Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD AND SYSTEM FOR DETERMINING TRANSMISSION PARAMETERS IN A WIRELESS LOCAL AREA NETWORK
Document Type and Number:
WIPO Patent Application WO/2018/229307
Kind Code:
A1
Abstract:
The invention pertains to a method for determining transmission parameters in a wireless local area network operating under a restricted access window scheme, said wireless local area network comprising an access point and a plurality of stations, the method comprising at said access point: estimating (230) respective transmission intervals and next transmission times of said plurality of stations; and assigning (260) a subset of said plurality of stations to a restricted access window group on the basis of said estimated next transmission times. The invention also pertains to a computer program product comprising code means configured to cause a processor to carry out the method and an access point configured to carry out the method.

Inventors:
TIAN LE (BE)
LATRE STEVEN (BE)
FAMAEY JEROEN (BE)
Application Number:
PCT/EP2018/066156
Publication Date:
December 20, 2018
Filing Date:
June 18, 2018
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
IMEC VZW (BE)
UNIV ANTWERPEN (BE)
International Classes:
H04W74/00
Foreign References:
US20130336245A12013-12-19
US20140071900A12014-03-13
Other References:
None
Attorney, Agent or Firm:
IPLODGE BVBA (BE)
Download PDF:
Claims:
Claims

1. A method for determining transmission parameters in a wireless local area network operating under a restricted access window scheme, said wireless local area network comprising an access point (600) and a plurality of stations (610, 620, 630), the method comprising at said access point (600) :

- estimating (230) respective transmission intervals and next transmission times of said plurality of stations; and

- assigning (260) a subset of said plurality of stations to a restricted access window group on the basis of said estimated next transmission times.

2. The method according to claim 1, further comprising determining (270) the number and the respective durations of slots in said restricted access window group.

3. The method according to any of the preceding claims, wherein said estimating (230) comprises incrementing (315) a previous transmission interval estimate of a station (610, 620, 630) if

(310) said station (610, 620, 630) failed to use an assigned slot in an immediately preceding beacon interval .

4. The method according to claim 3, wherein said incrementing (315) is performed according to a multiplicative-decrease scheme.

5. The method according to any of the preceding claims, wherein said estimating (230) further comprises setting (325) a

transmission interval estimate of a station (610, 620, 630) to the time elapsed between two consecutive successful packet

transmissions by said station if (310) said station successfully used a first assigned slot in an immediately preceding beacon interval and failed (320) to use a second assigned slot in a beacon interval preceding said immediately preceding beacon interval.

6. The method according to any of the preceding claims, wherein said estimating (230) further comprises setting (335) a

transmission interval estimate of a station (610, 620, 630) to the time elapsed since the last successful transmission by said station, if (310) said station successfully used a first assigned slot in an immediately preceding beacon interval to transmit a single packet (330) and (320) said station successfully used a second assigned slot in a beacon interval preceding said

immediately preceding beacon interval .

7. The method according to any of the preceding claims, wherein said estimating (230) further comprises decrementing (345) a previous value of a transmission interval estimate of a station (610, 620, 630) if (310) said station successfully used a first assigned slot in an immediately preceding beacon interval to transmit more than one packet (330) and (320) said station successfully used a second assigned slot in a beacon interval preceding said immediately preceding beacon interval and said previous value of said transmission interval estimate is greater than one beacon interval (340) .

8. The method according to any of the preceding claims, wherein said estimating (230) further comprises decrementing (355) a previous value of a transmission interval estimate of a station (610, 620, 630) if (310) said station successfully used a first assigned slot in an immediately preceding beacon interval to transmit at least two packets (330) and (320) said station successfully used a second assigned slot in a beacon interval preceding said immediately preceding beacon interval and said previous value of said transmission interval estimate is less than one beacon interval (340) and the number of said at least two packets is greater than the number of packets expected on the basis of said previous value of said transmission interval estimate .

9. The method according to any of the preceding claims, wherein said estimating (230) further comprises incrementing (365) a previous value of a transmission interval estimate of a station (610, 620, 630) if (310) said station successfully used a first assigned slot in an immediately preceding beacon interval to transmit at least two packets (330) and (320) said station successfully used a second assigned slot in a beacon interval preceding said immediately preceding beacon interval and said previous value of said transmission interval estimate is less than one beacon interval (340) and the number of said at least two packets is less than the number of packets expected on the basis of said previous value of said transmission interval estimate.

10. The method according to claim 1 or claim 2, wherein said estimating (230) comprises using respective values of the "more data" header field as advertised by said plurality of stations.

11. The method according to claim 10, wherein a combination of an occurrence of a positive indication in a "more data" header field as advertised by a station from among said plurality of stations in a previous to last successful transmission packet, and a negative indication in a "more data" header field as advertised by said station in a last successful transmission packet, triggers a downward adjustment of a transmission interval estimate for said station . 12. The method according to any of the preceding claims, wherein assessments of failed or successful packet transmissions are adjusted to take into account cross slot boundary transmissions, such that a packet transmission spanning two beacon intervals is counted as successful in the earlier one of said two beacon intervals.

13. A computer program product comprising code means configured to cause a processor to carry out the method according to any of the preceding claims.

14. An access point (600) configured to carry out the method according to any of claims 1-12.

Description:
Method and System for Determining Transmission Parameters in a Wireless Local Area Network

Field of the Invention

The present invention pertains to the field of wireless local area networks, in particular in the context of an "Internet of Things" (IoT) setting or sensor networks.

Background

Traditional Wireless LAN systems rely on a Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) scheme in combination with a coordination function (e.g., DCF, HCF, PCF) to allow multiple stations to share the common wireless medium. The stations are configured to sense whether the channel is busy, and to wait for the expiry of a back-off timer prior to transmitting if this is the case. If there is a collision, the back-off counter is increased and the counter is restarted.

While the known CSMA/CA scheme works adequately for typical wireless LAN installations, such as hot spots used by no more than a few tens of stations, it has turned out to scale poorly to installations with hundreds or even thousands of devices, as may be expected to arise in the emerging "Internet of Things" (IoT) context. As the probability of collision increases, the average duration of the back-off timers increases, which leads to a decrease of the throughput for the stations .

It has been proposed, as part of the IEEE 802.11ah Wi-Fi standard (marketed as Wi-Fi HaLow) , to use a Restricted Access Window (RAW) scheme to overcome this decline in throughput. The RAW scheme aims to increase scalability in dense IoT networks, where a large amount of stations connect to a single access point (AP) , by dividing stations into groups, limiting simultaneous channel access to one group and therefore reducing the collision

probability for upstream traffic. The IEEE 802.11ah standard does not specify the grouping strategy, which is responsible for deciding how to split stations among groups. To date, no grouping strategies have been published that perform adequately in view of dynamic and heterogeneous traffic conditions. Accordingly, there is a need for grouping strategies that allow WLAN networks to enjoy the full benefit of the

scalability of the RAW scheme in deployments with high numbers of stations .

Summary

According to an aspect of the present invention, there is provided a method for determining transmission parameters in a wireless local area network operating under a restricted access window scheme, said wireless local area network comprising an access point and a plurality of stations, the method comprising at said access point: estimating respective transmission intervals and next transmission times of said plurality of stations; and assigning a subset of said plurality of stations to a restricted access window group on the basis of said estimated next

transmission times.

The present invention is based inter alia on the insight of the inventors that the optimal parameters for the RAW scheme depend on a wide range of network variables, such as number of stations, network load and traffic patterns, and that the WLAN network in an IoT context benefits from dynamic station grouping algorithms that determine the optimal station grouping parameters based on the current network and traffic conditions. It is an advantage of the method according to the present invention that the group duration and the station grouping parameters can be determined dynamically on the basis of information that is readily available in the access point. In particular, the method according to the present invention relies on information regarding successful and

unsuccessful transmission attempts by particular stations to obtain an accurate transmission interval estimate (or,

equivalently, a transmission rate estimate) .

In an embodiment, the method of the present invention further comprises determining the number and the respective durations of slots in said restricted access window group.

It is an advantage of this embodiment that the slot-related parameters can be determined dynamically on the basis of

information that is readily available in the access point. In particular, the method relies on information regarding successful and unsuccessful transmission attempts by particular stations to obtain an accurate transmission interval estimate (or,

equivalently, a transmission rate estimate) .

In an embodiment of the method according to the present invention, the estimating comprises incrementing a previous transmission interval estimate of a station if said station failed to use an assigned slot in an immediately preceding beacon interval.

In the assumption that most stations behave like sensor nodes in that they transmit data at a regular and predictable rate, the failure of a station to use an assigned slot may be indicative of an overestimation of the station's transmission rate (i.e., an underestimation of the transmission interval) . It is an advantage of this embodiment that such an estimation error is corrected so as to arrive at an estimate that is closer to the actual value.

In a particular embodiment, said incrementing is performed according to a multiplicative-decrease scheme.

The inventors have found that a multiplicative-decrease scheme provides an appropriate balance between the risk of causing transmission buffer overflows at the station (due to

underestimation of the transmission rate) and the risk of

allocating bandwidth in a suboptimal manner (due to overestimation of the transmission rate) . In an embodiment of the method according to the present invention, said estimating further comprises setting a transmission interval estimate of a station to the time elapsed between two consecutive successful packet transmissions by said station if said station successfully used a first assigned slot in an immediately

preceding beacon interval and failed to use a second assigned slot in a beacon interval preceding said immediately preceding beacon interval .

It is an advantage of this embodiment that it uses the most recent available information to estimate the transmission interval of a station, if the previous to last transmission slot assigned to that station was not successfully used.

In an embodiment of the method according to the present invention, said estimating further comprises setting a transmission interval estimate of a station to the time elapsed since the last

successful transmission by said station, if said station

successfully used a first assigned slot in an immediately

preceding beacon interval to transmit a single packet and said station successfully used a second assigned slot in a beacon interval preceding said immediately preceding beacon interval . It is an advantage of this embodiment that it increases slot utilization by setting the transmission interval estimate slightly higher than the observed interval for a station repeatedly transmitting successfully, where the last transmission included a single packet.

In an embodiment of the method according to the present invention, said estimating further comprises decrementing a previous value of a transmission interval estimate of a station if said station successfully used a first assigned slot in an immediately

preceding beacon interval to transmit more than one packet and said station successfully used a second assigned slot in a beacon interval preceding said immediately preceding beacon interval and said previous value of said transmission interval estimate is greater than one beacon interval.

It is an advantage of this embodiment that it increases bandwidth allocated to a station repeatedly transmitting successfully, where the last transmission includes more than one packet.

In an embodiment of the method according to the present invention, said estimating further comprises decrementing a previous value of a transmission interval estimate of a station if said station successfully used a first assigned slot in an immediately

preceding beacon interval to transmit at least two packets and said station successfully used a second assigned slot in a beacon interval preceding said immediately preceding beacon interval and said previous value of said transmission interval estimate is less than one beacon interval and the number of said at least two packets is greater than the number of packets expected on the basis of said previous value of said transmission interval estimate .

In an embodiment of the method according to the present invention, said estimating further comprises incrementing a previous value of a transmission interval estimate of a station if said station successfully used a first assigned slot in an immediately

preceding beacon interval to transmit at least two packets and said station successfully used a second assigned slot in a beacon interval preceding said immediately preceding beacon interval and said previous value of said transmission interval estimate is less than one beacon interval and the number of said at least two packets is less than the number of packets expected on the basis of said previous value of said transmission interval estimate.

It is an advantage of these two embodiments that it provides a gradual adjustment of the transmission interval estimates for station repeatedly transmitting successfully, whereby multiple packets are transmitted in a single slot. In an embodiment of the method according to the present invention, the estimating comprises using respective values of the "more data" header field as advertised by the plurality of stations.

IEEE 802.11ah inherits the "more data" header field from the legacy IEEE 802.11 standard and further extends its application scope. An 802.11ah station can set the "more data" header field of the frame control field to 1 in individually addressed packets to indicate that it has packets queued for transmission to the AP. In the legacy 802.11 standard, the "more data" field can be only used in the contention free (CF) period of the Point Coordination Function (PCF) or PS (power save) mode. It is an advantage of this embodiment that the estimation of the transmission interval can be made more accurate by not only looking at packets that have been transmitted successfully, but also at the state of the queue of the stations that have just successfully transmitted a packet.

In a particular embodiment, a combination of an occurrence of a positive indication in a "more data" header field as advertised by a station from among said plurality of stations in a previous to last successful transmission packet, and a negative indication in a "more data" header field as advertised by said station in a last successful transmission packet, triggers a downward adjustment of a transmission interval estimate for said station.

In this embodiment, the presence of a further queued packet at the time of the next to last successful transmission (a "positive indication" or a "1" value in the "more data" header field is indicative of the presence of a further packet in the transmission queue) , and the absence of a further queued packet at the time of the last successful transmission, is considered indicative of an overestimation of the transmission interval. It is an advantage of this embodiment that it uses the cited combination of

advertisements as a trigger to adjust the estimate of the

transmission interval, so as to avoid a detrimental build-up of packets in the transmission queue of the station in question. In an embodiment of the method according to the present invention, assessments of failed or successful packet transmissions are adjusted to take into account cross slot boundary transmissions, such that a packet transmission spanning two beacon intervals is counted as successful in the earlier one of said two beacon intervals .

The cross slot boundary feature allows ongoing transmissions to continue after the end of the current RAW slot. This feature can cause a packet transmission to span two beacon intervals. As a consequence, traffic estimation, which is performed at the target beacon transmission time, will consider such a transmission as failed, while in reality it may succeed; i.e., without adequately taking into account the cross slot boundary feature, such a transmission would be treated as a failure at time t c -l but as a success at time t c . It is an advantage of this embodiment that it can improve estimation accuracy by accounting for the incorrect information used at time t c -l and correcting it at time t c . According to an aspect of the present invention, there is provided a computer program product comprising code means configured to cause a processor to carry out the method as described above.

According to an aspect of the present invention, there is provided an access point configured to carry out the method as described above .

The technical effects and advantages of embodiments of the computer program product and the access point according to the present invention correspond, mutatis mutandis, to those of the corresponding embodiments of the method according to the present invention . Brief Description of the Figures

These and other technical features and advantages of embodiments of the present invention will now be described with reference to the attached drawings, in which:

- Figure 1 presents a schematic representation of the RAW

mechanism, with the beacon RPS element carrying information about the number of RAW groups, their duration, number of equal-sized slots, and assigned stations;

- Figure 2 schematically illustrates the steps of real-time stations grouping under dynamic traffic for IEEE 802. llah according to an embodiment of the present invention;

- Figure 3 presents an algorithm for estimating transmi ssion intervals according to an embodiment of the present

invention;

- Figure 4 provides a flow chart of the algorithm of Figure 3;

- Figure 5 presents an algorithm for assigning stations to RAW slots according to an embodiment of the present invention;

- Figure 6 schematically illustrates a wireless access network in which the present invention may be deployed;

- Figure 7 illustrates the cross slot boundary feature of the

IEEE 802 . llah standard;

- Figure 8 illustrates the parameters used for estimating the transmission interval of station s at time t c ; and

- Figure 9 presents an algorithm for estimating transmi ssion intervals according to another embodiment of the present invention .

Description of Embodiments

Figure 1 presents a schematic representation of the RAW mechanism, with the beacon RPS element carrying information about the number of RAW groups, their duration, number of equal-sized slots, and assigned stations. The RAW mechanism aims to reduce collisions and improve performance in dense IoT networks where hundreds or even thousands of stations are simultaneously contending for channel access .

It restricts the number of stations that can simultaneously access the channel by dividing them into groups and only allowing stations that belong to a certain group to access the channel at specific times. Specifically, the airtime is divided into

intervals, some of which are assigned to RAW groups, while the others are considered as shared channel airtime and can be accessed by all stations. Each interval assigned to a RAW group is preceded by a beacon that carries a RAW parameter set (RPS) information element that specifies the stations that belong to the group, as well as the interval start time. Moreover, each RAW interval consists of one or more slots, over which the stations in the RAW group are split evenly (using round-robin assignment) . As such, the RPS also contains the number of slots, slot format and slot duration count sub-fields which jointly determine the RAW slot duration.

In a feature that distinguishes IEEE Std 802. llah from previous WLAN standards, each station uses two back-off states of enhanced distributed channel access (EDCA) to manage transmission outside and inside their assigned RAW slot respectively. For the first back-off state, the station suspends its back-off timer at the start of each RAW, and restores and resumes the back-off timer at the end of the RAW. For the second back-off state, stations start back-off with initial back-off state inside their own RAW slot, and discard the back-off state at the end of their RAW slot, effectively restarting their back-off at the start of their next RAW period.

A beacon interval is the time between two beacon carrying RPS. The IEEE 802. llah standard does not specify how to divide beacon intervals into RAW groups. However, the chosen division should be announced in the beacon message, and the number of RAW groups has an impact on the length of the beacon message. Concretely, the access point (AP) should implement a station grouping algorithm that determines the number of groups, time duration of each group, and how to divide stations among them. Embodiments of the present invention exploit the freedom to adapt parameters between

consecutive beacon intervals in order to arrive at dynamic station grouping algorithms that determine the optimal station grouping parameters based on the current network and traffic conditions.

The inventors have found that it is advantageous to cluster stations and assign them to RAW groups by only using information readily available at the AP side. In view of that constraint, the objective is to maximize the performance (throughput, latency), by reducing channel contention. The parameters to be determined include (i) the number of RAW groups, (ii) the duration of each group, (iii) the number of (equal-sized) slots in each group, and (iv) the set of stations assigned to each group.

The inventors have found that a set of variables that is highly relevant for the purpose of the aforementioned performance maximization consists of the transmission intervals of the stations in the network. Hence, as shown in Figure 2, the

operations to be carried out by the AP can be divided in a

"transmission interval estimation" stage and a "RAW slots

assignment" stage. Once the algorithm has determined the RAW parameters and assigned stations to RAW slots based on these parameters, the RAW parameters are transmitted to the stations by the AP in the RPS element of the beacon frame.

In the "transmission interval estimation" stage, which is

initiated at the start of each target beacon transmission time (TBTT) 210, information about past transmissions is collected and updated 220. On the basis of this information, stations'

transmission intervals and their next transmission time are estimated 230.

Embodiments of the present invention rely on a novel scheme for transmission interval estimation, with a view to determining the above mentioned parameters. Based on updated information of past transmissions, the packet transmission interval and the next transmission time of each station are estimated at step 230 in Figure 2, as illustrated in more detail in the following exemplary algorithms .

Aspects of the invention will first be described with reference to a first embodiment, also referred to as "TAROA", which uses the algorithm depicted in Figure 3 and Figure 4 for transmission interval estimation and the algorithm depicted in Figure 5 for RAW parameter configuration.

The illustrated algorithm is based inter alia on the insight of the inventors that in an IoT context, many transmitters will be sensor stations, or act in a manner similar to sensor stations, which transmit packets with a certain (predictable) frequency. Hereinafter, line references (line x) will be used to refer to specific lines of the algorithm depicted in Figure 3, and

reference figures in bold type (3xx) will be used to refer to elements of the flow chart shown in Figure 4.

In the remainder of this description, the estimated transmission interval of each station s E S will be noted as tf nt . A station's transmission is regarded as successful if the AP received at least one packet from the station in the station's assigned RAW slot. If a station was assigned a RAW slot, but no packets were received by the AP during that slot, it is considered a failed transmission. The variables π;? Γαη5 [0] and π;? Γαη5 [1] are introduced to designate the last transmission result (success or failure) and the previous to last transmission result (success or failure), respectively.

In the algorithm depicted in Figure 3, are used as decision factors to adjust the transmission interval estimate, depending on which one of the following three cases occurs:

a) the previous transmission failed (π Γαη5 [0] == failed; lines 1- 3 of the algorithm depicted in Figure 3); b) the previous transmission was successful, but the one before failed (π Γαη5 [0] == success and π;? Γαη5 [1] == failure; lines 4-6 of the algorithm depicted in Figure 3); or

c) the last two transmissions were successful (π Γαη5 [0] ==

success and π;? Γαη5 [1] == success; lines 7-16 of the algorithm depicted in Figure 3) .

The motivation for using 7Tj? rans [0] and 7rj? rans [l] as decision factors can be explained as follows.

If the previous transmission failed (310/failed, case (a) above), this can be assumed to imply that station s had no packets in its transmit queue, which means that the estimated transmission interval tf nt of station s is too short. Of course, this assumption relies on the assumption that the failure is not due to a

collision, but that latter assumption is reasonable in view of the use of RAW, whose very purpose it is to minimize the probability of collisions. Hence, in this branch of the algorithm, the value of tf nt should be increased. The increase should be sufficiently gradual to avoid overestimation (in which case the station generates packets at a rate that exceeds the one represented by the estimated tf nt , which could lead to loss of packets due to buffer overflow) and sufficiently steep to avoid repeated

underestimation (in which case the station generates packets at a rate that is lower than the one represented by the estimated tf nt , which would result in suboptimal use of the available bandwidth) . The inventors have found that the use of a multiplicative-decrease scheme, as known from the TCP congestion control scheme, gives good results. Accordingly, tf nt is preferably increased by adding a term representing twice the number of consecutive failed

transmissions to the time elapsed since the last successful transmission (expressed as the difference of the current time t c and the time of the last successful transmission of station s, tf ucc [0]) minus 1 beacon interval 315. To enable this multiplicative- decrease scheme, the variable f ailed is introduced to represent the present value of the number of consecutive failed transmissions: thus, Ttfaiied i- s increased by one when transmission fails (as is the case here) and reset to 0 once transmission succeeds (as in case (b) and case (c) , discussed below) . If the previous transmission was successful (310/success) , but the one before failed (320/failed, case (b) above), the failure counter 7r^ aiied failed is reset to 0 and the transmission interval tf nt is estimated as the time difference between the last two successful transmissions (expressed here as the difference between the time of the last successful transmission t ucc [0] and the previous to last successful transmission t| ucc [1]) , 325. This scenario can be interpreted as occurring when the estimate of the transmission interval tf nt has transitioned from an underestimation to an accurate value or an overestimation .

If the estimate of the transmission interval tf nt is fairly accurate (at most a small overestimation, i.e. the actual rate at which the station generates packets is higher than the one represented by the estimate of the transmission interval tf nt ) , the system will arrive, after the beacon interval of case (b) above, at a

situation where the previous transmission and the one before that were both successful (310/success + 320/success, case (c) above) . This case can be further divided in two possibilities:

- If only one packet is received in this beacon interval 330/ true (in other words, the number of packets = 1 ) , tf nt is updated in the same way as in case (b) (335, line 10) .

- If s transmits multiple packets to the AP 330/false (in other words, > 1) , a further distinction must be made as to whether tf nt > 1 or tf nt < 1 .

o If tf nt is more than one beacon interval 340/false

(i.e., tf nt > 1) , the estimated transmission interval tf nt must be reduced. In the embodiment represented by

Figure 3, tf nt is reduced by 1 beacon interval (345, line 12) .

o If tfnt i- s Isss than one beacon interval (i.e., tf nt < 1) , there are two further possibilities: If the number of received packets is higher than

interval tf nt must be reduced. In the embodiment represented by Figure 3, tf nt is reduced by adding 1 to the inverse (355, line 14) .

If the number of received packets is lower than the estimated number of expected packets (i.e., < /.s the estimate of the transmission interval tf irnt must be increased. In the embodiment

represented by Figure 3, t i r nt is increased by subtracting 1 from the inverse (365, line

Finally, the next transmission time t^ ext is calculated as the last successful transmission plus the newly estimated transmission interval (370, line 17) . As the algorithm is iterative, the estimate of tf nt will become more accurate as more information about successful and failed transmissions becomes available.

It may be noted that while the method described above is extremely well suited to deal with dynamically changing transmission conditions, it does not lead to a strict convergence of the transmission interval estimates for stations that have a perfectly regular transmission rate. Instead, the estimates will oscillate between over- and underestimations , in such a way that the deviations at any given time are small enough not to impact the overall efficiency of the scheme in a significant way.

If, based on the above estimates t nt , a station is not expected to transmit 240, the system preferably postpones assigning a RAW slot to that station 250 until the next beacon interval.

Based on the above estimates tf nt , the set of stations S r that have pending packets are assigned to RAW groups 260 to allow them to access the channel. Subsequently, the set of RAW slots l b to initialize in the next beacon interval b, as well as the duration t r of each of the RAW slots, are determined 270. These RAW parameters are selected based on the previously determined estimation of the transmission interval tf nt and next transmission time t^ext . As shown in Figure 5, this is a two-step process:

(i) select a subset of stations with pending packets to be assigned a RAW slot during the upcoming beacon interval

(lines 2 8 ) , and

(ii) partition the selected stations among the available number of RAW slots and determine the slot durations

(lines 9-14) .

In the first part (lines 2-8) , the algorithm iterates over all stations s, according to ascending last successful transmission time t ucc [0] (i.e., S queue ) until the next station has a next estimated transmission time greater than the current time (i.e., t next > t c ) or the maximum allowed number of packet transmissions has been reached (i.e., ττ ϋ > ^ ιαΛ -) (line 2) . The station is first added to the set of stations allowed to transmit during the beacon interval S b (1ine 3) . Then, if the station is estimated to transmit more than 1 packet per beacon interval (i.e., tf nt < 1) and its estimated number of transmissions plus n b will exceed the maximum packet transmissions in b (line 4), then it is allowed to transmit part of its packets and its estimated transmission interval is updated accordingly (line 5), and n b equals to

nmax . line 6) . Otherwise, the station is expected to be able to transmit all of its packets and n b is increased with the number of packets s it is estimated to transmit in the beacon interval (line 8) .

All slots within a RAW group have the same duration and only stations with sequential AIDs can be assigned to the same group. The optimal duration of a slot depends on the number of stations assigned to it, as well as their data rates, number of queued packets, and packet payload sizes. The inventors have found that by limiting the method to cases where each RAW group has exactly 1 slot, and allowing all slots to have a different size, the loss of optimality caused by selecting a worst-case slot duration can be avoided . In the second part (lines 9-14) , stations are assigned to RAW slots rE¾ according to increasing AID (as only sequential AIDs can be assigned to the same group) until the number of stations assigned to the slot are greater or equal to the optimal number of assigned stations (i.e., \S r \ > a pt ) (line 10) . The skilled person will be able to determine an appropriate value of σζ νΐ by routine experimentation or analytical methods .

The number of packets to be transmitted by s is added to the expected number of packet transmissions in r (line 13) . Finally, the optimal duration t r of the slot is determined based on the number of expected packet transmission π Γ (line 14) .

Upon conclusion of the previous steps 260, 270, the beacon frame containing the necessary RAW group and slot information may be transmitted 280 to the network.

Embodiments of the method according to the present invention may be implemented in dedicated hardware (e.g., ASIC) , configurable hardware (e.g., FPGA) , programmable components (e.g., a DSP or general purpose processor with appropriate software) , or any combination thereof. The same component (s) may also include other functions. Accordingly, the present invention also pertains to a computer program product, preferably in the form of a computer readable medium, comprising code means configured to cause a processor to carry out the method as described above.

With reference to Figure 6, the present invention also pertains to an access point 600 configured to carry out the method as

described above. Without loss of generality, the access point 600 is shown in communication with three stations 610, 620, 630. As explained above, optimizing the RAW parameters strongly relies on accurate estimation of the interval tf nt for each station s. However, the aforementioned embodiments do not fully utilize all the information available in the IEEE 802.11ah packet header, which could provide more insights into the station' s traffic pattern. Therefore, further optional aspects of the present invention will now be described with reference to a second embodiment, which provides more accurate traffic estimation by exploiting the "More Data" header field and/or cross slot boundary feature. We refer to this embodiment as "E-TAROA".

The first step of E-TAROA (traffic estimation) is significantly different from the TAROA embodiment described above, and will be described in more detail with reference to Figures 7-9. The second step (RAW parameter optimization) of E-TAROA is nearly identical to the one the TAROA embodiment, with the possible exception that E-TAROA allows stations with queued packets, but an estimated next transmission time greater than the time of the next beacon, to transmit, while the embodiment described above did not necessarily consider their buffer and would not schedule them for

transmission .

The E-TAROA embodiment preferably takes advantage of the cross slot boundary feature of the IEEE 802.11ah standard (the RPS also contains the cross slot boundary (CSB) sub-field) , which is illustrated in Fig. 7. As Fig. 7 depicts, stations are allowed to continue their ongoing transmissions even after the end of the current RAW slot when CSB is set to true. Otherwise, stations should not start a transmission if the remaining time in the current RAW slot is not enough to complete it. The remaining time, termed as "holding time", should be at least equal to the TXOP of the station, several holding schemes are known from literature that specify how the station should count its back-off within the holding period.

In particular, in the E-TAROA embodiment, assessments of failed or successful packet transmissions are adjusted to take into account cross slot boundary transmissions, such that a packet transmission spanning two beacon intervals is counted as successful in the earlier one of said two beacon intervals. It is an advantage of this embodiment that it can improve estimation accuracy by accounting for the incorrect information used at time t c -l and correcting it at time t c .

Fig. 8 illustrates the parameters used for estimating the

transmission interval of station s at time t c in the E-TAROA embodiment. Figure 8a depicts an example of a station notifying the AP that it has more packets in its queue using the "more data' header field. It shows, when the estimated traffic interval tf nt (i.e., 7 in the example) of station s is larger than the real transmission interval if nt (i.e., 5 in the example), there is one packet buffered at station s after times transmission. In this case, the real transmission interval tf nt satisfies the following conditions :

(tfnt - tint) X A m + offset > tf nt ^ (tint - tfnt) Xim + offset < tf nt X 2

where offset means, right offset beacon intervals before tf nt is calculated for the first time, a packet arrives in the

transmission queue, offset ranges from 0 to tf nt — 1. Therefore, by using the "more data" header field, the estimated lower and upper bound of the real transmission interval tf nt can be represented as:

L int Max L int λ

The cross slot boundary feature allows ongoing transmissions to continue after the end of the current RAW slot. This feature can cause a packet transmission to span two beacon intervals. As a consequence, traffic estimation, which is performed at the TBTT, will consider such a transmission as failed, while in reality it may succeed. An example of this is depicted in Figure 8b. TAROA considers the transmission a failure at time t c — 1 but a success at time t c . E-TAROA improves estimation accuracy by accounting for the incorrect information used at time tc - 1 and correcting it at time t r .

In the E-TAROA embodiment the estimating of the transmission intervals comprises using respective values of the "more data" header field as advertised by the plurality of stations.

Preferably, a combination of an occurrence of a positive

indication in a "more data" header field as advertised by a station from among said plurality of stations in a previous to last successful transmission packet, and a negative indication in a "more data" header field as advertised by said station in a last successful transmission packet, triggers a downward adjustment of a transmission interval estimate for said station. The E-TAROA embodiment thus uses a different algorithm for estimating transmission intervals, a specific example of which is shown in Algorithm 3 of Fig. 9.

The goal of sensor traffic estimation is to determine the

estimated transmission interval tf nt (i.e., the time between the generation of two subsequent packets) and next transmission time tnext f° r each station s. As shown in Algorithm 3, they are estimated based on successful and failed transmissions during the previous beacon interval. A station's transmission is regarded as successful if the AP received at least one packet from the station. When only one packet from a station was received, and the station was not assigned to a RAW slot, the AP assumes the transmission crossed two beacon intervals. By using the "more data" field, a successful transmission can further indicate whether the station has more packets in its queue or not. If a station was assigned a RAW slot, but no packets were received by the AP, it is considered a failed transmission. The algorithm consists of four main blocks: (i) the previous transmission failed (lines 1-3) , (ii) the previous transmission was successful, but the one before failed (lines 4-8), (iii) the last two

transmissions were successful, and only one packet was received in the previous beacon interval (lines 9-18), and (iv) the last two transmissions were successful, and more than one packet was received in the beacon interval (lines 19-26) .

In the first case (lines 1-3) , if the previous successful

transmission did not indicate station s had packets queued to send, and the previous transmission failed, the transmission failure counter f ailed is increased by 1, and tf nt is increased by the number of subsequent failed transmissions multiplied by two. The transmission failure can be caused by a collision or the lack of packets in the station's transmission queue (i.e. no packets arrived in the transmission queue since the previous successful transmission) . As RAW aims to minimize collisions, by properly grouping the stations into RAW slots, we assume the probability of transmission failure caused by collision is low enough to be ignored. Thus, the estimated transmission interval tf nt of station s is considered too short. As shown in Line 3, as the number of sequential failed transmission attempts increases, the algorithm assumes its estimation is more wrong and it will increase the interval faster. As such, the transmission interval can be overestimated up to 2 X ( ^ αί; — l) beacon intervals. The first case also implies that if the failed transmission was caused by collision (i.e., the station had buffered packets to send but the previous transmission failed) , tf nt remains unchanged. In the second case (lines 4-8), the failure counter f ailed is set to 0 and the transmission interval is estimated as the time difference between the last two successful transmissions, i.e. t| ucc [0] and t| ucc [l] . If the previous successful transmission crosses two beacon intervals, t U cc[0] is decreased by one beacon interval.

If an accurate tf nt is obtained in case 2, the next transmission will succeed and lead to case 3 (lines 9-18) or case 4 (lines 19- 26) in which the two last transmissions are successful. In case 3, only 1 packet was received in the previous beacon interval. In both cases 3.1 (lines 11-14) and 3.2 (lines 15-16), tf nt is larger than one. For case 3.1, the transmission queue had no packets at the time of the last successful transmission but had packets at the time of previous to last successful transmission. This means the transmission interval was overestimated, and after times transmission, this overestimation results in one buffered packet in the transmission queue at the time of the previous to last successful transmission. The estimated lower bound of the real transmission interval is updated as the maximum of the lower bound depicted in Eq. 2, and t nt — 2 X { if a n— l) . The latter means the transmission interval is overestimated by up to 2 X { if a n— l) beacon intervals in case 1 (line 3) . The upper bound is updated by using Eq. 2. The value of tf nt is set to the average of the two bounds. Case 3.2 covers all the remaining conditions, tf nt is updated in the same way as in case 2 (lines 15-16) . Case 3.3 (lines 17-18) represents the inverse of case 3.1 and 3.2, where t nt is equal to or smaller than 1 (i.e., the station is estimated to generate 1 or more than 1 packet per beacon interval) . If the previous

successful transmission did not cross two beacon intervals and the transmission queue is empty, tf nt becomes 1, otherwise, tf nt remains unchanged .

In case 4 (lines 19-26), more than 1 packet was received. In case 4.1 (lines 21-22), tf nt is larger than 1 (i.e., only 1 packet was allowed to be transmitted in the previous beacon interval), the overestimated tf nt is reduced by 1 beacon interval. In case 4.2 (lines 23-24), the number of received packets is higher than the estimated number of expected packets (i.e., l/tf nt ) , the

transmission interval is reduced by adding 1 to the inverse. Case 4.3 (lines 25-26) represents fewer packets are received than estimated and the transmission queue has no buffered packets. The transmission interval is increased by subtracting 1 from the inverse .

Finally, the next transmission time is calculated as the last successful transmission plus the newly estimated transmission interval (line 27) . In essence, the algorithm is iterative, and more information about successful and failed transmissions becomes available, the estimate of tf nt will become more accurate.

While the invention has been described hereinabove with reference to specific embodiments, this was done to clarify and not to limit the invention, the scope of which is to be determined by reference to the attached claims.