Method and apparatus for controlling channel access in wireless local area network (wlan) system

ABSTRACT

Disclosed are a method and apparatus for an access point (AP) to control channel access of a station in a wireless local area network (WLAN) system. An AP according to one embodiment may determine resource allocation information for protecting a resource for a station not referring to traffic indication map (TIM) information. The determined resource allocation information is transmitted to a station referring to the TIM information, and the station referring to the TIM information does not conduct channel access in a time period specified in the resource allocation information.

The present application is a continuation of U.S. application Ser. No.15/021,524 filed Mar. 11, 2016, which is a U.S. National Stage ofInternational Patent Application No. PCT/KR2014/008468 filed Sep. 11,2014, which claims priority to Korean application number10-2013-0109264, filed Sep. 11, 2013, Korean application number10-2014-0006048, filed Jan. 17, 2014, and Korean application number10-2014-0120079, filed Sep. 11, 2014, in the Korean IntellectualProperty Office.

TECHNICAL FIELD Background Art

A wireless local area network (WLAN) enables wireless Internet access athome or offices or in specific service areas using portable terminals onthe basis of radio frequency technologies. When there are too manystations (STAs) in a WLAN, probability of collisions happening betweenSTAs in a channel access process increases. STAs which perform channelaccess without listening to a beacon signal may be in contention withother STAs allocated slots in the channel access process, and suchcontention may deteriorate efficiency of the entire network.

DISCLOSURE OF INVENTION Technical Solutions

According to an aspect of the present invention, there is provided amethod of controlling channel access, the method including determiningresource allocation information for protecting a resource for a firststation not referring to traffic indication map (TIM) information from asecond station referring to the TIM information; and broadcasting theresource allocation information.

The first station may request protection of the resource when requestingthe resource to an access point (AP).

The first station may transmit a bit value indicating whether protectionof the resource is requested to the AP whenever requesting the resource.

The bit value indicating whether protection of the resource is requestedmay be transmitted, being included in a control field or a request typefield of a target wake time (TWT) element.

The method may further include transmitting response data indicatingwhether a requested resource is protected to the first station when arequest for the resource is received from the first station.

The determining of the resource allocation information may includedetermining resource allocation information for restricting channelaccess of the second station in a time period for channel access of thefirst station.

The resource allocation information may include information on arestricted access window (RAW) for protecting the resource for the firststation.

The second station may not perform channel access in a time periodcorresponding to the RAW.

The determining of the resource allocation information may includereceiving request data for resource protection from the first station,and determining the resource allocation information setting a timeperiod requested by the first station for protection through an RAW whenthe request data is received.

The determining of the resource allocation information may includetransmitting response data indicating whether protection of the resourceis possible to the first station in response to the request data whenthe request data is received.

The determining of the resource allocation information includesreceiving control data indicating whether resource protection isrequested from the first station; and determining whether the firststation requests resource protection on the basis of the control dataand determining the resource allocation information setting a timeperiod requested by the first station for protection through an RAW whenthe first station requests resource protection.

The resource allocation information may be transmitted to the secondstation, being included in a beacon signal.

The second station may be a TIM station checking buffered downlink datathrough a beacon signal transmitted from the AP, and the first stationmay be a non-TIM station not checking the beacon signal and the buffereddownlink data.

According to another aspect of the present invention, there is provideda station performing channel access to an AP without referring to TIMinformation, the station including a controller to generate request datafor requesting resource protection to the AP; and a communication unitto transmit the request data to the AP.

The communication unit may receive response data indicating whetherresource protection is possible from the AP in response to the requestdata.

According to still another aspect of the present invention, there isprovided an AP including a controller to determine resource allocationinformation for protecting a resource for a first station not referringto TIM information from a second station referring to the TIMinformation; and a communication unit to broadcast the resourceallocation information.

The first station may request protection of the resource when requestingthe resource to the AP.

The first station may transmit a bit value indicating whether protectionof the resource is requested to the AP whenever requesting the resource.

The bit value indicating whether protection of the resource is requestedmay be transmitted, being included in a control field or a request typefield of a TWT element.

The controller may determine resource allocation information forprotecting a resource requested by the first station for protection fromthe second station when the first station requests protection of theresource.

The controller may determine resource allocation information forrestricting channel access of the second station in a time period forchannel access of the first station.

The resource allocation information may include information on an RAWfor protecting the resource for the first station.

The second station may not perform channel access in a time periodcorresponding to the RAW.

The communication unit may receive request data for resource protectionfrom the first station, and the controller may determine the resourceallocation information setting a time period requested by the firststation for protection through an RAW when the request data is received.

The communication unit may transmit response data indicating whether arequested resource is protected to the first station when a request forthe resource is received from the first station.

According to yet another aspect of the present invention, there isprovided an AP including a communication unit to receive request datafor resource protection from a station not referring to TIM information;and a controller to generate resource allocation information forprotecting a resource requested by the station through an RAW when therequest data is received, wherein the communication unit broadcasts theresource allocation information.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 illustrates a wireless local area network (WLAN) environmentincluding an access point (AP) and a plurality of stations (STAs)according to an embodiment of the present invention.

FIG. 2 illustrates a field used for indicating a resource allocated fora non-traffic indication map (TIM) STA according to an embodiment of thepresent invention.

FIG. 3 illustrates a configuration of an AP according to an embodimentof the present invention.

FIG. 4 illustrates a configuration of an STA according to an embodimentof the present invention.

FIG. 5 illustrates a format of a control field of a Target Wakeup Time(TWT) element according to an embodiment of the present invention.

FIG. 6 is a flowchart illustrating a channel access control methodaccording to an embodiment of the present invention.

BEST MODE FOR CARRYING OUT THE INVENTION

Hereinafter, exemplary embodiments of the present invention will bedescribed in detail with reference to the accompanying drawings. It isto be understood that the detailed description, which will be disclosedalong with the accompanying drawings, is intended to describe theexemplary embodiments of the present invention, and is not intended todescribe a unique embodiment with which the present invention can becarried out. Hereinafter, the following detailed description includesdetailed matters to provide full understanding of the present invention.However, it will be apparent to those skilled in the art that thepresent invention can be carried out without the detailed matters.

The following embodiments are constructed by combining components andfeatures of the present invention into particular forms. Each componentor feature may be considered optional unless mentioned otherwise. Eachcomponent or feature may be embodied in a separate form from anothercomponent or feature. Also, some components and/or features may becombined to construct an embodiment of the present invention. Operationsillustrated in embodiments of the present invention may be carried outin a different order. Some elements or features of one embodiment may beincluded in another embodiment or be replaced with correspondingelements or features of another embodiment.

Specific terms to be used in the following description are provided forbetter understanding of the present invention and may be changed withother forms without departing from the technical scope of the presentinvention.

In some cases, to prevent the concept of the present invention frombeing ambiguous, structures and apparatuses of the known art will beomitted, or will be shown in the form of a block diagram based on mainfunctions of each structure and apparatus. Also, like reference numeralsrefer to like elements throughout the specification.

The embodiments of the present invention may be supported by standardsdisclosed in at least one of wireless access systems, such as Instituteof Electrical and Electronics Engineers (IEEE) 802 system, 3rdGeneration Partnership Project (3GPP) system, 3GPP Long-Term Evolution(LTE) and LTE-Advanced (LTE-A) system and 3rd Generation PartnershipProject 2 (3GPP2) system. That is, operations or portions not mentionedin the embodiments to clarify the technical scope of the presentinvention may be supported by the standards. All terms used in thisspecification may be explained by the standards.

The following technology may be used for various types of wirelessaccess systems, such as Code Division Multiple Access (CDMA), FrequencyDivision Multiple Access (FDMA), Time Division Multiple Access (TDMA),Orthogonal Frequency Division Multiple Access (OFDMA), and SingleCarrier Frequency Division Multiple Access (SC-FDMA). CDMA may berealized by radio technologies, such as Universal Terrestrial RadioAccess (UTRA) or CDMA2000. TDMA may be realized by radio technologies,such as Global System for Mobile communications (GSM)/General PacketRadio Service (GPRS)/Enhanced Data Rates for GSM Evolution (EDGE). OFDMAmay be realized by radio technologies, such as IEEE 802.11 (Wi-Fi), IEEE802.16 (WiMAX), IEEE 802-20, and E-UTRA (Evolved UTRA). Although thefollowing description will be made with reference to the IEEE 802.11system for clarity, the technical scope of the present invention is notlimited thereto.

FIG. 1 illustrates a wireless local area network (WLAN) environmentincluding an access point and a plurality of stations according to anembodiment of the present invention.

The WLAN environment may include a plurality of components, in whichcommunications are performed by interactions between the components. Abasic constituent block of a WLAN system is referred to as a basicservice set (BSS), which may include an access point (AP) 110 and one ormore stations (STAs).

An AP is a functional entity which provides connection to a distributionsystem via a wireless medium for an STA associated with the AP. In aninfrastructure BSS including an AP, communications between STAs arebasically performed via the AP, but direct communications between STAsare possible when a direct link is established. The AP may also bereferred to as a central controller, base station (BS), node-B, basetransceiver system (BTS), site controller or administrative STA.

An STA is a functional medium including a physical layer interface formedium access control (MAC) and wireless medium in accordance with IEEE802.11. The STA may also be referred as a mobile terminal, wirelessdevice, wireless transmit/receive unit (WTRU), user equipment (UE),mobile station (MS), mobile subscriber unit) or simply user.

A WLAN defines a power saving mode (PSM) to save power consumption ofSTAs. An AP periodically transmits a beacon signal and notifies an STAof presence of a buffered frame through a traffic indication map (TIM)field of the beacon signal. STA1, STA2, STA3, STA4, STA5, STA6, STAT,STAB, and STA9 121 to 143 are represented by an STA in the followingdescription.

An STA in sleep mode may periodically wake up to receive TIM informationof a beacon signal transmitted from the AP 110. When a bit valuecorresponding to a specific STA is 0 in the TIM information, the STA maygo back to sleep. When the bit value of the specific STA is 1 in the TIMinformation, the STA wakes up until a last frame scheduled in a currentbeacon period is transmitted. The STA may check a More Data field of aheader of a frame transmitted by the AP 110 to identify whether theframe is a last frame. For example, when the More Data field is 0, theSTA may determine that the received frame is the last scheduled frame.

In the PSM, an amount of power consumed by the STA is determined basedon not only traffic transmitted to the STA but also a traffic amount ofanother STA, because data transmission between the AP 110 and the STAmay be interrupted by an attempt at data transmission between the AP 110and another STA. When such an interruption occurs, it takes longer timefor the STA to receive all buffered frames, and thus the STA consumesgreater power. As an increasing number of STAs communicate with the AP110, greater power is consumed.

