changes in a frequency 1202 of RF signal 110 .
- mobile device 100 may be placed in a vehicle, and driven along a road that is proximate to coaxial cable 102 .
- Changes in frequency 1202 provide information to mobile device 100 regarding whether mobile device 100 is traveling toward RF leak 104 or away from RF leak 104 .
- RF test signal 106 is a test signal at a known frequency.
- FIG. 13 is a flow chart of another method 1300 for detecting RF leaks emanating from a coaxial cable of a cable plant in an exemplary embodiment.
- Processor 118 determines changes in frequency 1202 of RF signal 110 as mobile device 100 is in motion (see step 1302 ). If frequency 1202 of RF signal 110 is higher than the known frequency of RF test signal 106 , then processor 118 identifies that that mobile device 100 is traveling towards RF leak 104 (see step 1304 ). If frequency 1202 of RF signal 110 is lower than the predetermined frequency of RF test signal 106 , then processor 118 identifies that mobile device 100 is traveling away from RF leak 104 (see step 1306 ).
- a distance 1212 between mobile device 100 and RF leak 104 may be estimated in some embodiments based on the rate at which frequency 1202 transitions. For example, using a slope of frequency 1202 in transition region 1204 . The slope may be higher as distance 1212 decreases.
- mobile device 100 is capable identifying a bearing towards RF leak 104 based on a transition region 1204 of frequency 1302 of RF signal 110 .
- frequency 1204 of RF signal 110 changes from being higher than the known frequency of RF test signal 106 to being lower than the known frequency of RF test signal 106 .
- Transition region 1204 can be analyzed by processor 118 to identify a bearing towards RF leak 104 .
- a zero crossing point 1206 allows processor 118 to identify a bearing 1208 to RF leak 104 that may be orthogonal to a direction of travel 1210 of mobile device.
- an intersection of the multiple bearings indicates to mobile device 100 a location of RF leak 104 .
- FIG. 14 is a block diagram of mobile device 100 in another exemplary embodiment.
- mobile device 100 is able to identify a location of RF leak 104 by analyzing an absolute delay between the transmission of RF test signal 106 and the reception of RF signal 110 by mobile device.
- a phase angle 1402 of RF signal 110 decreases to a minimum value at point 1404 , which indicates that antenna 108 of mobile device 100 is proximate to RF leak 104 .
- mobile device 100 is capable of detecting information about RF leaks utilizing multiple spatial cones that are not located at the origin, which is illustrated in FIG. 15 .
- spatial cone 1502 is located along the y-axis
- spatial cone 1504 is located along the x-axis.
- spatial cone 1504 is not located at the origin (0,0) in this embodiment. Rather, spatial cone 1504 is located some distance (d) along the x-axis from the origin, which places a location of RF leak 104 somewhere on a circle that is created when spatial cone 1502 intersects spatial cone 1504 .
- ⁇ 4 and ⁇ 5 are different angles.
- an accurate source clock onboard mobile device 100 may be utilized in order to accurately identify subtle changes in the phase angle and/or the frequency of RF signal 110 .
- One of the challenges in leakage detection is the use of a very stable reference signal source. This may be provided by using a Rubidium-based or Cesium-based frequency standard, which are commercially available.
- Another approach is the use a GPS-referenced clock.
- One option includes the use of two CW RF test signals separated by a fixed frequency, such as 10 MHz.
- Other options include the use of modulation, such as Amplitude Modulation (AM) or Binary Phase Shift Keying (BPSK), or downstream DOCSIS® 3.1 signals which can have a bandwidth nearing 200 MHz.
- AM Amplitude Modulation
- BPSK Binary Phase Shift Keying
- downstream DOCSIS® 3.1 signals which can have a bandwidth nearing 200 MHz.
- the RF signals could be demodulated to derive the clock, which would be used to as a reference for mobile device 100 . If two tones were used, they could be mixed together to produce a lower stable reference.
- the current Ettus B200 Software Defined Radio (SDR) receiver uses a 10 MHz reference.
- the recovered symbol clock or difference frequency can be used to lock-up a phased lock loop (PLL) generating a stable 10 MHz.
- PLL phased lock loop
- Using RF test signals with a built-in reference works even when there is Doppler shift, because the frequency of the modulation is not strongly affected by Doppler. Instead, the center frequency will be affected. Ideally you want the modulated signal, or two CW RF test signals, to be close enough in frequency to have very similar transmission path characteristics.
- One possible range for the recovered clock is 0.1-200 MHz. After recovering a stable clock, either or both tones can be demodulated into IQ data samples.
- the stable clock may also be derived from a data signal, such as a DOCSIS 3.1 OFDM® downstream signal.
- Mobile device 100 may perform Fourier transform such as a Discrete Fourier Transform (DFT) or a FFT on saved IQ data 114 to generate transformed data, which may reveal if multiple RF leaks or reflections are present.
- DFT Discrete Fourier Transform
- the samples are evenly spaced and the numbers of samples is 2 raised to an integer power, and all sample locations taken while antenna 108 is traveling in a straight line.
- the set of samples may be windowed to reduce a characteristic called leakage. After windowing the data set is transformed using a DFT. The data are analyzed and more data is gathered. If, for example a 64 point Fourier transform is being performed, a smoother display can be obtained by replacing some of the older samples with newer samples. Use of a windowing technique before performing a Fourier transform reduces leakage and produces clearer peaks in the transform. This test method may be viewed as a type of synthetic phased array.
- locating and mitigating RF leaks in coaxial cables of a cable plant can be performed more quickly and efficiently. This allows the cable operator of the cable plant to unsure that the RF leakage levels enforced by the FCC are in compliance.
- any of the various elements shown in the figures or described herein may be implemented as hardware, software, firmware, or some combination of these.
- an element may be implemented as dedicated hardware.
- Dedicated hardware elements may be referred to as “processors”, “controllers”, or some similar terminology.
- processors When provided by a processor, the functions may be provided by a single dedicated processor, by a single shared processor, or by a plurality of individual processors, some of which may be shared.
- processor or “controller” should not be construed to refer exclusively to hardware capable of executing software, and may implicitly include, without limitation, digital signal processor (DSP) hardware, a network processor, application specific integrated circuit (ASIC) or other circuitry, field programmable gate array (FPGA), read only memory (ROM) for storing software, random access memory (RAM), non-volatile storage, logic, or some other physical hardware component or module.
- DSP digital signal processor
- ASIC application specific integrated circuit
- FPGA field programmable gate array
- ROM read only memory
- RAM random access memory
- non-volatile storage logic, or some other physical hardware component or module.
- an element may be implemented as instructions executable by a processor or a computer to perform the functions of the element.
- Some examples of instructions are software, program code, and firmware.
- the instructions are operational when executed by the processor to direct the processor to perform the functions of the element.
- the instructions may be stored on storage devices that are readable by the processor. Some examples of the storage devices are digital or solid-state memories, magnetic storage media such as a magnetic disks and magnetic tapes, hard drives, or optically readable digital data storage media.
- FIG. 16 illustrates a computing system 1600 in which a computer readable medium 1606 may provide instructions for performing any of the methods disclosed herein.
- the invention can take the form of a computer program product accessible from the computer readable medium 1606 providing program code for use by or in connection with a computer or any instruction execution system.
- the computer readable medium 1606 can be any apparatus that can tangibly store the program for use by or in connection with the instruction execution system, apparatus, or device, including the computer system 1600 .
- the medium 1606 can be any tangible electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device).
- Examples of a computer readable medium 1606 include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk.
- Some examples of optical disks include compact disk-read only memory (CD-ROM), compact disk-read/write (CD-R/W) and DVD.
- the computing system 1600 can include one or more processors 1602 coupled directly or indirectly to memory 1608 through a system bus 1610 .
- the memory 1608 can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code is retrieved from bulk storage during execution.
- I/O devices 1604 can be coupled to the system either directly or through intervening I/O controllers.
- Network adapters may also be coupled to the system to enable the computing system 1600 to become coupled to other data processing systems, such as through host systems interfaces 1612 , or remote printers or storage devices through intervening private or public networks. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.
- FIG. 17 is a diagram 1700 illustratively representing a cable 1704 within a cable plant that has damage to the cable's shield, which causes it to act as a stationary leakage antenna 1710 .
- damage is common in cable plants and may be caused by, for example, corrosion, stress fractures, animal chews, technician error, and construction vehicle error.
- the cable 1704 transports a leakage test signal 1702 , and example of which is a stable continuous wave (CW) carrier or other deterministic signal, such as a DOCSIS 3.1 signal with pilots.
- the leakage test signal radiates to a mobile test antenna 1706 which is connected to a complex demodulator mobile receiver 1708 , at a first antenna location 1716 .
- the complex demodulator 1708 produces an in-phase (I) and quadrature (Q) signal sample for each of ‘N’ incremental steps 1711 over a synthetic phased array (SPA) distance 1712 as the receive antenna 1706 moves.
- SPA phased array
- incremental steps 1711 are separated by 15 cm and the number of incremental steps ‘N’ is an integer value such as 8 (as shown in FIG. 17 ) or 128, or may be, for example, 2 raised to some integer exponent.
- the samples are each processed by a well-known discrete inverse Fourier transform, the output of which is a set of Doppler frequencies.
- the mobile receive antenna 1706 were moving directly towards a leakage antenna 1710 at a velocity of 40 meter/sec and the CW test signal frequency is 900 MHz.
- the Doppler frequency can then be computed as 40/0.333 or 120 Hz.
- the Doppler frequency is a lower value, such as 80 Hz (at the 40 meter/sec antenna velocity)
- the mobile receive antenna 1706 is not moving directly towards the leakage antenna 1710 , but moving at an angle to the leakage antenna 1710 .
- Test antenna 1706 they moves to a second antenna location 1718 separated by a distance 1722 at which point second set of I-Q samples is generated.
- the second set of I-Q samples is then processed by a Fourier transform and, as described above for the first set of I-Q samples, a second bearing angle 1720 is produced using known methods.
- the intersection point of bearing angle 1714 from antenna location 1716 and bearing angle 1720 from antenna location 1722 shows the location of the leakage antenna 1710 .
- mobile receiver 1708 is a software defined radio (SDR) such as Ettus Model B210 connected to a computing device, such as a portable computer, Raspberry Pi, O-Droid computing device, or similar device.
- SDR software defined radio
- mobile receive antenna 1706 is an L-com monopole with omnidirectional antenna pattern, or similar.
- a Rubidium test standard may be employed.
- a Frequency Electronics Model 5680A may be used in both stationary and mobile locations.
- a GPS (global positioning system) disciplined oscillator such as offered by Trimble Navigation, may be employed for the stable frequency references.
