Nokia Corporation v. Apple Inc.

Filing 379

NOTICE of Issuance of Amended Subpoena upon The Institute of Electrical and Electronics Engineers, Inc. ("IEEE") by Apple Inc. (Attachments: # 1 Exhibit 1 part 1, # 2 Exhibit 1 part 2, # 3 Exhibit 1 part 3, # 4 Exhibit 1 part 4, # 5 Exhibit 1 part 5, # 6 Exhibit 1 part 6, # 7 Exhibit 1 part 7, # 8 Exhibit 1 part 8)(Moore, David)

Download PDF
progress has been made in obtaining fixed-cost telecommunication services for libraries. Except for expensive and specialized facilities (such as private microwave) that are beyond the budgetary reach of virtually all libraries, one can expectto pay common carriers every month for services used, andcommon-carrier rateshave beensteadilyincreasing. Packet radio, however, offers librariesthe potential for purchasingdatacommunication capabilities at a reasonable fixed cost. Single-hop packetradio networks are also being used to improve the efficiency of commercial operations. For example, the useofa small hand-held radiowith a limited keyboard is being experimentedwith by restaurants. The waiters, bartenders, and cooks are all equipped with a packet radio. The waiter entersan order andits destination (either the bartender or the cook), then waits to receive a packet indicating that the orderhas been completed. In summary, packet radio is an exciting technology that is beginning to play an important role in the local distriwe bution of information. In this paper have presented the current state of the DARPA packet radio network.The primarycomponent of the PRNET is the LPR. The LPR has many sophisticated features that can provide enhanced flexibility in designing a robust and reliable packet-switched communications network. Fullyautomated algorithmsand protocols to organize, control,maintain,andmovetraffic through the PRNET have been designed, implemented, and 50 tested. By means of these protocols, networks of about packet radios with some degree of nodal mobility can be organized and maintained under a fully distributed mode of control. We have described the algorithms and illustrated how the PRNET system (i.e., the LPRs along with their attached devices) provides highly reliable network transo port and datagram service, by dynamically determining p timal routes, effectively controlling congestion, and fairly allocating the channel in theface of changing link conditions, mobility, and varying traffic loads. ACKNOWLEDGMENT Many of our colleagues working on the packet radio program havecontributed to the ideas presented in this paper. In particular, wewould like to acknowledge contributions from DARPA, CECOM,BBN Communications, Hazeltine SRI Corporation, Rockwell Internationa1,and International. REFERENCES [l] R. E. Kahn, “The organization of computer resources into a Trans. Commun., vol. COM-25, packet radio network,” I€€€ no. 1, pp. 169-178, Jan. 1977. [2] R. E. Kahn, S. Gronemeyer, J. Burchfiel, andR. C. Kunzelman, vol. “Advances in packet radio technology,” Proc. I€€€, 6 6 , no. 11, pp. 1468-1496, Nov. 1978. [3] J. Jubin, “Current packet radio network protocols,” in lNFOCOM‘85 Proc., Mar. 1985. [4] K. Klemba et a / . , “Packet radio executive summary,” Tech. Rep. prepared Defense for Advanced Research Projects Agency by SRI International, July 1983. [5] D.BehrmanandW.C.Fifer,“A lowcost spread-spectrum packet radio,” in MILCOM’82 Proc., 1982. [6] H. Zimmermann, “OS1 reference model-The I S 0 model of 32 architecture for Open Systems Interconnection,” Trans. IEEE Commun., vol. COM-28, no. 4, pp. 425-432, Apr. 1980. B. Leiner, R. Cole, J. Postel, and D. Mills, “The DARPAInternet Protocol Suite,” /€E€ Trans. Commun., vol. COM-23, no. 3, pp. 29-34, Mar. 1985. D. Beyer,M. Lewis, andJ. Tornow, “Network interface unit,” Tech. Rep. SRNTN 35, SRI International, Sept. 1985. N. Shacham and Westcott, “Future directionsin packet raJ. dio architectures and protocols,” this issue, pp. 83-99. J. Westcott and J. Jubin, “A distributed routing design for a broadcast environment,” in MILCOM’82 Proc., 1982. J. M. McQuillan and D.C. Walden, “The ARPA Network design decisions,” Comput. Networks, vol. pp. 243-289, Aug. l, 1977. N. Cower andJ. Jubin, ”Congestion control using pacing in a packet radio network,” in Proc. /€E€ Millitary communication Conf. (M/LCOM’82), vol. 1, pp. 23.1-1-23.1-6, Oct. 1982. [I 31 L.KleinrockandF.A.Tobagi,”Packetswitchinginradiochan- nels: Part I-Carrier sense multiple-access modes and their throughput-delay characteristics,” / € € E Trans. Commun., vol. COM-23, no. 12, pp. 1400-1416, Dec. 1975. W. C. Fifer and F. J. Bruno, “The lowcost packet radio,” this issue, pp. 33-42. Fed. Inf. Process. Stand., Data Encryption Standard, publ. 46 ed., Nat. Bur. Stand., Washington, DC, 1977. D. H. Davis and S. A. Gronemeyer, “Performance of slotted ALOHA random access with delay capture and randomized time of arrival,”€ E € Trans. Commun., vol. / COM-28, no. 5, pp. 703-710, May 1980. M. S. Frankel, “Advanced technology testbeds for distributed, survivable command, control and communications,” in Proc. I€€€ MlLCOM Conf., vol. 3, Oct. 1982. John Jubin born in Philadelphia, PA, on was March 25, 1947. He received the B.S.E. de- gree in electrical engineering from Princeton University, Princeton, NJ,in 1968, and theM.S. degree operations research from in Southern Methodist University, Dallas, TX, in 1977. From 1969 to 1973 he was a communications-electronics engineerin the U.S. Air Force Communications Service.In 1973 he joined Texas Instruments, Dallas, TX, where he developed software for real-time seismic data processing systemsand for Global Positioning System user sets. he joined In 1977 Rockwell International’s Collins Defense Communications organization, where he worked primarilyon DARPA’s Packet Radio has and Survivable Radio Networks (SURAN) programs. currently is He principal investigator for Rockwell on SURAN.Hehas(co-)authored four papers packet radio network protocols for on IEEE conferences. He has designed packet-switched communications protocols also for other systems, including the Ground Wave Emergency Network. Janet D Tornow (Associate, IEEE) received . the B.S. degree in mathematics from Doug- lass College, Rutgers University, New Brunswick, NJ, 1977, and the MS. degree in in operations research from Stanford University, Stanford, CA, in 1979. In 1978 she worked at Bell Laboratories. She joined SRI International in 1979, where she is a Research Engineer. Her primary responsibility is principal investigator for SRI on the DARPA Survivable Radio Networks program. Her researc I interests include the specification and development of packet ,adio protocols, the integration of packet radio network system! and network characterization and performance evaluation. PROCEEDINGS OF THE IEEE, VOL. 75, NO. 1, JANUARY 1987 Authorized licensed use limited to: University of Minnesota. Downloaded on February 17,2010 at 12:24:37 EST from IEEE Xplore. Restrictions apply. AppDel0034721 Authorized licensed use limited to: University of Minnesota. Downloaded on February 17,2010 at 12:24:37 EST from IEEE Xplore. Restrictions apply. AppDel0034722 Authorized licensed use limited to: University of Minnesota. Downloaded on February 17,2010 at 12:24:37 EST from IEEE Xplore. Restrictions apply. AppDel0034723 Exhibit 15 SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] IEEE P802.11 802 LAN Access Method for Wireless Physical Medium [--- Unable To Translate Box ---] DATE: August 23, 1991REVISED: [--- Unable To Translate Box ---] September 4, 1991 TITLE: SEQUENTIALLY-USED COMMON CHANNEL ACCESS METHOD [--- Unable To Translate Box ---] AUTHOR: Chandos A. Rypinski, Chief Technical Officer LACE, Inc.Telephone: 707 765 9627 921 Transport Way Facsimile: 707 762 5328 Petaluma, California 94954 USA[--- Unable To Translate Box ---] SUMMARY This access method uses a single high-data-rate channel sequentially at overlapping and interfering Access-points (one reuse group) all under the control of a single Access Manager within a multi-port Hub Controller. In general, the capacity can be equal to the parallel use of a lower rate at the same number of Access-points in a channelized system. The primary plan requires infrastructure, but permits direct Station-to-Station transfers when it is possible. The plan provides connection-type service consistent with IEEE 802.6 cell format. A secondary version of the plan is given for operation without infrastructure and without support of connection-type services. The previous contribution (IEEE 802.11/91-19) on access method is superseded in detail use of messages by the current contribution (IEEE 802.11/91-95), however, the original contribution contains material on calculated efficiency and compatibility with 802.6 ATM cell transfer which remains relevant though slightly inaccurate because of increases in message lengths to allow channelization and multiple simultaneous connections at one Station. The purpose of this revision is to present the single time-shared channel concept consistently with channelized systems elsewhere presented, and to incorporate the common message set for all of the methods. This method is the first of three access methods that have been developed all using the same message set and which can be characterized as follows: [--- Unable To Translate Box ---] Printed: September 4, 1991Page 1 Access Method for Common Channel SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] 1) 2) 3) With and without infrastructure, sequential use of one channel at all Access-points within one reuse group. With infrastructure control, sequential use of a common setup channel and parallel use of a number of data transfer channels derived by code-division spread spectrum or otherwise. Independent of infrastructure and without virtual circuit support, random contention use of a common setup channel and distributed channel selection for following use of one of several data transfer channels. [--- Unable To Translate Box ---] Printed: September 4, 1991Page 2 Access Method for Common Channel SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] Table of Contents Page NOTICE.................................................................... 1 OVERVIEW................................................................... 1 FUNCTIONAL OBJECTIVES...................................................... 1 DESCRIPTION OF SYSTEM FEATURES............................................. 2 Central Access-management and Asynchronous Access.......................... 2 Central Control and Addressing............................................. 2 Automatic Repetition (ARQ) of Errored Packets.............................. 2 Access-point Address and Moving Stations................................... 2 Signal-level Reporting From Access-points.................................. 3 Asymmetry of REQUEST-GRANT Procedure....................................... 3 DESCRIPTION OF THE ACCESS PROTOCOL......................................... 3 Initial Conditions--With and Without Infrastructure Present................ 3 Registration Function...................................................... 3 Polling Function........................................................... 4 De-register Message........................................................ 4 Summary of Access Method for Station Originated Packets.................... 5 Access-point-Originated INVITATION-TO-REQUEST Messages..................... 5 Initiation of a Station-Originated Message................................. 5 Peer-to-Peer Direct Message and ACK.................................... 6 Receiving Station-to-Station Direct Communication.......................... 6 Resolution of Contention on REQUESTS....................................... 6 Polling Type Contention Resolution......................................... 7 Sorting Type Contention Resolution......................................... 7 Hub Controller-Originated Message.......................................... 7 Signal Level Function at the Station Receiver.............................. 8 SEGMENTATION AND AUTO-GRANT................................................ 8 REQUEST-GRANT Procedure for First Segment and Setup........................ 8 Auto-Grant................................................................. 8 SEGMENT DATA FRAMES........................................................ 9 COMPATIBILITY AND CAPACITY ALLOCATION FOR PACKET AND CONNECTION-TYPE TRAFFIC 9 Excess Demand from Stations................................................ 9 Timely Transmission of Virtual Connection Packets.......................... 9 Use of Priority Function--SID field....................................... 10 Segmentation for Virtual Connections...................................... 10 Segmentation Compatibility with B-ISDN.................................... 10 CENTRAL MANAGEMENT FUNCTIONS.............................................. 10 Management of Access-point Usage.......................................... 11 Management of User Addressing, Status and Usage........................... 11 Management of System Operations and Configuration......................... 11 INTERFERENCE CONTROL BETWEEN CONTIGUOUS LANS.............................. 11 Access-point Separation................................................... 12 Station Separation by Probability......................................... 12 POWER CONTROL CONSIDERATIONS.............................................. 12 Communication Between Hub Controller and Access-point..................... 13 BACKBONE INTERCONNECTION CONSIDERATIONS................................... 13 CONFIGURABLE OPTIONS...................................................... 13 Line Rate................................................................. 13 Delay Intervals........................................................... 13 TABLE I -- CONFIGURABLE PARAMETERS WITH CONFORMANCE-REQUIRED VALUES.... 13 Lengths and Retries....................................................... 14 AUTONOMOUS GROUPS NOT USING INFRASTRUCTURE................................ 14 Default Access Manager.................................................... 14 Distributed Contention-based Access Method................................ 14 Sending a Message......................................................... 14 Activation Criteria for Infrastructure.................................... 15 CONCLUSIONS............................................................... 15 [--- Unable To Translate Box ---] Printed: September 4, 1991Page 3 Access Method for Common Channel SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] SEQUENTIALLY-USED COMMON CHANNEL ACCESS METHOD NOTICE: The following paper is a revision, rewrite and abridgment of IEEE 802.9/91-19 "Access Protocol for IVD Wireless LAN." The purpose is to present the single timeshared channel concept consistently with channelized systems elsewhere presented, to incorporate a common message set for all of the methods, and to add a noninfrastructure secondary access method. The topology assumed is one system (reuse group) with 9, 16 or a small arbitrary number of Access-points on which Invitation-to-transmit appears sequentially. The protocol is fully described, but traffic capacity analysis is left for another contribution. This access method is applicable to medium signaling rates of 8-20 Mb/s, and the description assumes 10 Mb/s. FUNCTIONAL OBJECTIVES OVERVIEW The scope and intentions of Three access methods have this access protocol are as been developed all using the follows: same message set. 1) to operate equally on This plan is dependent on wire, radio or optical infrastructure; however, the mediums. 2) to be suitable for last section of this plan adds indefinitely a non-infrastructure large systems carpeting a large area, or to access be usable as message method using the same an independent small system with many like type systems on all sides. set. 3) to limit energy density The protocol is implemented radiated when all of the simultaneous radiation is with sequential message summed a interference transfers using for message set effect on other spectrum users. 4) to attain full use of which is capable of serving channel other access this and the time under peak load conditions. 5) to avoid Station logic methods. dependent Full provisions on system configuration and public network have been made for interface protocols. virtual circuits with 6) to make all Station logics demand-assigned bandwidth. identical independent of the size, scale or traffic The meaning of capacity used is that "asynchronous" as of the system in which they are used. 7) to make this local there are no fixed dimension distribution system timing frames or slots. Each compatible with common backbone network technology. transmission begins when the 8) To use the medium necessary pre-conditions are efficiently when are satisfied none of which the outward-inward traffic volume is asymmetrical, fixed time intervals. There 9) To provide direct peer-tois no addressing in the form when Stations are in range of each of time peer communication bit location in the stream. other. SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] 10) To use no air-time to pad predetermined boundaries. SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] it possible to assemble and use DESCRIPTION OF SYSTEM FEATURES essential facts about the system: Architectural and logic choices give this protocol and the 1) which Stations are available, and environment that it creates a 2) capable of directly communicating special set of properties now described. 3) what outside priority traffic is This access protocol is different ion that could take precedence. from other 802 protocols in a number 4) what is the local address of ways mostly as a result of obal addressfitting to the particular conditionsformat, and vice versa. in either 6 octet LAN or E.164 BCD The entity providing central of use. The extent of an access control functions is an "access group is smaller, and the manager" within a Hub Controller. probability of one packet being correctly received on the first try Central Control and Addressing is much smaller. The repetition Stations have a long global LAN mechanism must be in the physical address, a short local address and layer to bring the performance up to may have a long E.164 telephone the accuracy levels of other 802 address. A directory function in physical layers. By integrating the Hub Controller enables traffic acknowledgement and the repetition within the system to use short process into the access algorithm, addressing. Nonetheless, long the amount of time required for the addressing for both DA and SA will execution of this function is be used for externally addressed greatly decreased when it is used. traffic. When the REQUEST from a Station Central Access-management and contains a long destination address Asynchronous Access and there is a GRANT, that packet or By using a centrally-managed segment is completely defined by the access method, use of air-time can short source address thereafter. approach 100%. This procedure significantly reduces The right time to start a second overhead. use of the shared medium is Short addresses are non-permanent immediately after a first use is and assigned automatically by the concluded--and that is the purpose Hub Controller. They need not be of asynchronous logic. Among shared used or apparent to Users. mediums, radio is particularly Traffic originating outside the diminished by unnecessary "dead" system will be received and time. forwarded with long DA and SA. A further property of radio is that there is inevitable interaction Automatic Repetition (ARQ) of between contiguous illuminators. It Errored Packets is not possible to use one radio The advantages of ARQ are that it Access-point independently of those introduces no decrease in throughput around it. This kind of logic is except when it is needed, and it easily handled in common equipment, better compensates the temporary and unlikely to be effective or outage characteristic of the radio efficient distributed over the medium than would a full-time FEC. stations. Only at a common point is SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] Error-free (determined by CRC) packets originating at Stations are ACKnowledged by receiving Accesspoints. There is an automatic resend of the packet/segment limited to three attempts (two retries). Virtual circuit packets may be allowed only one retry or none at all, and then dropped. Stations are permitted to send NACK if they are addressed but the packet fails CRC. Access-point Address and Moving Stations Each Access-point is assigned a 4-bit identifier (API) which is broadcast in each INVITATION-TOREQUEST/REGISTER message. (Note: 12 bits may be a better choice.) Each Station will know which Access-point is being received or used and whether the current identifier is the same or different than the identified Access-point last used. Signal-level Reporting From Accesspoints The received signal level is reported back to the Hub Controller concurrently with reception. This signal level is used by the Hub Controller to decide which of several Access-points receiving the signal should be used for the next message exchange. Asymmetry of REQUEST-GRANT Procedure The inward REQUEST-GRANT procedure is essential to keeping Station logic simple and avoiding contention. It would be possible to use the same REQUEST-GRANT procedure in both directions rather than for only upward traffic. 802 philosophy is that a Station is always ready. A message is always sent--ready or not. It is for higher layers to provide a method of knowing whether Stations are there. To allow Stations to refuse a message, would be a point of incompatibility with 802 practice. If Stations could say "wait," a further buffering and indeterminate delay factor would be introduced in the network implementation. The amount of storage required in this protocol is only that to do repeat send on no ACK. Otherwise messages "fall on the floor" after a multiple-try delivery attempt. A symmetrical protocol is not used, because there is no functional value in downward REQUEST-GRANT, it would cost air-time, and it could create indeterminate buffer requirements in the infrastructure. DESCRIPTION OF THE ACCESS PROTOCOL This access method uses the message set shown in a separate contribution IEEE 802.11/91-80. (11AP16K) amended to add stationgenerated GRANT. This message set is also used or usable in other types of systems. In this protocol direct peer-topeer is a supported function with or without infrastructure. The description below is from the viewpoint of the individual user Station unless otherwise noted. Initial Conditions-With and Without Infrastructure Present If an infrastructure is present, its Access-points are transmitting POLL, INVITATION-TO-REGISTER and INVITATION-TO-REQUEST messages as described later below. When a Station does not hear any of the above infrastructure messages, there are two possible alternative reactions: SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] 1) the Station may assume a default no-infrastructure, contention mode is in operation, or 2) the Station activates a simplified default access manager which makes the first activated Station operate sufficiently like one Access-point to enable autonomous intercommunication within small groups of Stations. Operation with no infrastructure is described in greater detail later below. Registration Function Stations just entering the system listen first for the INVITATION-TOREGISTER (007) messages from which they identify the system providing the infrastructure. The Station cannot know which is the strongest signal received or which site would provide it. Though the Station can recognize a usable signal, there is no recognition of presence of unusable or foreign signals. The INVITATION-TO-REGISTER messages contain identity numbers for the transmitting Access-point (API). Registered Stations know that they are hearing or not hearing the Access-point at which they are currently registered. Assuming that the Station knows or deduces that it is unregistered, the Station responds With a REGISTER (102) message. Upon receipt of a REGISTER message, the Hub Controller decides which Access-point received that message with the best signal, and makes an assignment as described below. This process serves Stations coming into the system from outside or from turn-ON. It does not matter if the Station moves to the coverage of another Access-point before attempting the first message. The infrastructure provides the INVITATION-TO-REGISTER (007) message at the same frequency as a complete poll described below. The message format differs from a POLL (007) message only in having an open destination address field. This message is sent sequentially from a group of overlapping coverage Access-points all operating on the common channel. The unregistered Station upon hearing an INVITATION-TO-REGISTER sends a REGISTER (102) message with a long address (6 octets for LAN or possibly 60 bits for telephony within an 8 octet field) and hears immediately an ACK (011) and then a PACKET-DATA-FRAME (003) with long address in response. The payload of that frame contains the assignment of a temporary short address (2 octets) to that Station. If there is no response, the Station tries again at the next opportunity on a different Access-point. The registration response includes the identification of the Access-point from which it came, and the Station notes this as the current serving Access-point. Normally, the response is immediate on the currently used Access-point. Sometimes the response will not be sent, and the requesting Station must wait until a new INVITATION-TO-REGISTER message is received before repeating the REGISTER message. If the INVITATION-TO-REGISTER message from the first used Access-point is not heard within a specified interval SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] (e.g. 100 milliseconds) and if other Access-points are heard, a Station would reattempt registration using any Access-point with matching system identification (SYS field). Once a Station is registered, it is periodically polled and the infrastructure knows how to reach it. The POLL message is the means used to be sure that each Station is present, active, assigned a short address and associated with the correct Access-point in the directory maintained by the System in the Hub Controller. Polling Function The infrastructure sends a POLL message to every known user of the system periodically. The time used is after each round of INVITATIONTO-REQUEST (005) messages at each of the Access-points in one reuse group when there is no pending traffic. A POLL round requires many rounds of invitation messages and could be suspended for many seconds. This time makes only a slight increase in the minimum scan time, unless there is synchronized inter-system scanning where there is no difference. The POLL transmission originates on the Access-point last used by that Station, otherwise a group of surrounding Access-points is used for a second try. The addressed Station responds with an ACK (110) message, and it notes the identification of the Access-point from which the POLL was received as current. The Station may also respond with a REQUEST as described later. The air-time required for one poll is ((8+7)octs+4_sec) 16 _seconds at 10 Mb/s. With 12 Stations per Access-point and 16 Access-points per group (192 Stations), the polling function uses 3.07 milliseconds per round. The frequency with which a POLL round is initiated is a configurable parameter. Only the Access-points have the capacity to measure and use received signal level. If the response of a Station is at a higher signal level on a different Access-point than on the currently identified Accesspoint, the status entry for that Station will be changed accordingly in a system status directory after SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] the current transaction is completed. The Station is informed of the change by the origin API of the ACK message after sending a packet forward or by the origin API of the next transmission of a packet to the Station. De-register Message In response to an INVITATION-TOREGISTER OR A POLL message, a Station should send a DE-REGISTER (104) message upon shut-down or leaving the system. The polling function will eventually find this out if the message is not sent. The opportunity for this function occurs with the same frequency as the poll described above. Summary of Access Method for Station Originated Packets The concept of the system is that Stations may request permission with a REQUEST (106/108) message to transfer data on the common channel only immediately following receiving an INVITATION-TO-REQUEST (005) message originated at the Hub Controller. The normal response is a GRANT (015) message after which the Station sends the PACKET DATA FRAME (114). The Hub Controller sends ACK (011) when and if the transmission is received without error. Alternatively, the Hub Controller can ask for a repeat using NACK (013) or not respond. Peer-to-peer case: For the addressed Station to receive the message directly without repetition by the infrastructure, it must hear the REQUEST message, the GRANT message confirming and the PACKET DATA FRAME directly; and the Station must transmit immediate ACK after receiving the message before the same action by the Hub Controller. Access-point-Originated INVITATION-TO-REQUEST Messages The Hub Controller will send INVITATION-TO-REQUEST (005) messages only if the conditions necessary for immediate and successful transmission are present. The Hub Controller is responsible for knowing the interference possibilities that go with the use of each Access-point. The Hub Controller originates the INVITATION-TO-REQUEST message consecutively at each Access-point in a reuse group to avoid interference from radio coverage overlap that might occur with simultaneous transmission. This is one of the near indispensable functions of the infrastructure which prevents Station transmissions from interfering with transfers in progress. Initiation of a Station-Originated Message All Stations monitor the channel continuously and are able to hear INVITATION-TO-REQUEST messages usually from more than one Accesspoint. When a registered Station wants to send a packet, the Station listens for an INVITATION-TO-REQUEST message from the Access-point at which the Station was last polled or last used. At the end of the INVITATION message, the Station immediately sends a REQUEST message containing the DA, SA, SID and LEN packet header fields. There are two forms of REQUEST messages corresponding to long and short addressing as indicated in the TYP field. SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] This is a contention process with the possibility of collision made small by the frequency of opportunities to REQUEST and the division of the traffic so that there are only a small number of active users per Access-point. Stations may also REQUEST as a second type of response to an addressed POLL message. If there is no contention on the REQUEST, or if there is contention but a REQUEST message was still received successfully, the Hub Controller will send a GRANT message via the Access-point on which the Station responded to the INVITATIONTO-REQUEST. The methods for resolving contention at this step are described later below. The Station will receive a response, GRANT (015) or NACK (013) from the addressed Access-point immediately or not at all. It is possible, and may be desirable, to have a wait interval during which the Station may receive a GRANT; and in this case, the infrastructure would reply with immediate ACK (011) (rather than GRANT) which would enable the wait function. The wait state would be appropriate for delays not greater than a maximum transmission length (e.g. 250 _sec). Alternatively, there could be either NACK (013) which would cause REQUEST to be repeated or no reply to the Station REQUEST which would return the procedure to the beginning. It is possible for a REQUEST to be rejected because the infrastructure does not have the resources to process the message at the time of the REQUEST. The GRANT message transmission can send a power level setting, and will send the requesting Station's short address to identify the grantee. After the GRANT is received the Station sends the PACKET DATA FRAME (114). The GRANT message contains a CRC8 field on the content of the REQUEST message so the Station knows it is received correctly, and does not need to resend this information in the packet header. If this check fails, a new REQUEST is made. After the PACKET DATA FRAME is sent, the originating Station waits for ACK (110 or 011) which may come immediately and directly from the addressed Station or slightly delayed from the Access-point. Either ACK ends the cycle. This is the mechanism which allows successful Station-to-Station transmission to supersede the repeat function of the infrastructure. For virtual circuits, there is no ACK function since a delayed packet is a lost or useless packet. If no ACK is received, the Station may repeat the cycle unless the message is part of a connection-type service. Peer-to-Peer Direct Message and ACK The system plan permits but does not assume direct Station-to-Station communication. When an addressed Station correctly receives a message from another Station, the ACK (110) message is transmitted immediately. The Access-point also receives the same Station ACK, and then can discard its copy of the message and its intention to send a delayed ACK (011). If the Hub Controller does not hear the immediate ACK (110), it transmits a delayed ACK (011), and further processes the received message. The amount of delay is not more than ACK message plus a propagation SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] time, or 8 octets plus 4 _seconds (= 10.4 _sec). Since the Hub Controller will know whether there is a possibility of direct peer-to-peer communication, it is probable that better implementations will provide the Access Manager ACK delay selectively. An approximate logic would be to provide the delay only for packets between stations registered on the same or immediately contiguous Accesspoints. If the Hub Controller knows that there is no possibility of the addressee having heard the REQUEST directly, the ACK is immediate. For segmented peer-to-peer LAN messages, there is no possibility of auto-grant; therefore the originating Station must REQUEST independently for each segment after an infrastructure INVITATION-TOREQUEST. There is no provision for virtual connections directly between Stations. Receiving Station-to-Station Direct Communication Because of this function, it is necessary for a station to process the Station-send format message REQUEST (106 or 108). The GRANT (015) message cannot be used as an alternative because it has no provision for full source and destination addressing. There is no way for the originating Station to know that the message is being directly received from the handshake process. If a Station hears a REQUEST message for which it is the addressee, it is primed for a direct transfer. The addressed Station now expects to receive the Station-send format PACKET DATA FRAME (114) immediately or the same frame will be retransmitted from the same or another Access-point following. This is the only circumstance where a Station processes messages from another Station rather than from an Access-point. The direct Station-to-Station capability is configurable within the infrastructure to be active or disabled. Resolution of Contention on REQUESTS This problem is different depending on whether the contention possibilities are limited to 8 stations (as in the multi-drop ISDN S interface) or a hundred or more that might be present in a longreach-low-rate system. For the case where contention is improbable on the first try, a contention type access is preferred. This can be the case when the duty cycle of any one Access-point is low--and it is unlikely to be as high as 1%. When the contending REQUESTS are from Stations served on the same Access-point, it is still possible that they will be resolved without further added function. Since the stronger radio signal masks the weaker, access may be granted in an order based on proximity rather than order-ofarrival into queue. The "work-off" rate for a few Stations and short packets is so rapid, that lack of "fairness" makes little practical difference. It is also possible that both REQUEST messages may be received as contending on their home Accesspoint but one or the other may dominate on a second and third Access-point. It is quite possible, in the radio system, for alternate SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] paths to resolve contention in a way having no equivalent in cable. Nonetheless, there should be a back-up form of contention resolution to define worst-case access delay, and to obtain satisfactory operation in more defined mediums without coverage overlap. The polling type contention recovery mode is suitable for systems with a small number of stations per access point, and is described. The sorting method of contention recovery is suitable for perhaps 250 stations per access point, and is recognized as possible but not required. Polling Type Contention Resolution When the Hub Controller senses unresolvable contention at a particular Access-point, a poll of Stations registered at that Accesspoint is initiated. Since the number of registrants might average eight, and is rarely over 24, this consumes little time. The function is used that Stations with pending messages are allowed to REQUEST in response to an addressed POLL. When a correct REQUEST message is received, the Hub Controller responds with a GRANT message resuming the same procedure as with handshake following the normal INVITATION-TO-REQUEST initiation. Sorting Type Contention Resolution This algorithm may be considered where there is a possibility of contention from a large number of stations sharing a common Accesspoint. The principle of operation is a binary sort starting with the LSB of the short address in steps requiring a message exchange using "don't care" characters. This method is not foreseen as necessary, and therefore a detail description is not given. Hub Controller-Originated Message The Hub Controller can use the medium at any time by halting the sending of INVITATION messages. If there is waiting priority traffic via any controlled Access-point in a group, it is sent after the current INVITATION, REQUEST, GRANT, PACKET SEND AND ACK cycle is completed. Waiting non-priority traffic is sent after the inward cycle for that Access-point. This precedence is unimportant except when the system is heavily loaded. From the registration procedure (and reinforced by the polling procedure), the Hub Controller knows the availability and Access-point status of each Station. Except for management controlled exceptions, no attempt would be made to reach unavailable Stations. The Hub Controller sends a different (from the Station originated) format PACKET DATA FRAME (003) to the Station which has the complete header including long DA, SA, SID and LEN fields. The Station must be ready to receive these packets at any time after registering until de-registering. At the end of the PACKET or SEGMENT DATA FRAME transmission, the Station sends ACK (110) or NACK (112) or nothing. There is no ACK for packets used for virtual circuits or for broadcast messages. Without the ACK message, the Hub Controller may resend up to three tries. SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] The message transmitted could be from outside the network or from any Station within the network. Signal Level Function at the Station Receiver With this access protocol, a Station receiver is not required to measure or evaluate comparative signal level. The Station uses the Access-point assigned at registration or last used to receive a message from the infrastructure, usually a POLL. SEGMENTATION AND AUTO-GRANT There must be a limit to the maximum length of one message or connection bundle. By using a low limit for one data transfer, it is possible to allot a fraction of the capacity to each of several users rather than queue all behind a long message transmission. This is a feature that may or may not be used for packet data, but it is essential to the guarantee that a defined portion of the transmission capacity is available for connection-type services. With limited message length, it is necessary to segment the transmission of long packets and connections. The implication is that the setup procedure is done once with full exchange of information, but thereafter segments are transmitted with only sufficient information attached for identification of the associated packet or connection. In either case an automatically generated grant (auto-grant) procedure is used where the Hub Controller automatically sends a GRANT without a REQUEST on the channel. The procedure for handling LAN packets longer than the protocol payload limit (e.g. 288 octets) is to divide the message into transmission segments of maximum length except for a shorter last segment. A similar procedure is used for virtual connections where each bundle of samples is processed as a segment of a message of undefined (or long) length. The marking of the last segment may be different for virtual circuits. REQUEST-GRANT Procedure for First Segment and Setup There is no difference in the setup procedure for a complete message or the first segment of a long message. The format is identical for the PACKET DATA FRAME (003) and REQUEST (003/108) that is a complete message or the first segment of a long message. The difference is in the content of the LEN, SID and CNN fields. These fields are not available in the REQUEST--SHORT ADDRESS (106) format so this format cannot be used to initiate segmented messages. In the 8-octet long address field, there are 4-bits set aside for distinction between LAN and ISDN addressing, and for marking first, intermediate and last segments. The definitions used are determined by future public network practice for B-ISDN, SMDS and IEEE 802.6. Similar functions are independently defined for this access protocol by the SID field in the first transmission only. The SID field is defined at 3bits and is always associated with LEN field of 13-bits. This size defines lengths up to 8,191 octets which is larger than the length limits in most Standard LAN protocols. SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] Auto-Grant A rule of the access protocol is that a Station may not transmit except after receiving a permission message from the Hub Controller. The Hub will know that a Station has requested service for a multisegment LAN packet from the SID and LEN fields. From these, the number of segments required can be deduced. The first GRANT (015) is for the first segment only, however, with the auto-grant feature implemented no new REQUEST need be made for the following segments. The Hub Controller, using a time interval preceding that of an INVITATION-TOREQUEST, can issue a GRANT automatically for each following segment until the transfer is complete. This avoids a need to transfer a virtual-circuit segment at an exact instant. The addressing of following segments is short address (SA-2) as already established for Stations upon registration. The same identification is used for Stationoriginated segments where the short address is a pointer to the long address passed in the first REQUEST message. This function resembles the "Virtual Circuit Identifier" in 802.6 defined ATM cells. Auto-grant is not required for Access-point originated messages. For transmission of segments to Stations, the Hub Controller knows when the appropriate Access-point and Station are available. SEGMENT DATA FRAMES The SEGMENT DATA FRAME uses a short address only (001/100) after the above described initiating sequences have taken place. The SGN (segment number) counter field of 8-bits is a continuing upcounter on the number of segments transmitted which is set to 0 the first time transmitted (For Accesspoint originate, the second data frame and the first segment. For Station originate, the first data frame.). This counter provides a means for resequencing or for detecting missing segments. With 288 octets/payload, the value in SGN will not repeat for packets shorter than 9,790/9,216 octets (5-bits) or for a virtual circuit duration of 9 seconds. The first 3-bits of the SGN field are used for a status indication of initial, intermediate or final segment in a long packet transfer. It is necessary to have the CNN field in the segment header because a Station has the possibility of concurrent multiple connections during a packet transfer. A Station may transfer only one packet at a time. COMPATIBILITY AND CAPACITY ALLOCATION FOR PACKET AND CONNECTION-TYPE TRAFFIC With a common Access Manager and infrastructure present, absolute allocation of capacity for carried traffic is possible, because the Hub Controller determines who may transmit and the carriability of offered traffic. The logic of the Station does not participate in this choice in anyway, except for classifying the priority of its own originated traffic. Every system or plan has a limit to the amount of traffic that can be carried. Many efficient systems carry less rather than more traffic when the level of demand reaches a critical point. When both voice and SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] data are carried, there must be a means and method for dividing capacity in a pre-planned way so that one does not destroy the service for the other. This access protocol provides for the implementation of an adaptive or managed strategy for capacity division and handling of peak usage demands within the infrastructure and without requiring any concurrent changes in the user Station. Excess Demand from Stations The first method of suspending new demands for service is by withholding the INVITATION-TOREQUEST message, but this cannot be the primary means because saturation of datagram and connection-type service capacity will rarely occur simultaneously. INVITATION-TO-REQUEST will be issued, but after a REQUEST, GRANT may be withheld or ACK sent which orders the Station to wait. The response message adds slightly to channel loading during high traffic intervals, but the system cannot function unless the Hub Controller knows the types, size and location of waiting traffic when there is overload. When there is excess demand, the queued messages stack up in the originating Stations and not in buffer memory in the Hub Controller. The determination of the state of the available buffer memory is one of the criteria for sending the GRANT message. Timely Transmission of Virtual Connection Packets If a digital circuit is 64 kbits/second, it may be reproduced by a payload bundle of 48 octets every 6 milliseconds. The dimensional requirement is that each bundle is delivered before it is needed to have a continuous output flow from a buffer. If the bundle dimensions are known a priori as having the these values, then the receive buffer might introduce a 3 millisecond delay so that after the first bundle is received, subsequent bundles may arrive at intervals of 6 _ 1.5 milliseconds. It can be assumed that the originating side of the wireless LAN will transmit a ready bundle within 1.5 _ 1.5 milliseconds. In this example, the quantitizing delay is 6 milliseconds, and the transmission time uncertainty delay is a further 6 milliseconds. The delay for speech coders now proposed for advanced digital personal and mobile telephone systems is typically 50 milliseconds. On the other hand, current Bellcore practice allows only 2 milliseconds quantitizing delay for wireless subscriber loop. Use of Priority Function--SID field At each use of an Access-point, the Hub Controller must first handle inward or outward connection-type messages ahead of datagrams because of the timely delivery requirement. The REQUEST messages contain an SID field which identifies the type of service required and the relative priority. Since connection-type services may have more than one bandwidth and gathering interval, this information is essential to capacity allocation. The SID field is used to indicate connection-type service function, and then the LEN field is used to indicate the interval between accumulated samples and the length of the accumulated sample payload. SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] Segmentation for Virtual Connections The segments of a virtual connection are treated as a segmented packet of indefinite length. The REQUEST announces that it is a connection-type service both in the long destination address and in the SID field, redundantly. The sampling dimensions are transmitted in the LEN field. Each segment contains a marker that the current segment is either initial, intermediate or final in 3bits of the SGN field. The auto-grant initiation of the transmission of the next segment is the same as for LAN. Segmentation Compatibility with BISDN The developing broadband ISDN standards for the public network are described in Bellcore Special Report SR-NWT-001763, Issue 1, December 1990. There, and other places, the Asynchronous Transfer Mode (ATM) plan to transmit either voice or data in cells with 48 (4+44) octets of data and a 5 octet label is described. These cells may be passed at irregular intervals but at a constant average rate on a high speed medium. This LAN protocol with its adaptive length packets and segments can conform to the ATM payload size so that a second quantitizing delay can be avoided at the boundary between an ATM based network and this wireless LAN. This flexibility would not be available with rigidly dimensioned time slotting in the wireless LAN. CENTRAL MANAGEMENT FUNCTIONS In a large scale wireless access system the possible use of one Access-point is in some way dependent on the status of the other Access-points around it. This is particularly true for the common channel system when there are many groups of access-points that are contiguous and part of a continuous plan. This may create a need to synchronize the use of Access-points in different groups or at least to inhibit certain use combinations. This capability is a management function of the infrastructure, and does not affect Station logic in anyway. It is a system requirement that the access protocol contain source records for all of the data noted below, and that the transfer of information from the point of generation to the point of use be provided. Central management is implemented mainly in the Hub Controller, but the tasks involved require support from the access protocol. SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] Management of Access-point Usage nd de-registrations includingfunctions described To serve the API used above, the selection of the current active Access-point takes place in an Access Manager within the Hub Controller. Management of User Addressing, Status and Usage A further management function is the transitory status and directory records for all active Stations with the following data: 1) Global LAN address (48 bits) 2) Local LAN address (16 bits) 3) Global E.164 address (60 bits) 4) Current Access-point identifier 5) Secondary and Tertiary Access6) Current power setting 7) Last poll response time 8) Registration active/not active 9) Permitted address access 10) Changes log The log record may be stored for some period (e.g. up to 4 weeks) following the last activity before clearing. In addition, permanent records of usage for each active Station are needed to cover charging and cost distribution, and as evidence of system abnormality with the following data: 1) Global LAN address (48 bits) 2) Local LAN address (16 bits) 3) Global E.164 address (60 bits) 4) For each Access-point by day and by hour-a) Number of messages by b) Number of octets of payload transferred c) Number of failed transfers d) Number and time of Management of System Operations and Configuration At the system central controller, a number of operational records should be kept and updated in real time. For each Access-point, the following records should be maintained: 1) Long and short Access-point identifier 2) Location and antenna pattern description 3) Hub Controller location 4) API's where channel reuse is blocked 5) API's and SYS no. of foreign systems received 6) Date of last service 7) Message handling data-a) Number of packet messages-transmit, receive b) Number of packet octets of payload transferred c) Number of failed transfers requiring repeat d) Number of direct transfer messages e) Number of calls, messages and channel-seconds used for connectiontype service For the system as a whole, data should be collected on the volume and character of out-of-network traffic. There are also configurable parameters which may require downloading from a "human" system manager. Some of these are: 1) partitioning rules for data and voice capacity 2) authorized user identifications 3) access restrictions selectively by user SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] 4) security screening data INTERFERENCE CONTROL BETWEEN CONTIGUOUS LANS The presently described access protocol addresses service from a limited number of radio Accesspoints where there is not material overlapping radio coverage from other nearby systems. If the other nearby systems are area and capacity extensions of the first system, they are said to be commonly managed. If the other nearby systems are providing like-type service to neighboring enterprises, they are said to be independently managed; and it is for this situation that the SYS field is necessary. Access-point Separation Using directive antennas position for inward illumination from a boundary, it is often possible to limit overlap between Access-point transmit and receive coverage in contiguous systems to a very small portion of the served area. Also there is often geographic isolation from parking lots and other separating spaces. Nonetheless, there will be cases of interpenetration of systems occurring in shopping malls, multi-tenant office buildings, adjacent office building, convention centers, public transportation terminals and many other places which must be considered. The effectiveness of directional antennas at Access-points can be increased with cooperation between system managers. Station Separation by Probability Stations cannot use directive antennas to define their coverage. A mild consequence is that a Station in system A will hear transmissions from system B that can and must be ignored using the SYS field. A more serious consequence is that the Station in system A will not hear transmissions addressed to it because of interference from a few nearby Stations in system B. Because each Station has an air time duty cycle which is probably less than 0.05% (3.6 seconds/hour or 18.0 megabits of transmitted data per hour at 10 Mb/s), there is only one chance in 2,000 that the interfering Station will be transmitting. Similarly, while Station A listens all the time, there is only 0.05% of the time when he is listening to addressed traffic (approximation). Only a few interfering Stations need be anticipated because there is a higher attenuation rate between Stations, and because only a few are close enough to cause interference to a particular Station. Without considering that there is any radio frequency isolation or that the desired signal from the Access-point might be stronger than the interference, the chances of the interfering transmitter being ON while there is relevant traffic being received at the interfered Station, is about 1-in-1,0002 between any pair of overlapping coverage Stations. If one Station had certain interference from 100 other Stations, the odds would still be 10,000:1. If fewer than 1-in-100 messages must be repeated because of interference, the system is hardly impaired. The event of a transmitting Station originating interference to another receiving Station in a different system is statistically improbable and well within the SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] capacity of automatic repetition to correct. The provision of automatic repetition of unacknowledged messages is a necessary part of minimizing loss from overlapping radio coverage between Stations of contiguous systems. POWER CONTROL CONSIDERATIONS This access protocol enables this system to operate with all transmitters at full power all of the time, but average interference levels into other systems will be reduced if power is dynamically adjusted to the level necessary. To assist in this function, it is necessary for the Access-point receiver to measure and report the signal level of each received transmission. It is then possible for a power setting to be incorporated in the next message to the Station. Reduced power in the Station only occurs on command originating at the Hub Controller. A further use of the report is on registration and subsequent transmissions from the Station to determine the preferred Access-point for passing messages to that Station and changes that may occur. The power control requirement is quite different from that occurring in spread spectrum systems proposed for cellular and pocket telephone service because in this system only one Station at a time is served by each site. These other systems have many Stations simultaneously communicating with a common base Station each using a different spreading code, and it is required that all arrive with close to the same signal level. The more precise use of output power control is an area for further study. SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] Communication Between Hub Controller and Access-point Fast command transfer between Hub Controller and Access-point is needed to specify power level for the Access-point transmitter at full, -3, -6 and -9 dB or some other short set of possibilities. It is likely that power may be determined through the metallic path in the pairs between Access-point and Hub Controller rather than by reading the content of data messages. A more difficult transmission problem will be to provide the received signal level to the Hub Controller in the reverse direction. This is also a high speed function because it is part of the delay between completion of the REGISTER message and the sending of the response. CONFIGURABLE OPTIONS There are a number of parameters which might be configurable. Table I, on the following page, is an initial effort to identify these parameters and list the possibilities. A subset of these are default values and available values required in conforming equipment. Level A conformance is assumed to be minimum cost, and Level B is higher performance and function version. The setting of these parameters can affect the Hub Controller, the Access-point and the Station or any combination as shown in the right column. Line Rate This parameter affects all major parts of the system. Initially, this rate is a configuration parameter set at a single value throughout one system; however the rate could eventually become adaptive at the Station and configurable at the Hub Controller. BACKBONE INTERCONNECTION CONSIDERATIONS This access protocol is independent of backbone implementation as viewed at the user Station air-interface. There are some configurations and topologies which are more favorable than others from a cost and complexity viewpoint. If the propagation delay across the backbone is much longer than across wireless LAN, there may be a requirement for re-registration after roaming between LANs connected through the backbone. Delay Intervals The intermessage delay is configurable to provide for longer distances through radio and wire than can be accommodated with the default. Not all systems will have a peerto-peer direct requirement. The delay introduced with the length of one ACK message should not be compulsory. TABLE I -- CONFIGURABLE PARAMETERS WITH CONFORMANCE-REQUIRED VALUES PARAMETER NAME & PERMITTED & DESCRIPTION POSSIBLE REQUIRED FOR CONFORMANCE SCOPE OF EFFECT VALUES DEFAULT LINE RATE IN LEVEL A LEVEL B TBD TBD TBD TBD STN, A-P, SERVICE SUPPORT LAN, CIRCUIT LAN LAN BOTH STN, AM INTER-MSG DELAY _SEC: 2-6 4 4, 6 2, 3, 4, 6 STN, AM MBITS/SEC: AM SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] STN/STN ACK DELAY: OFF, 4-10 OCT 8 OFF, 8 OFF, 8 STN, AM MSG RETRIES N TIMES: 0-5 2 1, 2, 3 1, 2, 3 AM POLL INTERVAL: .5-10 TBD TBD TBD AM MAX SEG PAYLOAD LEN: 48-384 OCT TBD TBD TBD STN, AM MAX PACKET LENGTH: UP TO 10K OCT TBD TBD TBD STN, AM DEFAULT ACCESS MGR ON, OFF OFF OFF, ON OFF, ON STN SEC/POLL SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] The interval between initiation of polls is a configurable parameter. Lengths and Retries If the Hub Controller misses a packet, it is a tradeoff on how many retries are appropriate. The maximum size packet and segment are also configurable tradeoffs. Possibly, the Standard will settle on one or two values for some of these parameters. AUTONOMOUS GROUPS NOT USING INFRASTRUCTURE The defined area for this plan includes the words "common channel" which means not only one time-shared radio channel for both up and down link at infrastructure Accesspoints, but also that the same channel is used at all Access-points and communicating Stations. The system access protocol is further designed to allow direct communication between Stations when no infrastructure is present. Two methods are possible for operation without infrastructure. 1) Access-point simulation by the first Station up 2) Distributed contention-based access method Default Access Manager The above described Access Protocol can include a default access manager function in each Station. When turned ON, the Station listens for INVITATION-TOREQUEST messages, and hearing none acts as a reduced function Accesspoint by sending INVITATION-TOREQUEST and INVITATION-TO-REGISTER messages periodically. A second Station nearby can then REGISTER and communicate with the first Station, and similarly for further added Stations. The default access manager can include a prompt for manual entry of a group number with a small number of possibilities. This would be translated into the System Number field of those messages containing that field. SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] Distributed Contention-based Access Method This method is similar to that described in a separate contribution relating to channelized systems (IEEE 802.1/91-96), modified to complete all setups and transfers on a single channel. In general, steps and messages are deleted which indicate and confirm channel switches. The access method is simple. The logic is based upon the capacity to retry unsuccessful transmissions and the acknowledgement function is used to trigger retry. The same message set is used as for the infrastructure based access method previously described. Sending a Message If the ACK timer has expired or if no message of any kind has been received for 250 _seconds, a randomizing timer is started which adds one-of-64 possible delays randomly selected in steps of 4 _seconds. When this time has expired, the Station may transmit a REQUEST--LONG ADDRESS if it has a message to pass. If the addressed Station hears the REQUEST, then the originating Station hears the special station-originated GRANT (115) response. This message has the same format as the Access-point originated GRANT (015). If GRANT is not heard, the originating Station may try twice again in quick succession for one message. No further tries may be made until the initial timing conditions again exist which permit transmission, and then only two more cycles for the same message. If the GRANT response is heard, the originating Station sends the PACKET DATA FRAME (114). The receiving Station then sends ACK if received correctly or NACK. If NACK is received, the Station may resend the PACKET DATA FRAME immediately for two more tries otherwise the process goes back to the beginning. SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] C. Short and medium distance, and Activation Criteria for Infrastructure D. Systems with a few to many A composite system in which the hundreds of infrastructure is dormant until needed is possible. Then the E. LAN and connection-type criteria for activation and dormant services; operation need to be defined. A provided that provision is possibility for these points is now made for: described. Quiescent infrastructure will F. some configurable options, and become active sending INVITATION messages if any of the following G. a medium independent interface conditions exist: to type of substitutable PHY. 1) a Station allow more than oneis asks for or addressed by a connection-type 2. An entirely asynchronous protocol service. 2) a LAN can be evolved on thewhich message is initiated principle that the next step begins when the current Station not also addresses a step is completed; and that a high time utilization can be obtained a common Accessregistered by in this way. point. 3. Adaptively available peer-to-peer 3) a LAN message is received from communication can provided. outside addressed to abeStation within the system. 4. All necessary functions can be 4) the LAN traffic intensity results in anobtained from a library of about 16 different message types--half observed air-time usage upward, half downward. exceeding 2% at any single Access-point within the system. 5. Protocol for operation with and without infrastructure can be incorporated in a Station with both The infrastructure will not resume a modes using condition until quiescent substantially the same message set and format. all of these activation conditions 6. Infrastructure might be inactive have been absent for a time interval when its services are not needed. of two minutes. In the dormant state, the 7. The most important reasons for infrastructure will poll and solicit favoring the less Channel registration at much Commonfrequent Plan are: intervals than when it is active. With infrastructure, unused capacity is in a common pool available to any CONCLUSIONS Access-point in a reuse group. 1. It is possible to use a single The plan is highly resistant to anomalous signal levels from protocol for: contiguous Access-points as compared to channelized spread-spectrum systems. A. Radio, optical and wire mediums, and The plan avoids the overhead necessary for managing channel selection, and for placing this function in the ISO layer and B. Minimum, medium and high management structure. function Stations, and SEPTEMBER 1991 DOC.: IEEE P802.11/91-95 [--- Unable To Translate Box ---] apted to a dual mode operating with and without Exhibit 16 1992 Doc: IEEE P802.11 - 92/64 ---------------------------------------------------------- TOPIC: DISTRIBUTION SYSTEMS 5 ---------------------------------------------------------Issues 5- 1 F.Y. Simon 1992 Doc: IEEE P802.11 - 92/64 ---------------------------------------------------------- Issue Identification: 5.1 (Topic: Distribution Systems). - Will the standard specify: a) - the 'internal' of the distribution system (DS)? or b) - only the services it provides? Alternatives: 1) No - The internal functions of the Distribution System (DS) should not be specified. 2) Yes - The internal functions of the DS must be addressed. References: 1) - MAC Minutes of 09/17/92 2) - P802.11-92/128 - IEEE 802.11 Distribution System Services Functionality. Arguments: See MAC Minutes of 09/17/92 Pro: Con: Related Issue Identification: Issue Originator: Issue History: May 1992: Date first opened July 1992: Discussion and Alternatives 1 and 2 November 1992: Added Reference - Motion to close the issue by proposing to endorse Alternative #1. Results: Yes-21, no-1, abstain-1. Issue Status: Close ---------------------------------------------------------Issues 5- 2 F.Y. Simon 1992 Doc: IEEE P802.11 - 92/64 ---------------------------------------------------------Issue Identification: 5.2 (Topic: Distribution Systems). - What is a conformant Distribution System (DS)? Editor's note: Ref: 44 (92/58R1) Alternatives: Arguments: Pro: Con: Related Issue Identification: - 23.1 (Topic: Conformance) Issue Originator: Issue History: May 1992: First opened Issue Status: Open ---------------------------------------------------------Issues 5- 3 F.Y. Simon 1992 Doc: IEEE P802.11 - 92/64 ---------------------------------------------------------Issue Identification: 5.3 (Topic: Distribution Systems). What are the Distribution System's functions needed? Alternatives: 1) - Distribution System Services (DSS) must include the ability to deliver 802.11 MAC Service Data Units (MSDU) between Basic Service Sets (BSS) and non-802.11 LANs (via portals). 2) - The DSS must provide some filter algorithm to avoid flooding all BSSs with all traffic; or possibly. 2a) - An Access Point (AP) must transmit only MSDUs for stations that are associated with that AP. 3) - The delivery of MSDUs is perhaps the only function required to be performed by the DSS - all other functions seems to be sub-functions that are needed in order to fulfill the primary function of a Distribution System (DS). 4) - The DS must know or be able to find out the Station/Access point association (internal but not pass thru the interface) within the Extended Service Set (ESS). 5) - If Time-bounded (TB) services imply a connection, then the DSS must be able to provide and maintain the connections between the stations. 6) - [Is a DS a managed object or only the APs and/or Portals or none or what else?] References: - P802.11-92/128 - IEEE 802.11 Distribution System Services Functionality Arguments: Pro: Con: Related Issue Identification: 1) - 5.3A (Distribution Systems) 2) - 5.3B (Distribution Systems) Issue Originator: Dave Bagby Issue History: May 1992: First opened September 1992: Discussion and Alternatives ('brainstorming' ideas) 1 to 6. November 1992: Added Reference January 1993: Decision taken to split this issue (5.3) into two parts: 5.3A - What are the infrastructures services? and 5.3B What logical functions are needed to provide the defined infrastructure services? Issue Status: Open ---------------------------------------------------------Issues 5- 4 F.Y. Simon 1992 Doc: IEEE P802.11 - 92/64 ---------------------------------------------------------Issue Identification: 5.3A (Topic: Distribution Systems). - What are the infrastructure services required? Alternatives: 1) The initial set of infrastructure services required is: - Association (creation of Station to Access Point mapping) - Re-association (movement of mapping) - Disassociation (remove mapping) - Authentication (identity verification) - Privacy (privacy of payloads) - Integration (ability to connect to existing LANs) - Network Management (usual network management functions) References: 1) - P802.11-93/9 - 802.11 DS Service Transactions Arguments: Pro: Con: Related Issue Identification: 1) - 5.3 (Distribution Systems) Issue Originator: Dave Bagby Issue History: January 1993: First opened - Alternative #1 - Agreed to adopt the Alternative (#1) as initial infrastructure services required.-Result: yes-13, no-0, abstain-1. Issue Status: Close ---------------------------------------------------------Issues 5- 5 F.Y. Simon 1992 Doc: IEEE P802.11 - 92/64 ---------------------------------------------------------Issue Identification: 5.3B (Topic: Distribution Systems). What logical functions are needed to provide the defined infrastructure services? Alternatives: 1) - These services are defined in closed Issue 5.3A as: association, re-association, disassociation, authentication, privacy, integration, and network management. References: 1) - P802.11-93/9 - 802.11 DS Service Transactions 2) - The CODIAC Protocol - Centralized or Distributed Integrated Access Control (CODIAC), A Wireless MAC Protocol Arguments: Pro: 1.1) - For any of these services which require exchange of information over the wireless medium, the CODIAC protocol proposes using MDATA frames. Because delivery of these frames is critical, they are transferred in the four-step transaction in the same manner as client data. These frame formats are yet to be fully defined.Association, re-association, disassociation, and integration all require an AP. These services are supported by the AP bit which is set in frames sent by the AP, which also serves to notify stations of its presence. Con: Related Issue Identification: 1) - 5.3 (Distribution Systems) 2) - 5.3B (Distribution Systems) 3) - 5.3A (Distribution System) Issue Originator: Dave Bagby Issue History: January 1993: First opened - Reference #1 - Related Issue IDs #1 and 2. May 1993: Alternative #1 - Reference #2 - Argument_pro #1.1 Issue Status: Open ---------------------------------------------------------Issues 5- 6 F.Y. Simon 1992 Doc: IEEE P802.11 - 92/64 ---------------------------------------------------------Issue Identification: 5.4 (Topic: Distribution Systems). - Is the interface of the Distribution System is performed at: - In which layer entity the interface of the distribution system is performed? Alternatives: 1) - the MAC Layer 2) - the PHY Layer 3) - both MAC and PHY References: 1) - P802.11-93/40 - The Wireless Hybrid Asynchronous Time-bounded MAC Protocol Arguments: Pro: 1.1) - There is no relation between the wireless PHY and the Distribution System (DS). Con: Related Issue Identification: - 12.2 (Topic: Interfaces) Issue Originator: John Corey Issue History: May 1992: Date first opened March 1993: Reference #1 - Argument_pro #1.1 - Closing the Issue (5.4) by endorsing Alternative #1; result: yes-25, no-0, abstain-2. Issue Status: Close ---------------------------------------------------------Issues 5- 7 F.Y. Simon 1992 Doc: IEEE P802.11 - 92/64 ---------------------------------------------------------Issue Identification: 5.5 (Topic: Distribution Systems). - What are the performance requirements of the Distribution System (DS)? Editor's note: Ref: 100 (92/58R1) Alternatives: 1) None - The performance requirements of the Distribution System need not be specified. References: - P802.11-92/128 - IEEE 802.11 Distribution System Services Functionality. Arguments: Pro: 1) The performance requirements of the Distribution System need not be specified and should not be (since most sites will want to use their existing networks as their Distribution Systems). However, it is required that path metrics (between Access Points) be acquired in order to determine if the Distribution System can support Time-bounded services between different Basic Service Sets. This requirement interacts with Network Management issues. Con: Related Issue Identification: 1) - 13.1 (Management) Issue Originator: John Corey Issue History: May 1992: Date first opened November 1992: - Alternative #1, Argument-pro #1 and Related Issue ID. Issue Status: Open ---------------------------------------------------------Issues 5- 8 F.Y. Simon 1992 Doc: IEEE P802.11 - 92/64 ---------------------------------------------------------Issue Identification: 5.6 (Topic: Distribution Systems). - What is the direction for the Association Service transaction? Alternatives: 1) - From Station (STA) to Access Point (AP) 2) - From AP to STA 3) - Bidirectional References: 1) - P802.11-93/9 - 802.11 DS Service Transactions 2) - P802.11-93/40 - The Wireless Hybrid Asynchronous Time-bounded MAC Protocol Arguments: Pro: 1.1) - Needed when Station (STA) is first powered on 1.2) - There is no need for a bi-directional service. If the Access Point (AP) causes a Disassociation, the Station can sign on with a different Access Point and cause a new Association. Only the Station knows which Access Point is the best one to choose for the new Association, so it does not make sense for an Access Point to cause an Association on behalf of a Station. If we require the Access Points to know about the real time signal strength of every Associated Station in relation to every Access Point; and communicate this information through the Distribution System in a timely manner, then we are making too many assumptions about the performance of the Distribution System. We cannot define the Distribution System; it already exists. 2.1) - See 'Re-association' in Reference #1 3.1) - Implied if association AP to STA decided to be necessary. Con: 3.1) - See Alternative_pro #1.2 2.1) - See Alternative_pro #1.2 Related Issue Identification: Issue Originator: Dave Bagby Issue History: January 1993: Date first opened - Alternatives #1 to 3 - Reference #1 - Argument-pro #1.1, 2.1 and 3.1. March 1993: Reference #2 - Argument_pro #1.2 - Argument_con #3.1 and 2.1 Issue Status: Open ---------------------------------------------------------Issues 5- 9 F.Y. Simon 1992 Doc: IEEE P802.11 - 92/64 ---------------------------------------------------------Issue Identification: 5.7 (Topic: Distribution Systems). - Is the Explicit Re-association transaction required? Alternatives: 1) - Yes 2) - No References: 1) - P802.11-93/9 - 802.11 DS Service Transactions Arguments: Pro: 1.1) - Conceptually cleaner to perform an Explicit Re-association. 1.2) - Nicer for interaction with privacy level. 2.1) - This transaction can be accomplished with a Disassociate/Associate transaction pair. Con: 2.1) - Probably translates into more message traffic in a protocol. Related Issue Identification: 1) - 6.8 (Security) Issue Originator: Dave Bagby Issue History: January 1993: Date first opened - Alternatives #1 and 2 - Reference #1 - Argument-pro #1.1, 1.2 and 2.1 - Argument-con #2.1. Issue Status: Open ---------------------------------------------------------Issues 5 - 10 F.Y. Simon 1992 Doc: IEEE P802.11 - 92/64 ---------------------------------------------------------Issue Identification: 5.8 (Topic: Distribution Systems). - What is the direction of the Re-association Transaction? Alternatives: Note 1: Based on the closure of Issue 5.7 - The following assumes that there is a Re-association transaction defined. 1) - From Station (STA) to Access Point (AP) 2) - From AP to STA 3) - Bidirectional References: 1) - P802.11-93/9 - 802.11 DS Service Transactions Arguments: Pro: 3.1) - See note 1 - Station may wish to re-associate to another AP for reasons of signal quality and APs may whish to re-associate for reasons of signal quality, load balancing, or to fake an AP out of a network for service. Con: Related Issue Identification: 1) - 5.7 (Distribution System) Issue Originator: Dave Bagby Issue History: January 1993: Date first opened - Alternatives #1 to 3 - Reference #1 - Argument-pro #3.1. Issue Status: Open ---------------------------------------------------------Issues 5 - 11 F.Y. Simon 1992 Doc: IEEE P802.11 - 92/64 ---------------------------------------------------------Issue Identification: 5.9 (Topic: Distribution Systems). How to determine that Access Points (APs) are present? Alternatives: 1) - Discover: - Listen (APs beacon) - hard for ad-hoc networks - Ask (talk then listen) - may cause unnecessary traffic. 2) - Pre-configured knowledge - Disadvantages from installation and configuration viewpoints. 3) - All frames are marked with an AP bit which indicates that they originate with an AP (Reference #3). References: 1) - P802.11-93/9 - 802.11 DS Service Transactions 2) - P802.11-93/40 - The Wireless Hybrid Asynchronous Time-bounded MAC Protocol 3) - The CODIAC Protocol - Centralized or Distributed Integrated Access Control (CODIAC), A Wireless MAC Protocol Arguments: General: 1) - The WHAT Protocol (see Reference #2) handle this in two ways: a) Each MPDU that is transmitted by an Access Point is marked with a bit that indicates it was transmitted or relayed by an Access Point. A Station observing a Basic Service Set (BSS) that includes an Access Point will very quickly learn that the Access Point is present; and can attempt to sign on using a broadcast with the appropriate NETID. b) When the network is idle, Access Points send out periodic Announce frames. Announce frames are also marked with the AP bit, so a receiving Station can distinguish an ad-hoc Basic Service Set from one that includes an Access Point. Pro: 1.1) - Discover, Listen, if nothing is heard, then ask. 3.1) - If a station listens and does not hear frames from an AP, it can send a broadcast RTS with the Hierarchical bit set, which indicates that the RTS is intended for an AP only - this will cause any AP present to identify itself (Reference #3). Con: Related Issue Identification: Issue Originator: Dave Bagby Issue History: January 1993: Date first opened - Alternatives #1 and 2 - Reference #1. March 1993: Reference #2 - Argument_general #1 - Argument_pro #1.1 May 1993: Alternative #3 - Reference #3 - Argument_pro #3.1 Issue Status: Open ---------------------------------------------------------Issues 5 - 12 F.Y. Simon 1992 Doc: IEEE P802.11 - 92/64 ---------------------------------------------------------- ---------------------------------------------------------Issues 5 - 13 F.Y. Simon ---------------------------------------------------------Issues 5 - 14 F.Y. Simon Exhibit 17 May 1992 DOC:IEEE P802.11-92/50 Functional Requirements IEEE Project 802.11 DRAFT THIS DOCUMENT HAS NOT BEEN OFFICIALLY REVIEWED OR APPROVED. THIS DOCUMENT IS CIRCULATED FOR REVIEW PURPOSES ONLY. Version 0.2 802.11 Draft Functional Requirements V0.2 1 May 1992 DOC:IEEE P802.11-92/50 Dear reviewers This is the second version of the functional requirements document. It's version is 0.2. The goals for this version were: 1) To make the document more self consistent. 2) To neither add nor delete from the list of agreed functional requirements from the March mtg. 3) To keep the document as short as possible. 4) To clarify the concepts discussed at Irvine. To accomplish this the following was done: 1) Fleshed out the definitions section to include some terms the rest of the document used but did not define. The definitions are not complete. I do believe they are self consistent and good enough to proceed with. 2) I have changed a couple of common terms to make the meaning of their concepts clearer. I fear that this may cause short term confusion - I also believe it will provide long term improvement in the quality of our discussions. In particular I have taken the liberty of changing BSA to BSS and ESA to ESS (stop! don't shoot that gun just yet). The discussions at Irvine were productive because we divorced the concept of Coordination Function from physical implementation. We realized that the basic building blocks of a wireless network are really centered around a CF concept instead of a geographical concept. Thus, the "A" (for area) in these terms is very misleading - the best suggestion was to use the word "set" instead. It makes sense when you read the updated definitions. 3) There was an attempt made to add a short paragraph to expand the intent of the bullet items in the functional requirements section of the document. It became apparent while writing these paragraphs that they did not help clarify the functional requirements. The paragraphs tended to stray from "what is required" into "how to do it". It was felt that this was not appropriate for a functional requirements list. With the improved definitions, much of the motivation for the verbiage was gone. The paragraphs were abandoned. 4) In some places I have inserted <TBD>. This happened when it was not clear what to say. Help is solicited to clean up the <TBD> places. 5) The functional requirements seemed to naturally group themselves, so they were ordered them to make the document easier to read. The order is NOT intended to imply any relative importance between bullet items. Please bring all comments to the Leiden meeting, preferably in written form, even better if they are machine readable (by a PC, the most common format seems to be Win Word for either MAC or PC). You can also Email comments to me - but other than read them, I probably won't be able to do much with them between now and the Leiden meeting. 802.11 Draft Functional Requirements V0.2 2 May 1992 DOC:IEEE P802.11-92/50 I you have questions re this document, Email is the best way to access me. If you can not access the internet, try calling me. Just be aware that Email is more likely to get a considered response from me, the phone call is unlikely to catch me in the office - but you are welcome to try. Dave Bagby - editor. Email: david.bagby@Sun.com Office: (415) 336-1631 802.11 Draft Functional Requirements V0.2 3 May 1992 DOC:IEEE P802.11-92/50 Introduction: This document contains the agreed upon definitions and functional requirements for 802.11. Definitions: The following definitions are used within this document: MAC Service Data Unit (MSDU): The MAC Service Data Unit is information that is delivered as a unit between MAC service access points. Wireless Media (WM): The media used to implement a wireless LAN. Station (STA): Any device which contains an 802.11 conformant MAC and PHY interface to the wireless media. Coordination function (CF): That logical function which determines when a station transmits and receives via the WM. Distributed CF (DCF): A class of possible CFs where the CF logic is active in every STA at any given time. Point CF (PCF): A class of possible CFs where the CF logic is active in only one STA at any given time. Basic Service Set (BSS): A set of STAs controlled by a common CF. Extended Service Set (ESS): A set of interconnected BSSs which appear as a single BSS to LLC. Distribution System (DS): A logical system used to interconnect a set of BSSs to create an ESS. 802.11 Draft Functional Requirements V0.2 4 May 1992 DOC:IEEE P802.11-92/50 Distribution System Media (DSM): The media used by a DS for BSS interconnections. Distribution System Services (DSS): The set of services provided by the DS which enable the MAC to transport MDSUs between BSSs within an ESS. Access Point (AP): Any STA whose MAC invokes DSS. Registration: <TBD> <Ugly draft: The process by which a prospective user of the network authenticates himself to the network and exchanges operational parameters so as to participate in network services.> Authentication: <TBD> <Ugly Draft: The mathematical process invoked by ? to prove I am who I say I am. Who am I? the user of a STA? How do we say this since a user does not talk to a MAC/PHY, only other non-people layers do...> 802.11 Draft Functional Requirements V0.2 5 May 1992 DOC:IEEE P802.11-92/50 Functional requirements: Externally Imposed requirements: Documents which contain functional requirements that are hereby incorporated as 802.11 functional requirements: 802 Functional Requirements (document number P802-91/152). 802.11 PAR. <need PAR doc number here> The 802.11 PAR supersedes the 802 Functional Requirements (P80291/152) where they conflict. General requirements: The primary service provided by 802.11 is to deliver MSDU's between LLCs. Continuity of service to the LLC layers within an ESS will be supported. The Mac must accommodate any PHY transmission rate between 1 and 20 Mbs. The 802.11 MAC and PHY will support the applications described in the 802.11 Market Requirements Document. Any function or service unique to wireless networks will be handled within the 802.11 standard. 802.11 will support multicast services. The standard will support network management services. 802.11 Draft Functional Requirements V0.2 6 May 1992 DOC:IEEE P802.11-92/50 Data Service Types: 802.11 will provide two classes of data gram service: 1) An Asynchronous packet delivery service. 2) A Time-bounded packet delivery service. All 802.11 implementations will support the Asynchronous class service. Stations using the Asynchronous and/or Time-bounded service must coexist within the same BSS. Coordination Functions: All 802.11 implementations will support a common default Coordination Function. There will be a method for dynamically switching from the default Coordination Function and any other defined Coordination Function. A single MAC shall be used to support all Coordination Functions. There shall be mechanisms defined to resolve media use conflicts. Coordination Functions may be either DCF or PCF in nature. The following combinations of Coordination Functions and network types must be supported: Network Type CF Class: DCF BSS PCF Supported Supported ESS 802.11 Draft Functional Requirements V0.2 Supported 7 May 1992 DOC:IEEE P802.11-92/50 MAC / PHY interface: A single MAC will be used to support multiple PHYs. A single MAC/PHY interface will be defined. If the MAC/PHY interface is exposed, a conformant implementation must adhere to the defined MAC/PHY interface. Security: The standard shall support registration services. The standard shall support authentication services. Additional mechanisms beyond 802.10 shall be provided to address security issues unique to 802.11. 802.11 Draft Functional Requirements V0.2 8

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?