WO2009077893A1 - Method for generation of beacons by a base station in a wireless communications network - Google Patents
Method for generation of beacons by a base station in a wireless communications network Download PDFInfo
- Publication number
- WO2009077893A1 WO2009077893A1 PCT/IB2008/054349 IB2008054349W WO2009077893A1 WO 2009077893 A1 WO2009077893 A1 WO 2009077893A1 IB 2008054349 W IB2008054349 W IB 2008054349W WO 2009077893 A1 WO2009077893 A1 WO 2009077893A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- base station
- station
- beacons
- generation
- connection
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/005—Discovery of network devices, e.g. terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0203—Power saving arrangements in the radio access network or backbone network of wireless communication networks
- H04W52/0206—Power saving arrangements in the radio access network or backbone network of wireless communication networks in access points, e.g. base stations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0212—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave
- H04W52/0216—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave using a pre-established activity schedule, e.g. traffic indication frame
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Definitions
- the invention relates to a method for generation of beacons by a base station in a wireless communications network, consisting of at least one base station and at least one station, the beacons being generated repeatedly at time intervals.
- Wireless networks work for example according to the standard IEEE 802.11 and can be operated in the operation modes "Ad-hoc mode” or "Infrastructure mode".
- a base station In the operation mode "Infrastructure mode", a base station (AP ...
- the base station sends special management packets at fixed intervals to all stations in its range of reception. These data packets are also referred to as "beacons”, and contain information specific to the base station such as the network name SSID, the type of encryption and the supported data rates.
- the transmission interval is also called the beacon interval, and in customary base station configurations amounts to 100 ms (corresponding to a transmission of 10 beacons per second).
- the beacons support the connection setup in the network, as the clients can thereby recognize an available base station and only need to know the network name and optionally some parameters for the encryption.
- a further advantage is that the constant sending of the beacons, which are always sent at the lowest transmission rate (e.g. 1 Mbit/sec), enables monitoring of the received signal quality, even in the event that no user data is sent or received. Since the beacons are sent at time intervals of, for example, 100 ms, i.e. 10 times per second, this is 36000 beacons per hour and 144000 per day. Especially in the area of home applications, in which the network is used only for a few hours a day, the sending of the beacons represents an unnecessary energy demand and an avoidable source of faults. Furthermore, the transmission of the beacons makes the network visible to unwanted users, so that it becomes susceptible to attack.
- connection options are determined by the station with a scanning or sampling process. A distinction is made here between passive and active scanning.
- the station In passive scanning the station successively selects all possible channels, and for each channel, checks for the length of a wait time whether a beacon is received.
- This wait time is sized in such a way according to the transmission interval of the beacons that a beacon can certainly be received.
- the station In active scanning, the station sends a probe request successively to all possible channels, and waits for a probe response from an available base station.
- the response sent by the base station is very similar to the transmitted beacon. Since the base station sends an immediate response to the station's request in active scanning, the complete scanning process can be executed faster than in passive scanning.
- Base stations which support active scanning react to the probe request packets independently of the beacon transmission.
- beacon generation is then controllable only according to a fixed setting, and not geared to demand.
- the invention is therefore based on the object of specifying a method with which the generation of the beacons can be tailored to needs, achieving a reduction of the energy demand and the emissions, and an improvement in the security.
- the object is achieved with a method for generation of beacons by a base station in a wireless communications network of the kind initially mentioned, in that the generation of the beacons is started with a switching on of the base station and is ended after the expiry of a wait time t ⁇ in the event that no station is connected to the base station, and in that the generation of the beacons is started by a receipt of a probe request from a station of the communications network and is ended after the expiry of a wait time t w i in the event that no station is connected to the base station.
- a base station disposed in a wireless communications network After activation, a base station disposed in a wireless communications network generates beacons at intervals of 100 ms, for example. These beacons can be received by a station disposed in the radio range of the base station. By means of the information contained in each beacon, it is possible for the station to set up a connection between it and the base station. If at least one connection is established between a station and the base station, the beacons will still be continuously generated. In the event that no station is connected to the base station, the generation of the beacons is ended according to the invention after the expiry of a wait time W This wait time t w0 should be chosen such that a station which has interrupted the connection to the base station because of a fault, for example, is able to establish a renewed connection to the base station. If it can be assumed with certainty after the wait time two has expired that there is no active connection between a station and the base station, and there is also no temporary connection interruption, the generation of the beacons is ended by the base station.
- a request is sent by a station to a base station in the active scanning method, and received by the base station, the process of generation of beacons by the base station starts once again.
- a response to the station's request is sent from the base station, and likewise contains information for the setup of a connection between the station and the base station.
- the station can thus set up a connection to the base station, and a data transmission can be started in both directions. So long as at least one active connection exists between a station and the base station, the process of generating beacons is maintained.
- the generating of the beacons is only ended by the base station after the expiry of the wait time t w i, which is started at the moment when the last connection to the base station was ended. In this case too, it is ensured by the corresponding sizing of the wait time t w i that a temporary interruption of the connection between a station and the base station does not lead to the termination of the generation of beacons.
- the two wait times can have the same or different values.
- the generation of the beacons is only started by a receipt of a probe request from a station in the communications network if the request is from a known station, identifiable by a MAC address of the station.
- An improvement of the security in the network can be achieved if the base station is told which stations are permitted to set up a connection with the base station. For this purpose, the MAC addresses of the devices permitted to set up connections are stored in the base station. If a station sends a probe request, the base station can check by means of the MAC address included in the request, whether the station is a known station approved for communication. Only in the case of a positive check does the base station generate a response to the request, and start generating beacons.
- a base station B is disposed in a wireless communications network.
- the base station B In the transmission range of the base station B are two mobile stations Ml and M2; the mobile stations Ml and M2 can be formed by a laptop, a PDA or a mobile phone with WLAN function, for example.
- the base station After the base station is switched on, it generates beacons at intervals of 100 ms, these beacons containing information about the network name (SSID) and the supported data transfer rates.
- the stations Ml and M2 receive these beacons, and read the information they contain. Based on the information they have read, the stations Ml and M2 each establish a connection with the base station according to the standard IEEE 802.11. Data can then be bidirectionally transmitted in the usual way.
- the station Ml terminates its connection to the base station and logs off.
- the connection to the station M2 is still maintained.
- the beacons are continuously generated by the base station. Because of disturbances, from an adjacent wireless communications network for example, there is an interruption of the connection between the station M2 and the base station.
- the wait time t w i begins to run down, its expiry causing the termination of the generation of beacons by the base station.
- beacons It is necessary for the generation of beacons to continue even while the wait time t w i runs down because, as described in the example, a purely temporary interruption of the connection can be the cause of the connection release between a station and the base station.
- the transmission of the beacons gives the station M2 another opportunity to establish a connection to the base station. After the station M2 is connected again to the base station, it resumes the data transmission to the base station or the receipt of data from the base station. After termination, the station M2 logs off from the base station. From this time, the wait time t w i begins to run down once more. Once this time has expired, the base station ceases to generate beacons.
- the wait time t w i should therefore be sized such that a temporary connection break by a station Ml or M2 does not lead to a cessation of the beacon transmission by the base station, rather that the opportunity of a renewed connection by the station Ml or M2 to the base station is offered.
- beacons are ended by the base station, this consumes less energy, causes fewer emissions, and an improvement of the security in the network is achieved in that stations which are in reception range of the base station can no longer recognize the presence of the base station in passive scanning mode.
- the station M 1 If there is subsequently the need to establish a connection between the station M 1 and the base station, the station M 1 must send a request to the base station in the active scanning operation mode. When the base station receives this request, a response to the request is generated and sent, and at the same time the generation of beacons is started. It is thus possible to set up a connection between station Ml and the base station.
- the base station can be told which stations belong to its own communications network and are thus authorized to set up a connection. For this, the MAC addresses of the authorized stations are stored in the base station. If a request from a station is received by the base station, it can be checked by means of the MAC address held in the request, whether the station in question is authorized for connection setup. Thus only in the event that the station is an authorized station is the generation of beacons started and a response sent. Otherwise the base station does not react to the receipt of the request.
- the wait time t ⁇ which is started when the base station is switched on, and after whose expiry the generation of beacons is ended if no station has set up a connection to the base station, can have a value differing from that of the wait time t w i.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
The invention, which relates to a method for the generation of beacons by a base station in a wireless communications network, consisting of at least one base station and at least one station, the beacons being generated repeatedly at time intervals, is based on the object of specifying a method with which the generation of the beacons can be tailored to needs, achieving a reduction of the energy demand and the emissions, and an improvement in the security. According to the invention, the object is achieved in that the generation of the beacons is started with a switching on of the base station and is ended after the expiry of a wait time tw0 in the event that no station is connected to the base station, and in that the generation of the beacons is started by a receipt of a probe request from a station of the communications network and is ended after the expiry of a wait time tw1 in the event that no station is connected to the base station.
Description
DESCRIPTION
Method for generation of beacons by a base station in a wireless communications network
The invention relates to a method for generation of beacons by a base station in a wireless communications network, consisting of at least one base station and at least one station, the beacons being generated repeatedly at time intervals.
Wireless networks (WLAN ... Wireless Local Area Network) work for example according to the standard IEEE 802.11 and can be operated in the operation modes "Ad-hoc mode" or "Infrastructure mode".
In the ad-hoc mode, no central instance is used; the stations (clients) belonging to the network work equivalently. Communication of the stations with one another is only possible if all stations use the same network name (SSID ... Service Set Identifier) and the same settings for the encryption. The disadvantages of this operation mode are that a station cannot tell whether it is in the transmission range of another station with the same settings; who is part of the network; and what the quality of the connection is.
In the operation mode "Infrastructure mode", a base station (AP ...
Access Point) is provided as a central instance. The coordination within the network is implemented with this. The base station sends special management packets at fixed intervals to all stations in its range of reception. These data packets are also referred to as "beacons", and contain information specific to the base station such as the network name SSID, the type of encryption and the supported data rates. The transmission interval is also called the beacon interval, and in customary base station configurations amounts to 100 ms (corresponding to a transmission of 10 beacons per second).
The beacons support the connection setup in the network, as the clients can thereby recognize an available base station and only need to know the network name and optionally some parameters for the encryption. A further advantage is that the constant sending of the beacons, which are always sent at the lowest transmission rate (e.g. 1 Mbit/sec), enables monitoring of the received signal quality, even in the event that no user data is sent or received.
Since the beacons are sent at time intervals of, for example, 100 ms, i.e. 10 times per second, this is 36000 beacons per hour and 144000 per day. Especially in the area of home applications, in which the network is used only for a few hours a day, the sending of the beacons represents an unnecessary energy demand and an avoidable source of faults. Furthermore, the transmission of the beacons makes the network visible to unwanted users, so that it becomes susceptible to attack.
Since the beacons are only necessary for setting up and maintaining a connection, the generation itself is unnecessary in the remaining time.
For the setup of a connection between a station belonging to the network and the base station, the connection options are determined by the station with a scanning or sampling process. A distinction is made here between passive and active scanning.
In passive scanning the station successively selects all possible channels, and for each channel, checks for the length of a wait time whether a beacon is received. This wait time is sized in such a way according to the transmission interval of the beacons that a beacon can certainly be received.
In active scanning, the station sends a probe request successively to all possible channels, and waits for a probe response from an available base station. The response sent by the base station is very similar to the transmitted beacon. Since the base station sends an immediate response to the station's request in active scanning, the complete scanning process can be executed faster than in passive scanning. Base stations which support active scanning react to the probe request packets independently of the beacon transmission.
From prior art, a method for adapting the beacon interval to the current data traffic in a network is known for example from the EP 1 653 667 Al . The beacons are then generated, admittedly at differing intervals, but still permanently.
Furthermore, many WLAN base stations offer in their setting options the possibility of time-controlled switching on and off of the station, and hence also of the beacons; the beacon generation is then controllable only according to a fixed
setting, and not geared to demand.
The invention is therefore based on the object of specifying a method with which the generation of the beacons can be tailored to needs, achieving a reduction of the energy demand and the emissions, and an improvement in the security.
According to the invention, the object is achieved with a method for generation of beacons by a base station in a wireless communications network of the kind initially mentioned, in that the generation of the beacons is started with a switching on of the base station and is ended after the expiry of a wait time t^ in the event that no station is connected to the base station, and in that the generation of the beacons is started by a receipt of a probe request from a station of the communications network and is ended after the expiry of a wait time twi in the event that no station is connected to the base station.
After activation, a base station disposed in a wireless communications network generates beacons at intervals of 100 ms, for example. These beacons can be received by a station disposed in the radio range of the base station. By means of the information contained in each beacon, it is possible for the station to set up a connection between it and the base station. If at least one connection is established between a station and the base station, the beacons will still be continuously generated. In the event that no station is connected to the base station, the generation of the beacons is ended according to the invention after the expiry of a wait time W This wait time tw0 should be chosen such that a station which has interrupted the connection to the base station because of a fault, for example, is able to establish a renewed connection to the base station. If it can be assumed with certainty after the wait time two has expired that there is no active connection between a station and the base station, and there is also no temporary connection interruption, the generation of the beacons is ended by the base station.
If a request is sent by a station to a base station in the active scanning method, and received by the base station, the process of generation of beacons by the base station starts once again. A response to the station's request is sent from the base station, and likewise contains information for the setup of a connection between the station and the base station. The station can thus set up a connection to the base station, and a data transmission can be started in both directions. So long as at least
one active connection exists between a station and the base station, the process of generating beacons is maintained. The generating of the beacons is only ended by the base station after the expiry of the wait time twi, which is started at the moment when the last connection to the base station was ended. In this case too, it is ensured by the corresponding sizing of the wait time twi that a temporary interruption of the connection between a station and the base station does not lead to the termination of the generation of beacons.
In one development of the invention it is provided that the wait times t^o and twi are the same.
According to the invention, it is ensured by the wait times t^ and twi that a temporary interruption of the connection between a station and the base station does not lead to the cessation of the beacon transmissions. The station thus has the possibility of setting up the connection again after a temporary interruption, with the assistance of the information contained in the beacon. According to the invention, the two wait times can have the same or different values.
In a further development of the invention, it is provided that the generation of the beacons is only started by a receipt of a probe request from a station in the communications network if the request is from a known station, identifiable by a MAC address of the station.
An improvement of the security in the network can be achieved if the base station is told which stations are permitted to set up a connection with the base station. For this purpose, the MAC addresses of the devices permitted to set up connections are stored in the base station. If a station sends a probe request, the base station can check by means of the MAC address included in the request, whether the station is a known station approved for communication. Only in the case of a positive check does the base station generate a response to the request, and start generating beacons.
The invention will now be explained in detail on the basis of an example.
A base station B is disposed in a wireless communications network. In the transmission range of the base station B are two mobile stations Ml and M2; the
mobile stations Ml and M2 can be formed by a laptop, a PDA or a mobile phone with WLAN function, for example. After the base station is switched on, it generates beacons at intervals of 100 ms, these beacons containing information about the network name (SSID) and the supported data transfer rates. The stations Ml and M2 receive these beacons, and read the information they contain. Based on the information they have read, the stations Ml and M2 each establish a connection with the base station according to the standard IEEE 802.11. Data can then be bidirectionally transmitted in the usual way. At a later time, the station Ml terminates its connection to the base station and logs off. The connection to the station M2 is still maintained. During this time, the beacons are continuously generated by the base station. Because of disturbances, from an adjacent wireless communications network for example, there is an interruption of the connection between the station M2 and the base station. At the moment when the last station - in this case station M2 - has interrupted the connection to the base station, the wait time twi begins to run down, its expiry causing the termination of the generation of beacons by the base station. It is necessary for the generation of beacons to continue even while the wait time twi runs down because, as described in the example, a purely temporary interruption of the connection can be the cause of the connection release between a station and the base station. The transmission of the beacons gives the station M2 another opportunity to establish a connection to the base station. After the station M2 is connected again to the base station, it resumes the data transmission to the base station or the receipt of data from the base station. After termination, the station M2 logs off from the base station. From this time, the wait time twi begins to run down once more. Once this time has expired, the base station ceases to generate beacons. The wait time twi should therefore be sized such that a temporary connection break by a station Ml or M2 does not lead to a cessation of the beacon transmission by the base station, rather that the opportunity of a renewed connection by the station Ml or M2 to the base station is offered.
If the generation of beacons is ended by the base station, this consumes less energy, causes fewer emissions, and an improvement of the security in the network is achieved in that stations which are in reception range of the base station can no longer recognize the presence of the base station in passive scanning mode.
If there is subsequently the need to establish a connection between the station M 1 and the base station, the station M 1 must send a request to the base station in the active scanning operation mode. When the base station receives this request, a
response to the request is generated and sent, and at the same time the generation of beacons is started. It is thus possible to set up a connection between station Ml and the base station.
To increase the security in the network, the base station can be told which stations belong to its own communications network and are thus authorized to set up a connection. For this, the MAC addresses of the authorized stations are stored in the base station. If a request from a station is received by the base station, it can be checked by means of the MAC address held in the request, whether the station in question is authorized for connection setup. Thus only in the event that the station is an authorized station is the generation of beacons started and a response sent. Otherwise the base station does not react to the receipt of the request.
The wait time t^, which is started when the base station is switched on, and after whose expiry the generation of beacons is ended if no station has set up a connection to the base station, can have a value differing from that of the wait time twi.
By means of this e.g. much longer wait time t^, it is ensured that after a base station and a laptop are switched on in a home network, the base station will certainly be found for the first time after a sometimes time-consuming start-up of the laptop, even in the passive scanning operation mode usually selected according to the standard IEEE 802.11.
Claims
1. Method for generation of beacons by a base station in a wireless communications network, consisting of at least one base station and at least one station, the beacons being repeatedly generated at time intervals, characterized in that the generation of the beacons is started with a switching on of the base station and is ended after the expiry of a wait time t^ in the event that no station is connected to the base station, and in that the generation of the beacons is started by a receipt of a probe request from a station of the communications network and is ended after the expiry of a wait time twi in the event that no station is connected to the base station.
2. Method according to Claim 1, characterized in that the wait times t^ and twi are the same.
3. Method according to Claim 1 , characterized in that the generation of the beacons is only started by the receipt of a probe request from a station in the communications network if the request is from a known station, identifiable by a MAC address of the station.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/808,185 US8391261B2 (en) | 2007-12-17 | 2008-10-22 | Method for generation of beacons by a base station in a wireless communications network |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP07024453.8 | 2007-12-17 | ||
EP07024453 | 2007-12-17 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009077893A1 true WO2009077893A1 (en) | 2009-06-25 |
Family
ID=40488232
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2008/054349 WO2009077893A1 (en) | 2007-12-17 | 2008-10-22 | Method for generation of beacons by a base station in a wireless communications network |
Country Status (2)
Country | Link |
---|---|
US (1) | US8391261B2 (en) |
WO (1) | WO2009077893A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010142681A1 (en) * | 2009-06-11 | 2010-12-16 | Thomson Telecom Belgium | A power saving method at an access point |
EP2282588A1 (en) * | 2009-07-24 | 2011-02-09 | Thomson Telecom Belgium | A power saving method at an access point |
WO2011024130A2 (en) * | 2009-08-26 | 2011-03-03 | Telefonaktiebolaget L M Ericsson (Publ) | System and methods for reducing power consumed by a base station |
EP2360976A1 (en) * | 2010-02-15 | 2011-08-24 | Alcatel Lucent | A method for scheduling a mode for transmission, a base station and a user terminal therefor |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011015370A1 (en) * | 2009-08-07 | 2011-02-10 | Nec Europe Ltd. | Method for operating a mobile terminal as access point and corresponding mobile terminal |
WO2011106529A2 (en) * | 2010-02-24 | 2011-09-01 | Wherepro, Llc | Data packet generator and implementations of same |
KR20140003577A (en) * | 2011-02-22 | 2014-01-09 | 파나소닉 주식회사 | Wireless communication system and wireless slave and master units used therein |
EP3099117A4 (en) * | 2014-06-27 | 2017-07-12 | Huawei Technologies Co., Ltd. | Energy saving method and wake-up method for wireless ap, related device and system |
NL1041509B1 (en) | 2015-10-08 | 2017-04-26 | Assumite Gladium Spiritus B V | Activation procedure for low radiation wireless networks. |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003075586A1 (en) * | 2002-03-06 | 2003-09-12 | Koninklijke Philips Electronics N.V. | Method to reduce power consumption in a radio communication system and apparatus therefor |
WO2004075583A1 (en) * | 2003-02-24 | 2004-09-02 | Swisscom Ag | Reduction of electrosmog in wireless local networks |
EP1684466A1 (en) * | 2005-01-21 | 2006-07-26 | Research In Motion Limited | Power saving and handling broadcast as unicast traffic in a WLAN |
US20070021093A1 (en) * | 2005-07-21 | 2007-01-25 | Steve Chu | Network communications security enhancing |
DE102005051291A1 (en) * | 2005-10-26 | 2007-05-03 | Siemens Ag | Method for controlling base stations in wireless communication networks |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7333460B2 (en) | 2003-03-25 | 2008-02-19 | Nokia Corporation | Adaptive beacon interval in WLAN |
US7412265B2 (en) * | 2003-06-12 | 2008-08-12 | Industrial Technology Research Institute | Method and system for power-saving in a wireless local area network |
KR100539980B1 (en) * | 2003-08-13 | 2005-12-29 | 삼성전자주식회사 | Method for transmitting a beacon and apparatus for performing the same, method for transmitting/receiving a frame and apparatus for performing the same |
US7436790B2 (en) | 2004-03-25 | 2008-10-14 | Research In Motion Limited | Wireless access point methods and apparatus for reduced power consumption and cost |
JP4313715B2 (en) * | 2004-04-01 | 2009-08-12 | Okiセミコンダクタ株式会社 | Synchronization establishment circuit and synchronization establishment method |
EP1653667A1 (en) | 2004-10-26 | 2006-05-03 | Alcatel | A method for dynamically adapting beacon frames, an access point and a program module therefor |
-
2008
- 2008-10-22 WO PCT/IB2008/054349 patent/WO2009077893A1/en active Application Filing
- 2008-10-22 US US12/808,185 patent/US8391261B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003075586A1 (en) * | 2002-03-06 | 2003-09-12 | Koninklijke Philips Electronics N.V. | Method to reduce power consumption in a radio communication system and apparatus therefor |
WO2004075583A1 (en) * | 2003-02-24 | 2004-09-02 | Swisscom Ag | Reduction of electrosmog in wireless local networks |
EP1684466A1 (en) * | 2005-01-21 | 2006-07-26 | Research In Motion Limited | Power saving and handling broadcast as unicast traffic in a WLAN |
US20070021093A1 (en) * | 2005-07-21 | 2007-01-25 | Steve Chu | Network communications security enhancing |
DE102005051291A1 (en) * | 2005-10-26 | 2007-05-03 | Siemens Ag | Method for controlling base stations in wireless communication networks |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010142681A1 (en) * | 2009-06-11 | 2010-12-16 | Thomson Telecom Belgium | A power saving method at an access point |
US9088949B2 (en) | 2009-06-11 | 2015-07-21 | Thomson Licensing | Power saving method at an access point |
EP2282588A1 (en) * | 2009-07-24 | 2011-02-09 | Thomson Telecom Belgium | A power saving method at an access point |
WO2011024130A2 (en) * | 2009-08-26 | 2011-03-03 | Telefonaktiebolaget L M Ericsson (Publ) | System and methods for reducing power consumed by a base station |
WO2011024130A3 (en) * | 2009-08-26 | 2011-05-19 | Telefonaktiebolaget L M Ericsson (Publ) | System and methods for reducing power consumed by a base station |
US8526305B2 (en) | 2009-08-26 | 2013-09-03 | Telefonaktiebolaget L M Ericsson (Publ) | System and methods for reducing power consumed by a base station |
EP2360976A1 (en) * | 2010-02-15 | 2011-08-24 | Alcatel Lucent | A method for scheduling a mode for transmission, a base station and a user terminal therefor |
Also Published As
Publication number | Publication date |
---|---|
US8391261B2 (en) | 2013-03-05 |
US20100296501A1 (en) | 2010-11-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8391261B2 (en) | Method for generation of beacons by a base station in a wireless communications network | |
US11463988B2 (en) | Uplink broadcast service in a wireless local area network (WLAN) | |
EP3747225B1 (en) | Method and apparatus for triggering transmission carrier selection in wireless communication system | |
CN101939924B (en) | Time slot reuse method | |
EP1524799B1 (en) | Radio information transmitting system, radio communication method, and radio terminal device | |
CA2419897C (en) | Seamless roaming options in an ieee 802.11 compliant network | |
CA2717282C (en) | Handling mismatch of cryptographic keys and related battery drain and communication exchange failures | |
WO2001015387A1 (en) | Direct mode communication method between two mobile terminals in access point controlled wireless lan systems | |
US8804643B2 (en) | Method for enabling multi-channel signaling in a communication network | |
JP2009539323A (en) | Physical layer repeater with roaming support based on multiple identifiers | |
US8605596B2 (en) | Medium access for de-centralized wireless network | |
JP5033852B2 (en) | Meter reading data collection system | |
JP2001231082A (en) | Method for transmitting encrypted number in communication system, and mobile communication system | |
WO2020010300A1 (en) | Uplink service access via a wireless local area network (wlan) | |
US10187820B2 (en) | System and method for reducing signaling overhead | |
KR20220119477A (en) | Method and device for sidelink communication | |
EP2282583A1 (en) | Wireless access point implementing variable beacon transmission intervals | |
CN103384365A (en) | Method and system for network access, method for processing business and equipment | |
CN108684021A (en) | A kind of Bluetooth Low Energy communication means and device | |
WO2011064858A1 (en) | Wireless authentication terminal | |
CN101601324B (en) | Wireless non-cellular network | |
KR101920487B1 (en) | Method for relaying of base station and method for relaying of terminal | |
WO2010041127A1 (en) | Method and apparatus for communicating over multiple networks | |
JP2008521271A (en) | Method and apparatus for disassociating a wireless station in a wireless network | |
JP2024001289A (en) | Method for power-optimized data transmission in wireless cellular network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08862154 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12808185 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08862154 Country of ref document: EP Kind code of ref document: A1 |