This disclosure relates generally to efficiency in wireless communications systems. Embodiments of this disclosure relate to methods and apparatuses for detecting conditions associated with target wake time (TWT) parameter adjustment.
Wireless local area network (WLAN) technology allows devices to access the internet in the 2.4 GHz, 5 GHz, 6 GHz or 60 GHz frequency bands. WLANs are based on the Institute of Electrical and Electronic Engineers (IEEE) 802.11 standards. The IEEE 802.11 family of standards aim to increase speed and reliability and to extend the operating range of wireless networks.
Target Wake Time (TWT) is one of the important features for power management in WI-FI networks, which was developed by IEEE 802.11ah and later adopted and modified into IEEE 802.11ax. TWT enables wake time negotiation between an AP and an associated station (STA) for improving power efficiency. With TWT operation, it suffices for a STA to only wake up at a pre-scheduled time negotiated with another STA or AP in the network. In IEEE 802.11ax standards, two types of TWT operation are possible—individual TWT operation and broadcast TWT operation. Individual TWT agreements can be established between two STAs or between a STA and an AP. On the other hand, with broadcast TWT operation, an AP can set up a shared TWT session for a group of STAs.
The negotiated parameters such as the wake interval, wake duration and initial wake time (offset) highly affect latency, throughput as well as power efficiency, which are directly related to QoS (quality of service) or customer experiences. Services with different traffic characteristics will have different TWT parameter configurations for better QoS. Additionally, the TWT configuration should adapt to network and service status variation.
Embodiments of the present disclosure provide methods and apparatuses for enabling detecting abnormal access point, bad network condition, and abnormal server for TWT parameter adjustment in a wireless network (e.g., a WLAN).
In one embodiment, a communication device is provided, comprising: a transceiver and a processor operably coupled to the transceiver. The transceiver is configured to receive information including packets associated with TWT. The processor is configured to determine a network service type based on the packets, and when the determined network service type is a real-time service type: determine whether a condition associated with the TWT is satisfied, and modify the TWT based on the condition.
In another embodiment, a method for operating a communication device is provided, the method comprising: receiving information including packets associated with TWT; determining a network service type based on the packets; and when the determined network service type is a real-time service type: determining whether a condition associated with the TWT is satisfied, and modifying the TWT based on the condition.
In another embodiment, a non-transitory computer readable medium is provided, the computer readable medium comprising instructions that, when executed by a processor, cause the processor to receive information including packets associated with TWT; determine a network service type based on the packets; and when the determined network service type is a real-time service type: determine whether a condition associated with the TWT is satisfied, and modify the TWT based on the condition.
Other technical features may be readily apparent to one skilled in the art from the following figures, descriptions, and claims.
Before undertaking the DETAILED DESCRIPTION below, it may be advantageous to set forth definitions of certain words and phrases used throughout this patent document. The term “couple” and its derivatives refer to any direct or indirect communication between two or more elements, whether or not those elements are in physical contact with one another. The terms “transmit,” “receive,” and “communicate,” as well as derivatives thereof, encompass both direct and indirect communication. The terms “include” and “comprise,” as well as derivatives thereof, mean inclusion without limitation. The term “or” is inclusive, meaning and/or. The phrase “associated with,” as well as derivatives thereof, means to include, be included within, interconnect with, contain, be contained within, connect to or with, couple to or with, be communicable with, cooperate with, interleave, juxtapose, be proximate to, be bound to or with, have, have a property of, have a relationship to or with, or the like. The term “controller” means any device, system or part thereof that controls at least one operation. Such a controller may be implemented in hardware or a combination of hardware and software and/or firmware. The functionality associated with any particular controller may be centralized or distributed, whether locally or remotely. The phrase “at least one of,” when used with a list of items, means that different combinations of one or more of the listed items may be used, and only one item in the list may be needed. For example, “at least one of: A, B, and C” includes any of the following combinations: A, B, C, A and B, A and C, B and C, and A and B and C. As used herein, such terms as “1st” and “2nd,” or “first” and “second” may be used to simply distinguish a corresponding component from another and does not limit the components in other aspect (e.g., importance or order). It is to be understood that if an element (e.g., a first element) is referred to, with or without the term “operatively” or “communicatively”, as “coupled with,” “coupled to,” “connected with,” or “connected to” another element (e.g., a second element), it means that the element may be coupled with the other element directly (e.g., wiredly), wirelessly, or via a third element.
As used herein, the term “module” may include a unit implemented in hardware, software, or firmware, and may interchangeably be used with other terms, for example, “logic,” “logic block,” “part,” or “circuitry”. A module may be a single integral component, or a minimum unit or part thereof, adapted to perform one or more functions. For example, according to an embodiment, the module may be implemented in a form of an application-specific integrated circuit (ASIC).
Moreover, various functions described below can be implemented or supported by one or more computer programs, each of which is formed from computer readable program code and embodied in a computer readable medium. The terms “application” and “program” refer to one or more computer programs, software components, sets of instructions, procedures, functions, objects, classes, instances, related data, or a portion thereof adapted for implementation in a suitable computer readable program code. The phrase “computer readable program code” includes any type of computer code, including source code, object code, and executable code. The phrase “computer readable medium” includes any type of medium capable of being accessed by a computer, such as read only memory (ROM), random access memory (RAM), a hard disk drive, a compact disc (CD), a digital video disc (DVD), or any other type of memory. A “non-transitory” computer readable medium excludes wired, wireless, optical, or other communication links that transport transitory electrical or other signals. A non-transitory computer readable medium includes media where data can be permanently stored and media where data can be stored and later overwritten, such as a rewritable optical disc or an erasable memory device.
Definitions for other certain words and phrases are provided throughout this patent document. Those of ordinary skill in the art should understand that in many if not most instances, such definitions apply to prior as well as future uses of such defined words and phrases.
For a more complete understanding of the present disclosure and its advantages, reference is now made to the following description taken in conjunction with the accompanying drawings, in which like reference numerals represent like parts:
Embodiments of the present disclosure recognize that target wakeup time (TWT) can help save device power by setting a specific Station (STA) wakeup interval and the wakeup service period (SP), which can reduce the time/power consumption that STA is awake but has no data exchange to the Access Point (AP). The adjusted TWT parameters, including the TWT wakeup interval and the wakeup SP, need to meet the requirement that the overall throughput of the traffic is not impacted and little or no additional latency is introduced, while achieving a minimal duty cycle.
When TWT is negotiated, the TWT itself will inevitably introduce additional latency to the current network service. There can be three reasons which may lead to Quality of Service (QoS) issue after enabling TWT.
First, for some AP or STA, the TWT function may not work properly. Those problems can be caused by firmware or hardware problems within the AP or STA. Thus, a method needs to be developed to detect any abnormal AP and STA which has malfunctioned TWT, and then the TWT functions need to be disabled for those AP or STA.
Second, for some specific network service (such as mobile gaming etc.), if a bad network condition is discovered then it may lead to QoS issue when TWT is enabled. Thus, a method needs to be developed to detect those network services and the corresponding bad network condition, and then the TWT function needs to be disabled in this scenario.
Third, for some specific network service (such as mobile gaming etc.), sometimes, there can be problems with its network server. The bad server can cause delay and large latency in transceiving packets, and the TWT function in this scenario also needs to be turned off to avoid adding any extra latency to the communication chain. Thus, a method needs to be developed to detect the specific network service and whether the server of this network service is having any problem. If the network service's server is detected to behave abnormally, the TWT function needs to be turned off.
The wireless network 100 includes access points (APs) 101 and 103. The APs 101 and 103 communicate with at least one network 130, such as the Internet, a proprietary Internet Protocol (IP) network, or other data network. The AP 101 provides wireless access to the network 130 for a plurality of stations (STAs) 111-114 within a coverage area 120 of the AP 101. The APs 101-103 may communicate with each other and with the STAs 111-114 using WI-FI or other WLAN communication techniques. The STAs 111-114 may communicate with each other using peer-to-peer protocols, such as Tunneled Direct Link Setup (TDLS).
Depending on the network type, other well-known terms may be used instead of “access point” or “AP,” such as “router” or “gateway.” For the sake of convenience, the term “AP” is used in this disclosure to refer to network infrastructure components that provide wireless access to remote terminals. In WLAN, given that the AP also contends for the wireless channel, the AP may also be referred to as a STA. Also, depending on the network type, other well-known terms may be used instead of “station” or “STA,” such as “mobile station,” “subscriber station,” “remote terminal,” “user equipment,” “wireless terminal,” or “user device.” For the sake of convenience, the terms “station” and “STA” are used in this disclosure to refer to remote wireless equipment that wirelessly accesses an AP or contends for a wireless channel in a WLAN, whether the STA is a mobile device (such as a mobile telephone or smartphone) or is normally considered a stationary device (such as a desktop computer, AP, media player, stationary sensor, television, etc.).
Dotted lines show the approximate extents of the coverage areas 120 and 125, which are shown as approximately circular for the purposes of illustration and explanation only. It should be clearly understood that the coverage areas associated with APs, such as the coverage areas 120 and 125, may have other shapes, including irregular shapes, depending upon the configuration of the APs and variations in the radio environment associated with natural and man-made obstructions.
As described in more detail below, one or more of the APs may include circuitry and/or programming for facilitating triggered TXOP sharing for P2P communication during a TWT SP in a WLAN. Although
The AP 101 includes multiple antennas 204a-204n and multiple transceivers 209a-209n. The AP 101 also includes a controller/processor 224, a memory 229, and a backhaul or network interface 234. The transceivers 209a-209n receive, from the antennas 204a-204n, incoming radio frequency (RF) signals, such as signals transmitted by STAs 111-114 in the network 100. The transceivers 209a-209n down-convert the incoming RF signals to generate IF or baseband signals. The IF or baseband signals are processed by receive (RX) processing circuitry in the transceivers 209a-209n and/or controller/processor 224, which generates processed baseband signals by filtering, decoding, and/or digitizing the baseband or IF signals. The controller/processor 224 may further process the baseband signals.
Transmit (TX) processing circuitry in the transceivers 209a-209n and/or controller/processor 224 receives analog or digital data (such as voice data, web data, e-mail, or interactive video game data) from the controller/processor 224. The TX processing circuitry encodes, multiplexes, and/or digitizes the outgoing baseband data to generate processed baseband or IF signals. The transceivers 209a-209n up-converts the baseband or IF signals to RF signals that are transmitted via the antennas 204a-204n.
The controller/processor 224 can include one or more processors or other processing devices that control the overall operation of the AP 101. For example, the controller/processor 224 could control the reception of forward channel signals and the transmission of reverse channel signals by the transceivers 209a-209n in accordance with well-known principles. The controller/processor 224 could support additional functions as well, such as more advanced wireless communication functions. For instance, the controller/processor 224 could support beam forming or directional routing operations in which outgoing signals from multiple antennas 204a-204n are weighted differently to effectively steer the outgoing signals in a desired direction. The controller/processor 224 could also support OFDMA operations in which outgoing signals are assigned to different subsets of subcarriers for different recipients (e.g., different STAs 111-114). Any of a wide variety of other functions could be supported in the AP 101 by the controller/processor 224 including facilitating triggered TXOP sharing for P2P communication during a TWT SP. In some embodiments, the controller/processor 224 includes at least one microprocessor or microcontroller. The controller/processor 224 is also capable of executing programs and other processes resident in the memory 229, such as an OS. The controller/processor 224 can move data into or out of the memory 229 as required by an executing process.
The controller/processor 224 is also coupled to the backhaul or network interface 234. The backhaul or network interface 234 allows the AP 101 to communicate with other devices or systems over a backhaul connection or over a network. The interface 234 could support communications over any suitable wired or wireless connection(s). For example, the interface 234 could allow the AP 101 to communicate over a wired or wireless local area network or over a wired or wireless connection to a larger network (such as the Internet). The interface 234 includes any suitable structure supporting communications over a wired or wireless connection, such as an Ethernet or RF transceiver. The memory 229 is coupled to the controller/processor 224. Part of the memory 229 could include a RAM, and another part of the memory 229 could include a Flash memory or other ROM.
As described in more detail below, the AP 101 may include circuitry and/or programming for facilitating triggered TXOP sharing for P2P communication during a TWT SP. Although
The STA 111 includes antenna(s) 205, transceiver(s) 210, a microphone 220, a speaker 230, a processor 240, an input/output (I/O) interface (IF) 245, an input 250, a display 255, and a memory 260. The memory 260 includes an operating system (OS) 261 and one or more applications 262.
The transceiver(s) 210 receives, from the antenna(s) 205, an incoming RF signal (e.g., transmitted by an AP 101 of the network 100). The transceiver(s) 210 down-converts the incoming RF signal to generate an intermediate frequency (IF) or baseband signal. The IF or baseband signal is processed by RX processing circuitry in the transceiver(s) 210 and/or processor 240, which generates a processed baseband signal by filtering, decoding, and/or digitizing the baseband or IF signal. The RX processing circuitry sends the processed baseband signal to the speaker 330 (such as for voice data) or is processed by the processor 340 (such as for web browsing data).
TX processing circuitry in the transceiver(s) 210 and/or processor 240 receives analog or digital voice data from the microphone 220 or other outgoing baseband data (such as web data, e-mail, or interactive video game data) from the processor 240. The TX processing circuitry encodes, multiplexes, and/or digitizes the outgoing baseband data to generate a processed baseband or IF signal. The transceiver(s) 210 up-converts the baseband or IF signal to an RF signal that is transmitted via the antenna(s) 205.
The processor 240 can include one or more processors and execute the basic OS program 261 stored in the memory 260 in order to control the overall operation of the STA 111. In one such operation, the processor 240 controls the reception of forward channel signals and the transmission of reverse channel signals by the transceiver(s) 210 in accordance with well-known principles. The processor 240 can also include processing circuitry configured to facilitate triggered TXOP sharing for P2P communication during a TWT SP. In some embodiments, the processor 240 includes at least one microprocessor or microcontroller.
The processor 240 is also capable of executing other processes and programs resident in the memory 260, such as operations for facilitating triggered TXOP sharing for P2P communication during a TWT SP. The processor 240 can move data into or out of the memory 260 as required by an executing process. In some embodiments, the processor 240 is configured to execute a plurality of applications 262, such as applications for facilitating triggered TXOP sharing for P2P communication during a TWT SP. The processor 240 can operate the plurality of applications 262 based on the OS program 261 or in response to a signal received from an AP. The processor 240 is also coupled to the I/O interface 245, which provides STA 111 with the ability to connect to other devices such as laptop computers and handheld computers. The I/O interface 245 is the communication path between these accessories and the processor 240.
The processor 240 is also coupled to the input 250, which includes for example, a touchscreen, keypad, etc., and the display 255. The operator of the STA 111 can use the input 250 to enter data into the STA 111. The display 255 may be a liquid crystal display, light emitting diode display, or other display capable of rendering text and/or at least limited graphics, such as from web sites. The memory 260 is coupled to the processor 240. Part of the memory 260 could include a random-access memory (RAM), and another part of the memory 260 could include a Flash memory or other read-only memory (ROM).
Although
By contrast, in the bottom graph 304, wake time negotiation gives rise to consecutive TWT sessions 306 (e.g., a service session). Each TWT session 306 is defined as the time period from the beginning of a TWT interval 208 to the end of the TWT interval 308. Each TWT session 306 includes two states: an active state 311, defined by a TWT service period (SP) duration 310 (during which the STA is awake to communicate with the AP), and a power save state or doze state 312 (during which the STA is not actively awake or communicating with the AP). As a result of wake time negotiation, power efficiency at the STA is improved without adding too much latency or allowing UL or DL packets to be dropped.
In wake time negotiation, the negotiated TWT parameters include the wake interval (e.g., the TWT interval 308 for each TWT session 306), wake duration (e.g., the TWT SP duration 310 for each TWT session 306), and initial wake time or offset (e.g., indicated by the TWT start time 314). These negotiated parameters highly affect latency, throughput, and power efficiency, which are directly related to the QoS (quality of service) a customer experiences. Services with different traffic characteristics can have different TWT parameter configurations for better QoS. Additionally, the TWT configuration should adapt to network and service status variation.
In some embodiments, a TWT parameter set field is used to negotiate the TWT parameters.
The TWT agreement is initiated by a STA sending a TWT negotiation request to an AP. Once a TWT agreement is made between the AP and the STA, the STA periodically wakes up to communicate with the AP, where the interval between the successive wake times is jointly specified by the TWT wake interval mantissa 402 and TWT wake interval exponent 404 sub-fields in the TWT parameter set field 400.
The target wake time 406 and nominal minimum TWT wake duration 408 sub-fields specify, respectively, the first wake time for the TWT agreement, and the time for which the STA must wait before going to doze state when there is no transmitted traffic after a wake time, which is the TWT SP duration 310 in
Other than the wake interval and wake duration, offset is also an important impact factor on the user experience, as the offset could affect the latency.
Different offsets 502 introduce a different additional TWT related latency. TWT interval 308 and offset together define the additional latency introduced by TWT. After TWT negotiation setup, the offset 502 can be adjusted by the field “Next TWT” 502 in the example TWT information frame 600 illustrated in
In various embodiments, the actual TWT SP duration 310 is dynamically determined in run time by the aforementioned nominal minimum TWT wake duration, and the STA enters the doze state 312 when a packet is received with EOSP (end of service period) bit set to “1”, or more data bit set to “0”. Depending on whether or not early termination is supported, the time the STA enters the doze state 312 will be slightly different. As shown in graph 702, if the STA supports early termination then once the STA receives a packet with EOSP bit set to “1” or more data bit “0” the STA can enter doze state 312 (although there could be a slight delay between reception of the packet and entering doze state 312). If the STA does not support early termination, then it will wait until end of TWT SP duration to enter doze state 312, as shown in graph 304.
In some embodiments, the type of traffic between a STA and AP can affect the optimal TWT parameters, and in particular the optimal TWT interval and TWT SP duration. Current methods of determining TWT parameters do not use information about the incoming traffic's statistics or estimate variation in the traffic statistics at a fine time scale (e.g., at the scale of a TWT interval, which can be in a range from about 20 ms to about 80 ms).
When the Access Point (AP) or Station (STA)'s TWT function is not working properly, the packets can be buffered at the AP side at the start of a TWT session and are not transmitted to the STA after a long time. These phenomena can lead to abnormally large downlink (DL) inter-packet time. The DL inter-packet time here is defined as the difference of the arrival time between two packets at the STA. In some instances, the two packets could be consecutive packets. In other instances, the arrival time could be the DL inter-packet time between two specific types of packets (e.g., two UDP packets, in which we would ignore the non-UDP packets coming in between).
For real-time service, the normal DL inter-packet time can be relatively stable and small, and the DL inter-packet time is generally smaller. In the present disclosure, methods utilizing the downlink inter-packet time to detect the abnormal AP are proposed. The overview of the abnormal AP detection method is shown in
The abnormal AP detection may be performed every Δt seconds. A typical value of Δt can be 500 ms. At step 804, a network service detection module is utilized to detect if the current service is a real-time service. At step 806, a determination is made whether the current service is detected as a real-time service. If not, then the method reverts to step 802 and waits for Δt. If the current service is detected as a real-time service, then the method continues to step 808, where a determination is made whether TWT is negotiated. If the TWT is not negotiated, then the method reverts to step 802 and waits for Δt to check the abnormal AP status again. If the TWT is negotiated, then the method continues to step 810, where the method compares the current maximum downlink inter-packet time to a database of normal downlink inter-packet time. If abnormally large downlink inter-packet time is not detected, then the method reverts to step 802 and waits for Δt. If abnormally large downlink inter-packet time is detected, then the method continues to step 812, where the AP will be labeled as an abnormal AP, and thereafter continues to step 814, where the TWT will be torn down. After TWT tear down, the method reverts to step 802 and waits for Δt to check the abnormal AP status again.
Because there can be some fluctuation of the network service detection result, such as some occasional false or misdetection of real-time service, it may be beneficial to increase the confidence level and stability of the network service detection result as shown in
As illustrated in
If N_ser is not larger than N1, then at step 916 a determination is made whether N_ser is smaller than a second threshold N2. If so, then at step 918 the service type can be determined to be not Service 1, and then the method reverts to step 902 and waits for Δt. If N_ser is smaller than N1 but still larger than N2, then at step 920 the final result of the detected service type (denoted as Servicetype_curr) is not updated and the previous result Servicetype_prev is used instead, and then the method reverts to step 902 and waits for Δt. The value of the second threshold N2 should be equal to or smaller than the first threshold N1. A typical value of N2 can be 3 or 4. After it is confirmed that the current service is the desired Service 1, the method can be used to check when the current service is no longer Service 1. If the network service detection module's output at step 906 is not Service 1, then at step 907 a determination is made whether the value of N_ser is greater than zero. If not, then the method continues to step 916. If yes, then at step 922 the value of N_ser is reduced by 1 (e.g., due to the moving window of size N_max*Δt and step size Δt) until it reaches 0. If N_ser becomes smaller than N2, then the current service is confirmed to be no longer Service 1 as described above.
For step 810 in
To obtain such tables above, experiments are conducted in the anechoic chamber. Several phones are used to generate different background traffic to control the congestion level. The DL inter-packet time of a set of apps in mobile gaming, video call and audio call categories are recorded while the apps are running without any observable quality of service issue. Among the recorded DL inter-packet time, we choose the maximum value of the recorded inter-packet time in each category and record them in the database. The congestion level is measured by the ratio of clear-channel-assessment time and the radio-on time. The clear-channel-assessment time is the time that WiFi radios use to sense the channel and wait for the channel to be clear. The radio-on time is the time that Wi-Fi radios are turned on and awake. The time in the table represents the maximum normal inter-packet time that each sub-service can have. If the observed maximum downlink inter-packet time of a specific sub-service is larger than the one in the database, then this downlink interpacket time can be considered abnormal.
Due to some fluctuation of server traffic pattern, the downlink interpacket time for those sub-services can sometimes be larger than the one recorded in the database. Thus, we develop another mechanism to further confirm that the there is indeed a problem with the observed downlink interpacket time.
As illustrated in
As illustrated in
In another embodiment of abnormal AP detection, if the network service detection has a relatively high false detection or miss rate of the desired service, then additional procedures may be developed to mitigate the impact of the false detection rate or miss rate. In current TWT implementation, TWT is only enabled for real-time service. Thus, the detection of abnormal AP is only required for real-time service. As there can be some false abnormal AP detection, as illustrated in
In addition, sometimes the service detection can have some delay to detect non-real-time service. As non-real-time service typically has very large downlink interpacket time, when the service detection detects non-real-time service as real-time service, then it can falsely treat the downlink interpacket time of non-real-time service as the one from real-time service, and then decides that the inter-packet time is abnormally large. An additional measure is added which checks the time difference between the time that the abnormal AP is detected (T_abnormal) and the time that the non-real-time service is detected. As illustrated in
As illustrated in
If the determination at step 1206 is that the current service is not detected as a real-time service, a mechanism is introduced to reset the abnormal AP status to be false when the non-real-time service is detected for a period of time. At step 1216, a determination is made whether the abnormal AP status is set to true. If not, then the method reverts to step 1202 and waits for Δt to check the abnormal AP status again. If yes, then T_notReal is incremented by Δt and at step 1220, a determination is made whether T_notReal is larger than a threshold T1. If yes, then at step 1222, the abnormal AP status is set to be false, and the method reverts to step 1202 and waits for Δt to check the abnormal AP status again. If T_notReal is not larger than the threshold T1, then at step 1224, a determination is made whether T_curr-T_abnormal<T2. If yes, then at step 1226, the abnormal AP status is set to be false, and the method reverts to step 1202 and waits for Δt to check the abnormal AP status again. If not, the method reverts to step 1202 and waits for Δt to check the abnormal AP status again.
There are some services such as mobile gaming whose QoS is susceptible to bad network conditions. Thus, the TWT needs to be disabled for those services when a bad network condition is discovered. The flowchart of the proposed network condition based TWT adjustment strategy is shown in
The T_td in
In the example described above, the network condition may be measured by the congestion level and the transmission success rate (TxGoodRate). The congestion level is quantified by the ratio of clear channel assessment time and radio-on time (CCA/RO). The typical values of good and bad network conditions are shown below.
Sometimes, a server may act abnormally and cause QoS issues at the user end. In this case, the TWT needs to be torn down to minimize its impact on the last hop to the user. The last hop is defined as the link between the access point and user's WiFi device. Therefore, a method to detect a server anomaly and then teardown TWT would be beneficial. The abnormal server can often cause abnormally large downlink interpacket time. Thus, in the present disclosure, the downlink interpacket time is used as a metric to detect an abnormal server event. Unlike the abnormal AP, the server issue can be short-lived, and the method described in the present disclosure does give it a chance to clear the abnormal server status if normal downlink interpacket time is constantly observed.
At step 1404, the network service detection is performed to identify if the current running services are the ones which are sensitive to any server issues (e.g., mobile gaming). At step 1406, a determination is made whether such services (using Service 1 to represent here) is/are detected. If Service 1 is not detected, then at step 1407 the teardown timer T_td is set to 0 and the method reverts to step 1402 and waits for Δt to check server conditions. If Service 1 is detected, then at step 1408, a determination is made whether the abnormal server condition 1 is detected. If the abnormal server condition 1 is detected, then at step 1410, a determination is made whether the abnormal server has been detected in the past Tx minutes. If so, then at step 1412, the TWT will remain torn down for the rest of the current running services, and then the method reverts to step 1402 and waits for Δt to check server conditions. A typical value of Tx can be 10 minutes. If the abnormal server condition 1 is not detected, or if it is the first time that a server issue has been discovered for the current running services, then at step 1414 the TWT teardown timer T_td will be torn down for at least T1 seconds. A typical value of T1 can be 30 seconds. At step 1416, a determination is made whether T_td is greater than zero. If yes, then at step 1418 the TWT will remain torn down, and if not, the TWT is resumed at step 1420. If the abnormal server condition 1 is not detected at step 1408, then at step 1422 a determination is made whether a normal server condition is met. If a normal server condition is met, then at step 1424 the T_td value will reduce by Δt. Example normal and abnormal server conditions are described below.
In one example abnormal server condition, the DL interpacket time for mobile gaming service is larger than 90 ms for 3 times in a size 20 moving window. Each window has a time length of 500 ms.
In one example normal server condition, the DL interpacket time for mobile gaming is smaller than 75 ms.
The above flowcharts illustrate example methods that can be implemented in accordance with the principles of the present disclosure and various changes could be made to the methods illustrated in the flowcharts. For example, while shown as a series of steps, various steps could overlap, occur in parallel, occur in a different order, or occur multiple times. In another example, steps may be omitted or replaced by other steps.
Although the present disclosure has been described with an exemplary embodiment, various changes and modifications may be suggested to one skilled in the art. It is intended that the present disclosure encompass such changes and modifications as fall within the scope of the appended claims. None of the description in this application should be read as implying that any particular element, step, or function is an essential element that must be included in the claims scope. The scope of patented subject matter is defined by the claims.
This application claims priority under 35 U.S.C. § 119(e) to U.S. Provisional Patent Application No. 63/299,771 filed on Jan. 14, 2022, which is hereby incorporated by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
63299771 | Jan 2022 | US |