Next Article in Journal
Leveraging a Genetic Algorithm for the Optimal Placement of Distributed Generation and the Need for Energy Management Strategies Using a Fuzzy Inference System
Previous Article in Journal
Multiclass ECG Signal Analysis Using Global Average-Based 2-D Convolutional Neural Network Modeling
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Research on Optimization Measures of Zigbee Network Connection in an Imitated Mine Fading Channel

1
College of Transportation, Shandong University of Science and Technology, Qingdao 266590, China
2
College of Mechanical and Electronic Engineering, Shandong University of Science and Technology, Qingdao 266590, China
3
College of Information Science and Engineering, Shandong Normal University, Jinan 250358, China
*
Author to whom correspondence should be addressed.
Electronics 2021, 10(2), 171; https://doi.org/10.3390/electronics10020171
Submission received: 9 November 2020 / Revised: 29 December 2020 / Accepted: 9 January 2021 / Published: 14 January 2021
(This article belongs to the Section Networks)

Abstract

:
Based on the background of a mine, this study aimed to improve underground wireless communication. The study selected Zigbee technology from many wireless technologies as the basis, expounded the technical advantages and disadvantages, and addressed its disadvantages. First, the modulation technology of Zigbee was improved. This article selects and describes O-QPSK technology from three modulation technologies, thereby addressing the synchronization difficulties caused by inherent technical reasons, and proposes a modulation method based on feedforward timing. Moreover, excellent performance was achieved in the follow-up simulation experiment. For networking problems, a series of mechanisms are proposed to address several problems in large-scale networking: node offline, energy waste, signal delay, etc. This article proposes five main mechanisms and an improved protocol from two significant perspectives. The problem of node disconnection is divided into two parts. Considering the different status of edge nodes and important nodes in the network, three mechanisms are proposed for edge nodes for disconnection detection and self-repair, and two mechanisms are proposed for essential nodes. This can compensate for the loss caused by the disconnection of essential nodes at a specific time. For network energy waste, an Improved-LEACH protocol is proposed to alleviate the signal delay problem. The performance of the five mechanisms and one protocol was verified in a simulation test, and the performance was reasonable and in line with expectations.

1. Introduction

Hidden dangers and risks accompany coal mining. There are more than 20,000 coal mines in China, 95% of which are underground coal mines [1]. Underground coal mines are complex. Due to underground coal seams and hydrological conditions, underground problems are difficult to predict. Many sources of instability factors exist, such as underground gas changes, floods, fires due to high geothermal temperature, and gas explosions, or coal mining machinery faults caused by faults. Appropriate measures to avoid or provide early warning of disasters and faults have become the top priority of coal mine safety research. Initially, coal communication systems generally used a special coaxial cable. The radio wave was dispersed into the mine tunnel by the central station and then spread through the tunnel’s radio stations. Wired transmission is safe and reliable, and the transmission capacity is large. The signal is stable, which helps obtain underground news in time. However, wired transmission requires the use of complicated cables, and additional cables can cause other effects in narrow tunnels. Real-time information in underground coal mines is essential for monitoring the underground conditions of coal mines. Compared with aboveground, underground communication is affected by various conditions, such as underground rocks and, potentially, metals. Because underground conditions are highly complex, underground passages are crowded and narrow. Large-scale wired communication has an impact on mining projects. Due to the general rise of wireless communication, early scientific researchers abandoned wired communication and instead pursued wireless communication for mining applications [2].
Compared with wired transmission, wireless transmission is flexible, robust, portable, and uneven in layout. However, it does not affect narrow mine tunnels due to its difference, or open-wire or optical cable transmission. However, wireless transmission is easily affected by the environment. Mine communication is a specialized area of communication research, and differs from general ground and indoor communication. The walls of mine tunnels are rough, the interior is hot and humid, and there are numerous branch tunnels. Numerous coal mining machines are also present, in addition to a large number of coal mining machines. Due to the metal shell of the mine, the propagation environment and characteristics of radio waves in mines are significantly different from those of general ground communication [3]. Furthermore, numerous signal multipath effects occur in mines, such as are non-line-of-sight transmission, difficulty of the signal directly reaching the target receiver, and propensity to fading effects. Underground mines can be regarded as an implementation of non-line-of-sight transmission in a limited space. Compared with the free transmission channel [4] of general wireless communication, underground wireless communication must consider more influences, and, at present, underground communication continues to face a number of challenges.
Due to its advantages of low cost, low power consumption, and strong anti-interference, Zigbee is widely used in smart homes, industry, short-range monitoring, etc. It is also an option for wireless transmission in mine communication. In 1978, Murphy, J.N. [5] and his team placed a detector with a Zigbee communication module inside a mine and obtained a relatively stable signal; Zhang Changsen [6] and others proposed mine personnel positioning based on ZigBee technology. The system’s design scheme, the specific implementation process, and the implementation diagram of the software and hardware structure were outlined. Jiao Shangbin [7] and others used the Zigbee technology component wireless sensor network to collect data, such as gas concentration, carbon dioxide, temperature, and humidity in the mine, and adopted the Karl Mann filtering method to remove random errors. Experiments proved that the system was better able to collect and communicate the required data.
In the study of mine communication to reduce open-wire communication, Zigbee technology has unique advantages. Zigbee is established based on the IEEE802.15.4 protocol, uses spread spectrum methods to enhance anti-interference [8], and uses modulation methods such as BPSK (Binary Phase Shift Keying), ASK (Amplitude Shift Keying), and O-QPSK (Offset-Quadrature Phase Shift Keying) to enhance noise interference and reduce signal distortion. In mine communication, it is necessary to combat the energy loss caused by noise interference and multipath effects, and the influence on the network’s network capacity and stability. This study simulated the mine communication environment, abstracted it into a similar channel environment, and monitored the Zigbee modulation signal’s stability. Based on the research of the Zigbee modulation method, the study made in-depth improvements and the current article discussed the problem of network connection. Parallel measures were applied to the inner and outer layers of the technology to make improvements. Zigbee’s modulation method was studied from the inner layer, and O-QPSK was selected as the improvement target. Starting from the demodulation synchronization of O-QPSK, the aim was to address the issue of demodulation synchronization to reduce the signal delay problem. The implementation of Zigbee networking was studied from the outer layer, and the network strength was selected for the network life endurance of the Internet of Things, with the aim to address the edge node off-network belt caused by excessive network capacity. The problems of signal loss and the inability of upper-layer nodes to perceive, the primary information loss caused by the failure of virtual nodes, and the life of the network are also considered. An addition aim was to address the issue of energy waste caused by the transmission power adjustment problem of the Zigbee device itself; that is, energy is lost, and the resulting energy waste of the entire network leads to reduced network life. Finally, this study addressed the problems caused by signal delay, the impact of single node problems on the entire network, and the network’s energy-saving requirements.

2. Technical Selection and Discussion of Technical Defects

Coal is an important energy source in China and plays a pivotal role in the industrial field. However, due to the complexity of the underground environment and the incredibly complex mine structure, coupled with the low level of miners’ education and poor production safety awareness, coal mine accidents have occurred frequently in recent years, causing heavy casualties and economic losses, and affecting economic development and social stability. The importance of mine communication is self-evident. The efficiency of mine communication is related to the efficiency of production and the safety of workers. Most existing mine communication systems are wired communication, via communication cables laid in the tunnel, and then through 485 or CAN buses. There is a delay before the data to be transmitted to the ground monitoring center and, as the coal mine deepens, a large number of cables are laid in the tunnel. After mining is completed, the original cables are discarded, representing wasted investment.
Moreover, in an accident, cables may be damaged, causing the interruption of underground communication, thus making it impossible to locate personnel, which is not conducive to timely rescue. Wireless communication is a new technical research direction. At present, RFID technology is most commonly used. KJ90 and KJ95 are the more mature communication systems using RFID currently available. However, RFID also has high prices, high maintenance costs, poor compatibility, and suffers from the issue of anti-interference. Therefore, the research and development of a wireless mine communication system with a low price, easy maintenance, high reliability, and strong compatibility, and that can be easily expanded and upgraded is currently required. This chapter analyzes this issue. As the focus of analysis, an appropriate technology is selected from the range of technologies currently available. This technology and its drawbacks are analyzed, and improvements are suggested.

2.1. Technology Selection

Based on the above analysis, considering the conditions of the experimental environment, the following issues need to be considered when selecting a wireless network:
  • Node problem: The number of nodes that need to be deployed should be within the control range, and the size of the nodes needs to be small. In a mine environment, little space exists in which to arrange a large number of nodes with large volumes.
  • Data volume problem: The amount of data that needs to be transmitted is small, but the data packet loss rate is low, and the security, authenticity, and real-time delivery of the data need to be guaranteed.
  • Power supply problem: Because follow-up maintenance is troublesome, the battery life must be long.
  • Cost issue: Considering the actual demand, the cost should be reduced. As the area of the mine increases, the number of nodes increases accordingly. If the individual cost is high, the overall cost will be higher, so it is necessary to reduce the individual cost to reduce overall costs.
  • Selection problem: The selected technology must be mature and meet the first four requirements.
According to a collation of relevant data, several currently available mature wireless technologies were selected for comparison. The comparison is shown in Table 1:
The selection of technology must refer to multiple aspects. According to the five requirements, Zigbee technology was selected for the current research. Zigbee technology has a low cost, mature technology, long transmission distance, and low power consumption. Currently, it has mature applications in various fields. Zigbee technology uses ASK, BPSK, and O-QPSK [9], which are modulation technologies for encoding and despreading [10]. These modulation technologies enhance the anti-interference of Zigbee technology, which has low operating difficulty and is portable. The advantages of strong performance and good signal penetration are consistent with the requirements of this article.

2.2. Problems in the Selection of Technology

Zigbee technology is one of the more mature wireless communication technologies currently available, and its applications are extensive, particularly in smart homes. The mine communication environment has particular characteristics. Wireless communication equipment in a mine with suffer varying degrees of interference, and wireless technology also has a number of shortcomings. In the mine communication environment, these technical shortcomings can cause serious communication problems. The article begins with the aspects of modulation technology, networking, and the aspect of the environment to discuss technical defects.

2.2.1. Problems Caused by Modulation Technology

Zigbee technology at 2.4 GHz uses O-QPSK modulation. O-QPSK modulation technology overcomes the problems of signal 180° mutation and phase ambiguity caused by BPSK modulation. In addition, the use of DSSS (Direct Sequence Spread Spectrum) overcomes the problem of weakened anti-interference under ASK modulation. Typical O-QPSK demodulation is based on the same principle as QPSK demodulation. A demodulation method based on feedback timing is often used, but this demodulation scheme has significant problems. In this scheme, the synchronization system’s role is to synchronize the locally generated PN code with the PN code in the received signal, that is, the same frequency and the same phase. The signal received through the wideband filter is correlated with the local PN code in the multiplier, and the device and mobile equipment are calibrated to adjust the voltage-controlled clock source. The PN code generator and the received signal generated by the adjusted local clock are consistent. Once the useful signal is captured, the tracking device is activated to adjust the voltage-controlled clock source. If the synchronization fails due to the random number seed, a new round of sampling and tracking process begins. Therefore, the entire synchronization process includes two steps. The first step is to search for the synchronization head, and the second step is the closed-loop automatic control and adjustment process. This demodulation scheme’s significant disadvantage is that symbol synchronization is complicated when the carrier is not synchronized. Furthermore, carrier synchronization requires symbol synchronization to provide correct clock information. The timing loop delay is considerable, and the signal-to-noise ratio is low.

2.2.2. Problems Caused by Networking Technology

According to the 2.4 GHz Zigbee device parameter display of Texas Instruments (Table 2), there is an upper limit on a Zigbee network’s capacity. Furthermore, the area covered by the wireless communication network is also limited. According to mobile communication theory [11], as the distance to the signal source increases, the signal is weakened; when the maximum distance is reached, the signal is effectively non-existent. When the environment is poor, the signal penetration ability is blocked, the coverage area is reduced compared with a line-of-sight environment; in extreme cases, the decline is significantly weakened. Under the same network capacity, the signal coverage area under a non-line-of-sight environment will be weaker than that under a line-of-sight environment, and the network capacity may not reach its maximum in actual situations. The increase in network capacity is not conducive to the ability of edge nodes. Among the three topologies of Zigbee, the mesh structure that can cover the largest capacity also suffers from the problem that edge nodes are easily broken.
In Zigbee networks, when the network capacity increases, each transmission node’s load also increases. The load of the central node and the transmission node will increase more, but the node’s ability to handle the load is limited, leading to delays in message delivery and signal instability. In severe cases, the collapse of a central node with excessive load will cause the network to collapse. The expansion of network capacity also increases the number of nodes. Nodes at the edge of the coverage area are edge nodes, maybe due to the central source’s distance. Nodes too distance from the network center may lose contact unexpectedly. However, the network may not be able to respond in time or even be unaware of the problem, which is a more significant issue in practice. Furthermore, a larger number of nodes requires route searching and maintenance, causing higher routing expense and produce significant energy loss.

2.2.3. Problems Caused by the Environment

For several reasons, the environment of mine communication is a unique in the context of channel research [12]:
  • The transmission environment is complex: Mine tunnels have narrow spaces with a large number of coal seams, rock walls, soil, etc. There also numerous types of coal mining machinery, which is concentrated due to the narrow tunnels.
  • Significant electromagnetic interference: Coal mining equipment is mostly metallic and is used in large numbers. The unique composition of the roadway wall absorbs part of the electromagnetic wave or forms a multipath fading effect.
  • Other factors: Mine tunnels are not a fixed working environment, and the movement of personnel and machinery also affects the transmission of signals. The excavation of tunnels and subsequent mining directions are carried out randomly, and the direction of extensions is also different. This increases the requirements for the re-coverage of wireless systems.
Based on this discussion, an approximate mine tunnel channel is abstracted, and corresponding measures are taken. Developing this abstract requires further assumptions.

2.2.4. Summary

Based on the above discussion, this study aimed to improve the existing technology from several perspectives:
  • Inherent problems caused by modulation technology;
  • Inherent problems caused by networking technology.

3. Several Measures to Improve Existing Technology

Zigbee technology has a number of shortcomings, which relate mainly to two aspects. In this section, technical improvements are suggested to address these two areas. To better demonstrate the technical route of this section, its content is organized according to the workflow shown in Figure 1:
As shown in the figure above, Section 3.1 explains the construction of a mine-like communication environment, generally using the Rayleigh and Nakagami channels. In this study, the Nakagami channel was chose as the experimental channel. Section 3.2 will briefly explain the theoretical part of the improvement measures against the drawbacks of modulation technology, and the specific implementation will be carried out in Section 4.1; Section 3.3 is the theoretical discussion part for the drawbacks of networking technology, and the specific implementation will be done in Section 4.2 and Section 4.3

3.1. Simulate Mine Tunnel Environment

Mine channels are generally abstracted into the Rayleigh and Nakagami channels. The Rayleigh channel has no direct-sight path component but is accompanied by irregular fading effects. It is generally used as a model of an ideal mine tunnel environment. Previous research [13] notes that the Rayleigh channel is not capable over long distances. In the long-distance mine channel environment, the three-dimensional shape of the roadway is approximately cubic in the open channel environment. If the transmission distance is within 100 m, the electromagnetic wave transmission characteristics of 900, 1800 and 2.45 MHz are approximately in line with the Rician distribution. When obstacles are added and line-of-sight propagation is blocked, as the transmission distance increases, the electromagnetic wave distribution fits the Rayleigh distribution. However, the Rayleigh distribution also has the disadvantage of not being sufficiently flexible. The Nakagami channel was established based on the Rayleigh channel, but can be flexibly changed by changing the value of m, allowing description of the different fading characteristics of multipath signals. The Nakagami-m fading expression is as follows:
pZ z = 2 m m z 2 m 1 Γ m P r m exp mz 2 P r
where P r is the average power, Γ m is the gamma function, and m is the fading parameter. When m = 1 , the above equation degenerates into Rayleigh fading; when m   = K + 1 2 2 K + 1 , the above equation approximates Rayleigh fading with fading parameter K; and m   =   represents no fading. By changing the value of m, the Nakagami model can be transformed into a variety of fading models.

3.2. Discussion on Improvement of the Drawbacks of Modulation Technology

As shown in Figure 2, the classic O-QPSK demodulation scheme uses the principle of two-channel signal modulation. The digital baseband signal is divided into I and Q channels, which are then multiplied by the carrier and added together to obtain the modulated signal. However, realizing the polarity conversion of the signal and the serial-to-parallel conversion to separate the odd and even bits are challenges. Figure 2 shows an O-QPSK demodulation scheme based on feedback timing.
O-QPSK suffers from synchronization problems in the process of carrier recovery and symbol timing during demodulation. To solve this problem, in the traditional feedback timing demodulation scheme [14], a new demodulation scheme is used. The new method separates carrier recovery and symbol timing recovery, prioritizes them, and performs them separately. Carrier recovery and symbol timing recovery are performed separately. Timing recovery is based on the frequency domain nonlinear estimation algorithm to extract timing error information, and symbol positioning adjustment uses error control data interpolation. Figure 3 shows the recovery principle.

3.3. Discussion on Measures against the Disadvantages of Networking Technology

In a large-scale network, edge nodes can be disconnected due to the long distances involved, and disconnection cannot be detected in time by the central node. In this case, most of the network will not be significantly affected, but the disconnection will have an impact in actual situations. The network disconnection mechanism, power control mechanism, and error control protocol are proposed measures to address this phenomenon; however, when there are many nodes, the routing overhead increases significantly and causing unnecessary wastage of energy. In practice, the Zigbee network is used to reduce costs and simultaneously allow long distance use. The improvement of the LEACH protocol was proposed to address this issue, such that edge node breakage does not affect the overall network. However, the fracture of important nodes will cause the collapse of the comprehensive system centered on those nodes. The artificial redundant node and alternative link mechanisms have been proposed to address this problem. These measures are described in detail below, and related implementations are carried out in Section 4.

3.3.1. Network Disconnection Reconnection Mechanism, Power Control Mechanism, and Error Control Protocol

In a large-scale network, edge nodes are at risk of detachment. After edge nodes detach, they become isolated nodes. In actual situations, edge nodes generally serve as end nodes to transmit critical information. The detachment of edge nodes may cause significant information loss. Because isolated nodes must be rejoined to the network, a network disconnection reconnection mechanism is proposed. The process is divided into two main steps: node offline determination and the node access mechanism. In the judgment of offline nodes, if the node sends information to neighboring nodes but does not receive feedback, it is determined that it is offline. The network access mechanism is needed if the node is not in the network (i.e., become an isolated node), and if it is determined that it is an isolated node, network access is started. After the node determines that it is offline, the node’s network layer starts the network access mechanism, that is, sends a network access request to the neighboring node. If the neighboring node sends back the permission request to enter the network, the node sends its related data to the neighboring node. Then, the neighboring node sends the connection information, and the two nodes establish a connection.
The transmission power required for wireless network signal transmission is proportional to the transmission distance [15]. When there are many nodes, a large amount of energy loss occurs in route discovery and route searching. To save the energy of the overall network, a power control mechanism is proposed. The power control mechanism (The schematic diagram is shown in Figure 4) is mainly aimed at remedial measures after the link is interrupted due to the breaking of a node during the networking stage. The transmitting power range of node A is the blue circle range. When node B, the neighbor of A, is damaged, node A’s transmitting power increases to cover the nearest node C in addition to node B.
The impact of the mine environment must be considered. The error control protocol is controlled by the Z-TACK protocol stack, which can reduce the environment’s impact. The error control protocol is divided into a response mechanism and a retransmission mechanism. In the response mechanism, if the response frame is received after the data is sent, it is determined that the data is successfully sent; if the response frame is not received after the data is sent, the retransmission mechanism is started. If the confirmation frame is not returned within the specified Response WaitTime, it will be retransmitted. The number of transmissions of the retransmission mechanism is limited, and generally considered to be three times. If the confirmation frame is still not returned, the node is considered offline, the link is broken, and the link repair mechanism is started.

3.3.2. Improve-LEACH Agreement

Information exchange and transmission between nodes are required. The LEACH algorithm divides several nodes into a cluster group. Each cluster group has a cluster head node. The cluster head node collects the data of all group members and transmits it to the upper level. Then, if the cluster head node fails, the next cluster member is rotated to be the cluster head node. The LEACH protocol amortizes the high energy consumption cost of data transmission to the cluster members and ensures the cluster members’ average life span [16].
The LEACH protocol results in energy loss of the overall network, and causes a significant amount of energy wastage in actual use. An Improved-LEACH protocol is proposed to address this energy waste. The Improved-LEACH protocol changes the automatic cluster head election mode to a manual cluster head election mode. Manual cluster head election is based on the environment and node address, the actual environment, and other factors [17]. The selected cluster head node prolongs its service life accordingly (for example, by using better Zigbee equipment and better quality power). Other cluster nodes in the cluster are ordinary nodes. The ordinary nodes in the cluster are mainly responsible for communicating with each other and passing information to the cluster head node, and the cluster head node is mainly responsible for gathering and sending information and external communication. Ordinary nodes have a lighter task and only need to communicate within the cluster, and do not need to maintain routing information outside the cluster [18]. Cluster head nodes have a heavier task, and need to cache and retain information within the cluster, and cache information for other cluster head nodes. The Improved-LEACH protocol can reduce the network overhead caused by the automatic selection of cluster head nodes and reduce the network energy consumption.

3.3.3. Manual Redundant Node Mechanism and Alternative Link Mechanism

Breaking important nodes will cause significant losses. To address this problem, two measures are proposed: the artificial redundant node and alternative link mechanisms. The artificial redundant node measure places a redundant node beside the full link; the node joins the network only when the link has problems. The schematic diagram is shown in Figure 5.
The arrangement of redundant nodes in the artificial redundant node approach must be based on field detection and actual needs. If there costs are significant, another mechanism can be used, i.e., the alternative link mechanism. The schematic diagram is shown in Figure 6.
A link is placed near virtual nodes, and information in a particular area is routed through specific links. As shown in Figure 6, nodes a and b are routed through letter links, and nodes c and d are routed through digital links. During routing, when information is routed through node A to node B, the information of node A and B is packaged together. When vital link information is routed, the information of the passed node will be packaged together. Nodes c and d are treated similarly. When node B is damaged, node A and node B are broken, and node A temporarily forwards the information to node 1. The central controller can obtain node damage information via the information when parsing the file package for future maintenance.

4. Concrete Realization of Improvement Measures

This section presents the specific implementation of the measures proposed in Section 3. The main components of the implementation, for the improvement of modulation technology, are the realization of the reconnection mechanism of the network, the power control mechanism, and the LEACH improvement protocol.

4.1. The Realization of O-QPSK Modulation Based on Feedforward Timing

To overcome the difficulty of synchronization caused by typical O-QPSK demodulation, the O-QPSK demodulation method based on feedforward timing uses separate carrier recovery and symbol timing recovery. According to the schematic diagram in Section 3, the following specific implementation is carried out.

4.1.1. Symbol Timing Recovery

Figure 7 shows the new demodulation method proposed in this article. The new method also uses 2-channel A/D sampled data but, unlike the traditional method, it feeds the timing error back to the A/D data sample, which then passes through the digital down-conversion matched filter. After carrier recovery, the new method feeds the error back to the digital down-conversion, and then performs data interpolation and data demodulation through matched filtering. The specific implementation flow chart is shown in Figure 8 below.
Timing recovery adopts interpolation timing based on a frequency domain nonlinear estimation algorithm. After two A/D channels sample the baseband signal, it is digitally down-converted, then matched filtered, and subjected to two data amplification sampling processes [19]. The amplified sampled data after matched filtering uses a square loop algorithm for timing error estimation processing, and the processed timing error is used as the error estimation of data interpolation for the different filters for timing completion.
The signal S t after the baseband signal is sampled by two A/D channels is:
S t   =   I   +   Q e j 2 π f c t
where Q and I are two input signals, f c is the carrier frequency offset, and t is the time.
S t takes the real part as:
S t   =   Icos 2 π f c t Qsin 2 π f c t
After raising cosine rolling, the signal s t after the filter is:
s t   =   I t 2   +   Q t 2 cos 2 π f c t   +   φ t
At this time, the signal Q ,   I is a function of time, f c is the carrier frequency deviation, and φ t is the signal phase.
The s t signal is matched and filtered after digital down-conversion, the signal at this time is given by:
r t   =   As t τ e j Δ ω t + θ   +   n t
where n t is the noise signal, ω is the carrier frequency, θ is a uniformly distributed random variable in (0, 2 π ).
After the signal r t is amplified and sampled two times by the data, the signal r k is:
r k   =   r kT N   =   As k   +   n k
In Formula (6), N = 2 .
In the process of modulating the signal, to save the power of the transmission signal, the square loop algorithm is used to directly extract the carrier [20]. The received signal after the square loop contains the carrier frequency component of twice the frequency, and the phase locked loop is used. After extraction, the corresponding signal can be obtained via two frequency divisions. The sampling data amplified two times is extracted through the square loop for the timing error. Figure 9 shows the principle diagram of symbol timing recovery.
r k is squared and transformed into:
r k 2     =   r kT N 2 =   As k 2   +   n k
where s k 2 is:
s k 2   =   s t τ e j Δ ω t + θ 2 =   s t e j Δ ω t + θ 2   +   s t τ e j Δ ω t τ + θ
After passing through the band-pass filter, s t e j Δ ω t + θ 2 is:
s t e j Δ ω t + θ 2   =   I t 2   +   Q t 2 cos 2 π f c t   +   φ t 2 e j Δ ω t + θ 2 = cos 4 π f c t   +   2 φ t e j 2 Δ ω t + θ   =   s T
where T = 2 t .
Therefore s k 2 :
s k 2   =   s T   +   s T τ
The feedback signal is multiplied by the input signal, and the error signal is obtained as:
K m r ki r ko 2
where K m is the system error coefficient, r ki and r ko are the error signals of the two input signals. After simplifying Formula (11), the error signal is obtained through a low-pass filter and a two-frequency divider:
K m r ki r ko sin θ c t
The error signal y t is:
y t   =   K m sin θ c t A s T   +   s T τ   +   n k
In addition, y t is multiplied by its complex form and Fourier transform is used to obtain an error signal estimate. The obtained error signal estimate is used as the timing error. This value is used as the data interpolation timing error and used for symbol timing through the difference filter. The error estimate X m   is:
X m = k   =   mLN m + 1 LN 1 y t y k * t e j 2 π k N
where m is the number of samplings, N is the sampling value, L is the sampling step size, y k *   is the conjugate function of the error signal, and k is an integer.

4.1.2. Carrier Recovery (Carrier Frequency Estimation)

Carrier recovery uses FFT (Fast Fourier Transformation) [21]. FFT quantizes the carrier frequency with limited precision, and performs nonlinear transformation on the signal to eliminate the influence of modulation. The signal s(t) is:
s t   =   I t 2   +   Q t 2 cos 2 π f c t   +   φ t
I t   = sin 2 π f c t   +   φ m t   +   n I
Q t   = cos 2 π f c t   +   φ m t +   n Q
Frequency domain analysis of I t and Q t is:
I k   =   sin 2 π f c k   +   ϕ m   +   Δ ϕ   +   n I
Q k   =   cos 2 π f c k   +   ϕ m   +   Δ ϕ   +   n Q
The FFT carrier frequency difference estimation principle is shown in Figure 10.
For O-QPSK, the output signal after nonlinear transformation is:
I k   +   jQ k   =   F ρ k e jm θ k
I k   =   F ρ k sin m θ k
Q k   =   F ρ k cos m θ k
The twice-sampled data after matched filtering extracts the error in the symbol timing recovery. In the carrier recovery, the carrier frequency offset must be extracted for the lower-level signal modulation and applied to the carrier and timing synchronization; in (18b,c), let F ρ k   =   abs r k ,   ρ k   =   I t 2   +   Q t 2 ,   θ k   =   tan 1 I t Q t , for O-QPSK, m = 4 , so the Fourier change of (18a) can obtain the carrier frequency shift amount as:
Δ f ^   =   K maxR d 4 NS
R d is the symbol rate, K max the location of the maximum peak point, and N   is the number of FFT points.

4.1.3. Carrier Recovery (Carrier Phase Estimation)

The carrier phase estimation uses the Costas loop [22] composed of a phase detector and a loop filter. The schematic diagram of the carrier phase estimation recovery part is shown in Figure 11:
From Figure 11:
Z c k   =   1 2 I k cos Δ ϕ Q k sin Δ ϕ Z S k   =   1 2 I k sin Δ ϕ   +   Q k cos Δ ϕ
The phase detection output is:
Z O   =   sgn Z c k Z S k sgn Z c k   +   1 2 Z S k   +   1 2

4.2. Realization of Reconnection Mechanism and Power Control Mechanism after Network Disconnection

4.2.1. Realization of Network Disconnection and Reconnection Mechanism

Figure 12 shows a schematic diagram of the principle of the disconnected network reconnection mechanism. In the figure, nodes A, B, C, and D are child nodes, nodes, parent nodes, and ancestor nodes, respectively. Node B sends information to node C and then obtains the confirmation information from node C. Assuming that node B goes offline unexpectedly, then node B cannot obtain the confirmation information from node C at this time. Let node B send messages to node C and node A three times. If no confirmation frame is returned on both sides, it is determined that node B is offline; if the confirmation frame from node A is obtained, and the confirmation frame from node C is not obtained, the parent node is offline. The node B increases the power and sends information to the ancestor node D to ensure the smooth transmission of the information. Figure 13 shows a detailed flowchart of this mechanism.

4.2.2. Realization of Power Control Mechanism

The power control mechanism’s realization requires the TXPower register [23] in the Zigbee protocol stack. The specific algorithm realization is shown in Figure 14:
The specific description is as follows:
  • After initialization, considering that the subsequent battery supplement or replacement is not frequent during actual use, the power setting depends on the specific situation. Set the initial power P, and all nodes will send a beacon request frame Associate.request [24].
  • After the node receives the request frame, it will return an Associate.indication confirmation frame, which will contain the node ID and network address.
  • The node sending the request frame checks the returned confirmation frame, and calculates the number of neighboring nodes “NodeNum”.
  • When NodeNum <2, increase the transmission power and continue to send the request Associate.request; when NodeNum >2, reduce the transmission power and continue to send the request Associate.request; when NodeNum = 2, there is only one upstream “neighbor” in the communication range node and a downstream “neighbor” node, and the process ends. When NodeNum = 3, there are 3 “neighbor” nodes in the communication range, node IDs are compared, the two nearest neighbor nodes are selected, and the process ends

4.3. Implementation of LEACH Improved Protocol

In the LEACH protocol application phase, the data of a single node is often associated with the end-user of the sensor network, and the events that occur in the environment require high-level functional data to be described [25]. The Improved-LEACH protocol is changed to select the cluster head manually, and the primary purpose is to reduce the transmission energy of the nodes in the cluster. In the Improved-LEACH protocol, data must be transmitted for all nodes, and the final data will be uploaded to the base station. If the node is elected as a cluster head, the cluster head node must have enough energy to transmit, and each node can use different transmission energy and support different MAC (Media Access Control) protocols; each node forms a local cluster, and through the FCM clustering algorithm, a node is identified as the cluster head [26]. Other non-cluster head nodes transmit their data to the cluster head, and the cluster head receives data from all cluster members and processes the data sent to the base station. If the cluster head selection is sufficient, then cluster head nodes consume more energy than non-cluster head nodes, so cluster head nodes will quickly consume their limited energy. Once the cluster head’s energy is lower than the communication capability threshold, it no longer operates, and all cluster nodes lose communication capability. Therefore, in the Improved-LEACH protocol, a random selection of high-energy sensor nodes is introduced as the cluster head of the cluster to avoid the rapid loss of any sensor node’s capacity in the wireless network. In the Improved-LEACH protocol algorithm, the selection of cluster head nodes is divided into different rounds. At the beginning of each round, a new cluster is formed, and then data is transmitted from the node to the cluster head, and the cluster enters a stable state.
The basic principle of the Improved-LEACH protocol is as follows: For the data to be analyzed, the user determines a–c and then divides the data into c categories, and the center position of each category is marked by the cluster center. Such an initial division requires repeated correction of the cluster center to the optimal position through the FCM algorithm [27]. A function represents the distance from any data point to the corresponding cluster center. This function is minimized based on this iteration until the weighted sum of the distances from each type of data point to its corresponding cluster center reaches the minimum. The iteration ends when the data is successfully divided into category c by the FCM algorithm [28].
The Improved-LEACH protocol selects the cluster head and the formation process of the cluster as follows:
(1)
Initialization: Set the number of clusters c, 2 ≤ c ≤ n; set the iteration stop threshold to ε, initialize the cluster center P(0), and the iteration counter b = 0.
(2)
The new classification matrix U is obtained by the following formula:
μ ik   =   1 j = 1 c d ik d jk 1 m 1
(3)
The classified cluster center pi is obtained by the following formula:
p i = k = 1 n μ ik m x k k = 1 n μ ik m
If ‖P(b + 1) − P‖ < ε, the algorithm ends, and the cluster center P is selected and becomes the cluster head node. At this point, each cluster in the network has a different node, and each cluster has a unique identifier; otherwise, let b = b + 1 and jump to step (2).
In the first round of the algorithm, the system pre-specifies the optimal number of cluster heads c and uses the FCM algorithm to divide the entire wireless network into c cluster areas. Each node is divided into one of the cluster areas. The weighted sum of the distances from the class node to its corresponding cluster head is the smallest. In the wireless network’s life cycle, the cluster class structure is fixed; once the cluster class identifier of each node is given, it will not change until the node fails. In the next round, the algorithm starts, with the exception of the cluster head of the previous round. In addition to nodes, other ordinary nodes in the cluster need to report their own energy value, Ecur. In the previous round, the cluster head node selects the node with the highest Ecur value and uses this node as a new cluster head node, and other nodes become ordinary nodes. If several nodes in the cluster class have the same Ecur value and are all the largest, then the cluster head node is selected according to the ID size of these nodes. After the cluster head node is selected, the node will allocate communication time slots for each common node according to the number of nodes in the cluster class and then broadcast the message to other nodes using the CSMA (Carrier Sense Multiple Access)/MAC protocol. Ordinary nodes must keep their receivers listening to the cluster head node’s broadcast at this stage.
In the Improved-LEACH protocol algorithm, the single-hop communication mode is used. The advantage of adopting the single-hop communication mode is that ordinary nodes do not need to monitor at all times and only need to send data to the cluster head in the TDMA (Time Division Multiple Access) time slot allocated to them, and then enter the sleep state, thus saving energy. When communicating between clusters, the single-hop communication mode is used, which reduces the number of long-distance communications with base station nodes and can save energy.
W n 2   =   span V n 1 , 1 x , V n 1 , 2 x , V n 1 , 2 n 2 x

5. Simulation and Performance Comparison of Improvement Measures

The article uses the Nakagami analog channel to describe the channel environment of the mine tunnel. The article’s background is based on installing suitable wireless equipment on the hydraulic supports in the mine environment. In the simulated environment schematic diagram, the equipment is placed on hydraulic supports for receiving and transmitting. The general schematic diagram is shown in Figure 15.
The simulation experiment adopted a similar arrangement, and the idea of simulating the channel is as follows [29]:
The modulated random signal passes through the ln 1 port, passes the Rayleigh fadingchannel, and then passes the Rayleigh sampling sequence to convert the complex signal into amplitude and phase angle. The amplitude of the sequence is passed through the unbuffer module. The unbuffer module parameter to overlap = 0 [30]. Finally, a uniformly distributed random sequence and a Nakagami random sequence are sequentially generated through function transformation, and finally the output signal is normalized and the Nakagami distribution is regularized to the required power value through the gain module [31]. Then, the amplitude and phase angle input are converted into Nakagami’s complex signal output, and then output by the Out1 output port.
The Zigbee device chip adopts CC2530, which meets the IEEE802.15.4 standard, and has the characteristics of high integration, low power consumption, low cost, and low rated voltage. The chip has a powerful integrated development environment, and the development difficulty is low [32]. The protocol stack is configured inside the chip, which results in low energy consumption generated during the work process.

5.1. O-QPSK Performance Test Based on Feedforward Timing

According to the previous section, three device boards and one Zigbee device form a small network. This small network is called a cluster. The coverage area of the cluster is about 10 m or less. A cluster group is tentatively set for 10 m. In each cluster, the group is connected to a ZigBee device, which acts as a coordinator and is connected to the upper computer. The schematic diagram is shown in Figure 16, with the experimental device placed in the experimental environment.
The number and type of equipment used is fixed. When the number is large, it may have an individual impact on the single experimental equipment. Therefore, a small amount of equipment was used temporarily for observation. To simulate the environment, a noise signal was superimposed on the input signal to simulate a mine environment. Then, MATLAB was used to detect the fluctuation of the data and intensity test, and observe the signal waveform. The input signal was stable, and the noise channel was superimposed to show a messy signal performance, as shown in Figure 17. After the channel conditions were stabilized, the waveform continued to show a messy signal performance, as shown in Figure 17. Thus, the other characteristics of the signal must be observed.
As shown in Figure 18a–c, the baseband signal sent by the information source is a stable signal with energy concentrated around 0 Hz. The signal and power performance of the upper and lower branches are similar to those of the baseband signal. The baseband signal is modulated and sent; whether the modulation changes the performance and or affects the subsequently received signal requires further observation.
As shown in Figure 19a–c, the demodulated signal is consistent with the baseband signal, and the power is concentrated at 0 Hz, which is the same as that of the original baseband signal. It can be considered that the signal is undamaged and not affected by channel interference. Although this method involves some complication, it ensures that the demodulated signal’s properties remain unchanged. Furthermore, the performance is not compromised, which proves that the method is relatively successful.
According to the verification of simulation experiments, the signal’s demodulation process is relatively smooth, and the demodulated signal is the same as the original signal, indicating that the demodulation method based on feedforward timing is more successful in the application of O-QPSK. However, it can be seen from the eye diagram (As shown in Figure 20) that noise interferes with Zigbee devices; the symbols are overlapped, and although the “eye” type is open and closed, it is small. This indicates crosstalk between the symbols, although its impact is weak and mainly affected by noise. Thus, attention should be paid to the influence of noise when making adjustments.

5.2. Verification of Improvement Measures in the Case of Multiple Devices

The simulation experiment under multiple devices requires the support of the conclusion of the O-QPSK simulation experiment based on feedforward timing, and the device initialization is first required. The device is chaotic during initialization but tends to stabilize over time, as shown in Figure 21.
After the network nodes are stable, several measures proposed in the article are used for comparison. The regional parameters were first set, as shown in Table 3.
First, a network health test must be conducted. A previous article proposed the disconnection mechanism, the power control mechanism, and the error control protocol to address the problem of node disconnection. The artificial redundant node and alternative link mechanisms were proposed for crucial and essential nodes. However, during the test, it is necessary to observe the changes in the total number of network nodes for evaluation. According to the settings, the broken node sends a message to the adjacent node to confirm that it is offline. However, if the node is not off the network due to damage, it can initiate a reconnection request, and the transmission chain of the node that is offline due to damage will temporarily route the message to another transmission link. The console can obtain information about whether the node is on the network through the node ID and node network address. Table 4 shows the data table of changes in the number of nodes.
According to the experimental data, all of the nodes spent about 35 min on the network. Initially, due to equipment initialization and other reasons, the network construction was slow. After the test started, the network comprised only five nodes for approximately 100 min. According to the investigation, this was due to external reasons on site (accidental disconnection caused by the drop). The device was relatively stable and there was no disconnection.
Table 5 shows the signal delay detection. Detecting the degree of network signal delay can also provide a measure of the health of the network. In the experiment, any 10 nodes were selected for testing. To minimize the error, the average delay was calculated through multiple tests. The aim was to reduce the impact of large errors for each detection. According to the data in the table, the signal delay was not obvious during the time period of the simulation experiment and was relatively stable.
Figure 22 shows the signal strength coverage detection. It can be seen from the figure that the signal was relatively strong within 100 m, significantly weakened within 100–150 m (although a weak signal was present), and almost no signal was present beyond 150 m.
The Improved-LEACH protocol was mainly aimed at network energy saving, thus reducing unnecessary waste in the process of route discovery and route searching. However, it also improves the delay problem in the signal transmission process, that is, the reduction of signal transmission time, as shown in Figure 23. To improve the performance of the nodes under the LEACH protocol, the number of nodes in the experiment was 100, and the area was selected to be 100 m2 to manually set obstacle areas. The nodes were randomly arranged, and the life of the network was reflected by the death of the first node and half of the nodes in the network. The experiment was cycled by counting the number of rounds of network cluster establishment when the first node died, when half of the nodes died, and when all of the nodes died. According to the initial settings, the initial energy of the node was 0.05 J. The network life cycle comparison when the number of cluster heads in the algorithm was 2, 3, 4, 5 and 6 is shown in Table 6:
It can be seen from Table 6 that the life cycle of the wireless network is longest when the number of cluster heads is 5. Table 7 shows the number of rounds experienced using different algorithms when the number of nodes die:
The first column contains the name of each protocol, and the first row contains the number of node deaths. Table 7 shows that the Improved-LEACH protocol performs well when the number of nodes in each stage dies. Observing the delay test under the LEACH improved protocol, it can be seen that the Improved-LEACH protocol reduces the signal delay problem. In addition, when the transmit power is increased, the packet loss rate is significantly reduced, and it is possible to communicate information over a longer distance. Compared with the LEACH protocol, the Improved-LEACH protocol provides limited alleviation of the delay and packet loss problems. Specific data are shown in Table 8, Table 9, Table 10 and Table 11 below.

6. Conclusions

This study was undertaken in the context of underground mines. The current article introduces the communication conditions of underground mines and notes that the mine environment is complicated, thus, the mine communication environment is severe. Zigbee technology was selected from the currently available mature communication technologies. Although Zigbee technology is more mature, it has a number of disadvantages. The article focuses on addressing the disadvantages arising from the technical modulation technology itself and those due to the networking technology. Aiming at the drawbacks of modulation technology, an improvement measure was proposed. According to the simulation verification in Section 5, the improved O-QPSK modulation method performs well, addresses the difficulty of synchronization caused by the original modulation technology, and provides a more accurate solution. Excluding the original data, the shape and performance are not changed. Although the process is more cumbersome, it has higher security and significantly improved adaptability. It is suitable for the communication environment outlined in this article, and can be particularly used for signal transmission under non-line-of-sight conditions. Five mechanisms and an improved protocol were proposed to address the disadvantages of networking technology. In large-scale networking, which is often carried out in practice, the network is affected by the layout. For example, this article noted that Zigbee large-scale networks are affected by multipath and fading effects in mines. These have a significant impact on the network. Thus, four mechanisms were proposed, in addition to one protocol and an improved protocol. Among these, for node disconnection, a network reconnection mechanism was proposed. The power control mechanism and error control protocol provide response and temporary remedial measures after the edge node goes offline, whereas the artificial redundant node and alternative link mechanisms provide important remedial measures for node collapse or disconnection. The Improved-LEACH protocol addresses the problem of reducing the energy expenditure of the overall network. After analyzing the mine communication environment, the approximate Nakagami channel was proposed as a simulation experiment environment. In the simulation experiment, the number of nodes, signal delay, signal strength, and packet loss rate were tested. The experimental results prove that the proposed measures can achieve the expected effect, effectively enhancing the health of the network and better adapting to the harsh communication environment of underground mines.

Author Contributions

Conceptualization, Z.L., Q.Z. and Y.Y.; methodology, Z.L.; software, Y.W.; validation, Z.L., Y.Y. and Y.W.; formal analysis, Q.Z., Y.Y.; investigation, Y.Y.; resources, Z.L., Q.Z.; data curation, Y.W.; writing—original draft preparation, Z.L.; writing—review and editing, Z.L.; visualization, Y.Y.; supervision, Y.W.; project administration, Z.D.; funding acquisition, Z.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Key R & D plan of Shandong Province, China, grant number 2019GGX104048; the Ministry of Education of China, grant numbers IRT_16R45; the Key R & D plan of Shandong Province, China, grant number 2019SDZY01; open fund project of National Key Laboratory for mine disaster prevention and control, grant number MDPC201713.

Data Availability Statement

Data is contained within the article or supplementary material. The data presented in this study are available in this article.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, and in the decision to publish the results.

References

  1. Li, Y.T.; Li, M.G.; Zhu, H.; Hu, E.Y.; Tang, C.Q.; Li, P.; You, S.Z. Development and applications of rescue robots for explosion accidents in coal mines. J. Field Robot. 2019, 37, 466–489. [Google Scholar] [CrossRef]
  2. Alper, A.M. Using wireless underground sensor networks for mine and miner safety. Wirel. Netw. 2018, 24, 17–26. [Google Scholar]
  3. Lino, M.; Leao, E.; Soares, A.; Montez, C.; Vasques, F.; Moraes, R. Dynamic Reconfiguration of Cluster-Tree Wireless Sensor Networks to Handle Communication Overloads in Disaster-Related Situations. Sensors 2020, 20, 4707. [Google Scholar] [CrossRef] [PubMed]
  4. Hu, Q.S.; Cheng, Y.; Li, B.H.; Wang, Y.J.; Li, S.Y. Directional mobile charging method for mine Internet of things. IET Commun. 2019, 13, 3285–3293. [Google Scholar] [CrossRef]
  5. Murphy, J.N.; Parkinson, H.E. Underground mine communication. Proc. IEEE 1978, 66, 26–50. [Google Scholar] [CrossRef]
  6. Changsen, Z.; Pengyong, D.; Jingtao, X. Design of mine personnel positioning system based on ZigBee technology. Ind. Mine Autom. 2008, 2, 48–50. [Google Scholar]
  7. Jiao, S.; Song, D.; Zhang, Q.; Tang, J. Coal mine monitoring system based on ZigBee wireless sensor network. J. Electron. Meas. Instrum. 2013, 5, 436–442. [Google Scholar] [CrossRef]
  8. Hwang, H.; Jang, S.; Lee, S.; Jung, Y. Advanced ZigBee Baseband Processor with Variable Data Rates for Internet-of-things Applications. J. Semicond. Technol. Sci. 2017, 17, 56–64. [Google Scholar] [CrossRef] [Green Version]
  9. Zhang, G.Y.; Shi, C.Y.; Han, C.Z.; Li, X.W.; Wang, D.; Rabie, K.; Rupak, K. Implementation-Friendly and Energy-Efficient Symbol-by-Symbol Detection Scheme for IEEE 802.15.4 O-QPSK Receivers. IEEE Access 2020, 8, 158402–158415. [Google Scholar] [CrossRef]
  10. Baronti, P.; Pillai, P.; Chook, V. Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards. Comput. Commun. 2007, 30, 1655–1695. [Google Scholar] [CrossRef]
  11. Leinonen, M.E.; Jokinen, M.; Tervo, N.m.; Kursu, O.; Parssinen, A. System EVM Characterization and Coverage Area Estimation of 5G Directive mmW Links. IEEE Trans. Microw. Theory Tech. 2019, 67, 5282–5295. [Google Scholar] [CrossRef] [Green Version]
  12. Jin, F.; Zhan, K.; Lv, X.; Liu, X.; Zhang, Y.S. Mutli-Radio Rapid Handover Technology in Underground Mine Wireless Communication Networks. In Proceedings of the 2019 11th International Conference on Wireless Communications and Signal Processing (WCSP), Xi’an, China, 23–25 October 2019. [Google Scholar]
  13. Al-Juboori, S.; Fernando, X. Characterizing a Decorrelator for Selection Combining Receivers in Nakagami-m Fading Channels. Aeu-Int. J. Electron. Commun. 2019, 106, 12–19. [Google Scholar] [CrossRef]
  14. Shi, C.Y.; Zhang, G.Y.; Han, C.Z.; Ji, B.F.; Xie, P. A Non-coherent Detection Scheme of O-QPSK Receiver for Perfect-communication Establishment in Blockchain Technology. In Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Guilin, China, 17–19 October 2019; pp. 249–252. [Google Scholar]
  15. Wu, H. Research on the Coverage and Capacity of Heterogeneous Cooperative Wireless Networks. Master’s Thesis, Beijing University of Posts and Telecommunications, Beijing, China, 2018. [Google Scholar]
  16. Al-Zubaidi, A.S.; Mahmmod, B.M.; Abdulhussain, S.H.; Al-Jumaeily, D. Re-evaluation of the Stable Improved LEACH Routing Protocol for Wireless Sensor Network. In Proceedings of the International Conference on Information and Communication Technology, Baghdad, Iraq, 15–16 April 2019. [Google Scholar]
  17. Radhika, M.; Sivakumar, P. Energy optimized micro genetic algorithm based LEACH protocol for WSN. Wirel. Netw. 2020, 1–14. [Google Scholar] [CrossRef]
  18. Yousaf, A.; Ahmad, F.; Hamid, S.; Khan, F. Performance Comparison of Various LEACH Protocols in Wireless Sensor Networks. In Proceedings of the 2019 IEEE 15th International Colloquium on Signal Processing & Its Applications, Penang, Malaysia, 8–9 March 2019; pp. 108–113. [Google Scholar]
  19. Wei, D.Y.; Yang, W.W.; Li, Y.M. Lattices sampling and sampling rate conversion of multidimensional bandlimited signals in the linear canonical transform domain. J. Frankl. Inst.-Eng. Appl. Math. 2019, 356, 7571–7607. [Google Scholar] [CrossRef]
  20. Jing, L. Improved square loop design based on CORDIC algorithm. Electron. Des. Eng. 2016, 17, 93–95. [Google Scholar]
  21. Gao, J.D.; Jiang, Q.Y.; Pei, J. Real time implementation of digital signal FFT transform in the receiver of the WFEM. Chin. J. Geophys.-Chin. Ed. 2019, 62, 3819–3826. [Google Scholar]
  22. Kuznetsov, N.V.; Blagov, M.V.; Kudryashova, E.V.; Ladvanszky, J.; Yuldashev, M.V.; Yuldashev, R. Non-linear analysis of a modified QPSK Costas loop. Ifac Pap. 2019, 52, 31–35. [Google Scholar] [CrossRef]
  23. Mraz, L.; Cervenka, V.; Komosny, D.; Simek, M. Comprehensive Performance Analysis of ZigBee Technology Based on Real Measurements. Wirel. Pers. Commun. 2013, 71, 2783–2803. [Google Scholar] [CrossRef]
  24. Hanafy, M.A.; Ali, H.S.; Shaalan, A.A. Rakeness with block sparse Bayesian learning for efficient ZigBee-based EEG telemonitoring. Int. J. Commun. Syst. 2020, 33, e4219. [Google Scholar] [CrossRef]
  25. Cui, X.; Huang, X.H.; Ma, Y.; Meng, Q.K. A Load Balancing Routing Mechanism Based on SDWSN in Smart City. Electronics 2019, 8, 273. [Google Scholar] [CrossRef] [Green Version]
  26. Manuel, A.J.; Deverajan, G.G.; Patan, R.; Gandomi, A.H. Optimization of Routing-Based Clustering Approaches in Wireless Sensor Network: Review and Open Research Issues. Electronics 2020, 9, 1630. [Google Scholar] [CrossRef]
  27. Mohammed, A.; Mohammed, A.; Tat-Chee, W. Variants of the Low-Energy Adaptive Clustering Hierarchy Protocol: Survey, Issues and Challenges. Electronics 2018, 7, 136. [Google Scholar]
  28. Young, P.S.; Yeol, Y.D.; TaeHyeon, K. An Energy Efficient Enhanced Dual-Fuzzy Logic Routing Protocol for Monitoring Activities of the Elderly Using Body Sensor Networks. Electronics 2020, 9, 723. [Google Scholar]
  29. Ji, B.F.; Li, Y.Q.; Chen, S.D.; Han, C.Z.; Li, C.G.; Wen, H. Secrecy Outage Analysis of UAV Assisted Relay and Antenna Selection for Cognitive Network Under Nakagami-m Channel. IEEE Trans. Cogn. Commun. Netw. 2020, 6, 904–914. [Google Scholar] [CrossRef]
  30. Cai, Z.; Shi, M.; Hu, S.; Wang, Z. A 2.4 GHz 2.9 mW Zigbee RF Receiver with Current-Reusing and Function-Reused Mixing Techniques. Electronics 2020, 9, 697. [Google Scholar] [CrossRef]
  31. Calvo, I.; Barambones, O.; Chouza, A.; Abrahams, S.; Beckers, G.; Slechten, D.; Velasco, J. Building Wireless Control Applications with XBee and LabVIEW. Appl. Sci. 2019, 9, 2379. [Google Scholar] [CrossRef] [Green Version]
  32. Zhang, W.; Yu, X.; Li, Z. Design of wireless network sensor nodes based on CC2530 and ZigBee protocol stack. Comput. Syst. Appl. 2011, 2011, 184–187. [Google Scholar]
Figure 1. The main work of the article.
Figure 1. The main work of the article.
Electronics 10 00171 g001
Figure 2. O-QPSK modulation diagram.
Figure 2. O-QPSK modulation diagram.
Electronics 10 00171 g002
Figure 3. Schematic diagram.
Figure 3. Schematic diagram.
Electronics 10 00171 g003
Figure 4. Power control mechanism.
Figure 4. Power control mechanism.
Electronics 10 00171 g004
Figure 5. Artificial redundant node mechanism.
Figure 5. Artificial redundant node mechanism.
Electronics 10 00171 g005
Figure 6. The alternative link mechanism.
Figure 6. The alternative link mechanism.
Electronics 10 00171 g006
Figure 7. Schematic diagram.
Figure 7. Schematic diagram.
Electronics 10 00171 g007
Figure 8. Flow chart.
Figure 8. Flow chart.
Electronics 10 00171 g008
Figure 9. Schematic diagram of symbol timing recovery.
Figure 9. Schematic diagram of symbol timing recovery.
Electronics 10 00171 g009
Figure 10. FFT carrier frequency error estimation principle diagram.
Figure 10. FFT carrier frequency error estimation principle diagram.
Electronics 10 00171 g010
Figure 11. Carrier phase estimation principle diagram.
Figure 11. Carrier phase estimation principle diagram.
Electronics 10 00171 g011
Figure 12. Schematic diagram of nodes.
Figure 12. Schematic diagram of nodes.
Electronics 10 00171 g012
Figure 13. Schematic diagram of the disconnected network reconnection mechanism.
Figure 13. Schematic diagram of the disconnected network reconnection mechanism.
Electronics 10 00171 g013
Figure 14. Implementation diagram of power control protocol.
Figure 14. Implementation diagram of power control protocol.
Electronics 10 00171 g014
Figure 15. Schematic.
Figure 15. Schematic.
Electronics 10 00171 g015
Figure 16. Schematic diagram of simulation equipment test.
Figure 16. Schematic diagram of simulation equipment test.
Electronics 10 00171 g016
Figure 17. Signal performance diagram.
Figure 17. Signal performance diagram.
Electronics 10 00171 g017
Figure 18. Signal performance diagram. (a) Time domain surface plot and power spectrum plot of baseband signal and carrier signal; (b) The time-domain waveform and power spectrum of the baseband signal of the upper and lower branches; (c) Time-domain waveform and power spectrum of the frequency band signal of the upper and lower branches.
Figure 18. Signal performance diagram. (a) Time domain surface plot and power spectrum plot of baseband signal and carrier signal; (b) The time-domain waveform and power spectrum of the baseband signal of the upper and lower branches; (c) Time-domain waveform and power spectrum of the frequency band signal of the upper and lower branches.
Electronics 10 00171 g018aElectronics 10 00171 g018b
Figure 19. Signal performance diagram. (a) The time—domain performance diagram of the upper branch signal and the time domain performance diagram after the multiplier, low—pass filter and sampling decision; (b) The time—domain performance diagram of the lower branch signal and the time—domain performance diagram after the multiplier, low—pass filter and sampling decision; (c) Time domain waveform and power spectrum of baseband signal and demodulation signal.
Figure 19. Signal performance diagram. (a) The time—domain performance diagram of the upper branch signal and the time domain performance diagram after the multiplier, low—pass filter and sampling decision; (b) The time—domain performance diagram of the lower branch signal and the time—domain performance diagram after the multiplier, low—pass filter and sampling decision; (c) Time domain waveform and power spectrum of baseband signal and demodulation signal.
Electronics 10 00171 g019
Figure 20. Eye diagram.
Figure 20. Eye diagram.
Electronics 10 00171 g020
Figure 21. Schematic diagram of nodes tending to stabilize. (a) Initialization; (b) after time has elapsed; (c) stable state.
Figure 21. Schematic diagram of nodes tending to stabilize. (a) Initialization; (b) after time has elapsed; (c) stable state.
Electronics 10 00171 g021
Figure 22. Signal strength vs. distance graph.
Figure 22. Signal strength vs. distance graph.
Electronics 10 00171 g022
Figure 23. Improved nodes under the LEACH protocol.
Figure 23. Improved nodes under the LEACH protocol.
Electronics 10 00171 g023
Table 1. Comparison of several wireless technologies.
Table 1. Comparison of several wireless technologies.
Wireless TechnologyPros and Cons
GPSGlobal all-weather positioning, positioning accuracy is easily affected by weather, electromagnetic waves, obstacles, etc.
ZigbeeLow cost, long transmission distance, extensive data collection workload, and low accuracy.
RFIDHigh accuracy, low cost, not suitable for long-distance positioning.
UWBHigh precision and high cost.
BDSWide application, mature technology, reduced indoor accuracy
Table 2. Partial data of Zigbee equipment.
Table 2. Partial data of Zigbee equipment.
Frequency Range2.41–2.48 GHz
Receiving sensitivity−94 dBm
Network capacityMaximum 255
Coverage10–75 m, some maximum150 m
Operating temperature−20–65 °C
Number of connectable devices254
Transmission rate250 Kb/s, peak information speed is 720 Kb/s
Table 3. Parameter setting.
Table 3. Parameter setting.
Key ParametersValue
Area size100 m2
Number of nodes100
Free space model ε f s = 10   pJ/bit·m2
Node initial energy0.5 J
Transmitting and receiving circuit loss E e l e c = 50   nJ/bit
Data fusion processing loss50 nJ/bit
Table 4. Number of nodes.
Table 4. Number of nodes.
Observation TimeNumber of Nodes
00
20 min54
40 min100
60 min100
80 min100
100 min95
120 min100
140 min100
160 min100
180 min100
200 min100
Table 5. Signal delay detection.
Table 5. Signal delay detection.
Number of NodesTesting Frequency (Times)Average Delay (ms)
10 (0 min)300
10 (20 min)303.222
10 (40 min)303.545
10 (60 min)304.023
10 (80 min)303.654
Table 6. Network life cycle comparison.
Table 6. Network life cycle comparison.
Number of Cluster Heads150%100%
22570265
355126320
450157367
590212388
665172320
Table 7. The number of rounds experienced when the number of nodes die.
Table 7. The number of rounds experienced when the number of nodes die.
020406080100
LEACH1102012854026321115
LEACH-C110246300400580905
SEP110180270420420870
Improve-LEACH10030061061010951170
Table 8. Average signal delay under the LEACH protocol.
Table 8. Average signal delay under the LEACH protocol.
Number of NodesTesting Frequency (Times)Average Delay (ms)
1504.656
505076.226
10050267.535
Table 9. Improved average signal delay under the LEACH protocol.
Table 9. Improved average signal delay under the LEACH protocol.
Number of NodesTesting Frequency (Times)Average Delay (ms)
1503.124
505056.442
10050167.486
Table 10. Packet loss rate test (LEACH protocol).
Table 10. Packet loss rate test (LEACH protocol).
Transmit PowerDistance (m)
103050758590100120
1 dBm000.33.24.533.456.465.5
−1.5 dBm001.335.513.445.267.478.8
−3 dBm004.338.719.359.578.488.8
−6 dBm005.4210.434.371.389.999.1
−10 dBm00.448.6418.745.683.297.8100
−14 dBm02.4514.345.388.994.3100100
−25 dBm05.4424.565.493.1100100100
Table 11. Packet loss rate test (Improved-LEACH protocol).
Table 11. Packet loss rate test (Improved-LEACH protocol).
Transmit PowerDistance (m)
103050758590100120
1 dBm0001.23.523.545.654.4
−1.5 dBm001.34.310.434.554.576.4
−3 dBm002.15.618.545.359.886.4
−6 dBm003.47.521.357.669.395.5
−10 dBm00.345.410.432.376.795.5100
−14 dBm01.4410.430.478.590.4100100
−25 dBm0.41.5418.445.487.5100100100
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Liu, Z.; Wang, Y.; Zeng, Q.; Yang, Y.; Dai, Z. Research on Optimization Measures of Zigbee Network Connection in an Imitated Mine Fading Channel. Electronics 2021, 10, 171. https://doi.org/10.3390/electronics10020171

AMA Style

Liu Z, Wang Y, Zeng Q, Yang Y, Dai Z. Research on Optimization Measures of Zigbee Network Connection in an Imitated Mine Fading Channel. Electronics. 2021; 10(2):171. https://doi.org/10.3390/electronics10020171

Chicago/Turabian Style

Liu, Zhihai, Yuxuan Wang, Qingliang Zeng, Yang Yang, and Zhenrui Dai. 2021. "Research on Optimization Measures of Zigbee Network Connection in an Imitated Mine Fading Channel" Electronics 10, no. 2: 171. https://doi.org/10.3390/electronics10020171

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop