throbber

`
`
`March 9, 1992
`
`_
`
`
`
`DOC: IEEE P802.11I92-39
`
`
`
`
`
`
`
`Medium Access Control Protocol for Wireless LANs
`
`
`( An Update )
`
`
`
`K. S. Nataraian
`
`
`C. C. Huang
`
`
`0. F. Bantz
`
`
`
`
`
`
`IBM Thomas J. Watson Research Center
`
`
`
`
`
`
`P.O. Box 704. Yorktown Heights, NY 10598
`
`Abstract
`
`
`
`
`
`
`
`
`
`
`This contribution provides an updated and expanded description of a medium
`
`
`
`
`
`
`
`
`
`
`
`access control protocol for wireless LANs that was proposed In [NATB1a]. The
`
`
`
`
`
`
`
`
`
`
`
`
`proposal is described with respect to the 21 criteria that have been developed
`
`
`
`
`for consideration of MAC proposals.
`
`
`
`
`
`
`
`
`
`
`
`
`The medium access control protocol used is a hybrid of reservation and ran-
`
`
`
`
`
`
`
`
`
`
`
`dom access based protocols. Channel time is structured as a sequence of
`
`
`
`
`
`
`
`
`
`
`
`frames of equal duration. The protocol divides a frame into three intervals.
`
`
`
`
`
`
`
`
`
`
`
`
`In the first two intervals, transmission is scheduled by the controller, and a
`
`
`
`
`
`
`
`
`
`decentralized contention-based medium access control protocol is used in the
`
`
`
`
`
`
`
`
`third interval. An adaptively movable boundary separates the contention-free
`
`
`
`
`
`
`
`
`
`
`and contention-based portions in each frame. This provides for flexibility of
`
`
`
`
`
`
`
`
`
`
`bandwidth allocation to meet a variety of asynchronous and isochronous ser-
`
`
`
`
`
`
`
`vices that are anticipated in future wireless applications.
`
`
`
`
`
`
`We assume Slow-Frequency-Hopping spread-spectrum radio transmissions for
`
`
`
`
`
`
`
`
`
`
`
`isolating adjacent cells in a multicell network. However, the MAC protocol is
`
`
`
`
`
`
`
`
`
`
`
`
`applicabie to a variety of other PHY layers that require different cell isolation
`techniques.
`
`
`
`
`
`
`
`
`
`
`The communication architecture is flexible and permits several modes of op-
`
`
`
`
`
`
`eration. in particular, wireless communication is supported:
`
`
`
`
`
`
`
`
`
`
`0 When an infrastructure backbone network (i.e., a Distribution System) that
`
`
`
`
`
`
`
`facilitates extended coverage and mobility is available, and
`
`
`
`
`
`
`
`
`
`
`0 When there is no preexisting infrastructure to enable communication be-
`
`
`tween mobile stations.
`
`
`
`
`Page 1
`
`ST. JUDE 1011
`ST. IUDE 1011
`
`1
`
`

`

`
`
`
`
`
`DOC: IEEE P802.11I92-39
`March 9, 1992
`
`
`1 .lntroduction
`
`
`
`
`
`
`
`
`
`
`
`
`The demand for wireless data communications is expected to grow in the
`
`
`
`
`
`
`
`
`
`
`
`coming years as awide variety of user applications are developed and used -
`
`
`
`
`
`
`
`
`
`
`in a number of operating environments. The following usage scenarios are
`
`
`
`
`
`
`
`expected to become increasingly common in the future.
`
`
`
`
`
`
`
`
`
`Infrastructure-based LANs: The network architecture will consist of a finite
`
`
`
`
`
`
`
`
`
`
`
`number of Access Points that are attached to a Distribution System. The
`
`
`
`
`
`
`
`
`Distribution System, typically an IEEE 802 network. would enable:
`
`
`
`
`
`
`
`
`
`' Communication between mobile stations and fixed destinations ( ex. serv-
`
`
`
`
`
`
`
`
`
`
`ers, applications, data etc) that are attached to the Distribution System.
`
`
`
`
`
`
`
`
`
`
`
`Mobile stations communicate to an Access Point (a fixed station) that acts
`
`
`
`
`
`
`
`
`
`
`as a “bridge" between the radio environment and the Distribution System.
`
`
`
`
`
`
`
`
`
`
`The Access Point relays messages from/to stations that request its ser-
`vices.
`
`.
`
`
`
`
`
`
`
`0 Communication between mobile stations
`
`it communication is between two mobile stations that are not within
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`range of each other, this will occur utilizing the store-and—forward ca-
`
`
`
`
`
`
`
`
`
`
`
`pability of one or more Access Points attached to a Distribution Sys-
`tern.
`
`.
`
`
`
`
`
`
`
`
`
`
`
`
`
`If communication is between two mobile stations that are within range
`
`
`
`
`
`
`
`
`
`
`
`
`
`of each other. this can occur with direct or indirect support of an Ac~
`
`
`
`
`
`
`
`cess Point that can serve both of them.
`'
`
`
`
`
`
`
`
`
`
`
`Adhoc LANs: A primary requirement for a segment of user applications would
`
`
`
`
`
`
`
`
`
`be the capability to accomplish wireless communication without any depend-
`
`
`
`
`
`
`
`
`
`
`
`
`
`ence on a preexisting infrastructure. An adhoc LAN consisting of a set of mo-
`
`
`
`
`
`
`
`
`
`
`
`bile stations and shared resources like servers may be created. used for
`
`
`
`
`
`
`
`
`
`wireless communication and “dismantled” when the needs have been satis-
`fied.
`
`
`
`
`
`
`
`
`
`
`
`In this contribution we propose a communication architecture that is flexible
`
`
`
`
`
`
`
`
`
`
`and encompasses the several modes of usage scenarios outlined above.
`
`
`
`
`
`
`
`particular. wireless communication among participating stations is supported:
`
`
`
`
`
`
`
`
`
`
`0 When an infrastructure backbone network (i.e.. a Distribution System) that
`
`
`
`
`
`
`
`
`
`
`facilitates extended coverage and mobility is present and available for the
`
`
`
`
`mobile station to use, and
`
`
`
`
`
`
`
`
`
`
`0 When there is no preexisting infrastructure available to enable communi—
`
`
`
`
`
`
`
`cation between mobile stations that wish to communicate.
`
`
`in
`
`
`
`
`Page 2
`
`2
`
`

`

`
`
`
`
`March 9, 1992
`DOC: iEEE P802.11192-39
`
`
`
`
`2. Proposed Scheme
`
`
`
`
`
`
`
`
`
`
`
`
`The proposed MAC scheme is first described in the context of Infrastructure—
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`based LANs. The same scheme is used in Adhoc LANs as described in a later
`
`
`
`
`
`
`
`
`
`
`
`section. A half-duplex wireless link is assumed. The link is shared between
`
`
`
`
`
`
`
`
`
`
`
`inbound (mobile stations to Access Point) and outbound (Access Point to mo-
`
`
`
`
`
`
`
`
`
`
`
`
`bile stations) traffic. Channel time is structured as a sequence of frames of
`
`
`
`
`
`
`
`
`
`
`
`equal duration. The duration of a frame is subdivided into three intervals as
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`shown in Fig. 1. Centralized control is used in the first two intervals and de-
`
`
`
`
`
`centralized control in the third interval.
`
`
`|G|AH|
`
`A
`
`
`
`|BH|
`
`
`
`B
`
`
`
`|cu|
`
`c
`
`
`
`|s|
`
`
`
`
`
`
`
`I-l--|lllllllll|--llll|l|lllllllulllllllllllll-l
`
`
`
`
`
`
`[Broadcastl
`|
`
`
`|
`| Contention I.
`I Contention]
`
`
`
`I
`I
`[Free
`based
`I]
`
`
`
`
`
`
`
`
`M? to
`
`lllobiles
`
`
`
`
`
`|
`|
`
`
`
`| Hoblles to |
`
`
`
`[AP
`|
`
`| Hobiies
`
`
`
`
`[to AP
`
`
`
`|
`
`
`
`
`
`
`I HI“ TA -—-I
`
`
`
`
`
`I---- TB ----I
`
`
`
`
`
`i--- Tc ----1 l
`
`
`
`
`
`AH - Header for Period A
`
`
`
`
`8H - Header for Period B
`
`
`
`
`CH - Header for Period C
`
`
`
`
`
`AP - Access Point
`
`
`
`
`
`
`
`
`
`Figure 1. Frame Structure of Medium Access Control Scheme
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`In the first interval (Period A), the link is used exclusively for outbound data
`
`
`
`
`
`
`
`
`
`
`
`
`transfer from the Access Point to mobile stations. In the second interval (Pe-
`
`
`
`
`
`
`
`
`
`
`riod B), bandwidth is allocated for contention-free inbound data transfer from
`
`
`
`
`
`
`
`
`
`
`
`mobile stations to the Access Point. The allocation of bandwidth is performed
`
`
`
`
`
`
`
`
`
`
`
`by a SCHEDULER resident in the Access Point wireless adapter. Bandwidth is
`
`
`
`
`
`
`
`
`
`
`
`allocated In each frame for inbound and outbound transfers. The third interval
`
`
`
`
`
`
`
`
`
`
`
`
`is used for transmission from mobile stations to Access Point in a random-
`
`
`
`
`
`
`
`
`
`
`
`
`
`access mode of operation. Control as well as data packets will use this inter-
`val.
`
`
`Page 3
`
`3
`
`

`

`
`
`
`
`March 9, 1992
`DOC: IEEE P802.11192-39
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The control information for Periods A, B and C are AH, BH and CH respec-
`
`
`
`
`
`
`
`
`
`
`
`tively. The medium access control protocol is now briefly described with re-
`
`
`
`spect to Fig. 1.
`”
`
`
`
`
`
`
`2.1 Period A ( Outbound Interval )
`
`
`
`
`
`
`
`
`
`
`
`Header AH (Broadcast from Access Point to mobile stations) is the interval
`
`
`
`
`
`
`
`
`
`
`
`during which the Access Point broadcasts a special message to all the mobile
`
`
`
`
`
`
`
`
`
`
`
`stations that identifies the beginning of Period A and contains additional con-
`
`
`
`
`
`trol information shown in Fig. 2.
`
`
`
`
`
`
`
`
`
`
`
`
`Period A (Broadcast from Access Point to mobile stations) is the interval dur-
`
`
`
`
`
`
`
`
`
`
`ing which outbound traffic is transmitted. The Access Point broadcasts packets
`
`
`
`
`
`
`
`and mobile stations receive packets addressed to them.
`
`
`
`
`
`
`
`
`
`
`
`
`Header AH identifies the start of the information frame and contains the Net-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`work ID, the Access Point ID, the frequency to be used in the next hop (as-
`
`
`
`
`
`
`
`
`
`
`
`suming Slow Frequency Hopping is the underlying PHY), a list of receiving
`
`
`
`
`
`
`
`
`
`
`stations and other system control information. The Network ID helps distin-
`
`
`
`
`
`guish between several colocated autonomous LANs.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`TA “ Length of Period A
`
`
`
`
`
`Length of Period B
`TE
`
`
`
`
`
`TC = Length of Period C
`
`
`
`
`
`TAH = Length of Header AH
`
`
`
`
`
`TBH
`Length of Header BH
`
`
`
`
`
`TCH = Length of Header CH
`
`
`
`
`
`TREMHOP = Remaining Length of Hop
`
`
`
`
`
`
`
`BSID = Unique Id of the Access Point
`
`
`
`
`NET_lD = Network Id
`
`
`
`
`
`
`
`
`
`
`Next Frequency to be used in the Slow Frequency Hopping pattern
`
`
`
`List of Receiving Stations
`
`
`
`Broadcast Data indicator Flag
`
`
`
`
`
`
`
`
`
`Figure 2. Control information In Header AH
`
`
`
`
`
`
`
`
`
`
`
`
`
`In Period A the Access Point controls the transmissions outbound to the mo-
`
`
`
`
`
`
`
`
`
`bile stations. The corresponding control information, Header AH, for this
`
`
`
`Page 4
`
`4
`
`

`

`
`
`
`
`March 9, 1992
`DOC: IEEE P802.11192-39
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`interval is broadcasted by the Access Point. Each mobile station waits for the
`
`
`
`
`
`
`
`
`
`
`
`header whose contents include those shown in Fig. 2. On correct reception
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`of Header AH, each mobile station sets a timer for TA so that it knows when to
`
`
`
`
`
`
`
`
`
`
`
`
`receive Header BH and learn about the beginning of Period B. The parame-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ters TA, TB and TC lets the mobile stations know how much time is allocated
`
`
`
`
`
`
`
`
`
`
`
`
`
`to the three intervals in the current frame. On correct reception of Header AH,
`
`
`
`
`
`
`
`
`
`
`
`each receiving mobile station can determine whether or not it will receive
`
`
`
`
`
`
`
`
`
`
`packets from the Access Point (either broadcast or explicitly directed toward
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`If there is no outbound traffic in a frame. then TA will be set to zero In
`them).
`
`
`
`
`Header AH of the frame.
`
`
`
`
`
`
`
`2. Period 8 ( Inbound Slotted Interval )
`
`
`
`
`
`
`
`
`
`
`
`Header BH (Broadcast from Access Point to mobile stations) is the interval
`
`
`
`
`
`
`
`
`
`
`
`
`during which the Access Point broadcasts a special message to all the mobile
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`stations signifying the end of the Period A and the beginning of Period B. It
`
`
`
`
`
`
`
`
`also contains additional control information shown in Fig. 3.
`
`
`
`
`
`
`
`
`
`
`
`
`Period B (Contention Free Transfer from Mobile stations to Access Point) is the
`
`
`
`
`
`
`
`
`
`
`
`
`interval during which mobile stations take turn to transmit according to the slot
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`allocation specified in BH. At the end of Period A, each mobile station waits for
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Header BH. When received, each mobile station sets a timer for TB so that it
`
`
`
`
`
`
`
`
`
`
`
`
`
`knows when to receive Header CH and learn about the beginning of Period c,
`
`
`
`
`
`
`
`
`
`
`
`the contention interval. A mobile station that requested slot allocation in an
`
`
`
`
`
`
`
`
`
`
`
`earlier frame will check to see if it has been allocated any slots.
`
`
`
`
`
`
`
`
`
`
`
`
`length of Period B
`TB
`
`
`
`
`
`TC — length of Period 0
`
`
`
`
`
`
`
`
`
`
`
`NTR 1—" Number of mobile stations that have slots allocated in the
`
`current frame
`
`
`
`
`
`
`
`
`. 8(1)) = User I can transmit 8(1) packets.
`( I
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`There will be one such pair for each of the NTR mobile stations that hav
`
`
`
`
`
`slots allocated in the current frame.
`
`Figure 3. Control Information in Header BH.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Header BH specifies a list of ordered pairs of the term (i, 8(I) > that indi-
`
`
`
`
`
`
`
`
`
`
`
`
`
`cates mobile station l is allocated 50') slots in the current frame. Since the list
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`is ordered, the order in which they are allowed to transmit to the Access Point
`
`
`
`Page 5
`
`5
`
`

`

`
`
`'
`March 9, 1992
`DOC: IEEE P802.11/92-39
`
`
`_________________________________
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`is known to the mobile stations. Since each mobile station knows the list of
`
`
`
`
`
`
`
`
`
`
`
`
`stations that precede it and their allocations, It can determine when it should
`
`
`
`
`
`
`
`
`
`
`
`begin its transmission. At its designated time, the mobile station transmits for
`
`
`
`
`
`
`
`
`
`
`
`
`
`a fixed period of time whose duration depends on the number of slots allo-
`
`
`
`
`
`
`
`
`
`
`
`cated to it. Thus. contention-tree transfer from mobile stations to Access Point
`
`
`
`
`
`
`
`
`
`
`
`occurs utilizing the slot allocation information specified in BH. If a mobile sta-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`tion fails to receive BH correctly, then it will not make use of any slots that may
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`have been allocated to it in the current frame. At the beginning of a frame, it
`
`
`
`
`
`
`
`
`
`
`
`
`there is no pending request from any mobile station for inbound data transfer.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`then TB (the length of Period 8) ln Header BH of the frame is set to zero.
`
`
`
`
`
`
`
`
`
`
`
`
`
`Adjustment of TA and TB in each frame enables the bandwidth to be allocated
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`on a demand-driven basis. If both TA and T8 are set to zero, then the MAC'
`
`
`
`
`
`
`
`
`
`
`reduces to exclusively random-access mode of operation. For a large class
`
`
`
`
`
`
`
`
`
`
`of applications. outbound traffic (from Access Point to mobile stations) tends
`
`
`
`
`
`
`
`
`
`
`
`to be significantly large compared to inbound traffic (mobile stations to Access
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Point). In such cases, TA is expected to be the dominant component in a frame.
`
`
`
`
`
`
`
`2.3 Period C ( inbound Contention Interval )
`
`
`
`
`
`
`
`
`
`
`
`Header CH (Broadcast from Access Point to mobile stations) is the interval
`
`
`
`
`
`
`
`
`
`
`
`
`during which the Access Point broadcasts a special message to all the mobile
`
`
`
`
`
`
`
`
`
`
`
`
`
`stations, identifying the end of the Period B and the beginning of the Period
`
`
`
`
`
`
`
`
`
`C. The message also conveys the information In Fig. 4.
`
`
`
`
`0
`
`0
`
`
`
`
`
`
`TC = length of Period C
`
`
`
`
`
`
`
`
`K = Current estimate of users actively attempting transmission
`
`
`
`
`
`
`
`
`
`
`in Random Access Section ( expected to be much smaller than the
`
`
`
`
`
`
`
`number of users registered with the Access Point).
`
`Control information in Header CH.
`
`
`Figure 4.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Period C (Random access from mobile stations to Access Point) is the interval
`
`
`
`
`
`
`
`
`
`
`
`during which any station may contend for the channel and transmit a message
`
`
`
`
`
`
`
`
`
`
`without any explicit allocation from the Access Point. A Slotted-ALOHA pro—
`
`
`
`
`
`
`
`
`
`
`tocol with suitable modifications for retransmission scheduling is used in this
`interval.‘
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`1 The proposed choice of Slotted-ALOHA in Period C allows eliicient support for simple and
`
`
`
`
`
`
`
`
`
`
`
`inexpensive radio PHY layers (e.g. radios with long transmit-to—receive turnaround times).
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`However. we note that Period C admits the use of random access protocols that. under a
`
`
`
`
`
`
`
`
`
`
`
`different set of PHY layer assumptions. are theoretically more efficient than Slotted-ALOHA.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`in partiCUlar, a Carrier Sense Multiple Access-based protocol can be used in Period C. Use
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`of such CSMA-based alternative choices. are considered to be within the scope ofthis MAC
`proposal.
`
`6
`
`

