EP1330894A2 - Verfahren und system zur zentralen steuerung von drahtlosen lokalen netzwerken - Google Patents
Verfahren und system zur zentralen steuerung von drahtlosen lokalen netzwerkenInfo
- Publication number
- EP1330894A2 EP1330894A2 EP01987586A EP01987586A EP1330894A2 EP 1330894 A2 EP1330894 A2 EP 1330894A2 EP 01987586 A EP01987586 A EP 01987586A EP 01987586 A EP01987586 A EP 01987586A EP 1330894 A2 EP1330894 A2 EP 1330894A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- access point
- mobile device
- initial
- target
- piconet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 51
- 238000012546 transfer Methods 0.000 claims abstract description 55
- 238000004891 communication Methods 0.000 claims abstract description 51
- 238000004590 computer program Methods 0.000 claims description 14
- 230000000644 propagated effect Effects 0.000 claims description 12
- 238000005538 encapsulation Methods 0.000 claims description 10
- 230000001052 transient effect Effects 0.000 claims description 10
- 230000004044 response Effects 0.000 claims description 6
- 230000007423 decrease Effects 0.000 claims description 4
- 238000005516 engineering process Methods 0.000 description 44
- 238000013459 approach Methods 0.000 description 19
- 244000025221 Humulus lupulus Species 0.000 description 12
- 238000010586 diagram Methods 0.000 description 11
- 230000008859 change Effects 0.000 description 10
- 230000032258 transport Effects 0.000 description 9
- 230000005540 biological transmission Effects 0.000 description 7
- 230000000977 initiatory effect Effects 0.000 description 7
- 230000001360 synchronised effect Effects 0.000 description 6
- 230000008901 benefit Effects 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000001228 spectrum Methods 0.000 description 3
- 235000008694 Humulus lupulus Nutrition 0.000 description 2
- 235000009809 Humulus lupulus var lupuloides Nutrition 0.000 description 2
- 235000006878 Humulus lupulus var neomexicanus Nutrition 0.000 description 2
- 235000009800 Humulus lupulus var pubescens Nutrition 0.000 description 2
- 235000009808 Humulus lupulus var. lupulus Nutrition 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000011664 signaling Effects 0.000 description 2
- 230000005641 tunneling Effects 0.000 description 2
- 230000003313 weakening effect Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 230000015654 memory Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 230000003936 working memory Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/161—Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/169—Special adaptations of TCP, UDP or IP for interworking of IP based networks with other networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0011—Control or signalling for completing the hand-off for data sessions of end-to-end connection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/14—Reselecting a network or an air interface
- H04W36/142—Reselecting a network or an air interface over the same radio air interface technology
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
- H04W80/06—Transport layer protocols, e.g. TCP [Transport Control Protocol] over wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W92/00—Interfaces specially adapted for wireless communication networks
- H04W92/04—Interfaces between hierarchically different network devices
- H04W92/10—Interfaces between hierarchically different network devices between terminal device and access point, i.e. wireless air interface
Definitions
- Networked desktop computing is typical in both the office and home. Networking of mobile devices, such as mobile telephones, laptop computers, headsets, and PDA's (Personal Digital Assistants), is more difficult. New wireless standards, such as IEEE 802.11 and Bluetooth (BT) are designed to enable these devices to communicate with each other and a wired LAN (Local Area Network).
- IEEE 802.11 and Bluetooth BT are designed to enable these devices to communicate with each other and a wired LAN (Local Area Network).
- Bluetooth is a low cost wireless connection technology.
- Bluetooth is essentially a point-to-point (PPP) wireless communication technology that was developed as a replacement for using cable (i.e., hard wired) connections between devices.
- PPP point-to-point
- the Bluetooth technology is described in the Bluetooth specification, available from Bluetooth SIG, Inc. (see also the www.bluetooth.com web site), the entire teachings of which are herein incorporated by reference. This technology provides for a common attachment approach for different devices, and so enables mobile phones, laptops, headsets, and PDA's to be easily networked in the office and eventually in public locations.
- HIPERLAN/2 provide a generally similar wireless connection function as Bluetooth and may be used to support WLAN (wireless LAN) communications.
- IEEE 802.11 IEEE 802.11 "Wireless LAN Medium Access Control (MAC) and Physical Layer Specifications,” the entire teachings of which are herein incorporated by reference.
- ETSI specifications for HIPERLAN/2 such as ETSI document number TR 101 683, "Broadband Radio Access Networks (BRAN); HIPERLAN Type 2; System Overview,” the entire teachings of which are herein incorporated by reference.
- the Bluetooth technology provides for a piconet (or subnet), which is a group of up to eight devices, consisting of one master and a maximum of seven slaves that share a common hop sequence (based on a spread-spectrum frequency hopping technique, as is known in the art).
- a piconet or subnet
- the bandwidth is divided into seven time slots.
- One or more time slots are used for each master-slave communication. Amalgamating time slots increases capacity on that master-slave link.
- the mobile device As a user moves a mobile device connected to a WLAN from one location to another, the mobile device must establish a new connection with a new AP (access point, such as a local area network access point) when moving out of range of the previous AP.
- a new AP access point, such as a local area network access point
- this transfer from the previous AP to the new AP requires the breaking down of the connection with the previous AP and the establishment of a new connection with the new AP.
- the IEEE 802.11 standard does have the ability for the mobile device to change its point of LAN connection from one AP to another on the same IP sub-net (e.g., both AP's are directly connected via hubs or switches, not via a router), but the hand-offtakes a number of seconds during which time there is no data flow.
- both AP's are directly connected via hubs or switches, not via a router
- 802.11 standard has no method for the network to force the mobile device to transfer its LAN connection from one AP to another. This connection transfer is required for load balancing and improving the radio link quality of service.
- the transfer of the mobile device from one AP to another occurs typically with a delay or interruption in the communications over the WLAN to the mobile device. Seamless hand-offs of the mobile device from one AP to another are required both for continuous coverage and for QoS (Quality of Service). In the latter case mobile devices are moved between co-located AP's so that users can be assigned, for example, their own dedicated channel (i.e., given a greater bandwidth).
- the base version of Bluetooth has a 10 meter range and so if the Bluetooth technology is extended to enable Bluetooth to become a WLAN replacement, then an efficient, transparent and seamless approach to moving mobile devices from one piconet to another must be available. This approach must be transparent to layer 3 (i.e., network and route management layer) of the network interconnection layers (e.g., as specified in the Open System Interconnection Reference Model).
- each member of the group hops between seventy-nine different frequencies according to a sequence determined by the Bluetooth identifier (i.e., Bluetooth device address) of the master.
- All devices e.g., mobile devices
- All devices have their own free running clock, but each uses a time offset to synchronize its hops with the master of a respective group.
- the master does not alter its clock.
- a device e.g., mobile device
- wanting to join a group is initially in master mode. Such a device must detect the timing offset needed to join the group and then make the relevant offset at the same time as it switches into slave mode.
- This process is referred to a "joining a piconet" and is described in more detail in the Bluetooth specification.
- a slave e.g., mobile device
- the master e.g., AP
- the AP normally terminates the PPP session, and so the data is then sent and received as level 2 IP packets to any suitable device, connected locally or remotely across the Internet. If one of the slaves moves beyond the range of the master, then the connection breaks and the mobile device must then, if possible, establish a new radio link, and PPP link with the most appropriate AP.
- Establishing a PPP session is a long process; for example, tens of seconds of connectivity are lost.
- One solution is to move the termination of the PPP session at a central controller (e.g., roaming server or gateway server) rather than at the AP.
- a central controller e.g., roaming server or gateway server
- To implement this solution it is necessary for the mobile device to AP link to be seamlessly transferred from one AP to another.
- the AP'S are connected to a central controller (e.g., roaming server or gateway server) via an Ethernet LAN.
