Schemes to determine presence of hidden terminals in wireless networks environment and to switch between them
First Claim
Patent Images
1. In a wireless communications network having a plurality of transceiver nodes, a method of accessing said network said method comprising:
- a. determining if there are hidden nodes among said nodes in said network; and
b. dynamically selecting an access protocol based upon said determining, whereby said network is accessed with one of a first class of access protocols if there are determined to be no hidden nodes among said nodes and said network is accessed with one of a second class of access protocols if it is determined that there are hidden nodes among said nodes.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of delievering data in a wireless communications network using a combination of collision sensing and collision avoiidance protocols. More precisely, if there are no hidden nodes detected in the network, a collision sensing protocol is used; however, if there are hidden nodes, then a collision avoidance protocol is used. This invention also deals with methods of determining the presence or absence of hidden nodes.
-
Citations
8 Claims
-
1. In a wireless communications network having a plurality of transceiver nodes, a method of accessing said network said method comprising:
-
a. determining if there are hidden nodes among said nodes in said network; and b. dynamically selecting an access protocol based upon said determining, whereby said network is accessed with one of a first class of access protocols if there are determined to be no hidden nodes among said nodes and said network is accessed with one of a second class of access protocols if it is determined that there are hidden nodes among said nodes.
-
-
2. In a wireless communications network having a plurality of transceiver nodes, a method of accessing said network said method comprising:
-
a. determining if there are hidden nodes among said nodes in said network; and b. dynamically selecting an access protocol based upon said determining, whereby said network is accessed with a carrier sense multiple access protocol if there are determined to be no hidden nodes among said nodes and said network is accessed with a collision avoidance access protocol if it is determined that there are hidden nodes among said nodes. - View Dependent Claims (3)
-
-
4. In a communications network having a plurality of nodes, a method of determining the presence or absence of hidden nodes in said network, said method comprising:
-
a. monitoring each frame transmitted in said network for its source address and destination address, and monitoring each frame transmitted in said network to determine whether it is a data frame or an acknowledgement frame; b. maintaining a table indicating whether a node of said nodes is hidden; and c. updating said table when receiving each data frame, wherein an entry in said table corresponding to said source address in each data frame is updated to indicate that one of said nodes corresponding to said source address is not hidden, and wherein each entry in said table corresponding to said destination address in each data frame is updated to indicate that one of said nodes corresponding to said destination address is a hidden node; and d. updating said table when receiving each acknowledgement frame, wherein an entry in said table corresponding to said source address in each acknowledgement frame is either added or updated to indicate that one of said nodes corresponding to said source address in each acknowledgement frame is not hidden, and where each entry in said table corresponding to said destination address in each acknowledgement frame is added to indicate that one of said nodes corresponding to said destination address in each acknowledgement frame is a hidden node if said destination address in each acknowledgement frame was not previously in said table. - View Dependent Claims (5)
-
-
6. In a communications network having a plurality of nodes, a method of detecting the presence of hidden nodes by each node n of said nodes, said method comprising:
-
a. monitoring each frame transmitted in said network for its source and destination address; b. maintaining a table indicating whether a transmission between two nodes that is heard by said node n; and c. updating said table in each node that monitors a frame being transmitted from any node i to any node j, said entry corresponding to the tuplet (i,j) being updated to indicate that a transmission from node i to node j can be heard, wherein an indication in said table that a transmission from node i to node j was heard while there was no transmission heard from node j to node i indicates that there is at least one node that is hidden from node n. - View Dependent Claims (7)
-
-
8. In a wireless communications network having a plurality of transceiver nodes, a method of accessing said network said method comprising:
-
a. monitoring each frame transmitted in said network for its source address and destination address, and monitoring each frame transmitted in said network to determine whether it is a data frame or an acknowledgement frame; b. maintaining a table indicating whether a node of said nodes is hidden; and c. updating said table when receiving each data frame, wherein an entry in said table corresponding to said source address in each data frame is updated to indicate that one of said nodes corresponding to said source address is not hidden, and wherein each entry in said table corresponding to said destination address in each data frame is updated to indicate that one of said nodes corresponding to said destination address is a hidden node; and d. updating said table when receiving each acknowledgment frame, wherein an entry in said table corresponding to said source address in each acknowledgement frame is either added or updated to indicate that one of said nodes corresponding to said source address is not hidden, and where each entry in said table corresponding to said destination address in each acknowledgment frame is added to indicate that one of said nodes corresponding to said destination address in said acknowledgement frame is a hidden node if said destination address in each acknowledgement frame was not previously in said table; e. accessing said network with a carrier sense multiple access protocol if there are determined to be no hidden nodes among said nodes; and f. accessing said network with collision avidance access protocol if it is determined that there are hidden nodes.
-
Specification