Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Avoiding exposed node problems in wireless local area networks

A wireless local area network and hidden terminal technology, which is applied in the field of avoiding hidden terminals in wireless local area networks

Active Publication Date: 2012-07-04
AVAYA TECH LLC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The hidden terminal problem arises when a station cannot hear the transmitter but is within interference range of the receiver

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Avoiding exposed node problems in wireless local area networks
  • Avoiding exposed node problems in wireless local area networks
  • Avoiding exposed node problems in wireless local area networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] A wireless LAN network may use a common control protocol (CCC). The CCC protocol is a MAC protocol that extends the IEEE802.11 distributed MAC protocol so that multiple channels can be used in a BSS or mesh network. The CCC protocol defines a flexible channel access structure based on distributed priority contention-based media access. The CCC protocol distinguishes two logical channel functions: Control Channel (CC) and Data Channel (DC). In the following description, a station or network point observing the CCC MAC protocol is called a "node". Nodes exchange control and management frames on the control channel. The data channel carries data services.

[0028] Reservations for transmission on the various data channels are made by exchanging control frames on the control channels. As an extension of the traditional RTS and CTS messages, CC-RTS and CC-CTS are used to reserve the data channel for the time taken to transmit a transmission opportunity (TXOP). As specifie...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method, apparatus and computer program product for preventing occurrences of the hidden node problem are presented. A transmission request (CC-RTS) is received from a source node, the CC-RTS frame including a reservation duration value indicating the length of time needed for a transmission reservation. A timer is adjusted for the period other nodes must refrain from transmitting on the channel(NAV) equal to a duration of a transmission request / transmission response (CC-RTS / CC-CTS) handshake. When the CC-RTS has been denied, then a second CC-RTS frame is received having a reservation duration value of zero, and when the CC-RTS is accepted then the NAV is extended to remainder of the reservation duration value of the original CC-RTS frame. The CC-RTS and CC-CTS are sent at a more robustPHY mode than traffic frames.

Description

Background technique [0001] Wireless local area networks (WLANs) have become ubiquitous. In a wireless local area network (LAN), wireless channels can be reserved for transmission of frame sequences, while using an asynchronous distributed random channel access method. In this case, both the source and destination of the transmission broadcast the reservation duration in order to establish the interference neighborhood. [0002] According to the 802.11 Distributed Channel Access MAC protocol, neighbors are notified of the transmission using RTS / CTS frames. To establish an interference neighborhood, the source and destination of the transmission send RTS and CTS frames containing the reservation duration, respectively. A node either receives a frame to refrain from transmission, or it agrees to receive a transmission for a specified duration. In this way, transmission will be refrained from being transmitted for the duration indicated in the received CTS frame by a "hidden t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/413
Inventor 玛斯尔德・本维尼斯特
Owner AVAYA TECH LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products