GB2440194A - Optimising superframe periods based upon network parameters - Google Patents

Optimising superframe periods based upon network parameters Download PDF

Info

Publication number
GB2440194A
GB2440194A GB0614454A GB0614454A GB2440194A GB 2440194 A GB2440194 A GB 2440194A GB 0614454 A GB0614454 A GB 0614454A GB 0614454 A GB0614454 A GB 0614454A GB 2440194 A GB2440194 A GB 2440194A
Authority
GB
United Kingdom
Prior art keywords
network
contention
superframe
communication controller
controller
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB0614454A
Other versions
GB2440194B (en
GB0614454D0 (en
Inventor
Russell John Haines
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Toshiba Europe Ltd
Original Assignee
Toshiba Research Europe Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Toshiba Research Europe Ltd filed Critical Toshiba Research Europe Ltd
Priority to GB0614454A priority Critical patent/GB2440194B/en
Publication of GB0614454D0 publication Critical patent/GB0614454D0/en
Publication of GB2440194A publication Critical patent/GB2440194A/en
Application granted granted Critical
Publication of GB2440194B publication Critical patent/GB2440194B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0808Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using carrier sensing, e.g. as in CSMA
    • H04Q7/3832
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L12/403Bus networks with centralised control, e.g. polling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L12/407Bus networks with decentralised control
    • H04L12/413Bus networks with decentralised control with random access, e.g. carrier-sense multiple-access with collision detection (CSMA-CD)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/06Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface

Abstract

A communication controller, e.g. Access Point, provides flexible control of an IEEE802.11 WLAN superframe. In particular, the communication controller optimises the proportion of the superframe reserved as the Contention-Free Period (CFP), during which the communication controller controls access to the communications medium, and/or the Contention Period (CP), during which access to the communications medium is allowed on a contention basis, based upon a set of network parameters. During network operation, the superframe parameters are repeatedly re-optimised in response to changes in the network parameters, such as changes in network delay times, number of contending stations, number of contention free stations, required delay thresholds or fundamental network model assumptions such as traffic profiles and data rates.

Description

<p>I</p>
<p>A Wireless Communication System This invention relates to apparatus, methods, processor control code and signals for establishment of wireless communications in a network. More particularly, but not exclusively, it relates to aspects of the technology supported by the IEEE8O2.11 standards, especially concerning WLAN.</p>
<p>The IEEE8O2. 11 standard (in particular, the digest entitled "IEEE Wireless LAN Edition -A compilation based on IEEE Std 802.1 1TM- 1999 (R2003) and its amendments") describes and defines technology for the implementation of wireless network based communication between stations (STA). In the context of the standard, a network is referred to as a Basic Service Set (BSS). Two topologies of BSS are supported. Firstly, an "infrastructure" topology defines one of the stations of the BSS as an Access Point (AP). An access point is provided to act as a bridge into a wider LAN or even the internet. Secondly, in an "independent" topology, a group of stations form a BSS on an ad hoc basis.</p>
<p>The 802.11 standard defines technology in two layers of the OSI model, namely the MAC (Media Access Control) layer and the PHY (Physical) layer. The MAC layer presents a MAC Service Access Point (SAP) to higher layers of the OS! model, accepting MAC Service Data Units (MSDUs). The MAC is capable of fragmenting a received MSDU if this allows for more robust transmission of data. After the MAC has processed a (possibly fragmented) MSDU, it presents MAC Protocol Data Units (MPDUs) to the PHY SAP.</p>
<p>In order to manage access to the communications medium, the standard provides a Distributed Coordination Function (DCF). Using the DCF, each station in the BSS competes for access to the resource on an equitable basis with all others, using Carrier Sense Multiple Access with Collision Avoidance (CSMAJCA). As described in section 9.1.1 of the above referenced standard, a station using the DCF monitors the medium for a predetermined period of time (known as the DCF Inter-Frame Space, DIFS) to determine if another station is transmitting and, if not, backs off for a minimum specified time period (which in practice is a randomly generated number of slots, where a slot is a fixed period of time defined for a particular PHY specification) during which the medium must remain free, before attempting to commence transmission itself. This random back-off avoids the situation where two stations may detect the medium to have been free for a period of DIFS then simultaneously transmit and collide. There is still a small probability that two stations will choose the same random back-off period, but this is considerably less than if they were allowed to transmit straight after the DIFS.</p>
<p>As a feedback mechanism, the size of the range of random numbers is increased in the event of collisions occurring, decreasing that collision probability still further.</p>
<p>Transmissions are conducted with either a two-phase (DATA/ACK) or four-phase (RTS/CTS/DATA/ACK) handshake. in each case, error recovery is achieved through Automatic Repeat reQuest, ARQ. The four phase handshake is particularly appropriate to networks containing hidden nodes -i.e. stations that are out of the transmission range of the transmitting station (and so would not detect an ongoing transmission) but are in transmission range of the receiving station (hence this hidden node could quite innocently start to transmit to the receiving node as well, resulting in collisions.</p>
<p>Prioritisation, for example of the right to send an ACK in reply over another STA's right to initiate a new exchange, is achieved through Inter Frame Spaces (IFS) -the short IFS (SIFS), DIFS, PCF IFS (PIFS) and Extended/Emergency iFS (EIFS). Further description of the structure and use of the different types of IFS can be found in the above referenced version of the standard.</p>
<p>Use of the 802.11 standard compliant technology in an infrastructure type topology only requires provision of the DCF mechanism. However, a centralised Point Coordination function (PCF) can be optionally provided, to offer enhanced operation. This is of particular use for traffic with particular Quality of Service requirements, such as loss, delay or jitter.</p>
<p>The PCF offers contention-free access to a particular, nominated station. This station is implemented with a Point Coordinator (PC) functionality. Typically the Point Coordinator (PC) resides on the AP.</p>
<p>In order to allow PCF and DCF to coexist, the standard specifies use of a superframe, illustrated in figure 1. The superframe comprises a beacon (B) announcing the start of a contention free period (CFP), which is then followed by a contention period (CP).</p>
<p>During the CFP, the Access Point has contention free access to the medium. Then, in the CP, the station in question reverts to operation in accordance with the DCF.</p>
<p>In most published discussion of IEEE8O2. 11, and most particularly the concept of a superframe, the superframe is typically characterised by two parameters: CFPap, which determines the rate at which the super-frame repeats (i.e. when new beacons are issued), and CFPMAX, which determines the length of the CFP. CFPjp is expressed in absolute length, in milliseconds. Typically, as described in "Self-adaptive transmission scheme of integrated services over an IEEE 802.11 WLAN," (C. Li, J. Li, and X. Cai, Electronics Letters, vol. 40, pp. 1596, 2004) CFPj is in the range 20-lOOms.</p>
<p>Further, CFPMAX is normally expressed as a ratio of the maximum CFP period to the CFPrup period.</p>
<p>The polling process within the CFP is initiated by the PC sending either a simple CF-Poll packet to the first STA to be polled or, if the AP has data to send to the STA, a combined Data+CF-Poll packet. Having received a CF-Poll, the STA then has the right to send a single buffered frame. The STA can then acknowledge the Data (if any) with a CF-Ack or, if it has data to send (that will fit within the TXOP), a Data+CF-Ack frame.</p>
<p>As a further example of a multi-purpose transmission, the PC can then send a combined Data+CF-Ack+CF-Poll frame, acknowledging the transmission from the previous STA, polling the next one and sending it some data, in one operation. This process continues until the PC concludes the CFP with a CFP-End transmission (which can also be combined with CFP-Ack to the last polled STA if needed); the DCF-based CP then begins.</p>
<p>STAs associate with the AP by means of an initial handshake. A STA can indicate during association that it doesn't required to be polled now, or ever. That is, it is possible for a STA not to be included on the polling list. In PCF, the list of STAs to be polled is the entire list of STAs that have associated with the AP that have expressed a desire to be polled.</p>
<p>One difficulty with using the PCF of IEEE8O2.l 1 is that if a station successfully contends for access to the medium during the CP, there is no way of bounding the transmission time of that station, apart from the upper limit on MPDU-size. This can lead to unnecessary and undesirable delay of the beacon and consequently the ensuing contention free period. This clearly impacts the ability of PCF to support delay-and jitter-sensitive traffic.</p>
<p>The IEEE8O2. lie standard (IEEE (Institute of Electrical and Electronics Engineers), "IEEE Standard 802.1 le -Part 11 Amendment 8: Medium Access Control (MAC) Quality of Service Enhancements," 2005.) enhances the PCF, througJi provision of a Hybrid Coordination Function (HCF). The HCF offers a Transmit Opportunity (TXOP), which grants access to the medium for a defined period of time (to address the delayed-beacon issue of PCF mentioned above). A Hybrid Controller (HC), which replaces the PC in 802.1 le, also has the ability to poll in the CP as well as the CFP. Stations are also prohibited from transmitting over a defined Target Beacon Transition Time (TBTT), again to address the delayed beacon issue.</p>
<p>Having received a CF-Poll, the STA then has the right to send a single buffered frame (constrained by the explicit TXOP value in the CF-Poll packet, as of lie). For HCF, to distinguish from PCF operation, the letters "QOS" preface all CF-Po1IICF-Ack messages; some additional parameters are employed to link the poil to a specific traffic stream identifier. In HCF, a more dynamic registration process is used than in PCF. In the latter case, a STA sends a TXOP-request to the AP in a QoS-Info field (QoS being a common abbreviation for Quality of Service) during a preceding TXOP. This preceding TXOP is either a polled transmission or a contended transmission; it will be evident to the reader that the very first TXOP must be obtained through contention. A TXOP can be anywhere between 32 and 8160,is in length, in 32j.ts increments, but constrained as follows: * There is a BSS-wide upper TXOPlimit (broadcast in the beacon) * There is a TXOPlimit[AC] for each AC (subject to the BSS-wide limit) set by the HC (via information fields in the beacon), for use in the EDCAJCP phase of the superframe (note that the HC itself is not bound by this limit) * An explicit poll-specific TXOP can be granted to a specific station for a specific</p>
<p>exchange (via a field in the CF-Poll frame).</p>
<p>Traffic Streams, TS, are also set up in advance via the management plane, to give the HC advance notice of the requirements of the applications in the BSS. TSs are characterised by a data structure called a TSpec, or Traffic Specification, which includes minimum, nominative and peak (where appropriate) values for MSDU size, service interval, data rate, delay and required raw PHY rate.</p>
<p>Further information is available in the standards, specifically section 9.3 of IEEE8O2. 11 2003 referenced above, and in corresponding sections of the IEEE8O2.1 le Standard.</p>
<p>When using PCF or HCF in a backwards-compatibility mode), there is a need to determine an optimum set of parameters for the superframe, to obtain the best network performance, for a particular network configuration. When HCF is deployed using the fully-flexible dynamic TXOP allocation scheme, this superframe is only notionally required in the sense that it defines a split between polled and contending traffic, which can be used to constrain the number of "polled" TXOPs that are granted during any beacon-period.</p>
<p>A series of publications by Changle Li and colleagues attempt to solve this problem by the discrete selection of pre-defined PCF parameters through pre-defined look-up tables indexed by the number of active A/V stations and the maximum allowable delay of the applications and the improvements that result. The look-up values have been found empirically. The publications are: "Self-adaptive transmission scheme of integrated services over an IEEE 802.11 WLAN," (C. Li, J. Li, and X. Cai, Electronics Letters, vol. 40, pp. 1596, 2004); "Performance Analysis of IEEE 802.11 WLAN to Support Voice Services," (C. Li, J. Li, and X. Cai, Proceedings of the 18th International Conference on Advanced Information Networking and Application (AINA 04), vol. 2, pp. 343 -346, 2004); "A study of self-adaptive transmission for integrated voice and data services over an IEEE 802.11 WLAN," (C. Li, M. Li, and X. Cai, 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 2004. PIMRC 2004., vol. 3, pp. 1922 -1926, 2004); and "Performance evaluation of IEEE 802.11 WLAN -high speed packet wireless data network for supporting voice service," (C. Li, J. Li, and X. Cai, presented at 2004 IEEE Wireless Communications and Networking Conference, 2004. WCNC., 2004).</p>
<p>An alternative solution for improving the selection of superframe parameters to achieve a balance between contention based access and access controller based access is disclosed by the present applicant in GBO5 13533.0. Optimum lengths of the contention free period and contention period are determined by performing a constrained optimisation. The optimisation may be constrained by performance parameters of the system. The optimisation may be a non-linear optimisation, and may employ a barrier method. In preferred embodiments, a superframe controller is provided, including means to determine a performance characteristic, means to determine on the basis of non-linear optimisation superframe characterisation parameters and means for deploying the superframe in accordance with the determined superframe characterisation parameters across the network. Features of this system may be used in embodiments of the present invention, and this is discussed in more detail below.</p>
<p>EP1427150 relates to a method and controller for transmitting multimedia data over WLAN. This document discloses a system where a resource request in the CP results in an allocation in the CFP, in order to allow the system to efficiently facilitate the real time transmission of large multimedia data such as high definition TV.</p>
<p>Embodiments of the present invention provide further improvement over the above described prior art, for configuration of superframe parameters to provide better service on the network.</p>
<p>One aspect of the present invention provides a communication controller for a communications network with one or more communications stations across a communications medium, the communications network effecting communication by allocating first time periods during which the communication controller is operable to control access to the communications medium and second time periods during which the access to the communications medium is allowed on a contention basis, wherein the communication controller comprises: means for repeatedly determining proposed optimum lengths of said first andlor second time periods using a current set of network parameters; and configuration means for repeatedly reconfiguring the length of said first and/or second time periods according to said proposed optimum lengths.</p>
<p>A further aspect of the present invention provides a method of controlling access to a communications medium, comprising establishing a data frame structure for successive definition in the communications medium, the data frame structure defining a first period during which access to the communications medium is controlled centrally and a second period during which access to the communications medium is allowed on a contention basis, further comprising repeatedly determining a proposed optimum length of the first period and the second period using a current set of network parameters for the communication medium; and repeatedly reconfiguring the length of said first and/or second time periods according to said proposed optimum lengths.</p>
<p>In some embodiments, the current set of network parameters includes a current estimated or measured network delay time. The network delay time may be determined according to network traffic queuing times and/or the network delay time may be determined according to end-to-end network traffic delay times.</p>
<p>The current set of network parameters may include current delay requirements of communication stations on the network. The current set of network parameters may include one or more of the following: a current number of contention-free stations on the network, a current estimated number of contending stations on the network, required delay thresholds, traffic profiles, data rates and other network model assumptions.</p>
<p>The reconfiguration process may include reducing the contention-free traffic delay and as a result increasing the contention-based traffic delay in response to a measured or estimated bottleneck in the contention-free traffic.</p>
<p>The communication controller may use a look up table to determine said first and second time periods, said look up table being configured according to a network model.</p>
<p>In some embodiments, one of a plurality of iookup tables may be selected according to a current set of network parameters. One or more of the iookup tables may be reconfigured dynamically during operation of the network in response to actual or expected changes in network parameters.</p>
<p>in some embodiments, the communication controller may use measured end-to-end delay values to trigger an emergency recovery mechanism where the first and second time periods are temporarily configured to prioritise contention-free traffic more.</p>
<p>In some embodiments, the communication controller may perform a registration process with stations requiring contention free services, and to maintain a record of the number of stations currently requiring contention-free services. The communication controller may also perform a de-registration process with stations that no longer require contention-free services.</p>
<p>In some embodiments, the communications controller may obtain an estimate of the number of non-contending stations using the measured network traffic flow.</p>
<p>In some embodiments, the means for determining optimum lengths of the first and second periods comprises means for performing a constrained optimisation. The means for determining optimum lengths may comprise means for performing an optimisation constrained by performance parameters of the system. The means for determining optimum lengths may comprise means for performing a non-linear optimisation. The means for determining optimum lengths may comprise means for performing an optimisation employing a barrier method. The means for determining said proposed optimum lengths may comprise storage means storing predetermined data calculated on the basis of a prior optimisation, for reference with regard to one or more look-up parameters.</p>
<p>In some embodiments, the communication controller is IEEE8O2. 11 compliant. The communication controller may be adapted to re-configure a fixed PCF superframe structure.</p>
<p>In some embodiments of the present invention, only the superframe time intervals (e.g. the contention free period length and the super-frame repetition rate) are reconfigured by the optimisation process, to obtain a better network performance. For example, such a superframe reconfiguration may be triggered by increased or decreased amounts of network traffic, changes to the number of contending stations or contention-free stations, or bottlenecks in the system causing increased traffic delays.</p>
<p>To allow the network controller to perform the optimisation, a lookup table (LUT) may be provided. This LUT may provide a range of values of each variable parameter, and the optimised superframe configuration times corresponding to each possible combination of variable parameters. For example, the prior art by Li described above provides a lookup table where CFPMAX and CFP values can be obtained by looking up a table of values indexed by the current number of active stations (Nv) and the current maximum allowable delay.</p>
<p>Even in embodiments of the invention, where the superframe configuration is calculated rather than found empirically, it may still be advantageous to use lookup tables in order to avoid any delay to the reconfiguration process that is caused by the time taken to calculate the new values.</p>
<p>In other embodiments of the invention, the network model parameters used to perform the optimisation process may also be reconfigured. The network model parameters may include the mean data MSDU size, data rate, A/V MSDU size, data beacon size, slot time, SIFS time, PTFS time, DIFS time, MAC header length, PLCP (Physical layer convergence protocol) header size, control frame data-rate and ACK (acknowledgement) size. Such network model parameters will depend on which version(s)/amendment(s) of the IEEE8O2.1 I protocol family is(are) being used, which PHY configuration (e.g. 802.11 g operating in native or legacy modes), and on the individual network setup.</p>
<p>A set of network model parameters may be used to calculate a single LUT. In a simple embodiment of the invention, there may be only a single LUT provided. However, in more complex embodiments, multiple LUTs may be provided, by using multiple sets of network model parameters. The LUT which best matches the current network configuration may be selected, and used for the optimisation of superframe parameters.</p>
<p>In further embodiments, one or more reconfigurable LUTs may be provided, where particular parameters used to calculated the LUT can be changed, the LUT may be reconfigured dynamically, and then the reconfigured LUT may be used in the optimisation process.</p>
<p>In some embodiments, checks that Quality of Service (Q0S) requirements are being met may be performed at periodic intervals, and in other embodiments, such checks may be performed at non-periodic intervals. Preferably such checks are carried out for every five to ten superframes. In some embodiments, the quality of service check rate may be a factor of past network performance.</p>
<p>Preferred embodiments of the invention use mathematically sound algorithms such as those described in GBO5 13533.0, validated through simulation as the basis for the configuration. However, the present invention also encompasses embodiments using empirical results from simulation-based studies, such as those described by Li in the above listed publications.</p>
<p>Embodiments of the present invention may be used in a wide range of applications.</p>
<p>Using a reconfigurable mechanism means the system can be fine-tuned automatically without requiring user intervention or maintenance. For example, embodiments of the invention can be used in a general-case re-configurable system for commodity chipsets or in multi-purpose APs. Further embodiments of the invention can provide low silicon usage with a single LUT on a chipset, and target a specific known application (e.g. in the Toshiba TransCube A/V product) with a single LUT in a product.</p>
<p>Further preferred features of these aspects of the invention will now be set forth by the following description of specific embodiments of the invention, provided by way of example only, with reference to the accompanying drawings in which: Figure 1 is a schematic timing diagram showing the definition of a superframe in the context of the 802.11 standard; Figure 2 is a schematic diagram of a wireless communications system in accordance with a specific embodiment of the invention; Figure 3 is a schematic diagram of an access point of the system illustrated in figure 2; Figure 4 is a flow diagram showing a process of quality control and superframe reconfiguration in an embodiment of the invention; Figure 5 is a schematic diagram showing implementation options for the lookup table in embodiments of the invention; Figure 6 is a graph showing a fixed naïve superfranie end to end delay results; Figure 7 is a graph showing an adaptive superframe end to end delay results; Figure 8 is a graph showing a fixed, perfect a priori knowledge superframe end to end delay results with additional load; and Figure 9 is a graph showing an adaptive superframe end to end delay results with additional load.</p>
<p>Figure 10 is a flow diagram of a process of characterising a superframe in an access controller of the access point illustrated in figure 3; Figure 11 is a flow diagram of a constraint definition sub-process of the process illustrated in figure 10; Figure 12 is a graph of performance of the process of the specific embodiment for different starting criteria; Figure 13 is a flow diagram setting out an exemplary optimisation process called in a step of the process illustrated in figure 10.</p>
<p>A communications network used in an embodiment of the invention is illustrated in figure 2. The communications network is an IEEE8O2. 11 compliant wireless network, with an access point 100 and network node A 102, node B 104 and node C 106. The access point 100 is connected to an external network (such as the Internet), in this example by means of a broadband modem. It will be appreciated that other alternative arrangements can be made for the access point to establish connection to an external source of streaming packet-based data.</p>
<p>The access point 100 establishes wireless communication, in accordance with the 802.1 le Standard, with nodes A 102, B 104 & C 106. The access point 100 is thus configured to route data between the external network and the respective nodes 102, 104, 106.</p>
<p>In this embodiment, by way of example only, Node A 102 is a portable laptop computer, Node B 104 is a desktop computer and Node C 106 is a multimedia device (e.g. set-top box) operable in conjunction with a television or hi-fl system. Each of these nodes 102, 104, 106 is equipped with a 802.11 g wireless LAN network adaptor and configured to communicate with the access point 100.</p>
<p>Figure 3 shows the structure of access point 100 in an embodiment of the invention. In this embodiment, the access point 100 is equipped with a broadband modem 202 as previously described, to establish connection to the Internet. The broadband modem 202 is connected to a general purpose bus 204, which in turn connects to the components of the access point including working memory (combining RAM and ROM function, as required) 206, a processor 208, a wireless network access controller 230 and a mass storage device 216. The access controller 230 is, in turn, connected to an antenna 212. The working memory 206 may include a software application 230 for controlling the operation of the access point 100.</p>
<p>User operable input devices 220 are further provided, in communication with the processor 208. The user operable input devices 220 comprise any means by which an input action can be interpreted and converted into data signals.</p>
<p>Audio/video output devices 222 are further connected to the general-purpose bus 204, for the output of information to a user. Audio/video output devices 222 include any device capable of presenting information to a user, for example, a speaker and a video display unit.</p>
<p>The operation of the access point 100 will now be described. On the basis of execution of an application residing at a network node, data is retrieved from the external network via a connection established through the broadband modem 202. The manner in which the modem establishes connection is not relevant to the present invention, and can be of a conventional nature.</p>
<p>The retrieved data is then stored in the RAM 206. The access controller 230, determines, on an ongoing basis, access to the network by the access point 100 and by the other nodes 102, 104, 106. The access controller 230 is operable to define the superframe, as previously described in figure 1, but also to determine the length of the superframe and the proportion thereof which is reserved as the CFP.</p>
<p>Figure 4 is a flowchart showing a process of configuration and reconfiguration of the superframe by the access point 100 according to an embodiment of the invention. The process starts at step S300. At step S301, the access point 100 determines the model assumptions for setting up a model of the network. At this point, the access point 100 may calculate one or more iookup tables based on the network model assumptions, or alternatively, these iookup tables may be provided in advance.</p>
<p>Then, at step S302, the access point 100 selects the best lookup table (LUT) for this particular network. In some embodiments, only a single LUT option may be available.</p>
<p>However, in other embodiments, several LUT options may be available, and the access point 100 may select the one that is expected to give the best quality results, or at least select a LUT that is expected to meet the network requirements at the time.</p>
<p>After selection of a particular LUT option, this LUT is used to obtain superframe parameters, such as the maximum length of the contention free period, CFPMAX, and the superframe repetition rate, CPF.</p>
<p>At step S303, communication between stations on the network begins, using the superframe structure of figure 1 with the superframe parametersdetermined at step S302. During network operation, a QoS check is performed at predetermined time intervals, as indicated in step S304. Periodically (for example, every five to ten superframes), the current configuration is re-evaluated against the system's current requirement. The Q0S check involves checking to see if there has been any changes in network model assumptions, checking to see if there is any change in variable network parameters, and measuring or estimating a network delay and comparing this to the system requirements. In alternative embodiments, not all of these checks are performed.</p>
<p>At step S305, a check is performed to see if there have been any changes in network model assumptions, e.g. traffic profiles, data rates, etc. This information be determined by the AP, or it may simply be received and used by the AP. If there are changes to the model assumptions, the process continues at step S306, where a new lookup table is selected if appropriate, or a lookup table is reconfigured accordingly, if appropriate. The process then continues at step S308, which is described in more detail below.</p>
<p>Optionally, step S305, which checks for changes in network model assumptions, can trigger an on-line generation of new superframe configurations for the new set of constraints in the more complex implementation options. There is a spectrum of increasing complexity implementations here. One LUT may be implemented, which still gives reconfigurability in the dimensions of station-count and delay. Alternatively, multiple LUTs may be used, where each LUT embodies a different set of fundamental model assumptions. A further possibility is the use of reconflgurable LUTs, where one or more sets of data can be regenerated dynamically. This latter embodiment would support general purpose products, e.g. where both video and telephony functions may be required at different times. Software-defined radio type installations could also be supported using re-configurable LUTs, where a new PHY could be installed.</p>
<p>Figure 5 shows the different type of LUT arrangements that may be used during the reconfiguration. The left hand side of figure 5 shows a single look up table. This is particularly suitable for use in systems where conditions are not expected to change drastically, and where it is important to use a minimum amount of silicon area. The central part of figure 5 shows multiple look up tables, where one of these look up tables is selected and paged in. If network conditions substantially change, then a different look up table may be selected in its place, and paged in. The right hand side of figure 5 shows multiple look up tables with dynamic optimisation. The parameters within a selected look up table may be modified dynamically, but if an acceptable optimisation is not possible, a different LUT may be selected and optimised instead.</p>
<p>A further possible embodiment is the use of multi-dimensional LUTs, similar to multiple LUTs with more degrees of freedom. For example, an n-dimensional LUT could cover other variables such as traffic profile or PHY data rates. This would require additional memory, but may be useful in some circumstances.</p>
<p>If there are no changes to the network model assumptions at step S305, the process goes on to step S307. Here, a further part of the Q0S check is performed, comprising the following: * Has the number of associated stations changed? * Has the estimated number of contending stations changed? * Have the required delay thresholds changed? Again, in some embodiments, not all of these steps need be performed.</p>
<p>If there has been a change in the above listed parameters, then the process continues at step S308, where the current LUT is used to reconfigure the superframe parameters.</p>
<p>Once a suitable new CFPMAX and new CFPpip are obtained at step s307, using the current LUT, the new superframe configuration is used for network transmissions. The process then continues to step S309, where the network delay is measured. In some embodiments of the invention, this step can be omitted, as the superframe can be configured even without a feedback path offered by network delay evaluation, by simply using the Q0S checks for changes in system status, e.g. as described in S305 and S3 07.</p>
<p>In this embodiment, the network delay is measured or estimated at step S309, for example, by measurement of an End-to-End delay. The End-to-End delay experienced by traffic may be determined based on header time-stamps. Clocks on different stations on the network may be synchronised, albeit with course granularity, to a time-value broadcast in the beacon by the AP. This end-to-end delay measure provides a means of determining how well Q0S promises are being kept. During measurement of the network delay, some smoothing may be performed to ignore transient peaks that are not representative.</p>
<p>An alternative possibility of obtaining a measure of network delay is by measurement of how long a packet has been sitting in a queue local to a network node. The packet is time-stamped when the application presents it, then the time of transmission is also noted, and the time difference is sent to the AP. Using this method, no synchronisation between nodes on the network is required at all.</p>
<p>The performance requirements of the system are then compared to the measured network delay at step S3 10. If the delay requirements are not being met, the system may proceed to step S306, where the AP 100 may select a different LUT or reconfigure the current LUT to attempt to solve the problem. The process then continues at S308, where the superframe parameters are selected from the LUT, after which the network delay is again measured at step S309. Alternatively, if delay requirements are not being met, the reconfiguration process may firstly attempt to satisfy the requirements with the LUT currently in use. Failing that, it may page in alternative LUTs if they are available and suitable. Otherwise, it may choose the least bad configuration available that gets closest to the target performance.</p>
<p>The superframe may be temporarily reconfigured, rather than permanently reconfigured, as an emergency measure to attempt to clear whatever backlog has formed.</p>
<p>If the network delay is found to meet the given requirements at step S3 10, then no further reconfiguration is needed, and the process returns to step S304, and continues to perform QoS checks at predetermined intervals.</p>
<p>The results of the Q0S check may be stored in memory, to allow a user to monitor the network behaviour at a later time.</p>
<p>An example is now given, of a conference room scenario of 41 stations. This example is a simplified case of one of the comparison criteria usage models in IEEE8O2.I1TGn-UM 2004. (IEEE (Institute of Electrical and Electronics Engineers), "IEEE 802.11 Working Group, Task Group N: IEEE 802.11-03/0802: Usage Models," 2004).</p>
<p>Without the present invention, a person skilled in the art would implement the system to have a fixed superframe configuration arbitrarily chosen by the access point. At design time, a particular configuration of traffic would be assumed, and used in producing the design. For example, in the conference room scenario of 41 stations, a lOOms superframe repetition rate and a 10% polling/contention-free window may be selected on this basis. This configuration may have been arrived at after extensive simulation of the assumed applications and scenarios of the product, and trading off the requirements for each. If the system was them deployed in the conference room scenario, an average end-to-end delay measurement of 6Oms may be obtained.</p>
<p>However, in embodiments of the present invention, the system may be started in the same superframe configuration of 0.1/lOOms, but may self-optimise to a different configuration, e.g. 0.3/3Oms, which results in a greatly improved average end-to-end delay result (25ms) for the delay sensitive traffic. There is a corresponding marginal increase in the end-to-end delay for the background traffic, but this is acceptable because the background traffic has no specific delay requirements.</p>
<p>Even if the access point somehow had a priori knowledge of the perfect superframe configuration, or the designer got it perfectly right for this scenario, the present invention still has the clear advantage of its reconfiguration ability.</p>
<p>In figure 6, a graph of end-to-end delay against time is shown for a fixed naïve superframe. The top graph of figure 6 shows the delay-sensitive traffic results, and the bottom graph of figure 6 shows the background traffic results. Note that the y-axis units on the top and bottom graphs are different. The end-to-end delay is about 60 units for delay-sensitive traffic.</p>
<p>Figure 7 shows a graph of end-to-end delay versus time for an adaptive superframe according to an embodiment of the invention. The top graph of figure 7 shows the delay-sensitive traffic results, and the bottom graph of figure 7 shows the background traffic results. The end-to-end delay is about 22 units for delay-sensitive traffic, which is a marked improvement on the system of figure 6.</p>
<p>Figure 8 shows a graph of end-to-end delay versus time for a fixed, perfect a priori knowledge superframe, with additional load. The top graph of figure 8 shows the delay-sensitive traffic results, and the bottom graph of figure 8 shows the background traffic results. The fixed superframe structure has the "perfect" 0.3/3Oms configuration for the initial network conditions, and gives an optimal end-to-end delay ofjust over 20 units.</p>
<p>With normal traffic flow, this system behaves in the same way as the adaptive system according to an embodiment of the invention. However, in a deviation from the normal traffic flow, e.g. if a sudden glut of delay sensitive traffic is introduced after a period of time, then the system can no longer cope, and the end-to-end delay for the delay sensitive traffic spirals out of control, to over 70 units. Also, as a result of the fixed configuration, the delay insensitive background traffic is provided with a low-delay service, which provides no advantage, as this traffic has no delay requirements.</p>
<p>Figure 9 shows a graph of end-to-end delay versus time for an adaptive superframe according to an embodiment of the invention, with additional load. The top graph of figure 9 shows the delay-sensitive traffic results, and the bottom graph of figure 9 shows the background traffic results. Where required, e.g. if a glut of delay sensitive traffic appears, the superframe can quickly be reconfigured, bringing the end-to-end delay of the delay sensitive traffic back into the target range ofjust over 20 units. As a trade-off, the background traffic will see an increased delay, but this is irrelevant as the</p>
<p>background traffic has no delay requirements.</p>
<p>Embodiments of the invention may be used with alternative standards, in addition to IEEE8O2. 11. For example, the standard IEEE8O2. lie includes a MAC protocol for use with the IEEE8O2. 11 defined technology.</p>
<p>It is advantageous, although not essential, if the present invention is used with a method of optimisation such as that described in GBO5 13533.0 by the present applicant.</p>
<p>In such an embodiment, certain assumptions are made in order to develop the objective function by which the access controller determines an optimal specification for the superframe. This example is now discussed with reference to an IEEE8O2. 1 lb compliant system as used in the Li et al. publications referred to above.</p>
<p>It will be clear to the reader of these documents that these are viable parameters for typical systems presently available, and allow a fair comparison of performance of the specific embodiment of the invention with the arrangements offered in those documents. Clearly, it will be evident to the skilled person that an actual implementation will use the parameters appropriate to the implementation in question.</p>
<p>For example, if an aspect of the present invention is being implemented in an 802.lin system then parameters suitable for such technology would be used instead.</p>
<p>For clarity, the general example, with algebraic representations of the parameters, will be set out in due course. The assumptions from the cited prior art set out above, and hence the example parameters used for the remainder of this section, include: * An IEEE8O2.1 lb system with a data-rate of 2Mbps; * Standardised polled-traffic payload sizes of 200bytes; * Ten data stations each generating frames with a mean size of 1000 bytes at a rate of 7.5 frames per second; * No bit-errors, interference, capture-effect or hidden terminals; and * RTS/CTS handshaking and power-saving disabled throughout.</p>
<p>Some specific parameters used in the present example are given in Table 1: Table 1: Model Parameters Parameter Value Parameter Value Slot 0.O2ms PIFS 0.O3ms SIFS 0.Olms DIFS 0.O5ms PLCP Header! MAC Header 28 bytes 0.192ms Preamble Mean data MSDU 1000 bytes AJV MSDU 200 bytes Data rate 2Mbps Control rate 1Mbps Beacon 160 bytes ACK 14 bytes From these parameters, the characteristics of a standard data exchange in each phase of the superframe can be identified, as illustrated in step S1-2 of Figure 10.</p>
<p>Using these standard exchanges with their implicit overheads, utility functions expressing the utilisation or wastage of each phase are derived by calling a procedure in step SI -4. This captures both the inherent efficiency of the exchange and the efficiency of the fit of the exchanges within the superframe structure. This procedure is illustrated as a two part process in figure 11.</p>
<p>Firstly, in step S2-2, the overhead incurred during the polling phase, V. the number of stations to be polled, is expressed in terms of CFPMAJ(, CFP and N, as shown in equation 1: -[o.o2N + {(CFPMAX * CFP,,)-2.228N}J/ (1) -(cap *CFP / MAX REP Then, in step S2-4, the utilisation of the contention period, L(NCTX), is similarly expressed in terms of CFPMAX, CFPp and NCTX, the number of stations transmitting during the contention period, as equation 2 shows: L(N) = i_[(0.674Ncr) + {((i -CFPMAX)CFPREP)_ 4.978Ncrx,,j/ -CFPMAX)CFP)] (2) These functions give the upper bounds on performance in different configurations, for example in the graph illustrated in figure 12, V is considered for different values of CFPMAX.</p>
<p>Further constraints could, in alternative versions of the specific embodiment, be expressed, such as capturing the minimal sizes of the CFP and CP as specified to the standard (as specified in IEEE8O2. 11 2003, specifically at paragraph 9.3.3.3.</p>
<p>Specifically, one constraint on the characterisation of the superframe is that the CFP has to be at least large enough to contain polled exchange (CFPo11+Data, CFPo11+Ack) comprising the largest payload possible in each direction, plus a Beacon and a CF-End.</p>
<p>Similarly, the CP has to be large enough to contain an exchange (plus ACK) of the largest payload possible. The largest payload is 2312 bytes in 802.1 lb (employing WE?, as stated in the standard).</p>
<p>Although the standard does not specify clearly the data rates for which transmission is to be enabled, in order to meet the objective of ensuring sufficient space for an exchange by any station, the data rate must be the lowest data rate possible -in this case, 1Mbps. Similarly, the standard does not clearly state whether time must be allowed for inter-frame spacing (IFS); however it would be evident to the skilled person that that the IFS must be included to complete the exchanges successfully. For the purposes of defining the largest possible size of the CFP duration, the standard includes SIFS (and two slot durations) in the calculation of the C? size, which suggests that this is an appropriate arrangement.</p>
<p>Hence, the CFP must be at least: CFPMIN PIFS Beacon + Data + SIFS + Data + SIFS + CF-End (3) = 0.03 + 1.696 + 18.912 + 0.01 + 18.912 + 0.01 + 0.352 =39.922ms And the CP must be at least: CPMIN DIFS + Data + SIFS + ACK (4) = 0.05 + 0 + 18.912 + 0.01 + 0.304 = 19.276 ms It should be noted that, in the standard, it is stated that this is true "when operating with a CW of aCWmin". The back-off mechanism draws a random value from the range [0, CW], where CW is the exponentially increasing value (increasing on each failed transmission) that is initialised at aCWmin, which is 31 for the 802.1 lb PHY (paragraphs 9.2.4 and 18.3.3 of the standard).</p>
<p>These additional constraints suggest that a number of other operational restrictions would, in some specific embodiments of the invention be appropriate, including that CFPp 60ms, and that combinations such as (CFPp=l00ms, CFPMAX=O.95) are invalid (as such a combination would leave a contention period duration of just 5ms).</p>
<p>Once all desired constraints have been derived in accordance with step Si -4, the process continues in step S 1-6, by constructing an objective function in accordance with optimisation practice. The derived utilisation functions L and V can be used directly in the following objective function: Obj(x) = (1-L(Nc))2 + (V(Np))2 (5) Then, taking into account the objective function of equation 5, the function of equation 6 below is optimised in step S1-8 to derive the apparently most desirable combination of CFPMAX and CFP. The manner in which this is achieved will now be described.</p>
<p>In the following, CFPMAX = x, with the assumption that CFPp (=y) is equal to the delay D. Using the data exchange characteristics L and V derived in step Sl-2 gives: (6) On establishment of the optimisation, the optimisation problem is a minimisation of f0(x,y) ,subject to: CFI -xy =0 C,-(1-x)y =O 0 =x =l 0 =y =D Considering the 802.1 lb constraints set out in the four publications by Li et al. above, the parameters have the following values M = 0.674 standardised data exchange overhead, ms H =4.978 $ standardised data exchange, ms N=l0 number of data stations C =2.228 b polled exchange duration, ms C =0.02 polled exchange overhead, ms CFF1, = 39.922 CFPMIN at 1Mbps, ms (from equation 3) CP =19.276 CPMEN at 1Mbps, ms, (from equation 4) D E (75, 87.5,100,112.5,..., 200} delay values under consideration N E{2,4,...,20} numbers of polling stations under consideration = 0.0075 packet rate of the contending traffic, used to estimate the effective number of contending stations The "Barrier Method" is then used to solve the optimisation problem stated above. In simple terms, the barrier method uses an "indicator function", formed by modifying the inequality constraints, to indicate whether the solution is feasible or not. Slight variations are applied to a parameter of the indicator function(s) is (are) successively and iteratively, with each iteration performing Newton's Method for that set of values.</p>
<p>In further detail, the barrier method is applied to this multivariate optimisation problem which seeks global minima of the objective function Due to the constraints on this optimisation, the choice of solution is restricted to a subset of feasible solutions defined by g(x) <0 and h(x) =0, where both g and h can be multi-valued functions. In the present non-linear case, provided thatf is twice continuously differentiable, solutions can be found using a mixture of analytic and numerical methods.</p>
<p>The optimisation function is re-expressed in vector form (as it is multivariate), and the constraints form the barriers after which the method is named. Gradients and Hessians (second derivatives) of the optimisation function and the barrier functions are taken.</p>
<p>Starting points (xO and yO) are found to initialise the Barrier Method and optimal methods for x and y can then be found.</p>
<p>Referring to figure 13, the barrier method is outlined qualitatively in steps si to s7, and detailed using pseudo-code in Table I below.</p>
<p>In step s 1, the loss function is expressed as in equation 5. In step s2, the constraints of the problem are chosen, as discussed above. In step s3, parameters 1, p and inner and outer tolerances of the algorithm t,,c, are initialised. Typical values might for example be t = 0.5, p =2, e, = 0.0001, arid i = 0.0001.</p>
<p>In step s4, a starting vector x that satisfies the constraints is chosen. In step s5, Newton's method is run until inner tolerance is met. Once inner tolerance e, is met, outer tolerance e., is evaluated; if the outer tolerance is also met, then in step s6 the new near-optimal vector x is taken as the output of the process. However, if outer tolerance , is not met, then in step s7 the logarithmic barrier accuracy parameter t is increased by a factor t, and the Newtonian process re-started using the last vector x.</p>
<p>Accuracy parameter t provides a trade-off between convergence performance and the number of iterations required for convergence. As t increases it provides a better approximation to an indicator function (see below), but at the cost of slower convergence.</p>
<p>It will be clear to a person skilled in the art however that, particularly in the case of pre-computed sequences, the barrier method may be initialised with a relatively high value of t and eliminate step s7. -Although the barrier method is appropriate to convex problems and the skilled person will appreciate that the present problem is not convex, the barrier method is still appropriately used by suitable selection of constraints.</p>
<p>given strictly feasible x, t > 0, t > 1, > 0, Ej > 0 repeat 1. Newton's method (x, > 0) a. = -V2f (x)1 Vf (x) A2 = Vf (x)H x b. quit if A2/2 < j return x* := x c. line, search (determine 8) d. x:=x+/3Ax 2. x x 3. quit if p/t < o 4. t:= pt Table 1: Pseudo code for barrier method optimisation for the cost function of equation 3.</p>
<p>For a given set of constraints (specifically the aforementioned 802.1 lb parameters and the assumptions in the papers by Li et a!.) ranges of values are then produced.</p>
<p>The access controller 230 is operable to apply the above described processes to operating parameters during operation of the network. In that way, changes to the operating parameters can be responded to by adjustment, if optimal to do so, of either or both of the superframe repetition period and the proportion of the superframe reserved for the CFP.</p>
<p>The access controller 230 of the described specific embodiment is shown as implemented as a discrete unit, but it will be appreciated that it could be integrated with one or more other functional units of the access point. Further, it would be possible for the function of the access controller to be distributed. The non-linear optimising determination functionality could be provided in one node, while the superframe definition functionality could be provided by entirely separate means.</p>
<p>The access controller is shown as implemented by hardware, and particularly by integrated circuit (IC) devices. However, it will be appreciated by the skilled person that some or all of the function of the access controller could optionally be implemented in a general purpose hardware unit configured by a suitable software product. Such a software product could be introduced by means of optical (or other) storage media, by means of a signal such as a download, or by any other way of enabling software to become stored on a computer apparatus. In such circumstances, the suitable computer apparatus could be IEEE8O2.ll compliant, or even IEEE8O2.1 le compliant, with further flinctionality in accordance with a specific embodiment of the invention to be provided by means of the software configuration.</p>
<p>Whereas the described embodiment illustrates operation of the optimisation process by the access controller in a dynamic environment, an alternative embodiment could provide a memory resource, such as a look up table, storing values of CFPMAX and CFPip for all possible configurations of the parameters. The currently most appropriate values of CFPMAX and CFPp could then be looked up by the access controller 230 and applied to the system.</p>
<p>For the avoidance of doubt, the present invention is not limited to applications involving 802.11 e technology -it can equally be applied to 802.11 technology involving PCF.</p>
<p>Further, it can be applied to any other communications technology in which a balance is struck between a period wherein access is centrally controlled and a period in which access is contended for. Although a PCF solution has been described above, embodiments of the invention also give backward compatibility with legacy equipment.</p>
<p>A PCF solution is likely to be of lower complexity than a full 802.1 le HFC solution, and thus to use less MIPS and less silicon. Mechanisms described in the above PCF solution may also be used in an extension of these embodiments to a full HCF-style TXOP grant.</p>
<p>The present invention further includes a general purpose computer, including wireless communications means for transmitting and receiving wireless communications signals, which is configured by computer executable instructions to operate as either an access controller or a superframe controller as described above. The computer executable instructions can be introduced as a computer program product, storing information defining such computer executable instructions. The product can comprise a storage medium, such as an optical or magnetic disk, or a signal, such as an internet based download.</p>
<p>Further variations, modifications and additional features will be apparent to the skilled man considering the above disclosure and no statement above is intended to limit the scope of protection sought for the invention, which is to be determined by reference to the appended claims, interpreted in the light of, but not specifically limited to, the above</p>
<p>description of specific embodiments.</p>

Claims (1)

  1. <p>CLAIMS: 1. A communication controller for a communications network with
    one or more communications stations across a communications medium, the communications network effecting communication by allocating first time periods during which the communication controller is operable to control access to the communications medium and second time periods during which the access to the communications medium is allowed on a contention basis, wherein the communication controller comprises: means for repeatedly determining proposed optimum lengths of said first andlor second time periods using a current set of network parameters; and configuration means for repeatedly reconfiguring the length of said first andlor second time periods according to said proposed optimum lengths.</p>
    <p>2. The communication controller of claim 1, wherein said current set of network parameters include a current estimated or measured network delay time.</p>
    <p>3. The communication controller of claim 2, wherein the network delay time is determined according to network traffic queuing times.</p>
    <p>4. The communication controller of claim 2, wherein the network delay time is determined according to end-to-end network traffic delay times.</p>
    <p>5. The communication controller of any previous claim, wherein said current set of network parameters include current delay requirements of communication stations on the network.</p>
    <p>6. The communication controller of any previous claim, wherein said current set of network parameters includes at least one of a current number of contention-free stations on the network, a current estimated number of contending stations on the network, required delay thresholds, traffic profiles, data rates and other network model assumptions.</p>
    <p>7. The communication controller of any previous claim, wherein said reconfiguration includes reducing the contention-free traffic delay and increasing the contention-based traffic delay in response to a measured or estimated bottleneck in the contention-free traffic.</p>
    <p>8. The communication controller of any previous claim, adapted to use a look up table to determine said first and second time periods, said look up table being configured according to a network model.</p>
    <p>9. The communication controller of claim 8, adapted to select one of a plurality of iookup tables according to a current set of network parameters.</p>
    <p>10. The communication controller of claim 8 or claim 9, adapted to reconfigure the iookup table during operation of the network in response to actual or expected changes in network parameters.</p>
    <p>11. The communication controller of any previous claim, configured to use measured end-to-end delay values to trigger an emergency recovery mechanism where the first and second time periods are temporarily configured to prioritise contention-free traffic more.</p>
    <p>12. The communication controller of any previous claim, adapted to perform a registration process with stations requiring contention free services, and to maintain a record of the number of stations currently requiring contention-free services.</p>
    <p>13. The communication controller of claim 12, further adapted to perform a de-registration process with stations that no longer require contention-free services.</p>
    <p>14. The communications controller of any previous claim, adapted to obtain an estimate of the number of non-contending stations using the measured network traffic flow.</p>
    <p>15. A controller in accordance with any previous claim, wherein the means for determining optimum lengths of the first and second periods comprises means for performing a constrained optimisation.</p>
    <p>16. A controller in accordance with claim 15 wherein the means for determining optimum lengths comprises means for performing an optimisation constrained by performance parameters of the system.</p>
    <p>17. A controller in accordance with claim 16 wherein the means for determining optimum lengths comprises means for performing a non-linear optimisation.</p>
    <p>18. A controller in accordance with claim 17 wherein the means for determining optimum lengths comprises means for performing an optimisation employing a barrier method.</p>
    <p>19. The communication controller of any previous claim, wherein the means for determining said proposed optimum lengths comprises storage means storing predetermined data calculated on the basis of a prior optimisation, for reference with regard to one or more look-up parameters.</p>
    <p>20. The communication controller of any previous claim, wherein the controller is IEEE8O2.1 1 compliant.</p>
    <p>21. The communication controller of any previous claim, adapted to re-configure a 22. A method of controlling access to a communications medium, comprising establishing a data frame structure for successive definition in the communications medium, the data frame structure defining a first period during which access to the communications medium is controlled centrally and a second period during which access to the communications medium is allowed on a contention basis, further comprising repeatedly determining a proposed optimum length of the first period and the second period using a current set of network parameters for the communication medium; and repeatedly reconfiguring the length of said first and/or second time periods according to said proposed optimum lengths.</p>
    <p>23. A superframe controller operable to establish a superframe in a communications network established on the basis of a communications superframe comprising a contention period and a contention free period, the controller including means for repeatedly determining a performance characteristic, means for repeatedly determining, on the basis of an optimisation process, superframe characterisation parameters and means for repeatedly deploying the superframe in accordance with the determined superframe characterisation parameters across the network, according to a current set of network parameters.</p>
    <p>24. A computer program product comprising computer executable instructions which, when executed by a general purpose computer provided with means for establishing wireless communications, cause said computer to be configured either to operate as an apparatus in accordance with any of claims I to 21, or to perform the method of claim 22, or to operate as a superframe controller in accordance with claim 23.</p>
    <p>25. A computer program product in accordance with claim 24, comprising a storage medium storing information defining the computer executable instructions.</p>
    <p>26. A computer program product in accordance with claim 24, comprising a computer receivable signal bearing data defining the computer executable instructions.</p>
GB0614454A 2006-07-20 2006-07-20 A Wireless Communication System Expired - Fee Related GB2440194B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0614454A GB2440194B (en) 2006-07-20 2006-07-20 A Wireless Communication System

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0614454A GB2440194B (en) 2006-07-20 2006-07-20 A Wireless Communication System

Publications (3)

Publication Number Publication Date
GB0614454D0 GB0614454D0 (en) 2006-08-30
GB2440194A true GB2440194A (en) 2008-01-23
GB2440194B GB2440194B (en) 2008-07-30

Family

ID=36998443

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0614454A Expired - Fee Related GB2440194B (en) 2006-07-20 2006-07-20 A Wireless Communication System

Country Status (1)

Country Link
GB (1) GB2440194B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010027332A1 (en) * 2008-09-02 2010-03-11 Agency For Science, Technology And Research Communication device and method for communication resource allocation

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2236606A (en) * 1989-06-24 1991-04-10 Motorola Israel Ltd Communications system with contention protocol
GB2347824A (en) * 1999-03-05 2000-09-13 Int Mobile Satellite Org Bandwidth allocation methods
EP1427150A2 (en) * 2002-12-02 2004-06-09 Samsung Electronics Co., Ltd. Method of transmitting multimedia data over WLAN and point coordinator in WLAN
US20040117497A1 (en) * 2002-11-30 2004-06-17 Samsung Electronics Co., Ltd. Media access control method and system in wireless network
WO2006050140A2 (en) * 2004-10-28 2006-05-11 The Regents Of The University Of California Dynamic adaptation for wireless communications with enhanced quality of service

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2236606A (en) * 1989-06-24 1991-04-10 Motorola Israel Ltd Communications system with contention protocol
GB2347824A (en) * 1999-03-05 2000-09-13 Int Mobile Satellite Org Bandwidth allocation methods
US20040117497A1 (en) * 2002-11-30 2004-06-17 Samsung Electronics Co., Ltd. Media access control method and system in wireless network
EP1427150A2 (en) * 2002-12-02 2004-06-09 Samsung Electronics Co., Ltd. Method of transmitting multimedia data over WLAN and point coordinator in WLAN
WO2006050140A2 (en) * 2004-10-28 2006-05-11 The Regents Of The University Of California Dynamic adaptation for wireless communications with enhanced quality of service

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010027332A1 (en) * 2008-09-02 2010-03-11 Agency For Science, Technology And Research Communication device and method for communication resource allocation

Also Published As

Publication number Publication date
GB2440194B (en) 2008-07-30
GB0614454D0 (en) 2006-08-30

Similar Documents

Publication Publication Date Title
US10477581B2 (en) Control of quality of service in overlapping basic service sets in wireless local area networks
Mangold et al. Analysis of IEEE 802.11 e for QoS support in wireless LANs
US7978636B2 (en) System and method for controlling throughput of access classes in a WLAN
JP4777614B2 (en) System and method for performing fast channel switching in a wireless medium
US20020093929A1 (en) System and method for sharing bandwidth between co-located 802.11a/e and HIPERLAN/2 systems
EP1374496B1 (en) Random medium access methods with backoff adaptation to traffic
Genc et al. Wi-Fi QoS enhancements for downlink operations in industrial automation using TSN
US8027331B2 (en) Data transmission method and communication system using the same
KR20050056119A (en) Distributed architecture for deploying multiple wireless local-area networks
Peng et al. Performance analysis of IEEE 802.11 e enhanced distributed channel access
Lindgren et al. Quality of service schemes for IEEE 802.11 a Simulation Study
Costa et al. Limitations of the IEEE 802.11 DCF, PCF, EDCA and HCCA to handle real-time traffic
Yan et al. A Markov-based modelling with dynamic contention window adaptation for LAA and WiFi coexistence
Tuysuz et al. A beacon-based collision-free channel access scheme for IEEE 802.11 WLANs
Junior et al. Experimental Evaluation of the Coexistence of IEEE 802.11 EDCA and DCF Mechanisms
Kaur et al. Qos in wlan using ieee802. 11e: Survey of qos in mac layer protocols
Villalón et al. B-EDCA: A QoS mechanism for multimedia communications over heterogeneous 802.11/802.11 e WLANs
Bandinelli et al. A link adaptation strategy for QoS support in IEEE 802.11 e-based WLANs
MacKenzie et al. Achieving service differentiation in IEEE 802.11 e enhanced distributed channel access systems
GB2440194A (en) Optimising superframe periods based upon network parameters
GB2440195A (en) Optimising superframe periods to reduce delay to delay-sensitive traffic
Moad et al. Padovan sequence based Backoff Algorithm for improved wireless medium access in MANETs
GB2427981A (en) Optimising a contention period of a superframe for a wireless network
Didi et al. Mobility and QoS of 802.11 and 802.11 e wireless LAN standards.
Zhao Performance analysis for VoIP traffic with limited retransmissions in IEEE 802.11-based wireless networks

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20140720