- Each master listens via a dedicated Bluetooth logical channel for all devices within range. When a master hears a new device, it relays this information back to the controller.
- one of the masters is maintaining a connection to a particular slave and signals to the controller that there is weakening reception for that slave as indicated by increased packet loss on the PPP link to that particular slave (this data is easily available from the PPP controller), and/or by another indication of weakening reception, such as RSSI (Received Signal Strength Indication).
- the controller can then look up another (or second) master with stronger reception of the mobile transmission and force a hand-off of the slave (i.e., transfer of the connection for the mobile device from the previous AP to the new AP).
- This type of hand-off approach typically requires special client software (e.g., in the mobile device).
- PPP seamlessly moving mobile devices at layer 3 (i.e., by using PPP).
- This PPP approach requires all the AP's to extend the PPP connection back to a master controller (e.g., roaming server) that terminates the PPP connections and switches them from one AP to another as the user moves.
- the problem with this PPP approach is scalability and speed of 'hand-off which can be several seconds.
- the techniques of the present invention provide two approaches that work at a lower network layer than layer 3, namely, layer 2 or the data link layer.
- One approach of the invention involves spoofing the identity of the AP. This approach involves assigning a separate Bluetooth identifier number to the master for each of the seven available time slots.
- the other approach of the invention involves an extension to the master-slave switch feature provided by the Bluetooth specification to separate a slave from one piconet cleanly and then attach it to another operating piconet.
- This master- slave switching is relatively simple if there is only one slave per piconet but the invention provides a solution that works with multiple slaves in a piconet, such as seven active slaves per piconet, and also when there are other parked slaves.
- the present invention achieves this seamless hand-off without requiring client software, which is typically required in prior art approaches, hi the present invention, the second master inherits the characteristics of the first master. These characteristics include session data, such as the Bluetooth identifier (or other WLAN identifier) of the access point and encryption keys, as well as the PPP magic number. The session data may also include an identifier for the mobile device. Also, either the clocks of both masters are synchronized, or the slave is instructed to change its frequency offset to match the new master.
- session data such as the Bluetooth identifier (or other WLAN identifier) of the access point and encryption keys, as well as the PPP magic number.
- the session data may also include an identifier for the mobile device. Also, either the clocks of both masters are synchronized, or the slave is instructed to change its frequency offset to match the new master.
- the present invention provides solutions to the problems indicated above without requiring special software (or hardware) in the mobile device (that is, changes from a conventional approach are only required in the AP's and the roaming server), as provided for in the embodiments described below.
- the techniques of the invention provide for use of spoofing AP's by transferring unique session data (access point device address, hop sequence, frequency offset, and encryption key) from one master AP to another so that the mobile device is unaware of the change in master.
- BD Bluetooth Device
- the present invention provides a method and system for performing a seamless handoff of a mobile device from an initial access point (e.g., initial AP) to a target access point (e.g., target AP).
- the method of the system e.g., gateway application in a roaming server
- the method of the system includes (a) assigning session data to the initial access point to establish an initial connection from the mobile device through the initial access point to the roaming server, (b) detecting a triggering event that initiates a transfer of the mobile device from the initial access point to the target access point, and (c) transferring assignment of the session data from the imtial access point to the target access point to establish a target connection from the mobile device through the target access point to the roaming server.
- This transfer of assignment is based on the session data and is in response to detecting that the triggering event has occurred, thus enabling the mobile device to use the session data to communicate with the target access point, such that the mobile device transfers seamlessly (without loss of connection and/or interruption of the current session with the user) from the initial access point to the target access point.
- the present invention provides for the use of the master-slave switch to separate a slave from a piconet cleanly by forcing it to change into a master and then to associate it with another AP before switching it back to a slave in a piconet associated with the second AP.
- the present invention provides a method and system (e.g., roaming server) in a wireless local area network for performing a seamless handoff of a mobile device from an initial piconet having an initial access point (e.g., initial AP) to a target piconet having a target access point (e.g., target AP).
- the method includes assigning the mobile device associated with the initial access point a master role for the initial piconet, assigning the target access point a slave role in the initial piconet while the target access point retains a master role in the target piconet, and establishing an association of the mobile device with the target piconet by switching roles of the mobile device and target access point.
- the mobile device establishes the association with the target piconet as a slave of the target piconet.
- the target access point terminates the slave role of the target access point with the initial piconet, while the target access point maintains the master role in the target piconet, such that the mobile device transfers seamlessly from the initial piconet to the target piconet.
- the present invention provides for splitting of the wireless protocol stack so that only the part required to deal with the radio frequency interface is located in the AP and the remainder of the stack is located in the central roaming server.
- the two parts communicate through a communications layer such as UDP packets sent over a LAN (e.g., Ethernet) that encapsulated host controller commands sent between the AP and the roaming server. This split is appropriate for all wireless protocols.
- the present invention provides a method and system (e.g., roaming server) for enabling seamless roaming of mobile devices among access points in a wireless local area network, hi particular, the method includes (a) establishing a host controller interface in the roaming server, (b) encapsulating host controller commands in a packet-based network protocol for use in communication with access points in the wireless area network, the host controller commands directed to a connection session of the mobile device with the wireless local area network, and (c) exchanging the encapsulated host controller commands with access points in the wireless area network to enable a mobile device to receive the host controller commands and maintain the connection session while roaming among the access points.
- a host controller interface in the roaming server
- encapsulating host controller commands in a packet-based network protocol for use in communication with access points in the wireless area network, the host controller commands directed to a connection session of the mobile device with the wireless local area network
- exchanging the encapsulated host controller commands with access points in the wireless area network to enable a mobile device to receive the host controller commands
- the present invention provides an encapsulated packet for encapsulating and communicating commands based on a host controller interface using a packet-based network protocol.
- the encapsulated packet includes a host controller command based on the host controller interface, device address of a host exchanging the encapsulated packet, a sequence number for use in a series of encapsulated packets, and an acknowledgment number for use in acknowledging a previously transmitted encapsulated packet.
- Fig. 1 is a block diagram of a wireless local area network, including a roaming server, access points, and mobile device according to the present invention.
- Fig. 2 is a block diagram illustrating the components within the roaming server of Fig. 1.
- Fig. 3 is a block diagram illustrating two access points having the same access point device address to provide a seamless transfer for a roaming mobile device according to the present invention.
- Fig. 4 illustrates a procedure for a seamless transfer of a mobile device between two access points according to the present invention.
- Fig. 5 is a representation of the master/slave relationships of an initial access point, a mobile device, and a target access point during a master-slave switch according to the present invention.
- Fig. 6 is a flow chart of a procedure for a master/slave switch of the present invention.
- Fig. 7 is a block diagram of the communications interface of Fig. 2 including a host controller interface and a packet encapsulation module.
- Fig. 8 is a block diagram of a server wireless protocol stack and an associated access point wireless protocol stack according to the present invention.
- Fig. 9 is a block diagram of the packet format of the present invention for an encapsulated packet for a host controller interface command based on a network based packet protocol.
- Fig. 1 is a block diagram of a network 20 including a roaming server 22, access points 24 (e.g., 24-1, 24-2, 24-3) to a WLAN (wireless local area network) 36, and mobile device 26.
- the network 34 is any suitable network for connecting access points 24 to a roaming server, such as a hard-wired Ethernet LAN or a wireless network using a wireless communications protocol.
- the network 34 is hard- wired for part of the network 34 and wireless for one or more other parts of the network 34 (using one or more wireless communications protocols).
- the WLAN 36 is a network established in accordance with a wireless technology, which the present invention does not require to be the same as any wireless communication protocol or technology used in the network 34.
- wireless technology refers to a Bluetooth protocol technology, a IEEE 802.11 protocol technology, a ETSI HIPERLAN/2 protocol technology, or other wireless technology suitable for a WLAN 36 (e.g., typically providing coverage over 10 to 100 meters).
- the network 34 may use such a wireless technology for all or part of the network 34, or may use some other suitable wireless communications protocol.
- the network connection 28 (e.g., 28-1, 28-2, and 28-3) may be a hardwired connection, such as an Ethernet connection on a LAN 34, or may be a wireless connection based on a wireless technology or other suitable wireless communications protocol.
- the wireless connection 30 (e.g., 30-1 and 30-2) is a communication connection not requiring a hard- wired cable or link.
- the wireless connection 30 is based on radio, optical, infrared, acoustic, or other non-hard-wired media.
- the roaming server 22 is any suitable computing device or digital processing device that may serve as a server in the network 20.
- a roaming server 22 can be a server, a router, a bridge, a switch, or other device that may serve the purpose of a central controller or a gateway server in the network 20.
- the roaming server 22 is not a single physical entity, but the functionality of the roaming server 22 (such as shown in Fig. 2) is provided by a number of physical units (e.g., computers, servers, and/or network devices) that are networked together.
- the access point 24 typically has a network connection 28 to the roaming server 22.
- the access point 24 also acts as a receiving point, or connecting point, to establish the wireless connection 30 with each mobile device 26.
- the access point 24 is equipped to recognize a wireless technology connection 30.
- the mobile device 26 is any suitable type of device that will support a wireless technology.
- the mobile device 26 may be a computer with wireless connection adapter, a PDA (personal digital assistant), or a mobile telephone such as a cellular telephone.
- the WLAN subnet or channel 38 (e.g., 38-1 and 38-2) is an access point 24 and one or more mobile devices 26.
- the WLAN subnet or channel 38 is termed a "piconet" and conventionally has up to seven mobile devices 26.
- the channel 38 is known as a point to point link.
- each Bluetooth mobile device 26 connected to the access point 24 views the channel 38 as a point to point link.
- the techniques of the present invention enable more than seven mobile devices 26 to connect to a single access point 24. The exact number depends on system performance. In the case of the IEEE 802.11 standard, a number of mobile devices 26 (potentially greater than seven, but limited by the address range within the subnet associated with that access point 24) are associated with a single access point 24.
- the roaming server 22 determines that a mobile device 26 should change its LAN connection point from access point 24-1 to access point 24-2 based on a triggering or initiating event.
- a triggering or initiating event can be the moving of the mobile device 26 (e.g., when the user moves the mobile device 26 from one location to another), or receiving a request from a mobile device 26 or access point 24 to move the mobile device 26.
- the triggering or initiating event can also be a load balancing event, such as receiving an indication that one access point 24 is congested and another access point 24 is less congested (e.g., so that the mobile device 26 can be moved to another access point 24 to obtain a higher level of service, such as more bandwidth).
- the triggering or initiating event can also be receiving an indication of the quality of service level assigned to the user of the mobile device 26 (e.g., moving the mobile device 26 to a new access point 24 to fulfill a predefined service level for the user of the mobile device 26).
- the triggering event can also be a indication of a poor or declining quality of the connection 30 (e.g., radio link) between the mobile device 26 and an access point 24 (e.g., resulting in a transfer of the mobile device 26 from one access point 24-1 to another access point 24-2 that provides an improved quality of service for the mobile device 26 over the radio link).
- a poor or declining quality of the connection 30 e.g., radio link
- the triggering event triggers a temporary or permanent handoff of the mobile device 26 from one access point 24-1 to another access point 24-2.
- the handoff may be due to a transient situation, such as due to temporary congestion of access point 24-1, or temporary decline in connection quality in the initial connection 30-1 (e.g., radio link quality).
- the initial access point 24-1 keeps knowledge of the mobile device 26 for a predefined period of time (e.g., short period of time) so that the mobile device 26 may transfer back to the initial access point 24-1 after the termination of the transient situation.
- the temporary handoff from one access point 24-1 to another access point 24-2 should occur quickly (i.e., without apparent or substantial interruption in the service to the mobile device 26), as is supported by the techniques of the present invention, as described herein. If the handoff is permanent, the initial access point 24-1 loses all knowledge of the mobile device 26. In general, if the handoff is temporary, but the fransient situation persists, then the handoff may be made permanent.
- the roaming server 22 instructs access points 24-1 and 24-2 to make a seamless handoff of the mobile device 26 from access point 24-1 to access point 24-2 at the data link level in a data link transfer 32 (that is, in the case of the Bluetooth technology, from point to point link 38-1 to point to point link 38-2, and, in the case of the IEEE 802.11 technology, from shared radio channel 38-1 to shared radio channel 38-2). h making this type of transfer at the data link transfer level 32, the transfer is transparent to the mobile device 26 and the connection 30-1 is transferred or reestablished as the wireless connection 30-2 without a requirement for a special technology or special software in the mobile device 26 (beyond the conventional wireless technology required to support communications over the WLAN 36).
- a data link transfer 32 that is, in the case of the Bluetooth technology, from point to point link 38-1 to point to point link 38-2, and, in the case of the IEEE 802.11 technology, from shared radio channel 38-1 to shared radio channel 38-2).
- the roaming server 22 first receives information (i.e., the triggering or initiating event) from access point 24-1 currently supporting the mobile device 26 as the mobile device 26 moves out of the range of access point 24-1. For example, this movement is indicated by a declining rate of packets (e.g., wireless connection packets based on the wireless technology) received at access point 24-1. The roaming server 22 then directs the access point 24-2 to establish a relationship or connection 30-2 with the subject mobile device 26. The roaming server 22 must have some indication from the access point 24-2 that the mobile device 26 is moving within range of that access point 24-2.
- information i.e., the triggering or initiating event
- this indication may be provided by a query broadcast over the wireless medium (e.g., query over a radio frequency suitable for use with the WLAN 36 based on the wireless technology) from access point 24-2 to detect what mobile devices 26 are within range of the access point 24-2.
- the roaming server 22 can instruct access points 24-1 and 24-2 to make the seamless handoff of the mobile device 26 as a data link transfer 32.
- the roaming server 22 also determines base a triggering or initiating event based on congestion, quality of service level, or load balancing considerations.
- piconets 38-1 and 38-2 can be considered co-located (that is, provide wireless coverage to overlapping areas).
- the mobile device 26 is within range of each access point 24-1 and 24-2 and may be connected, optionally, to either access point 24-1 or 24-2. hi general, in a crowded environment such as a conference room there may well be multiple devices 26 desiring high speed WLAN 36 access.
- Users may choose which access point 24 to join by signaling via the loading variable in the SDP (service discovery protocol) for the case of the Bluetooth technology, and the beacon for the case of IEEE 802.11 technology (based on proposed modifications to the IEEE 802.11 standard).
- users maybe directed to join a particular access point 24 by signaling via the loading variable in the radio protocol header or beacon.
- the mobile device 26 requests service from an access point 24 by sending a request along with the device address of the mobile device 26.
- the access point 24 would normally respond by paging the mobile device 26 and starting the synchronization between the access point 24 and the mobile device 26.
- the access point 24 passes the request along with the device address of the mobile device 26 back to the roaming server 22 which looks up the user's service level data 47 in the device database 42 (see Fig. 2) and the loading on each of the relevant access points 24 (e.g., traffic or congestion on the subnet that the mobile device 26 is connected to).
- the roaming server 22 then directs that the mobile device 26 connect to the appropriate access point 24 (tl is may not be the access point 24 that received the request).
- the mobile device 26 requests service from access point 24-1, but, after determining the user's service level, the roaming server 22 signals access point 24-2 to page the mobile device 26 and establish a connection 30-2.
- the roaming server 22 signals to all the relevant access points 24-1, 24-3 except the desired access point 24-2 to suppress their beacons.
- the roaming server 22 looks up the mobile device 26 in the device database 42, and according to the user service level data 47 and WLAN loading, the roaming server 22 might decide that the mobile device 26 should be communicating via another connection 38 that is covering that mobile device 26. That is, one access point 24 may offer a higher level of available bandwidth (i.e., lower level of congestion) for the mobile device 26 than another access point 24 that has less bandwidth available (i.e., higher level of congestion). For example, the preferable access point 24 may have fewer mobile devices 26 connected to it and thus more bandwidth available. The roaming server 22 may direct the mobile device 26 to a different access point 24. In either case the mobile device 26 is forced to transfer its connection 30.
- one access point 24 may offer a higher level of available bandwidth (i.e., lower level of congestion) for the mobile device 26 than another access point 24 that has less bandwidth available (i.e., higher level of congestion).
- the preferable access point 24 may have fewer mobile devices 26 connected to it and thus more bandwidth available.
- the roaming server 22 may direct
- a user moves a mobile device 26 within range of both access points 24-1, 24-2.
- the mobile device 26 seeks to make a connection 30-1 to congested access point 24-1.
- the roaming server 22 thus directs the mobile device 26 to join a less congested access point 24-2, with the result shown by connection 30-2. Subsequently, the mobile device 26 moves to the less congested access point 24-2 in a seamless handoff, according to the techniques of the invention as described herein, without requiring re-registration with the roaming server 22.
- the congestion at access point 24-1 may also be due to a fransient situation or problem, such a temporary increase in traffic by one or more of the mobile devices 26 connected to access point 24-1.
- a transient situation e.g., congestion
- the roaming server 22 directs the mobile device 26 to transfer back to access point 24-1.
- a mobile device 26 may experience declining connection quality of the connection 30-1 (e.g., radio link) to the initial access point 24-1 (also termed the primary access point 24-1) due to some transient situation or problem.
- connection quality declines to a comparatively low level; for example, as measured by the signal strength of the connection 30-1 having a lower level (e.g., lesser amplitude) than the signal strength of the connection 30-2.
- the roaming server 22 directs the mobile device 26 to transfer from the primary access point 24-1 to a secondary access point 24-2 that has the better connection quality for the connection 30-2 (quality of the radio link) to the mobile device 26. This transfer may be temporary and the transient situation may terminate; for example, if the person obstructing the path moves out of the path. Then the roaming server 22 directs the mobile device 26 to transfer back from the secondary access point 24-2 to the primary access point 24-1.
- Fig. 2 is a block diagram illustrating the components within the roaming server 22. These components include a digital processor 40, a device database 42, and a communications interface 44.
- the digital processor 40 hosts and executes a gateway application 46 in the working memory of the roaming server 22.
- the gateway application 46 serves to provide for the management of the connections of the roaming server 22 to other devices, such as access points 24 and mobile devices 26 (typically through connections through access points 24).
- the gateway application 46 may instruct an access point 24-1 to perform a transfer of wireless connections 30-1 so that the mobile device 26 can establish a new connection 30-2 with a different access point 24-2.
- the gateway application 46 is implemented partially or totally in hardware, such as in an ASIC (application-specific integrated circuit).
- the device database 42 in the roaming server 22 is a memory or disk or other storage device that provides database and storage services for the roaming server 22, such as providing service level data 47 that may be assigned to a mobile device 26, or a user of the mobile device 26.
- the device database 42 can provide information and store information on a wireless connection 30 such as wireless connection 30-1 so that the wireless connection 30-1 may be reestablished at a different access point 24 such as wireless connection 30-2 (i.e., using the same communication parameters as wireless connection 30-1 based on information that is stored in the device database 42 in the roaming server 22).
- the session data 48 is an example of such information, and can include the AP device address 52 (described for Fig.
- the session data 48 also includes a mobile device address that the roaming server 22 assigns to the mobile device 26.
- the AP device address 52 is a BD_ADDR (Bluetooth device) address
- the mobile device address is an AM_ADDR (active member of a piconet) address.
- the AP device address 52 is a MAC (Medium Access Control) address
- the mobile device address is an AID (Association Identifier).
- the device database 42 can be part of the roaming server 22, or may be accessed by the roaming server 22 over a communications connection or network connection (e.g., Internet connection).
- a communications interface 44 of the roaming server 22 provides an interface to provide communications with other devices, such as a network interface to support network connections 28 over the LAN 34 to the access points 24.
- the communications interface 44 is based on a NIC or Network Interface Card along with associated network communication software.
- a computer program product 80 including a computer readable or usable medium (e.g., one or more CDROM's, diskettes, tapes, etc.), provides software instructions for the gateway application 46.
- the computer program product 80 may be installed by any suitable software installation procedure, as is well known in the art.
- the software instructions may also be downloaded over a wireless connection.
- a computer program propagated signal product 82 embodied on a propagated signal on a propagation medium e.g., a radio wave, an infrared wave, a laser wave, a sound wave, or an electrical wave propagated over the Internet or other network
- the propagated signal is an analog carrier wave or digital signal carried on the propagated medium.
- the propagated signal may be a digitized signal propagated over the Internet or other network.
- the propagated signal is a signal that is transmitted over the propagation medium over a period of time, such as the instructions for a software application sent in packets over a network over a period of milliseconds, seconds, minutes, or longer.
- the computer readable medium of the computer program product 80 is a propagation medium that the computer may receive and read, such as by receiving the propagation medium and identifying a propagated signal embodied in the propagation medium, as described above for the computer program propagated signal product 82.
- Fig. 3 is a block diagram of a WLAN 50 with two access points 24-4 and 24-5 that provide a seamless transfer for a roaming mobile device 26-2 using an access point device address transfer or spoofing approach according to the present invention.
- the AP device address 52 (e.g., 52-1, 52-2, 52-3, 52-4, and 52-5) is an identifier that provides an identification or address of an access point 24 in the WLAN 50.
- the AP device address 52 is a Bluetooth device address (BD_ADDR).
- BD_ADDR Bluetooth device address
- the AP device address 52 is a MAC (Media Access Control) address.
- the communication channel 54 (e.g., 54-1, 54-2, 54-3, 54-4, and 54-5) is a wireless communication link according to a wireless technology, hi one embodiment, the communication channel 54 is an example of a wireless connection 30, as illustrated in Fig. 1.
- the point to point link 57 (e.g., 57-1 and 57-2) is a WLAN subnet, typically supported by a respective access point 24.
- the WLAN 50 is one example of the WLAN 36 of Fig. 1
- the point to point links 57-1 and 57-2 are examples of the point to point link 38 of Fig. 1.
- Communication link transfer 56 indicates the transfer of the mobile device 26-2 from point to point link 57-1 to point to point link 57-2 using AP device address spoofing (i.e., the same AP device address 52- 2 is used for access point 24-5 as for access point 24-4).
- AP device address spoofing i.e., the same AP device address 52- 2 is used for access point 24-5 as for access point 24-4.
- communication channel 54-2A between access point 24-4 and the mobile device 26-2
- communication channel 54-2B between access point 24-5 and the mobile device 26-2 is also based on the same AP device address 52-2.
- Fig. 4 illustrates a procedure 200 for a seamless transfer of a mobile device 26 between two access points 24 using the AP device address spoofing of Fig. 3.
- a gateway application 46 in a roaming server 22 assigns session data 48 to the initial access point 24-4 to establish an initial connection 54-2 from the mobile device 26-2 through the imtial access point 24-4 to the roaming server 22.
- the session data 48 for example, includes the AP device address 52-2, which is assigned to the initial access point 24-4 by the roaming server 22.
- the roaming server 22 assigns a mobile device address to the mobile device 26 that is also included in the session data 48.
- a communications interface 44 of the roaming server 22 detects a triggering event that initiates a transfer of the mobile device 26-2 from the initial access point 24-4 to the target access point 24-5.
- This transfer is indicated by a communications link transfer 56 in Fig. 3.
- the triggering event for example, can occur when the mobile device 26-2 is moved by the user from one location to another so that the mobile device 26-2 is moving out of range of the initial access point 24-4 and into range of the target access point 24-5.
- the triggering event can also be indicated by congestion or the need for load balancing for the initial access point 24-4. For example, point to point link 57-1 may become congested in comparison to point to point link 57-2.
- the roaming server 22 initiates the transfer of the mobile device 26-2 from the initial access point 24-4 to the target access point 24-5.
- the triggering event can also be indicated by a decline in connection quality for connection 54-2A.
- the gateway application 46 fransfers assignment of the session data 48 from the initial access point 24-4 to the target access point 24-5 to establish a target connection 54-2 from the mobile device 26-2 through the target access point 24-5 to the roaming server 22 based on the session data 48.
- the session data 48 includes the AP device address 52-2, which the gateway application 46 is now assigning to the target access point 24-5 when it was previously assigned to the initial access point 24-4.
- the mobile device 26-2 can establish the same connection 54-2 using the AP device address 52-2 to the target access point 24-5.
- the mobile device 26-2 is using the same session data 48 when communicating with the target access point 24-5 that it was using when communicating with the initial access point 24-4.
- the target access point 24-5 constructs a spoof frame (based on an 802.11 frame) that includes the AP device address 52 (MAC address) of the initial access point (primary access point), the mobile device address (Association ID) of the mobile device 26 that was assigned by the roaming server 22 to the mobile device 26, as well as any data to be transferred.
- the roaming server 22 determines that the connection quality of a connection 30 (radio link connection) is declining, and thus sends the next data packet to the target or secondary access point (e.g., 24-5) and instructs it to create the spoof frame to be sent to the mobile device 26-2.
- the target or secondary access point e.g., 24-5
- the roaming server 22 instructs the target or secondary access point 24-5 to listen for a packet from the mobile device 26-2 even if the packet is addressed to another access point (e.g., 24-4) having a different MAC address , so that packets could be returned from either access point (e.g., 24-4 or 24-5).
- another access point e.g., 24-4 having a different MAC address
- each access point 24 is aware of all the packets that arrive on a radio channel (e.g., assuming the channel can be accessed by both access points 24-4 and 24- 5).
- both access points 24-4 and 24-5 normally operate on different main channels, but the controller or roaming server 22 forces secondary or target access point 24-5 to jump onto the same channel as the primary or initial access point 24-4 to send the spoofed packet.
- the access point 24 changes channels in response to SNMP (Simple Network Mangement Protocol) MIB-2 (Management Information Base) commands, which are kept in a queue to be processed on a best efforts basis. Typically, such a command is executed an indeterminate amount of time after the command is received.
- SNMP Simple Network Mangement Protocol
- MIB-2 Management Information Base
- the present invention provides for a direct link between the access point 24 and the controller or roaming server 22 that can force an immediate channel change (as soon as the current packet is sent or received).
- the access point 24 uses a look up table to determine what to do with packets that arrive with a particular device address 52 (MAC address).
- MAC address device address 52
- the present invention provides that the look-up table be expanded to include a new category called "watch out".
- the watch out category includes device addresses 52 (MAC addresses) and spoofing channels that the access point 24 should look out for.
- MAC addresses device addresses 52
- RSSI receiver signal strength
- each mobile device 26 is synchronized with its access point 24-4, and typically changes synchronisation when associating with a different access point 24-5. If the access points 24-4, 24-5 are on different channels, they are members of different ESS's (extended service sets). Then, the access points 24-4, 24-5 can be synchronized (because they are allowed to be synchronized because they are on different ESS's), thus avoiding any delay due to synchronization when the mobile device 26 is transferred form one access point 24-4 to the other access point 24-5.
- the techniques of the present invention support seamless hand-offs of a mobile device 26 between two access points 24 by assigning a unique BD_ADDR (Bluetooth device) address for the AP device address 52 to the access point 24 for each communication channel 54 that it is supporting, hi a conventional piconet 57 (or subnet), the communication channel 54 is a master-slave link.
- the master e.g., access point 24
- the master can have up to seven slaves (e.g., mobile devices 26), each slave following a hop pattern (based on a spread spectrum frequency hopping) set by the master.
- Each master-slave communication channel 54 occupies one or more time slots.
- the access point 24 has a particular AP device address 52 associated with each master-slave link (i.e., communication channel 54). So in case of seven slaves there are seven communication channels 54 (e.g., master-slave links), and the access point 24 changes its AP device address 52 for each time slot. The access point 24 does not, however, need to change its timing offset as this is set by the clock of the access point 24, so all the slaves (e.g., mobile devices 26) are in synchronization with the master (e.g., access point 24). As each communications channel 54 is associated with a particular AP device address 52, the slaves hop between frequencies in synchronization with the access point 24 but they are no longer synchronized with each other.
- each communications channel 54 is associated with a particular AP device address 52, the slaves hop between frequencies in synchronization with the access point 24 but they are no longer synchronized with each other.
- This AP device address spoofing approach of the invention has several effects, as described in the following paragraphs.
- the session data 48 is the data for the current session between the mobile device 26 and the access point 24 based on a connection 30.
- the session data 48 can include the AP device address 52 (e.g., Bluetooth address), mobile device address, hop sequence, frequency offset, and encryption data (e.g., encryption key or codes).
- the movement of session data 48, such as the AP device addresses 52 and encryption codes, is achieved by controlling all the access points 24 from a central roaming server 22.
- clock offset command e.g., Bluetooth clock offset command
- the clock offset command maybe required because Bluetooth devices, such as access points 24 and mobile devices 26, normally having free running clocks. Creating a piconet 57 requires each slave to temporarily apply an offset to their clock so as to synchronize clocks with the master.
- the AP device address spoofing approach of the invention also permits a master (e.g., access point 24) to have an almost unlimited number of slaves (e.g., mobile devices 26) attached to it. This is possible because on each time slot there can be multiple slaves, each in synchronization with a different AP device address 52, and so hopping to a different sequence derived from the AP device address 52.
- a master e.g., access point 24
- slaves e.g., mobile devices 26
- a roaming server 22 that controls the access point 24-4 can decide, for each time slot, which AP device address 52-3 to give the access point 24-4.
- This AP device address 52-3 determines which mobile device 26-3 that the roaming server 22 communicates with through the access point 24-4.
- all the other mobile devices 26-1 and 26-2 connected to the access point 24-4 are probably on the wrong frequency when the roaming server 22 transmits the packet intended for mobile device 26-3.
- the other mobile devices 26-1 and 26-2 in effect, hear nothing from the roaming server 22 but they continue to stay in synchronization with the access point 24-4.
- the techniques of the invention enable unlimited numbers of mobile devices 26 (i.e., slaves) per piconet 57 and provide an alternative means of paging a mobile device 26, thus eliminating any constraint on the number of parked devices 26 (i.e., parked slaves).
- the roaming server 22 may reassign the session data 44 to the initial access point 24-2 to re-establish the initial connection 54- 2 A after a termination of the transient situation.
- the roaming server 22 reassigns the AP device address 52-2 to the initial access point 24-4 so that the mobile device 26- 2 can communicate with the imtial access point 24-4 using the same AP device address 52-2 that it used previously to communicate with the initial access point 24-4.
- Fig. 5 is a representation of the master-slave relationships 302, 304, 306, 308, 310 of an initial access point 24-6, a mobile device 26-6, and a target access point 24-7 during a master/slave switch according to the present invention.
- a master-slave switch is a conventional, known operation in which the master (typically the creator of a piconet 38, such as an access point 24) and a slave (e.g., mobile device 26) switch roles so that the former master becomes a slave to the new master (former slave).
- the conventional switch involves a TDD (Time Division Duplex) switch so that the master and slave switch their TX (transmission) and RX (receiving) timing.
- the piconet 38 for the former master is based on piconet parameters derived from the AP device address 52 and clock of the former master.
- the conventional MSS switch leads to a newly defined piconet 38 based on piconet parameters derived from the AP device address 52 and clock of the new master.
- the Bluetooth baseband specification version 1.0 B (available from Bluetooth SIG, Inc.), describes a conventional MSS in Section 10.9.3, "Master-slave switch.”
- the slave in the original piconet 38 is unit "A”
- the master in the original piconet 38 is unit "B”
- the conventional procedure for a MSS switch involves:
- the two units (slave A and master B) agree to trade roles so that unit A will be master and B will be slave.
- Slave A and master B perform a TDD switch between the slave A and master B while retaining (temporarily) the hopping scheme of master B (i.e., spread-spectrum frequency hopping).
- Master A sends a LMP (Link Manager protocol) timing packet to slave B to be used in synchronizing the timing of transmissions between master A and slave B.
- LMP Link Manager protocol
- Master A establishes new channel parameters for a new piconet 38 (including master A and slave B) based on new piconet parameters derived from the address 52 and clock of master A.
- Master A communicates the new piconet parameters to each slave in the former piconet 38.
- Master A verifies the switch of the slaves to the new piconet 38 based on the new piconet parameters.
- this master- slave switch uses this master- slave switch to facilitate a seamless handoff of a mobile device 26 between two access points 24 without requiring any additional software in the mobile device 26.
- Fig. 5 is a flow chart illustrating a procedure 400 for a master-slave switch of the present invention.
- the roaming server 22 detects a triggering event for mobile device 26-6, which is currently a slave to initial access point 24-6, indicating that the mobile device 26-6 should transfer from the initial access point 24-6 to the target access point 24-7.
- the roaming server 22 also detects that mobile device 26-6 has moved within range of target access point 24-7 as its device identifier (e.g., Bluetooth address) can be heard by target access point 24-7 on enquiry logical channel. As a result, the roaming server 22 desires to move mobile device 26-6 from initial access point 24-6 to target access point 24-7. At this point, the target access point 24-7 is a master in piconet B, and the mobile device 26-6 is still a slave in piconet A (see relationship 304 in Fig. 5).
- device identifier e.g., Bluetooth address
- step 404 the roaming server 22 achieves the transfer by instructing the initial access point 24-6 to start a master-slave switch with mobile device 26-6 and perform a partial switch. It follows step 1) and step 2) of the above summarized conventional procedure for a MSS, but then stops, so mobile device 26-6 is now master of piconet A (as illustrated by relationship 306 in Fig. 5) but all the devices are still following the hop pattern and offset of initial access point 24-6.
- the target access point 24-7 can be the master of piconet B at the same time it is the slave of another piconet (e.g., piconet A).
- the roaming server 22 instructs the target access point 24-7 to connect to mobile device 26-6 as a slave.
- mobile device 26-6 is the master of piconet A that includes target access point 24-7 as one of the slaves (see relationship 308 in Fig. 5).
- step 406 the target access point 24-7 then instructs mobile device
- step 408 the initial access point
- Mobile device 26-6 cannot follow because it is now a slave of target access point 24-7 in piconet B (see relationship 310 in Fig. 5). Mobile device 26-6 is now following a hop pattern set by the AP device address 52 of target access point 24-7, so the mobile device 26-6 is part of piconet B.
- Fig. 7 is a block diagram of the communications interface 44 of Fig. 2 including a host controller interface (HCI) 60 and a packet encapsulation module 62.
- the host controller interface 60 is a conventional interface specified by the wireless technology
- the packet encapsulation module 62 is a software or hardware module configured according to the present invention to encapsulate host controller commands in a network based encapsulated packet 64.
- the encapsulated packet 64 includes host device address 66, sequence number 68, acknowledgment number 70, and the host controller command 72 (e.g., HCI command).
- the host device address 66 is based on the AP device address 52 of Fig. 3.
- UDP User Datagram Protocol
- HCI Home Controller Interface
- Fig. 8 is a block diagram of a server wireless protocol stack 74 and an associated complementary access point wireless protocol stack 76.
- the server wireless protocol stack 74 (for a roaming server 22 or master access point 24) includes the TCP/IP (Transmission Control Protocol/Internet Protocol) layer 84, the PPP (point to point) layer 86, the RFCOMM (serial cable emulation protocol) layer 88, the L2CAP (logical link controller adaptation protocol) layer 90, the HCI transport layer 92-1, and the UDP/TP (User Datagram Protocol/Internet Protocol) transport layer 94-1.
- the access point wireless protocol stack 76 includes the HCI transport layer 92-2, the UDP/IP fransport layer 94-2, the link manager layer 100 (e.g., Bluetooth link manager), the link controller layer 102 (e.g., Bluetooth link controller), and the radio layer 104.
- An encapsulated packet signal 108 is a communications signal (e.g., over a LAN) that transports an encapsulated packet 64 between the server wireless protocol stack 74 and the access point wireless protocol stack 76.
- the encapsulated packet signal 108 (and hence encapsulated packet 64) is transported between stacks 74 and 76 at the HCI transport layer 92 and the UDP/IP transport layer 94.
- the encapsulated packet signal 108 includes multiple encapsulated packets 64.
- UDP over TCP is a lower overhead and less delay caused by packet re-transmissions.
- the advantage of UDP encapsulation over Ethernet encapsulation is that the UDP-based packets easily pass through routers.
- the splitting of the wireless protocol stack into two stacks 74 and 76, which includes encapsulation of host controller commands, represents one aspect of the invention.
- the present invention does not require that the wireless protocol stack be split in order to implement the session data transfer (AP device address spoofing) aspect of the present invention (Figs. 3 and 4) and/or the master- slave switch aspect of the present invention (Figs. 5 and 6).
- the session data transfer (AP device address spoofing) aspect of the present invention may be implemented without splitting of the wireless protocol stack or use of the master-slave switch, hi one embodiment, the present invention provides for the implementation of both the session data transfer (AP device address spoofing) aspect of the present invention and the splitting of the wireless protocol stack aspect of the present invention.
- Fig. 9 illustrates the HCI UDP packet format for an encapsulated packet 64 that includes a host controller interface command 72 (e.g., HCI command) based on a network based packet protocol (e.g., UDP).
- a host controller interface command 72 e.g., HCI command
- UDP network based packet protocol
- the encapsulated host controller command 72 is part of the payload 122 when UDP packets are used for the HCI transport layer.
- the version field 112 is a 1-byte value that identifies the version of the packet format used. For the first version of the HCI UDP protocol, the value 0x01 is used.
- the type field 114 specifies a 1-byte value that determines the interpretation of the payload 122. Values are defined in Table 1. Table 1
- the values 0x01 through 0x04 are interpreted as in the HCI UART Transport Layer (as described in the Bluetooth Core Specification version 1.0B, available from Bluetooth SIG. h e, (see also the www.bluetooth.com web site).
- the value 0x10 is for control messages related to session initiation and tear down.
- the value 0x11 is a Zero- Length Body (ZLB) message used for acknowledgments.
- ZLB Zero- Length Body
- the BD_ADDR field 116 contains a host device address 66, such as a 48-bit Bluetooth device identifier, with the MSB being transmitted first.
- the BD_ADDR field 116 is shown as six 8-bit fields, 116-1, 116-2, 116-3, 116-4, 116- 5, and 116-6 that together make up the 48-bit Bluetooth device identifier.
- the BD_ADDR identifies the host controller (e.g., access point 24 or roaming server 22) that is the source or destination of the encapsulated HCI packet 64.
- the sequence number field 118 is an unsigned 16-bit integer field that contains a sequence number 68 used to ensure reliable, in-order delivery of encapsulated HCI packets 64. Its use is described later.
- the acknowledgment number field 120 is an unsigned 16-bit integer field used to contain the acknowledgment number 70 to ensure reliable, in-order delivery of encapsulated HCI packets 64. Its use is described later. Sequence numbers 68 and acknowledgment numbers 70 together provide reliable and sequenced transport of encapsulated HCI packets 64. The following description of the use of these numbers 68, 70 is based on the use of Nr and Ns fields in L2TP (Layer Two Tunneling Protocol) confrol packets. See Section 5.8, "Reliable Delivery of Confrol Messages" of RFC2661 , “Layer Two Tunneling Protocol: L2TP", Internet Engineering Task Force, the entire teachings of which are incorporated herein by reference.
- the sequence numbers 68 begin at a value of 0, and are incremented with the transmission of every encapsulated packet 64.
- the sequence counter is a free running counter represented modulo 65536.
- the sequence number 68 in the header of a received message is considered less than equal to the last received sequence number 68 if its value lies in the range of the last received sequence number 68 and the preceding 32767 values, inclusive. For example, if the last received sequence number 68 was 15, then messages with sequence numbers 68 with values of 0 through 15, as well as values 32784 through 65535, would be considered less than or equal. Such a message would be considered a duplicate of a message already received and ignored from processing. However, in order to ensure that all messages are acknowledged properly, receipt of duplicate messages is acknowledged.
- This acknowledgment may be either piggybacked on a message in queue, or sent explicitly through a ZLB acknowledgment. All encapsulated packets 64 take up one slot in the sequence number space, except the ZLB acknowledgment. Thus the sequence number 68 is not incremented after a ZLB message is sent.
- the acknowledgment number 70 is used to acknowledge messages received by the peer. It contains the sequence number 68 of the message the peer expects to receive next (e.g., the last sequence of a non-ZLB message received plus 1, modulo 65536). While the acknowledgment number 70 in a received ZLB is used to flush out messages from the local retransmit queue, the sequence number 68 of the ZLB does not update the acknowledgment number 70 of the next message sent.
- a sliding window is implemented in order to deal with random transmission time delays. While this invention has been particularly shown and described with references to preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details maybe made therein without departing from the scope of the invention encompassed by the appended claims.
- the techniques of the present invention can be applied to wireless technologies and wireless communication protocols other than the Bluetooth technology, IEEE 802.11 technology, and the ETSI HIPERLAN/2 technology, hi particular, the techniques of the present invention can be applied to other wireless technologies and protocols suitable for wireless communications among mobile devices 26 and network devices (e.g., access points 24).
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US24197500P | 2000-10-23 | 2000-10-23 | |
US241975P | 2000-10-23 | ||
US911092 | 2001-07-23 | ||
US09/911,092 US7260638B2 (en) | 2000-07-24 | 2001-07-23 | Method and system for enabling seamless roaming in a wireless network |
PCT/US2001/051306 WO2002041587A2 (en) | 2000-10-23 | 2001-10-22 | Method and system for enabling centralized control of wireless local area networks |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1330894A2 true EP1330894A2 (de) | 2003-07-30 |
Family
ID=26934736
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP01987586A Withdrawn EP1330894A2 (de) | 2000-10-23 | 2001-10-22 | Verfahren und system zur zentralen steuerung von drahtlosen lokalen netzwerken |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1330894A2 (de) |
JP (1) | JP2004514383A (de) |
AU (1) | AU2002239788A1 (de) |
CA (1) | CA2426482A1 (de) |
WO (1) | WO2002041587A2 (de) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102026301A (zh) * | 2009-09-15 | 2011-04-20 | 中兴通讯股份有限公司 | 时延敏感型前向服务质量业务的数据分配方法及系统 |
Families Citing this family (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7126937B2 (en) | 2000-12-26 | 2006-10-24 | Bluesocket, Inc. | Methods and systems for clock synchronization across wireless networks |
US7016325B2 (en) | 2001-01-18 | 2006-03-21 | Strix Systems, Inc. | Link context mobility method and system for providing such mobility, such as a system employing short range frequency hopping spread spectrum wireless protocols |
US7151757B2 (en) | 2001-05-02 | 2006-12-19 | Strix Systems, Inc. | Wireless base station to base station synchronization in a communication system, such as a system employing a short-range frequency hopping or time division duplex scheme |
WO2002103988A1 (en) | 2001-05-02 | 2002-12-27 | Strix Systems, Inc. | Wireless base station neighbor discovery in a communication system employing a short-range frequency hopping scheme |
US7194010B2 (en) | 2001-05-02 | 2007-03-20 | Strix Systems, Inc. | Wireless base station to base station synchronization in a communication system, such as a system employing a short range frequency hopping or time division duplex scheme |
GB2389005B (en) * | 2002-05-23 | 2005-09-07 | Inc Motorola | Communications methods and apparatus for use therein |
US7113498B2 (en) | 2002-06-05 | 2006-09-26 | Broadcom Corporation | Virtual switch |
ATE471008T1 (de) * | 2002-06-26 | 2010-06-15 | Nokia Corp | Lastausgleich in einem drahtlosen kommunikationsnetz |
WO2004034229A2 (en) | 2002-10-10 | 2004-04-22 | Rocksteady Networks, Inc. | System and method for providing access control |
EP1411670B1 (de) * | 2002-10-17 | 2005-12-28 | Alcatel | Hybrides UMTS/WLAN Telekommunikationssystem |
US7698550B2 (en) * | 2002-11-27 | 2010-04-13 | Microsoft Corporation | Native wi-fi architecture for 802.11 networks |
KR100580244B1 (ko) * | 2003-01-23 | 2006-05-16 | 삼성전자주식회사 | 무선랜상의 핸드오프 방법 |
FI114076B (fi) | 2003-02-05 | 2004-07-30 | Teliasonera Finland Oyj | Menetelmä ja järjestelmä tilaajan autentikointiin |
US20040185845A1 (en) | 2003-02-28 | 2004-09-23 | Microsoft Corporation | Access point to access point range extension |
BRPI0408619A (pt) * | 2003-03-27 | 2006-03-07 | Thomson Licensing | deslocamento seguro entre pontos de acesso sem fio |
US7167705B2 (en) * | 2003-06-27 | 2007-01-23 | Oracle International Corporation | Roaming across different access mechanisms and network technologies |
US7624438B2 (en) | 2003-08-20 | 2009-11-24 | Eric White | System and method for providing a secure connection between networked computers |
CN1312870C (zh) * | 2003-09-03 | 2007-04-25 | 中兴通讯股份有限公司 | 移动终端在码分多址系统与无线局域网间切换的方法 |
US20050135310A1 (en) * | 2003-12-19 | 2005-06-23 | International Business Machines Corporation | Autonomic client reassociation in a wireless local area network |
US7359339B2 (en) * | 2003-12-23 | 2008-04-15 | Lenovo Singapore Pte Ltd | Smart access point |
US8543710B2 (en) | 2004-03-10 | 2013-09-24 | Rpx Corporation | Method and system for controlling network access |
US7590728B2 (en) | 2004-03-10 | 2009-09-15 | Eric White | System and method for detection of aberrant network behavior by clients of a network access gateway |
US7665130B2 (en) | 2004-03-10 | 2010-02-16 | Eric White | System and method for double-capture/double-redirect to a different location |
US7610621B2 (en) | 2004-03-10 | 2009-10-27 | Eric White | System and method for behavior-based firewall modeling |
KR101075657B1 (ko) * | 2004-05-29 | 2011-10-21 | 삼성전자주식회사 | 무선랜에서의 빠른 핸드오프 방법 |
DE102004052331A1 (de) | 2004-10-27 | 2006-05-04 | Nec Europe Ltd. | Verfahren zur Steuerung der Kommunikation mit mobilen Stationen in einem Netzwerk |
JP2006222549A (ja) * | 2005-02-08 | 2006-08-24 | Nec Corp | 無線lanシステムにおけるローミング方法および無線lanシステム |
KR100694208B1 (ko) * | 2005-03-07 | 2007-03-14 | 삼성전자주식회사 | 무선 근거리 통신 시스템의 서비스 제공 방법 및 그 장치 |
EP1705835A1 (de) * | 2005-03-22 | 2006-09-27 | Gemtek Systems, Inc. | Verfahren und Systeme für schnelles Weiterreichen in 802.11 Netzen |
US20060264212A1 (en) * | 2005-05-20 | 2006-11-23 | Ramesh Sekhar | Method and system for a roam-less mobile unit |
JP2007068054A (ja) | 2005-09-01 | 2007-03-15 | Fujitsu Ltd | 無線装置 |
JP4829600B2 (ja) * | 2005-11-28 | 2011-12-07 | キヤノン株式会社 | 通信装置及び通信装置の制御方法 |
GB0606071D0 (en) | 2006-03-27 | 2006-05-03 | Siemens Ag | Indication of dtm handover command |
JP5012799B2 (ja) * | 2006-07-04 | 2012-08-29 | 富士通株式会社 | 通信装置、通信装置による無線通信装置の接続先切替制御方法およびプログラム |
FR2905551B1 (fr) * | 2006-09-06 | 2009-01-23 | Alcatel Sa | Procede de gestion des connexions entre un terminal sans fil et des interfaces d'acces |
US8245284B2 (en) | 2006-10-05 | 2012-08-14 | Microsoft Corporation | Extensible network discovery |
WO2008081137A2 (fr) * | 2006-12-22 | 2008-07-10 | France Telecom | Procede de commutation de communication, point d'acces, controleur de reseau et programmes d'ordinateur associes |
US7907562B2 (en) * | 2007-06-20 | 2011-03-15 | Microsoft Corporation | Managing dense wireless access point infrastructures in wireless local area networks |
US8155588B2 (en) * | 2007-12-27 | 2012-04-10 | Lenovo (Singapore) Pte. Ltd. | Seamless hand-off of bluetooth pairings |
US8599793B2 (en) * | 2010-04-28 | 2013-12-03 | Cisco Technology, Inc. | Troubleshooting client roaming |
EP2622493A1 (de) * | 2010-09-30 | 2013-08-07 | Apple Inc. | Paarungstransfer drahtloser zubehörvorrichtungen zwischen mehreren host-vorrichtungen |
US20130115880A1 (en) * | 2011-11-09 | 2013-05-09 | Cisco Technology, Inc. | Pairing a Bluetooth Device to a Virtual Desktop in a Hosted Desktop Environment |
CN104159252A (zh) * | 2014-08-25 | 2014-11-19 | 醴陵恒茂电子科技有限公司 | 无线接入点集中网络管理装置及其管理方法 |
US11178728B1 (en) * | 2020-07-09 | 2021-11-16 | Cassia Networks Inc. | Method and system for wireless roaming |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2062040C (en) * | 1992-02-28 | 2001-01-16 | Deborah Pinard | Mobile wireless communications system |
US5901144A (en) * | 1995-04-13 | 1999-05-04 | Hitachi, Ltd. | Mobile radio communications system |
US6038458A (en) * | 1996-12-30 | 2000-03-14 | Nokia Telecommunications Oy | Method for selecting a signal, and a cellular radio system |
US6026297A (en) * | 1997-09-17 | 2000-02-15 | Telefonaktiebolaget Lm Ericsson | Contemporaneous connectivity to multiple piconets |
US6560210B1 (en) * | 1998-06-10 | 2003-05-06 | Lucent Technologies Inc. | Handing off a wireless terminal in a wireless telecommunications system |
JP3111992B2 (ja) * | 1998-07-07 | 2000-11-27 | 日本電気株式会社 | 自動車通信方法及びシステム |
US6549951B1 (en) * | 1998-08-25 | 2003-04-15 | Stmicroelectronics, Inc. | Method and device for controlling communications with a serial bus |
-
2001
- 2001-10-22 WO PCT/US2001/051306 patent/WO2002041587A2/en not_active Application Discontinuation
- 2001-10-22 AU AU2002239788A patent/AU2002239788A1/en not_active Abandoned
- 2001-10-22 JP JP2002543871A patent/JP2004514383A/ja active Pending
- 2001-10-22 EP EP01987586A patent/EP1330894A2/de not_active Withdrawn
- 2001-10-22 CA CA002426482A patent/CA2426482A1/en not_active Abandoned
Non-Patent Citations (1)
Title |
---|
See references of WO0241587A2 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102026301A (zh) * | 2009-09-15 | 2011-04-20 | 中兴通讯股份有限公司 | 时延敏感型前向服务质量业务的数据分配方法及系统 |
CN102026301B (zh) * | 2009-09-15 | 2015-04-01 | 中兴通讯股份有限公司 | 时延敏感型前向服务质量业务的数据分配方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
JP2004514383A (ja) | 2004-05-13 |
CA2426482A1 (en) | 2002-05-23 |
WO2002041587A2 (en) | 2002-05-23 |
AU2002239788A1 (en) | 2002-05-27 |
WO2002041587A3 (en) | 2003-02-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7146636B2 (en) | Method and system for enabling centralized control of wireless local area networks | |
WO2002041587A2 (en) | Method and system for enabling centralized control of wireless local area networks | |
US7480272B2 (en) | Soft handoff in IP-based CDMA networks by IP encapsulation | |
US7126937B2 (en) | Methods and systems for clock synchronization across wireless networks | |
US6842460B1 (en) | Ad hoc network discovery menu | |
US7016336B2 (en) | Administrative domains for personal area networks | |
US20050037818A1 (en) | Providing a universal wireless headset | |
US20070177629A1 (en) | Method of associating an ip address with a plurality of link layer addresses in a wireless communication network | |
US20020167965A1 (en) | Link context mobility method and system for providing such mobility, such as a system employing short range frequency hopping spread spectrum wireless protocols | |
US20020072382A1 (en) | Dynamic, dual-mode wireless network architecture with a split layer 2 protocol | |
EP1411686A2 (de) | Drahtloses Kommunikationsgerät und Verfahren für verbindungsloses Rundumsenden | |
JP2010509831A (ja) | 基本サービスセットの動的割当 | |
WO2003105499A1 (en) | Virtual switch | |
JP2009500918A (ja) | 無線ローカルエリアネットワークにおいて無線クライアント用ipアドレスの割当て及び管理を行う方法、システム、及び装置 | |
KR20070085799A (ko) | 기반구조-기반 멀티-홉 무선 네트워크의 mac 어드레스프라이버시를 위한 방식 | |
WO2007122992A1 (en) | Fast link-down detection systems and methods | |
JP2008547357A (ja) | 移動可能デバイスの移動の制御用に構成されたルーチングのデータ及びリンク品質のデータのアプリケーション層への呈示 | |
JP2003516033A (ja) | ルート探索に基づいたピコネットの確立方法 | |
US20070078974A1 (en) | Time synchronized wireless method and operations | |
JP2003519994A (ja) | パケット・データ・サービス・ネットワークからポイント対ポイント・プロトコル(ppp)催促を要求するための方法及び装置 | |
EP1676459B1 (de) | System und verfahren zur handhabung von ip-schicht-mobilität in einem drahtlosen netzwerk | |
JP2002529021A (ja) | 共通ipアドレス付きの移動端末および無線装置 | |
WO2002058334A2 (en) | System, method and computer-readable medium for wirelessly exchanging communication with a mobile unit | |
GB2366138A (en) | Overhead message updating | |
Hossain | Performance improvement of mobile IP-based handoff between WLAN and GPRS networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
17P | Request for examination filed |
Effective date: 20030827 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20050402 |