November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.

Similar documents
IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract

Tools for Evaluating Bluetooth Coexistence with Other 2.4GHz ISM Devices

Impact of Bluetooth on Direct Sequence Wireless LANs

Delivering Voice over IEEE WLAN Networks

Experimental Study on Co-existence of b with Alien Devices

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless LANs. ITS 413 Internet Technologies and Applications

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Wireless MACs: MACAW/802.11

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

WLAN and WPAN Coexistence in UL Band

Wireless Communications

Mohamed Khedr.

May 1998 doc.: IEEE /196 IEEE P Wireless LANs Advantages of Code Channelization (Ver.2) Abstract

Lesson 2-3: The IEEE x MAC Layer

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Wireless Protocols. Training materials for wireless trainers

Local Area Networks NETW 901

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

IEEE MAC Sublayer (Based on IEEE )

Investigation of WLAN

By N.Golmie Presented by: Sushanth Divvela

Hands-On Exercises: IEEE Standard

Department of Electrical and Computer Systems Engineering

Wireless and Mobile Networks

3.1. Introduction to WLAN IEEE

Computer Networks. Wireless LANs

Sample solution to Midterm

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets

Mobile Communications Chapter 7: Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs

Mobile & Wireless Networking. Lecture 7: Wireless LAN

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Impact of IEEE n Operation on IEEE Operation

Lecture 16: QoS and "

Wireless Local Area Networks (WLANs) Part I

Interference of Bluetooth and IEEE : Simulation Modeling and Performance Evaluation

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time

IEEE Technical Tutorial. Introduction. IEEE Architecture

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <

Mohammad Hossein Manshaei 1393

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

Wireless LAN -Architecture

Guide to Wireless Communications, Third Edition. Objectives

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Link Layer II: MACA and MACAW

Announcements : Wireless Networks Lecture 11: * Outline. Power Management. Page 1

Multiple Access in Cellular and Systems

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Multiple Access Protocols

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

IEEE Ad Hoc Networks: Performance Measurements

A cluster based interference mitigation scheme for performance enhancement in IEEE

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks

An Efficient Scheduling Scheme for High Speed IEEE WLANs

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

Transmission Control Protocol over Wireless LAN

WIRELESS TECHNOLOGIES

COEXISTENCE MODEL OF ZIGBEE& IEEE b (WLAN) IN UBIQUITOUS NETWORK ENVIRONMENT

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea

MSIT 413: Wireless Technologies Week 8

Wireless Communication and Networking CMPT 371

Radio Networks. Riccardo Cavallari. Radio Networks Office: 3 rd floor, Main Building

An Efficient Tool for the Evaluation of the Impact of WiFi Interference on Bluetooth Performance

Mobile Communications Chapter 7: Wireless LANs

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.

Medium Access Control Sublayer

Interactions Between the Physical Layer and Upper Layers in Wireless Networks: The devil is in the details

IEEE Wireless Access Method and Physical Specification

Wireless# Guide to Wireless Communications. Objectives

Vehicle Networks. Wireless Local Area Network (WLAN) Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION

Wireless Networking & Mobile Computing

Mobile Communications Chapter 7: Wireless LANs

WiFi / IEEE WLAN

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

MAC Essentials for Wireless Sensor Networks

An energy-efficient MAC protocol for infrastructure WLAN based on modified PCF/ DCF access schemes using a bidirectional data packet exchange

Chapter 6 Medium Access Control Protocols and Local Area Networks

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

A Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel

Amarjeet Singh. February 7, 2012

Nomadic Communications WLAN MAC Fundamentals

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Advanced Computer Networks WLAN

Qos support and adaptive video

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

ZIGBEE& IEEE b (WLAN) COEXISTENCE IN UBIQUITOUS NETWORK ENVIRONMENT

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

CS698T Wireless Networks: Principles and Practice

Transcription:

IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax: (407)724-7886 e-mail: jzyren@harris.com Abstract A basic model of the effects of interference generated by a Bluetooth piconet co-located with a high speed DSSS IEEE 802.11 wireless node was described in an earlier paper entitled Impact of Bluetooth on 802.11 Direct Sequence (Doc: IEEE P802.11-98/319). Basic assumptions used in the original paper are discussed and refinements are suggested. Results using the modified model are presented. The impact of 802.11 Direct Sequence on Bluetooth is not considered in this paper. 1.0 Introduction The effects of interference between the various wireless standards and specifications now proliferating in the 2.4 GHz band is matter of growing interest. An earlier paper, Impact of Bluetooth on 802.11 Direct Sequence [1] has already described a basic model for estimating the interference between a Bluetooth (BT) piconet and a co-located IEEE 802.11 Direct Sequence (DS) station. The DS station (STA) is some arbitrary distance from the DS Access Point (AP). Results were presented showing the degradation in 802.11 network throughput as a function of piconet utilization and of packet fragment size. The basic model rested on the assumption that due to the close physical proximity of the BT piconet and the DS node, that any overlap in frequency and time between BT traffic and a downstream (AP-to-STA) DS packet resulted in a DS packet error. Upstream DS traffic (STA-to-AP) is largely unaffected because the BT piconet would not be in close proximity to the AP. Interference from a co-channel BT burst would be approximately 20 db below the DS upstream signal at the AP receiver. This assumption is retained in the modified model. Model Feature P802.11-98/319 Proposed Modification Probability of co-channel 33% 25% interference Packet s long preamble & header (192 µsec) short preamble & header (96 µsec) BT Interference Profile same as dwell period (625 µsec) BT burst 366 µsec long, 625 µsec period Modified Inter Frame Spacing on dropped fragment ACKTimeout + DIFS + 7 slot times ACKTimeout + DIFS + 15 slot times Table 1-1 Proposed Modifications to Interference Model The basic model also included many simplifying assumptions, as summarized in Table 1-1. While the basic model remains intact, some of the underlying assumptions can be refined. A modified set of assumptions is Submission page 1 Jim Zyren, Harris Semiconductor

therefore also included in Table 1-1. These proposed modifications are described in detail in the following paragraphs and form the basis for this paper. 2.0 Mixed Bluetooth / 802.11 Topology The relative geometry of the BT and DS networks is shown in Figure 2.1. For the situation described, dominant traffic flow is downstream (AP-to-STA). Due to the topology under consideration, only downstream traffic will be affected by BT interference. For upstream traffic (ACK packets in this case), the STA has a 20 db advantage over the BT transmitter, assuming a 0 dbm BT Tx power. As will be described later, when the direction of dominant traffic flow is reversed, the impact of BT interference is significantly reduced. 802.11 Access Point ALL packets from station immune to Bluetooth collisions ALL packets from AP subject to Bluetooth collisions Bluetooth Nodes 802.11 Station 3.0 Modified Assumptions Figure 2.0-1 Relative Geometry of BT and DS Radios As described above, the basic model included several simplifying assumptions. The baseline assumptions can in some cases be refined. Suggestions for refinement are described in detail in the subsequent paragraphs of this section. 3.1 Probability of Co-Channel Interference Co-channel interference will occur when a BT transmitter hops into the occupied channel of a DS network. In order to determine the probability of this situation, the effective bandwidth of the DS system must be estimated. Figure 3.1-1 shows a measured plot of CW jammer suppression for the CCK waveform as a function of frequency offset from center frequency. For this discussion, the important feature of the plot is the jammer suppression at +/- 10 MHz from band center. Note that suppression is 10 db greater at +/- 8.5 MHz from center, relative to suppression near band center. At +/- 10 MHz suppression is about 15 db greater than at band center. Effective DS receiver bandwidth for estimating the effect of narrowband interference, such as a 1 MHz wide BT signal, is therefore taken to be 20 MHz. Submission page 2 Jim Zyren, Harris Semiconductor

-10-11 -12 Suppression (db) -13-14 -15-16 -17-18 -19-20 -10000-9000 -8000-7000 -6000-5000 -4000-3000 -2000-1000 0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000 Center Frequency Offset (khz) Figure 3.1-1 11 Mbps CCK CW Jammer Suppression The probability that a co-located BT piconet will hop to a frequency in the DS passband is therefore: P int = 20 MHz / 79 MHz ~ ¼ It is perhaps worthwhile to explain that the frequency response to narrowband interference shown in Figure 3.1-1 is due to the combination of the IF filter and the effects of the receiver correlation process. Consider the situation shown in Figure 3.1-2 where a jammer appears near the band edge. The IF filter has a 3 db bandwidth of 17 MHz. For a jammer located 11 MHz from center frequency, it provides perhaps 5 to 6 db of rejection. post-correlation bandwidth narrow band interference IF Filter Response fc - 11 MHz fc Figure 3.1-2 Narrowband Interference Located at Band Edge The rest of the rejection comes from the fact that the receiver combines the narrowband interference with the CCK code sequences. When correlated with the CCK code sequences, CW interference takes on a sin (x) / x distribution with a null-to-null bandwidth of 22 MHz. Note that for a jammer located 11 MHz from center frequency, the null falls directly into the post correlation bandwidth of the receiver as shown in Figure 3.1-3. Beyond 11 MHz, sidelobes of the interference PSD are much lower and the IF filter effect begins to dominate, thereby suppressing narrowband interference even further. Submission page 3 Jim Zyren, Harris Semiconductor

post-correlation bandwidth fc - 11 MHz fc Figure 3.1-3 First Null of Spread Interferor Falls in Post Correlation Bandwidth 3.1.1 Influence of Usage Scenario The validity of the above discussion is somewhat dependent on the BT usage scenario. More specifically, it depends on the actual range between the BT nodes and the desktop unit. For the scenario under consideration, the desktop is not associated with the BT piconet. It is therefore very unlikely that all nodes in the BT piconet would be located within 1 meter of the desktop. If the desktop were BT capable (to provide for local synchronization with a palm top computer for example), presumably it would assume the role of master in the piconet. In this instance, some positive means could be taken to prevent interference, such as preventing simultaneous use of both the DS and BT systems. If the BT nodes are, in fact, within 1 meter, it is more accurate to assume a 1/3 chance that the BT piconet will hop into the DS passband. With such limited range loss, interferors will have to be further away from center frequency before the receiver can provide adequate rejection. Use of a 1/3 probability of interference from the BT piconet on any given hop will marginally reduce DS throughput. Under conditions of heavy BT piconet utilization, use of a 1/3 probability of co-channel interference results in a reduction in throughput of about 16% relative to the results stated below. 3.2 Packet Headers Long packet headers were included in the basic model. However, high speed systems will be able to employ short preambles. For the purposes of this analysis, short preambles are assumed. The short preamble includes a 56 bit preamble and a 16 bit Start-of_Frame delimiter transmitted at 1 Mbps. In addition, the 48-bit PHY header is transmitted at 2 Mbps (for both 5.5 Mbps and 11 Mbps packets). Header duration is: t header = [72 bits @ 1 Mbps] + [ 48 bits @ 2 Mbps] = 96 µsec Packet header time is added to the time required to transmit the payload to determine total transmission time. Total transmission time is then used to determine the probability of collision. For a 1500 byte packet at 11 Mbps, the transmission time is therefore 1187 µsec. 3.3 BT interference Profile In the basic model, the probability of collision with a BT transmission was based on the number of BT dwell periods the DS packet overlapped in time, as shown in Figure 3.3-1. In the specific example described, a DS packet which is 3.2 BT dwell periods in duration will have 20% probability of overlapping five BT transmission bursts, and an 80% probability of overlapping four transmission bursts. Submission page 4 Jim Zyren, Harris Semiconductor

625 µsec 3.2 dwell periods Figure 3.3-1 BT Interference Profile in Baseline Model For single time slot packets, the BT transmission burst is 366 µsec out of the 625 µsec dwell period. If multi-slot packets are assumed, the effective hop rate is reduced. Given that the interference level is assumed to be high enough to cause a DS packet error, the single time slot packet represents the worst case situation. Therefore, the BT transmission profile shown in Figure 3.3-2 is used for the modified model. Based on the modified profile, a DS packet having a 3.2 BT dwell time duration will overlap 3 bursts with a 21% probability and 4 bursts with a 79% probability. Overall probability of collision is determined by a weighted average of these conditions and the fact that any given hop has a 25% probability of falling in band. 625 µsec 259 µsec = 134 µsec 3.2 dwell periods Figure 3.3-2 Modified Model of BT Interference Profile 3.4 Interframe Spacing on Dropped DS Packet In the event a fragment is lost during transmission, the DS network must re-contend for the channel. It will enter a random back-off algorithm after determining that it has not received an ACK from the receiving STA. Therefore, in addition to the loss of the packet, a collision results in an overhead penalty. The baseline model assumes that retransmission of the dropped fragment will occur one DIFS and 7 slot times after ACKTimeout. ACKTimeout is defined such that it represents the amount of time which would have been required to complete the ACK, thereby preventing the node transmitting the dropped packet from entering its random backoff algorithm before other stations contenting for the medium. The DS-PHY MIB indicates that the maximum number of slot times used on the first retransmission attempt (CWmin) is 31. The number of slot times used is a uniform random variable of interval (0, CWmin). The average number of slot times is 15. Therefore, in the modified model, it is assumed that retransmission of the dropped fragment will occur one DIFS and 15 slot times after ACKTimeout. Submission page 5 Jim Zyren, Harris Semiconductor

4.0 Results Results of analysis using the modified assumptions suggested in the previous section are shown below. Figure 4.01 shows Degradation Factor as a function of Fragment Size (bytes) for various levels of BT piconet utilization. Degradation Factor measures network throughput under stated conditions of BT utilization and fragment size relative to error free transmission of 1500 byte packets on a continuous basis. The reference throughput ( R ) is computed as follows: Error free throughput @ 5.5 Mbps: R 5.5 = payload / (DIFS + 15 slot times + header + payload + SIFS + header + ACK) = 12000 bits / 2754 µsec = 4.35 Mbps Error free throughput @ 11 Mbps: R 11 = 12000 bits / 1653 µsec = 7.25 Mbps Submission page 6 Jim Zyren, Harris Semiconductor

4.00 3.50 3.00 Degradation Factor 2.50 2.00 1.50 1.00 90% BT Util. 50% BT Util. 10% BT Util. 0% BT Util. 0.50 0.00 1500 750 500 375 300 250 150 100 75 Fragment Payload (bytes) Figure 4.0-1 Degradation Factor for Transmission of 1500 Byte Packets @ 5.5 Mbps 4.50 4.00 Throughput (Mbps) 3.50 3.00 2.50 2.00 1.50 1.00 0.50 0.00 1500 750 500 375 300 250 150 100 75 Fragment Size (bytes) 90% BT Util. 50% BT Util. 10% BT Util. 0% BT Util. Figure 4.0-2 Network Throughput (Mbps) for 1500 Byte Packets @ 5.5 Mbps The topology considered in this analysis is severe by any measure. Placing non-compatible radios in close proximity without taking positive measures to avoid interference is not generally advisable. However, by setting a fragmentation size of 750 bytes, DS system throughput can be maintained above 2 Mbps even when co-located with a heavily loaded BT piconet. A fragment size of 750 bytes also provides good system throughput when interference is not present (0% BT utilization) Submission page 7 Jim Zyren, Harris Semiconductor

6.00 5.00 Degradation Factor 4.00 3.00 2.00 90% BT Util. 50% BT Util. 10% BT Util. 0% BT Util. 1.00 0.00 1500 750 500 375 300 250 150 100 75 Fragment Size (bytes) Figure 4.0-3 Degradation Factor for 1500 Byte Packets @ 11 Mbps 8.00 7.00 Throughput (Mbps) 6.00 5.00 4.00 3.00 2.00 90% BT Util. 50% BT Util. 10% BT Util. 0% BT Util. 1.00 0.00 1500 750 500 375 300 250 150 100 75 Fragment Size (bytes) Figure 4.0-4 Network Throughput for 1500 Byte Packets @ 11 Mbps Based on the results shown in Figures 4.0-3 and 4.0-4, fragmentation does not deliver much benefit at 11 Mbps in the presence of a highly loaded BT piconet. However, even without the use of fragmentation, a throughput of 4 Mbps can be maintained. 4.1 Upstream Traffic It should be pointed out that the event that large files are to be uploaded, system throughput is virtually unaffected. The only packets subject to interference in this case are downstream ACK packets which are very short, and therefore have a very low probability of being jammed. System throughput for upstream traffic in the presence of varying BT utilization levels is summarized in Table 4.1-1 Submission page 8 Jim Zyren, Harris Semiconductor

BT Utilization Throughput @ 5.5 Mbps Throughput @ 11 Mbps 90% 3.6 Mbps 6.0 Mbps 50% 3.9 Mbps 6.6 Mbps 10% 4.3 Mbps 7.1 Mbps 0% 4.4 Mbps 7.2 Mbps Table 4.1-1 Network Throughput for Upstream Traffic The conclusion is that interference from a BT piconet is a localized effect. The range at which interference from a BT piconet begins to seriously affect the performance of a DS node depends on several factors: a. range of DS STA from AP b. prevailing direction of data flow (upstream / downstream) c. local propagation conditions d. DS data rate e. BT piconet utilization 5.0 Conclusions 1. These results are in general agreement with results generated in the original model. A Co-located BT piconet will have an adverse effect on the throughput of a DS receiver. However, in spite of including the effects of a longer interframe spacing on dropped fragments, network throughput is about 50% to 70% better than originally estimated. 2. Even when co-located with a heavily loaded BT piconet, the shorter packet sizes allowed by the 5.5 Mbps and 11 Mbps data rates will be able to more easily avoid BT jamming and maintain connectivity. Further, worst case throughput will still be greater than that of currently available 1 and 2 Mbps systems operating under error-free conditions. 3. The effects of interference generated from a BT piconet will be localized, extending up to a range of several meters, depending primarily on the range of the DS STA from its associated AP. If the DS STA is fairly close to the AP, the BT bubble of interference will only be two or three meters in radius. If the DS-STA is at the edge of the BSA, the radius of BT interference may be up to 10 meters. However, affected nodes will still be able to maintain reasonable throughput. 4. A fragmentation threshold of 750 bytes provides good throughput under heavily loaded conditions without incurring a severe throughput penalty when no interference is present. 5. The results stated in this paper assume that the BT nodes in question all have a maximum Tx power of 0 dbm. The interference presented by the BT devices is essentially the result of a near/far problem, in that all of the BT devices are much closer to the DS receiver than the AP. In the event that +20 dbm BT nodes are used for longer ranges, the BT piconet topology would be radically different. Specifically, the nodes BT nodes would not be clustered around the DS node as depicted in Figure 2.0-1. A +20 dbm BT node operating in close proximity to a DS receiver obviously presents a more significant interference problem. However, this is countered by the fact that the other active BT devices would be much further away. In order to analyze this scenario, some distributed BT topology must be postulated. Such an exercise is beyond the scope of this paper. 6. The effect of an active DS transmitter on a nearby BT piconet was not described in this paper. Such an analysis would require a detailed discussion of BT packet structures and forward error correction measures. This topic will not be suitable for open discussion until Version 1.0 of the BT Specification is publicly released. 7. References 1. Greg Ennis, Impact of Bluetooth on 802.11 Direct Sequence, Doc: IEEE P802.11-98/319 2. H. Hashemi, The Indoor Radio Propagation Channel, Proceedings of the IEEE, pp. 943-968, Vol. 81, No. 7, July 1993 Submission page 9 Jim Zyren, Harris Semiconductor

Submission page 10 Jim Zyren, Harris Semiconductor