The technology discussed below generally relates to wireless communications and, more particularly to a method for improving discovery in a peer-to-peer wireless network.
Certain embodiments of the present disclosure provide a method for wireless communications by a wireless node in a peer-to-peer (P2P) wireless network. The method generally includes maintaining a discovery database of at least one other wireless node of the P2P wireless network, wherein the discovery database comprises a type of each specified wireless node and a class of each offered service, and transmitting the type of each specified wireless node and the class of each offered service within a bit-mapped field of an identifier (ID) discovery probe message.
Certain embodiments of the present disclosure provide a method for wireless communications by a wireless node in a peer-to-peer (P2P) wireless network. The method generally includes maintaining a discovery database of at least one other wireless node of the P2P wireless network, wherein the discovery database comprises a type of each specified wireless node and a class of each offered service, receiving a query for service, wherein the query was transmitted by another wireless node of the P2P wireless network as a part of an identifier (ID) discovery probe message, and scanning the maintained discovery database to determine if there is a service entry matching the received query.
Certain embodiments of the present disclosure provide a method for wireless communications by a wireless node in a peer-to-peer (P2P) wireless network. The method generally includes reading a bit-mapped field of each received identifier (ID) discovery probe message transmitted from at least one other wireless node of the P2P wireless network, and determining, based on the read bit-mapped fields, which of the at least one other wireless node is aware of a service sought by the wireless node.
Certain embodiments of the present disclosure provide a method for wireless communications by a wireless node in a peer-to-peer (P2P) wireless network. The method generally includes generating an identifier (ID) discovery probe message with a query field indicating a service class being sought, and transmitting, to at least one other wireless node of the P2P wireless network, the query field within the ID discovery probe message to search for the service class.
Certain embodiments of the present disclosure provide an apparatus for wireless communications by a wireless node in a peer-to-peer (P2P) wireless network. The apparatus generally includes logic for maintaining a discovery database of at least one other wireless node of the P2P wireless network, wherein the discovery database comprises a type of each specified wireless node and a class of each offered service, and logic for transmitting the type of each specified wireless node and the class of each offered service within an identifier (ID) discovery probe message.
Certain embodiments of the present disclosure provide an apparatus for wireless communications by a wireless node in a peer-to-peer (P2P) wireless network. The apparatus generally includes logic for maintaining a discovery database of at least one other wireless node of the P2P wireless network, wherein the discovery database comprises a type of each specified wireless node and a class of each offered service, logic for receiving a query for service, wherein the query was transmitted by another wireless node of the P2P wireless network as a part of an identifier (ID) discovery probe message, and logic for scanning the maintained discovery database to determine if there is a service entry matching the received query.
Certain embodiments of the present disclosure provide an apparatus for wireless communications by a wireless node in a peer-to-peer (P2P) wireless network. The apparatus generally includes logic for reading identifier (ID) discovery probe messages transmitted from at least one other wireless node of the P2P wireless network, and logic for determining, based on information in the ID discovery probe messages, which of the at least one other wireless node is aware of a service sought by the wireless node.
Certain embodiments of the present disclosure provide an apparatus for wireless communications by a wireless node in a peer-to-peer (P2P) wireless network. The apparatus generally includes logic for generating an identifier (ID) discovery probe message with a query field indicating a service class being sought, and logic for transmitting, to at least one other wireless node of the P2P wireless network, the query field within the ID discovery probe message to search for the service class.
Certain embodiments of the present disclosure provide an apparatus for wireless communications by a wireless node in a peer-to-peer (P2P) wireless network. The apparatus generally includes means for maintaining a discovery database of at least one other wireless node of the P2P wireless network, wherein the discovery database comprises a type of each specified wireless node and a class of each offered service, and means for transmitting the type of each specified wireless node and the class of each offered service within an identifier (ID) discovery probe message.
Certain embodiments of the present disclosure provide an apparatus for wireless communications by a wireless node in a peer-to-peer (P2P) wireless network. The apparatus generally includes means for maintaining a discovery database of at least one other wireless node of the P2P wireless network, wherein the discovery database comprises a type of each specified wireless node and a class of each offered service, means for receiving a query for service, wherein the query was transmitted by another wireless node of the P2P wireless network as a part of an identifier (ID) discovery probe message, and means for scanning the maintained discovery database to determine if there is a service entry matching the received query.
