WO2022208210A1 - Non-zero random backoff procedure - Google Patents
Non-zero random backoff procedure Download PDFInfo
- Publication number
- WO2022208210A1 WO2022208210A1 PCT/IB2022/052293 IB2022052293W WO2022208210A1 WO 2022208210 A1 WO2022208210 A1 WO 2022208210A1 IB 2022052293 W IB2022052293 W IB 2022052293W WO 2022208210 A1 WO2022208210 A1 WO 2022208210A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- zero
- backoff
- backoff procedure
- sta
- channel
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 312
- 238000004891 communication Methods 0.000 claims description 37
- 101100172132 Mus musculus Eif3a gene Proteins 0.000 claims description 22
- 230000006870 function Effects 0.000 claims description 22
- 230000000977 initiatory effect Effects 0.000 claims description 5
- 230000004044 response Effects 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 25
- 101150081243 STA1 gene Proteins 0.000 description 24
- 230000005540 biological transmission Effects 0.000 description 24
- 101100161473 Arabidopsis thaliana ABCB25 gene Proteins 0.000 description 23
- 101100096893 Mus musculus Sult2a1 gene Proteins 0.000 description 23
- OVGWMUWIRHGGJP-WVDJAODQSA-N (z)-7-[(1s,3r,4r,5s)-3-[(e,3r)-3-hydroxyoct-1-enyl]-6-thiabicyclo[3.1.1]heptan-4-yl]hept-5-enoic acid Chemical compound OC(=O)CCC\C=C/C[C@@H]1[C@@H](/C=C/[C@H](O)CCCCC)C[C@@H]2S[C@H]1C2 OVGWMUWIRHGGJP-WVDJAODQSA-N 0.000 description 21
- 101000988961 Escherichia coli Heat-stable enterotoxin A2 Proteins 0.000 description 21
- 238000005516 engineering process Methods 0.000 description 14
- 238000004590 computer program Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 230000008901 benefit Effects 0.000 description 6
- 238000012549 training Methods 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000009827 uniform distribution Methods 0.000 description 3
- 230000003247 decreasing effect Effects 0.000 description 2
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 101100395869 Escherichia coli sta3 gene Proteins 0.000 description 1
- 101000752249 Homo sapiens Rho guanine nucleotide exchange factor 3 Proteins 0.000 description 1
- 102100021689 Rho guanine nucleotide exchange factor 3 Human genes 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000012634 fragment Substances 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
- H04W74/0841—Random access procedures, e.g. with 4-step access with collision treatment
- H04W74/085—Random access procedures, e.g. with 4-step access with collision treatment collision avoidance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- the technology of this disclosure pertains generally to channel contention procedures on a wireless network using CSMA/CA procedures, and more particularly to channel contention procedures which provide a bounded contention time when accessing the channel. [0006] 2. Background Discussion
- RTA real time applications
- the data generated from the RTA is referred to herein as RTA traffic and is packetized as RTA packets at the transmitter STA; while data generated from non-time sensitive applications are referred to herein as non-RTA traffic and are packetized as non-RTA packets at the transmitter STA.
- the RTA packets require low latency due to their high timeliness requirement of packet delivery, with the RTA packet data remaining valid only within a certain period of time.
- a non-zero backoff procedure is described for ensuring that the backoff counter must be decremented at least once between two CCA busy events during a backoff procedure.
- the contention time of an AC can be bounded by (CWmax+1)*TXOP_limit where CWmax is the max contention window size of that AC and TXOPJimit is the max TXOP limit for all the ACs.
- the non-zero backoff procedure is preferably utilized in conjunction with setting a short Arbitration Inter-Frame Spacing (AIFS) time (also referred to as AIFS Number (AIFSN)) for an AC to give the non-zero backoff procedure of that AC higher priority compared with the legacy backoff procedure of the same AC.
- AIFS Arbitration Inter-Frame Spacing
- FIG. 1 is a flow diagram of a WLAN system using Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) under IEEE 802.11.
- CSMA/CA Carrier Sense Multiple Access / Collision Avoidance
- FIG. 2 is a data field diagram of a data frame as defined in IEEE 802.11.
- FIG. 3 is a data field diagram of an ACK frame format as defined in IEEE 802.11.
- FIG. 4 is a data field diagram of a HE single user (SU) PPDU format as defined in IEEE 802.11.
- FIG. 5 is a communications diagram of retransmission in CSMA/CA where the backoff time is increased due to retransmission in IEEE 802.11.
- FIG. 6 is a communications diagram in which a packet is dropped after the number of retransmission exceeds the retry limit in IEEE 802.11.
- FIG. 7 is a queue diagram of an EDCA queue showing ACs and EDCA functions as defined in IEEE 802.11.
- FIG. 8 is a communications diagram of a channel access procedure for EDCA as defined in IEEE 802.11.
- FIG. 9 is a data field diagram of the format for an EDCA parameter set element as defined in IEEE 802.11.
- FIG. 10 is a data field diagram of a QoS Info field when sent by an AP as defined in IEEE 802.11.
- FIG. 11 is a data field diagram of the format for AC Parameter Record fields as defined in IEEE 802.11.
- FIG. 12 is a hardware block diagram of wireless station hardware according to at least one embodiment of the present disclosure.
- FIG. 13 is a hardware block diagram of a Multi-Link Device according to at least one embodiment of the present disclosure.
- FIG. 14 is a topology of a network scenario utilized by way of example and not limitation according to at least one example of the present disclosure.
- FIG. 15 is a flow diagram of a non-zero backoff procedure according to at least one example of the present disclosure.
- FIG. 16 is a communications diagram of a STA using non-zero backoff procedure for channel contention according to at least one example of the present disclosure.
- FIG. 17 is a communications diagram of a STA enabling and disabling non-zero backoff procedures for channel contention during different period of time according to at least one example of the present disclosure.
- FIG. 18 is a flow diagram of an AP sending the EDCA parameter set element to its associated STAs according to at least one example of the present disclosure.
- FIG. 19 is a queue diagram of EDCA queues in which a STA uses some EDCAFs for non-zero backoff procedures and other EDCAFs for legacy backoff procedures according to at least one example of the present disclosure.
- FIG. 20 is a flow diagram of using a new EDCA parameter set element to set the parameters for non-zero backoff procedures according to at least one example of the present disclosure.
- FIG. 21 is a data field diagram of a frame which includes EDCA parameter setting for non-zero backoff and legacy backoff procedures separately according to at least one example of the present disclosure.
- FIG. 22 is a data field diagram of a non-zero backoff EDCA parameter set according to at least one example of the present disclosure.
- FIG. 23 is a queue diagram of an EDCA system of a STA using EDCAFs for non-zero backoff procedures and other EDCAFs for legacy backoff procedure according to at least one example of the present disclosure showing ACs and EDCA functions.
- FIG. 24 is a communications diagram of a STA using a shorter Arbitration Inter-Frame Spacing (AIFS) time than that used for a legacy STA using a non-zero backoff procedure for the same AC according to at least one example of the present disclosure.
- AIFS Arbitration Inter-Frame Spacing
- FIG. 25 is a communications diagram showing another example of a STA using a shorter AIFS time than the legacy STA for the non-zero backoff procedures of the same AC according to at least one example of the present disclosure.
- the RTA packet requires low latency due to its high timeliness requirement on packet delivery.
- the RTA packet is valid when it is delivered within a certain period of time.
- Certain RTA packet traffic also is benefited by (or requires) a bounded (more predictable) channel contention time that provided by a CSMA/CA wireless system.
- each STA needs to sense and contend for channel access before transmitting each packet. Though a short channel contention time accelerates channel access, it does not provide bounded channel access time. The delay caused by channel contention is still significant and unpredictable.
- a process is described which bounds the delay caused by channel contention by utilizing a non-zero (NZ) backoff procedure which can be beneficial for RTA packets.
- the disclosed non-zero backoff procedure can guarantee a bounded time for STAs to complete channel contention.
- the non-zero backoff procedure obtains a higher probability to gain an earlier channel access than the legacy backoff procedure, assuming their EDCA parameters are the same except that the Arbitration Inter-Frame Spacing (AIFS), of the non-zero backoff procedure is shorter than the AIFS of the legacy backoff procedure.
- AIFS Arbitration Inter-Frame Spacing
- FIG. 1 depicts a WLAN system under IEEE 802.11 using Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) to allow stations (STAs) to obtain channel access for packet transmissions and retransmissions.
- CSMA/CA Carrier Sense Multiple Access / Collision Avoidance
- the STA Before each transmission and retransmission, the STA must sense the channel and set a backoff time in order to contend for channel access.
- the backoff time is decided by a uniform random variable between zero and the size of contention window (CW). After the STA waits for the backoff time and senses that the channel is idle, it proceeds to transmit (send) a packet.
- a retransmission may be required if the STA does not receive an ACK before timeout; otherwise the transmission succeeds.
- the STA checks the number of retransmissions of the packet. If the number of retransmissions exceeds the retry limit, then the packet is dropped and no retransmissions are scheduled. Otherwise, the retransmissions are scheduled.
- the STA sets another backoff time depending on the new size of the contention window.
- the STA waits the backoff time for retransmission and continues forward in that manner.
- FIG. 2 illustrates the data frame format in a regular WLAN system.
- a Frame Control field indicates the type of frame.
- a Duration field contains NAV information used for CSMA/CA channel access.
- An RA field contains an address for the recipient of the frame.
- a TA field contains the address for the STA that transmitted the frame.
- a Sequence control field contains the fragment number and the sequence number of a packet.
- An HT control field indicates extra control information for the frames.
- FIG. 3 illustrates the ACK frame format in regular WLAN system.
- a Frame Control field indicates the type of frame.
- a Duration field contains NAV information used for CSMA/CA channel access.
- An RA field contains an address for the recipient of the frame.
- FIG. 4 shows the HE single user (SU) PPDU format used for single user transmission in IEEE 802.11 ax which contains the following fields.
- An L-STF field provides a non-HT short training field.
- An L-LTF field provides a non-HT long training field.
- An L-SIG field provides a non-HT SIGNAL field.
- An RL-SIG field provides a repeated non-HT SIGNAL field.
- An HE-SIG-A field provides an HE SIGNAL A field.
- An HE-STF field provides an HE short training field.
- An HE-LTF field provides an HE long training field.
- a Data field is the field carrying PHY layer convergence protocol Service Data Units (PSDUs).
- a PE field is a packet extension field.
- FIG. 5 illustrates one example of retransmission in CSMA/CA where the backoff time is increased in response to performing retransmission.
- the data frame and the ACK frame use formats as shown in FIG. 2 and FIG. 3, respectively.
- the frames are packetized using the packet format as shown in FIG. 4.
- the transmitter transmits the initial transmission of a packet, it does not receive the ACK before the ACK timeout. Then, for a retransmission it sets another backoff time in which the size of the contention window is n slots.
- the transmitter STA After waiting the backoff time, the transmitter STA retransmits the packet for the first time. However, the retransmission also fails.
- the transmitter STA needs to retransmit the packet and sets another backoff time to contend for channel access. This time, the size of the contention window is doubled, which is 2*n slots, due to the retransmission.
- the expected backoff time is also doubled by the contention window size.
- the second retransmission succeeds since it receives an ACK before timeout.
- FIG. 6 illustrates one example in which the packet is dropped after the number of retransmissions exceeds the retry limit.
- the retry limit is denoted by “R”.
- the data frame and the ACK frame use the formats as shown in FIG. 2 and FIG. 3, respectively.
- the frames are packetized using the packet format as shown in FIG. 4. As shown in FIG.
- the transmitter STA after the initial transmission of a packet fails, the transmitter STA retransmits that packet multiple times. Flowever, none of the retransmissions succeed. After retransmitting R times, the number of retransmissions exceeds the retry limit, and the transmitter STA stops retransmitting that packet and the packet is dropped.
- FIG. 7 illustrates the reference model of the Enhanced DCF Channel Access (EDCA) queue in IEEE 802.11 ; where DCF stands for Distributed Coordination Function.
- the system contains six transmit queues and four access categories (ACs). Each AC uses EDCA functions (EDCAFs) to contend for channel access for transmitting packets from its corresponding transmit queues, which is an enhanced variant of the DCF.
- EDCAFs EDCA functions
- the six transmit queues are voice (VO), alternate voice (A_VO), alternate video (A_VI), video (VI), best effort (BE), and background (BK).
- Each transmit queue decides the transmission order of the packets in the queue.
- the four ACs are voice (VO), video (VI), best effort (BE), and background (BK).
- Each AC has an EDCA function (EDCAF) to provide the function of channel contention.
- EDCAF EDCA function
- An internal collision avoidance mechanism is used when multiple EDCAFs try to access the channel at the same time. When the internal collision occurs, the EDCAF with higher priority will gain channel access.
- Table 1 lists the User Priority (UP) to Access Class (AC) mapping used in EDCA queue of IEEE 802.11. The second and third columns represent the user priorities of the traffic and their corresponding designations in IEEE 802.1 D. In each row, according to user priority, the traffic will be enqueued in the corresponding transmit queue and access category. The priority increases from the top row to the bottom row. The traffic with higher priority has higher probability to be transmitted earlier.
- FIG. 8 illustrates a channel access procedure for EDCA. As shown in the figure, it also compares EDCA channel access with the Distributed Coordination Function (DCF).
- DCF Distributed Coordination Function
- DCF is the basic medium access protocol for IEEE 802.11 which employs the CSMA/CA with exponential backoff algorithm.
- the STA determines that the medium is idle at the time that a frame arrives at an empty queue for transmission, the STA is able to immediately access the channel and the medium is free for a DCF Interframe Space (DIFS) time. Otherwise, it follows the backoff procedure to contend for the channel. After sensing channel idle for DIFS time, it starts to count down backoff as long as the medium is idle. The number of backoff slots is randomly chosen between zero and its contention window.
- the STA pauses to count down the backoff when CCA busy (or medium busy) occurs, i.e., when the STA senses the channel is busy. When the backoff counts down to zero, the STA starts to transmit packets.
- DCF is a CSMA/CA with exponential backoff algorithm and EDCA is implemented based on DCF.
- the fundamental access method of the MAC used by non- DMG STAs is a DCF known as carrier sense multiple access with collision avoidance (CSMA/CA).
- the DCF shall be implemented in all STAs.
- the EDCA channel access protocol is derived from the DCF procedures described in 10.3 (DCF) by adding four independent enhanced distributed channel access functions (EDCAFs) to provide differentiated priorities to transmitted traffic, through the use of four different access categories (ACs).”
- the EDCAF of an AC as shown in FIG. 7 is able to immediately access the channel and the medium is free for the arbitration Inter-Frame Spacing (AIFS) time (or number) of that AC when the EDCAF determines that the medium is idle at the time that a frame arrives at the empty queue of that AC for transmission.
- AIFS[i] as shown in the figure represents the AIFS time for AC i; where “i” denotes any of the ACs.
- each EDCAF follows the backoff procedure to contend for the channel and gain channel access for that AC. After sensing the channel is idle for AIFS time, it starts to count down a backoff as long as the medium is idle.
- the number of backoff slots is randomly chosen between zero and the contention window size of that AC.
- the EDCAF pauses to count down the backoff when Clear Channel Assessment (CCA) busy (or medium busy) occurs, i.e. , when the channel is sensed busy.
- CCA Clear Channel Assessment
- EDCAFs can contend for the channel in parallel.
- EDCAFs for AC i and AC j can contend for the channel at the same time as shown in FIG. 8.
- An AC is able to reserve a period of contention free time, for example a TX Opportunity (TXOP) for transmitting packets.
- TXOP TX Opportunity
- the maximum duration of TXOP is denoted as the TXOP limit.
- AIFS Number represents the AIFS duration in terms of the number of backoff slots, and is also referred to herein as AIFS time.
- the TXOP limit represents the maximum duration of TXOP that each AC can reserve each time except for when the TXOP limit is set to zero.
- a STA can’t reserve TXOP for multiple packet transmissions.
- the AP can transmit or broadcast a frame including an EDCA parameter set element to set the EDCA parameters on its associated STAs.
- FIG. 9 illustrates the format of an EDCA parameter set element defined in IEEE 802.11.
- An Element ID field contains an identification of the element indicating in this example that this element is an EDCA parameter set element.
- a Length field indicates the length of the element.
- a QoS Info field is defined in IEEE 802.11 as shown in FIG. 10.
- An Updated EDCA Info field is defined in IEEE 802.11 and reserved for non- S1G STA.
- An AC_BE Parameter Record field carries the EDCA parameters of AC_BE. The format of this subfield and the following subfields is shown in FIG. 11.
- An AC_BK Parameter Record field carries the EDCA parameters of AC_BK.
- An AC_VI Parameter Record field carries the EDCA parameters of AC_VI.
- An AC_VO Parameter Record field carries the EDCA parameters of AC_VO.
- FIG. 10 illustrates the format of the QoS Info field when sent by the AP as defined in IEEE 802.11.
- An EDCA Parameter Set Update Count field indicates the version of the EDCA parameter set. If the non-AP STA receives this with a different value that what it has stored, then the STA should update the EDCA parameters according to the recently received EDCA parameter element.
- a Q-ACK field is set to a first state (e.g., “1”) when dot11 QAckOptionlmplemented is true and is set to 0 otherwise.
- a Queue Request field is set to a first state (e.g., “1”) if APs can process a non-zero queue size subfield in the QoS control field of the QoS data frames and is set to a second state (e.g., “0”) otherwise.
- a TXOP Request field is set to a first state (e.g., ⁇ ”) if APs can process a non-zero TXOP Duration requested subfield in the QoS control field of QoS data frames and is set to a second state (e.g., “0”) otherwise.
- FIG. 11 illustrates the format of AC_X (e.g., AC_VO, AC_VI, AC_BE, AC_BK) Parameter Record field as defined in IEEE 802.11.
- An AC/AIFSN field indicates the access category (AC) of this field and the parameter set of the AIFSN.
- An ECWmin/ECWmax field indicates the minimum contention window (CW) size and maximum CW size of the AC.
- a TXOP limit field indicates the TXOP limit of the AC.
- wireless communication systems using 802.11 using random backoff procedure can access the channel without decrementing any backoff slots. Therefore, it is possible that during a backoff procedure of a STA, its backoff counter does not decrease between two successive CCA busy events if the second CCA busy is caused by another STA accessing the channel without decrementing any backoff slots. As a result, the contention time (the time for one backoff procedure) is not bounded (it is unconstrained). This type of operation is not suitable for transmissions which require a bounded latency.
- the disclosed technology describes a non-zero (NZ) backoff procedure to ensure the backoff counter is set (initialized) to at least one count.
- the backoff counter is set to a random number between 1 and CW+1.
- the legacy backoff procedure can initialize its backoff counter to zero since the backoff counter is randomly chosen between 0 and CW. If all STAs use a non-zero backoff procedure, then the backoff counter of a STA must decrease by at least one count between two CCA busy events.
- the time for counting down the backoff counter to zero for a STA when using non-zero backoff procedure, is bounded by (CWmax+1)*TXOP_limit where CWmax is the maximum contention window size of the backoff procedure and TXOP_limit is the maximum contention-free channel time that a STA can reserve for transmission after it gains channel access.
- this non-zero backoff procedure is used by the EDCAF of an AC in EDCA, it is preferably utilized with a shorter AIFS time (smaller AIFSN) so that the non-zero backoff procedure is given a higher priority compared with legacy backoff procedure with the same CW.
- FIG. 12 illustrates an example embodiment 10 of a wireless station (STA) configured for executing the protocol of the present disclosure.
- STA wireless station
- An external I/O connection 14 preferably couples to an internal bus 16 upon which are connected a CPU 18 and memory (e.g., RAM) 20 for executing a program(s) which implement the communication protocol.
- the host machine accommodates at least one modem 22 to support communications coupled to at least one RF module 24, 28 each connected to one or multiple antennas 29, 26a, 26b, 26c through 26n.
- An RF module with multiple antennas allows for performing beamforming during transmission and reception. In this way, the STA can transmit signals using multiple sets of beam patterns.
- Bus 14 allows connecting various devices to the CPU, such as to sensors, actuators and so forth.
- Instructions from memory 20 are executed on processor 18 to execute a program which implements the communications protocol, which is executed to allow the STA to perform in different roles on the network, such as that of an access point (AP) station or a regular station (non-AP STA).
- AP access point
- non-AP STA regular station
- the programming is configured to operate in different modes (TXOP holder, TXOP share participant, source, intermediate, destination, first AP, other AP, stations associated with the first AP, stations associated with other AP, coordinator, coordinatee and so forth), depending on what role it is performing in the current communications context.
- the STA hardware is shown configured with at least one modem, and associated RF circuitry for providing communication on at least one band.
- This may be any desired combination of sub-6 GFIz bands and directional bands.
- At least one embodiment of the present disclosure is configured for using the sub-6 GFIz band.
- the present disclosure can be configured with multiple modems 22, with each modem coupled to an arbitrary number of RF circuits. In general, using a larger number of RF circuits will result in broader coverage of the antenna beam direction. It should be appreciated that the number of RF circuits and number of antennas being utilized is determined by hardware constraints of a specific device. A portion of the RF circuitry and antennas may be disabled when the STA determines it is unnecessary to communicate with neighboring STAs.
- the RF circuitry includes frequency converter, array antenna controller, and so forth, and is connected to multiple antennas which are controlled to perform beamforming for transmission and reception. In this way the STA can transmit signals using multiple sets of beam patterns, each beam pattern direction being considered as an antenna sector.
- MLD multi-link device
- FIG. 13 illustrates an example embodiment 40 of a Multi-Link Device (MLD) hardware configuration.
- MLD Multi-Link Device
- Multiple STAs are affiliated with an MLD, with each STA operating on a link of a different frequency.
- the MLD has external I/O 41 access to applications, this access connects to a MLD management entity 48 having a CPU 62 and memory (e.g., RAM) 64 to allow executing a program(s) that implements communication protocols at the MLD level.
- the MLD can distribute tasks to, and collect information from, each affiliated station to which it is connected, exemplified here as STA 1 42, STA 244 through to STA N 46 and share information between affiliated STAs.
- each STA of the MLD has its own CPU 50 and memory (RAM) 52, which is generally coupled through a bus 58 to at least one modem 54 which is connected to at least one RF circuit 56 which has one or more antennas.
- the RF circuit has multiple antennas 60a, 60b, 60c through 60n, such as in an antenna array.
- the modem in combination with the RF circuit and associated antenna(s) transmit/receive data frames with neighboring STAs.
- the RF module includes frequency converter, array antenna controller, and other circuits for interfacing with its antennas.
- each STA of the MLD does not necessarily require its own processor and memory, as the STAs may share resources with one another and/or with the MLD management entity, depending on the specific MLD implementation. It should be appreciated that the above MLD diagram is given by way of example and not limitation, whereas the present disclosure can operate with a wide range of MLD implementations.
- FIG. 14 illustrates an example embodiment 70 of a topology (network scenario), given by way of example and not limitation.
- the topology is provided solely to explain the goals of the proposed technology, not to limit it to a specific STA configuration.
- An MLD is considered an AP MLD if APs are affiliated with that MLD.
- An MLD is considered a non-AP MLD if non-AP STAs are affiliated with that MLD.
- the example topology of FIG. 14 assumes there are 6 STAs consisting 3 MLDs in a given area (e.g., meeting room).
- AP1 80 and AP2 82 are affiliated with multi-link device (MLD) #1 72
- STA1 84 and STA486 are affiliated with MLD#274
- STA388 and STA590 are affiliated with MLD#3 76.
- STA278 can exemplify a non-AP STA operating on Linkl 92 or a single link MLD (i.e. , a special MLD which only has one STA and operates on one link).
- STA1 , STA2, and STA3 are associated with AP1 over Linkl 92, 94a and 96a; and STA4 and STA5 are associated with AP2 over Link294b and 96b.
- all STAs use EDCA for random channel access on all links.
- a non-zero backoff procedure is a backoff procedure in which a STA has to generate a random backoff with a count greater than or equal to 1 (backoff slots) to initialize the backoff counter for channel contention. Then, the STA can count down the backoff counter the same as it does in CSMA/CA. It is also possible that the CW can be updated as in the CSMA/CA.
- FIG. 15 illustrates an example embodiment 110 of a non-zero backoff procedure.
- a STA intends to initiate 112 the transfer of one or more frames, it waits 114 until the medium/channel is idle without interruption for a period of time equal to IFS, such as DIFS, AIFS[AC_i] (AIFS when the STA contends for a channel for AC_i), EIFS as defined in IEEE 802.11.
- IFS such as DIFS, AIFS[AC_i] (AIFS when the STA contends for a channel for AC_i), EIFS as defined in IEEE 802.11.
- the STA may apply those different types of IFSs according to the rule defined in IEEE 802.11. It is also possible that the STA uses either DIFS or AIFS[AC_i] only.
- the STA After the IFS channel/medium idle time, the STA generates 116 a non-zero random backoff count (i.e. , the number of backoff slots) for an additional deferral time before transmitting. That is, Backoff Count is greater or equal to one.
- Backoff Count is greater or equal to one.
- Random() Pseudorandom integer drawn from a uniform distribution over the interval [1, CW+1], where CW is the contention window size.
- Random() Pseudorandom integer drawn from a uniform distribution over the interval [1 , CW], where CW is the contention window size.
- Random() Pseudorandom integer drawn from a uniform distribution over the interval [m, n], where m and n are integers, and n is greater than m, which is greater than or equal to 1.
- the STA counts down 118 the backoff counter.
- a check 120 determines if the medium/channel becomes busy before the backoff counter reaches a terminal count (e.g., 0). If it has become busy, then at block 122 it stops counting down the backoff counter and returns to block 114 where the STA waits until the medium/channel is idle without interruption for a period of time equal to IFS; then the STA continues counting down the backoff counter. It should be noted that since the backoff counter contains a non-zero value, the STA does not generate a new random backoff count after waiting for the IFS time.
- FIG. 16 illustrates an example embodiment 130 of a STA using a non-zero backoff procedure in DCF for channel contention.
- the network topology is shown in FIG. 14, with interactions here between AP1 132,
- STA1 and AP1 are performing a legacy backoff as defined in DCF of IEEE 802.11 138.
- STA2 starts non-zero backoff procedure 140. It first waits a DIFS time 141 and sets the backoff counter equal to 1 143. When the backoff counter counts down to zero 142, STA2 accesses the channel and starts packet transmission 144.
- FIG. 17 illustrates an example embodiment 150 of a STA enabling and disabling a non-zero backoff procedure for channel contention by time.
- the network topology is shown in FIG. 14.
- STA1 134 and AP1 132 are depicted.
- STA1 uses a non-zero backoff procedure 134 during a scheduled period of time 152.
- This scheduled period of time could be determined by the STA, negotiated between the AP and STA, or allocated by the AP.
- a scheduled period of time could be a restricted Target Wake Time (TWT) service period (SP) or scheduled period of FICF Controlled Channel Access (FICCA) in IEEE 802.11 be.
- TWT Target Wake Time
- SP restricted Target Wake Time
- FICCA FICF Controlled Channel Access
- STA1 when STA1 uses a non-zero backoff procedure in an EDCAF, it can also use an AIFS whose time is different from that of the legacy backoff procedure. For example, for AC_VO, when STA1 uses non-zero backoff procedure, it can set the AIFSN of AC_VO to 1. When STA1 uses a legacy backoff procedure, it can set the AIFSN of AC_VO to 2.
- the current backoff procedure used in IEEE 802.11 is denoted as a legacy backoff procedure.
- the STA not supporting non-zero backoff procedure is denoted as a legacy STA.
- One purpose of the disclosed technologies is to make the non-zero backoff procedure to provide a higher priority than the legacy backoff procedure.
- the non-zero backoff procedure can use a shorter AIFS time than the legacy backoff procedure.
- a STA using a non-zero backoff procedure for AC VO can set the AIFSN of AC_VO to 1
- another STA using legacy backoff procedure for AC VO can set the AIFSN of AC_VO to 2.
- the STA only reduces the AIFS time for an AC without using the non-zero backoff procedure to increase its priority.
- the AIFS time should be greater, or equal to, the Point Coordination Function Interframe Space (PIFS) time to ensure the error recovery procedure for retransmissions can access the channel faster.
- PIFS Point Coordination Function Interframe Space
- an AP can send a frame including an EDCA parameter set element as shown in FIG. 9 to set the EDCA parameters of the legacy backoff procedure on its associated STAs.
- this element it is possible to reuse this element to set the EDCA parameters for a non-zero backoff procedure.
- FIG. 18 illustrates an example embodiment 170 of an AP sending the EDCA parameter set element to its associated STAs.
- the purpose exemplified here is that of letting the AP send the same EDCA parameter setting that could be used for EDCA parameter setting for both the non-zero backoff procedure and the legacy backoff procedure on its associated STAs.
- the AP first transmits or broadcasts 172 a frame including the EDCA parameter setting, e.g., EDCA parameter set element, to its associated STAs.
- a check 174 is performed to determine, if the receiver STA supports a non-zero backoff procedure. If the non-zero backoff is supported then at block 176, the STA sets its EDCA parameter AIFSN[AC_i] (i.e. , the AIFSN for AC_i) equal to that parameter from AP minus one or more, and can use non-zero random backoff procedure to contend for the channel.
- the AIFSN[AC_VO] is 2 in the EDCA parameter set element from AP.
- the STA sets the AIFSN[AC_VO] to 1 for a non-zero backoff procedure for AC_VO.
- the rest of the parameters for that AC_i can be set the same as those from the AP or adjusted similar as AIFSN.
- the STA decides which EDCAFs use non-zero backoff procedure and/or which time an EDCAF uses a non-zero backoff procedure.
- the STA sends information to inform the AP that it supports non-zero backoff procedure, and the AP can make a determination for the STA whether to use non-zero backoff procedure or not. This decision can also be made either by the AP only, or negotiated between the AP and the STA.
- the supporting of non-zero backoff procedure can be a capability of a STA while a non-AP STA can send this capability information with other capability information of the non-AP STA to an AP.
- FIG. 19 illustrates an example embodiment 190 in which an EDCA system of a STA uses some EDCAFs for a non-zero backoff procedure and other EDCAFs for a legacy backoff procedure, for accessing Channel 210.
- MSDU MAC Service Data Unit
- UP User Priority
- the AC queues are shown as AC_VO 194, AC_VI 198, AC_BE 202 and AC_BK 206.
- the AC_VO EDCAF 196 uses a non-zero backoff procedure with short AIFS while the EDCAFs 200, 204 and 208 of the other ACs use a legacy backoff procedure.
- the STA can use the parameters from the EDCA parameter set element as received from the AP, which is shown as in Table 3.
- the STA determines which EDCAFs will use non-zero backoff procedures and/or which time periods that an EDCAF will use a non-zero backoff procedure. Alternatively, this determination can be performed by the AP only, or a determination negotiated between the AP and the STA.
- Table 3 shows an example of using the same EDCA parameter set element to set the parameters for both legacy backoff procedure and non zero backoff procedure.
- EDCAF of an AC is enabled to use non-zero backoff procedure, it can set AIFSN of that AC to a value less than that in the received EDCA parameter set element.
- the AIFSN of AC_VO is set to 1 which is less than that in the EDCA parameter set element (i.e. , 2).
- the EDCA parameters of those ACs should be the same as they are in the EDCA parameter set element.
- CWmin and CWmax can utilize predetermined integers.
- a new EDCA parameter set element can be defined to set the parameters for non-zero backoff procedure.
- the new EDCA parameter set element for the non-zero backoff procedure can be set similar to FIG. 22 and it can be carried by a frame similar to that described in FIG. 21.
- the AP can send or broadcast a frame similar to FIG. 21 to set the EDCA parameters for a legacy backoff procedure and for a non-zero backoff procedure separately.
- FIG. 20 illustrates an example embodiment 230 of using a new EDCA parameter set element to set the parameters for non-zero backoff procedure.
- the AP transmits or broadcasts 232 a frame including the EDCA parameter setting for the legacy backoff procedure (e.g., EDCA parameter set element) and the EDCA parameter setting for the non-zero backoff procedure (e.g., non-zero backoff EDCA parameter set element) separately.
- the legacy backoff procedure e.g., EDCA parameter set element
- the EDCA parameter setting for the non-zero backoff procedure e.g., non-zero backoff EDCA parameter set element
- a check 234 determines, if the receiver STA supports a non-zero backoff procedure. If it is a legacy STA, then in block 238 it ignores the EDCA parameter setting for the non-zero backoff procedure.
- the receiver STA If, however, the receiver STA supports a non-zero backoff procedure, then in block 236 it uses the EDCA parameter setting for the non-zero backoff procedure in the received frame. It will be noted that when a STA receives the EDCA parameter setting of an AC for the non zero backoff procedure from AP, the choice can be either mandatory or optional on whether the STA enables the non-zero backoff procedure for that AC. When a STA uses EDCA parameter settings of an AC for the non zero backoff procedure, it may ignore the EDCA parameter setting of that AC for the legacy backoff procedure in the received frame. Note that a STA may enable or disable non-zero backoff procedure by time. [00130] FIG.
- a Frame Control field indicates the type of frame.
- a Duration field contains NAV information used for CSMA/CA channel access.
- Address 1 field contains an address for the recipient of the frame.
- Address 2 field contains the address of the STA that transmitted the frame.
- Address 3 field contains the BSSID of the BSS of the recipient.
- a Sequence control field indicates the sequence number of the frame.
- An FIT control field indicates the extra control information for the frames.
- An EDCA parameter set element is configured to allow the AP to set this field to indicate the EDCA parameter setting for the legacy backoff procedure. When the STA receives this field, it can use the parameters in the field for a legacy backoff procedure.
- a Non-zero backoff EDCA parameter set element is configured to allow the AP to set this field to indicate the EDCA parameter setting for the non-zero backoff procedure. When a STA receives this field, it can use the parameters in the field for a non-zero backoff procedure.
- One example format of this field is shown in FIG. 22.
- FIG. 22 illustrates an example embodiment 270 of a non-zero backoff EDCA parameter set parameter.
- An Element ID and Element ID extension fields provide identification of the element to indicate this element is non-zero backoff EDCA parameter set element.
- a Length field indicates the length of the element.
- a QoS Info field can be defined and configured to operate as in IEEE 802.11 as per FIG. 10.
- An Updated EDCA Info field can be defined and utilized as it is in IEEE 802.11 as shown in FIG. 10.
- An AC Parameter Records field carries multiple AC Parameter
- FIG. 23 illustrates an example embodiment 290 of an EDCA system of a STA using EDCAFs for non-zero backoff procedure and other EDCAFs for legacy backoff procedure.
- MSDU MAC Service Data Unit
- UP User Priority
- the EDCAFs 296, 300 and 304 of selected AC exemplified as AC_Y, AC_X and AC_VO uses the non-zero backoff procedure with short AIFS while the EDCAFs 308, 312 and 316 of the other ACs use legacy backoff procedures to obtain channel access 318.
- the STA can use the parameters from the EDCA parameter set element as received from the AP for the legacy backoff procedure and the parameters from the non-zero backoff EDCA parameter set element received from AP for the non-zero backoff procedure, such as is shown as in Table 4.
- the STA can determine (decide) which EDCAFs are to use a non-zero backoff procedure and/or which time periods that an EDCAF is to use the non-zero backoff procedure. Alternatively, this decision can be made by the AP acting alone or a decision negotiated between the AP and the STA.
- Table 4 shows an example of using the EDCA parameter set element to set the parameters for legacy backoff procedure and using the non-zero backoff EDCA parameter set element to set the parameters for a non-zero backoff procedure.
- the EDCAF of an AC is enabled to use non-zero backoff procedure, it should use the same parameters of that AC as in the received non-zero backoff EDCA parameter set element.
- the AIFSN of AC X is set to 3, CWmin to (aCWmin+1 )/4-1 , CWmax to (aCWmin+1 )/2-1 , TXOP limit to 2ms. It will be noted that aCWmin and aCWmax can be predetermined integers.
- FIG. 24 illustrates an example embodiment 330 of a STA using shorter AIFS for a non-zero backoff than that used for a legacy STA procedure of the same AC.
- the figure illustrates coexistence of non-zero backoff procedure and legacy backoff procedure.
- the network topology is shown in FIG. 14, and depicts AP1 132, STA1 134 and STA2 136.
- AP1 and STA2 start non-zero backoff procedures 334 for AC_i while STA1 uses a legacy backoff procedure 336 for AC_i.
- the STAs first wait an AIFS time before counting down the backoff 338.
- the AIFS of AC_i of STA1 is one backoff slot time longer than that of AP1 and STA2.
- AP1 and STA2 end the AIFS time of AC_i earlier than STA1 and starts/continues counting down the backoff slots.
- This gives the non-zero backoff procedure higher probability of accessing the channel earlier (i.e. , higher priority) than the legacy backoff procedure for AC_i, especially when the two backoff procedures share the same CW to generate random backoff slots.
- This can also ensure that each time AP1 and STA2 enter CCA busy (or medium busy) after starting counting down backoff slots, the backoff counter is decreased by at least one.
- STA1 is allowed to immediately access the channel and start packet transmission 340 after its AIFS of AC_i according to the legacy backoff procedure.
- the AIFS time of AC_i of STA1 can be multiple backoff SlotS time longer than that of AP1 and STA2.
- FIG. 25 illustrates an example embodiment 370 of a STA using a shorter AIFS than the legacy STA for the non-zero backoff procedures of a same AC.
- the figure shows another example of coexistence of non-zero backoff procedure and legacy backoff procedure.
- the network topology is shown in FIG. 14, and depicts the same STAs as in FIG. 24.
- STA2 starts 372 a non-zero backoff procedure using a short AIFS 334 for AC_i.
- AP1 and STA1 use a legacy backoff procedure for AC_i with a legacy AIFS 336.
- this example shows that it is possible that a STA supporting non zero backoff procedure can associate with a legacy AP and still use the non-zero backoff procedure.
- the EDCA parameter setting for the non-zero backoff procedure can be the same or similar to that described in FIG. 18.
- the STAs first wait an AIFS time before counting down the backoff.
- STA2 should end the AIFS time of AC_i earlier than STA1 and start/continue to count down the backoff slots.
- This can also ensure that every time STA2 enters CCA busy (or medium busy) after starting counting down backoff slots, the backoff counter is decreased by at least one.
- STA1 is allowed to immediately access the channel and start packet transmission 374 after its AIFS of AC_i due to the rule of the legacy backoff procedure.
- AIFS time of AC_i of STA1 can be multiple backoff slots spanning a time longer than that of AP1 and STA2.
- STA2 After STA1 performs its transmission, STA2 is seen performing a short AIFS 334 and starting to count down 338, while AP1 uses the legacy AIFS 336 which takes longer. STA2 is first to count down the backoff to zero 376 and start its packet transmission 378.
- Embodiments of the present technology may be described herein with reference to flowchart illustrations of methods and systems according to embodiments of the technology, and/or procedures, algorithms, steps, operations, formulae, or other computational depictions, which may also be implemented as computer program products.
- each block or step of a flowchart, and combinations of blocks (and/or steps) in a flowchart, as well as any procedure, algorithm, step, operation, formula, or computational depiction can be implemented by various means, such as hardware, firmware, and/or software including one or more computer program instructions embodied in computer-readable program code.
- any such computer program instructions may be executed by one or more computer processors, including without limitation a general purpose computer or special purpose computer, or other programmable processing apparatus to produce a machine, such that the computer program instructions which execute on the computer processor(s) or other programmable processing apparatus create means for implementing the function(s) specified.
- blocks of the flowcharts, and procedures, algorithms, steps, operations, formulae, or computational depictions described herein support combinations of means for performing the specified function(s), combinations of steps for performing the specified function(s), and computer program instructions, such as embodied in computer-readable program code logic means, for performing the specified function(s).
- each block of the flowchart illustrations, as well as any procedures, algorithms, steps, operations, formulae, or computational depictions and combinations thereof described herein can be implemented by special purpose hardware-based computer systems which perform the specified function(s) or step(s), or combinations of special purpose hardware and computer-readable program code.
- these computer program instructions may also be stored in one or more computer-readable memory or memory devices that can direct a computer processor or other programmable processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory or memory devices produce an article of manufacture including instruction means which implement the function specified in the block(s) of the flowchart(s).
- the computer program instructions may also be executed by a computer processor or other programmable processing apparatus to cause a series of operational steps to be performed on the computer processor or other programmable processing apparatus to produce a computer-implemented process such that the instructions which execute on the computer processor or other programmable processing apparatus provide steps for implementing the functions specified in the block(s) of the flowchart(s), procedure (s) algorithm(s), step(s), operation(s), formula(e), or computational depiction(s).
- program executable refer to one or more instructions that can be executed by one or more computer processors to perform one or more functions as described herein.
- the instructions can be embodied in software, in firmware, or in a combination of software and firmware.
- the instructions can be stored local to the device in non-transitory media, or can be stored remotely such as on a server, or all or a portion of the instructions can be stored locally and remotely. Instructions stored remotely can be downloaded (pushed) to the device by user initiation, or automatically based on one or more factors.
- processor hardware processor, computer processor, central processing unit (CPU), and computer are used synonymously to denote a device capable of executing the instructions and communicating with input/output interfaces and/or peripheral devices, and that the terms processor, hardware processor, computer processor, CPU, and computer are intended to encompass single or multiple devices, single core and multicore devices, and variations thereof.
- An apparatus for wireless communication in a network comprising: (a) a wireless communication circuit, as a wireless station (STA) as either an Access Point (AP) or a non-AP STA, is configured for wirelessly communicating over a channel with other wireless stations (STAs), which are either APs or non-AP STAs, on a wireless local area network (WLAN) in which packets carry frames; (b) a processor coupled to said wireless communication circuit for operating on the WLAN as a STA; (c) a non-transitory memory storing instructions executable by the processor for communicating with other STAs; and (d) wherein said instructions, when executed by the processor, perform one or more steps comprising: (d)(i) initiating a non-zero backoff procedure by setting a backoff counter to a random value greater than or equal to at least one backoff slot in starting to contend for a channel; (d)(ii) counting down said backoff counter depending on channel conditions; and (d)(iii) access
- An apparatus for wireless communication in a network comprising: (a) a wireless communication circuit, as a wireless station (STA) operating as either an Access Point (AP) or a non-AP STA, is configured for wirelessly communicating over a channel with other wireless stations (STAs), which are either APs or non-AP STAs, on a wireless local area network (WLAN) in which packets carry frames; (b) a processor coupled to said wireless communication circuit for operating on the WLAN as a STA; (c) a non-transitory memory storing instructions executable by the processor for communicating with other STAs; and (d) wherein said instructions, when executed by the processor, perform one or more steps comprising: (d)(i) utilizing non-zero backoff procedures for channel contention when said STA supports non-zero backoff procedure, and utilizing legacy backoff procedure for channel contention when said STA does not support non-zero backoff procedures; and (d)(ii) setting an AIFS time for an AC shorter, as
- a method of wireless communication in a network comprising: (a) performing wireless communications from a wireless station (STA) operating as either an Access Point (AP) or a non-AP STA to other wireless stations (STAs), which are either APs or non-AP STAs, on a wireless local area network (WLAN) in which packets carry frames; (b) initiating a non zero backoff procedure by setting a backoff counter to a random value greater than or equal to at least one backoff slot in starting to contend for a channel; (c) counting down said backoff counter depending on channel conditions; and (d) accessing the channel when the backoff counter reaches zero.
- STA wireless station
- AP Access Point
- STAs wireless stations
- WLAN wireless local area network
- a wireless communication apparatus performing transmission of packets, where CSMA/CA or EDCA is applied and packets carry frames comprising: STAs not supporting non-zero backoff procedure uses legacy backoff procedure for channel contention; STAs supporting non-zero backoff procedure could use non-zero backoff procedure for channel contention; and STAs using non-zero backoff procedure for an AC could set the AIFS time of that AC shorter than that used by STAs using legacy backoff procedure for the same AC to let non-zero backoff procedure has higher possibility to access channel earlier.
- a wireless communication apparatus performing transmission of packets, where CSMA/CA or EDCA is applied and packets carry frames, comprising: a STA initiates a non-zero backoff counter to a random value greater or equal to 1 (at least one backoff slot); STA counts down the backoff counter depending on the channel condition; and STA accesses the channel when the backoff counter equal to 0.
- Phrasing constructs such as “A, B and/or C”, within the present disclosure describe where either A, B, or C can be present, or any combination of items A, B and C.
- references in this disclosure referring to “an embodiment”, “at least one embodiment” or similar embodiment wording indicates that a particular feature, structure, or characteristic described in connection with a described embodiment is included in at least one embodiment of the present disclosure. Thus, these various embodiment phrases are not necessarily all referring to the same embodiment, or to a specific embodiment which differs from all the other embodiments being described.
- the embodiment phrasing should be construed to mean that the particular features, structures, or characteristics of a given embodiment may be combined in any suitable manner in one or more embodiments of the disclosed apparatus, system or method.
- set refers to a collection of one or more objects.
- a set of objects can include a single object or multiple objects.
- Relational terms such as first and second, top and bottom, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
- the terms can refer to instances in which the event or circumstance occurs precisely as well as instances in which the event or circumstance occurs to a close approximation.
- the terms can refer to a range of variation of less than or equal to ⁇ 10% of that numerical value, such as less than or equal to ⁇ 5%, less than or equal to ⁇ 4%, less than or equal to ⁇ 3%, less than or equal to ⁇ 2%, less than or equal to ⁇ 1 %, less than or equal to ⁇ 0.5%, less than or equal to ⁇ 0.1 %, or less than or equal to ⁇ 0.05%.
- substantially aligned can refer to a range of angular variation of less than or equal to ⁇ 10°, such as less than or equal to ⁇ 5°, less than or equal to ⁇ 4°, less than or equal to ⁇ 3°, less than or equal to ⁇ 2°, less than or equal to ⁇ 1 °, less than or equal to ⁇ 0.5°, less than or equal to ⁇ 0.1 °, or less than or equal to ⁇ 0.05°.
- Coupled as used herein is defined as connected, although not necessarily directly and not necessarily mechanically.
- a device or structure that is “configured” in a certain way is configured in at least that way, but may also be configured in ways that are not listed.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020237011105A KR20230061464A (en) | 2021-03-31 | 2022-03-14 | Non-zero random backoff procedure |
JP2023558233A JP2024510681A (en) | 2021-03-31 | 2022-03-14 | Non-zero random backoff procedure |
CN202280006126.2A CN116058073A (en) | 2021-03-31 | 2022-03-14 | Non-zero random backoff procedure |
EP22711648.0A EP4292377A1 (en) | 2021-03-31 | 2022-03-14 | Non-zero random backoff procedure |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US202163168449P | 2021-03-31 | 2021-03-31 | |
US63/168,449 | 2021-03-31 | ||
US17/509,015 US11963224B2 (en) | 2021-03-31 | 2021-10-24 | Non-zero random backoff procedure |
US17/509,015 | 2021-10-24 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022208210A1 true WO2022208210A1 (en) | 2022-10-06 |
Family
ID=80819611
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2022/052293 WO2022208210A1 (en) | 2021-03-31 | 2022-03-14 | Non-zero random backoff procedure |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2022208210A1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070263654A1 (en) * | 2006-05-12 | 2007-11-15 | Nokia Corporation | Pro-active congestion mitigation for wireless networks |
US20130279426A1 (en) * | 2012-01-09 | 2013-10-24 | Qualcomm Incorporated | System and method of communication using distributed channel access parameters |
US20180167976A1 (en) * | 2016-12-12 | 2018-06-14 | Qualcomm Incorporated | Wireless medium access operations |
-
2022
- 2022-03-14 WO PCT/IB2022/052293 patent/WO2022208210A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070263654A1 (en) * | 2006-05-12 | 2007-11-15 | Nokia Corporation | Pro-active congestion mitigation for wireless networks |
US20130279426A1 (en) * | 2012-01-09 | 2013-10-24 | Qualcomm Incorporated | System and method of communication using distributed channel access parameters |
US20180167976A1 (en) * | 2016-12-12 | 2018-06-14 | Qualcomm Incorporated | Wireless medium access operations |
Non-Patent Citations (1)
Title |
---|
GU D ET AL: "QOS ENHANCEMENT IN IEEE802.11 WIRELESS LOCAL AREA NETWORKS", IEEE COMMUNICATIONS MAGAZINE, IEEE SERVICE CENTER, PISCATAWAY, US, vol. 41, no. 6, 1 June 2003 (2003-06-01), pages 120 - 124, XP001163853, ISSN: 0163-6804 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220053560A1 (en) | Request trigger frame and txop sharing launched by non-ap sta | |
KR102308351B1 (en) | Access method and apparatus | |
EP2894929B1 (en) | Method for access to a medium by a multi-channel device | |
KR20220141866A (en) | Coordinated WIFI Stations with Shared TXOP in Time Domain | |
US20230081745A1 (en) | Preemption / interruption of an ongoing low priority ppdu | |
US20230029957A1 (en) | Channel access on non-simultaneous transmit/receive link | |
US11516848B2 (en) | Channel contention of non-STR MLD when detecting transmission on one link | |
US11716760B2 (en) | Channel access of a simultaneous-transmit-receive (STR) multi-link-device (MLD) with a non-STR MLD | |
EP3932136B1 (en) | Communication devices and methods | |
US11464050B2 (en) | Timer for non-simultaneous T/R multi-link device accessing of the channel | |
US11889556B2 (en) | Prioritized channel access | |
US20220400500A1 (en) | Enabling legacy (non-eht) stations to operate on the conditional link of a soft ap mld | |
US11963224B2 (en) | Non-zero random backoff procedure | |
WO2022208210A1 (en) | Non-zero random backoff procedure | |
US20230262770A1 (en) | Transmit opportunity sharing in a restricted target wait time | |
US20240008086A1 (en) | Prioritization of r-twt tids in r-twt sps | |
Farooq et al. | An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11 e | |
WO2023044263A1 (en) | Preemption / interruption of an ongoing low priority ppdu | |
CN116803184A (en) | Preemption/interruption of an ongoing low priority PPDU | |
EP4245091A1 (en) | Prioritized channel access | |
CN116783976A (en) | Channel access on non-simultaneous transmit/receive links |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22711648 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 20237011105 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2022711648 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2022711648 Country of ref document: EP Effective date: 20230912 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2023558233 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |