EP1905166A1 - Wireless communications approach using background monitoring - Google Patents
Wireless communications approach using background monitoringInfo
- Publication number
- EP1905166A1 EP1905166A1 EP06787151A EP06787151A EP1905166A1 EP 1905166 A1 EP1905166 A1 EP 1905166A1 EP 06787151 A EP06787151 A EP 06787151A EP 06787151 A EP06787151 A EP 06787151A EP 1905166 A1 EP1905166 A1 EP 1905166A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- communications
- channel
- channels
- recited
- communications channels
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/69—Spread spectrum techniques
- H04B1/713—Spread spectrum techniques using frequency hopping
- H04B1/715—Interference-related aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/54—Allocation or scheduling criteria for wireless resources based on quality criteria
- H04W72/541—Allocation or scheduling criteria for wireless resources based on quality criteria using the level of interference
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/69—Spread spectrum techniques
- H04B1/713—Spread spectrum techniques using frequency hopping
- H04B1/715—Interference-related aspects
- H04B2001/7154—Interference-related aspects with means for preventing interference
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/14—Spectrum sharing arrangements between different networks
Definitions
- the present invention relates generally to wireless communications, and more particularly to a wireless communications approach using background monitoring.
- a communications network is any system or mechanism that provides for the exchange of information or data between participants.
- the term "participant” refers to a device or mechanism that communicates with other devices or mechanisms.
- one of the participants is designated as a master participant, or simply as the "master.”
- the master generally initiates and controls communications with the other participants, which are conventionally referred to as slave participants, or simply as “slaves.”
- Masters may also be assigned other functions to perform. Although a master participant typically performs additional functions than the other participants, any participant is capable of performing these functions if elected as the master participant.
- a frequency hopping (FH) protocol is an approach for wireless communications in a communications network that uses a frequency hopping signal transmission technique in which information or data is transmitted over a set of frequencies in a communications frequency band.
- a frequency hopping communications system is a system that uses a FH protocol. The order in which the communications network hops among the set of frequencies is known as the hopping sequence.
- a non-frequency hopping (NFH) system is simply a communications system whose carrier does not hop over a set of frequencies. A typical NFH system may occupy a portion of the communications frequency band corresponding to several frequencies used by an FH system.
- the frequency band is broken up into separate frequencies, often referred to as "channels.”
- the FH system transmits data on one channel, hops to the next channel in the hopping sequence to transmit more data, and continues by transmitting data on subsequent channels in the hopping sequence.
- the switching of frequencies may occur many times each second.
- Frequency hopping also helps with fading of transmissions and power consumption and also provides security for the transmission so that others may not intercept the data being transmitted because others do not know the hopping sequence.
- An example of a frequency hopping protocol is the Institute of Electrical and Electronics Engineers (IEEE) 802.15.1 Wireless Personal Area Network Standard, which is based on the BluetoothTM wireless personal area network (WPAN) technology from the Bluetooth Special Interest Group.
- IEEE Institute of Electrical and Electronics Engineers
- WPAN wireless personal area network
- the BLUETOOTH trademarks are owned by Bluetooth SIG, Inc., U.S.A.
- the Bluetooth protocol uses 79 individual randomly chosen frequency channels numbered from 0 to 78 and changes the frequencies 1600 times per second.
- NFH systems include the IEEE 802.1 Ib Wireless Local Area Network (WLAN) and the IEEE 802.15.3 next-generation WPAN, both of which operate in the 2.4 GHz Industrial, Scientific, Medical (ISM) band, which is an unlicensed portion of the radio spectrum that may be used in most countries by anyone without a license.
- WLAN Wireless Local Area Network
- ISM Industrial, Scientific, Medical
- An FH communications system may be either point-to-point, meaning that communications paths are provided from one participant to another participant, or point- to-multipoint, meaning that communications paths are provided from one participant to multiple participants.
- one device of the network determines the hopping sequence that will be used by all participants of the network.
- the other participants of the network are time synchronized with the master to maintain communications with the master.
- the Bluetooth and IEEE 802.15.1 frequency hopping protocols are point-to-multipoint systems in which the frequency hopping sequence is dete ⁇ nined by the physical address of the master and the phase of hopping is determined by the master's clock.
- the "physical address" of the master is a unique identifier, such as a media access control (MAC) address, that identifies the device anywhere in the world on a network.
- MAC media access control
- Some FH communications system are configured such that certain devices transmit at specified times or timeslots. For example, slaves may respond to the master at assigned timeslots. As another example, in a Bluetooth FH communications system, the master may transmit at even-numbered timeslots on the hopping sequence and the slaves listen at those regular intervals. The master will address one slave (or all slaves in a "broadcast" mode), and the addressed slave returns back to the master at the next odd- numbered timeslot. [0011] A preamble, which is known to all the participants of the FH network, is used to identify the network and for the slaves to synchronize with the master.
- the known preamble is called the "channel access code.”
- the known preamble is called the "channel access code.”
- One problem with frequency hopping communications systems is that coexistence problems arise between the FH communications system and NFH communications systems that operate in the same frequency band. While the FH communications system hops over the entire frequency band, the NFH communications systems occupy separate parts of the frequency band. When the FH communications system hops over part of the frequency band occupied by an NFH communications system, there may be interference between the systems. Although the use of a FH protocol helps to lessen the interference problem because not all of the FH channels will interfere with other communications systems, there nevertheless remains interference on those channels that coincide with the NFH communications systems.
- interference situation is the coexistence problem between the frequency hopping IEEE 802.15.1 WPAN and the non-frequency hopping IEEE 802.11b Wireless Local Area Network (WLAN) because both share the 2.4 GHz ISM band.
- Interference may change depending on when the communications systems use the band and the relative locations of the participants of each system to participants of another system. Because the participants may be mobile, interference may vary depending on the movements of the participants of one system relative to the locations of participants of other systems. In addition, interference may arise from other sources, such as some consumer appliances like microwave ovens, resulting in a degradation of performance of the FH communications system.
- Interference results in data transmission errors, such as an increase in the bit error rate (BER) or the loss of data packets, resulting in reduced transmission quality and performance and the need to retransmit the data.
- BER bit error rate
- One approach for managing the coexistence problem is to increase the power used in the transmissions so that the other interfering system have less of an impact on the system transmitting at the increased power.
- this increased power approach drains batteries used by the participants, and thus the required power increase may be impractical.
- the increased power approach only benefits the system using the increased power and results in a bigger interference impact on other systems.
- Another approach for managing the coexistence problem is to skip a "bad" channel that suffers from interference, such as by moving onto the next channel in the sequence or by jumping to another randomly selected channel.
- this skipping approach does not necessarily avoid other bad channels because the next channel used may also have an interference problem.
- a method selects communications channels for a communications system. A set of communications channels is selected based on the performance of the communications channels and channel selection criteria. Then another set of communications channels is selected based on a later performance of the communications channels and the channel selection criteria.
- a method is provided for communicating with a participant. A set of communications channels is selected based on the performance of the communications channels and a performance criterion. Identification data that identifies the set of communications channels is generated and provided to the participant. The set of communications channels is used for communicating with the participant according to a frequency hopping protocol.
- another set of communications channels is selected in a similar manner when a specified criterion is satisfied, including but not limited to, after expiration of a specified length of time, when the performance of at least one of the channels in the set of channels satisfies another performance criterion, or when a specified number of the set of channels satisfies yet another performance criterion.
- a communications device is used in a network that communicates via a frequency hopping protocol.
- the communications device includes a memory that has identification data that identifies a set of communications channels that is selected based on channel performance and a performance criterion.
- the communications device includes a transceiver that is communicatively coupled to the memory and that is configured to transmit and receive, based on the identification data, over the set of channels, according to a frequency hopping protocol.
- the communications device includes a processor for generating a measurement of channel performance based on receiving a packet from another device and transmitting another packet to the other device that contains data indicating the measurement of channel performance.
- another communications device is used in a network that communicates via a frequency hopping protocol.
- the communications device includes a memory for storing sequences of instructions and a processor communicatively coupled to the memory.
- the instructions When the processor executes the instructions, the instructions cause the processor to determine the performance of communications channels and then select a set of channels based on the performance and a performance criterion.
- the processor generates and stores in the memory data that identifies the set of channels and transmits the data to another communications device.
- the communications device includes a transceiver that is communicatively coupled to the memory and that is configured to transmit and receive, based on the data, over the set of channels according to a frequency hopping protocol.
- a communications channel selector apparatus is provided.
- the apparatus is configured to determine channel performance at one time and select based on that performance a set of channels based on channel selection criteria.
- the apparatus is configured to then determine the channel performance at a later time and select another set of channels based on that latter performance and the channel selection criteria.
- the invention encompasses a system, a computer-readable medium, and a carrier wave configured to carry out the foregoing functions.
- FIG. IA is a flow diagram that depicts an approach for selecting sets of communications channels based on channel performance, according to an embodiment of the invention
- FIG. IB is a flow diagram that depicts an approach for communicating with a participant using a set of good channels, selected according to an embodiment of the invention.
- FIG. 2 is a block diagram that depicts a communications network, according to an embodiment of the invention.
- FIG. 3 A is a block diagram that depicts an example format of a standard packet, according to an embodiment of the invention.
- FIG. 3B is a block diagram that depicts a master test packet that is sent by a master to slaves to test channel performance, according to an embodiment of the invention.
- FIG. 3 C is a block diagram that depicts a slave test packet that is sent by a slave to a master to provide channel performance measurements and to test channel performance, according to an embodiment of the invention.
- FIG. 4 is a block diagram that depicts a good channel packet sent by a master to slaves to identify a set of selected channels, according to an embodiment of the invention.
- FIG. 5 A is a block diagram that depicts the loading of a set of channels into a channel register, according to an embodiment of the invention.
- FIG. 5B is a block diagram that depicts the replacement of bad channels with good channels in a default set of channels in a channel register, according to an embodiment of the invention.
- FIGS. 6A, 6B, and 6C are flow diagrams that depict example message sequencing for implementing adaptive frequency hopping, according to an embodiment of the invention.
- FIG. 7 is a block diagram that depicts a communications apparatus configured according to an embodiment of the invention.
- FIG. 8 is a flow diagram that depicts a functional overview of an approach for providing wireless communications using separate channel monitoring according to an embodiment of the invention.
- FIG. 9 is a diagram that depicts example channel performance data.
- FIG. 10 is a flow diagram that depicts a wireless communications approach using background monitoring according to an embodiment of the invention.
- FIG. 11 is a block diagram that depicts an example computer system upon which embodiments of the invention may be implemented.
- RSSI Received Signal Strength Indicator
- a novel approach for managing network communications generally involves selecting sets of communications channels based on channel performance. An initial set of channels is selected based on one or more selection criteria at the start-up of the communications network. Additional sets of channels are then periodically selected to adaptively avoid interference.
- FIG. IA is a flow diagram that depicts an approach for selecting sets of communications channels based on channel performance, according to an embodiment of the invention.
- the performance of a set of available communications channels is determined. For example, for a communications system that uses 100 channels, some or all of the 100 channels may be tested to determine channel performance. Other systems using the same frequency band may interfere with several of the 100 channels.
- a set of communications channels to be used is selected based on the channel performance determined in block 110, one or more performance criteria, and one or more selection criteria.
- a communications system may experience interference on channels 3 through 5 from one communications system and on channels 50 through 54 from another communications system.
- the channel testing may indicate a high bit error rate (BER) on those channels.
- Channels may be classified by comparing the test results to the performance criteria.
- the performance criteria may be a specified value, or a specified threshold.
- the channel is classified as "good,” whereas channels with a BER that does not exceed the specified threshold are classified as "bad.”
- the reason why a bad channel's performance does exceed the specified threshold may be due to a variety of reasons, including but not limited to, the channel being used by another communications system or noise from other interference sources, such as microwave ovens.
- a set of channels is selected based on the selection criteria.
- the selection criteria may be to select the good channels but not the bad channels.
- the communications system performing the channel selection may avoid interference present on the bad channels.
- channels may be selected based on comparing performance results to one or more criteria without first classifying the channels.
- other criteria may be used, for example, that particular channels are, or are not, to be selected regardless of the test results.
- the performance of the communications channels is determined again by additional testing.
- This additional testing may be initiated according to a specified schedule, such as the expiration of specified time period, or the additional testing may be initiated as a result of monitoring and detecting new interference among the selected set of channels, such as from another communications system that previously did not cause interference.
- the additional testing may be performed over some or all of the original 100 channels.
- a new set of communications channels is selected based on the channel performance determined in block 118 in a manner similar to that of block 114 above. For example, the new set of channels may be based on selecting channels that are good when the additional testing of block 118 is performed.
- the new set of channels may be different than the good channels selected in block 112 because new interference typically may be present from other systems that were not being used at the time of the first testing of block 110 or that were not in sufficient proximity at the time of the first testing of block 110 to cause sufficient interference to result in the channels being classified as bad.
- the determination and re-determination of channel performance depicted by blocks 110 and 118 may be performed by a different entity or device than the selection of the channels depicted in blocks 114 and 122.
- each step may be performed by a different entity, and a particular entity may perform any number of the steps of a particular embodiment of the invention.
- the determination of channel performance and the selection of a new set of communications channels depicted by blocks 118 and 122, respectively, may be repeated based on the same types of reasons as discussed above for block 118.
- the method depicted in FIG. IA may adaptively avoid interference, even if the interference changes over time, by periodically retesting channel performance and selecting new sets of communications channels to avoid using channels with unacceptable performance.
- This approach avoids interference, such as from the coexistence problem between different communications systems that use the same part of a communications band, by testing performance of communications channels to determine a set of channels that have acceptable performance according to one or more performance criteria.
- the approach described herein may be characterized as "robust” because interference in a communications system is reduced or eliminated by using channels that have been tested and determined to be "good” because channel performance exceeds a specified threshold as compared to channels that have been tested and determined to be “bad” because channel performance falls below the specified threshold.
- the approach described herein is a simple scheme that is easy to implement on many devices (due to the low computational requirements), that requires little memory, and that is fully interoperable with devices that do not support this novel approach.
- FIG. IB is a flow diagram 100 that depicts an approach for communicating with a participant using a set of good channels, selected according to an embodiment of the invention, hi block 130, performance data for communications channels is determined. For example, in a Bluetooth or an IEEE 802.15.1 FH communications system, some or all of the 19 channels maybe tested to dete ⁇ nine a received signal strength indication (RSSI) or by checking transmission quality based on transmission errors.
- RSSI received signal strength indication
- a set of communications channels is selected by comparing the performance data determined in block 130 to performance criteria to determine whether each channel is good or bad. Then a set of channels is selected that includes only good channels. For example, channels 25-30 of the original 79 channels of the Bluetooth or IEEE 802.15.1 FH communications system examples above maybe classified as bad due to interference from an NFH communications system, resulting in the selection of channels 0-24 and 31-78 for the channel set.
- channel identification data is generated that identifies the set of selected communications channels. For example, in the Bluetooth or IEEE 802.15.1 FH communications system examples above, a reduced frequency hopping sequence that uses good channels 0-24 and 31-78 may be selected, or alternatively, bad channels 25-30 may be replaced by randomly-selected good channels in the normal hopping sequence. [0056] In block 136, the channel identification data identifying the selected set of communications channels is provided to the participant. For example, in the Bluetooth or IEEE 802.15.1 FH communications system examples above, the master may provide a slave with information on which channels are selected and/or not selected in block 132 (e.g., channels 0-24 and 31-78).
- the set of communications channels is used to communicate with the participant.
- a master may communicate with the slave using the set of selected channels as identified in the identification data generated in block 134.
- the performance of the communications channels is redetermined.
- the performance determination in block 140 may be in a manner similar to, or different from, that of the original performance determination in block 130.
- the redetermination of channel performance in block 140 may be initiated based on a number of criteria. For example, the new testing may be performed at periodic intervals, when interference is detected on the selected set of communications channels, or when the available number of good channels falls below a specified number.
- a new set of communications channels is selected based on the testing performed in block 140 and specified performance criteria to determine which channels are currently good and which are bad. For example, in the Bluetooth or IEEE 802.15.1 FH communications system examples above, a mobile NFH communications system that previously caused interference may no longer be a problem if the NFH communications system is no longer operating or has moved away from the FH communications system. Also, another previously undetected NFH communications system may be causing interference for the opposite reason. For this example, assume that the NFH communications system causing interference on channels 25-30 is no longer a problem because the NFH communications system has moved, but also assume that another FH communications system is now active and causing interference on channels 3, 22, 48, and 53.
- data is generated, which identifies the new set of communications channels. For example, in the Bluetooth or IEEE 802.15.1 FH communications system examples above, a smaller frequency hopping sequence that does not use channels 3, 22, 48, and 53 may be selected, or channels 3, 22, 48, and 53 may be replaced by good channels in the normal hopping sequence.
- the data identifying the new selected set of communications channels is provided to the participant. For example, in the Bluetooth or IEEE 802.15.1 FH communications system examples above, the master may provide a slave with a hopping sequence based on the new channels selected in block 142.
- the new set of communications channels is used to communicate with the participant.
- a master may communicate with the slave using the set of selected channels as identified in the identification data generated in block 144.
- the steps in blocks 140-148 may be repeated as necessary depending on the requirements of a particular application or implementation.
- the approach may be used to adaptively select sets of communications channels that provide a specified channel performance, thereby avoiding interference with other communications systems and other sources of interference.
- a new set of communications channels is used to supplement an existing set of communications channels.
- a specified number of channels may be randomly selected for testing, and if found to have acceptable performance, used to add to those channels of the first set that still have acceptable performance.
- FIG. 2 is a block diagram that depicts a communications network 200, according to an embodiment of the invention. For clarity, FIG. 2 depicts a small number of communications devices, whereas in practice any number of such communications devices may be used.
- Examples of communications devices that may be used in a network that uses the channel selection approach described herein include, but are not limited to, wireless devices that are used in wireless local area networks (WLANs) and in wireless personal area networks (WPANs), such as cordless phones, laptop computers, desktop computers, printers, and personal digital assistants (PDAs).
- WLANs wireless local area networks
- WPANs wireless personal area networks
- Wireless devices may communicate in a variety of ways, including but not limited to, infrared, line of sight, cellular, microwave, satellite, packet radio and spread spectrum technologies.
- Some communications devices may be characterized as mobile devices based on the relative ease of moving such devices between locations or because the mobile devices may be conveniently carried by a person, such as cordless phones, laptop computers, and PDAs.
- Communications network 200 includes a master 210 and slaves 220, 230.
- Master 210 includes a memory 212 that may be used to store instructions, a processor 214 that may execute the instructions stored in memory 212, and a transceiver 216 that is configured to transmit and receive communications between master 210 and other devices of communications network 200, such as slaves 220, 230.
- Slaves 220, 230 include a memory 222, 232, a processor 224, 234 and a transceiver 226, 236, respectively, that perform functions similar to the corresponding elements of master 210.
- master 210 selects, as described herein, a set of communications channels from the default communications channels for a specified communications protocol, generates identification data for the selected set of channels, and transmits the identification data to slave 220, such as by using the approach of FIG. IB.
- slave 230 may not be capable of using the selected set of channels.
- slave 230 may not be configured to use a selected set of good channels sent by master 210.
- master 210 communicates with slave 220 using the selected set of communications channels and communicates with slave 230 using the default communications channels for the specified communications protocol. For example, if a FH communications protocol is used, master 210 and slave 220 communicate by hopping over the selected set of good communications channels, while master 210 and slave 230 communicate by hopping over the default communications channels for the FH protocol.
- channel performance is monitored using one or more channel performance measurement techniques.
- any of the techniques for measuring channel performance that are discussed below may be used alone or in combination.
- Different methods may be used for testing channels to select a set of communications channels and to monitor the performance of the selected set of communications channels, depending on the requirements of a particular application or implementation. Although testing is normally performed on all possible communications channels, it is not necessary to test all channels, nor is it necessary to use the same method for determining or monitoring performance of different channels.
- Special Test Packets [0071] According to one embodiment of the invention, special test packets containing known content are used to test the performance of communications channels. As used herein, a "packet" is a block of data used for transmissions in a packet-switched system.
- packets may include a preamble, a header, a payload, and a tail, alone or in any combination.
- the number of error bits (NEB) that occur in the known content of the special test packets may be calculated to determine channel performance. For channels in which there is interference, such as from another communications system, the NEB will be high as a result of the interference. Conversely, if there is no interference, the NEB will be low.
- a slave may calculate the NEB for a transmission from a master to the slave and include the result in a subsequent transmission from the slave to the master.
- the master may calculate the NEB for the transmission from the slave to the master based on the subsequent transmission.
- FIG. 3 A is a block diagram that depicts an example format of a standard packet 300, according to an embodiment of the invention.
- Standard packet 300 is for a
- Standard packet 300 includes a known preamble 310, a packet header 320, and a payload 330.
- Known preamble 310 is used to identify the FH communications network and for the slaves to synchronize with the master.
- Known preamble 310 is a binary string of data whose length depends on the communications protocol. For example, for a
- Bluetooth based FH communications system known preamble 310 is 72 bits in length.
- Packet header 320 contains control information, such as the origination and destination address of the packet, the type of packet, and the priority level for the packet.
- Payload 330 contains the contents or data being carried by standard packet
- FIG. 3B is a block diagram that depicts a master test packet 360 that is sent by a master to slaves to test channel performance, according to an embodiment of the invention.
- Master test packet 360 includes a known preamble 340, a packet header 364, a payload header 366, and copies of known preamble 370, 372, 374.
- Known preamble 340 is analogous to known preamble 310 of FIG. 3A, but known preamble 340 is unique for the FH communications system that uses master test packet 360.
- Packet header 364 is analogous to packet header 320 in FIG. 3A, but may differ based on the content of master test packet 360, such as the particular original and destination addresses of the packet.
- Payload header 366 contains control information relating to the payload portion of master test packet 360, such as the type of data contained in the payload. For the example depicted in FIG. 3B, payload header 366 identifies that the payload of master test packet 360 contains a specified number of copies of known preamble 340, depicted as copies of known preamble 370, 372, 374. Although master test packet 360 is depicted and described as including three copies of the known preamble 370, 372, 374, any number of copies may be used, subject to the capacity limits of the payload portion of the packet, and the payload portion of the packet may contain other data besides copies of the known preamble.
- the slave that receives master test packet 360 may calculate the number of error bits (NEB) that occur in copies of known preamble 370, 372, 374 and in known preamble 340.
- NEB error bits
- the known preamble is referred to as the channel access code, which has a length of 72 bits. Based on the channel access code at the start of a packet and the three copies of the channel access code in the packet payload sent from the master to the slave, there are 288 bits of data to test channel performance based on the NEB.
- FIG. 3C is a block diagram that depicts a slave test packet 380 that is sent by a slave to a master to provide channel performance measurements and to test channel performance, according to an embodiment of the invention.
- Slave test packet 380 includes a known preamble 340, a packet header 384, a payload header 386, an NEB of last received packet 388, and copies of known preamble 390, 392, 394.
- Known preamble 340 of slave test packet 380 may be the same as that of master test packet 360, provided that master test packet 360 and slave test packet 380 are sent between participants of the same FH communications system.
- Packet header 384 and payload header 386 are analogous to packet header 364 and payload header 366, respectively, with differences arising from the type of packet
- Slave test packet 380 includes the NEB of last received packet 388 that contains the NEB calculated by the slave for the last packet sent by the master to the slave, such as master test packet 360.
- the NEB of last received packet 388 is used to pass back from the slave to the master the information on the performance of the master to slave transmission over the particular channel used to send master test packet 360.
- slave test packet 380 may calculate the NEB that occur in copies of known preamble 390, 392, 394 and known preamble 340.
- channel performance may differ between transmissions from master to slave and from slave to master, for example, if an interference source is closer to one participant than the other.
- slave test packet 380 is depicted and described as including three copies of the known preamble 390, 392, 394, any number of copies may be used, subject to the capacity limits of the payload portion of the packet.
- Each channel of a communications system may be tested repeatedly by using master test packet 360 and slave test packet 380 described herein.
- the frequency hopping rate is 1,600 hops per second, and there are 79 channels. Therefore, in one second, each of the 79 channels may be tested both from the master to the slave and from the slave to the master 20 times.
- test packets such as master test packet 360 and slave test packet 380
- master test packet 360 and slave test packet 380 may be well suited for initial channel testing because many separate and detailed tests may be made of each channel in a short amount of time.
- channel performance is measured on a scale from an NEB value of 0 to an NEB value corresponding to every test bit being in error, thereby providing a range of channel performance measurements. While the overhead associated with such detailed testing may be relatively high compared to other methods described below, such detailed testing is not generally performed frequently enough to make the overhead prohibitive.
- a received signal strength indicator is used to test the performance of communications channels.
- RSSI received signal strength indicator
- a master can either just listen at a slave transmission time slot or the master or send a NULL packet to a slave to ensure that the slave will not transmit at the next slave transmission time slot.
- a NULL packet generally includes only an access code and a packet header and is typically used to ensure that the master and slave are synchronized.
- the signal received by the master represents the noise floor of the channel because the slave is not transmitting on the channel. If there is interference, such as from another communications system, the RSSI will be high. Conversely, if there is no interference, the RSSI will be low.
- a master may perform 10 RSSI measurements for each of the 79 channels.
- Use of RSSI may be well suited for initial channel testing because many separate and detailed tests may be made of each channel in a short amount of time.
- channel performance is measured on a scale from very low RSSI values to very high RSSI values corresponding to the noise level measured on the channel, thereby providing a range of channel performance measurements. While the overhead associated with such detailed testing may be relatively high compared to other methods described below, such detailed testing is not generally performed frequently enough to make the overhead prohibitive.
- the known preamble at the start of the packet is used to test the performance of communications channels.
- the preamble correlation approach is similar to the special test packet approach above, but without the use of copies of the known preamble in the payload portion of the packet.
- the master may use identification packets, NULL packets, POLL packets, or any other kind of packet and correlate the received preamble against the known preamble. A packet that does not pass the correlation is discarded (e.g., it is a lost packet).
- Use of the preamble correlation approach may be well suited for continuous monitoring of channel performance, such as the ongoing monitoring of a selected set of communications channels, because no special packets are required and therefore the overhead is relatively low compared to other approaches that require additional packets.
- the result of each measurement is whether the packet is discarded (or lost) or not, thus providing limited granularity because a one bit error provides the same result of a lost packet and a multiple bit error.
- one copy of the known preamble is used instead of multiple copies, there are fewer bits being used to detect interference problems. This increases the likelihood that a "bad" channel is mischaracterized as a "good” channel.
- a header error check is used to test the performance of communications channels.
- the HEC is a check on the contents of the packet header, such that if an error occurs in the packet header, the HEC does not check and the packet is discarded (e.g., it is a lost packet).
- Use of the HEC approach may be well suited for continuous monitoring of channel performance, such as the ongoing monitoring of a selected set of communications channels, because no special packets are required and therefore the overhead is relatively low compared to other approaches that require additional packets.
- the result of each measurement is whether the packet is discarded (or lost) or not, thus providing limited granularity because a one bit error provides the same result of a lost packet and a multiple bit error.
- a cyclic redundancy check is used to test the performance of communications channels.
- the CRC may be a check of either the payload of the packet or the complete contents of the packet, depending on the communications system protocol being used. As an example, in Bluetooth and IEEE 802.15.1, the data packet must pass a CRC check, otherwise the packet must be retransmitted. A retransmission request (RR) indicates poor channel performance.
- a packet loss ratio is used for channel performance testing of transmissions between participants of a communications system.
- a packet loss may occur when a specified condition is satisfied, including but not limited to, a failure of the preamble correlation, HEC, or CRC.
- PLR may be well suited for both initial channel testing and continuous monitoring of channel performance.
- FEC forward error correction
- a communications system may be used for channel performance testing of transmissions between participants of a communications system.
- FEC may be performed on the packet header or on the payload of the packet.
- FEC is used as a form of redundant data encoding to allow the recipient to ensure the integrity of the received data and to correct any identified errors.
- the packet header is 1/3 FEC coded
- the payload is 2/3 FEC coded.
- the FEC coding may be used for both an NEB calculation and for error correction.
- Use of the FEC approach may be well suited for continuous monitoring of channel performance, such as the ongoing monitoring of a selected set of communications channels, because no special packets are required and therefore the overhead is relatively low compared to other approaches that require additional packets. While the result of each measurement provides more granularity via an NEB measurement than some of the other methods above, there is more overhead associated with FEC and less information may be included in each packet due to the redundant data encoding.
- each channel performance measurement technique describes the use of the same method for both master to slave and slave to master transmissions
- different methods may be used for each transmission direction.
- the RSSI approach may be used for master to slave transmissions while the preamble correlation is used for slave to master transmissions.
- different methods may be combined, such that to have a test considered successful, two or more tests must be satisfied. For example, to receive a "pass" indication, a packet may have to pass both the preamble correlation and the HEC. Further, the tests used may change over time depending upon the effectiveness of the tests and the requirements of a particular application or implementation.
- a channel is classified based on the channel performance and one or more classification criteria. For example, a channel maybe classified as "good” or “bad” based on the results of the channel performance testing by applying one or more performance measurements to specified performance criteria as discussed above. As used herein, a good channel's performance exceeds a specified criterion, or a specified threshold, whereas a bad channel's performance does not exceed the specified threshold.
- multiple tests of each channel are used to classify a channel.
- a master may test each channel for a specified number of times, such as 10 tests per channel.
- the use of multiple tests provides a more accurate determination of channel performance because each individual test may be influenced by factors that produce results that do not accurately reflect the overall performance of the channel. For example, an isolated instance of interference may cause a poor channel performance measurement even though the channel generally performs well. Conversely, a channel with heavy interference may have an acceptable channel performance measurement during a temporary break in the interference, even though most of the time there is interference from the interference source, such as another communications system.
- Table 1 contains the results often channel performance tests for "n" channels. There are three possible results of each hypothetical channel performance test represented in Table 1 : high, medium, or low.
- each test may have a numerical value, such as an NEB or RSSI value.
- each numerical test may be represented by a relative value, such as "superior,” “average,” or “poor”, by converting a numerical value to such a qualitative scale (e.g., the RSSI is high indicating poor channel performance, the NEB is low indicating good channel performance, etc.).
- each test may have a simple "pass/fail,” “pass/loss”, or “pass/RR” for checks such as HEC, CRC, or FEC, and the packet loss ratio (PLR) may be determined by calculating a percentage of packets that are lost, such as by using the preamble correlation, HEC, CRC, or FEC.
- PLR packet loss ratio
- channels 1 and 2 are classified as "bad” because the results generally indicate low channel performance even though not all of the individual test results for channels 1 and 2 are low and some are medium or even high.
- Channels n-1 and n are classified as "good” because the results generally indicate high channel performance even though some individual tests indicated a low or medium result.
- this example uses subjective performance criteria to classify the channels (e.g., that the results are generally low or high)
- quantitative performance criteria may be used, either in the form of numerical performance measurements or by assigning numerical values to the types of qualitative results depicted in Table 1.
- other classification criteria may be used, such as that the highest or lowest performance measurement is to be ignored.
- test results may be used and combined.
- tests that provide NEB results may be combined with CRC results of "pass/loss" to arrive at an overall assessment of channel performance.
- the manner in which such results are combined depends on the particular implementation.
- different types of tests may be converted to a single type of scale and then combined or averaged to reach a final result, or different test results may be combined using weighting factors that favor some types of tests over others to arrive at a final result.
- the conversion of numerical results to qualitative results and the combining of individual tests results to achieve a classification of each channel depends on the how competing tradeoffs are to be weighed for a given implementation.
- high channel performance may be desired, but setting too high of a standard (e.g., all test results must be "high”) may limit the number of channels classified as "good” such that there are few good channels available for use and may result in frequent retesting of the channels when supposedly poor performance is detected. Conversely, setting too low of a standard allows for a larger pool of channels to be used, but then channels with significant interference are classified as good when in fact channel performance is low and channels are not retested when new interference occurs.
- a standard e.g., all test results must be "high”
- setting too low of a standard allows for a larger pool of channels to be used, but then channels with significant interference are classified as good when in fact channel performance is low and channels are not retested when new interference occurs.
- the results of the chamiel performance testing are compared to one or more acceptance criteria. For example, if the testing provides NEB results, an average value may be determined and compared to an acceptance criterion, such as a threshold value. If the testing results exceed the threshold, the channel is classified as "bad", but if the testing results do not exceed the threshold, the channel is classified as "good.”
- an acceptance criterion such as a threshold value. If the testing results exceed the threshold, the channel is classified as "bad", but if the testing results do not exceed the threshold, the channel is classified as "good.”
- the correlation approach, HEC, and CRC may all be used to determine whether a packet is lost or not (e.g., whether an error occurs as a result of the transmission of the packet) and the packet loss ratio determined and compared to a threshold value. Assuming that a threshold of 15% is established, the loss of more than 15 packets out of 100 would result in the channel being classified as bad, whereas loosing 15 or fewer packets would result in the channel
- Channel testing and classification may be performed by a master or other participants, such as slaves.
- channel testing and classifications from multiple participants may be combined and/or weighted to determine an overall, or final, classification for the channels of interest.
- Table 2 provides an illustration of a "referendum" approach that considers the channel performance determined by a master and seven slaves.
- each participant has one "vote” on whether to use the channel or not.
- a vote of "0" means that participant is voting to not use the channel (e.g., the channel is found by that participant to be "bad")
- a vote of "1” means that the participant's vote is to use the channel (e.g., the channel is found by that participant to be "good”).
- a certain number of votes (e.g., the "passing mark") is required for the channel to be judged "good” and therefore available for use by the FH communications system, hi the example of Table 2, the passing mark is seven so that of the eight votes cast for each channel, seven participants must vote to use the channel for it to be classified as "good.”
- the same considerations discussed above for determining how to combine different test results and how to set the threshold for determining whether a channel is bad or good apply here when combining the results of channel performance testing by multiple participants.
- Table 2 indicates that each participant has an equally weighted vote
- other referendum approaches may be used. For example, the vote of particular participants, such as the master or a specified slave or slaves, may be given a higher weight. As another example, particular participants may be able to "veto" the result, meaning that those particular participants must vote to use the channel in order for it to receive a passing score.
- the set of communications channels is selected based on one or more selection criteria, and data that indicates the selected set of channels is sent to other participants of the communications system. For example, a master may select the channels classified as "good,” generate a special packet that identifies the selected set of good communications channels in the payload, and send the special packet to one or more other participants in the communications network. While the master typically performs the selection of the good channels and notifies other participants of the communications system, other participants may perform one or both functions instead of the master.
- the master instructs the other participants when to begin using the selected set of channels.
- the master may include in the special packet a specified time at which the participants are to begin using the selected channels.
- the specified time may represent a time delay after which the participants of the communications system begin to use the good channel set instead of the previously used channels.
- Other time criteria may be used in addition to specifying a time or to specifying a time delay
- FIG. 4 is a block diagram that depicts a good channel packet 400 sent by a master to slaves to identify a set of selected channels, according to an embodiment of the invention.
- Good channel packet 400 includes a known preamble 410, a packet header 420, and a payload header 430, all of which are analogous to the similar elements depicted and discussed with reference to FIGS. 3A, 3B, and 3C above.
- good channel packet 400 includes a timeout 440, good channel data 450, and a CRC 460.
- Good channel data 450 is part of the payload portion of good channel packet 400 and identifies the selected set of good communications channels to be used by the participants of the communications network.
- Good channel data 450 may be encoded, such as by using a 1/3 FEC coding scheme, to allow the recipient of good channel packet 400 to correct any errors in good channel data 450 that occur as a result of the transmission of good channel packet 400.
- CRC 460 is a cyclic redundancy check value for verifying the accurate transmission of good channel packet 400. If the cyclic redundancy check fails, a retransmission request may be sent by the recipient of good channel packet 400 to the sender of good channel packet 400 to have another good channel packet 400 sent.
- Timeout 440 specifies a particular time at which the participants are to begin using the new channel, or an amount of time that the participants of the communications system are to wait before beginning to use the good channels identified by good channel data 450. For example, in a Bluetooth or IEEE 802.15.1 FH communications system, timeout 440 specifies the number of time slots to wait before the master and slaves begin to use the good channels.
- the number of time slots must be at least twice the number of slaves because the master separately communicates good channel packet 400 to each slave at even number time slots and receives an acknowledgement back from each slave on the odd numbered time slots.
- Other communications systems may use a shorter delay by using a broadcast packet to simultaneously inform the other participants of the communications network of the selected set of communications channels.
- additional security protection may be included by sending the good channel information in an encrypted format to the other participants in the communications network.
- the FH sequence may be determined if the MAC address of the master is known (because that MAC address is used to select the hopping sequence).
- the selection by the master of the channels to use and then transmitting those selected channels to other participants in an encoded format precludes other entities from working out the hopping sequence merely by knowing the MAC address. While having the MAC address may provide others with the possible channels that could be used by the particular FH communications network, the other entities cannot determine from the MAC address which channels the master has selected and in wnicn order me master nas arranged me selected channels.
- some participants of the communications system do not use the selected set of good channels.
- the selected set of channels is used by all of the participants of the communications system, there may be some participants who are not configured to accept and use a set of communications channels sent by another participant.
- some participants may communicate with each other using the original or default set of communications channels while other participants communicate using a selected set of good channels.
- the master of a FH communications system may track which slaves do and which slaves do not implement the adaptive FH approach described herein. For slaves using the good communications channels, the master and such slaves communicate using that set of good channels, but other slaves that do not use the good channels communicate with the master over the default set of communications channels for the particular FH protocol.
- more than one set of selected channels is used for communications between different pairings of participants in a communications network.
- a particular set of selected communications channels may be used between a master and one or more specified slaves while another particular set of selected communications channels is used between the master and one or more other specified slaves.
- each pairing of the master and a slave may communicate on a different set of communications channels, such as one of the selected sets of communications channels or the default set of communications channels for the communications system.
- the participant after a participant has received the set of selected communications channels, the participant stores data that indicates the new set of selected channels. For example, in a Bluetooth or IEEE 802.15.1 FH communications system, each participant has a selection kernel that addresses a register. The output of the kernel is a set of addresses for each slot in the register, while the content of the slot in the register is a channel number.
- the selection kernel which is usually complicated
- the register is loaded using only the selected set of communications channels. As a result, when the kernel addresses the register, only the selected set of channels are used.
- the size of the register is typically based on the standard number of channels for the FH protocol, and the selected set of channels will normally not include some "bad" channels, the number of selected channels is less than the number of slots in the register.
- One approach for filling up the register is to cyclically load the register using the selected set of communications channels until the register is full.
- Another approach is to replace "bad" channels in the original or default channel set using good channels that are randomly selected from the selected channel set. For example, if channel 3 is classified as bad but channel 12 is good, then channel 12 is specified in place of channel 3 in the default hopping sequence.
- FIG. 5 A is a block diagram that depicts the loading of a set of channels into a channel register, according to an embodiment of the invention.
- FIG. 5A depicts a selection kernel 510, a register with default channels 520, a register with good channels 550, and a table of good channels 570.
- Register with default channels 520 includes default channels 522a-522n that are the channel numbers for the default set of hopping frequencies for the particular FH protocol being used for the communications network.
- Register with default channels 520 also includes addresses 524a-524n that are the addresses associated with each slot containing one of default channels 522a-522n, respectively.
- the addressing by selection kernel 510 of register with default channels 520 is depicted by an addressing arrow 512.
- Register with good channels 550 includes default channels 552a-552n that are the channel numbers for the good channels, such as may be provided to the participant using good channel packet 400.
- the set of selected good channels is depicted in FIG. 5 A as table of good channels 570.
- the loading of the good channels from table of good channels 570 into register with good channels 550 is depicted by a loading arrow 572.
- Register with good channels 550 also includes addresses 554a-554n that are the addresses associated with each slot containing one of good channels 552a-552n, respectively.
- the addressing by selection kernel 510 of register with good channels 550 is depicted by addressing arrow 514.
- FIG. 5B is a block diagram that depicts the replacement of bad channels with good channels in a default set of channels in a channel register, according to an embodiment of the invention.
- FIG. 5B depicts many of the same features as described above with respect to FIG. 5 A, except for the differences discussed herein.
- the major difference between the example of FIG. 5A and FIG. 5B is that in FIG. 5B, whenever selection kernel 510 addresses a channel classified as bad in register with default channels 520, the bad channel is replaced with a good channel that is randomly selected from table of good channels 570. Thus, only good channels are selected to form the hopping sequence.
- register with default channels 520 is the same as in FIG. 5 A. However, whenever selection kernel 510 addresses a bad default channel in register with default channels 520, the bad default channel is replaced with good channels that are randomly selected from table of good channels 570. Assume for this example that default channels 522b and 522n-l are classified as bad and that the remaining default channels are classified as good. Also, for this example, table of good channels 570 includes good channels 576a-576n.
- addressing arrow 530 depicts selection kernel 510 addressing good default channel 522a, whose address is address 524a. Default channel 522a is used because default channel 522a is classified as good. Although not depicted in FIG. 5B, good default channels 522c and 522n are similarly addressed. However, addressing arrow 532 depicts selection kernel 510 addressing bad default channel 522b, whose address is address 524b. A good channel 576a is randomly selected from good channel table 570 to replace default channel 522b because default channel 522b is classified as bad. As another particular example, addressing arrow 534 depicts selection kernel 510 addressing bad default channel 522n-l, whose address is address 524n-l. A good channel 576k is randomly selected from good channel table 570 to replace bad default channel 522n-l.
- implementation of a selected set of communications channels includes setting a good channel usage timeout (GCUT).
- GCUT channel usage timeout
- interference may change over time, such as from other communications systems starting or stopping to be used or as a result of changes of location of the participants of the communications network or of interference sources, it may be useful to periodically change the set of channels being used. For example, some previously good channels may become bad and vice versa, thus impacting the communications system after the set of communications channels is selected and implemented in the communications network. For a Bluetooth or IEEE 802.15.1 FH communications system, a five-minute GCUT may be used.
- the participants of the communications network switch back to the original or default set of communications channels, after which additional performance testing may be performed and another set of communications channels selected.
- the switch back to the default set of communications channels may be performed by each participant at a selected time or after the specified time delay, or the master may send a "switch back" message to the other participants of the communications network with a timeout delay, and then after the timeout delay expires, the participants switch back.
- the additional performance testing may be performed prior to expiration of the GCUT to reduce the amount of time the participants use the default set of channels.
- prior to expiration of the GCUT 5 the participants are provided with a new set of channels, eliminating the need to switch to the default set of channels.
- interference may change over time as a result of other communications systems that become active or inactive or as a result of movement of the participants of a communications system or a source of interference. While the use of the GCUT will eventually allow for such changes to be detected and new channel sets selected that take into account the changes in interference, performance of the communications system prior to the expiration of the GCUT maybe impacted to an undesirable degree.
- the channel performance of the selected set of communications channels is monitored and rescanning of the default channels is triggered based on specified performance criteria. For example, if a channel previously classified as good is retested and determined to be bad, the communications network may switch back to the default channel set to allow for rescanning of the channels to select a new set of communications channels that account for changes in interference since the previous set was selected. As another example, a channel previously classified as good that is now found to be bad may be replaced by another good channel in the register of the participants. As yet another example, rescanning of the default channels may be triggered when the number of previously good but now bad channels reaches a specified number when the number of still good channels drops below a specified threshold.
- any method of measuring channel performance may be used for monitoring the selected set of communications channels, some methods may be more appropriate than others.
- the preamble correlation, HEC, CRC, PLR, and FEC approaches discussed above may be used, either alone or in combination with each other, because those approaches do not require the use of special packets.
- those approaches may be used during normal data transmissions, thereby providing continuous monitoring of the performance of the selected set of communications channels.
- a channel that has a specified number of lost packets, such as five, or another threshold of poor channel performance, may be reclassified as bad instead of good.
- messages are sent from a master to the slaves of a communications system to switch to and from selected sets of communications channels until a positive acknowledgement is received from the slaves.
- the master may transmit the selected set of communications channels to all the slaves of the communications network by sending good channel packets and then waiting to receive a positive acknowledgement message from each slave. If a negative acknowledgement is received from a slave, the master retransmits the set of channels to the slave until a positive acknowledgement is received.
- a negative acknowledgement may include the lack of any message from a slave within a specified period of time or a message indicating an error or other problem with the transmission of the selected set of communications channels.
- FIGS. 6A, 6B, and 6C are flow diagrams that depict the message sequencing for implementing adaptive frequency hopping, according to an embodiment of the invention.
- the message sequences depicted are illustrative and particular implementations may include fewer or more steps in the same or a different order or configuration. While steps are indicated as being performed by a master 610, slaves 612, or both, the steps indicated under one type of participant may be performed by other types of participants, and the participant types are not limited to participants that are designated to be either a master or a slave. Also, while the flow diagram depicts the use of either default channels 614 or good channels 616 during the indicated steps, other sets of channels may be used at each step.
- master 610 sends a master test packet to slaves 612.
- the master test packet may be that depicted in FIG. 3 A if the special packet testing approach is used.
- any desired channel performance testing method such as those discussed above, may be used alone or in combination with each other.
- master test packet 360 and slave test packet 380 will be described.
- the special packet and RSSI testing approaches for determining channel performance are more likely to be used for initial testing of the channels whereas the other testing approaches are more likely to be used for monitoring channel performance of a set of channels.
- each of slaves 612 test the NEB of master test packet 360 sent by the master to the particular slave over a specified communications channel, as discussed above, to determine the performance of the communications channel, as depicted by block 624.
- slaves 612 each transmit a slave test packet 380 to master 610.
- slave test packet 380 includes the NEB of the master test packet (e.g., NEB of last received packet 388 depicted in FIG. 3B).
- master 610 tests the NEB of slave test packet 380 sent by each of the slaves 612 over another specified communications channel. As discussed before, testing of each channel is typically performed for a specified number of times, such as 10, to get a fair representation of the typical performance of each channel and thereby avoid relying on one or a few tests that may not accurately reflect typical channel performance. [0146] In block 636, master 610 classifies the channels as bad or good based on the testing measurements (e.g., the calculated NEB of the master and slave test packets) by comparing the test results to one or more performance criteria, as discussed above.
- the testing measurements e.g., the calculated NEB of the master and slave test packets
- master 610 sends slaves 612 the good channels, such as by using good channel packet 400 that includes timeout 440 for specifying the delay until the communications network will begin to use the good channels.
- Slaves 612 receive good channel packet 400 in block 644.
- slaves 612 send an acknowledgement to master 610 that indicates whether good channel packet 400 was successfully received.
- Master 610 receives the acknowledgement messages from slaves 612 in block 652.
- master 610 determines whether a positive acknowledgement has been received from slaves 612. If not, the method returns to block 640 where master 610 sends good channel packet 400 again. If so, the method continues to block 658. [0150] From block 620 through block 654, default channels 614 are used by master 610 and slaves 612 to communicate. However, after expiration of the delay specified by timeout 440 of good channel packet 400, the participants hop over good channels 616 instead of default channels 614, as depicted in block 658.
- not all participants may implement the adaptive channel set selection approach described herein, and master 610 may not have received a positive acknowledgement from all the slaves by the time the timeout expires.
- the master communicates over the good channels with the slaves that are ready to use the good channels and over the default channels with the slaves that are not ready or are unable to use the good channels.
- the channel performance of the selected set of good channels is monitored, as depicted by block 662, to determine if new or increased interference occurs on the selected set of channels.
- the monitoring of channel performance may be done by any desired method, including the methods discussed above, either alone or in combination with each other.
- the preamble correlation, HEC, CRC, PLR, FEC, or some combination thereof is used since such methods do not require special packets or significant overhead as with the special packet or RSSI approaches.
- the determination may be made based on one or more criteria, including but not limited to the following: (1) the expiration of a specified time, such as a GCUT of 5 minutes; (2) classification of at least one previously good channel as now being bad; or (3) the number of channels that remain classified as good drops below a specified threshold (e.g., if the number of good channels of an original good channel set of 50 channels drops below 40).
- a specified time such as a GCUT of 5 minutes
- classification of at least one previously good channel as now being bad or (3) the number of channels that remain classified as good drops below a specified threshold (e.g., if the number of good channels of an original good channel set of 50 channels drops below 40).
- a specified threshold e.g., if the number of good channels of an original good channel set of 50 channels drops below 40.
- master 610 determines that a switch from good channels 616 back to default channels 614 is appropriate, master 610 sends a command to slaves 612 to "switch back to default channels", along with a timeout, as depicted in block 670.
- master 610 may use a modified version of good channel packet 400 that includes a command to switch back to default channels in the payload portion of the packet instead of good channel data 450.
- the "switch back" message includes a timeout similar to timeout 440 to specify the delay after which the participants of the communications network switch back to using default channels 614.
- Slaves 612 receive the "switch back" message with timeout in block 674, and then in block 678 slaves 612 send an acknowledgement to master 610 that indicates whether the "switch back" message was successfully received. Master 610 receives the acknowledgement messages from slaves 612 in block 682.
- master 610 determines whether a positive acknowledgement has been received from slaves 612. If not, the method returns to block 670 where master 610 sends the "switch back" message again. If so, the method continues to block 690. [0158] In block 690, after expiration of the delay specified by the timeout included in the "switch back" message, the participants hop over default channels 614 instead of good channels 616.
- This technology can be categorized into two broad classes that include unlicensed cognitive radios operating in the unlicensed bands and unlicensed cognitive radios operating in the licensed bands. Each class has unique challenges to ensure successful operation. The second being particularly challenging since there are parts of the radio spectrum that are used by passive receivers such as radio astronomy where very weal- distant objects are being observed. A typical signal power in radio astronomy is less than a trillionth of a watt. Detecting and avoiding these passive receivers is an extremely challenging problem and one method of solving this problem is to require any device operating in this band to be able to determine its location and avoid utilizing that part of the spectrum once in the proximity of this sensitive receiver.
- a cognitive radio In unlicensed radio bands, such as the newly allocated 5.470-5.725 GHz band and the 3.650-3.700 GHz band, a cognitive radio must sense the presence of the incumbent spectrum owner (or licensee) and vacate within a very short period with minimum number of transmissions. Detection must be successful irrespective of the varied transmission characteristics of the incumbent device and irrespective of the instantaneous RF propagating conditions. The transmission characteristics can vary significantly even within the same band. For example, pulse repetition rates for radars operating in the 5GHz band can vary from (20) twenty to (100,000) one hundred thousand pulses per second and the 3dB bandwidth of the transmitter varies from approximately 500Khz to approximately 150MHz.
- a radio local area network In the ETSI regulatory domain a radio local area network must vacate a channel in 10 seconds after the first radar pulse is detected with a channel closing time, i.e. maximum transmission time during a channel move, of 260ms. Furthermore before a channel can be utilized it must be sensed for a minimum of 60s. This presents some very significant challenges that have yet to be addressed by conventional wireless communications systems.
- a wireless communications approach includes background monitoring.
- a first set of one or more communications channels is used for communications.
- a second set of one or more communications channels are monitored separately and concurrently with communications on the first set of one or more communications channels to identify incumbent users, i.e., one or more other users that have rights to use any of the second set of one or more communications channels.
- the monitoring may also be used to characterize the performance of the second set of one or more communications channels and pre-qualify communications channels as replacement communications channels.
- the particular communications channel is replaced by a replacement communications channel.
- the replacement communications channel is one that has been determined, via the background monitoring, to not have an incumbent user.
- FIG. 7 is a block diagram that depicts a communications apparatus 700 configured in accordance with an embodiment of the invention.
- Communications apparatus 700 includes a communications transceiver 702, a background monitor 704, a communications manager 706, a communications interface 708 and storage 710.
- Communications transceiver 702 is a mechanism configured to allow communications apparatus 700 to transmit and receive data to and from other communications devices, for example, over a wireless communications link.
- Background monitor 704 is a mechanism configured to monitor a plurality of communications channels so that the plurality of communications channels can be characterized.
- background monitor 704 may include one or more receivers and corresponding hardware and software for processing information received by the one or more receivers.
- Communications manager 706 is a mechanism configured to manage communications for communications apparatus 700.
- Communications interface 708 may be any mechanism that allows communications apparatus 700 to exchange data with other apparatuses or devices, e.g., one or more other wireless devices. ⁇
- Storage 710 may be any type of storage, including volatile storage, nonvolatile storage, or any combination of volatile and non- volatile storage. According to one embodiment of the invention, storage 710 includes configuration data 712 and channel performance data 714 that are described in more detail hereinafter. [0170] Communications transceiver 702, background monitor 704, communications manager 706, communications interface 708 and storage 710 may be implemented by hardware, software, or any combination of hardware and software and the approach is not limited to any particular implementation. Furthermore, although these elements are depicted in FIG. 7 as being separate, the functionality of two or more of these elements may be combined into a single element, depending upon a particular implementation. Communications apparatus 700 may include other elements, components and processes, depending upon a particular implementation, that are not depicted in FIG. 7 or described herein for purposes of explanation.
- background monitor 704 may provide background monitoring services for any number of communications apparatuses or devices.
- background monitor 704 may reside on any one of the communications apparatuses for which background monitoring services are being provided or background monitor 704 may reside external to all of the communications apparatuses.
- channel performance data 714 may be maintained at one of the communications apparatuses, or in a separate database accessible by the communications apparatuses.
- FIG. 8 is a flow diagram 800 that depicts a functional overview of an approach for providing wireless communications using background monitoring, according to an embodiment of the invention.
- an initial frequency band is selected and an initial set of communications channels to be used in the frequency band is identified.
- the initial frequency band may be specified, for example, by configuration data 712 or by a user, such as administrative personnel.
- the initial set of communications channels may be specified by configuration data 712 or by a user.
- the initial set of communications channels may be selected automatically, for example by communications manager 706 evaluating characteristics of the communications channels and 'choosing communications channels that are determined to provide adequate performance.
- the approach is applicable to any wireless communications systems or protocols.
- Example wireless applications include, without limitation, WLAN, WPAN and WiMAX.
- Example frequency bands include, without limitation, the 2.4 GHz band, the 3.650-3.700 GHz band and the 5.470-5.725 GHz band.
- step 804 communications begin on the initial set of communications channels.
- communications transceiver 702 begins communicating with one or more other communications devices on the initial set of communications channels.
- background monitoring is started to identify any incumbent users and to characterize communications channels.
- background monitor 704 begins monitoring the communications channels in the selected frequency band to identify any incumbent users and to determine the performance of the communications channels. This may include, for example, generating channel performance data 714 that specifies one or more attributes of the communications channels in the frequency band. The attributes may indicate the performance of the communications channels and whether any of the communications channels have incumbent users, i.e., are currently being used by one or more other wireless devices.
- FIG. 8 depicts the background monitoring of step 806 starting after the selection of the initial frequency band and initial set of communications channels in step 802, the approach is not limited to this context and background monitor 704 may be started earlier and used, for example, to select the initial set of communications channels.
- step 808 one or more communications channels are replaced as necessary with replacement communications channels.
- a determination is made that a particular communications channel is no longer to be used for communications.
- the determination that the particular communications channel is no longer to be used for communications may be made based upon a variety of factors. For example, an incumbent user may have been detected on the particular communications channel. As another example, the particular communications channel may no longer have acceptable performance characteristics.
- the particular communications channel is substituted with a replacement communications channels. For example, suppose that communications manager 706 determines that the particular communications channel no longer satisfies the one or more channel selection criteria or that an incumbent user has been detected on the particular communications channel. Communications manager 706 examines channel performance data 714 to identify a replacement communications channel that satisfies one or more channel selection criteria.
- the channel selection criteria may be any type of channel selection criteria, depending upon a particular implementation, and may be specific to a particular frequency band. Communications manager 706 then causes the replacement communications channel to be used in place of the particular communications channel. This may include communications apparatus 700 instructing other communications devices to use the replacement communications channel in place of the particular communications channel that is no longer to be used.
- background monitoring is performed separately and concurrently with communications on the plurality of communications channels.
- a particular communications channel needs to be replaced, for example, because an incumbent user has been detected on the particular communications channel or the performance of the particular communications channel is no longer acceptable, the particular communications channel can be replaced with a replacement communications channel that has already been pre-qualified. This avoids having to cease communications to pre-qualify communications channels to identify a replacement communications channel.
- communications may only occur on one particular frequency band. For example, all of the participating devices may be using one particular frequency band. In this situation, background monitoring may be limited to only the particular frequency band being used. Background monitoring may be further limited to particular communications channels within the particular frequency band.
- participating devices maybe capable of using multiple frequency bands for communications.
- background monitoring may be performed on multiple frequency bands. This may include the frequency bands being used for communications as well as other frequency bands.
- the order in which frequency bands and communications channels are monitored may vary, depending upon the implementation. Any type of algorithm or approach may be used to select an order in which communications channels and frequency bands are monitored and the approach is not limited to any particular algorithm or approach.
- the frequency bands and communications channels to be monitored, and their order, may be specified, for example, by configuration data 712 or by a user, such as administrative personnel.
- communications apparatus 700 may be configured to automatically determine the frequency bands and communications channels to be monitored, and an order in which they are to be monitored.
- the particular frequency bands and communications channels that are monitored, and/or the order in which they are monitored, may change over time, depending upon a particular implementation.
- Some communications devices may change the frequency band(s) that they are using, for example, based upon geographic location, or the communications devices may be reconfigured to use different frequency bands.
- the background monitoring may change in accordance with the change in frequency bands and/or change in communications channels within a frequency band.
- Background monitoring may include re-monitoring communications channels that have previously been monitored.
- a wide variety of approaches may be used to determine when communications channels are re-monitored. For example, a particular replacement communications channel may be re-monitored before being used to replace a communications channel that is no longer to be used. This ensures that the particular replacement communications channel is still suitable for use, in case the characteristics of the particular replacement communications channel have changed since the last time the particular replacement communications channel was evaluated.
- a time constraint may be used to automatically re-monitor replacement communications channels after a specified time has elapsed. The re-monitoring of communications channels is not limited to replacement communications channels.
- any communications channel may be re-monitored, including communications channels that have been previously characterized as unsuitable or having an incumbent user. This is useful in situations where transitory interference initially caused a communications channel to be characterized as unsuitable for communications. It is also useful for situations where an incumbent user transmits only very infrequently, but that a prior monitoring happened to detect the transmission.
- background monitoring may include identifying communications channels that have incumbent users, i.e., communications channels that are currently being used by other users.
- the determination that a particular communications channel has an incumbent user may be made using a variety of techniques and the approach is not limited to any particular technique.
- an incumbent user may be detected based upon the presence of at least a threshold amount of energy on the particular communications channel.
- the presence of at least a threshold amount of energy on the particular communications channel provides an indication that an incumbent user, or another user, is transmitting on the particular communications channel.
- the threshold may be selected to differentiate between users transmitting on the particular communications channel and background noise or other interference.
- an incumbent user may be detected based upon the presence of at least a threshold amount of energy and at least one characteristic of an incumbent user.
- a wide variety of characteristics may be used to detect and incumbent user, depending upon a particular implementation, and the approach is not limited to any particular characteristics.
- the characteristic may include any modulation characteristic, other property or even identification data.
- an incumbent user is determined to exist on a particular communications channel when at least a threshold amount of energy is detected on the particular communications channel and a packet preamble is detected.
- the packet preamble may be any portion of a preamble for any communications protocol, e.g., a portion of an 802.11 packet that is associated with an incumbent user.
- Detecting a packet preamble in combination with at least a threshold amount of energy helps to differentiate between incumbent users, other users and other energy sources or general interference.
- Some standards for non-licensed use of licensed spectrum may specify that incumbent users identify themselves as such using, for example, by using an identification tone or code.
- Other standards or legacy systems may not include the use of an identification tone or code.
- power spectral analysis may be used to identify incumbent users.
- the power spectral density of a transmission generally indicates the output power of a transmission as a function of frequency.
- the power spectral density of a transmission may be used to identify particular modulation schemes, such as an 802.11 signal.
- a power spectral density having a "spike” shape may indicate the use of a single carrier
- a series of “spikes” may indicate the use of frequency hopping
- a square or rectangular power spectral density may indicate the use of orthogonal frequency division multiplexing (OFDM).
- a database may be used to efficiently compare the power spectral density of a transmission with power spectral density "masks" stored in a database of power spectral density masks.
- Channel performance data 714 may be analyzed by background monitor 704, communications manager 706, or any other entity or process, to identify replacement communications channels.
- Replacement communications channels maybe identified, for example, by comparing performance data 714 to a one or more channel selection criteria to identify communications channels that satisfy the one or more channel selection criteria.
