1. Field of Invention
Embodiments of the present invention pertain to wireless communication, and in particular, to enabling the wireless conveyance of communal information between apparatuses.
2. Background
Wireless technology has evolved from a simple carrier for voice communication to being employed in various wireless applications. Enhancements in wireless technology have substantially improved communication abilities, quality of service (QoS), speed, etc., which have contributed to insatiable user desire for new device functionality. As a result, portable wireless apparatuses are no longer just relied on for making telephone calls. They have become integral, and in some cases essential, tools for managing the professional and/or personal lives of users.
For example, as manufacturers release mobile devices having new communication abilities, there is now an expectation amongst users that applications residing on the devices have a real time “awareness” of both local and remote information. In supporting such functionality, applications not traditionally incorporating communication functionality are being redesigned to support wired/wireless communication. In one example usage scenario, wireless support may enable monitoring (e.g., sensor) apparatuses to transmit data to other apparatuses via wireless communication. Example usage scenarios may include natural resource monitoring, biometric sensors, systems for supporting financial transactions, personal communication and/or location devices, etc. Apparatuses enabled for such monitoring/communication activities may operate using limited resources. For example, these apparatuses may be simple (e.g., may have limited processing resources), may be small (e.g., may have space constraints due to size limitations imposed in retrofit applications), may have power constraints (e.g., battery powered), etc.
Wireless connection establishment and maintenance processes defined in existing communication protocols may not be appropriate for all apparatuses, such as those with resource constraints as described above. For example, existing wireless communication protocols may require substantial wireless interaction to keep apparatuses synchronized with other apparatuses in the network, wherein such interaction may comprise either continuous or periodic network participation. These requirements may not take into consideration the burden that such extensive network communication places upon resource-constrained devices, especially when other wireless traffic could possibly cause interference in the same operational space (e.g., other wireless networks operating utilizing the same wireless channel). As a result, it may become difficult to operate such resource-constrained apparatuses in accordance with these standards.
Example embodiments of the present invention may be directed to a method, apparatus, computer program and system for facilitating communal apparatus interaction. In accordance with at least one embodiment of the present invention, an apparatus configured to communicate on a wireless channel may receive first information pertaining to wireless traffic expected from other networks also utilizing the wireless channel. The apparatus may then determine whether the received information satisfies a first criterion, and if it is determined that the first information satisfies the first criterion, the apparatus may shorten an “awake” window duration for communicating on the wireless channel. Alternatively, if it is determined that the information does not satisfy the first criterion, the apparatus may proceed to further determine whether second information pertaining to wireless traffic on the wireless channel that is expected from a network satisfies a second criterion. If it is determined that the second information satisfies the second criterion, the apparatus may proceed to lengthen the awake window duration.
In an example implementation the first criterion may be set in the apparatus as a dominance threshold value for the other networks also utilizing the wireless channel, while the second criterion may be set in the apparatus as a dominance threshold value for the network in which the apparatus is participating. In this example determining whether the first information satisfies the first criterion may comprise the apparatus determining whether the wireless traffic expected from the other networks also utilizing the wireless channel exceeds the other network dominance threshold. Likewise, the apparatus determining whether the second information satisfies the second criteria may comprise the apparatus determining whether the wireless traffic on the wireless channel expected from the network in which the apparatus is operating exceeds the dominance threshold value for the network in which the apparatus is participating.
It is also possible for the first and second criteria to correspond to previous values for the first and second information, respectively. In such an instance determining whether the first information satisfies the first criterion may comprise the apparatus determining whether the wireless traffic expected form the other networks also utilizing the wireless channel exceeds the previous wireless traffic expected from the other wireless networks also utilizing the wireless channel, while determining whether the second information satisfies the second criterion may comprise the apparatus determining whether the wireless traffic expected from the network in which the apparatus is participating exceeds the previous wireless traffic expected from the network in which the apparatus is operating. Regardless of how the first and second criteria are established, the results of these determinations may cause the apparatus to shorten or lengthen the awake window, which may correspond to a period of time during which the apparatus is allowed to transmit and receive on the wireless channel. However, there are exceptions to the above situations. For example, in the instance that a determination is made that the second information does not satisfy the second criterion, the apparatus may maintain (e.g., not shorten or lengthen) the duration of the awake window for communicating on the wireless channel.
The above summarized configurations or operations of various embodiments of the present invention have been provided merely for the sake of explanation, and therefore, are not intended to be limiting. Moreover, inventive elements associated herein with a particular example embodiment of the present invention can be used interchangeably with other example embodiments depending, for example, on the manner in which an embodiment is implemented.
The disclosure will be further understood from the following description of various exemplary embodiments, taken in conjunction with appended drawings, in which:
While the present invention has been described herein in terms of a multitude of example embodiments, various changes or alterations can be made therein without departing from the spirit and scope of the present invention, as set forth in the appended claims.
I. Example System with which Embodiments of the Present Invention May be Implemented
An example of a system that is usable for implementing various embodiments of the present invention is disclosed in
Computing device 100 may be, for example, a laptop computer. Elements that represent basic example components comprising functional elements in computing device 100 are disclosed at 102-108. Processor 102 may include one or more devices configured to execute instructions. In at least one scenario, the execution of program code (e.g., groups of computer-executable instructions stored in a memory) by processor 102 may cause computing device 100 to perform processes including, for example, method steps that may result in data, events or other output activities. Processor 102 may be a dedicated (e.g., monolithic) microprocessor device, or may be part of a composite device such as an ASIC, gate array, multi-chip module (MCM), etc.
Processor 102 may be electronically coupled to other functional components in computing device 100 via a wired or wireless bus. For example, processor 102 may access memory 104 in order to obtain stored information (e.g., program code, data, etc.) for use during processing. Memory 104 may generally include removable or imbedded memories (e.g., non-transitory computer readable storage media) that operate in a static or dynamic mode. Further, memory 104 may include read only memories (ROM), random access memories (RAM), and rewritable memories such as Flash, EPROM, etc. Examples of removable storage media based on magnetic, electronic and/or optical technologies are shown at 100 I/O in
One or more interfaces 106 may also be coupled to various components in computing device 100. These interfaces may allow for inter-apparatus communication (e.g., a software or protocol interface), apparatus-to-apparatus communication (e.g., a wired or wireless communication interface) and even apparatus to user communication (e.g., a user interface). These interfaces allow components within computing device 100, other apparatuses and users to interact with computing device 100. Further, interfaces 106 may communicate machine-readable data, such as electronic, magnetic or optical signals embodied on a computer readable medium, or may translate the actions of users into activity that may be understood by computing device 100 (e.g., typing on a keyboard, speaking into the receiver of a cellular handset, touching an icon on a touch screen device, etc.). Interfaces 106 may further allow processor 102 and/or memory 104 to interact with other modules 108. For example, other modules 108 may comprise one or more components supporting more specialized functionality provided by computing device 100.
Computing device 100 may interact with other apparatuses via various networks as further shown in
Further, interaction with remote devices may be supported by various providers of short and long range wireless communication 140. These providers may use, for example, long range terrestrial-based cellular systems and satellite communication, and/or short-range wireless access points in order to provide a wireless connection to Internet 120. For example, personal digital assistant (PDA) 142 and cellular handset 144 may communicate with computing device 100 via an Internet connection provided by a provider of wireless communication 140. Similar functionality may be included in devices, such as laptop computer 146, in the form of hardware and/or software resources configured to allow short and/or long range wireless communication. Further, some or all of the disclosed apparatuses may engage in direct interaction, such as in the short-range wireless interaction shown between laptop 146 and wireless-enabled apparatus 148. Example wireless enabled apparatuses 148 may range from more complex standalone wireless-enabled devices to peripheral devices for supporting functionality in apparatuses like laptop 146.
Further detail regarding example interface component 106 disclosed with respect to computing device 100 in
Multiradio controller 152 may manage the operation of some or all of interfaces 154-160. For example, multiradio controller 152 may prevent interfaces that could interfere with each other from operating at the same time by allocating specific time periods during which each interface is permitted to operate. Further, multiradio controller 152 may be able to process environmental information, such as sensed interference in the operational environment, to select an interface that will be more resilient to the interference. These multiradio control scenarios are not meant to encompass an exhaustive list of possible control functionality, but are merely given as examples of how multiradio controller 152 may interact with interfaces 154-160 in
II. Example Operational Environment
Wireless-enabled apparatuses 202 are labeled “A” to “G” in
An example interaction between two apparatuses 300 and 302, in accordance with at least one embodiment of the present invention, is disclosed at 304 in
Detail with respect to example interaction 304 is disclosed further in the “cloud” also depicted at 304 in
However, typically a formal wireless network connection needs to be established before any data-type communication messages 306 may be exchanged. Network establishment and media access control (MAC) management messages 308 may be utilized to establish and maintain an underlying wireless network architecture within operating space 200 that may be utilized to convey data-type communication messages 306. In accordance with at least one embodiment of the present invention, small messages (e.g., having a mean size of 100 Bytes) containing apparatus configuration, operation and status information may be exchanged to transparently establish wireless network connections when, for example, an apparatus enters operating space 200. Network connections may exist between any/all apparatuses existing within the operating space, and may exist for the entire time that apparatuses reside in operating space 200. Data-type communication messages 406 may then be conveyed using existing networks (new network connections do not need to be negotiated each time messages are sent), which may reduce response delay and increase quality of service (QoS).
In accordance with at least one embodiment of the present invention, the above maintenance of connectivity utilizing small messages, such as network establishment and MAC management messages 308, may be considered as also maintaining apparatus awareness within operating space 200 as disclosed in
An example of distributed local network formation 400 via automated network establishment and MAC management messages 308 is disclosed in
The possible benefits resulting from the ability to transparently convey small messages within network 400 are apparent in that apparatuses 202 may be able to maintain real-time awareness of communal information (e.g., apparatuses, people, places objects, etc.) without having to manually orchestrate data collection. However, the time and resources required to configure the Internet Protocol (IP) cannot be afforded in such operations. For example, the subnetwork access protocol (SNAP) in the IEEE 802.2 logical link control (LLC) is an existing tool that may be usable for conveying communal information. However, SNAP would be overkill for such small message interactions in that SNAP incurs substantial protocol overhead to accommodate different types of network-level protocols. The communication of communal information does not require SNAP or even IP. Communal information may comprise small messages that may be transferred without network layer protocol support. The small messages may comprise, for example, at least one of community identifier information, person identifier information, place description information and service description information. Apparatuses need to be able to convey small messages as soon as they enter the communal environment (e.g., operating space 200), and thus, there needs to be a way to avoid using IP when exchanging communal information (e.g., via small messages), even when Wi-Fi technology is being employed. Instead, the distribution of communal information via small messages requires an architecture solution that allows “legacy” Wi-Fi for IP-based networking and services to be supported concurrently with small messaging services. Current Wi-Fi architecture does not provide such a platform.
III. Example Conveyance of Communal Information
An example of network timing and beaconing usable in accordance with at least one embodiment of the present invention is disclosed in
The WLAN logical architecture comprises stations (STA), wireless access points (AP), independent basic service sets (IBSS), basic service sets (BSS), distribution systems (DS), and extended service sets (ESS). Some of these components map directly to hardware devices, such as stations and wireless access points. For example wireless APs may function as bridges between stations and a network backbone (e.g., in order to provide network access). An IBSS is a wireless network comprising at least two STAs, and is also sometimes referred to as an ad hoc wireless network. A BSS is a wireless network comprising a wireless access point supporting one or multiple wireless clients, and is also sometimes referred to as an infrastructure wireless network. All STAs in a basic service set may interact via the AP. APs may provide connectivity to wired local area networks and bridging functionality when one STA initiates communication to another STA or with a node that is part of a distribution system (e.g., with a STA coupled to another AP that is linked through a wired network backbone).
In wireless network architectures like WLAN, beacon signals may be utilized to synchronize the operation of networked apparatuses such as disclosed above. In situations where new ad hoc networks are being created the initiating apparatus may establish beaconing based on its own clock, and all apparatuses that subsequently join the network may conform to the beacon. Similarly, apparatuses joining established networks may synchronize to the network beacon. In WLAN apparatuses may synchronize to beacon signals using a timing synchronization function (TSF), which is a local clock function that synchronizes to and tracks the network beacon period.
An example of a beacon signal is shown in
In accordance with at least one embodiment of the present invention, functionality may be introduced utilizing the example distributed wireless network described above to allow apparatuses to operate at a standard beaconing rate, or alternatively, using a “diluted” beaconing rate. “Diluted” beaconing may entail a beaconing mode operating at a lower frequency than the beaconing rate originally established in the network. Diluted beaconing may be controlled by information (e.g., information elements) that is included in network beacon frames, wherein the included information may express one or more diluted beacon rates as multiples of the beacon. Using the beacon and the one or more associated diluted beacon period indications contained within beacon frames, networked apparatuses may elect to operate (e.g., via random contention) based either on the beacon period or a diluted beacon period. In particular, all apparatuses may synchronize to the same initial target beacon transmission time (TBTT), for example when TSF=0, and may then count the number periods that occur after the initial TBTT based on the internal TSF function. In this way, apparatuses operating using a diluted beacon period may be active on TBTT counts that corresponds to the multiple defined by the diluted beaconing period.
An example diluted beacon rate of every 5th TBTT is disclosed in
For example, all apparatuses may remain synchronized in a network comprising four apparatuses wherein apparatuses 1, 2 and 4 operate using a diluted beaconing mode having an example frequency (e.g., a time period between beacon transmissions) of every 6th TBTT, but only device 3 would be active (e.g., “competing”) in beaconing periods 1, 2, 3, 4 and 5, while all apparatuses may participate in TBTT 0, TBTT 6, TBTT 12, etc. Therefore, there can be at least two different beacon periods among the apparatuses, and possibly further diluted beacon periods, as each apparatus may select its own diluted beaconing period based on the original beaconing period and the one or more associated diluted beacon period indications transmitted therewith.
In accordance with at least one example embodiment of the present invention, beacons may contain a diluted beacon period parameter. For example, the diluted beacon period parameter may be carried in a vendor-specific Information Elements (IE) within a beacon packet. Diluted beacon period parameters remain the same for the lifetime of the network, however should there be need for more flexibility, other beacon rate periods may be predefined, and the predefined beacon rate periods may signaled in a manner similar to the diluted beaconing rate.
IV. Examples of Awake Windows
Possible awake windows for an apparatus that is participating in the network are further shown in
While all apparatuses in the network will operate based on the same origin point (e.g., TSF=0) and normal beacon period (e.g., as set forth by the TBTT), individual apparatuses may select an operational mode based upon the one or more diluted beacon period indications that are transmitted in the beacon. For example, an apparatus may operate utilizing a diluted beacon period which is a multiple “4,” and thus, may be allowed to be active every four TBTTs. Awake windows may also occur in accordance with a diluted beacon period, and in at least one example implementation, the awake windows may began just prior to the commencement of the diluted beacon period.
Awake window duration, while initially configured to be constant as defined by an IE carried by the beacon, may in actual practice be variable. For example, awake window duration may be defined by a MAC parameter similar to the beacon interval and diluted beacon period parameters. A host in the beaconing apparatus may determine awake window duration and provide it to the modem for transmission in the beacon. It may then be communicated using a general or vendor specific IE along with the beacon interval and diluted beacon period. Upon awake window expiration apparatuses may attempt to transition to a “doze” or sleep state as shown at 602 and 606. However, the transition to doze state may, in actuality, happen earlier or later in accordance with control methodologies that will be discussed with respect to
In the awake state an apparatus is allowed to receive and transmit frames in the channel. An awake window length or duration MAC parameter may determine the final time after which the apparatus may sleep (at least in regard to communal messaging). However, a radio modem may alter operation locally if it detects certain situations. Examples of situations where a radio modem may alter operation are shown in
An example entitled “AWAKE PERIOD CUTOFF PREVENTION” is further disclosed in
When the wireless channel is dominated by communal information traffic, awake window control is not as important because the radio modem may be active for the time required to receive all of the communal information frames. The main purpose for controlling the awake window length parameter in this case is to prevent the communal information traffic from being accidentally cut off by an awake window that is too short. An example of this scenario is disclosed under the heading “AWAKE PERIOD TOO SHORT” in
However, problems may arise in situations where there is a significant amount of external traffic (e.g., non-communal information traffic from other networks) that may propagate interference on the wireless channel. In these instances proper adjustment of the awake window duration parameter may save power. To have a real low-energy, always-on, system, proper awake window length adjustment may minimize the receiver on-time when the channel becomes dominated by non-communal traffic. For example, if the awake window duration parameter value is too large and there is external traffic, the radio modem may stay in the awake state for too long, needlessly consuming apparatus power by receiving non-communal information frames. This sort of operational situation is disclosed under the heading “AWAKE WINDOW TOO LONG” in
In accordance with at least one embodiment of the present invention, it may be advantageous if apparatuses exchanging communal information could execute an adjustment algorithm for modifying awake window duration autonomously without the need for explicit control signaling between apparatuses. Avoiding dedicated control signaling for this purpose may help to conserve power. While automated adjustment may be beneficial, the adjustment must be done accurately. If awake windows do not have the appropriate duration, neighboring nodes may have very different parameter values, which may cause sleep-induced loss (e.g., communal information frames may be lost due to a modem dozing prematurely) because some devices will transmit communal information frames when others have already transitioned into the doze state.
Controlling ATIM (Announcement Traffic Indication Message) window duration may be deemed a somewhat similar concept to awake window duration. Current strategies focus only on the adjustment of the ATIM window in such a way that it is long enough for the desired ATIM traffic (coming from own network), without solving the problem of how to react properly to a situation where external traffic dominates the channel. Moreover, existing systems assume that ATIM window duration is signaled to neighboring apparatuses. In accordance with various embodiments of the present invention, this is a practice that should be avoided to conserve energy in the apparatus.
In accordance with at least one embodiment of the present invention, processes for autonomous awake window duration setting is disclosed. The disclosed embodiments may be used in an ad-hoc communal network (referred as “own” network) that competes for resources (e.g., wireless channel access) with other radio systems, also referred as “other” networks, that operate in same wireless bandwidth. Awake time duration or length may be set by measuring own network and other network traffic (e.g., as measured by own network apparatuses) so that if other network traffic becomes dominant in a wireless channel, own network devices may shorten their awake time durations. As a result, own network apparatuses may save energy because they avoid receiving other network traffic (e.g., every received other network packet is wasted energy for own network apparatuses). On the contrary, in a wireless channel where other network traffic is low, awake window duration may grow. If operating on multiple wireless channels, own network traffic may automatically be moved by awake window adjustments from wireless channels congested by other network traffic to less congested wireless channels, possibly resulting in energy savings and increased communication performance due to less interference.
While there may be some similarities between ATIM window length management and various embodiments of the present invention, as disclosed herein, there are also substantial differences. ATIM window control is based on pending traffic that a node is going to send to a counterpart node point-to-point. The various embodiments of the present invention may select awake window length based on at least two categories: own network traffic and other network traffic. ATIM window length is selected so that the pending traffic fits into the window, while in the various embodiments of the present invention the awake window length may be variable in order to accommodate communal information while screening out other network traffic. ATIM window length control is based only on present traffic, while in the various embodiments of the present invention adjustment may be based on predicted future traffic situations. ATIM window length is signaled to a counterpart node, while in various embodiments of the present invention awake window duration is controlled autonomously at each node, which helps to save power.
In accordance with at least one embodiment of the present invention, a channel utilization measure (û) corresponding to transmitted and received network traffic/awake time, or to another similar channel congestion measure, may be utilized to predict own network traffic and other network traffic. Utilization û may be formulated by a radio modem supporting communal messaging, or it may be calculated in upper layers of the apparatus communication system based on received packets and information obtained about measured awake time. Utilization û can be instantaneous per awake-period or buffered previous utilizations from where average, median or moving average may be calculated. Instant channel utilizations uk, uk+1, . . . , uk+n may collected to a buffer vector of size n, and when the buffer is full:
Alternative 1: Average: û=Mean (uk, uk+1 . . . , uk+n)
Alternative 2: Median: û=Median (uk, uk+1 . . . , uk+n
Alternative 3: Exponential moving average: û=(1−α) ûk−1αuk wherein 0<α<1; for example, α may be set to α=1/((n−1)/2).
Following are example algorithms for adjusting awake window duration that may use the variables: awakeTime—Time the modem was awake per awake window; ûother—other Received other networks' traffic per awake time; ûown—Transmitted and received own networks' traffic per awake time; Dominance_Threshold_other—Threshold that determines others' dominance, for example 50%; Dominance_Threshold_own—Threshold that determines own dominance, for example 50%; wstep—Amount of decrease in awake window length when shortened; vstep—Amount of increase in awake window length when grown; CurrentAwakeWindowLength—Length of awake window now; MaxAwakeWindowLength—Widest possible awake window; MinAwakeWindowLength—Shortest possible awake window; NextAwakeWindowLength—Result of the algorithm. In accordance with at least one embodiment of the present invention, two example pseudocodes that help explain how awake window duration may be adjusted comprise:
Example Alternative 1: Fixed Thresholds for Dominance
Example Alternative 2: Differential Comparison
In addition, the awakeTime variable can be used to boost the algorithm using the comparison: CurrentAwakeWindowLength<=awakeTime, which may represent whether awake window duration has been “cut,” wherein the previous awake window ended prematurely during an ongoing transmission of own network traffic (see, for example,
An advantage realized by using awake window length control algorithms instead of having a fixed awake window length is that a system (e.g., communal information distribution system) may operate in an always-on fashion while still having reasonable power consumption. Moreover, scalability may be introduced into power consumption in that that power consumption for each apparatus in a community may be controlled locally regardless of the community size (e.g., the same algorithm may be used regardless of community size since the control is localized and inter-apparatus notification is not required). In accordance with at least one embodiment of the present invention, awake window duration control may be implemented with no changes in the radio modem, and if needed, may instead be implemented in the host (e.g., control layers in the apparatus). In multi-channel operation, awake window duration may be different for each wireless channel, allowing traffic to be directed to non-congested channels if necessary.
In accordance with at least one embodiment of the present invention, an example flowchart of a communication process is disclosed in
If in step 1004 it is determined that the expected other network traffic will not exceed the other network DT, a further determination may be made in step 1010 as to whether second information (e.g., expected own network traffic on the wireless channel, such as traffic from a network in which the apparatus is participating) will satisfy a second criterion (e.g., will exceed an own network DT). Own network information may be received in the apparatus from other apparatuses in the own network (e.g., via communal messaging) or may already be present in the apparatus based on the participation of the apparatus in the own network. Like the other network DT, the own network DT may be set in the apparatus as fixed or dynamic value that may be updated by the apparatus periodically based on, for example, average own network traffic on the wireless channel, sensed changes in own network traffic on the wireless channel or in the apparatus itself due to, for example, the activation of a particular application on the apparatus (e.g., a chat application), a power condition in the apparatus, etc. If in step 1010 it is determined that expected own network traffic will exceed the own network DT, the process may then move to step 1012 where the awake window duration may be lengthened (e.g., in order to provide more time for own network operation), but not above a maximum value set in the apparatus. The process may then terminate in step 1008 and reinitiate in step 1000. If in step 1010 it is determined that predicted own network traffic will not exceed the own network DT, the process may move to step 1014 where the awake window duration may be maintained (e.g., not changed from previous length). The process may then terminate in step 1008 and reinitiate in step 1000.
An alternative example communication process, in accordance with at least one embodiment of the present invention, is disclosed in
If in step 1020 a determination is made that the first information does not satisfy the first criterion, the process may proceed to step 1026 wherein a further determination may be made as to whether second information (e.g., own network traffic expected on the wireless channel) satisfies a second criterion (exceeds previous own network traffic information). If it is determined in step 1026 that the expected own network traffic information exceeds the previous own network traffic information (e.g., own network traffic appears to be increasing), the process may move to step 1028 wherein the awake window duration may be lengthened (e.g., in order to avoid packet losses due to awake window cutoff). Similar to
Further to the above, the various example embodiments of the present invention are not strictly limited to the above implementations, and thus, other configurations are possible.
For example, an apparatus, in accordance with at least one embodiment of the present invention, may comprise means for receiving information pertaining to wireless traffic expected from other networks utilizing a wireless channel on which the apparatus is configured to communicate, means for determining whether the first information satisfies a first criterion, means for, if the first information is determined to satisfy the first criterion, shortening an awake window duration for communicating on the wireless channel, means for, if the first information is determined not to satisfy the first criterion, determining whether second information satisfies a second criterion, the second information pertaining to wireless traffic on the wireless channel that is expected from a network in which the apparatus is participating, and means for if the second information is determined to satisfy the second criterion, lengthening the awake window duration for communicating on the wireless channel.
At least one other example embodiment of the present invention may include electronic signals that cause an apparatus receive information pertaining to wireless traffic expected from other networks utilizing a wireless channel on which the apparatus is configured to communicate, determine whether the information satisfies a first criterion, if the information is determined to satisfy the first criterion, shorten an awake window duration for communicating on the wireless channel, if the first information is determined not to satisfy the first criterion, determine whether second information satisfies a second criterion, the second information pertaining to wireless traffic on the wireless channel that is expected from a network in which the apparatus is participating, and if the second information is determined to satisfy the second criterion, lengthen the awake window duration for communicating on the wireless channel.
Accordingly, it will be apparent to persons skilled in the relevant art that various changes in form a and detail can be made therein without departing from the spirit and scope of the invention. The breadth and scope of the present invention should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.
Number | Name | Date | Kind |
---|---|---|---|
5371734 | Fischer | Dec 1994 | A |
6941372 | Pearson | Sep 2005 | B2 |
7567673 | Fukuzawa et al. | Jul 2009 | B2 |
7590100 | Smith et al. | Sep 2009 | B2 |
7774495 | Pabla et al. | Aug 2010 | B2 |
7840903 | Amidon et al. | Nov 2010 | B1 |
7848277 | Chou et al. | Dec 2010 | B2 |
7864720 | Jeyaseelan | Jan 2011 | B2 |
7907557 | Carter | Mar 2011 | B2 |
8005032 | Wang et al. | Aug 2011 | B2 |
8005515 | Chhabra et al. | Aug 2011 | B1 |
8014378 | Yoon et al. | Sep 2011 | B1 |
8165106 | Yang et al. | Apr 2012 | B2 |
8185726 | Taha et al. | May 2012 | B2 |
20020101446 | Tang et al. | Aug 2002 | A1 |
20030204742 | Gupta et al. | Oct 2003 | A1 |
20040153676 | Krantz et al. | Aug 2004 | A1 |
20050025092 | Morioka et al. | Feb 2005 | A1 |
20050068928 | Smith et al. | Mar 2005 | A1 |
20050128988 | Simpson et al. | Jun 2005 | A1 |
20050193106 | Desai et al. | Sep 2005 | A1 |
20060034217 | Kwon et al. | Feb 2006 | A1 |
20060050730 | Shvodian | Mar 2006 | A1 |
20060120314 | Krantz et al. | Jun 2006 | A1 |
20060215588 | Yoon | Sep 2006 | A1 |
20060251004 | Zhong et al. | Nov 2006 | A1 |
20060285510 | Kim et al. | Dec 2006 | A1 |
20070002866 | Belstner et al. | Jan 2007 | A1 |
20070086424 | Calcev et al. | Apr 2007 | A1 |
20070086426 | Bonta et al. | Apr 2007 | A1 |
20070127427 | Tanaka | Jun 2007 | A1 |
20070161364 | Surineni et al. | Jul 2007 | A1 |
20070226777 | Burton et al. | Sep 2007 | A1 |
20070249291 | Nanda et al. | Oct 2007 | A1 |
20070254596 | Corson et al. | Nov 2007 | A1 |
20070297438 | Meylan et al. | Dec 2007 | A1 |
20080002692 | Meylan et al. | Jan 2008 | A1 |
20080025512 | Nakajima | Jan 2008 | A1 |
20080031208 | Abhishek et al. | Feb 2008 | A1 |
20080095091 | Surineni et al. | Apr 2008 | A1 |
20080125190 | Jan et al. | May 2008 | A1 |
20080130543 | Singh et al. | Jun 2008 | A1 |
20080151848 | Fischer et al. | Jun 2008 | A1 |
20080261639 | Sun et al. | Oct 2008 | A1 |
20080268892 | Hamdi et al. | Oct 2008 | A1 |
20090073871 | Ko et al. | Mar 2009 | A1 |
20090147702 | Buddhikot et al. | Jun 2009 | A1 |
20090156190 | Fisher | Jun 2009 | A1 |
20090196180 | Bahl et al. | Aug 2009 | A1 |
20090247201 | Ye et al. | Oct 2009 | A1 |
20090279449 | Kneckt et al. | Nov 2009 | A1 |
20090303926 | Den Hartog et al. | Dec 2009 | A1 |
20090310571 | Matischek et al. | Dec 2009 | A1 |
20090310618 | Carter | Dec 2009 | A1 |
20090325533 | Lele et al. | Dec 2009 | A1 |
20100002584 | Jalali | Jan 2010 | A1 |
20100002608 | Goldhamer | Jan 2010 | A1 |
20100110948 | Batta | May 2010 | A1 |
20100111066 | Mehta | May 2010 | A1 |
20100138549 | Goel et al. | Jun 2010 | A1 |
20100142463 | Hu | Jun 2010 | A1 |
20100157827 | Park et al. | Jun 2010 | A1 |
20100165947 | Taniuchi et al. | Jul 2010 | A1 |
20100189082 | Choi et al. | Jul 2010 | A1 |
20100226297 | Kasslin et al. | Sep 2010 | A1 |
20100226309 | Kasslin et al. | Sep 2010 | A1 |
20100246591 | Gobriel et al. | Sep 2010 | A1 |
20100302947 | Leppanen et al. | Dec 2010 | A1 |
20100304759 | Leppanen et al. | Dec 2010 | A1 |
20100332683 | Das et al. | Dec 2010 | A1 |
20110038349 | Sun et al. | Feb 2011 | A1 |
20110058510 | Thomas et al. | Mar 2011 | A1 |
20110065440 | Kakani | Mar 2011 | A1 |
20110069649 | Gobriel et al. | Mar 2011 | A1 |
20110141966 | Kasslin et al. | Jun 2011 | A1 |
20110142028 | Kasslin et al. | Jun 2011 | A1 |
20110142029 | Kasslin et al. | Jun 2011 | A1 |
20110222493 | Mangold et al. | Sep 2011 | A1 |
20110250857 | Reial et al. | Oct 2011 | A1 |
20110250921 | Reial | Oct 2011 | A1 |
20120077506 | Wietfeldt et al. | Mar 2012 | A1 |
20120207040 | Comsa et al. | Aug 2012 | A1 |
20120225662 | Jo et al. | Sep 2012 | A1 |
20130170420 | Kobayashi | Jul 2013 | A1 |
Number | Date | Country |
---|---|---|
1571283 | Jan 2005 | CN |
1728668 | Feb 2006 | CN |
101601229 | Dec 2009 | CN |
1361728 | Nov 2003 | EP |
1396986 | Mar 2004 | EP |
1545146 | Jun 2005 | EP |
1703701 | Sep 2006 | EP |
2107732 | Oct 2009 | EP |
WO2004091246 | Oct 2004 | WO |
WO2005006658 | Jan 2005 | WO |
WO2008019140 | Feb 2008 | WO |
WO2008075264 | Jun 2008 | WO |
WO2008094107 | Aug 2008 | WO |
WO2009113798 | Sep 2009 | WO |
W02009135996 | Nov 2009 | WO |
WO2010029386 | Mar 2010 | WO |
Entry |
---|
International Search Report for International Application No. PCT/FI2010/050069—Date of Completion of Search: Jun. 4, 2010—4 pages. |
International Search Report for International Application No. PCT/FI2010/050838—Date of Completion of Search: Jan. 21, 2011, 4 pages. |
Chen, H. et al., IEEE P802.11; doc.:IEEE 802.11-10/0828r0, Wireless LANs, Normative Text for 5 MHz Measurement Pilot Frame, Jun. 2010, 4 pages. |
Wang, L. et al., Proposed SFD Text for 802.11ai, doc.:IEEE 11-12-0406-02-00ai; Passive Scanning Improvement, May 4, 2012; 15 pages. |
Extended European Search Report for European App. No. 12183977.3—Date of Completion of Search: Jun. 12, 2013, 6 pages. |
Cavalcanti, D. et al., “IEEE 802.22-07/0121r1: Proposed text changes to Section 6.21.2 Self-coexistence in IEEE 802.22/D0.2 Draft Standard” published in Mar. 2007, 26 pages. |
Cordeiro, C. et al, “Cognitive PHY and MAC Layers for Dynamic Spectrum Access and Sharing of TV Bands”, published by ACM on Aug. 5, 2006, 11 pages. |
IEEE 802.11-2007, Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Jun. 2007, Chapter 7.2.3.1. entitled “Beacon frame format”, (pp. 80-81). |
International Search Report of International App. No. PCT/FI2010/050071—Date of Completion of Search: May 3, 2010, 4 pages. |
International Search Report of International App. No. PCT/FI2010/050801—Date of Completion of Search: Feb. 3, 2011, 4 pages. |
International Search Report of International App. No. PCT/FI2010/050803—Date of Completion of Search: Feb. 24, 2011, 4 pages. |
International Search Report of International App. No. PCT/FI2010/050838—Date of Completion of Search: Jan. 21, 2011, 4 pages. |
Wang, Q., et al., “AwareWare: An Adaptation Middleware for Heterogeneous Environments”, IEEE Communications Society, 2004, 6 pages. |
International Search Report for International Application No. PCT/IB2010/052403—Date of Completion of Search: Sep. 8, 2010—4 pages. |
X. Gao, et al; Optimal ATIM size for 802.11 networks in ad hoc mode; DoCoMo Communications Lab USA, Mar. 27, 2006. |
Eun-Sun Jung, et al; An Energy Efficient MAC Protocol for Wireless LANs; Technical Report TR01-017; Dept of Computer Science; Texas A&M University; Jul. 31, 2001; pp. 1-11. |
Wi-Fi Alliance Technical Committee; Quality of Service (QoS) Task Group; WMM TM (including WMM TM Power Save) Specification; Wi-Fi Alliance, V. 1.1; WMM—Specification—1-1.doc; pp. 1-36, Jun. 2004. |
English Language Machine Translation of Chinese Application Publication No. CN1571283, 9 pages. |
English Language Machine Translation of Chinese Application Publication No. CN101601229, 10 pages. |
English Language Machine Translation of Chinese Application Publication No. CN1728668, 11 pages. |
Number | Date | Country | |
---|---|---|---|
20130094413 A1 | Apr 2013 | US |