Scheduling method for uplink and downlink of an optical transmission system

10461860 ยท 2019-10-29

Assignee

Inventors

Cpc classification

International classification

Abstract

A method of allocating transmission time slots in an optical wireless system. Resources are allocated taking account of asymmetry of interference diagrams on uplink and downlink and adopting reuse of transmission intervals for each channel, in areas in which there is no interference. In some embodiments, the allocation method allows for relaying between access points through the network to take account of the fact that the access point providing the best uplink (or downlink) can be distinct from the access point associated with the terminal.

Claims

1. A method of allocating transmission time slots in an optical wireless system including (1) a plurality of access points each having a corresponding access point identifier, connected to a wired network and controlled by a network controller, and (2) a plurality of terminals, each having a corresponding terminal identifier, the method comprising: associating an access point among said plurality of access points with each terminal of the plurality of terminals, such that an average quality of an uplink and a downlink between the associated access point and said each terminal is maximum; determining, via each terminal of the plurality of terminals associated with each of the plurality of access points, coverage information containing access point identifiers of access points of the plurality of access points received by the each terminal; and allocating downlink transmission time slots to each terminal of the plurality of terminals according to: when the coverage information of the each terminal includes only the access point identifier of the associated access point associated with the each terminal, allocating via the associated access point a downlink transmission time slot to the downlink between the each terminal and its associated access point, within an available time range managed by the network controller (CFP.sub.free.sup.down(AP.sub.n)); when the coverage information of the each terminal includes a plurality of the access point identifiers, allocating via the network controller a downlink transmission time slot to the downlink between the each terminal and its associated access point, within an available time range (CFP.sub.free.sup.down(AP.sub.n)) and correspondingly eliminating the downlink transmission time slot thus allocated from the available time ranges of access points belonging to the coverage information of the each terminal.

2. The method of allocating transmission time slots according to claim 1, further comprising: receiving, by each access point of the plurality of access points, reception information containing terminal identifiers of terminals of the plurality of terminals that can transmit to the each access point; and allocating uplink transmission time slots to each terminal of the plurality of terminals according to: when the terminal identifier of the each terminal only appears in the reception information of its associated access point, allocating, by the associated access point, an uplink time slot to the uplink between the each terminal and its associated access point, within an available time range managed by the network controller (CFP.sub.free.sup.up(AP.sub.n)); when the terminal identifier of the each terminal appears in a plurality of items of reception information, allocating, by the network controller, an uplink transmission time slot to the uplink between the each terminal and its associated access point, within an available time range (CFP.sub.free.sup.up(AP.sub.n)) and eliminating the downlink transmission time slot thus allocated from available time ranges for all access points of the plurality of access points containing the terminal identifier of the each terminal in their reception information.

3. A method of allocating transmission time slots in an optical wireless system including (1) a plurality of access points each having a corresponding access point identifier, connected to a wired network, and controlled by a network controller, and (2) a plurality of terminals each having a corresponding terminal identifier, the method comprising: associating an access point among said plurality of access points with each terminal of the plurality of terminals, such that a quality of an uplink between said each terminal and the associated access point is maximum; determining, via each terminal of the plurality of terminals associated with each of the plurality of access points, coverage information containing access point identifiers received by the each terminal and quality indicators of downlinks with access points corresponding to the access point identifiers, said coverage information being forwarded to the network controller through the access points corresponding to the access point identifiers; allocating downlink transmission time slots to each terminal of the plurality of terminals according to: when the coverage information of the each terminal includes only the access point identifier of the associated access point associated with the each terminal, allocating via the associated access point a downlink transmission time slot to the downlink between the each terminal and its associated access point, within an available time range managed by the network controller (CFP.sub.free.sup.down(AP.sub.n)); when the coverage information of the each terminal includes a plurality of the access point identifiers: (1) determining via the network controller an auxiliary access point among said plurality of access points such that a quality of the downlink between the auxiliary access point and the each terminal is maximum, the downlink between the associated access point and the each terminal comprising a first link through the wired network between the associated access point and the auxiliary access point and a second link between the auxiliary access point and the each terminal; (2) allocating via the network controller a transmission time slot to the second link, within an available time range (CFP.sub.free.sup.down(AP.sub.n)), and (3) eliminating the time slot thus allocated from available time ranges of access points belonging to the coverage information.

4. A method of allocating transmission time slots in an optical wireless system including (1) a plurality of access points each having a corresponding access point identifier, connected to a wired network, and controlled by a network controller, and (2) a plurality of terminals, each having a corresponding terminal identifier, the method comprising: associating an access point among said plurality of access points with each terminal of the plurality of terminals, such that a quality of a downlink between the associated access point and said each terminal is maximum; determining, via each access point of the plurality of access points, reception information containing terminal identifiers of the plurality of terminal identifiers received by the each access point and quality indicators of an uplink with terminals of the plurality of terminals having terminal identifiers in said reception information, said reception information being transmitted to the network controller; allocating uplink transmission time slots to each terminal of the plurality of terminals according to: when the terminal identifier of the each terminal only appears in the reception information of its associated access point, allocating via the associated access point a transmission time slot to the uplink, within an available time range managed by the network controller (CFP.sub.free.sup.up(AP.sub.n)); when the terminal identifier of the each terminal appears in a plurality of items of access point reception information, determining via the network controller an auxiliary access point among said plurality of access points such that the quality of the uplink between the each terminal and the auxiliary access point is maximum, the uplink between the each terminal and the associated access point comprising a first link between the each terminal and the auxiliary access point and a second link in the wired network between the auxiliary access point and the associated access point.

5. The method of allocating transmission time slots in an optical wireless system according to claim 1, wherein said optical system complies with IEEE standard 802.15.7.

6. The method of allocating transmission time slots in an optical wireless system according to claim 3, wherein said optical system complies with IEEE standard 802.15.7.

7. The method of allocating transmission time slots in an optical wireless system according to claim 4, wherein said optical system complies with IEEE standard 802.15.7.

8. The method of allocating transmission time slots in an optical wireless system according to claim 1, further comprising: transmitting optical signals between the plurality of access points and the plurality of terminals according to the downlink transmission time slots allocated to the plurality of terminals.

9. The method of allocating transmission time slots in an optical wireless system according to claim 2, further comprising: transmitting optical signals between the plurality of terminals and the plurality of access points according to the uplink transmission time slots allocated to the plurality of terminals.

10. The method of allocating transmission time slots in an optical wireless system according to claim 3, further comprising: transmitting optical signals between the plurality of access points and the plurality of terminals according to the downlink transmission time slots allocated to the plurality of terminals.

11. The method of allocating transmission time slots in an optical wireless system according to claim 4, further comprising: transmitting optical signals between the plurality of terminals and the plurality of access points according to the uplink transmission time slots allocated to the plurality of terminals.

Description

BRIEF DESCRIPTION OF THE DRAWINGS

(1) Other features and advantages of the invention will become clear after reading a preferred embodiment of the invention, given with reference to the appended figures among which:

(2) FIGS. 1A and 1B diagrammatically illustrate an example of an optical telecommunication system with asymmetry of interference on the uplink and the downlink.

(3) FIG. 2 diagrammatically shows an optical telecommunication system with a coordinated topology;

(4) FIG. 3 diagrammatically represents the structure of a superframe used in an optical telecommunication system;

(5) FIG. 4A diagrammatically represents an interference diagram between access points of an optical wireless telecommunication system;

(6) FIG. 4B represents an interference graph of access points for the optical wireless telecommunication system in FIG. 4A;

(7) FIG. 4C represents an example allocation of time slots for the optical wireless telecommunication system in FIG. 4A;

(8) FIG. 5 represents the flow chart for allocation of control signal time slots in an optical wireless telecommunication system that can be used in any embodiment of the invention;

(9) FIG. 6A represents the flow chart for a method of allocating time slots for downlinks of an optical wireless telecommunication system, according to a first embodiment of the invention;

(10) FIG. 6B represents flowchart for a method of allocating time slots for uplinks of an optical wireless telecommunication system, according to a first embodiment of the invention;

(11) FIG. 7 represents application of the time slots method according to the first embodiment of the invention, to the optical wireless telecommunication system in FIGS. 1A and 1B;

(12) FIG. 8 represents application of a method of allocating time slots according to a second embodiment of the invention, to the optical wireless telecommunication system in FIGS. 1A and 1B;

(13) FIG. 9 represents application of a method of allocating time slots, according to a third embodiment of the invention, to the optical wireless telecommunication system in FIGS. 1A and 1B.

DETAILED PRESENTATION OF PARTICULAR EMBODIMENTS

(14) We will consider in the following an optical wireless communication system (Li-Fi), as described for example in IEEE standard IEEE 802.15.7r1. This network comprises a plurality of access points connected to a backhaul network.

(15) It is assumed that this network has a central interference management mechanism. As illustrated in FIG. 2, network access points (also called coordinators) 210, are connected to a global controller 250, by means of the backhaul network according to a coordinated topology, in the meaning of the above-mentioned standard. More precisely, each terminal 230 is capable of detecting interference between signals received from two access points and forwarding an interference report (a metric) to the network controller 250, through said access point. Similarly, each access point 210 can analyse the interference level between signals emitted by two terminals and transmit an interference report to the network controller 250. Depending on the interference ratios on the downlink and the uplink, the network controller transmits a time allocation of control signal time slots through the backhaul network, as described in detail below.

(16) In particular, the function of the network controller is to emit superframes through the access points and allocate an access to the medium to them, based on a time division multi-access (TDMA) mechanism.

(17) More precisely, transmission on the uplink/downlink uses a superframe structure like that shown in FIG. 3.

(18) A superframe is delimited by successive beacons emitted by all access points (also called coordinators) synchronously. It is divided into three successive parts: a first part called the control period or beacon period (BP) dedicated to transmission of control messages (on the downlink and on the uplink) and a second part called the Contention Access Period (CAP) in which terminals can transmit at random and a third part called the Contention-Free Period (CFP), itself divided into Guaranteed Time Slots (GTSs) in which terminals and access points can transmit without a risk of access conflict on the uplink and downlink respectively.

(19) Interference management is controlled by the network controller that firstly determines an interference table (or interference matrix) between access points. This interference matrix can be determined in advance starting from a survey of coverage areas during deployment of the different access points or can be built up as progress is made making use of interference reports forwarded by the terminals to the network controller through the access points.

(20) The interference matrix is binary and is symmetrical. For each pair of access points controlled by the network controller, it indicates whether or not there is an intersection of coverage areas of these two access points (either on the uplink or the downlink). The absence or existence of such an intersection is represented by a binary value.

(21) Interference can be detected on the downlink or on the uplink. On the downlink, interference between access points is detected from interference reports from terminals, forwarded to the network controller through these access points. On the uplink, interference is detected as soon as an access point receives a signal from a terminal that is not addressed to it. The interference report is then transmitted by the access point concerned to the network controller. When interference between access points is detected, either on the uplink or on the downlink, this interference is considered to be acquired even if it is no longer observed later. It is understood that this interference will only be detected if a terminal is in the intersection of access point coverage zones. The interference matrix thus keeps a time history trace of interference recorded between access points.

(22) For example, considering the interference diagram between access points AP.sub.1, . . . , AP.sub.6 in FIG. 4A, the interference table will be given by:

(23) TABLE-US-00001 AP.sub.1 AP.sub.2 AP.sub.3 AP.sub.4 AP.sub.5 AP.sub.6 AP.sub.1 X 1 0 1 1 0 AP.sub.2 1 X 1 1 1 1 AP.sub.3 0 1 X 0 1 1 AP.sub.4 1 1 0 X 1 0 AP.sub.5 1 1 1 1 X 1 AP.sub.6 0 1 1 0 1 X

(24) The interference table (or matrix) can be considered as an adjacency matrix of a graph called an incompatibilities graph, the vertices of which are network access points. According to this representation, two interfering access points on the downlink are represented by adjacent vertices in the incompatibilities graph.

