WO2002028024A2 - Architecture for a wireless local area network node - Google Patents

Architecture for a wireless local area network node Download PDF

Info

Publication number
WO2002028024A2
WO2002028024A2 PCT/US2001/040585 US0140585W WO0228024A2 WO 2002028024 A2 WO2002028024 A2 WO 2002028024A2 US 0140585 W US0140585 W US 0140585W WO 0228024 A2 WO0228024 A2 WO 0228024A2
Authority
WO
WIPO (PCT)
Prior art keywords
layer
mac
software
host
hardware
Prior art date
Application number
PCT/US2001/040585
Other languages
French (fr)
Other versions
WO2002028024A3 (en
Inventor
Rajugopal R. Gubbi
Original Assignee
Sharewave, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sharewave, Inc. filed Critical Sharewave, Inc.
Priority to AU2001257624A priority Critical patent/AU2001257624A1/en
Publication of WO2002028024A2 publication Critical patent/WO2002028024A2/en
Publication of WO2002028024A3 publication Critical patent/WO2002028024A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/324Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the data link layer [OSI layer 2], e.g. HDLC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W80/00Wireless network protocols or protocol adaptations to wireless operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • the present invention relates to the field of wireless computer networks and, in particular, to the hardware and software architectures for a node to be used in such a network, especially where the network operates according to the protocol specified in the IEEE Standard 802.11, and variants thereof.
  • WLAN wireless LAN
  • the majority of the WLAN products available in the marketplace today are proprietary spread spectrum solutions targeting vertical applications operating in the 900MHz and 2.4GHz frequency bands. These products include wireless adapters and access points in PCMCIA, ISA and custom PC board platforms.
  • Proprietary solutions for some applications are beneficial, especially for those requiring market differentiation or customization of a wireless LAN network.
  • proprietary solutions are typically customized and constrain end users into purchasing products from a single equipment supplier.
  • the advantage of standards-based products is that users can choose from a number of vendors that provide compatible products. This increases competition and provides the potential for lower cost products. Thus, interoperability, low cost and stimulation of market demand are some of the advantages that standards-based solutions offer.
  • Ad-hoc is a simple network where communications are established between multiple stations in a given coverage area without the use of an access point or server.
  • the standard specifies the etiquette or protocol that each station must observe so that they all have fair access to the wireless communication link. It also provides schemes for arbitrating requests to use the communication link to ensure that throughput is maximized for all users.
  • client/server networks use an access point that controls the allocation of bandwidth (i.e., transmission times) for all stations.
  • the access point may also be used to handle traffic to and from a wired or wireless backbone. This arrangement allows for point coordination of all of the stations in the network and ensures proper handling of the data traffic as the access point routes data between the stations and to and from the network.
  • WLANs controlled by a central access point will provide better throughput performance.
  • the IEEE 802.11 standard does not specify technology or implementation but simply provides specifications for the physical layer and Media Access Control (MAC) layer of a network.
  • the standard thus allows for manufacturers of wireless LAN radio equipment to build interoperable network equipment, while still providing design freedom for these vendors to choose desired implementations.
  • the physical layer (or phy) in any network defines the modulation and signaling characteristics for the transmission of data.
  • two RF (radio frequency) and one infrared transmission methods are defined.
  • RF methods are considered, but in general the schemes described herein may be equally applicable to infrared transmissions.
  • Operation of a WLAN in unlicensed RF bands requires the use of spread spectrum modulation to meet the requirements for operation in most countries.
  • the RF transmission standards set forth in the 802.11 standard are Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS).
  • Both architectures are defined for operation in the 2.4GHz frequency band, typically occupying the 83 MHz of bandwidth from 2.400 GHz to 2.483 GHz.
  • Differential band phase shift keying (DBPSK) and differential quadrature phase shift keying (DQPSK) are the modulation techniques employed for the DSSS networks.
  • Frequency hopping networks use 2-4 level Gaussian FSK (frequency shift keying) as the modulation signaling method.
  • the physical layer data rate for FHSS systems is 1 Mbps.
  • For DSSS systems both 1 Mbps and 2 Mbps data rates are supported.
  • the choice between FHSS and DSSS will depend on a number of factors related to the users application and the environment that the system will be operating within.
  • the DSSS physical layer uses an 11-bit Barker code Sequence to spread the data before it is transmitted. Each bit transmitted is modulated by the 11 -bit sequence. This process spreads the RF energy across a wider bandwidth than would be otherwise required to transmit the raw data.
  • the processing gain of the system is defined as lOx the log of the ratio of spreading rate (also know as the chip rate) to the data.
  • the receiver "despreads" the received signal to recover the original data.
  • the advantage of this technique is that it reduces the effect of narrowband sources of interference.
  • the spreading architecture used in the direct sequence physical layer should not be confused with code division multiple access (CDMA) networks. All 802.11 compliant products utilize the same pseudorandom (PN) code and therefore do not have a set of codes available as is required for CDMA operation.
  • PN pseudorandom
  • the FHSS physical layer has 22 hop patterns to choose from.
  • the frequency hop physical layer is required to hop across the 2.4GHz band covering 79 channels. Each channel occupies IMhz of bandwidth and transmitters must hop at a specified minimum rate (2.5 hops per second in the United States).
  • Each of the physical layers use their own unique header to synchronize with the receiver and to determine the signal modulation format and data packet length.
  • the physical layer headers are always transmitted at 1Mbps. Predefined fields in the headers provide the option to increase the data rate to 2 Mbps for the actual data packet.
  • the MAC layer specification for the 802.11 standard has similarities to the 802.3 Ethernet wired line standard.
  • 802.11 networks use a protocol scheme know as carrier- sense, multiple access, collision avoidance (CSMA/CA). This protocol seeks to avoid data collisions instead of detecting them such as the algorithm used in the 802.3 standard. It is difficult to detect collisions in an RF transmission network and it is for this reason that collision avoidance is used.
  • CSMA/CA carrier- sense, multiple access, collision avoidance
  • the MAC layer operates together with the physical layer by sampling the energy over the medium transmitting data.
  • the physical layer uses a clear channel assessment (CCA) algorithm to determine if the channel is clear. This is accomplished by measuring the RF energy at the antenna and determining the strength of the received signal. This measured signal is commonly known as RSSI. If the received signal strength is below a specified threshold the channel is declared clear and the MAC layer is given the clear channel status for data transmission. If the RF energy is above the threshold, data transmissions are deferred in accordance with the protocol rules.
  • CCA clear channel assessment
  • Carrier sense can be used to determine if the channel is available. This technique is more selective because it verifies that the signal is the same carrier type as 802.11 transmitters. The best method to use depends upon the levels of interference in the operating environment.
  • the CSMA/CA protocol allows for options the can minimize collisions by using request to send (RTS), clear-to-send (CTS), data and acknowledge (ACK) transmission frames, in a sequential fashion.
  • RTS request to send
  • CTS clear-to-send
  • ACK data and acknowledge
  • Communications are established when one of the wireless nodes sends a short message RTS frame.
  • the RTS frame includes the destination and the length of message.
  • the message duration is known as the network allocation vector (N AV).
  • NAV network allocation vector
  • the NAV alerts all others in the network, to back off the communication link for the duration of the transmission.
  • the receiving station issues a CTS frame which echoes the senders address and the NAV. If the CTS frame is not received, it is assumed that a collision occurred and the RTS process starts over. After the data frame is received, an ACK frame is sent back verifying a successful data transmission.
  • a common limitation with wireless LAN systems is the "hidden node" problem. This can disrupt a significant volume of the communication traffic in a highly loaded LAN environment. It occurs when there is a station in a service set that cannot detect the transmission of another station to detect that the media is busy. In such cases two or more stations that are unaware of one another's transmissions may try to transmit at the same time to another station that can "hear" more than one of the transmitting stations.
  • the use of RTS, CTS, Data and ACK sequences helps prevent the disruptions caused by this problem.
  • the 802.11 standard defines practices that ensure network interoperability, however, as indicated above, the standard does not specify any particular implementation details. For example, the 802.11 standard makes no mention of how protocol functions should be divided between hardware and software operations in an 802.11 compliant product. Such decisions are left to product vendors.
  • a medium access control (MAC) layer for a node of a wireless local area network which may be used in embedded, host and stand-alone applications, includes a hardware layer and a software layer.
  • the hardware layer is configured to perform time- critical tasks and the software layer is configured to perform non-time critical tasks.
  • the software layer includes multiple modules, such as one or more of a host communication agent, a bridging layer, a network management support module, a SBM-to-TAME conversion module, and a rate estimation module.
  • the software layer acts as the source of and the destination of MAC Service Data Units and is configured as a hierarchical structure in which functional unit blocks for associated elements of the hardware layer communicate with an application layer through respective device drivers and managers. Device drivers and managers communicate through a device manager layer. In a host-based configuration, all communication layers above the MAC layer run on a host. BRIEF DESCRIPTION OF THE DRAWINGS
  • Figure 1 illustrates a topology/connectivity diagram showing an example scenario for wireless local area network devices configured in accordance with an embodiment of the present invention.
  • Figure 2 illustrates a hardware block diagram layout for wireless local area network devices configured in accordance with an embodiment of the present invention.
  • Figure 3 illustrates a system block diagram for a host-based application of an 802. He MAC for wireless local area network devices configured in accordance with an embodiment of the present invention.
  • Figure 4 illustrates a system block diagram for an embedded application of an 802. He MAC for wireless local area network devices configured in accordance with an embodiment of the present invention.
  • Figure 5 is a software context diagram for wireless local area network devices configured in accordance with an embodiment of the present invention.
  • Figure 6 illustrates an exemplary architecture for embedded software for wireless local area network devices configured in accordance with an embodiment of the present invention.
  • Figure 7 illustrates the relationships between different layers within a MAC for wireless local area network devices configured in accordance with an embodiment of the present invention.
  • a system (e.g., hardware and software) architecture for wireless local area network devices is disclosed herein. More specifically, examples of hardware and software functionality (and division of labor there between) for Quality of Service (QoS)-based computer network devices that incorporate 802.11 -compliant MACs are discussed herein.
  • QoS Quality of Service
  • FIG. 1 A system (e.g., hardware and software) architecture for wireless local area network devices is disclosed herein. More specifically, examples of hardware and software functionality (and division of labor there between) for Quality of Service (QoS)-based computer network devices that incorporate 802.11 -compliant MACs are discussed herein.
  • QoS Quality of Service
  • ASIC Application specific integrated circuit
  • EPC Enhanced PC that supports multimedia streams
  • ESTA Enhanced STA that supports multimedia streams
  • SMAC A MAC hardware accelerator for the 802.11 protocol in an
  • ASIC SITARA A MAC hardware accelerator for the 802. He (multimedia) protocol in an ASIC
  • Device/node same as station (as that term is used in the 802.11 standard).
  • Firmware/software a computer-readable set of instructions or program that is executed by a control processor, including drivers and other functions.
  • Driver an agent in the software responsible for the operation of a particular FUB in an ASIC.
  • Host software a set of computer-readable instructions (i.e., a program) that is executed by a host processor including drivers and applications
  • Host driver an agent in the host software responsible for the operation of a particular interface with other hardware attached to the host.
  • Host protocol driver a driver in the host software responsible for providing
  • the system architecture described herein is intended for use with 802. He- compliant devices with support for multimedia streaming and Quality of Service (QoS) as detailed in the 802. He standard promulgated by the IEEE. More specifically, the devices described herein include an ASIC with enhancements to the 802.11 MAC, called SMAC, to support the proposed IEEE 802. He standard.
  • the ASIC includes a FUB configured to provide support for QoS operations; this FUB is referred to as a SITARA.
  • the software running on the ASIC includes a MAC layer, a bridging layer, network management support and other product-related segments such as an Ethernet driver, a PCI/PCMCIA/USB driver, Flash ROM support for configuration information storage, etc. This description addresses both a host-based and embedded application of the proposed scheme.
  • NICs network interface cards
  • bridges and gateway products can be realized using either of these configurations. While a NIC constitutes a host-based application, a bridge is an embedded application.
  • a gateway can be realized either as a host-based application, e.g., using a two-processor approach, or as an embedded application, e.g., using just an ASIC for both MAC and higher layer operations. These different applications are described in more detail below.
  • target platforms include enhanced stations (i.e., stations that comply with the 802.11 standard and that are enhanced for multimedia operations in accordance with the schemes described herein), enhanced stations capable of being enhanced point coordinators, and enhanced point coordinators themselves.
  • Such devices may be employed in a WLAN 10 as a gateway 12 or other node 14, one or more of which may act as a bridge to other networks (e.g., via Ethernet connections).
  • the nodes are configured for multimedia operations, applications such as streaming video and/or audio, and interactive game playing may be supported, as well as more traditional applications such as file transfer and voice transport. All communications between nodes take place over wireless links 16. Bridging operations may utilize wired or wireless links 18.
  • the functions of the 802. He MAC may be implemented partly in software and partly in hardware.
  • a preferred practice is to implement any function that is time critical in the 802. He protocol in hardware, thus achieving predictable timing and making the software easier to write, maintain and enhance.
  • events that require a response within a few hundred microseconds ( ⁇ s) and/or occur more frequently than say 500 times per second (i.e., within a 2 msec interval) may be considered time critical.
  • a MAC hardware accelerator configured in accordance with the present teachings should support the transmission of sequences of multimedia protocol data units (MPDUs), together with related timing, without any frame-by-frame software interaction.
  • the hardware should not have the burden of additional buffering, other than what is already provided by software, of the entire frames' data before transmission.
  • the MAC-module in software interacts with the MAC hardware to prepare queues of frames to transmit, analyze and deliver the received frames.
  • the 802. He retry rules, segmentation and re-assembly, timing generation and management functions are performed largely in software.
  • the device 20 includes an ASIC 22, system memory (e.g., RAM) 24, boot/configuration memory (e.g., flash-ROM or PROM) 26, a baseband processor (e.g., to provide 802. Ha or 802. lib functionality/compatibility) 28, an RF section 30, a host interface 32, and an external control bus interface 34.
  • system memory e.g., RAM
  • boot/configuration memory e.g., flash-ROM or PROM
  • a baseband processor e.g., to provide 802. Ha or 802. lib functionality/compatibility
  • RF section 30 e.g., to provide 802. Ha or 802. lib functionality/compatibility