Certain embodiments of the present disclosure provide an apparatus for wireless communications by a wireless node in a peer-to-peer (P2P) wireless network. The apparatus generally includes means for reading identifier (ID) discovery probe messages transmitted from at least one other wireless node of the P2P wireless network, and means for determining, based on information in the ID discovery probe messages, which of the at least one other wireless node is aware of a service sought by the wireless node.
Certain embodiments of the present disclosure provide an apparatus for wireless communications by a wireless node in a peer-to-peer (P2P) wireless network. The apparatus generally includes means for generating an identifier (ID) discovery probe message with a query field indicating a service class being sought, and means for transmitting, to at least one other wireless node of the P2P wireless network, the query field within the ID discovery probe message to search for the service class.
Certain embodiments of the present disclosure provide a software storage apparatus for wireless communications by a wireless node in a peer-to-peer (P2P) wireless network, comprising a computer-readable medium having instructions stored thereon, the instructions being executable by one or more processors. The instructions generally include instructions for maintaining a discovery database of at least one other wireless node of the P2P wireless network, wherein the discovery database comprises a type of each specified wireless node and a class of each offered service, and instructions for transmitting the type of each specified wireless node and the class of each offered service within an identifier (ID) discovery probe message.
Certain embodiments of the present disclosure provide a software storage apparatus for wireless communications by a wireless node in a peer-to-peer (P2P) wireless network, comprising a computer-readable medium having instructions stored thereon, the instructions being executable by one or more processors. The instructions generally include instructions for maintaining a discovery database of at least one other wireless node of the P2P wireless network, wherein the discovery database comprises a type of each specified wireless node and a class of each offered service, instructions for receiving a query for service, wherein the query was transmitted by another wireless node of the P2P wireless network as a part of an identifier (ID) discovery probe message, and instructions for scanning the maintained discovery database to determine if there is a service entry matching the received query.
Certain embodiments of the present disclosure provide a software storage apparatus for wireless communications by a wireless node in a peer-to-peer (P2P) wireless network, comprising a computer-readable medium having instructions stored thereon, the instructions being executable by one or more processors. The instructions generally include instructions for reading identifier (ID) discovery probe messages transmitted from at least one other wireless node of the P2P wireless network, and instructions for determining, based on information in the ID discovery probe messages, which of the at least one other wireless node is aware of a service sought by the wireless node.
Certain embodiments of the present disclosure provide a software storage apparatus for wireless communications by a wireless node in a peer-to-peer (P2P) wireless network, comprising a computer-readable medium having instructions stored thereon, the instructions being executable by one or more processors. The instructions generally include instructions for generating an identifier (ID) discovery probe message with a query field indicating a service class being sought, and instructions for transmitting, to at least one other wireless node of the P2P wireless network, the query field within the ID discovery probe message to search for the service class.
So that the manner in which the above-recited features of the present disclosure can be understood in detail, a more particular description, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only certain embodiments and are therefore not to be considered limiting of its scope, for the description may admit to other equally effective embodiments.
Various embodiments are described more fully hereinafter with reference to the accompanying drawings. This disclosure may, however, be embodied in many different forms and should not be construed as limited to any specific structure or function presented throughout this disclosure. Rather, these embodiments are provided so that this disclosure will convey the general scope of the disclosure to those skilled in the art. Based on the teachings herein one skilled in the art should appreciate that the scope of the disclosure is intended to cover any embodiment disclosed herein, whether implemented independently of or combined with any other embodiment of the disclosure. For example, an apparatus may be implemented or a method may be practiced using any number of the embodiments set forth herein. In addition, the scope of the disclosure is intended to cover such an apparatus or method which is practiced using other structure, functionality, or structure and functionality in addition to or other than the various embodiments of the disclosure set forth herein. It should be understood that any embodiment of the disclosure disclosed herein may be embodied by one or more elements of a claim.
The word “exemplary” is used herein to mean “serving as an example, instance, or illustration.” Any embodiment or aspect described herein as “exemplary” is not to be construed as preferred or advantageous over other embodiments or aspects. Although particular embodiments are described herein, many variations and permutations of these embodiments fall within the scope of the disclosure. Although some benefits and advantages of the preferred embodiments may be mentioned, the scope of the disclosure is not intended to be limited to particular benefits, uses, or objectives. Rather, embodiments of the disclosure are intended to be broadly applicable to different wireless technologies, system configurations, networks, and transmission protocols, some of which are illustrated by way of example in the figures and in the following description of the preferred embodiments. The detailed description and drawings are merely illustrative of the disclosure rather than limiting, the scope of the disclosure being defined by the appended claims and equivalents thereof.
A peer-to-peer (P2P) wireless network is designed to operate in a manner where all devices share a common wireless resource (i.e., spectrum) for both receive and transmit operations (i.e., time-division duplex scheme). A key objective of the P2P network is to facilitate discovery. i.e., the act of discovering devices in the radio frequency (RF) vicinity that a terminal can make a connection with (i.e., receive from and transmit to). The interconnection of P2P devices constitutes the network.
The discovery process generally requires P2P devices to periodically transmit an identifier (ID) probe message (possibly at pseudorandom times) intended to be received by other P2P devices in the RF vicinity. In general, a P2P device spends a majority of its time listening for ID probes from other devices, and very small amount of time transmitting its own ID probe message.
An ID probe message typically includes various types of information, such as a unique ID of the device, a location of the device (if available), and a specific service advertised by the device. All P2P devices create and maintain a “discovery” database of other P2P devices in the RF vicinity. The discovery database then contains the information collected from the received ID probes.
The coverage around a specific node (i.e., device) in the P2P network is typically non-uniform and severely constrained compared to that of, for example, a macrocell, a microcell, or even a picocell. This is because many of the P2P devices are often buried in the local clutter and the propagation conditions can be highly variable, leading to large path-losses due to shadowing and building penetration losses. Because of the large degree of variability in the propagation, a device advertising a desired service may be discovered even if it is far away from a searching node (e.g., 1 km), while another device advertising the same desired service much closer to the searching node may not be discovered because of excessive path loss specific to the geometry and topology of the P2P network.
The techniques described herein may be used for various broadband wireless communication systems, including communication systems that are based on an orthogonal multiplexing scheme. Examples of such communication systems include Orthogonal Frequency Division Multiple Access (OFDMA) systems, Single-Carrier Frequency Division Multiple Access (SC-FDMA) systems, and so forth. An OFDMA system utilizes orthogonal frequency division multiplexing (OFDM), which is a modulation technique that partitions the overall system bandwidth into multiple orthogonal sub-carriers. These sub-carriers may also be called tones, bins, etc. With OFDM, each sub-carrier may be independently modulated with data. An SC-FDMA system may utilize interleaved FDMA (IFDMA) to transmit on sub-carriers that are distributed across the system bandwidth, localized FDMA (LFDMA) to transmit on a block of adjacent sub-carriers, or enhanced FDMA (EFDMA) to transmit on multiple blocks of adjacent sub-carriers. In general, modulation symbols are sent in the frequency domain with OFDM and in the time domain with SC-FDMA.
Referring now to
Base station 102 can communicate with one or more devices such as device 116; however, it is to be appreciated that base station 102 can communicate with substantially any number of devices similar to device 116. As depicted, device 116 is in communication with antennas 104 and 106, where antennas 104 and 106 transmit information to device 116 over a forward link 118 and receive information from device 116 over a reverse link 120. In a frequency division duplex (FDD) system, forward link 118 can utilize a different frequency band than that used by reverse link 120, for example. Further, in a time division duplex (TDD) system, forward link 118 and reverse link 120 can utilize a common frequency band.
In addition, devices 122 and 124 can be communicating with one another, such as in a peer-to-peer configuration. Moreover, device 122 is in communication with device 124 using links 126 and 128. In a peer-to-peer ad hoc network, devices within range of each other, such as devices 122 and 124, communicate directly with each other without a base station 102 and/or a wired infrastructure to relay their communication. Additionally, peer devices or nodes can relay traffic. The devices communicating in a peer-to-peer (P2P) manner can function similar to base stations and relay traffic or communications to other devices, until the traffic reaches its ultimate destination. The devices can also transmit control channels, which carry information that can be utilized to manage the data transmission between peer nodes.
A communication network can include any number of devices or nodes that are in wireless (or wired) communication. Each node can be within range of one or more other nodes and can communicate with the other nodes or through utilization of the other nodes, such as in a multi-hop topography (e.g., communications can hop from node to node until reaching a final destination). For example, a sender node may wish to communicate with a receiver node. To enable packet transfer between sender node and receiver node, one or more intermediate nodes can be utilized. It should be understood that any node can be a sender node and/or a receiver node and/or intermediate node and can perform functions of either sending and/or receiving information at substantially the same time (e.g., can broadcast or communicate information at about the same time as receiving information) or at different times.
System 100 can be configured to allow nodes that have initiated a communication session over a network to move the session to a direct connection. Nodes that are directly connected can exchange packets natively without any encapsulation. In accordance with some embodiments, a “homeless” node can switch to a wireless network without losing its ongoing sessions. By “homeless” it is meant a node that does not have any home agent entity to provide assistance for keeping ongoing sessions alive while switching to foreign networks nor to forward any new incoming request(s) to establish new sessions to the node's current location. In accordance with some embodiments, nodes can be mobile (e.g., wireless), static (e.g., wired), or combinations thereof (e.g., one node static and a second node mobile, both nodes mobile, and so forth).
Interfaces of nodes 202 and 204 can be wired (e.g., Device to Device), wireless (e.g., WAN), or combinations thereof. For example, Node1 interface can be wireless and Node2 interface can be wired, or Node2 interface can be wireless and Node1 interface can be wired, or both interfaces can be wireless or wired.
For illustration purposes, the first interface of each node 202, 204 is a WAN interface, 208 and 210. WAN interfaces 208, 210 provide a connection over network 206, illustrated by links 212 and 214. Further, each node 202, 204 includes at least a second interface that is connected to a local network with directly connected peers or a multi-hop mesh network. For example, the local network can be a Wireless Local Area Network (WLAN) or another device to device (e.g., peer to peer) technology. For illustration purposes, the second interface of each node 202, 204 is illustrated as a Device to Device (D2D) interface 216, 218. The D2D interfaces 216, 218 allow nodes 202, 204 to perform direct communications, illustrated by direct link 220.
A procedure according to various embodiments for starting a session over network 206 and moving to a direct session (e.g., over direct link 220) will now be described. For example purposes, it is assumed that node1 202 utilizes Mobile Internet Protocol. Communications are performed by node1 202 utilizing its Mobile IP home address as a source address. A home address is a unicast routable address assigned to a node and is used as the permanent address of the node. Node1 202 communicates with node2 204 over network 206 (e.g., WAN) by sending and receiving packets over respective first interfaces (e.g., WAN interfaces 208, 210). The packets can be encapsulated in a MIPv6 tunnel to a home agent, which can be included in network 206 according to various embodiments, or a route optimization tunnel directly to node2 204.
First communications device 300 includes a processor 302 and memory 304 coupled together via a bus 309 over which the various elements (302, 304) may interchange data and information. Communications device 300 further includes an input module 306 and an output module 308 which may be coupled to processor 302 as shown. However, in some embodiments, the input module 306 and output module 308 are located internal to the processor 302. Input module 306 can receive input signals. Input module 306 can, and in some embodiments does, include a wireless receiver and/or a wired or optical input interface for receiving input. Output module 308 may include, and in some embodiments does include, a wireless transmitter and/or a wired or optical output interface for transmitting output.
Processor 302 is configured to: receive a first signal from a second communications device; generate a first application alert if said first signal satisfies an application alert criteria; and receive a second signal from an access point said second signal carrying second communications device information based on a previous signal from the second communications device. The access point may be, and sometimes is, a base station. In some embodiments, the second communications device information is location information. In various embodiments, processor 302 is configured to receive said first signal via a wireless peer to peer interface as part of being configured to receive a first signal. In some embodiments, processor 302 is configured to receive the second signal via a wireless wide area network interface as part of being configured to receive the second signal.
Processor 302 is further configured to determine an operation to take based on the second communications device information included in the second signal and information included in said first signal. In one exemplary embodiment, said second communications device information included in the second signal is information on a previous location of said second communications device, said information included in the first signal is current location information, and said operation is one of a location based traffic update operation and a location based advertisement update operation. Processor 302, in some embodiments, is further configured to send an information request signal to the access point requesting information corresponding to the second communications device, in response to the generated first application alert.
Collection of nodes of a peer-to-peer (P2P) wireless network, such as the nodes 202 and 204 of the P2P network 206 from
Certain embodiments support that nodes of the P2P network broadcast their advertised service(s) along with the advertised service(s) of all one-hop (i.e., direct-connect) neighbors. This approach may essentially form site diversity since any P2P node entering the neighborhood may get a view of the advertised services from multiple locations. Hence, the multi-user diversity may be present at each node of the P2P wireless network, which may improve service discovery.
Certain embodiments of the present disclosure support sharing of specific information in each of the participating node databases with their connected neighbors. Since the nodes may be distributed in space, each of the nodes may be able to hear different subsets of nodes. A database generated by aggregating the information in a plurality of nodes (e.g., ten or more nodes) may form a more complete view of the nodes in the immediate vicinity than that of any single node. Certain embodiments of the present disclosure also provide a means of sharing the information contained in a given node's database with other nodes that may be connected with this node.
At least two different methods are proposed in the present disclosure for sharing the discovery database information. A number of variations may be derived from these two approaches.
In one embodiment of the present disclosure, each node in a P2P wireless network may maintain a discovery database of devices, each of which may be categorized into a specific type and a service class. These device types and service classes may be conveyed in a bit-mapped field and sent as a part of an identifier (ID) discovery probe for nearby devices to read. If a nearby device is searching for a specific service class, it may read the bitmaps provided by the nodes to which it is connected in order to determine which of these neighbors may be aware of the desired service class being sought. In this case, the node desiring the specific service class may subsequently query one of the neighbors in order to acquire identification information associated with a node offering the sought service. A connection to the desired service class node may then be established on some other transport network that may interconnect all the nodes of the P2P network.
In another embodiment of the present disclosure, the database information may be shared by providing for a query field as a part of the ID discovery probe transmitted by any P2P device seeking a specific service class. This query field may indicate to neighbors of the querying node the specific service class being sought. The neighbor nodes may receive the query, scan their discovery databases to check if they contain an entry that matches the query, and subsequently respond to the query if the queried service entry is found in the maintained discovery database.
In order to ensure that the P2P network is not bogged down in multiple redundant responses, a specific protocol may secure that the responses are randomized or prioritized. Since the nodes not responding immediately may be listening, if they receive the respond to the query, then these nodes may abort their responses. Similarly, the requesting node may send an acknowledgement to the neighbors indicating that its request has been satisfied (i.e., search for the specific service class was successful). A connection to the desired service class node may then be established on some other transport network that interconnects all the nodes of the P2P network.
It should be noted that a responding node may actually be able to respond as a surrogate node. Thus, the responding node may convey, in its response to the request, all of the information that is provided by the desired node's discovery ID probe. Thus, the responding node may effectively act as a repeater or surrogate for the end node.
Certain embodiments of the present disclosure support certain control mechanisms for managing a system bandwidth and a node battery life in a P2P wireless network. For example, a service announcement frequency may not be a fixed system parameter, but it may be rather adaptive with minimum and maximum rates. A node of the P2P network may adjust its frequency of transmitting service announcements based on dynamics of the P2P network. Thus, a highly static neighborhood may typically result in a lower service announcement frequency than a neighborhood where nodes may come and go more quickly. Also, the service announcement frequency may be lowered with increased node density due to the gain from additional neighbors, and therefore nodes battery life may be extended.
When the density of nodes of the P2P network increases, a number of neighbor nodes associated with any given node may increase. Consequently, the size of the neighbor lists may increase, implying more bandwidth may be utilized for advertising services. The data rate employed by nodes may be made adaptive in order to provide some elasticity in capacity of the system. Thus, a lower data rate may be utilized when the node density is low. On the good side, this may provide for a greater range of the P2P network. Conversely, as the density of nodes increases, the utilized data rate may be also increased. On the other hand, the increase in data rate may reduce a range at which a service announcement message may be received. It should be noted that the data rate may be selected locally. In addition, as the density of nodes increases, a number of services advertised by a given node may be pared, either by capping it or through prioritization.
In summary, in densely populated areas, the overall coverage (i.e., the maximum range of a service, as well as the physical RF coverage) may be smaller, allowing for higher data rates. By combining this with a lower service announcement frequency, the discovery overhead may be maintained at a reasonable level.
The various operations of methods described above may be performed by various hardware and/or software component(s) and/or module(s) corresponding to means-plus-function blocks illustrated in the Figures. For example, blocks 402-408 illustrated in
As used herein, a phrase referring to “at least one of” a list of items refers to any combination of those items, including single members. As an example, “at least one of: a, b, or c” is intended to cover: a, b, c, a-b, a-c, b-c, and a-b-c.
The various illustrative logical blocks, modules and circuits described in connection with the present disclosure may be implemented or performed with a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array signal (FPGA) or other programmable logic device (PLD), discrete gate or transistor logic, discrete hardware components or any combination thereof designed to perform the functions described herein. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any commercially available processor, controller, microcontroller or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
The steps of a method or algorithm described in connection with the present disclosure may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in any form of storage medium, computer-readable medium or memory unit that is known in the art. Some examples of storage media that may be used include random access memory (RAM), read only memory (ROM), flash memory, EPROM memory, EEPROM memory, registers, a hard disk, a removable disk, a CD-ROM and so forth. A software module may comprise a single instruction, or many instructions, and may be distributed over several different code segments, among different programs, and across multiple storage media. A storage medium may be coupled to a processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor.
The methods disclosed herein comprise one or more steps or actions for achieving the described method. The method steps and/or actions may be interchanged with one another without departing from the scope of the claims. In other words, unless a specific order of steps or actions is specified, the order and/or use of specific steps and/or actions may be modified without departing from the scope of the claims.
The functions described may be implemented in hardware, software, firmware or any combination thereof. If implemented in software, the functions may be stored as one or more instructions on a computer-readable medium. A storage media may be any available media that can be accessed by a computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Disk and disc, as used herein, include compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk, and Blu-ray® disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers.
Software or instructions may also be transmitted over a transmission medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of transmission medium.
Further, it should be appreciated that modules and/or other appropriate means for performing the methods and techniques described herein can be downloaded and/or otherwise obtained by a user terminal and/or base station as applicable. For example, such a device can be coupled to a server to facilitate the transfer of means for performing the methods described herein. Alternatively, various methods described herein can be provided via storage means (e.g., RAM, ROM, a physical storage medium such as a compact disc (CD) or floppy disk, etc.), such that a user terminal and/or base station can obtain the various methods upon coupling or providing the storage means to the device. Moreover, any other suitable technique for providing the methods and techniques described herein to a device can be utilized.
It is to be understood that the claims are not limited to the precise configuration and components illustrated above. Various modifications, changes and variations may be made in the arrangement, operation and details of the methods and apparatus described above without departing from the scope of the claims.
While the foregoing is directed to embodiments of the present disclosure, other and further embodiments of the disclosure may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims that follow.
The present Application for Patent is a Continuation of patent application Ser. No. 12/610,255 entitled METHODS AND SYSTEMS FOR PEER-TO-PEER NETWORK DISCOVERY USING MULTI-USER DIVERSITY filed Oct. 30, 2009, issuing as U.S. Pat. No. 8,478,776, and assigned to the assignee hereof and hereby expressly incorporated by reference herein.
Number | Name | Date | Kind |
---|---|---|---|
6604140 | Beck et al. | Aug 2003 | B1 |
6633757 | Hermann et al. | Oct 2003 | B1 |
6909721 | Ekberg et al. | Jun 2005 | B2 |
6983326 | Vigue et al. | Jan 2006 | B1 |
7293080 | Clemm et al. | Nov 2007 | B1 |
7379958 | Karhu | May 2008 | B2 |
7386459 | English | Jun 2008 | B2 |
7440994 | Harrow et al. | Oct 2008 | B2 |
7457304 | Roh et al. | Nov 2008 | B2 |
7477634 | McKown | Jan 2009 | B1 |
7492777 | Ekberg et al. | Feb 2009 | B2 |
7496075 | Kwak et al. | Feb 2009 | B2 |
7499981 | Harrow et al. | Mar 2009 | B2 |
7516201 | Kovacs et al. | Apr 2009 | B2 |
7546363 | Harrow et al. | Jun 2009 | B2 |
7562112 | Harrow et al. | Jul 2009 | B2 |
7590097 | Ekberg et al. | Sep 2009 | B2 |
7631033 | Zehler | Dec 2009 | B2 |
7647012 | Yamada et al. | Jan 2010 | B2 |
7647021 | Moore et al. | Jan 2010 | B2 |
7656822 | Abdelaziz et al. | Feb 2010 | B1 |
7714911 | Yoshida | May 2010 | B2 |
7734717 | Saarimaki et al. | Jun 2010 | B2 |
7769837 | Nogawa et al. | Aug 2010 | B2 |
7844738 | Eytchison | Nov 2010 | B2 |
7904561 | Chan et al. | Mar 2011 | B2 |
7921155 | Harrow et al. | Apr 2011 | B2 |
8478776 | Walton et al. | Jul 2013 | B2 |
8478820 | Michaelis et al. | Jul 2013 | B2 |
20030149917 | Smith et al. | Aug 2003 | A1 |
20040162871 | Pabla et al. | Aug 2004 | A1 |
20060178924 | Yagiura | Aug 2006 | A1 |
20060235958 | Motoyama | Oct 2006 | A1 |
20070060160 | Hur et al. | Mar 2007 | A1 |
20070116031 | Chung et al. | May 2007 | A1 |
20070141986 | Kuehnel et al. | Jun 2007 | A1 |
20070141988 | Kuehnel et al. | Jun 2007 | A1 |
20070153717 | Tervonen et al. | Jul 2007 | A1 |
20070189322 | Hirose | Aug 2007 | A1 |
20070192300 | Reuther et al. | Aug 2007 | A1 |
20070195746 | Ryu et al. | Aug 2007 | A1 |
20070283018 | Yun | Dec 2007 | A1 |
20070287438 | Hansen et al. | Dec 2007 | A1 |
20080090656 | Hartwig | Apr 2008 | A1 |
20080107089 | Larsson et al. | May 2008 | A1 |
20080123558 | Chhabra | May 2008 | A1 |
20080139116 | Balgard et al. | Jun 2008 | A1 |
20080140835 | Bradley et al. | Jun 2008 | A1 |
20080248802 | Krishnamoorthy | Oct 2008 | A1 |
20080250160 | Hall | Oct 2008 | A1 |
20080279161 | Stirbu et al. | Nov 2008 | A1 |
20080298329 | Mo et al. | Dec 2008 | A1 |
20080313188 | Hu et al. | Dec 2008 | A1 |
20090029691 | Shen et al. | Jan 2009 | A1 |
20090029699 | Luukkala et al. | Jan 2009 | A1 |
20090031035 | Dharmaraju et al. | Jan 2009 | A1 |
20090036063 | Zuniga et al. | Feb 2009 | A1 |
20090059890 | Cordeiro et al. | Mar 2009 | A1 |
20090061784 | Cordeiro | Mar 2009 | A1 |
20090063686 | Schmidt et al. | Mar 2009 | A1 |
20090092105 | Chou | Apr 2009 | A1 |
20090103568 | Garba et al. | Apr 2009 | A1 |
20090106810 | Stoye et al. | Apr 2009 | A1 |
20090157829 | Choi et al. | Jun 2009 | A1 |
20090213771 | Celentano et al. | Aug 2009 | A1 |
20090219947 | Kariya | Sep 2009 | A1 |
20090227282 | Miyabayashi et al. | Sep 2009 | A1 |
20090237265 | Eguchi | Sep 2009 | A1 |
20090252134 | Schlicht et al. | Oct 2009 | A1 |
20090274166 | Zhang et al. | Nov 2009 | A1 |
20090290528 | Kwon et al. | Nov 2009 | A1 |
20090296674 | Ekl et al. | Dec 2009 | A1 |
20090323652 | Chen et al. | Dec 2009 | A1 |
20100054223 | Zhang et al. | Mar 2010 | A1 |
20100085916 | Yu et al. | Apr 2010 | A1 |
20100097946 | Celentano et al. | Apr 2010 | A1 |
20100118785 | Sugaya | May 2010 | A1 |
20100165925 | Del Prado Pavon et al. | Jul 2010 | A1 |
20100260042 | Kwon et al. | Oct 2010 | A1 |
20110044280 | Zhai | Feb 2011 | A1 |
20110069187 | Yokota | Mar 2011 | A1 |
20110113085 | Manor et al. | May 2011 | A1 |
20110205962 | Das et al. | Aug 2011 | A1 |
20120033585 | Michaelis et al. | Feb 2012 | A1 |
20130281086 | Michaelis | Oct 2013 | A1 |
Number | Date | Country |
---|---|---|
1627760 | Jun 2005 | CN |
1717879 | Jan 2006 | CN |
1723643 | Jan 2006 | CN |
100334652 | Aug 2007 | CN |
101341685 | Jan 2009 | CN |
1542409 | Jun 2005 | EP |
1677462 | Jul 2006 | EP |
1592177 | Apr 2007 | EP |
2003092575 | Mar 2003 | JP |
2003284139 | Oct 2003 | JP |
2005086570 | Mar 2005 | JP |
2005167696 | Jun 2005 | JP |
2005234877 | Sep 2005 | JP |
2005318581 | Nov 2005 | JP |
2005537762 | Dec 2005 | JP |
2006013811 | Jan 2006 | JP |
2006171917 | Jun 2006 | JP |
2006237658 | Sep 2006 | JP |
2006287463 | Oct 2006 | JP |
2007180839 | Jul 2007 | JP |
2007234008 | Sep 2007 | JP |
2009055246 | Mar 2009 | JP |
2009055350 | Mar 2009 | JP |
2009105750 | May 2009 | JP |
2009521190 | May 2009 | JP |
2009232259 | Oct 2009 | JP |
2009537898 | Oct 2009 | JP |
2010534980 | Nov 2010 | JP |
2010537699 | Dec 2010 | JP |
2011512102 | Apr 2011 | JP |
2011521583 | Jul 2011 | JP |
20040083238 | Oct 2004 | KR |
20050108087 | Nov 2005 | KR |
20090063732 | Jun 2009 | KR |
527791 | Apr 2003 | TW |
200801969 | Jan 2008 | TW |
200835373 | Aug 2008 | TW |
WO-2007075961 | Jul 2007 | WO |
2007136622 | Nov 2007 | WO |
WO-2008066777 | Jun 2008 | WO |
2009015322 | Jan 2009 | WO |
Entry |
---|
Taiwan Search Report—TW099137518—TIPO—Dec. 15, 2013. |
Campo C et al: “PDP: A lightweight discovery protocol for local-scope interactions in wireless ad hoc networks”, Computer Networks, Elsevier Science Publishers B.V., Amsterdam, NL, vol. 50, No. 17, Dec. 5, 2006, pp. 3264-3283, XP025182668, ISSN: 1389-1286, DOI: DOI:10.1016/J.COMNET.2005.12.007 [retrieved on Dec. 5, 2006]. |
Chakraborty D et al: “Toward Distributed Service Discovery in Pervasive Computing Environments”, IEEE Transactions on Mobile Computing, IEEE Service Center, Los Alamitos, CA, US LNKD—DOI:10.1109/TMC.2006.26, vol. 5, No. 2, Feb. 1, 2006, pp. 97-112, XP001545958, ISSN: 1536-1233. |
Clausen T, et al., “Optimized Link State Routing Protocol”, IETF draft, Oct. 2003. |
European Search Report—EP12194583—Search Authority—The Hague—Dec. 13, 2012. |
Fan et al: “Bandwidth allocation in UWB WPANs with ECMA-368 MAC”, Computer Communications, Elsevier Science Publishers BV, Amsterdam, NL, vol. 32, No. 5, Mar. 27, 2009, pp. 954-960, XP026001994, ISSN: 0140-3664, DOI: DOI:10.1016/J.COMCOM.2008.12.024 [retrieved on Dec. 30, 2008] abstract section 2. Proposed MAS allocation method. |
Gunther Auer, “Contention Free Dynamic Slot Allocation in Cellular Networks,” Sarnoff Symposium 2009. |
Guttman C Perkins J Kempf Sun Microsystems E: “Service Templates and Service: Schemes; rfc2609.txt”, IETF Standard, Internet Engineering Task Force, IETF, CH, Jun. 1, 1999, XP015008392, ISSN: 0000-0003. |
International Search Report and Written Opinion—PCT/US2010/054885, International Search Authority—European Patent Office—Mar. 4, 2011. |
Standard ECMA-368, “High Rate Ultra Wideband PHY and MAC Standard”, 2nd Edition, ECMA International, Geneva, Switzerland, Dec. 2007, pp. 1-330, XP002563778. |
Sud S, et al., “Enabling rapid wireless system composition through layer-discovery”, IEEE Network, IEEE Service Center, New York, NY, US, vol. 22, No. 4, Jul. 1, 2008, pp. 14-20, XP011232023,ISSN, 0890-8044, DOI, DOI,10.1109/MNET.2008.4579766 abstract p. 16, left-hand column, paragraph 1—right-hand column, paragraph 1 p. 18, right-hand column, paragraph 3-6. |
Ververidis C N, et al., “Service discovery for mobile Ad Hoc networks, a survey of issues and techniques”, IEEE Communications Surveys, IEEE, New York, NY, US, vol. 10, No. 3, Jul. 1, 2008, pp. 30-45, XP011234560, ISSN, 1553-877X, DOI, DOI,10.1109/COMST.2008.4625803 p. 34, left-hand column, paragraph 4—p. 36, left-hand column, paragraph 2. |
Wei Kuang Lai, “MARS: a multiple access scheme with sender driven and reception first for smart antenna in ad hoc networks”, Wireless Communications and Mobile Computing, Wirel. Commun. Mob. Comput. 2009; 9: 197-208. Published online Apr. 21, 2008 in Wiley InterScience. |
Zhensheng Zhang, “Pure Directional Transmission and Reception Algorithms in Wireless Ad Hoc Networks with Directional Antennas,” 2005 IEEE International Conference on Communications, May 16-20, 2005, Seoul, Korea. |
Taiwan Search Report—TW103103245—TIPO—Jun. 18, 2015. |
Taiwan Search Report—TW103103245—TIPO—Jan. 1, 2016. |
Number | Date | Country | |
---|---|---|---|
20130281146 A1 | Oct 2013 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12610255 | Oct 2009 | US |
Child | 13923143 | US |