1. Technical Field
The present invention relates to a system and a method for interference detection and identification as well as frequency allocation for wireless systems.
2. Description of Related Art
The license-free 2.4 GHz ISM band is crowded with radio applications. Examples are WLAN, Bluetooth, cordless phones, microwave ovens, etc. Interference to other systems, and vice versa, is a well-known problem in this band.
A system requiring high reliability for its own quality of service, as well as a good co-existence with other systems must choose a set of frequencies that are unused at that particular time, in that particular area. This is known in the art as dynamic/automatic channel allocation, or dynamic/automatic frequency allocation.
The issue of dynamic channel allocation (DCA) is a known problem for over 30 years. DECT is one of the most widespread systems using DCA. DCA is very effective within one particular system.
Adaptive frequency hopping (AFH) is another example of known art. Such systems adapt their allowed frequency table on the basis of prior success to communicate on particular frequencies. In version 1.2, the Bluetooth SIG has adopted AFH.
It is important to prevent the selection of nearby used Wireless Local Area Network (WLAN) frequencies. This is due to the ‘vulnerability’ of WLAN to interference in combination with the widespread success of the technology. WLANs consist of one access point (AP) and associated wireless stations (STA). The AP transmits a beacon as part of its air interface protocol. Without data transmissions taking place, the beacon remains as the only detectable presence in the WLAN, similar to a heartbeat. This is illustrated in
A known way to detect WLAN access points is the method used by programs such as “Netstumbler”. This method is based on sending a request to access points (APs) and detecting the WLANs based on the replies of the APs. There are two disadvantages to this approach: 1) Some APs have a security feature, by which they will not reply to such requests, unless the request contains the correct Service Set IDentifier (SSID)—thus making them invisible. 2) A device is needed that is capable of transmissions compatible with (parts of) the WLAN PHY/MAC.
It is an object of the invention to provide an improved system and method for interference detection and identification.
This and other objects of the invention are achieved by a system, a method and a computer program according to the independent claim. Favorable embodiments are defined in the dependent claims.
According to an aspect of the invention a system for interference detection and identification, as well as frequency allocation for wireless systems is provided, containing interference detection means for detecting interference on wireless radio frequencies. The interference detection means comprising discrimination means for discriminating between interference caused by a WLAN and interference caused by other radio applications. In this way, frequencies associated with WLANs can be reliably identified and avoided. The system according to the invention does not require the presence of a WLAN compatible PHY/MAC. Furthermore it is able to discover all WLANs, also the secure ones.
Based on the interference detection and identification, the system may determine a set of allowed frequencies that may be used for frequency allocation. Frequencies clear of interference are added to the set of allowed frequencies. Interfered frequencies are added to this set only if no WLAN has been detected.
The system according to the present invention is optimized for, but not limited to, a digitally modulated non-frequency hopping wireless audio system. The bandwidth of this system allows N adjacent, non-overlapping frequencies. These N frequencies are all scanned. Scanning may be for a period of time, or continuously. The scanning process results in a table, containing the observed statistics. The statistics are processed for best frequency detection and allocation.
Frequency hoppers (FH) such as Bluetooth or cordless phones need not actively be avoided. FHs without adaptive frequency hopping (AFH) use the whole band, so there is no best or worst frequency. FH with AFH requires no avoidance, since those systems can avoid interference themselves.
Frequency hoppers are essentially narrowband transmissions, typically using 1 MHz bandwidth. Since they need not be avoided particularly, it is beneficial to not only measure total received power (interference) but also determine whether its source is narrowband or broadband. In case that the source is broadband it is determined that the interference comes from a WLAN.
According to a further embodiment the discriminating means are adapted for discriminating an interference caused by a WLAN-beacon. This may be done either by discriminating a repetition frequency of the WLAN-beacon or by discriminating a duration of the WLAN-beacon by means of a filter. In both cases the discrimination between interferences coming from a WLAN and from other applications is performed in a simple and reliable way.
According to a further aspect of the invention a method is provided for interference detection and identification, as well as frequency allocation for wireless systems comprising the following steps:
These and other aspects of the invention will be apparent from and elucidated with reference to the embodiments described hereinafter.
The invention will be better understood and its numerous objects and advantages will become more apparent to those skilled in the art by reference to the following drawings, in conjunction with the accompanying specification, in which:
Throughout the figures like reference numerals refer to like elements.
An example of how a wideband power detector may respond over time to the simultaneous presence of a frequency hopper and a WLAN beacon is depicted in
General Flow
The general flow of the entire process according to the invention is depicted in
The frequency is set to the one to be tested (FUT—frequency under test). On this frequency, statistics, such as power and duration, are collected. Optionally, these statistics are pre-processed for the purpose of data storage reduction. After collecting for the intended time period for the FUT, the presence of interfering systems is identified, and their type (e.g. WLAN or not) is classified. The above is repeated for all frequencies, whereas finally a set of allowable frequencies is determined, and the best is assigned.
The system according to the present invention is preferably used in the 2400-2483.5 MHz-band. The frequency under test preferably is a 22 MHz wide frequency band.
This process need not necessarily be continuous or sequential. For instance, the information may be collected in between transmissions of the desired system, hence in intervals. Additionally, the process may be executed in parallel, for instance, if more than one radio front-end is available. The process in
Measurement of Statistics
The measurement of statistics may be designed according to
After automatic gain control (AGC), power is measured. AGC circuits may also produce a power measurement themselves.
In
WBP represents the total power in the radio frequency (RF) bandwidth. NBP represents the aggregate power of all signals having a bandwidth substantially smaller than the RF bandwidth. Concrete examples are 11 MHz (−3 dB) WBP bandwidth, and 1 MHz (−3 dB) NBP bandwidth.
From the difference WBP−NBP, the type of interference may be deduced. In
Power Measurement
Assuming a digital implementation, samples enter, are correlated over a delay time, and are summed over a period of time. Power is obtained by taking the absolute value and proper scaling. NBP is measured by setting the delay to a non-zero value, e.g. 1 μs. WBP is measured by setting the delay to 0. In more general terms, the delay value must be set in relation to the autocorrelation function of the respective signals. For narrow-band detection, the delay is set to a value larger than the main lobe of the autocorrelation function of the WLAN signal. For wide-band detection, the delay is set to a value smaller than this main lobe.
Several notes apply to
Power measurements may be made more sensitive by means of antenna selection or antenna combination techniques. A person skilled in the art can apply these to improve the NBP/WBP power measurements.
Data Pre-processing
The pre-processing step in
The references in
Data pre-processing is an optional function, with the intent to reduce the data flow. This makes it possible to reduce the requirements on storage and processing power. There are four proposed steps:
The purpose of the filter in 2) is to maximize the response to WLAN beacon power signature. This can be done by means of tuning the impulse response to beacon length. In this way, the relatively long WLAN-beacon can be distinguished from briefer other interferences. This assumes that there are multiple power measurements per beacon.
The low pass filter is another alternative data reduction technique, and can be implemented by means of the median, average, or any other known filter in the art.
The intensity filter compares the measured power to a threshold, and the logical result (‘1’ or ‘0’) is averaged in time.
Interference Presence Detection and Identification
There are two methods for detection and classification presented here:
First, the pre-processed data allows for straightforward thresholding. The determined max-hold power value is compared to a pre-defined threshold. Upon exceeding the threshold, the respective frequency is declared occupied. Such a technique discriminates very little according to the type of interference. Note that, if used, the NBP−WBP discriminator has already done pre-classification, so that the probability of exceeding the threshold from non-WLAN sources has been reduced.
To further make use of the known beacon repetition rate, method 2) collects the sequential unpreprocessed power measurements, and organizes them in a matrix form, the matrix consisting of a plurality of columns C and rows R, by writing data row by row as depicted schematically in
WLAN beacons with the known repetition rate will show up in vertically adjacent fields in this matrix. The sum of the columns is calculated. This is schematically depicted in
The next step is to process the data such that WLAN beacons are positively discriminated. Correlation methods are well-suited for this. The correlation in
Summing adjacent columns together allows small alignment differences between the actual rate of beacon and the assumed rate. A low complexity of the computation of the threshold is depicted in
The threshold varies as a function of the total noise over a certain time period. The threshold computation shown in
Method 2 can be made suitable for any interferer repetition rate by adjusting the row length. Variations in rate can be compensated by summing less or more adjacent columns. Accuracy can be improved by adding rows. The method is extendible to multiple WLAN (wifi) beacon detection, i.e., on the basis of multiple-peak detection.
Channel Assignment
In the final channel assignment there are two decisions to be taken:
Step 1) is depicted in
All frequencies are evaluated. Those clear of interference are added to the set of allowed frequencies. Those with interference are only allowed if no WLAN has been detected.
Further classification can be obtained by integrating the information from all observed frequencies. A full-band frequency hopper (FH) will yield similar power measurements in all bands. Therefore, when all frequencies show consistency to a pre-defined level, interference is classified as frequency hopper only. If any frequency shows a substantial increase over (the mean of) the others, that frequency is a likely candidate for WLAN. The flow diagram for this is depicted in
Step 2) takes the set of allowed frequencies as input. The frequency selected is the one with the least average interference. If the set is empty, the system may overrule the list and allocate one or more frequencies, for instance also based on a least average interference criterion.
The functionality shown
The system according to the present invention is optimized for, but not limited to, a digitally modulated non-frequency hopping wireless audio system.
As will be recognized by those skilled in the art, the innovative concepts described in the present application can be modified and varied over a wide range of applications.
Accordingly, the scope of patented subject matter should not be limited to any of the specific exemplary teachings discussed, but is instead defined by the following claims.
Any reference signs in the claims shall not be construed as limiting the scope thereof.
Number | Date | Country | Kind |
---|---|---|---|
1031641 | Apr 2006 | NL | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP2007/053876 | 4/20/2007 | WO | 00 | 10/20/2008 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2007/122188 | 11/1/2007 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
5048057 | Saleh et al. | Sep 1991 | A |
6130907 | Chen | Oct 2000 | A |
6359901 | Todd et al. | Mar 2002 | B1 |
6442384 | Shah et al. | Aug 2002 | B1 |
6606496 | Salvarani et al. | Aug 2003 | B1 |
6697013 | McFarland et al. | Feb 2004 | B2 |
6704378 | Jagger et al. | Mar 2004 | B2 |
6941110 | Kloper et al. | Sep 2005 | B2 |
7107032 | Li | Sep 2006 | B2 |
7129884 | Tehrani et al. | Oct 2006 | B1 |
7149205 | Nakamura et al. | Dec 2006 | B2 |
7260361 | Jacobsen | Aug 2007 | B2 |
7363008 | Hassan et al. | Apr 2008 | B2 |
7373162 | Farnham et al. | May 2008 | B2 |
7424268 | Diener et al. | Sep 2008 | B2 |
7515935 | Ibrahim et al. | Apr 2009 | B2 |
7554965 | Karaoguz | Jun 2009 | B2 |
7599686 | Quinn et al. | Oct 2009 | B2 |
7643460 | Bajic | Jan 2010 | B2 |
7643811 | Reunamaki et al. | Jan 2010 | B2 |
7929508 | Yucek et al. | Apr 2011 | B1 |
7933566 | Li et al. | Apr 2011 | B2 |
7945209 | Grushkevich et al. | May 2011 | B2 |
8023599 | Tanaka et al. | Sep 2011 | B2 |
8204445 | Wood | Jun 2012 | B2 |
20030125019 | Bajikar | Jul 2003 | A1 |
20040203826 | Sugar et al. | Oct 2004 | A1 |
20050117676 | Liu | Jun 2005 | A1 |
20050272436 | Trott et al. | Dec 2005 | A1 |
20060089103 | Osburn | Apr 2006 | A1 |
20060171327 | Durand et al. | Aug 2006 | A1 |
20070183338 | Singh et al. | Aug 2007 | A1 |
20080057967 | Goldsmith | Mar 2008 | A1 |
20090296647 | Friday et al. | Dec 2009 | A1 |
Number | Date | Country |
---|---|---|
1515488 | Mar 2005 | EP |
2002-353878 | Dec 2002 | JP |
2005-523616 | Aug 2005 | JP |
9710553 | Mar 1997 | WO |
03001742 | Jan 2003 | WO |
03090037 | Oct 2003 | WO |
03090037 | Oct 2003 | WO |
Entry |
---|
International Search Report PCT/EP2007/053876; Dated Aug. 6, 2007. |
Number | Date | Country | |
---|---|---|---|
20090097445 A1 | Apr 2009 | US |