This present disclosure relates to network protocols, and more particularly to medium access control layers that encapsulate data from a plurality of received data units.
Networking protocols are normally developed in layers, with each layer responsible for a different facet for the communication. Layers exchange structured information. Each layer receives Service Data Units (SDUs) from higher layers, which are processed to generate Protocol Data Units (PDUs). Protocol Data Units are handed over to the lower layers for service. Similarly, the PDUs received from the lower layers are processed to generate SDUs, which are handed over to the higher layers. PDUs not only carry the SDUs but also carry management information that is relevant for managing the layer functionality. Defining the structure of SDUs and PDUs for a given protocol layer is critical to enable proper layer functionality. Some examples of network protocol layers include the well-known Transmission Control Protocol (TCP) and Internet Protocol (IP). The structure of TCP data units has provisions to enable end-to-end delivery. The structure of IP data units enables efficient routing.
Networks use medium access control layer (MAC) to enable coordinated access to the medium. Medium access layer uses the functionality of the physical layer (PHY) to provide services to the higher layer. MAC service to the higher layers can include guarantees on Quality of Service (QoS). QoS provides guarantees on bandwidth, latency, jitter and packet loss probability for traffic streams. Jitter refers to deviation in the time of delivery of data over the network.
In general, the present disclosure features a method of operating in a network in which a plurality of stations communicate over a shared medium, comprising providing a physical layer (e.g., PHY) for handling physical communication over the shared medium; providing a high level layer (e.g., PAL) that receives data from the station and supplies high level data units (e.g., MSDUs) for transmission over the medium; providing a MAC layer that receives the high level data units from the high level layer and supplies low level data units (e.g., MPDUs) to the physical layer; at the MAC layer, encapsulating content from a plurality of the high level data units; dividing the encapsulated content into a plurality of pieces (e.g., segments) with each piece capable of being independently retransmitted; and supplying low level data units containing one or more of the plurality of pieces.
Preferred implementations of the present disclosure may include one or more of the following. At least some information common to the encapsulated high level data units may not be repeated for each high level data unit encapsulated in a low level data unit. The information common to the encapsulated high level data units may comprise destination and source addresses. The high level data units may each comprise a payload, and encapsulating may comprise forming a queue comprising the payloads from a succession of high level data. The queue may comprise a succession of sub-frames, each sub-frame comprising a header and a plurality of payloads. Each sub-frame may be divided into the plurality of pieces capable of being independently retransmitted. Division of a sub-frame into the plurality of pieces may comprise dividing the sub-frame into a plurality of sub-blocks, and forming at least some pieces from a plurality of sub-blocks. Each piece may constitute a segment that is transmitted as a physical layer block. The present disclosure may further comprise parity pieces derived from other pieces and capable of being used at a destination to recover one or more lost pieces at the destination without having to retransmit the lost pieces. Each piece may be transmitted as a physical layer block, and the parity pieces may also be transmitted as parity physical layer blocks. The physical layer blocks may be encoded using forward error correction. Some of the pieces making up a low level data unit may constitute retransmitted pieces that failed to be correctly transmitted in an earlier attempt. At least some retransmitted pieces may be transmitted with greater forward error correction. Each sub-frame may further comprise a delivery time stamp associated with at least some payloads. Clock information characterizing the time setting of a clock in a transmitting station may be transmitted to a receiving station within a header of the low level data units, and the clock information may be used by the receiving station along with the delivery time stamps to establish the time at which payloads are delivered. The time at which a payload is delivered may be set to be substantially the time specified by the time stamp. The present disclosure may further comprise an integrity check value associated with each sub-frame or with a plurality of sub-frames. Each of the plurality of payloads in a sub-frame may have identical length. Each sub-frame may further comprise MAC management information. The MAC layer may have the capability of transmitting data in a plurality of sessions within a regularly-repeated contention free interval, wherein a station to which data is transmitted may be identified by a destination address and a station from which data is transmitted may be identified by a source address, and wherein the queue may contain payloads for the same session, same source address, and same destination address. The MAC layer may have the capability of transmitting data in a plurality of sessions within a regularly-repeated contention free interval, wherein a station to which data is transmitted may be identified by a destination address and a station from which data is transmitted may be identified by a source address, and wherein the queue may contain sub-frames for the same session, same source address, and same destination address. The sessions may be transmitted in a substantially contention-free manner. The sessions may be transmitted within time slots of a regularly-repeated contention-free interval. A stream identifier (e.g., MSID) may be used to associate content of a queue with a particular session. The stream identifier may also be used to associate content of a queue with a priority level for contention-based transmission over the medium. There may be a plurality of queues, each containing payloads having a unique combination of stream identifier, source address, and destination address. Each queue may contain a payload having a unique combination of stream identifier, source address, destination address, and type of high level layer. The queue may be divided into a plurality of sub-blocks, wherein a plurality of sub-blocks may be grouped to form a segment, with a segment crossing sub-frame boundaries in the queue, wherein a segment may constitute one of the pieces. Each sub-block may be shorter than a sub-frame. At least some segments may contain a number of sub-blocks corresponding to other than an integral number of sub-frames. The sub-blocks may be of equal length. The sub-blocks may have an associated sequential numbering adapted for use at the receiving station for re-establishing the correct sequential order of the sub-blocks. The sub-blocks may have a predetermined size, which combined with the associated sequential numbering, may eliminate the need for buffer reordering when out of order segments are received. The sub-blocks may be of equal size. The present disclosure may further comprise, for at least some of the low level data units, forming the low level data unit from a plurality of segments. Each segment in the low level data unit may form the body of a separate block transmitted by the physical layer. Individual segments may be individually encrypted. Encryption information common to a plurality of segments may be carried in a header. Some encryption information may be carried in a header and frame control of the low level data unit and in a header of the block. Some encryption information may be carried in frame control of the low level data unit and in a header of the block. Each block may separately undergo forward error correction, and forward error correction bits for each block may be transmitted in the low level data unit. The level of forward error correction used may be different for different blocks. The level of forward error correction used may provide greater error correction capability for selected blocks that are being retransmitted after failing to be correctly transmitted in an earlier attempt. Most of the blocks may be identical in length. The initial and final block of a low level data unit may be of a different length than the remaining blocks. Information common to the plurality of segments forming the low level data unit may be transmitted in a header for the low level data unit. The information common to the plurality of segments may be transmitted only in the header. The low level data unit may further comprise a frame control field.
In another aspect, the present disclosure features a method of operating in a network in which a plurality of stations communicate over a shared medium, comprising providing a physical layer (e.g., PHY) for handling physical communication over the shared medium; providing a high level layer (e.g., PAL) that receives data from the station and supplies high level data units (e.g., MSDUs) for transmission over the medium; providing a MAC layer that receives the high level data units from the high level layer and supplies low level data units (e.g., MPDUs) to the physical layer; at the MAC layer, forming low level data units by encapsulating content from a plurality of the high level data units; and adaptively escalating the robustness of transmission of the low level data units depending on the frequency of transmission errors.
Preferred implementations of the present disclosure may include one or more of the following. The present disclosure may further comprise incorporating forward-error correction information into the transmitted stream of low level data units, and the step of adaptively escalating may comprise adaptively varying the forward-error correction information depending on the frequency of transmission errors. Varying the forward-error correction information may comprise varying one or both of the amount and type of forward-error correction information. Decisions on adaptively escalating may be made at a transmitting station. The low level data units may comprise a plurality of pieces (e.g., segments). The forward error correction information may comprise information associated with provided with the pieces for use at a destination for recovering a piece that is received with errors. The forward error correction information may comprise parity pieces derived from other pieces and capable of being used at a destination to recover one or more lost pieces at the destination without having to retransmit the lost pieces. Each piece may be transmitted as a physical layer block, and the parity pieces may also be transmitted as parity physical layer blocks.
These and other embodiments may have one or more of the following advantages.
The present disclosure provides mechanisms to generate MAC protocol data units (MPDU) from the MAC Service data units (MSDU) in such a manner that enables efficient end-to-end delivery of packets. These mechanisms provide support to enhance Quality of Service (QoS) support and efficient delivery of management information. The format of the MPDU enables efficient retransmission of corrupted data and seamless integration with the underlying physical layer.
Multiple higher layers of the networking protocols can be seamlessly interfaced with the MAC.
The MAC layer provides various Classes of service for application payloads. At the MAC layer, each Class encompasses a coherent set of Quality of Service (QoS) guarantees and can be translated naturally to such behavior in the MAC as channel access, number of retries, etc. This enables scalability and improved QoS guarantees. Supports both connection based and connection less service.
Mechanisms are provided to exchange MAC Management information between MAC layer and higher layers in a manner that would simplify implementation. Several types of MAC Management entities can be defined.
Processing on the MSDUs reduces redundant information while maintaining functionality.
Transmission of management information is enabled in an in-band manner along with application data.
Transmission of urgent MAC management information is enabled in an out-of band manner.
Efficient encryption of information is enabled to provide data privacy.
Testing of end-to-end delivery of MSDUs is enabled by means of a Integrity check vector (ICV).
A segmentation process enables maximum possible MPDUs to generated, thus increasing the MPDU efficiency.
There is a mapping of MPDU on to FEC Blocks at the PHY and the choice of FEC Block sizes enable efficient retransmission.
A MPDU header carries information common to all PBs, thus increasing MPDU efficiency
Transmission of MPDUs is enabled with low end-to-end jitter.
Bridging and forwarding of MSDUs are supported.
PHY error detection and correction by means of ARQ process is enabled.
An ARQ process is augmented by an Escalation mechanism and an outer erasure code, which enables improved guarantees on QoS parameters.
There is a simplified reassembly process with duplicate rejection capability. These advantages are illustrated in the Detailed Description of the preferred embodiment that follows.
The details of one or more implementations of the present disclosure are set forth in the accompanying drawings and the description below. Other features, objects, and advantages of the present disclosure will be apparent from the description and drawings, and from the claims.
There are a great many possible implementations of the present disclosure, too many to describe herein. Some possible implementations that are presently preferred are described below. It cannot be emphasized too strongly, however, that these are descriptions of implementations of the present disclosure, and not descriptions of the present disclosure, which is not limited to the detailed implementations described in this section but is described in broader terms in the claims.
As shown in
H1i 58 denotes the ith Host Interface, with one interface for each protocol supported. The H1 interface 58 defines the point of demarcation for the ith Host Protocol Data Units (HiPDU) 68 and the ith Protocol Adaptation Layer Service Data Unit (PALi SDU) 69 to higher layers of the network architecture 50.
For each protocol supported, the corresponding Protocol Adaptation Layer (PAL) 52 may be implemented partially in host software and partially in firmware and/or hardware. Examples of architecture 50 support IEEE 802.3 and Isochronous Stream protocols as well as provide access to the proprietary protocols through interface 60. The PAL 52 provides support for Higher Layer Adaptation (HLA) functionality and/or Bridging functionality. Both HLA and Bridging operations support translation of host data packets including PAL Protocol Data Units (PALiPDU) 70 to MAC Service Data Units (MSDUs) 71 and vice versa, translation of host address from the H1 interface 58 to MAC 12, 14, 16 addresses. HLA and bridging operations also support determination of traffic classes and QoS parameters in addition to Establishment of streams in coordination with the MAC 12, 14, 16.
The PALs 52 also support address discovery and routing functions for bridging operations. Each PAL 52 provides binding and mapping from the stream identifiers provided by the MAC layer 54 at session setup time with the higher layer entities as necessary.
Each PAL 52 has an associated PAL Type (PLT) at the MAC layer 54, to enable routing of the associated MAC Service Data Units (MSDUs) 71 at the receiver MAC (e.g., 12, 14, 16). In addition, information about available overall channel bandwidth as well as available bandwidth for a specific class of traffic is provided by the MAC layer 54 to the PAL 52 to support rate adaptation.
The M1 interface 62 is common to all Protocol Adaptation Layers and defines the demarcation between the PAL 52 and the MAC layer 54, with PAL Protocol Data Units (PALiPDUs) 70 being passed down from the PAL 52 to the MAC layer 54 as MAC Service Data Units (MSDUs) 72 and vice versa.
The Medium Access Control (MAC) layer 54 processes MAC Service Data Units (MSDUs) 71 from the PAL 52 and generates PHY Service Data Units (PSDU) 73 for delivery to the Physical Layer 56. MAC layer 54 processing includes Service interface to PAL 52, Network Management, Admission Control, Encryption, Error Control (ARQ), Retransmission, Escalation, Channel Estimation - Modulations, FEC, etc., Tone Map as a function of time, Framing, Segmentation & Reassembly, Packet Encapsulation and De-encapsulation, Channel Access (Contention Free Bursting, managed sessions, CSMA/CA, etc.), Time Stamping, Synchronization—With Multimedia Clocks, and Contention Free Sessions.
The Physical Layer Signaling (PS) Interface 64 separates the MAC layer 54 and the PHY 56 with MAC Protocol Data Units (MPDUs) 72 being passed to the PHY 56 from the MAC layer 54 as PHY Service Data Units (PSDUs) 73 across the PS Interface 64 and vice versa.
The Physical Layer (PHY) 56 Protocol provides the following operations. Service interface to MAC layer 54, OFDM Modulation, Forward Error Correction Coding, Physical Carrier Sensing, Frame Control Decoding, Error detection, and information needed for channel estimation and tone map selection.
MSDUs 71 are received by the MAC (e.g., 12, 14, or 16) at the MAC layer 54 from higher layers of the network architecture 50. Details of the format of the MSDUs 71 are described in more detail below. MSDUs 71 arrive either by themselves or in association with a connection. One or more MSDUs 71 are processed by the MAC (e.g., 12, 14, or 16) to produce a Sub-Frame. The term Sub-Frame is used to refer to the data element composed of Sub-Frame Header, optional MAC Management Information, optional Delivery Time Stamp, the Payload from one or more MSDUs 71, and an optional Integrity Check Value (ICV). When a Sub-Frame is generated from multiple MSDUs 71, all MSDU 71 payloads have the same length and have identical SA 104, DA 102, MSID 118, and PLT 112. Grouping of MSDUs 71 into a Sub-Frame is done for efficiency when small fixed length MSDU 71 payloads (such as MPEG Transport Stream packets) are sent in the same stream. The format of the Sub-frame is described in more detail below. Sub-Frames are grouped into Sub-Frame streams. Each sub-frame stream is delivered independently by the MAC (e.g., 12, 14, or 16).
Each MAC 12, 14, 16 supports eight different Classes of services. Each Class encompasses a coherent set of Quality of Service (QoS) characteristics for an application and can be translated naturally to such behavior in the MAC (e.g., 12, 14, 16) as channel access, number of retries, etc. Classes 0 to 3 are used by non-connection oriented MSDUs while Classes 4 to 7 are used by connection oriented services. Each MSDU 71 and hence the corresponding sub-frame stream is associated with a Class. The Sub-Frame can also carry delivery time stamp, which enable support for jitter free delivery of the MSDU 71. Reliable end to end delivery of packets can be confirmed by means of integrity check sequence that can span on or more sub-frames.
Sub-Frames that belong to the same stream are partitioned into Segments and are transmitted as part of a MAC protocol Data Unit (MPDU) 72. Segment and MPDU 72 contents are described in detail below. Segments can be encrypted to provide data privacy. Details of encryption and decryption process are presented in more detail below. Each MPDU 72 contains Frame control information, MPDU header and one or more PHY Blocks (PBs). The Frame Control carries information that is relevant to all stations in the network and is broadcast. MPDU header carries information relevant to all PHY Blocks. The PHY Blocks carry Segments as their payload. Details of the MPDU header and PHY Block are described below. At the physical layer level, each PB is mapped onto a FEC Block except the first PB. The first FEC Block contains MPDU header and the first PB. This mapping of segments onto the FEC blocks at the PHY level enable efficient retransmission as errors at the physical layer occur on granularity of FEC blocks. PHY Blocks contains PB Header and PB integrity check sequence (PBCS). PBCS is used to test the integrity of PB. PB header is used along with the MPDU header for proper reassembly of segments and generation of Sub-Frames.
MPDUs 72 are acknowledged by a receiver layer (e.g., MAC 54) to indicate reception of MPDUs. Segments that cannot be delivered reliable can be retransmitted. Segments in an MPDU 72 can be transmitted in an escalated mode. Escalated Segments are transmitted by the PHY 56 using more robust encoding, thus enabling higher probability of error free delivery. More details on Escalation are provided below. There is interactive use of PHY level 56 escalation and MAC level 54 retransmissions to enable reliable end to end delivery of packets along with QoS enhancements.
MAC Service Data Unit (MSDU)
MAC Service Data Unit (MSDU) 71 is the information payload that the MAC layer 54 has been asked to transport by the higher layer of the network architecture. As shown in
The salient features of the MSDU format 100 include support for multiple higher layers of the network architecture to interface with the MAC layer 54. Each higher layer of the network architecture 50 is provided with a unique PAL Type 112, which is carried in each MSDU 71 that is generated by the higher layer of the network architecture 50. This enables proper routing of the MSDUs 71 at the receiving MAC layer 54.
The MSDU format 100 also includes support for identifying streams of MSDUs 71 that belong to the same session or require a specific Class of service. This is achieved by means of MAC Stream identifiers (MSID) 118. Sessions can be established by negotiation between the higher layer of the network architecture and the MAC 12. During this process, each session is provided with a unique MSID 118. MSDUs 71 that belong to a session carry the MSID 118 to which each MSDU 71 is associated. In this example, MSIDs 118 enable MAC 12 to use resources allocated for that session, thus providing guarantees on various QoS parameters. A set of MSIDs 118 can be reserved for use by MSDUs 71 that do not belong to any session. In this example, MSID 118 indicates the traffic Class to which the MSDUs 71 belong. Internal to the MAC layer 54, each Class of traffic is provided with a coherent set of access parameters and allocations thus providing differentiated services. In general, established sessions can also be divided into various classes, with each class providing guarantees in a specific range of QoS parameters. In this case, MSID 118 can be used to explicitly determine the traffic Class, which is provided during connection setup.
The format of the MSDU 71 also enables an exchange of MAC Management information between the higher layers of the network architecture 50 and the MAC layer 54 by means of the optional MAC Management field 108. This feature simplifies the interface between the MAC layer 54 and the higher layers of the network architecture. Furthermore, this feature can also be used to exchange management information between higher layers of the network architecture 50.
The MSDU format 100 also provides support for the layer of the network architecture 50 that is higher than the MAC layer 54 to control when a delivery time stamp has to be inserted.
The Destination Address (DA) field 102 and Source Address (SA) field 104 are 6 octets each and carry addressing information between transmitting MAC 12 and receiving MAC 14. An octet is a sequence of eight bits. An octet is thus an eight-bit byte. These fields 102 and 104 are identical to a 48-bit MAC address format described in the Institute of Electrical and Electronics Engineers (IEEE) Standard 802.3.
The 2-octet Traffic Information field 106 contains a 2-bit PAL Type (PLT) field, a 1-bit MAC Management Flag (MMF), a 1-bit DTS Flag, and a 12-bit MAC Stream ID (MSID) field as shown by Table 1.
The PAL Type (PLT) 112 enables the MAC layer 54 to distinguish between various types of higher layers. This is used for proper routing of the MSDU 71 at the receiver layer. MAC layer 54 supports IEEE 802.3 and Isochronous Streams (IS). Table 2 shows the interpretation of the PLT fields.
The MAC Management Flag (MMF) 114 is set to 0b1 to indicate that the corresponding MSDU 71 is associated with an embedded MAC Management Information (MMI) field 108.
The Delivery Time Stamp Flag (DTSF) 116 is set to 0b1 by the PAL 52 to indicate that this MSDU payload 110 should be associated with a Delivery Time Stamp in a Sub-Frame that may contain other MSDU payloads 110 that do not have a DTS (as indicated by a DTSF value of 0b0).
The MAC Stream ID (MSID) 118 is a 12-bit field that is associated with the payload being carried by the MSDU 71. MSIDs 118 with values from 0 to 3 are used by MSDUs 71 that do not belong to an established connection and map on to MAC Service Classes 0 to 3. The remaining MSIDs 118 may be used by connection-based services and are assigned by the MAC layer 54 during the connection setup process.
The MSDU format 100 can contain MAC Management Information 108. The presence of this field 108 is indicated by the MMF flag 114 in the Traffic Information field 106. If MAC Management Information 108 is present in the Sub-Frame, its format and content shall be as described in the Jitter Control Section below.
The MSDU Payload field 110 depends on the higher layer (e.g., PAL 52) that generated the MSDU 71. The MSDU Payload 110 is not interpreted by the MAC layer 54.
The Sub-Frame may contain MAC Management Information 108 and no MSDU Payload 110, or a MSDU Payload 110 and no MAC Management Information 108, or it may contain both.
Sub-Frame
The MAC layer 54 processes one or more MSDUs 71 to generate a Sub-Frame. As shown in
As shown in
The MAC Management Flag 182 is set to 0b1 to indicate the presence of MAC Management information 154. MAC Management information 154, if present, shall follow the sub-frame header 152.
The Integrity Check Value Flag 184 is set to 0b1 to indicate the presence of an ICV field 158 in the corresponding Sub-Frame 150. The ICV field 158, if present, follows the Sub-Frame payload 110.
The Length field 186 is a 14-bit used to specify the length of Sub-Frame 150, excluding the 2-octet Sub-Frame Header 152 and the 4-octet ICV (if present) 158.
The Sub-Frame 150 can contain MAC Management Information 154 as indicated by the MMF flag 182 in the Sub-Frame Header 152. If the MAC Management Information 154 is present in the Sub-Frame 150, its format and content is as described in the Jitter Control Mechanism section below.
The optional Delivery Time Stamp (DTS) 156 is the 24-bit value of the sender's local 25 MHz multimedia clock at the time at which the MSDU 71 arrived from the sender's PAL 52, plus the delivery latency associated with this MSDU 71. This value indicates the time at which the MSDU 71 should be presented to the destination's PAL 52. The DTS field 156 shall be included in a Sub-Frame 150 only when required for jitter control as negotiated at stream set-up. At that time, the option of one DTS 156 per Sub-Frame 150 or one DTS 156 per MSDU payload 110 shall be selected for the stream. The DTS 156 will precede the MSDU payload(s) 110 to which it applies, and these payloads 110 will be grouped according to the DTS Flag 116 in the MSDU traffic information 106. All the MSDUs 100 with DTSF=0b0 will be grouped into a single Sub-Frame 150 with the next MSDU 100 whose DTSF=0b1.
The Sub-Frame Payload field 160 contains the payload 110 from one or more MSDUs 71 depending on how the Sub-Frame 150 was formed.
The Integrity Check Value (ICV) 158 is a Cyclic Redundancy Code (CRC)-32 error checking code computed over one or more Sub-Frames 150. The ICV Flag (ICVF) 158 in the Sub-Frame header 152 is used to determine the Sub-Frames 150 over which the ICV 158 is computed. The ICV 158 does not cover the Sub-Frame headers 152.
Sub-Frames 150 that are generated from MSDUs 71 belonging to the same {SA 104, DA 102, PLT 112 and MSID 118} tuple are grouped together to form a sub-frame stream. When a MPDU 72 is generated by the MAC layer 54, its payload contains Sub-Frame(s) 150 from only one sub-frame stream at a time.
The salient features of Sub-Frame 150, and Sub-Frame Stream generation process include removing information that is common to all the MSDUs 71 that belong to a single stream while a sub-frame 150 is generated. This information is only transmitted once per MPDU 72, thus increasing protocol efficiency.
Multiple MSDU payloads 110 can be transmitted in a single Sub-Frame 150. This improves the protocol efficiency when small fixed length MSDU payloads 110 are sent in the same stream.
The structure of the Sub-Frame 150 provides a mechanism for carrying management information along with MSDU payload 110.
Sub-Frames 150 also provide a mechanism for transmitting delivery time stamps 156. These delivery time stamps 156 provide the time at which the Sub-Frame 150 has to be delivered to the higher layer of the architecture 50 at the receiver MAC (e.g., 12, 14, 16).
The structure of the Sub-Frame 150 allows for inserting an ICV 158 on each Sub-Frame 150 or a group of Sub-Frames 150 at a time. The ICV 158 enables end-to end check for proper reception of Sub-Frames 150.
The Sub-Frame 150 is generated by processing one or more MSDUs 71. The generation of a Sub-Frame 150 from an MSDU 71 is shown in
Sub-Frames Streams, Sub-Blocks and Segments
As shown in
As shown in
MAC Protocol Data Unit (MPDU) and FEC Blocks
The term MAC Protocol Data Unit (MPDU) 254 is the information that the PHY 56 has been asked to transport by the MAC layer 54. The MPDU 72 is composed of a Frame Control field 256, MPDU Header 258 and one or more PHY Blocks 266. Frame Control carriers broadcast information. The MPDU header 258 and the first PHY Block 266 are transmitted using a single FEC Block 268. The subsequent PHY Blocks 266 are transmitted in separate FEC Blocks 266. The first FEC Block 268 in an MPDU 72 is of a larger size to accommodate the fixed length MPDU header 258 along with the PHY Block 266. All the PHY Blocks 266 have a fixed size except for the last one in the MPDU 72.
The salient features of the MPDU format include that all the information that is common to all Segments 252 in an MPDU 72 is transmitted as part of the MPDU header 258, thus improving the efficiency of communication. Furthermore, segmentation across Sub-Frame boundaries provides high MPDU transmission efficiency under a very large range of MSDU, Sub-Frame sizes. The MPDU header 258 is protected by a special integrity check, which provides better performance on marginal channels. The MPDU header 258 carries local clock time stamp information. This time stamp can be used by the receiver MAC (e.g., 14) to synchronize with the transmitter MAC 12, thus enabling jitter free service. The mapping of MPDU header 258 and first PHY Blocks 266 on to the first FEC Block 268 that has a larger size to enable MPDU header 258 overhead enables efficient retransmission of lost PHY Blocks 266. Support for Escalating the PHY Block 266 encoding is provided. This mechanism can be used in conjecture with retransmissions to enhance QoS guarantees. There is also support of Multicast with partial ARQ, bridging and forwarding.
The format of MPDU Header 258 is shown in
Number of Empty PHY blocks (NEPB) is two bits of the MPDU header which are used to indicate the number of empty PBs 266 at the end of the PPDU Payload. The restrictions on the frame length at high data rates cause increments of as many as 3 FEC blocks between successive valid frame sizes. The sender MAC (e.g., 12) may only require one of these FEC blocks 268 to hold data, and so there may be zero, one, or two empty PBs at the end of the PHY PDU Payload, as indicated by NEPB.
The MAC Stream ID (MSID) field carries the MAC Stream ID that is associated with the payload being carried by this MPDU. MSIDs 0 to 3 are used by MPDUs that carry connectionless Class 0 to 3 traffic respectively. The remaining MSIDs may be used by connection-based services and are assigned by the MAC during the connection setup process.
The PAL Type (PLT) field defines the PAL Type (PLT) that is being carried by the MPDU. The MAC receiver uses this to reassemble and to route the MSDUs to the correct PAL.
The Time Stamp (TS) field is a 24-bit Time Stamp representing the value of the local transmitter's Multimedia clock with reference to the start of the preamble when the MPDU was transmitted. The TS field is used for jitter-free delivery (in conjunction with the Delivery Time Stamp (DTS) in the Sub-Frame Header), Tone Map (TM) timing and in managing the Periodic Contention Free Channel Access.
The Encryption Key Select (EKS) field is an Index of the Encryption Key used for encrypting the Segments. In some examples, EKS is 12 bits long, providing additional keys for access networks. A value of 0x000 indicates that the segments are encrypted using the stations default encryption key. A value of 0xfff indicates that the Segments in the MPDU 72 are not encrypted. Preferred implementations can also obtain the EKS by processing the frame control header fields.
The Sub-Frame Boundary PHY Block Sequence Number (SFPBN) field carries a number representing the relative position within the MPDU of the PHY Block that contains a Sub-Frame boundary. A value of 0b000000 indicates the first PB, 0b000001 indicates the second PB, etc. A value of 0b111111 indicates that no Sub-Frame boundary exists in the current MPDU 72.
The Sub-Frame boundary offset (SFO) field carries the offset in bytes of the Sub-Frame boundary (i.e., the first octet of the first new Sub-Frame) within the PHY Block indicated by SFPBN. A value of 0x000 indicates the first byte.
The Destination Address (DA) 302, Source Address (SA) 304, Original Destination Address (ODA) 306, and Original Source Address (OSA) 308 fields carry the addressing associated with the MPDU 72.
The Destination Address (DA) 302 is a 48-bit address for the receiver to which this MPDU 72 is being sent in the current transmission. The address format follows the IEEE 802.3 Ethernet Standard.
The Source Address (SA) 304 is a 48-bit address for the station (e.g., MAC 12) that is sending this MPDU 72 in the current transmission. The address format follows the IEEE 802.3 Ethernet Standard.
The Original Destination Address (ODA) 306 is a 48-bit address for the receiver that is the ultimate destination of this MPDU 254. The address format follows the IEEE 802.3 Ethernet Standard.
The Original Source Address (OSA) 308 is a 48-bit address for the station (e.g., MAC 12) from which this MPDU 72 originated. The address format follows the IEEE 802.3 Ethernet Standard.
The contents of the DA 302, SA 304, ODA 306 and OSA 308 fields in the MPDU header 258 are used to indicate whether the MPDU 72 being transmitted is a Regular MPDU or a Multicast MPDU with Response. Table 7 summarizes the interpretation of these addresses.
The Header Check Sequence (HCS) is a 32-bit CRC computed over all the MPDU Header fields. After receiving the MPDU, stations shall compute the 32-bit CRC based on the above process to detect transmission errors. If any transmission error is detected, the entire MPDU is discarded. To reduce the probability of errors in the MPDU header, the first FEC Block may be more robustly encoded than the standard FEC block.
Each PHY Block (PB) or PB with MPDU header is mapped onto a single Forward Error Correction (FEC) block at the physical layer. A Long MPDU can carry one or more PHY blocks. Each PB contains a PB Header (PBH), PB Body (PBB) and PB Check Sequence (PBCS). The MPDU Header is always carried as an addition field pre-pended to the first PB in the MPDU.
The salient features of the PHY Block format include that the PHY Block Check Sequence (PBCS) provides a very highly reliable error detection mechanism. Further mapping of PHY Blocks on to the FEC Blocks enable efficient retransmission.
The PHY Block format also enables the Sub-Block Sequence number to simplify reassembly and provides duplicate rejection at the receiver.
The PHY Block header format also provides a mechanism to transmit MAC Management frame in an out of band manner. This mechanism enables fast exchange of important MAC Management information.
The PHY Block body size is chosen to enable zero encryption overheads in the PHY Block Body. The overall encryption mechanism simplifies implementation.
Three sizes, 263, 519, and 775 octets (with 256, 512, or 768 octets of PBB for the segment it contains, respectively) are supported for PHY blocks 266. However, there are six FEC block information field sizes, namely 263, 519, and 775 octets for FEC Blocks containing only a PHY Block and 303, 559, and 815 octets for FEC Blocks containing a PHY Block and MPDU Header or SMPDU header and VFs field (in SACK long MPDUs). The larger size accommodates an additional 40 Octets for the header and the extra data. The first FEC block in a PPDU contains an MPDU header and a PB, while the rest contain only one PB each. When the PHY Body is filled with FEC blocks that form the PHY Payload, maximum size PBs shall be used for all but the last FEC block, which may contain a PB of any of the three sizes. Subject to these constraints, the sender (e.g., MAC 12) shall fill as much of the PHY Body as possible with PHY Payload.
The fields in the 3-octet PB Header are shown in Table 8.
The PB Header consists of a 14-bit Sub-Block Sequence Number and a 2-bit Length Type (PBLT) field, 1-bit Erasure Code Version, 5-bit Erasure Group Length and a 2-bit Parity Block Number.
The Sub-Block Sequence Number (SBSN) field indicates the sequence number of the first Sub-Block in the segment. The SBSN can be used by the receiver to properly insert the received Segments in the reassembly buffer. The process of numbering Sub-Blocks combined with fixed Sub-Block sizes eliminates the need for buffer reordering when out of order segments are received. Dividing the queue into sub-blocks of equal size and sending the sequence number in the PHY Block header simplifies reassembly while reducing the overhead required to carry the sequence number. The overhead is reduced because numbering is done one sub-block at a time rather that one byte (or one bit) at a time. For example, using 256 byte blocks compared to byte number saves 8-bits of space in the PHY block header. Reassembly is simplified because the receiver exactly knows where to put each sub-block.
SBSN numbers shall be initialized to 0 when a CF session is set up, and wrap around as long as the CFID is in use. For non-CF traffic (MSIDs 0-3), it is initialized to 0, wraps around as needed. For CSMA/CA traffic, the last SBSN shall be stored until twice the maximum Sub-Frame lifetime after which the SSBN shall be reset to 0. The first segment with a reset SBSN should have SFPBN=0 and SFO=0 also. When EGL is non-zero (i.e., Parity PB), this field carries the sequence number of the first sub-block in the last segment of the erasure group.
The PHY Block Length Type (PBLT) is a 2-bit field that indicates whether the PHY Block Body (PBB) is full, short 1 octet, or short more than 1 octet. The PBLT values and meanings are given in Table 9.
In the case of PBLT=0b10 or 0b11, the implied 2-octet length field contains the valid data length of the Segment carried by the PBB. The rest of the Segment is zero padded. The PHY Payload length may be large enough to hold more FEC blocks than are required by the MAC, which means that the last FEC block will not hold a PB. In this case, the transmitter inserts an empty PB with the PBLT=0b10 and a length field of 0x00 so that the receiver will discard this PB. The NEPB field of the MPDU Header indicates the number of these PBs so the receiver can discard them without having to decrypt them. When PBLT=0b11, then the receiver reassembles the segment contained in the PBB into the MAC Management Sub-Frame queue associated with this {SA, DA} pair. The MSB of the length field in the PBB of PBs with PBLT=0b11 shall be interpreted as the Sub-Frame Boundary Flag (SFBF). This bit allows the sender to indicate to the receiver that the first octet of the PBB is a sub-frame boundary (when SFBF=0b1).
An Erasure Group Length field when set to 0b00000, indicates a normal PB. A non-zero value of the EGL indicates parity PB. In this case, the value in the EGL field is the number of normal PBs (or the length of erasure group) covered by this parity PB. A value of 0b00001 indicates erasure group of length one and so on. A value of 0b11111 indicates an erasure group of size 31.
A Parity Block Number field is valid only when the EGL is set to a non-zero value. PBN indicates the sequence number of the parity block and is used by the receiver to recover lost segments. This field shall be set to 0b00 for this version
The PHY Block (PB) body carries the encrypted Segment as the payload. Note that a Segment may have to be zero-padded before encryption to ensure that it fits exactly into the PB Body. The PB Header and the PBCS are not encrypted.
The PHY Body Check Sequence (PBCS) is a CRC-32 and is computed over the PB Header and the encrypted PB Body. The PBCS of the first PB in an MPDU 72 is not computed over the MPDU header 258.
MAC Management Information Fields
MAC Management Information (MMI) can be transmitted as part of an MSDU or a Sub-Frame. When MMI is transmitted as part of an MSDU, the presence of this field is indicated by setting the MAC Management flag in the Traffic Information to 0b1 (refer to Section 1). When the MMF flag is set, the MMI field immediately follows the end of the Traffic Information.
When MMI is transmitted as part of a Sub-Frame, the presence of this field is indicated by setting the MAC Management flag in the Sub-Frame header to 0b1 (Refer to Section 2). When the MMF flag is set, the MAC Management Information field immediately follows the end of the Sub-Frame header. Table 10 shows the structure of the MMI field. Note that the MMI field has variable structure and that the sub-fields are so defined as to specify the particular structure of the MMI field.
The 1-octet Number of Entries (NE) field specifies the number of separate MAC Management Entries that are contained in the MMI field. Supposing that NE is L, then the MMI field contains L structures, one for each MAC Management Entry. Each such structure includes a MAC Management Entry Header (MEHDR), a MAC Management Entry Length (MELEN), and the associated MAC Management Entry data (MMENTRY).
For the ith MMENTRY, the ith MAC Management Entry Header (MEHDRi) field specifies a 1 octet header. The MAC Management Entry Header structure is as shown in Table 11.
The 2-bit MAC Management Entry Version (MEV) field indicates the version in use for interpretation of MAC Entries. If the received MEV is not equal to 0b00, the receiver discards the MAC Management Entry and uses the MAC entry length field to determine the number of octets to ignore before continuing to process the remainder of the Sub-Frame.
The 6-bit MAC Management Entry Type (METYPE) field defines the MAC entry command or request that follows. Several METYPEs are defined that enables such functions as layer management, Session set up etc.
The MAC Entry Length field (MELENi) contains the length in octets of the MMENTRY field to follow. If MMENTRY does not exist, MELEN is set to zero. This field provides for transparent extension of MAC management, without rendering older equipment obsolete. If an MSDU or a Sub-Frame is received with an METYPE value that is not understood, the receiver can still properly parse the MSDU or Sub-Frame and process its contents, ignoring what it does not understand. The format of MMENTRY depends on the MEHDR with which it is associated.
Jitter Control Mechanism
A Jitter Control mechanism enables station to deliver MSDUs 71 with a very low jitter in the order of a few nano seconds. This mechanism uses the Delivery time stamp 156 in the Sub-Frames 150 to determine when the corresponding MSDU 71 has to be delivered to the higher layer at the receiver. Synchronization of the clocks of the transmitters (e.g., MAC 12) and receivers (e.g., MAC 14) is obtained by transmitters inserting its local clock time stamp in MPDU header 258 and receiver using this to synchronize with the transmitter.
The salient features of jitter control mechanism include support for very low end-to-end jitter. The jitter control mechanism also includes support for higher layers of the network architecture to control the insertion of Delivery time stamps. This support for higher layers reduces overhead while providing the needed functionality. The jitter control mechanism can also use tracking algorithms to obtain close synchronization with the transmitters clock, thus enabling low end-to-end jitter guarantees in the order of nano-seconds. Furthermore, multi-streaming applications can use jitter control mechanism to provide synchronization between multiple receiver MACs.
Each MAC maintains a 25 MHz System Clock. Any MSDU that belongs to a jitter-free session is associated with a 24-bit Delivery Time Stamp (DTS) when the MSDU arrives at the MAC. This timestamp is inserted into the Sub-Frame that is generated from the MSDU (and possibly other MSDUs). When multiple MSDUs are combined into a single Sub-Frame with a single timestamp, the DTS Flag (DSTF) in the MSDU header indicates which MSDUs are to generate the timestamp. When an MSDU with the DTSF=0b1 arrives, its timestamp is generated and inserted into the Sub-Frame along with the MSDU payload and all other MSDU payloads that arrived since the last MSDU with DTSF=0b1. At the receiver, all of these MSDU payloads are delivered by the time indicated by the DTS in the Sub-Frame, with the last MSDU payload delivered at the indicated time. The PAL sending the MSDUs 71 to the source MAC (e.g., 12) takes care not to exceed the maximum Sub-Frame size before a time stamped MSDU 71 is sent.
The DTS is the sum of the system clock value when the MSDU 71 is received plus the end to end latency associated with the traffic (this is determined during the call admission process and the QoS for this traffic type). Every MPDU 72 carries the transmitter's System Clock time stamp (with respect to the start of the preamble) in the MPDU header 258. The receiver may use jitter control algorithm to provide very low jitter guarantees.
The receiving MAC (e.g., 14) delivers jitter-free traffic to the destination PAL at the time indicated in the delivery time stamp (DTS) based on the information derived from the System Clock timestamps in the MPDU headers 258.
ARQ, Escalation, and Erasure Codes
MPDUs 72 are acknowledged by the receiver to indicate reception station. Segments that cannot be delivered reliable can be retransmitted. A retransmitted segment is packaged in a new PB in the front of the next available MPDU 72 and is retransmitted. The retransmitted PBs will normally be escalated to improve their chances of correct reception. The number of escalated PHY Blocks in the MPDU 72 can be indicated in the frame control header. MAC layer can also use parity PBs to ensure reliable delivery of regular PBs. Parity PBs are generated by from a group of regular PBs and can be used to recover one or more lost PBs at the destination without having to retransmit them. These mechanisms enable latency sensitive packets to be delivered more effectively with a limited number of retries. Escalation and Erasure codes tradeoff data rate of the channel with the number of retries required to get a certain packet loss rate.
Encryption
Some implementations allow MACs to transmit segments in an encrypted for, thus providing privacy of data. Encryption information may include an Network Encryption Key (NEK) that indicates the key to be used to decrypt a block and an Initialization Vector (IV) that is used to initialize the decryption algorithm. Both NEK and IV should be correctly known to the receiver to properly decrypt the PB. The Encryption Key Select (EKS) field in the MPDU Header is used to refer to the index of the Network Encryption Key (NEK) used for encryption. The NEK to be used for encrypting any Segment and the corresponding EKS are exchanged between station prior to the transmission of MPDU. The Initialization Vector (IV) used for encrypting the first PHY Block is obtained by concatenating fields from Frame Control, MPDU header and PHY block header. Other preferred implementations may obtain the EKS by processing the fields of the Frame Control. For example, the EKS can be derived from a substantially unique session identifier carried in the Frame Control. The Initialization vector can be generated from the fields of the frame control and the PHY Block header. Once the MPDU is delivered to the destination, the PBCS of each PB is checked and then the good PBs are decrypted and delivered the receiver buffer. PB failures are reported to the transmitting station by a SACK and are re-encrypted and retransmitted, using a current Network Encryption Key (NEK) and a new Initialization Vector (IV). This process reduces the overhead for transmission of initialization vector. Further, proper choice of PHY Block body length can be used to reduce the encryption pad that might be needed.
Other implementations of the present disclosure are within the following claims.
This application is a continuation of U.S. patent application Ser. No. 13/025,230, filed Feb. 11, 2011, which is a continuation application of and claims priority to U.S. patent application Ser. No. 10/720,742, filed on Nov. 24, 2003, each of which is incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
3806885 | Moore | Apr 1974 | A |
4569044 | Tao et al. | Feb 1986 | A |
4581734 | Olson et al. | Apr 1986 | A |
4630261 | Irvin | Dec 1986 | A |
4677612 | Olson et al. | Jun 1987 | A |
4682324 | Ulug | Jul 1987 | A |
4720850 | Oberlander et al. | Jan 1988 | A |
4726018 | Bux et al. | Feb 1988 | A |
4792947 | Takiyasu et al. | Dec 1988 | A |
4819229 | Pritty et al. | Apr 1989 | A |
4881241 | Pommier et al. | Nov 1989 | A |
4943959 | Arnold | Jul 1990 | A |
4977593 | Ballance | Dec 1990 | A |
5001472 | Fischer et al. | Mar 1991 | A |
5003539 | Takemoto et al. | Mar 1991 | A |
5046069 | Calvignac et al. | Sep 1991 | A |
5081678 | Kaufman et al. | Jan 1992 | A |
5105423 | Tanaka et al. | Apr 1992 | A |
5121396 | Irvin et al. | Jun 1992 | A |
5136905 | Stack, I et al. | Aug 1992 | A |
5140584 | Suzuki | Aug 1992 | A |
5142578 | Matyas et al. | Aug 1992 | A |
5157659 | Schenkel | Oct 1992 | A |
5185796 | Wilson | Feb 1993 | A |
5188632 | Goldenberg | Feb 1993 | A |
5197061 | Halbert-Lassalle et al. | Mar 1993 | A |
5204903 | Okada et al. | Apr 1993 | A |
5214646 | Yacoby | May 1993 | A |
5228025 | Le Floch et al. | Jul 1993 | A |
5231634 | Giles et al. | Jul 1993 | A |
5249184 | Woest et al. | Sep 1993 | A |
5274629 | Helard et al. | Dec 1993 | A |
5280480 | Pitt et al. | Jan 1994 | A |
5297275 | Thayer | Mar 1994 | A |
5307376 | Castelain et al. | Apr 1994 | A |
5339313 | Ben-Michael et al. | Aug 1994 | A |
5343473 | Cidon et al. | Aug 1994 | A |
5359625 | Vander Mey et al. | Oct 1994 | A |
5384777 | Ahmadi et al. | Jan 1995 | A |
5416801 | Chouly et al. | May 1995 | A |
5426646 | Slack | Jun 1995 | A |
RE35001 | Grow | Jul 1995 | E |
5432848 | Butter et al. | Jul 1995 | A |
5436905 | Li et al. | Jul 1995 | A |
5448565 | Chang et al. | Sep 1995 | A |
5452288 | Rahuel et al. | Sep 1995 | A |
5452322 | Lauer | Sep 1995 | A |
5473602 | McKenna et al. | Dec 1995 | A |
5481535 | Hershey | Jan 1996 | A |
5483529 | Baggen et al. | Jan 1996 | A |
5488632 | Mason et al. | Jan 1996 | A |
5504747 | Sweazey | Apr 1996 | A |
5515379 | Crisler et al. | May 1996 | A |
5524027 | Huisken | Jun 1996 | A |
5537414 | Takiyasu et al. | Jul 1996 | A |
5541922 | Pyhalammi | Jul 1996 | A |
5548649 | Jacobson | Aug 1996 | A |
5555268 | Fattouche et al. | Sep 1996 | A |
5563883 | Cheng | Oct 1996 | A |
5563897 | Pyndiah et al. | Oct 1996 | A |
5568476 | Sherer et al. | Oct 1996 | A |
5610908 | Shelswell et al. | Mar 1997 | A |
5612975 | Becker et al. | Mar 1997 | A |
5615212 | Ruszczyk et al. | Mar 1997 | A |
5619651 | Young | Apr 1997 | A |
5623512 | Sasaki | Apr 1997 | A |
5629942 | Zijderhand | May 1997 | A |
5629948 | Hagiwara et al. | May 1997 | A |
5636230 | Marturano et al. | Jun 1997 | A |
5644576 | Bauchot et al. | Jul 1997 | A |
5651009 | Perreault et al. | Jul 1997 | A |
5694389 | Seki et al. | Dec 1997 | A |
5706348 | Gray et al. | Jan 1998 | A |
5717689 | Ayanoglu | Feb 1998 | A |
5732113 | Schmidl et al. | Mar 1998 | A |
5737330 | Fulthorp et al. | Apr 1998 | A |
5745769 | Choi | Apr 1998 | A |
5757766 | Sugita | May 1998 | A |
5757770 | Lagoutte et al. | May 1998 | A |
5764931 | Schmahl et al. | Jun 1998 | A |
5771235 | Tang et al. | Jun 1998 | A |
5787071 | Basso et al. | Jul 1998 | A |
5790541 | Patrick et al. | Aug 1998 | A |
5793307 | Perreault et al. | Aug 1998 | A |
5793861 | Haigh | Aug 1998 | A |
5799033 | Baggen | Aug 1998 | A |
5812599 | Van Kerckhove | Sep 1998 | A |
5818821 | Schurig | Oct 1998 | A |
5818826 | Gfeller et al. | Oct 1998 | A |
5825807 | Kumar | Oct 1998 | A |
5828677 | Sayeed et al. | Oct 1998 | A |
5841778 | Shaffer et al. | Nov 1998 | A |
5841873 | Lockhart et al. | Nov 1998 | A |
5884040 | Chung | Mar 1999 | A |
5886993 | Ruszczyk et al. | Mar 1999 | A |
5887063 | Varadharajan et al. | Mar 1999 | A |
5892769 | Lee | Apr 1999 | A |
5896561 | Schrader et al. | Apr 1999 | A |
5903614 | Suzuki et al. | May 1999 | A |
5914932 | Suzuki et al. | Jun 1999 | A |
5914959 | Marchetto et al. | Jun 1999 | A |
5940399 | Weizman | Aug 1999 | A |
5940438 | Poon et al. | Aug 1999 | A |
5948060 | Gregg et al. | Sep 1999 | A |
5956338 | Ghaibeh | Sep 1999 | A |
5966412 | Ramaswamy | Oct 1999 | A |
5970062 | Bauchot | Oct 1999 | A |
5987011 | Toh | Nov 1999 | A |
5987331 | Grube et al. | Nov 1999 | A |
6005894 | Kumar | Dec 1999 | A |
6006017 | Joshi et al. | Dec 1999 | A |
6028933 | Heer et al. | Feb 2000 | A |
6035000 | Bingham | Mar 2000 | A |
6041063 | Povlsen et al. | Mar 2000 | A |
6041358 | Huang et al. | Mar 2000 | A |
6044154 | Kelly | Mar 2000 | A |
6044482 | Wong | Mar 2000 | A |
6052377 | Ohmi et al. | Apr 2000 | A |
6055316 | Perlman et al. | Apr 2000 | A |
6074086 | Yonge, III | Jun 2000 | A |
6076115 | Sambamurthy et al. | Jun 2000 | A |
6092214 | Quoc et al. | Jul 2000 | A |
6097703 | Larsen et al. | Aug 2000 | A |
6097817 | Bilgic et al. | Aug 2000 | A |
6098179 | Harter, Jr. | Aug 2000 | A |
6108713 | Sambamurthy et al. | Aug 2000 | A |
6111919 | Yonge, III | Aug 2000 | A |
6125150 | Wesel et al. | Sep 2000 | A |
6130887 | Dutta | Oct 2000 | A |
6130894 | Ojard et al. | Oct 2000 | A |
6151296 | Vijayan et al. | Nov 2000 | A |
6160443 | Maalej et al. | Dec 2000 | A |
6169744 | Grabelsky et al. | Jan 2001 | B1 |
6172615 | Kogure | Jan 2001 | B1 |
6172616 | Johnson et al. | Jan 2001 | B1 |
6182147 | Farinacci | Jan 2001 | B1 |
6188717 | Kaiser et al. | Feb 2001 | B1 |
6192397 | Thompson | Feb 2001 | B1 |
6202082 | Tomizawa et al. | Mar 2001 | B1 |
6215792 | Abi-Nassif | Apr 2001 | B1 |
6216244 | Myers et al. | Apr 2001 | B1 |
6222851 | Petry | Apr 2001 | B1 |
6222873 | Bang et al. | Apr 2001 | B1 |
6243386 | Chan et al. | Jun 2001 | B1 |
6243449 | Margulis et al. | Jun 2001 | B1 |
6246770 | Stratton et al. | Jun 2001 | B1 |
6252849 | Rom et al. | Jun 2001 | B1 |
6259696 | Yazaki et al. | Jul 2001 | B1 |
6263445 | Blumenau | Jul 2001 | B1 |
6269132 | Yonge, III | Jul 2001 | B1 |
6278357 | Croushore et al. | Aug 2001 | B1 |
6278685 | Yonge, III et al. | Aug 2001 | B1 |
6278716 | Rubenstein et al. | Aug 2001 | B1 |
6279716 | Kayatani et al. | Aug 2001 | B1 |
6289000 | Yonge, III | Sep 2001 | B1 |
6295296 | Tappan | Sep 2001 | B1 |
6334185 | Hansson et al. | Dec 2001 | B1 |
6343083 | Mendelson et al. | Jan 2002 | B1 |
6363052 | Hosein | Mar 2002 | B1 |
6370156 | Spruyt et al. | Apr 2002 | B2 |
6385672 | Wang et al. | May 2002 | B1 |
6397368 | Yonge, III et al. | May 2002 | B1 |
6421725 | Vermilyea et al. | Jul 2002 | B1 |
6430192 | Creedon et al. | Aug 2002 | B1 |
6430661 | Larson et al. | Aug 2002 | B1 |
6434153 | Yazaki et al. | Aug 2002 | B1 |
6442129 | Yonge, III et al. | Aug 2002 | B1 |
6445717 | Gibson et al. | Sep 2002 | B1 |
6456649 | Isaksson et al. | Sep 2002 | B1 |
6466580 | Leung | Oct 2002 | B1 |
6469992 | Schieder | Oct 2002 | B1 |
6473435 | Zhou et al. | Oct 2002 | B1 |
6480489 | Muller et al. | Nov 2002 | B1 |
6487212 | Erimli et al. | Nov 2002 | B1 |
6501760 | Ohba et al. | Dec 2002 | B1 |
6519263 | Huth | Feb 2003 | B1 |
6526451 | Kasper | Feb 2003 | B2 |
6526581 | Edson | Feb 2003 | B1 |
6538985 | Petry et al. | Mar 2003 | B1 |
6553534 | Yonge et al. | Apr 2003 | B2 |
6559757 | Deller et al. | May 2003 | B1 |
6567416 | Chuah | May 2003 | B1 |
6567914 | Just et al. | May 2003 | B1 |
6577231 | Litwin, Jr. et al. | Jun 2003 | B2 |
6587453 | Romans et al. | Jul 2003 | B1 |
6587474 | Griessbach | Jul 2003 | B1 |
6594268 | Aukia et al. | Jul 2003 | B1 |
6632225 | Sanford et al. | Oct 2003 | B2 |
6647250 | Bultman et al. | Nov 2003 | B1 |
6654410 | Tzannes | Nov 2003 | B2 |
6667991 | Tzannes | Dec 2003 | B1 |
6671284 | Yonge, III et al. | Dec 2003 | B1 |
6747976 | Bensaou et al. | Jun 2004 | B1 |
6759946 | Sahinoglu et al. | Jul 2004 | B2 |
6765885 | Jiang et al. | Jul 2004 | B2 |
6775280 | Ma et al. | Aug 2004 | B1 |
6778507 | Jalali | Aug 2004 | B1 |
6782476 | Ishibashi | Aug 2004 | B1 |
6807146 | McFarland | Oct 2004 | B1 |
6834091 | Litwin, Jr. et al. | Dec 2004 | B2 |
6882634 | Bagchi et al. | Apr 2005 | B2 |
6888844 | Mallory et al. | May 2005 | B2 |
6901064 | Cain et al. | May 2005 | B2 |
6907044 | Yonge, III et al. | Jun 2005 | B1 |
6909723 | Yonge, III et al. | Jun 2005 | B1 |
6952399 | Bayerl et al. | Oct 2005 | B1 |
6985072 | Omidi et al. | Jan 2006 | B2 |
7000031 | Fischer et al. | Feb 2006 | B2 |
7038584 | Carter | May 2006 | B2 |
7085284 | Negus | Aug 2006 | B1 |
7200147 | Shin et al. | Apr 2007 | B2 |
7206320 | Iwamura | Apr 2007 | B2 |
7212513 | Gassho et al. | May 2007 | B2 |
7218901 | Mobley et al. | May 2007 | B1 |
7233804 | Sugaya et al. | Jun 2007 | B2 |
7242932 | Wheeler et al. | Jul 2007 | B2 |
7274792 | Chin et al. | Sep 2007 | B2 |
7280517 | Benveniste | Oct 2007 | B2 |
7298706 | Yoshida et al. | Nov 2007 | B2 |
7307357 | Kopp | Dec 2007 | B2 |
7315524 | Ohmi et al. | Jan 2008 | B2 |
7330457 | Panwar et al. | Feb 2008 | B2 |
7339457 | Trochesset | Mar 2008 | B2 |
7342896 | Ayyagari | Mar 2008 | B2 |
7352770 | Yonge, III et al. | Apr 2008 | B1 |
7356010 | He et al. | Apr 2008 | B2 |
7359398 | Sugaya | Apr 2008 | B2 |
7369579 | Logvinov et al. | May 2008 | B2 |
7388853 | Ptasinski et al. | Jun 2008 | B2 |
7423992 | Iwamura | Sep 2008 | B2 |
7447200 | Chan et al. | Nov 2008 | B2 |
7457306 | Watanabe et al. | Nov 2008 | B2 |
7474676 | Tao et al. | Jan 2009 | B2 |
7496078 | Rahman | Feb 2009 | B2 |
7506042 | Ayyagari | Mar 2009 | B2 |
7519030 | Cimini et al. | Apr 2009 | B2 |
7522630 | Ho et al. | Apr 2009 | B2 |
7551581 | Stephens et al. | Jun 2009 | B2 |
7551606 | Iwamura | Jun 2009 | B2 |
7558294 | Yonge, III | Jul 2009 | B2 |
7570656 | Raphaeli et al. | Aug 2009 | B2 |
7623542 | Yonge et al. | Nov 2009 | B2 |
7664145 | Akamatsu et al. | Feb 2010 | B2 |
7684568 | Yonge et al. | Mar 2010 | B2 |
7684756 | Bohnke et al. | Mar 2010 | B2 |
7729372 | Yonge, III | Jun 2010 | B2 |
7822059 | Katar et al. | Oct 2010 | B2 |
7830907 | Petranovich et al. | Nov 2010 | B1 |
7856008 | Ayyagari et al. | Dec 2010 | B2 |
7865549 | Kwon et al. | Jan 2011 | B2 |
7894487 | Yonge, III et al. | Feb 2011 | B2 |
7904021 | Yonge, III et al. | Mar 2011 | B2 |
8028097 | Iwamura | Sep 2011 | B2 |
8089901 | Yonge, III et al. | Jan 2012 | B2 |
8090857 | Yonge et al. | Jan 2012 | B2 |
8102853 | Ngo et al. | Jan 2012 | B2 |
8175190 | Yonge, III | May 2012 | B2 |
8400968 | Liu et al. | Mar 2013 | B2 |
8416887 | Yonge, III | Apr 2013 | B2 |
8553706 | Riedel et al. | Oct 2013 | B2 |
8654635 | Yonge et al. | Feb 2014 | B2 |
20010043576 | Terry | Nov 2001 | A1 |
20010048692 | Karner | Dec 2001 | A1 |
20020001314 | Yi et al. | Jan 2002 | A1 |
20020012320 | Ogier et al. | Jan 2002 | A1 |
20020015423 | Rakib et al. | Feb 2002 | A1 |
20020015466 | Akiba et al. | Feb 2002 | A1 |
20020015477 | Geile et al. | Feb 2002 | A1 |
20020027897 | Moulsley et al. | Mar 2002 | A1 |
20020042836 | Mallory | Apr 2002 | A1 |
20020048368 | Gardner | Apr 2002 | A1 |
20020061031 | Sugar et al. | May 2002 | A1 |
20020065047 | Moose | May 2002 | A1 |
20020105901 | Chini et al. | Aug 2002 | A1 |
20020107023 | Chari et al. | Aug 2002 | A1 |
20020115458 | Mizuno et al. | Aug 2002 | A1 |
20020116342 | Hirano et al. | Aug 2002 | A1 |
20020131591 | Henson et al. | Sep 2002 | A1 |
20020137462 | Rankin | Sep 2002 | A1 |
20020150249 | Ohkita et al. | Oct 2002 | A1 |
20020163933 | Benveniste | Nov 2002 | A1 |
20020191533 | Chini et al. | Dec 2002 | A1 |
20030006883 | Kim et al. | Jan 2003 | A1 |
20030012166 | Benveniste | Jan 2003 | A1 |
20030016123 | Tager et al. | Jan 2003 | A1 |
20030038710 | Manis et al. | Feb 2003 | A1 |
20030039257 | Manis et al. | Feb 2003 | A1 |
20030048183 | Vollmer et al. | Mar 2003 | A1 |
20030051146 | Ebina et al. | Mar 2003 | A1 |
20030053493 | Graham Mobley et al. | Mar 2003 | A1 |
20030056014 | Verberkt et al. | Mar 2003 | A1 |
20030066082 | Kliger et al. | Apr 2003 | A1 |
20030071721 | Manis et al. | Apr 2003 | A1 |
20030079169 | Ho et al. | Apr 2003 | A1 |
20030086437 | Benveniste | May 2003 | A1 |
20030107476 | Sahinoglu et al. | Jun 2003 | A1 |
20030133427 | Cimini, Jr. et al. | Jul 2003 | A1 |
20030133473 | Manis et al. | Jul 2003 | A1 |
20030137993 | Odman | Jul 2003 | A1 |
20030174664 | Benveniste | Sep 2003 | A1 |
20030181204 | Benveniste | Sep 2003 | A1 |
20030198246 | Lifshitz et al. | Oct 2003 | A1 |
20030203716 | Takahashi et al. | Oct 2003 | A1 |
20030217182 | Liu et al. | Nov 2003 | A1 |
20030227934 | White et al. | Dec 2003 | A1 |
20030231607 | Scanlon et al. | Dec 2003 | A1 |
20030231652 | Sprague et al. | Dec 2003 | A1 |
20030231658 | Liang et al. | Dec 2003 | A1 |
20030231715 | Shoemake et al. | Dec 2003 | A1 |
20040001499 | Patella et al. | Jan 2004 | A1 |
20040008728 | Lee | Jan 2004 | A1 |
20040009783 | Miyoshi | Jan 2004 | A1 |
20040010736 | Alapuranen | Jan 2004 | A1 |
20040013135 | Haddad | Jan 2004 | A1 |
20040037248 | Tamaki et al. | Feb 2004 | A1 |
20040047319 | Elg | Mar 2004 | A1 |
20040047351 | Del Prado Pavon et al. | Mar 2004 | A1 |
20040064509 | Ayyagari et al. | Apr 2004 | A1 |
20040066783 | Ayyagari | Apr 2004 | A1 |
20040070912 | Kopp | Apr 2004 | A1 |
20040075535 | Propp et al. | Apr 2004 | A1 |
20040077338 | Hsu et al. | Apr 2004 | A1 |
20040081089 | Ayyagari et al. | Apr 2004 | A1 |
20040083362 | Park et al. | Apr 2004 | A1 |
20040122531 | Atsuta et al. | Jun 2004 | A1 |
20040136396 | Yonge, III et al. | Jul 2004 | A1 |
20040141523 | Bhushan et al. | Jul 2004 | A1 |
20040141548 | Shattil | Jul 2004 | A1 |
20040160990 | Logvinov et al. | Aug 2004 | A1 |
20040165532 | Poor et al. | Aug 2004 | A1 |
20040165728 | Crane et al. | Aug 2004 | A1 |
20040174851 | Zalitzky et al. | Sep 2004 | A1 |
20040184427 | Lynch et al. | Sep 2004 | A1 |
20040184481 | Lee | Sep 2004 | A1 |
20040186994 | Herbert et al. | Sep 2004 | A1 |
20040208139 | Iwamura et al. | Oct 2004 | A1 |
20040214570 | Zhang et al. | Oct 2004 | A1 |
20040218577 | Nguyen et al. | Nov 2004 | A1 |
20040250159 | Tober et al. | Dec 2004 | A1 |
20040264557 | Maruyama | Dec 2004 | A1 |
20050001694 | Berkman | Jan 2005 | A1 |
20050015805 | Iwamura | Jan 2005 | A1 |
20050025176 | Ko et al. | Feb 2005 | A1 |
20050033960 | Vialen et al. | Feb 2005 | A1 |
20050041588 | Kim et al. | Feb 2005 | A1 |
20050041673 | Jiang et al. | Feb 2005 | A1 |
20050053066 | Famolari | Mar 2005 | A1 |
20050058089 | Vijayan et al. | Mar 2005 | A1 |
20050063402 | Rosengard et al. | Mar 2005 | A1 |
20050078803 | Wakisaka et al. | Apr 2005 | A1 |
20050089062 | Zegelin | Apr 2005 | A1 |
20050099938 | Sarraf et al. | May 2005 | A1 |
20050114489 | Yonge, III et al. | May 2005 | A1 |
20050122994 | Mangin et al. | Jun 2005 | A1 |
20050124293 | Alicherry et al. | Jun 2005 | A1 |
20050135284 | Nanda et al. | Jun 2005 | A1 |
20050135312 | Montojo et al. | Jun 2005 | A1 |
20050135403 | Ketchum et al. | Jun 2005 | A1 |
20050147075 | Terry | Jul 2005 | A1 |
20050149649 | Carneal et al. | Jul 2005 | A1 |
20050149757 | Corbett et al. | Jul 2005 | A1 |
20050163067 | Okamoto et al. | Jul 2005 | A1 |
20050169222 | Ayyagari et al. | Aug 2005 | A1 |
20050170835 | Ayyagari et al. | Aug 2005 | A1 |
20050174950 | Ayyagari | Aug 2005 | A1 |
20050180453 | Gaskill | Aug 2005 | A1 |
20050190785 | Yonge, III | Sep 2005 | A1 |
20050192011 | Hong et al. | Sep 2005 | A1 |
20050193116 | Ayyagari et al. | Sep 2005 | A1 |
20050208906 | Miyoshi et al. | Sep 2005 | A1 |
20050243765 | Schrader et al. | Nov 2005 | A1 |
20050276276 | Davis | Dec 2005 | A1 |
20060007907 | Shao et al. | Jan 2006 | A1 |
20060077997 | Yamaguchi et al. | Apr 2006 | A1 |
20060083205 | Buddhikot et al. | Apr 2006 | A1 |
20060098606 | Pandey et al. | May 2006 | A1 |
20060126493 | Hashem et al. | Jun 2006 | A1 |
20060164969 | Malik et al. | Jul 2006 | A1 |
20060218269 | Iwamura | Sep 2006 | A1 |
20060227729 | Budampati et al. | Oct 2006 | A1 |
20060233203 | Iwamura | Oct 2006 | A1 |
20060233266 | Suetsugu | Oct 2006 | A1 |
20060256881 | Yonge, III | Nov 2006 | A1 |
20070013419 | Ayyagari et al. | Jan 2007 | A1 |
20070025266 | Riedel et al. | Feb 2007 | A1 |
20070025383 | Katar et al. | Feb 2007 | A1 |
20070025384 | Ayyagari et al. | Feb 2007 | A1 |
20070025386 | Riedel et al. | Feb 2007 | A1 |
20070025391 | Yonge, III et al. | Feb 2007 | A1 |
20070025398 | Yonge, III et al. | Feb 2007 | A1 |
20070026794 | Ayyagari et al. | Feb 2007 | A1 |
20070058659 | Ayyagari et al. | Mar 2007 | A1 |
20070058661 | Chow | Mar 2007 | A1 |
20070058732 | Riedel et al. | Mar 2007 | A1 |
20070060141 | Kangude et al. | Mar 2007 | A1 |
20070064788 | Yonge, III et al. | Mar 2007 | A1 |
20070091925 | Miyazaki et al. | Apr 2007 | A1 |
20070127381 | Oh et al. | Jun 2007 | A1 |
20070147322 | Agrawal et al. | Jun 2007 | A1 |
20070230497 | Choi et al. | Oct 2007 | A1 |
20070237070 | Geile et al. | Oct 2007 | A1 |
20070248089 | Redi et al. | Oct 2007 | A1 |
20080095126 | Mahany et al. | Apr 2008 | A1 |
20080117891 | Damnjanovic et al. | May 2008 | A1 |
20080132264 | Krishnamurthy et al. | Jun 2008 | A1 |
20080201503 | McKim et al. | Aug 2008 | A1 |
20090011782 | Yonge, III et al. | Jan 2009 | A1 |
20090034552 | Yonge, III et al. | Feb 2009 | A1 |
20090067389 | Lee et al. | Mar 2009 | A1 |
20090116461 | Yonge, III et al. | May 2009 | A1 |
20090154487 | Ryan et al. | Jun 2009 | A1 |
20090207865 | Yonge, III et al. | Aug 2009 | A1 |
20090238153 | Sim | Sep 2009 | A1 |
20090279638 | Kurobe et al. | Nov 2009 | A1 |
20100111099 | Yonge, III et al. | May 2010 | A1 |
20110044218 | Kaur et al. | Feb 2011 | A1 |
20110128973 | Yonge, III et al. | Jun 2011 | A1 |
Number | Date | Country |
---|---|---|
3413144 | Oct 1985 | DE |
0571005 | Nov 1993 | EP |
0818905 | Jan 1998 | EP |
1065818 | Jan 2001 | EP |
0844563 | Jan 2003 | EP |
1693998 | Aug 2006 | EP |
1748574 | Jan 2007 | EP |
1748597 | Jan 2007 | EP |
1179919 | Oct 2010 | EP |
3107317 | May 1991 | JP |
08265241 | Oct 1996 | JP |
10503624 | Mar 1998 | JP |
11234230 | Aug 1999 | JP |
2000165304 | Jun 2000 | JP |
2000216752 | Aug 2000 | JP |
2000512450 | Sep 2000 | JP |
2002500388 | Jan 2002 | JP |
2002135177 | May 2002 | JP |
2003507930 | Feb 2003 | JP |
2003533939 | Nov 2003 | JP |
2004088180 | Mar 2004 | JP |
2004120709 | Apr 2004 | JP |
2004129249 | Apr 2004 | JP |
2005073240 | Mar 2005 | JP |
2005079615 | Mar 2005 | JP |
2005529518 | Sep 2005 | JP |
2007509530 | Apr 2007 | JP |
5068262 | Nov 2012 | JP |
2013102502 | May 2013 | JP |
9528773 | Oct 1995 | WO |
9634329 | Oct 1996 | WO |
9748206 | Dec 1997 | WO |
9857439 | Dec 1998 | WO |
9857440 | Dec 1998 | WO |
9934548 | Jul 1999 | WO |
0072495 | Nov 2000 | WO |
0113560 | Feb 2001 | WO |
0118998 | Mar 2001 | WO |
0182550 | Nov 2001 | WO |
0189124 | Nov 2001 | WO |
0206986 | Jan 2002 | WO |
0213442 | Feb 2002 | WO |
0241598 | May 2002 | WO |
02103943 | Dec 2002 | WO |
03015291 | Feb 2003 | WO |
03026224 | Mar 2003 | WO |
03100996 | Dec 2003 | WO |
03100996 | Dec 2003 | WO |
03103222 | Dec 2003 | WO |
03104919 | Dec 2003 | WO |
2004029766 | Apr 2004 | WO |
2004038980 | May 2004 | WO |
2004095165 | Nov 2004 | WO |
2004102893 | Nov 2004 | WO |
2005015841 | Feb 2005 | WO |
2005024558 | Mar 2005 | WO |
2005039127 | Apr 2005 | WO |
2005048047 | May 2005 | WO |
2005062546 | Jul 2005 | WO |
2007014319 | Feb 2007 | WO |
2007014377 | Feb 2007 | WO |
Entry |
---|
Afkhamie et al., “An Overview of the upcoming HomePlug AV Standard”, May 2005, IEEE 0-7803-8844-5/05, pp. 400-404. |
Anuj Batra et al., TI Physical Layer Proposal for IEEE 802.15 Task Group 3A, May 14, 2003, IEEE, IEEE 802.15-03/142R2, pp. 1-76. |
Bruce Schneier, Applied Cryptography, 1996, John Wiley & Sons, Inc., Second Edition, pp. 34-38, pp. 48-49, pp. 513-514, and pp. 518-520, 14 pages. |
Ayyagari Deepak,“High Speed Home Networking for AV and IP Applications using existing Powerline Infrastructure,” Dec. 2004, p. 65-72, paras:[0001]&[0004], Sharp Technical Journal, 8 pages. |
Baig Sobia, et al., “A Discrete Multitone Transceiver at the Heart of the PHY Layer of an In-Home Power Line Communication Local Area Network,” IEEE Communications Magazine, Apr. 2003, pp. 48-53. |
Benedetto S., et al., “A Soft-input soft-ouput Maximum A Posteriori (MAP) Module to Decode Parallel and Serial Concatenated Codes,” TDA Progress Report, 1996, vol. 42 (127), pp. 1-20, (XP002959296). |
Bertsekas, et al., Data Networks, Prentice Hall, Englewood Cliffs, NJ, Section 2.4.3 Selective Repeat ARQ, 1992, 24 pages. |
Blake, et al., “An Architecture for Differentiated Services,” The Internet Society, 1998, RFC 2475, pp. 1-31. |
Broadband Radio Access Networks (BRAN); High Performance Radio Local Area Network (HiperLAN), Type 1: Functional Specification, European Standard (Telecommunication Series) No. 300652 V. 1.2.1 (Jul. 1998), 105 pages. |
Bruschi D., et al., “Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues,” Mobile Networks and Applications, 2002, 10 pages. |
Bux W., “Token-Ring Local-Area Networks and Their Performance,” Proceedings of the IEEE, 1989, vol. 77 (2), 20 pages. |
Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications, International Standard (ANSI/IEEE Std 802.3), 2002, ISO/IEC 8802-3, 24 pages. |
Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications, International Standard, 1996, ISO/IEC 8802, Part 3, (ANSI/IEEE Std 802.3), 96 pages. |
Co-pending U.S. Appl. No. 60/705,720, filed Aug. 2, 2005, 40 pages. |
Dube P, et al., “Queueing analysis of early message discard policy,” IEEE International Conference, 2002, vol. 4, 5 pages. |
Ehrsam, et al., “A cryptographic key management scheme for implementing the Data Encryption Standard,” IBM Systems Journal, 1978, vol. 17 (2), 21 pages. |
Goalic, et al., “ Real-Time Turbo-Decoding of Product Codes on a Digital Signal Processor,” IEEE, 1997, 5 pages. |
HomePlug Powerline Alliance, HomePlug 1.0.1 Specification, Dec. 1, 2001, 145 pages. |
HomePlug Powerline Alliance Inc., “HomePlug AV White Paper,” Doc. Ver. Number HPAVWP-050818, Aug. 2005, 11 pages. |
IBM, Combined use of collision resolution and collision avoidance MAC protocols, IBM Technical Disclosure Bulletin, 1994, vol. 37, (NN9410299), 6 pages. |
‘Initialization Vector’ Wikipedia, the Free Encyclopedia [online] [retrieved on Jun. 21, 2006] <URL: http://en.wikipedia.org/wiki/Initialization.sub.--vector>, 2 pages. |
Interface Specification for HomePNA.TM. 2.0 10M8 Technology—Link Layer Protocols, Dec. 1, 1999, 78 pages. |
Jeon, Wha Sook, Dong Geun Jeong, Chong-Ho Choi, “An Integrated Services MAC Protocol for Local Wireless Communications,” Feb. 1, 1998, IEEE Transactions on Vehicular Technology, vol. 47, 13 pages. |
Kamerman A., et al., “Net throughput with IEEE 802.11 wireless LANs; Wireless Communications and Networking Conference,” WCNC 2000 IEEE, 2000, vol. 2 (23-28), 6 pages. |
Katar et al., “Beacon Schedule Persistence to Mitigate Beacon Loss in HomePlug AV Networks,” May 2006, IEEE 1-4244-0113-05/06, 5 pages. |
Lee, et al., “HomePlug 1.0 powerline communication LANs—protocol description and performance results,” International Journal of Communication Systems, 2003, vol. 16, 28 pages. |
Lee et al., “HomePlug 1.0 Powerline Communication LANs-Protocol Description and Performance Results version 5.4,” 2000, International Journal of Communication Systems, 2000 00: 1-6, pp. 28 pages. |
Pavlidou, et al., “Power Line Communications: State of the Art and Future Trends.” IEEE Communications Magazine, Apr. 2003, 7 pages. |
Peterson W., et al., “Error-Correcting Codes,” Second Edition, The Massachusetts Institute of Technology Press, 1986, 34 pages. |
PKCS #5 v. 20: Password-Based Cryptography Standard RSA Laboratories, Mar. 25, 1999, 30 pages. |
Programmable PSD Mask V1.1.1 (Feb. 2006); Proposed Technical Specification European Telecommunications Standards Institute Available prior to Jun. 2006, 10 pages. |
Pyndiah R., et al., “Near Optimum Decoding of Product Codes,” IEEE, 1994, 5 pages. |
Pyndiah R., et al., “Near-Optimum Decoding of Product Codes: Block Turbo Codes,” leee Transactions on Communications, IEEE Service Center, Piscataway, 1998, vol. 46 (8), 8 pages. |
Pyndiah R., et al., “Performance of Block Turbo Coded 16-QAM and 64-QAM Modulations,” IEEE, 1995, 5 pages. |
Ruiz, David, et al., “In-Home AV PLC MAC with Neighboring Networks Support,” IEEE, 2005, p. 17, rt. hand column, line 14-p.20,rt. hand column, line 16; and Figs. 2,3, & 6, 5 pages. |
Schneier, Bruce, “Applied Cryptography,”1996, John Wiley & Sons, Inc., Second Edition, pp. 34-38, pp. 48-49, pp. 513-514, and pp. 518-520, 14 pages. |
Shared Wireless Access Protocol (Cordless Access) Specification, SWAP-CA Revision 1.21, Jan. 27, 1999, by the HomeRFTm Technical Committee, 70 pages. |
Sun, et al., “Public-key ID-based Cryptosystem,” IEEE, 1991, pp. 142-144, 3 pages. |
Wang, Contribution to the TG3 and TG4 MAC: MPDU Formats, May 10, 2001, Wi-LAN Inc., IEEE 802.16 Broadband Wireless Access Working Group <http://ieee802.org/16>, 9 pages. |
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, International Standard (ANSI/IEEE Std802.11), 1999, ISO/IEC 8802-11, 122 pages. |
CA Application No. 2,617,148 Office Action, Aug. 2, 2013 , 3 pages. |
Canadian Application No. 2616855, Examiner's Report, Oct. 28, 2013 , 2 pages. |
Canadian Application No. 2,616,610 Office Action, May 9, 2013 , 2 pages. |
EP Application No. 06849804.7 Eurpean Search Report, Jun. 14, 2014 , 5 pages. |
International Search Report & Written Opinion in PCT application No. PCT/US2008/065831, Feb. 20, 2009 , 22 pages. |
International Search Report from PCT appl No. PCT/US06/29377, Sep. 25, 2007 , 9 pages. |
Japanese Application No. 2008-524255 Office Action, Oct. 29, 2013 , 4 pages. |
Japanese Application No. 2013-004092, Office Action, Jan. 7, 2014 , 3 pages. |
U.S. Appl. No. 11/337,946 Office Action, Jan. 26, 2009 , 23 pages. |
U.S. Appl. No. 11/337,963 Office Action, Feb. 6, 2009 , 17 pages. |
“U.S. Appl. No. 11/492,487 Office Action”, Jun. 23, 2009 , 13 Pages. |
“U.S. Appl. No. 11/492,487 Final Office Action”, Mar. 9, 2010 , 15 pages. |
“U.S. Appl. No. 11/492,505 Final Office Action”, Jan. 14, 2010 , 18 Pages. |
“U.S. Appl. No. 11/492,505 Office Action”, Jun. 25, 2009 , 14 pages. |
“U.S. Appl. No. 11/492,505 Office Action”, Mar. 3, 2011 , 16 pages. |
“U.S. Appl. No. 11/492,505 Office Action”, Oct. 19, 2011 , 19 pages. |
“U.S. Appl. No. 11/492,505 Final Office Action”, May 21, 2012 , 16 pages. |
“U.S. Appl. No. 11/492,506 Final Office Action”, Oct. 28, 2009 , 10 pages. |
“U.S. Appl. No. 11/492,506 Final Office Action”, Aug. 30, 2010 , 13 pages. |
“U.S. Appl. No. 11/492,506 Office Action”, May 29, 2012 , 11 Pages. |
“U.S. Appl. No. 11/492,506 Office Action”, Apr. 3, 2009 , 14 pages. |
“U.S. Appl. No. 11/492,506 Office Action”, Feb. 19, 2010 , 8 pages. |
“U.S. Appl. No. 11/493,382 Final Office Action”, Jan. 6, 2010 , 12 pages. |
“U.S. Appl. No. 11/493,382 Office Action”, Mar. 17, 2011 , 11 pages. |
“U.S. Appl. No. 11/493,382 Office Action”, May 15, 2009 , 13 pages. |
“U.S. Appl. No. 11/493,382 Office Action”, Jun. 25, 2010 , 15 pages. |
“U.S. Appl. No. 12/431,433 Final Office Action”, Sep. 13, 2010 , 9 pages. |
“U.S. Appl. No. 12/431,433 Office Action”, May 25, 2010 , 11 Pages. |
“U.S. Appl. No. 12/628,507 Final Office Action”, May 2, 2011 , 13 pages. |
“U.S. Appl. No. 12/628,507 Office Action”, Sep. 27, 2010 , 35 pages. |
“U.S. Appl. No. 13/025,230 Office Action”, Jun. 3, 2013 , 7 pages. |
“Canadian Application No. 2,616,610 Office Action”, Apr. 28, 2014, 4 pages. |
“European Application No. 13161040.4 Extended European Search Report”, Jul. 4, 2014, 8 pages. |
“European Application No. 06788769.5 Communication pursuant to Art 94(3) EPC”, May 27, 2014, 5 pages. |
“Canadian Application No. 2,806,708, Examiner's Report”, Sep. 29, 2014, 3 pages. |
“Eurpoean Application No. 06253916.8, EPO Communication pursuant to Art. 94(3) EPC”, Jul. 28, 2014, 5 pages. |
“European Application No. 13168680.0, European Search Report”, Jul. 9, 2014, 8 pages. |
Number | Date | Country | |
---|---|---|---|
20140192641 A1 | Jul 2014 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13025230 | Feb 2011 | US |
Child | 14147936 | US | |
Parent | 10720742 | Nov 2003 | US |
Child | 13025230 | US |