WO2014182090A1 - 무선랜 시스템에서 숨겨진 노드 문제의 완화 방법 - Google Patents
무선랜 시스템에서 숨겨진 노드 문제의 완화 방법 Download PDFInfo
- Publication number
- WO2014182090A1 WO2014182090A1 PCT/KR2014/004100 KR2014004100W WO2014182090A1 WO 2014182090 A1 WO2014182090 A1 WO 2014182090A1 KR 2014004100 W KR2014004100 W KR 2014004100W WO 2014182090 A1 WO2014182090 A1 WO 2014182090A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- frame
- terminal
- sta
- hidden node
- raw
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 54
- 238000001514 detection method Methods 0.000 claims abstract description 24
- 101150081243 STA1 gene Proteins 0.000 description 66
- OVGWMUWIRHGGJP-WTODYLRWSA-N (z)-7-[(1r,3s,4s,5r)-3-[(e,3r)-3-hydroxyoct-1-enyl]-6-thiabicyclo[3.1.1]heptan-4-yl]hept-5-enoic acid Chemical compound OC(=O)CCC\C=C/C[C@H]1[C@H](/C=C/[C@H](O)CCCCC)C[C@H]2S[C@@H]1C2 OVGWMUWIRHGGJP-WTODYLRWSA-N 0.000 description 62
- 101100366889 Caenorhabditis elegans sta-2 gene Proteins 0.000 description 62
- 238000010586 diagram Methods 0.000 description 24
- 230000005540 biological transmission Effects 0.000 description 17
- 101100419062 Caenorhabditis elegans rps-2 gene Proteins 0.000 description 14
- 230000004044 response Effects 0.000 description 12
- 101150007503 rps1 gene Proteins 0.000 description 12
- MOVRNJGDXREIBM-UHFFFAOYSA-N aid-1 Chemical compound O=C1NC(=O)C(C)=CN1C1OC(COP(O)(=O)OC2C(OC(C2)N2C3=C(C(NC(N)=N3)=O)N=C2)COP(O)(=O)OC2C(OC(C2)N2C3=C(C(NC(N)=N3)=O)N=C2)COP(O)(=O)OC2C(OC(C2)N2C3=C(C(NC(N)=N3)=O)N=C2)COP(O)(=O)OC2C(OC(C2)N2C(NC(=O)C(C)=C2)=O)COP(O)(=O)OC2C(OC(C2)N2C3=C(C(NC(N)=N3)=O)N=C2)COP(O)(=O)OC2C(OC(C2)N2C3=C(C(NC(N)=N3)=O)N=C2)COP(O)(=O)OC2C(OC(C2)N2C3=C(C(NC(N)=N3)=O)N=C2)COP(O)(=O)OC2C(OC(C2)N2C(NC(=O)C(C)=C2)=O)COP(O)(=O)OC2C(OC(C2)N2C3=C(C(NC(N)=N3)=O)N=C2)COP(O)(=O)OC2C(OC(C2)N2C3=C(C(NC(N)=N3)=O)N=C2)COP(O)(=O)OC2C(OC(C2)N2C3=C(C(NC(N)=N3)=O)N=C2)COP(O)(=O)OC2C(OC(C2)N2C(NC(=O)C(C)=C2)=O)COP(O)(=O)OC2C(OC(C2)N2C3=C(C(NC(N)=N3)=O)N=C2)COP(O)(=O)OC2C(OC(C2)N2C3=C(C(NC(N)=N3)=O)N=C2)COP(O)(=O)OC2C(OC(C2)N2C3=C(C(NC(N)=N3)=O)N=C2)CO)C(O)C1 MOVRNJGDXREIBM-UHFFFAOYSA-N 0.000 description 11
- 238000005516 engineering process Methods 0.000 description 11
- 230000008569 process Effects 0.000 description 10
- 239000000523 sample Substances 0.000 description 9
- 238000013468 resource allocation Methods 0.000 description 8
- 238000007726 management method Methods 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 238000010295 mobile communication Methods 0.000 description 4
- 230000000116 mitigating effect Effects 0.000 description 3
- 230000002618 waking effect Effects 0.000 description 3
- VYLDEYYOISNGST-UHFFFAOYSA-N bissulfosuccinimidyl suberate Chemical compound O=C1C(S(=O)(=O)O)CC(=O)N1OC(=O)CCCCCCC(=O)ON1C(=O)C(S(O)(=O)=O)CC1=O VYLDEYYOISNGST-UHFFFAOYSA-N 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000014509 gene expression Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000013469 resistive pulse sensing Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000000593 degrading effect Effects 0.000 description 1
- 230000006866 deterioration Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 239000004984 smart glass Substances 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012384 transportation and delivery Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
- H04W72/044—Wireless resource allocation based on the type of the allocated resource
- H04W72/0446—Resources in time domain, e.g. slots or frames
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/002—Transmission of channel access control information
- H04W74/006—Transmission of channel access control information in the downlink, i.e. towards the terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/04—Scheduled access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0808—Non-scheduled access, e.g. ALOHA using carrier sensing, e.g. carrier sense multiple access [CSMA]
- H04W74/0816—Non-scheduled access, e.g. ALOHA using carrier sensing, e.g. carrier sense multiple access [CSMA] with collision avoidance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- the present invention relates to a technique for mitigating a hidden node problem, and more particularly, to a method for mitigating a hidden node problem by setting a limited access interval in a WLAN system.
- Wireless local area network is based on radio frequency technology, personal digital assistant (PDA), laptop computer, portable multimedia player (PMP), smart It is a technology for wirelessly accessing the Internet in a home, business, or a specific service providing area by using a portable terminal such as a smart phone or a tablet PC.
- PDA personal digital assistant
- PMP portable multimedia player
- IEEE 802.11a provides a transmission rate of 54 Mbps using an unlicensed band at 5 GHz.
- IEEE 802.11b applies a direct sequence spread spectrum (DSSS) at 2.4 GHz to provide a transmission rate of 11 Mbps.
- IEEE 802.11g applies orthogonal frequency division multiplexing (OFDM) at 2.4 GHz to provide a transmission rate of 54 Mbps.
- IEEE 802.11n applies multiple input multiple output OFDM (MIMO-OFDM) to provide a transmission rate of 300 Mbps for four spatial streams.
- IEEE 802.11n supports a channel bandwidth of up to 40 MHz, and in this case, provides a transmission rate of 600 Mbps.
- VHT Very high throughput
- IEEE 802.11ac is a standard for providing a very high throughput in the sub-6GHz band
- IEEE 802.11ad is a standard for providing a very high throughput in the 60GHz band.
- IEEE 802.11af is a standard defined for the operation of a WLAN in a TV white space
- IEEE 802.11ah is a standard defined to support a large number of terminals operating at low power
- IEEE 802.11ai Is a standard defined for fast initial link setup (FILS) in a WLAN system.
- IEEE 802.11 high efficiency WLAN (HEW) for the purpose of improving the frequency efficiency in a dense environment in which a plurality of base stations and terminals exist.
- An object of the present invention for solving the above problems is to provide a method for establishing a limited access interval to mitigate the hidden node problem.
- Another object of the present invention for solving the above problems is to provide a method for detecting a terminal of a hidden node relationship.
- the limited access interval setting method for achieving the above object, starting at a first time point in the beacon interval, and is used for channel access of the first terminal group including at least one terminal
- Setting a restricted access section starting from a second time point after a predefined time from the first time point, setting a second restricted access section used for channel access of a second terminal group including at least one terminal;
- generating a beacon including setting information of the first limited access section and setting information of the second limited access section, and transmitting the generated beacon.
- the two restricted access sections overlap from the second time point.
- the predefined time may be greater than the sum of the length of the PS-Poll frame and the interval between the distributed frames and less than the length of the time slot.
- the first terminal group may include terminals other than the terminals included in the second terminal group.
- the first terminal group may have a higher priority than the second terminal group.
- the first limited access interval may include at least one time slot, and different time slots may be allocated to each time slot.
- the second limited access interval may include at least one time slot, and different time slots may be allocated to each time slot.
- a method for setting a limited access section which is located within a beacon interval and sets a limited access section used for channel access of terminals. Setting a time offset between a first sub-limited connection section and a second sub-limited connection section, generating setting information of the restricted access section including the time offset, generating a beacon including the setting information of the limited access section And transmitting the generated beacon, wherein the first sub-limited access period is used for channel access of a first terminal group including at least one terminal, and the second sub-limited access period is at least The first sub-limited access port is used for channel access of a second terminal group including one terminal. And the second sub-limited access period are redundant from the point indicated by the time offset.
- the time offset may be greater than the sum of the length of the PS-Poll frame and the interval between the distributed frames and less than the length of the time slot.
- the first terminal group may include terminals other than the terminals included in the second terminal group.
- the first terminal group may have a higher priority than the second terminal group.
- the first sub-limited access period may include at least one time slot, and different time slots may be allocated to each time slot.
- the second sub-limited access period may include at least one time slot, and different time slots may be allocated to each time slot.
- Hidden node detection method for achieving the other object, setting a first limited access interval used for a plurality of terminals for transmitting a hidden node detection frame, based on the HND frame Setting a second restricted access section used for the plurality of terminals transmitting the hidden node report frame generated by the beacon, the beacon including setting information of the first limited access section and setting information of the second limited access section. Generating a step and transmitting the generated beacon.
- the hidden node detecting method may further include receiving the HNR frames from the plurality of terminals in the second limited access interval and detecting a terminal having a hidden node relationship among the plurality of terminals based on the received HNR frames. It may further comprise a step.
- the HND frame may be an NDP frame.
- the HNR frame may include information on the HND frame received by each terminal.
- the HNR frame may include at least one of a MAC address, an AID, and a BSSID for a transmitting terminal that transmitted the HND frame.
- the second limited access section may begin after the end of the first limited access section.
- the plurality of terminals may be allocated to the second limited access section in the same order as the order of the plurality of terminals allocated to the first limited access section.
- Hidden node detection method for achieving the other object, the step of receiving a beacon from the access point, the configuration information of the first limited access section and the second limited access section included in the beacon Obtaining a time slot allocated to the terminal based on configuration information, transmitting a node detection frame hidden in a time slot allocated to the terminal during the first limited access interval, and transmitting another node in a time slot not allocated to the terminal; Receiving the transmitting HND frame, generating a hidden node report frame including information on the received HND frame, and transmitting the HNR frame in a time slot allocated to the terminal during the second limited access interval. It may include.
- the HND frame may be an NDP frame.
- the received HND frame may be received from a terminal belonging to the same BSS as the terminal.
- the HNR frame may include at least one of a MAC address, an AID, and a BSSID for a transmitting terminal that transmitted the HND frame.
- the second limited access section may begin after the end of the first limited access section.
- the plurality of terminals may be allocated to the second limited access section in the same order as the order of the plurality of terminals allocated to the first limited access section.
- the present invention it is possible to reduce the frequency of occurrence of a hidden node problem by allocating a time slot for allowing access of a wireless channel to each terminal so that time for accessing a wireless channel is distributed to each terminal.
- the use efficiency of the channel can be improved.
- the use efficiency of the wireless channel can be improved.
- the problem of hidden nodes can be alleviated by setting the start time of the time slot differently for each terminal.
- a terminal in a hidden node relationship can be detected.
- an access point managing a service space divided into sectors may set a sounding RAW field of RPS (restricted access window) parameter set to allocate a terminal to a specific sector.
- RPS restricted access window
- the terminals included in the RAW start AID (association ID) to the RAW end AID may not transmit a signal during the RAW period and may receive a sector beacon transmitted for each sector while operating in a reception mode.
- the terminal may report the received sector beacon ID information to the access point, and the access point may allocate the terminal to one specific sector based on the reported information.
- a terminal located at a sector boundary may receive and report a plurality of sector beacons, and even in this case, the access point should allocate the terminal to one specific sector.
- the access point may check the hidden node relationship with the terminal included in the sector using the method for detecting the hidden node relationship according to an embodiment of the present invention, and then allocate the terminal to the sector having no hidden node relationship.
- the terminal uses the corresponding information to blacklist the terminals that are incapable of direct link setup in a hidden node relation with themselves. It can be managed in the form. Therefore, the terminal may not attempt to perform unnecessary tunneled direct-link setup (TDLS) or direct-link setup (DLS).
- TDLS direct-link setup
- DLS direct-link setup
- FIG. 1 is a conceptual diagram illustrating an embodiment of a configuration of an IEEE 802.11 WLAN system.
- FIG. 2 is a conceptual diagram illustrating an access process of a terminal in an infrastructure BSS.
- FIG. 3 is a conceptual diagram illustrating an embodiment of a data transmission process of an access point.
- FIG. 4 is a conceptual diagram illustrating a hidden node problem between terminals.
- FIG. 5 is a conceptual diagram illustrating a power saving mode in a WLAN system.
- FIG. 6 is a conceptual diagram illustrating a structure of a TIM IE included in a beacon frame.
- FIG. 7 is a conceptual diagram illustrating a limited access window based scheduling method.
- FIG. 8 is a conceptual diagram illustrating a continuous RAW-based scheduling method.
- FIG. 9 is a conceptual diagram illustrating a nested RAW-based scheduling method.
- FIG. 10 is a flowchart illustrating a method for setting a limited access section according to an embodiment of the present invention.
- FIG. 11 is a conceptual diagram illustrating a method for setting a limited access section according to an embodiment of the present invention.
- FIG. 12 is a flowchart illustrating a method for setting a limited access section according to another embodiment of the present invention.
- FIG. 13 is a conceptual diagram illustrating a method for setting a limited access section according to another embodiment of the present invention.
- FIG. 14 is a first flowchart illustrating a hidden node detection method according to an embodiment of the present invention.
- 15 is a second flowchart illustrating a hidden node detection method according to an embodiment of the present invention.
- 16 is a conceptual diagram illustrating a hidden node detection method according to an embodiment of the present invention.
- first and second may be used to describe various components, but the components should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another.
- the first component may be referred to as the second component, and similarly, the second component may also be referred to as the first component.
- a station is a physical layer for medium access control (MAC) and wireless medium that conforms to the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard. By any functional medium that includes an interface.
- the station STA may be divided into a station that is an access point (AP) and a station that is a non-access point (STA).
- a station (STA), which is an access point (AP), may simply be called an access point (AP), and a station (STA), which is a non-AP, may simply be called a terminal.
- the station STA may include a processor and a transceiver, and may further include a user interface and a display device.
- the processor refers to a unit designed to generate a frame to be transmitted through a wireless network or to process a frame received through the wireless network, and may perform various functions for controlling a station (STA).
- a transceiver is a unit that is functionally connected to a processor and is designed to transmit and receive a frame through a wireless network for a station (STA).
- An access point is a centralized controller, a base station (BS), a radio access station, a node B, an evolved node B, and a mobile multihop relay (MMR) -BS. May refer to a base transceiver system (BTS), a site controller, or the like, and may include some or all of the functions thereof.
- BTS base transceiver system
- site controller or the like, and may include some or all of the functions thereof.
- the terminal may be a wireless transmit / receive unit (WTRU), a user equipment (UE), a user terminal (UT), an access terminal (AT), a mobile station (MS), May refer to a mobile terminal, a subscriber unit, a subscriber station (SS), a wireless device, or a mobile subscriber unit, and some of them. Or all of the functions may be included.
- WTRU wireless transmit / receive unit
- UE user equipment
- UT user terminal
- AT access terminal
- MS mobile station
- SS subscriber station
- wireless device or a mobile subscriber unit, and some of them. Or all of the functions may be included.
- a desktop computer a laptop computer, a tablet PC, a wireless phone, a mobile phone, a smart phone, a smart watch capable of communicating with the terminal (smart watch), smart glass, e-book reader, portable multimedia player (PMP), portable game machine, navigation device, digital camera, digital multimedia broadcasting (DMB) player, digital voice Digital audio recorder, digital audio player, digital picture recorder, digital picture player, digital video recorder, digital video player ) Can be used.
- PMP portable multimedia player
- DMB digital multimedia broadcasting
- FIG. 1 is a conceptual diagram illustrating an embodiment of a configuration of an IEEE 802.11 WLAN system.
- an IEEE 802.11 WLAN system includes at least one basic service set (BSS).
- BSS means a set of stations (STA 1, STA 2 (AP 1), STA 3, STA 4, STA 5 (AP 2)) that can be successfully synchronized to communicate with each other, the concept of a specific area is no.
- BSS can be classified into Infrastructure BSS (Independent BSS) and Independent BSS (IBSS), and BSS 1 and BSS 2 represent Infrastructure BSS.
- BSS 1 connects a terminal (STA 1), an access point (STA 2 (AP 1)) providing a distribution service and a plurality of access points (STA 2 (AP 1), STA 5 (AP 2)) It may include a distribution system (DS).
- STA 2 an access point STA 2 (AP 1) may manage a terminal STA 1.
- BSS 2 connects a terminal (STA 3, STA 4), an access point (STA 5 (AP 2)) providing a distribution service and a plurality of access points (STA 2 (AP 1), STA 5 (AP 2)) It may include a distribution system.
- an access point STA 5 (AP 2) may manage terminals STA 3 and STA 4.
- IBSS is a BSS that operates in an ad-hoc mode. Since the IBSS does not include an access point, there is no centralized management entity. That is, in the IBSS, terminals are managed in a distributed manner. In IBSS, all terminals may be mobile terminals, and thus, are not allowed to be connected to the distribution system (DS), thereby forming a self-contained network.
- DS distribution system
- the access points STA 2 (AP 1) and STA 5 (AP 2) may provide access to the distributed system DS through the wireless medium for the terminals STA 1, STA 3, and STA 4 coupled thereto. Can be. Communication between terminals STA 1, STA 3, and STA 4 in BSS 1 or BSS 2 is generally performed through an access point STA 2 (AP 1) or STA 5 (AP 2), but a direct link (direct link) If the link is configured, direct communication between the terminals STA 1, STA 3, and STA 4 is possible.
- the plurality of infrastructure BSSs may be interconnected through a distribution system (DS).
- DS distribution system
- a plurality of BSSs connected through a distribution system (DS) is called an extended service set (ESS).
- Stations included in the ESS may communicate with each other, and the UE may move from one BSS to another BSS while seamlessly communicating within the same ESS.
- a distribution system is a mechanism for one access point to communicate with another access point, whereby the access point transmits a frame or moves to another BSS for terminals coupled to the BSS it manages.
- a frame may be transmitted for any terminal.
- the access point may transmit and receive frames with an external network such as a wired network.
- Such a distribution system (DS) does not necessarily need to be a network, and there is no limitation on its form as long as it can provide a predetermined distribution service defined in the IEEE 802.11 standard.
- the distribution system may be a wireless network such as a mesh network or a physical structure that connects access points to each other.
- a method for mitigating a hidden node problem may be applied to the above-described IEEE 802.11 WLAN system, and in addition to an IEEE 802.11 WLAN system, a WPAN (wireless personal area network) , 2G mobile communications such as wireless body area network (WBAN), wireless broadband internet (WBro) or world interoperability for microwave access (WiMax), global system for mobile communication (GSM) or code division multiple access (CDMA) Network, 3G mobile network such as wideband code division multiple access (WCDMA) or cdma2000, 3.5G mobile network such as high speed downlink packet access (HSDPA) or high speed uplink packet access (HSUPA), long term evolution (LTE) Alternatively, the present invention may be applied to various networks such as 4G mobile communication networks such as LTE-Advanced and 5G mobile communication networks.
- WPAN wireless personal area network
- 2G mobile communications such as wireless body area network (WBAN), wireless broadband internet (WBro) or world interoperability for microwave access (WiMax), global system for
- MAC frames are largely classified into data frames, management frames, and control frames.
- the data frame includes data to be transmitted to the terminal and is transmitted from the upper layer to the terminal.
- Management frames are used to support IEEE 802.11 services.
- Control frames are used to support the transmission of data frames and management frames.
- the management frame includes an association request frame, an association response frame, a reassociation request frame, a reassociation response frame, a probe request frame, and a probe response.
- Frame beacon frame, authentication frame, action frame and the like.
- Control frames include block acknowledgment (ACK) request frames, block ACK frames, power save (POLL) -Poll frames, request to send (RTS) frames, clear to send (CTS) frames, ACK frames, and content free (CF) ) -End frame.
- ACK block acknowledgment
- POLL power save
- RTS request to send
- CTS clear to send
- ACK ACK
- CF content free
- FIG. 2 is a conceptual diagram illustrating an access process of a terminal in an infrastructure BSS.
- the terminal STA In order to transmit and receive data in the intrastructure BSS, the terminal STA must first be connected to the access point AP.
- an access procedure of a terminal (STA) in an infrastructure BSS is largely 1) a probe step (AP) step (probe step), 2) an authentication step with the detected access point (AP) (authentication step) ) And 3) an association step with an authenticated access point (AP).
- the STA may first detect neighboring access points (APs) through a detection process.
- the detection process is divided into a passive scanning method and an active scanning method.
- the passive scanning method may be performed by overhearing beacons transmitted by neighboring access points (APs).
- the active scanning method may be performed by broadcasting a probe request frame (broadcasting).
- the AP that receives the probe request frame may transmit a probe response frame corresponding to the probe request frame to the corresponding STA.
- the STA may know the presence of neighboring access points (APs) by receiving a probe response frame.
- the terminal STA performs an authentication process with the detected access point AP, and at this time, the terminal STA may perform authentication with the plurality of detected access points APs.
- An authentication algorithm according to the IEEE 802.11 standard may be divided into an open system algorithm for exchanging two authentication frames and a shared key algorithm for exchanging four authentication frames. Through the process of exchanging an authentication request frame and an authentication response frame based on the authentication algorithm, the terminal STA may perform authentication with the access point AP.
- the terminal STA may select one of the authenticated access points APs and perform a connection process with the selected access point AP. That is, the terminal STA transmits a connection request frame to the selected access point AP, and the access point AP that receives the connection request frame transmits a connection response frame corresponding to the connection request frame to the corresponding STA. do. As such, through the process of exchanging the connection request frame and the connection response frame, the STA may perform a connection process with the access point AP.
- FIG. 3 is a conceptual diagram illustrating an embodiment of a data transmission process of an access point.
- the AP may broadcast a beacon periodically, and may broadcast a beacon including a delivery traffic indication message (DTIM) at three beacon intervals.
- Terminals STA 1 and STA 2 of a power save mode (PSM) periodically wake up to receive a beacon and check a traffic indication map (TIM) or DTIM included in the beacon to be transmitted to them. Make sure the data is buffered at the access point. In this case, when the buffered data is present, the terminals STA 1 and STA 2 remain awake to receive data from the access point AP, and when the buffered data does not exist, the terminals STA 1 and STA 2. ) Returns to the power saving state (ie, the doze state).
- PSM power save mode
- the STA (STA 1, STA 2) is a PS-Poll frame (notifying that it is awake and ready to receive data)
- a trigger frame is transmitted to the access point, and the access point AP receives a PS-Poll frame (or a trigger frame) so that the terminals STA 1 and STA 2 can receive data.
- the access point AP may transmit data or ACK to the terminals STA 1 and STA 2.
- the access point AP may transmit data to the terminals STA 1 and STA 2 at an appropriate time.
- the bit in the TIM corresponding to its AID is set to 0, the terminals STA 1 and STA 2 return to the power saving state.
- a UE follows a carrier sensing multiple access (CSMA) / collision avoidance (CA) scheme to access a wireless channel. That is, the terminal may check the occupancy state of the corresponding wireless channel before accessing the wireless channel. Occupancy check of the wireless channel is performed through channel sensing to detect whether there is a certain level of energy in the wireless channel.
- CSMA carrier sensing multiple access
- CA collision avoidance
- the terminal may wait for a random backoff time and then perform channel sensing again. On the other hand, if energy below a certain level is detected and the corresponding channel is determined to be idle, the terminal may access the corresponding channel and transmit a signal.
- the first transmitting terminal transmits a signal and the second transmitting terminal incorrectly determines that the wireless channel is idle even though the wireless channel is occupied, and transmits a signal, a collision between two signals occurs and the receiving terminal normally receives two signals. Cannot be received. In this case, the transmitting terminals attempt to retransmit due to the transmission failure of the signal, thereby degrading the efficiency of the radio channel. This phenomenon is called a hidden node problem in a WLAN system.
- FIG. 4 is a conceptual diagram illustrating a hidden node problem between terminals.
- a hidden node problem generally occurs between terminals STA 1 and STA 2 located at cell boundaries opposite to each other about an access point AP. That is, when the first terminal STA 1 and the second terminal STA 2 are in a hidden node relationship, the first terminal STA 1 may receive a signal transmitted from the access point AP, but the second terminal STA 2) cannot receive a signal transmitted from the second terminal STA 2 can receive a signal transmitted from the access point AP, but cannot receive a signal transmitted from the first terminal STA 1. .
- the first terminal STA 1 and the second terminal STA 2 do not know each other, the first terminal STA 1 and the second terminal STA 2 simultaneously transmit signals. In this case, a collision between two signals occurs, and the access point AP cannot receive both signals.
- the terminal cannot determine whether to transmit a signal of the other terminal regardless of channel sensing performance.
- a WLAN system composed of thousands of sensor terminals (that is, low power terminals)
- there may be a plurality of sensor terminals in a hidden node relationship and thus retransmissions due to signal collisions and signal collisions frequently occur between the sensor terminals. Occurs and the efficiency of the radio channel is drastically lowered.
- FIG. 5 is a conceptual diagram illustrating a power saving mode in a WLAN system.
- the AP may broadcast a beacon at every beacon interval, and the terminals STA 1, STA 2,..., STA 4 which are in a power saving state periodically wake up to access point (AP).
- Receive beacons transmitted from < RTI ID 0.0 >
- the beacon may include information (ie, TIM) indicating whether data destined for a specific terminal STA 1, STA 2,..., STA 4 is buffered in the access point AP.
- IE TIM information element
- FIG. 6 is a conceptual diagram illustrating a structure of a TIM IE included in a beacon frame.
- the TIM IE includes an element ID field, a length field, a DTIM count field, a DTIM period field, a bitmap control field, a partial virtual bitmap ( partial virtual bitmap) field.
- the bitmap control field may include 1 bit for AID 0 and a bitmap offset.
- the partial virtual bitmap field may include information indicating a terminal to receive data buffered at the access point.
- the UEs STA 1, STA 2,..., STA 4 that have received the beacon check the bits corresponding to their AIDs in the bitmap control field and the partial virtual bitmap field included in the TIM IE. By doing so, it can be confirmed that data to be transmitted to the user is buffered in the AP. If the data to be transmitted to the AP is buffered in the AP, the terminal STA 1, STA 2,..., STA 4 are ready to receive the data by transmitting the PS-Poll frame to the AP. It can inform the access point (AP).
- the access point AP may transmit the buffered data to the corresponding terminal.
- a terminal operating in the power saving mode (STA 1, STA 2, ..., STA 4) can wake up in every beacon period to check the TIM IE by waking up each beacon when the DTIM count becomes 0 according to the DTIM cycle without checking the TIM IE. .
- the AP may simultaneously set the bits corresponding to the plurality of terminals STA 1, STA 2,..., And STA 4 in the partial virtual bitmap, and in this case, the terminal STA 1, STA 2,..., STA 4 ) Has a radio channel access contention to transmit the PS-Poll frame immediately after receiving the beacon frame.
- transmission of PS-Poll frames is simultaneously attempted from a plurality of terminals STA 1, STA 2,..., STA 4 within a short time.
- the terminals STA 1, STA 2,... In the case of many STAs 4), collision between PS-Poll frames and retransmission accordingly occur.
- RAW 7 is a conceptual diagram illustrating a scheduling method based on a restricted access window (RAW).
- RAW restricted access window
- the access point may generate a beacon including RPS (RAW parameter set) information for scheduling of the terminal.
- RPS includes the same group indication field, periodic RAW (PRAW) indication field, page ID field, RAW start AID field, RAW end AID field, RAW start time Field, RAW duration field, access restricted to paged STA only field, group / resource allocation frame indication field, sounding RAW field, Slot definition field and the like.
- PRAW periodic RAW
- the RPS may further include a hidden node detecting RAW field, a hidden node reporting RAW field, and the like.
- the access point may define a RAW section from the RAW start time to the RAW period, and allow channel access to a terminal group specified between the RAW start AID and the RAW end AID within the page ID.
- the access point may divide the RAW period into a plurality of time slots according to the slot definition field, and allocate a terminal belonging to a group designated in the corresponding RAW to each time slot.
- One time slot may have a certain length, and at least one terminal may be allocated to one time slot.
- a method of allocating a terminal to a time slot may be defined separately in the slot definition field or may be inferred by the terminal according to a predetermined rule using the AID location information of the terminal.
- FIG. 8 is a conceptual diagram illustrating a continuous RAW-based scheduling method.
- the access point may generate a beacon including a plurality of RPSs (ie, RPS 1 and RPS 2). That is, the access point can set the continuous RAW section using the RPS 1 and RPS 2.
- the access point may use the same group indication field included in RPS 2 to indicate that the terminal group of RPS 2 is the same as the terminal group designated by the previous RPS 1, thereby enabling RAW start AID, RAW end AID, etc. This omitted RPS 2 can be generated.
- the group / resource allocation frame indication field may indicate that a group / resource allocation frame (ie, RA frame) indicating separate time slot allocation information is received at the start of the RAW period.
- a group / resource allocation frame ie, RA frame
- the access point can allocate a time slot for the transmission of the PS-Poll frame to the terminal in the RAW 1 section, and transmit the PS-Poll frame to transmit the actual data in the RAW 2 section. Only the terminal can assign a time slot.
- the terminals when the terminals are scheduled to access the channel within an arbitrary time slot, the terminals simultaneously accessing the channel immediately after receiving the beacon frame are distributed in time, thereby alleviating channel access contention and frame collision problems. You can.
- time slots may be wasted, thereby reducing efficiency of channel usage.
- a plurality of terminals may be allocated to one time slot.
- FIG. 9 is a conceptual diagram illustrating a nested RAW-based scheduling method.
- the access point may generate a beacon including a plurality of RPSs (ie, RPS 1 and RPS 2). That is, the access point may allocate a plurality of terminals to the same time slot by changing only the RAW start AID and RAW end AID sections in RPS 1 and RPS 2.
- FIG. 10 is a flowchart illustrating a method for setting a limited access section according to an embodiment of the present invention
- FIG. 11 is a conceptual diagram illustrating a method for setting a limited access section according to an embodiment of the present invention.
- the access point may set the first limited access section RAW 1 (S100).
- the first limited access section RAW 1 may start at a first time point T 1 within the beacon interval and may be used for channel access of a first terminal group including at least one terminal.
- the first restricted access interval RAW 1 may include at least one time slot, and different time slots may be allocated to each time slot.
- the setting information (RPS 1) of the first restricted access section (RAW 1) includes the same group indication field, PRAW indication field, page ID field, RAW start AID 1 field, RAW end AID 1 field, RAW start time 1 field, and RAW period. 1 field, restricted access field for paged STA, group / resource allocation frame indication field, sounding RAW field, slot definition field and the like.
- the configuration information RPS 1 of the first limited access section RAW 1 may further include a hidden node detection RAW field, a hidden node reporting RAW field, and the like.
- the access point may allocate from the terminal having AID 1 to the terminal having AID 9 in each time slot.
- the access point may establish a second restricted access section (RAW 2) (S110).
- the second restricted access section RAW 2 may start at a second time point T 1 + T d , which is after a predefined time T d from the first time point T 1 within the beacon interval, and at least one terminal. It can be used for channel access of the second terminal group including.
- the second restricted access section RAW 2 may include at least one time slot, and different time slots may be allocated to each time slot.
- the first limited access section RAW 1 and the second limited access section RAW 2 may overlap from the second time point T 1 + T d . That is, the time slot included in the first limited access section RAW 1 may overlap with the time slot included in the second limited access section RAW 2.
- the predefined time T d is greater than the sum of the length of the PS-Poll frame (ie the time the PS-Poll frame is transmitted) and the distributed interframe space (DIFS) and the length of the time slot (ie , Time slot is transmitted).
- DIFS distributed interframe space
- the second terminal group may include terminals other than the terminals included in the first terminal group, and may have a lower priority than the first terminal group. That is, the access point may allocate the specific terminal group to the limited access section having the fastest RAW start time when it is desired to set the priority of the specific terminal group higher. For example, the access point may allocate the first terminal group to the first limited access section RAW 1 when the priority of the first terminal group is to be set higher.
- the setting information (RPS 2) of the second restricted access section (RAW 2) includes the same group indication field, PRAW indication field, page ID field, RAW start AID 2 field, RAW end AID 2 field, RAW start time 2 field, and RAW period. 2 fields, restricted access fields for paged STAs, group / resource allocation frame indication fields, sounding RAW fields, slot definition fields, and the like.
- the configuration information RPS 2 of the second limited access section RAW 2 may further include a hidden node detection RAW field, a hidden node reporting RAW field, and the like.
- the access point may allocate from the terminal having AID 10 to the terminal having AID 18 in each time slot.
- RAW start time 2 may be defined as Equation 1 below.
- the access point may generate a beacon including the setting information RPS 1 of the first limited access section RAW 1 and the setting information RPS 2 of the second limited access section RAW 2 (S120).
- the beacon may be transmitted (S130).
- the second limited access section is established.
- the tenth terminal that is, the terminal having AID 10 assigned to the first time slot of the interval (RAW 2) is the first terminal (ie, the AID allocated to the first time slot of the first restricted access interval (RAW 1)). Even if the UE has a hidden node relationship), the PS-Poll frame transmission time of the first terminal is avoided, so that the collision between the PS-Poll frames does not occur.
- the frame transmitted after the PS-Poll frame transmission of the first terminal is an ACK or data frame transmitted by the access point, and since the tenth terminal and the access point are not in a hidden node relationship, the tenth terminal transmits the frame by the access point. After completing, the channel access competition may be performed.
- the tenth terminal may wake up before the start point T 1 + T d of the first time slot of the second restricted access section RAW 2.
- the tenth terminal has a starting point T 1 of the first time slot of the first restricted access section RAW 1 overlapping the first time slot of the second restricted access section RAW 2 (ie, its own time). Wake up T d before the start of the time slot.
- the tenth terminal When waking up from the start point T 1 of the first time slot of the first restricted access interval (RAW 1), the tenth terminal is between the other terminal and the access point in the first time slot of the first limited access interval (RAW 1). You can check whether there is frame transmission or reception. Through this, the tenth terminal may check even if the terminal having a hidden node relationship with the tenth terminal transmits and receives a frame through the first time slot of the first restricted access section RAW.
- FIG. 12 is a flowchart illustrating a method for setting a limited access section according to another embodiment of the present invention
- FIG. 13 is a conceptual diagram illustrating a method for setting a limited access section according to another embodiment of the present invention.
- the access point may set a limited access section (S200).
- the restricted access interval is located within the beacon interval and may be used for channel access of the terminals.
- the access point may set a time offset between the first sub-limited access section RAW 1 and the second sub-limited access section RAW 2 included in the restricted access section (S210).
- the first sub-limited access section RAW 1 may start at a first time point T 1 within an interval of a beacon frame and may be used for channel access of a first terminal group including at least one terminal.
- the first sub-limited access period RAW 1 includes at least one time slot, and different time slots may be allocated to each time slot.
- the second sub-limited connection interval RAW 2 may start at a second time point T 1 + T d , which is after a time offset T d from the first time point T 1 in the beacon frame interval, at least one It may be used for channel access of a second terminal group including a terminal.
- the second sub-limited access period RAW 2 includes at least one time slot, and different time slots may be allocated to each time slot.
- the first sub-limited connection section RAW 1 and the second sub-limited connection section RAW 2 may overlap from the time indicated by the time offset. That is, the time slot included in the first sub-limited access section RAW 1 may overlap with the time slot included in the second sub-limited access section RAW 2.
- the time offset T d is greater than the sum of the length of the PS-Poll frame (that is, the time when the PS-Poll frame is transmitted) and the distributed interframe space (DIFS), and the length of the time slot (that is, the time slot is transmitted). Length).
- the second terminal group may include terminals other than the terminals included in the first terminal group, and may have a lower priority than the first terminal group. That is, the access point may allocate the specific terminal group to the sub-limited access period having the fastest RAW start time when it is desired to set the priority of the specific terminal group higher. For example, the access point may allocate the first terminal group to the first sub-limited access period RAW 1 when the priority of the first terminal group is to be set higher.
- the access point may generate setting information of the limited access section including the time offset (S220).
- the setting information (RPS) of the restricted access section includes the same group indication field, PRAW indication field, page ID field, RAW start AID 1 field, RAW end AID 1 field, RAW start time 1 field, RAW period 1 field, and paged STA.
- Limited access field group / resource allocation frame indication field, sounding RAW field, slot definition field, deferred RAW start time offset field, and the like.
- the configuration information (RPS) of the restricted access section may further include a hidden node detection RAW field, a hidden node reporting RAW field, and the like.
- the deferred RAW start time offset field when the deferred RAW start time offset field is set to any value other than 0, this means that the restricted access section is composed of a plurality of sub-limited access sections, and the starting point of each sub-limited access section is Has a time offset of any value.
- the slot definition field may include terminal group information to be allocated to each sub-limited access period, or may include terminal information to be allocated to a time slot of each sub-limited access period.
- the access point may generate a beacon including the setting information of the restricted access section (S230), and transmit the generated beacon (S240).
- the tenth terminal allocated to the first time slot of the second sub-limited access section (RAW 2) (ie, the terminal having AID 10) is allocated to the first time slot of the first sub-limited access section (RAW 1). Even if the first terminal (that is, the terminal having AID 1) is in a hidden node relationship, the PS-Poll frame transmission time of the first terminal is avoided, so that collision between PS-Poll frames does not occur.
- the tenth terminal may wake up before the start point T 1 + T d of the first time slot of the second sub-limited access section RAW 2.
- the tenth terminal includes a starting point T 1 of the first time slot of the first sub-limited access section RAW 1 that overlaps the first time slot of the second sub-limited access section RAW 2 ( That is, it can wake up at a time T d before the start point of its time slot.
- the tenth terminal is another terminal in the first time slot of the first sub-limited connection interval RA 1. It can be checked whether there is a frame transmission or reception between the AP and the access point. By doing so, the tenth terminal may check the terminal even if the terminal in a hidden node relationship transmits and receives a frame through the first time slot of the first sub-limited access period (RAW 1).
- the fifth terminal that is, the terminal having AID 5
- the second sub-limited connection section RAW 2 Since the twelfth terminal (that is, the terminal having AID 12) allocated to the third time slot of the Tx can transmit the PS-Poll frame, it is possible to prevent the time slot from being wasted.
- FIG. 14 is a first flowchart illustrating a hidden node detection method according to an embodiment of the present invention
- FIG. 15 is a second flowchart illustrating a hidden node detection method according to an embodiment of the present invention
- an access point is used for a plurality of terminals STA 1, STA 2, STA 3, and STA 4 that transmit a hidden node detecting (HND) frame.
- 1 Limited access section (RAW 1) can be set (S300).
- the HND frame is a frame transmitted by each terminal STA 1, STA 2, STA 3, and STA 4 to detect a hidden node, and may be a null data packet (NDP) frame.
- the first limited access section RAW 1 may include a plurality of time slots, and one terminal may be allocated to one time slot.
- the access point AP may allocate the first terminal STA 1 having AID 1 to the first time slot in the first restricted access interval RAW 1, and assign AID 2 to the second time slot.
- the branch may allocate a second terminal STA 2, the third terminal STA 3 having AID 3 in the third time slot, and the fourth terminal STA having AID 4 in the fourth time slot. 4) can be assigned.
- the setting information (RPS 1) of the first restricted access section (RAW 1) includes the same group indication field, PRAW indication field, page ID field, RAW start AID field, RAW end AID field, RAW start time field, RAW period field, page It may include a limited access field, group / resource allocation frame indication field, sounding RAW field, HND RAW field, slot definition field and the like for the STA.
- the AP may allocate a plurality of terminals STA 1, STA 2, STA 3, and STA 4 to the first limited access section RAW 1 through the setting of the HND RAW field.
- An access point (AP) is a second limited used for a plurality of terminals (STA 1, STA 2, STA 3, STA 4) transmitting a hidden node reporting (HNR) frame generated based on the HND frame
- the access section RAW 2 may be set (S310).
- the HNR frame may include information on the HND frame received by each terminal STA 1, STA 2, STA 3, or STA 4 from another terminal. That is, the HNR frame may include at least one of a MAC address, an AID, and a BSSID for a terminal transmitting the HND frame. In addition, the HNR frame may further include a signal strength of the HND frame.
- the second restricted access section RAW 2 may begin after the end of the first restricted access section RAW 1.
- the second limited access section RAW 2 may include a plurality of time slots, and one terminal may be allocated to one time slot.
- the access point AP may allocate the first terminal STA 1 having AID 1 to the first time slot in the second restricted access section RAW 2, and assign the AID 2 to the second time slot.
- the branch may allocate a second terminal STA 2, the third terminal STA 3 having AID 3 in the third time slot, and the fourth terminal STA having AID 4 in the fourth time slot. 4) can be assigned.
- the access point AP may access the second restricted access section RAW 2 in the same order as that of the plurality of terminals STA 1, STA 2, STA 3, and STA 4 allocated to the first limited access section RAW 1.
- a plurality of terminals STA 1, STA 2, STA 3, and STA 4 may be allocated to the terminals.
- the setting information (RPS 2) of the second restricted access section (RAW 2) includes the same group indication field, PRAW indication field, page ID field, RAW start AID field, RAW end AID field, RAW start time field, RAW period field, page It may include a limited access field, a group / resource allocation frame indication field, a sounding RAW field, an HNR RAW field, a slot definition field and the like for the STA.
- the AP may assign a plurality of terminals STA 1, STA 2, STA 3, and STA 4 to the second limited access section RAW 2 through the setting of the HNR RAW field.
- the access point AP may generate a beacon including setting information RPS 1 of the first limited access section RAW 1 and setting information RPS 2 of the second limited access section RAW 2 (S320). .
- the access point AP may transmit the generated beacon (S330).
- Each terminal STA 1, STA 2, STA 3, and STA 4 may receive a beacon from the access point AP.
- Each of the terminals STA 1, STA 2, STA 3, and STA 4 includes configuration information RPS 1 of the first limited access section RAW 1 included in the beacon and configuration information of the second limited access section RAW 1.
- a time slot allocated to itself may be acquired based on (RPS 2) (S340).
- each of the terminals STA 1, STA 2, STA 3, and STA 4 has a first limited access section (based on the HND RAW field included in the configuration information RPS 1 of the first limited access section RAW 1). It is possible to obtain a time slot allocated to itself in RAW 1).
- each of the terminals STA 1, STA 2, STA 3, and STA 4 includes a second limited access section (based on the HNR RAW field included in the configuration information RPS 2 of the second limited access section RAW 2). It is possible to acquire a time slot assigned to itself in RAW 2).
- Each terminal STA 1, STA 2, STA 3, and STA 4 may transmit an HND frame in a time slot allocated to it among the first limited access interval RA 1, and may be different in a time slot not allocated to it.
- the terminal may receive an HND frame transmitted.
- each terminal STA 1, STA 2, STA 3, and STA 4 may transmit the HND frame through broadcasting.
- the first terminal STA 1 may transmit the first HND frame in the first time slot when the first time slot is allocated to the first time slot among the first limited access interval RAW 1, and the first time slot In another time slot other than the HND frame transmitted by another terminal may be received (S350). That is, the first terminal STA 1 may always keep awake state in the first limited access section RAW 1.
- the second terminal STA 2 may transmit the second HND frame in the second time slot when the second time slot is allocated to the second time slot among the first limited access interval RAW 1, and may be configured to transmit a time other than the second time slot.
- an HND frame transmitted by another terminal may be received in a slot. That is, the second terminal STA 2 may always keep awake state in the first limited access section RAW 1.
- the third terminal STA 3 may transmit the third HND frame in the third time slot when the third time slot is allocated to the third time slot among the first limited access interval RAW 1, and a time other than the third time slot may be transmitted.
- an HND frame transmitted by another terminal may be received in a slot. That is, the third terminal STA 3 may always keep awake state in the first limited access section RAW 1.
- the fourth terminal STA 4 may transmit the fourth HND frame in the fourth time slot when the fourth time slot is allocated to the fourth time slot among the first limited access interval RAW, and may be configured to transmit a time other than the fourth time slot.
- an HND frame transmitted by another terminal may be received in a slot. That is, the fourth terminal STA 4 may always keep awake state in the first limited access section RAW 1.
- Each terminal STA 1, STA 2, STA 3, and STA 4 may generate an HNR frame including information on the received HND frame (S390). For example, when the first terminal STA 1 receives only the second HND frame from the second terminal STA 2, the first terminal STA 1 may generate an HNR frame including information on the second HND frame, or the second terminal ( When the second HND frame is received from the STA 2) and the third HND frame is received from the third terminal STA 3, an HNR frame including information on the second HND frame and information on the third HND frame may be generated. have.
- each terminal STA 1, STA 2, STA 3, and STA 4 may generate an HNR frame including information on the HND frame received from the UE belonging to the same BSS among the received HND frames.
- the first terminal STA 1 receives a second HND frame from a second terminal STA 2 belonging to the same BSS as its own, and receives a third HND from a third terminal STA 3 belonging to a different BSS from its own.
- an HNR frame including only information on the second HND frame may be generated.
- Each terminal STA 1, STA 2, STA 3, and STA 4 may transmit an HNR frame in a time slot allocated to the terminal among the second limited access interval RAW 2.
- the first terminal STA 1 may transmit the first HNR frame to the access point AP in the first time slot when the first time slot is allocated to the first time slot among the second restricted access interval RAW 2.
- an ACK that is a response to the first HNR frame may be received from the access point AP in operation S410.
- the first terminal STA 1 may operate in a power saving mode in a time slot except the first time slot in the second limited access section RAW 2.
- the second terminal STA 2 may transmit the second HNR frame to the access point AP in the second time slot when the second time slot is allocated to the second limited access interval RAW (S420).
- an ACK which is a response to the second HNR frame, may be received from the access point (AP).
- the second terminal STA 2 may operate in a power saving mode in a time slot except for a second time slot among the second limited access section RAW 2.
- the third terminal STA 3 may transmit the third HNR frame to the access point AP in the third time slot when the third time slot is allocated to the third time slot among the second restricted access interval RAW (S440).
- an ACK which is a response to the third HNR frame, may be received from the access point (AP).
- the third terminal STA 3 may operate in a power saving mode in a time slot except a third time slot in the second limited access section RAW 2.
- the fourth terminal STA 4 may transmit the fourth HNR frame to the access point AP in the fourth time slot when the fourth time slot is allocated to the fourth time slot among the second limited access section RA 2 (S460).
- an ACK which is a response to the fourth HNR frame, may be received from the access point (AP).
- the fourth terminal STA 4 may operate in a power saving mode in a time slot except a fourth time slot in the second limited access section RAW 2.
- An access point is a hidden node relationship among the plurality of terminals STA 1, STA 2, STA 3, and STA 4 based on the HNR frames received from the plurality of terminals STA 1, STA 2, STA 3, and STA 4.
- the terminal can be detected (S480).
- the access point AP includes only information on a second HND frame (that is, a frame transmitted by the second terminal STA 2) in the first HNR frame received from the first terminal STA 1. If so, the third terminal STA 3 and the fourth terminal STA 4 may be determined to be terminals in a hidden node relationship with the first terminal STA 1.
- a second HND frame that is, a frame transmitted by the second terminal STA 2
- the third terminal STA 3 and the fourth terminal STA 4 may be determined to be terminals in a hidden node relationship with the first terminal STA 1.
- the access point AP may transmit information on the second HND frame and the third HND frame (that is, the frame transmitted by the third terminal STA 3) to the first HNR frame received from the first terminal STA 1. If the information about the UE 4 STA (STA 4) can be determined to be a terminal in a hidden node relationship with the first terminal (STA 1).
- the access point AP may include information on a second HND frame, information on a third HND frame, and a fourth HND frame (that is, a fourth terminal) in the first HNR frame received from the first terminal STA 1. If information on the frame transmitted by STA 4) is included, it may be determined that there is no terminal in a hidden node relationship with the first terminal STA 1.
- the access point AP may allocate the terminals STA 1, STA 2, STA 3, and STA 4 to time slots based on the detected hidden node relationship (S490). That is, the access point AP may allocate each terminal to the time slot so that terminals in the hidden node relationship are not allocated to the same time slot.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (13)
- 액세스 포인트(access point)에서 수행되는 숨겨진 노드(hidden node) 검출 방법으로서,숨겨진 노드 검출(hidden node detecting, HND) 프레임을 전송하는 복수의 단말을 위해 사용되는 제1 제한된 접속 구간을 설정하는 단계;상기 HND 프레임을 기초로 생성된 숨겨진 노드 보고(hidden node reporting, HNR) 프레임을 전송하는 상기 복수의 단말을 위해 사용되는 제2 제한된 접속 구간을 설정하는 단계;상기 제1 제한된 접속 구간의 설정 정보 및 상기 제2 제한된 접속 구간의 설정 정보를 포함한 비컨을 생성하는 단계; 및생성된 비컨을 전송하는 단계를 포함하는 것는 숨겨진 노드 검출 방법.
- 청구항 1에 있어서,상기 숨겨진 노드 검출 방법은,상기 제2 제한된 접속 구간에서 상기 복수의 단말로부터 상기 HNR 프레임을 수신하는 단계; 및수신된 HNR 프레임을 기초로 상기 복수의 단말 중에서 숨겨진 노드 관계에 있는 단말을 검출하는 단계를 더 포함하는 것을 특징으로 하는 숨겨진 노드 검출 방법.
- 청구항 1에 있어서,상기 HND 프레임은,NDP(null data packet) 프레임인 것을 특징으로 하는 숨겨진 노드 검출 방법.
- 청구항 1에 있어서,상기 HNR 프레임은,각각의 단말이 수신한 상기 HND 프레임에 대한 정보를 포함하는 것을 특징으로 하는 숨겨진 노드 검출 방법.
- 청구항 4에 있어서,상기 HNR 프레임은,상기 HND 프레임을 전송한 송신 단말에 대한 MAC(medium access control) 주소, AID(association ID) 및 BSSID(basic service set ID) 중 적어도 하나를 포함하는 것을 특징으로 하는 숨겨진 노드 검출 방법.
- 청구항 1에 있어서,상기 제2 제한된 접속 구간은,상기 제1 제한된 접속 구간의 종료 후에 시작되는 것을 특징으로 하는 숨겨진 노드 검출 방법.
- 청구항 1에 있어서,상기 제2 제한된 접속 구간에는,상기 제1 제한된 접속 구간에 할당된 상기 복수의 단말의 순서와 동일하게 상기 복수의 단말이 할당되는 것을 특징으로 하는 숨겨진 노드 검출 방법.
- 단말에서 수행되는 숨겨진 노드(hidden node) 검출 방법으로서,액세스 포인트(access point)로부터 비컨(beacon)을 수신하는 단계;상기 비컨에 포함된 제1 제한된 접속 구간의 설정 정보 및 제2 제한된 접속 구간의 설정 정보를 기초로 상기 단말에 할당된 타임 슬롯(time slot)을 획득하는 단계;상기 제1 제한된 접속 구간 중 상기 단말에게 할당된 타임 슬롯에서 숨겨진 노드 검출(hidden node detecting, HND) 프레임을 전송하고 상기 단말에게 할당되지 않은 타임 슬롯에서 다른 단말이 전송하는 HND 프레임을 수신하는 단계;수신된 HND 프레임에 대한 정보를 포함한 숨겨진 노드 보고(hidden node reporting, HNR) 프레임을 생성하는 단계; 및상기 제2 제한된 접속 구간 중 상기 단말에게 할당된 타임 슬롯에서 상기 HNR 프레임을 전송하는 단계를 포함하는 숨겨진 노드 검출 방법.
- 청구항 8에 있어서,상기 HND 프레임은,NDP(null data packet) 프레임인 것을 특징으로 하는 숨겨진 노드 검출 방법.
- 청구항 8에 있어서,상기 수신된 HND 프레임은,상기 단말과 동일한 BSS(basic service set)에 속하는 단말로부터 수신된 것임을 특징으로 하는 숨겨진 노드 검출 방법.
- 청구항 8에 있어서,상기 HNR 프레임은,상기 HND 프레임을 전송한 송신 단말에 대한 MAC(medium access control) 주소, AID(association ID) 및 BSSID(basic service set ID) 중 적어도 하나를 포함하는 것을 특징으로 하는 숨겨진 노드 검출 방법.
- 청구항 8에 있어서,상기 제2 제한된 접속 구간은,상기 제1 제한된 접속 구간의 종료 후에 시작되는 것을 특징으로 하는 숨겨진 노드 검출 방법.
- 청구항 8에 있어서,상기 제2 제한된 접속 구간에는,상기 제1 제한된 접속 구간에 할당된 상기 복수의 단말의 순서와 동일하게 상기 복수의 단말이 할당되는 것을 특징으로 하는 숨겨진 노드 검출 방법.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201480026285.4A CN105191474B (zh) | 2013-05-10 | 2014-05-08 | 用于缓解无线局域网系统中的隐藏节点问题的方法 |
US14/786,176 US9706551B2 (en) | 2013-05-10 | 2014-05-08 | Method for alleviating hidden node problem in WLAN system |
US15/616,046 US10098114B2 (en) | 2013-05-10 | 2017-06-07 | Method for alleviating hidden node problem in WLAN system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20130053380 | 2013-05-10 | ||
KR10-2013-0053380 | 2013-05-10 |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/786,176 A-371-Of-International US9706551B2 (en) | 2013-05-10 | 2014-05-08 | Method for alleviating hidden node problem in WLAN system |
US15/616,046 Continuation US10098114B2 (en) | 2013-05-10 | 2017-06-07 | Method for alleviating hidden node problem in WLAN system |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014182090A1 true WO2014182090A1 (ko) | 2014-11-13 |
Family
ID=51867491
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2014/004100 WO2014182090A1 (ko) | 2013-05-10 | 2014-05-08 | 무선랜 시스템에서 숨겨진 노드 문제의 완화 방법 |
Country Status (4)
Country | Link |
---|---|
US (2) | US9706551B2 (ko) |
KR (2) | KR102175543B1 (ko) |
CN (1) | CN105191474B (ko) |
WO (1) | WO2014182090A1 (ko) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016167563A1 (ko) * | 2015-04-15 | 2016-10-20 | 엘지전자 주식회사 | 비면허 대역 상에서 단말이 데이터를 수신하는 방법 및 장치 |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110034790B (zh) * | 2012-09-04 | 2022-06-03 | 韩国电子通信研究院 | 进行扇区训练操作的方法和装置 |
CN105472633B (zh) * | 2014-05-29 | 2020-12-29 | 索尼公司 | 用于时分双工无线通信小区间同步检测的电子设备和方法 |
US10390341B2 (en) * | 2014-10-31 | 2019-08-20 | Realtek Semiconductor Corp. | Wireless communication system and associated wireless communication method |
US9788317B2 (en) * | 2015-03-30 | 2017-10-10 | Intel IP Corporation | Access point (AP), user station (STA) and method for channel sounding using sounding trigger frames |
CN106162711B (zh) * | 2015-04-10 | 2019-11-05 | 富士通株式会社 | 识别隐藏终端的方法、装置和系统 |
US10070403B2 (en) | 2016-03-09 | 2018-09-04 | Mueller International, Llc | Time beacons |
US10582347B2 (en) | 2016-04-14 | 2020-03-03 | Mueller International, Llc | SMS communication for cellular node |
CN105828452B (zh) * | 2016-05-10 | 2019-10-08 | 珠海市魅族科技有限公司 | 无线局域网的通信方法、通信装置、接入点和站点 |
US10097411B2 (en) | 2016-05-23 | 2018-10-09 | Mueller International, Llc | Node migration |
US10200947B2 (en) | 2016-07-11 | 2019-02-05 | Mueller International, Llc | Asymmetrical hail timing |
US10271352B2 (en) | 2016-07-19 | 2019-04-23 | Realtek Semiconductor Corp. | Wireless communication system and associated wireless communication method and wireless device having efficient polling mechanism in overlapping network environments |
CN109417776B (zh) * | 2016-09-30 | 2021-03-30 | 华为技术有限公司 | 一种传输消息的方法和设备 |
US10178617B2 (en) | 2017-05-01 | 2019-01-08 | Mueller International, Llc | Hail and acceptance for battery-powered devices |
US10267652B1 (en) | 2018-01-23 | 2019-04-23 | Mueller International, Llc | Node communication with unknown network ID |
US11057773B2 (en) | 2018-11-20 | 2021-07-06 | Cisco Technology, Inc. | Systems and methods for detecting access point impersonators |
CN110337125B (zh) * | 2019-04-23 | 2022-04-05 | 重庆邮电大学 | 一种5g网络中的工作站重分组方法 |
CN113163487B (zh) * | 2020-01-07 | 2022-12-27 | 维沃移动通信有限公司 | 资源调度方法、通信设备、网络设备及存储介质 |
CN113438688B (zh) * | 2021-06-24 | 2023-06-06 | 普联技术有限公司 | 一种隐藏节点的检测方法及检测装置 |
WO2024001999A1 (zh) * | 2022-06-27 | 2024-01-04 | 华为技术有限公司 | 一种通信方法及装置 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040165563A1 (en) * | 2003-02-24 | 2004-08-26 | Hsu Raymond T. | Wireless local access network system detection and selection |
KR20050003575A (ko) * | 2003-06-27 | 2005-01-12 | 삼성전자주식회사 | 시분할 방식의 무선랜 통신방법 및 시스템 |
KR100542348B1 (ko) * | 2003-09-03 | 2006-01-10 | 삼성전자주식회사 | 무선 랜 시스템의 전력 감소 방법 및 그 장치 |
KR20070116461A (ko) * | 2006-06-05 | 2007-12-10 | 삼성전자주식회사 | 비압축 av 데이터 전송을 위한 데이터 구조, 데이터 슬롯 할당 방법, 비압축 av 데이터 전송 방법, 및 상기 방법을 이용하는 장치 |
KR20110020038A (ko) * | 2009-08-21 | 2011-03-02 | 에스케이 텔레콤주식회사 | 근거리 영역에서의 방송 서비스를 위한 슈퍼프레임 구조로 이루어지는 시스템 및 방법, 그리고 이에 적용되는 장치 |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
ATE188277T1 (de) * | 1995-12-11 | 2000-01-15 | Busch Sa Atel | Zwillings-förderschrauben |
US7184407B1 (en) * | 2002-05-10 | 2007-02-27 | Cisco Systems Wireless Networking (Australia) Pty Limited | Detecting, reporting and mitigating hidden nodes in a wireless data network |
KR100570830B1 (ko) * | 2003-07-29 | 2006-04-12 | 삼성전자주식회사 | 씨에스엠에이/씨에이에 기반한 무선 랜에서의 매체 접근제어 방법 및 그 장치 |
KR20050052816A (ko) * | 2003-12-01 | 2005-06-07 | 엘지전자 주식회사 | 무선망에서 히든 스테이션 문제의 해결 방법 |
US20050213601A1 (en) * | 2004-03-29 | 2005-09-29 | Boris Ginzburg | Method and apparatus to provide hidden node protection |
GEP20094867B (en) * | 2004-08-12 | 2009-12-25 | Interdigital Tech Corp | Method and system for controlling access to a wireless communication medium |
KR101261688B1 (ko) * | 2006-01-11 | 2013-05-06 | 퀄컴 인코포레이티드 | 피어-투-피어 통신에서 식별을 제공하는 비컨 신호들의 인코딩 |
US7965681B2 (en) | 2008-05-16 | 2011-06-21 | Nokia Siemens Networks Oy | Channel allocation procedure in a meshed network |
US8625570B2 (en) * | 2008-12-31 | 2014-01-07 | Stmicroelectronics, Inc. | Robust unicast/broadcast/multicast communication protocol |
CA2771881C (en) | 2009-02-18 | 2016-05-24 | Lg Electronics Inc. | Method of controlling channel access |
KR101282362B1 (ko) * | 2009-11-24 | 2013-07-04 | 한국전자통신연구원 | 다중 사용자 기반 무선통신 시스템에서 전송 실패 프레임의 복구 방법 |
US8861383B2 (en) * | 2010-01-19 | 2014-10-14 | Cisco Technology, Inc. | Acquiring a signal parameter for a neighboring access point |
KR101758909B1 (ko) * | 2010-02-18 | 2017-07-18 | 엘지전자 주식회사 | 무선 랜에서 수신 확인 전송 방법 및 장치 |
WO2011149285A2 (ko) * | 2010-05-26 | 2011-12-01 | 엘지전자 주식회사 | 무선 랜 시스템에서 데이터 송수신 방법 및 장치 |
KR101527120B1 (ko) * | 2010-08-17 | 2015-06-08 | 삼성전자주식회사 | 멀티 유저의 txop 파워 세이빙을 위한 액티브 모드에서의 단말 및 액세스 포인트의 통신 방법 |
KR101234758B1 (ko) * | 2011-07-05 | 2013-02-19 | 서울대학교산학협력단 | 무선 접속 시스템에서 데이터 채널 예약 방법 및 장치 |
US9204371B2 (en) * | 2011-11-23 | 2015-12-01 | Marvell World Trade Ltd. | 802.11 restricted access windows |
US9295033B2 (en) * | 2012-01-31 | 2016-03-22 | Qualcomm Incorporated | Systems and methods for narrowband channel selection |
US9019874B2 (en) * | 2012-06-27 | 2015-04-28 | Nokia Corporation | Method, apparatus, and computer program product for resolving hidden node in synchronized DCF based channel access |
US9066265B2 (en) * | 2012-10-19 | 2015-06-23 | Intel Corporation | Methods and arrangements for frequency selective transmission |
US9185745B2 (en) * | 2012-11-06 | 2015-11-10 | Nokia Technologies Oy | Method, apparatus, and computer program product for relay operation in Wi-Fi networks |
US9107229B2 (en) * | 2012-12-03 | 2015-08-11 | Nokia Technologies Oy | Method, apparatus, and computer program product for signaling for sectorized beam operation in wireless networks |
-
2014
- 2014-05-08 KR KR1020140054548A patent/KR102175543B1/ko active IP Right Grant
- 2014-05-08 CN CN201480026285.4A patent/CN105191474B/zh active Active
- 2014-05-08 US US14/786,176 patent/US9706551B2/en active Active
- 2014-05-08 KR KR1020140054533A patent/KR102136811B1/ko active IP Right Grant
- 2014-05-08 WO PCT/KR2014/004100 patent/WO2014182090A1/ko active Application Filing
-
2017
- 2017-06-07 US US15/616,046 patent/US10098114B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040165563A1 (en) * | 2003-02-24 | 2004-08-26 | Hsu Raymond T. | Wireless local access network system detection and selection |
KR20050003575A (ko) * | 2003-06-27 | 2005-01-12 | 삼성전자주식회사 | 시분할 방식의 무선랜 통신방법 및 시스템 |
KR100542348B1 (ko) * | 2003-09-03 | 2006-01-10 | 삼성전자주식회사 | 무선 랜 시스템의 전력 감소 방법 및 그 장치 |
KR20070116461A (ko) * | 2006-06-05 | 2007-12-10 | 삼성전자주식회사 | 비압축 av 데이터 전송을 위한 데이터 구조, 데이터 슬롯 할당 방법, 비압축 av 데이터 전송 방법, 및 상기 방법을 이용하는 장치 |
KR20110020038A (ko) * | 2009-08-21 | 2011-03-02 | 에스케이 텔레콤주식회사 | 근거리 영역에서의 방송 서비스를 위한 슈퍼프레임 구조로 이루어지는 시스템 및 방법, 그리고 이에 적용되는 장치 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016167563A1 (ko) * | 2015-04-15 | 2016-10-20 | 엘지전자 주식회사 | 비면허 대역 상에서 단말이 데이터를 수신하는 방법 및 장치 |
KR101918618B1 (ko) | 2015-04-15 | 2018-11-14 | 엘지전자 주식회사 | 비면허 대역 상에서 단말이 데이터를 수신하는 방법 및 장치 |
US10375730B2 (en) | 2015-04-15 | 2019-08-06 | Lg Electronics Inc. | Method and apparatus for receiving, by terminal, data on unlicensed band |
Also Published As
Publication number | Publication date |
---|---|
CN105191474B (zh) | 2019-04-19 |
KR102136811B1 (ko) | 2020-07-22 |
KR102175543B1 (ko) | 2020-11-06 |
US10098114B2 (en) | 2018-10-09 |
US20160081085A1 (en) | 2016-03-17 |
US20170280450A1 (en) | 2017-09-28 |
KR20140133459A (ko) | 2014-11-19 |
US9706551B2 (en) | 2017-07-11 |
CN105191474A (zh) | 2015-12-23 |
KR20140133461A (ko) | 2014-11-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2014182090A1 (ko) | 무선랜 시스템에서 숨겨진 노드 문제의 완화 방법 | |
WO2015023103A1 (ko) | 무선랜 시스템에서 데이터 전송 방법 및 장치 | |
WO2013191439A1 (ko) | 무선랜 시스템에서 채널 액세스 제어 방법 및 장치 | |
WO2013162340A1 (ko) | 무선랜 시스템에서 채널 액세스 방법 및 장치 | |
WO2013119095A1 (ko) | 무선랜 시스템에서 채널 액세스 방법 및 장치 | |
WO2018048202A1 (ko) | 무선랜에서 액세스 포인트의 탐색 방법 및 장치 | |
WO2015005675A1 (ko) | 무선랜 시스템에서 데이터 전송 방법 및 장치 | |
WO2013119097A1 (ko) | 무선랜 시스템에서 채널 액세스 방법 및 장치 | |
WO2013151312A1 (ko) | 무선랜 시스템에서 채널 액세스 방법 및 장치 | |
WO2013151311A1 (ko) | 무선랜 시스템에서 채널 액세스 방법 및 장치 | |
WO2013147563A1 (ko) | 무선랜 시스템에서 비콘 송수신 방법 및 장치 | |
WO2013115618A1 (ko) | 무선랜 시스템에서 채널 액세스 방법 및 장치 | |
WO2014046453A2 (ko) | 무선랜 시스템에서 청취 간격 업데이트 방법 및 장치 | |
WO2015005677A1 (ko) | 무선랜 시스템에서 데이터 전송 방법 및 장치 | |
WO2014137172A1 (ko) | 무선랜 시스템에서 스테이션의 신호 수신 방법 및 장치 | |
WO2016163849A1 (ko) | 무선랜 시스템에서 멀티 유저 전송에 관련된 프레임 송수신 방법 및 장치 | |
WO2013141669A1 (ko) | 무선랜 시스템에서 채널 액세스 방법 및 장치 | |
WO2011149285A2 (ko) | 무선 랜 시스템에서 데이터 송수신 방법 및 장치 | |
WO2013115629A1 (ko) | 무선랜 시스템에서 널 데이터 패킷 프레임을 이용하는 채널 액세스 방법 및 장치 | |
WO2013157787A1 (ko) | 무선랜 시스템에서 피드백 트리거 프레임 송수신 방법 및 장치 | |
WO2014116023A1 (ko) | 무선랜 시스템에서 그룹 어드레스드 프레임을 송수신하는 방법 및 이를 위한 장치 | |
WO2013147549A1 (ko) | 무선랜 시스템에서 채널 액세스 제어 방법 및 장치 | |
WO2013122415A1 (ko) | 무선 통신 시스템에서 채널 액세스 방법 및 이를 위한 장치 | |
WO2016163850A1 (ko) | 무선랜 시스템에서 액세스 방법 선택에 관련된 프레임 송수신 방법 및 장치 | |
WO2013154405A1 (ko) | 무선랜 시스템에서 비콘 프레임의 선택적 디코딩을 위한 방법 및 장치 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201480026285.4 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14794785 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14786176 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 22/02/2016) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 14794785 Country of ref document: EP Kind code of ref document: A1 |