- One complication can occur when mobile receive antenna 1706 travels in a straight line such that ambiguity is created regrading which side of the road a leakage signal is on, that is, the intersections of bearing angles 1714 , 1720 produced by the Acos function create a real location and a false location of leakage signal 1710 .
- the bearing angle is actually half of the apex angle of a solid three dimensional cone, where the apex of the cone is antenna location 1716 or antenna location 1718 .
- a three dimensional cone will intersect the ground along two lines, and the false line needs to be eliminated.
- the intersection points will converge in the correct direction and diverge in the false direction.
- a second mobile receive antenna (not shown but similar to the second mobile receive antenna 1806 B in FIG. 18 ) is locate proximate to the first mobile receive antenna 1706 and connected to another second mobile receiver.
- the mobile receive antenna may be placed alongside mobile receive antenna 1706 at, for example, a separation distance of 1-1.5 meters.
- the relative phase shifts between the mobile receivers 1708 and the second mobile receiver reveals the direction of a leakage source. That is, the leakage source will be on the side that experiences a higher Doppler frequency as the leakage antenna 1710 is passed.
- two antennas are connected to a switch, such as an electronic double pole switch, that multiplexes or alternatively connects the two antennas to a single receiver, such that only a single receive is required thereby reducing cost of implementation.
- a computer that receives data from the SDR (discussed above) may control the switch between the two antennas.
- the measurement points can be made at the same horizontal location as shown in FIG. 17 . This could be done for cost reduction, power reduction, or weight reduction such as may be beneficial in an airborne, terrestrial, or cable “walking” drone implementation.
- a GPS data logger receiver for recording antenna position as measurements are made such that data point may be geographically located.
- PGS data logger received is a Columbus model V-800. From the GPS data the latitude, longitude values of leakage antennas, such as leakage antenna 1710 is located and recorded. It is also useful to record the strength of the leakage signal as well as the drive path that the mobile receive antenna 1706 took, date, and time.
- CW carrier test signal with a SPA provides for extreme sensitivity due to the narrow receiver noise bandwidth, and the processing gain and directional properties of the SPA.
- the embodiment described in FIG. 17 may be utilized in multiple ways. It can be carried by a human or placed on a cart, where an accelerometer may cooperate with the system to provide uniform I-Q samples.
- the present system and method may also be mounted on a vehicle, examples of which include by are not limited to a cable service vehicle, a taxi, or a delivery vehicle.
- the embodiment can be flown by a manned aircraft or drone.
- geometry considerations vary relative to ground testing. For example, when driving the 3-D cone intersects with the ground along a “V” shape. However, when flying the ground (containing the leakage antenna) intersects slices the 3-D cone along a hyperbola, assuming level flight. So geometric leakage calculations are made in three dimensions or four dimensions when time is included.
- Testing can be automatic, where a driver of a vehicle is not aware test data is being gathered.
- the collected leakage data can be uploaded over a wireless link, for example, when the vehicle is parked near a wireless data receiving unit.
- the data obtained by leakage detection can be manually or automatically placed into a data base and processed.
- processing may focus on proactive network maintenance, troubleshooting interference with wireless services, or tracking new leaks or leaks that vary with time and weather.
- the antenna 1706 can be changed out for a new frequency antenna or a multiband antenna can be used. Alternately, an antenna may be used at a non-specified frequency and a correction factor can be applied to the recorded data.
- FIG. 18 shows environment 1800 with the antenna system similar to that of FIG. 17 configured on a truck.
- the antenna reciprocity theorem states that the transmit and receive properties of associated antennas are identical. Hence, it is also possible to transmit from one or more moving antennas and receive at the leakage antenna.
- a mobile transmit antenna 1806 is mounted on a vehicle 1814 , traveling down a road 1822 , and emitting a test signal 1802 .
- the test signal 1802 is received by a receive leakage antenna 1810 created by a shield break 1824 .
- Test signal 1802 which may be a CW carrier, is generated by a moving test signal transmitter 1818 .
- the received test signal is received at leakage antenna 1820 and propagates through cable line 1804 to a stationary receiver 1826 .
- the stationary receiver 1826 may be at a fiber node, a hub site, a headend, in a home, or placed in the system for the present testing procedure.
- Doppler shift information is collected at stationary receiver 1826 , similar to the moving receiver embodiment, discussed above.
- a position transmitting antenna 1812 may optionally be configured with vehicle 1814 such that it travels with moving transmit antennas 1806 , 1806 B.
- Antenna 1812 functions to send a position carrier 1816 with the latitude, longitude, and velocity of the vehicle 1814 to a position receiver, not shown.
- leakage antenna 1810 also receives the position carrier 1816 . If nearby frequency band to the test signal's frequency is utilized for the position carrier 1816 , a common single antenna may be used for both test signal 1802 and position carrier 1816 by combining the transmitted signals before connecting them to the common single antenna.
- the present transmit system which utilizes a single test signal 1802 from a single mobile transmit antenna 1806 , has a similar left-right ambiguity problem as the embodiment discussed in FIG. 17 .
- This problem can be similarly resolved by locating a second mobile transmit antenna 1806 B on vehicle 1814 proximate to antenna 1806 .
- Test signal 1802 can be switched between transmitting antennas 206 and 206 B rapidly by switch 220 .
- the stationary receiver would synchronously switch output streams, recovering interleaved I-Q samples from both antennas at different times.
- FIG. 19 is plot diagram 1900 that illustrates two Doppler shift vs. distance plots. It will be understood that the distance axis of plot diagram 1900 may be adapted to time if velocity is uniform over a given span. FIG. 19 is discussed in relationship to FIG. 18 and should be read as such.
- a first plot 1902 is produced from mobile transmitting antenna 1806 when it is at a first closer distance from shield break 1824 .
- a second plot 1904 is produced from mobile transmitting antenna 1806 B when it is at a second farther distance from shield break 1824 .
- a switch may be utilized to change between transmit antennas 1806 , 1806 B every 15 cm such that the SPA distances for each antenna 112 overlap.
- the antenna closer to leakage antenna 1810 (antenna 1806 in FIG. 18 ) has an increased Doppler frequency change relative to the antenna farther away (antenna 1806 B in FIG. 18 ) due to faster rotation of phase. This feature makes it possible to eliminate the false leak image. Note that when the antenna's bearing angles are 90 degrees the plots will cross.
- the present system and method may provide additional information to stationary receiver 1826 to instruct it as to which antenna's signal is currently being received.
- antenna 1806 may be configured to transmit slightly longer than antenna 1806 B by varying the duty cycle of switch 212 from 50-50 to 55-45.
- the distance point of plot 1900 where the Doppler frequency goes through zero (hereinafter, zero point 1906 ) represents where the shield break is at right angles to the travel path of the antennas 1806 , 1806 B. Note that when the leakage antenna is far away from the antenna, the Doppler frequency approaches +F 1908 or ⁇ F 1910 , which can be calculated from the wavelength and antenna velocity.
- test signals travel at almost the speed of light, but the antenna velocity is much, much lower.
- the antenna velocity is used for Doppler frequency calculations. If a test antenna is driving at 40 meters per second, and the antenna acquires I-Q data point every 15 cm then the capture rate is one sample every 3.75 ms. Assuming a leak antenna, such as leakage antenna 1810 , is 100 meters away from the mobile antenna, such as antenna 1806 , 1806 B, then the signal transit time between then is approximately 0.000333 ms, which can be considered virtually instantaneous.
- sampling rates can be sped up as antenna velocity increases. Testing can even be done semi-statically if desired. That is, an I-Q measurement is made, the antenna is moved 15 cm and another I-Q measurement is made, which continues until enough samples are captured to perform a Fourier transform and make a SPA.
- FIG. 20 is a diagram 2000 that illustrates a hand holdable antenna 2004 with one or more accelerometers 2006 in a base 2007 , and a receiver/computing/display device 2008 .
- the embodiment of FIG. 20 is primarily intended for indoor leakage antenna location, as may be utilized inside a home or apartment building, although it also functional outdoors.
- received signal values are sent to receiver 2008 and accelerometer voltage samples, from accelerometer(s) 2006 are simultaneously sent to receiver 2008 over cable 2010 .
- the three X, Y, and Z axes 2012 of antenna 2004 are located by computation elements within receiver 2008 utilizing the accelerometer data and received data.
- the I-Q field strength values are recorded, along with the position of the antenna. This process may be repeated in the X-Y plane and in the Y-Z planes, forming a three dimensional (3-D) field strength map. From the field strength map the direction to the leakage antenna(s) may be determined. Indoor locations are frequently more difficult to analyze than outdoor applications because the leakage signal suffers multipath distortion, as well as diffraction.
- Another motion pattern that the technician can use for antenna 2004 is a straight line in each of the X, Y, and Z axes. Processing can be done as discussed in the parent (allowed) application.
- Yet another motion pattern that the technician can use is a zig-zag pattern where a two dimensional plane of (relatively) evenly-spaced samples are captured. Samples are captured while antenna is moved left-to-right while holding the forward position steady. Next, the antenna is advanced and moved right-to-left to get another set of samples. This is repeated until a test area is covered. This set of samples may be transformed with a 2-dimension IFFT to reveal the direction to a leakage signal. Likewise this technique can be used in 3-dimensions. While a computer-controlled actuator can give more accurate sample spacing relative to a human moving the antenna, the errors produced by a human moving the antenna can be reduced by interpolation.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Signal Processing (AREA)
- Electromagnetism (AREA)
- Quality & Reliability (AREA)
- Examining Or Testing Airtightness (AREA)
- Monitoring And Testing Of Transmission In General (AREA)
Abstract
Embodiments provided describe detections of RF leakage test signal emanating from cable plant. In one embodiment a single mobile receive antenna, connected to a complex demodulator mobile receiver, receives a stabilized test signal radiating from the cable plant. The test signal may be a known continuous wave (CW) carrier or other deterministic signal. The received test signal varies in phase as a function of a position of the mobile receive antenna relative to the location of a leakage antenna. The phase variance forms a Doppler shift as the test antenna moves relative to the leakage antenna. The receiver generates multiple in-phase (I) and quadrature (Q) test signal samples over a SPA (synthetic phased array) distance as the test antenna's travels, and the samples are inserted into a Fourier transform. The result of the transform is instantaneous Doppler frequency shift, from which a bearing angle can be computed.
Description
- The present application is a continuation of U.S. application Ser. No. 15/276,263 (filed Sep. 26, 2016) entitled “RADIO FREQUENCY LEAKAGE DETECTION IN A CABLE PLANT,” which application is a continuation in part of U.S. application Ser. No. 14/812,916 (filed Jul. 29, 2015) entitled “RADIO FREQUENCY LEAKAGE DETECTION IN A CABLE PLANT,” which application claims priority to, and thus the benefit of, an earlier filing date from, U.S. Provisional Patent Application No. 62/030,345 (filed Jul. 29, 2014) entitled “LOCATING/IDENTIFYING CABLE PLANT ISSUES”, U.S. Provisional Patent Application No. 62/054,529 (filed Sep. 24, 2014) entitled “VARIOUS COMMUNICATION SYSTEMS AND METHODS”, and U.S. Provisional Patent Application No. 62/146,848 (filed on Apr. 13, 2015) entitled “SIGNAL LEAKAGE DETECTION USING SYNTHETIC PHASED ARRAYS”, all of which are hereby incorporated by reference.
- This disclosure relates to the field of Radio Frequency (RF) signal detection, and in particular, to detecting RF leaks from a cable plant of a cable system operator.
- Cable system operators use Radio Frequency (RF) signals transmitted over coaxial cables to provide television and data services to customers. Normally these RF signals do not cause interference when in compliance with Federal Communication Commission (FCC) rules that limit interference. However, in some cases the RF signals can leak. Cable signal leaks occur when the RF signals transmitted within the cable system are not contained within the cable plant. Cable signal leaks may be caused by loose connectors, damaged cables, unshielded housings, or unterminated cables.
- A cable plant uses many of the same frequencies to transmit programming as licensed to over-the-air broadcasters. Cable operators are considered by the FCC to be secondary users of these frequencies, so they are precluded from interfering with licensed users who are the primary users of these frequencies.
- Cable signal leakage can interfere with the over-the-air services that are using the same frequencies as the cable plant near the vicinity of an RF leak. This can interfere with ham radio operators, cellular radio, emergency responders, and aircraft navigation systems. When interference from the cable plant occurs, it can hamper or endanger others.
- The FCC has set maximum individual signal leakage levels for cable systems. The FCC is stricter with signal leakage levels for cable systems that interfere with aeronautical and/or navigation communications. Therefore, the FCC requires cable operators to have a periodic, on-going program to inspect, locate, and repair RF leaks in their cable plants. However, locating RF leaks in a cable plant can be difficult and time consuming, due to the complexity and size of a typical cable plant.
- Cable system operator use Radio Frequency (RF) signals transmitted over coaxial cables to provide television and data services to customers. Normally these RF signals do not cause interference when the shielding integrity is good, but sometime damage occurs. Damage may be caused by corrosion, animal chews, craft error, or mechanical stress. When there is damage to cable shielding, cable signals may leak out causing interference with wireless services. Many of the RF frequencies used inside the coaxial cable are the same frequencies used for a variety of wireless communication services, such as aviation signals, Ham radio signals, broadcast signals and wireless LTE (long term evolution) 2-way communications. Additionally, when there is shield damage allowing signal egress, it may be accompanied by signal ingress, where cable services are negatively affected by wireless signals or electrical noise. The FCC has published leakage limits for field strength. One limitation with legacy leakage detection equipment is that when a distance between the leakage signal's source and a receiving antenna is not known, it is not possible to calculate if the field strength exceeds FCC limits at a test distance, which may be at 3 meters or 30 meters. Thus, there is a need to know measurement distance to calculate if a detected leak exceeds FCC limits.
- Embodiments described herein provide for the detection of RF leaks in a coaxial cable of a cable plant utilizing various analytical techniques that are applied to the RF signals emitted from the RF leaks. These analytical techniques provide information about an RF leak that reduces the amount of effort and time that may be required to locate the RF leak in the cable plant.
- One embodiment comprises a mobile device that is configured to detect RF leaks emanating from a coaxial cable of a cable plant. The mobile device includes an antenna that is configured to receive an RF signal from an RF leak in the coaxial cable. The mobile device further includes a quadrature demodulator that is configured to demodulate the RF signal to generate In-phase and Quadrature (IQ) data, and a controller. The controller is configured to determine changes in a phase angle of the RF signal based on the IQ data generated as the mobile device is in motion. The controller is further configured to identify that the mobile device is travelling toward the RF leak responsive to determining that the phase angle is advancing, and to identify that the mobile device is travelling away from the RF leak responsive to determining that the phase angle is retarding.
- Another embodiment comprises a method for detecting RF leaks emanating from a coaxial cable of a cable plant. The method comprises receiving, by an antenna of a mobile device, an RF signal from an RF leak in the coaxial cable. The method further comprises demodulating the RF signal to generate IQ data, and determining changes in a phase angle of the RF signal based on the IQ data generated as the mobile device is in motion. The method further comprises identifying that the mobile device is travelling towards the RF leak responsive to determining that the phase angle is advancing, and identifying that the mobile device is travelling away from the RF leak responsive to determining that the phase angle is retarding.
- Another embodiment is a non-transitory computer readable medium embodying programmed instructions which, when executed by a processor of a mobile device, detects RF leaks emanating from a coaxial cable of a cable plant. The instructions direct the processor to receive, by an antenna of the mobile device, an RF signal from an RF leak in the coaxial cable. The instructions further direct the processor to demodulate the RF signal to generate IQ data, and to determine changes in a phase angle of the RF signal based on the IQ data generated as the mobile device is in motion. The instructions further direct the processor to identify that the mobile device is traveling towards the RF leak responsive to determining that the phase angle is advancing. The instructions further direct the processor to identify that the mobile device is traveling away from the RF leak responsive to determining that the phase angle is retarding.
- The above summary provides a basic understanding of some aspects of the specification. This summary is not an extensive overview of the specification. It is intended to neither identify key or critical elements of the specification nor delineate any scope particular embodiments of the specification, or any scope of the claims. Its sole purpose is to present some concepts of the specification in a simplified form as a prelude to the more detailed description that is presented later.
- Embodiments described herein provide for the detection of RF leaks in coaxial network utilizing various analytical techniques that are applied to RF signals emitted from the RF leaks, or probing RF signals applied to the coaxial network to discover shielding defects. These analytical techniques provide information about shielding defects that reduce the amount on time and effort that may be required to locate and repair the shielding defect.
- In one embodiment a mobile test antenna receives a leakage test signal radiated from a leakage antenna created by a shield break in the cable plant. The antenna is connected to a mobile receiver with a complex demodulator producing in-phase (I) and quadrature (Q) samples periodically. I-Q samples, which contain information about the magnitude and phase of one or more leakage antennas, are inserted into a Fourier transform, which produce Doppler frequency components for each leakage antenna. The Doppler frequency components may each be processed with an arc cosine function to reveal bearing angles to each leakage antenna, as well as strength of the leakage signal. After the mobile antenna moves a distance, the intersection of another bearing angle with the first bearing angle reveals the position of the leaks.
- In another embodiment another embodiment a second mobile test antenna is used to resolve whether the leak is on the left or right side of the drive path.
- In another embodiment, a mobile transmit antenna, connected to a mobile test signal transmitter, transmits a leakage signal which is received by a leakage antenna and relayed over cable line to a stationary receiver. The position of the mobile transmit antenna during the test may be sent wirelessly to a stationary receiver, so the latitude and longitude of the leakage antennas can be determined.
- In another embodiment a second mobile transmitting antenna is used to resolve left-right ambiguity.
- In another embodiment a single antenna with a position reporting capability is moved by a technician, and I-Q field strength is recorded along with position as the antenna is moved. The result is a spatial map of electromagnetic field in a space that is analyzed for the leakage source.
- Some embodiments are now described, by way of example only, and with reference to the accompanying drawings. The same reference number represents the same element or the same type of element on all drawings.
-
FIG. 1 is a block diagram of a mobile device that detects RF leaks emanating from a coaxial cable of a cable plant in an exemplary embodiment. -
FIG. 2 is flow chart of a method for detecting RF leaks emanating from a coaxial cable of a cable plant in an exemplary embodiment. -
FIG. 3 is a flow chart of another method for detecting an RF leak emanating from a coaxial cable plant in an exemplary embodiment. -
FIG. 4 illustrates a first spatial cone along an x-axis in an exemplary embodiment. -
FIG. 5 is a flow chart of a method of determining a bearing to an RF leak emanating from a coaxial cable of a cable plant in an exemplary embodiment. -
FIG. 6 illustrates a second spatial cone along a y-axis in an exemplary embodiment. -
FIG. 7 illustrates two possible bearings to an RF leak in an exemplary embodiment. -
FIG. 8 illustrates a third spatial cone along a z-axis in an exemplary embodiment. -
FIG. 9 illustrates the mobile device ofFIG. 1 in another exemplary embodiment. -
FIG. 10 is a flow chart of another method for determining a bearing to an RF leak emanating from a coaxial cable of a cable plant in an exemplary embodiment. -
FIG. 11 is a flow chart of a method for determining if multiple RF leaks exist in a coaxial cable of a cable plant in an exemplary embodiment. -
FIG. 12 is a block diagram of the mobile device ofFIG. 1 in another exemplary embodiment. -
FIG. 13 is a flow chart of another method for detecting RF leaks emanating from a coaxial cable of a cable plant in an exemplary embodiment. -
FIG. 14 is a block diagram of the mobile device ofFIG. 1 in another exemplary embodiment. -
FIG. 15 illustrates spatial cones that are not located at the origin in an exemplary embodiment. -
FIG. 16 is a block diagram of an exemplary computing system in which a computer readable medium provides instructions for performing the methods described herein. -
FIG. 17 illustratively represents a system utilizing a single receive antenna for locating leakage antennas, in an embodiment. -
FIG. 18 illustratively represents a system utilizing a two transmit antennas for locating leakage antennas, in an embodiment. -
FIG. 19 is a diagram showing two Doppler frequency vs. distance plots to determine if leak is on the left or right, in an embodiment. -
FIG. 20 illustratively represents moving an antenna in a space to determine from the mapped electromagnetic field in that space where leakage antennas are located, in an embodiment. - The figures and the following description illustrate specific exemplary embodiments. It will thus be appreciated that those skilled in the art will be able to devise various arrangements that, although not explicitly described or shown herein, embody the principles of the embodiments and are included within the scope of the embodiments. Furthermore, any examples described herein are intended to aid in understanding the principles of the embodiments, and are to be construed as being without limitation to such specifically recited examples and conditions. As a result, the inventive concept(s) is not limited to the specific embodiments or examples described below, but by the claims and their equivalents.
-
FIG. 1 is a block diagram of amobile device 100 that detects RF leaks emanating from a coaxial cable of a cable plant in an exemplary embodiment. For purposes of discussion, acoaxial cable 102 is illustrated inFIG. 1 that is part of a cable plant.Coaxial cable 102 includes an inner conductor (not shown) that is surrounded by a tubular insulation layer (not shown). The tubular insulation layer is surrounded by a tubular outer shield (not shown). - In this embodiment,
coaxial cable 102 is utilized by a cable operator to distribute television and/or data services to customers. Cable operators typically transmit using some of the same frequencies over coaxial cables (e.g., coaxial cable 102) that are licensed for over-the-air broadcasts. For instance, a cable plant may utilize frequencies of up to about 1 gigahertz (GHz), which may interfere (if there are RF leaks) with any number of critical radio services in the US, such as local fire departments (154.28 MHz), local and state search and rescue (155.160 MHz), National Guard (163.4875 MHz), the US Air Force (311.00 MHz), and many others. - To prevent the cable plant from interfering with licensed spectrum, the FCC requires that cable operators routinely inspect their cable plants to determine if any RF leaks are present. For purposes of discussion,
coaxial cable 102 inFIG. 1 is illustrated with anRF leak 104 that is detectable bymobile device 100. -
RF leak 104 may be caused by damage tocoaxial cable 102. Some examples of the types of damage that may occur atcoaxial cable 102 include broken tubular outer shields, loose connectors, damaged RF gaskets on housings, etc. In thisembodiment RF leak 104 generates anRF signal 110, which corresponds with anRF test signal 106 that is transmitted alongcoaxial cable 102.RF test signal 106 may be a Continuous Wave (CW) test signal in some embodiments. For instance,RF test signal 106 may be an 800 megahertz (MHz) CW signal that is injected alongcoaxial cable 102 to allowmobile device 100 to detectRF leak 104. However, 800 MHz is just one possible frequency that may be transmitted alongcoaxial cable 102, with other options being any frequency that may be supported by the bandwidth ofcoaxial cable 102. In some embodiments,RF test signal 106 may include pilot signals that are used for automatic gain and slope control of data signals transmitted bycoaxial cable 102.RF test signal 106 may also include data signals utilized by a cable plant to provide television and/or data services to customers in some embodiments. - In this embodiment,
mobile device 100 includes anantenna 108 that is capable of receiving RF signal 110 that is generated byRF leak 104.Antenna 108 includes any electrical device that is able to convert RF signal 110 into an electrical current and/or voltage.Mobile device 100 also includes a quadrature demodulator (QD) 112, that generatesIQ data 114. Quadrature demodulation is sometimes referred to as IQ demodulation, or complex demodulation.QD 112 demodulatesRF signal 110, and generates both an in-phase component (I) and a quadrature component (Q) of RF signal 110 relative to a frequency source (not shown) used for demodulation. For instance, ifRF test signal 106 is a 800 MHz CW test signal, then theQD 112 may utilize an 800 MHz frequency source to demodulate RF signal 110 and generateIQ data 114, which would represent changes in the phase and magnitude ofRF signal 110.QD 112 in this embodiment includes any electronic device that is able to demodulate RF signal 110, and to generate both an in-phase and a quadrature component forRF signal 110. -
IQ data 114 is proved to acontroller 116, which is able to analyzeIQ data 114 to enablemobile device 100 to detect information aboutRF leak 104. For instance,controller 116 may be able to analyzeIQ data 114 to identify whethermobile device 110 is moving toward or away fromRF leak 104, may be able to analyzeIQ data 114 to determine a bearing and/or a location ofRF leak 104, may be able to analyzeIQ data 114 to identify frequency shifts in RF signal 110 etc. To do so,controller 116 may utilize any electronic device that is capable of performing such functionality. While the specific hardware implementation ofcontroller 116 is subject to design choices, one particular embodiment may include one ormore processors 118 coupled with amemory 120.Processor 118 includes any electronic device that is able to perform functions.Processor 118 may include one or more Central Processing Units (CPU), microprocessors, Digital Signal Processors (DSPs), Application-specific Integrated Circuits (ASICs), etc. Some examples of processors include Intel® Core™ processors, ARM® processors, etc. -
Memory 120 includes any electronic device that is able to store data. For instance,memory 120 may storeIQ data 114 during processing.Memory 120 may include one or more volatile or non-volatile Dynamic Random Access Memory (DRAM) devices, FLASH devices, volatile or non-volatile Static RAM devices, hard drives, Solid State Disks (SSDs), etc. Some examples of non-volatile DRAM and SRAM include battery-backed DRAM and battery-backed SRAM. -
Mobile device 100 in some embodiments includes adisplay 122, which allows a user (not shown inFIG. 1 ) to interact visually withmobile device 100.Display 122 includes any electronic device that is capable of displaying information to a user. One example ofdisplay 122 includes a Liquid Crystal Display (LCD), which may include a touch interface that allows the user to controlmobile device 100. - Consider that a user is in the field with
mobile device 100, and is attempting to locateRF leak 104 incoaxial cable 102.RF test signal 106 is transmitted alongcoaxial cable 102 during the testing process.RF test signal 106 may be introduced at a downstream portion of the cable plant relative tocoaxial cable 102, may include pilot or training signals utilized by the cable plant, and/or may include data signals provided by the cable plant to customers. -
FIG. 2 is flow chart of amethod 200 for detecting RF leaks emanating from a coaxial cable of a cable plant in an exemplary embodiment.Method 200 will be discussed with respect tomobile device 100, althoughmethod 200 may be performed by other systems, not shown. The steps of the flow charts described herein may include other steps that are not shown. Also, the steps of the flow charts described herein may be performed in an alternate order. -
Mobile device 100 begins the testing phase ofcoaxial cable 102 by receiving RF signal 110 at antenna 108 (seestep 202 ofFIG. 2 ). To do so, a user may carrymobile device 100 proximate tocoaxial cable 102, a user may be driving nearbycoaxial cable 102 withmobile device 100 in a vehicle, etc. TheRF signal 110 is demodulated byQD 112 to generateIQ data 114, which is provided toprocessor 118 ofcontroller 116. In some embodiments,RF test signal 106 may comprise a CW test signal at a known frequency. In this case,QD 112 may use a reference source at the known frequency to demodulate RF signal 110, withIQ data 114 representing the in-phase (I) and quadrature (Q) differences between RF signal 110 and the source. In other embodiments,RF test signal 106 may comprise a broadband test signal having a pre-determined pattern. For instance,RF test signal 106 may comprise pre-defined Orthogonal Frequency Division Multiplexed (OFDM) test patterns, such as pilot subcarriers used in Data Over Cable Service Interface Specification (DOSCIS®) used by a customer's cable modem to adapt to changing channel conditions. -
Processor 118 analyzesIQ data 114, and determines changes in a phase angle ofRF signal 110 generated asmobile device 100 is in motion (see step 206). For instance,processor 118 may monitor changes in the phase angle as the user carriesmobile device 100 alongcoaxial cable 102. Changes to the phase angle result frommobile device 100 moving with respect toRF leak 104. For instance, ifRF test signal 106 is an 800 MHz CW signal, then a wavelength ofRF signal 110 generated byRF leak 104 is about 37.5 centimeters (cm). Asmobile device 100 is moved closer toRF leak 104, the phase angle of RF signal 110 advances. For example, ifmobile device 100 is moved 10 cm directly towardsRF leak 104, thenprocessor 118 would be able to determine that the phase angle of RF signal 110 advances by about (10/37.5)*360 degrees, or about 96 degrees. In like manner, ifmobile device 100 is moved 10 cm directly away fromRF leak 104, thenprocessor 118 would be able to determine that the phase angle ofRF signal 110 is retarding by about 96 degrees. However, it is not necessary thatmobile device 100 be traveling directly toward or away fromRF leak 104 in order to identify changes in the phase angle ofRF signal 110. - If
processor 118 determines that the phase angle ofRF signal 110 is retarding, thenprocessor 118 will identify thatmobile device 100 is traveling away from RF leak 104 (see step 208). For instance,processor 118 may indicate such ondisplay 122 in some embodiments. Ifprocessor 118 determines that the phase angle ofRF signal 110 is advancing, thenprocessor 118 will identify thatmobile device 100 is traveling towards RF leak 104 (see step 210). For instance,processor 118 may indicate such ondisplay 122 in some embodiments. - Accurately identifying small changes in the phase angle of
RF signal 110 may depend upon a number of factors, including the stability of the frequency ofRF test signal 106, the stability of the source frequency used byQD 112 to demodulate RF signal 110, etc. Therefore,mobile device 100 may include a highly stable frequency source. For instance,mobile device 100 may include a Rubidium-based frequency standard and/or an oscillator locked to a Global Positioning System (GPS) signal, which may be used byQD 112 to demodulateRF signal 110. -
FIG. 3 is a flow chart of anothermethod 300 of detecting an RF leak emanating from a coaxial cable plant in an exemplary embodiment.Method 300 will be discussed with respect tomobile device 100, althoughmethod 300 may be performed by other systems, not shown. In this embodiment, information aboutRF leak 104 can be determined by determining phase changes inRF signal 110 whenmobile device 100 changes locations and constraining possible bearings to RF leak 104 based on a relationship between changes in the phase angle and the distance between the locations. - Consider that
mobile device 100 is located at a first location, which for purposes of discussion is the origin (0,0) of an x-y coordinate system. Starting at the origin, ifmobile device 100 is moved along the x-axis a small incremental amount Δx, then an angle θ1 can be computed which will describe a first spatial cone along the x-axis in 3-dimensions. An apex angle of the first spatial cone will be twice θ1, and will be at the origin. θ1 is calculated based on a relationship between the actual phase change of RF signal 110 between (0,0) and (0+Δx, 0), and the phase change that would be expected ifmobile device 100 was moved directly towardsRF leak 104. -
Processor 118 analyzesIQ data 114 generated at a first location (0,0) to determine a first phase angle of RF signal 110 based onIQ data 114 generated at the first location (seestep 302 ofFIG. 3 ).Mobile device 100 is moved to a second location (0+Δx, 0), andprocessor 118 determines a second phase angle of RF signal 110 based onIQ data 114 generated at the second location (see step 304). The distance between the origin (0,0) and (0+Δx, 0) can be determined by mobile device 100 (e.g., utilizing an accelerometer, GPS signals, etc.), and used to calculate an expected phase shift in RF signal 110 that would occur if RF leak 104 were located along the x-axis. For instance, ifRF test signal 106 is an 800 MHz CW test signal, then the wavelength would be 37.5 cm. Therefore, one would expect that ifmobile device 100 was moved 37.5 cm along the x-axis, that a phase rotation between the first phase determined at (0,0) and the second phase determined at (0+Δx, 0) would be 360 degrees. If the phase difference between (0,0) and (0+Δx, 0) were instead only 270 degrees, then θ1 is related to 270/360. In particular, θ1 may be calculated as the Arc cosine of (270/360), which is 41.4 degrees. The apex angle of the first spatial cone is therefore 2 θ1, or 82.8 degrees, which is calculated based on the phase difference and the distance between the first location and the second location (see step 306). A firstspatial cone 402 is illustrated inFIG. 4 , which is located at (0,0) and lies along the x-axis. The apex angle for firstspatial cone 402 is 2 θ1, andRF leak 104 lies along a surface generated by firstspatial cone 402. Fistspatial cone 402 therefore confines possible locations ofRF leak 104 to its surface. Similar calculation can be performed along the y-axis to generate a second spatial cone and the z-axis to generate a third spatial cone that further constrains the possible locations ofRF leak 104. -
FIG. 5 is a flow chart of amethod 500 of determining a bearing to an RF leak emanating from a coaxial cable of a cable plant in an exemplary embodiment.Method 500 will be discussed with respect tomobile device 100, althoughmethod 500 may be performed by other systems, not shown. - Starting at the origin (0,0), if
