Unlock instant, AI-driven research and patent intelligence for your innovation.

Multichannel multiple access method based on asymmetric bandwidth

A multi-channel, asymmetric technology, applied in the field of communication, can solve the problem of only covering the channel listening ability, limiting the efficiency of the MAC protocol, etc.

Inactive Publication Date: 2017-04-05
NORTHWESTERN POLYTECHNICAL UNIV
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The five generations of WLAN (Wireless Local Area Networks) standards (801.11, 802.11b, 802.11a / g, 802.11n, 802.11ac), which have been developed and popularized since 1997, all existing WLAN standards use MAC (Media Access Control) protocol, the channel listening capabilities of the access point AP (Access Point) and the station STA (Station) only cover a single channel of 20MHz, which greatly limits the improvement of the efficiency of the MAC protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multichannel multiple access method based on asymmetric bandwidth
  • Multichannel multiple access method based on asymmetric bandwidth
  • Multichannel multiple access method based on asymmetric bandwidth

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0091] Assumption: In the initial stage of networking, there is no STA information in the AP. After 3 RAR collections, the number of collections counter exceeds the threshold value 3, and the AP releases the channel. The specific steps are as follows (flow chart see Figure 13 ):

[0092] Step 1: The AP detects that the DIFS time on the main channel is idle, and successfully competes for the channel after backing off, and sets the Timer timeout to TXOP unlicenced , clear the timer Timer and the RAR collection times counter Counter at the same time, and enter step 2.

[0093] Step 2: In the initial stage of networking, AP does not have any information about STAs, and it is judged that the uplink data transmission conditions are not met at this time, and the protocol turns to step 3.

[0094] Step 3: The AP judges that the downlink data transmission condition is not met, and the protocol transfers to step 4.

[0095] Step 4: The AP judges that the number of RAR collection tim...

Embodiment 2

[0125] It is assumed that the AP meets the uplink data transmission condition to perform uplink scheduling transmission after one RAR collection, and then, because the uplink data transmission condition is not satisfied but the downlink data transmission condition is met, the AP schedules the STA to perform downlink data transmission. Finally, TXOP unlicenced When the timeout expires, the AP releases the channel. The specific steps are as follows (flow chart see Figure 14 ):

[0126] Step 1: The AP detects that the DIFS time on the main channel is idle, successfully competes for the channel after backoff, sets the timer Timer, and the timeout period is TXOP unlicenced , clear the timer Timer and the RAR collection times counter Counter at the same time, and enter step 2.

[0127] Step 2: In the initial stage of networking, AP does not have any information about STAs, and it is judged that the uplink data transmission conditions are not met at this time, and the protocol tu...

Embodiment 3

[0155] It is assumed that the AP performs an uplink data service transmission process, a downlink data service transmission process, and RAR transmission request collection in sequence. Finally, TXOP unlicenced When the timeout expires, the AP releases the channel. The specific steps are as follows (flow chart see Figure 15 ):

[0156] Step 1: The AP detects that the main channel is idle for DIFS time, and successfully competes for the channel after backoff, and sets the Timer timeout to TXOP unlicenced , clear the timer Timer and the RAR collection times counter Counter at the same time, and enter step 2.

[0157] Step 2: Assuming that the AP recognizes that an uplink data transmission condition is satisfied at this time through RAR collection or Piggyback feedback during the last TXOP, the protocol enters step 3.

[0158] Step 3: Uplink data transmission process

[0159] Uplink step 3-1: AP broadcasts ECTS&SCH frames on the main channel, and the process enters uplink st...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a multichannel multiple access method based on asymmetric bandwidth and relates to the communication technology field. An AP (Access Point) performs channel competition on a special main channel, and after the AP competition channel is successful, the downlink data business scheduling transmission, the uplink data business scheduling transmission or the uplink data business transmission request collection is selected according to the requirement of the downlink data business. The multichannel multiple access method based on the asymmetric bandwidth fully employs the AP scheduling capacity, the AP has a full-channel monitoring and data transmit-receive capacity, and the STA only has the 20MHz single-channel monitoring and OFDMA sub-channel data transmit-receive capacity and fully utilizes the AP scheduling capacity to ensure that all the channels have more users to transmit and receive the data at the same time so as to greatly improve the MAC efficiency.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to the technical problem of networking under multi-channel in a wireless local area network environment. Background technique [0002] Nowadays, the wireless local area network based on the 802.11 protocol has penetrated into every corner of our lives, providing us with wireless network connection methods in homes, offices, and public places. The five generations of WLAN (Wireless Local Area Networks) standards (801.11, 802.11b, 802.11a / g, 802.11n, 802.11ac), which have been developed and popularized since 1997, all existing WLAN standards use MAC (Media Access Control) protocol, the channel detection capabilities of the access point AP (Access Point) and the station STA (Station) only cover a single channel of 20MHz, which greatly limits the improvement of the efficiency of the MAC protocol. At present, the FCC (Federal Communications Commission) has announced the 555MHz unl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W72/12H04W74/08
CPCH04W72/1268H04W72/1273H04W74/0841H04W72/535
Inventor 闫中江张忠伟杨懋李波
Owner NORTHWESTERN POLYTECHNICAL UNIV