[0001] The present invention relates to a wireless networking system and method.
BACKGROUND OF THE INVENTION
[0002] The IEEE 802.11 family of specifications provides a method for wireless transmission
of data between devices. The spectrum assignments in which IEEE 802.11 wireless networks
can be used are a finite resource that is getting more congested as IEEE 802.11 becomes
more popular.
[0003] The IEEE 802.11 standard is not well suited to the situation where two (or more)
unrelated networks are within radio range of each other and use the same radio frequency
(RF) channel. Two or more networks operating on the same RF channel within radio range
of each other increases the probability of packet collisions.
[0004] One technique that has been suggested within the IEEE 802.11 standard to improve
quality of service (QoS) is based on prioritising traffic, i.e. giving one of the
networks prioritised access to the wireless medium.
[0005] IEEE 802.11 provides three channel access methods for providing QoS prioritised traffic.
[0006] The first method (called Enhanced Distributed Channel Access (EDCA)) modifies the
time a station or access point waits between sensing that the wireless medium is not
busy and starting to transmit. The waiting time is modified in such a way to make
higher priority traffic more likely to be the first to be transmitted.
[0007] The second channel access method (called Point Coordination Function (PCF)) is based
on an access point providing stations with contention free periods (CFP) in a period
immediately following the transmission of a beacon frame from the access point. A
polling mechanism is used where an access point grants a transmission opportunity
to a station. All other stations remain silent during a CFP.
[0008] The third channel access method (called Hybrid Coordination Function Controlled Channel
Access (HCCA)) is based on an access point providing stations with contention free
periods. A polling mechanism is used where an access point grants a transmission opportunity
to a station. All other stations remain silent during a CFP.
[0009] United States Patent Application
S/N 10/411,173 (published as
US 2003/0202498) and as
EP1355450 describes an access point for a wireless local area network. The access point is
arranged to service its stations by using a Point Coordination Function (PCF) protocol
and to monitor overlap with neighbouring access points. To mitigate overlap, the access
point and overlapping neighbouring access points synchronise in such a way that the
access point can service its stations in an overlap areas during a certain servicing
time, while the overlapping neighbouring access points are silent, and vice versa.
A silence trade-off mechanism is used to assure that overlapping access points get
their fair share of available bandwidth.
[0010] The following document may be relevant to understanding the present invention: IEEE
Std 802.11, 2007 Edition - Wireless LAN Medium Access Control (MAC) and Physical Layer
(PHY) Specifications.
SUMMARY OF THE INVENTION
[0011] The EDCA system described above is negatively impacted by multiple unrelated networks
within radio range of each other. It suffers from the problem that stations with packets
of the same class (e.g. two stations with a packet of "voice" level priority) will
have the same wait times. This effectively causes these prioritised packets to behave
like best-effort traffic (traffic without a quality of service (QoS) guarantee, that
is delivered as quickly as possible but with no guarantees of throughput or latency).
Multiple unrelated networks within radio range of each other increase the chances
of multiple packets of the same class being ready for transmission at the same time.
[0012] The PCF and HCCA systems described above are also negatively impacted by multiple
unrelated networks within radio range of each other. These systems fail to provide
a CFP if another network is nearby because the AP in the nearby network will not have
scheduled a silence and may cause packet collisions.
[0013] United States Patent Application
S/N 10/411,173 mentioned above uses an iterative algorithm to negotiate an agreement of a time schedule
which is then adhered to. This requires all the access points in the negotiation to
use the same scheduling algorithm or else the iteration would not converge. Moreover,
the Point Coordination Function (PCF) is used to control access to the wireless medium.
Consequently, the servicing times when overlapping access points have to remain silent
must be synchronised with the times and periods of beacon messages sent out by the
access point since a PCF period can only be started at a whole number of beacon intervals.
[0014] According to embodiments of the present invention, in a system including a first
access point serving a first wireless network; and a neighbouring access point serving
a neighbouring wireless network having coverage overlapping with the first wireless
network, wherein the first access point and the neighbouring access point transmit
beacon messages at beacon times that are temporally separated by predetermined beacon
periods, there is provided a method of operating the system, the method including:
the first access point sending a first offer to the neighbouring access point, the
first offer offering a period of silent time to the neighbouring access point during
which period of silent time the first access point silences the first wireless network,
wherein the period of silent time is independent of the beacon times and the beacon
periods.
[0015] Preferably, the method further includes: the neighbouring access point sending an
acceptance of the first offer to the first access point; the first access point receiving
the acceptance; and the first access point silencing the first wireless network.
[0016] Preferably, the first access point silencing the first wireless network includes
the first access point silencing the first wireless network for the duration of the
period of silent time.
[0017] Alternatively, the method further includes: the neighbouring access point sending
an acceptance of the first offer to the first access point; the first access point
receiving the acceptance; and the first access point not honouring the first offer
by not silencing the first wireless network.
[0018] Preferably, the method further includes: the neighbouring access point detecting
that the first access point is not honouring the first offer.
[0019] Preferably, the detecting includes the neighbouring access point detecting data being
transmitted by and/or destined for the first access point.
[0020] Preferably, the detecting includes the neighbouring access point detecting that the
first access point is not sending out instructions to cause the first wireless network
to become silent.
[0021] Preferably, the method further includes: the neighbouring access point sending a
reciprocal offer to the first access point, the reciprocal offer offering a reciprocal
period of silent time during which silent time the neighbouring access point silences
the neighbouring wireless network.
[0022] Preferably, the neighbouring access point sends the reciprocal offer to the first
access point only if the first access point honours the first offer by silencing the
first wireless network.
[0023] Preferably, the neighbouring access point sends the reciprocal offer to the first
access point even if the first access point does not honour the first offer.
[0024] Preferably, the method further includes: the neighbouring access point ignoring failure
of the first access point to honour the first offer before sending the reciprocal
offer to the first access point.
[0025] Preferably, the neighbouring access point arbitrarily ignores the failure of the
first access point to honour the first offer.
[0026] Preferably, the method further includes: the first access point sending an acceptance
of the reciprocal offer to the neighbouring access point; the neighbouring access
point receiving the acceptance; and the neighbouring access point silencing the neighbouring
wireless network.
[0027] Preferably, the neighbouring access point silencing the neighbouring wireless network
includes the neighbouring access point silencing the neighbouring wireless network
for the duration of the reciprocal period of silent time.
[0028] Alternatively, the method further includes: the first access point sending an acceptance
of the reciprocal offer to the neighbouring access point; the neighbouring access
point receiving the acceptance; and the neighbouring access point not honouring the
reciprocal offer by not silencing the neighbouring wireless network.
[0029] Preferably, the method further includes: the first access point detecting that the
neighbouring access point is not honouring the reciprocal offer.
[0030] Preferably, the detecting includes the first access point detecting data being transmitted
by and/or destined for the neighbouring access point.
[0031] Preferably, the detecting includes the first access point detecting that the neighbouring
access point is not sending out instructions to cause the neighbouring wireless network
to become silent.
[0032] Preferably, the method further includes: the first access point sending an additional
offer to the neighbouring access point, the additional offer offering an additional
period of silent time during which silent time the first access point silences the
first wireless network.
[0033] Preferably, the first access point sends the additional offer to the neighbouring
access point only if the neighbouring access point honours the reciprocal offer by
silencing the neighbouring wireless network.
[0034] Preferably, the first access point sends the additional offer to the neighbouring
access point even if the neighbouring access point does not honour the reciprocal
offer.
[0035] Preferably, the method further includes: the first access point ignoring failure
of the neighbouring access point to honour the reciprocal offer before sending the
additional offer to the neighbouring access point.
[0036] Preferably, the first access point arbitrarily ignores the failure of the neighbouring
access point to honour the reciprocal offer.
[0037] Preferably, the method further includes: the first access point sending an additional
offer to the neighbouring access point, the additional offer offering an additional
period of silent time during which silent time the first access point silences the
first wireless network.
[0038] Preferably, the method further includes: the neighbouring access point sending an
acceptance of the additional offer to the first access point; the first access point
receiving the acceptance; and the first access point silencing the first wireless
network.
[0039] Preferably, the first access point silencing the first wireless network includes
the first access point silencing the first wireless network for the duration of the
additional period of silent time.
[0040] Alternatively, the method further includes: the neighbouring access point sending
an acceptance of the additional offer to the first access point; the first access
point receiving the acceptance; and the first access point not honouring the additional
offer by not silencing the first wireless network.
[0041] Preferably, the method further includes: the neighbouring access point detecting
that the first access point is not honouring the additional offer.
[0042] Preferably, the detecting includes the neighbouring access point detecting data being
transmitted by and/or destined for the first access point.
[0043] Preferably, the detecting includes the neighbouring access point detecting that the
first access point is not sending out instructions to cause the first wireless network
to become silent.
[0044] Preferably, the method further includes: the neighbouring access point sending an
additional reciprocal offer to the first access point, the additional reciprocal offer
offering an additional reciprocal period of silent time during which silent time the
neighbouring access point silences the neighbouring wireless network.
[0045] Preferably, the neighbouring access point sends the additional reciprocal offer to
the first access point only if the first access point honours the additional offer
by silencing the first wireless network.
[0046] Preferably, the neighbouring access point sends the additional reciprocal offer to
the first access point even if the first access point does not honour the additional
offer.
[0047] Preferably, the method further includes: the neighbouring access point ignoring failure
of the first access point to honour the additional offer before sending the additional
reciprocal offer to the first access point.
[0048] Preferably, the neighbouring access point arbitrarily ignores the failure of the
first access point to honour the additional offer.
[0049] Preferably, the method further includes: the neighbouring access point sending an
additional reciprocal offer to the first access point, the additional reciprocal offer
offering an additional reciprocal period of silent time during which silent time the
neighbouring access point silences the neighbouring wireless network.
[0050] According to further embodiments of the present invention, there is provided a system
including: a first wireless network; a first access point serving the first wireless
network; a neighbouring wireless network having coverage overlapping with the first
wireless network; and a neighbouring access point serving the neighbouring wireless
network, wherein the first access point and the neighbouring access point are operable
to transmit beacon messages at beacon times that are temporally separated by predetermined
beacon periods, and the first access point is operable to send a first offer to the
neighbouring access point, the first offer offering a period of silent time to the
neighbouring access point during which period of silent time the first access point
silences the first wireless network, wherein the period of silent time is independent
of the beacon times and the beacon periods.
[0051] According to yet further embodiments of the present invention, there is provided
an access point serving a first wireless network, the first wireless network having
coverage overlapping with a neighbouring wireless network, the neighbouring wireless
network being served by a neighbouring access point, wherein the access point and
the neighbouring access point are operable to transmit beacon messages at beacon times
that are temporally separated by predetermined beacon periods, and the access point
is operable to send a first offer to the neighbouring access point, the first offer
offering a period of silent time to the neighbouring access point during which period
of silent time the access point silences the first wireless network, wherein the period
of silent time is independent of the beacon times and the beacon periods.
[0052] The present invention, in embodiments thereof, allows access points in wireless communications
networks that are not controlled by one central management entity and are within radio
range of each other to collaborate their usage of a radio frequency (RF) channel by
sharing time on the wireless medium. This allows one of the networks to grant a slice
of time to another network during which the first network will remain silent. The
recipient network can then use this silent time for its traffic without collisions
from the other network.
[0053] In certain embodiments of the present invention, the system is a collaborative system
whereby a network that benefits from silent time repays the gift by reciprocating
with its own offer of silence. An AP can advertise that it supports collaboration
and can choose to offer silent time to another AP that is also known to support collaboration.
If the offer is accepted, the AP can choose to silence its basic service set (BSS)
for a period of time that was specified in the offer. However, an AP can also choose
to "defect", i.e. an AP offering silence can choose not to honour its offer or an
AP does not have to repay the sacrifice made by the offering AP.
[0054] In certain embodiments of the present invention, a "tit-for-tat" algorithm is used
where collaboration is rewarded by reciprocation and defection is punished by non-collaboration.
For example, a rogue AP that always accepts offers but never reciprocates may stop
receiving offers.
[0055] The present invention, in certain embodiments thereof, is compatible with legacy
equipment; does not reduce the robustness of networks to rogue equipment; and works
across network boundaries (including networks not controlled by one central management
entity.
[0056] The present invention, in certain embodiments thereof, allows and rewards collaboration
but does not provide a new attack vector for a denial of service attack.
[0057] The present invention, in certain embodiments thereof, enhances QoS by allowing collaborating
APs to avoid allocating overlapping contention free periods.
[0058] The present invention, in certain embodiments thereof, optimises time on an RF channel
to remove/reduce the chance of collisions with traffic from other networks. QoS can
therefore be improved.
[0059] The present invention, in certain embodiments thereof, reduces collisions and back-offs
that could cause total throughput to fall below a required level.
[0060] The present invention, in certain embodiments thereof, is able to establish periods
of silence that are independent of the timings and periods of beacon messages sent
out by access points. Thus the silencing of networks is not tied to any particular
channel access mode and is therefore independent of the channel access mode operated
by the networks.
[0061] The present invention, in certain embodiments thereof, does not require all the access
points to share the same scheduling algorithm. Moreover, there is no requirement of
a fixed schedule that has to be adhered to. This is advantageous since the future
demands on the network may not be known in advance.
[0062] The present invention, in certain embodiments thereof, does not involve the negotiation
of a permanent allocation of time. Rather, periods of silence are determined on a
round by round basis. Therefore, the timing and duration of the periods of silence
can advantageously adapt to the changing load and radio conditions of the network.
Moreover, the simplistic and dynamic nature of the determination of the periods of
silence is beneficial especially when the network is heavily loaded and overheads
need to be minimised. The timing and duration of the periods of silence can also adapt
to the changing loads on the networks.
BRIEF DESCRIPTION OF THE DRAWINGS
[0063] The present invention will be understood and appreciated more fully from the following
detailed description, taken in conjunction with the drawings in which:
Figure 1 is a simplified pictorial illustration of a wireless communications network;
Figure 2 is a simplified pictorial illustration of two wireless communication networks;
Figure 3 is a simplified flow chart illustration of a method of access point collaboration
according to an embodiment of the present invention;
Figure 4 is a simplified, pictorial illustration of a residential environment;
Figure 5 is a simplified pictorial illustration of three wireless communication networks;
and
Figure 6 is a simplified pictorial illustration of three wireless communication networks.
DETAILED DESCRIPTION OF EMBODIMENTS
[0064] Embodiments of the present invention will now be described in relation to IEEE 802.11
conformant wireless networks. However, someone skilled in the art will realise that
the invention is equally applicable to other wireless communication networks.
[0065] Some terminology relating to IEEE 802.11 conformant networks and used in the description
that follows will now be given:
[0066] A station (STA) is a device that contains an IEEE 802.11-conformant medium access
control (MAC) and physical layer (PHY) interface to the wireless medium (WM), e.g.
a WiFi network card installed in a personal computer.
[0067] An access point (AP) is an entity that has station functionality, provides a coordination
function and also provides access to distribution services, via the wireless medium
(WM) for associated stations.
[0068] A basic service set (BSS) is the basic building block of an IEEE 802.11 network and
comprises a set of stations controlled by a single coordination function.
[0069] Reference is now made to figure 1 which shows an IEEE 802.11-conformant wireless
network comprising BSS1 101, which has two stations - STA1 103 and STA2 105 - and
an access point AP1 107. In figure 1, BSS1 101 is marked by a circular line which
schematically depicts the coverage area of BSS 1 within which the member stations
of BSS 1 101 may remain in communication.
[0070] Reference is now made to figure 2, which shows the wireless network of figure 1 (including
BSS1 101, STA1 103, STA2 105 and AP1 107) and additionally shows a further, unrelated
IEEE 802.11-conformant wireless network comprising BSS2 201, whose coverage area is
shown as overlapping with the coverage area of BSS1 101. BSS2 comprises two stations
- STA3 203 and STA4 205 - and an access point AP2 207.
[0071] The coverage areas of the two wireless networks shown in figure 2 overlap such that:
+ Radio emissions from AP1 107 in BSS 1 101 are detectable by AP2 207 in BSS2 201;
+ Radio emissions from AP2 207 in BSS2 201 are detectable by AP1 107 in BSS1 101;
+ Radio emissions from STA1 103 and STA2 105 in BSS1 101 are detectable by AP2 207
in BSS2 201;
+ Radio emissions from AP2 207 in BSS2 201 are detectable by STA1 103 and STA2 105
in BSS1 101;
+ Radio emissions from STA4 205 in BSS2 201 are detectable by AP1 107 in BSS1 101;
and
+ Radio emissions from AP1 107 in BSS1 101 are detectable by STA4 205 in BSS2 201.
[0072] It is to be noted that radio emissions from STA3 203 in BSS2 201 would not be detectable
by AP1 107 in BSS1 101, and radio emissions from AP1 107 in BSS 1 101 would not be
detectable by STA3 203 in BSS 201 since STA3 203 does not lie within the coverage
area of BSS 1 101.
[0073] According to certain embodiments of the present invention, the two wireless networks
are assumed to share the same radio frequency (RF) channel and therefore data packet
collisions may occur.
[0074] According to certain embodiments of the present invention, two (or more) APs that
are within radio range of each other (and that are using the same RF channel) are
able to collaborate with each other in order to share time on the shared RF channel.
[0075] Referring to figure 2, the first step of a collaboration process according to the
present embodiment between APs comprises APs advertising that they support collaboration.
This is done by adding some extra information to the management frame of subtype "beacon"
(sent by an AP to announce its presence and described in section 7.2.3.1 of IEEE 802.11,
2007 Edition as mentioned previously) that APs send regularly and/or by adding this
same information to a management frame of subtype "probe response".
[0076] APs define the timing for the entire BSS by transmitting beacons according to the
BeaconPeriod attribute within the AP. This defines a series of target beacon transmission
times (TBTT): exactly a BeaconPeriod time units apart. At each TBTT, the AP schedules
a beacon as the next frame for transmission. The beacon period is included in beacon
and probe response frames, and STAs adopt that beacon period when joining the BSS.
[0077] According to embodiments of the present invention, the extra information that is
added to beacon frames and probe response frames is called an AP Collaboration information
element (IE). [In IEEE 802.11 specifications, an Information Element (IE) is a key-length-value
structure that is used to encapsulate an item of information. All IEs have the same
basic structure, described in section 7.3.2 of IEEE 802.11, 2007 Edition as mentioned
previously.]
[0078] The AP Collaboration IE defines information about the inter-AP collaboration features
supported by the AP. A particular example of the format of the AP Collaboration element
is shown below:
| |
Element ID |
Length |
AP Collaboration Capabilities |
| Octets: |
1 |
1 |
1 |
[0079] The Element ID (used to define the type of information element) is set to a new value
added to the previously specified values in table 7-26 of section 7.3.2 of IEEE 802.11,
2007 Edition as mentioned previously or is set to a vendor proprietary extension value.
The length field (used to specify how many octets occur in the element contents field)
is set to one. A particular example of the format of the AP Collaboration Capabilities
field (the element contents field of the AP Collaboration IE), which is one octet
long (i.e. eight bits long), is shown below:
| Bit |
Capability |
Description |
| 0 |
Time Collaboration |
AP supports CFP Offer action |
| 1-7 |
Reserved |
|
[0080] The Time Collaboration capability (bit 0) is set to true (i.e. the bit is set to
1) if the AP supports sharing of time on the wireless medium and supports the contention
free period (CFP) Offer action (described below). Otherwise, this capability bit is
set to false (i.e. the bit is set to 0).
[0081] An AP can choose to offer silent time (a contention free period) to another AP that
has advertised its support for collaboration. An offer is made by transmitting a CFP
Offer action frame to a recipient AP that supports collaboration. Action frames have
a common structure (described in section 7.2.3.12 of IEEE 802.11-2007) that contains
two octets to indicate the action (the category and action fields) followed by a number
of IEs. A particular example of the structure of a CFP Offer frame is shown below:
| Order |
Information |
| 1 |
Category |
| 2 |
Action |
| 3 |
Quiet |
[0082] The Category field value is set to 1, which indicates that the CFP Offer frame is
a QoS action frame, as described in table 7-24 of section 7.3.1.11 of IEEE 802.11-2007
as mentioned previously.
[0083] The Action field value is set to 4, which indicates that the action is a CFP Offer.
An action field value of 4 is a new action field value added to the previous action
field values as described in table 7-45 of section 7.4.2 of IEEE 802.11-2007 as mentioned
previously.
[0084] The Quiet field comprises a Quiet IE, which is used to define an interval during
which no transmission shall occur in the current RF channel. Hence the Quiet field
contains the time period that is being offered during which the AP will be silent.
The silent period is not related to the beacon timing. In other words, it is independent
of any beacon times (TBTTs) and beacon periods. The format of the Quiet IE is described
in section 7.3.2.23 of IEEE 802.11-2007 as mentioned previously.
[0085] An AP that supports collaboration responds to a CFP Offer frame with a CFP Offer
Response frame. This response contains a copy of the offer and the decision by the
recipient AP to accept or reject this offer. A particular example of the structure
of a CFP Offer Response frame is shown below:
| Order |
Information |
| 1 |
Category |
| 2 |
Action |
| 3 |
Quiet |
| 4 |
Status Code |
[0086] The Category field value is set to 1, which indicates that the CFP Offer frame is
a QoS action frame, as described in table 7-24 of section 7.3.1.11 of IEEE 802.11-2007
as mentioned previously.
[0087] The Action field value is set to 5, which indicates that the action is a CFP Offer
Response. An action field value of 5 is a new action field value added to the previous
action field values as described in table 7-45 of section 7.4.2 of IEEE 802.11-2007
as mentioned previously.
[0088] The Quiet field contains a copy of the Quiet IE received in the CFP Offer frame.
[0089] The Status Code field contains the response to the time period that was offered and
is set to one of the values defined in table 7-22 of section 7.3.1.9 of IEEE 802.11,
2007 Edition as mentioned previously. In the present embodiment, and as a non-limiting
example, the status code contains one of the following values: 0; 37; 38; or 1, which
correspond to the following responses: SUCCESS (i.e. offer accepted); REQUEST DENIED
(i.e. offer declined); INVALID PARAMETERS; or UNSPECIFIED FAILURE.
[0090] If the offer is accepted, the AP that made the offer attempts to silence the BSS
for the quiet interval specified in the offer. In the present embodiment, a Quiet
IE is included in a beacon frame that is transmitted by the AP that is silencing its
BSS. It should be noted that even though the Quiet IE is carried in the beacon frame,
the period of silence is not related to the beacon timing. Moreover, multiple Quiet
IEs can be carried in a single beacon frame.
[0091] In alternative embodiments, if there are stations associated to the access point
that do not support the Quiet IE, the AP employs an alternative method to silence
the BSS by transmitting a frame of type "CF-Poll (no data)". The CF-Poll bit is used
in a frame sent by an AP to a station to poll that station in order to see if it wants
to transmit any frames. A CF-Poll (no data) frame is a frame with the CF-Poll bit
set but with no data payload. The "CF-Poll (no data)" frame is further described in
section 7.1 of IEEE 802.11-2007, as mentioned previously. Preceding the start of the
quiet interval (the start of the quiet interval minus the time required to transmit
the CF-Poll frame), the access point schedules a frame of type "CF-Poll (no data)"
with the Recipient Address field set to the AP's own MAC address and the duration/ID
field set to the duration of the quiet interval. Preferably, the "CF-Poll (no data)"
frame is transmitted at one of the physical layer modulation and encoding schemes
supported by all associated stations, as described in 802.11-2007 in sections 12 to
19. The "CF-Poll (no data)" frame sets a timer in the stations called the NAV, which
activates the virtual carrier sense system of the station, as described in section
9.2.1 in 802.11-2007. A station having an active carrier sense cannot transmit frames
and the desire to silence the BSS is achieved.
[0092] It will be appreciated that other methods of silencing a BSS will be apparent to
someone skilled in the art.
[0093] With reference to figure 3, a method by which AP1 107 decides if it wishes to make
a collaboration offer to another AP and by which any collaboration offer is made will
now be described.
[0094] Starting from step 301, it is assumed that AP1 107 has been active on a particular
RF channel for a sufficient period of time to have received beacons from any other
AP within radio range operating on the same RF channel. For example beacons are typically
transmitted every 100ms, therefore AP1 107 is likely to have received beacons from
nearby APs within a second. In the present embodiment, AP 1 107 receives a beacon
from AP2 207.
[0095] When each new beacon is received, AP 1 checks the contents of the beacon to see if
the AP from which the beacon was received supports collaboration (step 303). In the
present embodiment, AP1 107 checks the contents of the beacon received from AP2 207
(more specifically, AP 1 107 checks the time collaboration capability bit of the AP
collaboration IE that was included in the beacon) and sees that AP2 207 supports collaboration.
[0096] If AP 1 107 does detect an AP that supports collaboration (as in the present embodiment),
AP1 107 then decides whether or not to make an offer of a silent period of time to
that AP (step 305). This decision is based on factors such as the current load being
experienced on the RF channel and the previous history of receiving collaboration
offers from another AP. For example, if the network is heavily loaded and there is
little or no spare time, AP1 107 may decide not to make an offer of a silent period
of time.
[0097] If, on the other hand, none of the APs from which beacons were received support collaboration,
AP1 107 services stations STA1 103 and STA2 105 according to the methods as described
in the IEEE 802.11 standard (step 307).
[0098] It will be remembered that in the present embodiment, AP2 207 supports collaboration
and hence AP 1 107 decides whether or not to make an offer of a silent period of time
to AP2 207.
[0099] If the decision made is to not make an offer, AP1 107 services stations STA1 103
and STA2 105 according to the methods as described in the IEEE 802.11 standard (step
307).
[0100] If, on the other hand, the decision made is to make an offer, AP1 107 sends a CFP
Offer frame (with contents as previously described) to another AP (step 309) - to
AP2 207 in the present embodiment.
[0101] AP1 107 then waits for the recipient AP (AP2 207 in the present embodiment) to reply
to the offer (step 311).
[0102] On receiving the CFP Offer frame from AP1 107, AP2 207 decides whether to accept
or decline the offer and responds to the offer by sending a CFP Offer Response frame
back to AP1 107 (not shown).
[0103] AP1 107 inspects the contents of the CFP Offer Response frame to see if the offer
has been accepted or declined (step 313).
[0104] If the offer has been declined, AP1 107 services stations STA1 103 and STA2 105 according
to the methods as described in the IEEE 802.11 standard (step 307).
[0105] If the offer has been accepted, AP1 107 then decides whether or not to honour the
offer of silence that it has made (step 315). Normally, AP1 107 would honour its offer.
However there are situations where this may not be desirable, such as an unexpectedly
high level of radio interference that has caused a backlog of traffic on the network.
[0106] If AP1 107 decides not to honour the offer, AP1 107 services stations STA1 103 and
STA2 105 according to the methods as described in the IEEE 802.11 standard (step 307).
[0107] If, on the other hand, AP1 107 decides to honour the offer, AP1 107 silences BSS
1 101 for the time period specified in the offer (step 317). Examples of methods to
achieve this have been described previously. It should be noted that some methods
of silencing BSS1 might not be perfect and that traffic might still occur on a network
that has been silenced. An example of such an occurrence is a probe frame sent by
a station when being switched on.
[0108] It will be noted from the above description that an AP can choose to "defect". For
example, AP2 207 does not have to repay the sacrifice of AP1 107; or AP 1 107 can
choose not to honour its offer of silence. In another example of defection, AP1 107
may stop scheduling collaboration intervals or change the value of one or more of:
the Quiet Period field, the Quiet Duration field, and the Quiet Offset field in Quiet
IEs etc.
[0109] Failure to honour an offer of silence can be detected by numerous techniques. For
example, the AP that accepted the offer of silence monitors the beacon frames from
the offering AP to check that it has included one or more Quiet IE in its beacon that
will cause its BSS to become silent during the offered quiet period. Another example
is the AP that accepted the offer of silence monitors the wireless medium during the
silence period. If the accepting AP detects packets going to or from the offering
AP (e.g. by inspection of the source and destination addresses in the frame header),
then the accepting AP knows that the offering AP must have defected from the offer.
Other methods of detecting "defection" include measuring access delay or channel load,
as these should both decrease if the other BSS is silent. Other methods will be apparent
to someone skilled in the art.
[0110] If both AP1 107 and AP2 207 decided to collaborate (i.e. AP1 107 makes an offer to
be silent, the offer is accepted by AP2 207, AP2 207 responds to AP1 107 with its
own offer to be silent and AP1 107 accepts the offer) then both APs (AP1 107 and AP2
207) gain some time on the network while the other AP is silent.
[0111] However, if AP1 107 defects (e.g. does not honour the offer it makes to AP2 207),
then AP1 107 will gain extra time on the network at the expense of AP2 207. If AP2
207 accepts the offer from AP1 (which honours its offer) and then decides to defect
(e.g. by not responding to AP 1 107 with its own offer of silence), then AP2 207 will
gain extra time on the network at the expense of AP 1 107.
[0112] In the present embodiment, no fixed rules are specified for when an AP should make
a CFP Offer or when it should accept or reject an offer. Preferably, a collaboration
algorithm that rewards an AP for providing CFP Offers by reciprocation is used, e.g.
a "tit-for-tat" algorithm, where an AP makes an initial offer of silence and then
only ever makes further offers if it receives an Offer from another AP.
[0113] A "tit-for-tat" collaboration algorithm is based on successive rounds of decision
making (i.e. successive rounds of collaboration) by APs that are taking part. In every
round, a binary decision to collaborate or defect is made by each AP involved in the
collaboration. One round of collaboration comprises AP1 107 making an offer to AP2
207; AP1 107 either collaborating or defecting (by honouring or not honouring such
an offer); AP2 either collaborating or defecting (by making an offer to AP 1 or not
making such an offer or not honouring such an offer). The outcome of each round depends
on the choices made by each AP. Preferably, an AP is configured to adopt the behaviour
adopted by the AP with which it is collaborating in the previous round of collaboration.
In such cases, the table below shows the strategy that the APs adopt in two successive
rounds of collaboration - round n and round n+1:
| Round n |
Round n+1 |
| AP1 |
AP2 |
AP1 |
AP2 |
| Collaborate |
Collaborate |
Collaborate |
Collaborate |
| Collaborate |
Defect |
Defect |
Collaborate |
| Defect |
Collaborate |
Collaborate |
Defect |
| Defect |
Defect |
Defect |
Defect |
[0114] Thus if AP2 107 defects in round n (e.g. by not responding with a reciprocal offer
to an offer from AP1 107), AP1 107 will defect in round n+1 (by not making another
offer or by making an offer and then not honouring the offer). If AP1 107 collaborates
in round n (by making an offer to AP2 207 and honouring the offer), AP2 207 will collaborate
in round n+1 (by responding to the offer from AP1 107 and collaboration by AP1 107
with a reciprocal offer which AP2 subsequently honours) and so on.
[0115] The outcomes for any one round of collaboration are summarised below:
| AP1 |
AP2 |
Outcome |
| Collaborate |
Collaborate |
Both APs get some time on the network while the other one is silent |
| Collaborate |
Defect |
AP2 gains extra network time at the expense of AP1 |
| Defect |
Collaborate |
AP 1 gains extra network time at the expense of AP2 |
| Defect |
Defect |
Both APs exhibit standard 802.11 behaviour |
[0116] Thus an AP that loses out in one round may choose to "defect" in the next round.
This AP will then either gain back its lost time (if the other AP collaborates) or
will adopt standard IEEE 802.11 behaviour.
[0117] If both APs (AP1 107 and AP2 207) both defect in any given round then AP1 107 and
AP2 207 can get locked in an endless case of defection. Therefore in the present embodiment,
both APs are preferably configured to always collaborate in the first round of collaboration.
[0118] Alternatively, a modified "tit-for-tat" algorithm can be used, e.g. "tit-for-two-tats"
where two "defections" are required before retaliation and "tit-for-tat with forgiveness"
where there is an arbitrary/random chance (e.g. 5%) that a "defection" will be ignored.
In yet other embodiments of the present invention, APs may be configured not to check
for the version of defection where an AP chooses not to honour an offer of silence.
Other variations of the "tit-for-tat" algorithm and alternative schemes/rules for
when an AP should make a CFP Offer, when it should accept/reject an offer, and when
it should collaborate/defect will be apparent to someone skilled in the art.
[0119] An example where access point collaboration is useful is in a residential environment
such as the one shown in figure 4. Adjacent houses 401 to 419 on street 421 each have
an AP and multiple stations (not shown). Radio emissions from an AP in house 415 are
detectable in houses 403, 405, 407, 411, 413, 417 and 419. In certain situations there
are an insufficient number of RF channels for each home 401 to 419 to have its own
dedicated RF channel. In such a situation, two or more homes are forced to use the
same RF channel.
[0120] By using AP collaboration, two homes are able to more efficiently make use of the
spectrum by reducing the number of collisions (and the resultant back-off periods)
on the shared RF channel. This increase of efficiency is important when there are
only a small number of channels (e.g. IEEE 802.11 in the 2.4GHz ISM band has only
3 non-overlapping channels) and when large amounts of traffic need to be passed over
the network (e.g. streaming high definition video data).
[0121] In the above described embodiment, AP1 107 was described as silencing BSS1 101 in
response to AP2 207 accepting the offer and AP1 deciding to honour the offer. In alternative
embodiments, AP1 107 may be able to ascertain the location of STAs and other APs and
therefore might choose to silence only certain stations rather than the entire BSS.
This is useful in situations where some of the stations in the BSS may not be in radio
range of the neighbouring BSS even though the AP of the BSS is in radio range.
[0122] The above described embodiment can be also extended beyond two access points collaborating
to a more general case of multiple access points in collaboration. Referring to figure
5, in another embodiment, three networks are shown having overlapping coverage areas
such that BSS 1 101 and BSS2 201 have overlapping coverage areas, BSS2 201 and BSS3
501 have overlapping coverage areas, but BSS1 101 and BSS3 501 do not have overlapping
coverage areas. In such an embodiment, AP2 207 can send a CFP Offer to both AP1 107
and AP3 507 containing an offer of the same period of time. The acceptance and decline
mechanisms previously described will then be as previously described. If both AP1
107 and AP3 507 accept the offer and AP2 207 decides to honour the offer that it made
to both AP1 107 and AP3 507, AP2 207 will silence BSS 201 and then AP1 107 and AP3
507 can both use the RF channel simultaneously without causing collisions with each
other because they do not have overlapping coverage areas.
[0123] Referring now to figure 6, in another embodiment three networks are shown overlapping
such that all three of the networks have overlapping coverage areas with each other.
Following the same approach as described previously, AP2 207 sends identical offers
to both AP1 107 and AP3 507. In this embodiment, if the offer is accepted and honoured,
there is a chance that both AP 1 107 and AP3 507 will consider this a "defection"
from AP2 207 (for failing to honour its offer) because of collisions between BSS1
101 and BSS3 501. In such a situation, the collaboration system is likely to fall
in to the "defection" case in each round of collaboration, causing a fall-back to
standard IEEE 802.11 behaviour.
[0124] It is appreciated that various features of the invention which are, for clarity,
described in the contexts of separate embodiments may also be provided in combination
in a single embodiment. Conversely, various features of the invention which are, for
brevity, described in the context of a single embodiment may also be provided separately
or in any suitable subcombination.
[0125] It will be appreciated by persons skilled in the art that the present invention is
not limited by what has been particularly shown and described hereinabove. Rather
the scope of the invention is defined only by the claims which follow:
1. A method of operating a system comprising a first access point (107) serving a first
wireless network (101); and a neighbouring access point (207) serving a neighbouring
wireless network (201) having coverage overlapping with said first wireless network
(101), wherein said first access point (107) and said neighbouring access point (207)
transmit beacon messages at beacon times that are temporally separated by predetermined
beacon periods, said method comprising:
said first access point (107) sending a first offer to said neighbouring access point
(207), said first offer offering a period of silent time to said neighbouring access
point (207) during which period of silent time said first access point (107) silences
said first wireless network (101),
wherein said period of silent time is independent of said beacon times and said beacon
periods.
2. The method of claim 1, further comprising:
said neighbouring access point (207) sending an acceptance of said first offer to
said first access point (107);
said first access point (107) receiving said acceptance; and
said first access point (107) either:
silencing said first wireless network (101); or
not honouring said first offer by not silencing said first wireless network (101);
AND
further comprising: said neighbouring access point (207) detecting that said first
access point (107) is not honouring said first offer by either: detecting data being
transmitted by and/or destined for said first access point (107); or detecting that
said first access point (107) is not sending out instructions to cause said first
wireless network (101) to become silent.
3. The method of claim 2, further comprising:
said neighbouring access point (207) sending a reciprocal offer to said first access
point (107), said reciprocal offer offering a reciprocal period of silent time during
which silent time said neighbouring access point (207) silences said neighbouring
wireless network (201).
4. The method of claim 3, wherein said neighbouring access point (207) sends said reciprocal
offer to said first access point (107) only if said first access point (107) honours
said first offer by silencing said first wireless network (101); OR
further comprising:
said neighbouring access point (207) ignoring failure of said first access point (107)
to honour said first offer before sending said reciprocal offer to said first access
point (107).
5. The method of claim 3 or 4, further comprising:
said first access point (107) sending an acceptance of said reciprocal offer to said
neighbouring access point (207);
said neighbouring access point (207) receiving said acceptance; and
said neighbouring access point (207) either:
silencing said neighbouring wireless network (201); or
not honouring said reciprocal offer by not silencing said neighbouring wireless network
(201).
6. The method of claim 5, further comprising:
said first access point (107) detecting that said neighbouring access point (207)
is not honouring said reciprocal offer.
7. The method of claim 6, wherein said detecting comprises said first access point (107)
either: detecting data being transmitted by and/or destined for said neighbouring
access point (207); or detecting that said neighbouring access point (207) is not
sending out instructions to cause said neighbouring wireless network (201) to become
silent.
8. The method of any of claims 1 to 7, further comprising:
said first access point (107) sending an additional offer to said neighbouring access
point (207), said additional offer offering an additional period of silent time during
which silent time said first access point (107) silences said first wireless network
(101).
9. The method of claim 8, wherein said first access point (107) sends said additional
offer to said neighbouring access point (207) only if said neighbouring access point
(207) honours said reciprocal offer by silencing said neighbouring wireless network
(201); OR
said first access point (107) ignoring failure of said neighbouring access point (207)
to honour said reciprocal offer before sending said additional offer to said neighbouring
access point (207).
10. The method of claim 8 or 9, further comprising:
said neighbouring access point (207) sending an acceptance of said additional offer
to said first access point (107);
said first access point (107) receiving said acceptance; and
said first access point (107) either:
silencing said first wireless network (101); or
not honouring said additional offer by not silencing said first wireless network (101).
11. The method of claim 10, further comprising: said neighbouring access point (207) detecting
that said first access point (107) is not honouring said additional offer by either:
detecting data being transmitted by and/or destined for said first access point (107);
or detecting that said first access point (107) is not sending out instructions to
cause said first wireless network (101) to become silent.
12. The method of any of claims 1 to 11, further comprising:
said neighbouring access point (207) sending an additional reciprocal offer to said
first access point (107), said additional reciprocal offer offering an additional
reciprocal period of silent time during which silent time said neighbouring access
point (207) silences said neighbouring wireless network (201).
13. The method of claim 12, wherein said neighbouring access point (207) sends said additional
reciprocal offer to said first access point (107) only if said first access point
(107) honours said additional offer by silencing said first wireless network (101);
OR
said neighbouring access point (207) ignoring failure of said first access point (107)
to honour said additional offer before sending said additional reciprocal offer to
said first access point (107).
14. A system comprising:
a first wireless network (101);
a first access point (107) serving said first wireless network (101);
a neighbouring wireless network (201) having coverage overlapping with said first
wireless network (101); and
a neighbouring access point (207) serving said neighbouring wireless network (201),
wherein said first access point (107) and said neighbouring access point (207) are
operable to transmit beacon messages at beacon times that are temporally separated
by predetermined beacon periods, and
said first access point (107) is operable to send a first offer to said neighbouring
access point (207), said first offer offering a period of silent time to said neighbouring
access point (207) during which period of silent time said first access point (107)
silences said first wireless network (101), wherein said period of silent time is
independent of said beacon times and said beacon periods.
15. An access point (107) serving a first wireless network (101), said first wireless
network (101) having coverage overlapping with a neighbouring wireless network (201),
said neighbouring wireless network (201) being served by a neighbouring access point
(207), wherein said access point and said neighbouring access point (207) are operable
to transmit beacon messages at beacon times that are temporally separated by predetermined
beacon periods, and said access point is operable to send a first offer to said neighbouring
access point (207), said first offer offering a period of silent time to said neighbouring
access point (207) during which period of silent time said access point silences said
first wireless network (101), wherein said period of silent time is independent of
said beacon times and said beacon periods.
1. Ein Verfahren zum Betreiben eines Systems, das einen ersten Zugangspunkt (107), welcher
einem ersten drahtlosen Netz (101) dient, und einen benachbarten Zugangspunkt (207),
welcher einem benachbarten drahtlosen Netz (201) mit einer mit dem ersten drahtlosen
Netz (101) überlappenden Abdeckung dient, beinhaltet, wobei der erste Zugangspunkt
(107) und der benachbarte Zugangspunkt (207) zu Bakenzeiten, die durch vorbestimmte
Bakenperioden zeitlich getrennt sind, Bakennachrichten übertragen, wobei das Verfahren
Folgendes beinhaltet:
Senden eines ersten Angebots an den benachbarten Zugangspunkt (207) durch den ersten
Zugangspunkt (107), wobei das erste Angebot dem benachbarten Zugangspunkt (207) eine
Periode an Funkstille anbietet, wobei während dieser Periode an Funkstille der erste
Zugangspunkt (107) das erste drahtlose Netz (101) stilllegt,
wobei die Periode an Funkstille unabhängig von den Bakenzeiten und den Bakenperioden
ist.
2. Verfahren gemäß Anspruch 1, das ferner Folgendes beinhaltet:
Senden einer Annahme des ersten Angebots an den ersten Zugangspunkt (107) durch den
benachbarten Zugangspunkt (207);
Empfangen der Annahme durch den ersten Zugangspunkt (107) und
wobei der erste Zugangspunkt (107) entweder
das erste drahtlose Netz (101) stilllegt oder
das erste Angebot nicht einhält, indem er das erste drahtlose Netz (101) nicht stilllegt;
UND
das ferner Folgendes beinhaltet: Feststellen durch den benachbarten Zugangspunkt (207),
dass der erste Zugangspunkt (107) das erste Angebot nicht einhält, entweder durch
Feststellen, dass Daten von dem ersten Zugangspunkt (107) übertragen werden und/oder
für diesen bestimmt sind, oder Feststellen, dass der erste Zugangspunkt (107) keine
Anweisungen aussendet, um zu bewirken,
dass des erste drahtlose Netz (101) stillgelegt wird.
3. Verfahren gemäß Anspruch 2, das ferner Folgendes beinhaltet:
Senden eines reziproken Angebots an den ersten Zugangspunkt (107) durch den benachbarten
Zugangspunkt (207), wobei das reziproke Angebot eine reziproke Periode an Funkstille
anbietet, wobei während dieser Funkstille der benachbarte Zugangspunkt (207) das benachbarte
drahtlose Netz (201) stilllegt.
4. Verfahren gemäß Anspruch 3, wobei der benachbarte Zugangspunkt (207) das reziproke
Angebot lediglich dann an den ersten Zugangspunkt (107) sendet, wenn der erste Zugangspunkt
(107) das erste Angebot einhält, indem er das erste drahtlose Netz (101) stilllegt;
ODER
das ferner Folgendes beinhaltet:
Ignorieren des Fehlens der Einhaltung des ersten Angebots seitens des ersten Zugangspunkts
(107) durch den benachbarten Zugangspunkt (207), bevor das reziproke Angebot an den
ersten Zugangspunkt (107) gesendet wird.
5. Verfahren gemäß Anspruch 3 oder 4, das ferner Folgendes beinhaltet:
Senden einer Annahme des reziproken Angebots an den benachbarten Zugangspunkt (207)
durch den ersten Zugangspunkt (107);
Empfangen der Annahme durch den benachbarten Zugangspunkt (207) und
wobei der benachbarte Zugangspunkt (207) entweder
das benachbarte drahtlose Netz (201) stilllegt oder
das reziproke Angebot nicht einhält, indem er das benachbarte drahtlose Netz (201)
nicht stilllegt.
6. Verfahren gemäß Anspruch 5, das ferner Folgendes beinhaltet:
Feststellen durch den ersten Zugangspunkt (107), dass der benachbarte Zugangspunkt
(207) das reziproke Angebot nicht einhält.
7. Verfahren gemäß Anspruch 6, wobei das Feststellen beinhaltet, dass der erste Zugangspunkt
(107) entweder feststellt, dass Daten von dem benachbarten Zugangspunkt (207) übertragen
werden und/oder für diesen bestimmt sind, oder feststellt, dass der benachbarte Zugangspunkt
(207) keine Anweisungen aussendet, um zu bewirken, dass das benachbarte drahtlose
Netz (201) stillgelegt wird.
8. Verfahren gemäß einem der Ansprüche 1 bis 7, das ferner Folgendes beinhaltet:
Senden eines zusätzlichen Angebots an den benachbarten Zugangspunkt (207) durch den
ersten Zugangspunkt (107), wobei das zusätzliche Angebot eine zusätzliche Periode
an Funkstille anbietet, wobei während dieser Funkstille der erste Zugangspunkt (107)
das erste drahtlose Netz (101) stilllegt.
9. Verfahren gemäß Anspruch 8, wobei der erste Zugangspunkt (107) das zusätzliche Angebot
lediglich dann an den benachbarten Zugangspunkt (207) sendet, wenn der benachbarte
Zugangspunkt (207) das reziproke Angebot einhält, indem er das benachbarte drahtlose
Netz (201) stilllegt; ODER
wobei der erste Zugangspunkt (107) das Fehlen der Einhaltung des reziproken Angebots
durch den benachbarten Zugangspunkt (207) ignoriert, bevor das zusätzliche Angebot
an den benachbarten Zugangspunkt (207) gesendet wird.
10. Verfahren gemäß Anspruch 8 oder 9, das ferner Folgendes beinhaltet:
Senden einer Annahme des zusätzlichen Angebots an den ersten Zugangspunkt (107) durch
den benachbarten Zugangspunkt (207);
Empfangen der Annahme durch den ersten Zugangspunkt (107) und
wobei der erste Zugangspunkt (107) entweder
das erste drahtlose Netz (101) stilllegt oder
das zusätzliche Angebot nicht einhält, indem er das erste drahtlose Netz (101) nicht
stilllegt.
11. Verfahren gemäß Anspruch 10, das ferner Folgendes beinhaltet: Feststellen durch den
benachbarten Zugangspunkt (207), dass der erste Zugangspunkt (107) das zusätzliche
Angebot nicht einhält, entweder durch Feststellen, dass Daten von dem ersten Zugangspunkt
(107) übertragen werden und/oder für diesen bestimmt sind, oder Feststellen, dass
der erste Zugangspunkt (107) keine Anweisungen aussendet, um zu bewirken, dass das
erste drahtlose Netz (101) stillgelegt wird.
12. Verfahren gemäß einem der Ansprüche 1 bis 11, das ferner Folgendes beinhaltet:
Senden eines zusätzlichen reziproken Angebots an den ersten Zugangspunkt (107) durch
den benachbarten Zugangspunkt (207), wobei das zusätzliche reziproke Angebot eine
zusätzliche reziproke Periode an Funkstille anbietet, wobei während dieser Funkstille
der benachbarte Zugangspunkt (207) das benachbarte drahtlose Netz (201) stilllegt.
13. Verfahren gemäß Anspruch 12, wobei der benachbarte Zugangspunkt (207) das zusätzliche
reziproke Angebot lediglich dann an den ersten Zugangspunkt (107) sendet, wenn der
erste Zugangspunkt (107) das zusätzliche Angebot einhält, indem er das erste drahtlose
Netz (101) stilllegt; ODER
wobei der benachbarte Zugangspunkt (207) das Fehlen der Einhaltung des zusätzlichen
Angebots durch den ersten Zugangspunkt (107) ignoriert, bevor das zusätzliche reziproke
Angebot an den ersten Zugangspunkt (107) gesendet wird.
14. Ein System, das Folgendes beinhaltet:
ein erstes drahtloses Netz (101);
einen ersten Zugangspunkt (107), der dem ersten drahtlosen Netz (101) dient;
ein benachbartes drahtloses Netz (201) mit einer mit dem ersten drahtlosen Netz (101)
überlappenden Abdeckung und
einen benachbarten Zugangspunkt (207), der dem benachbarten drahtlosen Netz (201)
dient;
wobei der erste Zugangspunkt (107) und der benachbarte Zugangspunkt (207) betriebsfähig
sind, um zu Bakenzeiten, die durch vorbestimmte Bakenperioden zeitlich getrennt sind,
Bakennachrichten zu übertragen, und
wobei der erste Zugangspunkt (107) betriebsfähig ist, um ein erstes Angebot an den
benachbarten Zugangspunkt (207) zu senden, wobei das erste Angebot dem benachbarten
Zugangspunkt (207) eine Periode an Funkstille anbietet, wobei während dieser Periode
an Funkstille der erste Zugangspunkt (107) das erste drahtlose Netz (101) stilllegt,
wobei die Periode an Funkstille unabhängig von den Bakenzeiten und den Bakenperioden
ist.
15. Ein Zugangspunkt (107), der einem ersten drahtlosen Netz (101) dient, wobei das erste
drahtlose Netz (101) eine mit einem benachbarten drahtlosen Netz (201) überlappende
Abdeckung aufweist, wobei ein benachbarter Zugangspunkt (207) dem benachbarten drahtlosen
Netz (201) dient, wobei der Zugangspunkt und der benachbarte Zugangspunkt (207) betriebsfähig
sind, um zu Bakenzeiten, die durch vorbestimmte Bakenperioden zeitlich getrennt sind,
Bakennachrichten zu übertragen, und wobei der Zugangspunkt betriebsfähig ist, um ein
erstes Angebot an den benachbarten Zugangspunkt (207) zu senden, wobei das erste Angebot
dem benachbarten Zugangspunkt (207) eine Periode an Funkstille anbietet, wobei während
dieser Periode an Funkstille der Zugangspunkt das erste drahtlose Netz (101) stilllegt,
wobei die Periode an Funkstille unabhängig von den Bakenzeiten und den Bakenperioden
ist.
1. Un procédé d'exploitation d'un système comprenant un premier point d'accès (107) qui
dessert un premier réseau sans fil (101) ; et un point d'accès voisin (207) qui dessert
un réseau sans fil voisin (201) dont la couverture chevauche celle dudit premier réseau
sans fil (101), dans lequel ledit premier point d'accès (107) et ledit point d'accès
voisin (207) transmettent des messages de balise à des temps de balise qui sont temporairement
séparés par des périodes de balise prédéterminées, ledit procédé comprenant :
le fait que ledit premier point d'accès (107) envoie une première offre audit point
d'accès voisin (207), ladite première offre offrant une période de temps silencieux
audit point d'accès voisin (207), période de temps silencieux au cours de laquelle
ledit premier point d'accès (107) impose silence audit premier réseau sans fil (101),
dans lequel ladite période de temps silencieux est indépendante desdits temps de balise
et desdites périodes de balise.
2. Le procédé de la revendication 1, comprenant de plus :
le fait que ledit point d'accès voisin (207) envoie une acceptation de ladite première
offre audit premier point d'accès (107) ;
le fait que ledit premier point d'accès (107) reçoive ladite acceptation ; et
le fait que ledit premier point d'accès (107) soit :
impose silence audit premier réseau sans fil (101) ; soit n'honore pas ladite première
offre en n'imposant pas silence audit premier réseau sans fil (101) ; ET
comprenant de plus : le fait que ledit point d'accès voisin (207) détecte que ledit
premier point d'accès (107) n'honore pas ladite première offre : soit en détectant
des données qui sont transmises par et / ou destinées audit premier point d'accès
(107) ; soit en détectant que ledit premier point d'accès (107) n'envoie pas d'instructions
pour amener ledit premier réseau sans fil (101) à faire silence.
3. Le procédé de la revendication 2, comprenant de plus :
le fait que ledit point d'accès voisin (207) envoie une offre réciproque audit premier
point d'accès (107), ladite offre réciproque offrant une période réciproque de temps
silencieux, temps silencieux au cours duquel ledit point d'accès voisin (207) impose
silence audit réseau sans fil voisin (201).
4. Le procédé de la revendication 3, dans lequel ledit point d'accès voisin (207) envoie
ladite offre réciproque audit premier point d'accès (107) seulement si ledit premier
point d'accès (107) honore ladite première offre en imposant silence audit premier
réseau sans fil (101); OU
comprenant de plus :
le fait que ledit point d'accès voisin (207) ignore le manquement dudit premier point
d'accès (107) à honorer ladite première offre avant d'envoyer ladite offre réciproque
audit premier point d'accès (107).
5. Le procédé de la revendication 3 ou de la revendication 4, comprenant de plus :
le fait que ledit premier point d'accès (107) envoie une acceptation de ladite offre
réciproque audit point d'accès voisin (207) ;
le fait que ledit point d'accès voisin (207) reçoive ladite acceptation ; et
le fait que ledit point d'accès voisin (207) soit :
impose silence audit réseau sans fil voisin (201) ; soit n'honore pas ladite offre
réciproque en n'imposant pas silence audit réseau sans fil voisin (201).
6. Le procédé de la revendication 5, comprenant de plus :
le fait que ledit premier point d'accès (107) détecte que ledit point d'accès voisin
(207) n'honore pas ladite offre réciproque.
7. Le procédé de la revendication 6, dans lequel ladite détection comprend le fait que
ledit premier point d'accès (107) : soit détecte des données qui sont transmises par
et / ou destinées audit point d'accès voisin (207) ; soit détecte que ledit point
d'accès voisin (207) n'envoie pas d'instructions pour amener ledit réseau sans fil
voisin (201) à faire silence.
8. Le procédé de n'importe lesquelles des revendications 1 à 7, comprenant de plus :
le fait que ledit premier point d'accès (107) envoie une offre additionnelle audit
point d'accès voisin (207), ladite offre additionnelle offrant une période additionnelle
de temps silencieux, temps silencieux au cours duquel ledit premier point d'accès
(107) impose silence audit premier réseau sans fil (101).
9. Le procédé de la revendication 8, dans lequel ledit premier point d'accès (107) envoie
ladite offre additionnelle audit point d'accès voisin (207) seulement si ledit point
d'accès voisin (207) honore ladite offre réciproque en imposant silence audit réseau
sans fil voisin (201) ; OU
ledit premier point d'accès (107) ignore le manquement dudit point d'accès voisin
(207) à honorer ladite offre réciproque avant d'envoyer ladite offre additionnelle
audit point d'accès voisin (207).
10. Le procédé de la revendication 8 ou de la revendication 9, comprenant de plus :
le fait que ledit point d'accès voisin (207) envoie une acceptation de ladite offre
additionnelle audit premier point d'accès (107) ;
le fait que ledit premier point d'accès (107) reçoive ladite acceptation ; et
le fait que ledit premier point d'accès (107) soit :
impose silence audit premier réseau sans fil (101) ; soit n'honore pas ladite offre
additionnelle en n'imposant pas silence audit premier réseau sans fil (101).
11. Le procédé de la revendication 10, comprenant de plus : le fait que ledit point d'accès
voisin (207) détecte que ledit premier point d'accès (107) n'honore pas ladite offre
additionnelle : soit en détectant des données qui sont transmises par et / ou destinées
audit premier point d'accès (107) ; soit en détectant que ledit premier point d'accès
(107) n'envoie pas d'instructions pour amener ledit premier réseau sans fil (101)
à faire silence.
12. Le procédé de n'importe lesquelles des revendications 1 à 11, comprenant de plus :
le fait que ledit point d'accès voisin (207) envoie une offre réciproque additionnelle
audit premier point d'accès (107), ladite offre réciproque additionnelle offrant une
période réciproque additionnelle de temps silencieux, temps silencieux au cours duquel
ledit point d'accès voisin (207) impose silence audit réseau sans fil voisin (201).
13. Le procédé de la revendication 12, dans lequel ledit point d'accès voisin (207) envoie
ladite offre réciproque additionnelle audit premier point d'accès (107) seulement
si ledit premier point d'accès (107) honore ladite offre additionnelle en imposant
silence audit premier réseau sans fil (101) ; OU
ledit point d'accès voisin (207) ignore le manquement dudit premier point d'accès
(107) à honorer ladite offre additionnelle avant d'envoyer ladite offre réciproque
additionnelle audit premier point d'accès (107).
14. Un système comprenant:
un premier réseau sans fil (101) ;
un premier point d'accès (107) desservant ledit premier réseau sans fil (101) ;
un réseau sans fil voisin (201) dont la couverture chevauche celle dudit premier réseau
sans fil (101) ; et
un point d'accès voisin (207) desservant ledit réseau sans fil voisin (201),
dans lequel ledit premier point d'accès (107) et ledit point d'accès voisin (207)
sont exploitables pour transmettre des messages de balise à des temps de balise qui
sont temporairement séparés par des périodes de balise prédéterminées, et
ledit premier point d'accès (107) est exploitable pour envoyer une première offre
audit point d'accès voisin (207), ladite première offre offrant une période de temps
silencieux audit point d'accès voisin (207), période de temps silencieux au cours
de laquelle ledit premier point d'accès (107) impose silence audit premier réseau
sans fil (101), dans lequel ladite période de temps silencieux est indépendante desdits
temps de balise et desdites périodes de balise.
15. Un point d'accès (107) desservant un premier réseau sans fil (101), ledit premier
réseau sans fil (101) ayant une couverture qui chevauche celle d'un réseau sans fil
voisin (201), ledit réseau sans fil voisin (201) étant desservi par un point d'accès
voisin (207), où ledit point d'accès et ledit point d'accès voisin (207) sont exploitables
pour transmettre des messages de balise à des temps de balise qui sont temporairement
séparés par des périodes de balise prédéterminées, et ledit point d'accès est exploitable
pour envoyer une première offre audit point d'accès voisin (207), ladite première
offre offrant une période de temps silencieux audit point d'accès voisin (207), période
de temps silencieux au cours de laquelle ledit point d'accès impose silence audit
premier réseau sans fil (101), dans lequel ladite période de temps silencieux est
indépendante desdits temps de balise et desdites périodes de balise.