CA2481416A1 - System and method for identifying potential hidden node problems in multi-hop wireless ad-hoc networks - Google Patents
System and method for identifying potential hidden node problems in multi-hop wireless ad-hoc networks Download PDFInfo
- Publication number
- CA2481416A1 CA2481416A1 CA002481416A CA2481416A CA2481416A1 CA 2481416 A1 CA2481416 A1 CA 2481416A1 CA 002481416 A CA002481416 A CA 002481416A CA 2481416 A CA2481416 A CA 2481416A CA 2481416 A1 CA2481416 A1 CA 2481416A1
- Authority
- CA
- Canada
- Prior art keywords
- node
- neighbor node
- nodes
- neighbor
- instructions
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/005—Discovery of network devices, e.g. terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Abstract
A system and method for identifying potential hidden node problems in a multi-hop wireless ad-hoc communication network (100), such as an 802.11 network.
The system and method evaluates the relationship between the neighbors of each respective node (102) to identify nodes (102,104,106) of a wireless ad-hoc communication network (100) whose capabilities of receiving data packets can be adversely affected by hidden node problems in order to avoid selecting paths containing those potentially problem nodes (102,104,106) for routing data packets. Specifically, for each node (102,104,106) , the system and method generates a node metric identifying the relationship between the neighbors of a node. Each node (102,104,106) can then transmit its respective metric with its routing advertisement data, so that other nodes can assess the degree of potential hidden node problem that may be experienced by that node, and can choose to avoid using that potentially problem node for routing data packets to other nodes.
The system and method evaluates the relationship between the neighbors of each respective node (102) to identify nodes (102,104,106) of a wireless ad-hoc communication network (100) whose capabilities of receiving data packets can be adversely affected by hidden node problems in order to avoid selecting paths containing those potentially problem nodes (102,104,106) for routing data packets. Specifically, for each node (102,104,106) , the system and method generates a node metric identifying the relationship between the neighbors of a node. Each node (102,104,106) can then transmit its respective metric with its routing advertisement data, so that other nodes can assess the degree of potential hidden node problem that may be experienced by that node, and can choose to avoid using that potentially problem node for routing data packets to other nodes.
Description
SYSTEM AND METHOD FOR IDENTIFYING POTENTIAL HIDDEN NODE PROBLEMS IN MULTI-HOP
WIRELESS AD-HOC NETWORKS
BACKGROUND OF THE INVENTION
Field of the Invention:
(0001] The present invention relates to a system and method for identifying potential hidden node problems in a multi-hop wireless ad-hoc communication network, such as an 802.I I network. More particularly, the present invention relates to a system and method for identifying nodes of a wireless ad-,hoc communication network whose capabilities of receiving data packets can be adversely affected by hidden node problems, in order to avoid selecting paths containing those potentially problem nodes for routing data packets. This application claims benefit from U.S. Provisional Patent Application Serial No.
60/37I,7I8 entitled "A System And Method For Identifying Potential Hidden Node Problems in Multi-Hop Wireless Ad-Hoc Networks For The Purpose Of Avoiding Such Potentially Problem Nodes In Route Selection", filed April 12, 2002, and from U.S. Patent Application Serial No.
10/298,542, filed on November 19, 2002, the entire contents of which are incorporated herein by reference.
Description of the Related Art:
WIRELESS AD-HOC NETWORKS
BACKGROUND OF THE INVENTION
Field of the Invention:
(0001] The present invention relates to a system and method for identifying potential hidden node problems in a multi-hop wireless ad-hoc communication network, such as an 802.I I network. More particularly, the present invention relates to a system and method for identifying nodes of a wireless ad-,hoc communication network whose capabilities of receiving data packets can be adversely affected by hidden node problems, in order to avoid selecting paths containing those potentially problem nodes for routing data packets. This application claims benefit from U.S. Provisional Patent Application Serial No.
60/37I,7I8 entitled "A System And Method For Identifying Potential Hidden Node Problems in Multi-Hop Wireless Ad-Hoc Networks For The Purpose Of Avoiding Such Potentially Problem Nodes In Route Selection", filed April 12, 2002, and from U.S. Patent Application Serial No.
10/298,542, filed on November 19, 2002, the entire contents of which are incorporated herein by reference.
Description of the Related Art:
(0002] In recent years, a type of mobile communications network known as an "ad-hoc"
network has been developed. In this type of network, each user terminal (hereinafter "mobile node") is capable of operating as a base station or router for the other mobile nodes, thus eliminating the need for a fixed infrastructure of base stations. Accordingly, data packets being sent from a source mobile node to a destination mobile node are typically routed through a number of intermediate mobile nodes before reaching the destination mobile node.
network has been developed. In this type of network, each user terminal (hereinafter "mobile node") is capable of operating as a base station or router for the other mobile nodes, thus eliminating the need for a fixed infrastructure of base stations. Accordingly, data packets being sent from a source mobile node to a destination mobile node are typically routed through a number of intermediate mobile nodes before reaching the destination mobile node.
(0003] More sophisticated ad-hoc networks are also being developed which, in addition to enabling mobile nodes to communicate with each other as in a conventional ad-hoc network, further enable the mobile nodes to access a fixed network and thus communicate with other types of user terminals, such as those on the public switched telephone network (PSTN) and on other networks such as the Internet. Details of these types of ad-hoc networks are described in U.S. patent application Serial No. 09/897,790 entitled "Ad Hoc Peer~to-Peer Mobile Radio Access System Interfaced to the PSTN and Cellular Networks", filed on June 29, 2001, in U.S. patent application Serial No. 09/815,157 entitled "Time Division Protocol for an Ad-Hoc, Peer-to-Peer Radio Network Having Coordinating Channel Access to Shared Parallel Data Channels with Separate Reservation Channel", filed on March 22, 2001, and in U. S. patent application Serial No. 09/815,164 entitled "Prioritized-Routing for an Ad-Hoc, Peer-to-Peer, Mobile Radio Access System", filed on March 22, 2001, the entire content of each of said patent applications being incorporated herein by reference.
[0004] As can be appreciated by one skilled in the art, when a node sends packetized data to a destination node, the node typically checks its routing table to determine whether the destination node is contained in its routing table. If the destination node is contained in the node's routing table, the data is transmitted via a path that leads to the destination node. If the destination node is not listed in the node's routing table, then the packet is sent to one or more other nodes listed in the node's routing table, and those other nodes determine if the destination table is listed in their routing tables. The process continues until the data packet eventually reaches the destination node.
[0005] As can further be appreciated by one skilled in the art, the "hidden node" problem is a classic problem for Medium Access Protocols (MACS) in these types of ad-hoc networks.
The problem occurs when two radios (nodes) are transmitting outside the effective communication range of each other, but both are within the effective communication range of an intermediate node that is also participating in the network. If both of the two radios in the network attempt to communicate with the intermediate node at or near the same time, their signals can collide and/or cause packet corruption at the intermediate node which is the intended receiver. In this case, the two extremal nodes are "hidden" from each other.
The problem occurs when two radios (nodes) are transmitting outside the effective communication range of each other, but both are within the effective communication range of an intermediate node that is also participating in the network. If both of the two radios in the network attempt to communicate with the intermediate node at or near the same time, their signals can collide and/or cause packet corruption at the intermediate node which is the intended receiver. In this case, the two extremal nodes are "hidden" from each other.
[0006] The hidden node problem therefore reduces successful packet delivery at the intermediate node. Also, the more hidden nodes there are around the intermediate node, the more severe the packet corruption can be.
[0007] Accordingly, a need exists for a system and method for effectively and efficiently identifying nodes experiencing hidden node problems in a wireless ad-hoc communication network, so that routing through those nodes can be avoided if possible.
SUMMARY OF THE INVENTION
SUMMARY OF THE INVENTION
[0008] An object of the present invention is to provide a system and method for effectively and efficiently identifying nodes experiencing hidden node problems in a wireless ad-hoc communication network.
[0009] Another object of the present invention is to provide a system and method for locating and evaluating multiple neighbor node sets for each node, and calculating a degree of hidden nodes present at each node.
(0010] Still another object of the present invention is to provide a system and method for communicating a degree of hidden nodes present at each node as a routing advertisement for use in transmission route selection.
(0011] Still another object of the present invention is to provide a system and method for calculating at least one transmission route through a network avoiding nodes which advertise a high degree of hidden nodes present.
[0012] These and other objects of the present invention are substantially achieved by providing a system and method for identifying potential hidden node problems in a mufti-hop wireless ad-hoc communication network, such as an 802.11 network. The system and method evaluates the relationship between the neighbors of each respective node to identify nodes of a wireless ad-hoc communication network whose capabilities of receiving data packets can be adversely affected by hidden node problems, in order to avoid selecting paths containing those potentially problem nodes for routing data packets.
[0013] Specifically, for each node, the system and method generates a node metric identifying the relationship between the neighbors of a node. A first neighbor node set is calculated for a node of interest, and thereafter, a neighbor node set is then calculated for each node included in the first neighbor node set. Nodes present in the first neighbor node set, but not present in each subsequent neighbor node sets, respectively, are included in a set of potentially hidden nodes about the node of interest. This value can be communicated with other nodes as a metric in a routing advertisement, so that other nodes can assess the degree of potential hidden node problems that may be experienced by that node, and can choose to avoid using that potentially problem node for routing data packets to other nodes.
BRIEF DESCRIPTION OF THE DRAWINGS
BRIEF DESCRIPTION OF THE DRAWINGS
[0014] These and other objects, advantages and novel features of the invention will be more readily appreciated from the following detailed description when read in conjunction with the accompanying drawings, in which:
[0015] Fig. 1 is a conceptual block diagram of an example of an ad-hoc wireless communications network employing a system and method for identifying the degree of hidden node problems that may be experienced by the respective nodes in the network according to an embodiment of the present invention;
(0016] Fig. 2 is a block diagram illustrating an example of components of a node employed in the network shown in Fig. 1;
[0017] Fig. 3 is a conceptual diagram depicting an example of the relationship between a node and its neighboring nodes in the network shown in Fig. 1 to demonstrate an example of the technique for evaluating the degree of potential hidden node problem that may be experienced by that node according to an embodiment of the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
[0018] Fig. 1 is a block diagram illustrating an example of an ad-hoc packet-switched wireless communications network 100 employing an embodiment of the present invention.
Specifically, the network 100 includes a plurality of mobile wireless user terminals 102-1 through 102-n (referred to generally as nodes or mobile nodes 102), and a fixed network 104 having a plurality of access points 106-1, 106-2, ...106-n (referred to generally as nodes or access points 106), for providing the nodes 102 with access to the fixed network 104. The fixed network 104 includes, for example, a core local access network (LAN), and a plurality of servers and gateway routers, to thus provide the nodes 102 with access to other networks, such as other ad-hoc networks, the public switched telephone network (PSTN) and the Internet. The network 100 further includes a plurality of fixed routers 107-1 through 107-n (referred to generally as nodes or fixed routers 107) for routing data packets between other nodes 102, 106 or 107.
Specifically, the network 100 includes a plurality of mobile wireless user terminals 102-1 through 102-n (referred to generally as nodes or mobile nodes 102), and a fixed network 104 having a plurality of access points 106-1, 106-2, ...106-n (referred to generally as nodes or access points 106), for providing the nodes 102 with access to the fixed network 104. The fixed network 104 includes, for example, a core local access network (LAN), and a plurality of servers and gateway routers, to thus provide the nodes 102 with access to other networks, such as other ad-hoc networks, the public switched telephone network (PSTN) and the Internet. The network 100 further includes a plurality of fixed routers 107-1 through 107-n (referred to generally as nodes or fixed routers 107) for routing data packets between other nodes 102, 106 or 107.
[0019] As can be appreciated by one skilled in the art, the nodes 102, 106 and 107 are capable of communicating with each other directly, or via one or more other nodes 102, 106 or 107 operating as a router or routers for data packets being sent between nodes 102, as described in U.S. Patent No. 5,943,322 to Mayor, which is incorporated herein by reference, and in U. S. patent application Serial Nos. 09/897,790, 09/815,157 and 09!815,164, referenced above. Specifically, as shown in Fig. 2, each node 102, 106 and 107 includes a transceiver 108 which is coupled to an antenna 110 and is capable of receiving and transmitting signals, such as packetized data signals, to and from the node 102, 106 or 107, under the control of a controller 112. The packetized data signals can include, for example, voice, data or multimedia.
(0020] Each node 102, 106 and 107 further includes a memory 114, such as a random access memory (RAM), that is capable of storing, among other things, routing information pertaining to itself and other nodes 102, 106 or 107 in the network 100. In addition, certain nodes, especially nodes 102, can include a subscriber device host (not shown), which can consist of any number of devices, such as a notebook computer terminal, mobile telephone unit, mobile data unit, personal computer (PC), personal data assistant (PDA), or any other suitable device.
(0021] In addition to voice, data and multimedia packetized data signals, the nodes 102, 106 and 107 exchange respective routing information, referred to as routing advertisements or routing table information, with each other via a broadcasting mechanism periodically, for example, when a new node 102 enters the network 100, or when existing nodes 102 in the network 100 move. A node 102, 106 or 107 will broadcast it's routing table updates, and nearby nodes 102, 106 or 107 will only receive the broadcast routing table updates if within broadcast range (e.g., radio frequency (RF) range) of the broadcasting node 102, 106 or 107.
For example, assuming that nodes 102-1 and 102-6 are within the RF broadcast range of node 102-3, when node 102-3 broadcasts routing table information, the current table information is received and filed by both nodes 102-1 and 102-6. However, if nodes 102-2, 102-4 and 102-are beyond the broadcast range of node 102-3, these nodes will not receive the current table information broadcast.
For example, assuming that nodes 102-1 and 102-6 are within the RF broadcast range of node 102-3, when node 102-3 broadcasts routing table information, the current table information is received and filed by both nodes 102-1 and 102-6. However, if nodes 102-2, 102-4 and 102-are beyond the broadcast range of node 102-3, these nodes will not receive the current table information broadcast.
(0022] Each node 102, 106 or 107 in the network 100 can also experience the hidden node problem as discussed in the Background section above. As will now be discussed with regard to Fig. 3, an embodiment of the present invention provides a technique for identifying the degree of the potential hidden node problem that can be experienced by a node 102, 106 or 107, such that other nodes 102, 106 and 107 can avoid including such nodes in selected routing paths for routing data packets through the network 100.
[0023] According to an embodiment of the present invention, the wireless ad-hoc network 100 may use certain metrics to avoid degenerate areas of the network demonstrating decreased performance. Optimally, a mufti-hop ad-hoc routing network 100 can be configured so that a routing path chosen from a source node to a destination node will ensure the highest bandwidth, lowest latency, and greatest probability for packet delivery. The embodiment of the present invention enables the nodes of network 100 to establish a routing metric, which prevents the nodes from routing packets through areas of the network 100 that contain high degrees of hidden nodes. For this embodiment, the descriptive term "degree of hidden nodes" at a node of interest refers to the number of hidden nodes present about the node.
[0024] As discussed above, in a mufti-hop wireless ad-hoc routing networlc 100, a routing advertisement transmitted by a node 102, 106 and 107 may advertise all of the other nodes 102, 106 and 107, or neighbor nodes, with which that node can directly communicate. In addition, the routing advertisement transmitted by a node 102, 106 and 107 typically advertises all of the destinations that can be reached from the node directly, and destinations that can be reached indirectly, listing the intermediate nodes to which the packet must be delivered to in order to reach the destination. As will now be described, an embodiment of the present invention examines the neighbor node routing advertisements transmitted by a node to evaluate the potential hidden problem experienced by that node.
[0025] Fig. 3 is a conceptual diagram illustrating an exemplary relationship 116 between four nodes, consisting of any combination of nodes 102, 106 and 107, in the network 100, which are identified as nodes a, b, c and d. The lines between the nodes a, b, c and d indicate a neighbor relationship. For example, node a is neighbors with nodes U and c, node b is neighbors with nodes a and c, node d is neighbors with node c, and node c is neighbors with nodes a, b and d,. The set of neighbors of node a is indicated as set A. The entity a is included in the list of neighbors indicated in set A. So for the portion of the network 100 shown in Fig. 3, the neighbor lists of each node are:
_ 'J _ A={a,b,c}
B=~a,b,c~
C=~a,b,c,d~
D=~c,d~
_ 'J _ A={a,b,c}
B=~a,b,c~
C=~a,b,c,d~
D=~c,d~
[0026] If we consider node c as the node of interest, an example of the technique of identifying the hidden nodes about node a according to an embodiment of the present invention is as follows:
[0027] First, the embodiment of the present invention identifies all of the nodes that are neighbors to the node of interest, node c, based on the routing advertisements transmitted by node c, which in this case, includes the node set C. For each neighbor node, a comparison is made between the routing advertisements transmitted by node c and the neighbor lists at each neighbor node. Specifically, as the neighbor list is received from node c at node cz, Set A is compared with Set C. As the neighbor list is received from node c at node b, Set B is compared with Set C, and as the neighbor list is received from node c at node d, Set D is compared with Set C. Based upon each comparison, the nodes of each set not shared is then determined. This is the symmetric difference of each set comparison which in this example, is as follows:
CO+ A={d~
COB=~d~
COD= fa,b}
CO+ A={d~
COB=~d~
COD= fa,b}
[0028] The union of these sets represents all of the potentially hidden nodes of node c.
This set of potentially hidden nodes of node c for the network shown above is known as Pc, and it contains:
Pc = ~c~, b, d~
The number of elements in the set is then determined, which in this example is determined as ~Pc~ = 3, which represents the number of potentially hidden nodes of node c for the network.
_g_ (0029] All elements of the potentially hidden node set Pc which are neighbors of each other, or sub-neighbors, are then determined. In this example, nodes a, b and c are elements of the potentially hidden node set Pc. Of nodes a, b and c, only nodes a and b are sub-neighbors. These nodes are now treated as a single entry a b in the new set of hidden nodes around node c:
He=~ a b, d lz so ~Hc~ = 2 Therefore, the degree of hidden nodes about node c is 2.
This set of potentially hidden nodes of node c for the network shown above is known as Pc, and it contains:
Pc = ~c~, b, d~
The number of elements in the set is then determined, which in this example is determined as ~Pc~ = 3, which represents the number of potentially hidden nodes of node c for the network.
_g_ (0029] All elements of the potentially hidden node set Pc which are neighbors of each other, or sub-neighbors, are then determined. In this example, nodes a, b and c are elements of the potentially hidden node set Pc. Of nodes a, b and c, only nodes a and b are sub-neighbors. These nodes are now treated as a single entry a b in the new set of hidden nodes around node c:
He=~ a b, d lz so ~Hc~ = 2 Therefore, the degree of hidden nodes about node c is 2.
(0030] Since nodes a, b and c are all neighbors of each other, normal coordination can occur between them and they should not attempt to access the medium simultaneously.
Therefore, the hidden node contribution made by nodes a and b is reduced to the hidden node contribution of a single node since they are coordinated. The degree of hidden nodes about c (i.e. 2) represents the number of mobile nodes, or radios, that are unaware of each other and which may cause interference at node c.
Therefore, the hidden node contribution made by nodes a and b is reduced to the hidden node contribution of a single node since they are coordinated. The degree of hidden nodes about c (i.e. 2) represents the number of mobile nodes, or radios, that are unaware of each other and which may cause interference at node c.
(0031] In the embodiment of the present invention described above, the degree of hidden .
nodes of each node 102, 106 and 107 in the network 100 is determined in the manner described above. Each node then advertises it's respective metric along with its other routing information in the manner described above. Routing algorithms performed by, for example, the controller 112 of each of the nodes, can use the metric of each node to select transmission paths comprised of nodes having lower degrees of hidden nodes. This will thus minimize the likelihood that the packet will be corrupted or delayed due to the contribution of a hidden node along the route.
nodes of each node 102, 106 and 107 in the network 100 is determined in the manner described above. Each node then advertises it's respective metric along with its other routing information in the manner described above. Routing algorithms performed by, for example, the controller 112 of each of the nodes, can use the metric of each node to select transmission paths comprised of nodes having lower degrees of hidden nodes. This will thus minimize the likelihood that the packet will be corrupted or delayed due to the contribution of a hidden node along the route.
(0032] As can be appreciated from the above, the embodiment of the present invention can identify and help avoid routes in wireless ad-hoc routing networks that may be degenerate due to a large degree of hidden nodes along the route, as opposed to previous techniques which focused on direct measures of link quality among routes. The embodiment of the present invention can therefore predict areas of high hidden node interference in networks containing radios that cannot directly evaluate link quality.
(0033] In addition, some radio standards in use by mobile node, such as 802.11, may perform much more poorly than other standards in the presence of a high degree of hidden nodes. Specifically, the 802.11 standard, while in ad-hoc power-save mode, can experience the inability or greatly diminished capacity to transmit data in the presence of hidden nodes.
In such an event, traditional direct measurements of link quality may not reflect the full degenerate condition in existence along a chosen route. Thus, it may be possible for such an area to appear to have a high capacity when in fact the synergy between the ad-hoc power-save algorithm and the hidden nodes may prevent most traffic from being successfully forwarded through the area. However, since the embodiment of the present invention discussed above can specifically identify the areas having high degrees hidden nodes, a routing algorithm may use such determinations to avoid routes through such areas, even though the areas can appear to have high node capacity.
In such an event, traditional direct measurements of link quality may not reflect the full degenerate condition in existence along a chosen route. Thus, it may be possible for such an area to appear to have a high capacity when in fact the synergy between the ad-hoc power-save algorithm and the hidden nodes may prevent most traffic from being successfully forwarded through the area. However, since the embodiment of the present invention discussed above can specifically identify the areas having high degrees hidden nodes, a routing algorithm may use such determinations to avoid routes through such areas, even though the areas can appear to have high node capacity.
[0034] As can be appreciated by one skilled in the art, the embodiment of the present invention can be employed in other wireless routing networks that can suffer from the classic hidden node problem, as well as to 802.11 devices in peer-to-peer mode and any other wireless device that allows direct peer-to-peer communication.
[0035] Although only a few exemplary embodiments of the present invention have been described in detail above, those skilled in the art will readily appreciate that many modifications are possible in the exemplary embodiments without materially departing from the novel teachings and advantages of this invention. Accordingly, all such modifications are intended to be included within the scope of this invention as defined in the following claims.
Claims (30)
1. A method for identifying hidden nodes which adversely affect communication between nodes in an ad-hoc communications network, said network including a plurality of nodes being adapted to transmit and receive signals to and from other nodes in said network, the method comprising:
calculating a first neighbor node set for at least one node of said plurality, and calculating a second neighbor node set for at least one neighbor node contained in said first neighbor node set; and calculating a degree of hidden nodes value for said at least one node based on said first and second neighbor node sets and communicating said value as part of a routing advertisement.
calculating a first neighbor node set for at least one node of said plurality, and calculating a second neighbor node set for at least one neighbor node contained in said first neighbor node set; and calculating a degree of hidden nodes value for said at least one node based on said first and second neighbor node sets and communicating said value as part of a routing advertisement.
2. A method as claimed in claim 1, further comprising:
calculating said first neighbor node set to include each neighbor node of said at least one node, said each neighbor node comprising a node of said plurality with which said at least one node can directly communicate.
calculating said first neighbor node set to include each neighbor node of said at least one node, said each neighbor node comprising a node of said plurality with which said at least one node can directly communicate.
3. A method as claimed in claim 1, further comprising:
communicating said first neighbor node set to said at least one neighbor node.
communicating said first neighbor node set to said at least one neighbor node.
4. A method as claimed in claim 1, further comprising:
calculating said second neighbor node set to include each neighbor node of said at least one neighbor node, said each neighbor node comprising a node of said plurality with which said at least one neighbor node can directly communicate.
calculating said second neighbor node set to include each neighbor node of said at least one neighbor node, said each neighbor node comprising a node of said plurality with which said at least one neighbor node can directly communicate.
5. A method as claimed in claim 1, further comprising:
communicating said second neighbor node set to said at least one node.
communicating said second neighbor node set to said at least one node.
6. A method as claimed in claim 1, further comprising:
calculating a third neighbor node set to include each neighbor node that is included in said first neighbor node set which is not also a neighbor node that is included in said second neighbor node set.
calculating a third neighbor node set to include each neighbor node that is included in said first neighbor node set which is not also a neighbor node that is included in said second neighbor node set.
7. A method as claimed in claim 6, further comprising:
locating each neighbor node that is contained in said third neighbor node set which is a sub-neighbor node, said sub-neighbor node comprising at least one neighbor node that is contained in said third node set which can directly communicate with at least one other neighbor node contained in said third neighbor node set; and combining at least one sub-neighbor node plurality into a single representative neighbor node in said third neighbor node set.
locating each neighbor node that is contained in said third neighbor node set which is a sub-neighbor node, said sub-neighbor node comprising at least one neighbor node that is contained in said third node set which can directly communicate with at least one other neighbor node contained in said third neighbor node set; and combining at least one sub-neighbor node plurality into a single representative neighbor node in said third neighbor node set.
8. A method as claimed in claim 7, further comprising:
calculating said degree of hidden nodes value based on said third neighbor node set.
calculating said degree of hidden nodes value based on said third neighbor node set.
9. A method as claimed in claim 1, further comprising:
calculating said degree of hidden nodes value for each node of said plurality;
and calculating at least one transmission route from a source node to a destination node based upon at least one said degree of hidden nodes value.
calculating said degree of hidden nodes value for each node of said plurality;
and calculating at least one transmission route from a source node to a destination node based upon at least one said degree of hidden nodes value.
10. A method as claimed in claim 1, further comprising:
calculating at least one transmission route via a routing algorithm based upon said degree of hidden nodes value.
calculating at least one transmission route via a routing algorithm based upon said degree of hidden nodes value.
11. A system for identifying hidden nodes which adversely affect communication between nodes in an ad-hoc communications network, said network including a plurality of nodes being adapted to transmit and receive signals to and from other nodes in said network, the system comprising:
a first node, adapted to calculate a first neighbor node set for at least one node of said plurality;
said first node being further adapted to calculate a second neighbor node set for at least one neighbor node contained in said first neighbor node set; and said first node being further adapted to calculate a degree of hidden nodes value for said at least one node based on said first and second neighbor node sets and communicate said value as part of a routing advertisement.
a first node, adapted to calculate a first neighbor node set for at least one node of said plurality;
said first node being further adapted to calculate a second neighbor node set for at least one neighbor node contained in said first neighbor node set; and said first node being further adapted to calculate a degree of hidden nodes value for said at least one node based on said first and second neighbor node sets and communicate said value as part of a routing advertisement.
12. A system as claimed in claim 11, wherein:
said first node is adapted to calculate said first neighbor node set to include each neighbor node of said at least one node, said each neighbor node comprising a node of said plurality with which said at least one node can directly communicate.
said first node is adapted to calculate said first neighbor node set to include each neighbor node of said at least one node, said each neighbor node comprising a node of said plurality with which said at least one node can directly communicate.
13. A system as claimed in claim 11, wherein:
said first node is adapted to communicate said first neighbor node set to said at least one neighbor node.
said first node is adapted to communicate said first neighbor node set to said at least one neighbor node.
14. A system as claimed in claim 11, wherein:
said first node is adapted to calculate said second neighbor node set to include each neighbor node of said at least one neighbor node, said each neighbor node comprising a node of said plurality with which said at least one neighbor node can directly communicate.
said first node is adapted to calculate said second neighbor node set to include each neighbor node of said at least one neighbor node, said each neighbor node comprising a node of said plurality with which said at least one neighbor node can directly communicate.
15. A system as claimed in claim 11, wherein:
said first node is adapted to communicate said second neighbor node set to said at least one node.
said first node is adapted to communicate said second neighbor node set to said at least one node.
16. A system as claimed in claim 11, wherein:
said first node is adapted to calculate a third neighbor node set to include each neighbor node that is included in said first neighbor node set which is not also a neighbor node that is included in said second neighbor node set.
said first node is adapted to calculate a third neighbor node set to include each neighbor node that is included in said first neighbor node set which is not also a neighbor node that is included in said second neighbor node set.
17. A system as claimed in claim 16, wherein:
said first node is adapted to locate each neighbor node that is contained in said third neighbor node set which is a sub-neighbor node, said sub-neighbor node comprising at least one neighbor node that is contained in said third node set which can directly communicate with at least one other neighbor node contained in said third neighbor node set;
and said first node being further adapted to combine at least one sub-neighbor node plurality into a single representative neighbor node in said third neighbor node set.
said first node is adapted to locate each neighbor node that is contained in said third neighbor node set which is a sub-neighbor node, said sub-neighbor node comprising at least one neighbor node that is contained in said third node set which can directly communicate with at least one other neighbor node contained in said third neighbor node set;
and said first node being further adapted to combine at least one sub-neighbor node plurality into a single representative neighbor node in said third neighbor node set.
18. A system as claimed in claim 17, wherein:
said first node is adapted to calculate said degree of hidden nodes value based on said third neighbor node set.
said first node is adapted to calculate said degree of hidden nodes value based on said third neighbor node set.
19. A system as claimed in claim 11, wherein:
said first node is adapted to calculate said degree of hidden nodes value for each node of said plurality; and said first node being further adapted to calculate at least one transmission route from a source node to a destination node based upon at least one said degree of hidden nodes value.
said first node is adapted to calculate said degree of hidden nodes value for each node of said plurality; and said first node being further adapted to calculate at least one transmission route from a source node to a destination node based upon at least one said degree of hidden nodes value.
20. A system as claimed in claim 11, wherein:
said first node is adapted to calculate at least one transmission route via a routing algorithm based upon said degree of hidden nodes value.
said first node is adapted to calculate at least one transmission route via a routing algorithm based upon said degree of hidden nodes value.
21. A computer-readable medium of instructions, adapted to identify hidden nodes which adversely affect communication between nodes in an ad-hoc communications network, said network including a plurality of nodes being adapted to transmit and receive signals to and from other nodes in said network, comprising:
a first set of instructions, adapted to calculate a first neighbor node set for at least one node of said plurality;
a second set of instructions, adapted to calculate a second neighbor node set for at least one neighbor node contained in said first neighbor node set; and a third set of instructions, adapted to calculate a degree of hidden nodes value for said at least one node based on said first and second neighbor node sets and communicate said value as part of a routing advertisement.
a first set of instructions, adapted to calculate a first neighbor node set for at least one node of said plurality;
a second set of instructions, adapted to calculate a second neighbor node set for at least one neighbor node contained in said first neighbor node set; and a third set of instructions, adapted to calculate a degree of hidden nodes value for said at least one node based on said first and second neighbor node sets and communicate said value as part of a routing advertisement.
22. A computer-readable medium of instructions as claimed in claim 21, wherein:
said first set of instructions is adapted to calculate said first neighbor node set to include each neighbor node of said at least one node, said each neighbor node comprising a node of said plurality with which said at least one node can directly communicate.
said first set of instructions is adapted to calculate said first neighbor node set to include each neighbor node of said at least one node, said each neighbor node comprising a node of said plurality with which said at least one node can directly communicate.
23. A computer-readable medium of instructions as claimed in claim 21, wherein:
said first set of instructions is adapted to communicate said first neighbor node set to said at least one neighbor node.
said first set of instructions is adapted to communicate said first neighbor node set to said at least one neighbor node.
24. A computer-readable medium of instructions as claimed in claim 21, wherein:
said second set of instructions is adapted to calculate said second neighbor node set to include each neighbor node of said at least one neighbor node, said each neighbor node comprising a node of said plurality with which said at least one neighbor node can directly communicate.
said second set of instructions is adapted to calculate said second neighbor node set to include each neighbor node of said at least one neighbor node, said each neighbor node comprising a node of said plurality with which said at least one neighbor node can directly communicate.
25. A computer-readable medium of instructions as claimed in claim 21, wherein:
said second set of instructions is adapted to communicate said second neighbor node set to said at least one node.
said second set of instructions is adapted to communicate said second neighbor node set to said at least one node.
26. A computer-readable medium of instructions as claimed in claim 21, wherein:
said third set of instructions is adapted to calculate a third neighbor node set to include each neighbor node that is included in said first neighbor node set which is not also a neighbor node that is included in said second neighbor node set.
said third set of instructions is adapted to calculate a third neighbor node set to include each neighbor node that is included in said first neighbor node set which is not also a neighbor node that is included in said second neighbor node set.
27. A computer-readable medium of instructions as claimed in claim 26, wherein:
said third set of instructions is adapted to locate each neighbor node that is contained in said third neighbor node set which is a sub-neighbor node, said sub-neighbor node comprising at least one neighbor node that is contained in said third node set which can directly communicate with at least one other neighbor node contained in said third neighbor node set; and said third set of instructions being further adapted to combine at least one sub-neighbor node plurality into a single representative neighbor node in said third neighbor node set.
said third set of instructions is adapted to locate each neighbor node that is contained in said third neighbor node set which is a sub-neighbor node, said sub-neighbor node comprising at least one neighbor node that is contained in said third node set which can directly communicate with at least one other neighbor node contained in said third neighbor node set; and said third set of instructions being further adapted to combine at least one sub-neighbor node plurality into a single representative neighbor node in said third neighbor node set.
28. A computer-readable medium of instructions as claimed in claim 27, wherein:
said third set of instructions is adapted to calculate said degree of hidden nodes value based on said third neighbor node set.
said third set of instructions is adapted to calculate said degree of hidden nodes value based on said third neighbor node set.
29. A computer-readable medium of instructions as claimed in claim 21, wherein:
said third set of instructions is adapted to calculate said degree of hidden nodes.
value for each node of said plurality; and a fourth set of instructions, adapted to calculate at least one transmission route from a source node to a destination node based upon at least one said degree of hidden nodes value.
said third set of instructions is adapted to calculate said degree of hidden nodes.
value for each node of said plurality; and a fourth set of instructions, adapted to calculate at least one transmission route from a source node to a destination node based upon at least one said degree of hidden nodes value.
30. A computer-readable medium of instructions as claimed in claim 29, wherein:
said fourth set of instructions is adapted to calculate at least one transmission route via a routing algorithm based upon said degree of hidden nodes value.
said fourth set of instructions is adapted to calculate at least one transmission route via a routing algorithm based upon said degree of hidden nodes value.
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US37171802P | 2002-04-12 | 2002-04-12 | |
US60/371,718 | 2002-04-12 | ||
US10/298,542 US7200149B1 (en) | 2002-04-12 | 2002-11-19 | System and method for identifying potential hidden node problems in multi-hop wireless ad-hoc networks for the purpose of avoiding such potentially problem nodes in route selection |
US10/298,542 | 2002-11-19 | ||
PCT/US2003/011118 WO2003088587A1 (en) | 2002-04-12 | 2003-04-11 | System and method for identifying potential hidden node problems in multi-hop wireless ad-hoc networks |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2481416A1 true CA2481416A1 (en) | 2003-10-23 |
Family
ID=29254266
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002481416A Abandoned CA2481416A1 (en) | 2002-04-12 | 2003-04-11 | System and method for identifying potential hidden node problems in multi-hop wireless ad-hoc networks |
Country Status (7)
Country | Link |
---|---|
US (1) | US7200149B1 (en) |
EP (1) | EP1495589A4 (en) |
JP (1) | JP2005522940A (en) |
KR (1) | KR20040102085A (en) |
AU (1) | AU2003226068A1 (en) |
CA (1) | CA2481416A1 (en) |
WO (1) | WO2003088587A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109479301A (en) * | 2016-07-26 | 2019-03-15 | 高通股份有限公司 | Cooperate concealed nodes identification and management |
Families Citing this family (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7382765B2 (en) * | 2003-04-30 | 2008-06-03 | Harris Corporation | Predictive routing in a moble ad hoc network |
US7453864B2 (en) * | 2003-04-30 | 2008-11-18 | Harris Corporation | Predictive route maintenance in a mobile ad hoc network |
EP1631915A4 (en) * | 2003-06-06 | 2012-04-25 | Meshnetworks Inc | System and method for characterizing the quality of a link in a wireless network |
DE10353851A1 (en) * | 2003-11-18 | 2005-06-16 | 4G Systeme Gmbh | Device and method for setting up Ad-Hoc networks |
TWI234970B (en) * | 2003-12-05 | 2005-06-21 | Inst Information Industry | Method and system for route selection and method for route reconstruction |
US7298707B2 (en) * | 2004-01-21 | 2007-11-20 | Cisco Technology, Inc. | System and method for controlling the flooding of information in a network environment |
GB2412273B (en) * | 2004-03-15 | 2006-12-20 | Toshiba Res Europ Ltd | Detection of hidden and exposed nodes in wireless networks |
US7506042B2 (en) * | 2004-08-06 | 2009-03-17 | Sharp Laboratories Of America, Inc. | Hierarchical ad hoc network organizational method involving with proxy networking |
US7502360B2 (en) | 2005-03-04 | 2009-03-10 | Itt Manufacturing Enterprises, Inc. | Method and apparatus for dynamic neighbor discovery within wireless networks using time division multiple access (TDMA) |
US7639663B1 (en) | 2005-03-04 | 2009-12-29 | Itt Manufacturing Enterprises, Inc. | Method and apparatus for dynamic channel access within wireless networks |
US7653075B2 (en) * | 2005-05-23 | 2010-01-26 | Juniper Networks, Inc. | Processing communication flows in asymmetrically routed networks |
JP4604916B2 (en) * | 2005-08-29 | 2011-01-05 | パナソニック株式会社 | Wireless network system, wireless communication method, and wireless communication apparatus |
KR100913894B1 (en) * | 2005-09-30 | 2009-08-26 | 삼성전자주식회사 | Method for efficient routing in wireless mesh network |
DE102006014308A1 (en) * | 2006-03-10 | 2007-09-13 | Rohde & Schwarz Gmbh & Co. Kg | Method for multi-hop data transmission in an ad hoc network with hidden nodes |
DE102006014311A1 (en) * | 2006-03-10 | 2007-09-20 | Rohde & Schwarz Gmbh & Co. Kg | Method for identifying hidden nodes in an ad hoc network |
US7925765B2 (en) | 2006-04-07 | 2011-04-12 | Microsoft Corporation | Cooperative diagnosis in a wireless LAN |
GB0614723D0 (en) * | 2006-07-25 | 2006-09-06 | Donaldson Thomas A | Information and communication system |
FR2906041A1 (en) * | 2006-09-15 | 2008-03-21 | Mobiluck S A Sa | Fixed/mobile communicating apparatus e.g. palmtop computer, detecting method, involves searching communicating apparatuses located at indirect proximity of given communicating apparatus and direct proximity to detected apparatus |
US8009615B2 (en) * | 2006-11-09 | 2011-08-30 | Avaya Inc. | Multi-hop ad-hoc wireless networks that support non-multi-hop wireless terminals |
US7843833B2 (en) * | 2006-11-09 | 2010-11-30 | Avaya Inc. | Detection and handling of lost messages during load-balancing routing protocols |
US20080112326A1 (en) * | 2006-11-09 | 2008-05-15 | Avaya Technology Llc | Load-Balancing Routes In Multi-Hop Ad-Hoc Wireless Networks |
JP5125572B2 (en) * | 2008-02-12 | 2013-01-23 | 日本電気株式会社 | Wireless network traffic performance evaluation system, method and program |
US7917099B2 (en) * | 2008-03-18 | 2011-03-29 | Robert Bosch, Gmbh | Topology arrangement for achieving reliable communication in wireless automotive networks |
JP5281312B2 (en) * | 2008-04-25 | 2013-09-04 | キヤノン株式会社 | COMMUNICATION DEVICE, ITS CONTROL METHOD, COMPUTER PROGRAM |
US8014337B2 (en) * | 2008-10-27 | 2011-09-06 | Motorola Solutions, Inc. | Method and system for wireless multi-hopping communication |
KR101068667B1 (en) * | 2009-09-28 | 2011-09-28 | 한국과학기술원 | Method and system for setting routing path considering hidden node and carrier sense interference, and recording medium thereof |
US9059923B2 (en) | 2012-04-06 | 2015-06-16 | Qualcomm Incorporated | Devices and methods for beacon communication in ad-hoc networks |
EP2736285A1 (en) * | 2012-11-21 | 2014-05-28 | Thomson Licensing | Method for optimizing a wireless network connection |
EP2996425A1 (en) * | 2014-09-10 | 2016-03-16 | Thomson Licensing | Method for operating a first wireless node communicating with a second wireless node, and device performing the method |
US9929988B2 (en) * | 2014-09-18 | 2018-03-27 | Bottomline Technologies (De) Inc. | Method for tracking and routing financial messages for mobile devices |
US9730234B2 (en) | 2015-07-07 | 2017-08-08 | Qualcomm Incorporated | Channel selection at small cell access points based on detection of hidden nodes |
US10410123B2 (en) | 2015-11-18 | 2019-09-10 | International Business Machines Corporation | System, method, and recording medium for modeling a correlation and a causation link of hidden evidence |
US11532040B2 (en) | 2019-11-12 | 2022-12-20 | Bottomline Technologies Sarl | International cash management software using machine learning |
US11526859B1 (en) | 2019-11-12 | 2022-12-13 | Bottomline Technologies, Sarl | Cash flow forecasting using a bottoms-up machine learning approach |
US11704671B2 (en) | 2020-04-02 | 2023-07-18 | Bottomline Technologies Limited | Financial messaging transformation-as-a-service |
Family Cites Families (101)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4910521A (en) | 1981-08-03 | 1990-03-20 | Texas Instruments Incorporated | Dual band communication receiver |
US4494192A (en) | 1982-07-21 | 1985-01-15 | Sperry Corporation | High speed bus architecture |
JPS59115633A (en) | 1982-12-22 | 1984-07-04 | Toshiba Corp | Information transmitting system |
US4675863A (en) | 1985-03-20 | 1987-06-23 | International Mobile Machines Corp. | Subscriber RF telephone system for providing multiple speech and/or data signals simultaneously over either a single or a plurality of RF channels |
US4747130A (en) | 1985-12-17 | 1988-05-24 | American Telephone And Telegraph Company, At&T Bell Laboratories | Resource allocation in distributed control systems |
US4736371A (en) | 1985-12-30 | 1988-04-05 | Nec Corporation | Satellite communications system with random multiple access and time slot reservation |
US4742357A (en) | 1986-09-17 | 1988-05-03 | Rackley Ernie C | Stolen object location system |
GB2229064B (en) | 1987-06-11 | 1990-12-12 | Software Sciences Limited | An area communications system |
US5210846B1 (en) | 1989-05-15 | 1999-06-29 | Dallas Semiconductor | One-wire bus architecture |
US5555425A (en) | 1990-03-07 | 1996-09-10 | Dell Usa, L.P. | Multi-master bus arbitration system in which the address and data lines of the bus may be separately granted to individual masters |
US5068916A (en) | 1990-10-29 | 1991-11-26 | International Business Machines Corporation | Coordination of wireless medium among a plurality of base stations |
US5369748A (en) | 1991-08-23 | 1994-11-29 | Nexgen Microsystems | Bus arbitration in a dual-bus architecture where one bus has relatively high latency |
US5241542A (en) | 1991-08-23 | 1993-08-31 | International Business Machines Corporation | Battery efficient operation of scheduled access protocol |
US5231634B1 (en) | 1991-12-18 | 1996-04-02 | Proxim Inc | Medium access protocol for wireless lans |
US5392450A (en) | 1992-01-08 | 1995-02-21 | General Electric Company | Satellite communications system |
US5896561A (en) | 1992-04-06 | 1999-04-20 | Intermec Ip Corp. | Communication network having a dormant polling protocol |
FR2690252B1 (en) | 1992-04-17 | 1994-05-27 | Thomson Csf | METHOD AND SYSTEM FOR DETERMINING THE POSITION AND ORIENTATION OF A MOBILE, AND APPLICATIONS. |
US5233604A (en) | 1992-04-28 | 1993-08-03 | International Business Machines Corporation | Methods and apparatus for optimum path selection in packet transmission networks |
JP3198182B2 (en) * | 1993-01-29 | 2001-08-13 | 株式会社東芝 | Wireless LAN system |
GB9304638D0 (en) | 1993-03-06 | 1993-04-21 | Ncr Int Inc | Wireless data communication system having power saving function |
US5696903A (en) | 1993-05-11 | 1997-12-09 | Norand Corporation | Hierarchical communications system using microlink, data rate switching, frequency hopping and vehicular local area networking |
US5317566A (en) | 1993-08-18 | 1994-05-31 | Ascom Timeplex Trading Ag | Least cost route selection in distributed digital communication networks |
US5631897A (en) | 1993-10-01 | 1997-05-20 | Nec America, Inc. | Apparatus and method for incorporating a large number of destinations over circuit-switched wide area network connections |
US5857084A (en) | 1993-11-02 | 1999-01-05 | Klein; Dean A. | Hierarchical bus structure access system |
US5412654A (en) | 1994-01-10 | 1995-05-02 | International Business Machines Corporation | Highly dynamic destination-sequenced destination vector routing for mobile computers |
JP2591467B2 (en) | 1994-04-18 | 1997-03-19 | 日本電気株式会社 | Access method |
US5502722A (en) | 1994-08-01 | 1996-03-26 | Motorola, Inc. | Method and apparatus for a radio system using variable transmission reservation |
CA2132180C (en) | 1994-09-15 | 2001-07-31 | Victor Pierobon | Massive array cellular system |
JP3043958B2 (en) | 1994-09-29 | 2000-05-22 | 株式会社リコー | Network communication method by wireless communication |
US6029217A (en) | 1994-10-03 | 2000-02-22 | International Business Machines Corporation | Queued arbitration mechanism for data processing system |
DE69433872T2 (en) | 1994-10-26 | 2005-07-14 | International Business Machines Corp. | Medium access control scheme for wireless local area networks with interleaved variable length time division frames |
US5618045A (en) | 1995-02-08 | 1997-04-08 | Kagan; Michael | Interactive multiple player game system and method of playing a game between at least two players |
US5555540A (en) | 1995-02-17 | 1996-09-10 | Sun Microsystems, Inc. | ASIC bus structure |
US5796741A (en) | 1995-03-09 | 1998-08-18 | Nippon Telegraph And Telephone Corporation | ATM bus system |
US5572528A (en) | 1995-03-20 | 1996-11-05 | Novell, Inc. | Mobile networking method and apparatus |
US5886992A (en) | 1995-04-14 | 1999-03-23 | Valtion Teknillinen Tutkimuskeskus | Frame synchronized ring system and method |
US5517491A (en) | 1995-05-03 | 1996-05-14 | Motorola, Inc. | Method and apparatus for controlling frequency deviation of a portable transceiver |
US5623495A (en) | 1995-06-15 | 1997-04-22 | Lucent Technologies Inc. | Portable base station architecture for an AD-HOC ATM lan |
US5822309A (en) | 1995-06-15 | 1998-10-13 | Lucent Technologies Inc. | Signaling and control architecture for an ad-hoc ATM LAN |
US5781540A (en) | 1995-06-30 | 1998-07-14 | Hughes Electronics | Device and method for communicating in a mobile satellite system |
GB2303763B (en) | 1995-07-26 | 2000-02-16 | Motorola Israel Ltd | Communications system and method of operation |
GB9517943D0 (en) | 1995-09-02 | 1995-11-01 | At & T Corp | Radio communication device and method |
US6132306A (en) | 1995-09-06 | 2000-10-17 | Cisco Systems, Inc. | Cellular communication system with dedicated repeater channels |
US6192053B1 (en) | 1995-09-07 | 2001-02-20 | Wireless Networks, Inc. | Enhanced adjacency detection protocol for wireless applications |
US5615212A (en) | 1995-09-11 | 1997-03-25 | Motorola Inc. | Method, device and router for providing a contention-based reservation mechanism within a mini-slotted dynamic entry polling slot supporting multiple service classes |
US5805842A (en) | 1995-09-26 | 1998-09-08 | Intel Corporation | Apparatus, system and method for supporting DMA transfers on a multiplexed bus |
US5805593A (en) | 1995-09-26 | 1998-09-08 | At&T Corp | Routing method for setting up a service between an origination node and a destination node in a connection-communications network |
US5701294A (en) | 1995-10-02 | 1997-12-23 | Telefonaktiebolaget Lm Ericsson | System and method for flexible coding, modulation, and time slot allocation in a radio telecommunications network |
US5717689A (en) | 1995-10-10 | 1998-02-10 | Lucent Technologies Inc. | Data link layer protocol for transport of ATM cells over a wireless link |
US5920821A (en) | 1995-12-04 | 1999-07-06 | Bell Atlantic Network Services, Inc. | Use of cellular digital packet data (CDPD) communications to convey system identification list data to roaming cellular subscriber stations |
US5991279A (en) | 1995-12-07 | 1999-11-23 | Vistar Telecommunications Inc. | Wireless packet data distributed communications system |
US5878036A (en) | 1995-12-20 | 1999-03-02 | Spartz; Michael K. | Wireless telecommunications system utilizing CDMA radio frequency signal modulation in conjunction with the GSM A-interface telecommunications network protocol |
KR100197407B1 (en) | 1995-12-28 | 1999-06-15 | 유기범 | Communication bus architecture between process in the full electronic switching system |
US5680392A (en) | 1996-01-16 | 1997-10-21 | General Datacomm, Inc. | Multimedia multipoint telecommunications reservation systems |
US5684794A (en) | 1996-01-25 | 1997-11-04 | Hazeltine Corporation | Validation of subscriber signals in a cellular radio network |
US5706428A (en) | 1996-03-14 | 1998-01-06 | Lucent Technologies Inc. | Multirate wireless data communication system |
US5652751A (en) | 1996-03-26 | 1997-07-29 | Hazeltine Corporation | Architecture for mobile radio networks with dynamically changing topology using virtual subnets |
US5796732A (en) | 1996-03-28 | 1998-08-18 | Cisco Technology, Inc. | Architecture for an expandable transaction-based switching bus |
US5805977A (en) | 1996-04-01 | 1998-09-08 | Motorola, Inc. | Method and apparatus for controlling transmissions in a two-way selective call communication system |
US5943322A (en) | 1996-04-24 | 1999-08-24 | Itt Defense, Inc. | Communications method for a code division multiple access system without a base station |
US5787080A (en) | 1996-06-03 | 1998-07-28 | Philips Electronics North America Corporation | Method and apparatus for reservation-based wireless-ATM local area network |
US5845097A (en) | 1996-06-03 | 1998-12-01 | Samsung Electronics Co., Ltd. | Bus recovery apparatus and method of recovery in a multi-master bus system |
SE518132C2 (en) | 1996-06-07 | 2002-08-27 | Ericsson Telefon Ab L M | Method and apparatus for synchronizing combined receivers and transmitters in a cellular system |
US5661727A (en) | 1996-06-12 | 1997-08-26 | International Business Machines Corporation | Schemes to determine presence of hidden terminals in wireless networks environment and to switch between them |
US5844905A (en) | 1996-07-09 | 1998-12-01 | International Business Machines Corporation | Extensions to distributed MAC protocols with collision avoidance using RTS/CTS exchange |
US5909651A (en) | 1996-08-02 | 1999-06-01 | Lucent Technologies Inc. | Broadcast short message service architecture |
US5987011A (en) | 1996-08-30 | 1999-11-16 | Chai-Keong Toh | Routing method for Ad-Hoc mobile networks |
US6044062A (en) | 1996-12-06 | 2000-03-28 | Communique, Llc | Wireless network system and method for providing same |
US5903559A (en) | 1996-12-20 | 1999-05-11 | Nec Usa, Inc. | Method for internet protocol switching over fast ATM cell transport |
US6130892A (en) | 1997-03-12 | 2000-10-10 | Nomadix, Inc. | Nomadic translator or router |
US5877724A (en) | 1997-03-25 | 1999-03-02 | Trimble Navigation Limited | Combined position locating and cellular telephone system with a single shared microprocessor |
US6052594A (en) | 1997-04-30 | 2000-04-18 | At&T Corp. | System and method for dynamically assigning channels for wireless packet communications |
US5881095A (en) | 1997-05-01 | 1999-03-09 | Motorola, Inc. | Repeater assisted channel hopping system and method therefor |
US5870350A (en) | 1997-05-21 | 1999-02-09 | International Business Machines Corporation | High performance, high bandwidth memory bus architecture utilizing SDRAMs |
US6240294B1 (en) | 1997-05-30 | 2001-05-29 | Itt Manufacturing Enterprises, Inc. | Mobile radio device having adaptive position transmitting capabilities |
GB2326065B (en) | 1997-06-05 | 2002-05-29 | Mentor Graphics Corp | A scalable processor independent on-chip bus |
US6108738A (en) | 1997-06-10 | 2000-08-22 | Vlsi Technology, Inc. | Multi-master PCI bus system within a single integrated circuit |
US5987033A (en) | 1997-09-08 | 1999-11-16 | Lucent Technologies, Inc. | Wireless lan with enhanced capture provision |
US6396814B1 (en) | 1997-09-12 | 2002-05-28 | Kabushiki Kaisha Toshiba | Network construction method and communication system for communicating between different groups via representative device of each group |
US6163699A (en) | 1997-09-15 | 2000-12-19 | Ramot University Authority For Applied Research And Industrial Development Ltd. | Adaptive threshold scheme for tracking and paging mobile users |
US6067291A (en) | 1997-09-23 | 2000-05-23 | Lucent Technologies Inc. | Wireless local area network with enhanced carrier sense provision |
US6034542A (en) | 1997-10-14 | 2000-03-07 | Xilinx, Inc. | Bus structure for modularized chip with FPGA modules |
US6118788A (en) | 1997-10-15 | 2000-09-12 | International Business Machines Corporation | Balanced media access methods for wireless networks |
US5936953A (en) | 1997-12-18 | 1999-08-10 | Raytheon Company | Multi-mode, multi-channel communication bus |
US6047330A (en) | 1998-01-20 | 2000-04-04 | Netscape Communications Corporation | Virtual router discovery system |
US6065085A (en) | 1998-01-27 | 2000-05-16 | Lsi Logic Corporation | Bus bridge architecture for a data processing system capable of sharing processing load among a plurality of devices |
US6130881A (en) | 1998-04-20 | 2000-10-10 | Sarnoff Corporation | Traffic routing in small wireless data networks |
US6078566A (en) | 1998-04-28 | 2000-06-20 | Genesys Telecommunications Laboratories, Inc. | Noise reduction techniques and apparatus for enhancing wireless data network telephony |
US6064626A (en) | 1998-07-31 | 2000-05-16 | Arm Limited | Peripheral buses for integrated circuit |
US6304556B1 (en) | 1998-08-24 | 2001-10-16 | Cornell Research Foundation, Inc. | Routing and mobility management protocols for ad-hoc networks |
US6115580A (en) | 1998-09-08 | 2000-09-05 | Motorola, Inc. | Communications network having adaptive network link optimization using wireless terrain awareness and method for use therein |
US6208870B1 (en) | 1998-10-27 | 2001-03-27 | Lucent Technologies Inc. | Short message service notification forwarded between multiple short message service centers |
US6285892B1 (en) | 1998-11-24 | 2001-09-04 | Philips Electronics North America Corp. | Data transmission system for reducing terminal power consumption in a wireless network |
US6104712A (en) | 1999-02-22 | 2000-08-15 | Robert; Bruno G. | Wireless communication network including plural migratory access nodes |
US6453168B1 (en) | 1999-08-02 | 2002-09-17 | Itt Manufacturing Enterprises, Inc | Method and apparatus for determining the position of a mobile communication device using low accuracy clocks |
US6275707B1 (en) | 1999-10-08 | 2001-08-14 | Motorola, Inc. | Method and apparatus for assigning location estimates from a first transceiver to a second transceiver |
US6327300B1 (en) | 1999-10-25 | 2001-12-04 | Motorola, Inc. | Method and apparatus for dynamic spectrum allocation |
US6349091B1 (en) | 1999-11-12 | 2002-02-19 | Itt Manufacturing Enterprises, Inc. | Method and apparatus for controlling communication links between network nodes to reduce communication protocol overhead traffic |
US6349210B1 (en) | 1999-11-12 | 2002-02-19 | Itt Manufacturing Enterprises, Inc. | Method and apparatus for broadcasting messages in channel reservation communication systems |
US7046639B2 (en) * | 2000-09-29 | 2006-05-16 | The Regents Of The University Of California | System and method for ad hoc network access employing the distributed election of a shared transmission schedule |
US20020122410A1 (en) * | 2001-02-13 | 2002-09-05 | Cybiko Inc. | Method of wireless data exchange amongst devices of limited range |
-
2002
- 2002-11-19 US US10/298,542 patent/US7200149B1/en not_active Expired - Lifetime
-
2003
- 2003-04-11 EP EP03746718A patent/EP1495589A4/en not_active Withdrawn
- 2003-04-11 WO PCT/US2003/011118 patent/WO2003088587A1/en active Application Filing
- 2003-04-11 KR KR10-2004-7016294A patent/KR20040102085A/en not_active Application Discontinuation
- 2003-04-11 AU AU2003226068A patent/AU2003226068A1/en not_active Abandoned
- 2003-04-11 JP JP2003585371A patent/JP2005522940A/en not_active Abandoned
- 2003-04-11 CA CA002481416A patent/CA2481416A1/en not_active Abandoned
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109479301A (en) * | 2016-07-26 | 2019-03-15 | 高通股份有限公司 | Cooperate concealed nodes identification and management |
CN109479301B (en) * | 2016-07-26 | 2023-05-02 | 高通股份有限公司 | Collaborative hidden node identification and management |
Also Published As
Publication number | Publication date |
---|---|
WO2003088587A1 (en) | 2003-10-23 |
EP1495589A1 (en) | 2005-01-12 |
EP1495589A4 (en) | 2006-07-05 |
KR20040102085A (en) | 2004-12-03 |
US7200149B1 (en) | 2007-04-03 |
JP2005522940A (en) | 2005-07-28 |
AU2003226068A1 (en) | 2003-10-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7200149B1 (en) | System and method for identifying potential hidden node problems in multi-hop wireless ad-hoc networks for the purpose of avoiding such potentially problem nodes in route selection | |
US7672246B2 (en) | System and method for using per-packet receive signal strength indication and transmit power levels to compute path loss for a link for use in layer II routing in a wireless communication network | |
US6754188B1 (en) | System and method for enabling a node in an ad-hoc packet-switched wireless communications network to route packets based on packet content | |
KR100830364B1 (en) | System and method for selecting stable routes in wireless networks | |
US7280483B2 (en) | System and method to improve the network performance of a wireless communications network by finding an optimal route between a source and a destination | |
KR100957920B1 (en) | System and method for utilizing multiple radios to increase the capacity of a wireless communication network | |
US7522537B2 (en) | System and method for providing connectivity between an intelligent access point and nodes in a wireless network | |
JP4264061B2 (en) | System and method for implementing network routing and configuration in overlapping wireless deployments | |
US7382740B2 (en) | System and method to perform smooth handoff of mobile terminals between fixed terminals in a network | |
US7606176B2 (en) | System and method to improve the performance of an on demand routing protocol in a wireless network | |
US7706390B2 (en) | System and method for routing packets in a wireless multihopping communication network | |
US7697420B1 (en) | System and method for leveraging network topology for enhanced security | |
WO2003051009A1 (en) | Method of using data rates as a routing metric in ad-hoc networks | |
Magaia et al. | High Throughput Low Coupling Multipath Routing for Wireless Multimedia Sensor Networks. | |
Damle | Hybrid routing with periodic mesh updates in wireless mesh networks | |
KR20050026707A (en) | Monitoring link quality in a mobile ad hoc network | |
MAYURI | Survey on routing metrics and routing protocols in wireless mesh networks | |
de Vries | Power Awareness Routing in Mobile Ad Hoc Networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FZDE | Discontinued |