mobile device 100 is moved along the vertical y-axis a small incremental amount Δy, then an angle θ2 can be computed which will describe a second spatial cone along the y-axis in 3-dimensions. An apex angle of the second spatial cone will be twice θ2, and will be at the origin. θ2 is calculated based on a relationship between the actual phase change of RF signal 110 between (0,0) and (0, 0+Δy), and the phase change that would be expected ifmobile device 100 was moved directly towardsRF leak 104. In this embodiment, the y-axis is orthogonal to the x-axis, and the second spatial cone further constrains possible locations ofRF leak 104 along a surface of the second spatial cone. -
Mobile device 100 is moved to a third location (0, 0+Δy), andprocessor 118 determines a third phase angle of RF signal 110 based on ofIQ data 114 at the third location (see step 502). The distance between the origin (0,0) and (0, 0+Δy) can be determined bymobile device 100, and used to calculate an expected phase shift in RF signal 110 that would occur if RF leak 104 were located along the y-axis. For instance, ifRF test signal 106 is an 800 MHz CW test signal, then the wavelength would be 37.5 cm. Therefore, one would expect that ifmobile device 100 was moved 37.5 cm along the y-axis, that a phase rotation between the first phase determined at (0,0) and the second phase determined at (0, 0+Δy) would be 360 degrees. If the phase difference between (0,0) and (0, 0+Δy) were instead only 200 degrees, then θ2 is related to 200/360. In particular, θ2 may be calculated as the Arc cosine of (200/360), which is 56.3 degrees. The apex angle of the second spatial cone is therefore 2 θ2, or 102.6 degrees, which is calculated based on the phase difference and the distance between the first location and the third location (see step 504). A secondspatial cone 602 is illustrated inFIG. 6 . The apex angle for secondspatial cone 602 is 2 θ2. Using the apex angles calculated for firstspatial cone 402 and secondspatial cone 602,processor 118 is able to determine bearings to RF leak 104 that are based on the intersection between firstspatial cone 402 and secondspatial cone 602, which occurs along lines 604-605 inFIG. 6 . A bearing toRF leak 104 will lie on one of lines 604-605.Processor 118 may indicate bearings to RF leak 104 ondisplay 122 in some embodiments. If the elevation along a z-axis ofRF leak 104 is known, then the elevation may be used to determine which lines 604-605 are the correct bearing. If the elevation along the z-axis ofRF leak 104 is not known, then which of lines 604-605 is the correct bearing to RF leak 104 can be calculated using similar techniques as described above for the x-axis and y-axis spatial cones along the z-axis. - Consider that
mobile device 100 is located at the first location, which is the origin (0,0,0) of an x-y-z coordinate system illustrated inFIG. 7 .FIG. 7 illustrates two possible bearings to an RF leak in an exemplary embodiment. Firstspatial cone 402 and secondspatial cone 602 have been removed for clarity, leaving behind lines 604-605 that represent possible bearings toRF leak 104. Starting at the origin, ifmobile device 100 is moved along the z-axis a small incremental amount Δz, then an angle θ3 can be computed which will describe a third spatial cone along the z-axis in 3-dimensions. An apex angle of the third spatial cone will be twice θ3, and will be at the origin. θ3 is calculated based on a relationship between the actual phase change of RF signal 110 between (0,0,0) and (0,0,0+Δz), and the phase change that would be expected ifmobile device 100 was moved directly towardsRF leak 104. In this embodiment, the z-axis is orthogonal to both the x-axis and the y-axis, and the third spatial cone further constrains possible locations ofRF leak 104 along a surface of the third spatial cone. -
Mobile device 100 is moved to a third location (0,0,0+Δz), andprocessor 118 determines a fourth phase angle of RF signal 110 based onIQ data 114 at the third location (seestep 506 ofFIG. 5 ). The distance between the origin (0,0,0) and (0,0,0+Δz) can be determined bymobile device 100, and used to calculate an expected phase shift in RF signal 110 that would occur if RF leak 104 were located along the z-axis. For instance, ifRF test signal 106 is an 800 MHz CW test signal, then the wavelength would be 37.5 cm. Therefore, one would expect that ifmobile device 100 was moved 37.5 cm along the x-axis, that a phase rotation between the first phase determined at (0,0,0) and the fourth phase determined at (0,0,0+Δz) would be 360 degrees. If the phase difference between (0,0,0) and (0,0,0+Δz) were instead only 250 degrees, then θ3 is related to 250/360. In particular, θ3 may be calculated as the Arc cosine of (250/360), which is 46 degrees. The apex angle of the third spatial cone is therefore 2 θ3, or 92 degrees, which is calculated based on the phase difference and the distance between the first location and the fourth location (see step 508). A thirdspatial cone 802 is illustrated inFIG. 8 , which is located at (0,0,0) and lies along the z-axis. The apex angle for thirdspatial cone 802 is 2 θ3, andprocessor 118 determinesline 604 is a bearing ofRF leak 104 based on anintersection 804 between firstspatial cone 402, secondspatial cone 602, and third spatial cone 802 (see step 510).Processor 118 may indicate the bearing ondisplay 122 ofmobile device 100 in some embodiments. -
FIG. 9 illustratesmobile device 100 in another exemplary embodiment. In this embodiment,mobile device 100 includes amember 902 that is configured to rotate about anaxis 904. In this embodiment,antenna 108 is mounted tomember 902 at aradius 906 fromaxis 904, and rotates aboutaxis 904 asmember 902 rotates. Asantenna 108 rotates in the direction indicated in the arrow inFIG. 9 , aphase angle 908 of RF signal 110 advances and retards.FIG. 10 is a flow chart of anothermethod 1000 for determining a bearing to an RF leak emanating from a coaxial cable of a cable plant in another exemplary embodiment.Processor 118 determines a maximum rate of change (e.g., the first derivative) ofphase angle 908 that is generated asantenna 108 rotates about axis 904 (seestep 1002 ofFIG. 10 ). A bearing angle θb ofRF leak 104 can be determined byprocessor 118 based on a position ofantenna 108 at the maximum rate of change asmember 902 rotates (see step 1004). A tangent from the direction of rotation at point B, where the slope ofphase 908 is at a maximum, can be determined from θb. Tangent point A will be 180 degrees opposed. A bearing frommobile device 100 toRF leak 104 may be indicated ondisplay 122 byprocessor 118 in some embodiments. - In Another embodiment,
mobile device 100 performs an Inverse Fast Fourier Transform (IFFT) onIQ data 114 to generate IFFT data, and attempts to determine if multiple RF leaks are present incoaxial cable 102.FIG. 11 is a flow chart of amethod 1100 for determining if multiple RF leaks exist in a coaxial cable of a cable plant in an exemplary embodiment. In this embodiment,RF test signal 106 is a wideband RF signal. Some other examples ofRF test signal 106 include chirps, sin(x)/x waveforms, pseudo-noise sequences, and Zadoff-Chu sequences. - During operation,
processor 118 performs an IFFT on samples ofIQ data 114 to generate IFFT data (see step 1102).Processor 118 determines if at least two RF sources are indicated in the IFFT data (see step 1104). If only one RF source is indicated, thenmethod 1100 ends. If at least two RF sources are indicated, thenprocessor 118 determines if a phase of each of the RF sources corresponds asmobile device 100 changes locations (see step 1106). Even if two RF sources are identified in the IFFT data, one RF source may be a reflection of another RF source. If the phases correspond, then processor determines that only one RF leak exists in coaxial cable 102 (see step 1108). However, if the phases do not correspond, thenprocessor 118 determines that at least two RF leaks exist in coaxial cable 102 (see step 1110). - In some embodiments,
RF test signal 106 may DOCSIS® pilot signals that are typically transmitted bycoaxial cable 102 while providing television and/or data services to customers. The pilot signals do not carry data, and are utilized to characterize the RF channel incoaxial cable 102. In another embodiment,mobile device 100 captures a full set of pilot subcarrier signals at the subcarrier frequencies of the pilot signals, and combines the pilot signals into an OFDM frame.Processor 118 is then able to perform an IFFT onIQ data 114 for the OFDM frame, which generates one or more impulse responses. If the impulses are the result of two or more RF leaks incoaxial cable 102, or the leaks have multipath issues, then the delays of the different impulses will vary from each other asmobile device 100 changes locations. If the delay changes of the individual impulses are tracked as the antenna is moved, each leak can be individually identified and a spatial cone may be created for each leak. -
FIG. 12 is a block diagram ofmobile device 100 in another exemplary embodiment. In this embodiment,mobile device 100 is able to processIQ data 114 whilemobile device 100 is in motion, and determine changes in afrequency 1202 ofRF signal 110. For instance,mobile device 100 may be placed in a vehicle, and driven along a road that is proximate tocoaxial cable 102. Changes infrequency 1202 provide information tomobile device 100 regarding whethermobile device 100 is traveling towardRF leak 104 or away fromRF leak 104. In this embodiment,RF test signal 106 is a test signal at a known frequency. -
FIG. 13 is a flow chart of anothermethod 1300 for detecting RF leaks emanating from a coaxial cable of a cable plant in an exemplary embodiment.Processor 118 determines changes infrequency 1202 of RF signal 110 asmobile device 100 is in motion (see step 1302). Iffrequency 1202 ofRF signal 110 is higher than the known frequency ofRF test signal 106, thenprocessor 118 identifies that thatmobile device 100 is traveling towards RF leak 104 (see step 1304). Iffrequency 1202 ofRF signal 110 is lower than the predetermined frequency ofRF test signal 106, thenprocessor 118 identifies thatmobile device 100 is traveling away from RF leak 104 (see step 1306). Adistance 1212 betweenmobile device 100 andRF leak 104 may be estimated in some embodiments based on the rate at whichfrequency 1202 transitions. For example, using a slope offrequency 1202 intransition region 1204. The slope may be higher asdistance 1212 decreases. - In another embodiment,
mobile device 100 is capable identifying a bearing towardsRF leak 104 based on atransition region 1204 offrequency 1302 ofRF signal 110. Asmobile device 100 transitions from travelling towardRF leak 104 to travelling away fromRF leak 104,frequency 1204 of RF signal 110 changes from being higher than the known frequency ofRF test signal 106 to being lower than the known frequency ofRF test signal 106.Transition region 1204 can be analyzed byprocessor 118 to identify a bearing towardsRF leak 104. In this case, a zerocrossing point 1206 allowsprocessor 118 to identify abearing 1208 to RF leak 104 that may be orthogonal to a direction oftravel 1210 of mobile device. Using multiple bearings asmobile device 100 travels in different directions, an intersection of the multiple bearings indicates to mobile device 100 a location ofRF leak 104. -
FIG. 14 is a block diagram ofmobile device 100 in another exemplary embodiment. In this embodiment,mobile device 100 is able to identify a location ofRF leak 104 by analyzing an absolute delay between the transmission ofRF test signal 106 and the reception of RF signal 110 by mobile device. Asantenna 108 ofmobile device 100 is brought closer toRF leak 104, aphase angle 1402 of RF signal 110 decreases to a minimum value atpoint 1404, which indicates thatantenna 108 ofmobile device 100 is proximate toRF leak 104. - In another embodiment,
mobile device 100 is capable of detecting information about RF leaks utilizing multiple spatial cones that are not located at the origin, which is illustrated inFIG. 15 . In this embodiment,spatial cone 1502 is located along the y-axis, andspatial cone 1504 is located along the x-axis. However,spatial cone 1504 is not located at the origin (0,0) in this embodiment. Rather,spatial cone 1504 is located some distance (d) along the x-axis from the origin, which places a location ofRF leak 104 somewhere on a circle that is created whenspatial cone 1502 intersectsspatial cone 1504. In this embodiment, θ4 and θ5 are different angles. - As discussed previously, an accurate source clock onboard
mobile device 100 may be utilized in order to accurately identify subtle changes in the phase angle and/or the frequency ofRF signal 110. One of the challenges in leakage detection is the use of a very stable reference signal source. This may be provided by using a Rubidium-based or Cesium-based frequency standard, which are commercially available. Another approach is the use a GPS-referenced clock. - These challenges may be mitigated by transmitting an RF test signal with a built-in reference. One option includes the use of two CW RF test signals separated by a fixed frequency, such as 10 MHz. Other options include the use of modulation, such as Amplitude Modulation (AM) or Binary Phase Shift Keying (BPSK), or downstream DOCSIS® 3.1 signals which can have a bandwidth nearing 200 MHz.