  • host interface 32 e.g., 802. Ha or 802. lib functionality/compatibility
  • Other components such as Ethernet Phys and related connectors 36 may also be provided.
  • the baseband processor 28 and the RF section 30 may either be provided on the same circuit board as the ASIC 22 or they may be provided as part of a daughter radio board
  • ASIC 22 includes a control processor core (e.g., an ARM processor core as is customary in ASIC applications) and related circuitry 38, a memory controller 40, and various functional unit blocks (FUBs) for PCI/PCMCIA/USB ports 42, Ethernet ports 44, and the 802. He MAC 46.
  • the ASIC 22 may also include a configuration and general purpose input output (GPIO) port 48 for functions such as a status display through one or more LEDs, and an external connector bus (ECB) interface 50 that can be used to provide support for other devices such as a second Ethernet connection, an HPNA connection, or other MACs such as HiperLan2 and IEEE- 1394. Further, an error correction codec 54 may be included.
  • Internal busses (not shown) couple the elements of ASIC 22 to the host processor core 38 in the customary fashion.
  • WLAN devices are host-based products.
  • a network interface card (NIC) is a good example of a host- based application for WLAN devices configured in accordance with the present invention.
  • a NIC is always attached to a host and provides 802. He wireless network interface to that host.
  • a personal computer is an example of a host in this configuration.
  • the NIC is composed of an ASIC 22, a NIC hardware board, software (illustrated as a firmware application and MAC module) for ASIC 22, an NDIS (or similar) driver (usually found in the host) and the network management software (also found in the host).
  • the system block diagram for a NIC 60 with personal computer as host 62 is shown in Fig re 3. All communication layers above the
  • MAC such as TCP IP and higher, layers
  • TCP IP Transmission Control Protocol
  • layers are envisaged to be running on the host 62.
  • the MAC API is appropriately programmed by the software application.
  • the software application layer consists of multiple modules including a host communication agent, network management support, SBM-to-TAME conversion, rate estimation module, etc.
  • the software application can be seen as the source of and the destination of MAC Service Data Units (MSDUs) from the 802. He MAC.
  • MSDUs MAC Service Data Units
  • the host 62 supports an NDIS driver, which may be a thin layer passing frames between the host and the NIC, and making basic MAC management decisions.
  • the network management software may be an application program running on the host 62, which helps in device installation and device management. Note that in a Gateway product implemented using two processors, one host processor may be used for router applications and an ASIC 22 may be used as a wireless interface. In the illustrated application, the host processor 62 runs the software necessary for network management and provides a driver that is functionally similar to an NDIS driver for communication with the NIC.
  • a bridge is a good example of an embedded application of the MAC.
  • a bridge is a layer-2 device connecting a wired network (e.g., either Ethernet or HPNA) to an 802. He (i.e.. wireless) network.
  • a bridge application 65 includes an ASIC 22, a hardware board, and software for ASIC 22 including the 802. He MAC module and the network management module.
  • the system block diagram for a bridge 65 is shown in Figure 4. No communication layers above the MAC (such as
  • TCP/IP TCP/IP
  • a gateway device implemented using single ASIC 22, as an embedded application, the higher layers are present and running on ASIC 22.
  • the software application layer for the bridge 65 includes a bridging module and embedded network management module along with the modules such as SBM, if necessary, SBM-to-TAME conversion, rate estimation, etc. that were present in the NIC configuration. Along with these modules, the software in a bridge 65 contains a driver for the Ethernet FUB instead of the driver for the host interface FUB. As in the host- based application, the software application can be considered the source of and the destination of MSDUs.
  • control frames received across the 802. He MAC are handled by the hardware upon reception and all frames to be transmitted are constructed by the software, except those control frames (CF) and acknowledgement (Ack) frames transmitted as immediate responses (within xIFS) to the received frames. These latter control and ack frames are constructed by the hardware.
  • CF- Ack notification (or a failure notification) is provided from hardware to software as applicable.
  • the software context diagram for the present scheme is shown in Figure 5.
  • the hardware accelerator (SITARA) performs the time critical tasks and expects the rest of the tasks to be performed either in the embedded software or in the host software.
  • the hardware does not take inter-packet decisions by itself unless it is instructed to do so.
  • the embedded software is expected to provide all the control information to the hardware and additionally indicate the action to be taken in cases such as a transmission failure.
  • This control information may be included in a transmit-frame-header structure defined for SITARA and some of the action information could be passed in control registers of SITARA.
  • the hardware accelerator passes received information such as data and events, including timer events (time outs and the like), scheduled transmission events and completion reports/errors and beacon events to the embedded software.
  • the embedded software passes CFP/CP control messages, timer settings, poll and transmission control information and the actual packets for transmission to the hardware.
  • the embedded and host processor software layers exchange MIB updates and values, stream connect/disconnect information, channel information, flow control information and transmission and reception information between one another.
  • the MAC software thus communicates with two entities: the MAC hardware and the host.
  • the external interfaces to the MAC software are the MAC hardware interfaces and the host interfaces.
  • the host is the source of new MIB updates, transmission requests and the stream connect/disconnect events arising out of reception of RSVP-like signaling packets.
  • the embedded software provides receive indications, values of MIB variables, channel status changes and the stream connect/disconnect events arising out of events within the MAC or upon such instruction from EAP/EPC.
  • the host software includes a host software driver (e.g., an NDIS driver on a Windows environment) and a network management application.
  • the host software driver includes interfaces to higher layers, a D/SBM layer and a hardware abstraction layer to interface with the ASIC.
  • the host software driver In order to make the best use of the streaming support in the 802. He standard, the host software driver should be capable of stream classification. Hence, depending on the QoS requirement it should be possible to flow control each stream differently over the hardware interface to the ASIC.
  • the MAC hardware is the source of received data and a number of different types of events, such as a receive packet event, transmit failure/success events and timer events.
  • the MAC software provides formatted packets and additional control, if needed, in the hardware registers so that the hardware can transmit a sequence of frames.
  • the MAC software On the transmit side, it is the responsibility of the MAC software to deal with all the management frames, segmentation, stream/priority classification, packet queuing and ordering, into a transmit table for the hardware. The hardware will then perform the transmit operations according to the information in the table.
  • the MAC software handles tasks like constructing delayed-Ack frames and delivering data packets to the host. Additionally the MAC software performs all non- time-critical tasks such as stream connection/disconnection process, channel status estimation/analysis, time allocation per D/SBM request, etc.
  • Figure 7 illustrates relationships between these different layers within the MAC.
  • the embedded software includes the MAC module, an embedded application layer and a host interface.
  • An architecture for the embedded software for the ASIC is shown in Figure 6.
  • the figure also shows the possibility of other device drivers (such as an Ethernet driver) that can be present in the embedded software.
  • other device drivers such as an Ethernet driver
  • the device drivers interface with the hardware FUBs on one side and with their respective manager entities through the device manager layer on the other side.
  • the device manager provides uniform interfaces so that the device driver and its manager can be developed in parallel.
  • the embedded application layer for a host-based application includes connections between the host interface manager and the WLAN manager.

Abstract

A medium access control (MAC) layer for a node of a wireless local area network, which may be used in embedded, host and stand-alone applications, includes a hardware layer and a software layer. The hardware layer is configured to perform time-critical tasks and the software layer is configured to perform non-time critical tasks. The software layer includes multiple modules, such as one or more of a host communication agent, a bridging layer, a network management support module, a SBM-t-TAME conversion module, and a rate estimation module. Further, the software layer acts as the source of and the destination of MAC Service Data Units and is configured as a hierarchical structure in which functional unit blocks for associated elements of the hardware layer communicate with an application layer through respective device drivers and managers. Device drivers and managers communicate through a device manager layer.

Description

Architecture for a Wireless Local Area Network Node
FIELD OF THE INVENTION
The present invention relates to the field of wireless computer networks and, in particular, to the hardware and software architectures for a node to be used in such a network, especially where the network operates according to the protocol specified in the IEEE Standard 802.11, and variants thereof.
BACKGROUND
The Institute of Electrical and Electronic Engineers (IEEE) manages most of the worldwide standards for computer local area networks (LANs) and its IEEE 802.11 Standard represents the first standard for wireless LAN (WLAN) products. The majority of the WLAN products available in the marketplace today are proprietary spread spectrum solutions targeting vertical applications operating in the 900MHz and 2.4GHz frequency bands. These products include wireless adapters and access points in PCMCIA, ISA and custom PC board platforms. Proprietary solutions for some applications are beneficial, especially for those requiring market differentiation or customization of a wireless LAN network. However, proprietary solutions are typically customized and constrain end users into purchasing products from a single equipment supplier. The advantage of standards-based products is that users can choose from a number of vendors that provide compatible products. This increases competition and provides the potential for lower cost products. Thus, interoperability, low cost and stimulation of market demand are some of the advantages that standards-based solutions offer.
The IEEE 802.11 standard defines the protocol for two types of networks: Ad- hoc and client/server networks. An Ad-hoc network is a simple network where communications are established between multiple stations in a given coverage area without the use of an access point or server. The standard specifies the etiquette or protocol that each station must observe so that they all have fair access to the wireless communication link. It also provides schemes for arbitrating requests to use the communication link to ensure that throughput is maximized for all users. In contrast, client/server networks use an access point that controls the allocation of bandwidth (i.e., transmission times) for all stations. The access point may also be used to handle traffic to and from a wired or wireless backbone. This arrangement allows for point coordination of all of the stations in the network and ensures proper handling of the data traffic as the access point routes data between the stations and to and from the network. Typically WLANs controlled by a central access point will provide better throughput performance.
The IEEE 802.11 standard does not specify technology or implementation but simply provides specifications for the physical layer and Media Access Control (MAC) layer of a network. The standard thus allows for manufacturers of wireless LAN radio equipment to build interoperable network equipment, while still providing design freedom for these vendors to choose desired implementations.
The physical layer (or phy) in any network defines the modulation and signaling characteristics for the transmission of data. At the physical layer of an 802.11- compliant network, two RF (radio frequency) and one infrared transmission methods are defined. For purposes of this discussion, only the RF methods are considered, but in general the schemes described herein may be equally applicable to infrared transmissions. Operation of a WLAN in unlicensed RF bands requires the use of spread spectrum modulation to meet the requirements for operation in most countries. The RF transmission standards set forth in the 802.11 standard are Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS). Both architectures are defined for operation in the 2.4GHz frequency band, typically occupying the 83 MHz of bandwidth from 2.400 GHz to 2.483 GHz. Differential band phase shift keying (DBPSK) and differential quadrature phase shift keying (DQPSK) are the modulation techniques employed for the DSSS networks. Frequency hopping networks use 2-4 level Gaussian FSK (frequency shift keying) as the modulation signaling method. The physical layer data rate for FHSS systems is 1 Mbps. For DSSS systems both 1 Mbps and 2 Mbps data rates are supported. The choice between FHSS and DSSS will depend on a number of factors related to the users application and the environment that the system will be operating within.
The DSSS physical layer uses an 11-bit Barker code Sequence to spread the data before it is transmitted. Each bit transmitted is modulated by the 11 -bit sequence. This process spreads the RF energy across a wider bandwidth than would be otherwise required to transmit the raw data. The processing gain of the system is defined as lOx the log of the ratio of spreading rate (also know as the chip rate) to the data. The receiver "despreads" the received signal to recover the original data. The advantage of this technique is that it reduces the effect of narrowband sources of interference. The spreading architecture used in the direct sequence physical layer should not be confused with code division multiple access (CDMA) networks. All 802.11 compliant products utilize the same pseudorandom (PN) code and therefore do not have a set of codes available as is required for CDMA operation.
The FHSS physical layer has 22 hop patterns to choose from. The frequency hop physical layer is required to hop across the 2.4GHz band covering 79 channels. Each channel occupies IMhz of bandwidth and transmitters must hop at a specified minimum rate (2.5 hops per second in the United States). Each of the physical layers use their own unique header to synchronize with the receiver and to determine the signal modulation format and data packet length. The physical layer headers are always transmitted at 1Mbps. Predefined fields in the headers provide the option to increase the data rate to 2 Mbps for the actual data packet.
The MAC layer specification for the 802.11 standard has similarities to the 802.3 Ethernet wired line standard. 802.11 networks use a protocol scheme know as carrier- sense, multiple access, collision avoidance (CSMA/CA). This protocol seeks to avoid data collisions instead of detecting them such as the algorithm used in the 802.3 standard. It is difficult to detect collisions in an RF transmission network and it is for this reason that collision avoidance is used.
The MAC layer operates together with the physical layer by sampling the energy over the medium transmitting data. The physical layer uses a clear channel assessment (CCA) algorithm to determine if the channel is clear. This is accomplished by measuring the RF energy at the antenna and determining the strength of the received signal. This measured signal is commonly known as RSSI. If the received signal strength is below a specified threshold the channel is declared clear and the MAC layer is given the clear channel status for data transmission. If the RF energy is above the threshold, data transmissions are deferred in accordance with the protocol rules.
The standard provides another option for CCA that can be used in place of or together RSSI measurement. Carrier sense can be used to determine if the channel is available. This technique is more selective because it verifies that the signal is the same carrier type as 802.11 transmitters. The best method to use depends upon the levels of interference in the operating environment.
The CSMA/CA protocol allows for options the can minimize collisions by using request to send (RTS), clear-to-send (CTS), data and acknowledge (ACK) transmission frames, in a sequential fashion. Communications are established when one of the wireless nodes sends a short message RTS frame. The RTS frame includes the destination and the length of message. The message duration is known as the network allocation vector (N AV). The NAV alerts all others in the network, to back off the communication link for the duration of the transmission. The receiving station issues a CTS frame which echoes the senders address and the NAV. If the CTS frame is not received, it is assumed that a collision occurred and the RTS process starts over. After the data frame is received, an ACK frame is sent back verifying a successful data transmission.
A common limitation with wireless LAN systems is the "hidden node" problem. This can disrupt a significant volume of the communication traffic in a highly loaded LAN environment. It occurs when there is a station in a service set that cannot detect the transmission of another station to detect that the media is busy. In such cases two or more stations that are unaware of one another's transmissions may try to transmit at the same time to another station that can "hear" more than one of the transmitting stations. The use of RTS, CTS, Data and ACK sequences helps prevent the disruptions caused by this problem.
Thus, the 802.11 standard defines practices that ensure network interoperability, however, as indicated above, the standard does not specify any particular implementation details. For example, the 802.11 standard makes no mention of how protocol functions should be divided between hardware and software operations in an 802.11 compliant product. Such decisions are left to product vendors.
SUMMARY OF THE INVENTION
A medium access control (MAC) layer for a node of a wireless local area network, which may be used in embedded, host and stand-alone applications, includes a hardware layer and a software layer. The hardware layer is configured to perform time- critical tasks and the software layer is configured to perform non-time critical tasks. The software layer includes multiple modules, such as one or more of a host communication agent, a bridging layer, a network management support module, a SBM-to-TAME conversion module, and a rate estimation module. Further, the software layer acts as the source of and the destination of MAC Service Data Units and is configured as a hierarchical structure in which functional unit blocks for associated elements of the hardware layer communicate with an application layer through respective device drivers and managers. Device drivers and managers communicate through a device manager layer. In a host-based configuration, all communication layers above the MAC layer run on a host. BRIEF DESCRIPTION OF THE DRAWINGS
The present invention is illustrated by way of example, and not limitation, in the figures of the accompanying drawings in which like reference numerals refer to similar elements and in which:
Figure 1 illustrates a topology/connectivity diagram showing an example scenario for wireless local area network devices configured in accordance with an embodiment of the present invention.
Figure 2 illustrates a hardware block diagram layout for wireless local area network devices configured in accordance with an embodiment of the present invention.
Figure 3 illustrates a system block diagram for a host-based application of an 802. He MAC for wireless local area network devices configured in accordance with an embodiment of the present invention.
Figure 4 illustrates a system block diagram for an embedded application of an 802. He MAC for wireless local area network devices configured in accordance with an embodiment of the present invention.
Figure 5 is a software context diagram for wireless local area network devices configured in accordance with an embodiment of the present invention.
Figure 6 illustrates an exemplary architecture for embedded software for wireless local area network devices configured in accordance with an embodiment of the present invention.
Figure 7 illustrates the relationships between different layers within a MAC for wireless local area network devices configured in accordance with an embodiment of the present invention.
DETAILED DESCRIPTION
A system (e.g., hardware and software) architecture for wireless local area network devices is disclosed herein. More specifically, examples of hardware and software functionality (and division of labor there between) for Quality of Service (QoS)-based computer network devices that incorporate 802.11 -compliant MACs are discussed herein. Although discussed with reference to certain illustrated embodiments, upon review of this specification, those of ordinary skill in the art will recognize that the present architecture and the devices built upon such architecture may find application in a variety of systems. Therefore, in the following description the illustrated embodiments should be regarded as exemplary only and should not be deemed to be limiting in scope. The following abbreviations are used throughout this discussion: CP: Contention period
CFP: Contention free period
ASIC: Application specific integrated circuit
FUB: Functional unit block in an ASIC
PC: Point coordinator
EPC: Enhanced PC that supports multimedia streams
STA: Station
ESTA: Enhanced STA that supports multimedia streams
SMAC: A MAC hardware accelerator for the 802.11 protocol in an
ASIC SITARA: A MAC hardware accelerator for the 802. He (multimedia) protocol in an ASIC
The following terminology is used throughout this discussion:
Device/node: same as station (as that term is used in the 802.11 standard). Firmware/software: a computer-readable set of instructions or program that is executed by a control processor, including drivers and other functions. Driver: an agent in the software responsible for the operation of a particular FUB in an ASIC. Host software: a set of computer-readable instructions (i.e., a program) that is executed by a host processor including drivers and applications Host driver: an agent in the host software responsible for the operation of a particular interface with other hardware attached to the host. Host protocol driver: a driver in the host software responsible for providing
802. He protocol related support on the host processor.
The system architecture described herein is intended for use with 802. He- compliant devices with support for multimedia streaming and Quality of Service (QoS) as detailed in the 802. He standard promulgated by the IEEE. More specifically, the devices described herein include an ASIC with enhancements to the 802.11 MAC, called SMAC, to support the proposed IEEE 802. He standard. The ASIC includes a FUB configured to provide support for QoS operations; this FUB is referred to as a SITARA. The software running on the ASIC includes a MAC layer, a bridging layer, network management support and other product-related segments such as an Ethernet driver, a PCI/PCMCIA/USB driver, Flash ROM support for configuration information storage, etc. This description addresses both a host-based and embedded application of the proposed scheme.
In general NICs (network interface cards), bridges and gateway products can be realized using either of these configurations. While a NIC constitutes a host-based application, a bridge is an embedded application. A gateway can be realized either as a host-based application, e.g., using a two-processor approach, or as an embedded application, e.g., using just an ASIC for both MAC and higher layer operations. These different applications are described in more detail below.
Now referring to Figure 1, a connectivity diagram with target/example applications for WLAN devices configured in accordance with the present scheme is shown. As indicated, target platforms include enhanced stations (i.e., stations that comply with the 802.11 standard and that are enhanced for multimedia operations in accordance with the schemes described herein), enhanced stations capable of being enhanced point coordinators, and enhanced point coordinators themselves. Such devices may be employed in a WLAN 10 as a gateway 12 or other node 14, one or more of which may act as a bridge to other networks (e.g., via Ethernet connections). Because the nodes are configured for multimedia operations, applications such as streaming video and/or audio, and interactive game playing may be supported, as well as more traditional applications such as file transfer and voice transport. All communications between nodes take place over wireless links 16. Bridging operations may utilize wired or wireless links 18.
Within the nodes 12 and 14, the functions of the 802. He MAC may be implemented partly in software and partly in hardware. In one embodiment, a preferred practice is to implement any function that is time critical in the 802. He protocol in hardware, thus achieving predictable timing and making the software easier to write, maintain and enhance. For purposes of such embodiments, events that require a response within a few hundred microseconds (μs) and/or occur more frequently than say 500 times per second (i.e., within a 2 msec interval) may be considered time critical.
A MAC hardware accelerator configured in accordance with the present teachings (SITARA) should support the transmission of sequences of multimedia protocol data units (MPDUs), together with related timing, without any frame-by-frame software interaction. At the same time, the hardware should not have the burden of additional buffering, other than what is already provided by software, of the entire frames' data before transmission. The MAC-module in software interacts with the MAC hardware to prepare queues of frames to transmit, analyze and deliver the received frames. The 802. He retry rules, segmentation and re-assembly, timing generation and management functions are performed largely in software.
With these partitions between software and hardware functionality in mind, a hardware block diagram for a WLAN device 20 configured in accordance with the present invention is shown in Figure 2. , The device 20 includes an ASIC 22, system memory (e.g., RAM) 24, boot/configuration memory (e.g., flash-ROM or PROM) 26, a baseband processor (e.g., to provide 802. Ha or 802. lib functionality/compatibility) 28, an RF section 30, a host interface 32, and an external control bus interface 34. Other components such as Ethernet Phys and related connectors 36 may also be provided. The baseband processor 28 and the RF section 30 may either be provided on the same circuit board as the ASIC 22 or they may be provided as part of a daughter radio board attached to a circuit board which includes ASIC 22.
ASIC 22 includes a control processor core (e.g., an ARM processor core as is customary in ASIC applications) and related circuitry 38, a memory controller 40, and various functional unit blocks (FUBs) for PCI/PCMCIA/USB ports 42, Ethernet ports 44, and the 802. He MAC 46. The ASIC 22 may also include a configuration and general purpose input output (GPIO) port 48 for functions such as a status display through one or more LEDs, and an external connector bus (ECB) interface 50 that can be used to provide support for other devices such as a second Ethernet connection, an HPNA connection, or other MACs such as HiperLan2 and IEEE- 1394. Further, an error correction codec 54 may be included. Internal busses (not shown) couple the elements of ASIC 22 to the host processor core 38 in the customary fashion.
Not all WLAN devices are stand-alone devices. In some cases, WLAN devices are host-based products. A network interface card (NIC) is a good example of a host- based application for WLAN devices configured in accordance with the present invention. A NIC is always attached to a host and provides 802. He wireless network interface to that host. A personal computer is an example of a host in this configuration. Hence, the NIC is composed of an ASIC 22, a NIC hardware board, software (illustrated as a firmware application and MAC module) for ASIC 22, an NDIS (or similar) driver (usually found in the host) and the network management software (also found in the host). The system block diagram for a NIC 60 with personal computer as host 62 is shown in Fig re 3. All communication layers above the
MAC (such as TCP IP and higher, layers) are envisaged to be running on the host 62.
At the top layer of the 802. He MAC module, communication is carried out through a MAC application programming interface (API). The MAC API is appropriately programmed by the software application. The software application layer consists of multiple modules including a host communication agent, network management support, SBM-to-TAME conversion, rate estimation module, etc. Conceptually the software application can be seen as the source of and the destination of MAC Service Data Units (MSDUs) from the 802. He MAC.
The host 62 supports an NDIS driver, which may be a thin layer passing frames between the host and the NIC, and making basic MAC management decisions. The network management software may be an application program running on the host 62, which helps in device installation and device management. Note that in a Gateway product implemented using two processors, one host processor may be used for router applications and an ASIC 22 may be used as a wireless interface. In the illustrated application, the host processor 62 runs the software necessary for network management and provides a driver that is functionally similar to an NDIS driver for communication with the NIC.
In addition to host-based applications, embedded applications of the present MAC may also be used. A bridge is a good example of an embedded application of the MAC. A bridge is a layer-2 device connecting a wired network (e.g., either Ethernet or HPNA) to an 802. He (i.e.. wireless) network. There is no host assumed for this configuration. Hence, a bridge application 65 includes an ASIC 22, a hardware board, and software for ASIC 22 including the 802. He MAC module and the network management module. The system block diagram for a bridge 65 is shown in Figure 4. No communication layers above the MAC (such as
TCP/IP) are assumed to be running on the processor core 38. For a gateway device implemented using single ASIC 22, as an embedded application, the higher layers are present and running on ASIC 22.
The software application layer for the bridge 65 includes a bridging module and embedded network management module along with the modules such as SBM, if necessary, SBM-to-TAME conversion, rate estimation, etc. that were present in the NIC configuration. Along with these modules, the software in a bridge 65 contains a driver for the Ethernet FUB instead of the driver for the host interface FUB. As in the host- based application, the software application can be considered the source of and the destination of MSDUs.
In general, all control frames received across the 802. He MAC are handled by the hardware upon reception and all frames to be transmitted are constructed by the software, except those control frames (CF) and acknowledgement (Ack) frames transmitted as immediate responses (within xIFS) to the received frames. These latter control and ack frames are constructed by the hardware. As part of this process, a CF- Ack notification (or a failure notification) is provided from hardware to software as applicable.
The software context diagram for the present scheme is shown in Figure 5. '< The hardware accelerator (SITARA) performs the time critical tasks and expects the rest of the tasks to be performed either in the embedded software or in the host software. The hardware does not take inter-packet decisions by itself unless it is instructed to do so. Hence, the embedded software is expected to provide all the control information to the hardware and additionally indicate the action to be taken in cases such as a transmission failure. This control information may be included in a transmit-frame-header structure defined for SITARA and some of the action information could be passed in control registers of SITARA.
Thus, the hardware accelerator passes received information such as data and events, including timer events (time outs and the like), scheduled transmission events and completion reports/errors and beacon events to the embedded software. In return, the embedded software passes CFP/CP control messages, timer settings, poll and transmission control information and the actual packets for transmission to the hardware. The embedded and host processor software layers exchange MIB updates and values, stream connect/disconnect information, channel information, flow control information and transmission and reception information between one another. The MAC software thus communicates with two entities: the MAC hardware and the host. Hence, the external interfaces to the MAC software are the MAC hardware interfaces and the host interfaces.
As shown, the host is the source of new MIB updates, transmission requests and the stream connect/disconnect events arising out of reception of RSVP-like signaling packets. The embedded software provides receive indications, values of MIB variables, channel status changes and the stream connect/disconnect events arising out of events within the MAC or upon such instruction from EAP/EPC. The host software includes a host software driver (e.g., an NDIS driver on a Windows environment) and a network management application. The host software driver includes interfaces to higher layers, a D/SBM layer and a hardware abstraction layer to interface with the ASIC. In order to make the best use of the streaming support in the 802. He standard, the host software driver should be capable of stream classification. Hence, depending on the QoS requirement it should be possible to flow control each stream differently over the hardware interface to the ASIC.
The MAC hardware is the source of received data and a number of different types of events, such as a receive packet event, transmit failure/success events and timer events. The MAC software provides formatted packets and additional control, if needed, in the hardware registers so that the hardware can transmit a sequence of frames. Hence on the transmit side, it is the responsibility of the MAC software to deal with all the management frames, segmentation, stream/priority classification, packet queuing and ordering, into a transmit table for the hardware. The hardware will then perform the transmit operations according to the information in the table. On the receive side, the MAC software handles tasks like constructing delayed-Ack frames and delivering data packets to the host. Additionally the MAC software performs all non- time-critical tasks such as stream connection/disconnection process, channel status estimation/analysis, time allocation per D/SBM request, etc. Figure 7 illustrates relationships between these different layers within the MAC.
The embedded software includes the MAC module, an embedded application layer and a host interface. An architecture for the embedded software for the ASIC is shown in Figure 6. The figure also shows the possibility of other device drivers (such as an Ethernet driver) that can be present in the embedded software. For a host-based application, all the other ports are absent.
As shown, the device drivers interface with the hardware FUBs on one side and with their respective manager entities through the device manager layer on the other side. The device manager provides uniform interfaces so that the device driver and its manager can be developed in parallel. The embedded application layer for a host-based application includes connections between the host interface manager and the WLAN manager.
Thus, a system architecture for wireless local area network devices has been described. Although the foregoing description and accompanying figures discuss and illustrate specific embodiments, it should be appreciated that the present invention is to be measured only in terms of the claims that follow.

Claims

CLAIMSWhat is claimed is:
1. A medium access control (MAC) layer for a node of a wireless local area network, comprising a hardware layer and a software layer, the hardware layer being configured to perform time-critical tasks and the software layer being configured to perform non- time critical tasks.
2. The MAC layer of claim 1 wherein the software layer comprises multiple modules including one or more of a host communication agent, a bridging layer, a network management support module, a SBM-to-TAME conversion module, and a rate estimation module.
3. The MAC layer of claim 1 wherein the software layer acts as the source of and the destination of MAC Service Data Units.
4. The MAC layer of claim 1 configured for use in an embedded application.
5. The MAC layer of claim 1 configured for use in a stand-alone application.
6. The MAC layer of claim 1 configured for use in a host-based application.
7. The MAC layer of claim 6 wherein all communication layers above the MAC layer are configured to run on a host.
8. The MAC layer of claim 1 wherein the software layer is configured as a hierarchical structure in which functional unit blocks for associated elements of the hardware layer communicate with an application layer through respective device drivers and managers.
9. The MAC layer of claim 8 wherein the device drivers and managers communicate through a device manager layer.
PCT/US2001/040585 2000-09-27 2001-04-23 Architecture for a wireless local area network node WO2002028024A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2001257624A AU2001257624A1 (en) 2000-09-27 2001-04-23 Architecture for a wireless local area network node

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/671,960 US7092374B1 (en) 2000-09-27 2000-09-27 Architecture for a wireless area network node
US09/671,960 2000-09-27

Publications (2)

Publication Number Publication Date
WO2002028024A2 true WO2002028024A2 (en) 2002-04-04
WO2002028024A3 WO2002028024A3 (en) 2003-01-16

Family

ID=24696573

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/040585 WO2002028024A2 (en) 2000-09-27 2001-04-23 Architecture for a wireless local area network node

Country Status (3)

Country Link
US (1) US7092374B1 (en)
AU (1) AU2001257624A1 (en)
WO (1) WO2002028024A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1599962A1 (en) * 2003-02-28 2005-11-30 THOMSON Licensing Method for wlan exclusive downlink channel

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7334046B1 (en) 2002-08-05 2008-02-19 Qlogic, Corporation System and method for optimizing frame routing in a network
US7397768B1 (en) 2002-09-11 2008-07-08 Qlogic, Corporation Zone management in a multi-module fibre channel switch
US7212499B2 (en) * 2002-09-30 2007-05-01 Ipr Licensing, Inc. Method and apparatus for antenna steering for WLAN
US20040081095A1 (en) * 2002-10-29 2004-04-29 Yonghe Liu Policing mechanism for resource limited wireless MAC processors
US7684401B2 (en) 2003-07-21 2010-03-23 Qlogic, Corporation Method and system for using extended fabric features with fibre channel switch elements
US7646767B2 (en) 2003-07-21 2010-01-12 Qlogic, Corporation Method and system for programmable data dependant network routing
US7792115B2 (en) 2003-07-21 2010-09-07 Qlogic, Corporation Method and system for routing and filtering network data packets in fibre channel systems
US7894348B2 (en) 2003-07-21 2011-02-22 Qlogic, Corporation Method and system for congestion control in a fibre channel switch
US7352701B1 (en) 2003-09-19 2008-04-01 Qlogic, Corporation Buffer to buffer credit recovery for in-line fibre channel credit extension devices
CN100484064C (en) 2003-11-19 2009-04-29 皇家飞利浦电子股份有限公司 Method for accessing a medium by a multi-channel device
US7340167B2 (en) 2004-04-23 2008-03-04 Qlogic, Corporation Fibre channel transparent switch for mixed switch fabrics
US7930377B2 (en) 2004-04-23 2011-04-19 Qlogic, Corporation Method and system for using boot servers in networks
US7404020B2 (en) * 2004-07-20 2008-07-22 Qlogic, Corporation Integrated fibre channel fabric controller
US8295299B2 (en) 2004-10-01 2012-10-23 Qlogic, Corporation High speed fibre channel switch element
TWI255111B (en) * 2004-10-22 2006-05-11 Univ Nat Chiao Tung Wireless LAN medium access controller supporting the mode switching, and its switching method
US20060203842A1 (en) * 2004-11-12 2006-09-14 Wollmershauser Steven M Dongle-type network access module
US20060146709A1 (en) * 2004-12-30 2006-07-06 Boris Ginzburg Device, system and method for limiting data rates supported by a wireless LAN
US20060193313A1 (en) * 2005-02-25 2006-08-31 Telkonet, Inc. Local area network above telephony infrastructure
KR100889731B1 (en) * 2006-12-04 2009-03-24 한국전자통신연구원 Optimum resource allocation method in distributed mac for wireless personal area networks
US8111674B2 (en) * 2006-12-07 2012-02-07 Cisco Technology, Inc. Maintaining network availability for wireless clients in a wireless local area network

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0789468A1 (en) * 1996-02-02 1997-08-13 AT&T Corp. A wireless adapter architecture for mobile computing

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5630061A (en) * 1993-04-19 1997-05-13 International Business Machines Corporation System for enabling first computer to communicate over switched network with second computer located within LAN by using media access control driver in different modes
US5638371A (en) * 1995-06-27 1997-06-10 Nec Usa, Inc. Multiservices medium access control protocol for wireless ATM system
US5774461A (en) * 1995-09-27 1998-06-30 Lucent Technologies Inc. Medium access control and air interface subsystem for an indoor wireless ATM network
US5684791A (en) * 1995-11-07 1997-11-04 Nec Usa, Inc. Data link control protocols for wireless ATM access channels
US5787080A (en) * 1996-06-03 1998-07-28 Philips Electronics North America Corporation Method and apparatus for reservation-based wireless-ATM local area network
US6327254B1 (en) * 1997-10-14 2001-12-04 Lucent Technologies Inc. Method for bandwidth sharing in a multiple access system for communications networks
US6640248B1 (en) * 1998-07-10 2003-10-28 Malibu Networks, Inc. Application-aware, quality of service (QoS) sensitive, media access control (MAC) layer
US6160804A (en) * 1998-11-13 2000-12-12 Lucent Technologies Inc. Mobility management for a multimedia mobile network
US6542490B1 (en) * 1999-01-29 2003-04-01 Nortel Networks Limited Data link control proctocol for 3G wireless system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0789468A1 (en) * 1996-02-02 1997-08-13 AT&T Corp. A wireless adapter architecture for mobile computing

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
AT&T,LUCENT,SHAREWAVE: "IEEE 802.11 doc 00/071 QoS MAC Enhancements Joint Proposal" IEEE, 1 May 2000 (2000-05-01), pages 1-50, XP002209850 *
DRABU YASIR: "A survey of QoS techniques in 802.11" DEPARTMENT OF COMPUTER SCIENCE, KENT STATE UNIVERSITY, January 1999 (1999-01), pages 1-11, XP002209851 *
TROTTER J ET AL: "A WIRELESS ADAPTER ARCHITECTURE FOR MOBILE COMPUTING" PROCEEDINGS OF THE USENIX MOBILE AND LOCATION-INDEPENDENT COMPUTING SYMPOSIUM, XX, XX, 10 April 1995 (1995-04-10), pages 25-31, XP000675147 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1599962A1 (en) * 2003-02-28 2005-11-30 THOMSON Licensing Method for wlan exclusive downlink channel
EP1599962A4 (en) * 2003-02-28 2011-02-09 Thomson Licensing Method for wlan exclusive downlink channel

Also Published As

Publication number Publication date
AU2001257624A1 (en) 2002-04-08
WO2002028024A3 (en) 2003-01-16
US7092374B1 (en) 2006-08-15

Similar Documents

Publication Publication Date Title
US7092374B1 (en) Architecture for a wireless area network node
US9730109B2 (en) Wireless communication system, wireless communication apparatus, wireless communication method, and computer program
US9198019B2 (en) Communication system and method for discovering end-points that utilize a link layer connection in a wired/wireless local area network
US20190357257A1 (en) Wireless communication apparatus and method
US7978675B1 (en) Extension mode for wireless LANs complying with short interframe space requirement
US7373135B2 (en) Communication system, communication apparatus, communication method, and program
US20060140147A1 (en) Bandwidth allocation protocol for shared wireless networks
EP2760246B1 (en) Wireless communication apparatus and wireless communication method in a multistandard wireless LAN
JP2004221710A (en) Wireless lan system and communication control method thereof
JP2007527167A (en) Wireless packet processing method and apparatus using medium access control action table
EP1543433B1 (en) A wireless access point in a hybrid wire/wireless network
Fok A simulator for wireless local area networks
KR100752360B1 (en) Method for monitoring available resource in wireless network, and data transferring method, wireless communication terminal, network using the method
Hännikäinen Design of quality of service support for wireless local area networks
Sattari An experimental study of wireless LANs

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 69(1) EPC (EPO FORM 1205A DATED 22.08.03)

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP