A system, method, and computer-readable storage media for reducing monopolization of a frequency channel during full-duplex communications. The MAC layer of governing communications can be modified to reduce likelihood of monopolization by (1) in networks which are exclusively filled with full-duplex devices, configuring non-communicating devices to ignore data collisions of communicating devices, requiring the communicating devices to wait for an standard backoff time after the data transmission is complete; and/or (2) in mixed half-duplex/full-duplex networks, requiring a half-duplex nodes and/or a full-duplex node to wait an extended duration after the data transmission is complete, while the non-communicating devices do not wait an extended duration.

Patent
   9271307
Priority
Dec 19 2012
Filed
Dec 19 2012
Issued
Feb 23 2016
Expiry
May 25 2033
Extension
157 days
Assg.orig
Entity
Large
0
4
EXPIRED<2yrs
1. A method comprising:
determining, at a first node, that the first node and a second node are in full-duplex communication, wherein the first node uses a distributed channel access protocol for contending with other nodes to communicate with the second node;
receiving an input indicating that the use of an extended interframe space should be used rather than a distributed coordination function interframe space, wherein the input is received as part of a clear-to-send signal; and
after receiving an acknowledgment of receipt of a successful transmission from the second node, deferring contention in the distributed channel access protocol at the first node for the extended interframe space, wherein the extended interframe space delays the first node from entering, at a start time, a subsequent contention round.
11. A computer-readable storage device having instructions stored which, when executed by a computing device, cause the computing device to perform operations comprising:
determining, at a first node, that the first node and a second node are in full-duplex communication, wherein the first node uses a distributed channel access protocol for contending with other nodes to communicate with the second node;
receiving an input indicating that the use of an extended interframe space should be used rather than a distributed coordination function interframe space, wherein the input is received as part of a clear-to-send signal; and
after receiving an acknowledgment of receipt of a successful transmission from the second node, deferring contention in the distributed channel access protocol at the first node for the extended interframe space, wherein the extended interframe space delays the first node from entering, at a start time, a subsequent contention round.
6. A system comprising:
a processor; and
a computer-readable storage medium having instructions stored which, when executed by the processor, cause the processor to perform operations comprising:
determining, at a first node, that the first node and a second node are in full-duplex communication, wherein the first node uses a distributed channel access protocol for contending with other nodes to communicate with the second node;
receiving an input indicating that the use of an extended interframe space should be used rather than a distributed coordination function interframe space, wherein the input is received as part of a clear-to-send signal; and
after receiving an acknowledgment of receipt of a successful transmission from the second node, deferring contention in the distributed channel access protocol at the first node for the extended interframe space, wherein the extended interframe space delays the first node from entering, at a start time, a subsequent contention round.
2. The method of claim 1, wherein, after transmitting the acknowledgment of receipt of the successful transmission, the second node defers contention in the distributed channel access protocol for the extended interframe space.
3. The method of claim 2, wherein the wireless device is one of a smartphone, a laptop, a router, and a computer.
4. The method of claim 1, wherein a duration of the extended interframe space is defined by an 802.11 standard.
5. The method of claim 1, wherein the first node does not transmit data in a subsequent full-duplex communication round.
7. The system of claim 6, wherein, after sending the acknowledgement of the successful transmission, the second node defers from contention in the distributed channel access protocol for the extended interframe space.
8. The system of claim 7, wherein the wireless device is one of a smartphone, a laptop, a router, and a computer.
9. The system of claim 7, wherein a duration of the extended interframe space is defined by an 802.11 standard.
10. The system of claim 8, wherein the first node does not transmit data in a subsequent full-duplex communication round.
12. The computer-readable storage device of claim 11, wherein the second node, after transmitting the acknowledgment of receipt of the successful transmission, defers from contention in the distributed channel access protocol for the extended interframe space.
13. The computer-readable storage device of claim 12, wherein the wireless device is one of a smartphone, a laptop, a router, and a computer.
14. The computer-readable storage device of claim 12, wherein a duration of the extended interframe space is defined by an 802.11 standard.

1. Technical Field

The present disclosure relates to full-duplex media access control (MAC) timing modification, and more specifically to ensuring that node pairs involved in full-duplex communications do not receive an unfair advantage of capturing the full-duplex channel repeatedly over nodes communicating in a half-duplex mode.

2. Introduction

In 802.11 wireless networks, various durations for specific actions and events are defined. The durations often change depending on protocol version (for example, version 802.11(a) versus version 802.11(n)), however the relationships of the defined durations do not change. Examples of durations defined within the 802.11 model are SIFS (short interframe space), DIFS (distributed coordination function interframe space), and EIFS (extended interframe space). The relationships of the exemplary durations, as defined by the 802.11 model, are that a SIFS has a shorter duration than a DIFS, which in turn has a shorter duration than an EIFS. For example, the SIFS can have a duration of 10 μs, the DIFS can have a duration of the SIFS duration+(2×a predetermined slot time), and the EIFS can have a duration of the SIFS duration+the DIFS duration+acknowledgment duration. Alternatively, the SIFS can have a duration determined based on transmission and processing delays built into the system.

A MAC (media access control) layer defines how nodes communicate with other nodes using a specific protocol version. MAC layers for the 802.11 model and other wireless networks specify that nodes will pause for a longer wait time (EIFS), rather than the standard wait time (DIFS), when the nodes receive an erroneous packet. The purpose of the extended wait time upon receiving an erroneous packet is to allow other packet recipient nodes, who received the data correctly, to be able to send an acknowledgment frame in time.

FIG. 1 illustrates an example system embodiment;

FIG. 2 illustrates an exemplary network having both half-duplex and full-duplex devices;

FIG. 3 illustrates an example of potential frequency channel monopolization using MAC frames associated with 802.11(a);

FIG. 4 illustrates an example of MAC frames according to a first embodiment;

FIG. 5 illustrates an example of MAC frames according to a second embodiment;

FIG. 6 illustrates a first example method embodiment; and

FIG. 7 illustrates a second example method embodiment.

The following disclosure covers two general embodiments that relate to how nodes in a network communication. A first embodiment relates to nodes communicating in a full-duplex mode. A second embodiment focuses on a scenario where a half-duplex node is communicating in a network where other full-duplex nodes are involved in full-duplex communication. In the second embodiment, the half-duplex node ignores what it would normally view as collisions with respect to how it handles the interface spacing. Knowledge about the other nodes being in full-duplex communication can be explicitly communicated or inferred by the half-duplex node.

As noted above, the first embodiment covers full-duplex communication between two nodes. A system, method, computer-readable media, and a computer-readable device reduce the likelihood of monopolization of a frequency channel by full-duplex devices by modifying the MAC layer. In a network where all nodes are configured to be full-duplex capable, the MAC can be modified such that upon termination of the communication between the full-duplex devices, the devices which just finished communicating defer (wait) for an EIFS duration prior to engaging in the next contention round. The other nodes in the network, which were not communicating and which viewed the full-duplex data as collisions, similarly pause for an EIFS. Because all of the nodes in the network pause for an EIFS, the likelihood of channel monopolization by the two communicating full-duplex nodes is reduced.

When full-duplex capable nodes are introduced to a network, data can be transmitted by two separate nodes simultaneously in a single frequency channel. For example, as illustrated in FIG. 2, a network 200 which contains half-duplex devices 208 (which are only capable of half-duplex communications 210, or are only communicating in a half-duplex mode) has full-duplex devices 204 (which are capable of full-duplex communications 206) introduced into the network 200. The half-duplex devices 208 and the full-duplex devices 204 all communicate with an access point 202, which can be a router, base station, or other centralized communication node, or with another wireless device (not illustrated). The network 200 as illustrated can provide increased communications efficiency, throughput, and/or bandwidth, while allowing for both full-duplex and half-duplex nodes. However, while full-duplex communications can be beneficial to a network, current MAC layer designs specify that when multiple packets are received on a single frequency channel from multiple sources, a collision or error has occurred. Therefore, while the full-duplex capable nodes communicating will not detect any errors and will, following communication, back off for the standard DIFS time period, the remaining nodes in the network will see an error and backoff for an extended EIFS time period. After waiting for the standard DIFS time period, the nodes which had been communicating can begin contending for the next round of communications, while the remaining nodes wait for the EIFS period before beginning contention. Because the DIFS wait time is smaller than the EIFS wait time, there is a higher likelihood that one of the full-duplex nodes which had been communicating will grab the channel again, producing additional interference, and unfairly monopolizing the frequency channel.

FIG. 3 illustrates the potential for nodes to monopolize the frequency channel. A full-duplex sender 302 and full-duplex receiver 304 have won a contention round, allowing them access to the frequency channel. After waiting a DIFS period of time 308, the sender 302 sends a request-to-send signal 310, indicating that the node 302 is ready to transmit data. After a SIFS (short interframe space) 312, the receiving node sends a clear-to-send 314, indicating both that the sender node 302 can send data and also that the receiver node 304 has data it will be transmitting in the same frequency channel, creating a full-duplex communication. After another SIFS 316, both nodes 302, 304 initiate communication of the data 318, 320. Upon completing the data transmission, the nodes 302, 304 pause for another SIFS 326, and transmit acknowledgments 328, 330 if the data 318, 320 was received correctly. Assuming the data was received correctly, the sender 302 and receiver 304 both wait for a standard DIFS 332, 334 period of time before initiating the next round of communications.

However, the other nodes 306 in the network, which are either not full-duplex capable or are configured using non-full-duplex MAC layers, see the full-duplex communications as errors. For example, other nodes 306 receive, during the RTS-CTS handshake 310, 314, network allocation vectors (NAVs) 322, 324 indicating the estimated packet sizes the sender 302 and receiver 304 will be communicating. However, upon the full-duplex communications beginning with the transmissions of data 318, 320, the other nodes 306 receive packets intended for two distinct nodes 302, 304, and determine that an error has occurred. Therefore, at time t3, when the sender 302 and receiver 304, have finished communications and begin waiting the standard DIFS 332, 334, which will end at time t4. The other nodes 306 begin, at time t3, to wait for the extended EIFS 336, which will end at time t5. The gap 338 between when the DIFS ends at time t4 and when the EIFS ends at time t5 can produce unfairness in capturing the channel, because the nodes which wait for the DIFS time period can re-capture the channel, never providing the other nodes 306 the opportunity to communicate data. In a network that has both full-duplex and half-duplex nodes, the MAC layer is modified such that the nodes which were transmitting in full-duplex wait, upon completing transmission, for an EIFS duration of time, whereas the other nodes which were detecting “collisions” either immediately begin contending for the next communication round, or alternatively, wait for a DIFS duration before beginning the contention round.

These and other various embodiments are described in detail below. While specific implementations are described, it should be understood that this is done for illustration purposes only. Other components and configurations may be used without parting from the spirit and scope of the disclosure. A brief introductory description of a basic general purpose system or computing device in FIG. 1 which can be employed to practice the concepts, methods, and techniques disclosed is illustrated. A more detailed description of modifications to the MAC layers to prevent unfairness, as well as various embodiments and configurations, will then follow. These variations shall be described herein as the various embodiments are set forth. The disclosure now turns to FIG. 1.

With reference to FIG. 1, an exemplary system and/or computing device 100 includes a processing unit (CPU or processor) 120 and a system bus 110 that couples various system components including the system memory 130 such as read only memory (ROM) 140 and random access memory (RAM) 150 to the processor 120. The system 100 can include a cache 122 of high speed memory connected directly with, in close proximity to, or integrated as part of the processor 120. The system 100 copies data from the memory 130 and/or the storage device 160 to the cache 122 for quick access by the processor 120. In this way, the cache provides a performance boost that avoids processor 120 delays while waiting for data. These and other modules can control or be configured to control the processor 120 to perform various actions. Other system memory 130 may be available for use as well. The memory 130 can include multiple different types of memory with different performance characteristics. It can be appreciated that the disclosure may operate on a computing device 100 with more than one processor 120 or on a group or cluster of computing devices networked together to provide greater processing capability. The processor 120 can include any general purpose processor and a hardware module or software module, such as module 1 162, module 2 164, and module 3 166 stored in storage device 160, configured to control the processor 120 as well as a special-purpose processor where software instructions are incorporated into the processor. The processor 120 may be a self-contained computing system, containing multiple cores or processors, a bus, memory controller, cache, etc. A multi-core processor may be symmetric or asymmetric.

The system bus 110 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. A basic input/output (BIOS) stored in ROM 140 or the like, may provide the basic routine that helps to transfer information between elements within the computing device 100, such as during start-up. The computing device 100 further includes storage devices 160 such as a hard disk drive, a magnetic disk drive, an optical disk drive, tape drive or the like. The storage device 160 can include software modules 162, 164, 166 for controlling the processor 120. The system 100 can include other hardware or software modules. The storage device 160 is connected to the system bus 110 by a drive interface. The drives and the associated computer-readable storage media provide nonvolatile storage of computer-readable instructions, data structures, program modules and other data for the computing device 100. In one aspect, a hardware module that performs a particular function includes the software component stored in a tangible computer-readable storage medium, or in a computer-readable storage device, in connection with the necessary hardware components, such as the processor 120, bus 110, display 170, and so forth, to carry out a particular function. In another aspect, the system can use a processor and computer-readable storage medium to store instructions which, when executed by the processor, cause the processor to perform a method or other specific actions. The basic components and appropriate variations can be modified depending on the type of device, such as whether the device 100 is a small, handheld computing device, a desktop computer, or a computer server.

Although the exemplary embodiment(s) described herein employs the hard disk 160, other types of computer-readable media which can store data that are accessible by a computer, such as magnetic cassettes, flash memory cards, digital versatile disks, cartridges, random access memories (RAMs) 150, read only memory (ROM) 140, a cable or wireless signal containing a bit stream and the like, may also be used in the exemplary operating environment. Tangible computer-readable storage media, or computer-readable storage devices, expressly exclude media such as energy, carrier signals, electromagnetic waves, and signals per se.

To enable user interaction with the computing device 100, an input device 190 represents any number of input mechanisms, such as a microphone for speech, a touch-sensitive screen for gesture or graphical input, keyboard, mouse, motion input, speech and so forth. An output device 170 can also be one or more of a number of output mechanisms known to those of skill in the art. In some instances, multimodal systems enable a user to provide multiple types of input to communicate with the computing device 100. The communications interface 180 generally governs and manages the user input and system output. There is no restriction on operating on any particular hardware arrangement and therefore the basic hardware depicted may easily be substituted for improved hardware or firmware arrangements as they are developed.

For clarity of explanation, the illustrative system embodiment is presented as including individual functional blocks including functional blocks labeled as a “processor” or processor 120. The functions these blocks represent may be provided through the use of either shared or dedicated hardware, including, but not limited to, hardware capable of executing software and hardware, such as a processor 120, that is purpose-built to operate as an equivalent to software executing on a general purpose processor. For example the functions of one or more processors presented in FIG. 1 may be provided by a single shared processor or multiple processors. (Use of the term “processor” should not be construed to refer exclusively to hardware capable of executing software.) Illustrative embodiments may include microprocessor and/or digital signal processor (DSP) hardware, read-only memory (ROM) 140 for storing software performing the operations described below, and random access memory (RAM) 150 for storing results. Very large scale integration (VLSI) hardware embodiments, as well as custom VLSI circuitry in combination with a general purpose DSP circuit, may also be provided.

The logical operations of the various embodiments are implemented as: (1) a sequence of computer implemented steps, operations, or procedures running on a programmable circuit within a general use computer, (2) a sequence of computer implemented steps, operations, or procedures running on a specific-use programmable circuit; and/or (3) interconnected machine modules or program engines within the programmable circuits. The system 100 shown in FIG. 1 can practice all or part of the recited methods, can be a part of the recited systems, and/or can operate according to instructions in the recited tangible computer-readable storage media. Such logical operations can be implemented as modules configured to control the processor 120 to perform particular functions according to the programming of the module. For example, FIG. 1 illustrates three modules Mod1 162, Mod2 164 and Mod3 166 which are modules configured to control the processor 120. These modules may be stored on the storage device 160 and loaded into RAM 150 or memory 130 at runtime or may be stored in other computer-readable memory locations.

Having disclosed some components of a computing system, and having discussed FIGS. 2 and 3 above, the disclosure provides exemplary embodiments. While these embodiments are discussed separately, elements and pieces of each embodiment can be combined without violation of the principles disclosed herein. FIG. 4 illustrates an example of MAC frames according to a first embodiment. A full-duplex sender 402 has won a contention round with a full-duplex sender 404. After waiting for a DIFS duration 408, the sender 402 and receiver engage in a RTS-CTS handshake 410 prior to initiate communication of data. Other full-duplex nodes 406 recognize the signals exchanged in the RTS-CTS handshake, and recognize the NAV durations 422, 424 indicated within the RTS and CTS signals.

As the sender 402 and receiver 404 exchange data 418, 420 in full-duplex, the other nodes 406 receive two sets of data packets, which is recorded as a collision per previous MAC layer designs. Upon finishing the data transmissions 418, 420, the sender 402 and receiver 404 pause for a SIFS duration 426, and transmit acknowledgements of the data received 428, 430. Following the transmission of acknowledgments, at time t3, the sender 402 and receiver 404 pause an EIFS duration 432, 434 prior to entering a new contention round. The other full-duplex nodes 406, which have been recording collisions during the process, recognize the end of the data exchange, at time t3, and also wait for an EIFS 436. Recognition of the end of the data exchange can occur based on receiving the transmitted acknowledgments 428, 430, or based on the termination of the NAV durations 422, 424 previously received.

In other configurations the other nodes 406 can be half-duplex nodes, or alternatively, a mixture of full-duplex and half-duplex nodes. In addition, the MAC can be modified such that the other nodes 406 wait for a shorter duration than an EIFS, such as a DIFS, an SIFS, or for as short a duration as logistically possible, prior to initiating the next contention round. Because the sender 402 and receiver 404 nodes are configured to wait for an EIFS, these shorter durations can provide an advantage to the other nodes 406 in “winning” the contention round.

The second embodiment disclosed herein covers a configuration where a half-duplex node is communicating in a network where at least one other node is communicating in a full duplex mode. FIG. 5 illustrates an example of MAC frames according to the second embodiment. A full-duplex sender 502 has won a contention round for access to a full-duplex receiver 504. After waiting for a DIFS duration 508, the sender 502 and receiver 504 engage in a RTS-CTS handshake 510 prior to initiate communication of data. Other half-duplex nodes 506 recognize the signals exchanged in the RTS-CTS handshake, and recognize the NAV durations 522, 524 indicated within the RTS and CTS signals. As the sender 502 and receiver 504 exchange data 518, 520 in full-duplex, the other half-duplex nodes 506 receive two sets of data packets, which are considered collisions, just as previous MAC layer designs have specified. Alternatively, the other half-duplex nodes 506 (and/or additional full-duplex nodes in the network) can ignore the collisions, rather than recording the collisions, until the end of the NAV durations received. The information about the full-duplex transfer can be inferred by a half-duplex node in some fashion. One example of how the half-duplex node would infer data about a full-duplex transfer via another node is through information in the CTS packet or through other data. Further, other full-duplex capable nodes and/or full-duplex nodes in a full-duplex communication mode may also have explicit information about or inferred information about a set of nodes in full-duplex communication such that the other full-duplex capable node and/or full-duplex nodes in a full-duplex communication mode also ignore collisions in the NAV duration from the set of nodes in full-duplex communication.

Upon finishing the data transmissions 518, 520, the sender 502 and receiver 504 pause for a SIFS duration 526, and transmit acknowledgements of the data received 528, 530. Following the transmission of acknowledgments 528, 530, at time t3, the sender 502 and receiver 504 pause an EIFS duration 532, 534 prior to entering a new contention round. The other half-duplex nodes 506, which have been registering collisions during the full-duplex exchange process or ignoring the collisions, recognize the end of the data exchange. The recognition can occur based on receiving the acknowledgments 528, 530 transmitted, or based on the termination of the NAV durations 522, 524 previously received. At time t3, upon recognizing that the data exchange has ended, the other half-duplex nodes 506 do not wait for an EIFS, but instead wait for a DIFS duration 536. After the DIFS duration 536, the other half-duplex nodes 506 can immediately initiate a new contention round, decreasing the likelihood of the nodes which sent and received data 502, 504 in the previous round re-winning the contention round. In certain configurations, at time t3 the other half-duplex nodes 506 do not wait for a DIFS or an EIFS, instead immediately initiating the new contention round.

Having disclosed some basic system components and concepts, the disclosure now turns to the first exemplary method embodiment shown in FIG. 6. For the sake of clarity, the method is described in terms of an exemplary system 100 as shown in FIG. 1 configured to practice the method. The steps outlined herein are exemplary and can be implemented in any combination thereof, including combinations that exclude, add, or modify certain steps.

The system 100 first determines that a first node and a second node are in full-duplex communication, wherein the first node uses a distributed channel access protocol for contending with other nodes to communicate with the second node (602). For example, the first node uses the distributed channel access protocol to win a contention round. Winning the contention round can be based on strength of signal, priority of data, time since last communication, or other factors having a relative weight higher than factors belonging to other nodes. The system 100, for example, can be the first node or the second node. Examples of the first node and second node can be wireless devices, such as smartphones, tablet computers, laptops, and wireless routers. Therefore, if the system 100, acting as the first node, is a smartphone and the second node is a wireless router, per step 602 the system 100 wins the contention round using a distributed channel access protocol and begins full-duplex communications with the router.

After receiving an acknowledgment of receipt of a successful transmission from the second node, the system 100 defers, or waits, for an extended interframe space (604). The extended interframe space is longer than the standard distributed coordination function interframe space, or DCF interframe space, between rounds of communication. For example, the DCF interframe space could have a duration of 50 μs, whereas the extended interframe space is longer than 50 μs. In certain configurations, the system 100 can receive instructions directing it to wait for the extended interframe space based on the other nodes, whereas in other configurations the MAC layer associated with the system 100 can be permanently modified such that communications the system 100 always defers, after receiving acknowledgment of receipt of data, for an extended interframe space. As an example of a signal that could be used to indicate that an extended interframe space duration should follow, a CTS sender can indicate that it intends to send full-duplex data by re-purposing an unused bit (e.g., the More Data bit in the CTS Frame Control field). The unused bit can indicate that the modified version of the MAC should be used. Another option is for a full-duplex node to use two MAC addresses, one for half-duplex use, and the other for full-duplex use. Having two MAC addresses would allow the RTS sender to adapt its rate based on which MAC address, the full-duplex or half-duplex, is being used, and the new duration using that adapted rate could be set as a NAV duration by the CTS sender.

The other nodes associated with the system 100, which did not win the contention round, can be configured to immediate begin contending for the next round of communications, or can be configured to wait for a DIFS, an EIFS, or another time duration. The interframe spacing durations, such as DIFS, EIFS, or SIFS, used by the system 100 can be set by a standard or model, such as the 802.11 standard.

FIG. 7 illustrates a second exemplary method embodiment. As with FIG. 6, for the sake of clarity, the method is described in terms of an exemplary system 100 as shown in FIG. 1 configured to practice the method. The steps outlined herein are exemplary and can be implemented in any combination thereof, including combinations that exclude, add, or modify certain steps.

The system 100, at a first node, determines that a second node and a third node are in full duplex communication, wherein the first node and the second node use a distributed channel access protocol for contending for access to communicate with the third node (702). The nodes can be laptops, smartphones, tablets, base stations, or other wireless devices. Contending for access can take place via a contention round, in which all of the nodes contend for the ability to communicate data with the third node.

After receiving, at the first node, a communication associated with the full-duplex communication between the second node and the third node, the full-duplex communication not intended for the first node, the system 100 defers for a distributed coordination function interframe space period of time (704). In order for the system 100 to defer for a distributed coordination function interframe space duration, the MAC layer of the system 100 can be modified. An exemplary modification can require the distributed coordination function interframe space duration to always be initiated following the reception of non-intended data, or, in other configurations, the signal can indicate that the distributed coordination function interframe space duration should be used.

As an example of a signal that could be used to indicate that a distributed coordination function interframe space duration should follow a communication, a CTS sender can indicate that it intends to send full-duplex data by re-purposing an unused bit (e.g., the More Data bit in the CTS Frame Control field). The unused bit can indicate that the modified version of the MAC should be used. Another option is for a full-duplex node to use two MAC addresses, one for half-duplex use, and the other for full-duplex use. Having two MAC addresses would allow the RTS sender to adapt its rate based on which MAC address, the full-duplex or half-duplex, is being used, and the new duration using that adapted rate could be set as a NAV duration by the CTS sender.

The system 100 can, following the distributed coordination function interframe space duration, enter a new contention round. While the first node defers for a distributed coordination function interframe space period of time, the second and third nodes can be configured to wait for an extended interframe space duration following a communication. The system 100 can initiate the subsequent contention round prior to the second node and the third node completing the extended interframe space “pause,” and thereby prevents unfair monopolization of the frequency channel (used in full-duplex communications) by the second and third nodes. The interframe spacing durations, such as DIFS, EIFS, or SIFS, used by the system 100 can be set by a standard or model, such as the 802.11 standard.

Embodiments within the scope of the present disclosure may also include tangible and/or non-transitory computer-readable storage media for carrying or having computer-executable instructions or data structures stored thereon. Such tangible computer-readable storage media can be any available media that can be accessed by a general purpose or special purpose computer, including the functional design of any special purpose processor as described above. By way of example, and not limitation, such tangible computer-readable media can include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code means in the form of computer-executable instructions, data structures, or processor chip design. When information is transferred or provided over a network or another communications connection (either hardwired, wireless, or combination thereof) to a computer, the computer properly views the connection as a computer-readable medium. Thus, any such connection is properly termed a computer-readable medium. Combinations of the above should also be included within the scope of the computer-readable media.

Computer-executable instructions include, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Computer-executable instructions also include program modules that are executed by computers in stand-alone or network environments. Generally, program modules include routines, programs, components, data structures, objects, and the functions inherent in the design of special-purpose processors, etc. that perform particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of the program code means for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps.

Other embodiments of the disclosure may be practiced in network computing environments with many types of computer system configurations, including personal computers, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and the like. Embodiments may also be practiced in distributed computing environments where tasks are performed by local and remote processing devices that are linked (either by hardwired links, wireless links, or by a combination thereof) through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.

The various embodiments described above are provided by way of illustration only and should not be construed to limit the scope of the disclosure. For example, the principles herein apply equally to wireless communications and cellular communications where practical. Various modifications and changes may be made to the principles described herein without following the example embodiments and applications illustrated and described herein, and without departing from the spirit and scope of the disclosure.

Shankaranarayanan, Nemmara K., Jana, Rittwik, Aggarwal, Vaneet, Rice, Christopher W.

Patent Priority Assignee Title
Patent Priority Assignee Title
7817641, Oct 20 2005 Amir Keyvan, Khandani Methods for spatial multiplexing of wireless two-way channels
8554237, Feb 04 2005 TELCORDIA LEGACY INC Channel partitioning for wireless local area networks
20080240078,
20090103485,
/////
Executed onAssignorAssigneeConveyanceFrameReelDoc
Dec 19 2012AT&T Intellectual Property I, L.P.(assignment on the face of the patent)
Feb 06 2014RICE, CHRISTOPHER W AT&T Intellectual Property I, L PASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0322050886 pdf
Feb 10 2014AGGARWAL, VANEETAT&T Intellectual Property I, L PASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0322050886 pdf
Feb 10 2014JANA, RITTWIKAT&T Intellectual Property I, L PASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0322050886 pdf
Feb 12 2014SHANKARANARAYANAN, NEMMARA K AT&T Intellectual Property I, L PASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0322050886 pdf
Date Maintenance Fee Events
Jul 16 2019M1551: Payment of Maintenance Fee, 4th Year, Large Entity.
Oct 16 2023REM: Maintenance Fee Reminder Mailed.
Apr 01 2024EXP: Patent Expired for Failure to Pay Maintenance Fees.


Date Maintenance Schedule
Feb 23 20194 years fee payment window open
Aug 23 20196 months grace period start (w surcharge)
Feb 23 2020patent expiry (for year 4)
Feb 23 20222 years to revive unintentionally abandoned end. (for year 4)
Feb 23 20238 years fee payment window open
Aug 23 20236 months grace period start (w surcharge)
Feb 23 2024patent expiry (for year 8)
Feb 23 20262 years to revive unintentionally abandoned end. (for year 8)
Feb 23 202712 years fee payment window open
Aug 23 20276 months grace period start (w surcharge)
Feb 23 2028patent expiry (for year 12)
Feb 23 20302 years to revive unintentionally abandoned end. (for year 12)