EP1588502A1 - Mobile wireless base station - Google Patents

Mobile wireless base station

Info

Publication number
EP1588502A1
EP1588502A1 EP03739359A EP03739359A EP1588502A1 EP 1588502 A1 EP1588502 A1 EP 1588502A1 EP 03739359 A EP03739359 A EP 03739359A EP 03739359 A EP03739359 A EP 03739359A EP 1588502 A1 EP1588502 A1 EP 1588502A1
Authority
EP
European Patent Office
Prior art keywords
wireless
bridge
lan
wan
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP03739359A
Other languages
German (de)
French (fr)
Other versions
EP1588502A4 (en
Inventor
Zhen-Hong Top Global USA Inc. ZHOU
Shi Top Global USA Inc. LEI
Yu Top Global USA Inc. YANG
Weizhou Top Global USA Inc. WANG
Wei Top Global USA Inc. QINGXIN
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Top Global USA Inc
Original Assignee
Top Global USA Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Top Global USA Inc filed Critical Top Global USA Inc
Publication of EP1588502A1 publication Critical patent/EP1588502A1/en
Publication of EP1588502A4 publication Critical patent/EP1588502A4/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/02Inter-networking arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4604LAN interconnection over a backbone network, e.g. Internet, Frame Relay
    • H04L12/462LAN interconnection over a bridge based backbone
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/009Arrangements for interconnection between switching centres in systems involving PBX or KTS networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/10Aspects of automatic or semi-automatic exchanges related to the purpose or context of the telephonic communication
    • H04M2203/1091Fixed mobile conversion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2207/00Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place
    • H04M2207/18Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place wireless networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/006Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • This invention relates to communication systems and methods, particularly systems and methods that facilitate communication between different networks.
  • wireless local area networks have been developed as an enhanced replacement for wired LANs.
  • a wireless LAN a plurality of mobile network stations (e.g., personal computers, telecommunication devices, etc.) are present that are capable of wireless communication.
  • data-communication in a wireless LAN can be more versatile, due to the flexibility of the arrangement of network stations in the area covered by the LAN, and due to the absence of cabling connections.
  • Wireless LANs are generally implemented according to the standard as defined by the ISO/IEC 8802-11 international standard (IEEE 802.11).
  • IEEE 802.11 describes a standard for wireless LAN systems that will operate in the 2.4-2.5 GHz ISM (industrial, scientific and medical) band. This ISM band is available worldwide and allows unlicensed operation for spread spectrum systems. The 2,400-2,483.5 MHz band has been allocated for both the US and Europe.
  • the IEEE 802.11 standard focuses on the MAC (medium access control) and PHY (physical layer) protocols for access point based networks and ad-hoc networks.
  • the stations within a group or cell can communicate only directly to the access point.
  • This access point forwards messages to the destination station within the same cell or through the wired distribution system to another access point, from which such messages arrive finally at the destination station.
  • the 802.11 standard supports three PHY protocols: DSSS (direct sequence spread spectrum), FHSS (frequency hopping spread spectrum), and infrared with PPM (pulse position modulation). All these three PHYs all provide bit rates of 1 and 2 Mbit/s. Furthermore, IEEE 802.11 includes extensions 11a, l ib, and llg which allow for additional higher bit rates: Extension 1 lb provides bit rates 5.5 and 11 Mbit/s as well as the basic DSSS bit rates of 1 and 2 Mbit/s within the same 2.4-2.5 GHz ISM band. Extension 1 la provides a high bit rate OFDM (Orthogonal Frequency Division Multiplexing modulation) PHY standard providing bit rates in the range of 6 to 54 Mbit/s in the 5 GHz band. Extension 1 lg provides a high bit rates upto 54 Mbit/s using OFDM in the 2.4-2.5 GHz ISM band.
  • OFDM Orthogonal Frequency Division Multiplexing modulation
  • the IEEE 802.11 basic MAC protocol allows interoperability between compatible PHYs through the use of the CSMA/CA (carrier sense multiple access with collision avoidance) protocol and a random back-off time following a busy medium condition.
  • the IEEE 802.11 CSMA CA protocol is designed to reduce the collision probability between multiple stations accessing the medium at the same time. Therefore, a random back-off arrangement is used to resolve medium contention conflicts.
  • the IEEE 802. 11 MAC protocol defines special functional behavior for fragmentation of packets, medium reservation via RTS/CTS (request-to-send/clear-to-send) polling interaction and point coordination (for time-bounded services).
  • the IEEE 802.11 MAC protocol defines Beacon frames sent at regular intervals by the access point to allow stations to momtor the presence of the access point.
  • the IEEE 802.11 MAC protocol also gives a set of management frames including Probe Request frames which are sent by a station and are followed by Probe Response frames sent by an available access point, to allow a station to scan actively if there is an access point operating on a certain channel frequency and to show to the station what parameter settings this access point is using.
  • Wireless personal digital assistants and "smart" cellular telephones are the most popular devices known to provide "mobile Internet” access for the mass consumer market.
  • the present invention is directed to the use of a mobile wireless bridge (MWB) to provide wired and wireless local area network (LAN) clients (jointly hereinafter simply “LAN clients”) uninterrupted wide area network (WAN) access to Internet resources even if a WAN initially used to access such resources becomes unavailable.
  • a mobile wireless bridge as the term is used herein, is a device that is adapted to act as a bridge at least between a wireless LAN, a wireless WAN and one other WAN, and preferably is adapted to act as a bridge at least between a wired LAN, a wireless LAN, a wired LAN, and a wireless LAN.
  • MWB is adapted to interface with a variety of WANs and to seamlessly switch between WANs if a WAN being used becomes unavailable, unreliable, or otherwise undesirable.
  • MWBs will generally also comprise at least one Access Controller that controls LAN client access to any WAN the MWB has access to.
  • MWBs will be adapted couple LANs to Internet resources via a hardwired connection (e.g. cable modem, DSL, TI, etc.) and at least one mobile cellular coi nunications network (MCCN) such that computers or other devices that are not equipped to directly access the MCCN can access Internet resources via the MCCN.
  • a hardwired connection e.g. cable modem, DSL, TI, etc.
  • MCCN mobile cellular coi nunications network
  • MWBs will function as a LAN access point even if the bridge is currently not coupled to any WANs, provide LAN clients access to a wired WAN whenever the MWB has reliable access to any such wired WAN, provide LAN clients access to a wireless WAN whenever any such wired WAN becomes unavailable, and maintain wireless WAN access despite movement of the MWB to different geographic locations.
  • MWBs eliminates the need for LAN clients to include the hardware and software required to directly access a wired or wireless WAN.
  • a LAN client needs to access a WAN it uses its (the client's) LAN access and a MWB that is part of the LAN to access a wired or wireless WAN. Since the LAN client does not access the WAN directly, it has no need to support the hardware and/or software necessary for direct WAN access.
  • the use of multiple MWBs can provide continuous LAN access for LAN clients even if the LAN client moves out of the range of any particular MWB. As such, the use of multiple MWBs allows LAN clients to roam between LANs such bridges are part of.
  • MWBs can also provide a simple method of providing WAN access to LAN clients in areas where wired WANs are impractical.
  • LAN clients can have LAN access, WAN access, and Internet access even when the LAN client is out of range of fixed position LAN access points, and does not have access to a wired WAN.
  • FIG. 1 A illustrates a network in accordance with the claimed invention.
  • Figure IB illustrates the network of figure 1A where the MWB is accessing only one of two WANs.
  • Figure 1C illustrates the network of figure 1A where the MWB is accessing only one of two WANs.
  • Figure 2A illustrates a network comprising a plurality of MWBs in accordance with the claimed invention.
  • Figure 2B illustrates the network of figure 2 A after a LAN client and a MWB have changed position.
  • FIG. 3 illustrates the hardware and software modules of a MWB in accordance with the claimed invention.
  • Figure 4A is a diagram illustrating how data packet streams are transmitted and forwarded by a MWB between different network systems in accordance with the claimed invention.
  • Figure 4B is a flow chart illustrating the steps by which wired or wireless LAN users are authenticated in wired WAN and wireless WAN systems in accordance with the claimed invention.
  • Figure 5 is a flow chart illustrating the steps by which data packets are controlled and forwarded when wired LAN or wireless LAN users access wired or wireless WAN system resources in accordance with the claimed invention.
  • FIG. 1 A illustrates a network 100 comprising a MWB 110, coupling wireless WAN 120, wired WAN 130, wireless LAN 140, and wired LAN 150.
  • MWB 110 acts as the access point for wireless LAN 140.
  • LANs 140 and 150 include LAN clients 141-143 and 151-153.
  • WANs 110 and 120 are also coupled to the Internet 190 such that any LAN client (141-143, 151-153) obtaining access to WAN 110 or 120 also has access to Internet 190 via WAN 110 or 120.
  • LAN clients are able to access Internet resources via MWB 110 and wired WAN 110 and/or wireless WAN 120.
  • MWB 110 be adapted to couple LANs to wireless WANs but not to wired LANs, and/or may be adapted to only couple wireless LANs to wireless WANs.
  • LAN clients are devices adapted to be coupled to a LAN, while LAN users are people or other entities that use such LAN clients.
  • the terms "user” and “client” are to a large degree interchangeable as all LAN users will utilize a LAN client.
  • Examples of LAN clients include computers (mainframe, workstation, desktop, laptop, notebook, etc.), personal data assistants (PDAs), and mobile telephones among others.
  • MWB 110 will provide WAN access to LAN clients through the use of a wired WAN such as WAN 110 whenever a wired WAN is available as illustrated by figure IB. If such a wired WAN is not available, or becomes unavailable (possibly due to disconnection, failure, unreliability, and/or remoteness), MWB 110 will utilize a wireless WAN such as WAN 120 to provide WAN/Internet access to LAN clients as illustrated in figure lC.
  • a wired WAN such as WAN 110 whenever a wired WAN is available as illustrated by figure IB. If such a wired WAN is not available, or becomes unavailable (possibly due to disconnection, failure, unreliability, and/or remoteness), MWB 110 will utilize a wireless WAN such as WAN 120 to provide WAN/Internet access to LAN clients as illustrated in figure lC.
  • a switch is made from a first WAN to a second WAN the transition will be made in such a manner that it has minimal impact if any on any LAN clients that are or will be accessing Internet resources.
  • Giving priority to any available wired WAN will decrease the load on wireless WANs and potentially may provide higher data rates and increased reliability to LAN client access of Internet resources while being able to fall back to a wireless LAN helps insure that access to such resources continues even when a wired WAN is unavailable.
  • MWB 110 may be utilized in situations where wired WANs are unavailable or impractical.
  • One example would be the use of MWB 110 to provided WAN access to LAN clients located in remote locations.
  • Another example would be to use MWB 110 to provide WAN access to clients in regions that are highly developed but have not been wired to provide WAN access.
  • Yet another example would be to provide WAN access to LAN clients on vehicles. By installing a MWB 110 on a vehicle, LAN clients on the vehicle would be able to obtain WAN/Internet via a wireless (and/or in some instances wired) LAN.
  • MWB 110 Before providing access to a particular WAN, MWB 110 will authenticate any LAN client trying to obtain such access. Such authentication may be done at any time prior to providing a LAN client WAN access, possibly when a LAN client first accesses MWB 110, and/or when a LAN client first attempts to access a particular WAN.
  • MWBs may be accomplished in any reasonable fashion such as through wired and/or wireless dedicated and/or shared communication lines, and/or wireless distribution system (WDS) technology.
  • WDS wireless distribution system
  • Interconnecting MWBs will facilitate roaming of LAN clients in an area of coverage that is larger than can be provided by a single MWB.
  • a network 200 comprises MWBs 210A-210D interconnected by WDS 260, where MWBs 210A-210D in conjunction with wired WANs 230A and 230B, wireless WANs 220A and 220B, wired LANs 250A and 250B, wireless LANS 240B-240D provide access to the Internet 290 to LAN clients 251-254 and 241-243 in the manner previously described in relation to network 100 of figure 1.
  • client 243 is at a first location and coupled to MWB 210C via wireless LAN 240C.
  • client 243 is at a different location and coupled to MWB 210D via wireless LAN 240D.
  • the switch from MWB 210C to MWB 210D would be accomplished without any interruption of service to LAN client 243.
  • a vehicle mounted MWB 210B is at a first location and coupled via wireless WAN 220A to Internet 290 while in figure 2B MWB 210B is coupled to Internet 290 via wireless WAN 220B.
  • MWBs When MWBs are interconnected with each other (and possible with other devices that provide related functions) that they MWBs cooperate to best meet the needs of any LAN clients using such MWBs. As such, MWBs may hand off LAN clients to other MWBs if another MWB is better suited to satisfy the needs of the client. Alternatively, MWBs may route LAN client communications between themselves to provide the LAN clients with optimum service. In some instances routing between MWBs may be done to provide LAN clients of a first MWB with higher speed Internet access available to a second MWB.
  • a first MWB can connect with at least one other MWB or access point through a WDS
  • MWBs such as MWB 110 of figures 1A-1C and MWBs 210A-210D of figures 2A and 2B will preferably comprise at least the following hardware and software modules as illustrated in figure 3 in regard to MWB 300:
  • Wireless LAN (WLAN) module 313, which is compatible with IEEE
  • 802.1 la/b/g standards can be used to construct wireless LAN basic service set (BSS) and wireless distribution system (WDS), implement wireless access functions to provide wireless access to LAN clients.
  • BSS basic service set
  • WDS wireless distribution system
  • LAN Ethernet Controller 312 through which the LAN system domain can be expanded, and through which other wired or wireless LAN systems can be interconnected;
  • WAN Ethernet Controller 315 through which the LAN clients in wired and wireless LANs can access wired WANs and Internet resources.
  • Wireless WAN (WWAN) module 310 which can be a GPRS module, CDMA1X module, any 3G module, or any other type of module that provides access to a particular type of WAN system that is to be accessed by LAN clients using MWB 300. As an example, if LAN clients are to access Internet resource through a GPRS network system, this WWAN module must be a GPRS module. 5. Spanning Tree Protocol (STP) bridge software module 311, which is responsible for data packets forwarding between different LAN (wired and wireless LAN).