- At
mobile device 100, the RF signals could be demodulated to derive the clock, which would be used to as a reference formobile device 100. If two tones were used, they could be mixed together to produce a lower stable reference. The current Ettus B200 Software Defined Radio (SDR) receiver uses a 10 MHz reference. The recovered symbol clock or difference frequency can be used to lock-up a phased lock loop (PLL) generating a stable 10 MHz. - Using RF test signals with a built-in reference works even when there is Doppler shift, because the frequency of the modulation is not strongly affected by Doppler. Instead, the center frequency will be affected. Ideally you want the modulated signal, or two CW RF test signals, to be close enough in frequency to have very similar transmission path characteristics. One possible range for the recovered clock is 0.1-200 MHz. After recovering a stable clock, either or both tones can be demodulated into IQ data samples. The stable clock may also be derived from a data signal, such as a DOCSIS 3.1 OFDM® downstream signal.
- A problem arises when there is more than one signal source, or one signal source is reflecting and producing multipath. In this RF environment the trajectory of the IQ plot is no longer circular, but appears to move randomly, sometimes temporarily passing through the origin at a location where all received signals cancel due to vector phase addition or subtraction. The presence of multiple sources and be detected by measuring and saving IQ values at uniform distances while the antenna is traveling in a straight line.
Mobile device 100 may perform Fourier transform such as a Discrete Fourier Transform (DFT) or a FFT on savedIQ data 114 to generate transformed data, which may reveal if multiple RF leaks or reflections are present. Ideally the samples are evenly spaced and the numbers of samples is 2 raised to an integer power, and all sample locations taken whileantenna 108 is traveling in a straight line. Optionally the set of samples may be windowed to reduce a characteristic called leakage. After windowing the data set is transformed using a DFT. The data are analyzed and more data is gathered. If, for example a 64 point Fourier transform is being performed, a smoother display can be obtained by replacing some of the older samples with newer samples. Use of a windowing technique before performing a Fourier transform reduces leakage and produces clearer peaks in the transform. This test method may be viewed as a type of synthetic phased array. - Utilizing the various analytical techniques described, locating and mitigating RF leaks in coaxial cables of a cable plant can be performed more quickly and efficiently. This allows the cable operator of the cable plant to unsure that the RF leakage levels enforced by the FCC are in compliance.
- Any of the various elements shown in the figures or described herein may be implemented as hardware, software, firmware, or some combination of these. For example, an element may be implemented as dedicated hardware. Dedicated hardware elements may be referred to as “processors”, “controllers”, or some similar terminology. When provided by a processor, the functions may be provided by a single dedicated processor, by a single shared processor, or by a plurality of individual processors, some of which may be shared. Moreover, explicit use of the term “processor” or “controller” should not be construed to refer exclusively to hardware capable of executing software, and may implicitly include, without limitation, digital signal processor (DSP) hardware, a network processor, application specific integrated circuit (ASIC) or other circuitry, field programmable gate array (FPGA), read only memory (ROM) for storing software, random access memory (RAM), non-volatile storage, logic, or some other physical hardware component or module.
- Also, an element may be implemented as instructions executable by a processor or a computer to perform the functions of the element. Some examples of instructions are software, program code, and firmware. The instructions are operational when executed by the processor to direct the processor to perform the functions of the element. The instructions may be stored on storage devices that are readable by the processor. Some examples of the storage devices are digital or solid-state memories, magnetic storage media such as a magnetic disks and magnetic tapes, hard drives, or optically readable digital data storage media.
- In one embodiment, the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode, etc.
FIG. 16 illustrates acomputing system 1600 in which a computer readable medium 1606 may provide instructions for performing any of the methods disclosed herein. - Furthermore, the invention can take the form of a computer program product accessible from the computer readable medium 1606 providing program code for use by or in connection with a computer or any instruction execution system. For the purposes of this description, the computer readable medium 1606 can be any apparatus that can tangibly store the program for use by or in connection with the instruction execution system, apparatus, or device, including the
computer system 1600. - The medium 1606 can be any tangible electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device). Examples of a computer readable medium 1606 include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk. Some examples of optical disks include compact disk-read only memory (CD-ROM), compact disk-read/write (CD-R/W) and DVD.
- The
computing system 1600, suitable for storing and/or executing program code, can include one ormore processors 1602 coupled directly or indirectly to memory 1608 through asystem bus 1610. The memory 1608 can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code is retrieved from bulk storage during execution. Input/output or I/O devices 1604 (including but not limited to keyboards, displays, pointing devices, etc.) can be coupled to the system either directly or through intervening I/O controllers. Network adapters may also be coupled to the system to enable thecomputing system 1600 to become coupled to other data processing systems, such as through host systems interfaces 1612, or remote printers or storage devices through intervening private or public networks. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters. -
FIG. 17 is a diagram 1700 illustratively representing acable 1704 within a cable plant that has damage to the cable's shield, which causes it to act as astationary leakage antenna 1710. Such damage is common in cable plants and may be caused by, for example, corrosion, stress fractures, animal chews, technician error, and construction vehicle error. - The
cable 1704 transports aleakage test signal 1702, and example of which is a stable continuous wave (CW) carrier or other deterministic signal, such as a DOCSIS 3.1 signal with pilots. The leakage test signal radiates to amobile test antenna 1706 which is connected to a complexdemodulator mobile receiver 1708, at afirst antenna location 1716. Thecomplex demodulator 1708 produces an in-phase (I) and quadrature (Q) signal sample for each of ‘N’incremental steps 1711 over a synthetic phased array (SPA)distance 1712 as the receiveantenna 1706 moves. In one example,incremental steps 1711 are separated by 15 cm and the number of incremental steps ‘N’ is an integer value such as 8 (as shown inFIG. 17 ) or 128, or may be, for example, 2 raised to some integer exponent. The samples are each processed by a well-known discrete inverse Fourier transform, the output of which is a set of Doppler frequencies. - In one embodiment, the mobile receive
antenna 1706 were moving directly towards aleakage antenna 1710 at a velocity of 40 meter/sec and the CW test signal frequency is 900 MHz. The test signal's wavelength is readily computed as 3E8 meters per second (speed of light) divided by 900E6 Hz=0.333 meters. The Doppler frequency can then be computed as 40/0.333 or 120 Hz. However, if the Doppler frequency is a lower value, such as 80 Hz (at the 40 meter/sec antenna velocity), the mobile receiveantenna 1706 is not moving directly towards theleakage antenna 1710, but moving at an angle to theleakage antenna 1710. A bearing angle 1714 (or bearing angle 1720) may be calculated as Acos(80/120)=48.19 degrees. -
Test antenna 1706 them moves to asecond antenna location 1718 separated by adistance 1722 at which point second set of I-Q samples is generated. The second set of I-Q samples is then processed by a Fourier transform and, as described above for the first set of I-Q samples, asecond bearing angle 1720 is produced using known methods. The intersection point of bearingangle 1714 fromantenna location 1716 andbearing angle 1720 fromantenna location 1722 shows the location of theleakage antenna 1710. - In practice, many bearing angles can be computed from many antenna locations, increasing the accuracy of the determination of the location of
leakage source 1710 by averaging. Likewise a larger value of ‘N’ produces improved bearing angle resolution. - In one embodiment,
mobile receiver 1708 is a software defined radio (SDR) such as Ettus Model B210 connected to a computing device, such as a portable computer, Raspberry Pi, O-Droid computing device, or similar device. - In an embodiment, mobile receive
antenna 1706 is an L-com monopole with omnidirectional antenna pattern, or similar. - To achieve the necessary stability of both the
leakage test signal 1702 and mobile receiver 1708 a Rubidium test standard may be employed. For example a Frequency Electronics Model 5680A may be used in both stationary and mobile locations. Alternately a GPS (global positioning system) disciplined oscillator, such as offered by Trimble Navigation, may be employed for the stable frequency references. - One complication can occur when mobile receive
antenna 1706 travels in a straight line such that ambiguity is created regrading which side of the road a leakage signal is on, that is, the intersections of bearing 1714, 1720 produced by the Acos function create a real location and a false location ofangles leakage signal 1710. The bearing angle is actually half of the apex angle of a solid three dimensional cone, where the apex of the cone isantenna location 1716 orantenna location 1718. A three dimensional cone will intersect the ground along two lines, and the false line needs to be eliminated. - If the path of the test antenna wavers, such as when a vehicle carrying the equipment turns or changes lanes, the intersection points will converge in the correct direction and diverge in the false direction.
