Increasing reliable data throughput in a wireless network

Information

  • Patent Grant
  • 9240868
  • Patent Number
    9,240,868
  • Date Filed
    Friday, November 4, 2005
    19 years ago
  • Date Issued
    Tuesday, January 19, 2016
    8 years ago
Abstract
Systems and methods for improving data transmission rates in communication networks are disclosed. In an 802.11 wireless communication network, where a source node of the wireless network transmits TCP data to a destination node of the wireless network, the destination node does not transmit TCP acknowledgments (ACKs) for the TCP data if 802.11 ACKs indicate that the destination node received the TCP data. If a source outside the wireless network transmits TCP data to the destination node within the wireless network through an intermediate device, such as an access point, the destination node suppresses transmitting TCP ACKs. The intermediate device transmits TCP ACKs as proxy for the destination node to the source. The intermediate device also suppresses TCP ACKs where a source node within the wireless network sends the TCP data to a destination node outside of the wireless network.
Description
BACKGROUND OF THE INVENTION

1. Field of the Invention


The present invention relates generally to communication networks and more particularly to systems and methods for increased data throughput over communication networks, such as wireless networks.


2. Description of the Prior Art


A reference model can conveniently represent communication between networked devices. FIG. 1 illustrates a correlation between layers of the Open Systems Interconnection (OSI) Reference Model and the Department of Defense (DoD) Reference Model, according to the prior art. The Department of Defense Model (DoD) model and the Open Systems Interconnection (OSI) model are two standardized reference models which are well known to those skilled in the art.


These reference models represent communications as processes which occur in a hierarchy of higher and lower layer protocols. In general, each layer communicates with a higher layer protocol and a lower layer protocol. As indicated by FIG. 1, the DoD model includes four layers, a network access layer, an internet layer, a host-to-host transport layer (the transport layer), and an applications layer.



FIG. 2 illustrates physical and virtual data flow at the various layers in the DoD Reference Model during communication between two network devices, according to the prior art. Each layer in a first network device communicates with the corresponding layer in a second network device. The communication between layers is represented by dashed lines, the embedding of information in successive lower layer protocols at the first network device is represented by downward arrows between layers, and the un-packaging of information by successive higher layer protocols at the second network device is represented by upward arrows between layers.


For instance, the communication between the network devices in the transport layer (i.e., the higher layer protocol) is embedded into a communication in the internet layer (i.e., the lower layer protocol for the transport layer protocol) of each device. Physical data transfer is ultimately made at the lowest layer protocol in the hierarchy of the reference model. In the DoD network reference model, the lowest layer protocol is the network access layer.


The network access layer comprises media access control services and protocols (which attach physical source and destination addresses, e.g., Ethernet addresses, and control protocols), and the physical medium, for example, copper cables or RF specifications such as the type of modulation. To achieve compatibility and interoperability of equipment manufactured by various different vendors, communication networks often rely on standard specifications for the network access layer. In one example, in 1997, the Institute of Electrical and Electronics Engineers (IEEE) 802 Group established the 802.11 wireless standard specifying media access (MAC) services, protocols, and an RF physical layer for wireless communication. This protocol is now in widespread use for wireless networks. For example, in an IEEE 802.11 network, an access point (e.g., a base station) communicates data with a remote receiving node (e.g., a mobile station such as a laptop computer configured with a network interface card) over a wireless link such as a radio frequency (RF) baseband wireless link.


Generally, wireless transmissions tend to be more susceptible to data losses than other forms of data transmission. Wireless transmission can be unreliable because of problems such as interference, signal attenuation, and multi-path reflections of radio signals. For example, 802.11b and 802.11g wireless local area networks (LANs) communicate by way of a 2.45 GHz frequency band which often has interfering radiation from mobile phones, microwave ovens and other 802.11 networks. To address this problem, the 802.11 specification comprises mechanisms to enable reliable communication despite the presence of interference.


In the present context, a transmission protocol is “reliable” if the protocol provides for verification that the receiving node received the data. One mechanism by which an 802.11 wireless access point provides reliable communication with an associated receiving node is with 802.11 acknowledgments (ACKs). A unicast 802.11 packet is acknowledged by the receiving node via an 802.11 ACK following a successful reception. If the access point does not detect the 802.11 ACK within a set period of time, the unicast 802.11 packet is presumed to have been lost and is therefore retransmitted by the access point. However, by implementing a reliable lower layer protocol, the transmission of 802.11 ACKs limits data transmission rates over communication networks because for successfully received unicast 802.11 packets, the 802.11 ACKs are transmitted in return.


A higher layer protocol that implements reliable transmission potentially further limits the data transmission rates when implemented on a communication network that provides a reliable lower layer protocol, such as the wireless network. For example, the transport layer of the DoD reference module typically includes reliable connection oriented protocols, such as TCP, for the exchange of data between a sender and a receiver. TCP assures reliable delivery of data services between the sender and the receiver (i.e., the source and destination) using several mechanisms. After a predefined amount of data is transmitted from the sender to the receiver, the sender must wait for a TCP acknowledgment (ACK) in the transport layer back from the receiver to confirm that the data was received. The sender is not allowed to transmit additional data until it receives this ACK, and if the sender does not receive the ACK within a predetermined time, it must retransmit the data.



FIG. 3 illustrates transmission of TCP and 802.11 acknowledgments for TCP data 350 transmitted from a source 310 to a receiving node 330, according to the prior art. The source node 310 transmits the TCP data 350 to an access point 320 over a wired network 300. The access point 320 then transmits the TCP data 350 (e.g., encapsulated in an 802.11 packet) over a wireless link 340 to the receiving node 330. If the receiving node 330 successfully receives the TCP data 350, the receiving node 330 transmits an 802.11 ACK 360 to the access point 320.


The receiving node 330 then transmits a TCP ACK 370 to the source 310 through the access point 320. The access point 320 acknowledges receipt of the TCP ACK 370 by another 802.11 ACK 380. The access point 320 finally transmits the TCP ACK 370 to the source 310.


Therefore, the TCP ACKs (e.g., the TCP ACK 370) are particularly burdensome in the 802.11 wireless LAN because multiple acknowledgments, (i.e., TCP ACKs and 802.11 ACKs) are sent to acknowledge receipt of the same communication (i.e., the TCP data 350). A wireless network, such as an IEEE 802.11 network, may provide a relatively high maximum physical data rate, for example 54 Mbps. However, because TCP packet headers and other protocol content is transmitted over the wireless link along with application layer data, in practice, the TCP data transfer rate corresponding to a 54 Mbps rate of physical transmission between physical IEEE 802.11g network devices is only about 24 Mbps. Hence, protocol overhead comprises about 50% of the application layer data rate.


Additionally, data transmission between a TCP source and a TCP destination is often unidirectional. For example, applications such as web browsers commonly receive large amounts of data from a remote website while sending little or no data back to the site. Accordingly, the TCP data transmission is often unidirectional over short intervals, and the TCP ACKs from the receiver to the sender typically carry no TCP data.


One limitation is that the protocol overhead for sending the TCP ACKs from the receiver to the sender burdens the physical communication channel when there is no actual TCP data being transferred from the receiver to the sender. Furthermore, much of this overhead is typically repeated for each TCP ACK. As a result, much of the time used to send 802.11 data packets is taken up with sending encapsulated TCP ACKs that have no accompanying TCP data and accompanying 802.11 ACKs. The multiple TCP ACKs and 802.11 ACKs increase network traffic over the communication network and limit bandwidth for the transfer of the data.


SUMMARY

The present invention provides systems, devices, and methods for throughput enhancement by acknowledgment suppression. A method comprises transmitting data according to a higher layer protocol from a source to a destination through an intermediate device between the source and the destination, transmitting a first acknowledgment according to a lower layer protocol from the destination to the intermediate device, and transmitting a second acknowledgment according to the higher layer protocol to the source from the intermediate device based on the first acknowledgment. The destination may comprise a node of a wireless network. The intermediate device may comprise an access point of the wireless network.


In some embodiments, the higher layer protocol comprises TCP, a reliable connection oriented protocol, and the second acknowledgment comprises a TCP ACK. The lower layer protocol may comprise an 802.11 protocol, and the first acknowledgment comprises an 802.11 ACK.


Another method comprises transmitting data according to a higher layer protocol from a source to a destination, transmitting a first acknowledgment to the source according to a lower layer protocol from an intermediate device between the source and the destination, transmitting a second acknowledgment according to the higher layer protocol from the destination to the intermediate device, and suppressing the second acknowledgment at the intermediate device. In some embodiments, the source comprises a node of a wireless network. The intermediate device may comprise an access point of a wireless network. In some embodiments, suppressing the second acknowledgment comprises not transmitting the second acknowledgment to the source.


Still another method of the invention comprises transmitting data according to a higher layer protocol from a source to a destination through an intermediate device between the source and the destination, transmitting a first acknowledgment to the source according to a lower layer protocol from the intermediate device, and transmitting a second acknowledgment according to the lower layer protocol to the intermediate device from the destination.


A wireless local area network (LAN) device, such as an access point, is further provided. The device comprises logic configured to transmit data according to a higher layer protocol from a source to a destination, receive a first acknowledgment according to a lower layer protocol from the destination, and transmit a second acknowledgment according to the higher layer protocol to the source based on the first acknowledgment. In these embodiments, the logic may be embodied in any combination of hardware, software, and firmware elements. In some embodiments, the device is further configured to broadcast a beacon advertising a capability to generate TCP acknowledgments based on 802.11 acknowledgments.


Another wireless LAN device of the invention comprises logic configured to receive data according to a higher layer protocol from a source, transmit a first acknowledgment to the source according to a lower layer protocol, and not send a higher layer protocol acknowledgment to the source in response to receiving the data. In some embodiments, the wireless LAN device comprises a receiving node. The source in communication with the wireless LAN device may comprise an access point.





BRIEF DESCRIPTION OF THE DRAWINGS

The present invention will be described with reference to drawings that represent preferred embodiments of the invention. These embodiments are intended to illustrate without limiting the invention. Other embodiments will become apparent from the following drawings:



FIG. 1 illustrates a correlation between layers of the Open Systems Interconnection (OSI) Reference Model and the Department of Defense (DoD) Reference Model, according to the prior art;



FIG. 2 illustrates physical and virtual data flow at the various layers in the DoD Reference Model during communication between two network devices, according to the prior art;



FIG. 3 illustrates transmission of TCP and 802.11 acknowledgments for TCP data transmitted from a source to a receiving node, according to the prior art;



FIG. 4 illustrates an exemplary wireless local area network device, according to an embodiment of the present invention;



FIG. 5 illustrates transmission of TCP and 802.11 acknowledgments for TCP data transmitted from a source to a receiving node, according to an embodiment of the present invention; and



FIG. 6 illustrates transmission of TCP and 802.11 acknowledgments for TCP data transmitted between two receiving nodes of a wireless network, according to an embodiment of the present invention.





DETAILED DESCRIPTION

The present invention is directed to methods for improving data transmission rates in communication networks through the reduction of acknowledgment transmissions, and to systems and devices that are configured to enable the methods. Specifically in an exemplary wireless network, when a node of the wireless network is transmitting TCP data over a wireless link to a destination, TCP acknowledgments (ACKs) without data or other flag bits are not sent over the wireless link if 802.11 ACKs are sufficient to inform the node that the TCP data has been properly received by the destination. If the TCP data originates outside of the wireless network and is being sent to a destination within the wireless network, the destination suppresses the TCP ACKs and an access point of the wireless network sends the TCP ACKs to the originator. If the TCP data originates within the wireless network and is being sent out of the wireless network, the access point of the wireless network suppresses the TCP ACKs. If the TCP data is being sent between nodes in the wireless network, both the access point and the destination node suppress TCP ACKs. Accordingly, some embodiments of the present invention provide access points and wireless nodes that are configured to selectively suppress TCP ACKs when appropriate.



FIG. 4 illustrates an exemplary wireless local area network (LAN) device 400 comprising an antenna apparatus 410 and an 802.11g RF communication apparatus 420, according to one embodiment of the present invention. The wireless LAN device 400 can be, for example, a transmitter and/or a receiver, such as an 802.11 access point, a set-top box, a laptop computer, a television, a PCMCIA card, a remote control, and a remote terminal such as a handheld gaming device. In an exemplary embodiment, the wireless LAN device 400 comprises an access point for communicating to one or more remote receiving nodes over a wireless link (not shown), for instance, by way of TCP/IP in an 802.11 wireless network.


Typically, the wireless LAN device 400 receives data from a router (not shown) connected to the Internet, and the wireless LAN device 400 exchanges the data via the wireless link with one or more remote receiving nodes (not shown). The wireless LAN device 400 can also form a part of a wireless LAN by enabling communications among the one or more remote receiving nodes. Although the disclosure focuses on specific embodiments for the wireless LAN device 400, aspects of the invention are applicable to a wide variety of devices for exchanging information via a communication network, and are not intended to be limited to the specifically disclosed embodiments.


In one embodiment, the wireless LAN device 400 includes the antenna apparatus 410, the 802.11g RF communication apparatus 420 (e.g., a transceiver), and a processor (not shown) running software to control the communication apparatus 420 and/or the antenna apparatus 410. The communication apparatus 420 can be essentially any device for generating and/or receiving an RF signal. The communication apparatus 420 may include, for example, a radio modulator/demodulator for converting data received into the wireless LAN device 400 (e.g., from the router) into an RF signal for transmission to one or more of the remote receiving nodes. In some embodiments, the communication apparatus 420 comprises circuitry for receiving data packets of video from the router and circuitry for converting the data packets into 802.11 compliant RF signals. Additionally, the principles of the invention apply to an access point with a single antenna, or an access point with two omnidirectional “whip” antennas.



FIG. 5 illustrates transmission of TCP and 802.11 acknowledgments for TCP data 550 transmitted from a source 510 to a receiving node 530, according to an embodiment of the present invention. A wired network 500 connects the source 510 to an access point 520 (e.g., such as the wireless LAN device 400 of FIG. 4). A wireless network 540 connects the access point 520 to the receiving node 530. An exchange of data between the source 510, the access point 520, and the receiving node 530 is schematically illustrated below the representation of the devices 510, 520, and 530.


The source 510 transmits the TCP data 550 destined for the receiving node 530. To reach the receiving node 530, the source 510 transmits the TCP data 550 over the wired network 500 to the access point 520. In one example, an unreliable wired network access protocol, such as, 802.3 Ethernet, may be used to transmit the TCP data 550 via the wired network 500.


After the access point 520 converts the TCP data 550 into an 802.11 frame, the access point 520 transmits the 802.11 frame comprising the TCP data 550 to the receiving node 530. Subsequently, the receiving node 530 transmits an 802.11 ACK 560 to the access point 520. Upon receiving the 802.11 ACK 560, the access point 520 has sufficient information to determine that the receiving node 530 received the TCP data 550 without error. The access point 520 then transmits a TCP ACK 570 over the wired network 500 to the source 510.


The access point 520 advantageously provides that if the access point 520 receives the 802.11 ACK 560, then the receiving node 530 received the TCP data 550 without error. Accordingly, the access point 520 and the receiving node 530 may not exchange multiple ACKs for the TCP data 540. Thus, according to one embodiment, the receiving node 530 does not send a TCP ACK to acknowledge the TCP data 550. In some embodiments, the receiving node 530 generates the TCP ACK, but is configured to suppress the TCP ACK from the transmission at the lower layer protocol. In other embodiments, the receiving node 530 is configured to not generate the TCP ACK. Not sending the TCP ACK frees the wireless link 540 for other transmissions.


Although the explanation of the embodiment shown in FIG. 5 is in terms of TCP data sent from the source 510 to the receiving node 530, similar issues exist when TCP data is sent from the receiving node 530 to the source 510 by way of the access point 520. Therefore, according to one embodiment, when TCP data is transmitted from the receiving node 530 to the access point 520 via the wireless link 540, an 802.11 ACK returned to the receiving node 530 is sufficient to inform the receiving node 530 that the TCP data was received by the access point 520.


The TCP data is then sent to the source 510 over the wired network 500. The source 510 then returns a TCP ACK to the access point 520. The TCP ACK from the source 510 is then suppressed by the access point 520. Suppressing the TCP ACK at the access point 520, advantageously, prevents the transmission of the TCP ACK to the receiving node 530 and the subsequent transmission of another 802.11 ACK back to the access point 520 from the receiving node 530 in response to the received TCP ACK.


Generally, in a TCP network, a proxy that synthesizes (“spoofs”) a TCP ACK from an intended destination must take responsibility for delivering the TCP data to the intended destination. It is generally necessary for the proxy (the “spoofer”) to retain the TCP data until the TCP data has been received and acknowledged by the destination. Once the source receives an acknowledgment that the TCP data has been received by the destination, the source can delete the TCP data from its transmission buffer. Thus, when the source receives a spoofed TCP ACK from the proxy before the data is actually delivered to the destination, the source can proceed as if the data had actually been delivered. Generally, the spoofed TCP ACK allows the sender to send more data to the proxy.


In this sense, the system of FIG. 5 is generally configured for using 802.11 ACKs as a proxy for TCP ACKs. Reducing the number of TCP ACKs that are sent over the wireless link 540 improves TCP data throughput across the wireless link 540. The access point 520 and receiving node 530 can be thought of as comprising a distributed proxy.


In one embodiment, the access point 520 and the receiving node 530 handshake during an initial association to enable the suppression of TCP ACKs and to enable the access point 520 to spoof the suppressed TCP ACKs to the source 510 based on 802.11 ACKs from the receiving node 530. The initial association includes an exchange of information between the access point 520 and the receiving node 530 to indicate, by way of example, that the access point 520 is capable of supporting 54 Mbps physical layer rate communications.


In another embodiment, the access point 520 broadcasts a beacon advertising its capability to generate TCP ACKs based on 802.11 ACKs. If the receiving node 530 elects to use this capability to increase the capacity for TCP data transmission over the wireless link 540, the receiving node 530 will signal this capability in an 802.11 association request sent to the access point 520. Thereafter, the receiving node 530 and the access point 520 can cooperatively suppress TCP ACKs that originate either from the transport layer in the receiving node 530 or in the source 510.


After successful completion of the 802.11 association handshake, wireless 802.11 frames comprising TCP ACKs in all TCP communications transmitted across the wireless link 540 will be suppressed by spoofing the TCP ACKs from the 802.11 ACKs as described above. A benefit of the handshaking is that the access point 520 can differentiate a receiving node (not shown) that does not support TCP ACK suppression from the receiving node 530 that does. By suppressing TCP ACKs, TCP data transmission capacity in an 802.11g network can be improved by up to 30% over that of the prior art. In some embodiments, actual data throughput is increased from 24 Mbps to 30 Mbps in the 54 Mbps 802.11g physical data rate mode.


In some embodiments, it may be advantageous to suspend TCP ACK suppression, even though the access point 520 and receiving node 530 have the suppression capability. For example, when a TCP data stream is transmitted from the receiving node 530 to the source 510 via the access point 520, the access point 520 may buffer the TCP data stream until a TCP ACK returned by the source 510 towards the receiving node 530 is received by the access point 520. In order to sustain TCP ACK suppression between the access point 520 and the receiving node 530, the access point 520 may require a very high capacity buffer to store the accumulated TCP data stream from the receiving node 530. In particular, this will be the case if the TCP data stream from the access point 520 to the source 510 is interrupted, for example, due to a network problem between the access point 520 and the source 510.


In one embodiment, to reduce the buffering required by the access point 520, the access point 520 avoids suppressing TCP ACKs even though it has the capability to do so. In other embodiments, the access point 520 suppresses TCP ACKs for only a limited number of data packets. In some embodiments, the access point 520 may reduce data transmission rates over the wireless link 540, or may stop generating 802.11 ACKs to the receiving node 530, as data buffers in the access point 520 become full.



FIG. 6 shows transmission of TCP and 802.11 acknowledgments between two nodes of a wireless network according to an embodiment of the present invention. A wired network 600 connects a source 610 to an access point 620. A wireless link 650 connects the access point 620 to a receiving node 630. A wireless link 660 connects the access point 620 to a receiving node 640. An exchange of data between the receiving nodes 630 and 640 and the access point 620 is schematically illustrated below the representation of the devices 620, 630, and 640.


The access point 620 may buffer TCP data between the receiving node 630 and the receiving node 640. The access point 620 may also operate as a proxy between the receiving node 630 and the receiving node 640. When the access point 620 operates solely as a buffer, the receiving node 630 transmits TCP data 670 to the access point 620. The access point 620 then returns an 802.11 ACK 680 to the receiving node 630 to acknowledge the receipt of the TCP data 670. The access point 620 then transmits the TCP data 670 to the receiving node 640. The receiving node 640 transmits an 802.11 ACK 690 to the access point 620. In this situation, as compared to the prior art, a TCP ACK and an 802.11 ACK are eliminated both between the access point 620 and the receiving node 630, and between the receiving node 640 and the access point 620.


As described herein, the access point 620 can act to prevent an overflow of the data buffers in the access point 620. The access point 620 can suspend TCP ACK suppression entirely with the receiving nodes 630 and 655. Alternatively, the access point 620 can operate as a proxy between the receiving node 630 and the receiving node 640. In this mode of operation, the access point 620 generates a TCP ACK from the receiving node 640 to the receiving node 630 based on the 802.11 ACK 690 received from the receiving node 640. The access point 620 transmits the spoofed TCP ACK to the receiving node 630. The access point 620 may further moderate data transmission rates and TCP ACK suppression based on a degree of buffer fullness.


In general, the access point 620 may not suppress TCP segments that comprise data in addition to an acknowledgment (ACK flag set). Furthermore, in some embodiments, the access point 620 may not suppress TCP segments comprising the three-part “handshake” which initiates a TCP connection (a first TCP segment with only the synchronize (SYN) flag set, followed by a second reply TCP segment with both flags SYN and ACK set, and then a third TCP ACK confirming receipt of the SYN/ACK reply). TCP segments including certain TCP control flags, for example, the urgent pointer field (URG), the synchronize no more data (SYN FIN), and the reset connection (RST) flags are not suppressed in some embodiments. However, not all TCP implementations are the same and selected segments comprising these flags or data may be suppressed in some embodiments.


Although the present invention has been described with respect to the 802.11 wireless protocols, the principles of the invention also apply to generating an acknowledgment for a reliable higher layer protocol based on any lower layer protocol that supports reliable data transmission. Additionally, although the present invention has been described with respect to the TCP protocol, the invention also applies to any higher layer protocol that supports reliable data transmission.


For example, referring to again to FIG. 5, in one embodiment, the source 510 includes a Trivial File Transfer Protocol (TFTP) server. The TFTP protocol provides a reliable application layer protocol (i.e., the higher layer protocol) generally implemented on top of User Datagram Protocol (UDP). The receiving node 530 may request a file from the source 510 by communicating with the TFTP server. The source 510 sends the file by sending a UDP packet (in place of the TCP data 550) through the access point 520 and over the wireless link 540 to the receiving node 530. The receiving node 530, upon successful reception of the UDP packet over the wireless link 540, transmits the 802.11 ACK 560 to the access point 520.


The receiving node 530 does not send an ACK for the UDP packet because the UDP protocol does not provide reliable transmission through acknowledgments. However, the receiving node 530 may send a TFTP ACK according to the TFTP higher layer protocol. According to the principles of the invention, the receiving node 530 may suppress transmission of the TFTP ACK because the 802.11 ACK 560 was already sent. The access point 520 then may send a TFTP ACK (in place of the TCP ACK 570) to the source 510 to acknowledge reception of the file. Advantageously, the access point 520 may generate a higher layer protocol acknowledgment (e.g., the TFTP application layer ACK) based on the lower layer protocol acknowledgment (e.g., the 802.11 ACK 560).


In the foregoing specification, the present invention is described with reference to specific embodiments thereof, but those skilled in the art will recognize that the present invention is not limited thereto. Various features and aspects of the above-described present invention may be used individually or jointly. Further, the present invention can be utilized in any number of environments and applications beyond those described herein without departing from the broader spirit and scope of the specification. The specification and drawings are, accordingly, to be regarded as illustrative rather than restrictive. It will be recognized that the terms “comprising,” “including,” and “having,” as used herein, are specifically intended to be read as open-ended terms of art.

Claims
  • 1. A method for reliably transmitting data from a source to a destination in a wireless network, the method comprising: transmitting data from the source to the destination, the data transmitted according to a higher layer protocol that includes the transmission control protocol (TCP);receiving a first acknowledgment at the source, wherein the first acknowledgment is transmitted from an intermediate device between the source and the destination, wherein the first acknowledgment is transmitted according to a lower layer protocol that includes an 802.11 protocol, wherein the first acknowledgment includes an 802.11 acknowledgment (802.11 ACK); andsuppressing any further transmission of acknowledgements in the wireless network at the source from the intermediate device, wherein the suppression is based on a transmission of a second acknowledgement from the destination to the intermediate device, wherein the second acknowledgement is transmitted according to the higher layer protocol and includes a transmission control acknowledgement (TCP ACK), and wherein the transmission of data in the wireless network from the source to the destination nevertheless remains reliable and occurs without delay of additional acknowledgment transmissions to the source from the intermediate device as a result of the first acknowledgment being transmitted according to the lower layer protocol and the second acknowledgment being transmitted according to the higher layer protocol.
  • 2. The method of claim 1, wherein the intermediate device includes an access point for a wireless network.
  • 3. The method of claim 1, wherein suppressing the second acknowledgment is a result of not transmitting the second acknowledgment to the source.
  • 4. The method of claim 1, wherein the source of the data originates outside the wireless network.
  • 5. The method of claim 1, wherein the source of the data originates within the wireless network.
  • 6. The method of claim 1, wherein the destination of the data is outside the wireless network.
  • 7. The method of claim 1, wherein the destination of the data is within the wireless network.
  • 8. The method of claim 1, further comprising determining that the destination received the transmitted data from the source without error.
  • 9. The method of claim 1, further comprising receiving a proxy acknowledgement at the source from the intermediate device thereby instructing the source that additional data may be transmitted to the source.
  • 10. The method of claim 1, wherein the second acknowledgement between the intermediate device and the destination includes an exchange of operation-based information.
  • 11. The method of claim 1 further comprising broadcasting operation-based information of the intermediate device, wherein the broadcasted information can be received by the destination to adjust operation of the destination.
  • 12. The method of claim 1, wherein the second acknowledgement from the destination to the intermediate device includes information used by the intermediate device to determine that the destination supports acknowledgement suppression.
CROSS REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of U.S. Provisional Patent Application No. 60/625,331 entitled “Systems and Methods for Improved Data Throughput in Wireless Local Area Networks,” filed on Nov. 5, 2004, the subject matter of which are hereby incorporated by reference. This application is related to co-pending U.S. patent application Ser. No. 11/010,076 entitled “System and Method for an Omnidirectional Planar Antenna Apparatus with Selectable Elements,” filed on Dec. 9, 2004, U.S. patent application Ser. No. 11/022,080 entitled “Circuit Board Having a Peripheral Antenna Apparatus with Selectable Antenna Elements,” filed on Dec. 23, 2004, and U.S. patent application Ser. No. 11/041,145 entitled “System and Method for a Minimized Antenna Apparatus with Selectable Elements,” filed on Jan. 21, 2005, the subject matter of which are hereby incorporated by reference.

US Referenced Citations (311)
Number Name Date Kind
1653664 Kirkup Dec 1927 A
4176356 Foster et al. Nov 1979 A
4193077 Greenberg et al. Mar 1980 A
4253193 Kennard Feb 1981 A
4305052 Baril et al. Dec 1981 A
4513412 Cox Apr 1985 A
4814777 Monser Mar 1989 A
5097484 Akaiwa Mar 1992 A
5117430 Berglund May 1992 A
5173711 Takeuchi et al. Dec 1992 A
5203010 Felix Apr 1993 A
5220340 Shafai Jun 1993 A
5220678 Feei Jun 1993 A
5361256 Doeringer Nov 1994 A
5373548 McCarthy Dec 1994 A
5408465 Gusella et al. Apr 1995 A
5507035 Bantz Apr 1996 A
5559800 Mousseau et al. Sep 1996 A
5570366 Baker Oct 1996 A
5608726 Virgile Mar 1997 A
5636213 Eastmond et al. Jun 1997 A
5754145 Evans May 1998 A
5767809 Chuang et al. Jun 1998 A
5802312 Lazaridis et al. Sep 1998 A
5867109 Wiedeman Feb 1999 A
5930259 Katsube Jul 1999 A
5940771 Gollnick et al. Aug 1999 A
5960344 Mahany Sep 1999 A
5964830 Durrett Oct 1999 A
5970410 Carney et al. Oct 1999 A
5974034 Chin et al. Oct 1999 A
6018659 Ayyagari et al. Jan 2000 A
6034638 Thiel et al. Mar 2000 A
6044062 Brownrigg et al. Mar 2000 A
6088570 Komara et al. Jul 2000 A
6094177 Yamamoto Jul 2000 A
6132306 Trompower Oct 2000 A
6181697 Nurenberg Jan 2001 B1
6249516 Brownrigg et al. Jun 2001 B1
6266528 Farzaneh Jul 2001 B1
6266537 Kashitani et al. Jul 2001 B1
6292153 Aiello et al. Sep 2001 B1
6307524 Britain Oct 2001 B1
6317599 Rappaport et al. Nov 2001 B1
6326922 Hegendoerfer Dec 2001 B1
6337628 Campana, Jr. Jan 2002 B2
6337668 Ito et al. Jan 2002 B1
6339404 Johnson et al. Jan 2002 B1
6345043 Hsu Feb 2002 B1
6356242 Ploussios Mar 2002 B1
6356243 Schneider et al. Mar 2002 B1
6356553 Nagami et al. Mar 2002 B1
6356905 Gershman et al. Mar 2002 B1
6377227 Zhu et al. Apr 2002 B1
6392610 Braun et al. May 2002 B1
6393261 Lewis May 2002 B1
6404386 Proctor, Jr. et al. Jun 2002 B1
6404775 Leslie et al. Jun 2002 B1
6407719 Ohira et al. Jun 2002 B1
6414955 Clare et al. Jul 2002 B1
6418138 Cerf et al. Jul 2002 B1
6442507 Skidmore et al. Aug 2002 B1
6445688 Garces et al. Sep 2002 B1
6493679 Rappaport et al. Dec 2002 B1
6498589 Horii Dec 2002 B1
6499006 Rappaport et al. Dec 2002 B1
6505253 Chiu Jan 2003 B1
6507321 Oberschmidt et al. Jan 2003 B2
6570883 Wong May 2003 B1
6584080 Ganz et al. Jun 2003 B1
6625454 Rappaport et al. Sep 2003 B1
6674459 Ben-Shachar et al. Jan 2004 B2
6701522 Rubin et al. Mar 2004 B1
6704301 Chari et al. Mar 2004 B2
6714551 Le-Ngoc Mar 2004 B1
6725281 Zintel et al. Apr 2004 B1
6728514 Bandeira et al. Apr 2004 B2
6753814 Killen et al. Jun 2004 B2
6762723 Nallo et al. Jul 2004 B2
6778517 Lou et al. Aug 2004 B1
6779004 Zintel Aug 2004 B1
6819287 Sullivan et al. Nov 2004 B2
6836481 Hotta Dec 2004 B1
6873627 Miller Mar 2005 B1
6876280 Nakano Apr 2005 B2
6888504 Chiang et al. May 2005 B2
6888893 Li et al. May 2005 B2
6892230 Gu et al. May 2005 B1
6906678 Chen Jun 2005 B2
6910068 Zintel et al. Jun 2005 B2
6924768 Wu et al. Aug 2005 B2
6931429 Gouge et al. Aug 2005 B2
6941143 Mathur Sep 2005 B2
6950019 Bellone et al. Sep 2005 B2
6957042 Williams Oct 2005 B2
6957277 Yagyu et al. Oct 2005 B2
6961028 Joy et al. Nov 2005 B2
6973622 Rappaport et al. Dec 2005 B1
6975834 Forster Dec 2005 B1
6996086 Wolfe et al. Feb 2006 B2
7034770 Yang et al. Apr 2006 B2
7043277 Pfister May 2006 B1
7050809 Lim May 2006 B2
7053853 Merenda et al. May 2006 B2
7064717 Kaluzni et al. Jun 2006 B2
7076274 Jollota et al. Jul 2006 B2
7085814 Gandhi et al. Aug 2006 B1
7089307 Zintel et al. Aug 2006 B2
7113519 Hammel et al. Sep 2006 B2
7130895 Zintel et al. Oct 2006 B2
7136655 Skafidas et al. Nov 2006 B2
7149197 Garahi et al. Dec 2006 B2
7157757 Parekh et al. Jan 2007 B2
7161934 Buchsbaum Jan 2007 B2
7164667 Rayment et al. Jan 2007 B2
7171223 Herscovich et al. Jan 2007 B2
7171475 Weisman et al. Jan 2007 B2
7187925 Abhishek Mar 2007 B2
7203508 Ohkubo et al. Apr 2007 B2
7269174 Olson et al. Sep 2007 B2
7283494 Hammel et al. Oct 2007 B2
7289505 Sanchez Oct 2007 B2
7292617 Beasley et al. Nov 2007 B2
7321571 Schnack et al. Jan 2008 B2
7336642 Rich et al. Feb 2008 B2
7355997 Qian Apr 2008 B2
7362737 Behroozi Apr 2008 B2
7369510 Wong May 2008 B1
7489932 Chari et al. Feb 2009 B2
7496680 Canright Feb 2009 B2
7505426 Srikrishna et al. Mar 2009 B2
7505447 Kish et al. Mar 2009 B2
7515589 Bacher et al. Apr 2009 B2
7522731 Kiemba et al. Apr 2009 B2
7546126 Beasley et al. Jun 2009 B2
7551562 Srikrishna et al. Jun 2009 B2
7586879 Chari et al. Sep 2009 B2
7672274 Bims Mar 2010 B2
7697504 Chari et al. Apr 2010 B2
7715395 Ginchereau et al. May 2010 B2
7733833 Kalika et al. Jun 2010 B2
7787436 Kish et al. Aug 2010 B2
7853829 Younger et al. Dec 2010 B2
7916684 Henderson et al. Mar 2011 B2
7974223 Zelig et al. Jul 2011 B2
8089869 Kisela et al. Jan 2012 B2
8089949 Kish Jan 2012 B2
8125975 Kish et al. Feb 2012 B2
8355343 Kish et al. Jan 2013 B2
8547899 Kish Oct 2013 B2
8619662 Kish Dec 2013 B2
8634402 Kish Jan 2014 B2
8638708 Kish Jan 2014 B2
8688834 Fujimoto et al. Apr 2014 B2
8780760 Kish Jul 2014 B2
8824357 Kish et al. Sep 2014 B2
9019886 Kish Apr 2015 B2
9066152 Kish Jun 2015 B2
9071942 Kish Jun 2015 B2
20010047474 Takagi et al. Nov 2001 A1
20010055312 Negus Dec 2001 A1
20020001310 Mai Jan 2002 A1
20020031130 Tsuchiya et al. Mar 2002 A1
20020036996 Ozluturk et al. Mar 2002 A1
20020045435 Fantaske Apr 2002 A1
20020047800 Proctor, Jr. et al. Apr 2002 A1
20020080767 Lee Jun 2002 A1
20020084942 Tsai et al. Jul 2002 A1
20020105471 Kojima et al. Aug 2002 A1
20020112058 Weisman et al. Aug 2002 A1
20020114330 Cheung et al. Aug 2002 A1
20020143951 Khan Oct 2002 A1
20020158798 Chiang et al. Oct 2002 A1
20020158801 Crilly, Jr. et al. Oct 2002 A1
20020164963 Tehrani et al. Nov 2002 A1
20020170064 Monroe et al. Nov 2002 A1
20020194367 Nakamura et al. Dec 2002 A1
20030003917 Copley et al. Jan 2003 A1
20030026240 Eyuboglu et al. Feb 2003 A1
20030026268 Nava Feb 2003 A1
20030030588 Kalis et al. Feb 2003 A1
20030043786 Kall Mar 2003 A1
20030063591 Leung et al. Apr 2003 A1
20030122714 Wannagot et al. Jul 2003 A1
20030133458 Sato et al. Jul 2003 A1
20030169330 Ben-Shachar et al. Sep 2003 A1
20030184490 Raiman et al. Oct 2003 A1
20030189514 Miyano et al. Oct 2003 A1
20030189521 Yamamoto et al. Oct 2003 A1
20030189523 Ojantakanen et al. Oct 2003 A1
20030210207 Suh et al. Nov 2003 A1
20030227414 Saliga et al. Dec 2003 A1
20030228857 Maeki Dec 2003 A1
20030231593 Bauman et al. Dec 2003 A1
20040008663 Srikrishna Jan 2004 A1
20040014432 Boyle Jan 2004 A1
20040017310 Runkle et al. Jan 2004 A1
20040017860 Liu Jan 2004 A1
20040027291 Zhang et al. Feb 2004 A1
20040027304 Chiang et al. Feb 2004 A1
20040028006 Kayama Feb 2004 A1
20040032378 Volman et al. Feb 2004 A1
20040036651 Toda Feb 2004 A1
20040036654 Hsieh Feb 2004 A1
20040041732 Aikawa et al. Mar 2004 A1
20040048593 Sano Mar 2004 A1
20040058690 Ratzel et al. Mar 2004 A1
20040061653 Webb et al. Apr 2004 A1
20040070543 Masaki Apr 2004 A1
20040080455 Lee Apr 2004 A1
20040085993 Wentink May 2004 A1
20040095278 Kanemoto et al. May 2004 A1
20040114535 Hoffmann et al. Jun 2004 A1
20040125777 Doyle et al. Jul 2004 A1
20040190477 Olson Sep 2004 A1
20040260800 Gu et al. Dec 2004 A1
20040264463 Fukushima Dec 2004 A1
20050002395 Kondo Jan 2005 A1
20050009523 Pekonen Jan 2005 A1
20050022210 Zintel et al. Jan 2005 A1
20050032531 Gong et al. Feb 2005 A1
20050041739 Li et al. Feb 2005 A1
20050042988 Hoek et al. Feb 2005 A1
20050074018 Zintel et al. Apr 2005 A1
20050074019 Handforth et al. Apr 2005 A1
20050097503 Zintel et al. May 2005 A1
20050135480 Li et al. Jun 2005 A1
20050138137 Encarnacion et al. Jun 2005 A1
20050138193 Encarnacion et al. Jun 2005 A1
20050153720 White et al. Jul 2005 A1
20050180381 Retzer et al. Aug 2005 A1
20050185666 Raya et al. Aug 2005 A1
20050188193 Kuehnel et al. Aug 2005 A1
20050226239 Nishida et al. Oct 2005 A1
20050232179 Da Costa et al. Oct 2005 A1
20050240665 Gu et al. Oct 2005 A1
20050250544 Grant et al. Nov 2005 A1
20050267935 Gandhi et al. Dec 2005 A1
20050271070 Mikami et al. Dec 2005 A1
20060018335 Koch Jan 2006 A1
20060045089 Bacher et al. Mar 2006 A1
20060094371 Nguyen May 2006 A1
20060098605 Li May 2006 A1
20060098607 Zeng et al. May 2006 A1
20060098613 Kish et al. May 2006 A1
20060114881 Chari Jun 2006 A1
20060123124 Weisman et al. Jun 2006 A1
20060123125 Weisman et al. Jun 2006 A1
20060123455 Pai et al. Jun 2006 A1
20060133341 Chari et al. Jun 2006 A1
20060165029 Melpignano et al. Jul 2006 A1
20060168159 Weisman et al. Jul 2006 A1
20060184660 Rao et al. Aug 2006 A1
20060184661 Weisman et al. Aug 2006 A1
20060184693 Rao et al. Aug 2006 A1
20060224690 Falkenburg et al. Oct 2006 A1
20060225107 Seetharaman et al. Oct 2006 A1
20060227761 Scott, III et al. Oct 2006 A1
20060239369 Lee Oct 2006 A1
20060268881 Moreton Nov 2006 A1
20060280131 Rahman et al. Dec 2006 A1
20060291434 Gu et al. Dec 2006 A1
20070002750 Sang Jan 2007 A1
20070010271 Roy Jan 2007 A1
20070027622 Cleron et al. Feb 2007 A1
20070030811 Frei et al. Feb 2007 A1
20070072612 Haraguchi et al. Mar 2007 A1
20070101020 Lin et al. May 2007 A1
20070109961 Liang May 2007 A1
20070135167 Liu Jun 2007 A1
20070189283 Agarwal et al. Aug 2007 A1
20070223451 Ren et al. Sep 2007 A1
20070242602 Pang et al. Oct 2007 A1
20070280168 Shibata Dec 2007 A1
20080043638 Ribiere Feb 2008 A1
20080069068 Dean et al. Mar 2008 A1
20080137681 Kish et al. Jun 2008 A1
20080137682 Kish et al. Jun 2008 A1
20080159207 Levine et al. Jul 2008 A1
20080225804 Thubert Sep 2008 A1
20080247317 Weil et al. Oct 2008 A1
20080247327 Weil et al. Oct 2008 A1
20080267116 Kang et al. Oct 2008 A1
20090019314 Younger et al. Jan 2009 A1
20090028095 Kish et al. Jan 2009 A1
20090040989 Da Costa et al. Feb 2009 A1
20090067369 Stamoulis Mar 2009 A1
20090073921 Ji et al. Mar 2009 A1
20090080333 Ozer et al. Mar 2009 A1
20090154359 Strutt et al. Jun 2009 A1
20090180396 Kish et al. Jul 2009 A1
20090207730 Stamoulis et al. Aug 2009 A1
20090213730 Zeng et al. Aug 2009 A1
20090225676 Kisela et al. Sep 2009 A1
20090262677 Banerjea et al. Oct 2009 A1
20100040056 Kobayashi Feb 2010 A1
20100085916 Yu et al. Apr 2010 A1
20100182944 Kish et al. Jul 2010 A1
20110096712 Kish et al. Apr 2011 A1
20110119360 Kish May 2011 A1
20110119401 Kish May 2011 A1
20110158233 Namgung Jun 2011 A1
20110216685 Kish et al. Sep 2011 A1
20120063379 Kish et al. Mar 2012 A1
20130010775 Kish et al. Jan 2013 A1
20130194969 Kish et al. Aug 2013 A1
20140016563 Kish Jan 2014 A1
20140071879 Kish Mar 2014 A1
20140133385 Kish May 2014 A1
20140175117 Kish Jun 2014 A1
20150312727 Kish Oct 2015 A1
Foreign Referenced Citations (26)
Number Date Country
1 965 598 May 2007 CN
102763378 Oct 2012 CN
0352787 Jul 1989 EP
0 534 612 Mar 1993 EP
1 315 311 May 2003 EP
1 450 521 Aug 2004 EP
1 608 108 Dec 2005 EP
1 653 664 May 2006 EP
2 350 863 Aug 2015 EP
2306278 Apr 1997 GB
3038933 Jul 1989 JP
2008088633 Feb 1996 JP
2001057560 Feb 2002 JP
2005354249 Dec 2005 JP
2006060408 Mar 2006 JP
31159 Oct 2012 VN
WO 0225967 Mar 2002 WO
WO0249360 Jun 2002 WO
WO 03079484 Sep 2003 WO
WO 2004057817 Jul 2004 WO
WO 2005008938 Jan 2005 WO
WO 2006052639 May 2006 WO
WO 2007016326 Feb 2007 WO
WO 2009088488 Jul 2009 WO
WO 2011060454 May 2011 WO
WO 2012061531 May 2012 WO
Non-Patent Literature Citations (86)
Entry
Ken Tang, et al., “MAC Layer Broadcast Support in 802.11 Wireless Networks,” Computer Science Department, University of California, Los Angeles, 2000 IEEE, pp. 544-548.
Ken Tang, et al., “MAC Reliable Broadcast in Ad Hoc Networks,” Computer Science. Department, University of California, Los Angeles, 2001 IEEE, pp. 1008-1013.
Vincent D. Park, et al., “A Performance Comparison of the Temporally-Ordered Routing Algorithm and Ideal Link-State Routing,” IEEE, Jul. 1998, pp. 592-598.
Ian F. Akyildiz, et al., “A Virtual Topology Based Routing Protocol for Multihop Dynamic Wireless Networks,” Broadband and Wireless Networking Lab, School of Electrical and Computer Engineering, Georgia Institute of Technology.
Dell Inc., “How Much Broadcast and Multicast Traffic Should I Allow in My Network,” PowerConnect Application Note #5, Nov. 2003.
Toskala, Antti, “Enhancement of Broadcast and Introduction of Multicast Capabilities in RAN,” Nokia Networks, Palm Springs, California, Mar. 13-16, 2001.
Microsoft Corporation, “IEEE 802.11 Networks and Windows XP,” Windows Hardware Developer Central, Dec. 4, 2001.
Festag, Andreas, “What is MOMBASA?” Telecommunication Networks Group (TKN), Technical University of Berlin, Mar. 7, 2002.
Hewlett Packard, “HP ProCurve Networking: Enterprise Wireless LAN Networking and Mobility Solutions,” 2003.
Dutta, Ashutosh et al., “MarconiNet Supporting Streaming Media Over Localized Wireless Multicast,” Proc. of the 2d Int'l Workshop on Mobile Commerce, 2002.
Dunkels, Adam et al., “Making TCP/IP Viable for Wireless Sensor Networks,” Proc. of the 1st Euro. Workshop on Wireless Sensor Networks, Berlin, Jan. 2004.
Dunkels, Adam et al., “Connecting Wireless Sensornets with TCP/IP Networks,” Proc. of the 2d Int'l Conf. on Wired Networks, Frankfurt, Feb. 2004.
Cisco Systems, “Cisco Aironet Access Point Software Configuration Guide: Configuring Filters and Quality of Service,” Aug. 2003.
Hirayama, Koji et al., “Next-Generation Mobile-Access IP Network,”Hitachi Review vol. 49, No. 4, 2000.
Pat Calhoun et al., “802.11r strengthens wireless voice,” Technology Update, Network World, Aug. 22, 2005, http://www.networkworld.com/news/tech/2005/082208techupdate.html.
Areg Alimian et al., “Analysis of Roaming Techniques,” doc.:IEEE 802.11-04/0377r1, Submission, Mar. 2004.
Information Society Technologies Ultrawaves, “System Concept / Architecture Design and Communication Stack Requirement Document,” Feb. 23, 2004.
Golmie, Nada, “Coexistence in Wireless Networks: Challenges and System-Level Solutions in the Unlicensed Bands,” Cambridge University Press, 2006.
Mawa, Rakesh, “Power Control in 3G Systems,” Hughes Systique Corporation, Jun. 28, 2006.
Wennstrom, Mattias et al., “Transmit Antenna Diversity in Ricean Fading MIMO Channels with Co-Channel Interference,” 2001.
Steger, Christopher et al., “Performance of IEEE 802.11b Wireless LAN in an Emulated Mobile Channel,” 2003.
Chang, Nicholas B. et al., “Optimal Channel Probing and Transmission Scheduling for Opportunistics Spectrum Access,” Sep. 2007.
Tsunekawa, Kouichi, “Diversity Antennas for Portable Telephones”, 39th IEEE Vehicular Technology Conference, pp. 50-56, vol. 1, Gateway to New Concepts in Vehicular Technology, May 1-3, 1989, San Francisco, CA.
Hirayama et al., Next-Generation Mobil-Access IP Network, Hitachi Review, vol. 49 (2000), No. 4, pp. 176-179.
Hjalmtysson et al., Overcoming Last-Hop/First-Hop Problems in IP Multicast, Reykjavik University, Dept. of Computer Science, Ofanleiti 2, 103 Reykjavik, Iceland, (The Icelandic Centre for Research under grant No. 020500002.).
Visoottiviseth et al., Sender-Initiated Multicast Forwarding Scheme, Telecommunications, 2003, ICT 2003 10th International Conference, pp. 334-339, downloaded on Mar. 26, 2009 from IEEE Xplore, 0-7803-7661 (c) 2003 IEEE.
Tang et al., Mac Reliable Broadcast in Ad Hoc Networks, Computer Science Dept., University of California, Los Angeles, pp. 1008-1013, 0-7803-7225 (c) 2001 IEEE.
EP Application No. 10813061.8. Supplementary European Search Report dated Jul. 23, 2012.
U.S. Appl. No. 13/736,017 Office Action mailed Nov. 21, 2013.
CN Application No. 20058001629.7, Office Action dated Feb. 21, 2012.
U.S. Appl. No. 11/985,865, Office Action mailed Dec. 20, 2010.
U.S. Appl. No. 12/008,715, Office Action mailed Sep. 2, 2011.
U.S. Appl. No. 12/181,274, Office Action mailed Nov. 15, 2012.
U.S. Appl. No. 12/181,274, Office Action mailed Jun. 10, 2011.
U.S. Appl. No. 12/938,316, Office Action mailed Nov. 20, 2012.
U.S. Appl. No. 12/947,800, Office Action mailed Sep. 26, 2012.
Akyildiz et al., “Wireless mesh networks: a survey,” Computer Networks, 2005.
Cato et al., “Method for Easier, Better, and Faster Site Surveys for Wireless Networks,” IBM Technical Disclosure Bulletin, vol. 40, No. 1, 1997.
Chawla, “Design of a Wireless Backhaul Network for Microcells,” 1999.
Fair queuing, http://en.wikipedia.org/wiki/fair—queuing. Aug. 11, 2008.
Gillham, Burce et al. JUNOSe Internet Software for E-Series Routing Platforms Policy and QoS Confirguaration Guide, Release 7.0x, Sep. 7, 2005.
Johansson et al., “Relaying Access Points and Related Business Models for Low Cost Mobile Systems,” 2004.
Weighted Fair Queuing, http://en.wikipedia.org/wiki/Weighted—fair—queuing.
Weighted Round Robin, http:en.wikipedia.org/wiki/Weighted—round—robin.
Yanikomeroglu, “Cellular Multihop Communications: Infrastructure—Based Relay Network Architecture for 4G Wireless Systems,” 2004.
PCT Search Report and Written Opinion for PCT/US08/014148 mailed Mar. 30, 2009.
PCT Search Report and Written Opinion for PCT/US11/059019 mailed Feb. 21, 2012.
PCT Search Report and Written Opinion for PCT/US05/039760 mailed Sep. 14, 2006.
PCT Search Report and Written Opinion for PCT/US10/56908 mailed May 3, 2011.
EP Application No. 10813061.8. Supplementary European Search Report dated Oct. 13, 2011.
TW Application No. 094138837, Office Action dated Apr. 25, 2013.
TW Application No. 094138837, Office Action dated Nov. 28, 2011.
U.S. Appl. No. 11/232,196, Office Action mailed May 15, 2008.
U.S. Appl. No. 11/232,196, Final Office Action mailed Dec. 26, 2007.
U.S. Appl. No. 11/232,196, Office Action mailed Apr. 5, 2007.
U.S. Appl. No. 11/267,477, Final Office Action mailed Oct. 6, 2010.
U.S. Appl. No. 11/267,477, Office Action mailed Jun. 16, 2010.
U.S. Appl. No. 11/267,477, Final Office Action mailed Jun. 10, 2009.
U.S. Appl. No. 11/267,477, Office Action mailed Sep. 25, 2008.
U.S. Appl. No. 11/985,866, Office Action mailed Dec. 16, 2009.
U.S. Appl. No. 11/985,866, Office Action mailed May 29, 2009.
U.S. Appl. No. 12/008,715, Final Office Action mailed Nov. 23, 2010.
U.S. Appl. No. 12/008,715, Office Action mailed Jun. 7, 2010.
U.S. Appl. No. 12/008,715, Office Action mailed Oct. 16, 2009.
U.S. Appl. No. 12/181,274, Final Office Action mailed Jun. 19, 2013.
U.S. Appl. No. 12/181,274, Final Office Action mailed Jan. 18, 2012.
U.S. Appl. No. 12/947,800, Final Office Action mailed Jul. 17, 2013.
U.S. Appl. No. 12/947,803, Final Office Action mailed Jul. 17, 2012.
U.S. Appl. No. 12/947,803, Office Action mailed Aug. 27, 2012.
Cato et aL, “Method for Easier, Better, and Faster Site Surveys for Wireless Networks,” IBM Technical Disclosure Bulletin, vol. 40, No. 1, 1997.
Fair queuing, http://en.wikipedia.org/wiki/fair—queuing.
Gillham, Burce et al. JUNOSe Internet Software for E-Series Routing Platforms Policy and QoS Confirguaration Guide, Release 7.0x.
Johansson et aL, “Relaying Access Points and Related Business Models for Low Cost Mobile Systems,” 2004.
PCT Search Report and Written Opinion for PCT/US05/039760 mailed May 3, 2011.
Chinese Application No. 201080002467.X, Second Office Action dated Jan. 26, 2015.
U.S. Appl. No. 14/160,402 Office Action mailed Oct. 22, 2014.
U.S. Appl. No. 14/080,488, Office Action mailed Oct. 21, 2014.
U.S. Appl. No. 14/028,323, Office Action mailed Oct. 14, 2014.
Chinese Application No. 20058001629.7, Office Action dated Jan. 21, 2014.
Chinese Application No. 201080002467.X, Office Action dated Jul. 3, 2014.
Chinese Application No. 20058001629.7, Office Action dated Aug. 6, 2014.
U.S. Appl. No. 14/106,514, Office Action mailed Sep. 22, 2014.
U.S. Appl. No. 14/028,323, Final Office Action mailed Jun. 12, 2015.
Taiwan Application No. 103106913, Office Action dated May 28, 2015.
U.S. Appl. No. 12/947,800, Office Action mailed Mar. 19. 2015.
U.S. Appl. No. 12/947,803, Office Action mailed Mar. 12, 2015.
Related Publications (1)
Number Date Country
20060098616 A1 May 2006 US
Provisional Applications (1)
Number Date Country
60625331 Nov 2004 US