Next Article in Journal
Initial Testing of Robotic Exoskeleton Hand Device for Stroke Rehabilitation
Next Article in Special Issue
Unmanned Aerial Vehicle Assisted Post-Disaster Communication Coverage Optimization Based on Internet of Things Big Data Analysis
Previous Article in Journal
Performance of a Double RIS Communication System Aided by Partially Active Elements
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Fasys: Visible-Light-Based Communication and Positioning Services towards Smart Cities

1
School of Information Science and Engineering, Shenyang Ligong University, Shenyang 110158, China
2
Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen 518055, China
3
School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
4
Hangzhou Institute of Advanced Technology, Hangzhou 310056, China
5
Institute of Intelligent Communications and Network Security, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(14), 6340; https://doi.org/10.3390/s23146340
Submission received: 29 May 2023 / Revised: 30 June 2023 / Accepted: 7 July 2023 / Published: 12 July 2023
(This article belongs to the Special Issue Recent Advances in IoT Big Data Analytics towards Smart Cities)

Abstract

:
Visible-light-based transmission application plays an important role in various types of sensor services for the Internet of Things (IoTs). However, in big data scenarios, current visible-light-based systems cannot achieve concurrent high-speed communication, low-speed communication, and positioning. Therefore, in this article, we propose a smart visible-light-based fusion applications system, named Fasys, to solve the above problem for the big data traffic with heterogeneity. Specifically, for low-speed data services, we propose a novel linear block coding and bit interleaving mechanism, which enhances the LED positioning accuracy and recovers the lost data bits in the interframe gap (IFG). For high-speed data services with traffic possessing burstiness, an elegant statistical reliability analysis framework in regard to latency is proposed based on martingale theory. The backlog martingale process is constructed. Leveraging stopping time theory, a tight upper bound of unreliability is obtained. An arrival abstraction and traffic allocation scheme is designed, which contributes to decouple the reliability requirement as the maximum supportable arrival load. Finally, we implement our Fasys system, and extensive experimental results show that our system can achieve consistent high-precision positioning and low-BER data communication for low-speed data services. And the proposed martingale-based traffic allocation scheme can achieve the provisioning of reliability in regard to the latency for high-speed data services.

1. Introduction

Both smart cities and smart homes derived from the Internet of Things (IoTs) are popularized in people’s lives. Modern people are willing to spend 80% to 90% of their daily time in indoor spaces for activities [1,2], which produce multi-modal data, e.g., GPS data, image data, video data, and audio data. High-speed Internet surfing and colorful machine-to-machine interconnections (low-speed) have become rich application requirements. The networks are expected to embrace the massive data traffic with heterogeneous characteristics. For example, you can control the smart router to download 1080 P videos at high speed or play a TV show in real time. You can also control the smart switch to adjust low-data sensor-based devices for entertainment, movie, and sleep modes [3,4,5]. Big data scenarios challenge the current network architectures and network ability.
For indoor low-speed data services, the IoTs can interconnect and control intelligent applications through single-point contacts, such as positioning services, warehousing and transportation monitoring, and intelligent-based home furnishings. Although the wireless medium transmission has low costs and easy deployment advantages, there are problems, such as electromagnetic interference and resource shortages. Visible light communication (VLC) by ceiling LEDs can overcome the above issues and is an effective solution [6,7].
For indoor high-speed data services, traffic with high peak data rates frequently features latency and reliability requirements, such as the voice and video services in the eMBB scenario [8]. The reliability in regard to latency is a statistical quality of service (QoS) index, which indicates the probability of system latency within a threshold. Under the strict reliability requirements constraint, the traffic possessing bursty random characteristics and high data rates desires an amazingly large bandwidth, which challenges the insufficient underlying resources [9]. VLC is expected to be one of the supplements to relieve the tension of radio frequency (RF) resources.
We show the visible-light-based system applications for communication and positioning, as shown in Figure 1. The network data in the access network are broadcast at high speed through the LEDs, and the laptops or other devices receive the data through the high-response photodiode. The LEDs transmit a low-data sensor acquisition index or location coordinate landmark to achieve effective interaction among smart devices.
However, the visible-light-based application system still has the following problems:
(1)
For indoor low-speed data services, the system finds it difficult to extract distinguishable positioning landmark features without affecting communication performance when the visible-light-based system tries to achieve positioning and communication simultaneously, and the lost data bits in the interframe gap (IFG) have an effect on the system performance [10,11].
(2)
For indoor high-speed data services, a precise analysis framework of reliability in regard to latency is the crux for reasonable resource allocation, which should reveal the relationships among traffic characteristics, network abilities, and reliability requirements. The existing theoretical methods, such as stochastic network calculus and the effective bandwidth, appear to have mathematical barriers. For traffic with burstiness, these frameworks only provide loose upper bounds of unreliability in regard to latency [12,13]. It could trigger resource waste when theoretical results guide the reliability provisioning.
Here, in this paper, we design and implement a novel visible-light-based fusion application system, named the Fasys, to solve the above problems and achieve effective communication and positioning services. Specifically, when the LED is used to transmit low-speed communication data and positioning landmarks we find a robust linear mapping relationship between the data transmission rate and the width of the bright and dark stripes in the LED contour sub-maps. We only need to capture one complete sequence header instead of two sequence headers to recognize a specific LED. We also propose a linear block coding and bit interleaving mechanism. We encode the transmitted communication data according to the Hamming 7 , 4 rule and obtain codewords named Hamming blocks. We perform the above mechanisms on the fixed number of Hamming blocks, which decreases the system’s image processing overhead and decreases the interframe gap. For service traffic with high data rates and burstiness, VLC is considered to provide great assistance for the RF link to guarantee reliability. A precise analysis method of reliability in regard to latency is proposed based on martingale theory. A backlog martingale process for the bursty traffic is constructed and the complex parameters are captured. Leveraging stopping time theory, a tight upper bound of unreliability is derived. Based on the theoretical result, the abstracted arrivals are determined for the RF link and the VLC link, i.e., the maximum arrival rates each link can support. An effective traffic allocation scheme is designed to achieve the provisioning of reliability in regard to latency.
In summary, our contributions are summarized as follows:
  • We first design and implement a visible-light-based fusion applications system, Fasys, which can achieve concurrent communication and positioning fusion services.
  • For the low-speed data services, we propose the novel linear block coding and bit interleaving mechanism, which enhances the LED positioning accuracy and recovers the lost data bits in the IFG.
  • For the high-speed data services, an elegant reliability evaluation framework is proposed based on martingale construction for the traffic with burstiness. An upper bound of unreliability in regard to latency is obtained to guide the design of a traffic allocation scheme, which facilitates to decouple the statistical reliability requirement as the maximum arrival load the link can carry.
  • We evaluate the effectiveness of the Fasys system via extensive experiments, and the results show that our Fasys system can achieve centimeter-level positioning accuracy and a K b p s communication rate for the low-speed data services. Meanwhile, the martingale-based traffic allocation scheme can provision the reliability requirement for the bursty traffic. The theoretical result we derive of the unreliability in regard to latency is precise.

2. The Communication and Positioning for Low-Speed Data Applications

In this section, we describe the low-speed data services, including the visible light positioning and the low-speed data visible light communication.

2.1. Visible-Light-Based Positioning

For the visible-light-based positioning part, it is important to design the LED’s mapping mechanism between the transmitter and the receiver to recognize the LED landmark accurately.
Compared with previous visible light positioning solutions, we do not use modulation and driving circuits to control each LED to transmit a unique identification code. Instead, we seek to extract distinguishable positioning landmark features from visible light signals (communication data) to set the mapping mechanism between the transmitter and the receiver.
Through extensive experiments, we found that when the transmitted data sequence period changes at a fixed frequency in the transmitter, the light and dark stripe widths are stable changes at captured LED sub-maps in the receiver. We use this robust linear mapping mechanism to transmit the positioning landmark and low-speed communication data. First, we ensure that the data communication frequencies { f 1 , f 2 , , f n , } are between 200 Hz and 8 KHz to avoid human eyes perceiving flickers. For the different LEDs { L E D 1 , L E D 2 , , L E D n , } , we assign a unique transmission frequency for each LED, so that the receiver can capture different sequence header widths { W 1 , W 2 , , W n , } in the received LED sub-maps. Then, for the assigned transmission frequencies, we ensure that each received sequence header width W i , i = 1 , 2 , 3 , between captured LED sub-maps does not overlap. The detailed frequency design for the mapping mechanism is shown in Table 1. Finally, we use the different sequence header widths to match LED transmission frequencies and recognize specific LED landmarks rather than using the decoding LED sequence method.
Through the above mapping mechanism, we only need to match the width values of the captured sequence headers with the benchmark width values in the database to recognize the specific LEDs. It means that we can use the frequency of the transmission communication data to represent the LED landmarks, which does not have an effect on serving the communication data content.

2.2. Low-Speed Visible-Light-Based Communication

For the visible-light-based communication part, it is important to design a robust coding and error correction mechanism to solve the data loss problem in the interframe gap at the receiver.
Compared with previous visible light communication solutions, we do not consecutively transmit each communication data packet twice, which achieves a low BER by decreasing the communication data rate. Instead, we seek to transmit each data packet only once and design reasonable coding and error correction mechanisms to recover the lost data in the IFG. The communication data packet formats from our predecessor and our own proposal are shown in Figure 2a,b respectively.
We use the linear block coding and bit interleaving scheme to encode communication packets. First, we convert the communication data into ASCII codes and use the (7,4) Hamming coding rule to encode the converted ASCII codes, as shown in Figure 3a. Since linear block coding can only correct the one-bit errors, we then perform the bit interleaving on the transformed linear block coding, in order to spread possible errors to different Hamming blocks. Finally, we use the Manchester encoding rule to encode the transformed bit interleaving codes again, for example, the “1010” bits are converted the “10011001” bits, as shown in Figure 3b. For the decoding process at the receiver, we first insert some random codes between any two consecutive frames. Then, we perform Manchester decoding and bit de-interleaving on the current data, which disperses possible bit errors into different Hamming blocks. Finally, we use the (7,4) Hamming code to restore the received communication data.
In addition, the number of Hamming blocks determines the error correction performance of the communication transmission. We need to configure a reasonable number of Hamming blocks in the encoded data. The number of Hamming blocks is affected by (1) the amount of data lost in the interframe gap and (2) the packet capacity. According to the rolling shutter effect, the number of scanning lines L b used to receive data bits on the image sensor is as follows:
L b = ( L f × f ) / R b
where L f is the number of scan lines per frame, R b is the data rate, and f is the frame rate. The data capacity N b p f per frame can be calculated as follows:
N b p f = L f / L b = R b / f
Please note that, in order to achieve consistent visible light positioning and visible light communication, we need to ensure that the data packet capacity is as close as possible to the data capacity per frame. The specific constraint relationship is N b p b < N b p f . N b p b is the communication data packet capacity.
Through the linear block coding and bit interleaving mechanism, we only need to transmit the communication data packets once to realize the consistent transmission for low-speed visible light communication and visible light positioning.

3. The Reliability Provisioning for High-Speed Data Applications

In this section, we describe the high-speed data services. We assume that these kinds of applications possess statistical latency and reliability requirements. The reliability in regard to latency is called latency-bounded reliability in this paper. For the data traffic with latency-bounded reliability requirements, we design a traffic allocation scheme in a VLC/radio frequency (RF) heterogeneous network (HetNet). The VLC network is used to aid the traffic offloading for the RF network.

3.1. The Network Model and the Queuing System

An indoor downlink HetNet scenario is shown in Figure 4. The access network for the target user equipment (UE) consists of one RF access point (AP) and one VLC AP. The data traffic delivered to the target UE is split into two flows transmitted on the RF link and the VLC link, respectively. The edge software defined network (SDN) controllers could provide traffic allocation decisions.
The orthogonal frequency division multiple access (OFDMA) scheme is adopted in the RF network. The bandwidth of each RB is W R F . h r ( t ) denotes the channel gain and p r ( t ) is the transmission power assigned to the UE on a resource block (RB) at time slot t. We use α to denote the RB allocation factor. α is the number of RBs that are allocated to the target UE and is a random variable obeying a specifical independent identical distribution (i.i.d.). Therefore, the achievable transmission rate of UE at time slot t is
R R F ( t ) = α W R F log 2 ( 1 + p r × h r ( t ) σ R F 2 ) [ b i t s / s ]
where σ R F 2 is the noise power.
In the HetNet, we consider the light of sight (LoS) VLC link between the VLC AP and the UE. Then, the channel gain can be modeled as
h v = ( b + 1 ) A p 2 π d 2 cos b ( φ i r ) g o f f ( φ i n ) cos ( φ i n )
where b is the Lambertian index, and b = 1 / log 2 ( cos ( ϑ 1 / 2 ) ) . ϑ 1 / 2 is the half-intensity radiation angle. A p is the photodiode (PD) area. d is the distance between AP i and UE m. g o f is the gain of optical filter. φ i n and φ i r are the angle of incidence and irradiance between the VLC AP and the UE, respectively. f ( φ i n ) is the optical concentrator gain, which is a function of φ i n
f ( φ i n ) = r 2 sin 2 ( Θ ) , 0 φ i n Θ 0 , φ i n > Θ
where r is the refractive index, and Θ is the semi-angle of the field of view (FoV) of the PD. According to [14], the electronic transmission power p v e ( t ) and optical transmission power p v o ( t ) when an ACO-OFDM scheme is used satisfy p v e ( t ) = π ( p v o ( t ) ) 2 , where π is the responsivity of the PD. The achievable transmission rate for the UE, which is defined as R V L C ( t ) , can be given as
R V L C ( t ) = W V L C log 2 1 + ρ 2 p v e × h v 2 σ V L C 2 [ b i t s / s ]
where W V L C is the system bandwidth, and ρ is the optical to electrical (O/E) conversion factor. σ V L C 2 is the noise power.
The RF link and VLC link are modeled as two queuing systems. Since latency is often defined from the perspective of packets, the arrival rate and service rates are sampled in the units of packets/slots instead of bits/s. { a R F ( t ) , t 0 } and { a V L C ( t ) , t 0 } denote the arrival processes of the two links, respectively. a l ( t ) , l { R F , V L C } is the number of arrival packets at slot t. s l ( t ) , l { R F , V L C } is the number of served packets in corresponding links at slot t. s l ( t ) = f R l ( t ) g , where f (s/slot) is the duration of a slot and g (bits/packet) is the length of a packet. R l ( t ) { R R F ( t ) , R V L C ( t ) } is the achievable transmission rate of the RF link or the VLC link. To maintain the stability of the queuing system, E [ a l ( t ) ] E [ s l ( t ) ] . The accumulated arrival process { A l ( m , n ) , 0 m n } and the accumulated service process { S l ( m , n ) , 0 m n } from time slot m to n are driven as A l ( m , n ) = k = m n a l ( k ) and S l ( m , n ) = k = m n s l ( k ) , respectively. The total number of data packets delivered to the target UE is A ( m , n ) = A R F ( m , n ) + A V L C ( m , n ) . Based on stochastic network calculus (SNC) theory, the departure process D l ( 0 , n ) can be characterized by A l ( 0 , n ) and S l ( 0 , n ) .
D l ( 0 , n ) = A l S l ( 0 , n ) = inf 0 k n { A l ( 0 , k ) + S l ( k , n ) }
where the processes of arrival, service, and departure are connected by the (min, +) convolution. Based on the queuing theory, the backlog process Q l ( t ) of link l , l { R F , V L C } in the buffer is defined as
Q l ( t ) = sup 0 m t { A l ( m , t ) S l ( m , t ) }
And the latency of link l , l { R F , V L C } at time slot t is given as
W l ( t ) = min { k 0 | A l ( 0 , t k ) D l ( 0 , t ) }
The statistical latency-bounded reliability requirement includes two metrics: the latency threshold W max and the bound of unreliability ζ . The traffic allocation pattern is adopted in this paper. The arrival flows allocated to the RF link and VLC link should both be provisioned reliably. That is, W l ( t ) , l { R F , V L C } should converge to its stationary distribution, which means that the latency is required to ensure P { W l ( t ) W max } ζ .
The traffic load that each link can carry depends on the corresponding channel state and the access scheme. The determination of the ideal traffic load needs the precise analysis of the link latency-bounded reliability. We define link latency-bounded reliability as the probability that the link latency does not exceed the predefined latency threshold W l max , a lower bound of which is denoted as R E l ( W l max , a l ( t ) , s l ( t ) ) , l { R F , V L C } . It is a function of the latency threshold, the characteristics of the arrival process { a l ( t ) , t 0 } , and the characteristics of the service process { s l ( t ) , t 0 } . We analyze R E l ( W l max , a l ( t ) , s l ( t ) ) leveraging martingale theory, which contributes to describe the randomness of the queue length (the difference of the arrival process and the service process). In the martingale domain, the inequalities in regard to martingales support the unreliability analysis naturally. We can obtain an elegant closed form of R E l ( W l max , a l ( t ) , s l ( t ) ) , l { R F , V L C } , finally.
The analysis procedure of the link latency-bounded reliability can be concluded as follows: (1) The backlog process Q l ( t ) is constructed as an exponent martingale, which is denoted as M l L ( t ) = f l ( t ; a l ( t ) , s l ( t ) ) . M l L ( t ) is the function of Q l ( t ) ; (2) We focus on a special event S W about link latency, i.e., S W = { W l ( t ) W l max } ; (3) By applying stopping time theory to M l L ( t ) , the probability of stopping time event occurrence, P { S W } , can be derived. That is, 1 R E l ( W l max , a l ( t ) , s l ( t ) ) is obtained ( P { S W } 1 R E l ( W l max , a l ( t ) , s l ( t ) ) ).
In the traffic allocation phase, for the traffic flow allocated to link l { R F , V L C } , the reliability requirement should be met, i.e., R E l ( W l max , a l ( t ) , s l ( t ) ) = 1 ζ . Based on the theoretical result we derived, the ideal traffic load of each link can be determined.
Next, the novel martingale analysis method of the link latency performance, the arrival abstraction, and the traffic allocation scheme are introduced.

3.2. The Martingale-Based Link Latency-Bounded Reliability

Some definitions about martingales are presented first.
Definition 1.
(Martingales): The discrete time stochastic sequence { X ( t ) , t 0 } is a martingale with respect to another sequence { Y ( t ) , t 0 } if the following applies for t 0 :   
(a) 
E [ | X ( t ) | ] < ;
(b) 
E [ X ( t + 1 ) | Y ( 0 ) , Y ( 1 ) , , Y ( t ) ] = X ( t ) .
We model the generation process of data packets in the target UE as a Markov-modulated random process to describe the bursty characteristics. Thus, the traffic flows allocated to the two links are also depicted as the same processes, merely with different arrival parameters. In the following, a backlog martingale for the backlog process of each link is constructed.
Definition 2.
(Backlog martingale). Let { Z l ( t ) , t 0 } , l { R F , V L C } be a Markov process with the state space T l = { 0 , 1 } and the transition matrix is Φ l . f l : S R + is a deterministic function. The arrival a l ( t ) = f l ( Z l ( t ) ) = R l m a x Z l ( t ) . R l m a x is the maximum peak arrival rate that link l can support. The service process is { s l ( t ) , t 0 } . For θ l * , j l , and γ l , there is a process { M l L ( t ) , t 0 } about { Q l ( t ) , t 0 } ,
M l L ( t ) = V l a ( z l ( t ) ) V l s ( s l ( t ) ) e θ * [ A l ( m , t ) S l ( m , t ) ]
which is constructed as a martingale process. Then, { M l L ( t ) , t 0 } is called a backlog martingale. The parameter θ * is defined as
θ * = sup { θ > 0 : s p ( Φ l θ ) E [ e θ s l ( t ) ] = 1 }
where s p ( x ) is the spectral radius of x . Φ l θ is defined as a θ transform for Φ l . If ( x ) i , j is the element of x , then ( Φ l θ ) i , j = ( Φ l ) i , j e θ f l ( Z l ( t + 1 ) ) . V l a is the corresponding eigenvector of s p ( Φ l θ ) . V l a ( z l ( t ) ) is the ( z l ( t ) ) th element of V l a . V l s ( s l ( t ) ) is a specifical function of service process { s l ( t ) , t 0 } .
The proof of why Equation (10) is a martingale process relies on the definition of martingales.
Proof. 
Due to the stability assumption, E [ M l L ( t ) ] = E [ | M l L ( t ) | ] < obviously holds. And then Equation (12) can be derived. (12a) holds because the arrival and service processes are independent, and { a l ( t ) , t 0 } , l { R F , V L C } is the Markov-modulated random process. (12b) relies on the definition of conditional expectation and features of i.i.d. service processes. (12c) is from the definition of Φ l θ . The relation between s p ( Φ l θ ) and V l a supports (12d) to (12e). Leveraging the defined θ * , the last step (12f) is finished. Thus, E [ M l L ( t + 1 ) | Q l ( 0 ) , Q l ( 1 ) , , Q l ( t ) ] = M l L ( t ) holds. The proof is completed.
E [ M l L ( t + 1 ) | Q l ( 0 ) , Q l ( 1 ) , , Q l ( t ) ] = E [ V l a ( z l ( t + 1 ) ) V l s ( s l ( t + 1 ) ) e θ * [ A l ( m , t + 1 ) S l ( m , t + 1 ) ] | Q l ( t ) ] = E [ V l a ( z l ( t + 1 ) ) e θ * A l ( m , t + 1 ) | z l ( t ) ] E [ V l s ( s l ( t + 1 ) ) e θ * S l ( m , t + 1 ) | s l ( t ) ] ( 12 a ) = e θ * A l ( m , t ) z l ( t + 1 ) T l V l a ( z l ( t + 1 ) ) e θ * f l ( z l ( t + 1 ) ) P { z l ( t + 1 ) | z l ( t ) } V l s ( s l ( t ) ) e θ * S l ( m , t ) E [ e θ * s l ( t ) ] ( 12 b ) = z l ( t ) = i , z l ( t + 1 ) = j V l s ( s l ( t ) ) e θ * [ A l ( m , t ) s l ( t + 1 ) ] E [ e θ * s l ( t ) ] j T l V l a ( j ) ( Φ l θ ) i , j ( 12 c ) = V l s ( s l ( t ) ) e θ * [ A l ( m , t ) s l ( t + 1 ) ] E [ e θ * s l ( t ) ] ( Φ l θ V l a ) ( i ) ( 12 d ) = V l s ( s l ( t ) ) e θ * [ A l ( m , t ) s l ( t + 1 ) ] E [ e θ * s l ( t ) ] s p ( Φ l θ ) V l a ( z l ( t ) ) ( 12 e ) = M l L ( t ) ( 12 f )
R l m a x is called the abstracted arrival. The abstracted arrival is a measure of the traffic load that each link can carry, considering the stochastic characteristics of the traffic flow and the service scheme of link l. The determination of R l m a x relies on evaluating the link latency performance precisely. Based on the backlog martingale, we can yield the bound of backlog overflow probability via stopping time theory in the martingale domain. The backlog overflow probability is given by Theorem 1.    □
Theorem 1.
Consider a queuing system corresponding to the backlog martingale as Definition 2. The following bound of backlog overflow probability holds for any backlog threshold η l 0
P { Q l ( t ) η l } E [ V l a ( z l ( 0 ) ) ] E [ V l s ( s l ( 0 ) ) ] H e θ * η l
where
H = min { V l a ( z l ( t ) ) V l s ( s l ( t ) ) : a l ( t ) s l ( t ) > 0 }
Proof. 
The proof of Theorem 1 is based on stopping time theory. A stopping time event about { Q l ( t ) , t 0 } is defined as S L = { Q l ( t ) η l } . Then, the first time that S L occurs is the stopping time of the backlog martingale { M l L ( t ) , t 0 } , which is written as
N L = inf { t > 0 : A l ( 0 , t ) S l ( 0 , t ) η l }
According to the stopping time theory of martingales, we have E [ M l L ( 0 ) ] = E [ M l L ( t N L ) ] , where t N L = min { t , N L } . Thus, it can be derived that
E [ M l L ( 0 ) ] = E [ V l a ( z l ( 0 ) ) V l s ( s l ( 0 ) ) ] = E [ V l a ( z l ( t N L ) ) V l s ( s l ( t N L ) ) × e θ * [ A l ( 0 , t N L ) S l ( 0 , t N L ) ] ] E [ V l a ( z l ( N L ) ) V l s ( s l ( N L ) ) × e θ * [ A l ( 0 , N L ) S l ( 0 , N L ) ] 1 { N L t } ] H e θ * η l P { N L t }
By minimizing N L , a l ( N L ) s l ( N L ) > 0 and E [ V l a ( z l ( N L ) ) V l s ( s l ( N L ) ) > H hold. It is possible that P { N L } = P { Q l ( t ) η l } . The proof is completed when N L .
Based on the bound of backlog overflow probability, the bound of link latency-bounded unreliability is derived in Theorem 2.    □
Theorem 2.
In the case of Theorem 1, the following bound of latency W l ( t ) holds for
P { W l ( t ) W l max } E [ V l a ( z l ( 0 ) ) ] E [ V l s ( s l ( 0 ) ) ] H e θ * W l max ln s p ( Φ l θ * ) θ *
Proof. 
P { W l ( t ) W l max } = P { A l ( 0 , t W l max ) D l ( 0 , t ) } P { A l ( 0 , t W l max ) inf 0 m t { A l ( 0 , m ) + S l ( m , t ) } } P { sup 0 m t W l max t { A l ( m , t W l max ) S l ( m , t ) } 0 } = P { sup 0 m t W l max t { A l ( m , t W l max ) S l ( m , t ) + ( t W l max m ) ln E [ e θ * s l ( t ) ] 1 ln s p ( Φ l θ * ) θ * } ln s p ( Φ l θ * ) θ * W l max }
The last step relies on the definition of θ * . ln E [ e θ * s l ( t ) ] 1 ln s p ( Φ l θ * ) = 0 holds. Based on the time shift feature of martingales, it is obvious that
M l L s ( t ) = V l a ( z l ( t W l max ) ) V l s ( s l ( t ) ) e θ * [ A l ( m , t W l max ) S l ( m , t ) ]
is also a martingale process. To complete the latency analysis, the stopping time event S W = { W l ( t ) W l max } can be transformed into
  
S W = { A l ( m , t W l max ) S l ( m , t ) + ( t W l max m ) ln E [ e θ * s l ( t ) ] 1 ln s p ( Φ l θ * ) θ * ln s p ( Φ l θ * ) θ * W l max }
Then, the first time slot that S W occurs in is defined as the stopping time N W .
N W = inf { t > 0 : A l ( m , t W l max ) S l ( m , t ) + ( t W l max m ) ln E [ e θ * s l ( t ) ] 1 ln s p ( Φ l θ * ) θ * ln s p ( Φ l θ * ) θ * W l max }
Renting the stopping time theory for the martingale process M l L s ( t ) , we can derive that
E [ M l L s ( 0 ) ] = E [ V l a ( z l ( 0 ) ) V l s ( s l ( 0 ) ) ] H e θ * ln s p ( Φ l θ * ) θ * W l max P { N W t }
The parameter H is defined as (14). When N W , we can obtain P { W l ( t ) W l max } = P { N W } as Theorem 2. Thus, we obtain the latency-bounded reliability of link l , l { R F , V L C } , which is derived as
R E l ( W l max , a l ( t ) , s l ( t ) ) = 1 E [ V l a ( z l ( 0 ) ) ] E [ V l s ( s l ( 0 ) ) ] H e θ * W l max ln s p ( Φ l θ * ) θ *
   □

3.3. The Arrival Abstraction and Traffic Allocation Scheme

Based on the derived bound of link unreliability in regard to latency, we designed Algorithm 1 to achieve the arrival abstraction and the traffic allocation. The process is summarized in Figure 5. The input of the algorithm includes the arrival model, the service model of each link, and the corresponding model parameters. For the total arrival traffic { a ( t ) , t 0 } , the peak arrival rate is denoted as R m a x . The backlog process and the latency process are described by accumulated arrival and accumulated service processes. In the martingale domain, the arrival-related martingale parameter ln s p ( Φ l θ ) and the service-related martingale parameter E [ e θ s l ( t ) ] should be determined. Accordingly, the martingale parameter θ * is obtained. We construct the backlog martingale for the backlog process. Relying on the stopping time theory, the upper bound of the unreliability in regard to link latency is derived. Using this theoretical analysis result, the abstracted arrival of each link, R l max is captured under the constraint of the latency-bounded reliability requirement. Finally, the traffic allocation decision is made according to the ratio of R R F max and R V L C max . Unfortunately, the closed-form solution of abstracted arrival is unable to be obtained. Therefore, search algorithms, such as the binary search algorithm, can be adapted to obtain R l max , as is shown in Algorithm 1.
Algorithm 1 Arrival Abstraction for the RF and VLC links
1:
Input: The transition matrix Φ l . The latency threshold W max . The unreliability requirement ζ . The maximum tolerance t o l A A . The model parameters of the RF link, α , W R F , h r ( t ) , p r , σ R F 2 . The model parameters of the VLC link, ρ , W V L C , h v , p v e , σ V L C 2 .
2:
According to the characteristics of arrival and service processes, determine the martingale parameters V l a ( z l ( t ) ) , V l s ( s l ( t ) ) , θ * , respectively. Construct the backlog martingale process { M l L ( t ) , t 0 } .
3:
Derive the link latency-bounded unreliability as shown in (17).
4:
while  | ζ E [ V l a ( z l ( 0 ) ) ] E [ V l s ( s l ( 0 ) ) ] H e θ * W l max ln s p ( Φ l θ * ) θ * | t o l A A do
5:
    Record the abstracted arrival R R F max and R V L C max .
6:
end while
7:
Output: the abstracted arrival R R F max and R V L C max .

4. Discussion

In this section, we evaluate our Fasys system through extensive experiments, for low-speed communication, positioning, and high-speed communication applications. In the low-speed communication and positioning application, we use the Cree XLamp CXA1512 as the LED for the transmitter, which can provide 900–1200 lm. Meanwhile, we use the STM32F407ZGT6 series microcontroller and IRF520 module as the system driving circuit. For the receiver, we use the google pixel smartphone to capture LED images, under 64,000–92,500 ns exposure times. The vertical distance between the LED and the smartphone is 0.8–1.1 m. In the high-speed communication application, we use Matlab to test the system performance, and all of the software parameters for high-speed services are shown in Table 2.
We use the image decoding rate, positioning success rate, and latency-bounded unreliability to test the system performance. The positioning success rate indicates the ratio of the number of captured images that can be successfully positioned to the total number of captured images. The image decoding rate indicates the ratio of the number of images decoded by all LEDs in the image to the total number of captured images. Please note that the captured image can contain 1–3 LEDs; we only need to recognize one LED to achieve positioning, but one LED does not mean that the image decoding rate in the captured image is 100%. For low-speed positioning and communication services, we use the ratio of the number of bits correctly decoded in captured images to the total number of bits transmitted by the transmitter to calculate the system BER. For high-speed communication services, the latency-bounded unreliability of the target UE is simulated to verify the effectiveness of the proposed arrival abstraction and traffic allocation scheme. The link latency-bounded unreliability is measured by the proportion of time slots in which the corresponding latency threshold is violated.

4.1. Visible-Light-Based Positioning and Low-Speed Communication

We test the positioning success rate and image decoding rate to test the visible-light-based positioning and low-speed communication stability and consistency. The test selects 5 × 5 positioning points from the positioning area centered on three LEDs. The positioning success rate and image decoding rate results are shown in Figure 6. From Figure 6, we can find that the data bit recognition rate in the image data for the positioning and communication is higher than 90%, and the positioning success rate is 100%. This shows that our system can stably provide low-rate visible light communication and high-recognition-rate landmark decoding.
We use the cumulative distribution function (CDF) to describe the positioning part in the low-speed service. The system receiver is placed in 100 random positions in the positioning area, and each position can capture at least one complete LED. The positioning accuracy results are shown in Figure 7. From Figure 7, we can find that, in the 100 sample data, 90% of the positioning error results are always less than 7.5 cm, which shows that our proposed positioning part can achieve centimeter-level positioning effects.
In addition, we use the BER to test the communication part in the low-speed service. Note that our communication transmission scheme only transmits each data packet once. We transmit 100,000 random bits under different SNR conditions, and the results are shown in Figure 8. From Figure 8 that we can find that our scheme has a lower data BER than the traditional communication scheme, which shows that the low-speed communication part can provide a good communication performance. Meanwhile, we only need to transmit each data packet once, which means that our transmission rate is higher than that of the traditional scheme.
In Figure 9, we show the impact of the number of the different Hamming blocks on the low-speed communication performance. From Figure 9 we can find that, when the number of Hamming blocks increases, the low-speed communication system has the lower BER. The number of the Hamming blocks shows that the bit interleaving mechanism can recover the lost data bits in the IFG effectively.

4.2. The Arrival Abstraction and Traffic Allocation Scheme for High-Speed Communication

We show the numerical results and analyze the performance of the proposed traffic allocation scheme.
The effectiveness of the proposed arrival abstraction and traffic allocation algorithm is illustrated firstly. We simulate an RF link and a VLC link. The RF AP and the VLC AP are located at the (0, 0, 2.5) coordinate point. The UE is at the (1, 1, 0.5) coordinate point. The path loss of the RF link is modeled as 31.5 + 35 * l o g ( D r ) , where D r is the distance between the RF AP and the UE. The RB allocation factor α follows a poisson distribution with average λ . Two queuing systems are constructed to describe the packets’ transmission processes, respectively. The arrival traffic is generated by the MMOO model. For a special MMOO arrival traffic with peak rate R m a x , the arrival abstraction and traffic allocation algorithm is performed. And the corresponding data flows that two links should deliver are determined. We record the latency of each system. Because two independent links are used, for each slot, if the latency of any link exceeds the threshold, this slot is labeled as a violated slot. The averages of the unreliability are shown as a histogram in Figure 10. The unreliability requirement ζ can be guaranteed when the latency threshold is relaxed (5 slots to 10 slots). A stricter latency threshold means that more bandwidth resources should be provisioned so that the identical reliability requirement can be met. Based on the current link configuration, the guarantee of the reliability requirement for the MMOO arrival traffic is unachievable if the latency threshold is less than four slots.
However, using only a single link could make the reliability guarantee more terrible, as is shown in Figure 11. We simulate the link latency-bounded unreliability correspondingly on the case that the RF link or the VLC link delivers the traffic individually, where the green box-plots represent the results that the RF link only used and the blue box-plots otherwise. It shows that the reliability requirement can not be met in either case. Adopting only one link is incompetent. The system load is 0.4 (measured as the ratio of the average arrival rate to the average service rate), which implies that the system is light-load. However, the burstiness of the MMOO arrival traffic makes the two links unable to provision the reliability, even though the average service rate is up to 10 packets/slot. Meanwhile, the randomness of the service process in the RF link, which results from the RB allocation factor, causes the link latency-bounded unreliability to worsen. The service process of the VLC link can be modeled as a constant rate process. Thus, reducing the randomness of the service process as much as possible is the crux for the latency-bounded reliability provisioning.
The impact of the randomness in the service process on the abstracted arrival is analyzed and the results are shown in Figure 12. The abstracted arrival is the maximum peak rate that one link can support under the constraint of the latency-bounded reliability requirement if the arrival traffic is modeled as an MMOO process. When the service rates are constant, i.e., corresponding to the VLC link, the system could carry a greater arrival load than the random service process. Meanwhile, the reliability is also higher, as is shown in Figure 11. When the latency threshold is tight (one slot to four slots), the abstracted arrival is more sensitive to the randomness of service.

5. Related Work

In this section, we introduce the closest work for visible-light-based communication and positioning.

5.1. Visible-Light-Based Communication

In 2000, Tanaka et al. [15] proposed to use a white LED to build a wireless optical communication system for the first time, which creates a precedent for using an LED as a communication device. In 2003, the Visible Light Communication Consortium [16] was established in Japan, and the research on visible light communication gradually attracted the attention of scholars. In 2011, IEEE 802.15.7 [17] set the standards for short-distance wireless optical communication using visible light, including the specific design standardization for the data link layer and physical layer. The VLC has gained momentum as a great aid for the RF networks to provision the reliable delivery of various services. A link section strategy in hybrid VLC/RF networks was investigated in [18]. The non-asymptotic data backlog and delay violation probability bounds were obtained for the proposed three link usage strategies. The guarantee of statistical reliability in regard to latency is a bottleneck for the VLC network configuration and deployment, which need a precise reliability analysis framework as guidance.
Queuing theory is the basic method to analyze the latency performance, which can only provide the average results of latency [19,20]. Stochastic network calculus (SNC) is an important mathematical framework in terms of latency probabilistic bounds analysis. SNC contributes many fundamental concepts and operations, such as the definitions of departure, backlog, latency processes, and (min, +) convolutions. In [21], the upper bound of the unreliability in regard to latency was derived, where union bound inequality was adopted. It estimates an upper bound of the event probability, which facilitates the conversion of the (min, +) convolutions into the univariate convolution in classical algebra. Unfortunately, as the key enabler of latency performance analysis based on SNC, union bound inequality could induce a loose delay bound [22]. Effective bandwidth (EB) and effective capacity (EC) theories are adopted to analyze the latency performance widely. However, the assumption of constant fluid [12] and the usage of the union bound are drawbacks of this framework, which induce the derived bound of delay violation probability to be loose. For the bursty traffic, the bandwidth demands could be overestimated. As a powerful mathematical method, martingale theory is envisioned to present a more precise analysis result of latency performance. Researchers have testified that the bound of delay violation probability based on martingales improves the state-of-the-art bound by several orders of magnitude [23].
The research team in [22,23,24] was devoted to evaluating latency performance based on martingale theory. They proposed a modularity method to derive the upper bound of unreliability in regard to latency by a suitable exponential martingale transform of arrival and service processes. The authors in [25,26] expanded the martingale analysis framework in multi-hop vehicular ad hoc networks and the computation offloading scenario so that the system latency can be analyzed precisely. A differentiated ALOHA random access algorithm was proposed in [13], in which the energy efficiency maximization problem was formulated with the martingale-based delay violation probability bound constraints. In [27], a tight bound of delay violation probability for aggregate traffic was derived by leveraging supermartingale theory. These remarkable works guide our research.

5.2. Visible-Light-Based Positioning

Rahman et al. [28] proposed a binocular vision positioning system, which uses multi-LED image sensors at different imaging positions and the relative positions between different image sensors to obtain the information required for triangulation and then calculates the position of the receiver. Kim et al. [29] proposed the use of different colored LEDs to realize an indoor visible light positioning system. The system uses different colors to mark the world coordinate position, the receiver is two computer cameras, and the system calculates the receiver position through the images’ geometric relationship. Kuo et al. [30] proposed using solid-state lighting equipment and smartphone cameras to achieve accurate indoor positioning. They use the CMOS camera in the commercial smartphone to take LED images, and use the improved AOA algorithm for positioning, which solves the problem of using multiple image sensors. Hassan et al. [31] conducted research on the indoor positioning system based on visible light LEDs, and discussed and compared the existing visible light positioning systems. Meanwhile, they showed several new research, implementation, commercialization, and standardization directions for the future development of visible light positioning technology. Keskin et al. [32] used a distance estimation algorithm based on Time of Arrival (TOA) and Received Signal Strength (RSS) to estimate the effect of the sampling rate on the positioning error and proposed a distance estimation algorithm to improve the theoretical limit of positioning error for the synchronous and asynchronous visible light positioning systems. Rátosi et al. [33] proposed the dynamic visible light indoor positioning system, which can position and track moving objects. The under-sampling scheme provides high-frequency flicker-free operation for the landmark and uses cameras to capture image streams to estimate moving objects in real time. Yazar et al. [34] proposed a pulse optimization design method based on light-emitting diodes (LEDs) as transmitters. This method quantifies the positioning accuracy by the Cramér-Rao lower limit (CRLB) and studies the problem of maximizing the positioning performance of asynchronous and synchronous visible light positioning systems, which can reduce energy consumption by about 45% or improve positioning accuracy by 25%.

6. Conclusions

In this paper, for the big data applications with heterogeneous requirements, we have implemented a visible-light-based fusion application system, named Fasys, which can achieve high-speed and low-speed communication and high-precision positioning services, simultaneously. First, we proposed a linear block coding and bit interleaving mechanism for the low-speed data services, which enhances the LED positioning accuracy and recovers the lost data bits in the IFG. Then, we proposed an arrival abstraction and traffic allocation scheme for the high-speed data services in the VLC/RF HetNet. A precise analysis framework of reliability in regard to latency was constructed based on martingale theory. Finally, we evaluated our system performance, and the results show that the Fasys system can achieve consistent centimeter-level positioning and low-BER data communication. The obtained upper bound of the reliability in regard to latency is tight, and the traffic allocation algorithm can provide the reliability provisioning reasonably.

Author Contributions

Conceptualization, B.Y. and X.L.; methodology, L.G. and X.W.; software, B.Y. and S.S.; validation, X.L., L.G. and S.S.; formal analysis, B.Y. and X.W.; investigation, B.Y.; resources, S.S.; data curation, X.L.; writing—original draft preparation, B.Y. and X.L.; writing—review and editing, L.G., X.W. and S.S.; visualization, B.Y. and X.L.; supervision, B.Y. and X.L.; project administration, L.G., X.W. and S.S.; funding acquisition, all authors. All authors have read and agreed to the published version of the manuscript.

Funding

This material is based upon work supported by Natural Science Foundation of Guangdong Province under Grants No. 2021A1515011268, the SYLU-introduced high-level talents scientific research support plan No. 1010147001205 and No. 1010147001128, Guangdong Basic and Applied Basic Research Foundation No. 2021A1515110958, National Natural Science Foundation of China No. 62202215, and Natural Science Foundation of Chongqing under Grant CSTB2023NSCQ-MSX2995.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

Any opinions, findings, conclusions, or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the funding parties.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Stankovic, J.A. Research directions for the internet of things. IEEE Internet Things J. 2014, 1, 3–9. [Google Scholar] [CrossRef]
  2. Ning, Z.; Dong, P.; Wang, X.; Hu, X.; Guo, L.; Hu, B.; Guo, Y.; Qiu, T.; Kwok, R.Y. Mobile edge computing enabled 5G health monitoring for Internet of medical things: A decentralized game theoretic approach. IEEE J. Sel. Areas Commun. 2020, 39, 463–478. [Google Scholar] [CrossRef]
  3. Xiao, Y.; Krunz, M.; Shu, T. Multi-operator network sharing for massive IoT. IEEE Commun. Mag. 2019, 57, 96–101. [Google Scholar] [CrossRef] [Green Version]
  4. Park, K.H.; Lee, H.E.; Kim, Y.; Bien, Z.Z. A steward robot for human-friendly human-machine interaction in a smart house environment. IEEE Trans. Autom. Sci. Eng. 2008, 5, 21–25. [Google Scholar] [CrossRef]
  5. Kong, X.; Wu, Y.; Wang, H.; Xia, F. Edge Computing for Internet of Everything: A Survey. IEEE Internet Things J. 2022, 9, 23472–23485. [Google Scholar] [CrossRef]
  6. Kong, X.; Chen, Q.; Hou, M.; Rahim, A.; Ma, K.; Xia, F. RMGen: A tri-layer vehicular trajectory data generation model exploring urban region division and mobility pattern. IEEE Trans. Veh. Technol. 2022, 71, 9225–9238. [Google Scholar] [CrossRef]
  7. Ning, Z.; Chen, H.; Ngai, E.C.; Wang, X.; Guo, L.; Liu, J. Lightweight imitation learning for real-time cooperative service migration. IEEE Trans. Mob. Comput. 2023; early access. [Google Scholar] [CrossRef]
  8. Kong, X.; Duan, G.; Hou, M.; Shen, G.; Wang, H.; Yan, X.; Collotta, M. Deep Reinforcement Learning based Energy Efficient Edge Computing for Internet of Vehicles. IEEE Trans. Ind. Inform. 2022, 18, 6308–6316. [Google Scholar] [CrossRef]
  9. Wang, X.; Li, J.; Ning, Z.; Song, Q.; Guo, L.; Guo, S.; Obaidat, M.S. Wireless Powered Mobile Edge Computing Networks: A Survey; Association for Computing Machinery: New York, NY, USA, 2023. [Google Scholar] [CrossRef]
  10. Jia, C.; Evans, B.L. Online calibration and synchronization of cellphone camera and gyroscope. In Proceedings of the 2013 IEEE Global Conference on Signal and Information Processing, Austin, TX, USA, 3–5 December 2013. [Google Scholar]
  11. Sahin, A.; Eroglu, Y.S.; Guvenç, I.; Pala, N.; Yuksel, M. Hybrid 3-D Localization for Visible Light Communication Systems. IEEE J. Light. Technol. 2015, 33, 4589–4599. [Google Scholar] [CrossRef]
  12. Chang, C.S.; Thomas, J.A. Effective bandwidth in high-speed digital networks. IEEE J. Sel. Areas Commun. 1995, 13, 1091–1100. [Google Scholar] [CrossRef]
  13. Zhao, L.; Chi, X.; Zhu, Y. Martingales-based energy-efficient D-ALOHA algorithms for MTC networks with delay-insensitive/URLLC terminals co-existence. IEEE Internet Things J. 2018, 5, 1285–1298. [Google Scholar] [CrossRef]
  14. Wu, W.; Zhou, F. Adaptive Network Resource Optimization for Heterogeneous VLC/RF Wireless Networks. IEEE Trans. Commun. 2018, 66, 5568–5581. [Google Scholar] [CrossRef]
  15. Tanaka, Y.; Haruyama, S.; Nakagawa, M. Wireless optical transmissions with white colored LED for wireless home links. In Proceedings of the 11th IEEE International Symposium on Personal Indoor and Mobile Radio Communications. PIMRC 2000. Proceedings (Cat. No.00TH8525), London, UK, 18–21 September 2000. [Google Scholar]
  16. Visible Light Communications Consortium Publicize and Standardize Visible Light Communication Technology. 2013. Available online: https://j-photonics.org/vlca/en/standard/ (accessed on 6 July 2023).
  17. IEEE Std 802.15.7-2018; IEEE Standard for Local and Metropolitan Area Networks–Part 15.7: Short-Range Optical Wireless Communications. IEEE: Piscataway Township, NJ, USA, 2019; pp. 1–407.
  18. Hammouda, M.; Akın, S.; Vegni, A.M.; Haas, H.; Peissig, J. Link Selection in Hybrid RF/VLC Systems under Statistical Queueing Constraints. IEEE Trans. Wirel. Commun. 2017, 17, 2738–2754. [Google Scholar] [CrossRef] [Green Version]
  19. Alaslani, M.; Nawab, F.; Shihada, B. Blockchain in IoT Systems: End-to-End Delay Evaluation. IEEE Internet Things J. 2019, 6, 8332–8344. [Google Scholar] [CrossRef] [Green Version]
  20. Yang, G.; Haenggi, M.; Xiao, M. Traffic Allocation for Low-Latency Multi-Hop Networks with Buffers. IEEE Trans. Commun. 2017, 66, 3999–4013. [Google Scholar] [CrossRef] [Green Version]
  21. Jiao, W.; Sheng, M.; Lui, K.S.; Shi, Y. End-to-End Delay Distribution Analysis for Stochastic Admission Control in Multi-hop Wireless Networks. IEEE Trans. Wirel. Commun. 2014, 13, 1308–1320. [Google Scholar] [CrossRef] [Green Version]
  22. Ciucu, F.; Poloczek, F.; Schmitt, J. Sharp per-flow delay bounds for bursty arrivals: The case of FIFO, SP, and EDF scheduling. In Proceedings of the IEEE INFOCOM 2014—IEEE Conference on Computer Communications, Toronto, ON, Canada, 27 April–2 May 2014. [Google Scholar]
  23. Poloczek, F.; Ciucu, F. Service-martingales: Theory and applications to the delay analysis of random access protocols. In Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, 26 April–1 May 2015. [Google Scholar]
  24. Poloczek, F.; Ciucu, F. Scheduling analysis with martingales. Perform. Eval. 2014, 79, 56–72. [Google Scholar] [CrossRef] [Green Version]
  25. Hu, Y.; Li, H.; Chang, Z.; Han, Z. Scheduling Strategy for Multimedia Heterogeneous High-Speed Train Networks. IEEE Trans. Veh. Technol. 2016, 66, 3265–3279. [Google Scholar] [CrossRef]
  26. Liu, T.; Li, J.; Shu, F.; Han, Z. Quality-of-Service Driven Resource Allocation Based on Martingale Theory. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018. [Google Scholar]
  27. Sun, H.; Chi, X.; Qian, L. Bandwidth estimation for aggregate traffic under delay QoS constraint based on supermartingale theory. Comput. Commun. 2018, 130, 1–9. [Google Scholar] [CrossRef]
  28. Rahman, M.S.; Haque, M.M.; Kim, K.D. Indoor positioning by LED visible light communication and image sensors. Int. J. Electr. Comput. Eng. 2011, 1, 161. [Google Scholar] [CrossRef]
  29. Kim, B.Y.; Cho, J.S.; Park, Y.; Kim, K.D. Implementation of indoor positioning using LED and dual PC cameras. In Proceedings of the 2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN), PUKet, Thailand, 4–6 July 2012. [Google Scholar]
  30. Kuo, Y.S.; Pannuto, P.; Hsiao, K.J.; Dutta, P. Luxapose: Indoor positioning with mobile phones and visible light. In Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, Maui, HI, USA, 7–11 September 2014. [Google Scholar]
  31. Hassan, N.U.; Naeem, A.; Pasha, M.A.; Jadoon, T.; Yuen, C. Indoor positioning using visible led lights: A survey. ACM Comput. Surv. 2015, 48, 854–865. [Google Scholar] [CrossRef]
  32. Keskin, M.F.; Gezici, S. Comparative theoretical analysis of distance estimation in visible light positioning systems. IEEE J. Light. Technol. 2015, 34, 854–865. [Google Scholar] [CrossRef]
  33. Rátosi, M.; Simon, G. Real-time localization and tracking using visible light communication. In Proceedings of the 2018 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Nantes, France, 24–27 September 2018. [Google Scholar]
  34. Yazar, O.; Gezici, S. Optimal pulse design for visible light positioning systems. Signal Process. 2022, 191, 108334. [Google Scholar] [CrossRef]
Figure 1. The visible-light-based communication and positioning for smart cities.
Figure 1. The visible-light-based communication and positioning for smart cities.
Sensors 23 06340 g001
Figure 2. Data packet format comparison between the (a) predecessor and (b) ours.
Figure 2. Data packet format comparison between the (a) predecessor and (b) ours.
Sensors 23 06340 g002
Figure 3. We show the system communication packets. (a) Linear block coding rule to encode transmitted data and (b) Bit interleaving and Manchester encoding for the low-speed visible-light-based services.
Figure 3. We show the system communication packets. (a) Linear block coding rule to encode transmitted data and (b) Bit interleaving and Manchester encoding for the low-speed visible-light-based services.
Sensors 23 06340 g003
Figure 4. Scenario diagram for high-speed data services.
Figure 4. Scenario diagram for high-speed data services.
Sensors 23 06340 g004
Figure 5. The summary of the arrival abstraction and traffic allocation.
Figure 5. The summary of the arrival abstraction and traffic allocation.
Sensors 23 06340 g005
Figure 6. Image decoding rate and positioning success rate.
Figure 6. Image decoding rate and positioning success rate.
Sensors 23 06340 g006
Figure 7. Positioning accuracy of the Fasys system.
Figure 7. Positioning accuracy of the Fasys system.
Sensors 23 06340 g007
Figure 8. The system low-speed communication performance under different Eb/No conditions.
Figure 8. The system low-speed communication performance under different Eb/No conditions.
Sensors 23 06340 g008
Figure 9. The system low-speed communication performance under different Hamming blocks conditions.
Figure 9. The system low-speed communication performance under different Hamming blocks conditions.
Sensors 23 06340 g009
Figure 10. The average latency-bounded unreliability vs. latency threshold.
Figure 10. The average latency-bounded unreliability vs. latency threshold.
Sensors 23 06340 g010
Figure 11. The latency-bounded unreliability vs. latency threshold. The green box-plots are the results that the RF link is only used and the blue box-plots are the results that the VLC link is only used.
Figure 11. The latency-bounded unreliability vs. latency threshold. The green box-plots are the results that the RF link is only used and the blue box-plots are the results that the VLC link is only used.
Sensors 23 06340 g011
Figure 12. The abstracted arrival vs. latency threshold.
Figure 12. The abstracted arrival vs. latency threshold.
Sensors 23 06340 g012
Table 1. The LED’s mapping mechanism for the positioning and low-speed data communication application.
Table 1. The LED’s mapping mechanism for the positioning and low-speed data communication application.
LED transmission frequency/(bit/s) 1 290 × 10 6 1 285 × 10 6 1 280 × 10 6 1 275 × 10 6
The width range of the captured sequence header/pixel 128 , 130 126 , 127 123 , 125 121 , 122
Data carrying capacity per frame/bit 49 , 50 50 , 51 51 , 52 52 , 53
Table 2. The commonly used parameters for traffic allocation scheme.
Table 2. The commonly used parameters for traffic allocation scheme.
ParametersValues
The transition probability of the MMOO model, p0.1
The transition probability of the MMOO model, q0.5
The traffic modelThe peak rate of the MMOO model, R m a x 24 packets/slot
The length of a packet512 bits
The unreliability requirement, ζ 10 4
The bandwidth of an RB, W R F 0.1 MHz
The length of a time slot, T0.5 ms
The RF linkThe noise power spectral density in the RF network, σ R F 2 −76 dBm/Hz
The transmission power of the RF AP, P r 2 W
The RB allocation factor, λ 10
The bandwidth of the VLC network, W V L C 0.4 MHz
The maximum electronic transmission power of the VLC AP i, P v e 20 W
The noise power spectral density in the VLC network, σ V L C 2 10 21 A 2 /Hz
The half-intensity radiation angle, ϑ 1 / 2 70 deg.
The VLC linkThe area of the PD, A p 10 4 m 2
The gain of the optical filter, g o f 1
The refrative factor, r1.5
The semi-angle of FoV of the PD, Θ 50 deg.
The responsivity of the PD, π 1
The O/E conversion factor, ρ 1
The simulationsThe number of observation slots 10 5
The number of repetitions of the simulation experiments50
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yu, B.; Liu, X.; Guo, L.; Wei, X.; Song, S. Fasys: Visible-Light-Based Communication and Positioning Services towards Smart Cities. Sensors 2023, 23, 6340. https://doi.org/10.3390/s23146340

AMA Style

Yu B, Liu X, Guo L, Wei X, Song S. Fasys: Visible-Light-Based Communication and Positioning Services towards Smart Cities. Sensors. 2023; 23(14):6340. https://doi.org/10.3390/s23146340

Chicago/Turabian Style

Yu, Baozhu, Xiangyu Liu, Lei Guo, Xuetao Wei, and Song Song. 2023. "Fasys: Visible-Light-Based Communication and Positioning Services towards Smart Cities" Sensors 23, no. 14: 6340. https://doi.org/10.3390/s23146340

APA Style

Yu, B., Liu, X., Guo, L., Wei, X., & Song, S. (2023). Fasys: Visible-Light-Based Communication and Positioning Services towards Smart Cities. Sensors, 23(14), 6340. https://doi.org/10.3390/s23146340

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop