Nokia Corporation v. Apple Inc.
Filing
379
NOTICE of Issuance of Amended Subpoena upon The Institute of Electrical and Electronics Engineers, Inc. ("IEEE") by Apple Inc. (Attachments: # 1 Exhibit 1 part 1, # 2 Exhibit 1 part 2, # 3 Exhibit 1 part 3, # 4 Exhibit 1 part 4, # 5 Exhibit 1 part 5, # 6 Exhibit 1 part 6, # 7 Exhibit 1 part 7, # 8 Exhibit 1 part 8)(Moore, David)
progress has been made in obtaining fixed-cost telecommunication services for libraries. Except for expensive and
specialized facilities (such as private microwave) that are
beyond the budgetary reach of virtually all libraries, one
can expectto pay common carriers every month for
services
used, andcommon-carrier rateshave beensteadilyincreasing. Packet radio, however, offers librariesthe potential for purchasingdatacommunication capabilities at a reasonable fixed cost.
Single-hop packetradio networks are also being used to
improve the efficiency of commercial operations. For example, the useofa small hand-held radiowith a limited
keyboard is being experimentedwith by restaurants. The waiters, bartenders, and cooks are all equipped with a packet
radio. The waiter entersan order andits destination (either
the bartender or the
cook), then waits to receive a packet
indicating that the orderhas been completed.
In summary, packet radio is an exciting technology that
is beginning to play an important role in the local distriwe
bution of information. In this paper have presented the
current state of the DARPA packet radio network.The primarycomponent of the
PRNET is the LPR. The LPR has many
sophisticated features that can provide enhanced flexibility
in designing a robust and reliable packet-switched communications network. Fullyautomated algorithmsand protocols to organize, control,maintain,andmovetraffic
through the
PRNET have been designed, implemented, and
50
tested. By means of these protocols, networks of about
packet radios with some degree of nodal mobility can be
organized and maintained under a fully distributed mode
of control. We have described the algorithms and illustrated how the
PRNET system (i.e., the LPRs along with their
attached devices) provides highly reliable network transo
port and
datagram service, by dynamically determining p
timal routes, effectively controlling congestion, and fairly
allocating the channel in theface of changing link conditions, mobility, and varying traffic loads.
ACKNOWLEDGMENT
Many of our
colleagues working on the
packet radio program havecontributed to the
ideas presented in this
paper.
In particular, wewould like to acknowledge contributions
from DARPA, CECOM,BBN Communications, Hazeltine
SRI
Corporation, Rockwell Internationa1,and International.
REFERENCES
[l] R. E. Kahn, “The organization of computer resources into a
Trans. Commun., vol. COM-25,
packet radio network,” I€€€
no. 1, pp. 169-178, Jan. 1977.
[2] R. E. Kahn, S. Gronemeyer, J. Burchfiel, andR. C. Kunzelman,
vol.
“Advances in packet radio technology,” Proc. I€€€, 6 6 ,
no. 11, pp. 1468-1496, Nov. 1978.
[3] J. Jubin,
“Current
packet
radio
network
protocols,”
in
lNFOCOM‘85 Proc., Mar. 1985.
[4] K. Klemba et a / . , “Packet radio executive summary,” Tech.
Rep. prepared Defense
for
Advanced
Research
Projects
Agency by SRI International, July 1983.
[5] D.BehrmanandW.C.Fifer,“A
lowcost spread-spectrum
packet radio,” in MILCOM’82 Proc., 1982.
[6] H. Zimmermann, “OS1 reference model-The I S 0 model of
32
architecture for Open Systems Interconnection,” Trans.
IEEE
Commun., vol. COM-28, no. 4, pp. 425-432, Apr. 1980.
B. Leiner, R. Cole, J. Postel, and D.
Mills, “The DARPAInternet
Protocol Suite,” /€E€ Trans. Commun., vol. COM-23, no. 3, pp.
29-34, Mar. 1985.
D. Beyer,M. Lewis, andJ. Tornow, “Network interface unit,”
Tech. Rep. SRNTN 35, SRI International, Sept. 1985.
N. Shacham and Westcott, “Future directionsin packet raJ.
dio architectures and protocols,” this issue, pp. 83-99.
J. Westcott and J. Jubin, “A distributed routing design for a
broadcast environment,” in MILCOM’82 Proc., 1982.
J. M. McQuillan and D.C. Walden, “The ARPA Network design decisions,” Comput. Networks, vol. pp. 243-289, Aug.
l,
1977.
N. Cower andJ. Jubin, ”Congestion control using pacing
in
a packet radio network,” in Proc. /€E€ Millitary communication Conf. (M/LCOM’82), vol. 1, pp. 23.1-1-23.1-6, Oct. 1982.
[I 31 L.KleinrockandF.A.Tobagi,”Packetswitchinginradiochan-
nels: Part I-Carrier sense multiple-access modes and their
throughput-delay characteristics,” / € € E Trans. Commun., vol.
COM-23, no. 12, pp. 1400-1416, Dec. 1975.
W. C. Fifer and F. J. Bruno, “The lowcost packet radio,” this
issue, pp. 33-42.
Fed. Inf. Process. Stand., Data Encryption Standard, publ. 46
ed., Nat. Bur. Stand., Washington, DC, 1977.
D. H. Davis and S. A. Gronemeyer, “Performance of slotted
ALOHA random access with delay capture and randomized
time of arrival,”€ E € Trans. Commun., vol.
/
COM-28, no. 5, pp.
703-710, May 1980.
M. S. Frankel, “Advanced technology testbeds for distributed, survivable command, control and communications,”
in Proc. I€€€ MlLCOM Conf., vol. 3, Oct. 1982.
John Jubin born in Philadelphia, PA, on
was
March 25, 1947. He received the B.S.E. de-
gree in electrical engineering from Princeton University, Princeton, NJ,in 1968, and
theM.S. degree operations research from
in
Southern Methodist University,
Dallas, TX,
in 1977.
From 1969 to 1973 he was a communications-electronics engineerin the U.S. Air
Force Communications Service.In 1973 he
joined Texas Instruments, Dallas, TX, where
he developed software for real-time seismic data processing systemsand for Global Positioning System user sets. he joined
In 1977
Rockwell International’s Collins Defense Communications organization, where he worked primarilyon DARPA’s Packet Radio
has
and Survivable Radio Networks (SURAN) programs. currently
is He
principal investigator for Rockwell on
SURAN.Hehas(co-)authored four papers packet radio network protocols for
on
IEEE conferences. He has designed packet-switched communications protocols also for other systems, including the Ground Wave Emergency Network.
Janet D Tornow (Associate, IEEE) received
.
the B.S. degree in mathematics from Doug-
lass
College,
Rutgers
University,
New
Brunswick, NJ, 1977, and the MS. degree
in
in operations research from Stanford University, Stanford, CA, in 1979.
In 1978 she worked at Bell Laboratories.
She joined SRI International in 1979, where
she is a Research Engineer. Her primary responsibility is principal investigator for
SRI
on the DARPA Survivable Radio Networks
program. Her researc I interests include the specification and development of packet
,adio protocols, the integration of packet radio network system! and network characterization and performance evaluation.
PROCEEDINGS OF THE IEEE, VOL. 75, NO. 1, JANUARY 1987
Authorized licensed use limited to: University of Minnesota. Downloaded on February 17,2010 at 12:24:37 EST from IEEE Xplore. Restrictions apply.
AppDel0034721
Authorized licensed use limited to: University of Minnesota. Downloaded on February 17,2010 at 12:24:37 EST from IEEE Xplore. Restrictions apply.
AppDel0034722
Authorized licensed use limited to: University of Minnesota. Downloaded on February 17,2010 at 12:24:37 EST from IEEE Xplore. Restrictions apply.
AppDel0034723
Exhibit 15
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
IEEE P802.11
802 LAN Access Method for Wireless Physical Medium
[--- Unable To Translate Box ---]
DATE:
August 23, 1991REVISED:
[--- Unable To Translate Box ---]
September 4, 1991
TITLE:
SEQUENTIALLY-USED COMMON CHANNEL ACCESS METHOD
[--- Unable To Translate Box ---]
AUTHOR:
Chandos A. Rypinski,
Chief Technical Officer
LACE, Inc.Telephone: 707 765 9627
921 Transport Way
Facsimile:
707 762 5328
Petaluma, California 94954 USA[--- Unable To Translate
Box ---]
SUMMARY
This access method uses a single high-data-rate channel
sequentially at overlapping and interfering Access-points (one
reuse group) all under the control of a single Access Manager
within a multi-port Hub Controller. In general, the capacity can
be equal to the parallel use of a lower rate at the same number
of Access-points in a channelized system.
The primary plan requires infrastructure, but permits direct
Station-to-Station transfers when it is possible.
The plan
provides connection-type service consistent with IEEE 802.6 cell
format.
A secondary version of the plan is given for operation
without infrastructure and without support of connection-type
services.
The previous contribution (IEEE 802.11/91-19) on access
method is superseded in detail use of messages by the current
contribution
(IEEE
802.11/91-95),
however,
the
original
contribution contains material on calculated efficiency and
compatibility with 802.6 ATM cell transfer which remains relevant
though slightly inaccurate because of increases in message
lengths to allow channelization and multiple simultaneous
connections at one Station. The purpose of this revision is to
present the single time-shared channel concept consistently with
channelized systems elsewhere presented, and to incorporate the
common message set for all of the methods.
This method is the first of three access methods that have
been developed all using the same message set and which can be
characterized as follows:
[--- Unable To Translate Box ---]
Printed: September 4, 1991Page 1
Access Method for Common Channel
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
1)
2)
3)
With and without infrastructure, sequential use of one
channel at all Access-points within one reuse group.
With infrastructure control, sequential use of a common
setup channel and parallel use of a number of data
transfer channels derived by code-division spread
spectrum or otherwise.
Independent of infrastructure and without virtual
circuit support, random contention use of a common
setup channel and distributed channel selection for
following use of one of several data transfer channels.
[--- Unable To Translate Box ---]
Printed: September 4, 1991Page 2
Access Method for Common Channel
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
Table of Contents
Page
NOTICE....................................................................
1
OVERVIEW................................................................... 1
FUNCTIONAL OBJECTIVES...................................................... 1
DESCRIPTION OF SYSTEM FEATURES............................................. 2
Central Access-management and Asynchronous Access.......................... 2
Central Control and Addressing............................................. 2
Automatic Repetition (ARQ) of Errored Packets.............................. 2
Access-point Address and Moving Stations................................... 2
Signal-level Reporting From Access-points.................................. 3
Asymmetry of REQUEST-GRANT Procedure....................................... 3
DESCRIPTION OF THE ACCESS PROTOCOL......................................... 3
Initial Conditions--With and Without Infrastructure Present................ 3
Registration Function...................................................... 3
Polling Function........................................................... 4
De-register Message........................................................ 4
Summary of Access Method for Station Originated Packets.................... 5
Access-point-Originated INVITATION-TO-REQUEST Messages..................... 5
Initiation of a Station-Originated Message................................. 5
Peer-to-Peer Direct Message and ACK....................................
6
Receiving Station-to-Station Direct Communication.......................... 6
Resolution of Contention on REQUESTS....................................... 6
Polling Type Contention Resolution......................................... 7
Sorting Type Contention Resolution......................................... 7
Hub Controller-Originated Message.......................................... 7
Signal Level Function at the Station Receiver.............................. 8
SEGMENTATION AND AUTO-GRANT................................................ 8
REQUEST-GRANT Procedure for First Segment and Setup........................ 8
Auto-Grant................................................................. 8
SEGMENT DATA FRAMES........................................................ 9
COMPATIBILITY AND CAPACITY ALLOCATION FOR PACKET AND CONNECTION-TYPE TRAFFIC 9
Excess Demand from Stations................................................ 9
Timely Transmission of Virtual Connection Packets.......................... 9
Use of Priority Function--SID field....................................... 10
Segmentation for Virtual Connections...................................... 10
Segmentation Compatibility with B-ISDN.................................... 10
CENTRAL MANAGEMENT FUNCTIONS.............................................. 10
Management of Access-point Usage.......................................... 11
Management of User Addressing, Status and Usage........................... 11
Management of System Operations and Configuration......................... 11
INTERFERENCE CONTROL BETWEEN CONTIGUOUS LANS.............................. 11
Access-point Separation................................................... 12
Station Separation by Probability......................................... 12
POWER CONTROL CONSIDERATIONS.............................................. 12
Communication Between Hub Controller and Access-point..................... 13
BACKBONE INTERCONNECTION CONSIDERATIONS................................... 13
CONFIGURABLE OPTIONS...................................................... 13
Line Rate................................................................. 13
Delay Intervals........................................................... 13
TABLE I -- CONFIGURABLE PARAMETERS WITH CONFORMANCE-REQUIRED VALUES.... 13
Lengths and Retries....................................................... 14
AUTONOMOUS GROUPS NOT USING INFRASTRUCTURE................................ 14
Default Access Manager.................................................... 14
Distributed Contention-based Access Method................................ 14
Sending a Message......................................................... 14
Activation Criteria for Infrastructure.................................... 15
CONCLUSIONS............................................................... 15
[--- Unable To Translate Box ---]
Printed: September 4, 1991Page 3
Access Method for Common Channel
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
SEQUENTIALLY-USED COMMON CHANNEL ACCESS METHOD
NOTICE:
The following paper
is a revision, rewrite and
abridgment of IEEE 802.9/91-19
"Access
Protocol
for
IVD
Wireless LAN." The purpose is
to present the single timeshared
channel
concept
consistently with channelized
systems elsewhere presented,
to
incorporate
a
common
message set for all of the
methods, and to add a noninfrastructure
secondary
access method.
The topology assumed is one
system (reuse group) with 9,
16 or a small arbitrary number
of
Access-points
on
which
Invitation-to-transmit appears
sequentially.
The
protocol
is
fully
described,
but
traffic
capacity analysis is left for
another contribution.
This
access
method
is
applicable to medium signaling
rates of 8-20 Mb/s, and the
description assumes 10 Mb/s.
FUNCTIONAL OBJECTIVES
OVERVIEW
The scope and intentions of
Three access methods have
this access protocol are as
been developed all using the
follows:
same message set.
1) to
operate
equally
on
This plan is dependent on
wire, radio or optical
infrastructure; however, the mediums.
2) to
be
suitable
for
last section of this plan adds
indefinitely
a
non-infrastructure large systems carpeting a large area, or to
access
be usable as message
method using the same an independent small system with many like
type systems on all sides.
set.
3) to limit energy density
The protocol is implemented
radiated when all of the
simultaneous radiation is
with
sequential
message
summed a interference
transfers using for message set effect on other spectrum users.
4) to attain full use of
which is capable of serving
channel other access
this and the time under peak load conditions.
5) to
avoid
Station
logic
methods.
dependent
Full provisions on system configuration and public network
have been
made for interface protocols.
virtual circuits with
6) to make all Station logics
demand-assigned bandwidth.
identical independent of the size, scale or traffic
The
meaning
of
capacity used is that
"asynchronous" as of the system in which they are used.
7) to
make
this
local
there are no fixed dimension
distribution system
timing frames or slots. Each compatible with common backbone
network technology.
transmission begins when the
8) To
use
the
medium
necessary pre-conditions are
efficiently when are
satisfied none of which the outward-inward traffic volume is
asymmetrical,
fixed time intervals.
There
9) To provide direct peer-tois no addressing in the form
when Stations are in range of each
of time peer communication bit
location in the
stream. other.
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
10) To use no air-time to pad
predetermined boundaries.
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
it possible to assemble and use
DESCRIPTION OF SYSTEM FEATURES
essential facts about the system:
Architectural and logic choices
give
this
protocol
and
the
1) which Stations are available, and
environment
that
it
creates
a
2) capable of directly communicating
special
set
of
properties
now
described.
3) what outside priority traffic is
This access protocol is different
ion that could take precedence.
from other 802 protocols in a number
4) what
is
the
local
address
of ways mostly as a result of
obal addressfitting to the particular conditionsformat, and vice versa.
in either 6 octet LAN or E.164 BCD
The
entity
providing
central
of use.
The extent of an access
control functions is an "access
group
is
smaller,
and
the
manager" within a Hub Controller.
probability of one packet being
correctly received on the first try
Central Control and Addressing
is much smaller.
The repetition
Stations have a long global LAN
mechanism must be in the physical
address, a short local address and
layer to bring the performance up to
may have a long E.164 telephone
the accuracy levels of other 802
address.
A directory function in
physical layers.
By integrating
the Hub Controller enables traffic
acknowledgement and the repetition
within the system to use short
process into the access algorithm,
addressing.
Nonetheless,
long
the amount of time required for the
addressing for both DA and SA will
execution
of
this
function
is
be used for externally addressed
greatly decreased when it is used.
traffic.
When the REQUEST from a Station
Central Access-management and
contains a long destination address
Asynchronous Access
and there is a GRANT, that packet or
By
using
a
centrally-managed
segment is completely defined by the
access method, use of air-time can
short source address thereafter.
approach 100%.
This procedure significantly reduces
The right time to start a second
overhead.
use
of
the
shared
medium
is
Short addresses are non-permanent
immediately after a first use is
and assigned automatically by the
concluded--and that is the purpose
Hub Controller.
They need not be
of asynchronous logic. Among shared
used or apparent to Users.
mediums,
radio
is
particularly
Traffic originating outside the
diminished by unnecessary "dead"
system
will
be
received
and
time.
forwarded with long DA and SA.
A further property of radio is
that there is inevitable interaction
Automatic
Repetition
(ARQ)
of
between contiguous illuminators. It
Errored Packets
is not possible to use one radio
The advantages of ARQ are that it
Access-point independently of those
introduces no decrease in throughput
around it.
This kind of logic is
except when it is needed, and it
easily handled in common equipment,
better compensates the temporary
and unlikely to be effective or
outage characteristic of the radio
efficient
distributed
over
the
medium than would a full-time FEC.
stations. Only at a common point is
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
Error-free (determined by CRC)
packets originating at Stations are
ACKnowledged by receiving Accesspoints.
There is an automatic
resend of the packet/segment limited
to three attempts (two retries).
Virtual circuit packets may be
allowed only one retry or none at
all, and then dropped.
Stations are permitted to send
NACK if they are addressed but the
packet fails CRC.
Access-point
Address
and
Moving
Stations
Each Access-point is assigned a
4-bit identifier (API) which is
broadcast in each INVITATION-TOREQUEST/REGISTER message. (Note: 12
bits may be a better choice.) Each
Station will know which Access-point
is being received or used and
whether the current identifier is
the same or different than the
identified Access-point last used.
Signal-level Reporting From Accesspoints
The received signal level is
reported back to the Hub Controller
concurrently with reception.
This
signal level is used by the Hub
Controller
to
decide
which
of
several Access-points receiving the
signal should be used for the next
message exchange.
Asymmetry of REQUEST-GRANT Procedure
The
inward
REQUEST-GRANT
procedure is essential to keeping
Station logic simple and avoiding
contention. It would be possible to
use the same REQUEST-GRANT procedure
in both directions rather than for
only upward traffic.
802 philosophy is that a Station
is always ready.
A message is
always sent--ready or not.
It is
for higher layers to provide a
method of knowing whether Stations
are there.
To allow Stations to
refuse a message, would be a point
of
incompatibility
with
802
practice.
If Stations could say "wait," a
further buffering and indeterminate
delay factor would be introduced in
the network implementation.
The
amount of storage required in this
protocol is only that to do repeat
send on no ACK. Otherwise messages
"fall
on
the
floor"
after
a
multiple-try delivery attempt.
A symmetrical protocol is not
used, because there is no functional
value in downward REQUEST-GRANT, it
would cost air-time, and it could
create
indeterminate
buffer
requirements in the infrastructure.
DESCRIPTION OF THE ACCESS PROTOCOL
This access method uses the
message set shown in a separate
contribution
IEEE
802.11/91-80.
(11AP16K) amended to add stationgenerated GRANT.
This message set
is also used or usable in other
types of systems.
In this protocol direct peer-topeer is a supported function with or
without infrastructure.
The description below is from the
viewpoint of the individual user
Station unless otherwise noted.
Initial Conditions-With
and
Without
Infrastructure
Present
If an infrastructure is present,
its Access-points are transmitting
POLL,
INVITATION-TO-REGISTER
and
INVITATION-TO-REQUEST messages as
described later below.
When a Station does not hear any
of
the
above
infrastructure
messages, there are two possible
alternative reactions:
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
1) the Station may assume a default
no-infrastructure,
contention
mode
is
in
operation, or
2) the
Station
activates
a
simplified default access
manager which makes the
first
activated
Station
operate sufficiently like
one Access-point to enable
autonomous
intercommunication
within
small groups of Stations.
Operation with no infrastructure
is described in greater detail later
below.
Registration Function
Stations just entering the system
listen first for the INVITATION-TOREGISTER (007) messages from which
they identify the system providing
the infrastructure.
The Station
cannot know which is the strongest
signal received or which site would
provide it. Though the Station can
recognize a usable signal, there is
no
recognition
of
presence
of
unusable or foreign signals.
The
INVITATION-TO-REGISTER
messages contain identity numbers
for the transmitting Access-point
(API).
Registered Stations know
that they are hearing or not hearing
the Access-point at which they are
currently registered. Assuming that
the Station knows or deduces that it
is
unregistered,
the
Station
responds With a REGISTER (102)
message.
Upon
receipt
of
a
REGISTER
message, the Hub Controller decides
which Access-point received that
message with the best signal, and
makes an assignment as described
below.
This
process
serves
Stations
coming into the system from outside
or from turn-ON. It does not matter
if the Station moves to the coverage
of
another
Access-point
before
attempting the first message.
The infrastructure provides the
INVITATION-TO-REGISTER (007) message
at the same frequency as a complete
poll described below.
The message
format differs from a POLL (007)
message only in having an open
destination address field.
This
message is sent sequentially from a
group
of
overlapping
coverage
Access-points all operating on the
common channel.
The unregistered Station upon
hearing an INVITATION-TO-REGISTER
sends a REGISTER (102) message with
a long address (6 octets for LAN or
possibly 60 bits for telephony
within an 8 octet field) and hears
immediately an ACK (011) and then a
PACKET-DATA-FRAME (003) with long
address in response. The payload of
that frame contains the assignment
of a temporary short address (2
octets) to that Station.
If there
is no response, the Station tries
again at the next opportunity on a
different
Access-point.
The
registration response includes the
identification of the Access-point
from which it came, and the Station
notes this as the current serving
Access-point.
Normally,
the
response
is
immediate on the currently used
Access-point.
Sometimes
the
response will not be sent, and the
requesting Station must wait until a
new INVITATION-TO-REGISTER message
is received before repeating the
REGISTER
message.
If
the
INVITATION-TO-REGISTER message from
the first used Access-point is not
heard within a specified interval
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
(e.g. 100 milliseconds) and if other
Access-points are heard, a Station
would reattempt registration using
any
Access-point
with
matching
system identification (SYS field).
Once a Station is registered, it
is periodically polled and the
infrastructure knows how to reach
it.
The POLL message is the means
used to be sure that each Station is
present, active, assigned a short
address and associated with the
correct
Access-point
in
the
directory maintained by the System
in the Hub Controller.
Polling Function
The infrastructure sends a POLL
message to every known user of the
system periodically. The time used
is after each round of INVITATIONTO-REQUEST (005) messages at each of
the Access-points in one reuse group
when there is no pending traffic. A
POLL round requires many rounds of
invitation messages and could be
suspended for many seconds.
This
time makes only a slight increase in
the minimum scan time, unless there
is
synchronized
inter-system
scanning
where
there
is
no
difference.
The POLL transmission originates
on the Access-point last used by
that Station, otherwise a group of
surrounding Access-points is used
for a second try.
The addressed Station responds
with an ACK (110) message, and it
notes the identification of the
Access-point from which the POLL was
received as current.
The Station
may also respond with a REQUEST as
described later.
The air-time required for one
poll
is
((8+7)octs+4_sec)
16
_seconds at 10 Mb/s.
With 12
Stations per Access-point and 16
Access-points
per
group
(192
Stations), the polling function uses
3.07 milliseconds per round.
The
frequency with which a POLL round is
initiated
is
a
configurable
parameter.
Only the Access-points have the
capacity to measure and use received
signal level. If the response of a
Station is at a higher signal level
on a different Access-point than on
the currently identified Accesspoint, the status entry for that
Station will be changed accordingly
in a system status directory after
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
the
current
transaction
is
completed.
The Station is informed of the
change by the origin API of the ACK
message after sending a packet
forward or by the origin API of the
next transmission of a packet to the
Station.
De-register Message
In response to an INVITATION-TOREGISTER OR A POLL message, a
Station should send a DE-REGISTER
(104) message upon shut-down or
leaving the system.
The polling
function will eventually find this
out if the message is not sent.
The opportunity for this function
occurs with the same frequency as
the poll described above.
Summary of Access Method for
Station Originated Packets
The concept of the system is that
Stations may request permission with
a REQUEST (106/108) message to
transfer data on the common channel
only immediately following receiving
an
INVITATION-TO-REQUEST
(005)
message
originated
at
the
Hub
Controller. The normal response is
a GRANT (015) message after which
the Station sends the PACKET DATA
FRAME (114).
The Hub Controller
sends ACK (011) when and if the
transmission is received without
error.
Alternatively, the Hub
Controller can ask for a repeat
using NACK (013) or not respond.
Peer-to-peer
case:
For
the
addressed Station to receive the
message directly without repetition
by the infrastructure, it must hear
the REQUEST message, the GRANT
message confirming and the PACKET
DATA FRAME directly; and the Station
must transmit immediate ACK after
receiving the message before the
same action by the Hub Controller.
Access-point-Originated
INVITATION-TO-REQUEST Messages
The Hub Controller will send
INVITATION-TO-REQUEST (005) messages
only if the conditions necessary for
immediate
and
successful
transmission are present.
The Hub
Controller
is
responsible
for
knowing
the
interference
possibilities that go with the use
of each Access-point.
The Hub Controller originates the
INVITATION-TO-REQUEST
message
consecutively at each Access-point
in
a
reuse
group
to
avoid
interference from radio coverage
overlap
that
might
occur
with
simultaneous transmission.
This
is
one
of
the
near
indispensable
functions
of
the
infrastructure
which
prevents
Station
transmissions
from
interfering
with
transfers
in
progress.
Initiation of a Station-Originated
Message
All Stations monitor the channel
continuously and are able to hear
INVITATION-TO-REQUEST
messages
usually from more than one Accesspoint.
When a registered Station
wants to send a packet, the Station
listens for an INVITATION-TO-REQUEST
message from the Access-point at
which the Station was last polled or
last used.
At the end of the
INVITATION
message,
the
Station
immediately sends a REQUEST message
containing the DA, SA, SID and LEN
packet header fields. There are two
forms
of
REQUEST
messages
corresponding to long and short
addressing as indicated in the TYP
field.
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
This is a contention process with
the possibility of collision made
small
by
the
frequency
of
opportunities to REQUEST and the
division of the traffic so that
there are only a small number of
active users per Access-point.
Stations may also REQUEST as a
second type of response to an
addressed POLL message.
If there is no contention on the
REQUEST, or if there is contention
but a REQUEST message was still
received
successfully,
the
Hub
Controller will send a GRANT message
via the Access-point on which the
Station responded to the INVITATIONTO-REQUEST.
The
methods
for
resolving contention at this step
are described later below.
The
Station
will
receive
a
response, GRANT (015) or NACK (013)
from
the
addressed
Access-point
immediately or not at all.
It is
possible, and may be desirable, to
have a wait interval during which
the Station may receive a GRANT; and
in this case, the infrastructure
would reply with immediate ACK (011)
(rather than GRANT) which would
enable the wait function. The wait
state would be appropriate for
delays not greater than a maximum
transmission length (e.g. 250 _sec).
Alternatively, there could be
either NACK (013) which would cause
REQUEST to be repeated or no reply
to the Station REQUEST which would
return
the
procedure
to
the
beginning.
It is possible for a
REQUEST to be rejected because the
infrastructure does not have the
resources to process the message at
the time of the REQUEST.
The GRANT message transmission
can send a power level setting, and
will send the requesting Station's
short
address
to
identify
the
grantee.
After
the
GRANT
is
received the Station sends the
PACKET DATA FRAME (114).
The GRANT message contains a CRC8 field on the content of the
REQUEST message so the Station knows
it is received correctly, and does
not need to resend this information
in the packet header. If this check
fails, a new REQUEST is made.
After the PACKET DATA FRAME is
sent, the originating Station waits
for ACK (110 or 011) which may come
immediately and directly from the
addressed
Station
or
slightly
delayed
from
the
Access-point.
Either ACK ends the cycle. This is
the
mechanism
which
allows
successful
Station-to-Station
transmission to supersede the repeat
function of the infrastructure.
For virtual circuits, there is no
ACK function since a delayed packet
is a lost or useless packet. If no
ACK is received, the Station may
repeat the cycle unless the message
is
part
of
a
connection-type
service.
Peer-to-Peer Direct Message and ACK
The system plan permits but does
not assume direct Station-to-Station
communication.
When an addressed
Station correctly receives a message
from another Station, the ACK (110)
message is transmitted immediately.
The Access-point also receives the
same Station ACK, and then can
discard its copy of the message and
its intention to send a delayed ACK
(011).
If the Hub Controller does
not hear the immediate ACK (110), it
transmits a delayed ACK (011), and
further
processes
the
received
message.
The amount of delay is not more
than ACK message plus a propagation
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
time, or 8 octets plus 4 _seconds (=
10.4 _sec).
Since the Hub Controller will
know whether there is a possibility
of
direct
peer-to-peer
communication, it is probable that
better implementations will provide
the
Access
Manager
ACK
delay
selectively.
An approximate logic
would be to provide the delay only
for
packets
between
stations
registered
on
the
same
or
immediately
contiguous
Accesspoints. If the Hub Controller knows
that there is no possibility of the
addressee having heard the REQUEST
directly, the ACK is immediate.
For segmented peer-to-peer LAN
messages, there is no possibility of
auto-grant;
therefore
the
originating Station must REQUEST
independently for each segment after
an
infrastructure
INVITATION-TOREQUEST.
There is no provision for virtual
connections
directly
between
Stations.
Receiving Station-to-Station
Direct Communication
Because of this function, it is
necessary for a station to process
the
Station-send
format
message
REQUEST (106 or 108).
The GRANT
(015) message cannot be used as an
alternative
because
it
has
no
provision
for
full
source
and
destination addressing. There is no
way for the originating Station to
know that the message is being
directly received from the handshake
process.
If a Station hears a REQUEST
message
for
which
it
is
the
addressee, it is primed for a direct
transfer. The addressed Station now
expects to receive the Station-send
format PACKET DATA FRAME (114)
immediately or the same frame will
be retransmitted from the same or
another
Access-point
following.
This is the only circumstance where
a Station processes messages from
another Station rather than from an
Access-point.
The
direct
Station-to-Station
capability is configurable within
the infrastructure to be active or
disabled.
Resolution of Contention on REQUESTS
This
problem
is
different
depending on whether the contention
possibilities are limited to 8
stations (as in the multi-drop ISDN
S interface) or a hundred or more
that might be present in a longreach-low-rate system.
For the case where contention is
improbable on the first try, a
contention type access is preferred.
This can be the case when the duty
cycle of any one Access-point is
low--and it is unlikely to be as
high as 1%.
When the contending REQUESTS are
from Stations served on the same
Access-point, it is still possible
that they will be resolved without
further added function.
Since the stronger radio signal
masks the weaker, access may be
granted
in
an
order
based
on
proximity
rather
than
order-ofarrival into queue. The "work-off"
rate for a few Stations and short
packets is so rapid, that lack of
"fairness" makes little practical
difference.
It is also possible that both
REQUEST messages may be received as
contending on their home Accesspoint but one or the other may
dominate on a second and third
Access-point. It is quite possible,
in the radio system, for alternate
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
paths to resolve contention in a way
having no equivalent in cable.
Nonetheless, there should be a
back-up
form
of
contention
resolution
to
define
worst-case
access
delay,
and
to
obtain
satisfactory
operation
in
more
defined mediums without coverage
overlap.
The
polling
type
contention
recovery
mode
is
suitable
for
systems with a small number of
stations per access point, and is
described.
The sorting method of contention
recovery is suitable for perhaps 250
stations per access point, and is
recognized as possible but not
required.
Polling Type Contention Resolution
When the Hub Controller senses
unresolvable
contention
at
a
particular Access-point, a poll of
Stations registered at that Accesspoint is initiated.
Since the
number of registrants might average
eight, and is rarely over 24, this
consumes little time. The function
is used that Stations with pending
messages are allowed to REQUEST in
response to an addressed POLL.
When a correct REQUEST message is
received,
the
Hub
Controller
responds
with
a
GRANT
message
resuming the same procedure as with
handshake
following
the
normal
INVITATION-TO-REQUEST initiation.
Sorting Type Contention Resolution
This algorithm may be considered
where there is a possibility of
contention from a large number of
stations sharing a common Accesspoint.
The principle of operation
is a binary sort starting with the
LSB of the short address in steps
requiring a message exchange using
"don't care" characters.
This method is not foreseen as
necessary, and therefore a detail
description is not given.
Hub Controller-Originated Message
The Hub Controller can use the
medium at any time by halting the
sending of INVITATION messages. If
there is waiting priority traffic
via any controlled Access-point in a
group, it is sent after the current
INVITATION, REQUEST, GRANT, PACKET
SEND AND ACK cycle is completed.
Waiting non-priority traffic is sent
after the inward cycle for that
Access-point.
This precedence is
unimportant except when the system
is heavily loaded.
From the registration procedure
(and reinforced by the polling
procedure), the Hub Controller knows
the availability and Access-point
status of each Station. Except for
management controlled exceptions, no
attempt would be made to reach
unavailable Stations.
The
Hub
Controller
sends
a
different
(from
the
Station
originated) format PACKET DATA FRAME
(003) to the Station which has the
complete header including long DA,
SA, SID and LEN fields. The Station
must be ready to receive these
packets
at
any
time
after
registering until de-registering.
At the end of the PACKET or
SEGMENT DATA FRAME transmission, the
Station sends ACK (110) or NACK
(112) or nothing.
There is no ACK
for
packets
used
for
virtual
circuits or for broadcast messages.
Without the ACK message, the Hub
Controller may resend up to three
tries.
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
The message transmitted could be
from outside the network or from any
Station within the network.
Signal Level Function at the Station
Receiver
With this access protocol, a
Station receiver is not required to
measure
or
evaluate
comparative
signal level. The Station uses the
Access-point
assigned
at
registration or last used to receive
a message from the infrastructure,
usually a POLL.
SEGMENTATION AND AUTO-GRANT
There must be a limit to the
maximum length of one message or
connection bundle.
By using a low
limit for one data transfer, it is
possible to allot a fraction of the
capacity to each of several users
rather than queue all behind a long
message transmission.
This is a
feature that may or may not be used
for packet data, but it is essential
to the guarantee that a defined
portion of the transmission capacity
is available for connection-type
services.
With limited message length, it
is
necessary
to
segment
the
transmission of long packets and
connections.
The implication is
that the setup procedure is done
once
with
full
exchange
of
information, but thereafter segments
are transmitted with only sufficient
information
attached
for
identification of the associated
packet or connection.
In either case an automatically
generated
grant
(auto-grant)
procedure is used where the Hub
Controller automatically sends a
GRANT without a REQUEST on the
channel.
The procedure for handling LAN
packets longer than the protocol
payload limit (e.g. 288 octets) is
to
divide
the
message
into
transmission segments of maximum
length except for a shorter last
segment.
A similar procedure is
used for virtual connections where
each bundle of samples is processed
as a segment of a message of
undefined (or long) length.
The
marking of the last segment may be
different for virtual circuits.
REQUEST-GRANT Procedure for First
Segment and Setup
There is no difference in the
setup procedure for a complete
message or the first segment of a
long
message.
The
format
is
identical for the PACKET DATA FRAME
(003) and REQUEST (003/108) that is
a complete message or the first
segment of a long message.
The
difference is in the content of the
LEN, SID and CNN fields. These
fields are not available in the
REQUEST--SHORT ADDRESS (106) format
so this format cannot be used to
initiate segmented messages.
In the 8-octet long address
field, there are 4-bits set aside
for distinction between LAN and ISDN
addressing, and for marking first,
intermediate and last segments. The
definitions used are determined by
future public network practice for
B-ISDN,
SMDS
and
IEEE
802.6.
Similar functions are independently
defined for this access protocol by
the
SID
field
in
the
first
transmission only.
The SID field is defined at 3bits and is always associated with
LEN field of 13-bits.
This size
defines lengths up to 8,191 octets
which is larger than the length
limits
in
most
Standard
LAN
protocols.
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
Auto-Grant
A rule of the access protocol is
that a Station may not transmit
except after receiving a permission
message from the Hub Controller.
The Hub will know that a Station has
requested service for a multisegment LAN packet from the SID and
LEN fields. From these, the number
of segments required can be deduced.
The first GRANT (015) is for the
first segment only, however, with
the auto-grant feature implemented
no new REQUEST need be made for the
following
segments.
The
Hub
Controller, using a time interval
preceding that of an INVITATION-TOREQUEST,
can
issue
a
GRANT
automatically for each following
segment
until
the
transfer
is
complete.
This avoids a need to
transfer a virtual-circuit segment
at an exact instant.
The
addressing
of
following
segments is short address (SA-2) as
already established for Stations
upon
registration.
The
same
identification is used for Stationoriginated segments where the short
address is a pointer to the long
address passed in the first REQUEST
message.
This function resembles
the "Virtual Circuit Identifier" in
802.6 defined ATM cells.
Auto-grant is not required for
Access-point originated messages.
For transmission of segments to
Stations, the Hub Controller knows
when the appropriate Access-point
and Station are available.
SEGMENT DATA FRAMES
The SEGMENT DATA FRAME uses a
short address only (001/100) after
the
above
described
initiating
sequences have taken place.
The SGN (segment number) counter
field of 8-bits is a continuing upcounter on the number of segments
transmitted which is set to 0 the
first time transmitted (For Accesspoint originate, the second data
frame and the first segment. For
Station originate, the first data
frame.).
This counter provides a
means
for
resequencing
or
for
detecting missing segments.
With
288 octets/payload, the value in SGN
will not repeat for packets shorter
than 9,790/9,216 octets (5-bits) or
for a virtual circuit duration of 9
seconds.
The first 3-bits of the SGN field
are used for a status indication of
initial,
intermediate
or
final
segment in a long packet transfer.
It is necessary to have the CNN
field in the segment header because
a Station has the possibility of
concurrent
multiple
connections
during a packet transfer. A Station
may transfer only one packet at a
time.
COMPATIBILITY AND CAPACITY
ALLOCATION FOR PACKET AND
CONNECTION-TYPE TRAFFIC
With a common Access Manager and
infrastructure
present,
absolute
allocation of capacity for carried
traffic is possible, because the Hub
Controller
determines
who
may
transmit and the carriability of
offered traffic.
The logic of the
Station does not participate in this
choice
in
anyway,
except
for
classifying the priority of its own
originated traffic.
Every system or plan has a limit
to the amount of traffic that can be
carried.
Many efficient systems
carry less rather than more traffic
when the level of demand reaches a
critical point. When both voice and
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
data are carried, there must be a
means
and
method
for
dividing
capacity in a pre-planned way so
that one does not destroy the
service for the other. This access
protocol
provides
for
the
implementation of an adaptive or
managed
strategy
for
capacity
division and handling of peak usage
demands within the infrastructure
and without requiring any concurrent
changes in the user Station.
Excess Demand from Stations
The first method of suspending
new demands for service is by
withholding
the
INVITATION-TOREQUEST message, but this cannot be
the primary means because saturation
of
datagram
and
connection-type
service capacity will rarely occur
simultaneously.
INVITATION-TO-REQUEST
will
be
issued, but after a REQUEST, GRANT
may be withheld or ACK sent which
orders the Station to wait.
The
response message adds slightly to
channel loading during high traffic
intervals, but the system cannot
function unless the Hub Controller
knows the types, size and location
of waiting traffic when there is
overload.
When there is excess
demand, the queued messages stack up
in the originating Stations and not
in
buffer
memory
in
the
Hub
Controller.
The determination of
the state of the available buffer
memory is one of the criteria for
sending the GRANT message.
Timely Transmission of Virtual
Connection Packets
If a digital circuit is 64
kbits/second, it may be reproduced
by a payload bundle of 48 octets
every
6
milliseconds.
The
dimensional requirement is that each
bundle is delivered before it is
needed to have a continuous output
flow from a buffer.
If the bundle dimensions are
known a priori as having the these
values, then the receive buffer
might introduce a 3 millisecond
delay so that after the first bundle
is received, subsequent bundles may
arrive at intervals of 6 _ 1.5
milliseconds.
It can be assumed
that the originating side of the
wireless LAN will transmit a ready
bundle
within
1.5
_
1.5
milliseconds.
In this example, the quantitizing
delay is 6 milliseconds, and the
transmission time uncertainty delay
is a further 6 milliseconds.
The delay for speech coders now
proposed
for
advanced
digital
personal
and
mobile
telephone
systems
is
typically
50
milliseconds.
On the other hand,
current Bellcore practice allows
only 2 milliseconds quantitizing
delay for wireless subscriber loop.
Use of Priority Function--SID field
At each use of an Access-point,
the Hub Controller must first handle
inward or outward connection-type
messages ahead of datagrams because
of the timely delivery requirement.
The REQUEST messages contain an SID
field which identifies the type of
service required and the relative
priority.
Since connection-type
services may have more than one
bandwidth and gathering interval,
this information is essential to
capacity allocation.
The SID field is used to indicate
connection-type service function,
and then the LEN field is used to
indicate
the
interval
between
accumulated samples and the length
of the accumulated sample payload.
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
Segmentation for Virtual Connections
The
segments
of
a
virtual
connection
are
treated
as
a
segmented
packet
of
indefinite
length. The REQUEST announces that
it is a connection-type service both
in the long destination address and
in the SID field, redundantly. The
sampling dimensions are transmitted
in the LEN field.
Each segment contains a marker
that the current segment is either
initial, intermediate or final in 3bits of the SGN field.
The auto-grant initiation of the
transmission of the next segment is
the same as for LAN.
Segmentation Compatibility with BISDN
The developing broadband ISDN
standards for the public network are
described in Bellcore Special Report
SR-NWT-001763, Issue 1, December
1990. There, and other places, the
Asynchronous Transfer Mode (ATM)
plan to transmit either voice or
data in cells with 48 (4+44) octets
of data and a 5 octet label is
described.
These cells may be
passed at irregular intervals but at
a constant average rate on a high
speed medium.
This
LAN
protocol
with
its
adaptive length packets and segments
can conform to the ATM payload size
so that a second quantitizing delay
can be avoided at the boundary
between an ATM based network and
this wireless LAN. This flexibility
would not be available with rigidly
dimensioned time slotting in the
wireless LAN.
CENTRAL MANAGEMENT FUNCTIONS
In a large scale wireless access
system the possible use of one
Access-point
is
in
some
way
dependent on the status of the other
Access-points around it.
This is
particularly true for the common
channel system when there are many
groups of access-points that are
contiguous and part of a continuous
plan.
This may create a need to
synchronize the use of Access-points
in different groups or at least to
inhibit certain use combinations.
This capability is a management
function of the infrastructure, and
does not affect Station logic in
anyway.
It is a system requirement that
the access protocol contain source
records for all of the data noted
below, and that the transfer of
information
from
the
point
of
generation to the point of use be
provided.
Central management is implemented
mainly in the Hub Controller, but
the tasks involved require support
from the access protocol.
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
Management of Access-point Usage
nd de-registrations includingfunctions described
To serve the API used
above, the selection of the current
active Access-point takes place in
an Access Manager within the Hub
Controller.
Management of User Addressing,
Status and Usage
A further management function is
the transitory status and directory
records for all active Stations with
the following data:
1) Global LAN address (48 bits)
2) Local LAN address (16 bits)
3) Global E.164 address (60 bits)
4) Current
Access-point
identifier
5) Secondary and Tertiary Access6) Current power setting
7) Last poll response time
8) Registration active/not active
9) Permitted address access
10)
Changes log
The log record may be stored for
some period (e.g. up to 4 weeks)
following the last activity before
clearing.
In addition, permanent records of
usage for each active Station are
needed to cover charging and cost
distribution, and as evidence of
system
abnormality
with
the
following data:
1) Global LAN address (48 bits)
2) Local LAN address (16 bits)
3) Global E.164 address (60 bits)
4) For
each
Access-point
by day and by hour-a) Number
of
messages
by
b) Number of octets of payload
transferred
c) Number of failed transfers
d) Number
and
time
of
Management of System Operations and
Configuration
At the system central controller,
a number of operational records
should be kept and updated in real
time.
For each Access-point, the
following
records
should
be
maintained:
1) Long and short Access-point
identifier
2) Location and antenna pattern
description
3) Hub Controller location
4) API's where channel reuse is
blocked
5) API's and SYS no. of foreign
systems received
6) Date of last service
7) Message handling data-a) Number of packet messages-transmit, receive
b) Number of packet octets of
payload transferred
c) Number of failed transfers
requiring repeat
d) Number of direct transfer
messages
e) Number of calls, messages
and
channel-seconds
used for connectiontype service
For the system as a whole, data
should be collected on the volume
and
character
of
out-of-network
traffic.
There
are
also
configurable
parameters
which
may
require
downloading from a "human" system
manager. Some of these are:
1) partitioning rules for data
and voice capacity
2) authorized
user
identifications
3) access
restrictions
selectively by user
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
4) security screening data
INTERFERENCE CONTROL BETWEEN
CONTIGUOUS LANS
The presently described access
protocol addresses service from a
limited number of radio Accesspoints where there is not material
overlapping
radio
coverage
from
other nearby systems. If the other
nearby systems are area and capacity
extensions of the first system, they
are said to be commonly managed. If
the
other
nearby
systems
are
providing
like-type
service
to
neighboring enterprises, they are
said to be independently managed;
and it is for this situation that
the SYS field is necessary.
Access-point Separation
Using directive antennas position
for inward illumination from a
boundary, it is often possible to
limit overlap between Access-point
transmit and receive coverage in
contiguous systems to a very small
portion of the served area.
Also
there is often geographic isolation
from
parking
lots
and
other
separating spaces.
Nonetheless,
there will be cases of interpenetration of systems occurring in
shopping malls, multi-tenant office
buildings, adjacent office building,
convention
centers,
public
transportation terminals and many
other
places
which
must
be
considered.
The effectiveness of directional
antennas at Access-points can be
increased with cooperation between
system managers.
Station Separation by Probability
Stations cannot use directive
antennas to define their coverage.
A mild consequence is that a Station
in system A will hear transmissions
from system B that can and must be
ignored using the SYS field. A more
serious consequence is that the
Station in system A will not hear
transmissions
addressed
to
it
because of interference from a few
nearby Stations in system B.
Because each Station has an air
time duty cycle which is probably
less than 0.05% (3.6 seconds/hour or
18.0 megabits of transmitted data
per hour at 10 Mb/s), there is only
one
chance
in
2,000
that
the
interfering
Station
will
be
transmitting.
Similarly,
while
Station A listens all the time,
there is only 0.05% of the time when
he is listening to addressed traffic
(approximation).
Only
a
few
interfering
Stations
need
be
anticipated because there is a
higher
attenuation
rate
between
Stations, and because only a few are
close enough to cause interference
to a particular Station.
Without considering that there is
any radio frequency isolation or
that the desired signal from the
Access-point might be stronger than
the interference, the chances of the
interfering transmitter being ON
while there is relevant traffic
being received at the interfered
Station,
is
about
1-in-1,0002
between any pair of overlapping
coverage Stations.
If one Station
had certain interference from 100
other Stations, the odds would still
be 10,000:1. If fewer than 1-in-100
messages must be repeated because of
interference, the system is hardly
impaired.
The event of a transmitting
Station originating interference to
another receiving Station in a
different system is statistically
improbable and well within the
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
capacity of automatic repetition to
correct. The provision of automatic
repetition
of
unacknowledged
messages is a necessary part of
minimizing loss from overlapping
radio coverage between Stations of
contiguous systems.
POWER CONTROL CONSIDERATIONS
This access protocol enables this
system
to
operate
with
all
transmitters at full power all of
the time, but average interference
levels into other systems will be
reduced if power is dynamically
adjusted to the level necessary.
To assist in this function, it is
necessary
for
the
Access-point
receiver to measure and report the
signal
level
of
each
received
transmission.
It is then possible
for
a
power
setting
to
be
incorporated in the next message to
the Station. Reduced power in the
Station only occurs on command
originating at the Hub Controller.
A further use of the report is on
registration
and
subsequent
transmissions from the Station to
determine the preferred Access-point
for passing messages to that Station
and changes that may occur.
The power control requirement is
quite different from that occurring
in spread spectrum systems proposed
for cellular and pocket telephone
service because in this system only
one Station at a time is served by
each site. These other systems have
many
Stations
simultaneously
communicating with a common base
Station each using a different
spreading code, and it is required
that all arrive with close to the
same signal level.
The more precise use of output
power control is an area for further
study.
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
Communication Between Hub
Controller and Access-point
Fast command transfer between Hub
Controller
and
Access-point
is
needed to specify power level for
the
Access-point
transmitter
at
full, -3, -6 and -9 dB or some other
short set of possibilities.
It is
likely that power may be determined
through the metallic path in the
pairs between Access-point and Hub
Controller rather than by reading
the content of data messages.
A more difficult transmission
problem will be to provide the
received signal level to the Hub
Controller in the reverse direction.
This is also a high speed function
because it is part of the delay
between completion of the REGISTER
message and the sending of the
response.
CONFIGURABLE OPTIONS
There are a number of parameters
which might be configurable. Table
I, on the following page, is an
initial effort to identify these
parameters
and
list
the
possibilities.
A subset of these
are default values and available
values
required
in
conforming
equipment.
Level A conformance is assumed to
be minimum cost, and Level B is
higher
performance
and
function
version.
The setting of these parameters
can affect the Hub Controller, the
Access-point and the Station or any
combination as shown in the right
column.
Line Rate
This parameter affects all major
parts of the system.
Initially,
this
rate
is
a
configuration
parameter set at a single value
throughout one system; however the
rate
could
eventually
become
adaptive
at
the
Station
and
configurable at the Hub Controller.
BACKBONE INTERCONNECTION
CONSIDERATIONS
This
access
protocol
is
independent
of
backbone
implementation as viewed at the user
Station air-interface.
There are
some configurations and topologies
which are more favorable than others
from a cost and complexity viewpoint.
If the propagation delay across
the backbone is much longer than
across wireless LAN, there may be a
requirement
for
re-registration
after roaming between LANs connected
through the backbone.
Delay Intervals
The
intermessage
delay
is
configurable to provide for longer
distances through radio and wire
than can be accommodated with the
default.
Not all systems will have a peerto-peer direct requirement.
The
delay introduced with the length of
one ACK message should not be
compulsory.
TABLE I -- CONFIGURABLE PARAMETERS WITH CONFORMANCE-REQUIRED VALUES
PARAMETER NAME &
PERMITTED &
DESCRIPTION
POSSIBLE
REQUIRED FOR CONFORMANCE
SCOPE OF
EFFECT
VALUES
DEFAULT
LINE RATE IN
LEVEL A
LEVEL B
TBD
TBD
TBD
TBD
STN, A-P,
SERVICE SUPPORT
LAN, CIRCUIT
LAN
LAN
BOTH
STN, AM
INTER-MSG DELAY _SEC:
2-6
4
4, 6
2, 3, 4, 6
STN, AM
MBITS/SEC:
AM
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
STN/STN ACK DELAY:
OFF, 4-10 OCT
8
OFF, 8
OFF, 8
STN, AM
MSG RETRIES N TIMES:
0-5
2
1, 2, 3
1, 2, 3
AM
POLL INTERVAL:
.5-10
TBD
TBD
TBD
AM
MAX SEG PAYLOAD LEN:
48-384 OCT
TBD
TBD
TBD
STN, AM
MAX PACKET LENGTH:
UP TO 10K OCT
TBD
TBD
TBD
STN, AM
DEFAULT ACCESS MGR
ON, OFF
OFF
OFF, ON
OFF, ON
STN
SEC/POLL
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
The interval between initiation
of
polls
is
a
configurable
parameter.
Lengths and Retries
If the Hub Controller misses a
packet, it is a tradeoff on how many
retries are appropriate.
The maximum size packet and
segment
are
also
configurable
tradeoffs.
Possibly, the Standard
will settle on one or two values for
some of these parameters.
AUTONOMOUS GROUPS NOT USING
INFRASTRUCTURE
The defined area for this plan
includes the words "common channel"
which means not only one time-shared
radio channel for both up and down
link
at
infrastructure
Accesspoints, but also that the same
channel is used at all Access-points
and communicating Stations.
The system access protocol is
further designed to allow direct
communication between Stations when
no infrastructure is present.
Two
methods are possible for operation
without infrastructure.
1) Access-point simulation by the
first Station up
2) Distributed
contention-based
access method
Default Access Manager
The
above
described
Access
Protocol can include a default
access manager function in each
Station.
When turned ON, the
Station listens for INVITATION-TOREQUEST messages, and hearing none
acts as a reduced function Accesspoint
by
sending
INVITATION-TOREQUEST and INVITATION-TO-REGISTER
messages periodically.
A second
Station nearby can then REGISTER and
communicate with the first Station,
and similarly for further added
Stations.
The default access manager can
include a prompt for manual entry of
a group number with a small number
of possibilities.
This would be
translated into the System Number
field of those messages containing
that field.
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
Distributed Contention-based
Access Method
This method is similar to that
described in a separate contribution
relating
to
channelized
systems
(IEEE
802.1/91-96),
modified
to
complete all setups and transfers on
a single channel. In general, steps
and messages are deleted which
indicate
and
confirm
channel
switches.
The access method is simple. The
logic is based upon the capacity to
retry unsuccessful transmissions and
the acknowledgement function is used
to trigger retry. The same message
set
is
used
as
for
the
infrastructure based access method
previously described.
Sending a Message
If the ACK timer has expired or
if no message of any kind has been
received
for
250
_seconds,
a
randomizing timer is started which
adds
one-of-64
possible
delays
randomly selected in steps of 4
_seconds.
When this time has
expired, the Station may transmit a
REQUEST--LONG ADDRESS if it has a
message to pass.
If the addressed
Station hears the REQUEST, then the
originating
Station
hears
the
special
station-originated
GRANT
(115) response.
This message has
the same format as the Access-point
originated GRANT (015).
If GRANT is not heard, the
originating Station may try twice
again in quick succession for one
message.
No further tries may be
made
until
the
initial
timing
conditions again exist which permit
transmission, and then only two more
cycles for the same message.
If the GRANT response is heard,
the originating Station sends the
PACKET DATA FRAME (114).
The
receiving Station then sends ACK if
received correctly or NACK. If NACK
is received, the Station may resend
the PACKET DATA FRAME immediately
for two more tries otherwise the
process goes back to the beginning.
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
C. Short and medium distance, and
Activation
Criteria
for
Infrastructure
D. Systems with a few to many
A composite system in which the
hundreds of
infrastructure
is
dormant
until
needed is possible.
Then the
E. LAN
and
connection-type
criteria for activation and dormant
services;
operation need to be defined.
A
provided that provision is
possibility for these points is now
made for:
described.
Quiescent
infrastructure
will
F. some configurable options, and
become active sending INVITATION
messages if any of the following
G. a medium independent interface
conditions exist:
to
type of substitutable PHY.
1) a
Station allow more than oneis
asks
for
or
addressed by a connection-type
2. An entirely asynchronous protocol
service.
2) a LAN can be evolved on thewhich
message is initiated principle that the next step begins when the
current Station not also
addresses a step is completed; and that a high time utilization can be
obtained a common Accessregistered by in this way.
point.
3. Adaptively available peer-to-peer
3) a LAN message is received from
communication can
provided.
outside addressed to abeStation
within the system.
4. All necessary functions can be
4) the LAN traffic intensity results
in anobtained from a library of about 16 different message types--half
observed air-time usage
upward, half downward.
exceeding
2%
at
any
single
Access-point within the system.
5. Protocol for operation with and
without infrastructure can be incorporated in a Station with both
The
infrastructure
will
not
resume a modes using condition until
quiescent substantially the same message set and format.
all of these activation conditions
6. Infrastructure might be inactive
have been absent for a time interval
when its services are not needed.
of two minutes.
In
the
dormant
state,
the
7. The most important reasons for
infrastructure will poll and solicit
favoring the less Channel
registration at much Commonfrequent Plan are:
intervals than when it is active.
With infrastructure, unused capacity is in a common pool available to
any
CONCLUSIONS Access-point in a reuse group.
1. It is possible to use a single
The plan is highly resistant to anomalous signal levels from
protocol for:
contiguous Access-points as compared to channelized spread-spectrum
systems.
A. Radio,
optical
and
wire
mediums, and
The plan avoids the overhead necessary for managing channel
selection, and for placing this function in the ISO layer and
B. Minimum,
medium
and
high
management structure.
function Stations, and
SEPTEMBER 1991
DOC.: IEEE P802.11/91-95
[--- Unable To Translate Box ---]
apted to a dual mode operating with and without
Exhibit 16
1992
Doc: IEEE P802.11 - 92/64
----------------------------------------------------------
TOPIC: DISTRIBUTION SYSTEMS
5
---------------------------------------------------------Issues
5- 1
F.Y. Simon
1992
Doc: IEEE P802.11 - 92/64
----------------------------------------------------------
Issue Identification:
5.1
(Topic: Distribution Systems).
- Will the standard specify:
a) - the 'internal' of the distribution system (DS)? or
b) - only the services it provides?
Alternatives:
1) No - The internal functions of the Distribution System (DS) should not be specified.
2) Yes - The internal functions of the DS must be addressed.
References:
1) - MAC Minutes of 09/17/92
2) - P802.11-92/128 - IEEE 802.11 Distribution System Services Functionality.
Arguments:
See MAC Minutes of 09/17/92
Pro:
Con:
Related Issue Identification:
Issue Originator:
Issue History:
May 1992: Date first opened
July 1992: Discussion and Alternatives 1 and 2
November 1992: Added Reference - Motion to close the issue by proposing to endorse Alternative #1.
Results: Yes-21, no-1, abstain-1.
Issue Status: Close
---------------------------------------------------------Issues
5- 2
F.Y. Simon
1992
Doc: IEEE P802.11 - 92/64
---------------------------------------------------------Issue Identification:
5.2
(Topic: Distribution Systems).
- What is a conformant Distribution System (DS)?
Editor's note: Ref: 44 (92/58R1)
Alternatives:
Arguments:
Pro:
Con:
Related Issue Identification:
- 23.1 (Topic: Conformance)
Issue Originator:
Issue History:
May 1992: First opened
Issue Status: Open
---------------------------------------------------------Issues
5- 3
F.Y. Simon
1992
Doc: IEEE P802.11 - 92/64
---------------------------------------------------------Issue Identification:
5.3
(Topic: Distribution Systems).
What are the Distribution System's functions needed?
Alternatives:
1) - Distribution System Services (DSS) must include the ability to deliver 802.11 MAC Service
Data Units (MSDU) between Basic Service Sets (BSS) and non-802.11 LANs (via portals).
2) - The DSS must provide some filter algorithm to avoid flooding all BSSs with all traffic; or
possibly.
2a) - An Access Point (AP) must transmit only MSDUs for stations that are associated with that AP.
3) - The delivery of MSDUs is perhaps the only function required to be performed by the DSS - all
other functions seems to be sub-functions that are needed in order to fulfill the primary function of a
Distribution System (DS).
4) - The DS must know or be able to find out the Station/Access point association (internal but not
pass thru the interface) within the Extended Service Set (ESS).
5) - If Time-bounded (TB) services imply a connection, then the DSS must be able to provide and
maintain the connections between the stations.
6) - [Is a DS a managed object or only the APs and/or Portals or none or what else?]
References:
- P802.11-92/128 - IEEE 802.11 Distribution System Services Functionality
Arguments:
Pro:
Con:
Related Issue Identification:
1) - 5.3A (Distribution Systems)
2) - 5.3B (Distribution Systems)
Issue Originator: Dave Bagby
Issue History:
May 1992: First opened
September 1992: Discussion and Alternatives ('brainstorming' ideas) 1 to 6.
November 1992: Added Reference
January 1993: Decision taken to split this issue (5.3) into two parts: 5.3A - What are the infrastructures
services? and 5.3B What logical functions are needed to provide the defined infrastructure services?
Issue Status: Open
---------------------------------------------------------Issues
5- 4
F.Y. Simon
1992
Doc: IEEE P802.11 - 92/64
---------------------------------------------------------Issue Identification:
5.3A
(Topic: Distribution Systems).
- What are the infrastructure services required?
Alternatives:
1) The initial set of infrastructure services required is:
- Association (creation of Station to Access Point mapping)
- Re-association (movement of mapping)
- Disassociation (remove mapping)
- Authentication (identity verification)
- Privacy (privacy of payloads)
- Integration (ability to connect to existing LANs)
- Network Management (usual network management functions)
References:
1) - P802.11-93/9 - 802.11 DS Service Transactions
Arguments:
Pro:
Con:
Related Issue Identification:
1) - 5.3 (Distribution Systems)
Issue Originator: Dave Bagby
Issue History:
January 1993: First opened - Alternative #1 - Agreed to adopt the Alternative (#1) as initial
infrastructure services required.-Result: yes-13, no-0, abstain-1.
Issue Status: Close
---------------------------------------------------------Issues
5- 5
F.Y. Simon
1992
Doc: IEEE P802.11 - 92/64
---------------------------------------------------------Issue Identification:
5.3B
(Topic: Distribution Systems).
What logical functions are needed to provide the defined infrastructure services?
Alternatives:
1) - These services are defined in closed Issue 5.3A as: association, re-association, disassociation,
authentication, privacy, integration, and network management.
References:
1) - P802.11-93/9 - 802.11 DS Service Transactions
2) - The CODIAC Protocol - Centralized or Distributed Integrated Access Control (CODIAC), A
Wireless MAC Protocol
Arguments:
Pro:
1.1) - For any of these services which require exchange of information over the wireless medium, the
CODIAC protocol proposes using MDATA frames. Because delivery of these frames is critical, they
are transferred in the four-step transaction in the same manner as client data. These frame formats are
yet to be fully defined.Association, re-association, disassociation, and integration all require an AP.
These services are supported by the AP bit which is set in frames sent by the AP, which also serves
to notify stations of its presence.
Con:
Related Issue Identification:
1) - 5.3 (Distribution Systems)
2) - 5.3B (Distribution Systems)
3) - 5.3A (Distribution System)
Issue Originator: Dave Bagby
Issue History:
January 1993: First opened - Reference #1 - Related Issue IDs #1 and 2.
May 1993: Alternative #1 - Reference #2 - Argument_pro #1.1
Issue Status: Open
---------------------------------------------------------Issues
5- 6
F.Y. Simon
1992
Doc: IEEE P802.11 - 92/64
---------------------------------------------------------Issue Identification:
5.4
(Topic: Distribution Systems).
- Is the interface of the Distribution System is performed at:
- In which layer entity the interface of the distribution system is performed?
Alternatives:
1) - the MAC Layer
2) - the PHY Layer
3) - both MAC and PHY
References:
1) - P802.11-93/40 - The Wireless Hybrid Asynchronous Time-bounded MAC Protocol
Arguments:
Pro:
1.1) - There is no relation between the wireless PHY and the Distribution System (DS).
Con:
Related Issue Identification:
- 12.2 (Topic: Interfaces)
Issue Originator: John Corey
Issue History:
May 1992: Date first opened
March 1993: Reference #1 - Argument_pro #1.1 - Closing the Issue (5.4) by endorsing Alternative #1;
result: yes-25, no-0, abstain-2.
Issue Status: Close
---------------------------------------------------------Issues
5- 7
F.Y. Simon
1992
Doc: IEEE P802.11 - 92/64
---------------------------------------------------------Issue Identification:
5.5
(Topic: Distribution Systems).
- What are the performance requirements of the Distribution System (DS)?
Editor's note: Ref: 100 (92/58R1)
Alternatives:
1) None - The performance requirements of the Distribution System need not be specified.
References:
- P802.11-92/128 - IEEE 802.11 Distribution System Services Functionality.
Arguments:
Pro:
1) The performance requirements of the Distribution System need not be specified and should not be
(since most sites will want to use their existing networks as their Distribution Systems).
However, it is required that path metrics (between Access Points) be acquired in order to determine
if the Distribution System can support Time-bounded services between different Basic Service Sets.
This requirement interacts with Network Management issues.
Con:
Related Issue Identification:
1) - 13.1 (Management)
Issue Originator: John Corey
Issue History:
May 1992: Date first opened
November 1992: - Alternative #1, Argument-pro #1 and Related Issue ID.
Issue Status: Open
---------------------------------------------------------Issues
5- 8
F.Y. Simon
1992
Doc: IEEE P802.11 - 92/64
---------------------------------------------------------Issue Identification:
5.6
(Topic: Distribution Systems).
- What is the direction for the Association Service transaction?
Alternatives:
1) - From Station (STA) to Access Point (AP)
2) - From AP to STA
3) - Bidirectional
References:
1) - P802.11-93/9 - 802.11 DS Service Transactions
2) - P802.11-93/40 - The Wireless Hybrid Asynchronous Time-bounded MAC Protocol
Arguments:
Pro:
1.1) - Needed when Station (STA) is first powered on
1.2) - There is no need for a bi-directional service. If the Access Point (AP) causes a Disassociation,
the Station can sign on with a different Access Point and cause a new Association. Only the Station
knows which Access Point is the best one to choose for the new Association, so it does not make
sense for an Access Point to cause an Association on behalf of a Station. If we require the Access
Points to know about the real time signal strength of every Associated Station in relation to every
Access Point; and communicate this information through the Distribution System in a timely
manner, then we are making too many assumptions about the performance of the Distribution
System. We cannot define the Distribution System; it already exists.
2.1) - See 'Re-association' in Reference #1
3.1) - Implied if association AP to STA decided to be necessary.
Con:
3.1) - See Alternative_pro #1.2
2.1) - See Alternative_pro #1.2
Related Issue Identification:
Issue Originator: Dave Bagby
Issue History:
January 1993: Date first opened - Alternatives #1 to 3 - Reference #1 - Argument-pro #1.1, 2.1 and 3.1.
March 1993: Reference #2 - Argument_pro #1.2 - Argument_con #3.1 and 2.1
Issue Status: Open
---------------------------------------------------------Issues
5- 9
F.Y. Simon
1992
Doc: IEEE P802.11 - 92/64
---------------------------------------------------------Issue Identification:
5.7
(Topic: Distribution Systems).
- Is the Explicit Re-association transaction required?
Alternatives:
1) - Yes
2) - No
References:
1) - P802.11-93/9 - 802.11 DS Service Transactions
Arguments:
Pro:
1.1) - Conceptually cleaner to perform an Explicit Re-association.
1.2) - Nicer for interaction with privacy level.
2.1) - This transaction can be accomplished with a Disassociate/Associate transaction pair.
Con:
2.1) - Probably translates into more message traffic in a protocol.
Related Issue Identification:
1) - 6.8 (Security)
Issue Originator: Dave Bagby
Issue History:
January 1993: Date first opened - Alternatives #1 and 2 - Reference #1 - Argument-pro #1.1, 1.2 and
2.1 - Argument-con #2.1.
Issue Status: Open
---------------------------------------------------------Issues
5 - 10
F.Y. Simon
1992
Doc: IEEE P802.11 - 92/64
---------------------------------------------------------Issue Identification:
5.8
(Topic: Distribution Systems).
- What is the direction of the Re-association Transaction?
Alternatives:
Note 1: Based on the closure of Issue 5.7 - The following assumes that there is a Re-association
transaction defined.
1) - From Station (STA) to Access Point (AP)
2) - From AP to STA
3) - Bidirectional
References:
1) - P802.11-93/9 - 802.11 DS Service Transactions
Arguments:
Pro:
3.1) - See note 1 - Station may wish to re-associate to another AP for reasons of signal quality and
APs may whish to re-associate for reasons of signal quality, load balancing, or to fake an AP out of
a network for service.
Con:
Related Issue Identification:
1) - 5.7 (Distribution System)
Issue Originator: Dave Bagby
Issue History:
January 1993: Date first opened - Alternatives #1 to 3 - Reference #1 - Argument-pro #3.1.
Issue Status: Open
---------------------------------------------------------Issues
5 - 11
F.Y. Simon
1992
Doc: IEEE P802.11 - 92/64
---------------------------------------------------------Issue Identification:
5.9
(Topic: Distribution Systems).
How to determine that Access Points (APs) are present?
Alternatives:
1) - Discover:
- Listen (APs beacon) - hard for ad-hoc networks
- Ask (talk then listen) - may cause unnecessary traffic.
2) - Pre-configured knowledge
- Disadvantages from installation and configuration viewpoints.
3) - All frames are marked with an AP bit which indicates that they originate with an AP (Reference
#3).
References:
1) - P802.11-93/9 - 802.11 DS Service Transactions
2) - P802.11-93/40 - The Wireless Hybrid Asynchronous Time-bounded MAC Protocol
3) - The CODIAC Protocol - Centralized or Distributed Integrated Access Control (CODIAC), A
Wireless MAC Protocol
Arguments:
General:
1) - The WHAT Protocol (see Reference #2) handle this in two ways:
a) Each MPDU that is transmitted by an Access Point is marked with a bit that indicates it was
transmitted or relayed by an Access Point. A Station observing a Basic Service Set (BSS) that
includes an Access Point will very quickly learn that the Access Point is present; and can
attempt to sign on using a broadcast with the appropriate NETID.
b) When the network is idle, Access Points send out periodic Announce frames. Announce
frames are also marked with the AP bit, so a receiving Station can distinguish an ad-hoc Basic
Service Set from one that includes an Access Point.
Pro:
1.1) - Discover, Listen, if nothing is heard, then ask.
3.1) - If a station listens and does not hear frames from an AP, it can send a broadcast RTS with the
Hierarchical bit set, which indicates that the RTS is intended for an AP only - this will cause any
AP present to identify itself (Reference #3).
Con:
Related Issue Identification:
Issue Originator: Dave Bagby
Issue History:
January 1993: Date first opened - Alternatives #1 and 2 - Reference #1.
March 1993: Reference #2 - Argument_general #1 - Argument_pro #1.1
May 1993: Alternative #3 - Reference #3 - Argument_pro #3.1
Issue Status: Open
---------------------------------------------------------Issues
5 - 12
F.Y. Simon
1992
Doc: IEEE P802.11 - 92/64
----------------------------------------------------------
---------------------------------------------------------Issues
5 - 13
F.Y. Simon
---------------------------------------------------------Issues
5 - 14
F.Y. Simon
Exhibit 17
May 1992
DOC:IEEE P802.11-92/50
Functional Requirements
IEEE Project 802.11
DRAFT
THIS DOCUMENT HAS NOT BEEN OFFICIALLY
REVIEWED OR APPROVED. THIS DOCUMENT IS
CIRCULATED FOR REVIEW PURPOSES ONLY.
Version 0.2
802.11 Draft Functional Requirements V0.2
1
May 1992
DOC:IEEE P802.11-92/50
Dear reviewers This is the second version of the functional requirements document. It's version is 0.2.
The goals for this version were:
1) To make the document more self consistent.
2) To neither add nor delete from the list of agreed functional requirements from
the March mtg.
3) To keep the document as short as possible.
4) To clarify the concepts discussed at Irvine.
To accomplish this the following was done:
1) Fleshed out the definitions section to include some terms the rest of the document used
but did not define. The definitions are not complete. I do believe they are self consistent
and good enough to proceed with.
2) I have changed a couple of common terms to make the meaning of their concepts
clearer. I fear that this may cause short term confusion - I also believe it will provide long
term improvement in the quality of our discussions. In particular I have taken the liberty
of changing BSA to BSS and ESA to ESS (stop! don't shoot that gun just yet). The
discussions at Irvine were productive because we divorced the concept of Coordination
Function from physical implementation. We realized that the basic building blocks of a
wireless network are really centered around a CF concept instead of a geographical
concept. Thus, the "A" (for area) in these terms is very misleading - the best suggestion
was to use the word "set" instead. It makes sense when you read the updated definitions.
3) There was an attempt made to add a short paragraph to expand the intent of the bullet
items in the functional requirements section of the document. It became apparent while
writing these paragraphs that they did not help clarify the functional requirements. The
paragraphs tended to stray from "what is required" into "how to do it". It was felt that this
was not appropriate for a functional requirements list. With the improved definitions,
much of the motivation for the verbiage was gone. The paragraphs were abandoned.
4) In some places I have inserted . This happened when it was not clear what to
say. Help is solicited to clean up the places.
5) The functional requirements seemed to naturally group themselves, so they were
ordered them to make the document easier to read. The order is NOT intended to imply
any relative importance between bullet items.
Please bring all comments to the Leiden meeting, preferably in written form, even better
if they are machine readable (by a PC, the most common format seems to be Win Word
for either MAC or PC). You can also Email comments to me - but other than read them,
I probably won't be able to do much with them between now and the Leiden meeting.
802.11 Draft Functional Requirements V0.2
2
May 1992
DOC:IEEE P802.11-92/50
I you have questions re this document, Email is the best way to access me. If you can not
access the internet, try calling me. Just be aware that Email is more likely to get a
considered response from me, the phone call is unlikely to catch me in the office - but
you are welcome to try.
Dave Bagby - editor.
Email: david.bagby@Sun.com
Office: (415) 336-1631
802.11 Draft Functional Requirements V0.2
3
May 1992
DOC:IEEE P802.11-92/50
Introduction:
This document contains the agreed upon definitions and functional requirements for
802.11.
Definitions:
The following definitions are used within this document:
MAC Service Data Unit (MSDU): The MAC Service Data Unit is information that is
delivered as a unit between MAC service access points.
Wireless Media (WM): The media used to implement a wireless LAN.
Station (STA): Any device which contains an 802.11 conformant MAC and PHY
interface to the wireless media.
Coordination function (CF): That logical function which determines when a station
transmits and receives via the WM.
Distributed CF (DCF): A class of possible CFs where the CF logic is active in every
STA at any given time.
Point CF (PCF): A class of possible CFs where the CF logic is active in only one STA at
any given time.
Basic Service Set (BSS): A set of STAs controlled by a common CF.
Extended Service Set (ESS): A set of interconnected BSSs which appear as a single BSS
to LLC.
Distribution System (DS): A logical system used to interconnect a set of BSSs to create
an ESS.
802.11 Draft Functional Requirements V0.2
4
May 1992
DOC:IEEE P802.11-92/50
Distribution System Media (DSM): The media used by a DS for BSS interconnections.
Distribution System Services (DSS): The set of services provided by the DS which
enable the MAC to transport MDSUs between BSSs within an ESS.
Access Point (AP): Any STA whose MAC invokes DSS.
Registration:
Authentication:
802.11 Draft Functional Requirements V0.2
5
May 1992
DOC:IEEE P802.11-92/50
Functional requirements:
Externally Imposed requirements:
Documents which contain functional requirements that are hereby incorporated as
802.11 functional requirements:
802 Functional Requirements (document number P802-91/152).
802.11 PAR.
The 802.11 PAR supersedes the 802 Functional Requirements (P80291/152) where they conflict.
General requirements:
The primary service provided by 802.11 is to deliver MSDU's between LLCs.
Continuity of service to the LLC layers within an ESS will be supported.
The Mac must accommodate any PHY transmission rate between 1 and 20 Mbs.
The 802.11 MAC and PHY will support the applications described in the 802.11
Market Requirements Document.
Any function or service unique to wireless networks will be handled within the
802.11 standard.
802.11 will support multicast services.
The standard will support network management services.
802.11 Draft Functional Requirements V0.2
6
May 1992
DOC:IEEE P802.11-92/50
Data Service Types:
802.11 will provide two classes of data gram service:
1) An Asynchronous packet delivery service.
2) A Time-bounded packet delivery service.
All 802.11 implementations will support the Asynchronous class service.
Stations using the Asynchronous and/or Time-bounded service must coexist
within the same BSS.
Coordination Functions:
All 802.11 implementations will support a common default Coordination
Function.
There will be a method for dynamically switching from the default Coordination
Function and any other defined Coordination Function.
A single MAC shall be used to support all Coordination Functions.
There shall be mechanisms defined to resolve media use conflicts.
Coordination Functions may be either DCF or PCF in nature.
The following combinations of Coordination Functions and network types must
be supported:
Network Type
CF Class:
DCF
BSS
PCF
Supported
Supported
ESS
802.11 Draft Functional Requirements V0.2
Supported
7
May 1992
DOC:IEEE P802.11-92/50
MAC / PHY interface:
A single MAC will be used to support multiple PHYs.
A single MAC/PHY interface will be defined.
If the MAC/PHY interface is exposed, a conformant implementation must adhere
to the defined MAC/PHY interface.
Security:
The standard shall support registration services.
The standard shall support authentication services.
Additional mechanisms beyond 802.10 shall be provided to address security
issues unique to 802.11.
802.11 Draft Functional Requirements V0.2
8
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?