To minimize occurrence of interruptions, the AP 110 may allocate STAsdifferent times to access a channel, thereby reducing a number of STAssimultaneously accessing the channel. To allocate a time period for aspecific STA to access the channel, the AP 110 may divide a timeinterval between beacon signal transmission times or smaller timeinterval into slots and allocate a slot to the STA. Allocating a slot toan STA to control channel access of the STA is defined as slot-basedchannel access. The STA may access the channel in a time period of anallocated slot.

The AP 110 may allocate a slot to each STA or a group of STAs andallocate a Restricted Access Window (RAW) or Periodic RAW (PRAW)including the slot. A PRAW may be used to protect a periodicallyallocated resource as an RAW.

A general STA may notify the AP 110 of presence of the STA throughmanagement operations, such as association or negotiation processes, andof preference with respect to downlink transmission. For instance,instructions and verification of such information may be carried outthrough an association request/response process or a proberequest/response process between the STA and the AP 110.

Setting up preference of the STA with respect to downlink transmissionmay include one of a method of recognizing existence of downlink data byreferring to a TIM and receiving the downlink data and a method ofreceiving downlink data without referring to a TIM. A purpose of the AP110 providing TIM information to an STA is to allow the STA to access achannel only within a time resource indicated by the TIM information,thereby enhancing efficiency in utilization of the resource.

The STA may verify, by referring to the TIM information, whether the STAneeds to receive data transmitted from the AP 110 or not. A slotallocated by STA may be identified through a position of each STA in aTIM bitmap included in a beacon signal. The STA may periodically receivea beacon signal transmitted from the AP 110, interpret the TIMinformation included in the beacon signal, and go to a sleep mode whenno data to be transmitted to the STA is identified. When there is datato be transmitted to the STA, the STA may go to a mode for receivingdata, instead of going to the sleep mode. As such, an STA which receivesa beacon signal and verifies existence of data to be transmitted to theSTA by referring to TIM information included in the beacon signal isdefined as a TIM STA.

A TIM STA may verify TIM information and calculate a position thereof toperform channel access from a start point of an allocated slot. A slotmay be allocated to all STAs included in the TIM information or to eachgroup of a plurality of groups into which TIM STAs are divided. Sincedata size and channels involved in transmission may be differentdepending on TIM STAs, time needed to transmit data to a TIM STA mayvary by TIM STA and different numbers of slots may be needed by TIM STA.

Unlike the TIM STA, an STA operating without checking the TIMinformation included in the beacon signal may be defined as a non-TIMSTA. The non-TIM STA may operate without being directed by the TIMinformation. The non-TIM STA may wake up at random time, instead ofreceiving a beacon signal, and transmit a power save-poll (PS-Poll)frame to the AP 110 to verify whether there is buffered data for thenon-TIM STA to receive. Further, the non-TIM STA may wake up at randomtime and transmit a trigger frame to the AP 110 to notify the AP 110that a service period for receiving data from the AP 110 starts. Inaddition, the non-TIM STA may wake up at random time and transmit uplinkdata to the AP 110. A time at which the non-TIM STA wakes up at randomtime and transmits the PS-Poll frame, trigger frame or uplink data framemay overlap with target beacon transmission time (TBTT) at which the AP110 transmits a beacon signal or with an RAW allocated for another STA.The non-TIM STA includes a target wake time (TWT) STA and an unscheduledactive polling STA, wherein the TWT STA includes a null data packet(NDP) paging STA as a scheduled active polling STA.

The AP 110 may protect a resource required by a non-TIM STA from TIMSTAs. For example, the AP 110 may protect a resource needed by a TWTSTA, NDP paging STA and unscheduled active polling STA from TIM STAs.The AP 110 reduces probability of collisions occurring between STAs dueto channel access to save energy consumed by STAs.

FIG. 2 illustrates a field used for indicating a resource allocated fora non-TIM STA according to an embodiment of the present invention.

In detail, FIG. 2 illustrates an example of protecting a resource for aTWT STA or non-TIM STA using a non-TIM RAW indication with respect to anRAW parameter set information element (RPS IE) 210 and an RPS IE 230included in an RAW frame 220. For instance, an RPS IE is RAWinformation, which may include RAW group information, RAW start timeinformation, RAW duration information and slot information.

When the non-TIM RAW indication is set to 1, unnecessary information maybe deleted from the RPS IE. For example, an RAW slot definition field,options field or RAW group field may be deleted from the RPS IE. Anyfield may be deleted, without being particularly limited. When thenon-TIM RAW indication is set to 0, all related fields may be usedwithout deleting any field.

In one embodiment, when the non-TIM RAW indication is set to 1 and theRAW Group field is deleted, STAs other than the TWT STA or non-TIM STAmay not access a channel set in a CH Indication for RAW Duration from aRAW Start Time. The TWT STA may verify the RPS IE 210, and operate atTWT allocated to the TWT STA when the allocated TWT is within the RAWDuration from the RAW Start Time. The non-TIM STA is allowed to accessthe channel at any time.

In another embodiment, when the non-TIM RAW indication is set to 1 andthe RAW Group field is not deleted, an STA does not access a channel ina time period defined in the RPS IE when the STA does not belong to anRAW group defined in the RPS IE.

A method of using the non-TIM RAW indication is extended for anunscheduled active polling STA as follows. Since an unscheduled activepolling STA is allowed to operate from an association operation when theSTA notifies the AP that the STA is a non-TIM STA and receivespermission for non-TIM support from the AP, the AP may group andseparately manage non-TIM STAs by association identifier (AID). The APmay schedule an RAW for an unscheduled active polling STA in advance,and notify the STA of time of the RAW to conduct data transmission whenthe unscheduled active polling STA wakes up and succeeds in accessing achannel.

FIG. 3 illustrates a configuration of an AP according to an embodimentof the present invention.

The AP 310 may transmit a beacon signal to STAs. The AP 310 mayperiodically broadcast a beacon signal, wherein the beacon signal mayinclude information on a BSS managed by the AP 310. An STA may stand byto receive the beacon signal and acquire network information from thebeacon signal. Alternatively, the STA may actively broadcast a proberequest frame to request network information from the AP 310 receivingthe probe request frame. The AP 310 receiving the probe request framemay include network information in a probe response frame to transmitthe probe response frame to the STA.

The beacon signal may include TIM information. The TIM information mayinclude information indicating to which STA the AP 310 transmits data.Among STAs, an STA determining whether data is transmitted to the STAand determining whether to wake up or to operate in sleep mode based onthe TIM information in the beacon signal is defined as a TIM STA 350. Onthe contrary, an STA not referring to the TIM information in the beaconsignal is defined as a non-TIM STA 340. The TIM STA 350 may checkbuffered downlink data through the beacon signal transmitted from the AP310, and the non-TIM STA 340 may not check the beacon signal andbuffered downlink data.

The non-TIM STA 340 may include a scheduled active polling STA which isallocated a slot for performing channel access by request to the AP 310and performs channel access in the allocated slot, an unscheduled activepolling STA which performs channel access without being allocated aslot, or an STA which performs power saving through NDP paging.

The AP 310 may protect a resource for the non-TIM STA 340 from the TIMSTA 350. For example, the AP 310 may protect the resource for thenon-TIM STA 340 using an RAW. The AP 310 may set the resource to protectfor the non-TIM STA 340 as an RAW and transmit a beacon signal includinginformation on the RAW. The TIM STA 350 receiving the beacon signalidentifies a time period protected by the RAW based on the RAWinformation included in the beacon signal and does not perform channelaccess in the time period, thereby preventing collisions between thenon-TIM STA 340 and the TIM STA 350.

The AP 310 may transmit the RAW information for the non-TIM STA 340 byincluding in an RPS IE of the beacon signal. The RAW allocated toprotect the resource for the non-TIM STA 340 is referred to as a non-TIMRAW. Non-TIM RAW allocation information is included in the RPS IE of thebeacon signal, and the TIM STA 350 receiving the beacon signal does notperform channel access in the time period allocated as the non-TIM RAWbased on the non-TIM RAW allocation information included in the RPS IE.For example, the TIM STA 350 may set an entire time period of thenon-TIM RAW as a network allocation vector (NAV) and implement virtualcarrier sensing (CS) to set a channel as being busy. Accordingly, theTIM STA 350 is not in contention to access the channel with other STAs,thereby reducing power consumption of the STA.

Referring to FIG. 3, the AP 310 may include a controller 320 and acommunication unit 330.

The AP 310 may conduct a setup process with the non-TIM STA 340 toprotect the resource for the non-TIM STA 340 (or first STA) from the TIMSTA 350 (or second STA). The controller 320 may control the setupprocess with the non-TIM STA 340, and the communication unit 330 mayperform communications with the non-TIM STA 340. The communication unit330 may receive request data for resource protection from the non-TIMSTA 340, and the controller 320 may generate resource allocationinformation for protecting the resource for the non-TIM STA 340 notreferring to the TIM information from the TIM STA 350 referring to theTIM information when the request data is received. The communicationunit 330 may broadcast the determined resource allocation information.The resource allocation information may be transmitted, being includedin the beacon signal.

The controller 320 may determine resource allocation information forrestricting channel access of the TIM STA 350 in a time period forchannel access of the non-TIM STA 340. For instance, the resourceallocation information may include the RAW information for protectingthe resource for the non-TIM STA 340. The TIM STA 350 may receive thebeacon signal and acquire the RAW information allocated for the non-TIMSTA 340 by referring to the resource allocation information included inthe beacon signal. The TIM STA 350 may not perform channel access in thetime period corresponding to the RAW allocated for the non-TIM STA 340.

The AP 310 may perform the setup process with the non-TIM STA 340 firstto generate the resource allocation information for protecting theresource for the non-TIM STA 340, thereby determining whether to protectthe resource or determining a resource to protect.

Although a setup process between the AP 310 and a TWT STA or unscheduledactive polling STA as the non-TIM STA 340 is illustrated below, thescope of the present invention is not constructed as being limitedthereto.

<Setup Process Between AP 310 and TWT STA According to One Embodiment>

According to one embodiment, the setup process between the AP 310 and aTWT STA may be performed on the basis of a setting in a capability fieldof an 802.11 management frame. First, a dot11RAWOptionActivated field isset to 1 so that the AP 310 performs protection through an RAW.

The capability field may be divided into two fields depending on whethera resource to protect is for a TWT STA which supports TWT or for anunscheduled active polling STA not supporting TWT. In a case where theresource to protect is for the TWT STA, when a TWT support field is setto 1, the controller 320 may set a TWT protection support field to 1 inorder to support protection of the resource for the TWT STA. In a casewhere the resource to protect is for the unscheduled active polling STA,when a non-TIM support field is set to 1, the controller 320 may set anon-TIM protection support field to 1 in order to support a function ofprotecting the resource for channel access of the unscheduled activepolling STA from the TIM STA 350.

The TWT STA may also set up a capability field in a similar manner tothat by the AP 310. To protect the resource for the TWT STA, the TWT STAmay set a TWT protection support field to 1 when a TWT support field isset to 1. When the unscheduled active polling STA intends to requestprotection of the resource to the AP 310 so as to reduce collisions inchannel access, the unscheduled active polling STA sets a non-TIMprotection support field to 1 when a non-TIM support field is set to 1and the TWT support field is set to 0.

In either of the two aforementioned cases, the TWT STA capable ofrequesting resource protection may request resource protection to the AP310 capable of supporting resource protection. The TWT STA may transmitrequest data for resource protection to the AP 310 to request resourceprotection. The controller 320 may set the resource requested by the TWTSTA as an RAW to protect. The request data for resource protection mayinclude a capability field, a bit value of which may indicate whetherthe TWT STA requests resource protection. For instance, the TWT STA mayset a TWT protection support capability field or Non-TIM protectionsupport capability field of a capability element included in anassociation request frame or reassociation request frame to 1, therebynotifying the AP 310 that a request for resource protection is made.

When the request data for resource protection is received from thenon-TIM STA 340, the controller 320 may determine resource allocationinformation setting a resource in a time period requested by the non-TIMSTA 340 for protection as an RAW. When the request data for resourceprotection is received from the non-TIM STA 340, the communication unit330 may transmit, to the non-TIM STA 340, response data indicatingwhether protection of the resource requested by the non-TIM STA 340 ispossible in response to the request data.

For example, when the communication unit 330 receives a frame with a TWTprotection support capability field set to 1 from the TWT STA, thecontroller 320 may set a TWT service period (SP) of the TWT STAtransmitting the frame as an RAW to protect the resource for the TWTSTA. The controller 320 may protect all TWT service period of the TWTSTA through the RAW.

Alternatively, when the communication unit 330 receives a frame with anon-TIM protection support capability set to 1 from the TWT STA, aduration value indicating wakeup time of the TWT STA in a responseacknowledgement (ACK) frame to a PS-Poll frame with a pill typesub-field of a frame control field set to 3 transmitted by the TWT STAat random time may be set to indicate a time after TBTT at which abeacon signal including an RPS IE indicating protection through an RAWis transmitted. Accordingly, channel access of the TIM STA 350 the BSSis not allowed at least during a transmission opportunity (TxOP) afterthe duration value.

Also, when a bit of one integrated field (for example, RAW protectioncapability) of two fields of the AP 310 is set to 1, resources for theTWT STA and the non-TIM STA 340 are protected through an RAW. When a bitof one integrated field of the non-TIM STA 340 is set to 1, RAWprotection is requested depending on non-TIM/TWT support of the STA.

The TWT STA may identify whether the AP 310 supports RAW protectionthrough a beacon signal or probe response frame of the AP 310, and theTWT STA may use an identification result to select an AP 310 which theTWT STA is associated with in an association process with the AP 310.Also, the AP 310 may not need to negotiate with the TWT STA for whetherto protect a resource whenever setting a TWT.

<Setup Process Between AP 310 and TWT STA According to AnotherEmbodiment>

According to another embodiment, a request for resource protection isnot maintained since the request is made once by the TWT STA through acapability field of an IEEE 802.11 management frame, but the TWT STA mayreport whether to protect a resource whenever requesting the resource.The TWT STA may request resource protection by TWT and notify the AP 310whether a resource is protected. The AP 310 may implicitly determinethat RAW capability is set.

When the TWT STA requests a TWT resource to the AP 310, the TWT STA mayalso request protection of the resource. The TWT STA may transmit a bitvalue indicating whether protection of the resource is requested to theAP 310 whenever requesting the resource. The AP 310 may transmit, to theTWT STA, a bit value indicating whether the resource requested by theTWT STA is protected, being included in TWT response data (or responseframe). That is, when the AP 310 receives the request for the resourcefrom the TWT STA, the communication unit 330 may transmit the responsedata indicating whether the resource requested by the TWT STA isprotected to the TWT STA. When the AP 310 determines to protect theresource requested by the TWT STA, the AP 310 may determine resourceallocation information for protecting the resource requested by the TWTSTA from a TIM STA.

The AP 310 needs to perform TWT negotiations with the TWT STA based ontraffic properties, such as periodicity, latency and service period, inwhich a request for resource protection may change depending on TWTnegotiations. In addition, it may also change whether the AP 310 is ableto perform protection of new TWT. As the TWT STA requests resourceprotection if needed and the AP 310 protects the resource for the TWTSTA considering circumstances, flexible scheduling is possible and a TWTsetting desired by the TWT STA may be reflected.

To this end, control data indicating whether resource protection isrequested may be used. The communication unit 330 may receive controldata indicating whether resource protection is requested from the TWTSTA. The controller 320 may determine whether the TWT STA requestsresource protection on the basis of the received control data. When theTWT STA requests resource protection and the controller 320 determinesto protect the resource in a time period requested by the TWT STA forprotection, the controller 320 may determine resource allocationinformation which sets the resource in the time period as an RAW forprotection. When the control data indicating whether resource protectionis requested is received from the TWT STA, the communication unit 330may transmit, to the TWT STA, TWT response data indicating a guaranteeof protecting the resource requested by the TWT STA through the RAW orTWT response data indicating that the resource requested by the TWT STAmay not be protect.

For example, when the TWT STA requests TWT to the AP 310, 1 bit of acontrol field of a TWT element shown in FIG. 5 may be defined as an RAWprotection bit. FIG. 5 illustrates a format of the control field of theTWT element, wherein one bit of reserved bits of the control field maybe defined as the RAW protection bit. When the bit is set to 1, thecontroller 320 may determine that the TWT STA requests not only a TWTresource but also protection of the resource through the RAW. When thebit is set to 0, the controller 320 may determine that the TWT STA doesnot request protection of the TWT resource through the RAW. Thecommunication unit 330 may define a bit value indicating whether theresource requested by the TWT STA is protected in the TWT control fieldof the TWT element and transmit TWT response data including the TWTcontrol field to the TWT STA.

Alternatively, when the TWT STA requests TWT to the AP 310, one bit of arequest type field of the TWT element may be defined as an RAWprotection bit. When the bit is set to 1, the controller 320 maydetermine that the TWT STA requests not only a TWT resource but alsoprotection of the resource through the RAW. When the bit is set to 0,the controller 320 may determine that the TWT STA does not requestprotection of the TWT resource through the RAW. The communication unit330 may define a bit value indicating whether the resource requested bythe TWT STA is protected in the TWT request field of the TWT element andtransmit TWT response data including the TWT request field to the TWTSTA.

The TWT STA requesting the TWT resource may set the RAW protection bitof the TWT element to 1 so as to request protection of the resourcealong with the resource to the AP 310. When the AP 310 receives the TWTelement with the RAW protection bit set to 1 from the TWT STA, thecontroller 320 may determine whether to protect the resource requestedby the TWT and the communication unit 330 may transmit TWT response data(or response frame) defining the bit value indicating whether theresource requested by the TWT STA is protected to the TWT STA. When thebit value defined in the TWT response data is 1, the resource requestedby the TWT STA through the TWT element is guaranteed to be protected.When the bit value is 0, the resource requested by the TWT STA may notbe protected. When the controller 320 determines to protect the resourcerequested by the TWT STA, the controller 320 may protect the resourcerequested by the TWT STA (for example, a time period from TWT to aspecific time) as an RAW and prevent a TIM STA from accessing theresource. Information on the RAW may be included and broadcasted in theresource allocation information.

The TWT STA requesting the TWT resource may set the RAW protection bitof the TWT element to 0 in order to notify the AP 310 that it isunnecessary to protect the resource requested by the TWT STA. When theAP 310 receives the TWT element from the TWT STA, the AP 310 maytransmit, to the TWT STA, TWT response data (or response frame)indicating whether the resource requested by the TWT STA is protected bythe RAW. The response data may include a bit value indicating whetherthe resource requested by the TWT STA is protected, wherein the bitvalue equal to 1 indicates that the resource requested by the TWT STAthrough the TWT element is guaranteed to be protected and the bit valueequal to 0 indicates that the resource requested by the TWT STA may notbe protected.

A case where the TWT STA requesting the TWT resource sets the RAWprotection bit may be considered different from a case where the AP 310sets the RAW protection bit. The non-TIM STA 340 sets the RAW protectionbit to 1 so as to request that TWT be set considering protection of aTWT parameter preferentially when RAW protection is not performed withthe TWT parameter requested to the AP 310 being satisfied, in additionto a request of the TWT STA for RAW protection to the AP 310. The TWTSTA sets the RAW protection bit to 0 in order to request that TWT be setconsidering a TWT parameter preferentially rather than RAW protection.

<Setup Process Between AP 310 and TWT STA According to Still AnotherEmbodiment>

According to still another embodiment, the AP 310 capable of performingRAW protection may set a capability field to notify the TWT STA whetherresource protection is possible, and the TWT STA requesting RAWprotection may notify the AP 310 whether resource protection isrequested. The TWT STA may use a value of the capability field to selectan AP 310 that the TWT STA is associated with. After associated with theAP 310, the TWT STA setting an RAW protection capability field to 1 maybasically request TWT protection whenever setting TWT. When requestedTWT is not allocated by the AP 310, the TWT STA may prioritize TWTprotection and a TWT parameter for protection. The TWT STA setting theRAW protection capability field to 0 may operate in the same manner asat a conventional TWT setting, without considering TWT protection whensetting TWT. Thus, RAW protection setting negotiations other than afirst negotiation may be performed under a condition that both the AP310 and the TWT STA set the capability field to 1.

<Setup Process Between AP 310 and Unscheduled Active Polling STAAccording to One Embodiment>

RAW protection mentioned above may be also applied to a time periodallocated by the AP 310 for channel access of an unscheduled activepolling STA in addition to the TWT STA. The unscheduled active pollingSTA may request duration including up to time to reschedule anawake/doze cycle of the STA while transmitting a PS-Poll frame to the AP310. For example, the requested duration may be a time period includingup to TBTT of a beacon signal for acquiring necessary information or upto a service period for exchanging data. The unscheduled active pollingSTA receiving a response frame including the time period is in dozemode, without conducting channel access, for the time period and wakesup after the time period to conduct channel access.

The controller 320 may verify the request from the unscheduled activepolling STA on the basis of a value of a poll type subfield of a framecontrol field of the PS-Poll frame. The unscheduled active polling STAmay first request time period information including up to a serviceperiod to schedule as a response frame, simultaneously with transmittinga PS-Poll frame with a poll type set to 3 to request rescheduling of theawake/doze cycle. When the unscheduled active polling STA setting anon-TIM support field to 1 requests a PS-Poll frame with a poll typevalue of 3, the controller 320 may perform RAW protection to protect theservice period through an RAW. To this end, the controller 320 mayadjust a start point of the service period after TBTT at which thebeacon signal is transmitted. Here, the beacon signal may include an RPSIE signaling the RAW including the service period. If adjusting thestart point is impossible, the controller 320 may report time in the RAWindicated already in the RPS IE as the start point of the serviceperiod. In this case, for example, although the unscheduled activepolling STA may be in contention with other TWT STAs, the controller 320may reschedule the service period expected to involve less contention.

When the AP 310 delays allocating a resource for the unscheduled activepolling STA and thus is unable to perform RAW protection, the AP 310 maynotify the unscheduled active polling STA that RAW protection is notperformed. For example, the controller 320 may notify the unscheduledactive polling STA whether RAW protection is performed through any oneof reserved bits of an NDP ACK frame and NOD modified ACK frame. Thecontroller 320 may set the bit to 1 to indicate that RAW protection isperformed and set the bit to 0 to indicate that RAW protection is notperformed.

FIG. 4 illustrates a configuration of an STA according to an embodimentof the present invention.

The STA 410 of FIG. 4 may be a non-TIM STA performing channel access toan AP 440 without referring to TIM information. Referring to FIG. 4, theSTA 410 may include a controller 420 and a communication unit 430.

The controller 420 may generate request data for requesting resourceprotection to the AP 440. In one embodiment, the request data mayinclude a capability field of an 802.11 management frame, and thecontroller 420 may indicate whether to request resource protection tothe AP 440 through a bit value of the capability field. Thecommunication unit 430 may transmit the generated request data to the AP440. The communication unit 430 may receive response data indicatingwhether resource protection is possible from the AP 440 in response tothe request data. When the STA 410 requests a resource and protection ofthe resource together, the AP 440 may generate resource allocationinformation setting the requested resource as an RAW and broadcast thegenerated resource allocation information. The resource allocationinformation generated by the AP 440 may be broadcasted, being includedin a beacon signal transmitted by the AP 440, and the TIM STA receivingthe resource allocation information does not perform channel access inan RAW period set by the AP 440.

Alternatively, the STA 410 may be a TWT STA and request protection of aTWT resource to the AP 440 whenever requesting the TWT resource to theAP 440. When a request for the resource is made to the AP, thecontroller 420 may generate request data including a bit valueindicating whether protection of the resource is requested. The bitvalue indicating whether protection of the TWT resource is requested maybe transmitted, being included in a control field or request type fieldof a TWT element. The communication unit 430 may receive response dataindicating whether the resource requested by the STA 410 is protectedfrom the AP 440. The controller 420 may identify whether the resourcerequested by the STA 410 is protected on the basis of the response datareceived from the AP 440.

The STA 410 of FIG. 4 corresponds to the non-TIM STA 340 of FIG. 3, anddescription of the STA 410 not mentioned herein may refer to relateddescription of FIG. 3.

FIG. 6 is a flowchart illustrating a channel access control methodaccording to an embodiment of the present invention.

In operation 610, an AP may determine resource allocation informationfor protecting a resource for a non-TIM STA from a TIM STA. The AP mayperform a setup process with the non-TIM STA to protect the resource forthe non-TIM STA. The AP may determine whether to protect the resource ordetermine a resource to protect through the setup process with thenon-TIM STA. The setup process between the AP and the non-TIM STA hasbeen described above with reference to FIG. 3.

The AP may determine resource allocation information for restrictingchannel access of the TIM STA in a time period for channel access of thenon-TIM STA. For instance, the resource allocation information mayinclude information on an RAW for protecting the resource for thenon-TIM STA. The AP may receive request data for resource protectionfrom the non-TIM STA. When the request data is received, the AP maygenerate the resource allocation information for protecting the resourcefor the non-TIM STA not referring to TIM information from the TIM STAreferring to the TIM information.

In operation 620, the AP may broadcast the resource allocationinformation determined in operation 610. The resource allocationinformation may be transmitted, being included in a beacon signal. TheTIM STA may receive the beacon signal from the AP and acquire the RAWinformation allocated for the non-TIM STA by referring to the resourceallocation information included in the beacon signal. The TIM STA doesnot perform channel access in the time period corresponding to the RAWallocated for the non-TIM STA, thereby reducing unnecessary powerconsumption.

The example embodiments described herein may be implemented usinghardware components and software components. For example, the hardwarecomponents may include microphones, amplifiers, band-pass filters, audioto digital convertors, and processing devices. A processing device maybe implemented using one or more general-purpose or special purposecomputers, such as, for example, a processor, a controller and anarithmetic logic unit, a digital signal processor, a microcomputer, afield programmable array, a programmable logic unit, a microprocessor orany other device capable of responding to and executing instructions ina defined manner. The processing device may run an operating system (OS)and one or more software applications that run on the OS. The processingdevice also may access, store, manipulate, process, and create data inresponse to execution of the software. For purpose of simplicity, thedescription of a processing device is used as singular; however, oneskilled in the art will appreciated that a processing device may includemultiple processing elements and multiple types of processing elements.For example, a processing device may include multiple processors or aprocessor and a controller. In addition, different processingconfigurations are possible, such a parallel processors.

The software may include a computer program, a piece of code, aninstruction, or some combination thereof, to independently orcollectively instruct or configure the processing device to operate asdesired. Software and data may be embodied permanently or temporarily inany type of machine, component, physical or virtual equipment, computerstorage medium or device, or in a propagated signal wave capable ofproviding instructions or data to or being interpreted by the processingdevice. The software also may be distributed over network coupledcomputer systems so that the software is stored and executed in adistributed fashion. The software and data may be stored by one or morenon-transitory computer readable recording mediums.

The methods described above can be written as a computer program, apiece of code, an instruction, or some combination thereof, forindependently or collectively instructing or configuring the processingdevice to operate as desired. Software and data may be embodiedpermanently or temporarily in any type of machine, component, physicalor virtual equipment, computer storage medium or device that is capableof providing instructions or data to or being interpreted by theprocessing device. The software also may be distributed over networkcoupled computer systems so that the software is stored and executed ina distributed fashion. In particular, the software and data may bestored by one or more non-transitory computer readable recordingmediums. The non-transitory computer readable recording medium mayinclude any data storage device that can store data that can bethereafter read by a computer system or processing device. Examples ofthe non-transitory computer readable recording medium include read-onlymemory (ROM), random-access memory (RAM), Compact Disc Read-only Memory(CD-ROMs), magnetic tapes, USBs, floppy disks, hard disks, opticalrecording media (e.g., CD-ROMs, or DVDs), and PC interfaces (e.g., PCI,PCI-express, WiFi, etc.). In addition, functional programs, codes, andcode segments for accomplishing the example disclosed herein can beconstrued by programmers skilled in the art based on the flow diagramsand block diagrams of the figures and their corresponding descriptionsas provided herein.

A number of examples have been described above. Nevertheless, it shouldbe understood that various modifications may be made. For example,suitable results may be achieved if the described techniques areperformed in a different order and/or if components in a describedsystem, architecture, device, or circuit are combined in a differentmanner and/or replaced or supplemented by other components or theirequivalents. Accordingly, other implementations are within the scope ofthe following claims.

1. A method of controlling channel access performed by an access point(AP) in a wireless local area network (WLAN) system, the methodcomprising: receiving, from a station (STA), a request frame comprisinga bit value indicating whether protection of a resource for a targetwake time (TWT) is requested to the AP, wherein the bit value of therequest frame is a first value when the STA requests the protection ofthe resource for the TWT; determining whether the protection of theresource for the TWT when the bit value of the request frame is thefirst value; and transmitting, to the STA, a response frame comprising abit value indicating whether the resource for the TWT is to beprotected, in response to receiving the request for the protecting theresource.
 2. The method of claim 1, wherein the bit value of the requestframe is a second value when the STA does not request the protection ofthe resource for the TWT.
 3. The method of claim 1, wherein when the bitvalue of the response frame is a first value, the bit value of theresponse frame indicates the resource is to be protected by allocating arestricted access window (RAW).
 4. The method of claim 1, wherein whenthe bit value of the response frame is a second value, the bit value ofthe response frame indicates the resource may not be protected.
 5. Themethod of claim 1, further comprising: allocating a restricted accesswindow (RAW) for protecting a TWT service period of the STA in responseto receiving the request for the protecting the resource from the STA.6. The method of claim 5, further comprising: transmitting a beaconsignal comprising information on the allocated RAW.
 7. The method ofclaim 5, wherein the allocated RAW is to restrict channel access of atraffic indication map (TIM) STA, the TIM STA is a STA checking the TIMinformation.
 8. A method of controlling channel access performed by astation (STA) in a wireless local area network (WLAN) system, the methodcomprising: transmitting, to an access point (AP), a request framecomprising a bit value indicating whether protection of a resource for atarget wake time (TWT) is requested to the AP, wherein the bit value ofthe request frame is a first value when the STA requests the protectionof the resource; wherein whether the protection of the resource for theTWT is determined by the AP when the bit value of the request frame isthe first value; and receiving, from the AP, a response frame comprisinga bit value indicating whether the resource for the TWT is to beprotected, in response to receiving the request for the protecting theresource.
 9. The method of claim 8, wherein the bit value of the requestframe is a second value when the STA does not request the protection ofthe resource.
 10. The method of claim 9, wherein the first value of thebit value of the request frame is 1, and the second value of the bitvalue of the request frame is
 0. 11. The method of claim 9, wherein theSTA sets the bit value of the request frame to the first value when theSTA discovers the AP guaranteeing the protection of the resource for theTWT.
 12. The method of claim 9, wherein the request frame and theresponse frame are exchanged when the STA negotiates with the AP to setthe protection of the resource for the TWT
 13. The method of claim 8,wherein when the bit value of the response frame is a first value, thebit value of the response frame indicates the resource is to beprotected by allocating a restricted access window (RAW), and whereinwhen the bit value of the response frame is a second value, the bitvalue of the response frame indicates the resource may not be protected.14. The method of claim 8, wherein the AP allocates a restricted accesswindow (RAW) for protecting a TWT service period of the STA in responseto receiving the request for the protecting the resource from the STA.15. An access point (AP) comprising: a processor configured to: receive,from a station (STA), a request frame comprising a bit value indicatingwhether protection of a resource for a target wake time (TWT) isrequested to the AP, wherein the bit value of the request frame is afirst value when the STA requests the protection of the resource,determine whether the protection of the resource for the TWT when thebit value of the request frame is the first value, and transmit, to theSTA, a response frame comprising a bit value indicating whether theresource for the TWT is to be protected, in response to receiving therequest for the protecting the resource.
 16. A station (STA) comprising:a processor configured to: transmit, to an access point (AP), a requestframe comprising a bit value indicating whether protection of a resourcefor a target wake time (TWT) is requested to the AP, wherein the bitvalue of the request frame is a first value when the STA requests theprotection of the resource; wherein whether the protection of theresource for the TWT is determined by the AP when the bit value of therequest frame is the first value, and receive, from the AP, a responseframe comprising a bit value indicating whether the resource for the TWTis to be protected, in response to receiving the request for theprotecting the resource.