Unlock instant, AI-driven research and patent intelligence for your innovation.

A Multi-Channel Multiple Access Method Based on Asymmetric Bandwidth

A multi-channel, asymmetric technology, applied in the field of communication, can solve the problems of only coverage of channel interception capability and limitation of MAC protocol efficiency, etc.

Inactive Publication Date: 2019-08-13
NORTHWESTERN POLYTECHNICAL UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The five generations of WLAN (Wireless Local Area Networks) standards (801.11, 802.11b, 802.11a / g, 802.11n, 802.11ac), which have been developed and popularized since 1997, all existing WLAN standards use MAC (Media Access Control) protocol, the channel listening capabilities of the access point AP (Access Point) and the station STA (Station) only cover a single channel of 20MHz, which greatly limits the improvement of the efficiency of the MAC protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Multi-Channel Multiple Access Method Based on Asymmetric Bandwidth
  • A Multi-Channel Multiple Access Method Based on Asymmetric Bandwidth
  • A Multi-Channel Multiple Access Method Based on Asymmetric Bandwidth

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0091] Assumption: In the initial stage of networking, there is no STA information in the AP. After 3 RAR collections, the number of collections counter exceeds the threshold value 3, and the AP releases the channel. The specific steps are as follows (flow chart see Figure 13 ):

[0092] Step 1: The AP detects that the DIFS time on the main channel is idle, and successfully competes for the channel after backing off, and sets the Timer timeout to TXOP unlicenced , clear the timer Timer and the RAR collection times counter Counter at the same time, and enter step 2.

[0093] Step 2: In the initial stage of networking, AP does not have any information about STAs, and it is judged that the uplink data transmission conditions are not met at this time, and the protocol turns to step 3.

[0094] Step 3: The AP judges that the downlink data transmission condition is not met, and the protocol transfers to step 4.

[0095] Step 4: The AP judges that the number of RAR collection tim...

Embodiment 2

[0125] It is assumed that the AP meets the uplink data transmission condition to perform uplink scheduling transmission after one RAR collection, and then, because the uplink data transmission condition is not satisfied but the downlink data transmission condition is met, the AP schedules the STA to perform downlink data transmission. Finally, TXOP unlicenced When the timeout expires, the AP releases the channel. The specific steps are as follows (flow chart see Figure 14 ):

[0126] Step 1: The AP detects that the DIFS time on the main channel is idle, successfully competes for the channel after backoff, sets the timer Timer, and the timeout period is TXOP unlicenced , clear the timer Timer and the RAR collection times counter Counter at the same time, and enter step 2.

[0127] Step 2: In the initial stage of networking, AP does not have any information about STAs, and it is judged that the uplink data transmission conditions are not met at this time, and the protocol tu...

Embodiment 3

[0155] It is assumed that the AP performs an uplink data service transmission process, a downlink data service transmission process, and RAR transmission request collection in sequence. Finally, TXOP unlicenced When the timeout expires, the AP releases the channel. The specific steps are as follows (flow chart see Figure 15 ):

[0156] Step 1: The AP detects that the main channel is idle for DIFS time, and successfully competes for the channel after backoff, and sets the Timer timeout to TXOP unlicenced , clear the timer Timer and the RAR collection times counter Counter at the same time, and enter step 2.

[0157] Step 2: Assuming that the AP recognizes that an uplink data transmission condition is met at this time through RAR collection or Piggyback feedback during the last TXOP, the protocol enters step 3.

[0158] Step 3: Uplink data transmission process

[0159] Uplink step 3-1: AP broadcasts ECTS&SCH frames on the main channel, and the process enters uplink step 3-2...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a multi-channel multiple access based on asymmetric bandwidth, and relates to the field of communication technology. APs perform channel competition on a specific main channel. After the AP successfully competes for a channel, it selects a For downlink data service scheduling transmission, uplink data service scheduling transmission, or uplink data service transmission request collection, the present invention makes full use of the scheduling capability of the AP. The AP has full-channel monitoring and data sending and receiving capabilities, while the STA only has a single channel of 20MHz. Channel monitoring and OFDMA sub-channel data sending and receiving capabilities make full use of AP scheduling capabilities to ensure that more users on all channels send and receive data at the same time, thereby greatly improving MAC efficiency.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to the technical problem of networking under multi-channel in a wireless local area network environment. Background technique [0002] Nowadays, the wireless local area network based on the 802.11 protocol has penetrated into every corner of our lives, providing us with wireless network connection methods in homes, offices, and public places. The five generations of WLAN (Wireless Local Area Networks) standards (801.11, 802.11b, 802.11a / g, 802.11n, 802.11ac), which have been developed and popularized since 1997, all existing WLAN standards use MAC (Media Access Control) protocol, the channel detection capabilities of the access point AP (Access Point) and the station STA (Station) only cover a single channel of 20MHz, which greatly limits the improvement of the efficiency of the MAC protocol. At present, the FCC (Federal Communications Commission) has announced the 555MHz unl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W72/12H04W74/08
CPCH04W72/1268H04W72/1273H04W74/0841H04W72/535
Inventor 闫中江张忠伟杨懋李波
Owner NORTHWESTERN POLYTECHNICAL UNIV