`

`
`
`
`
`
`DOC: IEEE P802.11192-39
`March 9, 1992
`
`
`
`
`
`
`
`
`
`
`
`Period C is used for the following types of information:
`
`
`
`
`
`
`
`
`0 Request messages for registering with an Access Point
`
`
`
`0 Bandwidth reservation requests
`
`
`0 Data packets
`
`
`
`
`
`2.3.1 Registration with Access Point
`
`
`
`
`
`
`
`
`
`
`
`
`The process by which a mobile station introduces itself and requests the ser-
`
`
`
`
`
`
`
`
`
`
`
`
`
`vices ot an Access Point is called Registration. The set of registered users at
`
`
`
`
`
`
`
`
`
`
`
`
`an Access Point will change dynamically with time. An Access Point does not
`
`
`
`
`
`
`
`
`
`
`
`
`assume a priori knowledge about the number or the identity of mobile stations
`
`
`desiring its services.
`
`
`
`
`
`
`
`
`
`
`
`After a mobile station has monitored the radio environment and chosen an
`
`
`
`
`
`
`
`
`
`
`
`Access Point to register with. it sends a Request Registration Control Packet.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The packet contains the Access Point ID as well as the Network ID of the LAN
`
`
`
`
`
`
`
`
`
`
`
`
`that the mobiie station wishes to join. Other information included are the mo-
`
`
`
`
`
`
`
`
`
`
`
`
`bile station MAC address. and other information that may be required for ac-
`
`
`cess control purposes. -
`
`
`
`
`
`
`
`
`
`
`On receipt of a Request Registration control packet, the designated Access
`
`
`
`
`
`
`
`
`
`
`
`Point processes the request. It responds to the mobile station with a message
`
`
`
`
`
`
`
`
`
`called Registration Response packet.
`if the registration request is accepted,
`
`
`
`
`
`
`
`
`
`
`
`
`then the Access Point becomes the Owner of the mobile station. An Access
`
`
`
`
`
`
`
`
`
`
`
`
`
`Point provides the MAC functions for all mobile stations for which it is the
`
`
`
`
`
`
`
`
`
`
`
`
`
`owner. Ownership of a mobile station can change if it roams within an Ex-
`
`
`
`
`
`
`
`
`tended Service Area and a handoff sequence is initiated.
`
`
`
`
`
`2.3.2 Reservation Requests for Bandwidth
`
`
`
`
`
`
`
`
`
`
`Mobile stations request bandwidth for transmission in Contention Free mode
`
`
`
`
`
`
`
`
`
`
`(Period B). Such requests can be supported by transmitting the appropriate
`
`
`
`
`
`
`
`
`
`
`bandwidth reservation request to the Access Point. Both isochronous or non-
`
`
`
`
`
`
`
`
`isochronous services are supported by transmitting the appropriate bandwidth
`
`
`
`
`
`
`
`
`
`
`reservation request to the Access Point. Allocations based on reservation re»
`
`
`
`
`
`
`
`
`
`
`quests are specified in the BH header of the subsequent frames.
`
`
`
`
`
`
`
`
`
`
`Bandwidth reservation requests are transmitted by mobile stations to the Ac-
`
`
`
`
`
`
`
`
`
`
`cess Point using random access Slotted-ALOHA protocol in the third interval
`
`
`
`
`
`
`
`
`
`(Period C). The Access Point receives reservation requests and processes
`
`
`
`
`
`
`them according to the SCHEDULER allocation algorithm.
`
`
`Page 7
`
`7
`
`

`

`
`
`
`
`March 9, 1992
`DOC: IEEE P802.11I92-39
`
`
`
`
`
`
`
`
`
`
`
`
`The actual slot allocation information for inbound transmission is conveyed in
`
`
`
`
`
`
`
`Header 81-! of one or more subsequent frames.
`
`
`
`
`
`
`
`
`
`
`
`
`Reservation requests have the form shown In Fig. 5. Such a request means
`
`
`
`
`
`
`
`
`
`
`
`mobile station with MAC Address MSID requests Access Point APiD to allo-
`
`
`
`
`
`
`
`
`
`
`
`
`cate REQ_SIZE slots for inbound transmission (i.e.. number of slots needed for
`
`
`
`
`
`
`
`
`
`transmission in Period 3). Successful (Le. collision-free and error-free) recep-
`
`
`
`
`
`
`
`
`
`
`
`
`tion of reservation requests are acknowledged by the Access Point as part of
`
`
`
`
`
`
`
`
`
`the contention protocol
`in Period C.
`The field SERVICE_TYPE indicates
`
`
`
`
`
`
`
`
`
`whether an asynchronous or isochronous service is required.
`if asynchonous
`
`
`
`
`
`
`
`
`
`
`
`service is required. then no periodicity of request is assumed. If isochronous
`
`
`
`
`
`
`
`
`
`
`
`
`service is indicated, then REQfiSIZE slots will be allocated in every frame until
`
`
`
`
`
`
`
`
`
`
`
`
`a cancellation of the request is indicated in a subsequent control packet from
`
`
`the mobile station.
`
`INon—Iso) Figure 5. Reservation Request Control Packet
`
`Reservation
`
`Request packet
`
`
`MAC Address
`
`
`
`
`Network ID
`
`
`
`Access Point
`
`ID
`
`
`
`
`Reservation
`
`Request Size
`
`
`
`Type of Service
`
`(lso.
`
`
`
`APID
`
`REQ SIZE
`-
`
`SERVICE_TYPE
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The SCHEDULER maintains a queue of pending requests for inbound data
`
`
`
`
`
`
`
`
`
`
`
`
`transfer, each request containing information shown in Fig. 6.
`If there is not
`
`
`
`
`
`
`
`
`
`
`
`sufficient bandwidth to satisfy all reservation requests in a frame. then the
`
`
`
`
`
`
`
`
`
`
`
`
`
`unfulfilled requests will be taken up in the following frame. Note that the Ac-
`
`
`
`
`
`
`
`
`
`
`
`cess Point processes the reservation requests within Period A of the next
`
`
`
`
`
`
`
`
`frame and communicates it as part of Header BH.
`‘w—MWW“
`
`
`Page 8
`
`8
`
`

`

`
`
`
`
`
`-
`DOC: lEEE P802.11192-39
`March 9, 1992
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`At the end of Period B, each mobile station waits for Header CH corresponding
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`to Period C. The header contains TC. the length of the third interval. When re-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ceived, each mobile station sets a timer for TC so that it knows when to expect
`
`
`
`
`
`the header for the next frame.
`
`
`
`
`HAG Address Request
`
`Size
`
`
`isochronous or
`
`Non-lsochronous Figure 6. An Entry in the Queue of Outstanding Reservation Requests
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Phase C is devoted to the transmission of messages using a Slotted-ALOHA
`
`
`
`
`
`
`
`
`
`
`protocol. Note that the duration of the Slotted-ALOHA subframe can change
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`from one frame to the next in a manner determined by the Access Point and
`
`
`
`
`
`
`
`
`
`
`
`
`conveyed in the control headers AH, BH and CH.
`in the Slotted-ALOHA sub-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`lrame, each mobile station that has a message to transmit will do so oniy at the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`beginning of a time slot. At the end of each transmission, the users must know
`
`
`
`
`
`
`
`
`
`
`
`
`
`if their packets were received correctly (I.e., without collisions) or not. If a col-
`
`
`
`
`
`
`
`
`
`
`
`
`
`lision is detected (by lack of a positive ACK). the mobile station schedules a
`
`
`
`
`
`
`
`
`retransmission of the collided packet according to a retransmission scheduling
`
`
`
`
`
`
`
`
`
`algorithm. Since bursty data, reservation and registration requests must have
`
`
`
`
`
`
`
`
`
`
`
`short response time, parameter TC. the length of the random access portion '
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`of a frame. is always lower bounded by a value. TC__MIN. TC_MIN Is the min-
`
`
`
`
`
`
`
`
`
`
`
`
`
`imum number of slots per frame that are always available for use in contention
`
`
`
`
`
`
`
`
`mode (eg, TC_MIN = 20% of the frame length).
`
`
`
`
`
`
`
`
`
`
`
`
`
`At the end of each frame, the Access Point may have outstanding packets to
`
`
`
`
`
`
`
`
`
`
`
`be transmitted to mobile stations registered with it. These are first scheduled
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`for transmission in Period A. Recall that TB is the length of Period B. The
`
`
`
`
`
`
`
`
`
`
`
`SCHEDULER allocates bandwidth subject to the constraint (TA + T8) is never
`
`
`
`
`
`
`
`
`
`
`
`
`
`allowed to exceed 80% of irame length.
`If there is no outbound traffic and
`
`
`
`
`
`
`
`
`
`
`there are no outstanding reservation requests, TC is increased to 100%.
`
`
`
`
`
`
`
`
`
`
`
`
`When two stations are within a Basic Service Area and registered with the
`
`
`
`
`
`
`
`
`
`
`same Access Point, then there are two choices for communication between
`
`
`
`
`
`
`
`
`
`
`
`
`
`them. Fig. 7 shows an Access Point and two mobile stations that are registered
`
`with it.
`
`
`Page 9
`
`9
`
`

`

`
`
`
`
`March 9, 1992
`DOC: IEEE P802.11/92-39
`
`
`-
`
`
`
`
`
`
`The data transfer can occur in:
`
`
`
`
`
`
`
`
`
`
`Store-and-Forward (84’) repeat mode: The Access Point receives from the
`
`
`
`
`
`
`
`
`
`
`source station. and retransmits to the destination. This requires two trans-
`
`
`
`
`
`
`
`
`
`missions but has potential to provide coverage over a larger area.
`
`
`
`
`
`
`
`
`
`
`0 Direct Data Transfer mode: Stations communicate directly with a single
`
`
`
`
`
`
`
`
`
`transmission from source to destination station (no active intervention by
`
`
`
`
`Access Point during data transfer).
`
`
`S-F repeat
`mode
`
`
`
`ACCESS
`POINT
`
`
`
`
`S-F repeat
`mode
`
`direct transfer mode
`
`
`
`--«————————-——+
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`A mobile station may (or may not) be able to communicate directly to another
`
`
`
`
`
`
`
`
`
`
`mobile station registered with the same Access Point.
`in the Store—and-
`
`
`
`
`
`
`
`
`
`Forward repeat mode. a mobile station communicates through the Access
`
`
`
`
`
`
`
`Point to another mobile station in the network.
`
`
`
`
`
`
`
`
`
`
`
`
`
`The following are two modes of system operation for direct data transfer be-
`
`
`tween mobile stations.
`
`
`
`
`
`
`
`
`
`
`
`
`0 Mode 1: The first mode of operation is Random Access Direct Data Trans-
`
`
`
`
`
`
`
`
`
`
`
`fer. In this mode. a mobile station communicates directly to another mobile
`
`
`
`
`
`
`
`
`
`
`
`
`station in Period C. The Access Point will not receive the packet for
`
`store-and-forward transmission.
`
`mode I
`
`
`source
`address
`
`destination
`address
`
`Data
`
`
`Page 10
`
`10
`
`10
`
`

`

`
`
`
`
`
`
`March 9, 1992
`DOC: IEEE P802.11I92—39
`
`
`
`
`
`
`
`
`
`
`
`
`
`Mode 2: The second mode of operation is Reserved Access Direct Data
`
`
`
`
`
`
`
`
`
`
`Transfer.
`In this mode, a mobile station communicates directly to another
`
`
`
`
`
`
`
`
`
`
`
`mobile station in Period B of the frame. Bandwidth allocation ls requested
`
`
`
`
`
`
`
`
`
`
`
`
`
`from the Access Point in Period C. The Access Point then includes the fol-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`lowing in Header BH of Period B in a subsequent frame. The message has the
`
`following form:
`‘
`
`mode 2
`
`
`source
`address
`
`destination
`address
`
`allocated
`
`time slots
`
`
`
`
`
`
`
`
`
`
`
`
`The message allows both the sender and the receiver know when data trans-
`
`
`
`
`
`
`
`
`
`
`
`
`mission will happen, and that the second mode operation is active in the as-
`
`signment slots.
`
`SUCCESS
`
`RANDOM ACCESS
`
`
`
`DIRECT DATA
`
`TRANSFER HODE
`
`
`
`
`
`
`
`ACCESS POINT
`
`
`S—F REPEAT MODE
`
`
`
`
`RESERVED ACCESS
`DIRECT DATA
`
`
`
`TRANSFER MODE
`
`
`Mode 2
`
`SUCCESS
`
`
`
`
`
`
`
`
`
`
`
`Figure 8. Different Modes of Data Transfer In a Basic Service Area
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The above two modes of operation permit a mobile station to use Direct Data
`
`
`
`
`
`
`
`
`
`
`
`
`Transfer mode whenever it is in range of the destination station. The source
`
`
`
`
`
`
`
`
`
`
`
`
`
`station first tries the Direct Data Transfer mode.
`If not successful (lack of suc-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`cess in a number of retries), it enters the S-F repeat tnode. Using the Access
`
`
`
`
`
`
`
`
`
`
`
`
`Point. the packets are delivered to the destination. Fig. 8 summarizes the dif-
`
`
`
`ferent modes of operation.
`
`
`Page 11
`
`11
`
`11
`
`

`

`
`
`
`
`March 9, 1992
`DOC: IEEE P802.11192-39
`——-—-—————-————-————-———-———-—————~———...__...__
`
`Response to 21 Criteria
`
`
`
`
`
`
`
`
`
`
`1) Unauthorized network access impact on throughput
`
`
`
`
`
`
`
`
`
`
`
`The proposed MAC protocol is a hybrid of Reservation TDMA and random
`
`
`
`
`
`
`
`access schemes. Slow Frequency Happing Spread Spectrum communication
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`is used for intercell isolation in a multicell radio network. Users in a BSA can
`
`
`
`
`
`
`
`
`
`
`utilize the channel only after successfully registering with an Access Point.
`
`
`
`
`
`
`
`
`
`The registration procedure will exclude an unauthorized user trom accessing
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`a network. Users in adjacent cells of the same network as well as cells of
`
`
`
`
`
`
`
`
`colocated networks will
`typically be hopping in non-interfering channels
`
`
`
`
`
`
`
`
`
`
`
`
`(please see response to item 8). Their access of their networks should have
`
`
`
`
`marginal impact of system throughput.
`
`
`
`
`
`
`
`
`
`
`
`
`
`in an Adhoc-LAN. only the users that belong to the network will impact each
`
`
`
`
`
`
`
`
`
`
`
`other. Users belonging to other networks will again be isolated in frequency
`
`
`
`
`
`
`
`
`domain and will have marginal impact on system throughput.
`
`
`
`
`
`
`
`2) Establish peer-to—peer connectivity without prior knowledge
`
`
`
`
`
`
`
`
`
`
`Peer-to-peer connectivity can be established by creation of Adhoc LAN net-
`
`
`
`
`
`
`
`
`
`works. Such networks are created to facilitate communication between mobile
`
`
`
`
`
`
`
`
`
`
`
`
`stations without relying on the existence of a distinguished entity a la Access
`
`
`
`
`
`
`
`
`
`
`
`Point. The networks are created on-the~fly on a temporary basis consisting of
`
`
`
`
`
`
`
`
`
`mobile stations that wish to participate in such a network.
`
`
`
`
`
`
`
`
`
`
`This section describes-a simple approach to create Adhoc networks. With this
`
`
`
`
`
`
`
`
`approach, mobile stations would require implementation of Access Point
`
`
`
`
`
`
`
`
`
`
`
`
`functions in software in mobile station adapter cards. A mobile station is ex-
`
`
`
`
`
`
`
`
`
`
`
`plicitly designated to provide the basic control functions of an Access Point.
`
`
`
`
`
`
`
`
`
`The designated mobile station, called an Adhoc-type Access Point, performs
`
`
`
`
`
`
`
`
`
`
`only the core functions of an Infrastructure-type Access Point. These include
`
`the following:
`
`
`
`
`
`
`1. Bandwidth allocation based on reservation requests
`
`
`
`
`
`
`
`
`
`
`2. Registration of stations that wish to ioin the Adhoc network
`
`
`
`
`
`
`
`
`
`
`
`3. Timing and framing information for coordinating the stations in the Adhoc
`
`
`
`
`
`
`
`
`
`
`network. With a Frequency Hopping PHY layer, the control lunctlons in-
`
`
`
`
`
`
`
`
`
`
`cludes specifying the frequency hopping pattern to use, time instants when
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the stations should hop and how long they should stay in a hop. The above
`
`
`
`
`Page 12
`
`12
`
`12
`
`

`

`
`
`
`
`
`DOC: IEEE P802.11I92-39
`March 9, 1992
`
`
`
`
`
`
`
`
`
`control information facilitates synchronized frequency-hopping by all mobile
`
`
`
`
`
`
`
`
`
`
`
`
`
`stations that belong to the Adhoc LAN. Data transfer will occur using the same
`
`
`
`
`
`
`
`
`
`
`MAC protocol as in infrastructure-based LAN. The primary mode of operation
`
`
`
`
`
`
`
`
`
`
`
`
`is Direct Data Transfer between stations that belong to the Adhoc LAN. The
`
`
`
`
`
`
`
`
`
`
`Adhoc Access Point need not function as a Store—and-Forward repeater for
`
`
`
`
`
`
`
`
`
`
`
`data communication between peer stations that are in direct range of each
`
`
`
`
`
`
`
`
`
`
`other. However, Store-and-Forward repeat is a backup option available at the
`
`
`
`
`
`
`
`
`
`
`
`
`
`Adhoc Access Point and can be used for extending the coverage range of the
`
`Adhoc LAN.
`-
`
`
`
`
`
`
`
`
`
`
`
`
`A promising direction for automatic creation of Adhoc LANs is to create sys-
`
`
`
`
`
`
`
`
`
`
`
`
`
`tems in which a station is elected as an #Adhoc-type Access Point, performs the
`
`
`
`
`
`
`
`
`
`
`
`
`core functions of an Access Point for some duration and the responsibility for
`
`
`
`
`
`
`
`
`
`performing Adhoc-type Access Point functions is rotated among the partic-
`
`
`
`
`
`ipating stations in an equitable manner.
`
`
`3) Throughput
`
`
`
`
`
`
`
`
`
`
`
`
`
`is a hybrid of contention-free (Periods A and B) and
`The MAC protocol
`
`
`
`
`
`
`
`
`
`random—access protocols (Period C). Suppose the fraction of bandwidth used
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`in Periods A and B is f. The fraction used in Period C is (1 — f). The maximum
`
`
`
`
`
`
`
`
`
`
`
`
`throughput achievable is [100(f+ kmmfi -- 0)]%, where Aswan = 0.36. If we
`
`
`
`
`
`
`
`
`
`
`
`set I = 0.8, the maximum throughput is about 07.2%}' The average throughput
`
`
`
`
`
`
`
`
`
`
`
`is a function that depends very much on the traffic model assumptions.
`
`
`
`
`
`
`
`
`
`
`
`The following simulations show that high link utilization in an environment of
`
`
`
`
`
`
`
`
`
`
`
`
`
`heavy traffic is achievable and the system is stable even under high load con-
`
`
`
`
`
`
`
`
`
`
`
`ditions. Periods A and B are based on reservation and are unconditionally
`
`
`
`
`
`
`
`
`
`
`stable. Stability in Period C is achieved using adaptive retransmission strate-
`gles.
`
`
`
`
`
`
`
`
`
`
`
`
`
`The system modele

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket