Certain embodiments of the present disclosure generally relate to wireless communications and, more particularly, to detecting a Bluetooth device using a sequence of energy detection measurements.
Wireless communication systems are widely deployed to provide various types of communication content such as voice, data, and so on. These systems may be multiple-access systems capable of supporting communication with multiple users by sharing the available system resources (e.g., bandwidth and transmit power). Examples of such multiple-access systems include code division multiple access (CDMA) systems, time division multiple access (TDMA) systems, frequency division multiple access (FDMA) systems, 3GPP Long Term Evolution (LTE) systems, and orthogonal frequency division multiple access (OFDMA) systems, IEEE 802.11 carrier sense multiple access/collision avoidance (CSMA/CA) and Bluetooth frequency hopping spread spectrum (FHSS) systems.
Generally, a wireless multiple-access communication system can simultaneously support communication for multiple wireless terminals. Each terminal communicates with one or more base stations via transmissions on the forward and reverse links. The forward link (or downlink) refers to the communication link from the base stations to the terminals, and the reverse link (or uplink) refers to the communication link from the terminals to the base stations. This communication link may be established via a single-input-single-output, multiple-input-single-output or a multiple-input-multiple-output (MIMO) system.
The Institute of Electrical and Electronic Engineers (IEEE) 802.11 working group has been developing an amendment for a high-throughput physical layer (PHY), called 802.11n. The IEEE 802.11n standard includes two bandwidths, an original 20 MHz and a new optional 40 MHz. There have been numerous concerns about the effect of the 40 MHz version of the IEEE 802.11n on other wireless networks, such as Bluetooth operating in the 2.4 GHz frequency band.
Certain embodiments of the present disclosure provide a method for detecting the presence, in a first radio access technology (RAT) network, of a device that communicates via a second RAT. The method generally includes estimating a plurality of received power values of transmissions via the second RAT at a plurality of time steps during a network quiet time of the first RAT network to generate a first set of received power values, calculating a first test statistic based on the first set of received power values, comparing the first test statistic with a first threshold to determine if the device that communicates via the second RAT is in range, and in response to detecting the device that communicates via the second RAT in range, switching from a first operational frequency to a second operational frequency.
Certain embodiments of the present disclosure provide an apparatus for detecting the presence, in a first radio access technology (RAT) network, of a device that communicates via a second RAT. The apparatus generally includes means for estimating a plurality of received power values of transmissions via the second RAT at a plurality of time steps during a network quiet time of the first RAT network to generate a first set of received power values, means for calculating a first test statistic based on the first set of received power values, means for comparing the first test statistic with a first threshold to determine if the device that communicates via the second RAT is in range, and in response to detecting the device that communicates via the second RAT in range, means for switching from a first operational frequency to a second operational frequency.
Certain embodiments of the present disclosure provide an apparatus for detecting the presence, in a first radio access technology (RAT) network, of a device that communicates via a second RAT. The apparatus generally includes logic for estimating a plurality of received power values of transmissions via the second RAT at a plurality of time steps during a network quiet time of the first RAT network to generate a first set of received power values, logic for calculating a first test statistic based on the first set of received power values, logic for comparing the first test statistic with a first threshold to determine if the device that communicates via the second RAT is in range, and in response to detecting the device that communicates via the second RAT in range, logic for switching from a first operational frequency to a second operational frequency.
Certain embodiments of the present disclosure provide a computer-program product for detecting the presence, in a first radio access technology (RAT) network, of a device that communicates via a second RAT, comprising a computer readable medium having instructions stored thereon, the instructions being executable by one or more processors. The instructions generally include instructions for estimating a plurality of received power values of transmissions via the second RAT at a plurality of time steps during a network quiet time of the first RAT network to generate a first set of received power values, instructions for calculating a first test statistic based on the first set of received power values, instructions for comparing the first test statistic with a first threshold to determine if the device that communicates via the second RAT is in range, and in response to detecting the device that communicates via the second RAT in range, instructions for switching from a first operational frequency to a second operational frequency.
So that the manner in which the above-recited features of the present disclosure can be understood in detail, a more particular description, briefly summarized above, may be had by reference to aspects, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only certain typical aspects of this disclosure and are therefore not to be considered limiting of its scope, for the description may admit to other equally effective aspects.
Certain embodiments of the present disclosure, propose a method to reliably detect the presence of a Bluetooth device in close proximity to a station using energy detection measurements. Certain embodiments propose a method to eliminate instances of false detection because of other lower power signals from other nearby networks, such as a Wi-Fi network.
Various aspects of certain aspects of the present disclosure are described below. It should be apparent that the teachings herein may be embodied in a wide variety of forms and that any specific structure, function, or both being disclosed herein is merely representative. Based on the teachings herein one skilled in the art should appreciate that an aspect disclosed herein may be implemented independently of any other aspects and that two or more of these aspects may be combined in various ways. For example, an apparatus may be implemented or a method may be practiced using any number of the aspects set forth herein. In addition, such an apparatus may be implemented or such a method may be practiced using other structure, functionality, or structure and functionality in addition to or other than one or more of the aspects set forth herein. Furthermore, an aspect may comprise at least one element of a claim.
The word “exemplary” is used herein to mean “serving as an example, instance, or illustration.” Any aspect described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other aspects. Also as used herein, the term “legacy stations” generally refers to wireless network nodes that support 802.11n or earlier versions of the IEEE 802.11 standard.
The multi-antenna transmission techniques described herein may be used in combination with various wireless technologies such as Code Division Multiple Access (CDMA), Orthogonal Frequency Division Multiplexing (OFDM), Time Division Multiple Access (TDMA), Spatial Division Multiple Access (SDMA), and so on. Multiple user terminals can concurrently transmit/receive data via different (1) orthogonal code channels for CDMA, (2) time slots for TDMA, or (3) sub-bands for OFDM. A CDMA system may implement IS-2000, IS-95, IS-856, Wideband-CDMA (W-CDMA), or some other standards. An OFDM system may implement IEEE 802.11 or some other standards. A TDMA system may implement GSM or some other standards. These various standards are known in the art.
Access point 110 may communicate with one or more user terminals 120 at any given moment on the downlink and uplink. The downlink (i.e., forward link) is the communication link from the access point to the user terminals, and the uplink (i.e., reverse link) is the communication link from the user terminals to the access point. A user terminal may also communicate peer-to-peer with another user terminal. A system controller 130 couples to and provides coordination and control for the access points.
System 100 employs multiple transmit and multiple receive antennas for data transmission on the downlink and uplink. Access point 110 is equipped with a number Nap of antennas and represents the multiple-input (MI) for downlink transmissions and the multiple-output (MO) for uplink transmissions. A set Nu of selected user terminals 120 collectively represents the multiple-output for downlink transmissions and the multiple-input for uplink transmissions. In certain cases, it may be desirable to have Nap≧Nu≧1 if the data symbol streams for the Nu user terminals are not multiplexed in code, frequency, or time by some means. Nu may be greater than Nap if the data symbol streams can be multiplexed using different code channels with CDMA, disjoint sets of sub-bands with OFDM, and so on. Each selected user terminal transmits user-specific data to and/or receives user-specific data from the access point. In general, each selected user terminal may be equipped with one or multiple antennas (i.e., Nut≧1). The Nu selected user terminals can have the same or different number of antennas.
MIMO system 100 may be a time division duplex (TDD) system or a frequency division duplex (FDD) system. For a TDD system, the downlink and uplink share the same frequency band. For an FDD system, the downlink and uplink use different frequency bands. MIMO system 100 may also utilize a single carrier or multiple carriers for transmission. Each user terminal may be equipped with a single antenna (e.g., in order to keep costs down) or multiple antennas (e.g., where the additional cost can be supported).
On the uplink, at each user terminal 120 selected for uplink transmission, a TX data processor 288 receives traffic data from a data source 286 and control data from a controller 280. TX data processor 288 processes (e.g., encodes, interleaves, and modulates) the traffic data {dup,m} for the user terminal based on the coding and modulation schemes associated with the rate selected for the user terminal and provides a data symbol stream {sup,m}. A TX spatial processor 290 performs spatial processing on the data symbol stream {sup,m} and provides Nut,m, transmit symbol streams for the Nut,m antennas. Each transmitter unit (TMTR) 254 receives and processes (e.g., converts to analog, amplifies, filters, and frequency upconverts) a respective transmit symbol stream to generate an uplink signal. Nut,m transmitter units 254 provide Nut,m uplink signals for transmission from Nut,m antennas 252 to the access point 110.
At access point 110, Nap antennas 224a through 224ap receive the uplink signals from all Nup user terminals transmitting on the uplink. Each antenna 224 provides a received signal to a respective receiver unit (RCVR) 222. Each receiver unit 222 performs processing complementary to that performed by transmitter unit 254 and provides a received symbol stream. An RX spatial processor 240 performs receiver spatial processing on the Nap received symbol streams from Nap receiver units 222 and provides Nup recovered uplink data symbol streams. The receiver spatial processing is performed in accordance with the channel correlation matrix inversion (CCMI), minimum mean square error (MMSE), successive interference cancellation (SIC), or some other technique. Each recovered uplink data symbol stream {sup,m} is an estimate of a data symbol stream {sup,m} transmitted by a respective user terminal. An RX data processor 242 processes (e.g., demodulates, deinterleaves, and decodes) each recovered uplink data symbol stream {sup,m} in accordance with the rate used for that stream to obtain decoded data. The decoded data for each user terminal may be provided to a data sink 244 for storage and/or a controller 230 for further processing.
On the downlink, at access point 110, a TX data processor 210 receives traffic data from a data source 208 for Ndn user terminals scheduled for downlink transmission, control data from a controller 230, and possibly other data from a scheduler 234. The various types of data may be sent on different transport channels. TX data processor 210 processes (e.g., encodes, interleaves, and modulates) the traffic data for each user terminal based on the rate selected for that user terminal. TX data processor 210 provides Ndn downlink data symbol streams for the Ndn user terminals. A TX spatial processor 220 performs spatial processing on the Ndn downlink data symbol streams, and provides Nap transmit symbol streams for the Nap antennas. Each transmitter unit (TMTR) 222 receives and processes a respective transmit symbol stream to generate a downlink signal. Nap transmitter units 222 provide Nap downlink signals for transmission from Nap antennas 224 to the user terminals.
At each user terminal 120, Nut,m antennas 252 receive the Nap downlink signals from access point 110. Each receiver unit (RCVR) 254 processes a received signal from an associated antenna 252 and provides a received symbol stream. An RX spatial processor 260 performs receiver spatial processing on Nut,m received symbol streams from Nut,m receiver units 254 and provides a recovered downlink data symbol stream {sdn,m} for the user terminal. The receiver spatial processing is performed in accordance with the CCMI, MMSE, or some other technique. An RX data processor 270 processes (e.g., demodulates, deinterleaves, and decodes) the recovered downlink data symbol stream to obtain decoded data for the user terminal.
At each user terminal 120, Nut,m antennas 252 receive the Nap downlink signals from access point 110. Each receiver unit (RCVR) 254 processes a received signal from an associated antenna 252 and provides a received symbol stream. An RX spatial processor 260 performs receiver spatial processing on Nut,m received symbol streams from Nut,m receiver units 254 and provides a recovered downlink data symbol stream {sdn,m } for the user terminal. The receiver spatial processing is performed in accordance with the CCMI, MMSE, or some other technique. An RX data processor 270 processes (e.g., demodulates, deinterleaves, and decodes) the recovered downlink data symbol stream to obtain decoded data for the user terminal.
The wireless device 302 may include a processor 304 which controls operation of the wireless device 302. The processor 304 may also be referred to as a central processing unit (CPU). Memory 306, which may include both read-only memory (ROM) and random access memory (RAM), provides instructions and data to the processor 304. A portion of the memory 306 may also include non-volatile random access memory (NVRAM). The processor 304 typically performs logical and arithmetic operations based on program instructions stored within the memory 306. The instructions in the memory 306 may be executable to implement the methods described herein.
The wireless device 302 may also include a housing 308 that may include a transmitter 310 and a receiver 312 to allow transmission and reception of data between the wireless device 302 and a remote location. The transmitter 310 and receiver 312 may be combined into a transceiver 314. A plurality of transmit antennas 316 may be attached to the housing 308 and electrically coupled to the transceiver 314. The wireless device 302 may also include (not shown) multiple transmitters, multiple receivers, and multiple transceivers.
The wireless device 302 may also include a signal detector 318 that may be used in an effort to detect and quantify the level of signals received by the transceiver 314. The signal detector 318 may detect such signals as total energy, energy per subcarrier per symbol, power spectral density and other signals. The wireless device 302 may also include a digital signal processor (DSP) 320 for use in processing signals.
The various components of the wireless device 302 may be coupled together by a bus system 322, which may include a power bus, a control signal bus, and a status signal bus in addition to a data bus.
Certain embodiments of the present disclosure, propose a method to reliably detect presence of a Bluetooth device in close proximity to a wireless station using energy detection measurements. Certain embodiments propose a method to eliminate instances of false detection because of other lower power signals from other nearby networks, such as a Wi-Fi network.
For certain embodiments, an 802.11n station (i.e., a Wi-Fi station) may scan a channel to determine if there is a Bluetooth device operating in close proximity. The station may generate a metric based on the energy detection measurements and compare the metric to a threshold to decide if there is a Bluetooth device in range.
Certain embodiments of the present disclosure reliably detect the presence of a nearby Bluetooth transmitter given a sequence of power estimates, with minimal false detections on other medium-power wireless transmitters.
For certain embodiments, a sequence of power estimates are captured from the energy detection circuit. The output of the energy detector may be divided by the length of the observation period to generate signal power values. In practice, the scaling term may be combined into the threshold value, so the actual division operation may not be necessary in an implementation. In this disclosure, we consider the ‘received power,’ since it is more accurate.
At 502, a plurality of received power values of transmissions via a second RAT are estimated at a plurality of time steps during a network quiet time of the first RAT network to generate a first set of received power values. At 504, a first test statistic (or test metric) is calculated based on the first set of received power values. At 506, the first test statistic is compared with a first threshold to determine if there is a device that communicates via the second RAT in range. In response to detecting the device that communicates via the second RAT in range, the first network may switch from a first operational frequency to a second operational frequency.
At 508, additional checks may be performed on the received power values to detect a false alarm. At 510, additional processing may be done to determine if the Bluetooth device is no longer within range.
For reliable detection of a nearby Bluetooth device a quiet time period in the current Wi-Fi network should be found. Each quiet period may be rather short (e.g., 3 μs). However, due to synchronization issues, it is likely that the quiet period will be a little longer than the actual observation time. A quiet time in the network may be found in different ways.
A first method for finding a quiet time in the network may be to listen to the channel immediately after completion of a packet. Since each packet is followed by an inter-frame space (SIFS) time, there is always a short quiet time after completion of each packet. The duration of the SIFS quiet time varies depending on which physical layer is used under the family of IEEE 802.11 standards. For example, in the IEEE 802.11n PHY, the short inter-frame space is equal to 16 μs. In the IEEE 802.11n, there is a reduced inter-frame space (RIFS) of 2 μs. So, it is necessary to wait until after the completion of the RIFS. If a packet is not present after the RIFS, the network should be quiet until the completion of the SIFS time, during which an energy detection measurement may be scheduled.
During the quiet time, an energy detection measurement may be scheduled knowing that the network is not transmitting. It should be noted that with the above technique, the energy detection measurements may not be made at regular intervals. However, non-regular energy detection windows do not affect the result of the proposed technique.
For certain embodiments, a quiet time in a network may be found by sending a wireless local area network (WLAN) clear-to-send (CTS) packet and not transmitting anything after that time. This may be referred to as a CTS-to-self, since the WLAN network usually sends a message enabling the transmitting station to transmit for a scheduled period of time after the CTS. In this case, the station does not transmit after the completion of the CTS, instead, the station performs energy detection measurements. This method may be useful when measuring detected energy for longer periods.
For certain embodiments, a sequence of received power estimates may be generated during the quiet time using the energy detection circuit. The observations of the channel may be either periodic or they may be scheduled as time permits. These observations are typically made over a portion of the 2.4 GHz frequency band. The energy detector may be located after the receiver filter.
In the IEEE 802.11n standard, 20 MHz and 40 MHz bandwidths are supported. The energy detection observations may be performed using one of the two bandwidths. Since the 40 MHz bandwidth is twice as wide as the 20 MHz bandwidth, it is more effective at detecting Bluetooth signals. However, the 20 MHz bandwidth may also be used. It is also possible to move the center frequency of the receiver filter to observe different portions of the frequency band. However, if the Bluetooth device is not using adaptive frequency hopping, any of the typical center frequencies may be used.
For each observation time instance, a signal power is estimated. In this disclosure, it is assumed that the signal power is converted to dBm. However, it is possible to perform all of the calculations in the linear domain without converting to dB.
The received power estimate for the nth observation may be calculated as follows:
in which M represents number of samples during each observation period, and y(.) represents the received signal. The sequence of received power estimates may be represented by {P1, P2, . . . PN}.
For certain embodiments, in order to determine if there is a transmitting Bluetooth device nearby, a test statistic, T, may be generated based on the sequence of received power estimates. The test statistic may be compared with a threshold. Several different test statistics may be used. A few of these statistics are presented in this document, however, other test statistics will also fall into the scope of this disclosure.
The simplest test statistic that can be used is a maximum of all the received power estimates, which may be written as follows:
As an alternative, the max statistic may be generalized using Order Statistics. Therefore, the received power estimates may be sorted to generate a new set {PS1, PS2, . . . PSN} based on their size, in which PS1≦PS2≦ . . . ≦PSN. Hence, PSN may be the largest value or the maximum received power level. An alternative to using the maximum as a test statistic is to select the mth received power, PSm, from the sorted set. Therefore, the test statistic may be written as follows:
T=PSm
The test statistic T may be used to choose a value from the 90 percentile of the cumulative distribution of the received power random variable. The test statistic based on the 90 percentile avoids triggering the detector on a single isolated strong power observation, which may result in a more robust detector.
As an example, if there are 20 power observations, the 18th observation (after being sorted in an increasing order) may be selected as the test statistic, so that T=PS18. In this example, the test statistic is the third largest received power estimate.
For certain embodiments, a test statistic may be selected based on an average of a plurality of largest received power values (i.e., PSm, . . . , PSN), and may be written as follows:
After the test statistic is calculated, the test statistic may be compared to a threshold γ1, and a decision may be made based on whether or not the test statistic exceeds the threshold, as follows:
Therefore, the decision (D) that there is a nearby Bluetooth transmitter is True if the test statistic exceeds the threshold, otherwise the decision is False.
For certain embodiments, it is possible to perform additional checks to eliminate false alarms.
At 602, a second test statistic is calculated based on the first set of received power values. At 604, the first test statistic is compared with a first threshold and the second test statistic is compared with a second threshold. If both test statistics result in a positive decision about presence of a Bluetooth device, at 606, presence of a Bluetooth device in range is declared. If one of the test statistics results in a negative decision about presence of a Bluetooth device, at 608, a false alarm is declared.
If the first test statistic results in a positive decision, an additional check may be performed on the observed values based on the time domain correlation of the original received power sequence {P1, P2, . . . PN}. If the observation period is less than the Bluetooth hopping period (e.g., 625 μs), there may be a time correlation between the received power estimates. The second test statistic may be defined as the time correlation with an offset of one observation period by calculating the mean m of the power estimates and calculating the variance σ2 of the power estimates, as follows:
The autocorrelation r with an offset of one observation may be calculated as follows:
For certain embodiments, the test statistic may be the correlation coefficient
This test statistic may be compared to another threshold γ′ which may be a number between zero and one. If the correlation coefficient is small, the decision may be changed to False as follows:
If T′<γ′ Then D=False
If the test statistic exceeds the threshold, the decision stays as True.
For certain embodiments, once a Bluetooth device has been detected and the 802.11n network has changed to 20 MHz operation, the 802.11n network should not stay in the 20 MHz mode of operation forever. If the Bluetooth device leaves the region, the 802.11n may switch back to the 40 MHz mode.
At 702, if the Bluetooth device was previously in range, a plurality of received power values are estimated at a plurality of time steps during another network quiet time to generate a second set of received power values. At 704, a third test statistic is calculated based on the second set of received power values. The third test statistic may be calculated using one of the methods described above.
At 706, the third test statistic is compared with a third threshold to determine if the Bluetooth device is no longer within range, wherein the third threshold may be smaller than the first threshold (i.e., γ2≦γ1). For example, the first threshold may be −40 dBm while the third threshold may be −45 dBm.
If the test statistic is less than the third threshold, the decision is that Bluetooth transmitter is no longer present, while if the test statistic exceeds the third threshold, it means that the Bluetooth transmitter is still present.
Simulation Results
In this section, a simulation environment and simulation results are presented using the proposed scheme for detecting presence of a Bluetooth device in range of a station. It is assumed that two Bluetooth devices are nearby a Wi-Fi station. The Bluetooth devices are close enough to the STA so that the received power at the STA is high. In this simulation, the received power at the STA is −35 dBm from one of the Bluetooth devices and −50 dBm from the other Bluetooth device. This simulation is modeling a small Bluetooth piconet, with one device being farther from the STA than the other. This could represent a cell phone in someone's pocket and a Bluetooth headset.
The duty cycle of the Bluetooth is varied between 33% and 100%. The simulation of Bluetooth is without adaptive frequency hopping (AFH). Since the Bluetooth devices without AFH may be impacted by the Wi-Fi interference more than the Bluetooth devices that support AFH. Therefore, it is very important to be able to detect those Bluetooth piconets that do not support AFH.
The STA has a receiver bandwidth of either 20 MHz or 40 MHz. Simulation results are given for both cases. The performance of the 40 MHz version is superior. The Wi-Fi STA uses a standard energy detection circuit which samples the filtered signal and estimates the signal power. In this simulation, the time period over which the samples are collected is 4 μs. The energy detection occurs on a periodic basis every 100 μs.
The test statistic is assumed to be a maximum of the power estimates,
and is compared to the threshold value of −40 dBm. Two different channel models are supported in the simulation, such as additive white Gaussian noise (AWGN) channel and multipath channel.
The next set of simulations utilizes a multipath channel. An exponential delay spread model was used with a root mean square (RMS) delay spread of 100 ns. This multipath channel is between the Bluetooth piconet and the Wi-Fi station. This represents a large delay spread for such a channel since the devices will be quite close based on the detector threshold. Therefore, the simulation represents a worst case scenario.
The embodiments described in the present disclosure provide a method for reliable detection of a Bluetooth piconet nearby a station using the standard energy detection circuit.
The various operations of methods described above may be performed by various hardware and/or software component(s) and/or module(s) corresponding to means-plus-function blocks illustrated in the Figures. Generally, where there are methods illustrated in Figures having corresponding counterpart means-plus-function Figures, the operation blocks correspond to means-plus-function blocks with similar numbering. For example, operations 500, 600 and 700 illustrated in
As used herein, the term “determining” encompasses a wide variety of actions. For example, “determining” may include calculating, computing, processing, deriving, investigating, looking up (e.g., looking up in a table, a database or another data structure), ascertaining and the like. Also, “determining” may include receiving (e.g., receiving information), accessing (e.g., accessing data in a memory) and the like. Also, “determining” may include resolving, selecting, choosing, establishing and the like.
Information and signals may be represented using any of a variety of different technologies and techniques. For example, data, instructions, commands, information, signals and the like that may be referenced throughout the above description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles or any combination thereof.
The various illustrative logical blocks, modules and circuits described in connection with the present disclosure may be implemented or performed with a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array signal (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components or any combination thereof designed to perform the functions described herein. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any commercially available processor, controller, microcontroller or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core or any other such configuration.
The steps of a method or algorithm described in connection with the present disclosure may be embodied directly in hardware, in a software module executed by a processor or in a combination of the two. A software module may reside in any form of storage medium that is known in the art. Some examples of storage media that may be used include RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, a hard disk, a removable disk, a CD-ROM and so forth. A software module may comprise a single instruction, or many instructions, and may be distributed over several different code segments, among different programs and across multiple storage media. A storage medium may be coupled to a processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor.
The methods disclosed herein comprise one or more steps or actions for achieving the described method. The method steps and/or actions may be interchanged with one another without departing from the scope of the claims. In other words, unless a specific order of steps or actions is specified, the order and/or use of specific steps and/or actions may be modified without departing from the scope of the claims.
The functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored as one or more instructions on a computer-readable medium. A storage media may be any available media that can be accessed by a computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Disk and disc, as used herein, includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and Blu-ray® disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers.
Software or instructions may also be transmitted over a transmission medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of transmission medium.
Further, it should be appreciated that modules and/or other appropriate means for performing the methods and techniques described herein, such as those illustrated in the Figures, can be downloaded and/or otherwise obtained by a mobile device and/or base station as applicable. For example, such a device can be coupled to a server to facilitate the transfer of means for performing the methods described herein. Alternatively, various methods described herein can be provided via a storage means (e.g., random access memory (RAM), read only memory (ROM), a physical storage medium such as a compact disc (CD) or floppy disk, etc.), such that a mobile device and/or base station can obtain the various methods upon coupling or providing the storage means to the device. Moreover, any other suitable technique for providing the methods and techniques described herein to a device can be utilized.
It is to be understood that the claims are not limited to the precise configuration and components illustrated above. Various modifications, changes and variations may be made in the arrangement, operation and details of the methods and apparatus described above without departing from the scope of the claims
While the foregoing is directed to embodiments of the present disclosure, other and further embodiments of the disclosure may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims that follow.
The present application for patent claims benefit of U.S. Provisional Patent Application Ser. No. 61/113,088 filed Nov. 10, 2008, entitled, “Spectrum Sensing of Bluetooth using a Sequence of Energy Detection Measurements,” and assigned to the assignee hereof and hereby expressly incorporated by reference herein.
Number | Name | Date | Kind |
---|---|---|---|
4901307 | Gilhousen et al. | Feb 1990 | A |
5056109 | Gilhousen et al. | Oct 1991 | A |
5101501 | Gilhousen et al. | Mar 1992 | A |
5103459 | Gilhousen et al. | Apr 1992 | A |
5109390 | Gilhousen et al. | Apr 1992 | A |
5182753 | Dahlin et al. | Jan 1993 | A |
5224121 | Schorman | Jun 1993 | A |
5267261 | Blakeney, II et al. | Nov 1993 | A |
5285447 | Hulsebosch | Feb 1994 | A |
5414796 | Jacobs et al. | May 1995 | A |
5418839 | Knuth et al. | May 1995 | A |
5420850 | Umeda et al. | May 1995 | A |
5450621 | Kianush et al. | Sep 1995 | A |
5457816 | Koyama | Oct 1995 | A |
5471503 | Altmaier et al. | Nov 1995 | A |
5483063 | Hall, Jr. et al. | Jan 1996 | A |
5490165 | Blakeney, II et al. | Feb 1996 | A |
5546464 | Raith et al. | Aug 1996 | A |
5594718 | Weaver, Jr. et al. | Jan 1997 | A |
5625876 | Gilhousen et al. | Apr 1997 | A |
5627876 | Moon | May 1997 | A |
5697055 | Gilhousen et al. | Dec 1997 | A |
5701294 | Ward et al. | Dec 1997 | A |
5706315 | Ogoro | Jan 1998 | A |
5727033 | Weaver et al. | Mar 1998 | A |
5751725 | Chen | May 1998 | A |
5805648 | Sutton | Sep 1998 | A |
5848063 | Weaver, Jr. et al. | Dec 1998 | A |
5883899 | Dahlman et al. | Mar 1999 | A |
5896368 | Dahlman et al. | Apr 1999 | A |
5903550 | Spock | May 1999 | A |
5920554 | Nakamura et al. | Jul 1999 | A |
5930706 | Raith | Jul 1999 | A |
5936961 | Chiodini et al. | Aug 1999 | A |
5937019 | Padovani | Aug 1999 | A |
5946605 | Takahisa et al. | Aug 1999 | A |
5950131 | Vilmur | Sep 1999 | A |
5953324 | Adachi | Sep 1999 | A |
5953325 | Willars | Sep 1999 | A |
5956367 | Koo et al. | Sep 1999 | A |
5963870 | Chheda et al. | Oct 1999 | A |
5982760 | Chen | Nov 1999 | A |
5995836 | Wijk et al. | Nov 1999 | A |
5999816 | Tiedemann, Jr. et al. | Dec 1999 | A |
6047165 | Wright et al. | Apr 2000 | A |
6073021 | Kumar et al. | Jun 2000 | A |
6073025 | Chheda et al. | Jun 2000 | A |
6075974 | Saints et al. | Jun 2000 | A |
6075989 | Moore et al. | Jun 2000 | A |
6078570 | Czaja et al. | Jun 2000 | A |
6101175 | Schorman et al. | Aug 2000 | A |
6118498 | Reitmeier | Sep 2000 | A |
6125267 | Monge-Navarro et al. | Sep 2000 | A |
6128493 | Song | Oct 2000 | A |
6134440 | Black | Oct 2000 | A |
6144649 | Storm et al. | Nov 2000 | A |
6147983 | Backstrom | Nov 2000 | A |
6151502 | Padovani et al. | Nov 2000 | A |
6154659 | Jalali et al. | Nov 2000 | A |
6157835 | Findikli et al. | Dec 2000 | A |
6175561 | Storm et al. | Jan 2001 | B1 |
6181943 | Kuo et al. | Jan 2001 | B1 |
6185431 | Li et al. | Feb 2001 | B1 |
6188900 | Ruiz et al. | Feb 2001 | B1 |
6212368 | Ramesh et al. | Apr 2001 | B1 |
6233466 | Wong et al. | May 2001 | B1 |
6252861 | Bernstein et al. | Jun 2001 | B1 |
6304755 | Tiedemann, Jr. et al. | Oct 2001 | B1 |
6310869 | Holtzman et al. | Oct 2001 | B1 |
6314126 | Schilling et al. | Nov 2001 | B1 |
6334047 | Andersson et al. | Dec 2001 | B1 |
6370367 | Monge-Navarro et al. | Apr 2002 | B1 |
6381461 | Besson et al. | Apr 2002 | B1 |
6385437 | Park et al. | May 2002 | B1 |
6385455 | St. Clair et al. | May 2002 | B1 |
6396804 | Odenwalder | May 2002 | B2 |
6396820 | Dolan et al. | May 2002 | B1 |
6493333 | Kim et al. | Dec 2002 | B1 |
6535563 | Tiedemann, Jr. et al. | Mar 2003 | B2 |
6553064 | Chen et al. | Apr 2003 | B1 |
6553229 | Dent | Apr 2003 | B1 |
6563807 | Kim et al. | May 2003 | B1 |
6587446 | Sarkar et al. | Jul 2003 | B2 |
6597922 | Ling et al. | Jul 2003 | B1 |
6603751 | Odenwalder | Aug 2003 | B1 |
6611506 | Huang et al. | Aug 2003 | B1 |
6665308 | Rakib et al. | Dec 2003 | B1 |
6701130 | Hamalainen et al. | Mar 2004 | B1 |
6788748 | Chen et al. | Sep 2004 | B2 |
6865173 | Czaja et al. | Mar 2005 | B1 |
6879576 | Agrawal et al. | Apr 2005 | B1 |
7010068 | Tiedemann, Jr. et al. | Mar 2006 | B2 |
7177377 | Wu et al. | Feb 2007 | B2 |
7190688 | Kamel et al. | Mar 2007 | B1 |
7215976 | Brideglall | May 2007 | B2 |
7242935 | Odenwalder | Jul 2007 | B2 |
7245597 | Grilli et al. | Jul 2007 | B2 |
7292435 | She | Nov 2007 | B2 |
7502619 | Katz | Mar 2009 | B1 |
7603123 | Odenwalder | Oct 2009 | B2 |
7653157 | Tiedemann, Jr. et al. | Jan 2010 | B2 |
7664209 | Tiedemann, Jr. et al. | Feb 2010 | B2 |
8170558 | Odenwalder | May 2012 | B2 |
8199716 | Grilli et al. | Jun 2012 | B2 |
20020082019 | Sunay et al. | Jun 2002 | A1 |
20030194033 | Tiedemann, Jr. et al. | Oct 2003 | A1 |
20040063403 | Durrant | Apr 2004 | A1 |
20050095986 | Hassan et al. | May 2005 | A1 |
20060146869 | Zhang et al. | Jul 2006 | A1 |
20060171327 | Durand et al. | Aug 2006 | A1 |
20080151849 | Utsunomiya et al. | Jun 2008 | A1 |
20090112492 | Ibrahim et al. | Apr 2009 | A1 |
Number | Date | Country |
---|---|---|
0530165 | Mar 1993 | EP |
0548939 | Jun 1993 | EP |
0566551 | Oct 1993 | EP |
0576079 | Dec 1993 | EP |
0667726 | Aug 1995 | EP |
0748140 | Dec 1996 | EP |
0773695 | May 1997 | EP |
0809365 | Nov 1997 | EP |
0977393 | Feb 2000 | EP |
1076956 | May 2006 | EP |
1509057 | Jul 2007 | EP |
1509058 | Aug 2007 | EP |
2314734 | Jan 1998 | GB |
06252819 | Sep 1994 | JP |
8009457 | Jan 1996 | JP |
08500475 | Jan 1996 | JP |
8503591 | Apr 1996 | JP |
8237220 | Sep 1996 | JP |
09018927 | Jan 1997 | JP |
09064814 | Mar 1997 | JP |
9083429 | Mar 1997 | JP |
9307942 | Nov 1997 | JP |
10051834 | Feb 1998 | JP |
2008517566 | May 2008 | JP |
2011027694 | Feb 2011 | JP |
2127963 | Mar 1999 | RU |
9429980 | Dec 1994 | WO |
9429981 | Dec 1994 | WO |
9508237 | Mar 1995 | WO |
9616524 | May 1996 | WO |
9623369 | Aug 1996 | WO |
9626616 | Aug 1996 | WO |
9631078 | Oct 1996 | WO |
9638999 | Dec 1996 | WO |
9702668 | Jan 1997 | WO |
9729611 | Aug 1997 | WO |
9740592 | Oct 1997 | WO |
9740593 | Oct 1997 | WO |
9740792 | Nov 1997 | WO |
9819491 | May 1998 | WO |
9836507 | Aug 1998 | WO |
9836607 | Aug 1998 | WO |
9847253 | Oct 1998 | WO |
9938347 | Jul 1999 | WO |
9941934 | Aug 1999 | WO |
9957649 | Nov 1999 | WO |
9960733 | Nov 1999 | WO |
0070902 | Nov 2000 | WO |
9957849 | Nov 2000 | WO |
WO2006045097 | Apr 2006 | WO |
WO2006082379 | Aug 2006 | WO |
2007135639 | Nov 2007 | WO |
Entry |
---|
Polepalli B. et al., “Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation”, International Conference on Advanced Information Networking and Applications Workshops, 2009, pp. 328-333, IEEE Computer Society. |
Devin Akin: “802.11n 20/40 MHz BSS Mode Rules” Internet Citation Aug. 29, 2007, pp. 1-2, XP002511494. |
IEEE: “IEEE P802.11n?/D2.00 Draft Standard for Information Technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Specific requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications:” Internet Citation Feb. 1, 2007, pp. 199-202, XP002511493. |
International Search Report and Written Opinion—PCT/US2009/063626, International Searching Authority—European Patent Office, Mar. 29, 2010. |
J.R. Barr—Motorola Inc.: “Additional 40 MHz Scanning Proposal” IEEE 802.11-08/1101 R4, [Online] Oct. 6, 2008, pp. 1-23, XP002572008 INET Internet. |
Taiwan Search Report—TW098138158—TIPO—Dec. 5, 2012. |
3GPP Specification detail; “General Packet Radio Service (GPRS); Mobile Station (MS)—Base Station System (BSS) interface; Radio Link Control/Medium Access Control (RLC/MAC) protocol;” Mar. 20, 1998. |
Andermo, PG , Editor, “CODIT Final Review Report,” Nov. 21, 1995, pp. 1-7, 10-12, 21-25, 46-49, & 76-87, Issue 2.0. |
Baier A, et al., “Design Study for a CDMA-Based Third-Generation Mobile Radio Station System,” May 1994, IEEE Journal on Selected Areas in Communications, vol. 12, No. 4, pp. 733-743. |
ETSI, “Digital Cellular Telecommunications System; Multiband Operation of GSM/DC 1 800 by a Singel Operator (GSM 03.26 version 5.2.0)”, ETSI Technical Report 366, 3rd Ed., Nov. 1997, pp. 1-17. |
ETSI, “Digital Cellular Telecommunications System; (Phase 2+);Technical Realization of the Short Message Service (SMS); Point-to-Point (PP) (GSM 03.40 version 5.6.0)”, ETSI Technical Report Draft, ETS 300 901, 3rd Ed., Aug. 1997, pp. 1, 13-14. |
ETSI EN (04.60); “Digital cellular telecommunications system (Phase 2+); General Packet Radio Service (GPRS); Mobile Station (MS)—Base Station System (BSS) interface; Radio Link Control/Medium Access Control (RLC/MAC) protocol (GSM 04.60 version 6.0.0);” Mar. 1998; pp. 1 & 38-43; European Telecommunicaitons Standards Institute; Sophia Antipolis, Valbonne, France. |
Gustafsson et al., “Compressed Mode Techniques for Inter-Frequency Measurements in a Wide-band DSCDMA System”, Waves of the Year 2000+ PIMRC. The IEEE International Symposium on Personal, Indoor and Mobile Radio Communications., 1997, pp. 231-235, IEEE. |
Ojanpera T et al., “Wideband CDMA for Third Generation Mobile Communications” Jun. 2000, People Posts & Telecommunications Publishing House, Bejing, pp. 170-209 and 275-285. |
Ojanpera, T., et al., “Wideband CDMA for Third Generations Mobile Communications”, Text Book, 1998. |
Satarasinghe P, “A Novel Method for CDMA Hard Handoff”, IEEE, Globecom 1996, London, Nov. 18-22,vol. 3, Nov. 18, 1996, pp. 1766-1768. |
Simon, et al., “Spread Spectrum Communications Handbook,” Revised Edition, McGraw-Hill, 1994, ISBN 0-07-057629-7, pp. 11-12. |
TIA/EIA Interim Standard IS-95-A Mobile Station-Base Station Compatibility Standard for Dual-Mode Wideband Spread Spectrum Cellular System. May 1995. |
Number | Date | Country | |
---|---|---|---|
20100118695 A1 | May 2010 | US |
Number | Date | Country | |
---|---|---|---|
61113088 | Nov 2008 | US |