Channel discovery and disconnection in networks over white spaces and other portions of the spectrum

ABSTRACT

Functionality is described for discovering a channel within an environment in which non-privileged entities have subordinate access rights to spectrum compared to privileged entities. The functionality operates by investigating spectrum units within the spectrum for the presence of the channel. In one case, the functionality operates by investigating the spectrum units in linear succession; in another case, the functionality advances in a staggered fashion over the available spectrum. Functionality is also described for handling disconnection by a node from a channel. The functionality allows the node to convey its disconnection status to other communication participants. In one case, various aspects of the functionality are implemented by performing analysis in the time domain.

BACKGROUND

An appropriate rule-making authority may occasionally reconsider therules that govern the use of a particular portion of the wirelesscommunication spectrum. The authority may initiate such reconsiderationin view of advances in technology and changes in consumer needs. Ingeneral, historical considerations that were relevant at the time ofenactment of the rules may no longer apply in full force. Moreover, newconsiderations may now apply which were not foreseen at the time ofenactment of the rules.

A change in the rules may allow a tremendous expansion in the usefulnessof a particular portion of the spectrum. However, such a change may alsointroduce significant technical challenges. For example, in the UnitedStates, the FCC recently modified the rules governing the use of TVspectrum. Historically, the rules reserve that portion of the spectrumfor television transmissions and wireless microphones. Such licensedentities are referred to as privileged entities herein. The FCC rulingexpands the use of this portion of the spectrum to other, non-licensed,communication devices. However, the FCC ruling states that the newdevices are not permitted to interfere with the privileged entities.Such unlicensed entities are referred to as non-privileged entitiesherein because they have subordinate rights to the available spectrumcompared to the privileged entities. By contrast, there are no suchconstraints governing the use of communication devices in ISM bands(used for Wi-Fi communication). It is a challenging task to developdevices which make efficient use of the unoccupied TV spectrum—which iscommonly known as white spaces—under the constraints of the FCC ruling.Similar rule changes and associated challenges may apply to otherrule-making jurisdictions and other portions of the spectrum.

In other cases, the rules governing a particular portion of the wirelessspectrum have not changed. Here too, there remains potential for makingmore efficient use of the spectrum, e.g., by revisiting traditionalparadigms that have governed the use of the spectrum.

SUMMARY

According to one illustrative implementation, functionality is describedfor discovering a channel that can be used to conduct communicationamong nodes. The functionality operates by investigating the spectrumunits within an available spectrum according to a specified searchstrategy. The spectrum units may correspond to underlying TV channels(in one illustrative and non-limiting case). The functionalityinvestigates a spectrum unit by determining whether it is at least partof a channel. The functionality performs this task by determiningwhether a characteristic signal is obtained over the spectrum unit thatis associated with the channel, even though the spectrum unit may onlypartially overlap the channel.

If a channel is detected, the functionality further examines thecharacteristic signal obtained over the spectrum unit, e.g., byexamining a characteristic pattern in the signal. The functionalityderives the width and center frequency of the channel based on thecharacteristic signal. Once the width and center frequency of thechannel are determined, nodes can communicate using this channel.

According to one illustrative feature, the functionality is applied inan environment in which the spectrum is shared by privileged entitiesand non-privileged entities, the non-privileged entities havingsubordinate rights to the spectrum compared to the privileged entities.The functionality is used by the second entities to discover a channel;for example, a node can use the functionality to discover an accesspoint device with which it may communicate.

According to one illustrative implementation, a channel used by one node(such as a node associated with an access point device) can have avariable width which is not known to other nodes in advance of thediscovery of this channel by the other nodes. In other words, a channelcan encompass any number of underlying spectrum units (e.g., TV channelsin one example). The center frequency of the channel is also not knownto the other nodes. The functionality can discover the channel withoutexamining all permissible channel permutations having differentrespective center frequencies and widths.

According to a linear search strategy, the functionality operates byexamining each spectrum unit within the available spectrum in linearsuccession. According to a staggered search strategy, the functionalityexamines spectrum units within the available spectrum in staggeredfashion, skipping over one or more spectrum units in a linear successionof spectrum units. The skipping is performed to investigate theavailable spectrum for the presence of the channel on aclass-width-by-class-width basis, starting with the largest class widthfirst.

According to another illustrative implementation, functionality isdescribed for handling disconnection from a channel. The functionality,when implemented by a first node, operates by detecting a presence of aprivileged entity operating on a channel that is being used by the firstnode to communicate with a second node (such as an access point device).The first node and the second node are associated with non-privilegedentities, where, as stated, the non-privileged entities have subordinateaccess rights compared to the privileged entity. The functionality thenoperates by disconnecting the first node from the channel. In oneexample, disconnection is appropriate because the first node and thesecond node, being non-privileged entities, are no longer allowed tocommunicate on the channel in which a privileged entity suddenly beginstransmitting (or is suddenly discovered to be transmitting). Thefunctionality then entails sending notification information from thefirst node to the second node. The notification information informs thesecond node that the first node has lost its connection to the channel.

According to one illustrative feature, the functionality can notify thesecond node via a backup channel, e.g., using a chirping protocol or thelike. In addition, the functionality can notify the second node via analternative channel if a backup channel is determined to be unavailable.

According to another illustrative implementation, functionality isdescribed for extracting information from a spectrum using time domainanalysis. The functionality operates by investigating a plurality ofspectrum units in the time domain to identify a characteristic signal.The functionality then derives information based on the characteristicsignal, to provide derived information. The functionality then governscommunication among at least two nodes based on the derived information.

According to one illustrative feature, the functionality can use timedomain analysis to facilitate the discovery of a channel in the mannersummarized above. For example, the functionality can use acharacteristic pattern in the signal to derive at least the width of achannel. The functionality can then uses the identified channel tohandle communication among nodes.

According to another illustrative feature, the functionality can usetime domain analysis to handle disconnection from the channel in themanner summarized above. For example, the functionality can use timedomain analysis to detect telltale chirping activity (or other activity)on a backup or alternative channel, indicating that a node hasdisconnected from its channel.

The above approach can be manifested in various types of systems,components, methods, computer readable media, data structures, articlesof manufacture, and so on.

This Summary is provided to introduce a selection of concepts in asimplified form; these concepts are further described below in theDetailed Description. This Summary is not intended to identify keyfeatures or essential features of the claimed subject matter, nor is itintended to be used to limit the scope of the claimed subject matter.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows an illustrative environment in which privileged entitiesshare a portion of a wireless communication spectrum with non-privilegedentities.

FIG. 2 shows an illustrative derivation of spectrum availability bytaking a logical intersection of two spectrum maps.

FIG. 3 shows an illustrative use of available spectrum to host channelsof varying width.

FIG. 4 shows an illustrative communication device for conductingcommunication within the environment of FIG. 1.

FIG. 5 shows a high-level view of an illustrative communicationmanagement module for use in the communication device of FIG. 4.

FIG. 6 shows functionality for providing time domain analysis andfrequency domain analysis for use in the communication device of FIG. 4.

FIG. 7 is a graph which shows a high level view of a signal captured inthe time domain; this graph serves as a vehicle for explaining variousaspects of the operation of time domain analysis functionality shown inFIG. 6, as applied to the discovery of a channel.

FIG. 8 shows an illustrative communication module for use in thecommunication device of FIG. 4.

FIG. 9 shows an illustrative procedure that provides an overview of theoperation of a channel assignment module of FIG. 5.

FIG. 10 shows an illustrative procedure that explains how the channelassignment module can be used to generate a suitability assessment for achannel.

FIG. 11 shows an illustrative procedure that explains how the channelassignment module can convey a channel selection to a communicationparticipant, and how the appropriateness of the channel selection can besubsequently evaluated.

FIG. 12 shows an illustrative procedure that provides an overview oftime domain analysis that can be performed by the communication deviceof FIG. 4.

FIG. 13 shows an illustrative procedure that explains how a channeldiscovery module (of FIG. 5) can be used to discover a channel using alinear search strategy.

FIG. 14 shows an illustrative procedure that explains how the channeldiscovery module can be used to discover a channel using a staggeredsearch strategy.

FIG. 15 shows an illustrative procedure that explains how adisconnection management module (of FIG. 5) can be used to identify aloss of a channel, and to communicate that loss of the channel to othercommunication participants.

FIG. 16 shows an illustrative procedure that explains how thedisconnection management module can be used to detect notificationinformation which alerts it that a communication participant has lostits channel; FIG. 16 also explains how the disconnection managementmodule can initiate the selection of another channel in response to thenotification information.

FIG. 17 shows illustrative processing functionality that can be used toimplement any aspect of the features shown in the foregoing drawings.

The same numbers are used throughout the disclosure and figures toreference like components and features. Series 100 numbers refer tofeatures originally found in FIG. 1, series 200 numbers refer tofeatures originally found in FIG. 2, series 300 numbers refer tofeatures originally found in FIG. 3, and so on.

DETAILED DESCRIPTION

This disclosure sets forth functionality for handling various aspects ofcommunication in an environment in which privileged entities sharespectrum with non-privileged entities. The non-privileged users havesubordinate rights to the spectrum compared to the privileged users, aswill be explained in detail below. The functionality can also be used inother types of environments.

This disclosure is organized as follows. Section A describesillustrative systems for handling communication in the above-describedtype of environment that includes privileged and non-privilegedentities. Section B describes illustrative methods which explain theoperation of the system of Section A. Section C describes illustrativeprocessing functionality that can be used to implement any aspect of thefeatures described in Sections A and B.

As a preliminary matter, some of the figures describe concepts in thecontext of one or more structural components, variously referred to asfunctionality, modules, features, elements, etc. The various componentsshown in the figures can be implemented in any manner, for example, bysoftware, hardware (e.g., discrete logic components, etc.), firmware,and so on, or any combination of these implementations. In one case, theillustrated separation of various components in the figures intodistinct units may reflect the use of corresponding distinct componentsin an actual implementation. Alternatively, or in addition, any singlecomponent illustrated in the figures may be implemented by plural actualcomponents. Alternatively, or in addition, the depiction of any two ormore separate components in the figures may reflect different functionsperformed by a single actual component. FIG. 17, to be discussed inturn, provides additional details regarding one illustrativeimplementation of the functions shown in the figures.

Other figures describe the concepts in flowchart form. In this form,certain operations are described as constituting distinct blocksperformed in a certain order. Such implementations are illustrative andnon-limiting. Certain blocks described herein can be grouped togetherand performed in a single operation, certain blocks can be broken apartinto plural component blocks, and certain blocks can be performed in anorder that differs from that which is illustrated herein (including aparallel manner of performing the blocks). The blocks shown in theflowcharts can be implemented by software, hardware (e.g., discretelogic components, etc.), firmware, manual processing, etc., or anycombination of these implementations.

As to terminology, the phrase “configured to” encompasses any way thatany kind of functionality can be constructed to perform an identifiedoperation. The functionality can be configured to perform an operationusing, for instance, software, hardware (e.g., discrete logiccomponents, etc.), firmware etc., and/or any combination thereof.

The term “logic” encompasses any functionality for performing a task.For instance, each operation illustrated in the flowcharts correspondsto logic for performing that operation. An operation can be performedusing, for instance, software, hardware (e.g., discrete logiccomponents, etc.), firmware, etc., and/or any combination thereof.

A. Illustrative Systems

A.1. Illustrative Environment

FIG. 1 shows an illustrative environment 100 in which privilegedentities and non-privileged entities share a portion of a wirelesscommunication spectrum. As described above, a privileged entity is anentity which has superior rights to the spectrum compared to anon-privileged entity. FIG. 1 shows two representative privilegedentities, namely privileged entity M 102 and privileged entity N 104.Privileged entity M 102 has a range of influence corresponding to region106. Privileged entity N 104 has a range of influence corresponding toregion 108. Generally, the range of influence refers to a geographicrange of coverage in which entities can receive or are otherwiseaffected by the signals transmitted by the privileged entities (102,104), as defined by any jurisdiction-specific rules and/or otherconsiderations. FIG. 1 shows four representative non-privilegedentities, namely non-privileged entity W 110, non-privileged entity X112, non-privileged entity Y 114, and non-privileged entity Z 116.

The environment 100 can correspond to any contextual setting governed byany rule-making jurisdiction (or no rule-making jurisdiction). Further,the environment 100 can provide communication in any portion (orportions) of a wireless communication spectrum (e.g., an electromagneticcommunication spectrum). To facilitate explanation, the followingdiscussion presents the concrete illustrative example in which theenvironment 100 corresponds to an expansion of the use of the TVspectrum, as governed in the United Stated by the FCC. The unoccupied TVspectrum is commonly known as white spaces. In the UHF spectrum, thisportion includes, but is not limited to, 180 MHz of available bandwidthfrom channel 21 (512 MHz) to channel 51 (698 MHz), with the exception ofchannel 37. Additional TV spectrum is available in the VHF portion ofthe spectrum. To repeat, this example should be construed asrepresentative and non-limiting. The principles described herein are notlimited to any particular portion of a wireless communication spectrum.Nor are the principles limited to any particular country or otherrule-making authority.

In the context of white spaces, the privileged entities correspond totelevision transmitters and wireless microphones. These entitiesrepresent licensed users of the spectrum; that is, as set forth by theFCC, these entities are the original intended users of the spectrum andthe TV channels correspond to TV broadcast channels. The non-privilegedentities correspond to any other users of the spectrum. As per the FCCruling, a non-privileged entity cannot communicate on a portion of thespectrum currently being used by a privileged entity, if within acoverage area of that privileged entity. Further, if a privileged entitybegins to transmit on a portion of the spectrum being used by anon-privileged entity, it is appropriate that the non-privileged entityimmediately vacate that portion of the spectrum. Because of thesepriority-based rules, the privileged entities are said to have superiorrights to the spectrum compared to the non-privileged entities, and thenon-privileged entities are said to have subordinate rights compared tothe privileged entities. Other rule-making jurisdictions may promulgatedifferent rules governing access to the spectrum. The principlesdescribed herein are not limited to any particular rules governing useof the communication spectrum.

FIG. 1 shows the merely representative case in which non-privilegedentity Z 116 serves as an access point device which provides access to aresource of any type. For example, the resource may represent a network118 of any type, such as a local area network, a wide area network (suchas the Internet), a telecommunication network, etc. The othernon-privileged entities (W 110, X 112, and Y 114) communicate with thenon-privileged entity Z 116 in order to gain access to the network 118(or other resource). In a common application, for instance, thenon-privileged entities (W 110, X 112, and Y 114) are computer-typedevices and the non-privileged entity Z 116 is a router or base stationof any type that provides access to the network 118. In this context,the non-privileged entity Z 116 operates in the role of a master, whilethe non-privileged entities (W 110, X 112, and Y 114) each act in therole of a slave.

However, the principles described herein are not limited to theabove-described relationship among non-privileged entities. In anothercase, any two or more non-privileged entities can communicate with eachother using point-to-point communication. In another case, any two ormore non-privileged entities can form a local network of any type, suchas a mesh network or an ad hoc network. The non-privileged entities canuse that local network to transact local transactions amongst themselvesand/or to interact with a more encompassing network, such as network118. Still other paradigms and protocols may apply to the interactionamong non-privileged entities.

In the following discussion, the non-privileged entities can mostgenerically be referred to as nodes. Thus, many of the principles can beframed in a general framework of a first node in communication with asecond node. As explained above, the two nodes can have a master-slaverelationship, a peer-to-peer relationship, and so on. The non-privilegedentities can be implemented by communication devices of any kind. FIG.4, to be discussed in turn, shows one such illustrative communicationdevice.

On the topic of terminology, the term spectrum unit refers to anysegment of available spectrum. For example, the TV spectrum is dividedinto a number of channels, which are referred to as spectrum unitsherein. The segments of the spectrum are referred to as spectrum units,rather than channels, because the term channel is used in anothercontext, as will be clarified in the course of the ensuing discussion.As one example, the TV spectrum is commonly partitioned into 6 MHz-widespectrum segments because 6 MHz is the width of an individual TVbroadcast transmission. In Europe, the channels are 8 MHz wide.

The use of privileged and non-privileged entities in the same portion ofthe wireless spectrum contributes to three salient characteristics ofthe environment 100: spectrum variation; spectrum fragmentation; andspectrum temporality. These features are explored in greater detailbelow.

Spectrum variation means that the number and type of privileged entitiesthat affect a particular region varies from location to location. Forexample, assume that privileged entity M 102 is using a spectrum unitthat is generically labeled as “A,” while privileged entity N 104 isusing a spectrum unit that is generically labeled as “F.” For instance,spectrum units A and F may correspond to respective channels in the TVspectrum. All entities within region 106 are affected by privilegedentity M 102, transmitting on spectrum unit A. All entities withinregion 108 are affected by privileged entity N 104, transmitting onspectrum unit F. As such, non-privileged entity W 110 cannot usespectrum unit A due to the presence of privileged entity M 102, but isnot constrained by privileged entity N 104. Non-privileged entity Y 114and non-privileged entity Z 116 cannot use spectrum unit F due to thepresence of privileged entity N 104, but are not constrained byprivileged entity M 102. And non-privileged entity X 112 cannot usespectrum units A and F due to the presence of both privileged entity M102 and privileged entity N 104. The following explanation will setforth additional considerations that restrict the spectrum that isavailability to any non-privileged entity.

Spectrum fragmentation means that the presence of privileged entitiesbreaks up the spectrum that is available for transmission to thenon-privileged entities. For example, consider the spectrum as “seen by”non-privileged entity X 112. Non-privileged entity X 112 detects that itcan transmit on neither spectrum unit A nor spectrum unit F. This meansthat the available portions of the spectrum are fragmented by theunavailability of spectrum unit A and spectrum unit F. That is, thetotality of available spectrum no longer forms a contiguous band, but ispartitioned into chunks separated from each other by spectrum units usedby privileged entities (in this case, spectrum unit A and spectrum unitF). Here, there are four spectrum units available between spectrum unitA and spectrum unit F (corresponding to generically labeled spectrumunits B, C, D, and E, as shown in FIG. 2, to be discussed). Butgenerally, the available spectrum as “seen by” by any non-privilegedentity can include any dispersal of available and unavailable spectrumunits.

Spectrum temporality means that the presence of privileged entities thataffect a particular region may change over time. For example, aprivileged entity can become active or inactive at any particular timewithout warning to the non-privileged entities. For example, a user canswitch on or off a wireless microphone at any time without warning.Further, temporality may ensue from the fact that any of the privilegedentities and/or non-privileged entities can be in motion. For example,FIG. 1 indicates that privileged entity N 104 is in possible motion andnon-privileged entity X 112 is in possible position.

With the above characteristics in mind, consider the example in whichnon-privileged entity W 110 and non-privileged entity Y 114 seek tocommunicate with non-privileged entity Z 116. In this case,non-privileged entity W 110 is affected by privileged entity M 102operating on spectrum unit A, while non-privileged entity Y 114 andnon-privileged entity Z 116 are affected by privileged entity N 104operating on spectrum unit F. To ensure overall interference-freeinteraction, it is desirable that the interaction between non-privilegedentities W 110, Y 114, and Z 116 takes place on a channel that is freeto all non-privileged entities (W 110, Y 114, and Z 116).

FIG. 2 illustrates the above concept in graphical form, where theidentified reference numbers refer back to FIG. 1. A first column ofspectrum units corresponds to a first spectrum map. This spectrum maprepresents spectrum units that are available to non-privileged entity W110. A second column of spectrum units corresponds to a second spectrummap. This spectrum map represents spectrum units that are available tonon-privileged entity Y 114. A third column of spectrum unitscorresponds to a third spectrum map. This spectrum map representsspectrum units that are available to non-privileged entity Z 116. In onecase, any non-privileged entity can generate its spectrum map byscanning the spectrum for the presence of privileged entities. Anon-privileged entity can also generate its spectrum map using othermechanisms. For example, a non-privileged entity can obtain informationregarding privileged entities that constrain its operation from adatabase of any type, or from any other node or nodes, or from any othersource (or from any combination of sources). For example, anon-privileged entity can assess its location using any mechanism (e.g.,a GPS mechanism), and then consult such a geo-location database todetermine privileged entities (and associated spectrum units used bythese privileged entities) in its vicinity. That is, such a geo-locationdatabase may identify operating constraints on a location-by-locationbasis.

A channel assignment module (to be described in detail below) takes thelogical intersection (e.g., logical OR) of the three spectrum maps toform an indication of spectrum that is available to non-privilegedentities W 110, Y 114, and Z 116. In this case, the channel assignmentmodule determines that the available spectrum includes spectrum units B,C, D, E and G, etc., as represented by the fourth column in FIG. 2. Thisscenario represents a simplified example; in general, the channelassignment module can combine spectrum maps with respect to a largergroup of communication participants, respectively having more complexspectrum maps.

The channel assignment module next operates by selecting a channel fromwithin the available spectrum on which to conduct communication. Indoing so, the channel assignment module has multiple candidate channelsto select from. To convey this point, consider the graphicalillustration of FIG. 3. Here, the channel assignment module hasdetermined that spectrum units labeled with “x” are not free to use,e.g., because they are currently being used by privileged entities. Theremaining spectrum defines available spectrum for use in conductingcommunication among non-privileged entities. The channel assignmentmodule can select a channel from any portion of the available spectrum.

By way of terminology, as explained above, a spectrum unit refers to anunderlying portion of the spectrum, such as a pre-existed channel of theTV spectrum, each having a width of 6 MHz. One such representativespectrum unit is spectrum unit 302. Privileged entities communicate overthese spectrum units. A channel refers to a portion of the availablespectrum that the non-privileged entities use to conduct communication.A channel is associated with a center frequency and a width, asdiscussed below. In other words, while both spectrum units and channelsserve the functional role of communication channels, the followingexplanation distinguishes between the two for reasons of clarity.

In one case, all of the channels have the same width. In another case,the channels can have varying channel widths. In other words, thechannel widths need not all be the same. For example, in one case, thechannel assignment module selects a channel which overlaps only a singlespectrum unit. In another case, the channel assignment module selects achannel which overlaps two or more spectrum units.

For instance, consider the examples shown in FIG. 3, which showsillustrative channels 304 of varying width. A first channel has a widthof 20 MHz and spans five spectrum units. A second channel has a width of5 MHz and spans one spectrum unit. A third channel has a width of 10 MHzand spans three spectrum units. These examples are representative andnon-limiting. In general, a channel can have any width that isaccommodated by a portion of the available spectrum and can overlap anynumber of spectrum units.

Each channel is characterized by a width, W, and a center frequency, F.The width defines the frequency span of a channel, e.g., 5 MHz, 10 MHz,20 MHz, etc. The center frequency defines the center point in the spanof frequencies encompassed by the channel. In one case, the channelassignment module places the channel so that it coincides with a centerfrequency of an underlying spectrum unit, although other approaches mayadopt a different placement rule.

A.2. Illustrative Communication Device

Advancing to FIG. 4, this figure shows an overview of a representativecommunication device 400 that can be used to implement any one of thenon-privileged entities shown in FIG. 1. For example, the communicationdevice can be used to implement the non-privileged entity W 110 (which,in one case, operates in a slave mode) or the non-privileged entity Z(which, in one case, operates in a master mode). The communicationdevice 400 can correspond to, or can be integrated with, any type ofdevice, or more generally, electrical processing functionality, such asa personal desktop computing device, a laptop computing device, apersonal digital assistant (PDA) type computing device, a mobile phonetype computing device, a game console device, a set-top box device, arouter type device, a server type device, and so on.

The communication device 400 includes a wireless interaction module 402for communicating with other devices via wireless (e.g., radio)communication. The wireless interaction module 402, in turn, can includea scanning module 404 and a main communication module 406. As part of achannel assignment procedure, the scanning module 404 can scan thespectrum (e.g., the TV spectrum) to discover the presence of availablechannels and the quality of the available channels. As part of a channeldiscovery procedure, the scanning module 404 can scan the appropriatespectrum (e.g., the TV spectrum) for the presence of an assignedoperational channel, e.g., a channel associated with an access pointdevice. As part of a disconnection handling procedure, the scanningmodule 404 can scan the spectrum for the presence of notificationinformation. The notification information informs the communicationdevice 400 that another communication device with which it iscommunicating has moved to another channel.

The main communication module 406 enables the communication device 400to transmit and receive data packets and non-data messages over achannel to one or more other communication devices. The maincommunication module 406 can be tuned to a channel having a specifiedcenter frequency and width. FIG. 8, to be discussed in turn, providesadditional information regarding the operation of the main communicationmodule 406. Any mechanism and method of wireless communication can beemployed by the main communication module 406.

A number of modules process the information received from or sent to thewireless interaction module 402. For example, an incumbent detectionmodule 408 detects the presence of privileged entities based on a signalprovided to it by the scanning module 404. In one implementation, theincumbent detection module 408 performs this operation by detectingtelltale patterns in the signal. The telltale patterns are indicative ofthe transmissions generated by privileged entities, e.g., televisiontransmissions and wireless microphone transmissions. In one case, theincumbent detection module 408 can perform its analysis by operating ona version of the signal which has been transformed from the time domainto the frequency domain. (In addition, or alternatively, anon-privileged entity can determine the presence of privileged entitiesusing other mechanisms, such as by consulting a geo-location database,as described above.)

A communication management module 410 governs all aspects of thecommunication performed by the communication device 400. For example,advancing momentarily to FIG. 5, the communication management module 410can include a channel assignment module 502, a channel discovery module504, and a disconnection management module 506. The channel assignmentmodule 502 selects an appropriate channel for use in communicatingbetween one or more communication devices. The channel discovery module504 discovers the presence of a channel that has already been assigned(e.g., a channel associated with an access point device). Thedisconnection management module 506 performs various tasks upondetecting that a previously assigned channel has been lost by one ormore participants of a communication session (e.g., because the channelhas been “taken over” by a privileged entity, or for some other reason).Section B (below) provides a detailed description of the illustrativeoperation of the channel assignment module 502 (with reference to FIGS.9-11), the channel discovery module 504 (with reference to FIGS. 13 and14), and the disconnection management module 506 (with reference toFIGS. 15 and 16). The “ . . . ” notation in FIG. 5 indicates that thecommunication management module 506 may encompass additional components,not illustrated in this drawing.

Returning to FIG. 4, an interface module 412 is used to interactivelycouple any type of processing functionality 414 with the othercomponents of the communication device 400. For example, the interfacemodule 412 may represent, in part, driver functionality used to sendinformation to the wireless interaction module 402 and to receiveinformation from the wireless interaction module 402. The processingfunctionality 414 may represent, for instance, any type of applicationmodule (not shown) provided by a computing device or the like. Forexample, the processing functionality 414 may represent a web browserprogram provided by a laptop computer device that sends data to, andreceives data from, the wireless interaction module 402.

Advancing to FIG. 6, this figure shows a high-level view of processingthat can be performed by the communication device 400 based on thesignal received from the scanning module 404. A time-to-frequencyconversion module 602 converts the signal from a time domainrepresentation to a frequency domain representation, e.g., using a FastFourier Transform (FFT) technique or the like. The communication device400 includes frequency domain (FD) functionality 604 for performinganalysis on the signal in the frequency domain, as well as time domain(TD) functionality 606 for performing analysis on the signal in theoriginal time domain. For example, the incumbent detection module 408can use the FD functionality 604 for performing analysis in thefrequency domain. The channel discovery module 504 and the disconnectionmanagement module 506 can use the TD functionality 606 for performinganalysis in the time domain (as will be described later). The use of theTD functionality 606 for performing analysis in the time domain is, insome respects, more efficient than the FD functionality 604, e.g.,because the TD functionality 606 does not require conversion of thesignal into the frequency domain and analysis of the signal in thefrequency domain.

Consider, for example, the use of the TD functionality 606 by thechannel discovery module 504. In one possible strategy, the channeldiscovery module 504 can determine the width and center frequency of thechannel by investigating each possible permutation of width and centerfrequency until it discovers a channel. That is, the channel discoverymodule 504 can use the main communication module 406 to successivelytune to each possible center frequency and channel width and then“listen” on this candidate channel for the presence of beacon sent by anaccess point device or the like. This approach may be characterized as aone-to-one matching strategy, in which the channel discovery module 504identifies a hypothetical “location” of a channel and then advances to aparticular center frequency and channel width to determine whether thechannel is actually present at that location.

The approach described above may involve processing a potentially largenumber of permutations. In one example, there are a total of thirty 5MHz channels, twenty eight 10 MHz channels, and twenty six 20 MHzchannels. This defines a relatively large number of candidate channelsto investigate.

The channel discovery module 504 can apply a more efficient approach todetect a channel that is agnostic, at the outset, to the particularcharacteristics of the channel. In this approach, the channel discoverymodule 504 investigates the available spectrum by investigating spectrumunits in successive fashion according to some search strategy (discussedin further detail below). At any given time, the channel discoverymodule 504 receives a signal from the scanning module 404 representingsamples taken from a particular spectrum unit, e.g., a particular TVchannel. Assume that the channel discovery module 504 detects acharacteristic signal over this particular spectrum unit which revealsthe presence of a channel. At this juncture, the channel discoverymodule 504 can draw the limited conclusion that the spectrum unit is atleast part of a channel. One possibility is that the detected channel isentirely contained within the spectrum unit. But the channel can have avariable width which is not known a priori. So another possibility isthat the channel extends over additional spectrum units.

In any case, through this process, the channel discovery module 504 hasat least detected the presence of a channel without having to “try out”different channel widths and center frequencies in the manner describedabove. In other words, the channel discovery module 504 can methodicallyadvance through the available spectrum on the basis of a single-widthinvestigation unit, such as an investigation unit that corresponds tothe size of an individual TV spectrum unit. And this entire analysis canbe performed in the time domain based on the signal provided by thescanning module 404.

After having detected the presence of the channel, the channel discoverymodule 504 can derive additional information regarding thecharacteristics of the detected channel. For example, the channeldiscovery module 504 can infer at least the width of the channel usingtime domain analysis. In this approach, the channel discovery module 504detects a telltale pattern (or patterns) in the signal received by thescanning module 404 over a particular spectrum unit. The channeldiscovery module 504 can then derive at least the channel width of thechannel based on the characteristics of the telltale pattern.

Consider, for example, the signal of FIG. 7. The scanning module 404provides raw samples of an RF signal, each sample associated with an (I,Q) pair. FIG. 7 shows a signal formed by plotting the amplitude of thesamples (√{square root over (I²+Q²)}) as a function of time. The signalincludes one or more characteristic patterns therein which correlatewith the width of the channel. For instance, in one merely illustrativecase, the signal may reveal the transmission of a data packet 702followed by the transmission of an acknowledgment message 704 having awidth 706. An interval 708 separates the end of the data packet 702 fromthe start of the acknowledgement message 704. In one case, the width 706of the acknowledgement message 704 and/or the width of the interval 708may be proportion to an overall width of the channel being used. Basedon this correlation, the channel discovery module 504 can infer thewidth of the channel by measuring the width 706 of the acknowledgmentmessage 704 and/or the width of the interval 708. Section B will provideadditional details regarding two search strategies that the channeldiscovery module 504 can use to discovery a channel using time domainanalysis. After detecting the characteristics of the channel in themanner described above, the channel discovery module 504 can tune to thechannel using the main communication module 406 and decode its beaconsignal.

The example presented above applies to merely one particularillustrative protocol. In other protocols, other features of the signalmay correlate to the characteristics (e.g., width and/or centerfrequency) of the channel. In general, note that the time domainanalysis is efficient because it allows the channel discovery module 504to determine the characteristics of the channel by investigating asingle spectrum unit subsumed by the channel, e.g., without having toprobe all possible permutations of channels.

The channel discovery module 504 can detect the characteristics of thesignal in the time domain using a sliding window 710. That is, thechannel discovery module 504 performs a moving average of the samplesencompassed by the sliding window 710, and then performs detection basedon the result of the moving average. This operation helps ensure thatthe channel discovery module 504 accurately detects patterns within thesignal—that is, by not being influenced by errant signal events of shortduration. The channel discovery module 504 can set the width of thesliding window 710 to be smaller than the width of the interval 708 andthe width 706 of the acknowledgment message 704. This width allows themoving average to accurately detect the end of the data packet 702, thestart of the acknowledgment message 704, the end of the acknowledgmentmessage 704, etc. For example, the channel discovery module 504 candetect the end of a packet when the moving average drops below aprescribed threshold. The channel discovery module 504 can detect thestart of a packet when the moving average rises about a prescribedthreshold.

Consider next the use of the TD functionality 606 by the disconnectionmanagement module 506. The disconnection management module 506 canexamine the signal generated by the scanning module 404 to determine atelltale signal associated with notification information, such as achirp-type signal or the like. The chirp-type signal is sent by anothercommunication device to notify the communication device 400 that it haslost its channel (e.g., because a privileged entity has “taken over” thechannel). In one implementation, the telltale signal associated with thenotification information can also encode the identity of thecommunication device which sent it. For example, the length of thetelltale signal can be used to encode the identity of the sender. Bydetecting the identity of the sender, the disconnection managementmodule 506 can determine, in the time domain, whether it has a priorcommunication relationship with the sender. If there is no communicativerelationship, the disconnection management module 506 need not spendfurther time analyzing the signal.

The communication device 400 can make yet further use of the timeanalysis performed by the TD functionality 606. The examples set forthabove are representative, non-exhaustive, and non-limiting.

Advancing to FIG. 8, this figure shows one illustrative implementationof the main communication module 406, as introduced in FIG. 4. The maincommunication module 406 transmits and receives data packets andnon-data messages over a channel defined by a width W and a centerfrequency F. The main communication module 406 includes communicationfunctionality 802 and a frequency translation module 804.

The communication functionality 802 formats information to be sent bythe main communication module 406 and interprets information received bythe main communication module 406. In one case, the communicationfunctionality 802 operates in a frequency domain that may not coincidewith the frequency domain of signals sent (and received) over the air.To accommodate this scenario, the main communication module 406 caninclude the frequency translation module 804. On a transmission path,the frequency translation module 804 either upconverts or downconvertsthe signals received by the communication functionality 802 to anappropriate frequency for transmission over the air. On a receptionpath, the frequency translation module 804 either upconverts ordownconverts the signals received over the air to match the appropriatefrequency expectations of the communication functionality 802.

The main communication module 406 also tunes to a particular channeldefined by a particular channel width W and center frequency F. The maincommunication module 406 can perform this operation by adjusting one ormore reference clocks and one or more associated phase locked loops(PLLs), etc. Changes in the channel width may affect various othercharacteristics of the operation of the main communication module 406.Hence, the main communication module 406 can also select appropriateparameter values as a function of the channel width, e.g., by a loadingan appropriate parameter table or the like as a function of a selectedchannel width. One representative technology for adjusting channelswidths is described in U.S. application Ser. No. 12/163,187, entitled“Adapting Channel Width for Improving the Performance of WirelessNetworks,” filed on Jun. 27, 2008, naming the inventors of ParamvirBahl, Ranveer Chandra, Ratul Mahajan, Thomas Moscibroda, and RamyaRaghavendra.

In one particular representative implementation, aspects of the maincommunication module 406 can build upon pre-established functionalityused for Wi-Fi functionality, operative in the ISM bands. In this case,the frequency translation module 804 can convert between signalsappropriate to Wi-Fi communication to signals appropriate to TV spectrumcommunication. In another implementation, the main communication module406 can provide appropriate functionality that is originally designed tooperate in the TV spectrum (or other target spectrum) without adaptingWi-Fi functionality or other existing communication functionality.

B. Illustrative Processes

FIGS. 9-16 show procedures that explain the operation of the environment100 and the communication device 400 in flowchart form. Certainprinciples underlying the operation of the environment 100 andcommunication device 400 have already been described in Section A; assuch, certain operations will be addressed in summary fashion in thissection.

B.1. Channel Assignment

Starting with FIG. 9, this figure shows a procedure 900 for use by thechannel assignment module 502 in selecting a channel from a collectionof candidate channels within the available spectrum. This procedure 900can be performed by any first node which is communication with a secondnode. However, to simplify and facilitate discussion, the procedure 900is explained in the context of an access point device (such asnon-privileged entity Z 116 of FIG. 1) which assumes the role of amaster with respect to other communication devices with which itcommunicates.

To begin with, arrow 902 indicates that the access point device caninitiate the procedure 900 in response to various triggering events. Oneevent corresponds to the loss of an existing channel. A channel may belost due to the appearance of a privileged entity that begins operatingon that channel. In one case, the access point device may directlydetect the loss of the channel. In another case, another communicationdevice detects the loss of the channel and sends notificationinformation to the access point device to alert it of the loss of thechannel.

Another event corresponds to the deterioration of the channel, e.g., dueto an increase of traffic on that channel, etc. This event may notequate to the outright loss of the channel; rather, it indicates thatthe channel has become undesirable relative to other channels (whichhave potentially better quality). In one implementation, the accesspoint device can periodically examine the quality of its selectedchannel relative to other available channels, and initiate a switch ifanother channel has better performance.

Another event corresponds to the start up of the access point device.Still other events may trigger the initiation of the procedure 900.

In a first general phase 904 of operation, the access point deviceperforms availability analysis. The access point device performsavailability analysis to determine what portions of the spectrum that itis entitled to use. In one case, the access point device performsavailability analysis to determine those portions of the spectrum thatare not currently being used by privileged entities.

In a second general phase 906 of operation, the access point deviceperforms suitability analysis to select an available channel from agroup of candidate channels within the available spectrum (where theavailable spectrum has been defined by the availability analysisperformed in the general phase 904). The access point device performsthe suitability analysis by examining the suitability of the candidatechannels and selecting the channel deemed most desirable.

Now examining each operation in turn within the procedure 900, in block908, the access point device generates local availability information.The local availability information indicates the portions of thespectrum which are available to the access point device (that is, fromthe “perspective” of the access point device). The access point devicecan perform this operation by using the scanning module 404 andincumbent detection module 408 to detect the presence of privilegedentities within the spectrum. The portions of the spectrum which are notoccupied by privileged entities define local availability informationfrom the perspective of the access point device. The access point devicecan also determine its spectrum map using any alternative mechanismdiscussed above.

In block 910, the access point device receives availability informationfrom other communication devices (e.g., nodes) with which it has acommunication relationship. Each of these other communication devicescan form availability information in the manner described above, e.g.,using its own scanning module 404 and incumbent detection module 408, orthrough some alternative mechanism discussed above. Each of the othercommunication devices can forward its availability information to theaccess point device in any manner, e.g., as a message in a main channel,a message in a backup channel, etc. However, when the access pointdevice first starts up, it may not have any established relation withother communication devices. In this case, the access point device canselect a channel without obtaining availability information from othercommunication devices.

In block 912, the access point device identifies spectrum that isavailable to all participants of a communication session. It performsthis operation by taking the logical intersection of the availabilityinformation obtained in blocks 908 and 910. For example, the localavailability information for each communication device can be expressedas a spectrum map, which, in turn, may take the form of a vector of 1'sand 0's. A value of 0 may indicate that a spectrum unit is not availableand a value of 1 may indicate that it is available. The access point canform a logical intersection of these spectrum maps to generate a finalspectrum map which indicates the spectrum units which are available toall communication participants.

In block 914, the access point commences the suitability phase of itsoperation by computing a suitability assessment for each candidatechannel within the available spectrum (determined in the availabilityanalysis phase).

In block 916, the access point selects a channel on which to conductcommunication. In one case, the access point selects a channel having asuitability assessment deemed to be most desirable.

FIG. 10 shows a procedure 1000 which explains, in one illustrative andnon-limiting case, how the channel assignment module 502 can generate asuitability assessment for each candidate channel.

In block 1002, the channel assignment module 502 can identify acandidate channel to investigate. Recall, based on the discussion ofFIG. 3, that a channel can have any width and can span any number ofunderlying spectrum units (e.g., TV channels).

In block 1004, assume that the candidate channel under analysis spanstwo or more spectrum units (e.g., TV channels). In one case, the channelassignment module 502 proceeds by performing a suitability assessmentfor each individual spectrum unit. In one case, the channel assignmentmodule 502 can compute the suitability assessment for a particularspectrum unit as:

$\begin{matrix}{{\rho_{n}(c)} = {{\max\left( {{1 - A_{c}^{n}},\frac{1}{B_{c}^{n} + 1}} \right)}.}} & (1)\end{matrix}$

Here, ρ_(n)(c) represents the suitability assessment of spectrum unit cfrom the perspective of a node n (e.g., the access point device). A_(c)^(n) is a measure of airtime utilization of spectrum unit c from theperspective of a node n. B_(c) ^(n) is a number of other nodes orentities (e.g., other access point devices) competing with node n withrespect to spectrum unit c. That is, this defines how many otherentities that node n must contend with. Equation (1) indicates that thesuitability assessment ρ_(n)(c) for a particular spectrum unit is formedby taking the maximum of a first value (based on A_(c) ^(n)) and asecond value (based on B_(c) ^(n)).

Less formally stated, ρ_(n)(c) represents an expected share of spectrumunit c that node n will receive if the spectrum unit c is containedwithin a channel defined by center frequency F and width W. Equation (1)indicates that, at any instant in time, the probability that a node nwill be able to transmit on the spectrum unit c is at least the residualairtime 1−A_(c) ^(n). However, on each spectrum unit, a node n can alsoexpect to get its “fair share” of the airtime when contending with otheraccess point devices (as reflected by the value 1/(B_(c) ^(n)+1)). Thechannel assignment module 502 can take the maximum of these two valuesas an estimate of the probability that a node n will be able to use thespectrum unit c on each transmission opportunity.

The channel assignment module 502 can generate the airtime utilizationmeasure A_(c) ^(n) by sampling the utilization of spectrum unit c usingits scanning module 404. The channel assignment module 502 can defineutilization based on any criterion or plural criteria. For example, thechannel assignment module 502 can assess utilization based on the amountof information being transmitted over the spectrum unit in a given timeinterval. Alternatively, or in addition, the channel assignment module502 can assess utilization based on the amount of time that a particularcommunication device is granted access to the spectrum unit, and so on.The channel assignment module 502 can provide an indication of thenumber of other nodes B_(c) ^(n) that are using the spectrum unit bydetecting signals being transmitted over the spectrum unit by respectiveaccess point devices. The channel assignment module 502 can performaspects of these measurements using the time domain analysis approachdescribed above in Section A.

The channel assignment module 502 performs the above analysis for eachspectrum unit c associated with a channel under investigation.

In block 1006, the channel assignment module 502 next forms asuitability assessment for the overall channel by combining thesuitability assessments of its constituent spectrum units. In oneapproach, the channel assignment module 502 can generate the suitabilityassessment for a channel as:

$\begin{matrix}{{{MCham}_{n}\left( {F,W} \right)} = {\frac{W}{SF}{\prod\limits_{c \in {({F,W})}}\;{{\rho_{n}(c)}.}}}} & (2)\end{matrix}$

Here, MCham_(n)(F, W) is the suitability assessment for the candidatechannel as a whole from the perspective of node n. The candidate channelhas center frequency F and width W. SF is a scaling factor, e.g., in onecase 5 MHz.

Less formally stated, since ρ_(n)(C) represents the expected share of aTV spectrum unit c, the product of these shares across each TV spectrumin the channel (F, W) gives the expected share for the entire channel.This value is scaled by the optimal capacity of the probed channel,e.g., W=5 MHz in one case. That is, the approach uses a 5 MHz channel asa reference point because it fits into one single TV spectrum unit. Ingeneral, the MCham_(n)(F, W) suitability assessment for any candidatechannel is related to the current demands placed on the channel,ultimately reflecting the A_(c) ^(n) and B_(c) ^(n) measurementsassociated with its constituent spectrum units.

Consider two examples. In one case, assume that there is no backgroundinterference or other access point devices occupying any portion of thechannel (F, W). Here, Mcham_(n)(F, W) reduces to the optimal channelcapacity. That is, MCham_(n)(F, W)=1 for W=5 MHz, 2 for W=10 MHz, and 4for W=20 MHz.

In another example, consider a channel defined by (F, W=20 MHz). Out ofthe 5 TV spectrum units that are spanned by the channel, assume thatthree have no background interference, one has one competing accesspoint device and airtime utilization of 0.9, and one has one competingaccess point device with airtime utilization 0.2. MCham_(n)(F, 20MHz)=4·0.5·0.8=1.6. That is, the suitability assessment predicts athroughput on this channel that is equivalent to roughly 1.6 times anempty 5 MHz channel.

After computing the MCham_(n)(F, W) suitability assessment for allcandidate channels, the channel assignment module 502 can select thechannel having the most desirable (e.g., best) suitability assessment.

FIG. 11 shows a procedure 1100 for conveying a channel selection toother communication participants and evaluating the performance of thechannel selection.

In block 1102, the access point device communicates its channelselection to other communication devices with which it has acommunicative relationship. The access point device can convey thechannel selection using a beacon signal or other type of message. Thecommunication devices can receive the channel selection on a backupchannel, or using a discovery procedure (described below), etc. Uponreceipt of the channel selection, the communication devices can use thechannel when interacting with the access point device.

In block 1104, the access point device can evaluate the performance ofthe selected channel. The access point device can perform thisevaluation in different ways. In one case, the channel assessment module502 of the access point device can periodically scan other availablechannels and compute the above-described Mcham_(n)(F, W) suitabilityassessment for these other channels. The access point device can thencompare the suitability assessment associated with the other channelswith the channel that has been selected and is being used.

In one case, the access point device can determine the MCham_(n)(F, W)suitability assessment for the selected channel based solely on its ownmeasurements. In other words, the access point device can compute theMCham_(n)(F, W) suitability assessment based on measurements made fromthe “perspective” of the access point device itself. In another case,the access point device can generate the MCham_(n)(F, W) suitabilityassessment for the selected channel by taking into considerationmeasurements made by other communication devices.

For example, assume that, with reference to FIG. 1, non-privilegedentity Z 116 is an access point device which communicates withnon-privileged entity W 110 and non-privileged entity X 112 over achannel θ that has been selected as per the procedures of FIGS. 9 and10. The non-privileged entity Z 116 can compute the efficiency of theselected channel θ based solely on its own computation of a MCham_(n)(F,W) suitability assessment for the selected channel θ, in relation toMCham_(n)(F, W) suitability assessments for other available channels.Alternatively, the non-privileged entity Z can also receive anMCham_(n)(F, W) suitability assessment generated by non-privilegedentity W 110 for the selected channel θ and an MCham_(n)(F, W)suitability assessment generated by non-privileged entity X 112 for theselected channel θ. The non-privileged entity Z can then compute thefinal MCham_(n)(F, W) suitability assessment for the selected channel θby averaging the three suitability assessments provided bynon-privileged entities Z 116, W 110, and X 112.

In another case, the access point device can perform the averagingprocedure with respect to a plurality of available channels, includingthe selected channel. In this approach, each communication participantcan compute the MCham_(n)(F, W) suitability assessment for eachcandidate channel and transmit a set of MCham_(n)(F, W) suitabilityassessments to the access point device. The access point device can thengenerate an average suitability assessment for each available channeland select the most appropriate channel based on average suitabilityassessments. For that matter, the procedure shown in FIG. 10 (in whichan initial channel is selected) can also be modified to use theabove-described averaging procedure. That is, the access point devicecan take the suitability assessments generated by other communicationdevices into account when selecting an initial channel.

In yet another implementation, the other communication devices can sendtheir raw measurements (e.g., their A_(c) ^(n) and B_(c) ^(n)measurements) to the access point device, and the access point devicecan compute the MCham_(n)(F, W) suitability assessments on behalf of theother communication devices (instead of requiring the othercommunication devices to generate the MCham_(n)(F, W) suitabilityassessments). Still other implementations are possible.

In block 1106, the access point device takes appropriate correctiveactions in response to the computations made in block 1104. For example,the access point device can decide to switch back to a previously-usedchannel (e.g., a channel in use before switching to a new channel). Thisis assuming that the previously-used channel was abandoned for qualityreasons, not because it was “taken over” by a privileged entity.

B.2. Time Domain Analysis

FIG. 12 is a procedure 1200 that provides an overview of time domainprocessing that can be performed by the TD functionality 606 of anycommunication device. In one case, the channel discovery module 504 usesthis analysis to detect a channel associated with an access pointdevice. In another case, the disconnection management module 506 usesthis analysis to detect notification information which alerts it to thefact that a communication device has lost is channel. Still otherapplications are possible.

In block 1202, a communication device investigates spectrum units in thetime domain for the occurrence of a characteristic signal. As explainedabove, one such characteristic signal may be indicative of the presenceof a communication channel that overlaps one of the spectrum units. Thecharacteristic signal may further include a characteristic pattern thatcorresponds to the duration of certain messages, or the interval betweendifferent events, and so on. Another such characteristic signalcorresponds to a signal that notifies the communication device of theloss of a channel, such as a chirping-type signal.

In block 1204, FIG. 12 addresses the case in which the characteristicsignal corresponds to the presence of a channel. In this case, thechannel discovery module 504 has successively detected the presence of achannel by examining an individual spectrum unit, even though theboundaries of the channel may not be defined by the spectrum unit itself(that is, for instance, the channel may extend over one or moreadditional spectrum units).

In block 1206, the communication device derives information based on thecharacteristic signal detected in block 1202. In one case, thecommunication device derives at least the width of the channel based onthe characteristic signal detected in block 1202. In another case, thecommunication device forms a conclusion that a communication participanthas lost its communication channel based on the characteristic patterndetected in block 1202.

In block 1208, the communication device governs some aspect ofcommunication based on the information that has been derived in block1204. For example, block 1206 may entail using a channel that has beendetected in block 1204 to conduct communication among devices. Or block1206 may entail invoking a procedure to establish another channel if ithas been detected that a previous channel has been lost.

B.3. Channel Discovery

FIG. 13 shows a procedure 1300 for discovering a channel using a linearsearch strategy. In one representative and non-limiting case, thisprocedure may be performed by a communication device that is attemptingto establish communication with an access point. In the case of FIG. 13(and in the case of FIG. 14), the channel discovery module 504 candetect the presence of a channel from the “vantage point” of anyindividual spectrum unit that is part of the channel. Thus, the channeldiscovery module 504 can detect the presence of the channel byperforming a scan of the available spectrum using a single-sizedinvestigation unit in the time domain, rather than having to investigatedifferent channel permutations using the one-to-one matching approachdescribed above (in Section A).

In block 1302, the channel discovery module 504 of a communicationdevice sets a spectrum unit index n to the integer value 1.

In block 1304, the channel discovery module 504 advances to the spectrumunit n in a linear sequence of spectrum units. At the outset, n=1, sothe channel discovery module 504 examines the first spectrum unit in thesequence of spectrum units.

In block 1306, the channel discovery module 504 determines whether thespectrum unit n includes a channel, e.g., by determining whether acharacteristic signal is detected over this spectrum unit. Assume atthis juncture, that a determination is made that the spectrum unit doesnot include the channel.

In block 1308, the channel discovery module 504 determines whether thespectrum unit n is the last spectrum unit available for analysis. If so,and if a channel has not been detected, then the procedure terminateswith the conclusion that no channel has been found. If the spectrum unitn is not the last spectrum unit, then, in block 1308, n is incrementedby 1 and the above-described procedure is repeated with respect to thenext spectrum unit n.

Assume that the channel discovery module 504 eventually discovers achannel being transmitted over at least part of a spectrum unit. If so,in block 1310, the channel discovery module 504 examines acharacteristic pattern (or patterns) associated with the characteristicsignal obtained from the spectrum unit. Namely, the channel discoverymodule 504 computes the width W of the channel based on thecharacteristic pattern. The width of the channel can be generated in themanner described above, e.g., by deriving the width from the length ofan interval between a data packet and an acknowledgement message and/orthe duration of the acknowledgment message itself.

Assume that the channel width W is detected based on analysis performedat a sampled frequency F_(s). In general, the center frequency F of thechannel occurs within an error bound ±E of F_(s), where E corresponds toW/2. In the linear search strategy, the channel discovery module 504progresses in orderly successive fashion from lower frequencies tohigher frequencies. Hence, the center frequency F of the channel isconclusively given as F_(s)+E. Hence, in the linear search strategy, thechannel discovery module 504 can compute both W and F from time domainanalysis without decoding the signal.

After detecting the characteristics of the channel in theabove-described manner, the channel discovery module 504 can tune to thechannel and decode its beacon signal.

In the linear mode of discovery, the expected number of iterations untila channel is discovered is N_(su)/2, where N_(su) is the number ofspectrum units to be scanned, e.g., the number of TV channels to bescanned. In the worst case, the number of iterations is N_(su).

FIG. 14 shows a procedure 1400 for discovering a channel using astaggered search strategy. Again, in one scenario, this procedure may beperformed by a communication device that is attempting to establishcommunication with an access point device. In this case, instead ofinvestigating each spectrum unit in linear succession, the channeldiscovery module 504 examines the spectrum units on awidth-class-by-width-class basis. That is, the channel discovery module504 operates by first investigating the spectrum for the presence of achannel that has the largest possible channel width. If a channel ofthis nature is not found, the channel discovery module 504 investigatesthe spectrum for the presence a channel having the next-largest channelwidth. This process continues until the remaining unexamined spectrumunits are investigated for the presence of a channel having the smallestpossible channel width. Each possible channel width defines a channelwidth class.

In block 1402, the channel discovery module 504 sets a channel widthindex to correspond to a maximum possible channel width, such as 20 MHz(in one merely illustrative example).

In block 1404, the channel discovery module 504 sets an index m to aninteger value of 1. The index m is used to sequence through a group ofspectrum units associated with a particular width class.

In block 1406, the channel discovery module 504 advances to spectrumunit m in the selected width class. This operation may involve skippingover one or more spectrum units. For example, assume that the widthclass corresponds to a width of 20 MHz. In this case, the channeldiscovery module 504 advances through the available spectrum by skippingover four spectrum units at a time. The channel discovery module 504does not investigate the spectrum units that it skips over until anotheriteration (that is, if that other iteration is eventually performed).

In block 1408, the channel discovery module 504 determines whether thespectrum unit that it has advanced to has already been investigated in aprior investigation (in a prior iteration). If so, then there is no needto investigate it again, and the procedure 1400 operates by skippingover this spectrum unit and advancing to the next spectrum unit in thewidth class.

In block 1410, presuming the spectrum unit has not yet been examined,the channel discovery module 504 determines whether the spectrum unitcontains a channel, e.g., by determining whether it contains acharacteristic signal associated with a channel. Assume, at thisjuncture, that the spectrum unit does not contain the channel.

In block 1412, the channel discovery module 504 determines whether thespectrum unit m is the last spectrum unit in the width class that iscurrently being examined, e.g., to begin with, the 20 MHz width class.If not, in block 1414, the channel discovery module 504 increases theindex m to m+1, upon which it repeats the above-described operation. Forexample, for the case of the 20 MHz channel class, if the channeldiscovery module 504 has just examined spectrum unit x, it next examinesspectrum unit x+5, because it skips over four spectrum units at eachiteration for this width class.

Alternatively, presume that, in block 1410, the channel discovery module504 determines that it has advanced to the last spectrum unit in a widthclass. If so, in block 1416, the channel discovery module 504 next askswhether the channel unit that it has reached is the overall lastspectrum unit to be examined. If so, then the channel discovery module504 terminates the procedure 1400, reaching the conclusion that achannel has not been found.

Alternatively, if the spectrum unit is not the overall last spectrumunit, then, in block 1418, the channel discovery module 504 decrementsthe class width index by 1. This prompts the channel discovery module504 to repeat the above-described procedure for the next smallestchannel width, such as 10 MHz. In the case of 10 MHz, the channeldiscovery module 504 sequences through the spectrum units by skippingover two spectrum units at a time. As stated above, if the channeldiscovery module 504 determines that it has already examined a spectrumunit in a prior iteration (e.g., for a prior class width), there is noneed to reexamine it again. The channel discovery module 504 moves on tothe next spectrum unit for that class width.

The above procedure advances by scanning through the spectrum units insuccession, on a width-class-by-width-class basis. If a channel is notdiscovered, the channel discovery module 504 eventually reaches thesmallest possible channel width, e.g., 5 MHz in one example.

Block 1420 is eventually invoked when the channel discovery module 504eventually detects a channel that overlaps one of the spectrum units.The channel discovery module 504 can then infer the channel width basedon time domain analysis of the characteristic pattern (or patterns) ofthe detected characteristic signal, as described above with respect toFIG. 7.

However, in the case of the staggered search strategy, the channeldiscovery module 504 has moved through the spectrum units in a staggeredfashion, rather than a linear fashion as in the case of FIG. 13. Thismeans that the channel discovery module 504 cannot conclusivelydetermine the center frequency of the channel in the manner describedabove with respect to the linear mode of operation. Instead, the channeldiscovery module 504 can examine the spectrum in the vicinity of thedetected channel to decode the beacon being transmitted over thechannel. From this information, the channel discovery module 504 obtainsthe center frequency of the channel and other appropriate information.In other words, the channel discovery module 504 can narrow down thepresence of the channel within a small range. The channel discoverymodule 504 can successively advance through different center frequencieswithin this range to discover the actual center frequency of thechannel.

The expected discovery time of the staggered version of the discoveryprocedure can be shown to be (1/N_(W))(N_(su)+2^(N) ^(W)⁻¹+(N_(W)−1)/2). The expected number of iterations is (N_(su)+4+1)/4.Here, N_(su) is the number of spectrum units to scan, and N_(W) is thenumber of width class options to process (e.g., N_(W)=3 in the exampleshown in FIG. 3). Both algorithms have a worst-case discovery time ofN_(W).

B.4. Disconnection Management

Advancing to FIG. 15, this figure shows a procedure 1500 performed bythe disconnection management module 506 to convey the loss of a channel.For example, a communication device may use this procedure 1500 to alertits access point device that it has lost it channel. One reason acommunication device may lose its channel is because it is suddenlydiscovered that a privileged entity is transmitting using the channel(on any spectrum unit that overlaps the channel). This may be due to thefact that the privileged entity has just started transmitting. Or theprivileged entity may have just moved into the vicinity of thecommunication device, and so on. In any case, the privileged entity“takes over” the channel.

In block 1502, the communication device detects that a privileged entityis now transmitting on the channel that the communication device isusing to communicate with other communication participants. Thecommunication device can make this determination using its scanningmodule 404 in conjunction with the incumbent detection module 408, orusing some other mechanism. The communication device can discriminate atransmission that originates from a privileged entity from othercommunication based on a telltale signature associated with thetransmission.

In block 1504, the communication device immediately disconnects from thechannel it is using upon detecting a privileged entity.

In block 1506, the communication module sends notification informationto its other communication participants, such as its access pointdevice, to alert those devices of the loss of the channel. In one case,the communication module can use the main channel to send this messageto the other participants, e.g., immediately before it abandons thismain channel. In another case, the communication module can use a backupchannel to send this message to the other participants. The access pointdevice can, in advance, inform the communication device of the existenceof this channel as part of its beacon message, or as part of anothermessage. There is a risk that the backup channel is itself “taken over”by a privileged device and is therefore unavailable for use. In thiscase, the communication device can transmit the notification messageover any other alternative channel.

In one case, the communication device can transmit the notificationinformation using a chirping-type signal that the recipient device canreadily interpret as a message which indicates loss of a channel. In onecase, the notification information can also encode the identity of thecommunication device which is sending the notification information. Forexample, the communication device can encode the identity of the senderby modulating the length of the signal used to transmit the notificationinformation.

FIG. 16 describes a procedure 1600 for detecting notificationinformation sent by another communication device, and for taking actionbased on the notification information. For example, although not solimited, an access point device can perform the procedure 1600 uponreceiving notification information from one of its communicationdevices.

In block 1602, the access point device detects notification informationfrom a communication device. In one case, the access point deviceperforms this operation by periodically scanning its backup channel, andalso alternative channels. It can perform this task using the scanningmodule 404 in conjunction with the type of time domain analysisdescribed above. In this manner, the detection operation does not undulyinterfere with other communication tasks performed by the access pointdevice. Once the access point device detects the notificationinformation (e.g., a chirping-type signal), it can tune the maincommunication module 406 to the backup channel and decode the contentsof the chirp signal.

In block 1604, the access point device invokes the channel assignmentprocedure described above to assign another channel for use inconducting communication with its communication devices. The othercommunication devices can communicate their spectrum maps and the liketo the access point device via the backup channel.

In block 1606, the access point device can convey the new channelselection to its communication devices, e.g., within a beacon signaltransmitted by the access point device or using some other messagetransmitted by the access point device.

C. Representative Processing Functionality

FIG. 17 sets forth illustrative electrical processing functionality 1700that can be used to implement any aspect of the functions describedabove. With reference to FIG. 4, for instance, the type of processingfunctionality 1700 shown in FIG. 17 can be used to implement any aspectof the communication device 400. In one case, the processingfunctionality 1700 may correspond to any type of computing device thatincludes one or more processing devices.

The processing functionality 1700 can include volatile and non-volatilememory, such as RAM 1702 and ROM 1704, as well as one or more processingdevices 1706. The processing functionality 1700 also optionally includesvarious media devices 1708, such as a hard disk module, an optical diskmodule, and so forth. The processing functionality 1700 can performvarious operations identified above when the processing device(s) 1706executes instructions that are maintained by memory (e.g., RAM 1702, ROM1704, or elsewhere). More generally, instructions and other informationcan be stored on any computer readable medium 1710, including, but notlimited to, static memory storage devices, magnetic storage devices,optical storage devices, and so on. The term computer readable mediumalso encompasses plural storage devices. The term computer readablemedium also encompasses signals transmitted from a first location to asecond location, e.g., via wire, cable, wireless transmission, etc.

The processing functionality 1700 also includes an input/output module1712 for receiving various inputs from a user (via input modules 1714),and for providing various outputs to the user (via output modules). Oneparticular output mechanism may include a presentation module 1716 andan associated graphical user interface (GUI) 1718. The processingfunctionality 1700 can also include one or more network interfaces 1720for exchanging data with other devices via one or more communicationconduits 1722. One or more communication buses 1724 communicativelycouple the above-described components together.

Although the functionality has been described in the illustrativecontext of any environment that is shared between privileged andnon-privileged entities, aspects of the functionality can also beapplied in other environments that do not have this characteristic.

More generally, although the subject matter has been described inlanguage specific to structural features and/or methodological acts, itis to be understood that the subject matter defined in the appendedclaims is not necessarily limited to the specific features or actsdescribed above. Rather, the specific features and acts described aboveare disclosed as example forms of implementing the claims.

1. A computer-readable medium not consisting of a signal per se andhaving stored thereon computer-executable instructions that, whenexecuted, cause the performance of a disconnection management,comprising: detecting a presence of a privileged entity operating on achannel that is being used by a first node to communicate with a secondnode, the first node and the second node being associated withnon-privileged entities, the non-privileged entities having subordinateaccess rights compared to the privileged entity; disconnecting the firstnode from the channel; and sending notification information to a secondnode that indicates that the first node has disconnected from thechannel.
 2. The medium of claim 1, wherein, in the sending notificationinformation, the notification information is sent to the second node viaa backup channel.
 3. The medium of claim 1, wherein, in the sendingnotification information, the notification information is sent to thesecond node via an alternative channel when a backup channel is notavailable.
 4. The medium of claim 1, further comprising detectingnotification information sent by the second node to the first node, thenotification information sent by the second node indicating that thesecond node has detected loss of the channel.
 5. The medium of claim 4,wherein, in the detecting notification information, a time domainanalysis is used to detect the notification information sent by thesecond node.
 6. A disconnection management method, comprising: detectinga presence of a privileged entity operating on a channel that is beingused by a first node to communicate with a second node, the first nodeand the second node being associated with non-privileged entities, thenon-privileged entities having subordinate access rights compared to theprivileged entity; disconnecting the first node from the channel; andsending notification information to a second node that indicates thatthe first node has disconnected from the channel.
 7. The method of claim6, wherein, in the sending notification information, the notificationinformation is sent to the second node via a backup channel.
 8. Themethod of claim 6, wherein, in the sending notification information, thenotification information is sent to the second node via an alternativechannel when a backup channel is not available.
 9. The method of claim6, further comprising detecting notification information sent by thesecond node to the first node, the notification information sent by thesecond node indicating that the second node has detected loss of thechannel.
 10. The method of claim 9, wherein, in the detectingnotification information, a time domain analysis is used to detect thenotification information sent by the second node.
 11. A disconnectionmanagement device, comprising: a detecting section that detects apresence of a privileged entity operating on a channel that is beingused by a first node to communicate with a second node, the first nodeand the second node being associated with non-privileged entities, thenon-privileged entities having subordinate access rights compared to theprivileged entity; a disconnecting section that disconnects the firstnode from the channel; and a sending section that sends notificationinformation to a second node that indicates that the first node hasdisconnected from the channel.
 12. The device of claim 11, wherein thesending section sends the notification information to the second nodevia a backup channel.
 13. The device of claim 11, wherein the sendingsection sends the notification information to the second node via analternative channel when a backup channel is not available.
 14. Thedevice of claim 11, further comprising a notification informationdetecting section that detects notification information sent by thesecond node to the first node, the notification information sent by thesecond node indicating that the second node has detected loss of thechannel.
 15. The device of claim 14, wherein the notificationinformation detecting section uses a time domain analysis to detect thenotification information sent by the second node.