A Multi-Channel Multiple Access Method Based on Asymmetric Bandwidth
A multi-channel, asymmetric technology, applied in the field of communication, can solve the problems of only coverage of channel interception capability and limitation of MAC protocol efficiency, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0091] Assumption: In the initial stage of networking, there is no STA information in the AP. After 3 RAR collections, the number of collections counter exceeds the threshold value 3, and the AP releases the channel. The specific steps are as follows (flow chart see Figure 13 ):
[0092] Step 1: The AP detects that the DIFS time on the main channel is idle, and successfully competes for the channel after backing off, and sets the Timer timeout to TXOP unlicenced , clear the timer Timer and the RAR collection times counter Counter at the same time, and enter step 2.
[0093] Step 2: In the initial stage of networking, AP does not have any information about STAs, and it is judged that the uplink data transmission conditions are not met at this time, and the protocol turns to step 3.
[0094] Step 3: The AP judges that the downlink data transmission condition is not met, and the protocol transfers to step 4.
[0095] Step 4: The AP judges that the number of RAR collection tim...
Embodiment 2
[0125] It is assumed that the AP meets the uplink data transmission condition to perform uplink scheduling transmission after one RAR collection, and then, because the uplink data transmission condition is not satisfied but the downlink data transmission condition is met, the AP schedules the STA to perform downlink data transmission. Finally, TXOP unlicenced When the timeout expires, the AP releases the channel. The specific steps are as follows (flow chart see Figure 14 ):
[0126] Step 1: The AP detects that the DIFS time on the main channel is idle, successfully competes for the channel after backoff, sets the timer Timer, and the timeout period is TXOP unlicenced , clear the timer Timer and the RAR collection times counter Counter at the same time, and enter step 2.
[0127] Step 2: In the initial stage of networking, AP does not have any information about STAs, and it is judged that the uplink data transmission conditions are not met at this time, and the protocol tu...
Embodiment 3
[0155] It is assumed that the AP performs an uplink data service transmission process, a downlink data service transmission process, and RAR transmission request collection in sequence. Finally, TXOP unlicenced When the timeout expires, the AP releases the channel. The specific steps are as follows (flow chart see Figure 15 ):
[0156] Step 1: The AP detects that the main channel is idle for DIFS time, and successfully competes for the channel after backoff, and sets the Timer timeout to TXOP unlicenced , clear the timer Timer and the RAR collection times counter Counter at the same time, and enter step 2.
[0157] Step 2: Assuming that the AP recognizes that an uplink data transmission condition is met at this time through RAR collection or Piggyback feedback during the last TXOP, the protocol enters step 3.
[0158] Step 3: Uplink data transmission process
[0159] Uplink step 3-1: AP broadcasts ECTS&SCH frames on the main channel, and the process enters uplink step 3-2...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


