Patent application number | Description | Published |
20090201901 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND COMPUTER PROGRAM - Random access operation is performed under a communication environment in which a plurality of communication modes having different transmission rate coexist with small overhead. A high-grade communication station spoofs information of a packet length and a rate in a decoding portion so that a value of (packet length)/(rate) corresponds to a duration where the communication is hoped to be stopped. The other station receiving the spoofed information receives the rest of the packet with the designated rate during the interval designated by the value of (packet length)/(rate). In this case, the packet length and the rate are not those of actually transmitted packet so that this packet is discarded. | 08-13-2009 |
20100208713 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND COMPUTER PROGRAM - Random access operation is performed under a communication environment in which a plurality of communication modes having different transmission rate coexist with small overhead. A high-grade communication station spoofs information of a packet length and a rate in a decoding portion so that a value of (packet length)/(rate) corresponds to a duration where the communication is hoped to be stopped. The other station receiving the spoofed information receives the rest of the packet with the designated rate during the interval designated by the value of (packet length)/(rate). In this case, the packet length and the rate are not those of actually transmitted packet so that this packet is discarded. | 08-19-2010 |
20100208714 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND COMPUTER PROGRAM - Random access operation is performed under a communication environment in which a plurality of communication modes having different transmission rate coexist with small overhead. A high-grade communication station spoofs information of a packet length and a rate in a decoding portion so that a value of (packet length)/(rate) corresponds to a duration where the communication is hoped to be stopped. The other station receiving the spoofed information receives the rest of the packet with the designated rate during the interval designated by the value of (packet length)/(rate). In this case, the packet length and the rate are not those of actually transmitted packet so that this packet is discarded. | 08-19-2010 |
20100290421 | DECENTRALIZED WIRELESS COMMUNICATION SYSTEM, APPARATUS, AND ASSOCIATED METHODOLOGY - Communication stations select the channel which as many communication stations as possible can receive as a beacon sending channel based on interference information of each channel specified in a beacon signal. When there is a communication station which cannot receive a beacon, the beacon sending channel is changed. The communication stations can receive a beacon from all other communication stations by performing beacon receiving operation over a particular channel, avoiding the deadlock state. | 11-18-2010 |
20120243522 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND COMPUTER PROGRAM - Random access operation is performed under a communication environment in which a plurality of communication modes having different transmission rate coexist with small overhead. A high-grade communication station spoofs information of a packet length and a rate in a decoding portion so that a value of (packet length)/(rate) corresponds to a duration where the communication is hoped to be stopped. The other station receiving the spoofed information receives the rest of the packet with the designated rate during the interval designated by the value of (packet length)/(rate). In this case, the packet length and the rate are not those of actually transmitted packet so that this packet is discarded. | 09-27-2012 |
20130242970 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND COMPUTER PROGRAM - Random access operation is performed under a communication environment in which a plurality of communication modes having different transmission rate coexist with small overhead. A high-grade communication station spoofs information of a packet length and a rate in a decoding portion so that a value of (packet length)/(rate) corresponds to a duration where the communication is hoped to be stopped. The other station receiving the spoofed information receives the rest of the packet with the designated rate during the interval designated by the value of (packet length)/(rate). In this case, the packet length and the rate are not those of actually transmitted packet so that this packet is discarded. | 09-19-2013 |
20130322420 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND COMPUTER PROGRAM - Random access operation is performed under a communication environment in which a plurality of communication modes having different transmission rate coexist with small overhead. A high-grade communication station spoofs information of a packet length and a rate in a decoding portion so that a value of (packet length)/(rate) corresponds to a duration where the communication is hoped to be stopped. The other station receiving the spoofed information receives the rest of the packet with the designated rate during the interval designated by the value of (packet length)/(rate). In this case, the packet length and the rate are not those of actually transmitted packet so that this packet is discarded. | 12-05-2013 |
20130322421 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND COMPUTER PROGRAM - Random access operation is performed under a communication environment in which a plurality of communication modes having different transmission rate coexist with small overhead. A high-grade communication station spoofs information of a packet length and a rate in a decoding portion so that a value of (packet length)/(rate) corresponds to a duration where the communication is hoped to be stopped. The other station receiving the spoofed information receives the rest of the packet with the designated rate during the interval designated by the value of (packet length)/(rate). In this case, the packet length and the rate are not those of actually transmitted packet so that this packet is discarded. | 12-05-2013 |
20130329641 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND COMPUTER PROGRAM - Random access operation is performed under a communication environment in which a plurality of communication modes having different transmission rate coexist with small overhead. A high-grade communication station spoofs information of a packet length and a rate in a decoding portion so that a value of (packet length)/(rate) corresponds to a duration where the communication is hoped to be stopped. The other station receiving the spoofed information receives the rest of the packet with the designated rate during the interval designated by the value of (packet length)/(rate). In this case, the packet length and the rate are not those of actually transmitted packet so that this packet is discarded. | 12-12-2013 |
20130329716 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND COMPUTER PROGRAM - Random access operation is performed under a communication environment in which a plurality of communication modes having different transmission rate coexist with small overhead. A high-grade communication station spoofs information of a packet length and a rate in a decoding portion so that a value of (packet length)/(rate) corresponds to a duration where the communication is hoped to be stopped. The other station receiving the spoofed information receives the rest of the packet with the designated rate during the interval designated by the value of (packet length)/(rate). In this case, the packet length and the rate are not those of actually transmitted packet so that this packet is discarded. | 12-12-2013 |
20130329717 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND COMPUTER PROGRAM - Random access operation is performed under a communication environment in which a plurality of communication modes having different transmission rate coexist with small overhead. A high-grade communication station spoofs information of a packet length and a rate in a decoding portion so that a value of (packet length)/(rate) corresponds to a duration where the communication is hoped to be stopped. The other station receiving the spoofed information receives the rest of the packet with the designated rate during the interval designated by the value of (packet length)/(rate). In this case, the packet length and the rate are not those of actually transmitted packet so that this packet is discarded. | 12-12-2013 |
20130329827 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND COMPUTER PROGRAM - Random access operation is performed under a communication environment in which a plurality of communication modes having different transmission rate coexist with small overhead. A high-grade communication station spoofs information of a packet length and a rate in a decoding portion so that a value of (packet length)/(rate) corresponds to a duration where the communication is hoped to be stopped. The other station receiving the spoofed information receives the rest of the packet with the designated rate during the interval designated by the value of (packet length)/(rate). In this case, the packet length and the rate are not those of actually transmitted packet so that this packet is discarded. | 12-12-2013 |
20140362844 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND COMPUTER PROGRAM - Random access operation is performed under a communication environment in which a plurality of communication modes having different transmission rate coexist with small overhead. A high-grade communication station spoofs information of a packet length and a rate in a decoding portion so that a value of (packet length)/(rate) corresponds to a duration where the communication is hoped to be stopped. The other station receiving the spoofed information receives the rest of the packet with the designated rate during the interval designated by the value of (packet length)/(rate). In this case, the packet length and the rate are not those of actually transmitted packet so that this packet is discarded. | 12-11-2014 |