- Channel performance data 714 may be updated to reflect the communications channels that satisfy the one or more channel selection criteria. For example, data may be added to channel performance data 714 to identify particular communications channels that do not have any identified incumbent users and that have acceptable performance.
- Channel performance data may also indicate a ranking of communications channels based upon performance. This reduces the amount of computational overhead required to identify replacement communications channels.
- Channel selection criteria may be specific to particular frequency bands.
- FIG. 9 is a diagram that depicts example channel performance data 714.
- Channel performance data 714 may include less data than depicted in FIG. 9 or more data, depending upon a particular implementation, and the approach is not limited to any particular channel performance data 714.
- channel performance data 714 includes, for each of N number of communications channels, whether an incumbent user has been detected, an average interference power (IPA) , a maximum interference power (EPM) and the signal-to-noise ratio (SNR).
- IPA average interference power
- EPM maximum interference power
- SNR signal-to-noise ratio
- Other channel performance and quality data may also be collected, depending upon a particular implementation.
- Channel performance data 714 may include data for communications channels in any number of frequency bands and the data may be organized by frequency band.
- FIG. 10 is a flow diagram 1000 that depicts a wireless communications approach using background monitoring according to an embodiment of the invention.
- an initial frequency band is selected, for example, based upon configuration data 712.
- a communications channel from the initial frequency band is selected and monitored.
- a determination is made whether the communications channel is a "good" communications channel.
- a "good" communications channel is one that is suitable for communications, i.e., it is free of interference, has acceptable performance and does not have any incumbent users.
- the communications channel may be monitored for any length of time and any criteria may be used, depending upon a particular implementation. After a communications channel has been monitored for at least a specified time with no indication of any incumbent users and having acceptable performance, the communications channel may be characterized as "good". ' i
- step 1006 If in step 1006, the communications channel is not considered to be a "good" communications channel, then in step 1008, a determination is made whether more communications channels are available to be monitored in the initial frequency band. If so, then in step 1010, a next communications channel is selected and monitored in step 1004. If, in step 1008, there are no additional channels available to be monitored in the initial frequency band, then in step 1012, another frequency band is selected. Then, in step 1010, a communications channel is selected for monitoring from the other frequency band and the selected communications channel is monitored in step 1004.
- communications apparatus 700 may enter a "sleep" mode for a specified time and then being re-monitoring communications channels, starting again with the initial frequency band.
- Steps 1002 through 1012 represent an approach for identifying an initial communications channel that is free of interference and has acceptable performance.
- Steps 1002 through 1012 provide example steps that may be performed, for example, when communications apparatus 700 is first started up, e.g., during a "cold start". Once at least one good communications channel has been identified, then in step 1014, channel performance data 714 is updated accordingly. Also, in step 1016, several functions are performed. First, communications commence on the identified "good" communications channel. Also, the background monitoring continues separately and concurrently with communications on the good communications channel. The background monitoring monitors other communications channels within the same frequency band and may also include monitoring communications channels in other frequency bands, effectively iteratively performing steps 1004 through 1012.
- the background monitoring may also include updating channel performance data 714 as channels are monitored, to indicate whether any incumbent users have been detected, to indicate performance criteria and to indicate whether each communications channel satisfies the channel selection criteria and is therefore a "good" communications channel that is suitable for use.
- step 1016 also includes substituting communications channels as necessary. As previously described herein, if a particular communications channel is determined to have an incumbent user, or otherwise not have acceptable performance, the particular communications channel is replaced with a replacement communications channel identified by the background monitoring.
- the wireless communications approach using background monitoring described herein may be implemented in a variety of ways and the invention is not limited to any particular implementation.
- the approach may be integrated into a communications system or a network device, including but not limited to communications devices and communications channel selector apparatuses.
- the approach may be implemented as a stand-alone mechanism, including but not limited to a communications device and a communications channel selector apparatus, that can operate independently of a communications system.
- the approach may be implemented in computer software, hardware, or any combination thereof.
- FIG. 11 is a block diagram that illustrates an example computer system 1100 upon which an embodiment of the invention may be implemented.
- Computer system 1100 includes a bus 1102 or other communication mechanism for communicating information, and a processor 1104 coupled with bus 1102 for processing information.
- Computer system 1100 also includes a main memory 1106, such as a random access memory (RAM) or other dynamic storage device, coupled to bus 1102 for storing information and instructions to be executed by processor 1104.
- Main memory 1106 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 1104.
- Computer system 1100 further includes a read only memory (ROM) 1108 or other static storage device coupled to bus 1102 for storing static information and instructions for processor 1104.
- ROM read only memory
- a storage device 1110 such as a magnetic disk or optical disk, is provided and coupled to bus 1102 for storing information and instructions.
- Computer system 1100 may be coupled via bus 1102 to a display 1112, such as a cathode ray tube (CRT), for displaying information to a computer user.
- a display 1112 such as a cathode ray tube (CRT)
- An input device 1114 is coupled to bus 1102 for communicating information and command selections to processor 1104.
- cursor control 1116 is Another type of user input device
- cursor control 1116 such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 1104 and for controlling cursor movement on display 1112.
- This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane.
- the invention is related to the use of computer system 1100 for implementing the techniques described herein. According to one embodiment of the invention, those techniques are performed by computer system 1100 in response to processor 1104 executing one or more sequences of one or more instructions contained in main memory 1106. Such instructions may be read into main memory 1106 from another machine- readable medium, such as storage device 1110. Execution of the sequences of instructions contained in main memory 1106 causes processor 1104 to perform the process steps described herein. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention. Thus, embodiments of the invention are not limited to any specific combination of hardware circuitry and software.
- machine-readable medium refers to any medium that participates in providing data that causes a machine to operation in a specific fashion.
- various machine-readable media are involved, for example, in providing instructions to processor 1104 for execution.
- Such a medium may take many forms, including but not limited to, nonvolatile media, volatile media, and transmission media.
- Non-volatile media includes, for example, optical or magnetic disks, such as storage device 1110.
- Volatile media includes dynamic memory, such as main memory 1106.
- Transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 1102.
- Transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications.
- Machine-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD- ROM, any other optical medium, punchcards, papertape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read.
- Various forms of machine-readable media may be involved in carrying one or more sequences of one or more instructions to processor 1104 for execution.
- the instructions may initially be carried on a magnetic disk of a remote computer.
- the remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem.
- a modem local to computer system 1100 can receive the data on the telephone line and use an infra-red transmitter to convert the data to an infra-red signal.
- An infra-red detector can receive the data carried in the infra-red signal and appropriate circuitry can place the data on bus 11!02.
- Bus 1102 carries the data to main memory 1106, from which processor 1104 retrieves and executes the instructions.
- Computer system 1100 also includes a communication interface 1118 coupled to bus 1102.
- Communication interface 1118 provides a two-way data communication coupling to a network link 1120 that is connected to a local network 1122.
- communication interface 1118 may be an integrated services digital network (ISDN) card or a modem to provide a data communication connection to a corresponding type of telephone line.
- ISDN integrated services digital network
- communication interface 1118 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN.
- LAN local area network
- Wireless links may also be implemented.
- communication interface 1118 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
- Network link 1120 typically provides data communication through one or more networks to other data devices.
- network link 1120 may provide a connection through local network 1122 to a host computer 1124 or to data equipment operated by an Internet Service Provider (ISP) 1126.
- ISP 1126 in turn provides data communication services through the world wide packet data communication network now commonly referred to as the "Internet" 1128.
- Internet 1128 uses electrical, electromagnetic or optical signals that carry digital data streams.
- the signals through the various networks and the signals on network link 1120 and through communication interface 1118, which carry the digital data to and from computer system 1100, are exemplary forms of carrier waves transporting the information.
- Computer system 1100 can send messages and receive data, including program code, through the network(s), network link 1120 and communication interface 1118.
- a server 1130 might transmit a requested code for an application program through Internet 1128, ISP 1126, local network 1122 and communication interface 1118.
- the received code may be executed by processor 1104 as it is received, and/or stored in storage device 1110, or other non- volatile storage for later execution. In this manner, computer system 1100 may obtain application code in the form of a carrier wave.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Quality & Reliability (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A wireless communications approach includes background monitoring to identify incumbent users and to characterize communications channels. One or more communications channels are used for wireless communications and are monitored separately and concurrently with the communications on the one or more communications channels. The background monitoring may identify communications channels that have incumbent users or do not have acceptable performance and therefore are not to be used for communications. The background monitoring may also pre-qualify communications channels that do not have incumbent users and have acceptable performance. When a determination is made that a particular communications channel is no longer to be used for communications, for example, because an incumbent user has been detected on the particular communications channel or because the performance of the particular communications channel is no longer acceptable, then the particular communications channel is replaced by a replacement communications channel identified via the background monitoring.
Description
WIRELESS COMMUNICATIONS APPROACH USING BACKGROUND MONITORING
FIELD OF THE INVENTION
[0001] The present invention relates generally to wireless communications, and more particularly to a wireless communications approach using background monitoring.
BACKGROUND
[0002] A communications network is any system or mechanism that provides for the exchange of information or data between participants. As used herein, the term "participant" refers to a device or mechanism that communicates with other devices or mechanisms. In some communications network arrangements, one of the participants is designated as a master participant, or simply as the "master." The master generally initiates and controls communications with the other participants, which are conventionally referred to as slave participants, or simply as "slaves." Masters may also be assigned other functions to perform. Although a master participant typically performs additional functions than the other participants, any participant is capable of performing these functions if elected as the master participant. [0003] A frequency hopping (FH) protocol is an approach for wireless communications in a communications network that uses a frequency hopping signal transmission technique in which information or data is transmitted over a set of frequencies in a communications frequency band. A frequency hopping communications system is a system that uses a FH protocol. The order in which the communications network hops among the set of frequencies is known as the hopping sequence. [0004] In contrast to FH systems, a non-frequency hopping (NFH) system is simply a communications system whose carrier does not hop over a set of frequencies. A typical NFH system may occupy a portion of the communications frequency band corresponding to several frequencies used by an FH system.
[0005] With the FH approach, the frequency band is broken up into separate frequencies, often referred to as "channels." The FH system transmits data on one channel, hops to the next channel in the hopping sequence to transmit more data, and continues by transmitting data on subsequent channels in the hopping sequence. The switching of frequencies may occur many times each second. The use of an FH protocol
helps to reduce problems with interference from other communications systems and other interference sources. Frequency hopping also helps with fading of transmissions and power consumption and also provides security for the transmission so that others may not intercept the data being transmitted because others do not know the hopping sequence. [0006] An example of a frequency hopping protocol is the Institute of Electrical and Electronics Engineers (IEEE) 802.15.1 Wireless Personal Area Network Standard, which is based on the Bluetooth™ wireless personal area network (WPAN) technology from the Bluetooth Special Interest Group. The BLUETOOTH trademarks are owned by Bluetooth SIG, Inc., U.S.A. The Bluetooth protocol uses 79 individual randomly chosen frequency channels numbered from 0 to 78 and changes the frequencies 1600 times per second. Examples of NFH systems include the IEEE 802.1 Ib Wireless Local Area Network (WLAN) and the IEEE 802.15.3 next-generation WPAN, both of which operate in the 2.4 GHz Industrial, Scientific, Medical (ISM) band, which is an unlicensed portion of the radio spectrum that may be used in most countries by anyone without a license. [0007] An FH communications system may be either point-to-point, meaning that communications paths are provided from one participant to another participant, or point- to-multipoint, meaning that communications paths are provided from one participant to multiple participants.
[0008] Typically one device of the network, such as the master, determines the hopping sequence that will be used by all participants of the network. The other participants of the network, such as slaves, are time synchronized with the master to maintain communications with the master. For example, the Bluetooth and IEEE 802.15.1 frequency hopping protocols are point-to-multipoint systems in which the frequency hopping sequence is deteπnined by the physical address of the master and the phase of hopping is determined by the master's clock. The "physical address" of the master is a unique identifier, such as a media access control (MAC) address, that identifies the device anywhere in the world on a network.
[0010] Some FH communications system are configured such that certain devices transmit at specified times or timeslots. For example, slaves may respond to the master at assigned timeslots. As another example, in a Bluetooth FH communications system, the master may transmit at even-numbered timeslots on the hopping sequence and the slaves listen at those regular intervals. The master will address one slave (or all slaves in a "broadcast" mode), and the addressed slave returns back to the master at the next odd- numbered timeslot. [0011] A preamble, which is known to all the participants of the FH network, is used
to identify the network and for the slaves to synchronize with the master. For example, in Bluetooth and IEEE 802.15.1, the known preamble is called the "channel access code." [0012] One problem with frequency hopping communications systems is that coexistence problems arise between the FH communications system and NFH communications systems that operate in the same frequency band. While the FH communications system hops over the entire frequency band, the NFH communications systems occupy separate parts of the frequency band. When the FH communications system hops over part of the frequency band occupied by an NFH communications system, there may be interference between the systems. Although the use of a FH protocol helps to lessen the interference problem because not all of the FH channels will interfere with other communications systems, there nevertheless remains interference on those channels that coincide with the NFH communications systems. An example of the interference situation is the coexistence problem between the frequency hopping IEEE 802.15.1 WPAN and the non-frequency hopping IEEE 802.11b Wireless Local Area Network (WLAN) because both share the 2.4 GHz ISM band. [0013] Further, because of the dynamic nature of interference due to the use of devices at different times and locations, eventually all FH channels will experience some degree of interference at some time. Interference may change depending on when the communications systems use the band and the relative locations of the participants of each system to participants of another system. Because the participants may be mobile, interference may vary depending on the movements of the participants of one system relative to the locations of participants of other systems. In addition, interference may arise from other sources, such as some consumer appliances like microwave ovens, resulting in a degradation of performance of the FH communications system. [0014] Interference results in data transmission errors, such as an increase in the bit error rate (BER) or the loss of data packets, resulting in reduced transmission quality and performance and the need to retransmit the data.
[0015] One approach for managing the coexistence problem is to increase the power used in the transmissions so that the other interfering system have less of an impact on the system transmitting at the increased power. However, this increased power approach drains batteries used by the participants, and thus the required power increase may be impractical. Also, the increased power approach only benefits the system using the increased power and results in a bigger interference impact on other systems. [0016] Another approach for managing the coexistence problem is to skip a "bad" channel that suffers from interference, such as by moving onto the next channel in the
sequence or by jumping to another randomly selected channel. However, this skipping approach does not necessarily avoid other bad channels because the next channel used may also have an interference problem. Also, known "bad" and "good" channels may change over time due to the transient nature of some types of interference. [0017] Based on the need for wireless communications and the limitations of conventional approaches, an approach for managing interference in communications system, such as the coexistence problem between frequency hopping communications systems and non-frequency hopping communications systems, that does not suffer from the limitations of the prior approaches is highly desirable.
SUMMARY
[0018] Techniques are provided for selecting sets of communications channels based on channel performance. According to one aspect of the invention, a method selects communications channels for a communications system. A set of communications channels is selected based on the performance of the communications channels and channel selection criteria. Then another set of communications channels is selected based on a later performance of the communications channels and the channel selection criteria. [0019] According to another aspect of the invention, a method is provided for communicating with a participant. A set of communications channels is selected based on the performance of the communications channels and a performance criterion. Identification data that identifies the set of communications channels is generated and provided to the participant. The set of communications channels is used for communicating with the participant according to a frequency hopping protocol. According to other aspects, another set of communications channels is selected in a similar manner when a specified criterion is satisfied, including but not limited to, after expiration of a specified length of time, when the performance of at least one of the channels in the set of channels satisfies another performance criterion, or when a specified number of the set of channels satisfies yet another performance criterion. [0020] According to one aspect of the invention, a communications device is used in a network that communicates via a frequency hopping protocol. The communications device includes a memory that has identification data that identifies a set of communications channels that is selected based on channel performance and a performance criterion. The communications device includes a transceiver that is communicatively coupled to the memory and that is configured to transmit and receive, based on the identification data, over the set of channels, according to a frequency
hopping protocol. The communications device includes a processor for generating a measurement of channel performance based on receiving a packet from another device and transmitting another packet to the other device that contains data indicating the measurement of channel performance.
[0021] According to another aspect, another communications device is used in a network that communicates via a frequency hopping protocol. The communications device includes a memory for storing sequences of instructions and a processor communicatively coupled to the memory. When the processor executes the instructions, the instructions cause the processor to determine the performance of communications channels and then select a set of channels based on the performance and a performance criterion. The processor generates and stores in the memory data that identifies the set of channels and transmits the data to another communications device. The communications device includes a transceiver that is communicatively coupled to the memory and that is configured to transmit and receive, based on the data, over the set of channels according to a frequency hopping protocol.
[0022] According to another aspect of the invention, a communications channel selector apparatus is provided. The apparatus is configured to determine channel performance at one time and select based on that performance a set of channels based on channel selection criteria. The apparatus is configured to then determine the channel performance at a later time and select another set of channels based on that latter performance and the channel selection criteria.
[0023] According to other aspects, the invention encompasses a system, a computer-readable medium, and a carrier wave configured to carry out the foregoing functions.
BRIEF DESCRIPTION OF THE DRAWINGS
[0024] The present invention is depicted by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:
[0025] FIG. IA is a flow diagram that depicts an approach for selecting sets of communications channels based on channel performance, according to an embodiment of the invention;
[0026] FIG. IB is a flow diagram that depicts an approach for communicating with a participant using a set of good channels, selected according to an embodiment of the
invention.
[0027] FIG. 2 is a block diagram that depicts a communications network, according to an embodiment of the invention.
[0028] FIG. 3 A is a block diagram that depicts an example format of a standard packet, according to an embodiment of the invention.
[0029] FIG. 3B is a block diagram that depicts a master test packet that is sent by a master to slaves to test channel performance, according to an embodiment of the invention.
[0030] FIG. 3 C is a block diagram that depicts a slave test packet that is sent by a slave to a master to provide channel performance measurements and to test channel performance, according to an embodiment of the invention.
[0031] FIG. 4 is a block diagram that depicts a good channel packet sent by a master to slaves to identify a set of selected channels, according to an embodiment of the invention.
[0032] FIG. 5 A is a block diagram that depicts the loading of a set of channels into a channel register, according to an embodiment of the invention.
[0033] . FIG. 5B is a block diagram that depicts the replacement of bad channels with good channels in a default set of channels in a channel register, according to an embodiment of the invention.
[0034] FIGS. 6A, 6B, and 6C are flow diagrams that depict example message sequencing for implementing adaptive frequency hopping, according to an embodiment of the invention.
[0035] FIG. 7 is a block diagram that depicts a communications apparatus configured according to an embodiment of the invention.
[0036] FIG. 8 is a flow diagram that depicts a functional overview of an approach for providing wireless communications using separate channel monitoring according to an embodiment of the invention.
[0037] FIG. 9 is a diagram that depicts example channel performance data.
[0038] FIG. 10 is a flow diagram that depicts a wireless communications approach using background monitoring according to an embodiment of the invention.
[0039] FIG. 11 is a block diagram that depicts an example computer system upon which embodiments of the invention may be implemented.
DETAILED DESCRIPTION
[0040] An approach for selecting sets of communications channels based on channel performance is described. In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are depicted in block diagram form in order to avoid unnecessarily obscuring the present invention.
[0041] In the following description, various embodiments of the invention are described in the following sections:
I. OVERVIEW π. TESTING CHANNEL PERFORMANCE
A. Special Test Packets
B . Received Signal Strength Indicator (RSSI)
C. Preamble Correlation
D. Header Error Check (HEC)
E. Cyclic Redundancy Check (CRC)
F. Packet Loss Ratio (PLR)
G. Forward Error Correction (FEC)
H. Other Channel Performance Testing Considerations
III. CHANNEL CLASSIFICATION
IV. COMMUNICATING SELECTED CHANNELS TO PARTICIPANTS
V. IMPLEMENTING ADAPTIVE FREQUENCY HOPPING
VI. MONITORING CHANNELS
VII. MESSAGE SEQUENCING AND EXAMPLE IMPLEMENTATION
VIII. WIRELESS COMMUNICATIONS APPROACH USING BACKGROUND MONITORING
A. Introduction
B. Overview
C. Architecture
D. Functional Overview
E. Background Monitoring i. Incumbent User Detection ii. Channel Performance Data
F. Operational Example IX. IMPLEMENTATION MECHANISMS
I. OVERVIEW
[0042] A novel approach for managing network communications generally involves selecting sets of communications channels based on channel performance. An initial set of channels is selected based on one or more selection criteria at the start-up of the communications network. Additional sets of channels are then periodically selected to adaptively avoid interference.
[0043] FIG. IA is a flow diagram that depicts an approach for selecting sets of communications channels based on channel performance, according to an embodiment of the invention. In block 110, the performance of a set of available communications channels is determined. For example, for a communications system that uses 100 channels, some or all of the 100 channels may be tested to determine channel performance. Other systems using the same frequency band may interfere with several of the 100 channels.
[0044] In block 114, a set of communications channels to be used is selected based on the channel performance determined in block 110, one or more performance criteria, and one or more selection criteria. For example, a communications system may experience interference on channels 3 through 5 from one communications system and on channels 50 through 54 from another communications system. The channel testing may indicate a high bit error rate (BER) on those channels. Channels may be classified by comparing the test results to the performance criteria. For example, the performance criteria may be a specified value, or a specified threshold. If the BER for a channel exceeds the specified threshold, the channel is classified as "good," whereas channels with a BER that does not exceed the specified threshold are classified as "bad." The reason why a bad channel's performance does exceed the specified threshold may be due to a variety of reasons, including but not limited to, the channel being used by another communications system or noise from other interference sources, such as microwave ovens.
[0045] After classifying the performance of the channels, a set of channels is selected based on the selection criteria. For example, the selection criteria may be to select the good channels but not the bad channels. Thus, by selecting the set of good communications channels, the communications system performing the channel selection may avoid interference present on the bad channels.
[0046] Although this example describes the use of a particular type of performance criteria to classify channels and particular type of selection criteria to select from the classified channels, other approaches may be used to select a set of channels. For example, channels may be selected based on comparing performance results to one or more criteria without first classifying the channels. Also, other criteria may be used, for example, that particular channels are, or are not, to be selected regardless of the test results.
[0047] In block 118, the performance of the communications channels is determined again by additional testing. This additional testing may be initiated according to a specified schedule, such as the expiration of specified time period, or the additional testing may be initiated as a result of monitoring and detecting new interference among the selected set of channels, such as from another communications system that previously did not cause interference. For example, in the communications system example above, the additional testing may be performed over some or all of the original 100 channels. [0048] In block 122, a new set of communications channels is selected based on the channel performance determined in block 118 in a manner similar to that of block 114 above. For example, the new set of channels may be based on selecting channels that are good when the additional testing of block 118 is performed. The new set of channels may be different than the good channels selected in block 112 because new interference typically may be present from other systems that were not being used at the time of the first testing of block 110 or that were not in sufficient proximity at the time of the first testing of block 110 to cause sufficient interference to result in the channels being classified as bad.
[0049] According to other aspects of the invention, the determination and re-determination of channel performance depicted by blocks 110 and 118 may be performed by a different entity or device than the selection of the channels depicted in blocks 114 and 122. hi general, each step may be performed by a different entity, and a particular entity may perform any number of the steps of a particular embodiment of the invention.
[0050] The determination of channel performance and the selection of a new set of communications channels depicted by blocks 118 and 122, respectively, may be repeated based on the same types of reasons as discussed above for block 118. As a result, the method depicted in FIG. IA may adaptively avoid interference, even if the interference changes over time, by periodically retesting channel performance and selecting new sets of communications channels to avoid using channels with unacceptable performance.
[0051] This approach avoids interference, such as from the coexistence problem between different communications systems that use the same part of a communications band, by testing performance of communications channels to determine a set of channels that have acceptable performance according to one or more performance criteria. [0052] By using this novel approach to adaptively select sets of communications channels based on channel performance at various times, interference problems are reduced and transmission performance is improved for both the communications system that selects a set of communications channels to use and other interfering communications systems. Also, by reducing interference, the power level required to achieve a specified transmission quality is decreased, thereby increasing battery life of mobile devices. The approach described herein may be characterized as "robust" because interference in a communications system is reduced or eliminated by using channels that have been tested and determined to be "good" because channel performance exceeds a specified threshold as compared to channels that have been tested and determined to be "bad" because channel performance falls below the specified threshold. The approach described herein is a simple scheme that is easy to implement on many devices (due to the low computational requirements), that requires little memory, and that is fully interoperable with devices that do not support this novel approach.
[0053] FIG. IB is a flow diagram 100 that depicts an approach for communicating with a participant using a set of good channels, selected according to an embodiment of the invention, hi block 130, performance data for communications channels is determined. For example, in a Bluetooth or an IEEE 802.15.1 FH communications system, some or all of the 19 channels maybe tested to deteπnine a received signal strength indication (RSSI) or by checking transmission quality based on transmission errors.
[0054] In block 132, a set of communications channels is selected by comparing the performance data determined in block 130 to performance criteria to determine whether each channel is good or bad. Then a set of channels is selected that includes only good channels. For example, channels 25-30 of the original 79 channels of the Bluetooth or IEEE 802.15.1 FH communications system examples above maybe classified as bad due to interference from an NFH communications system, resulting in the selection of channels 0-24 and 31-78 for the channel set.
[0055] In block 134, channel identification data is generated that identifies the set of selected communications channels. For example, in the Bluetooth or IEEE 802.15.1 FH communications system examples above, a reduced frequency hopping sequence that uses
good channels 0-24 and 31-78 may be selected, or alternatively, bad channels 25-30 may be replaced by randomly-selected good channels in the normal hopping sequence. [0056] In block 136, the channel identification data identifying the selected set of communications channels is provided to the participant. For example, in the Bluetooth or IEEE 802.15.1 FH communications system examples above, the master may provide a slave with information on which channels are selected and/or not selected in block 132 (e.g., channels 0-24 and 31-78).
[0057] In block 138, the set of communications channels is used to communicate with the participant. For example, in the Bluetooth or IEEE 802.15.1 FH communications system examples above, a master may communicate with the slave using the set of selected channels as identified in the identification data generated in block 134. [0058] In block 140, the performance of the communications channels is redetermined. The performance determination in block 140 may be in a manner similar to, or different from, that of the original performance determination in block 130. The redetermination of channel performance in block 140 may be initiated based on a number of criteria. For example, the new testing may be performed at periodic intervals, when interference is detected on the selected set of communications channels, or when the available number of good channels falls below a specified number. [0059] In block 142, a new set of communications channels is selected based on the testing performed in block 140 and specified performance criteria to determine which channels are currently good and which are bad. For example, in the Bluetooth or IEEE 802.15.1 FH communications system examples above, a mobile NFH communications system that previously caused interference may no longer be a problem if the NFH communications system is no longer operating or has moved away from the FH communications system. Also, another previously undetected NFH communications system may be causing interference for the opposite reason. For this example, assume that the NFH communications system causing interference on channels 25-30 is no longer a problem because the NFH communications system has moved, but also assume that another FH communications system is now active and causing interference on channels 3, 22, 48, and 53.
[0060] In block 144, data is generated, which identifies the new set of communications channels. For example, in the Bluetooth or IEEE 802.15.1 FH communications system examples above, a smaller frequency hopping sequence that does not use channels 3, 22, 48, and 53 may be selected, or channels 3, 22, 48, and 53 may be replaced by good channels in the normal hopping sequence.
[0061] In block 146, the data identifying the new selected set of communications channels is provided to the participant. For example, in the Bluetooth or IEEE 802.15.1 FH communications system examples above, the master may provide a slave with a hopping sequence based on the new channels selected in block 142. [0062] In block 148, the new set of communications channels is used to communicate with the participant. For example, in the Bluetooth or IEEE 802.15.1 FH communications system examples above, a master may communicate with the slave using the set of selected channels as identified in the identification data generated in block 144. [0063] The steps in blocks 140-148 may be repeated as necessary depending on the requirements of a particular application or implementation. As a result, the approach may be used to adaptively select sets of communications channels that provide a specified channel performance, thereby avoiding interference with other communications systems and other sources of interference.
[0064] According to another embodiment of the invention, a new set of communications channels is used to supplement an existing set of communications channels. In contrast to the approach above in which the second set of channels is determined by retesting all possible channels and then using the second set in place of the first set (or in place of a default set), a specified number of channels may be randomly selected for testing, and if found to have acceptable performance, used to add to those channels of the first set that still have acceptable performance. [0065] FIG. 2 is a block diagram that depicts a communications network 200, according to an embodiment of the invention. For clarity, FIG. 2 depicts a small number of communications devices, whereas in practice any number of such communications devices may be used. Examples of communications devices that may be used in a network that uses the channel selection approach described herein include, but are not limited to, wireless devices that are used in wireless local area networks (WLANs) and in wireless personal area networks (WPANs), such as cordless phones, laptop computers, desktop computers, printers, and personal digital assistants (PDAs). Wireless devices may communicate in a variety of ways, including but not limited to, infrared, line of sight, cellular, microwave, satellite, packet radio and spread spectrum technologies. Some communications devices may be characterized as mobile devices based on the relative ease of moving such devices between locations or because the mobile devices may be conveniently carried by a person, such as cordless phones, laptop computers, and PDAs. [0066] Communications network 200 includes a master 210 and slaves 220, 230.
Master 210 includes a memory 212 that may be used to store instructions, a processor 214 that may execute the instructions stored in memory 212, and a transceiver 216 that is configured to transmit and receive communications between master 210 and other devices of communications network 200, such as slaves 220, 230.
[0067] Slaves 220, 230 include a memory 222, 232, a processor 224, 234 and a transceiver 226, 236, respectively, that perform functions similar to the corresponding elements of master 210.
[0068] According to one embodiment of the invention, master 210 selects, as described herein, a set of communications channels from the default communications channels for a specified communications protocol, generates identification data for the selected set of channels, and transmits the identification data to slave 220, such as by using the approach of FIG. IB.
[0069] However, slave 230 may not be capable of using the selected set of channels. For example, slave 230 may not be configured to use a selected set of good channels sent by master 210. As a result, master 210 communicates with slave 220 using the selected set of communications channels and communicates with slave 230 using the default communications channels for the specified communications protocol. For example, if a FH communications protocol is used, master 210 and slave 220 communicate by hopping over the selected set of good communications channels, while master 210 and slave 230 communicate by hopping over the default communications channels for the FH protocol.
II. TESTING CHANNEL PERFORMANCE
[0070] According to one embodiment of the invention, channel performance is monitored using one or more channel performance measurement techniques. For example, any of the techniques for measuring channel performance that are discussed below may be used alone or in combination. Different methods may be used for testing channels to select a set of communications channels and to monitor the performance of the selected set of communications channels, depending on the requirements of a particular application or implementation. Although testing is normally performed on all possible communications channels, it is not necessary to test all channels, nor is it necessary to use the same method for determining or monitoring performance of different channels.
A. Special Test Packets
[0071] According to one embodiment of the invention, special test packets containing known content are used to test the performance of communications channels. As used herein, a "packet" is a block of data used for transmissions in a packet-switched system.
For example, packets may include a preamble, a header, a payload, and a tail, alone or in any combination.
[0072] The number of error bits (NEB) that occur in the known content of the special test packets may be calculated to determine channel performance. For channels in which there is interference, such as from another communications system, the NEB will be high as a result of the interference. Conversely, if there is no interference, the NEB will be low.
[0073] For example, a slave may calculate the NEB for a transmission from a master to the slave and include the result in a subsequent transmission from the slave to the master. In addition to receiving the calculated NEB from the slave in the subsequent transmission, the master may calculate the NEB for the transmission from the slave to the master based on the subsequent transmission. As a result, performance in both directions of communications may be measured, which may be important because interference may occur to differing degrees in each direction depending on many factors, such a^ the relative locations of the master and slave to a source of interference.
[0074] FIG. 3 A is a block diagram that depicts an example format of a standard packet 300, according to an embodiment of the invention. Standard packet 300 is for a
Bluetooth or an IEEE 802.15.1 FH communications system. Standard packet 300 includes a known preamble 310, a packet header 320, and a payload 330.
[0075] Known preamble 310 is used to identify the FH communications network and for the slaves to synchronize with the master. Known preamble 310 is a binary string of data whose length depends on the communications protocol. For example, for a
Bluetooth based FH communications system, known preamble 310 is 72 bits in length.
[0076] Packet header 320 contains control information, such as the origination and destination address of the packet, the type of packet, and the priority level for the packet.
[0077] Payload 330 contains the contents or data being carried by standard packet
300, as compared to the control information, or overhead, of packet header 320.
[0078] FIG. 3B is a block diagram that depicts a master test packet 360 that is sent by a master to slaves to test channel performance, according to an embodiment of the invention. Master test packet 360 includes a known preamble 340, a packet header 364, a payload header 366, and copies of known preamble 370, 372, 374.
[0079] Known preamble 340 is analogous to known preamble 310 of FIG. 3A, but
known preamble 340 is unique for the FH communications system that uses master test packet 360.
[0080] Packet header 364 is analogous to packet header 320 in FIG. 3A, but may differ based on the content of master test packet 360, such as the particular original and destination addresses of the packet.
[0081] Payload header 366 contains control information relating to the payload portion of master test packet 360, such as the type of data contained in the payload. For the example depicted in FIG. 3B, payload header 366 identifies that the payload of master test packet 360 contains a specified number of copies of known preamble 340, depicted as copies of known preamble 370, 372, 374. Although master test packet 360 is depicted and described as including three copies of the known preamble 370, 372, 374, any number of copies may be used, subject to the capacity limits of the payload portion of the packet, and the payload portion of the packet may contain other data besides copies of the known preamble.
[0082] By including copies of known preamble 370, 372, 374 in the payload of master test packet 360, the slave that receives master test packet 360 may calculate the number of error bits (NEB) that occur in copies of known preamble 370, 372, 374 and in known preamble 340. For example, in a Bluetooth based FH communications system, such as Bluetooth or IEEE 802.15.1, the known preamble is referred to as the channel access code, which has a length of 72 bits. Based on the channel access code at the start of a packet and the three copies of the channel access code in the packet payload sent from the master to the slave, there are 288 bits of data to test channel performance based on the NEB.
[0083] FIG. 3C is a block diagram that depicts a slave test packet 380 that is sent by a slave to a master to provide channel performance measurements and to test channel performance, according to an embodiment of the invention. Slave test packet 380 includes a known preamble 340, a packet header 384, a payload header 386, an NEB of last received packet 388, and copies of known preamble 390, 392, 394.
[0084] Known preamble 340 of slave test packet 380 may be the same as that of master test packet 360, provided that master test packet 360 and slave test packet 380 are sent between participants of the same FH communications system.
[0085] Packet header 384 and payload header 386 are analogous to packet header 364 and payload header 366, respectively, with differences arising from the type of packet
(e.g., master to slave or slave to master) and packet contents (e.g., slave test packet 380 contains NEB of last received packet 388).
[0086] Slave test packet 380 includes the NEB of last received packet 388 that contains the NEB calculated by the slave for the last packet sent by the master to the slave, such as master test packet 360. The NEB of last received packet 388 is used to pass back from the slave to the master the information on the performance of the master to slave transmission over the particular channel used to send master test packet 360. [0087] In addition, by including copies of known preamble 390, 392, 394 in the payload of slave test packet 380, the master that receives slave test packet 380 from a slave may calculate the NEB that occur in copies of known preamble 390, 392, 394 and known preamble 340. As discussed above, channel performance may differ between transmissions from master to slave and from slave to master, for example, if an interference source is closer to one participant than the other. Although slave test packet 380 is depicted and described as including three copies of the known preamble 390, 392, 394, any number of copies may be used, subject to the capacity limits of the payload portion of the packet.
[0088] Each channel of a communications system may be tested repeatedly by using master test packet 360 and slave test packet 380 described herein. For example, in a Bluetooth or IEEE 802.15.1 FH communications system, the frequency hopping rate is 1,600 hops per second, and there are 79 channels. Therefore, in one second, each of the 79 channels may be tested both from the master to the slave and from the slave to the master 20 times.
[0089] Use of special test packets, such as master test packet 360 and slave test packet 380, may be well suited for initial channel testing because many separate and detailed tests may be made of each channel in a short amount of time. In addition, channel performance is measured on a scale from an NEB value of 0 to an NEB value corresponding to every test bit being in error, thereby providing a range of channel performance measurements. While the overhead associated with such detailed testing may be relatively high compared to other methods described below, such detailed testing is not generally performed frequently enough to make the overhead prohibitive.
B. Received Signal Strength Indicator (RSSI)
[0090] According to another embodiment of the invention, a received signal strength indicator (RSSI) is used to test the performance of communications channels. To determine the RSSI for a channel, a master can either just listen at a slave transmission time slot or the master or send a NULL packet to a slave to ensure that the slave will not transmit at the next slave transmission time slot. A NULL packet generally includes only
an access code and a packet header and is typically used to ensure that the master and slave are synchronized. When a slave receives a NULL packet, there is no return packet sent from the slave to the master.
[0091] By listening to the return channel from the slave, the signal received by the master represents the noise floor of the channel because the slave is not transmitting on the channel. If there is interference, such as from another communications system, the RSSI will be high. Conversely, if there is no interference, the RSSI will be low. Using this approach with a Bluetooth or IEEE 802.15.1 communications system, in one second a master may perform 10 RSSI measurements for each of the 79 channels. [0092] Use of RSSI may be well suited for initial channel testing because many separate and detailed tests may be made of each channel in a short amount of time. According to one embodiment of the invention, channel performance is measured on a scale from very low RSSI values to very high RSSI values corresponding to the noise level measured on the channel, thereby providing a range of channel performance measurements. While the overhead associated with such detailed testing may be relatively high compared to other methods described below, such detailed testing is not generally performed frequently enough to make the overhead prohibitive.
C. Preamble Correlation
[0093] According to another embodiment of the invention, the known preamble at the start of the packet is used to test the performance of communications channels. The preamble correlation approach is similar to the special test packet approach above, but without the use of copies of the known preamble in the payload portion of the packet. The master may use identification packets, NULL packets, POLL packets, or any other kind of packet and correlate the received preamble against the known preamble. A packet that does not pass the correlation is discarded (e.g., it is a lost packet). [0094] Use of the preamble correlation approach may be well suited for continuous monitoring of channel performance, such as the ongoing monitoring of a selected set of communications channels, because no special packets are required and therefore the overhead is relatively low compared to other approaches that require additional packets. However, the result of each measurement is whether the packet is discarded (or lost) or not, thus providing limited granularity because a one bit error provides the same result of a lost packet and a multiple bit error. Also, because one copy of the known preamble is used instead of multiple copies, there are fewer bits being used to detect interference problems. This increases the likelihood that a "bad" channel is mischaracterized as a
"good" channel.
D. Header Error Check (HEC)
[0095] According to another embodimeni of the invention, a header error check (HEC) is used to test the performance of communications channels. The HEC is a check on the contents of the packet header, such that if an error occurs in the packet header, the HEC does not check and the packet is discarded (e.g., it is a lost packet). [0096] Use of the HEC approach may be well suited for continuous monitoring of channel performance, such as the ongoing monitoring of a selected set of communications channels, because no special packets are required and therefore the overhead is relatively low compared to other approaches that require additional packets. However, the result of each measurement is whether the packet is discarded (or lost) or not, thus providing limited granularity because a one bit error provides the same result of a lost packet and a multiple bit error.
E. Cyclic Redundancy Check (CRC)
[0097] According to another embodiment of the invention, a cyclic redundancy check (CRC) is used to test the performance of communications channels. The CRC may be a check of either the payload of the packet or the complete contents of the packet, depending on the communications system protocol being used. As an example, in Bluetooth and IEEE 802.15.1, the data packet must pass a CRC check, otherwise the packet must be retransmitted. A retransmission request (RR) indicates poor channel performance.
[0098] Use of the CRC approach may be well suited for continuous monitoring of channel performance, such as the ongoing monitoring of a selected set of communications channels, because no special packets are required and therefore the overhead is relatively low compared to other approaches that require additional packets. However, the result of each measurement is whether there is a retransmission request or not, thus providing limited granularity because a one bit error provides the same result of a lost packet and a multiple bit error. However, as compared to other types of data checks, the CRC provides more bits for testing because either the payload or the entire packet is used to check for errors, instead of just a portion of the packet (e.g., just the header for HEC).
F. Packet Loss Ratio (PLR)
[0099] According to another embodiment of the invention, a packet loss ratio (PLR) is used for channel performance testing of transmissions between participants of a communications system. A packet loss may occur when a specified condition is satisfied, including but not limited to, a failure of the preamble correlation, HEC, or CRC. PLR may be well suited for both initial channel testing and continuous monitoring of channel performance.
G. Forward Error Correction (FEC)
[0100] According to another embodiment of the invention, forward error correction (FEC) is used for channel performance testing of transmissions between participants of a communications system. FEC may be performed on the packet header or on the payload of the packet. FEC is used as a form of redundant data encoding to allow the recipient to ensure the integrity of the received data and to correct any identified errors. As an example, in Bluetooth or IEEE 802.15.1, the packet header is 1/3 FEC coded, and the payload is 2/3 FEC coded. The FEC coding may be used for both an NEB calculation and for error correction.
[0101] Use of the FEC approach may be well suited for continuous monitoring of channel performance, such as the ongoing monitoring of a selected set of communications channels, because no special packets are required and therefore the overhead is relatively low compared to other approaches that require additional packets. While the result of each measurement provides more granularity via an NEB measurement than some of the other methods above, there is more overhead associated with FEC and less information may be included in each packet due to the redundant data encoding.
H. Other Channel Performance Testing Considerations
[0102] Although the descriptions of each channel performance measurement technique above describes the use of the same method for both master to slave and slave to master transmissions, different methods may be used for each transmission direction. For example, the RSSI approach may be used for master to slave transmissions while the preamble correlation is used for slave to master transmissions. Also, different methods may be combined, such that to have a test considered successful, two or more tests must be satisfied. For example, to receive a "pass" indication, a packet may have to pass both the preamble correlation and the HEC. Further, the tests used may change over time
depending upon the effectiveness of the tests and the requirements of a particular application or implementation.
III. CHANNEL CLASSIFICATION
[0103] According to one embodiment of the invention, a channel is classified based on the channel performance and one or more classification criteria. For example, a channel maybe classified as "good" or "bad" based on the results of the channel performance testing by applying one or more performance measurements to specified performance criteria as discussed above. As used herein, a good channel's performance exceeds a specified criterion, or a specified threshold, whereas a bad channel's performance does not exceed the specified threshold. Although this discussion assumes that all available channels, or all channels that could be used by the communications system, are to be tested and classified, particular implementations may test and classify fewer than all of the channels.
[0104] According to another embodiment of the invention, multiple tests of each channel are used to classify a channel. For example, a master may test each channel for a specified number of times, such as 10 tests per channel. The use of multiple tests provides a more accurate determination of channel performance because each individual test may be influenced by factors that produce results that do not accurately reflect the overall performance of the channel. For example, an isolated instance of interference may cause a poor channel performance measurement even though the channel generally performs well. Conversely, a channel with heavy interference may have an acceptable channel performance measurement during a temporary break in the interference, even though most of the time there is interference from the interference source, such as another communications system.
[0105] For example, Table 1 contains the results often channel performance tests for "n" channels. There are three possible results of each hypothetical channel performance test represented in Table 1 : high, medium, or low. In practice, each test may have a numerical value, such as an NEB or RSSI value. Also, each numerical test may be represented by a relative value, such as "superior," "average," or "poor", by converting a numerical value to such a qualitative scale (e.g., the RSSI is high indicating poor channel performance, the NEB is low indicating good channel performance, etc.). Further, each test may have a simple "pass/fail," "pass/loss", or "pass/RR" for checks such as HEC, CRC, or FEC, and the packet loss ratio (PLR) may be determined by calculating a
percentage of packets that are lost, such as by using the preamble correlation, HEC, CRC, or FEC.
TABLE l
Channel No. 1 2 n-1 n
Test 1 Low Low High High
Test 2 Low Low High High
Test 3 High Low High High
Test 4 Low Low High High
Test 5 Low High Low Medium
Test 6 Medium Low High High
Test 7 Low Low High High
Test 8 Low High High High
Test 9 Low Low High 1 High
Test 10 Low Low High High
Classification Bad Bad Good Good
[0106] In Table 1, channels 1 and 2 are classified as "bad" because the results generally indicate low channel performance even though not all of the individual test results for channels 1 and 2 are low and some are medium or even high. Channels n-1 and n are classified as "good" because the results generally indicate high channel performance even though some individual tests indicated a low or medium result. Although this example uses subjective performance criteria to classify the channels (e.g., that the results are generally low or high), quantitative performance criteria may be used, either in the form of numerical performance measurements or by assigning numerical values to the types of qualitative results depicted in Table 1. In addition, other classification criteria may be used, such as that the highest or lowest performance measurement is to be ignored.
[0107] According to another embodiment of the invention, different types of test results may be used and combined. For example, tests that provide NEB results, either numerical or converted to a qualitative scale, may be combined with CRC results of "pass/loss" to arrive at an overall assessment of channel performance. The manner in
which such results are combined depends on the particular implementation. For example, different types of tests may be converted to a single type of scale and then combined or averaged to reach a final result, or different test results may be combined using weighting factors that favor some types of tests over others to arrive at a final result. [0108] The conversion of numerical results to qualitative results and the combining of individual tests results to achieve a classification of each channel depends on the how competing tradeoffs are to be weighed for a given implementation. For example, high channel performance may be desired, but setting too high of a standard (e.g., all test results must be "high") may limit the number of channels classified as "good" such that there are few good channels available for use and may result in frequent retesting of the channels when supposedly poor performance is detected. Conversely, setting too low of a standard allows for a larger pool of channels to be used, but then channels with significant interference are classified as good when in fact channel performance is low and channels are not retested when new interference occurs.
[0109] According to another embodiment of the invention, the results of the chamiel performance testing are compared to one or more acceptance criteria. For example, if the testing provides NEB results, an average value may be determined and compared to an acceptance criterion, such as a threshold value. If the testing results exceed the threshold, the channel is classified as "bad", but if the testing results do not exceed the threshold, the channel is classified as "good." As another example, the correlation approach, HEC, and CRC may all be used to determine whether a packet is lost or not (e.g., whether an error occurs as a result of the transmission of the packet) and the packet loss ratio determined and compared to a threshold value. Assuming that a threshold of 15% is established, the loss of more than 15 packets out of 100 would result in the channel being classified as bad, whereas loosing 15 or fewer packets would result in the channel being classified as good.
[0110] Channel testing and classification may be performed by a master or other participants, such as slaves. In addition, channel testing and classifications from multiple participants may be combined and/or weighted to determine an overall, or final, classification for the channels of interest.
[0111] For example, Table 2 provides an illustration of a "referendum" approach that considers the channel performance determined by a master and seven slaves.
TABLE 2
Participant Channel 0 Channel 22 Channel n-1 Channel n
Master 0 0 1 1
Slave 1 0 0 1 1
Slave 2 0 0 1 0
Slave 3 0 0 1 1
Slave 4 0 0 1 1
Slave 5 0 1 1 1
Slave 6 0 0 1 1
Slave 7 0 0 1 1
Total Votes 0 1 8 7
Passing Mark 7 7 7 7
Classification Bad Bad Good Good i
I I
[0112] In the example depicted in Tahle 2, each participant has one "vote" on whether to use the channel or not. hi the example of Table 2, a vote of "0" means that participant is voting to not use the channel (e.g., the channel is found by that participant to be "bad"), and a vote of "1" means that the participant's vote is to use the channel (e.g., the channel is found by that participant to be "good").
[0113] A certain number of votes (e.g., the "passing mark") is required for the channel to be judged "good" and therefore available for use by the FH communications system, hi the example of Table 2, the passing mark is seven so that of the eight votes cast for each channel, seven participants must vote to use the channel for it to be classified as "good." The same considerations discussed above for determining how to combine different test results and how to set the threshold for determining whether a channel is bad or good apply here when combining the results of channel performance testing by multiple participants.
[0114] While Table 2 indicates that each participant has an equally weighted vote, other referendum approaches may be used. For example, the vote of particular participants, such as the master or a specified slave or slaves, may be given a higher weight. As another example, particular participants may be able to "veto" the result,
meaning that those particular participants must vote to use the channel in order for it to receive a passing score.
[0115] Other approaches using other classification criteria that differ from that of Table 2 may be used, such as a different manner for counting votes (e.g., using "weighted" votes where some votes count more than others) or determining which participants may vote. Not every participant needs to have input for each channel under consideration. While the referendum may be managed by the master in most cases, other participants may collect and combine the channel performance information, or votes, to determine the final channel classifications.
IV. COMMUNICATING SELECTED CHANNELS TO PARTICIPANTS
[0116] According to another embodiment of the invention, the set of communications channels is selected based on one or more selection criteria, and data that indicates the selected set of channels is sent to other participants of the communications system. For example, a master may select the channels classified as "good," generate a special packet that identifies the selected set of good communications channels in the payload, and send the special packet to one or more other participants in the communications network. While the master typically performs the selection of the good channels and notifies other participants of the communications system, other participants may perform one or both functions instead of the master.
[0117] According to one embodiment of the invention, the master instructs the other participants when to begin using the selected set of channels. For example, the master may include in the special packet a specified time at which the participants are to begin using the selected channels. Alternatively, the specified time may represent a time delay after which the participants of the communications system begin to use the good channel set instead of the previously used channels. Other time criteria may be used in addition to specifying a time or to specifying a time delay
[0118] FIG. 4 is a block diagram that depicts a good channel packet 400 sent by a master to slaves to identify a set of selected channels, according to an embodiment of the invention. Although the example depicted in FIG. 4 uses particular types of data in a particular order along with particular error checking and data redundancy approaches, others maybe used in place of or in addition to those depicted, and not all of the features depicted in FIG. 4 are necessary for a particular implementation. [0119] Good channel packet 400 includes a known preamble 410, a packet header 420, and a payload header 430, all of which are analogous to the similar elements
depicted and discussed with reference to FIGS. 3A, 3B, and 3C above. In addition, good channel packet 400 includes a timeout 440, good channel data 450, and a CRC 460. Good channel data 450 is part of the payload portion of good channel packet 400 and identifies the selected set of good communications channels to be used by the participants of the communications network. Good channel data 450 may be encoded, such as by using a 1/3 FEC coding scheme, to allow the recipient of good channel packet 400 to correct any errors in good channel data 450 that occur as a result of the transmission of good channel packet 400.
[0120] CRC 460 is a cyclic redundancy check value for verifying the accurate transmission of good channel packet 400. If the cyclic redundancy check fails, a retransmission request may be sent by the recipient of good channel packet 400 to the sender of good channel packet 400 to have another good channel packet 400 sent. [0121] Timeout 440 specifies a particular time at which the participants are to begin using the new channel, or an amount of time that the participants of the communications system are to wait before beginning to use the good channels identified by good channel data 450. For example, in a Bluetooth or IEEE 802.15.1 FH communications system, timeout 440 specifies the number of time slots to wait before the master and slaves begin to use the good channels. For such FH communications systems, the number of time slots must be at least twice the number of slaves because the master separately communicates good channel packet 400 to each slave at even number time slots and receives an acknowledgement back from each slave on the odd numbered time slots. Other communications systems may use a shorter delay by using a broadcast packet to simultaneously inform the other participants of the communications network of the selected set of communications channels.
[0122] According to another embodiment of the invention, additional security protection may be included by sending the good channel information in an encrypted format to the other participants in the communications network. Consider a typical FH communications system in which the FH sequence may be determined if the MAC address of the master is known (because that MAC address is used to select the hopping sequence). By encrypting the good channel data, even if the MAC address is known, the selection by the master of the channels to use and then transmitting those selected channels to other participants in an encoded format precludes other entities from working out the hopping sequence merely by knowing the MAC address. While having the MAC address may provide others with the possible channels that could be used by the particular FH communications network, the other entities cannot determine from the MAC address
which channels the master has selected and in wnicn order me master nas arranged me selected channels.
[0123] According to another embodiment of the invention, some participants of the communications system do not use the selected set of good channels. For example, although typically the selected set of channels is used by all of the participants of the communications system, there may be some participants who are not configured to accept and use a set of communications channels sent by another participant. As a result, in a particular communications system, some participants may communicate with each other using the original or default set of communications channels while other participants communicate using a selected set of good channels.
[0124] For example, the master of a FH communications system may track which slaves do and which slaves do not implement the adaptive FH approach described herein. For slaves using the good communications channels, the master and such slaves communicate using that set of good channels, but other slaves that do not use the good channels communicate with the master over the default set of communications channels for the particular FH protocol.
[0125] According to yet another embodiment of the invention, more than one set of selected channels is used for communications between different pairings of participants in a communications network. For example, a particular set of selected communications channels may be used between a master and one or more specified slaves while another particular set of selected communications channels is used between the master and one or more other specified slaves. As another example, each pairing of the master and a slave may communicate on a different set of communications channels, such as one of the selected sets of communications channels or the default set of communications channels for the communications system.
V. IMPLEMENTING ADAPTIVE FREQUENCY HOPPING
[0126] According to another embodiment of the invention, after a participant has received the set of selected communications channels, the participant stores data that indicates the new set of selected channels. For example, in a Bluetooth or IEEE 802.15.1 FH communications system, each participant has a selection kernel that addresses a register. The output of the kernel is a set of addresses for each slot in the register, while the content of the slot in the register is a channel number. Instead of modifying the selection kernel, which is usually complicated, the register is loaded using only the
selected set of communications channels. As a result, when the kernel addresses the register, only the selected set of channels are used.
[0127] Because the size of the register is typically based on the standard number of channels for the FH protocol, and the selected set of channels will normally not include some "bad" channels, the number of selected channels is less than the number of slots in the register. One approach for filling up the register is to cyclically load the register using the selected set of communications channels until the register is full. Another approach is to replace "bad" channels in the original or default channel set using good channels that are randomly selected from the selected channel set. For example, if channel 3 is classified as bad but channel 12 is good, then channel 12 is specified in place of channel 3 in the default hopping sequence.
[0128] FIG. 5 A is a block diagram that depicts the loading of a set of channels into a channel register, according to an embodiment of the invention. FIG. 5A depicts a selection kernel 510, a register with default channels 520, a register with good channels 550, and a table of good channels 570. Register with default channels 520 includes default channels 522a-522n that are the channel numbers for the default set of hopping frequencies for the particular FH protocol being used for the communications network. Register with default channels 520 also includes addresses 524a-524n that are the addresses associated with each slot containing one of default channels 522a-522n, respectively. The addressing by selection kernel 510 of register with default channels 520 is depicted by an addressing arrow 512.
[0129] Register with good channels 550 includes default channels 552a-552n that are the channel numbers for the good channels, such as may be provided to the participant using good channel packet 400. The set of selected good channels is depicted in FIG. 5 A as table of good channels 570. The loading of the good channels from table of good channels 570 into register with good channels 550 is depicted by a loading arrow 572. [0130] Register with good channels 550 also includes addresses 554a-554n that are the addresses associated with each slot containing one of good channels 552a-552n, respectively. The addressing by selection kernel 510 of register with good channels 550 is depicted by addressing arrow 514. As selection kernel 510 is not modified, an index is applied to the output of selection kernel 510 to address register with good channels 550. When the system switches back to register with default channels 520, the index is removed, and vice versa. Because register with good channels 550 is loaded using the good channels from table of good channels 570, only those good channels are addressed by selection kernel 510.
[0131] FIG. 5B is a block diagram that depicts the replacement of bad channels with good channels in a default set of channels in a channel register, according to an embodiment of the invention. FIG. 5B depicts many of the same features as described above with respect to FIG. 5 A, except for the differences discussed herein. The major difference between the example of FIG. 5A and FIG. 5B is that in FIG. 5B, whenever selection kernel 510 addresses a channel classified as bad in register with default channels 520, the bad channel is replaced with a good channel that is randomly selected from table of good channels 570. Thus, only good channels are selected to form the hopping sequence.
[0132] In the example of FIG. 5B, register with default channels 520 is the same as in FIG. 5 A. However, whenever selection kernel 510 addresses a bad default channel in register with default channels 520, the bad default channel is replaced with good channels that are randomly selected from table of good channels 570. Assume for this example that default channels 522b and 522n-l are classified as bad and that the remaining default channels are classified as good. Also, for this example, table of good channels 570 includes good channels 576a-576n.
[0133] hi the particular example of FIG. 5B, addressing arrow 530 depicts selection kernel 510 addressing good default channel 522a, whose address is address 524a. Default channel 522a is used because default channel 522a is classified as good. Although not depicted in FIG. 5B, good default channels 522c and 522n are similarly addressed. However, addressing arrow 532 depicts selection kernel 510 addressing bad default channel 522b, whose address is address 524b. A good channel 576a is randomly selected from good channel table 570 to replace default channel 522b because default channel 522b is classified as bad. As another particular example, addressing arrow 534 depicts selection kernel 510 addressing bad default channel 522n-l, whose address is address 524n-l. A good channel 576k is randomly selected from good channel table 570 to replace bad default channel 522n-l.
[0134] As a result of the replacement channel approach described above, all the good channels of the original default set of channels in the original hopping sequence are kept in the same position, while all the bad channels in the original hopping sequence are replaced by good channels. The bad channel replacement approach is dynamic, meaning that the same bad channel can be replaced by another randomly selected good channel when, at a later time, the selection kernel addresses the bad channel. [0135] According to another embodiment of the invention, implementation of a selected set of communications channels includes setting a good channel usage timeout
(GCUT). Because interference may change over time, such as from other communications systems starting or stopping to be used or as a result of changes of location of the participants of the communications network or of interference sources, it may be useful to periodically change the set of channels being used. For example, some previously good channels may become bad and vice versa, thus impacting the communications system after the set of communications channels is selected and implemented in the communications network. For a Bluetooth or IEEE 802.15.1 FH communications system, a five-minute GCUT may be used.
[0136] According to one embodiment of the invention, after expiration of the GCUT, the participants of the communications network switch back to the original or default set of communications channels, after which additional performance testing may be performed and another set of communications channels selected. The switch back to the default set of communications channels may be performed by each participant at a selected time or after the specified time delay, or the master may send a "switch back" message to the other participants of the communications network with a timeout delay, and then after the timeout delay expires, the participants switch back. In addition, the additional performance testing may be performed prior to expiration of the GCUT to reduce the amount of time the participants use the default set of channels. According to another embodiment of the invention, prior to expiration of the GCUT5 the participants are provided with a new set of channels, eliminating the need to switch to the default set of channels.
VI. MONITORING CHANNELS
[0137] As discussed above, interference may change over time as a result of other communications systems that become active or inactive or as a result of movement of the participants of a communications system or a source of interference. While the use of the GCUT will eventually allow for such changes to be detected and new channel sets selected that take into account the changes in interference, performance of the communications system prior to the expiration of the GCUT maybe impacted to an undesirable degree.
[0138] According to one embodiment of the invention, the channel performance of the selected set of communications channels is monitored and rescanning of the default channels is triggered based on specified performance criteria. For example, if a channel previously classified as good is retested and determined to be bad, the communications
network may switch back to the default channel set to allow for rescanning of the channels to select a new set of communications channels that account for changes in interference since the previous set was selected. As another example, a channel previously classified as good that is now found to be bad may be replaced by another good channel in the register of the participants. As yet another example, rescanning of the default channels may be triggered when the number of previously good but now bad channels reaches a specified number when the number of still good channels drops below a specified threshold.
[0139] While any method of measuring channel performance may be used for monitoring the selected set of communications channels, some methods may be more appropriate than others. For example, the preamble correlation, HEC, CRC, PLR, and FEC approaches discussed above may be used, either alone or in combination with each other, because those approaches do not require the use of special packets. As a result, those approaches may be used during normal data transmissions, thereby providing continuous monitoring of the performance of the selected set of communications channels. A channel that has a specified number of lost packets, such as five, or another threshold of poor channel performance, may be reclassified as bad instead of good.
VII. MESSAGE SEQUENCING AND EXAMPLE IMPLEMENTATION
[0140] According to another embodiment of the invention, messages are sent from a master to the slaves of a communications system to switch to and from selected sets of communications channels until a positive acknowledgement is received from the slaves. For example, the master may transmit the selected set of communications channels to all the slaves of the communications network by sending good channel packets and then waiting to receive a positive acknowledgement message from each slave. If a negative acknowledgement is received from a slave, the master retransmits the set of channels to the slave until a positive acknowledgement is received. A negative acknowledgement may include the lack of any message from a slave within a specified period of time or a message indicating an error or other problem with the transmission of the selected set of communications channels. As another example, a similar acknowledgement approach may be used when the master sends a message to the slaves of the communications network to switch back to a default set of communications channels. [0141] FIGS. 6A, 6B, and 6C are flow diagrams that depict the message sequencing for implementing adaptive frequency hopping, according to an embodiment of the
invention. The message sequences depicted are illustrative and particular implementations may include fewer or more steps in the same or a different order or configuration. While steps are indicated as being performed by a master 610, slaves 612, or both, the steps indicated under one type of participant may be performed by other types of participants, and the participant types are not limited to participants that are designated to be either a master or a slave. Also, while the flow diagram depicts the use of either default channels 614 or good channels 616 during the indicated steps, other sets of channels may be used at each step.
[0142] In block 620, master 610 sends a master test packet to slaves 612. The master test packet may be that depicted in FIG. 3 A if the special packet testing approach is used. In general, any desired channel performance testing method, such as those discussed above, may be used alone or in combination with each other. However, for this example, the use of master test packet 360 and slave test packet 380 will be described. As noted before, the special packet and RSSI testing approaches for determining channel performance are more likely to be used for initial testing of the channels whereas the other testing approaches are more likely to be used for monitoring channel performance of a set of channels.
[0143] After master test packet 360 is received, each of slaves 612 test the NEB of master test packet 360 sent by the master to the particular slave over a specified communications channel, as discussed above, to determine the performance of the communications channel, as depicted by block 624.
[0144] In block 628, slaves 612 each transmit a slave test packet 380 to master 610. As discussed above, slave test packet 380 includes the NEB of the master test packet (e.g., NEB of last received packet 388 depicted in FIG. 3B).
[0145] In block 632, master 610 tests the NEB of slave test packet 380 sent by each of the slaves 612 over another specified communications channel. As discussed before, testing of each channel is typically performed for a specified number of times, such as 10, to get a fair representation of the typical performance of each channel and thereby avoid relying on one or a few tests that may not accurately reflect typical channel performance. [0146] In block 636, master 610 classifies the channels as bad or good based on the testing measurements (e.g., the calculated NEB of the master and slave test packets) by comparing the test results to one or more performance criteria, as discussed above. [0147] In block 640, master 610 sends slaves 612 the good channels, such as by using good channel packet 400 that includes timeout 440 for specifying the delay until the communications network will begin to use the good channels.
[0148] Slaves 612 receive good channel packet 400 in block 644. In block 648, slaves 612 send an acknowledgement to master 610 that indicates whether good channel packet 400 was successfully received. Master 610 receives the acknowledgement messages from slaves 612 in block 652.
[0149] In block 654, master 610 determines whether a positive acknowledgement has been received from slaves 612. If not, the method returns to block 640 where master 610 sends good channel packet 400 again. If so, the method continues to block 658. [0150] From block 620 through block 654, default channels 614 are used by master 610 and slaves 612 to communicate. However, after expiration of the delay specified by timeout 440 of good channel packet 400, the participants hop over good channels 616 instead of default channels 614, as depicted in block 658.
[0151] As noted above, not all participants (e.g., all of slaves 612) may implement the adaptive channel set selection approach described herein, and master 610 may not have received a positive acknowledgement from all the slaves by the time the timeout expires. According to one embodiment of the invention, the master communicates over the good channels with the slaves that are ready to use the good channels and over the default channels with the slaves that are not ready or are unable to use the good channels. [0152] During the use of good channels 616 by the participants of the communications network, the channel performance of the selected set of good channels is monitored, as depicted by block 662, to determine if new or increased interference occurs on the selected set of channels. The monitoring of channel performance may be done by any desired method, including the methods discussed above, either alone or in combination with each other. Typically, the preamble correlation, HEC, CRC, PLR, FEC, or some combination thereof is used since such methods do not require special packets or significant overhead as with the special packet or RSSI approaches. [0153] In block 666, a determination is made whether to switch back from good channels 616 to default channels 614. The determination may be made based on one or more criteria, including but not limited to the following: (1) the expiration of a specified time, such as a GCUT of 5 minutes; (2) classification of at least one previously good channel as now being bad; or (3) the number of channels that remain classified as good drops below a specified threshold (e.g., if the number of good channels of an original good channel set of 50 channels drops below 40). The particular details of each criteria, such as the expiration time or the threshold on the number of good channels, depends on the striking a balance for a particular implementation between the desired performance of the channels and the overhead of reselecting new, good channels.
[0154] If in block 666 a determination is made not to switch back to default channels 614, the method returns to block 662 to continue monitoring channel performance. If a deteπnination is made to switch, then the method continues on to block 670. [0155] After master 610 determines that a switch from good channels 616 back to default channels 614 is appropriate, master 610 sends a command to slaves 612 to "switch back to default channels", along with a timeout, as depicted in block 670. For example, master 610 may use a modified version of good channel packet 400 that includes a command to switch back to default channels in the payload portion of the packet instead of good channel data 450. The "switch back" message includes a timeout similar to timeout 440 to specify the delay after which the participants of the communications network switch back to using default channels 614.
[0156] Slaves 612 receive the "switch back" message with timeout in block 674, and then in block 678 slaves 612 send an acknowledgement to master 610 that indicates whether the "switch back" message was successfully received. Master 610 receives the acknowledgement messages from slaves 612 in block 682.
[0157] In block 686, master 610 determines whether a positive acknowledgement has been received from slaves 612. If not, the method returns to block 670 where master 610 sends the "switch back" message again. If so, the method continues to block 690. [0158] In block 690, after expiration of the delay specified by the timeout included in the "switch back" message, the participants hop over default channels 614 instead of good channels 616.
[0159] In block 694, the performance of the default channels is redetermined by additional testing, meaning that the process returns to block 620 to repeat the steps outlined above.
VIII. WIRELESS COMMUNICATIONS APPROACH USING BACKGROUND MONITORING
A. Introduction
[0160] Wireless network technologies have grown at an exceedingly faster pace during the past few years. As new services have been provisioned, government bodies such as the Federal Communications Commission (FCC) have allocated wireless radio spectrum on an exclusive basis to these new services. Unfortunately wireless spectrum is a very scarce resource. Evidence to this fact is the crowded nature of radio frequency
spectrum allocation charts. In order to facilitate the continued innovation and growth in the wireless industries researchers and government agencies such as the FCC are trying to determine techniques and policies respectively, which will alleviate the spectrum crunch. [0161] One initiative that may significantly increase the amount of usable spectrum is that of cognitive radio documented in FCC Notice of Proposed Rule Making NPRM 03- 322. Cognitive radio is a methodology for opportunistic utilization of fallow spectrum. This technology can be categorized into two broad classes that include unlicensed cognitive radios operating in the unlicensed bands and unlicensed cognitive radios operating in the licensed bands. Each class has unique challenges to ensure successful operation. The second being particularly challenging since there are parts of the radio spectrum that are used by passive receivers such as radio astronomy where very weal- distant objects are being observed. A typical signal power in radio astronomy is less than a trillionth of a watt. Detecting and avoiding these passive receivers is an extremely challenging problem and one method of solving this problem is to require any device operating in this band to be able to determine its location and avoid utilizing that part of the spectrum once in the proximity of this sensitive receiver.
[0162] In unlicensed radio bands, such as the newly allocated 5.470-5.725 GHz band and the 3.650-3.700 GHz band, a cognitive radio must sense the presence of the incumbent spectrum owner (or licensee) and vacate within a very short period with minimum number of transmissions. Detection must be successful irrespective of the varied transmission characteristics of the incumbent device and irrespective of the instantaneous RF propagating conditions. The transmission characteristics can vary significantly even within the same band. For example, pulse repetition rates for radars operating in the 5GHz band can vary from (20) twenty to (100,000) one hundred thousand pulses per second and the 3dB bandwidth of the transmitter varies from approximately 500Khz to approximately 150MHz.
[0163] It must also perform communications with a minimum amount of transmit power, hi the 5.470-5.725 GHz band the incumbent users are radiolocation, radio navigation and meteorological radars, hi the 3.650-3.700GHz band the incumbent user is the C-band fixed space to earth satellite service. In order to ensure that minimum power is transmitted the device must determine the minimum power that will be necessary to maintain communications in a dynamic RF environment. Furthermore to avoid unnecessarily declaring a channel as occupied and causing significant disruption to the network the designer must tradeoff the stringent requirements of the probability of detection against an unnecessarily high probability of false alarm.
[0164] Another challenging problem in the implementation of cognitive radio for WLANs is that of moving the network and resuming communications with minimum disruption to the network. In the ETSI regulatory domain a radio local area network must vacate a channel in 10 seconds after the first radar pulse is detected with a channel closing time, i.e. maximum transmission time during a channel move, of 260ms. Furthermore before a channel can be utilized it must be sensed for a minimum of 60s. This presents some very significant challenges that have yet to be addressed by conventional wireless communications systems.
B. Overview
[0165] According to one aspect of the invention, a wireless communications approach includes background monitoring. According to this approach, a first set of one or more communications channels is used for communications. A second set of one or more communications channels are monitored separately and concurrently with communications on the first set of one or more communications channels to identify incumbent users, i.e., one or more other users that have rights to use any of the second set of one or more communications channels. The monitoring may also be used to characterize the performance of the second set of one or more communications channels and pre-qualify communications channels as replacement communications channels. When a determination is made that a particular communications channel from the first set of one or more communications channels is no longer to be used for communications, for example, because an incumbent user has been detected on the particular communications channel or because the performance of the particular communications channel is no longer acceptable, then the particular communications channel is replaced by a replacement communications channel. The replacement communications channel is one that has been determined, via the background monitoring, to not have an incumbent user. [0166] The approach provides interference and incumbent user avoidance while maintaining service because the background monitoring is performed separate from and concurrently with the communications on the first set of one or more communications channels. Thus, the approach eliminates downtime attributable to ceasing communications to pre-qualify new communications channels, for example, when an incumbent user has been detected. The approach is very useful in regulated communications environments, particularly in those that require a minimum communications channel evaluation time that is longer than a maximum time to vacate.
C. Architecture
[0167] FIG. 7 is a block diagram that depicts a communications apparatus 700 configured in accordance with an embodiment of the invention. Communications apparatus 700 includes a communications transceiver 702, a background monitor 704, a communications manager 706, a communications interface 708 and storage 710. [0168] Communications transceiver 702 is a mechanism configured to allow communications apparatus 700 to transmit and receive data to and from other communications devices, for example, over a wireless communications link. Background monitor 704 is a mechanism configured to monitor a plurality of communications channels so that the plurality of communications channels can be characterized. For example, background monitor 704 may include one or more receivers and corresponding hardware and software for processing information received by the one or more receivers. Communications manager 706 is a mechanism configured to manage communications for communications apparatus 700. Communications interface 708 may be any mechanism that allows communications apparatus 700 to exchange data with other apparatuses or devices, e.g., one or more other wireless devices. \
[0169] Storage 710 may be any type of storage, including volatile storage, nonvolatile storage, or any combination of volatile and non- volatile storage. According to one embodiment of the invention, storage 710 includes configuration data 712 and channel performance data 714 that are described in more detail hereinafter. [0170] Communications transceiver 702, background monitor 704, communications manager 706, communications interface 708 and storage 710 may be implemented by hardware, software, or any combination of hardware and software and the approach is not limited to any particular implementation. Furthermore, although these elements are depicted in FIG. 7 as being separate, the functionality of two or more of these elements may be combined into a single element, depending upon a particular implementation. Communications apparatus 700 may include other elements, components and processes, depending upon a particular implementation, that are not depicted in FIG. 7 or described herein for purposes of explanation.
[0171] Although embodiments of the invention are described herein in the context of background monitor 704 providing background monitoring services for communications apparatus 700, the invention is not limited to this context. For example, background monitor 704 may provide background monitoring services for any number of communications apparatuses or devices. In this situation, background monitor 704 may
reside on any one of the communications apparatuses for which background monitoring services are being provided or background monitor 704 may reside external to all of the communications apparatuses. Furthermore, channel performance data 714 may be maintained at one of the communications apparatuses, or in a separate database accessible by the communications apparatuses.
D. Functional Overview
[0172] FIG. 8 is a flow diagram 800 that depicts a functional overview of an approach for providing wireless communications using background monitoring, according to an embodiment of the invention. In step 802, an initial frequency band is selected and an initial set of communications channels to be used in the frequency band is identified. The initial frequency band may be specified, for example, by configuration data 712 or by a user, such as administrative personnel. The initial set of communications channels may be specified by configuration data 712 or by a user. Alternatively, the initial set of communications channels may be selected automatically, for example by communications manager 706 evaluating characteristics of the communications channels and 'choosing communications channels that are determined to provide adequate performance. [0173] The approach is applicable to any wireless communications systems or protocols. Example wireless applications include, without limitation, WLAN, WPAN and WiMAX. Example frequency bands include, without limitation, the 2.4 GHz band, the 3.650-3.700 GHz band and the 5.470-5.725 GHz band.
[0174] In step 804, communications begin on the initial set of communications channels. For example, communications transceiver 702 begins communicating with one or more other communications devices on the initial set of communications channels. [0175] In step 806, background monitoring is started to identify any incumbent users and to characterize communications channels. For example, background monitor 704 begins monitoring the communications channels in the selected frequency band to identify any incumbent users and to determine the performance of the communications channels. This may include, for example, generating channel performance data 714 that specifies one or more attributes of the communications channels in the frequency band. The attributes may indicate the performance of the communications channels and whether any of the communications channels have incumbent users, i.e., are currently being used by one or more other wireless devices.
[0176] Although FIG. 8 depicts the background monitoring of step 806 starting after the selection of the initial frequency band and initial set of communications channels in
step 802, the approach is not limited to this context and background monitor 704 may be started earlier and used, for example, to select the initial set of communications channels. [0177] In step 808, one or more communications channels are replaced as necessary with replacement communications channels. In the present example, suppose that a determination is made that a particular communications channel is no longer to be used for communications. The determination that the particular communications channel is no longer to be used for communications may be made based upon a variety of factors. For example, an incumbent user may have been detected on the particular communications channel. As another example, the particular communications channel may no longer have acceptable performance characteristics.
[0178] The particular communications channel is substituted with a replacement communications channels. For example, suppose that communications manager 706 determines that the particular communications channel no longer satisfies the one or more channel selection criteria or that an incumbent user has been detected on the particular communications channel. Communications manager 706 examines channel performance data 714 to identify a replacement communications channel that satisfies one or more channel selection criteria. The channel selection criteria may be any type of channel selection criteria, depending upon a particular implementation, and may be specific to a particular frequency band. Communications manager 706 then causes the replacement communications channel to be used in place of the particular communications channel. This may include communications apparatus 700 instructing other communications devices to use the replacement communications channel in place of the particular communications channel that is no longer to be used.
E. Background Monitoring
[0179] As previously described herein, background monitoring is performed separately and concurrently with communications on the plurality of communications channels. When a particular communications channel needs to be replaced, for example, because an incumbent user has been detected on the particular communications channel or the performance of the particular communications channel is no longer acceptable, the particular communications channel can be replaced with a replacement communications channel that has already been pre-qualified. This avoids having to cease communications to pre-qualify communications channels to identify a replacement communications channel.
[0180] In some implementations, communications may only occur on one particular frequency band. For example, all of the participating devices may be using one particular frequency band. In this situation, background monitoring may be limited to only the particular frequency band being used. Background monitoring may be further limited to particular communications channels within the particular frequency band. In other implementations, participating devices maybe capable of using multiple frequency bands for communications. In these situations, background monitoring may be performed on multiple frequency bands. This may include the frequency bands being used for communications as well as other frequency bands. The order in which frequency bands and communications channels are monitored may vary, depending upon the implementation. Any type of algorithm or approach may be used to select an order in which communications channels and frequency bands are monitored and the approach is not limited to any particular algorithm or approach.
[0181] The frequency bands and communications channels to be monitored, and their order, may be specified, for example, by configuration data 712 or by a user, such as administrative personnel. Alternatively, communications apparatus 700 may be configured to automatically determine the frequency bands and communications channels to be monitored, and an order in which they are to be monitored. The particular frequency bands and communications channels that are monitored, and/or the order in which they are monitored, may change over time, depending upon a particular implementation. Some communications devices may change the frequency band(s) that they are using, for example, based upon geographic location, or the communications devices may be reconfigured to use different frequency bands. The background monitoring may change in accordance with the change in frequency bands and/or change in communications channels within a frequency band.
[0182] Background monitoring may include re-monitoring communications channels that have previously been monitored. A wide variety of approaches may be used to determine when communications channels are re-monitored. For example, a particular replacement communications channel may be re-monitored before being used to replace a communications channel that is no longer to be used. This ensures that the particular replacement communications channel is still suitable for use, in case the characteristics of the particular replacement communications channel have changed since the last time the particular replacement communications channel was evaluated. As another example, a time constraint may be used to automatically re-monitor replacement communications channels after a specified time has elapsed. The re-monitoring of communications
channels is not limited to replacement communications channels. Rather, any communications channel may be re-monitored, including communications channels that have been previously characterized as unsuitable or having an incumbent user. This is useful in situations where transitory interference initially caused a communications channel to be characterized as unsuitable for communications. It is also useful for situations where an incumbent user transmits only very infrequently, but that a prior monitoring happened to detect the transmission.
i. Incumbent User Detection
[0183] As previously mentioned, background monitoring may include identifying communications channels that have incumbent users, i.e., communications channels that are currently being used by other users. The determination that a particular communications channel has an incumbent user may be made using a variety of techniques and the approach is not limited to any particular technique. For example, an incumbent user may be detected based upon the presence of at least a threshold amount of energy on the particular communications channel. The presence of at least a threshold amount of energy on the particular communications channel provides an indication that an incumbent user, or another user, is transmitting on the particular communications channel. The threshold may be selected to differentiate between users transmitting on the particular communications channel and background noise or other interference. [0184] As another example, an incumbent user may be detected based upon the presence of at least a threshold amount of energy and at least one characteristic of an incumbent user. A wide variety of characteristics may be used to detect and incumbent user, depending upon a particular implementation, and the approach is not limited to any particular characteristics. For example, the characteristic may include any modulation characteristic, other property or even identification data. According to one embodiment of the invention, an incumbent user is determined to exist on a particular communications channel when at least a threshold amount of energy is detected on the particular communications channel and a packet preamble is detected. The packet preamble may be any portion of a preamble for any communications protocol, e.g., a portion of an 802.11 packet that is associated with an incumbent user. Detecting a packet preamble in combination with at least a threshold amount of energy helps to differentiate between incumbent users, other users and other energy sources or general interference. [0185] Some standards for non-licensed use of licensed spectrum may specify that incumbent users identify themselves as such using, for example, by using an
identification tone or code. Other standards or legacy systems may not include the use of an identification tone or code. In these situations, power spectral analysis may be used to identify incumbent users. For example, the power spectral density of a transmission generally indicates the output power of a transmission as a function of frequency. The power spectral density of a transmission may be used to identify particular modulation schemes, such as an 802.11 signal. For example, a power spectral density having a "spike" shape may indicate the use of a single carrier, a series of "spikes" may indicate the use of frequency hopping and a square or rectangular power spectral density may indicate the use of orthogonal frequency division multiplexing (OFDM). A database may be used to efficiently compare the power spectral density of a transmission with power spectral density "masks" stored in a database of power spectral density masks.
ii. Channel Performance Data
[0186] Channel performance data 714 may be analyzed by background monitor 704, communications manager 706, or any other entity or process, to identify replacement communications channels. Replacement communications channels maybe identified, for example, by comparing performance data 714 to a one or more channel selection criteria to identify communications channels that satisfy the one or more channel selection criteria. Channel performance data 714 may be updated to reflect the communications channels that satisfy the one or more channel selection criteria. For example, data may be added to channel performance data 714 to identify particular communications channels that do not have any identified incumbent users and that have acceptable performance. Channel performance data may also indicate a ranking of communications channels based upon performance. This reduces the amount of computational overhead required to identify replacement communications channels. Channel selection criteria may be specific to particular frequency bands.
[0187] FIG. 9 is a diagram that depicts example channel performance data 714. Channel performance data 714 may include less data than depicted in FIG. 9 or more data, depending upon a particular implementation, and the approach is not limited to any particular channel performance data 714. hi the present example depicted in FIG. 9, channel performance data 714 includes, for each of N number of communications channels, whether an incumbent user has been detected, an average interference power (IPA) , a maximum interference power (EPM) and the signal-to-noise ratio (SNR). Other channel performance and quality data may also be collected, depending upon a particular implementation. Channel performance data 714 may include data for communications
channels in any number of frequency bands and the data may be organized by frequency band.
F. Operational Example
[0188] FIG. 10 is a flow diagram 1000 that depicts a wireless communications approach using background monitoring according to an embodiment of the invention. In step 1002, an initial frequency band is selected, for example, based upon configuration data 712. In step 1004, a communications channel from the initial frequency band is selected and monitored. In step 1006, a determination is made whether the communications channel is a "good" communications channel. A "good" communications channel is one that is suitable for communications, i.e., it is free of interference, has acceptable performance and does not have any incumbent users. The communications channel may be monitored for any length of time and any criteria may be used, depending upon a particular implementation. After a communications channel has been monitored for at least a specified time with no indication of any incumbent users and having acceptable performance, the communications channel may be characterized as "good". ' i
[0189] If in step 1006, the communications channel is not considered to be a "good" communications channel, then in step 1008, a determination is made whether more communications channels are available to be monitored in the initial frequency band. If so, then in step 1010, a next communications channel is selected and monitored in step 1004. If, in step 1008, there are no additional channels available to be monitored in the initial frequency band, then in step 1012, another frequency band is selected. Then, in step 1010, a communications channel is selected for monitoring from the other frequency band and the selected communications channel is monitored in step 1004. [0190] In the event that all communications channels within all available frequency bands are monitored and none are determined to be free of incumbent users and interference and have acceptable performance, then communications apparatus 700 may enter a "sleep" mode for a specified time and then being re-monitoring communications channels, starting again with the initial frequency band.
[0191] Steps 1002 through 1012 represent an approach for identifying an initial communications channel that is free of interference and has acceptable performance. Steps 1002 through 1012 provide example steps that may be performed, for example, when communications apparatus 700 is first started up, e.g., during a "cold start". Once at least one good communications channel has been identified, then in step 1014, channel
performance data 714 is updated accordingly. Also, in step 1016, several functions are performed. First, communications commence on the identified "good" communications channel. Also, the background monitoring continues separately and concurrently with communications on the good communications channel. The background monitoring monitors other communications channels within the same frequency band and may also include monitoring communications channels in other frequency bands, effectively iteratively performing steps 1004 through 1012. As previously described herein, the background monitoring may also include updating channel performance data 714 as channels are monitored, to indicate whether any incumbent users have been detected, to indicate performance criteria and to indicate whether each communications channel satisfies the channel selection criteria and is therefore a "good" communications channel that is suitable for use. In addition to the communications, background monitoring and updating of the channel performance data 714, step 1016 also includes substituting communications channels as necessary. As previously described herein, if a particular communications channel is determined to have an incumbent user, or otherwise not have acceptable performance, the particular communications channel is replaced with a replacement communications channel identified by the background monitoring.
IX. IMPLEMENTATION MECHANISMS
[0192] The wireless communications approach using background monitoring described herein may be implemented in a variety of ways and the invention is not limited to any particular implementation. The approach may be integrated into a communications system or a network device, including but not limited to communications devices and communications channel selector apparatuses. Also, the approach may be implemented as a stand-alone mechanism, including but not limited to a communications device and a communications channel selector apparatus, that can operate independently of a communications system. Furthermore, the approach may be implemented in computer software, hardware, or any combination thereof.
[0193] FIG. 11 is a block diagram that illustrates an example computer system 1100 upon which an embodiment of the invention may be implemented. Computer system 1100 includes a bus 1102 or other communication mechanism for communicating information, and a processor 1104 coupled with bus 1102 for processing information. Computer system 1100 also includes a main memory 1106, such as a random access memory (RAM) or other dynamic storage device, coupled to bus 1102 for storing
information and instructions to be executed by processor 1104. Main memory 1106 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 1104. Computer system 1100 further includes a read only memory (ROM) 1108 or other static storage device coupled to bus 1102 for storing static information and instructions for processor 1104. A storage device 1110, such as a magnetic disk or optical disk, is provided and coupled to bus 1102 for storing information and instructions.
[0194] Computer system 1100 may be coupled via bus 1102 to a display 1112, such as a cathode ray tube (CRT), for displaying information to a computer user. An input device 1114, including alphanumeric and other keys, is coupled to bus 1102 for communicating information and command selections to processor 1104. Another type of user input device is cursor control 1116, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 1104 and for controlling cursor movement on display 1112. This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane.
[0195] The invention is related to the use of computer system 1100 for implementing the techniques described herein. According to one embodiment of the invention, those techniques are performed by computer system 1100 in response to processor 1104 executing one or more sequences of one or more instructions contained in main memory 1106. Such instructions may be read into main memory 1106 from another machine- readable medium, such as storage device 1110. Execution of the sequences of instructions contained in main memory 1106 causes processor 1104 to perform the process steps described herein. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention. Thus, embodiments of the invention are not limited to any specific combination of hardware circuitry and software.
[0196] The term "machine-readable medium" as used herein refers to any medium that participates in providing data that causes a machine to operation in a specific fashion. In an embodiment implemented using computer system 1100, various machine-readable media are involved, for example, in providing instructions to processor 1104 for execution. Such a medium may take many forms, including but not limited to, nonvolatile media, volatile media, and transmission media. Non-volatile media includes, for example, optical or magnetic disks, such as storage device 1110. Volatile media includes dynamic memory, such as main memory 1106. Transmission media includes coaxial
cables, copper wire and fiber optics, including the wires that comprise bus 1102. Transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications. [0197] Common forms of machine-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD- ROM, any other optical medium, punchcards, papertape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read.
[0198] Various forms of machine-readable media may be involved in carrying one or more sequences of one or more instructions to processor 1104 for execution. For example, the instructions may initially be carried on a magnetic disk of a remote computer. The remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem. A modem local to computer system 1100 can receive the data on the telephone line and use an infra-red transmitter to convert the data to an infra-red signal. An infra-red detector can receive the data carried in the infra-red signal and appropriate circuitry can place the data on bus 11!02. Bus 1102 carries the data to main memory 1106, from which processor 1104 retrieves and executes the instructions. The instructions received by main memory 1106 may optionally be stored on storage device 1110 either before or after execution by processor 1104. [0199] Computer system 1100 also includes a communication interface 1118 coupled to bus 1102. Communication interface 1118 provides a two-way data communication coupling to a network link 1120 that is connected to a local network 1122. For example, communication interface 1118 may be an integrated services digital network (ISDN) card or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, communication interface 1118 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN. Wireless links may also be implemented. In any such implementation, communication interface 1118 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information. [0200] Network link 1120 typically provides data communication through one or more networks to other data devices. For example, network link 1120 may provide a connection through local network 1122 to a host computer 1124 or to data equipment operated by an Internet Service Provider (ISP) 1126. ISP 1126 in turn provides data communication services through the world wide packet data communication network now
commonly referred to as the "Internet" 1128. Local network 1122 and Internet 1128 both use electrical, electromagnetic or optical signals that carry digital data streams. The signals through the various networks and the signals on network link 1120 and through communication interface 1118, which carry the digital data to and from computer system 1100, are exemplary forms of carrier waves transporting the information. [0201] Computer system 1100 can send messages and receive data, including program code, through the network(s), network link 1120 and communication interface 1118. In the Internet example, a server 1130 might transmit a requested code for an application program through Internet 1128, ISP 1126, local network 1122 and communication interface 1118.
[0202] The received code may be executed by processor 1104 as it is received, and/or stored in storage device 1110, or other non- volatile storage for later execution. In this manner, computer system 1100 may obtain application code in the form of a carrier wave. [0203] In the foregoing specification, embodiments of the invention have been described with reference to numerous specific details that may vary from implementation to implementation. Thus, the sole and exclusive indicator of what is, and is intended by the applicants to be, the invention is the set of claims that issue from this application, in the specific form in which such claims issue, including any subsequent correction. Hence, no limitation, element, property, feature, advantage or attribute that is not expressly recited in a claim should limit the scope of such claim in any way. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.
Claims
1. A wireless communications apparatus comprising: a transceiver configured to provide communications on a first set of one or more communications channels; a background monitor configured to monitor, separately and concurrently with the transceiver using the first set of one or more communications channels for communications, a second set of one or more communications channels to determine whether any of the second set of one or more communications channels are currently being used by one or more incumbent users; and a communications manager configured to cause a particular communications channel from the first set of one or more communications channels to be replaced with a replacement communications channel from the second set of communications channels, wherein the replacement communications channel was determined to not being currently used by the one or more incumbent users.
2. The wireless communications apparatus as recited in Claim 1, wherein the background monitor is further configured to determine whether any of the second set of one or more communications channels are currently being used by one or more incumbent users by detecting energy on the second set of one or more communications channels that satisfies an energy threshold.
3. The wireless communications apparatus as recited in Claim 1, wherein the background monitor is further configured to determine whether any of the second set of one or more communications channels are currently being used by one or more incumbent users by detecting energy on the second set of one or more communications channels that satisfies an energy threshold and identifying at least a portion of a packet preamble.
4. The wireless communications apparatus as recited in Claim 1, wherein the background monitor is further configured to determine whether any of the second set of one or more communications channels are currently being used by one or more incumbent users by comparing power spectral densities of transmissions on the second set of one or more communications channels to specified power spectral densities.
5. The wireless communications apparatus as recited in Claim 1, wherein: the first set of one or more communications channels is in a first frequency band; and the second set of one or more communications channels is in a second frequency band.
6. The wireless communications apparatus as recited in Claim 1, wherein the wireless communications apparatus is further configured to: generate replacement channel identification data that identifies the replacement communications channel; and transmit the replacement channel identification data to one or more wireless devices that are using the first set of one or more communications channels for communications and instructing the one or more wireless devices to use the replacement communications channel instead of the particular communications channel.
7. The wireless communications apparatus as recited in Claim 1, wherein the background monitor is further configured to generate channel performance data that indicates one or more performance characteristics of the second set of one or more communications channels being monitored.
8. The wireless communications apparatus as recited in Claim 7, wherein the wireless communications apparatus is further configured to use the channel performance data to select the replacement communications channel that is used to replace the particular communications channel.
9. The wireless communications apparatus as recited in Claim 7, wherein the wireless communications apparatus is a wireless local area network (WLAN) communications apparatus.
10. A computer-implemented wireless communications method comprising: using for communications a first set of one or more communications channels; separately and concurrently with the using for communications the first set of one or more communications channels, monitoring a second set of one or more communications channels to determine whether any of the second set of one or more communications channels are currently being used by one or more incumbent users; and if a particular communications channel from the one or more communications channels is currently being used by the one or more incumbent users, then replacing the particular communications channel with a replacement communications channel from the second set of one or more communications channels, wherein the replacement communications channel was determined to not being currently used by the one or more incumbent users.
11. The computer-implemented method as recited in Claim 10, wherein: the using for communications a first set of one or more communications channels is performed by a transceiver; » ! the monitoring of the second set of one or more communications channels is performed by a background monitor that is separate from the transceiver.
12. The computer-implemented method as recited in Claim 10, further comprising determining that the particular communications channel is currently being used by one or more incumbent users by detecting energy on the particular communications channel that satisfies an energy threshold.
13. The computer-implemented method as recited in Claim 10, wherein the determining that the particular communications channel is currently being used by one or more incumbent users by detecting energy on the particular communications channel that satisfies an energy threshold includes detecting energy on the particular communications channel that satisfies an energy threshold and identifying at least a portion of a packet preamble.
14. The computer-implemented method as recited in Claim 10, wherein the determining that the particular communications channel is currently being used by one or more incumbent users by detecting energy on the particular communications cnannei mat satisfies an energy threshold includes comparing power spectral densities of transmissions on the second set of one or more communications channels to specified power spectral densities.
15. The computer-implemented method as recited in Claim 10, wherein: the first set of one or more communications channels is in a first frequency band; and the second set of one or more communications channels is in a second frequency band.
16. The computer-implemented method as recited in Claim 10, further comprising: generating replacement channel identification data that identifies the replacement communications channel; and transmitting the replacement channel identification data to one or more wireless devices that are using the first set of one or more communications channels for communications and instructing the one or more wireless devices to use the replacement communications channel instead of the particular communications channel.
17. The computer-implemented method as recited in Claim 10, wherein the first set of one or more communications channels are used by two or more wireless devices.
18. The computer-implemented method as recited in Claim 10, further comprising generating channel performance data that indicates one or more performance characteristics of the second set of one or more communications channels being monitored.
19. The computer-implemented method as recited in Claim 18, further comprising using the channel performance data to select the replacement communications channel that is used to replace the particular communications channel.
20. A computer-readable medium for implementing wireless communications, the computer-readable medium carrying instructions which, when processed by one or more processors, cause: using for communications a first set of one or more communications channels; separately and concurrently with the using for communications the first set of one or more communications channels, monitoring a second set of one or more communications channels to determine whether any of the second set of one or more communications channels are currently being used by one or more incumbent users; and if a particular communications channel from the second set of one or more communications channels is currently being used by the one or more incumbent users, then replacing the particular communications channel with a communications channel from the second set of one or more communications channels, wherein the replacement communications channel was determined to not being currently used by the one or more incumbent users.
21. The computer-readable medium as recited in Claim 20, wherein: the using for communications the first set of one or more communications channels is performed by a transceiver; \ the monitoring of the second set of one or more communications channels is performed by a background monitor that is separate from the transceiver.
22. The computer-readable medium as recited in Claim 20, further comprising additional instructions which, when processed by the one or more processors, cause determining that the particular communications channel is currently being used by one or more incumbent users by detecting energy on the particular communications channel that satisfies an energy threshold.
23. The computer-readable medium as recited in Claim 20, wherein the determining that the particular communications channel is currently being used by one or more incumbent users by detecting energy on the particular communications channel that satisfies an energy threshold includes detecting energy on the particular communications channel that satisfies an energy threshold and identifying at least a portion of a packet preamble.
24. The computer-implemented method as recited in Claim 10, wherein the determining that the particular communications channel is currently being used by one or more incumbent users by detecting energy on the particular communications channel that satisfies an energy threshold includes comparing power spectral densities of transmissions on the second set of one or more communications channels to specified power spectral densities.
25. The computer-readable medium as recited in Claim 20, wherein: the first set of one or more communications channels is in a first frequency band; and the second set of one or more communications channels is in a second frequency band.
26. The computer-readable medium as recited in Claim 20, further comprising additional instructions which, when processed by the one or more processors, cause: generating replacement channel identification data that identifies the replacement communications channel; and transmitting the replacement channel identification data to one or more wireless devices that are using the first set of one or more communications channels for communications and instructing the one or more wireless devices to use the replacement communications channel instead of the particular communications channel.
27. The computer-readable medium as recited in Claim 20, wherein the first set of one or more communications channels are used by two or more wireless devices.
28. The computer-readable medium as recited in Claim 20, further comprising additional instructions which, when processed by the one or more processors, cause generating channel performance data that indicates one or more performance characteristics of the second set of one or more communications channels being monitored.
29. The computer-readable medium as recited in Claim 28, further comprising additional instructions which, when processed by the one or more processors, cause using the channel performance data to select the replacement communications channel that is used to replace the particular communications channel.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US69758705P | 2005-07-08 | 2005-07-08 | |
US30333605A | 2005-12-16 | 2005-12-16 | |
PCT/US2006/027206 WO2007009043A1 (en) | 2005-07-08 | 2006-07-07 | Wireless communications approach using background monitoring |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1905166A1 true EP1905166A1 (en) | 2008-04-02 |
Family
ID=37401444
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP06787151A Withdrawn EP1905166A1 (en) | 2005-07-08 | 2006-07-07 | Wireless communications approach using background monitoring |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP1905166A1 (en) |
WO (1) | WO2007009043A1 (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8300673B2 (en) | 2007-08-24 | 2012-10-30 | Motorola Solutions, Inc. | System, method and apparatus for managing communication in a public safety communication network |
US8149893B2 (en) * | 2008-08-22 | 2012-04-03 | Siemens Aktiengesellschaft | Reliable wireless communication system using adaptive frequency hopping |
WO2010112483A1 (en) | 2009-03-30 | 2010-10-07 | Lumen Radio Ab | A method for selecting operating frequency channels in a wireless communication system |
GB2478323A (en) * | 2010-03-03 | 2011-09-07 | Adam Comm Systems Internat Ltd | Wireless communication in building management control. |
GB201114079D0 (en) | 2011-06-13 | 2011-09-28 | Neul Ltd | Mobile base station |
GB2492052B (en) * | 2011-06-13 | 2015-06-24 | Neul Ltd | Interference mitigation |
WO2012149724A1 (en) | 2011-09-05 | 2012-11-08 | 华为技术有限公司 | Method, device and system for monitoring quick path interconnect link |
WO2014064322A1 (en) * | 2012-10-22 | 2014-05-01 | Nokia Corporation | Interference avoidance and power savings for coexistence among different radio access technologies |
US11589248B1 (en) | 2021-02-18 | 2023-02-21 | Raytheon Company | Method and apparatus for system state discovery |
EP4423916A1 (en) * | 2021-10-28 | 2024-09-04 | Telefonaktiebolaget LM Ericsson (publ) | Transmitting a signal with frequency hopping in the presence of broadband interference |
CN118381574B (en) * | 2024-06-26 | 2024-09-03 | 辽宁科大物联科技有限公司 | Active compensation-based Bluetooth monitoring method, device, equipment and storage medium |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FI101114B (en) * | 1995-04-25 | 1998-04-15 | Nokia Telecommunications Oy | Asymmetric high speed data transfer procedure in mobile phone networks |
US6751249B1 (en) * | 1999-09-24 | 2004-06-15 | Agere Systems Inc. | Received-signal-strength-based swap table for frequency hopping communication system |
GB2401512B (en) * | 2001-01-03 | 2005-06-29 | Vtech Communications Ltd | Adaptive frequency hopping strategy |
US7356104B2 (en) * | 2003-07-10 | 2008-04-08 | Shinji Fukuda | Radio communication apparatus and interference avoiding method |
-
2006
- 2006-07-07 EP EP06787151A patent/EP1905166A1/en not_active Withdrawn
- 2006-07-07 WO PCT/US2006/027206 patent/WO2007009043A1/en active Application Filing
Non-Patent Citations (1)
Title |
---|
See references of WO2007009043A1 * |
Also Published As
Publication number | Publication date |
---|---|
WO2007009043A1 (en) | 2007-01-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10791565B2 (en) | Approach for managing the use of communications channels based on performance | |
WO2007009043A1 (en) | Wireless communications approach using background monitoring | |
Srinivasan et al. | An empirical study of low-power wireless | |
US7570614B2 (en) | Approach for managing communications channels based on performance | |
EP2327242B1 (en) | Method and system for distributed sensing management and control within a cognitive radio network | |
Golmie | Coexistence in wireless networks: Challenges and system-level solutions in the unlicensed bands | |
EP1502369B1 (en) | Device and method for management of a shared frequency band | |
US7424268B2 (en) | System and method for management of a shared frequency band | |
US8135424B2 (en) | Method to improve diversity gain in a cooperative spectrum sensing network | |
EP1560345B1 (en) | Wireless ultra wideband network having interference mitigation and related methods | |
WO2002060134A2 (en) | Approach for managing communications channels and transferring functions between participants | |
Kundargi et al. | Hierarchical sequential detection in the context of dynamic spectrum access for cognitive radios | |
Ansari et al. | A decentralized MAC for opportunistic spectrum access in cognitive wireless networks | |
Cuzanauskas et al. | Cognitive Radio test bed for optimized channel selection in IEEE 802.11-based networks | |
Syed | History assisted energy efficient spectrum sensing in cognitive radio networks | |
Yoon | Dynamic Radio Resource Allocation in Wireless Sensor and Cognitive Radio Networks | |
Ben Cheikh | Design of an Adaptive Frequency Hopping Algorithm Based On Probabilistic Channel Usage |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20080207 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): DE FR GB |
|
DAX | Request for extension of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
RBV | Designated contracting states (corrected) |
Designated state(s): DE FR GB |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN |
|
18W | Application withdrawn |
Effective date: 20110706 |