- In another embodiment (similar to that shown in the transmit embodiment of
FIG. 18 ), a second mobile receive antenna (not shown but similar to the second mobile receiveantenna 1806B inFIG. 18 ) is locate proximate to the first mobile receiveantenna 1706 and connected to another second mobile receiver. The mobile receive antenna may be placed alongside mobile receiveantenna 1706 at, for example, a separation distance of 1-1.5 meters. The relative phase shifts between themobile receivers 1708 and the second mobile receiver reveals the direction of a leakage source. That is, the leakage source will be on the side that experiences a higher Doppler frequency as theleakage antenna 1710 is passed. - In another embodiment, two antennas are connected to a switch, such as an electronic double pole switch, that multiplexes or alternatively connects the two antennas to a single receiver, such that only a single receive is required thereby reducing cost of implementation. In a single receiver embodiment, a computer that receives data from the SDR (discussed above) may control the switch between the two antennas. By either adding additional antenna feed cable to one antenna or modifying antennas positions such that one is slightly forward of the other, the measurement points can be made at the same horizontal location as shown in
FIG. 17 . This could be done for cost reduction, power reduction, or weight reduction such as may be beneficial in an airborne, terrestrial, or cable “walking” drone implementation. - Usable with a GPS configured system, although not illustrated, is a GPS data logger receiver for recording antenna position as measurements are made such that data point may be geographically located. One example of such a PGS data logger received is a Columbus model V-800. From the GPS data the latitude, longitude values of leakage antennas, such as
leakage antenna 1710 is located and recorded. It is also useful to record the strength of the leakage signal as well as the drive path that the mobile receiveantenna 1706 took, date, and time. - It should be noted that the use of a CW carrier test signal with a SPA provides for extreme sensitivity due to the narrow receiver noise bandwidth, and the processing gain and directional properties of the SPA.
- The embodiment described in
FIG. 17 may be utilized in multiple ways. It can be carried by a human or placed on a cart, where an accelerometer may cooperate with the system to provide uniform I-Q samples. The present system and method may also be mounted on a vehicle, examples of which include by are not limited to a cable service vehicle, a taxi, or a delivery vehicle. Likewise the embodiment can be flown by a manned aircraft or drone. When aerial, geometry considerations vary relative to ground testing. For example, when driving the 3-D cone intersects with the ground along a “V” shape. However, when flying the ground (containing the leakage antenna) intersects slices the 3-D cone along a hyperbola, assuming level flight. So geometric leakage calculations are made in three dimensions or four dimensions when time is included. - Testing can be automatic, where a driver of a vehicle is not aware test data is being gathered. In this mode the collected leakage data can be uploaded over a wireless link, for example, when the vehicle is parked near a wireless data receiving unit.
- The data obtained by leakage detection can be manually or automatically placed into a data base and processed. By way of example, processing may focus on proactive network maintenance, troubleshooting interference with wireless services, or tracking new leaks or leaks that vary with time and weather.
- Research has indicated that cable leakage severity depends on a frequency of a test signal. Thus it is valuable to test at different frequencies. This can be done by changing the frequency of the test signal periodically. The
antenna 1706 can be changed out for a new frequency antenna or a multiband antenna can be used. Alternately, an antenna may be used at a non-specified frequency and a correction factor can be applied to the recorded data. -
FIG. 18 showsenvironment 1800 with the antenna system similar to that ofFIG. 17 configured on a truck. The antenna reciprocity theorem states that the transmit and receive properties of associated antennas are identical. Hence, it is also possible to transmit from one or more moving antennas and receive at the leakage antenna. - In the embodiment of
FIG. 18 , a mobile transmitantenna 1806 is mounted on avehicle 1814, traveling down aroad 1822, and emitting atest signal 1802. Thetest signal 1802 is received by a receiveleakage antenna 1810 created by ashield break 1824.Test signal 1802, which may be a CW carrier, is generated by a movingtest signal transmitter 1818. The received test signal is received at leakage antenna 1820 and propagates throughcable line 1804 to astationary receiver 1826. Thestationary receiver 1826 may be at a fiber node, a hub site, a headend, in a home, or placed in the system for the present testing procedure. Asmobile test antenna 1806 drivespast leakage antenna 1810 Doppler shift information is collected atstationary receiver 1826, similar to the moving receiver embodiment, discussed above. - One complexity in the transmit system is determining the exact travel path and timing of the mobile transmit
antenna 1806 relative to the reception of the leakage test signal by thestationary receiver 1826. Aposition transmitting antenna 1812 may optionally be configured withvehicle 1814 such that it travels with moving transmit 1806, 1806B.antennas Antenna 1812 functions to send aposition carrier 1816 with the latitude, longitude, and velocity of thevehicle 1814 to a position receiver, not shown. In anotherembodiment leakage antenna 1810 also receives theposition carrier 1816. If nearby frequency band to the test signal's frequency is utilized for theposition carrier 1816, a common single antenna may be used for bothtest signal 1802 andposition carrier 1816 by combining the transmitted signals before connecting them to the common single antenna. - Note that the present transmit system, which utilizes a
single test signal 1802 from a single mobile transmitantenna 1806, has a similar left-right ambiguity problem as the embodiment discussed inFIG. 17 . This problem can be similarly resolved by locating a second mobile transmitantenna 1806B onvehicle 1814 proximate toantenna 1806.Test signal 1802 can be switched between transmittingantennas 206 and 206B rapidly by switch 220. The stationary receiver would synchronously switch output streams, recovering interleaved I-Q samples from both antennas at different times. -
FIG. 19 is plot diagram 1900 that illustrates two Doppler shift vs. distance plots. It will be understood that the distance axis of plot diagram 1900 may be adapted to time if velocity is uniform over a given span.FIG. 19 is discussed in relationship toFIG. 18 and should be read as such. - A
first plot 1902 is produced frommobile transmitting antenna 1806 when it is at a first closer distance fromshield break 1824. Asecond plot 1904 is produced frommobile transmitting antenna 1806B when it is at a second farther distance fromshield break 1824. - In an embodiment, a switch may be utilized to change between transmit
1806, 1806B every 15 cm such that the SPA distances for eachantennas antenna 112 overlap. The antenna closer to leakage antenna 1810 (antenna 1806 inFIG. 18 ) has an increased Doppler frequency change relative to the antenna farther away (antenna 1806B inFIG. 18 ) due to faster rotation of phase. This feature makes it possible to eliminate the false leak image. Note that when the antenna's bearing angles are 90 degrees the plots will cross. - In an embodiment, the present system and method may provide additional information to
stationary receiver 1826 to instruct it as to which antenna's signal is currently being received. Forexample antenna 1806 may be configured to transmit slightly longer thanantenna 1806B by varying the duty cycle of switch 212 from 50-50 to 55-45. - The distance point of
plot 1900 where the Doppler frequency goes through zero (hereinafter, zero point 1906) represents where the shield break is at right angles to the travel path of the 1806, 1806B. Note that when the leakage antenna is far away from the antenna, the Doppler frequency approaches +antennas F 1908 or −F 1910, which can be calculated from the wavelength and antenna velocity. - Note that test signals travel at almost the speed of light, but the antenna velocity is much, much lower. The antenna velocity is used for Doppler frequency calculations. If a test antenna is driving at 40 meters per second, and the antenna acquires I-Q data point every 15 cm then the capture rate is one sample every 3.75 ms. Assuming a leak antenna, such as
leakage antenna 1810, is 100 meters away from the mobile antenna, such as 1806, 1806B, then the signal transit time between then is approximately 0.000333 ms, which can be considered virtually instantaneous.antenna - If it is desired to have a constant distance between synthetic phased array elements, such as 15 cm, sampling rates can be sped up as antenna velocity increases. Testing can even be done semi-statically if desired. That is, an I-Q measurement is made, the antenna is moved 15 cm and another I-Q measurement is made, which continues until enough samples are captured to perform a Fourier transform and make a SPA.
-
FIG. 20 is a diagram 2000 that illustrates ahand holdable antenna 2004 with one ormore accelerometers 2006 in abase 2007, and a receiver/computing/display device 2008. The embodiment ofFIG. 20 is primarily intended for indoor leakage antenna location, as may be utilized inside a home or apartment building, although it also functional outdoors. As a technician (not shown) movesantenna 2004, received signal values are sent toreceiver 2008 and accelerometer voltage samples, from accelerometer(s) 2006 are simultaneously sent toreceiver 2008 overcable 2010. The three X, Y, andZ axes 2012 ofantenna 2004 are located by computation elements withinreceiver 2008 utilizing the accelerometer data and received data. As the technician traces a circle with the antenna horizontally in an X-Z plane, the I-Q field strength values are recorded, along with the position of the antenna. This process may be repeated in the X-Y plane and in the Y-Z planes, forming a three dimensional (3-D) field strength map. From the field strength map the direction to the leakage antenna(s) may be determined. Indoor locations are frequently more difficult to analyze than outdoor applications because the leakage signal suffers multipath distortion, as well as diffraction. - Another motion pattern that the technician can use for
antenna 2004 is a straight line in each of the X, Y, and Z axes. Processing can be done as discussed in the parent (allowed) application. - Yet another motion pattern that the technician can use is a zig-zag pattern where a two dimensional plane of (relatively) evenly-spaced samples are captured. Samples are captured while antenna is moved left-to-right while holding the forward position steady. Next, the antenna is advanced and moved right-to-left to get another set of samples. This is repeated until a test area is covered. This set of samples may be transformed with a 2-dimension IFFT to reveal the direction to a leakage signal. Likewise this technique can be used in 3-dimensions. While a computer-controlled actuator can give more accurate sample spacing relative to a human moving the antenna, the errors produced by a human moving the antenna can be reduced by interpolation.
