The present invention relates to wireless communications. More particularly, the present invention relates to techniques that increase the communications capacity of wireless communications networks.
Short-range wireless proximity networks typically involve devices that have a communications range of one hundred meters or less. To provide communications over long distances, these proximity networks often interface with other networks. For example, short-range networks may interface with cellular networks, wireline telecommunications networks, and the Internet.
Various short-range networks, such as Bluetooth and IEEE 802.15.3 networks, are referred to as wireless personal area networks (WPANs) or piconets. These networks include a single coordinator device (e.g, a master or piconet coordinator) and multiple non-coordinating devices (e.g., DEVs or slave devices).
A high rate physical layer (PHY) standard is currently being selected for IEEE 802.15.3a. The existing IEEE 802.15.3 media access control layer (MAC) is supposed to be used as much as possible with the selected PHY. Currently, there are two remaining PHY candidates. One of these candidates is based on frequency hopping application of orthogonal frequency division multiplexing (OFDM). The other candidate is based on M-ary Binary offset Keying. The OFDM proposal is called Multiband OFDM (MBO). Moreover, in order to further develop the OFDM proposal outside of the IEEE, a new alliance has been formed called the MultiBand OFDM Alliance (MBOA).
MBO utilizes OFDM modulation and frequency hopping. MBO frequency hopping may involve the transmission of each of the OFDM symbols at various frequencies according to pre-defined codes, such as Time Frequency Codes (TFCs). Time Frequency Codes can be used to spread interleaved information bits across a larger frequency band.
Presently, there is an interest within the MBOA to create a Medium Access Control (MAC) layer that would be used with the OFDM physical layer instead of the IEEE 802.15.3 MAC layer. A current version of the MBOA MAC involves a group of wireless communications devices (referred to as a beaconing group) that are capable of communicating with each other. The timing of beaconing groups is based on a repeating pattern of “superframes” in which the devices may be allocated communications resources.
MAC layers govern the exchange among devices of transmissions called frames. A MAC frame may have various portions. Examples of such portions include frame headers and frame bodies. A frame body includes a payload containing data associated with higher protocol layers, such as user applications. Examples of such user applications include web browsers, e-mail applications, messaging applications, and the like.
In addition, MAC layers govern the allocation of resources. For instance, each device requires an allocated portion of the available communication bandwidth to transmit frames. The current MBOA MAC proposal provides for the allocation of resources to be performed through communications referred to as beacons. Beacons are transmissions that devices use to convey non-payload information. Each device in a beaconing group is assigned a portion of bandwidth to transmit beacons.
Such transmissions allow the MBOA MAC to operate according to a distributed control approach, in which multiple devices share MAC layer responsibilities. Accordingly, the current MBOA MAC Specification (version 0.95, April 2005) provides various channel access mechanisms that allow devices to allocate portions of the transmission medium for communications traffic. These mechanisms include a protocol called the distributed reservation protocol (DRP), and a protocol called prioritized contention access (PCA).
As the use of communications networks, such as WPANs, becomes progressively more prevalent, it is desirable to increase network capacity. Also, it is desirable to conserve transmission power and reduce interference levels. Accordingly, techniques are needed to achieve these goals especially in congested network conditions.
The present invention provides techniques for spatial reuse in wireless communications networks. Accordingly, the present invention provides a method and device that participate in a wireless communications network. The network has a shared transmission medium for the exchange of communications traffic. Further the method and apparatus determine a value for at least one interference condition in the shared transmission medium of the wireless communications network. Based on this value, a planned transmission to a remote wireless communications device is scheduled. For instance, when this value is less than a predetermined threshold, this scheduling employs a time-overlapping access technique.
The present invention also provides an apparatus having a transceiver and a controller. The transceiver exchanges signals across a wireless communications network having a shared transmission medium for the exchange of communications traffic. The controller determines a value for at least one interference condition in the shared transmission medium of the wireless communications network. In addition, the transceiver schedules a planned transmission to a remote wireless communications device. This scheduling employs a time-overlapping access technique for the planned transmission when the value for the at least one interference condition is less than a predetermined threshold. The present invention further provides computer program product aspects.
Embodiments of the present invention provide improvements in throughput by spatially allocating wireless medium among terminals participating in a wireless networks, such as de-centralized beacon based networks (MBOA networks). In addition, embodiments of the present invention provide for reduced energy consumption as a result of minimizing of the transmit power levels and a better spectral efficiency exploitation (which implies fewer corrupted packets and retransmissions). Further features and advantages of the present invention will become apparent from the following description and accompanying drawings.
In the drawings, like reference numbers generally indicate identical, functionally similar, and/or structurally similar elements. The drawing in which an element first appears is indicated by the leftmost digit(s) in the reference number. The present invention will be described with reference to the accompanying drawings, wherein:
I. Operational Environment
For each of these transmissions, inner and outer propagation ranges are shown. For instance, an inner propagation range 104 and an outer propagation range 106 are shown for transmission 120. Likewise, an inner propagation range 108 and an outer propagation range 110 are shown for transmission 122. These are exemplary propagation ranges shown for the purposes of illustration. In fact, the actual propagation range for each transmission will depend upon the employed transmission power (as well as other environmental factors). More particularly, the greater the transmit power, the larger the propagation range.
As shown in
Outer propagation ranges 106 and 110 cover the intended recipients of their respective transmissions as well as the intended recipients of the other transmissions. Therefore, employment of these outer ranges yields interference without conserving power consumption.
The inner and outer propagation ranges of
The size of network environments, such as the environment of
In short-range wireless communications networks, the most prevalent communications are often between devices separated by distances that are substantially smaller than the network diameter. Thus, in such situations, only a relatively small fraction of network traffic is exchanged between devices separated by distances approaches the network diameter.
One such situation involves multiple people, each carrying various devices. Examples of such devices include, for example, a mobile telephone, a personal digital assistant (PDA), a wireless headset, and other devices. As an example, each individual's set of personal devices may have a mutual distance that is on the order of approximately 50 centimeters. However, in this situation, people may be separated at a substantially greater distance, such as 8 meters.
II. Superframe
Wireless network transmissions in the environment of
Each superframe 202 includes a beacon period 204 and a data transfer period 206. Beacon periods 204 convey transmissions from each of the active devices in the beaconing group. Accordingly, each beacon period 204 includes multiple beacon slots 207. Slots 207 each correspond to a particular device in the network (including the coordinator device). During these slots, the corresponding device may transmit various overhead or networking information.
For instance, such information may be used to set resource allocations and to communicate management information for the beaconing group. In addition, according to the present invention, data transfer periods 206 may be used to transmit information regarding services and features (e.g., information services, applications, games, topologies, rates, security features, etc.) of devices within the beaconing group. The transmission of such information in beacon periods 204 may be in response to requests from devices, such as scanning devices.
Data transfer period 206 is used for devices to communicate data according to various transmission schemes. These schemes may include, for example, frequency hopping techniques that employ OFDM and/or time frequency codes (TFCs). For instance, data transfer periods 206 may support data communications across links 120 and 122. In addition, devices (e.g., DEVs 102a-d) may use data transfer periods 206 to transmit control information, such as request messages to other devices. To facilitate the transmission of traffic, each device may be assigned a particular time slot within each data transfer period 206. In the context of the MBOA MAC, these time slots are referred to as media access slots (MASs).
A MAS is a period of time within data transfer period 206 in which two or more devices are protected from contention access by devices acknowledging the reservation. According to the MBOA MAC, MASs may be allocated by a distributed protocol, called the distributed reservation protocol (DRP). Alternatively, the MBOA MAC provides for resource allocation according to a prioritized contention access (PCA) protocol. Unlike DRP, PCA isn't constrained to reserving one or more entire MASs. Instead, PCA can be used to allocate any part of the superframe that is not reserved for beaconing or DRP reservations.
III. Power Considerations
Also, if the device determines that its transmission will cause interference to other receivers that is lower than the threshold, it will proceed with its transmission. In the context of MBOA, this determination is performed within the same superframe when beacons are grouped together in a beacon period. Alternatively, the determination is performed in a following superframe when beacons are spread across the superframe.
IV. Time Overlapping Transmission
In aspects of the present invention, devices obtain knowledge regarding the locality of other devices. From this knowledge, data transmissions may be scheduled in a manner that increases network capacity and conserves energy. For instance, certain transmissions may be scheduled with appropriate transmit power settings so that they overlap in time (e.g., simultaneous transmissions). Such time-overlapping transmissions yield spatial reuse.
In embodiments of the present invention, scheduling of planned transmissions involves discriminating between devices that are “close” and devices that are “far”. This discrimination may be quantitative. For instance, devices may compile locality information regarding mutual distances between devices. Examples of such locality information include received signal strength measurements and/or physical distance information.
A device may obtain locality information in various ways. For example, locality information may be obtained through network layer and/or physical layer protocols. For instance, this information may include received signal strength information (RSSI) that is furnished by the device's physical layer. Moreover, locality information may be obtained through other approaches, such as one that evaluate time offsets between various transmissions.
In addition to obtaining locality information, a device may also obtain knowledge of planned transmissions between other devices. Based on this obtained knowledge and locality information, the device may schedule transmissions that overlap in time with other devices' transmissions without interfering with these transmissions. This scheduling technique is referred to herein as time-overlapping access.
In a step 401, the device participates in a wireless communications network having a shared transmission medium. For instance, the network may be a personal area network employing a repeating frame format, such as the superframe format of
In a step 402, the device obtains locality information regarding other devices in the network. As described above, this locality information may include signal strength indicators corresponding to signals received from other devices, as well as actual distance between the devices and/or location information regarding the other devices.
In a step 404, the device receives information regarding planned transmissions by other devices in the network. This information may be received in various ways. For example, the device may obtain this information through the reception of beacon transmissions from the other devices. With reference to the example of
The operation of
Based on the information obtained in steps 402 and 404, the device determines, in a step 406, an access technique for an upcoming transmission. In particular, the device determines whether it is able to employ time-overlapping access or non-concurrent access for this upcoming transmission. In embodiments, step 406 comprises determining a value for at least one interference condition in the shared transmission medium of the wireless communications network.
If the time-overlapping access is available, then operation proceeds to a step 408. In this step, the device employs time overlapping access for the transmission. This step may include scheduling its upcoming transmission. Based on the device's knowledge of other devices' transmissions and their locality, step 408 results in the shared transmission medium being accessed simultaneously. However, this simultaneous access occurs at proper transmit power levels so that negligible interference occurs between transmissions.
Alternatively, if it is determined in step 406 that time-overlapping access is not available, then operation proceeds to step 410 in which the device employs non-concurrent access for the transmission. As a result, potential interference is avoided, but the advantages of spatial reuse are not obtained.
The operation of
The flowchart of
V. Transmit Power Levels
In embodiments of the present invention, the transmit power used for transmitting beacons is always set so that all devices in the network may receive these transmissions. However, the transmit power used for transmitting data is minimized according to the expected attenuation from the transmitting device to the receiving device. However, due to actual link conditions, the power setting may sometimes be insufficient for successful reception.
When a receiving device fails to receive a data transmission in the expected period, it may request retransmission by sending a control transmission (e.g., a beacon) having certain information (e.g., information elements). With reference to MBOA, examples of such information include: a Retrasm_request information element with the address of the corresponding transmitter; and a Reason_field (which can be implemented with one bit):
When this field is set to “1”, it indicates that the transmitted data (e.g., frame) was corrupted, so the transmitting device needs to re-transmit the data with higher power. However, when this field is set to “0”, it indicates a possible collision or jammed reception. If multiple requests were announced for the same device (e.g., due to a hidden node), the receiving may use this command to choose the transmitting device allowed to re-transmit. When clear-to-send (CTS) packets are used to confirm, the Retrasm_request information element may also used to require a re-transmission or a new transmission in a future superframe (e.g., SF[m+1]).
VI. Overview of Approaches
As described above with reference to
Various LIDB and STT approaches are within the scope of the present invention. For instance, embodiments of the present invention involve the use of LIDBs and STTs that are based on signal strength information, such as received signal strength indicators (RSSIs). However, further embodiments involve the use of LIDBs and STTs that are based on mutual distance information (MDI). Such RSSI approaches give an intrinsic priority to devices separated by relatively shorter distances, while MDI approaches give an intrinsic priority to devices separated by relatively greater distances.
VII. Received Signal Strength Approaches
One such RSSI-based approach is shown in
The flowchart of
In a step 508, the device determines the largest RSSI from the remaining RSSIs in the RSSI vector. This largest RSSI (referred to herein as RSSI_SID) is indicative of the strongest interfering device.
In a step 510, the device compares RSSI_OWN and RSSI_SID. This step may comprise subtracting RSSI_SID from RSSI_OWN. Alternatively, this step may comprise dividing RSSI_OWN by RSSI_SID.
As indicated by a step 512, if the comparison (or calculation) in step 510 is greater than a predetermined threshold, then time-overlapping access is selected in a step 514. Otherwise, non-concurrent access is selected in step 516.
A further RSSI-based approach is shown in
In a step 606, the device declares its RSSI vector to the other devices in the network. This may be done on a periodic basis or in response to a request from another device. Likewise, in a step 608, the device receives RSSI vector declarations from the other devices in the network.
Upon receipt of the declarations from the other devices, the device performs a step 610. In this step, the device builds an RSSI table (RSSIT) from its own RSSI vector and the RSSI vectors received in step 608.
As indicated by a step 614, the device determines whether the interference level determined in step 610 is greater than a predetermined threshold. If so, then operation proceeds to a step 616. In this step, time-overlapping access is selected. Otherwise, non-concurrent access is selected in step 618.
An exemplary RSSIT is shown below in Table 1.
In this table, each row corresponds to a transmitting device, while each column corresponds to a receiving device. Thus, each table entry RSSIi,j is a signal strength indicator associated with a transmission (e.g., a beacon) from a particular transmitting device (DEV i) to a particular receiving device (DEV j).
Each RSSI element in the RSSIT indicates the path loss between each device pairing in the network when the corresponding transmission is sent at a known transmit power. Therefore, the RSSIT provides a device with the capability to measure/estimate of the interference level at an intended receiving device due to other device's transmissions.
In embodiments of the present invention, devices may employ STT approaches that are adaptable. For instance, the device may select from among various STT operations based on the amount of locality information it possesses.
In a step 706, the device declares to other devices in network an RSSI corresponding to a transmission (e.g., a beacon) from its intended receiving device. In turn, the device receives such declarations from the other network devices. From these declarations, the device builds a compilation of RSSI information in a step 708.
Operation 750 includes a step 710. This step shows that the device may select among various STT operations based on the extent of its RSSI compilation. For instance, if a sufficient compilation (e.g., a complete RSSIT) has been established, gathering operation 650 of
VIII. Interference Level Determination
As described above, STT operation 650 of
Accordingly, the device calculates a transmit power, Ptx
The total interference level at a given receiving device, DEVy, can be computed as the sum of all contributions from transmitting devices. This total interference level, Pmax_int_rxy, is expressed below in Equation (2).
Upon the calculation of Equation (2), DEVx may proceed with time-overlapping access for the planned transmission if Pmax_int_rxy is less than a predetermined threshold, η. Otherwise the device proceeds with non-concurrent access.
Referring again to Equation (2), the expression for Pmax_int_rxy includes a summation argument, Ptx
Path loss can be computed as expressed below in Equation (3), which expresses the path loss between a device i and a device j.
As shown in Equation (3). Path loss between devices i and j may be calculated from their corresponding RSST entry and the transmit power of device i, which is expressed as Ptx
Based on this path loss, interference contributions may be calculated, according to Equation (4), below.
Ptx
In Equation (4) Ptxi is the transmission power used by DEVi to reach its intended receiving device, DEVRXi. Ptxi may be calculated according to Equation (5), below.
As indicated by Equation (2) above, calculation of the total interference level, Pmax_int_rxy, involves a summation of individual interference contributions for a number of device pairings (e.g., all devices in the RSSIT). However, in embodiments of the present invention, a simplified technique may be employed. In one such technique, only a highest interference contribution (HIC) is considered. This HIC is expressed below in Equation (6).
According to this technique, DEVx may proceed with time-overlapping access for the planned transmission if the HIC is less than a predetermined threshold, such as η. Otherwise the device proceeds with non-concurrent access.
As with the more involved technique, this alternative solution may be not reliable if the interference contributions are of the same order of magnitude.
IX. Mutual Distance Approaches
As described above, LIDB and STT approaches may be based on mutual distance information instead of received signal strength information.
As shown in
An exemplary MDT is shown below in Table 2.
In this table, each row corresponds to a transmitting device, while each column corresponds to a receiving device. Thus, each table entry Di,j is a distance from a particular transmitting device (DEV i) to a particular receiving device (DEV j).
In a step 806, the device calculates a minimum transmitted power for each of the planned transmissions. These minimum transmitted powers are calculated from the corresponding mutual distances in the MDT and assures a minimum received power, Pmin_rx, at each receiving device. These minimum transmitted powers will be also be calculated and used by the other devices for their respective transmissions.
In a step 808, the device calculates an estimated maximum interference level, Pmax_int_rx, from the perspective of its intended receiving device. Pmax_int_rx is estimated by an algorithm using the sensibility of the receiving device computed with the link budget, Pmin_rx, the exponent factor due to path-loss, α, and the MDT. This algorithm involves calculating a sum of the power (Ptxj−rxj) of the received signals which are designated for reception by the intended receiving device. This calculation of Pmax_int_rx is expressed below in Equation (7).
In Equation (7), the subscript j refers to the intended receiving device and the subscript i refers to an interfering transmitting device.
As indicated by a step 810, the device determines whether the estimated maximum interference noise, Pmax_int_rx, is less than a predetermined threshold. If so, then time overlapping access is employed in a step 812. Otherwise, non-concurrent access is employed in a step 814. In embodiments, this predetermined threshold is based on predetermined quality of service (QoS) requirements.
X. Wireless Communications Device
MAC controller 903 generates frames (data transmissions) and beacons for wireless transmission. In addition, MAC controller 903 receives and processes frames and beacon transmissions that are originated from remote devices. MAC controller 903 exchanges these frames and beacon transmissions with PHY controller 902. In turn, PHY controller 902 exchanges frames and beacon transmissions with transceiver 904.
In addition PHY controller 902 may provide MAC controller 903 with signal strength indicators (e.g., RSSIs). In embodiments, MAC controller 903 request such indicators from PHY controller 902. Alternatively PHY controller 902 may provide such indicators to MAC controller 903 in an unsolicited manner. In embodiments employing MBOA communications, PHY controller 902 may measure RSSIs during the reception of the PLCP preamble.
Further,
As shown in
The device of
One such implementation of the
Processor 1010 controls device operation. As shown in
Memory 1012 includes random access memory (RAM), read only memory (ROM), and/or flash memory, and stores information in the form of data and software components (also referred to herein as modules). These software components include instructions that can be executed by processor 1010. Various types of software components may be stored in memory 1012. For instance, memory 1012 may store software components that control the operation of transceiver 904. Also, memory 1012 may store software components that provide for the functionality of PHY controller 902, MAC controller 903, STT module 909, and upper protocol layer(s) 905. In addition, memory 1012 may store information for LIDB 907.
Moreover, memory 1012 may store software components that control the exchange of information through user interface 1014. As shown in
User input portion 1016 may include one or more devices that allow a user to input information. Examples of such devices include keypads, touch screens, and microphones. User output portion 1018 allows a user to receive information from the device. Thus, user output portion 1018 may include various devices, such as a display, and one or more audio speakers (e.g., stereo speakers) and a audio processor and/or amplifier to drive the speakers. Exemplary displays include color liquid crystal displays (LCDs), and color video displays.
The elements shown in
XI. Conclusion
While various embodiments of the present invention have been described above, it should be understood that they have been presented by way of example only, and not in limitation. For instance, although examples have been described involving MBOA communications, other short-range and longer-range communications technologies are within the scope of the present invention. Moreover, the techniques of the present invention may be used with signal transmission techniques other than OFDM.
Accordingly, the present invention is not limited to MBOA networks. In fact, the techniques of the present invention can employed in any media access control protocol. For instance, the techniques of the present invention may be employed with random access and contentionless access methods, as well as in centralized and distributed systems. Moreover, these techniques may be employed in networks having different superframe structures. In networks having a centralized controller device (such as an IEEE 802.15.3 coordinator device), the techniques of the present invention may be performed by the central controller.
Moreover, the present invention is not limited to traffic patterns involves point to point transmissions. Other traffic patterns may occur in which a single device sends “multicast” transmissions to multiple devices. Such multicast transmissions may be directed to devices that are relatively “close” to the transmitting device in comparison with the other network devices.
Therefore, it will be apparent to persons skilled in the relevant art that various changes in form and detail can be made therein without departing from the spirit and scope of the invention. Thus, the breadth and scope of the present invention should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.
Number | Name | Date | Kind |
---|---|---|---|
5758090 | Doner | May 1998 | A |
6154655 | Borst et al. | Nov 2000 | A |
6337984 | Hong et al. | Jan 2002 | B1 |
6807165 | Belcea | Oct 2004 | B2 |
7136624 | Ofuji et al. | Nov 2006 | B2 |
20030207699 | Shpak | Nov 2003 | A1 |
20040171402 | Tamaki et al. | Sep 2004 | A1 |
20060013338 | Gore et al. | Jan 2006 | A1 |
Number | Date | Country |
---|---|---|
1489788 | Dec 2004 | EP |
WO 0239620 | May 2002 | WO |
Number | Date | Country | |
---|---|---|---|
20070002803 A1 | Jan 2007 | US |