Abstract:
Techniques are provided for selecting a root node in an ad hoc network comprising a plurality of nodes including a first node. According to one implementation of these techniques, a first node can receive a message from at least one of the other nodes. Each message includes a number of primary factors associated with a particular node regarding capabilities of the particular node. The primary factors associated with each node can then be evaluated, and an attempt can be made to select the root node based on the primary factors associated with each node. If the first node is unable to select the root node based on the primary factors associated with each node, then the root node can be selected based on secondary factors associated with each node.
Abstract:
A method (S200) and system for scheduling data transmissions between a base station (110) and a plurality of user terminals (130) in a wireless network. The method and system include transmitting a first poll (260) from the base station (110) to a first user terminal traffic stream (Step S210). In response to the first poll (260) the first user terminal traffic stream transmits a first frame (210) to the base station (110), where a queue state of the first user terminal traffic stream is indicated in the header of the first frame (210) (Step S220). The base station (110) removes the first user terminal traffic stream from an active list when the first frame (210) indicates that the queue state is empty (Step S230). The base station (110) then calculates a deferral window (220) and schedules transmissions of other data frames (240) between the base station (110) and the plurality of user terminal traffic streams that remain on the active list (Steps S240 and S250). At the expiration of the deferral window (220) the first user terminal traffic stream is returned to the active list (Step S260).
Abstract:
Techniques are provided for selecting a root node in an ad hoc network comprising a plurality of nodes including a first node. According to one implementation of these techniques, a first node can receive a message from at least one of the other nodes. Each message includes a number of primary factors associated with a particular node regarding capabilities of the particular node. The primary factors associated with each node can then be evaluated, and an attempt can be made to select the root node based on the primary factors associated with each node. If the first node is unable to select the root node based on the primary factors associated with each node, then the root node can be selected based on secondary factors associated with each node.
Abstract:
Methods for providing a client access to a channel in a meshed wireless local area network are disclosed. The methods comprise that a client in the meshed wireless local area network implement a polling based channel access methodology. The client determines that the channel is available by sensing that the channel is not busy and sends a request for access to the channel to an access point, wherein the request specifies a priority of data that is to be transmitted when the client is granted access to the channel. The client waits a time period before receiving at least one of a) a rejection of the request for access to the channel, b) access to the channel, c) modification of the request for access to the channel, and d) delay access to the channel.
Abstract:
A method for transmitting beacons by nodes in a multi-tier wireless local area network is disclosed. First, a first beacon by a tier 1 node in the multi-tier wireless local area network is transmitted. Then, a second beacon by a tier 2 node is transmitted where the second beacon is transmitted based upon the time that the first beacon is sent by the tier 1 node.
Abstract:
A method (S200) and system for scheduling data transmissions between a base station (110) and a plurality of user terminals (130) in a wireless network. The method and system include transmitting a first poll (260) from the base station (110) to a first user terminal traffic stream (Step S210). In response to the first poll (260) the first user terminal traffic stream transmits a first frame (210) to the base station (110), where a queue state of the first user terminal traffic stream is indicated in the header of the first frame (210) (Step S220). The base station (110) removes the first user terminal traffic stream from an active list when the first frame (210) indicates that the queue state is empty (Step S230). The base station (110) then calculates a deferral window (220) and schedules transmissions of other data frames (240) between the base station (110) and the plurality of user terminal traffic streams that remain on the active list (Steps S240 and S250). At the expiration of the deferral window (220) the first user terminal traffic stream is returned to the active list (Step S260).