This invention is generally related to wireless communications, and more particularly to coping with interference in a wireless communications network.
Certain wireless local area network (“WLAN”) products, such as products based on the IEEE 802.11 standard, operate in unregulated spectrum. One problem associated with operating in unregulated spectrum is the potential of encountering interference from other devices. Regulated spectrum is relatively free of interference because unlicensed products which operate in the regulated spectrum can be removed from the marketplace. Even in unregulated spectrum there is at least a possibility of negotiating strategies for coping with interference from standards-compliant devices via standards organizations. However, some of the potential interfering devices are not standards-compliant, and some are not even communications devices. There is therefore a need for techniques and devices for coping with interference in unregulated spectrum.
A technique for coping with interference in a wireless network includes analyzing a plurality of alternate operating channels; ranking the alternate operating channels according to interference detected when analyzing the channels; and if a decision is made to move to an alternate operating channel, selecting the best ranked alternate operating channel. Various ranking categories may be used, including but not limited to a first category that is relatively free of interference, a second category that has some interference but will support degraded communications, and a third category that has an unacceptable level of interference. Within a given rank, preference may be given to channels that were most recently analyzed and ranked.
The invention helps improve communications by facilitating timely selection of an alternate channel. Different interference sources may have significantly different effects on communications with a spectrum. For example, some interference sources are relatively localized to a particular channel, whereas other interference sources adversely effect multiple channels. Similarly, some interference sources exhibit relatively higher power, longer pulse duration, or longer pulse period. Hence, it is not always possible to avoid interference simply by moving to a different channel. While it might be possible to implement a heuristic technique that moves sequentially to various different channels until an acceptable channel is located, the delay associated with finding a suitable channel could be disruptive to communications. By analyzing interference on various channels and ranking those channels before the need to change channels arises, it may be possible to move directly to the best available channel and thereby reduce the delay and associated communication disruption associated with changing channels.
Referring to
The access point (100) is adapted to recognize and respond to interference (106) generated by a device (114) other than the end station (102). For example, the access point includes a table (108) of interference profiles in memory (110) which are indicative of particular sources of interference. The memory (110) also includes a table (112) of counter measure plans which specify actions to be taken when a particular source of interference is recognized. Each counter measure plan specifies at least one remedial action, such as altering transmission characteristics and changing to an alternate communication channel. The remedial actions may be arranged hierarchically such that multiple actions are attempted in a predefined order until a satisfactory result is obtained. Each interference profile in the table (108) is associated with at least one counter measure plan in the corresponding table (112), and multiple interference profiles may be associated with a particular counter measure plan.
The first step (200) in the technique employed by the access point (100) to cope with interference is recognizing the existence of the interference (106). The access point may recognize the interference by analyzing the signal received at the access point. For example, a quiet interval may be implemented such that the signal received at the access point does not include normal traffic (116) between the access point and end station, but rather comprises any existing interference, e.g., signal (106). An alternative to use of the quiet interval is to analyze the combination of normal traffic signal (116) and interference signal (106). For example, a parallel demodulation engine (120) may be programmed to identify, from the combined signal, types of interference that differ recognizably from actual data in the channel. Alternatively, recognition of a combined signal which has a relatively high proportion of noise or is not in a format specified by the communications protocol being utilized may be used as an indication of the presence of interference. Alternatively, some communications protocols specify use of periodic communications between an access point and end station primarily to verify that the communications link is operational. Such a protocol may also be used to recognize the existence of interference when the communications link fails for purposes of the present technique.
Once the access point recognizes the existence of interference it then captures a sample (118) of the interference as indicated in step (202) in order to attempt to identify the source of the interference. The sample may be captured by storing a portion of the interference signal (106) received at the access point. The received signal, which is analog, may then be sampled and converted to digital format for processing. Each sample measurement is associated with a time stamp indicating the relative time at which the sample was obtained. Hence, the resulting data comprises sets of energy magnitude measurements and time stamps.
Because there are different possible sources of interference, and the characteristics of the interference associated those sources may vary, the sampling rate and period are selected to capture a sufficient sample to identify all known potential sources of interference stored in the digital patterns in memory. The sample (118) is then compared with the interference profiles in table (108) to identify a match, or the absence of a match, as indicated by step (204). Alternatively, an adaptive algorithm may be employed to adjust the sampling period and rate until a match between the sample and an interference profile is located or eliminated as a possibility. If a matching interference profile is located in table (108) then the associated counter measures plan is selected as indicated by step (206). As discussed above, the counter measures plan may include one or more of changing transmission signal characteristics as indicated by step (208) and changing to an alternate operating channel, or creating a countermeasure based on the interference signal, as indicated by step (210). If no matching interference profile is located then the access point either creates a counter measure based on the interference sample or changes to the alternate operating channel as indicated by step (210).
The quiet interval may be implemented by various techniques. For example, a continuous quiet interval may be implemented by temporarily ceasing communications until a sample of sufficient duration is obtained. Alternatively, temporally non-contiguous quiet gaps between communications may be combined via a relatively long sampling window during which the probability of having a continuously occupied channel over the entire time period is near zero to assemble a quiet interval.
Referring to
Referring now to
For each potential alternate channel, the pulse duration of the sample from that channel is employed as an index into table (108). Table (108) includes ranking information for various known types of interference. In the illustrated example the channels are ranked as “good,” “fair,” or “poor.” The rank “good” may be indicative of a channel which is relatively free of interference. The rank “fair” may be indicative of a channel which has interference but may nevertheless support communications. The rank “poor” may be indicative of a channel which has interference and is unlikely to support communications at a reasonable data rate.
If the pulse duration is in the range of 61-182 μSec then the channel is ranked as a “good” potential alternate. There is a probability that interference characterized by this pulse duration range is a result of switching transients internal to the access point (100).
If the pulse duration is in the range of 183-427 μSec then the channel is ranked as “fair.” An interference pulse duration in the range of 183-427 μSec is indicative of a Bluetooth product. Bluetooth products operate at relatively low power levels throughout the 2.4 GHz band. Hence, increasing transmission power is generally more effective at mitigating the effects of the interference than changing channels.
If the pulse duration is in the range of 428-549 μSec then the channel is ranked as “fair.” Interference exhibiting a pulse duration in this range may be from a Bluetooth product or a short-sync pulse from a FHSS cordless phone base station. If it is possible to differentiate between a Bluetooth product and FHSS cordless phone as the source then the channel is ranked as “fair” in the case of a Bluetooth source, and “poor” in the case of a FHSS cordless phone base station source.
If the pulse duration is in the range of 550-1342 μSec then the channel is ranked as “poor.” An interference source exhibiting a pulse duration within this range is likely a FHSS cordless phone, although it may also be a microwave source on an adjacent or more distant channel. The sample (118) may be examined more closely to distinguish between the microwave and FHSS cordless phone. In the case of the FHSS cordless phone the peak is relatively flat and the pulse duration is in the range of 625-950 μSec, increasing in proportion to the number of handsets. Conversely, if the peak rolls off in power more than 5 dB the source is probably microwave, particularly if the pulse duration is at the higher part of the range. If it is possible to distinguish whether the interference source is a FHSS cordless phone or microwave then an even lower quality rank, e.g., “vy poor,” may be applied to the channel if the source is a microwave.
If the pulse duration is in the range of 1343-2684 μSec then the channel is ranked as “poor.” An interference source exhibiting a pulse duration within this range is likely a microwave on an adjacent channel. Pulse period may be employed to obtain data further supporting identification of the source as microwave. In particular, a single pulse microwave fires once every AC cycle whereas a double pulse microwave fires twice every AC cycle. Hence, local power standards and the measured pulse period can be employed to produce corroborating data.
If the pulse duration is in the range of 2685-3660 μSec then the channel is ranked as “poor.” An interference source exhibiting a pulse duration within this range can be a microwave that is straddling the channel if it is single pulse, or a microwave in the channel if it is double pulse.
If the pulse duration is in the range of 3661-8540 μSec then the channel is ranked as “poor.” An interference source exhibiting a pulse duration within this range is most likely a single pulse microwave in channel.
If the pulse duration is above 8541 μSec then the channel is ranked as “poor.” An interference source exhibiting a pulse duration within this range is a CW interferer such as a video camera, cordless phone, or video delivery system.
Referring now to
While the invention is described through the above exemplary embodiments, it will be understood by those of ordinary skill in the art that modification to and variation of the illustrated embodiments may be made without departing from the inventive concepts herein disclosed. Moreover, while the preferred embodiments are described in connection with various illustrative structures, one skilled in the art will recognize that the system may be embodied using a variety of specific structures. For example, while the technique is described in connection with a wireless access point, it could be implemented in various other RF devices, including but not limited to client end stations. Accordingly, the invention should not be viewed as limited except by the scope and spirit of the appended claims.
A claim of priority is made to U.S. Provisional Patent Application Ser. No. 60/649,799, entitled Interference Counter Measures for Wireless LANs, filed Feb. 3, 2005, which is incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
60649799 | Feb 2005 | US |