  • STP Spanning Tree Protocol
  • NAT/NAPT Network Address Translation and Network Address Port Translation
  • Radius Client module 316 which is used in conjunction with a Radius Server for authentication, authorization and accounting of wired an/or wireless LAN clients and/or their users. This module will preferably be used with one of following authentication methods.
  • Web Portal module 317 which is a simple and practical authentication method, and is used in the most authentication application.
  • IEEE 802. IX module 318 which is another authentication method, and is often used in wireless LAN user authentication. This authentication method is defined in the newest WLAN security standard.
  • PPPoE module 319 which is a set of communication technology, and consist of authentication method, security and some other components usually used in PPP communication and Ethernet applications. In this patent description, its authentication method is mainly used.
  • SLM Card module 320 which is responsible for authenticating MWB 300 as a mobile client in WWAN network system
  • the MWB has 4 network interfaces: the LAN and WAN Ethernet controllers 312 and 315 connect to a wired LAN and a wired WAN through 2 standard RJ45 interfaces 321 and 322; the wireless LAN module 313 communicates with the WLAN BSS and WDS through IEEE802.1 la/b/g radio interface 323; the wireless WAN module 310 acts as a mobile station in WWAN systems (GPRS, CDMA1X and 3G), and connects the WWAN systems through corresponding air radio interfaces 324.
  • WWAN GPRS, CDMA1X and 3G
  • MWBs may be equipped with modules that support voice, video, and other types of communications as well.
  • modules listed as hardware modules may take the form of software modules and similarly software modules may take the form of hardware modules.
  • Some embodiments may be limited by the modules they contain to accessing only a limited number of different types of LANs and WANs while other embodiments may be more adaptable and able to access all major types of LANs and/or WANs. Standards described may change as newer standards are adopted such that MWBs will continue to be used despite such standard changes.
  • FIG. 4A illustrates the flow of data packets between different network modules.
  • Packets can flow between any of two of the wired WAN, wireless WAN, wired LAN, and wireless LAN modules except that the MWB is preferred not to support packet flow directly between the wired and wireless WAN modules.
  • LAN clients access WANs
  • network address translation and possible protocol translation is performed. Since a MWB is preferred to access as an access point in a wireless LAN, some packets from wireless LAN clients may be intended for other wireless LAN clients. In such instances the wireless LAN module is preferred to route such packets without passing them on to the other modules.
  • LAN clients When LAN clients want to access the Internet packets will preferably be routed to the wired WAN module if a wired WAN is available, but will otherwise be routed to the wireless WAN module
  • Data packets passing from LAN to WAN modules will preferably first be checked for the data packets source and destination port at the spanning tree bridge module which will then send the data packets to NAT/NAPT module to complete packets network address translation, which will then send them to the wired or wireless WAN module. These steps will be performed in reverse for packets received by a WAN module and headed for a LAN module.
  • a MWB can collect user's traffic stream data, and limit the usage of data communication bandwidth by every users according to some predefined rules or subscription information.
  • User's data traffic control can be implemented at the 2nd network layer in the STP bridge module and also can be implemented at the 3rd network layer in the NAT route module.
  • the traffic control implementation is based on the theory that outbound data rate should be controlled by the network interface. Because a MWB must control the data traffic from wired or wireless LAN to wired or wireless WAN network system, the users traffic control is preferably implemented at the 3rd layer based on the NAT/NAPT module.
  • Traffic control means that the device interfaces should be controlled to limit data send rate. If the uplink data rate should be controlled, the data rate to uplink port must be controlled and limited. If the downlink data rate should be controlled, the data rate to the downlink port must be controlled and limited. Traffic control in a MWB can be implemented at at least 2 stages of data transmission: (1) before data packets queue or (2) after data packets queue.
  • the flowchart shown illustrates method 400 by which data packets received by a MWB are controlled and forwarded when LAN clients access a WAN/Internet system resource.
  • the Net Address Translation module receives packet from an uplink or downlink.
  • the Net Address Translation module filters the packet received according to the header of the packet. Illegal packets will be abandoned and legal packets will be transferred in the uplink or downlink of step 430.
  • seven parameters will be, in step 440, set for every LAN client where the seven parameters include: i. MAC address of client (macAddr); ii. Up link rate of client (upRate); iii.
  • Down link rate of client (downRate); iv. Bytes transmitted by the client in the current period (upCount); v. Bytes received by the client in the current period (downCount); vi. Total bytes transmitted by the client: (upTotal); and vii. Total bytes received by the client (downTotal).
  • MWB In order to control the traffic of the client, MWB needs to check whether the bytes transmitted/received by the client in the current period (1 second for example) is bigger than the up/down link rate set for this client when the packets from/to this client are going to enter the relative queue.
  • the packet will enter the relative queue to wait to be transmitted/received in step 460. Then in step 470, the packet will be transferred to the appropriate port for uplink or downlink. If the bytes transmitted/received by the client in the current period is bigger than the up/down link rate set for this client, the packet will be abandoned in step 480.
  • the upCount and the downCount values are accumulated according to the transfer of data packets, and at the start point of each period (1 second for example) the upCount and the downCount values are reset to zero.
  • the step 530 indicates wireless or wired LAN users prepare to access wired or wireless WAN network resource through a MWB such as bridge 110 of figure 1; the step 531 indicates that the MWB will judge if a wired WAN resource is available; the step 532 indicates that, if a wired WAN is available, the MWB will authenticate LAN clients and/or users with traditional authentication methods, which include Web Portal + Radius Client method, LEEE 802. IX or PPPoE + Radius Client methods, etc.
  • the step 533 indicates that, if the wired WAN system resource is not available, the MWB will judge if a wireless WAN resource is available; the step 534 indicates that, if a wireless WAN resource is available, authentication should be done via wireless WAN system authentication methods.
  • the detailed authentication action in WWAN system is that, as the step 535 describes, the SIM card module in the MWB will first be called on to authenticate the MWB itself as a mobile station in WWAN system, then as the step 536 describes, the LAN clients/users that indirectly access Internet through wireless WAN system can be authenticated by traditional authentication methods via the Internet a described in step 532.
  • the step 537 describes LAN users can't access WAN network resource, and then MWB doesn't authenticate any user or client.

Abstract

A mobile wireless bridge (MWB) (110) is able to bridge traffic in either direction between a wireless LAN (140) and a wireless WAN (130), and support roaming of LAN clients (141-143, 151-153) and of the MWB (110) itself. Through the MWB (110), wired (150)and wireless LAN (140) clients (141-143, 151-153) and users are provided Internet (190) connectivity even if the LAN client (141-143, 151-153) is not otherwise able to access the wireless WAN (120). Preferred MWBs (110) will utilize mobile cellular communication networks100 as part of a WAN (120, 130) used to obtain access to Internet (190) resources. LAN clients (141-143, 151-153) and users can also access each other through the MWB (110) with the MWB (110) functioning as a hub, switch, gateway, and/or access point. Some MWBs (110) will be adapted to access multiple types of LANs (140, 150) and multiple types of WANs (120, 130).

Description

MOBILE WIRELESS BASE STATION
This application claims the benefit of Chinese national patent application number 03101878.5 titled "The methods and the systems of data communication between different networks" and filed on or about January 28, 2003, incorporated herein by reference in its entirety.
Field of The Invention
This invention relates to communication systems and methods, particularly systems and methods that facilitate communication between different networks.
Background of The Invention
Recently, wireless local area networks (LANs) have been developed as an enhanced replacement for wired LANs. In a wireless LAN a plurality of mobile network stations (e.g., personal computers, telecommunication devices, etc.) are present that are capable of wireless communication. As compared to wired LANs, data-communication in a wireless LAN can be more versatile, due to the flexibility of the arrangement of network stations in the area covered by the LAN, and due to the absence of cabling connections.
Wireless LANs are generally implemented according to the standard as defined by the ISO/IEC 8802-11 international standard (IEEE 802.11). IEEE 802.11 describes a standard for wireless LAN systems that will operate in the 2.4-2.5 GHz ISM (industrial, scientific and medical) band. This ISM band is available worldwide and allows unlicensed operation for spread spectrum systems. The 2,400-2,483.5 MHz band has been allocated for both the US and Europe. The IEEE 802.11 standard focuses on the MAC (medium access control) and PHY (physical layer) protocols for access point based networks and ad-hoc networks.
In access point based wireless networks, the stations within a group or cell can communicate only directly to the access point. This access point forwards messages to the destination station within the same cell or through the wired distribution system to another access point, from which such messages arrive finally at the destination station.
The 802.11 standard supports three PHY protocols: DSSS (direct sequence spread spectrum), FHSS (frequency hopping spread spectrum), and infrared with PPM (pulse position modulation). All these three PHYs all provide bit rates of 1 and 2 Mbit/s. Furthermore, IEEE 802.11 includes extensions 11a, l ib, and llg which allow for additional higher bit rates: Extension 1 lb provides bit rates 5.5 and 11 Mbit/s as well as the basic DSSS bit rates of 1 and 2 Mbit/s within the same 2.4-2.5 GHz ISM band. Extension 1 la provides a high bit rate OFDM (Orthogonal Frequency Division Multiplexing modulation) PHY standard providing bit rates in the range of 6 to 54 Mbit/s in the 5 GHz band. Extension 1 lg provides a high bit rates upto 54 Mbit/s using OFDM in the 2.4-2.5 GHz ISM band.
The IEEE 802.11 basic MAC protocol allows interoperability between compatible PHYs through the use of the CSMA/CA (carrier sense multiple access with collision avoidance) protocol and a random back-off time following a busy medium condition. The IEEE 802.11 CSMA CA protocol is designed to reduce the collision probability between multiple stations accessing the medium at the same time. Therefore, a random back-off arrangement is used to resolve medium contention conflicts. In addition, the IEEE 802. 11 MAC protocol defines special functional behavior for fragmentation of packets, medium reservation via RTS/CTS (request-to-send/clear-to-send) polling interaction and point coordination (for time-bounded services).
Moreover, the IEEE 802.11 MAC protocol defines Beacon frames sent at regular intervals by the access point to allow stations to momtor the presence of the access point. The IEEE 802.11 MAC protocol also gives a set of management frames including Probe Request frames which are sent by a station and are followed by Probe Response frames sent by an available access point, to allow a station to scan actively if there is an access point operating on a certain channel frequency and to show to the station what parameter settings this access point is using.
Wireless personal digital assistants (WPDA) and "smart" cellular telephones are the most popular devices known to provide "mobile Internet" access for the mass consumer market.
Summary of the Invention
The present invention is directed to the use of a mobile wireless bridge (MWB) to provide wired and wireless local area network (LAN) clients (jointly hereinafter simply "LAN clients") uninterrupted wide area network (WAN) access to Internet resources even if a WAN initially used to access such resources becomes unavailable. A mobile wireless bridge, as the term is used herein, is a device that is adapted to act as a bridge at least between a wireless LAN, a wireless WAN and one other WAN, and preferably is adapted to act as a bridge at least between a wired LAN, a wireless LAN, a wired LAN, and a wireless LAN. Moreover, such a MWB is adapted to interface with a variety of WANs and to seamlessly switch between WANs if a WAN being used becomes unavailable, unreliable, or otherwise undesirable. MWBs will generally also comprise at least one Access Controller that controls LAN client access to any WAN the MWB has access to.
In preferred embodiments MWBs will be adapted couple LANs to Internet resources via a hardwired connection (e.g. cable modem, DSL, TI, etc.) and at least one mobile cellular coi nunications network (MCCN) such that computers or other devices that are not equipped to directly access the MCCN can access Internet resources via the MCCN.
In preferred embodiments MWBs will function as a LAN access point even if the bridge is currently not coupled to any WANs, provide LAN clients access to a wired WAN whenever the MWB has reliable access to any such wired WAN, provide LAN clients access to a wireless WAN whenever any such wired WAN becomes unavailable, and maintain wireless WAN access despite movement of the MWB to different geographic locations.
The use of MWBs eliminates the need for LAN clients to include the hardware and software required to directly access a wired or wireless WAN. When a LAN client needs to access a WAN it uses its (the client's) LAN access and a MWB that is part of the LAN to access a wired or wireless WAN. Since the LAN client does not access the WAN directly, it has no need to support the hardware and/or software necessary for direct WAN access.
The use of multiple MWBs can provide continuous LAN access for LAN clients even if the LAN client moves out of the range of any particular MWB. As such, the use of multiple MWBs allows LAN clients to roam between LANs such bridges are part of.
MWBs can also provide a simple method of providing WAN access to LAN clients in areas where wired WANs are impractical. By placing MWBs in vehicles, LAN clients can have LAN access, WAN access, and Internet access even when the LAN client is out of range of fixed position LAN access points, and does not have access to a wired WAN.
Various objects, features, aspects and advantages of the present invention will become more apparent from the following detailed description of preferred embodiments of the invention, along with the accompanying drawings in which like numerals represent like components.
Brief Description of The Drawings
Figure 1 A illustrates a network in accordance with the claimed invention.
Figure IB illustrates the network of figure 1A where the MWB is accessing only one of two WANs.
Figure 1C illustrates the network of figure 1A where the MWB is accessing only one of two WANs.
Figure 2A illustrates a network comprising a plurality of MWBs in accordance with the claimed invention.
Figure 2B illustrates the network of figure 2 A after a LAN client and a MWB have changed position.
Figure 3 illustrates the hardware and software modules of a MWB in accordance with the claimed invention.
Figure 4A is a diagram illustrating how data packet streams are transmitted and forwarded by a MWB between different network systems in accordance with the claimed invention.
Figure 4B is a flow chart illustrating the steps by which wired or wireless LAN users are authenticated in wired WAN and wireless WAN systems in accordance with the claimed invention.
Figure 5 is a flow chart illustrating the steps by which data packets are controlled and forwarded when wired LAN or wireless LAN users access wired or wireless WAN system resources in accordance with the claimed invention.
Detailed Description
Figure 1 A illustrates a network 100 comprising a MWB 110, coupling wireless WAN 120, wired WAN 130, wireless LAN 140, and wired LAN 150. MWB 110 acts as the access point for wireless LAN 140. LANs 140 and 150 include LAN clients 141-143 and 151-153. WANs 110 and 120 are also coupled to the Internet 190 such that any LAN client (141-143, 151-153) obtaining access to WAN 110 or 120 also has access to Internet 190 via WAN 110 or 120. As such LAN clients are able to access Internet resources via MWB 110 and wired WAN 110 and/or wireless WAN 120. In less preferred embodiments, MWB 110 be adapted to couple LANs to wireless WANs but not to wired LANs, and/or may be adapted to only couple wireless LANs to wireless WANs.
LAN clients are devices adapted to be coupled to a LAN, while LAN users are people or other entities that use such LAN clients. The terms "user" and "client" are to a large degree interchangeable as all LAN users will utilize a LAN client. Examples of LAN clients include computers (mainframe, workstation, desktop, laptop, notebook, etc.), personal data assistants (PDAs), and mobile telephones among others.
In preferred embodiments MWB 110 will provide WAN access to LAN clients through the use of a wired WAN such as WAN 110 whenever a wired WAN is available as illustrated by figure IB. If such a wired WAN is not available, or becomes unavailable (possibly due to disconnection, failure, unreliability, and/or remoteness), MWB 110 will utilize a wireless WAN such as WAN 120 to provide WAN/Internet access to LAN clients as illustrated in figure lC.
If a switch is made from a first WAN to a second WAN the transition will be made in such a manner that it has minimal impact if any on any LAN clients that are or will be accessing Internet resources. Giving priority to any available wired WAN will decrease the load on wireless WANs and potentially may provide higher data rates and increased reliability to LAN client access of Internet resources while being able to fall back to a wireless LAN helps insure that access to such resources continues even when a wired WAN is unavailable.
In addition to providing continued communication despite loss of access to a wired WAN, MWB 110 may be utilized in situations where wired WANs are unavailable or impractical. One example would be the use of MWB 110 to provided WAN access to LAN clients located in remote locations. Another example would be to use MWB 110 to provide WAN access to clients in regions that are highly developed but have not been wired to provide WAN access. Yet another example would be to provide WAN access to LAN clients on vehicles. By installing a MWB 110 on a vehicle, LAN clients on the vehicle would be able to obtain WAN/Internet via a wireless (and/or in some instances wired) LAN.
In some instances it may be desirable to provide LAN clients with simultaneous access to both wired and wireless WANs as illustrated in figure 1 A. This may be done for numerous reasons such as load balancing or because certain LAN clients are not allowed to access certain WANs.
Before providing access to a particular WAN, MWB 110 will authenticate any LAN client trying to obtain such access. Such authentication may be done at any time prior to providing a LAN client WAN access, possibly when a LAN client first accesses MWB 110, and/or when a LAN client first attempts to access a particular WAN.
In some instances it will be advantageous to com ect multiple MWBs together. Such intercomiection of MWBs may be accomplished in any reasonable fashion such as through wired and/or wireless dedicated and/or shared communication lines, and/or wireless distribution system (WDS) technology. Interconnecting MWBs will facilitate roaming of LAN clients in an area of coverage that is larger than can be provided by a single MWB. In the case of wireless LAN clients, it is preferred that transitions from one MWB to another be accomplished as seamlessly as possible so as to provide the LAN clients with uninterrupted access to WAN/Internet resources.
In figure 2A a network 200 comprises MWBs 210A-210D interconnected by WDS 260, where MWBs 210A-210D in conjunction with wired WANs 230A and 230B, wireless WANs 220A and 220B, wired LANs 250A and 250B, wireless LANS 240B-240D provide access to the Internet 290 to LAN clients 251-254 and 241-243 in the manner previously described in relation to network 100 of figure 1. In figure 2A3 client 243 is at a first location and coupled to MWB 210C via wireless LAN 240C. hi figure 2B, client 243 is at a different location and coupled to MWB 210D via wireless LAN 240D. In preferred embodiments, the switch from MWB 210C to MWB 210D would be accomplished without any interruption of service to LAN client 243. Similarly, in figure 2 A a vehicle mounted MWB 210B is at a first location and coupled via wireless WAN 220A to Internet 290 while in figure 2B MWB 210B is coupled to Internet 290 via wireless WAN 220B.
When MWBs are interconnected with each other (and possible with other devices that provide related functions) that they MWBs cooperate to best meet the needs of any LAN clients using such MWBs. As such, MWBs may hand off LAN clients to other MWBs if another MWB is better suited to satisfy the needs of the client. Alternatively, MWBs may route LAN client communications between themselves to provide the LAN clients with optimum service. In some instances routing between MWBs may be done to provide LAN clients of a first MWB with higher speed Internet access available to a second MWB.
hi instances where a first MWB can connect with at least one other MWB or access point through a WDS, it is preferred that if the MWB detects that any such other MWB or access point has access to a WAN having a higher bandwidth than any WAN the first MWB is currently connected to that the first MWB cooperate with the other MWB or access point to share the higher bandwidth of that WAN. If routing communications to another MWB which becomes unavailable, a MWB should either reroute or directly handle such communications such that a LAN client does not suffer an unacceptable loss of service.
MWBs such as MWB 110 of figures 1A-1C and MWBs 210A-210D of figures 2A and 2B will preferably comprise at least the following hardware and software modules as illustrated in figure 3 in regard to MWB 300:
1. Wireless LAN (WLAN) module 313, which is compatible with IEEE
802.1 la/b/g standards, and can be used to construct wireless LAN basic service set (BSS) and wireless distribution system (WDS), implement wireless access functions to provide wireless access to LAN clients.
2. LAN Ethernet Controller 312, through which the LAN system domain can be expanded, and through which other wired or wireless LAN systems can be interconnected;
3. WAN Ethernet Controller 315, through which the LAN clients in wired and wireless LANs can access wired WANs and Internet resources.
4. Wireless WAN (WWAN) module 310, which can be a GPRS module, CDMA1X module, any 3G module, or any other type of module that provides access to a particular type of WAN system that is to be accessed by LAN clients using MWB 300. As an example, if LAN clients are to access Internet resource through a GPRS network system, this WWAN module must be a GPRS module. 5. Spanning Tree Protocol (STP) bridge software module 311, which is responsible for data packets forwarding between different LAN (wired and wireless LAN).
6. Network Address Translation and Network Address Port Translation (NAT/NAPT) software module 314, which is responsible for data packet forwarding between LAN and WAN networks.
7. Authentication, Authorization and Accounting software modules:
a) Radius Client module 316, which is used in conjunction with a Radius Server for authentication, authorization and accounting of wired an/or wireless LAN clients and/or their users. This module will preferably be used with one of following authentication methods.
b) Web Portal module 317, which is a simple and practical authentication method, and is used in the most authentication application.
c) IEEE 802. IX module 318, which is another authentication method, and is often used in wireless LAN user authentication. This authentication method is defined in the newest WLAN security standard.
d) PPPoE module 319, which is a set of communication technology, and consist of authentication method, security and some other components usually used in PPP communication and Ethernet applications. In this patent description, its authentication method is mainly used.
e) SLM Card module 320, which is responsible for authenticating MWB 300 as a mobile client in WWAN network system;
8. The MWB has 4 network interfaces: the LAN and WAN Ethernet controllers 312 and 315 connect to a wired LAN and a wired WAN through 2 standard RJ45 interfaces 321 and 322; the wireless LAN module 313 communicates with the WLAN BSS and WDS through IEEE802.1 la/b/g radio interface 323; the wireless WAN module 310 acts as a mobile station in WWAN systems (GPRS, CDMA1X and 3G), and connects the WWAN systems through corresponding air radio interfaces 324. In addition to providing LAN clients access to WANs for data communications, MWBs may be equipped with modules that support voice, video, and other types of communications as well.
Less preferred embodiments may use less than all of the hardware and software modules described above, may use modules not listed, and/or may use additional numbers of at least some of the described modules, i some embodiments modules listed as hardware modules may take the form of software modules and similarly software modules may take the form of hardware modules. Some embodiments may be limited by the modules they contain to accessing only a limited number of different types of LANs and WANs while other embodiments may be more adaptable and able to access all major types of LANs and/or WANs. Standards described may change as newer standards are adopted such that MWBs will continue to be used despite such standard changes.
Figure 4A illustrates the flow of data packets between different network modules. Packets can flow between any of two of the wired WAN, wireless WAN, wired LAN, and wireless LAN modules except that the MWB is preferred not to support packet flow directly between the wired and wireless WAN modules. When LAN clients access WANs, network address translation and possible protocol translation is performed. Since a MWB is preferred to access as an access point in a wireless LAN, some packets from wireless LAN clients may be intended for other wireless LAN clients. In such instances the wireless LAN module is preferred to route such packets without passing them on to the other modules. When LAN clients want to access the Internet packets will preferably be routed to the wired WAN module if a wired WAN is available, but will otherwise be routed to the wireless WAN module Data packets passing from LAN to WAN modules will preferably first be checked for the data packets source and destination port at the spanning tree bridge module which will then send the data packets to NAT/NAPT module to complete packets network address translation, which will then send them to the wired or wireless WAN module. These steps will be performed in reverse for packets received by a WAN module and headed for a LAN module.
When LAN users access Internet resource, it is an important function to control all of user's access traffic. After LAN users pass the authentication and get access authorization, a MWB can collect user's traffic stream data, and limit the usage of data communication bandwidth by every users according to some predefined rules or subscription information. User's data traffic control can be implemented at the 2nd network layer in the STP bridge module and also can be implemented at the 3rd network layer in the NAT route module. The traffic control implementation is based on the theory that outbound data rate should be controlled by the network interface. Because a MWB must control the data traffic from wired or wireless LAN to wired or wireless WAN network system, the users traffic control is preferably implemented at the 3rd layer based on the NAT/NAPT module.
User traffic control is preferably implemented through the use of queues. For a MWB, we can view the LAN Ethernet controller and wireless LAN modules together as being a downlink port, and the WAN Ethernet controller and wireless WAN modules together as an uplink port. Traffic control, as it is used herein, means that the device interfaces should be controlled to limit data send rate. If the uplink data rate should be controlled, the data rate to uplink port must be controlled and limited. If the downlink data rate should be controlled, the data rate to the downlink port must be controlled and limited. Traffic control in a MWB can be implemented at at least 2 stages of data transmission: (1) before data packets queue or (2) after data packets queue. Implementing traffic control on queued packets rather than on incoming packets requires the use of larger queues (i.e. more memory) to avoid the overflow of the queues. Moreover, doing so wastes resources such as CPU process time used to queue packets that are subsequently thrown out. As such, it is preferable to implement traffic control before packets are queued.
Referring to figure 4B, the flowchart shown illustrates method 400 by which data packets received by a MWB are controlled and forwarded when LAN clients access a WAN/Internet system resource. In step 410, the Net Address Translation module receives packet from an uplink or downlink. In step 420, the Net Address Translation module filters the packet received according to the header of the packet. Illegal packets will be abandoned and legal packets will be transferred in the uplink or downlink of step 430. Before a packet enters into the queue to wait to be transferred, seven parameters will be, in step 440, set for every LAN client where the seven parameters include: i. MAC address of client (macAddr); ii. Up link rate of client (upRate); iii. Down link rate of client (downRate); iv. Bytes transmitted by the client in the current period (upCount); v. Bytes received by the client in the current period (downCount); vi. Total bytes transmitted by the client: (upTotal); and vii. Total bytes received by the client (downTotal). In order to control the traffic of the client, MWB needs to check whether the bytes transmitted/received by the client in the current period (1 second for example) is bigger than the up/down link rate set for this client when the packets from/to this client are going to enter the relative queue. If the bytes transmitted/received by the client in the current period is not bigger than the up/down link rate set for this client, the packet will enter the relative queue to wait to be transmitted/received in step 460. Then in step 470, the packet will be transferred to the appropriate port for uplink or downlink. If the bytes transmitted/received by the client in the current period is bigger than the up/down link rate set for this client, the packet will be abandoned in step 480. The upCount and the downCount values are accumulated according to the transfer of data packets, and at the start point of each period (1 second for example) the upCount and the downCount values are reset to zero.
Referring to figure 5, a preferred method for authenticating LAN clients and/or users is prior to allowing WAN access is illustrated. In the flow chart of Figure 5 illustrating method 500, the step 530 indicates wireless or wired LAN users prepare to access wired or wireless WAN network resource through a MWB such as bridge 110 of figure 1; the step 531 indicates that the MWB will judge if a wired WAN resource is available; the step 532 indicates that, if a wired WAN is available, the MWB will authenticate LAN clients and/or users with traditional authentication methods, which include Web Portal + Radius Client method, LEEE 802. IX or PPPoE + Radius Client methods, etc. ; the step 533 indicates that, if the wired WAN system resource is not available, the MWB will judge if a wireless WAN resource is available; the step 534 indicates that, if a wireless WAN resource is available, authentication should be done via wireless WAN system authentication methods. The detailed authentication action in WWAN system is that, as the step 535 describes, the SIM card module in the MWB will first be called on to authenticate the MWB itself as a mobile station in WWAN system, then as the step 536 describes, the LAN clients/users that indirectly access Internet through wireless WAN system can be authenticated by traditional authentication methods via the Internet a described in step 532. On the other hand, if in the step 533 the wireless WAN system resource is not available, the step 537 describes LAN users can't access WAN network resource, and then MWB doesn't authenticate any user or client.
Thus, specific embodiments and applications of network systems comprising MWBs have been disclosed. It should be apparent, however, to those skilled in the art that many more modifications besides those already described are possible without departing from the inventive concepts herein. The inventive subject matter, therefore, is not to be restricted except in the spirit of the appended claims. Moreover, in interpreting both the specification and the claims, all terms should be interpreted in the broadest possible manner consistent with the context. In particular, the terms "comprises" and "comprising" should be interpreted as referring to elements, components, or steps in a non-exclusive manner, indicating that the referenced elements, components, or steps may be present, or utilized, or combined with other elements, components, or steps that are not expressly referenced.

Claims

CLAIMSWhat is claimed is:
1. A wireless bridge adapted to function as a bridge between at least one LAN comprising a plurality of clients, and at least one WAN.
2. The bridge of claim 1 comprising at least one wireless WAN module adapted communicate with a wireless WAN and at least one wireless LAN module adapted to communicate with a wireless LAN.
3. The bridge of claim A2 wherein the at least one wireless LAN module is adapted to utilize the IEEE 802.11 protocol.
4. The bridge of claim 2 further comprising a subscriber identity module adapted to provide the bridge access to a wireless WAN.
5. The bridge of claim 2 further comprising at least one wired WAN module adapted to communicate with a wired WAN and at least one wired LAN module adapted to communicate with a wired LAN.
6. The bridge of claim A5 wherein the bridge is adapted to authenticate wired LAN and wireless LAN access.
7. The bridge of claim A6 wherein the bridge is adapted to use IEEE802. IX, Radius Client, Web Portal and or PPPoE in authenticating WAN access.
8. The bridge of claim A5 further comprising a spanning tree module bridging the wireless LAN and wired LAN modules.
9. The bridge of claim A5 further comprising a network address translation module adapted to modify source and or destination addresses of packets passing between the LAN and WAN modules.
10. The bridge of claim A5 wherein each of the wired WAN and wired LAN modules comprises an RJ45 interface.
11. The bridge of claim Al 0 wherein the wired WAN module further comprises at least an El/Tl interface and an optical interface.
12. The bridge of claim A2 wherein the wireless WAN module is adapted to use at least one of the following: GPRS, CDMA IX, CDMA 2000, UMTS, and Satellite.
13. The bridge of claim 12 further comprising additional wireless WAN modules adapted to use at least one of the following GPRS, CDMA IX, CDMA 2000, UMTS, and Satellite.
15. The bridge of claim 1 wherein the bridge is adapted to function as a bridge between the at least one LAN and at least two WANs wherein the LAN is a wireless LAN, one of the at least two WANs is a wireless WAN, and a second of the at least two WANs is a wired WAN.
15. The bridge of claim 2 wherein the bridge is adapted to communicate with a plurality of wireless bridges through a wireless distribution system.
16. A network comprising two wireless sub-networks coupled together by the wireless bridge of claim 1.
17. The network of claim 16 comprising at least two wireless bridges coupled together via a wireless distribution system.
18. A network comprising two wireless sub-networks coupled together by the wireless bridge of claim 15.
19. The network of claim 18 comprising at least two wireless bridges coupled together via a wireless distribution system.
20. A method of comprising coupling at least two wireless networks together by providing a wireless bridge adapted to communicate with each of the at least two wireless networks, positioning the bridge in a location where the bridge can communicate with each of the at least two networks, and causing the bridge to establish communications with each of the at least two networks.
21. The method of claim 20 wherein causing the bridge to establish communications with each of the at least two networks comprises providing the bridge with a subscriber identity module and causing the bridge to use the subscriber identity module to identify itself to the wireless WAN.
22. A method of providing LAN client access to a WAN resource comprising: bridging a wireless WAN, a wired WAN, a wireless LAN and a wired LAN with a wireless bridge; causing the wireless bridge to authenticate the identity of a LAN client attempting to access a WAN resource.
23. The method of claim 22 wherein bridge with a wireless bridge comprises providing the bridge with a subscriber identity module and causing the bridge to use the subscriber identity module to identify itself to the wireless WAN.
24. The method of claim 22 wherein causing the wireless bridge to authenticate the identity of a LAN client comprises having the client authenticated via the internet through the use of Web Portal, LEEE 802.1x or PPPoE.
25. The method of claim 22 comprising obtaining the following information for the LAN client: (i) MAC address (macAddr); (ii) up link rate (upRate); (iii) down link rate (downRate); (iv) bytes transmitted by the client in the current period (upCount); (v) Bytes received by the client in the current period (downCount); (vi) total bytes transmitted by the client (upTotal); and total bytes received by the client (downTotal).
26. The method of claim 25 wherein: the bridge determines whether the bytes transmitted/received by the client in the current period is bigger than an up/down link rate set for this client when the packets from/to this client are going to enter a relative queue; and if the bytes transmitted/received by the client in the current period is not bigger than the up/down link rate set for this client, the bridge places the packets into the relative queue to wait to be transmitted/received; and if the bytes transmitted/received by the client in the current period is bigger than the up/down link rate set for this client, the bridge abandons the packets.
27. The method of claim 25 wherein the upCount and the downCount are accumulated respectively in accordance with the transmission and reception of data packets, and at the start point of each period the upCount and the downCount is set to zero.
28. The method of claim 25 wherein the wireless bridge supports the transmission of data, voice, and video communication packets between the wireless WAN, wired WAN, wireless LAN and wired LAN.
EP03739359A 2003-01-28 2003-06-30 Mobile wireless base station Withdrawn EP1588502A4 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN03101878 2003-01-28
CNB031018785A CN1172489C (en) 2003-01-28 2003-01-28 Data communication system and method between networks
PCT/US2003/020605 WO2004070970A1 (en) 2003-01-28 2003-06-30 Mobile wireless base station

Publications (2)

Publication Number Publication Date
EP1588502A1 true EP1588502A1 (en) 2005-10-26
EP1588502A4 EP1588502A4 (en) 2006-06-21

Family

ID=4789958

Family Applications (1)

Application Number Title Priority Date Filing Date
EP03739359A Withdrawn EP1588502A4 (en) 2003-01-28 2003-06-30 Mobile wireless base station

Country Status (4)

Country Link
EP (1) EP1588502A4 (en)
CN (1) CN1172489C (en)
AU (1) AU2003245754A1 (en)
WO (1) WO2004070970A1 (en)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100372254C (en) * 2003-08-22 2008-02-27 北京朗通环球科技有限公司 Radio mutual action type communication system
CN1305252C (en) * 2003-09-10 2007-03-14 大唐电信科技股份有限公司无线通信分公司 Wireless moile double-mode network card, method for its working mode control and power supply management
NZ547786A (en) 2003-12-19 2007-12-21 Univ California Resource sharing broadband access system, methods and devices
JP5079336B2 (en) 2004-02-13 2012-11-21 ザ リージェンツ オブ ザ ユニバーシティ オブ カリフォルニア Adaptive bias current circuit and method for amplifiers
US7881267B2 (en) 2004-06-04 2011-02-01 Hewlett-Packard Development Company, L.P. Portable computing device for wireless communications and method of operation
US7339913B2 (en) * 2004-08-17 2008-03-04 Intel Corporation Method and system of network management and service provisioning for broadband wireless networks
US20060114883A1 (en) * 2004-12-01 2006-06-01 Mehta Pratik M System and method for wireless cellular enabled information handling system router
US8838963B2 (en) 2005-02-04 2014-09-16 Apple Inc. Security enhancement arrangement
AU2005100399A4 (en) * 2005-05-13 2005-06-23 Mobile Ip Pty Ltd Free2move
KR101253352B1 (en) * 2005-05-13 2013-04-11 유니버시티 오브 매릴랜드 칼리지 팍 Authentication method for wireless distributed system
JP2008541641A (en) * 2005-05-16 2008-11-20 アイウィクス・インコーポレーテッド Multi-medium wide area communication network
US7813314B2 (en) 2005-08-02 2010-10-12 Waav Inc. Mobile router device
US8121071B2 (en) 2005-11-10 2012-02-21 Sierra Wireless America, Inc. Gateway network multiplexing
US8054778B2 (en) 2005-11-10 2011-11-08 Junxion, Inc. LAN/WWAN gateway carrier customization
FR2905547A1 (en) * 2006-09-05 2008-03-07 Thomson Licensing Sas CONNECTABLE NETWORK EQUIPMENT FOR WIRELESS NETWORK IN INFRASTRUCTURE MODE
US10075376B2 (en) 2007-04-18 2018-09-11 Waav Inc. Mobile network operating method
CN101399727B (en) * 2007-09-28 2012-04-18 华为技术有限公司 Wireless wideband access network, device and access method
CN101754434A (en) 2010-01-20 2010-06-23 中兴通讯股份有限公司 Access method, system and device
CN103368868A (en) * 2012-04-05 2013-10-23 中国移动通信集团江苏有限公司 Network flow bandwidth control method, device and system
CN104080086B (en) 2014-07-18 2018-09-04 北京智谷睿拓技术服务有限公司 Wireless connecting establishment method and wireless connection establish device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6424657B1 (en) * 2000-08-10 2002-07-23 Verizon Communications Inc. Traffic queueing for remote terminal DSLAMs
US20020114336A1 (en) * 2001-02-21 2002-08-22 Yu-Chun Chow Gateway apparatus for performing communication between WAN and LAN
US6483852B1 (en) * 1997-12-15 2002-11-19 Inria Institut National De Recherche En Informatique Et En Automatique Method and apparatus for connecting network segments

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6546425B1 (en) * 1998-10-09 2003-04-08 Netmotion Wireless, Inc. Method and apparatus for providing mobile and other intermittent connectivity in a computing environment
US6600734B1 (en) * 1998-12-17 2003-07-29 Symbol Technologies, Inc. Apparatus for interfacing a wireless local network and a wired voice telecommunications system
US6618162B1 (en) * 1999-01-26 2003-09-09 Intermec Ip Corp. Apparatus and method to configure a device, such as a printer, over a network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6483852B1 (en) * 1997-12-15 2002-11-19 Inria Institut National De Recherche En Informatique Et En Automatique Method and apparatus for connecting network segments
US6424657B1 (en) * 2000-08-10 2002-07-23 Verizon Communications Inc. Traffic queueing for remote terminal DSLAMs
US20020114336A1 (en) * 2001-02-21 2002-08-22 Yu-Chun Chow Gateway apparatus for performing communication between WAN and LAN

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of WO2004070970A1 *

Also Published As

Publication number Publication date
CN1172489C (en) 2004-10-20
AU2003245754A1 (en) 2004-08-30
EP1588502A4 (en) 2006-06-21
CN1430387A (en) 2003-07-16
WO2004070970A1 (en) 2004-08-19

Similar Documents

Publication Publication Date Title
US7995516B2 (en) Mobile wireless base station
WO2004070970A1 (en) Mobile wireless base station
US6870822B2 (en) Method and equipment for supporting mobility in a telecommunication system
CA2500656C (en) Wireless communication method and system with controlled wtru peer-to-peer communications
US7330472B2 (en) System and method for hybrid coordination in a wireless LAN
EP2309820A2 (en) Ad Hoc Peer-to-Peer Mobile Radio Access System Interfaced to the PSTN and Cellular Networks
US20100098034A1 (en) Wi-Fi ENABLED ROUTER HAVING UPLINK BANDWITH SHARING CAPABILITY
US20040141522A1 (en) Communications protocol for wireless lan harmonizing the ieee 802.11a and etsi hiperla/2 standards
US20050094558A1 (en) Wireless local area network (WLAN) methods and components that utilize traffic prediction
EP1515486B1 (en) Method and system for providing an intelligent switch in a hybrid wired/wireless local area network
Aad et al. Introducing service differentiation into IEEE 802.11
CA2544945A1 (en) Access points with selective communication rate and scheduling control and related methods for wireless local area networks (wlans)
Labiod et al. Wi-Fi TM, Bluetooth TM, ZigBee TM and WiMax TM
EP1320952A1 (en) COMMUNICATIONS PROTOCOL FOR WIRELESS LAN HARMONIZING THE IEEE 802.11a AND ETSI HiPerLAN/2 STANDARDS
KR20060011447A (en) Medium access control apparatus for overlaying channels network
CN100364340C (en) Method and system for optimal load balancing in a hybrid wired/wireless network
Sharma Analysis of 802.11 b MAC: A QoS, fairness, and performance perspective
Koga et al. A quality-aware VoWLAN architecture and its quantitative evaluations
Kim et al. Friendly coexistence of voice and data traffic in IEEE 802.11 WLANs
Choi et al. Enhancement of a WLAN-based Internet service in Korea
Yeong et al. 802.11 a MAC layer: firmware/hardware co-design
Zorzi Mobile and Wireless Telecommunication Networks
Almquist et al. Quality of service schemes for IEEE 802.11: a simulation study
Hanley A study of the performance of voice over IP over IEEE 802.11 wireless local area networks
Wu et al. A credit-based distributed protocol for long-term fairness in IEEE 802.11 single-hop networks

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20050726

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL LT LV MK

DAX Request for extension of the european patent (deleted)
RIN1 Information on inventor provided before grant (corrected)

Inventor name: LEI, SHITOP GLOBAL USA, INC.

Inventor name: YANG, YUTOP GLOBAL USA, INC.

Inventor name: ZHOU, ZHEN-HONGTOP GLOBAL USA, INC.

Inventor name: QINGXIN, WEITOP GLOBAL USA, INC.

Inventor name: WANG, WEIZHOUTOP GLOBAL USA, INC.

A4 Supplementary search report drawn up and despatched

Effective date: 20060522

17Q First examination report despatched

Effective date: 20070319

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20070731