WO2009077893A1 - Method for generation of beacons by a base station in a wireless communications network - Google Patents

Method for generation of beacons by a base station in a wireless communications network Download PDF

Info

Publication number
WO2009077893A1
WO2009077893A1 PCT/IB2008/054349 IB2008054349W WO2009077893A1 WO 2009077893 A1 WO2009077893 A1 WO 2009077893A1 IB 2008054349 W IB2008054349 W IB 2008054349W WO 2009077893 A1 WO2009077893 A1 WO 2009077893A1
Authority
WO
WIPO (PCT)
Prior art keywords
base station
station
beacons
generation
connection
Prior art date
Application number
PCT/IB2008/054349
Other languages
French (fr)
Inventor
Joerg Unbehaun
Original Assignee
Nxp B.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nxp B.V. filed Critical Nxp B.V.
Priority to US12/808,185 priority Critical patent/US8391261B2/en
Publication of WO2009077893A1 publication Critical patent/WO2009077893A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0203Power saving arrangements in the radio access network or backbone network of wireless communication networks
    • H04W52/0206Power saving arrangements in the radio access network or backbone network of wireless communication networks in access points, e.g. base stations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0212Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave
    • H04W52/0216Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave using a pre-established activity schedule, e.g. traffic indication frame
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • the invention relates to a method for generation of beacons by a base station in a wireless communications network, consisting of at least one base station and at least one station, the beacons being generated repeatedly at time intervals.
  • Wireless networks work for example according to the standard IEEE 802.11 and can be operated in the operation modes "Ad-hoc mode” or "Infrastructure mode".
  • a base station In the operation mode "Infrastructure mode", a base station (AP ...
  • the base station sends special management packets at fixed intervals to all stations in its range of reception. These data packets are also referred to as "beacons”, and contain information specific to the base station such as the network name SSID, the type of encryption and the supported data rates.
  • the transmission interval is also called the beacon interval, and in customary base station configurations amounts to 100 ms (corresponding to a transmission of 10 beacons per second).
  • the beacons support the connection setup in the network, as the clients can thereby recognize an available base station and only need to know the network name and optionally some parameters for the encryption.
  • a further advantage is that the constant sending of the beacons, which are always sent at the lowest transmission rate (e.g. 1 Mbit/sec), enables monitoring of the received signal quality, even in the event that no user data is sent or received. Since the beacons are sent at time intervals of, for example, 100 ms, i.e. 10 times per second, this is 36000 beacons per hour and 144000 per day. Especially in the area of home applications, in which the network is used only for a few hours a day, the sending of the beacons represents an unnecessary energy demand and an avoidable source of faults. Furthermore, the transmission of the beacons makes the network visible to unwanted users, so that it becomes susceptible to attack.
  • connection options are determined by the station with a scanning or sampling process. A distinction is made here between passive and active scanning.
  • the station In passive scanning the station successively selects all possible channels, and for each channel, checks for the length of a wait time whether a beacon is received.
  • This wait time is sized in such a way according to the transmission interval of the beacons that a beacon can certainly be received.
  • the station In active scanning, the station sends a probe request successively to all possible channels, and waits for a probe response from an available base station.
  • the response sent by the base station is very similar to the transmitted beacon. Since the base station sends an immediate response to the station's request in active scanning, the complete scanning process can be executed faster than in passive scanning.
  • Base stations which support active scanning react to the probe request packets independently of the beacon transmission.
  • beacon generation is then controllable only according to a fixed setting, and not geared to demand.
  • the invention is therefore based on the object of specifying a method with which the generation of the beacons can be tailored to needs, achieving a reduction of the energy demand and the emissions, and an improvement in the security.
  • the object is achieved with a method for generation of beacons by a base station in a wireless communications network of the kind initially mentioned, in that the generation of the beacons is started with a switching on of the base station and is ended after the expiry of a wait time t ⁇ in the event that no station is connected to the base station, and in that the generation of the beacons is started by a receipt of a probe request from a station of the communications network and is ended after the expiry of a wait time t w i in the event that no station is connected to the base station.
  • a base station disposed in a wireless communications network After activation, a base station disposed in a wireless communications network generates beacons at intervals of 100 ms, for example. These beacons can be received by a station disposed in the radio range of the base station. By means of the information contained in each beacon, it is possible for the station to set up a connection between it and the base station. If at least one connection is established between a station and the base station, the beacons will still be continuously generated. In the event that no station is connected to the base station, the generation of the beacons is ended according to the invention after the expiry of a wait time W This wait time t w0 should be chosen such that a station which has interrupted the connection to the base station because of a fault, for example, is able to establish a renewed connection to the base station. If it can be assumed with certainty after the wait time two has expired that there is no active connection between a station and the base station, and there is also no temporary connection interruption, the generation of the beacons is ended by the base station.
  • a request is sent by a station to a base station in the active scanning method, and received by the base station, the process of generation of beacons by the base station starts once again.
  • a response to the station's request is sent from the base station, and likewise contains information for the setup of a connection between the station and the base station.
  • the station can thus set up a connection to the base station, and a data transmission can be started in both directions. So long as at least one active connection exists between a station and the base station, the process of generating beacons is maintained.
  • the generating of the beacons is only ended by the base station after the expiry of the wait time t w i, which is started at the moment when the last connection to the base station was ended. In this case too, it is ensured by the corresponding sizing of the wait time t w i that a temporary interruption of the connection between a station and the base station does not lead to the termination of the generation of beacons.
  • the two wait times can have the same or different values.
  • the generation of the beacons is only started by a receipt of a probe request from a station in the communications network if the request is from a known station, identifiable by a MAC address of the station.
  • An improvement of the security in the network can be achieved if the base station is told which stations are permitted to set up a connection with the base station. For this purpose, the MAC addresses of the devices permitted to set up connections are stored in the base station. If a station sends a probe request, the base station can check by means of the MAC address included in the request, whether the station is a known station approved for communication. Only in the case of a positive check does the base station generate a response to the request, and start generating beacons.
  • a base station B is disposed in a wireless communications network.
  • the base station B In the transmission range of the base station B are two mobile stations Ml and M2; the mobile stations Ml and M2 can be formed by a laptop, a PDA or a mobile phone with WLAN function, for example.
  • the base station After the base station is switched on, it generates beacons at intervals of 100 ms, these beacons containing information about the network name (SSID) and the supported data transfer rates.
  • the stations Ml and M2 receive these beacons, and read the information they contain. Based on the information they have read, the stations Ml and M2 each establish a connection with the base station according to the standard IEEE 802.11. Data can then be bidirectionally transmitted in the usual way.
  • the station Ml terminates its connection to the base station and logs off.
  • the connection to the station M2 is still maintained.
  • the beacons are continuously generated by the base station. Because of disturbances, from an adjacent wireless communications network for example, there is an interruption of the connection between the station M2 and the base station.
  • the wait time t w i begins to run down, its expiry causing the termination of the generation of beacons by the base station.
  • beacons It is necessary for the generation of beacons to continue even while the wait time t w i runs down because, as described in the example, a purely temporary interruption of the connection can be the cause of the connection release between a station and the base station.
  • the transmission of the beacons gives the station M2 another opportunity to establish a connection to the base station. After the station M2 is connected again to the base station, it resumes the data transmission to the base station or the receipt of data from the base station. After termination, the station M2 logs off from the base station. From this time, the wait time t w i begins to run down once more. Once this time has expired, the base station ceases to generate beacons.
  • the wait time t w i should therefore be sized such that a temporary connection break by a station Ml or M2 does not lead to a cessation of the beacon transmission by the base station, rather that the opportunity of a renewed connection by the station Ml or M2 to the base station is offered.
  • beacons are ended by the base station, this consumes less energy, causes fewer emissions, and an improvement of the security in the network is achieved in that stations which are in reception range of the base station can no longer recognize the presence of the base station in passive scanning mode.
  • the station M 1 If there is subsequently the need to establish a connection between the station M 1 and the base station, the station M 1 must send a request to the base station in the active scanning operation mode. When the base station receives this request, a response to the request is generated and sent, and at the same time the generation of beacons is started. It is thus possible to set up a connection between station Ml and the base station.
  • the base station can be told which stations belong to its own communications network and are thus authorized to set up a connection. For this, the MAC addresses of the authorized stations are stored in the base station. If a request from a station is received by the base station, it can be checked by means of the MAC address held in the request, whether the station in question is authorized for connection setup. Thus only in the event that the station is an authorized station is the generation of beacons started and a response sent. Otherwise the base station does not react to the receipt of the request.
  • the wait time t ⁇ which is started when the base station is switched on, and after whose expiry the generation of beacons is ended if no station has set up a connection to the base station, can have a value differing from that of the wait time t w i.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention, which relates to a method for the generation of beacons by a base station in a wireless communications network, consisting of at least one base station and at least one station, the beacons being generated repeatedly at time intervals, is based on the object of specifying a method with which the generation of the beacons can be tailored to needs, achieving a reduction of the energy demand and the emissions, and an improvement in the security. According to the invention, the object is achieved in that the generation of the beacons is started with a switching on of the base station and is ended after the expiry of a wait time tw0 in the event that no station is connected to the base station, and in that the generation of the beacons is started by a receipt of a probe request from a station of the communications network and is ended after the expiry of a wait time tw1 in the event that no station is connected to the base station.

Description

DESCRIPTION
Method for generation of beacons by a base station in a wireless communications network
The invention relates to a method for generation of beacons by a base station in a wireless communications network, consisting of at least one base station and at least one station, the beacons being generated repeatedly at time intervals.
Wireless networks (WLAN ... Wireless Local Area Network) work for example according to the standard IEEE 802.11 and can be operated in the operation modes "Ad-hoc mode" or "Infrastructure mode".
In the ad-hoc mode, no central instance is used; the stations (clients) belonging to the network work equivalently. Communication of the stations with one another is only possible if all stations use the same network name (SSID ... Service Set Identifier) and the same settings for the encryption. The disadvantages of this operation mode are that a station cannot tell whether it is in the transmission range of another station with the same settings; who is part of the network; and what the quality of the connection is.
In the operation mode "Infrastructure mode", a base station (AP ...
Access Point) is provided as a central instance. The coordination within the network is implemented with this. The base station sends special management packets at fixed intervals to all stations in its range of reception. These data packets are also referred to as "beacons", and contain information specific to the base station such as the network name SSID, the type of encryption and the supported data rates. The transmission interval is also called the beacon interval, and in customary base station configurations amounts to 100 ms (corresponding to a transmission of 10 beacons per second).
The beacons support the connection setup in the network, as the clients can thereby recognize an available base station and only need to know the network name and optionally some parameters for the encryption. A further advantage is that the constant sending of the beacons, which are always sent at the lowest transmission rate (e.g. 1 Mbit/sec), enables monitoring of the received signal quality, even in the event that no user data is sent or received. Since the beacons are sent at time intervals of, for example, 100 ms, i.e. 10 times per second, this is 36000 beacons per hour and 144000 per day. Especially in the area of home applications, in which the network is used only for a few hours a day, the sending of the beacons represents an unnecessary energy demand and an avoidable source of faults. Furthermore, the transmission of the beacons makes the network visible to unwanted users, so that it becomes susceptible to attack.
Since the beacons are only necessary for setting up and maintaining a connection, the generation itself is unnecessary in the remaining time.
For the setup of a connection between a station belonging to the network and the base station, the connection options are determined by the station with a scanning or sampling process. A distinction is made here between passive and active scanning.
In passive scanning the station successively selects all possible channels, and for each channel, checks for the length of a wait time whether a beacon is received. This wait time is sized in such a way according to the transmission interval of the beacons that a beacon can certainly be received.
In active scanning, the station sends a probe request successively to all possible channels, and waits for a probe response from an available base station. The response sent by the base station is very similar to the transmitted beacon. Since the base station sends an immediate response to the station's request in active scanning, the complete scanning process can be executed faster than in passive scanning. Base stations which support active scanning react to the probe request packets independently of the beacon transmission.
From prior art, a method for adapting the beacon interval to the current data traffic in a network is known for example from the EP 1 653 667 Al . The beacons are then generated, admittedly at differing intervals, but still permanently.
Furthermore, many WLAN base stations offer in their setting options the possibility of time-controlled switching on and off of the station, and hence also of the beacons; the beacon generation is then controllable only according to a fixed setting, and not geared to demand.
The invention is therefore based on the object of specifying a method with which the generation of the beacons can be tailored to needs, achieving a reduction of the energy demand and the emissions, and an improvement in the security.
According to the invention, the object is achieved with a method for generation of beacons by a base station in a wireless communications network of the kind initially mentioned, in that the generation of the beacons is started with a switching on of the base station and is ended after the expiry of a wait time t^ in the event that no station is connected to the base station, and in that the generation of the beacons is started by a receipt of a probe request from a station of the communications network and is ended after the expiry of a wait time twi in the event that no station is connected to the base station.
After activation, a base station disposed in a wireless communications network generates beacons at intervals of 100 ms, for example. These beacons can be received by a station disposed in the radio range of the base station. By means of the information contained in each beacon, it is possible for the station to set up a connection between it and the base station. If at least one connection is established between a station and the base station, the beacons will still be continuously generated. In the event that no station is connected to the base station, the generation of the beacons is ended according to the invention after the expiry of a wait time W This wait time tw0 should be chosen such that a station which has interrupted the connection to the base station because of a fault, for example, is able to establish a renewed connection to the base station. If it can be assumed with certainty after the wait time two has expired that there is no active connection between a station and the base station, and there is also no temporary connection interruption, the generation of the beacons is ended by the base station.
If a request is sent by a station to a base station in the active scanning method, and received by the base station, the process of generation of beacons by the base station starts once again. A response to the station's request is sent from the base station, and likewise contains information for the setup of a connection between the station and the base station. The station can thus set up a connection to the base station, and a data transmission can be started in both directions. So long as at least one active connection exists between a station and the base station, the process of generating beacons is maintained. The generating of the beacons is only ended by the base station after the expiry of the wait time twi, which is started at the moment when the last connection to the base station was ended. In this case too, it is ensured by the corresponding sizing of the wait time twi that a temporary interruption of the connection between a station and the base station does not lead to the termination of the generation of beacons.
In one development of the invention it is provided that the wait times t^o and twi are the same.
According to the invention, it is ensured by the wait times t^ and twi that a temporary interruption of the connection between a station and the base station does not lead to the cessation of the beacon transmissions. The station thus has the possibility of setting up the connection again after a temporary interruption, with the assistance of the information contained in the beacon. According to the invention, the two wait times can have the same or different values.
In a further development of the invention, it is provided that the generation of the beacons is only started by a receipt of a probe request from a station in the communications network if the request is from a known station, identifiable by a MAC address of the station.
An improvement of the security in the network can be achieved if the base station is told which stations are permitted to set up a connection with the base station. For this purpose, the MAC addresses of the devices permitted to set up connections are stored in the base station. If a station sends a probe request, the base station can check by means of the MAC address included in the request, whether the station is a known station approved for communication. Only in the case of a positive check does the base station generate a response to the request, and start generating beacons.
The invention will now be explained in detail on the basis of an example.
A base station B is disposed in a wireless communications network. In the transmission range of the base station B are two mobile stations Ml and M2; the mobile stations Ml and M2 can be formed by a laptop, a PDA or a mobile phone with WLAN function, for example. After the base station is switched on, it generates beacons at intervals of 100 ms, these beacons containing information about the network name (SSID) and the supported data transfer rates. The stations Ml and M2 receive these beacons, and read the information they contain. Based on the information they have read, the stations Ml and M2 each establish a connection with the base station according to the standard IEEE 802.11. Data can then be bidirectionally transmitted in the usual way. At a later time, the station Ml terminates its connection to the base station and logs off. The connection to the station M2 is still maintained. During this time, the beacons are continuously generated by the base station. Because of disturbances, from an adjacent wireless communications network for example, there is an interruption of the connection between the station M2 and the base station. At the moment when the last station - in this case station M2 - has interrupted the connection to the base station, the wait time twi begins to run down, its expiry causing the termination of the generation of beacons by the base station. It is necessary for the generation of beacons to continue even while the wait time twi runs down because, as described in the example, a purely temporary interruption of the connection can be the cause of the connection release between a station and the base station. The transmission of the beacons gives the station M2 another opportunity to establish a connection to the base station. After the station M2 is connected again to the base station, it resumes the data transmission to the base station or the receipt of data from the base station. After termination, the station M2 logs off from the base station. From this time, the wait time twi begins to run down once more. Once this time has expired, the base station ceases to generate beacons. The wait time twi should therefore be sized such that a temporary connection break by a station Ml or M2 does not lead to a cessation of the beacon transmission by the base station, rather that the opportunity of a renewed connection by the station Ml or M2 to the base station is offered.
If the generation of beacons is ended by the base station, this consumes less energy, causes fewer emissions, and an improvement of the security in the network is achieved in that stations which are in reception range of the base station can no longer recognize the presence of the base station in passive scanning mode.
If there is subsequently the need to establish a connection between the station M 1 and the base station, the station M 1 must send a request to the base station in the active scanning operation mode. When the base station receives this request, a response to the request is generated and sent, and at the same time the generation of beacons is started. It is thus possible to set up a connection between station Ml and the base station.
To increase the security in the network, the base station can be told which stations belong to its own communications network and are thus authorized to set up a connection. For this, the MAC addresses of the authorized stations are stored in the base station. If a request from a station is received by the base station, it can be checked by means of the MAC address held in the request, whether the station in question is authorized for connection setup. Thus only in the event that the station is an authorized station is the generation of beacons started and a response sent. Otherwise the base station does not react to the receipt of the request.
The wait time t^, which is started when the base station is switched on, and after whose expiry the generation of beacons is ended if no station has set up a connection to the base station, can have a value differing from that of the wait time twi.
By means of this e.g. much longer wait time t^, it is ensured that after a base station and a laptop are switched on in a home network, the base station will certainly be found for the first time after a sometimes time-consuming start-up of the laptop, even in the passive scanning operation mode usually selected according to the standard IEEE 802.11.

Claims

Claims
1. Method for generation of beacons by a base station in a wireless communications network, consisting of at least one base station and at least one station, the beacons being repeatedly generated at time intervals, characterized in that the generation of the beacons is started with a switching on of the base station and is ended after the expiry of a wait time t^ in the event that no station is connected to the base station, and in that the generation of the beacons is started by a receipt of a probe request from a station of the communications network and is ended after the expiry of a wait time twi in the event that no station is connected to the base station.
2. Method according to Claim 1, characterized in that the wait times t^ and twi are the same.
3. Method according to Claim 1 , characterized in that the generation of the beacons is only started by the receipt of a probe request from a station in the communications network if the request is from a known station, identifiable by a MAC address of the station.
PCT/IB2008/054349 2007-12-17 2008-10-22 Method for generation of beacons by a base station in a wireless communications network WO2009077893A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/808,185 US8391261B2 (en) 2007-12-17 2008-10-22 Method for generation of beacons by a base station in a wireless communications network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP07024453.8 2007-12-17
EP07024453 2007-12-17

Publications (1)

Publication Number Publication Date
WO2009077893A1 true WO2009077893A1 (en) 2009-06-25

Family

ID=40488232

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2008/054349 WO2009077893A1 (en) 2007-12-17 2008-10-22 Method for generation of beacons by a base station in a wireless communications network

Country Status (2)

Country Link
US (1) US8391261B2 (en)
WO (1) WO2009077893A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010142681A1 (en) * 2009-06-11 2010-12-16 Thomson Telecom Belgium A power saving method at an access point
EP2282588A1 (en) * 2009-07-24 2011-02-09 Thomson Telecom Belgium A power saving method at an access point
WO2011024130A2 (en) * 2009-08-26 2011-03-03 Telefonaktiebolaget L M Ericsson (Publ) System and methods for reducing power consumed by a base station
EP2360976A1 (en) * 2010-02-15 2011-08-24 Alcatel Lucent A method for scheduling a mode for transmission, a base station and a user terminal therefor

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011015370A1 (en) * 2009-08-07 2011-02-10 Nec Europe Ltd. Method for operating a mobile terminal as access point and corresponding mobile terminal
WO2011106529A2 (en) * 2010-02-24 2011-09-01 Wherepro, Llc Data packet generator and implementations of same
KR20140003577A (en) * 2011-02-22 2014-01-09 파나소닉 주식회사 Wireless communication system and wireless slave and master units used therein
EP3099117A4 (en) * 2014-06-27 2017-07-12 Huawei Technologies Co., Ltd. Energy saving method and wake-up method for wireless ap, related device and system
NL1041509B1 (en) 2015-10-08 2017-04-26 Assumite Gladium Spiritus B V Activation procedure for low radiation wireless networks.

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003075586A1 (en) * 2002-03-06 2003-09-12 Koninklijke Philips Electronics N.V. Method to reduce power consumption in a radio communication system and apparatus therefor
WO2004075583A1 (en) * 2003-02-24 2004-09-02 Swisscom Ag Reduction of electrosmog in wireless local networks
EP1684466A1 (en) * 2005-01-21 2006-07-26 Research In Motion Limited Power saving and handling broadcast as unicast traffic in a WLAN
US20070021093A1 (en) * 2005-07-21 2007-01-25 Steve Chu Network communications security enhancing
DE102005051291A1 (en) * 2005-10-26 2007-05-03 Siemens Ag Method for controlling base stations in wireless communication networks

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7333460B2 (en) 2003-03-25 2008-02-19 Nokia Corporation Adaptive beacon interval in WLAN
US7412265B2 (en) * 2003-06-12 2008-08-12 Industrial Technology Research Institute Method and system for power-saving in a wireless local area network
KR100539980B1 (en) * 2003-08-13 2005-12-29 삼성전자주식회사 Method for transmitting a beacon and apparatus for performing the same, method for transmitting/receiving a frame and apparatus for performing the same
US7436790B2 (en) 2004-03-25 2008-10-14 Research In Motion Limited Wireless access point methods and apparatus for reduced power consumption and cost
JP4313715B2 (en) * 2004-04-01 2009-08-12 Okiセミコンダクタ株式会社 Synchronization establishment circuit and synchronization establishment method
EP1653667A1 (en) 2004-10-26 2006-05-03 Alcatel A method for dynamically adapting beacon frames, an access point and a program module therefor

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003075586A1 (en) * 2002-03-06 2003-09-12 Koninklijke Philips Electronics N.V. Method to reduce power consumption in a radio communication system and apparatus therefor
WO2004075583A1 (en) * 2003-02-24 2004-09-02 Swisscom Ag Reduction of electrosmog in wireless local networks
EP1684466A1 (en) * 2005-01-21 2006-07-26 Research In Motion Limited Power saving and handling broadcast as unicast traffic in a WLAN
US20070021093A1 (en) * 2005-07-21 2007-01-25 Steve Chu Network communications security enhancing
DE102005051291A1 (en) * 2005-10-26 2007-05-03 Siemens Ag Method for controlling base stations in wireless communication networks

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010142681A1 (en) * 2009-06-11 2010-12-16 Thomson Telecom Belgium A power saving method at an access point
US9088949B2 (en) 2009-06-11 2015-07-21 Thomson Licensing Power saving method at an access point
EP2282588A1 (en) * 2009-07-24 2011-02-09 Thomson Telecom Belgium A power saving method at an access point
WO2011024130A2 (en) * 2009-08-26 2011-03-03 Telefonaktiebolaget L M Ericsson (Publ) System and methods for reducing power consumed by a base station
WO2011024130A3 (en) * 2009-08-26 2011-05-19 Telefonaktiebolaget L M Ericsson (Publ) System and methods for reducing power consumed by a base station
US8526305B2 (en) 2009-08-26 2013-09-03 Telefonaktiebolaget L M Ericsson (Publ) System and methods for reducing power consumed by a base station
EP2360976A1 (en) * 2010-02-15 2011-08-24 Alcatel Lucent A method for scheduling a mode for transmission, a base station and a user terminal therefor

Also Published As

Publication number Publication date
US8391261B2 (en) 2013-03-05
US20100296501A1 (en) 2010-11-25

Similar Documents

Publication Publication Date Title
US8391261B2 (en) Method for generation of beacons by a base station in a wireless communications network
US11463988B2 (en) Uplink broadcast service in a wireless local area network (WLAN)
EP3747225B1 (en) Method and apparatus for triggering transmission carrier selection in wireless communication system
CN101939924B (en) Time slot reuse method
EP1524799B1 (en) Radio information transmitting system, radio communication method, and radio terminal device
CA2419897C (en) Seamless roaming options in an ieee 802.11 compliant network
CA2717282C (en) Handling mismatch of cryptographic keys and related battery drain and communication exchange failures
WO2001015387A1 (en) Direct mode communication method between two mobile terminals in access point controlled wireless lan systems
US8804643B2 (en) Method for enabling multi-channel signaling in a communication network
JP2009539323A (en) Physical layer repeater with roaming support based on multiple identifiers
US8605596B2 (en) Medium access for de-centralized wireless network
JP5033852B2 (en) Meter reading data collection system
JP2001231082A (en) Method for transmitting encrypted number in communication system, and mobile communication system
WO2020010300A1 (en) Uplink service access via a wireless local area network (wlan)
US10187820B2 (en) System and method for reducing signaling overhead
KR20220119477A (en) Method and device for sidelink communication
EP2282583A1 (en) Wireless access point implementing variable beacon transmission intervals
CN103384365A (en) Method and system for network access, method for processing business and equipment
CN108684021A (en) A kind of Bluetooth Low Energy communication means and device
WO2011064858A1 (en) Wireless authentication terminal
CN101601324B (en) Wireless non-cellular network
KR101920487B1 (en) Method for relaying of base station and method for relaying of terminal
WO2010041127A1 (en) Method and apparatus for communicating over multiple networks
JP2008521271A (en) Method and apparatus for disassociating a wireless station in a wireless network
JP2024001289A (en) Method for power-optimized data transmission in wireless cellular network

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08862154

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 12808185

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08862154

Country of ref document: EP

Kind code of ref document: A1