(25) FIG. 4B represents the incompatibilities graph corresponding to the interference diagram in FIG. 4A.

(26) The network controller attributes time slots (control signal time slots in the BP part, guaranteed time slots GTS in the CFP part) to the different access points, such that interfering access points are allocated separated time slots. When an access point does not interfere with any of its neighbours, it can allocate itself a time slot autonomously.

(27) Time slots can be allocated by the network controller using a colouring algorithm of the incompatibilities graph. Colouring of a graph means that a colour is attributed to each vertex of the graph, while checking that two adjacent vertices cannot be the same colour. This can be achieved by using an equitable colouring algorithm known in the state of the art, for example the Welsh and Powell algorithm. Such an algorithm can assure that two adjacent vertices of the graph are coloured with different colours as illustrated in FIG. 4B. Advantageously, the number of different colours in the graph will be minimised.

(28) FIG. 4C shows an example allocation of time slots, in accordance with the incompatibilities graph in FIG. 4B. Each row corresponds to an access point and represents a superframe transmitted on the downlink, comprising the BP, CAP and CFP parts. For example, it will be noted that the rows corresponding to access points AP.sub.1 and AP.sub.3 are the same colour: control signals can be transmitted on the downlink simultaneously with any risk of interference. On the other hand, the colour of the row corresponding to access point AP.sub.2 is different from the colour corresponding to access points AP.sub.1 and AP.sub.3. Thus, AP.sub.2 cannot transmit at the same time as AP.sub.1 and AP.sub.3 without the risk of creating interference for terminals located in the coverage area.

(29) Control signal time slots are thus allocated to different access points within the superframe. Thus, for example, access points AP.sub.1 and AP.sub.3 can send their control messages during the first interval BP.sub.1 of BP, access point AP.sub.2 can send in the second interval BP.sub.2 of BP, access points AP.sub.4 and AP.sub.6 can send in the interval BP.sub.3 of BP, and finally access point AP.sub.5 can send in the interval BP.sub.4.

(30) FIG. 5 represents the flow chart for allocation of time slots in an electronic wireless telecommunication system that can be used in any of the embodiments of the invention.

(31) This first phase applies to the allocation of time slots during the control part (BP) of the superframe.

(32) In step 510, interference is detected between access points on the downlink. This detection of interference is done by the network controller from interference reports (on the downlink) forwarded by terminals to the controller through the access points. Interference is also detected between access points on the uplink. This detection of interference is done by the network controller from interference reports (on the uplink) forwarded by these access points.

(33) This step can have been performed for example during deployment of the network.

(34) In step 520, the network controller determines an interference matrix between access points from previously detected interference. Detection of interference between access points on the uplink or the downlink corresponds to a first binary value in the matrix and a lack of interface corresponds to an inverse binary value.

(35) In step 530, the network controller constructs an incompatibilities graph in which the vertices are the access points and the adjacency matrix of which is given by the interference matrix.

(36) In step 540, the network controller allocates time slots on the downlink, to access points with a non-null degree on the graph. This allocation is made by colouring the incompatibilities graph obtained in the previous step: two access points with different colours are allocated separated time slots within the control part. Thus, two access points for which the coverage zones overlap are necessarily allocated separated time slots and two access points for which the coverage areas are separated can be allocated identical time intervals. Minimising the number of colours in the graph results in minimising the number of distinct time slots.

(37) When an access point corresponds to a null degree node of the incompatibilities graph, the access point allocates time slots on the downlink in step 550, independently of other access points.

(38) A terminal that wishes to connect to the network selects the access point that has the highest average quality of the downlink and the uplink. For example, the quality of a link can be estimated by means of a signal-to-noise metric. It then sends an association request to the selected access point in the reception slot reserved for this access point in the control part of the superframe.

(39) The network controller can allocate guaranteed time slots (GTSs) to access points during the CFP (Contention-Free Period) part of the superframe, on the downlink. Similarly, the network controller can allocate guaranteed time slots to terminals during the CFP part of the superframe, on the uplink.

(40) In this respect, it should be noted that a single guaranteed time slot can be allocated to the downlink and to the uplink of an access point, the uplink and the downlink being separated by the use of separated spectral ranges (for example visible on the downlink and infrared on the uplink).

(41) Firstly, interference on the downlink is detected.

(42) More precisely, each terminal determines which coverage area it is in.

(43) This information (for example the list of detected access point identifiers), called terminal coverage information, is transmitted on the uplink and is supplied to the network controller.

(44) If the terminal coverage information only comprises a single access point identifier, it is concluded that there is no interference on the downlink. The access point in question can then autonomously (in other words without referring to the network controller) allocate a guaranteed time slot on the downlink to the terminal. In other words, the access point can autonomously manage the allocation of GTS time slots on the downlink in its own coverage area, in other words not shared with the coverage area of a neighbouring access point. However, this autonomous allocation can only be made within the area of the CFP part not already allocated by the network controller, called CFP.sub.free.sup.down(AP.sub.n) defined below. Obviously, within this area, the time slot must not have been allocated to another downlink by the access point.

(45) On the other hand, if the coverage information comprises several access point identifiers, in other words if the terminal is in an interference area between downlinks, the guaranteed time slot is allocated by the network controller.

(46) The network controller manages the area CFP.sub.free.sup.down(AP.sub.n) of the CFP part for each access point AP.sub.n.

(47) Before starting allocation, in other words before setting up a downlink, each access point can use an available time range equal to the entire CFP part of the superframe, CFP.sub.free.sup.down(AP.sub.n)=CFP.

(48) When the network controller allocates a guaranteed time slot (GTS) to the terminal on the downlink, it can only do this by reducing the available time range CFP.sub.free.sup.down(AP.sub.n) for the access point. When this allocation has been made, the network controller eliminates the time slot thus allocated from the available time ranges (downlink) CFP.sub.free.sup.down(AP.sub.m), of access points AP.sub.m appearing in the coverage information of the terminal.

(49) In practice, the network controller has a first memory area representing the available time range (downlink) for each access point. This memory area is divided into the same number of sections as the number of time slots in the CFP area. When a time slot is allocated to an access point for a downlink to a terminal, the identifier of the access point is stored in the corresponding sections of the first memory areas of access points appearing in the coverage information of the terminal. Conversely, when the downlink between the access point and the terminal is broken, the identifier of the access point is deleted from the corresponding sections concerned and the time ranges are increased by the previously allocated time slot. Thus, when a section of the first memory area of an access point AP.sub.n does not contain any access point identifier, it can be concluded that it forms part of the available time range CFP.sub.free.sup.down(AP.sub.n).

(50) Interference on the uplink is detected in a similar manner. More precisely, each access point determines a list of terminal identifiers that it receives on the uplink, hereinafter called reception information.

(51) When the identifier of terminal D only appears in the reception information of the access point associated with it, the guaranteed time slot can be allocated autonomously by this access point.

(52) Otherwise, there will be interference on the uplink and the network controller is responsible for making the allocation. When the network controller allocates a guaranteed time slot (GTS) to the uplink between a terminal D and the access point AP.sub.n with which it is associated, it can only do it within the available time range (uplink), CFP.sub.free.sup.up(AP.sub.n), relative to the access point AP.sub.n concerned. When this allocation has been made, the network controller eliminates the time slot thus allocated from the available time ranges (downlink), CFP.sub.free.sup.up(AP.sub.m), of access AP.sub.m for which the association information includes the identifier of terminal D.

(53) In practice, as for the downlink, the network controller has a second memory area representing the available time range (uplink) for each access point. This memory area is divided into one section for each time slot in the CFP area, each section containing the identifier of the terminal to which the corresponding time slot is allocated.

(54) When a time slot is allocated to an uplink, the terminal identifier is stored in the corresponding sections of the second memory areas of access points for which the reception information contains the terminal identifier. Conversely, when the uplink between the terminal and the access point is broken, the terminal identifier is deleted from the corresponding sections concerned. Thus, when a section of the second memory area of an access point AP.sub.n does not contain any terminal identifier, it can be concluded that it forms part of the available time range (uplink) CFP.sub.free.sup.up(AP.sub.n) of the latter.

(55) FIG. 6A represents the flow chart for a method of allocating time slots for downlinks in an electronic wireless telecommunication system according, to the first embodiment of the invention.

(56) A downlink is considered between an access point AP.sub.n and a terminal D.

(57) In step 610, the terminal D determines its coverage information (list of identifiers of detected access points) and transmits it to the network controller.

(58) In step 620, it is determined if the coverage information is reduced to the access point AP.sub.n associated with it.

(59) If it is, in 625 the access point AP.sub.n allocates a time slot in the time range CFP.sub.free.sup.down(AP.sub.n) to the downlink.

(60) If it is not, the allocation is made by the network controller. In step 630, the network controller allocates a time slot to the downlink within the time range CFP.sub.free.sup.down(AP.sub.n).

(61) In step 640, the network controller eliminates the allocated time slot from the time ranges CFP.sub.free.sup.down(AP.sub.m) relative to access nodes AP.sub.m present in the coverage information of the terminal, and therefore in particular from the time range CFP.sub.free.sup.down(AP.sub.n) for the associated access point.

(62) FIG. 6B represents the flow chart for a method of allocating time slots for uplinks in an electronic wireless telecommunication system, according to the first embodiment of the invention;

(63) An uplink is considered between a terminal D and an access point AP.sub.n.

(64) In step 650, each access point determines its reception information (list of identifiers of detected terminals) and transmits it to the network controller.

(65) In step 660, it is determined if the identifier of terminal D only appears in the reception information for the access point that is associated with it, AP.sub.n.

(66) If this is the case, in 665 the access point AP.sub.n allocates a time slot in the time range CFP.sub.free.sup.up(AP.sub.n) to the uplink.

(67) If this is not the case, the allocation is made by the network controller. In step 670, the network controller allocates a time slot to the uplink within the time range CFP.sub.free.sup.up(AP.sub.n).

(68) In step 680, the network controller amputates the time ranges CFP.sub.free.sup.up(AP.sub.m) relative to access nodes AP.sub.m for which the reception information contains the identifier of terminal D, of the time slot thus allocated, and therefore in particular the time range CFP.sub.free.sup.up(AP.sub.n) for the access point AP.sub.n associated with it. By amputation of a time range CFP.sub.free.sup.up(AP.sub.m) of a time slot, it is meant that this time slot is eliminated from the time CFP.sub.free.sup.up(AP.sub.m) and that the rest of this time range is retained.

(69) FIG. 7 represents an application of the method of allocating time slots according to the first embodiment of the invention, to the optical wireless telecommunication system in FIGS. 1A and 1B.

(70) This figure shows the allocation of time slots in a superframe, indicating the BP, CAP and CFP parts of this superframe.

(71) The upper part of the figure also shows the allocation of time slots on the downlink (DL) and the lower part of the figure shows the allocation of time slots on the uplink (UL).

(72) Concerning the control part (BP) of the superframe, it can be seen that each access point has a control signal time slot (B.sub.1,B.sub.2,B.sub.3) on the downlink that is consistent with the interference diagram in FIG. 1A, each coverage area intersecting the other two areas.

(73) Similarly, on the uplink, a control signal time slot is allocated to each terminal D.sub.1,D.sub.2). It will be seen that no control signal time slot is attributed in relation to the access point LAP.sub.2 as no uplink is associated with this access point.

(74) Concerning the CFP part of the superframe, it can be seen that for the downlink, the access point LAP.sub.1 can use its entire available time range outside the data time slot (downlink), T.sub.N.sup.DL, that was allocated to it by the network controller to communicate with D.sub.1. In other words, CFP.sub.free.sup.down (LAP.sub.1)=CFP\T.sub.N.sup.DL.

(75) This time slot was correspondingly deleted from available time ranges (downlink) for access points appearing in the coverage information of terminal D.sub.1, namely {LAP.sub.1,LAP.sub.3}. The access point LAP.sub.2 can use its entire available time range provided that it does not appear in the coverage information for terminal D.sub.1 nor in the coverage information for terminal D.sub.2, in other words CFP.sub.free.sup.down(LAP.sub.2)=CFP. The available time range for access point LAP.sub.3 is amputated of T.sub.N.sup.DL as indicated above, namely CFP.sub.free.sup.down(LAP.sub.3)=CFP\T.sub.N.sup.DL. The time slot TN.sub.N1.sup.DL is allocated by LAP.sub.3 within the available time range CFP.sub.free.sup.down(LAP.sub.3) to communicate with D.sub.2. Since the coverage information of terminal D.sub.2 is limited to {LAP.sub.3}, there is no need to eliminate this time slot from the available time ranges of LAP.sub.1 and LAP.sub.2.

(76) On the uplink, the network controller allocates the data time slot T.sub.N.sup.UL to terminal D.sub.1 to communicate with LAP.sub.1. Since the reception information of LAP.sub.2 namely {D.sub.1,D.sub.2}, contains the identifier of terminal D.sub.1, this time slot is eliminated from the available time range (uplink) of LAP.sub.3, in other words CFP.sub.free.sup.up(LAP.sub.2)=CFP\T.sub.N.sup.UL. On the other hand, since the reception information of LAP.sub.3, namely {D.sub.2}, does not contain the identifier of terminal D.sub.1, the time slot T.sub.N.sup.UL is not eliminated from the available time range (uplink) of LAP.sub.3.

(77) Similarly, the network controller allocates the time slot T.sub.N.sup.UL to terminal D.sub.2 for the uplink with LAP.sub.3. Since the reception information of LAP.sub.2, namely {D.sub.1,D.sub.2}, contains the identifier of terminal D.sub.2, this time slot must correspondingly be eliminated from the available time range (uplink) of LAP.sub.2, CFP.sub.free.sup.up(LAP.sub.2)=CFP\T.sub.N.sup.UL. It will be noted that the section corresponding to T.sub.N.sup.UL in the second memory area of access point LAP.sub.2 contains identifiers of D.sub.1,D.sub.2. However, breaking one of the uplinks D.sub.1LAP.sub.1, D.sub.2LAP.sub.3 does not free the time slot T.sub.N.sup.UL since the identifier of the terminal for which the link is not broken remains stored in the section concerned.

(78) In a second embodiment, it is assumed that the association of an access point to the terminal is based only on the quality of the uplink.

(79) In this case, in addition to the terminal identifiers, the reception information includes link quality indicators as measured by the access point. The access point providing the highest quality uplink is chosen to be associated with the terminal.

(80) In step 610, the terminal not only detects identifiers of access points, but it also measures the quality of signals (signal/noise ratios) received from these access points. In other words, the coverage information transmitted by a terminal to the network controller contains not only the list of access points visible from the terminal, but also quality indicators of downlinks that could be made with these access points.

(81) The next step is to determine which of the access points appearing in the coverage information has the best downlink quality indicator. If the access point selected to make the downlink is the same as the access point selected to make the uplink, the situation is the same as the situation described with reference to FIG. 6A. On the other hand, if this access point is different, the downlink is made using a first link through the Ethernet network, between the associated access point and the access point with the best downlink quality indicator, called the auxiliary access point, and a second link between this auxiliary access point and the terminal. In this case, an optimum link quality is obtained on both the uplink and the downlink. It will thus be understood that the access point associated with the terminal (and communicating with the terminal in the control period BP) is dissociated from the downlink access point to which the time slot is allocated.

(82) FIG. 8 represents an application of the method of allocating time slots according to this second embodiment, to the optical wireless telecommunication system in FIGS. 1A and 1B.

(83) The upper part of the figure diagrammatically shows the uplink and the downlink between terminal D.sub.1 and access point LAP.sub.1. The uplink between D.sub.1 and LAP.sub.1 is the uplink that gives the best link quality. On the other hand, on the downlink, the quality of the link between LAP.sub.3 and D.sub.1 is better in this case than the link between LAP.sub.1 and D.sub.1. Thus, the selected downlink is composed of a first link through the wire network (Ethernet) between LAP.sub.1 and LAP.sub.3 and a second link (optical wireless) between LAP.sub.3 and D.sub.1.

(84) The lower part of the figure shows the allocation of time slots. It can be seen that this allocation on the uplink is the same as that shown in FIG. 7. On the other hand, on the downlink, a data time slot is allocated to the link between LAP.sub.3 and D.sub.1 instead of being allocated to a link between LAP.sub.1 and D.sub.1. The data flow is still transmitted through LAP.sub.1 but is relayed to LAP.sub.3 through the network that transmits it to D.sub.1.

(85) In a third embodiment, it is assumed that the association of an access point with the terminal is based only on the quality of the downlink. In this case, in addition to the access point identifiers, the coverage information includes link quality indicators as measured by the terminal. The access point providing the highest quality downlink is chosen to be associated with the terminal.

(86) In this case, in step 650, the access points not only detect identifiers of terminals, but also measure the quality of signals (signal/noise ratios) received from these terminals. In other words, the reception information transmitted by an access point to the network controller contains not only the list of terminals visible from the access point, but also quality indicators of uplinks that could be made with these access points.

(87) The next step is to determine which of the access points containing the terminal identifier in their reception information has the best uplink quality indicator. If the access point selected to make the uplink is the same as the access point chosen to make the downlink, the situation is the same as the situation described with reference to FIG. 7. On the other hand, if this access point is different, the uplink is made using a first link between the terminal and the access point with the best uplink quality indicator, called the auxiliary access point, and a second link through the Ethernet network, between this auxiliary access point and the associated access point. In this case, an optimum link quality is obtained on both the downlink and the uplink. It will thus be understood that the access point associated with the terminal (and communicating with the terminal in the control period BP) is dissociated from the uplink access point, in other words the access point to which the time slot is allocated and through which the data transit.

(88) FIG. 9 represents an application of the method of allocating time slots according to the second embodiment, to the optical wireless telecommunication system in FIGS. 1A and 1B.

(89) The upper part of the figure diagrammatically shows the uplink and the downlink between terminal D.sub.2 and access point LAP.sub.3. The downlink between LAP.sub.3 and D.sub.2 is the downlink that gives the best link quality. On the other hand, on the uplink, the link between D.sub.2 and LAP.sub.2 is better in this case than the link between D.sub.2 and LAP.sub.3. Thus, the selected uplink is composed of a first (optical wireless) link between D.sub.2 and LAP.sub.2 and a second link through the wire network (Ethernet) between LAP.sub.2 and LAP.sub.3.

(90) The lower part of the figure shows the allocation of time slots. It can be seen that this allocation on the downlink is the same as that shown in FIG. 7. On the other hand, on the uplink, a data time slot is allocated to the link between D.sub.2 and LAP.sub.2 instead of being allocated to a link between D.sub.2 and LAP.sub.3. The data flow transmitted to LAP.sub.2 is then relayed by the latter to LAP.sub.3 through the Ethernet network.

(91) According to a fourth embodiment, the access point associated with the terminal is chosen based on an average of the quality of the uplink and the quality of the downlink, the quality of a link being estimated for example based on a metric of the signal-to-noise ratio or an error rate. In this case, the access point corresponding to the best downlink quality and the access point corresponding to the best uplink quality can both be different from the access point associated with the terminal. A time slot is then allocated for a first auxiliary access point on the downlink, in accordance with the second embodiment, and for a second auxiliary access point on the uplink, in accordance with the third embodiment. Finally, the associated access point is then only used for control signals and messages.