- The hardware and software utilized in the embodiment of
FIG. 20 are similar to that described above for the many other embodiments. - Changes may be made in the above methods and systems without departing from the scope hereof. It should thus be noted that the matter contained in the above description or shown in the accompanying drawings should be interpreted as illustrative and not in a limiting sense. The following claims are intended to cover all generic and specific features described herein, as well as all statements of the scope of the present method and system, which, as a matter of language, might be said to fall there between.
Claims (9)
1. A system for locating one or more leakage antennas radiating a leakage signal from a cable plant, comprising:
a first mobile test antenna connected to a mobile receiver producing I and Q samples as the mobile test antenna moves a synthetic phased array (SPA) distance;
a Fourier transformer module for converting a first set of I and Q samples into a first set of Doppler frequency components associated with a first test antenna location and a second set of I and Q samples into a second set of Doppler frequency components associated with a second antenna;
a conversion module configured to convert the first set of Doppler frequency components into first bearing angle associated with the first test antenna location and the second set of Doppler frequency components into second bearing angle associated with the second antenna location;
wherein the location of the one or more leakage antennas is determined as the locations where said first bearing angle from the first test antenna location intersect said second bearing angle from the second test antenna location.
2. A system according to claim 1 , further comprising a second mobile test antenna connected to second mobile receiver that produces a third set of I and Q samples which is processed to resolves left-right location ambiguity.
3. A system according to claim 1 , further comprising a second mobile test antenna and a switch connecting said first mobile test antenna and said second mobile test antenna to said receiver, the receiver alternately connecting the first mobile test antenna and the second mobile test antenna to the receiver.
4. A system according to claim 1 , further comprising changing test signal frequencies to determine the severity of the one or more leakage antennas.
5. A system for detecting one or more leakage antennas that receive a first transmitted test signal, comprising:
a mobile transmit antenna connected to the first transmitted test signal transmitter for transmitting the first transmitted test signal;
a stationary receiver and processing unit connected to the one or more leakage antennas for receiving and processing mobile transmit antenna generated signals and producing a first and second set of I and Q samples as a result of said processing;
a location processing unit for determining the location of a first test antenna location and a second test antenna location; and
a Fourier transformer processing unit for converting the first set of I and Q samples into a first set of Doppler frequency components associated with the first test antenna location and converting the second set of I and Q samples into a second set of Doppler frequency components associated with the second test antenna location; and
a bearing angle processing unit configured to convert of first set of Doppler frequency components into first bearing angle associated with the first test antenna location and the second set of Doppler frequency components into a second bearing angle associated with the second test antenna location;
wherein the location of the leakage antenna is determined as the locations where said first bearing angles from first test antenna location intersect said second bearing angles from second test antenna location.
6. A system according to claim 5 , further comprising a second mobile transmit antenna which transmits a second transmitted test signal which is received at the one or more leakage antennas and stationary receiver and is processed by the processing unit to resolves left-right location ambiguity.
7. A system according to claim 5 , further comprising a data storage unit for recording leakage data.
8. A system according to claim 7 , wherein leakage data is automatically recorded when mobile transmit antenna is in a region with the first or second transmitted test signal, and data gathering is suspended when said mobile transmit antenna is outside the region with the first or second transmitted test signal.
9. A system according to claim 1 , further comprising a GPS data logger for associating latitude and longitude data with the one or more leakage antennas.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/872,623 US20180159590A1 (en) | 2014-07-29 | 2018-01-16 | Radio frequency leakage detection in a cable plant |
Applications Claiming Priority (6)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201462030345P | 2014-07-29 | 2014-07-29 | |
| US201462054529P | 2014-09-24 | 2014-09-24 | |
| US201562146848P | 2015-04-13 | 2015-04-13 | |
| US14/812,916 US9455766B2 (en) | 2014-07-29 | 2015-07-29 | Radio frequency leakage detection in a cable plant |
| US15/276,263 US9871557B2 (en) | 2014-07-29 | 2016-09-26 | Radio frequency leakage detection in a cable plant |
| US15/872,623 US20180159590A1 (en) | 2014-07-29 | 2018-01-16 | Radio frequency leakage detection in a cable plant |
Related Parent Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/276,263 Continuation US9871557B2 (en) | 2014-07-29 | 2016-09-26 | Radio frequency leakage detection in a cable plant |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US20180159590A1 true US20180159590A1 (en) | 2018-06-07 |
Family
ID=57775921
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/276,263 Active US9871557B2 (en) | 2014-07-29 | 2016-09-26 | Radio frequency leakage detection in a cable plant |
| US15/872,623 Abandoned US20180159590A1 (en) | 2014-07-29 | 2018-01-16 | Radio frequency leakage detection in a cable plant |
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/276,263 Active US9871557B2 (en) | 2014-07-29 | 2016-09-26 | Radio frequency leakage detection in a cable plant |
Country Status (1)
| Country | Link |
|---|---|
| US (2) | US9871557B2 (en) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109142888A (en) * | 2018-09-25 | 2019-01-04 | 北京空间飞行器总体设计部 | A kind of satellite electromagnetic leakage localization method and system |
| US11271650B1 (en) * | 2019-08-29 | 2022-03-08 | Harmonic, Inc. | Aeronautical band leakage assessment in high split HFC plant |
| US20240147271A1 (en) * | 2022-10-31 | 2024-05-02 | Comcast Cable Communications, Llc | Methods and systems for improved network leak detection and localization |
| US12375880B2 (en) | 2021-04-02 | 2025-07-29 | Comcast Cable Communications, Llc | Methods and systems for determining signal leaks in a network |
Families Citing this family (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9882663B2 (en) | 2016-03-17 | 2018-01-30 | Arcom Digital, Llc | Doppler location of signal leaks in an HFC network |
| CN109644123B (en) * | 2016-08-23 | 2020-09-08 | 华为技术有限公司 | Method for acquiring phase demodulation signal in clock recovery circuit and phase discriminator |
| US10284258B2 (en) | 2017-03-01 | 2019-05-07 | Intraway R&D S.A. | Method and system for interference detection and diagnostic in cable networks |
| US10921363B2 (en) * | 2017-10-09 | 2021-02-16 | Cable Television Laboratories, Inc. | Systems and methods for break detection |
| WO2019176931A1 (en) * | 2018-03-13 | 2019-09-19 | 株式会社メガチップス | Communication system using wired transmission line and multi-carrier modulation |
| US12294480B2 (en) * | 2018-05-17 | 2025-05-06 | Cable Television Laboratories, Inc. | Methods for network maintenance |
| US11327103B2 (en) * | 2020-04-27 | 2022-05-10 | Viavi Solutions Inc. | Home leakage (HL) detection with direction-to-source indication |
| US11846666B2 (en) | 2021-08-10 | 2023-12-19 | Charter Communications Operating Llc | System and method for detecting cable system signal ingress |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9021539B2 (en) * | 2006-08-07 | 2015-04-28 | Trilithic, Inc. | Leakage location methods |
| US9658314B2 (en) * | 2012-03-02 | 2017-05-23 | Nokomis, Inc. | System and method for geo-locating and detecting source of electromagnetic emissions |
-
2016
- 2016-09-26 US US15/276,263 patent/US9871557B2/en active Active
-
2018
- 2018-01-16 US US15/872,623 patent/US20180159590A1/en not_active Abandoned
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109142888A (en) * | 2018-09-25 | 2019-01-04 | 北京空间飞行器总体设计部 | A kind of satellite electromagnetic leakage localization method and system |
| US11271650B1 (en) * | 2019-08-29 | 2022-03-08 | Harmonic, Inc. | Aeronautical band leakage assessment in high split HFC plant |
| US12375880B2 (en) | 2021-04-02 | 2025-07-29 | Comcast Cable Communications, Llc | Methods and systems for determining signal leaks in a network |
| US20240147271A1 (en) * | 2022-10-31 | 2024-05-02 | Comcast Cable Communications, Llc | Methods and systems for improved network leak detection and localization |
Also Published As
| Publication number | Publication date |
|---|---|
| US20170019148A1 (en) | 2017-01-19 |
| US9871557B2 (en) | 2018-01-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9871557B2 (en) | Radio frequency leakage detection in a cable plant | |
| US9455766B2 (en) | Radio frequency leakage detection in a cable plant | |
| RU2684970C2 (en) | Method and system for identifying vehicles | |
| CN102272618B (en) | Diversity time and frequency location receiver | |
| US8154303B2 (en) | Method for locating cable impairments | |
| US9369160B2 (en) | Communications system using signal modulation | |
| MX2011006512A (en) | Interference detection, characterization and location in a wireless communications or broadcast system. | |
| Hobiger et al. | GLONASS-R: GNSS reflectometry with a frequency division multiple access-based satellite navigation system | |
| US11719735B1 (en) | Systems and methods for break detection | |
| Zhang et al. | Moving target parameter estimation and SFN ghost rejection in multistatic passive radar | |
| Palmer et al. | Receiver platform motion compensation in passive radar | |
| Osechas et al. | Characterization of the ground-to-air ranging performance of the 960-1215 mhz arns band using ofdm measurements in the 902-928 mhz ism band | |
| KR20180125297A (en) | Antenna radiation pattern measurement system using frequency modulated continuous wave and method thereof | |
| Schroeder et al. | Stationary cassidian FM Passive Radar demonstrator for 24/7 operation and sensor cluster measurements | |
| Jiao et al. | Ionospheric scintillation simulation on equatorial GPS signals for dynamic platforms | |
| JPWO2018142629A1 (en) | Object detection apparatus, object detection method, and computer-readable recording medium | |
| JP2009069020A (en) | Radar equipment | |
| KR102428516B1 (en) | A system and method for providing radio wave quality at a long distance using radio signals received from an aircraft flying at a short distance | |
| Geise et al. | In-Situ Nearfield Flight Inspection of a Glide-Slope System with a UAV | |
| Eiadkaew et al. | Environmental boundary estimation of urban areas using FMCW radar with data clustering for UAV detection | |
| US12035271B2 (en) | System and method for detecting and locating a signal source | |
| Iyer | Designing Of radar systems for passive detection and ranging: Target aquisition without transmission | |
| Atkinson | Using digital television signals for radar imaging | |
| Yellu | A Uniform Geometrical Theory of Diffraction Model of Very-High-Frequency Omni-directional Range Systems for Improved Accuracy | |
| Jung et al. | Comparative study of sensor fusion methods for hybrid positioning systems |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: CABLE TELEVISION LABORATORIES, INC., COLORADO Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:WILLIAMS, THOMAS H.;REEL/FRAME:045377/0273 Effective date: 20180328 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |