US20080244069A1 - Method and apparatus for dormant mode support with paging - Google Patents
Method and apparatus for dormant mode support with paging Download PDFInfo
- Publication number
- US20080244069A1 US20080244069A1 US12/133,273 US13327308A US2008244069A1 US 20080244069 A1 US20080244069 A1 US 20080244069A1 US 13327308 A US13327308 A US 13327308A US 2008244069 A1 US2008244069 A1 US 2008244069A1
- Authority
- US
- United States
- Prior art keywords
- access point
- computing device
- paging
- beacon
- group
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W68/00—User notification, e.g. alerting and paging, for incoming communication, change of service or the like
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/20—Selecting an access point
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0212—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave
- H04W52/0216—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave using a pre-established activity schedule, e.g. traffic indication frame
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0212—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave
- H04W52/0219—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave where the power saving management affects multiple terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/20—Manipulation of established connections
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
- H04W80/04—Network layer protocols, e.g. mobile IP [Internet Protocol]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Definitions
- LAN Local area networks
- computers computers, laptops, personal digital assistants, scanners and any other devices that deal with digital information.
- the physical reach of LANs has been limited because they require a physical or hard-wired connection between computing devices.
- Even with phone dial-ups, a LAN network is ultimately limited by its hard-wired nature.
- wireless solutions were developed.
- WLAN wireless LAN
- RF radio frequency
- infra-red infra-red
- microwave millimeter wave
- IP traffic routing data
- the IEEE 802.11 protocol specifies both the architectures and layers of a WLAN.
- the IEEE 802.11 protocol specifies the physical and medium access control (“MAC”) layers of a WLAN.
- the physical layer handles the wireless transmission of data, and is generally a form of RF or infrared communication.
- the MAC layer is a set of protocols which is responsible for maintaining order.
- the IEEE 802.11 protocol specifies two types.
- the first, shown in FIG. 1 is the ad hoc network.
- the ad hoc network can be spontaneously created with a plurality of computing devices.
- the ad hoc network has no structure, no fixed points and generally, every computing device can communicate with every other computing device.
- the second type of architecture is the infrastructure.
- this architecture uses access points through which the computing devices can communicate with each other and a node of a wired network (hereinafter “node”).
- node a wired network
- Nodes can communicate with each other through various types of networks, such as the Internet, generally by some type of wired connection.
- a distribution system which is the mechanism by which the access points communicate with each other, is included in the access points, and also includes the Nodes, networks, and the connections among them.
- Each access point has a range over which it provides service. Each of these ranges is a basic service set (“BSS”); while the BSS and the distribution system form an extended service set (“ESS”) which defines the range over which services can be provided.
- BSS basic service set
- ESS extended service set
- the location of the computing device on the network is determined by the access point to which it is connected.
- a computing device can move about within the range of the access point to which it is connected. If the WLAN is designed so that there is some overlap of the ranges of the access points, it may be possible for a computing device to move among the access points and remain connected to the WLAN and continue to send and receive IP traffic. In order to do this, the WLAN needs to know where the computing device is so that it knows where to direct IP traffic intended for the computing device. In other words, the WLAN must track the computing device.
- the computing device associates with an access point at a given time interval, upon its movement or when the computing device travels between or among the ranges of different access points. IP traffic intended for the computing device is forwarded to the last access point with which the computing device had associated and then forwards the IP traffic to the computing device.
- IP traffic intended for the computing device is forwarded to the last access point with which the computing device had associated and then forwards the IP traffic to the computing device.
- tracking and forwarding IP traffic to the computing device in this manner can lead to a power drain on the computing device and a high level of signaling over the network. For example, if the computing device must associate with a new access point whenever it enters the range of the new access point, the computing device must remain on at all times so that it may detect when it has entered the range of the new access point. Additionally, the computing device must remain on at all times to receive any incoming IP traffic. This continuous detection and repeated associating causes a tremendous drain on the computing device's power supply and adds to the signaling across the network.
- the IEEE 802.11 protocol includes dormant mode functionality.
- Dormant mode functionality (without paging functionality) allows a computing device to operate in two modes, an “active” mode and a “dormant” mode.
- the computing device can receive signals, such as IP traffic, and can send signals such as those sent when the computing device associates with an access point.
- the dormant mode the computing device is not turned off, but is put into a mode which reduces its ability to receive IP traffic by reducing the monitoring of certain channels and thus is a state of reduced power consumption.
- the computing device must be in active mode to send or receive IP traffic and associate with an access point. Therefore, the computing device must periodically go into active mode to associate with an access point and to send or receive IP traffic.
- IP traffic intended for the computing device may be transmitted while the computing device is in dormant mode
- the IEEE 802.11 protocol incorporates buffers in the access points to queue IP traffic intended for the computing device. The computing device can then receive this IP traffic when it switches into active mode and therefore does not miss any IP traffic sent while it was in dormant mode.
- dormant mode functionality does provide some power savings for the computing device and reduced signaling across the network, the computing device must still periodically switch into active mode to register with each access point of which it is in range, and to send or receive IP traffic.
- Paging is a method of notifying a dormant computing device of incoming IP traffic.
- Paging includes (i) the use of paging areas; and (ii) paging the computing device.
- the use of paging areas includes the creation of paging areas and having the computing device signal the network only when it crosses a paging area boundary.
- a paging area boundary is defined by the outer perimeter of the ranges of a collection of access points (an “access point group”) that are used to locate a dormant computing device. This outer perimeter forms the paging area boundary of a paging area.
- Each paging area uniquely identifies itself to computing devices by periodically broadcasting that paging area's unique paging area identifier.
- a network implementing paging will be arranged to have at least two paging areas. Only when a computing device crosses a paging area boundary from one paging area to another, does the computing device associate with the nearest access point. A computing device detects when it crosses a paging area boundary by detecting a change in the unique paging area identifier. However, because neighboring paging areas usually overlap with each other to prevent gaps in coverage, a computing device may be in more than one paging area simultaneously and thus will detect more than one paging area identifier. In this case, the computing device will detect the strength of the paging area identifier from each paging area that computing device is within and will associate with the paging area from which the strongest paging area identifier is broadcast.
- the computing device is programmed to periodically go from dormant to active mode so that it may detect the unique paging identifier or identifiers being broadcast.
- the computing device By requiring a computing device to associate with the network only when it crosses a paging area boundary, the amount of signaling to the network is decreased and the amount of time the computing device can remain dormant is increased, thus power consumption is decreased. Further reduction in power usage and signaling by the computing device is realized because the computing device only periodically needs to switch into active mode.
- the network does not know the location of the computing device within a given paging area. Because the computing device may have moved after the last time it associated with an access point, all that the network knows is that the computing device is located somewhere within the paging area in which the access point with which the computing device last associated is located (the “old access point”). In order for the network to forward IP traffic to the computing device, it must know the access point for which the computing device is currently in range (the “new access point”) and alert the computing device about the pending IP traffic. The network precisely locates the computing device within a paging area by paging the computing device.
- Paging the computing device is signaling by the network through the access points directed to locating the computing device and alerting it to establish a connection.
- Paging the computing device involves transmitting a request to all the access points in the same paging area as the old access point. These access points then broadcast the paging signal.
- the computing device receives the paging signal it associates with the new access point.
- the network knows the location of the computing device in terms of the access point in which it is in range.
- the new access point then signals the old access point, the old access point sends any buffered IP traffic to the new access point and the new access point delivers the buffered IP traffic to the computing device. Power drain on the computing device and signaling over the network are reduced because the computing device only associates with a new access point in the same paging area when the computing device is paged.
- WLAN protocols such as the IEEE 802.11
- the IEEE 802.11 protocol does not have paging areas, a dedicated paging channel and a radio link protocol specifically directed towards locating a dormant computing device.
- the IEEE 802.11 and other WLAN protocols lack the protocols for establishing and altering paging areas, associating a computing device with an access point, and performing paging.
- existing WLAN protocols do not address the issues of maintaining synchronization of the access points across each access point group and reducing signal interference among access points.
- Apparatuses and methods are disclosed herein for implementing dormant mode with paging in a WLAN. Power savings in the computing device and reduction in traffic across the network are achieved by requiring a computing device to inform the WLAN of its location only when it crosses a paging area boundary or is to receive IP traffic.
- Dormant mode with paging is implemented in a protocol that supports dormant functionality but does not itself provide methods or standards for implementing dormant mode and paging functionality, such as the IEEE 802.11.
- the methods and apparatuses disclosed herein are implemented in such a protocol and provide the methods needed to implement dormant mode with paging in such a protocol.
- the methods and apparatuses for implementing dormant mode with paging basically include (1) establishing paging areas; (2) communicating access group information to a computing device; and (3) locating a computing device.
- Establishing paging areas generally involves, forming at least two access point groups which includes; (a) defining the structure of the access point groups (b) establishing a protocol for communications among the access points in each access point group; and (c) establishing a protocol for manipulating the access point groups.
- Paging areas are needed to enable the paging functionality and do so primarily by using paging groups to define paging area boundaries.
- the paging groups are generally formed from a subset of all the access points within the WLAN or network by defining the structure of the access point group which establishes the relationships among the access points.
- the relationships among the access points in a paging group may be defined by a tree structured distributed group model.
- a tree structured distributed group model has a hierarchical tree structure wherein access points are defined in terms of functionality as “master,” “slave,” or both.
- Establishing a protocol for communications among the access points in an access point group may include developing a unique protocol or modifying an existing one such as the IEEE Inter Access Point Protocol (“IAPP”).
- IAPP IEEE Inter Access Point Protocol
- Establishing a protocol for manipulating access point groups involves adding operations to the protocol for communications that enable the implementation of a tree structured distributed model.
- Implementing a tree structured distributed model for an access point group may be accomplished by extending the operations of IAPP.
- at least five operations must be added to IAPP. These operations include “join,” “leave,” “group merge,” “group prune” and “devolution.”
- the step of communicating access point group information to computing devices generally includes (a) including the access point group's paging area ID in the beacon of each access point in the access point group; (b) assigning a channel over which to broadcast the beacon; (c) awakening the computing device to periodically detect the beacon; and (d) synchronizing the timing of the beacon broadcasts of all the access points within an access point group.
- Each paging group is assigned a unique paging area ID and communicates this paging area ID to any computing devices within that paging group's paging area so that a computing device can determine in which paging area it is located. This may be accomplished using a beacon packet or beacon, such as the beacon in the IEEE 802.11 protocol. Beacons are signals which are periodically broadcast to each of the access points and contain a variety of information including the paging area ID.
- Methods of channel assignment include: (1) static assignment; (2) standard common paging channel assignment; and (3) local common paging channel assignment method.
- static assignment method all the access points in the WLAN are assigned the same common channel over which to broadcast the IP traffic and the beacon.
- standard common paging channel assignment method the access points are assigned a universal common channel over which to broadcast the beacon and a different common channel over which to broadcast the IP traffic.
- local common paging channel assignment method all the access points in the same access point group are assigned the same channel for paging with no adjacent access paging groups assigned the same paging channel and a channel for IP traffic that is different from any of the paging channels.
- the timing of the beacon broadcasts for each access point within an access point group must be synchronized to occur approximately at the same time (the “beacon timing”).
- the computing device When the beacon broadcasts in an access point group all occur at the same time, the computing device only needs to be in active mode during the beacon timing no matter with which access point the computing device is associated. Synchronizing the beacon timing for the access points within an access point group involves the access points and the computing device. As the computing device moves from within the range of a first access point to within the range of a second access point, it senses the difference between the beacon timing of the first access point and the second access point to ascertain a “beacon timing difference.” The computing device then communicates this beacon timing difference to the second access point which communicates the beacon timing difference to the first access point. The beacon timing of the first or second access point or both are synchronized.
- Locating a computing device includes associating the computing device with an access point or access point group whenever it crosses an access point boundary, and whenever it is paged. Whenever a computing device crosses an access point boundary, it must associate with a new access point in a new access point group. Whenever a computing device is paged, it must associate with the access point for which it is in range so that it can receive IP traffic. To associate with an access point, the computing device sends a request to associate to the new access point. Thereafter, an association identification (“AID”) is assigned to the computing device.
- AID association identification
- FIG. 1 is a diagram of a wireless network with an ad hoc architecture according to the prior art
- FIG. 2 is a diagram of a wireless network with an infrastructure architecture according to the prior art
- FIG. 3 is a diagram of a WLAN that supports paging according to the a preferred embodiment
- FIG. 4 is a diagram of an access point group that uses a structured distributed grouping model according to a preferred embodiment
- FIG. 5 is a diagram of IAPP architecture according to the prior art
- FIG. 6A is diagram of an access point and access point group, according to a preferred embodiment
- FIG. 6B is a diagram of steps in a join operation, according to a preferred embodiment
- FIG. 6C is a diagram of an access point group after the join operation of FIG. 6B is performed, according to a preferred embodiment
- FIG. 7 is a diagram of steps in a leave operation, according to a preferred embodiment.
- FIG. 8A is a diagram of steps in a leave operation according to a preferred embodiment
- FIG. 8B is a diagram of an access group and an access point after the leave operation of FIG. 8A is performed, according to a preferred embodiment
- FIG. 9A is a diagram of a first and a second access group, according to a preferred embodiment.
- FIG. 9B is a diagram of steps in a group merge operation, according to a preferred embodiment.
- FIG. 9C is a diagram of an access group after the group merge operation of FIG. 10B is performed, according to a preferred embodiment
- FIG. 10A is a diagram of steps of a group prune operation, according to a preferred embodiment
- FIG. 10B is a diagram of a first and a second access group after the group prune operation of FIG. 10A is performed, according to a preferred embodiment
- FIG. 11A is a diagram of an access group before a group devolution operation is performed, according to a preferred embodiment
- FIG. 11B is a diagram of steps of a group devolution operation, according to a preferred embodiment.
- FIG. 11C is a diagram of an access group and a two access points after the group devolution operation of FIG. 11B is performed, according to a preferred embodiment
- FIG. 12A is a diagram of the beacon elements in the IEEE 802.11 protocol according to the prior art.
- FIG. 12B is a is a diagram of the beacon elements in the IEEE 802.11 protocol according to a preferred embodiment
- FIG. 12C is a diagram of the format of the paging ID according to a preferred embodiment
- FIG. 13A is a flow chart of a method for beacon synchronization, according to a preferred embodiment
- FIG. 13B is a continuation of the flow chart of 15 B.
- FIG. 14 is a diagram of the signals produced by a first access point, a second access point and a computing device during beacon synchronization, according to a preferred embodiment.
- the method for implementing dormant mode with paging basically includes the steps of (1) establishing paging areas; (2) communicating access group information to a computing device; and (3) locating a computing device.
- the following example will describe this method and apparatus using one computing device, it may be used for a plurality of computing devices. It is to be understood that the following example(s) is (are) for the purpose of explanation and not limitation.
- the step of establishing paging areas generally involves, forming at least two access point groups which includes; (a) defining the structure of the access point groups (b) establishing a protocol for communications among the access points in each access point group; (c) establishing a protocol for manipulating the access point groups.
- paging areas are defined by the outermost perimeter of the ranges of the outermost access point groups within a paging group. This outer most perimeter is the paging area boundary.
- the paging groups are generally formed from a subset of all the access points within the WLAN or network by defining the structure of the access point group which establishes the relationships among the access points.
- FIG. 3 wherein a WLAN 400 for which a paging area has been defined is shown.
- this WLAN 400 there are two nodes 402 and 404 connected to a network 406 , such as the internet, by some type of wired connection.
- a plurality of access points 420 , 422 , 424 , 428 , 430 and 432 are connected to nodes 402 and 404 via some type of wired connection.
- the access points 420 , 422 , 424 , 428 , 430 and 432 are grouped together so that the ranges of the access points 434 , 436 , 438 , 440 , 442 and 444 define a paging area 450 having a paging area boundary 452 .
- the relationships among the access points in a paging group may be defined by a tree structured distributed group model.
- FIG. 4 shows an access point group 10 wherein the relationships among the access points 12 - 21 in the access point group 10 are defined by a distributed group model.
- the paging group 10 is comprised of access points 12 - 21 and defines a paging area 26 .
- the paging area boundary 28 is defined by the outermost perimeters of the ranges 30 - 39 of the access points 12 - 21 , and encloses the paging area 26 .
- a tree structured distributed group model has a hierarchical tree structure.
- each access point is connected to one or more access points directly below it.
- access points are defined in terms of functionality as “master,” “slave,” or both.
- a master is an access point to which other access points belong and which has the ability to control the access points that belong to it.
- the master access points are 12 , 13 , 15 , 17 and 18 .
- a slave is an access point that belongs to a master.
- the slave access points are 13 - 21 . It is possible to be a master and a slave with the functionality of both at the same time, such as access points 13 , 15 , 17 and 18 .
- an access point may be the master of more than one access point as are access points 12 , 15 and 17 . However, an access point may not have more than one master. If an access point is simultaneously both a master and a slave, the master must follow the slave's attributes. Each access point group has one access point to which all others belong, directly or indirectly. This is called the “root access point” (access point 12 ). Access points at which the tree structure terminates are called “leaf access points” (access points 14 , 16 , 19 , 10 and 21 ). All remaining access points are called “intermediate access points” (access points 13 , 15 , 17 and 18 ).
- Establishing a protocol for communications among the access points in an access point group may include developing a unique protocol or modifying an existing one.
- the IEEE Inter Access Point Protocol (“IAPP”) is an existing protocol between access points that allows conformant access points from multiple vendors to interoperate on a common distribution system. IAPP specifies the functionality of the access points (which describes service primitives), a set of functions and a protocol that will allow IP packets to be carried between access points.
- FIG. 5 shows the IAPP architecture.
- the access point management entity or APME 40 is used as the main operational program of the access point, implementing the access point manufacturer's proprietary features and algorithms.
- a tree structured distributed model for the access point group is implemented in the APME.
- Establishing a protocol for manipulating access point groups involves adding operations that enable the implementation of a tree structured distributed model.
- Implementing a tree structured distributed model for an access point group in APME may be accomplished by extending the operations of IAPP.
- IAPP In order to form a paging group, at least five operations must be added to IAPP. These operations include “join,” “leave,” “group merge,” “group prune” and “devolution.” Examples of these operations are shown in FIGS. 6A-13B .
- the join operation performs the steps needed to add an access point to an existing access point group.
- the simplest case involves joining one access point to another access point.
- the first access point will send a join request to a second access point.
- the second access point will permit the first access point to join with it and will form the tree structure of the access point group with itself as the root access point. It does this by added the first access point to its cluster map (“CMAP”) as a slave.
- CMAP cluster map
- the CMAP is a list of all the access points in the access point group.
- the second access point will then send a join reply back to the first access point.
- the first and second access points now form an access point group with the second access point as the root access point and the first access point as the leaf access point.
- the joining access point In order to join an access point to an access point group containing more than one access point, the joining access point sends a join request to one of the access points in the access point group. If the access point receiving the join request is not the root access point of the group, it forwards the join request to its master. This step is repeated until the join request reaches the root access point. The root access point then permits the requesting access point to join by adding it to its CMAP and sending a join reply back to the joining access point through the same access points that forwarded the join request to the root access point but in reverse order. Before sending the join reply to the joining access point, the access point that received the join request from the joining access point will add the joining access point to its CMAP as a slave.
- the root access point may deny entry to the requesting access point.
- the root access point may include a limitation on the number of access points that can be included in its access point group, the root access point will deny entry to the requesting access point by communicating back to the requesting access point a no join reply.
- FIGS. 6A-C demonstrate the steps included in one embodiment of the join operation.
- FIG. 6B shows the steps in the join operation while FIG. 6A shows an access point 60 and an access point group 50 before the operation is performed and FIG. 6C shows the access point group 50 after the operation has been performed.
- the access point group 50 in FIG. 6A includes the root access point 52 , an intermediate access point 54 and two leaf access points 53 and 55 .
- the access point group 50 defines a paging area 56 with paging area boundary 57 .
- FIG. 6B when access point 60 is to be added to access group 50 , access point 60 sends a join request to one of the access points 54 in the access point group 50 at time t 1 .
- Access point 54 forwards this join request to the root access point at 52 at time t 2 .
- the root access point 52 then permits access point 60 to join by adding it to its CMAP and sending a join reply back to access point 54 at time t 3 .
- Access point 54 adds access point 60 to its CMAP as a slave and then forwards the join reply to access point 60 at time t 4 .
- FIG. 6C shows access point group 50 after the forgoing use of the join operation.
- Access point 60 is part of access point group 50 and is the slave of access point 54 .
- Access point group 50 has an enlarged paging area boundary 59 surrounding an enlarged paging area 58 .
- the join operation is defined so that only the root access point of the first access point may request to join with the second access point group. This prevents slave access points from having more than one master which would result if a slave access point would join another access point group.
- a first access point group attempts join a second access point group
- the slave access point group must leave the first access point group before the join request will be allowed.
- the leaving access point When an access point is to leave an access point group containing more than one access point, the leaving access point sends a leave request to one of the access points in the access point group. If the access point receiving the leave request is not the root access point of the group, it forwards the leave request to its master. This step is repeated until the leave request reaches the root access point. The root access point then permits the leaving access point to leave by deleting it from the CMAP and sending a leave reply back to the leaving access point through the same access points that forwarded the leave request to the root access point but in reverse order. Before sending the leave reply to the leaving access point, the access point that received the leave request from the leaving access point will remove the leaving access point from its CMAP.
- FIG. 7 and FIGS. 6C and 6A demonstrate the steps included in one embodiment of the leave operation.
- FIG. 7 shows the steps in the leave operation when a leaf access point leaves an access point group
- FIG. 6C shows the access point group 50 before the leave operation is performed
- FIG. 6A shows an access point 60 and the access point group 50 after the leave operation has been performed.
- the access point group 50 in FIG. 6C includes the root access point 52 , an intermediate access point 54 and three leaf access points 53 , 55 and 60 .
- the access point group 50 defines a paging area 58 with paging area boundary 59 . As shown in FIG.
- FIG. 6A shows access point group 50 and access point 60 after the leave operation has been performed.
- Access point 50 has a reduced paging area boundary 57 surrounding a reduced paging area 56 .
- FIG. 6C Another implementation of the leave operation involves removing an intermediate access point from an access point group.
- the intermediate access point is directly connected to its master and three leaf access points and is shown in FIGS. 6C , 9 A and 9 B.
- Implementing the leave operation to remove an intermediate access point may also be called “grafting” because it involves removing the intermediate access point from an access point group and then rejoining the slaves of the leaving access point to the access point group.
- the access point group 50 in FIG. 6C includes the root access point 52 , intermediate access point 54 and three leaf access points 53 , 55 and 60 .
- the access point group 50 defines a paging area 58 with paging area boundary 59 . As shown in FIG.
- access point 54 when intermediate access point 54 is to leave access group 50 , access point 54 sends a leave request to its master (root access point 52 ) at time t 1 .
- the root access point 52 then permits access point 54 to leave by deleting it from its CMAP and sending a leave reply back to access point 54 at time t 2 .
- Access point 54 then sends a leave request to its slaves, access point 60 , 53 and 55 , at time t 3
- Access points 60 , 53 and 55 then send leave requests back to access point 54 at time t 4 , at which time access point 55 removes access points 60 , 53 and 55 from its CMAP.
- FIG. 8B shows access point group 50 and access point 55 after the forgoing use of the leave operation.
- Access point group 50 now has a reduced paging area boundary 62 surrounding a reduced paging area 61 .
- the root access point, and only the root access point, of a first access point group sends a merge request to one of the access points in a second access point group. If the access point receiving the merge request is not the root access point of the group, it forwards the merge request to its master. This step is repeated until the merge request reaches the root access point.
- the root access point of the second access point group then permits the second access point group to merge with second access point group by adding the first access point group to the CMAP of the root access point of the second access point group and sending a merge reply back to the root access point of the first access point group through the same access points in the second access point group that forwarded the merge request to the root access point of the second access point group, but in reverse order.
- the access point in the second access point group that received the merge request from the root access point of the first access point group will add the root access point of the first access point group to its CMAP.
- FIGS. 9A-9C demonstrate the steps included in one embodiment of the merge operation.
- FIG. 10B shows the steps in the merge operation
- FIG. 9A shows two access point groups 70 and 80 before a merge operation is performed
- FIG. 9C shows the access point group 70 after the merge operation has been performed.
- the access point group 70 in FIG. 9A includes the root access point 74 , an intermediate access point 76 and two leaf access points 75 and 77 .
- the access point group 70 defines a paging area 71 with paging area boundary 72 .
- the access point group 80 includes the root access point 84 and two leaf access points 85 and 86 .
- the access point group 80 defines a paging area 81 with paging area boundary 82 . As shown in FIG.
- the root access point 84 of access point group 80 sends a merge request to one of the access points 75 in the access point group 70 at time t 1 .
- Access point 75 forwards this merge request to access point 76 at time t 2 and access point 76 forwards the merge request on to the root access point 74 of access point group 70 at time t 3 .
- the root access point 74 then permits access point group 80 to merge with access point group 70 by adding access point 84 to its CMAP and sending a merge reply back to access point 76 at time t 4 .
- Access point 76 then forwards the merge reply to access point 75 at time t 5 .
- Access point 75 adds access point 80 to its CMAP and then forwards the merge reply to root access point 84 at time t 6 .
- FIG. 9C shows access point group 70 after the forgoing use of the merge operation.
- Access point group 70 has an expanded paging area 88 defined by an expanded paging area boundary 89 .
- the first access point In order for a first access point to cut the access points that directly or indirectly depend from it, the first access point sends a prune inquiry request to its master. If the access point receiving the prune inquiry request is not the root access point of the access point group, the access point receiving the prune inquiry request forwards the prune inquiry request to its master. This step is repeated until the prune inquiry request reaches the root access point.
- the root access point then permits the first access point to prune its dependent access points by removing the dependent access points from the root access point's CMAP and sending a prune inquiry reply back to the first access point through the same access points that forwarded the prune inquiry request to the root access point (the “intermediate access points”), but in reverse order.
- the prune inquiry reply contains a CMAP which has a list of the dependent access points of the requester access point.
- the intermediate access points all remove the dependent access points from their CMAPs.
- the first access point then sends a prune request to each of its slave access points.
- the slave access points then send a prune reply back to the first access point.
- the first access point then removes the slave access points from its CMAP and each slave access point is removed from the access point group of the first access point.
- the removed slave access points may become the root access point of a new access point group if the slaves have slaves of their own, or they may stand alone.
- FIGS. 6C , 10 A and 10 B demonstrate the steps included in an example of one embodiment of the prune operation.
- FIG. 10A shows the steps in the prune operation
- FIG. 6C shows an access point group 50 before a prune operation is performed
- FIG. 10B shows the access point groups 50 and 96 after the prune operation has been performed.
- FIG. 10A when access point 54 is to prune access points 55 , 53 and 60 , access point 54 sends a prune inquiry request to the root access point 52 at time t 1 .
- the root access point 52 then permits access point 54 to prune its dependent access points 53 , 55 and 60 by removing the dependent access points 53 , 55 and 60 from root access point's 52 CMAP and sending a prune inquiry reply back to access point 54 at time t 2 .
- the prune inquiry reply contains a CMAP containing access point 54 's dependent access points.
- Access point 54 removes access points 53 , 55 and 60 from its CMAP and then sends a prune request to access points 53 , 55 and 60 at time t 3 .
- Access points 53 , 55 and 60 then sends a prune reply back to access point 54 at time t 4 .
- FIG. 10B shows access point group 50 and access points 53 , 55 and 60 after the forgoing use of the prune operation.
- Access point group 50 has a reduced paging area 92 defined by a reduced paging area boundary 94 .
- Access points 53 , 55 and 60 are free-standing access points which are not the member of any access point group.
- the devolution operation begins when the root access point sends a devolution request containing all the CMAPs and a delegation of the root role to its slaves. The slaves then send a devolution reply back to the root access point. The root access point removes all the slaves from its CMAP. Each of the slave access points then become the root access point for a new access point group. Each of the newly-formed root access points then sends a delegation request to each of its respective slaves. If any of the slaves is not a leaf access point, then that slave forwards the delegation request its slaves. This forwarding process continues until every leaf access point receives the delegation request. Each slave then sends back a delegation reply to its respective newly-formed root access point.
- FIGS. 11A , 11 B and 11 C demonstrate the steps included in one embodiment of the devolution operation.
- FIG. 11A shows an access point group 500 before a devolution operation is performed
- FIG. 11B shows the steps in the devolution operation
- FIG. 11C shows two access points 504 and 508 and access point group 520 after the devolution operation has been performed.
- Access point group as shown in FIG. 11A , includes a root access point 504 , intermediate access points 506 and 508 and leaf access points 510 , 512 and 514 .
- Access group 500 has a paging area 501 defined by a paging area boundary 502 . As shown in FIG.
- FIG. 11B shows a new access point group 520 and access point 504 and 508 after the forgoing use of the devolution operation.
- New access point group 520 has a paging area 522 defined by a paging area boundary 524 .
- the step of communicating access point group information to computing devices generally includes the steps of (a) including the access point group's paging area ID in the beacon of each access point in the access point group; (b) assigning a channel over which to broadcast the beacon; (c) awakening the computing device to periodically detect the beacon; and (d) synchronizing the timing of the beacon broadcasts of all the access points within an access point group.
- the step of including an access point group's unique paging area ID in the beacon of each access point enables one paging group (or paging area) to be distinguished from another. So that a computing device can determine in which paging area it is located, each paging group is assigned a unique paging area ID and communicates this paging area ID to any computing devices within its respective paging area. This may be accomplished using the beacon packet (hereinafter “beacon”) in the IEEE 802.11 protocol.
- beacon packet hereinafter “beacon”
- Beacons provide a mechanism for access points in an access group to communicate with each other.
- the beacon is a signal that is periodically broadcast by each of the access points and can contain a variety of information.
- Each packet of information in the beacon is called an “element.”
- the beacon included in the IEEE 802.11 protocol contains the elements 110 shown in FIG. 12A .
- the elements are identified by an element name and an element ID.
- Element IDs 32 - 255 are reserved and therefore available for use.
- FIG. 12B shows the enhanced elements 110 which contain a paging area ID 112 at one of the formerly-reserved elements, element ID 32 .
- the other reserved elements 114 remain available for use.
- FIG. 12C shows the format of the paging area ID 120 .
- This format includes a one octet space for the element ID, a one octet space for the length of the paging area ID 124 , and an eight octet space for the paging area ID itself 128 .
- the paging area ID can include one or both of EUI 48 and EUI 64 (the MAC address). Alternatively, the paging area ID can include any other indicator so long as that indicator is unique to each paging area. Additionally, the size of the space used for the paging area ID (an eight octet space as shown in FIG. 12C ) can be varied to accommodate paging area IDs of different lengths.
- the paging area ID can be included in any of the other packets broadcast by the access points.
- the paging area ID By including the paging area ID as an element in the beacon of the IEEE 802.11 protocol or other broadcast packet, the paging area ID will be periodically broadcasted by each access point in an access point group every time the beacon or other packet is broadcast throughout the range of each access point, respectively.
- Methods of channel assignment include: (1) static assignment; (2) standard common paging channel assignment; and (3) local common paging channel assignment method.
- static assignment method all the access points in the WLAN are assigned the same common channel over which the IP traffic and the beacon or other packet containing the paging area ID will be broadcast.
- a single paging channel is assigned to all the access points in the WLAN.
- the access points are assigned a common channel over which to broadcast the beacon or other packet containing the paging area ID (the “beacon channel”) and different common channel over which to broadcast the IP traffic (the “IP channel”).
- This method can reduce the need for a computing device to search for the beacon channel and can eliminate the risk of interference between the beacon channel and the IP channel.
- this method can eliminate the need for a computing device to search for the beacon broadcast, there is a risk of interference between the beacon or other packet and the IP traffic. Additionally, there is a risk of interference among the broadcasts of adjacent access points.
- the local common paging channel helps to reduce the risk of interference among the broadcasts of adjacent access points.
- all the access points in the same access point group are assigned the same paging channel.
- no adjacent access paging groups are assigned the same paging channel.
- the IP channel is a channel which is different from any of the paging channels.
- the paging channel for each access point group is assigned by that access point group's root access point.
- each slave access point uses the same paging channel as its master and none of the slave access points uses the paging channel as its IP channel.
- the computing device need only search for the paging channel when it crosses a paging area boundary because all the access points in the access point group have the same paging area ID. Additionally, assigning different beacon channels to adjacent access point groups helps to reduce the risk of interference among the beacon channels of these groups.
- the computing device in order for a computing device to detect a beacon or other packet, it must be awakened from dormant mode. Once awakened into active mode, the computing device will search for the paging channel if the local common paging channel assignment method was used for the beacon or other packet.
- the computing device itself is programmed to periodically awaken at set intervals and remain in active mode for a predetermined time period (the “beacon window”). However, the set intervals and beacon window need to generally correspond with the timing of the beacon broadcast (the “beacon timing”) of the access points.
- Synchronizing the beacon timing of all the access points within an access point group not only allows the computing device to awaken from dormant mode only periodically, it enhances the battery life of the computing device.
- Access points need to continuously and periodically broadcast their paging area ID so that the access points can be recognized by a computing device when the computing device crosses a paging area boundary.
- the computing device must periodically awaken from dormant mode to detect the beacon or other packet containing the paging area ID.
- frequent awakening causes heavy battery consumption. To save battery consumption, the number of awakenings needs to be reduced.
- the computing device only needs to awaken during the period of time during which the beacon is broadcast, even if the computing device has crossed from within the range of one access point into that of another.
- the access points can adjust their beacon timings to coincide with the beacon timings of the other access points using the local subnet broadcast which can be realized by IAPP.
- the access points in an access point group reside in different subnets, transition delays and router queuing delays make the local subnet broadcast an imprecise mechanism for synchronizing the beacon timings. Therefore, if all the access points in an access point group are not in the same subnet, synchronizing the beacon timing of all the access points cannot be accomplished using the distribution system. Instead synchronization is achieved by using the computing device's timing reports.
- the computing device's timing reports contain at least a beacon timing difference.
- FIGS. 13A and 13B The method used for synchronizing the beacon timings of all the access points in an access point group is shown in FIGS. 13A and 13B .
- the computing device When a computing device enters a paging area (“the first paging area”), the computing device registers with the access point of which it is in range (the “first access point”) 202 .
- the computing device then listens for an initial beacon from the first access point 204 . As it listens, the computing device determines whether it senses the initial beacon 204 . If the computing device does not sense the initial beacon, it continues to listen 204 until it determines that it has sensed the initial beacon 206 .
- the initial beacon (as do all beacons) contains the beacon timing for the access point group of which the first access point is a member.
- the beacon timing lets the computing device know when to anticipate the next beacon.
- the computing device Upon sensing the initial beacon, the computing device sets its set intervals to the group beacon timing 208 and then goes into dormant mode 210 . The computing device will now anticipate beacons according to the group beacon timing.
- the computing device While in dormant mode, the computing device may remain stationary, move within the range of the first access point, move into the range of another access point within the first paging area (the “second access point”) or move into a second paging area 212 . If the computing device remains stationary, moves within the range of the first access point or moves into the range of a second access point, it will awaken at its set interval (now set to the group beacon timing) 214 and listen for a new beacon 216 . The new beacon will either be the first access point's beacon, or it will be the second access point's beacon if the computing device has moved into the range of the second access point. The computing device then determines whether it senses a new beacon during the beacon window 218 .
- the computing device If it determines that it has sensed a beacon during the beacon window, the timing of the new beacon and the set interval of the computing device are already synchronized. Therefore, the computing device returns to dormant mode 210 and steps 210 - 218 are repeated until the computing device determines that it does not sense a new beacon during its beacon window 218 .
- the computing device determines that it has not sensed a new beacon during its beacon window 218 , the set intervals and the timing of the new beacon are not synchronized. Therefore, the computing device remains in active mode until it determines that it does sense a new beacon from which it calculates a beacon timing difference 220 .
- the beacon timing difference is the difference in time between the beginning of the beacon window during which a new beacon was anticipated by the computing device and the time when the new beacon is actually sensed by the computing device. If the new beacon did not come from the second access point 221 , it came from the first access point. This means that the computing device has stayed within range of the first access point and the set interval of the computing device is not synchronized with the beacon timing of the first access point.
- the computing device sends a beacon timing report containing at least the beacon timing difference to the first access point 250 .
- the computing device sets its timer to the beacon timing of the first access point 252 and the computing device returns to dormant mode 210 and the process continues from step 210 .
- the computing device sends the beacon timing report including at least the beacon timing difference and an identification of the first access point to the second access point 222 . Then it is determined if the second access point is the master of the first access point 226 . The second access point makes this determination from the identification of the first access point in the beacon timing report. If the second access point is the master of the first access point, the beacon timing of the first access point is set to that of the second access point 228 . The set intervals of the computing device are also set to the beacon timing of the second access point 230 .
- the second access point is not the master of the first access point 226 , it must be determined whether the first access point is the master of the second access point 232 . If the first access point is the master of the second access point, the beacon timing of the second access point is set to that of the first access point 234 . Then the set intervals of the computing device are set to the beacon timing of the first access point 238 . In contrast, if the first access point is not the master of the second access point, the beacon timings of the first and second access points are set to that of their common master 236 . The set interval of the computing device is then also set to the beacon timing of the common master 237 .
- the computing device After the set interval of the computing device is set in any of steps 230 , 237 or 238 , whichever access point had changed its beacon timing (the first access point, the second access point or both) notifies the other access points in the access point group of the change in their beacon timing. However, if the first and second access points are in different paging areas, as indicated by the paging area ID included in the beacon, the computing device will not synchronize the first and second access points.
- FIG. 14 An example of the signaling activity involved in beacon synchronization is shown in FIG. 14 .
- a computing device moves from within the rage of a first access point to within the range of a second access point at a time t 8 wherein the beacon timings of the two access points are not synchronized.
- both access points are located in the same access point group and the first access point is the master of the second access point.
- the signal for the computing device 360 is indicated as “low” when the computing device is in dormant mode and is indicated as “high” when the computing device is in active mode.
- the signals of the first access point 320 and the second access point 322 are divided into a plurality of segments.
- Each segment 322 and 342 has the duration of approximately the duration of the beacon of each access point, respectively.
- the computing device is within the range of the first access point during a first time period 324 and moves within the range of the second access point at a time t 8 and remains there during a second time period 326 .
- the second access point is broadcasting its beacon 344 and 348 during the first time period 324 , the computing device does not sense these beacons 344 and 348 because the computing device is not within the range of the second computing device during the first time period 324 .
- the computing device moves into the range of the second access point at time t 8 , is within the range of the second access point during a second time period 326 and remains there during a second time period 326 .
- the first access point is broadcasting its beacon 332 , 334 and 336 during the second time period 326
- the computing device does not sense these beacons 332 , 334 and 336 because the computing device is not within the range of the first computing device during the second time period 326 .
- the computing device's signal is “high” at time t 1 .
- the first access point broadcasts its beacon 328 between time t 2 and t 3 .
- the computing device returns to dormant mode at time t 4 (the signal of the computing device becomes “low”). Because the first access point's beacon 328 contains the beacon timing, the computing device knows when to anticipate the first access point's next beacon. Therefore, at time t 5 , a short time before the first access point's beacon 330 is anticipated, the computing device's signal goes “high” and remain “high” until the first access point has completed broadcasting the first access point's beacon 332 .
- the computing device moves from within the range of the first access point to within the range of the second access point. However, just prior to its move at time t 7 , the computing device had anticipated the next beacon 332 from the first access point. If the beacon timings of the first and second access points were synchronized, the computing device should sense the second access points beacon shortly after time t 7 . Because the beacon timings of the first and second access points are not synchronized, the computing device does not sense the second access point's beacon at time t 8 but instead at time t 9 . Therefore, the signal of the computing device must remain “high” until time t 10 when the second access point has completed the broadcast of its beacon 350 .
- the computing device calculates the beacon timing difference 362 .
- the beacon timing difference 362 is the difference between time t 10 (when the broadcast of the second access point's beacon 350 is complete) and time t 7 (shortly before the broadcast of the first access point's beacon 332 was anticipated).
- the computing device then sends the beacon timing difference to the second access point.
- the second access point identifies the first access point using IAPP and the Service Location Protocol (“SLP”). Because the first access point is the master of the second access point, the second access point must adjust its beacon timing to that of the first access point.
- SLP Service Location Protocol
- beacon 350 contains the unsynchronized beacon timing of the second access point
- the signal of the computing device will go “high” at time t 11 just before the computing device anticipates the next beacon at time t 12 . Therefore, before adjusting its beacon timing to that of the first access point, the second access point broadcasts one more beacon 352 according to its original beacon timing at t 12 . However, beacon 352 contains a beacon timing adjusted to that of the first access point.
- the computing device's signal will go “low” at time t 13 after the broadcast of beacon 352 is complete.
- the computing device's signal will go “high” again at t 14 just before the second access point's next beacon 354 is anticipated according to the adjusted beacon timing.
- the step of locating a computing device includes associating the computing device whenever it crosses an access point boundary and whenever it is paged. Whenever a computing device crosses an access point boundary, it must associate with a new access point group. In order to associate with a new access point group, the computing device will communicate with an access point in the access point group of which the computing device is in range (the “in-range access point”). More specifically, to associate with a new access point group, the computing device sends a request to associate to the in-range access point. The root access point of the new access point group, which may be the in-range access point, then assigns an association identification (“AID”) to the computing device and adds the AID and the associated MAC address of the computing device to its association table.
- AID association identification
- the A/D will typically have a value of in the range of about 1 to about 2007 and is placed in the 14 least significant bits of the AID field with the two least significant bits of the AID filed each set to “1.”
- the root access point of the new access point group will then communicate the MAC address and AID of the computing device to the other access points in the new access point group. This communication occurs during association and thru the use of IAPP to broadcast the IAPP-ADD.request (which includes the MAC address and AID of the computing device) over the local subnet broadcast using IAPP to all the access points on the same subnet. This communicates the MAC address of the computing device to the access points on the same subnet as the root access point.
- IAPP may also be used to communicate the MAC address of the computing device. Because the MAC address is used to identify the computing device instead of the IP address, the problems normally associated with a computing device moving from one subnet to the other are avoided.
- the AID will remain associated with the computing device and the MAC number of the computing device will remain in the association tables of the access points of the new access point group until the computing device explicitly or implicitly disassociates from the new access point group.
- the computing device invokes a disassociation service.
- To disassociate implicitly the computing device simply leaves the range of the new access point group without explicitly disassociating.
- the new access point group will discover that the computing device has left its range without explicitly disassociating when the new access point group does not receive a communication from the computing device within a predetermined time period. At this time, the computing device will be disassociated.
- the AID is available to be reused and the computing device's MAC address is deleted from the association tables of the access points in the new access point group.
- the computing device In addition to associating with an access point group, the computing device must also associate with an access point when it is paged so that it can receive IP traffic. Once a computing device has associated with an access point group, that access point group may then receive IP traffic for that computing device through the root access point. When the root access point receives IP traffic for the computing device, the computing device must then be located within the access point group and, if in dormant mode, the computing device must be moved into active mode. Because the location of the computing device within the access point group is unknown, the root access point communicates to the other access points in the access point group that the communication device needs to be paged. All the access points in the access point group then page the communication device.
- the communication device After receiving the page, the communication device then sends a request to associate to whichever of the access points the computing device is in range. That access point then notifies the root access point of the presence of the computing device within its range and the root access point then forwards the IP traffic to that access point. That access point then forwards the IP traffic to the computing device. While the computing device is in active mode, if it moves into the range of a second access point in the same access point group, it will register with the second access point.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
Apparatuses and methods are disclosed herein for implementing dormant mode with paging in a WLAN. Power savings in the computing device and reduction in traffic across the network are achieved by requiring a computing device to inform the WLAN of its location only when it crosses a paging area boundary or is to receive IP traffic. Dormant mode with paging is implemented in a protocol that supports dormant functionality and paging functionality but does not itself provide methods or standards for implementing such functionality, such as the IEEE 802.11. The methods and apparatuses disclosed herein provide the methods needed to implement dormant mode with paging in such a protocol. Generally, the methods and apparatuses for implementing dormant mode with paging basically include (1) establishing paging areas; (2) communicating access group information to a computing device; and (3) locating a computing device.
Description
- This application is a divisional of application Ser. No. 11/336,236, entitled METHOD AND APPARATUS FOR DORMANT MODE SUPPORT WITH PAGING,” filed Jan. 19, 2006, which is a divisional of application Ser. No. 10/264,807, entitled “METHOD AND ASSOCIATED APPARATUS FOR DORMANT MODE SUPPORT WITH PAGING,” filed Oct. 4, 2002, which claims priority based on the U.S. Provisional Patent Application No. 60/352,423, entitled “METHOD AND ASSOCIATED APPARATUS FOR DORMANT MODE SUPPORT WITH PAGING IN IEEE 802.11,” filed Jan. 28, 2002, all assigned to the corporate assignee of the present invention and which is incorporated by reference herein.
- Local area networks (“LAN”) have enabled digital networking of almost any computing device, including, computers, laptops, personal digital assistants, scanners and any other devices that deal with digital information. However, traditionally, the physical reach of LANs has been limited because they require a physical or hard-wired connection between computing devices. Even with phone dial-ups, a LAN network is ultimately limited by its hard-wired nature. To overcome this limitation, wireless solutions were developed.
- In a wireless LAN (“WLAN”), network connections are accomplished by use of a wireless technology such as radio frequency (“RF”), infra-red, microwave, millimeter wave or other type of wireless communication instead of cable. This allows a computing device to remain connected to the network while it is mobile or while it is not physically connected to the WLAN. The connection is usually accomplished and maintained through the use of an interface card installed in the computing device. WLANs may also include connections to a wired network, such as a LAN. Connections to the wired network are accomplished through the use of access points. Access points are connected to a node using some type of wired connection. An access point can reside at any node on the wired network and acts as a gateway for routing data (“IP traffic”) between the wired and wireless portions of the network.
- Several protocols have been proposed to standardize WLANs to allow greater compatibility with a wide range of devices, networks and components. One such protocol is the IEEE 802.11. The IEEE 802.11 protocol specifies both the architectures and layers of a WLAN. The IEEE 802.11 protocol specifies the physical and medium access control (“MAC”) layers of a WLAN. The physical layer handles the wireless transmission of data, and is generally a form of RF or infrared communication. The MAC layer is a set of protocols which is responsible for maintaining order.
- With regard to architecture, the IEEE 802.11 protocol specifies two types. The first, shown in
FIG. 1 , is the ad hoc network. The ad hoc network can be spontaneously created with a plurality of computing devices. As shown inFIG. 1 , the ad hoc network has no structure, no fixed points and generally, every computing device can communicate with every other computing device. The second type of architecture is the infrastructure. As shown inFIG. 2 , this architecture uses access points through which the computing devices can communicate with each other and a node of a wired network (hereinafter “node”). Computing devices communicate with an access point through some type of wireless technology and the access points communicate with a node through some type of wired technology. Nodes can communicate with each other through various types of networks, such as the Internet, generally by some type of wired connection. A distribution system, which is the mechanism by which the access points communicate with each other, is included in the access points, and also includes the Nodes, networks, and the connections among them. Each access point has a range over which it provides service. Each of these ranges is a basic service set (“BSS”); while the BSS and the distribution system form an extended service set (“ESS”) which defines the range over which services can be provided. The location of the computing device on the network is determined by the access point to which it is connected. - A computing device can move about within the range of the access point to which it is connected. If the WLAN is designed so that there is some overlap of the ranges of the access points, it may be possible for a computing device to move among the access points and remain connected to the WLAN and continue to send and receive IP traffic. In order to do this, the WLAN needs to know where the computing device is so that it knows where to direct IP traffic intended for the computing device. In other words, the WLAN must track the computing device.
- Generally, in order for the network to track the computing device, the computing device associates with an access point at a given time interval, upon its movement or when the computing device travels between or among the ranges of different access points. IP traffic intended for the computing device is forwarded to the last access point with which the computing device had associated and then forwards the IP traffic to the computing device. However, tracking and forwarding IP traffic to the computing device in this manner can lead to a power drain on the computing device and a high level of signaling over the network. For example, if the computing device must associate with a new access point whenever it enters the range of the new access point, the computing device must remain on at all times so that it may detect when it has entered the range of the new access point. Additionally, the computing device must remain on at all times to receive any incoming IP traffic. This continuous detection and repeated associating causes a tremendous drain on the computing device's power supply and adds to the signaling across the network.
- To overcome these disadvantages, the IEEE 802.11 protocol includes dormant mode functionality. Dormant mode functionality (without paging functionality) allows a computing device to operate in two modes, an “active” mode and a “dormant” mode. In the active mode, the computing device can receive signals, such as IP traffic, and can send signals such as those sent when the computing device associates with an access point. In the dormant mode, the computing device is not turned off, but is put into a mode which reduces its ability to receive IP traffic by reducing the monitoring of certain channels and thus is a state of reduced power consumption. The computing device must be in active mode to send or receive IP traffic and associate with an access point. Therefore, the computing device must periodically go into active mode to associate with an access point and to send or receive IP traffic. Because IP traffic intended for the computing device may be transmitted while the computing device is in dormant mode, the IEEE 802.11 protocol incorporates buffers in the access points to queue IP traffic intended for the computing device. The computing device can then receive this IP traffic when it switches into active mode and therefore does not miss any IP traffic sent while it was in dormant mode. Although dormant mode functionality does provide some power savings for the computing device and reduced signaling across the network, the computing device must still periodically switch into active mode to register with each access point of which it is in range, and to send or receive IP traffic.
- Further reductions in computing device power drain and signaling across the network can be accomplished through the use of paging. Paging is a method of notifying a dormant computing device of incoming IP traffic. Paging includes (i) the use of paging areas; and (ii) paging the computing device. The use of paging areas includes the creation of paging areas and having the computing device signal the network only when it crosses a paging area boundary. A paging area boundary is defined by the outer perimeter of the ranges of a collection of access points (an “access point group”) that are used to locate a dormant computing device. This outer perimeter forms the paging area boundary of a paging area. Each paging area uniquely identifies itself to computing devices by periodically broadcasting that paging area's unique paging area identifier.
- Generally, a network implementing paging will be arranged to have at least two paging areas. Only when a computing device crosses a paging area boundary from one paging area to another, does the computing device associate with the nearest access point. A computing device detects when it crosses a paging area boundary by detecting a change in the unique paging area identifier. However, because neighboring paging areas usually overlap with each other to prevent gaps in coverage, a computing device may be in more than one paging area simultaneously and thus will detect more than one paging area identifier. In this case, the computing device will detect the strength of the paging area identifier from each paging area that computing device is within and will associate with the paging area from which the strongest paging area identifier is broadcast.
- The computing device is programmed to periodically go from dormant to active mode so that it may detect the unique paging identifier or identifiers being broadcast. By requiring a computing device to associate with the network only when it crosses a paging area boundary, the amount of signaling to the network is decreased and the amount of time the computing device can remain dormant is increased, thus power consumption is decreased. Further reduction in power usage and signaling by the computing device is realized because the computing device only periodically needs to switch into active mode.
- One of the consequences of reducing the number of instances in which the computing device informs the network of its location in the previously-described manner is that the network does not know the location of the computing device within a given paging area. Because the computing device may have moved after the last time it associated with an access point, all that the network knows is that the computing device is located somewhere within the paging area in which the access point with which the computing device last associated is located (the “old access point”). In order for the network to forward IP traffic to the computing device, it must know the access point for which the computing device is currently in range (the “new access point”) and alert the computing device about the pending IP traffic. The network precisely locates the computing device within a paging area by paging the computing device. Paging the computing device is signaling by the network through the access points directed to locating the computing device and alerting it to establish a connection. Paging the computing device involves transmitting a request to all the access points in the same paging area as the old access point. These access points then broadcast the paging signal. When the computing device receives the paging signal it associates with the new access point. Once the computing device associates with the new access point, the network knows the location of the computing device in terms of the access point in which it is in range. The new access point then signals the old access point, the old access point sends any buffered IP traffic to the new access point and the new access point delivers the buffered IP traffic to the computing device. Power drain on the computing device and signaling over the network are reduced because the computing device only associates with a new access point in the same paging area when the computing device is paged.
- Although many cellular-based wireless WAN protocols support paging, WLAN protocols, such as the IEEE 802.11, do not specifically provide standards or methods for implementing paging. For example, the IEEE 802.11 protocol does not have paging areas, a dedicated paging channel and a radio link protocol specifically directed towards locating a dormant computing device. Additionally, the IEEE 802.11 and other WLAN protocols lack the protocols for establishing and altering paging areas, associating a computing device with an access point, and performing paging. Furthermore, existing WLAN protocols do not address the issues of maintaining synchronization of the access points across each access point group and reducing signal interference among access points.
- The advantages of the methods and apparatuses disclosed herein will be apparent from the following summary and detailed description of the preferred embodiments.
- Apparatuses and methods are disclosed herein for implementing dormant mode with paging in a WLAN. Power savings in the computing device and reduction in traffic across the network are achieved by requiring a computing device to inform the WLAN of its location only when it crosses a paging area boundary or is to receive IP traffic. Dormant mode with paging is implemented in a protocol that supports dormant functionality but does not itself provide methods or standards for implementing dormant mode and paging functionality, such as the IEEE 802.11. The methods and apparatuses disclosed herein are implemented in such a protocol and provide the methods needed to implement dormant mode with paging in such a protocol. Generally, the methods and apparatuses for implementing dormant mode with paging basically include (1) establishing paging areas; (2) communicating access group information to a computing device; and (3) locating a computing device.
- Establishing paging areas generally involves, forming at least two access point groups which includes; (a) defining the structure of the access point groups (b) establishing a protocol for communications among the access points in each access point group; and (c) establishing a protocol for manipulating the access point groups.
- Paging areas are needed to enable the paging functionality and do so primarily by using paging groups to define paging area boundaries. The paging groups are generally formed from a subset of all the access points within the WLAN or network by defining the structure of the access point group which establishes the relationships among the access points. In another implementation, the relationships among the access points in a paging group may be defined by a tree structured distributed group model. A tree structured distributed group model has a hierarchical tree structure wherein access points are defined in terms of functionality as “master,” “slave,” or both.
- Establishing a protocol for communications among the access points in an access point group may include developing a unique protocol or modifying an existing one such as the IEEE Inter Access Point Protocol (“IAPP”). Establishing a protocol for manipulating access point groups involves adding operations to the protocol for communications that enable the implementation of a tree structured distributed model. Implementing a tree structured distributed model for an access point group may be accomplished by extending the operations of IAPP. In order to form and manipulate a paging group, at least five operations must be added to IAPP. These operations include “join,” “leave,” “group merge,” “group prune” and “devolution.”
- Once access point groups have been formed, they must have some way of communicating their identity to any computing device that is within the paging area that they define so that the computing devices can be located. The step of communicating access point group information to computing devices generally includes (a) including the access point group's paging area ID in the beacon of each access point in the access point group; (b) assigning a channel over which to broadcast the beacon; (c) awakening the computing device to periodically detect the beacon; and (d) synchronizing the timing of the beacon broadcasts of all the access points within an access point group.
- Including an access point group's unique paging area ID in the beacon of each access point enables one paging group (or paging area) to be distinguished from another. Each paging group is assigned a unique paging area ID and communicates this paging area ID to any computing devices within that paging group's paging area so that a computing device can determine in which paging area it is located. This may be accomplished using a beacon packet or beacon, such as the beacon in the IEEE 802.11 protocol. Beacons are signals which are periodically broadcast to each of the access points and contain a variety of information including the paging area ID.
- In assigning a channel over which to broadcast the beacon or other packet containing the access point ID, there are several issues to consider. It is advantageous for adjacent access points to broadcast the beacon over different channels because this helps avoid interference. It is also advantageous for the access points to broadcast the beacon or other packet over a different channel than that used to broadcast the IP traffic because this helps to avoid interference between the IP traffic and the beacon or other packet. However, the more channels that are used the more channels a computing device must search every time a computing device moves from the range of one access point into the range of another. Because there is a conflict in the requirements of channel separation and minimizing the number of channels, multiple methods of assigning the channel for beacon broadcasting are required so that the assignment can be optimized for a given situation.
- Methods of channel assignment include: (1) static assignment; (2) standard common paging channel assignment; and (3) local common paging channel assignment method. In the static assignment method, all the access points in the WLAN are assigned the same common channel over which to broadcast the IP traffic and the beacon. In the standard common paging channel assignment method, the access points are assigned a universal common channel over which to broadcast the beacon and a different common channel over which to broadcast the IP traffic. In the local common paging channel assignment method, all the access points in the same access point group are assigned the same channel for paging with no adjacent access paging groups assigned the same paging channel and a channel for IP traffic that is different from any of the paging channels.
- The timing of the beacon broadcasts for each access point within an access point group must be synchronized to occur approximately at the same time (the “beacon timing”). When the beacon broadcasts in an access point group all occur at the same time, the computing device only needs to be in active mode during the beacon timing no matter with which access point the computing device is associated. Synchronizing the beacon timing for the access points within an access point group involves the access points and the computing device. As the computing device moves from within the range of a first access point to within the range of a second access point, it senses the difference between the beacon timing of the first access point and the second access point to ascertain a “beacon timing difference.” The computing device then communicates this beacon timing difference to the second access point which communicates the beacon timing difference to the first access point. The beacon timing of the first or second access point or both are synchronized.
- Locating a computing device includes associating the computing device with an access point or access point group whenever it crosses an access point boundary, and whenever it is paged. Whenever a computing device crosses an access point boundary, it must associate with a new access point in a new access point group. Whenever a computing device is paged, it must associate with the access point for which it is in range so that it can receive IP traffic. To associate with an access point, the computing device sends a request to associate to the new access point. Thereafter, an association identification (“AID”) is assigned to the computing device.
- The methods and apparatuses disclosed herein provide numerous embodiments which will be understood by those skilled in the art based on the present disclosure. Some of these are described below and are represented in the drawings by means of several figures, in which:
-
FIG. 1 is a diagram of a wireless network with an ad hoc architecture according to the prior art; -
FIG. 2 is a diagram of a wireless network with an infrastructure architecture according to the prior art; -
FIG. 3 is a diagram of a WLAN that supports paging according to the a preferred embodiment; -
FIG. 4 is a diagram of an access point group that uses a structured distributed grouping model according to a preferred embodiment; -
FIG. 5 is a diagram of IAPP architecture according to the prior art; -
FIG. 6A is diagram of an access point and access point group, according to a preferred embodiment; -
FIG. 6B is a diagram of steps in a join operation, according to a preferred embodiment; -
FIG. 6C is a diagram of an access point group after the join operation ofFIG. 6B is performed, according to a preferred embodiment; -
FIG. 7 is a diagram of steps in a leave operation, according to a preferred embodiment; -
FIG. 8A is a diagram of steps in a leave operation according to a preferred embodiment; -
FIG. 8B is a diagram of an access group and an access point after the leave operation ofFIG. 8A is performed, according to a preferred embodiment; -
FIG. 9A is a diagram of a first and a second access group, according to a preferred embodiment; -
FIG. 9B is a diagram of steps in a group merge operation, according to a preferred embodiment; -
FIG. 9C is a diagram of an access group after the group merge operation ofFIG. 10B is performed, according to a preferred embodiment; -
FIG. 10A is a diagram of steps of a group prune operation, according to a preferred embodiment; -
FIG. 10B is a diagram of a first and a second access group after the group prune operation ofFIG. 10A is performed, according to a preferred embodiment; -
FIG. 11A is a diagram of an access group before a group devolution operation is performed, according to a preferred embodiment; -
FIG. 11B is a diagram of steps of a group devolution operation, according to a preferred embodiment; -
FIG. 11C is a diagram of an access group and a two access points after the group devolution operation ofFIG. 11B is performed, according to a preferred embodiment; -
FIG. 12A is a diagram of the beacon elements in the IEEE 802.11 protocol according to the prior art; -
FIG. 12B is a is a diagram of the beacon elements in the IEEE 802.11 protocol according to a preferred embodiment; -
FIG. 12C is a diagram of the format of the paging ID according to a preferred embodiment; -
FIG. 13A is a flow chart of a method for beacon synchronization, according to a preferred embodiment; -
FIG. 13B is a continuation of the flow chart of 15B; and -
FIG. 14 is a diagram of the signals produced by a first access point, a second access point and a computing device during beacon synchronization, according to a preferred embodiment. - Identical features are marked with identical reference symbols in the indicated drawings. Disclosed herein is a method and apparatus for implementing dormant mode with paging in a WLAN. The method for implementing dormant mode with paging basically includes the steps of (1) establishing paging areas; (2) communicating access group information to a computing device; and (3) locating a computing device. Although the following example will describe this method and apparatus using one computing device, it may be used for a plurality of computing devices. It is to be understood that the following example(s) is (are) for the purpose of explanation and not limitation.
- The step of establishing paging areas generally involves, forming at least two access point groups which includes; (a) defining the structure of the access point groups (b) establishing a protocol for communications among the access points in each access point group; (c) establishing a protocol for manipulating the access point groups.
- Generally, paging areas are defined by the outermost perimeter of the ranges of the outermost access point groups within a paging group. This outer most perimeter is the paging area boundary. The paging groups are generally formed from a subset of all the access points within the WLAN or network by defining the structure of the access point group which establishes the relationships among the access points. One example is shown in
FIG. 3 wherein aWLAN 400 for which a paging area has been defined is shown. In thisWLAN 400, there are twonodes network 406, such as the internet, by some type of wired connection. A plurality ofaccess points nodes access points paging area 450 having apaging area boundary 452. - In another example, the relationships among the access points in a paging group may be defined by a tree structured distributed group model.
FIG. 4 shows anaccess point group 10 wherein the relationships among the access points 12-21 in theaccess point group 10 are defined by a distributed group model. Thepaging group 10 is comprised of access points 12-21 and defines apaging area 26. Thepaging area boundary 28 is defined by the outermost perimeters of the ranges 30-39 of the access points 12-21, and encloses thepaging area 26. - A tree structured distributed group model has a hierarchical tree structure. In the hierarchical tree structure, each access point is connected to one or more access points directly below it. Additionally, access points are defined in terms of functionality as “master,” “slave,” or both. A master is an access point to which other access points belong and which has the ability to control the access points that belong to it. In
FIG. 4 , the master access points are 12, 13, 15, 17 and 18. A slave is an access point that belongs to a master. In theaccess point group 10, the slave access points are 13-21. It is possible to be a master and a slave with the functionality of both at the same time, such asaccess points access points - Establishing a protocol for communications among the access points in an access point group may include developing a unique protocol or modifying an existing one. The IEEE Inter Access Point Protocol (“IAPP”) is an existing protocol between access points that allows conformant access points from multiple vendors to interoperate on a common distribution system. IAPP specifies the functionality of the access points (which describes service primitives), a set of functions and a protocol that will allow IP packets to be carried between access points.
FIG. 5 shows the IAPP architecture. The access point management entity or APME 40 is used as the main operational program of the access point, implementing the access point manufacturer's proprietary features and algorithms. A tree structured distributed model for the access point group is implemented in the APME. - Establishing a protocol for manipulating access point groups involves adding operations that enable the implementation of a tree structured distributed model. Implementing a tree structured distributed model for an access point group in APME may be accomplished by extending the operations of IAPP. In order to form a paging group, at least five operations must be added to IAPP. These operations include “join,” “leave,” “group merge,” “group prune” and “devolution.” Examples of these operations are shown in
FIGS. 6A-13B . - The join operation performs the steps needed to add an access point to an existing access point group. The simplest case involves joining one access point to another access point. The first access point will send a join request to a second access point. The second access point will permit the first access point to join with it and will form the tree structure of the access point group with itself as the root access point. It does this by added the first access point to its cluster map (“CMAP”) as a slave. The CMAP is a list of all the access points in the access point group. The second access point will then send a join reply back to the first access point. The first and second access points now form an access point group with the second access point as the root access point and the first access point as the leaf access point.
- In order to join an access point to an access point group containing more than one access point, the joining access point sends a join request to one of the access points in the access point group. If the access point receiving the join request is not the root access point of the group, it forwards the join request to its master. This step is repeated until the join request reaches the root access point. The root access point then permits the requesting access point to join by adding it to its CMAP and sending a join reply back to the joining access point through the same access points that forwarded the join request to the root access point but in reverse order. Before sending the join reply to the joining access point, the access point that received the join request from the joining access point will add the joining access point to its CMAP as a slave. However, it is possible for the root access point to deny entry to the requesting access point. For example, if the root access point may include a limitation on the number of access points that can be included in its access point group, the root access point will deny entry to the requesting access point by communicating back to the requesting access point a no join reply.
-
FIGS. 6A-C demonstrate the steps included in one embodiment of the join operation.FIG. 6B shows the steps in the join operation whileFIG. 6A shows anaccess point 60 and anaccess point group 50 before the operation is performed andFIG. 6C shows theaccess point group 50 after the operation has been performed. Theaccess point group 50 inFIG. 6A includes theroot access point 52, anintermediate access point 54 and twoleaf access points access point group 50 defines apaging area 56 withpaging area boundary 57. As shown inFIG. 6B , whenaccess point 60 is to be added to accessgroup 50,access point 60 sends a join request to one of the access points 54 in theaccess point group 50 at time t1.Access point 54 forwards this join request to the root access point at 52 at time t2. Theroot access point 52 then permitsaccess point 60 to join by adding it to its CMAP and sending a join reply back toaccess point 54 at time t3.Access point 54 addsaccess point 60 to its CMAP as a slave and then forwards the join reply to accesspoint 60 at time t4.FIG. 6C showsaccess point group 50 after the forgoing use of the join operation.Access point 60 is part ofaccess point group 50 and is the slave ofaccess point 54.Access point group 50 has an enlargedpaging area boundary 59 surrounding anenlarged paging area 58. - In a further embodiment of the join operation, where a first access point group attempts join a second access point group, the join operation is defined so that only the root access point of the first access point may request to join with the second access point group. This prevents slave access points from having more than one master which would result if a slave access point would join another access point group. In yet a further embodiment of the join operation, where a first access point group attempts join a second access point group, there is no restriction on which access points in the first access point group may request to join a second access point group. However, because a slave access point can only have one master at a time, if a slave access point in the first access point group requests to join the second access point group, the slave access point group must leave the first access point group before the join request will be allowed.
- When an access point is to leave an access point group containing more than one access point, the leaving access point sends a leave request to one of the access points in the access point group. If the access point receiving the leave request is not the root access point of the group, it forwards the leave request to its master. This step is repeated until the leave request reaches the root access point. The root access point then permits the leaving access point to leave by deleting it from the CMAP and sending a leave reply back to the leaving access point through the same access points that forwarded the leave request to the root access point but in reverse order. Before sending the leave reply to the leaving access point, the access point that received the leave request from the leaving access point will remove the leaving access point from its CMAP.
-
FIG. 7 andFIGS. 6C and 6A demonstrate the steps included in one embodiment of the leave operation.FIG. 7 shows the steps in the leave operation when a leaf access point leaves an access point group, whileFIG. 6C shows theaccess point group 50 before the leave operation is performed, andFIG. 6A shows anaccess point 60 and theaccess point group 50 after the leave operation has been performed. Theaccess point group 50 inFIG. 6C includes theroot access point 52, anintermediate access point 54 and threeleaf access points access point group 50 defines apaging area 58 withpaging area boundary 59. As shown inFIG. 7 , whenaccess point 60 is to be removed fromaccess group 50,access point 60 sends a leave request to one of the access points 54 in theaccess point group 50 at time t1.Access point 54 forwards this leave request to the root access point at 52 at time t2. Theroot access point 52 then permitsaccess point 60 to leave by deleting it from its CMAP and sending a leave reply back toaccess point 54 at time t3 whereinaccess point 54 removesaccess point 60 from its CMAP and then forwards the leave reply to accesspoint 60 at time t4.FIG. 6A showsaccess point group 50 andaccess point 60 after the leave operation has been performed.Access point 50 has a reducedpaging area boundary 57 surrounding a reducedpaging area 56. - Another implementation of the leave operation involves removing an intermediate access point from an access point group. In this implementation, the intermediate access point is directly connected to its master and three leaf access points and is shown in
FIGS. 6C , 9A and 9B. Implementing the leave operation to remove an intermediate access point may also be called “grafting” because it involves removing the intermediate access point from an access point group and then rejoining the slaves of the leaving access point to the access point group. Theaccess point group 50 inFIG. 6C includes theroot access point 52,intermediate access point 54 and threeleaf access points access point group 50 defines apaging area 58 withpaging area boundary 59. As shown inFIG. 8A , whenintermediate access point 54 is to leaveaccess group 50,access point 54 sends a leave request to its master (root access point 52) at time t1. Theroot access point 52 then permitsaccess point 54 to leave by deleting it from its CMAP and sending a leave reply back toaccess point 54 at time t2.Access point 54 then sends a leave request to its slaves,access point access point 54 at time t4, at whichtime access point 55 removesaccess points access point group 50, access points 60, 53 and 55 send a join request to rootaccess point 52. Access points 60, 53 and 55 andaccess group 50 go through the join operation as described herein.FIG. 8B showsaccess point group 50 andaccess point 55 after the forgoing use of the leave operation.Access point group 50 now has a reducedpaging area boundary 62 surrounding a reducedpaging area 61. - In order to combine two access point groups to form a single access point group, the root access point, and only the root access point, of a first access point group sends a merge request to one of the access points in a second access point group. If the access point receiving the merge request is not the root access point of the group, it forwards the merge request to its master. This step is repeated until the merge request reaches the root access point. The root access point of the second access point group then permits the second access point group to merge with second access point group by adding the first access point group to the CMAP of the root access point of the second access point group and sending a merge reply back to the root access point of the first access point group through the same access points in the second access point group that forwarded the merge request to the root access point of the second access point group, but in reverse order. Before sending the merge reply to the root access point of the first access point group, the access point in the second access point group that received the merge request from the root access point of the first access point group will add the root access point of the first access point group to its CMAP.
-
FIGS. 9A-9C demonstrate the steps included in one embodiment of the merge operation.FIG. 10B shows the steps in the merge operation,FIG. 9A shows twoaccess point groups FIG. 9C shows theaccess point group 70 after the merge operation has been performed. Theaccess point group 70 inFIG. 9A includes theroot access point 74, anintermediate access point 76 and twoleaf access points access point group 70 defines apaging area 71 withpaging area boundary 72. Theaccess point group 80 includes theroot access point 84 and twoleaf access points access point group 80 defines apaging area 81 withpaging area boundary 82. As shown inFIG. 9B , whenaccess point 80 is to be merged withaccess group 70, theroot access point 84 ofaccess point group 80 sends a merge request to one of the access points 75 in theaccess point group 70 at time t1.Access point 75 forwards this merge request to accesspoint 76 at time t2 andaccess point 76 forwards the merge request on to theroot access point 74 ofaccess point group 70 at time t3. Theroot access point 74 then permitsaccess point group 80 to merge withaccess point group 70 by addingaccess point 84 to its CMAP and sending a merge reply back toaccess point 76 at time t4.Access point 76 then forwards the merge reply to accesspoint 75 at time t5.Access point 75 addsaccess point 80 to its CMAP and then forwards the merge reply to rootaccess point 84 at time t6.FIG. 9C showsaccess point group 70 after the forgoing use of the merge operation.Access point group 70 has an expandedpaging area 88 defined by an expandedpaging area boundary 89. - In order for a first access point to cut the access points that directly or indirectly depend from it, the first access point sends a prune inquiry request to its master. If the access point receiving the prune inquiry request is not the root access point of the access point group, the access point receiving the prune inquiry request forwards the prune inquiry request to its master. This step is repeated until the prune inquiry request reaches the root access point. The root access point then permits the first access point to prune its dependent access points by removing the dependent access points from the root access point's CMAP and sending a prune inquiry reply back to the first access point through the same access points that forwarded the prune inquiry request to the root access point (the “intermediate access points”), but in reverse order. The prune inquiry reply contains a CMAP which has a list of the dependent access points of the requester access point. The intermediate access points all remove the dependent access points from their CMAPs. The first access point then sends a prune request to each of its slave access points. The slave access points then send a prune reply back to the first access point. The first access point then removes the slave access points from its CMAP and each slave access point is removed from the access point group of the first access point. The removed slave access points may become the root access point of a new access point group if the slaves have slaves of their own, or they may stand alone.
-
FIGS. 6C , 10A and 10B demonstrate the steps included in an example of one embodiment of the prune operation.FIG. 10A shows the steps in the prune operation, whileFIG. 6C shows anaccess point group 50 before a prune operation is performed, andFIG. 10B shows theaccess point groups 50 and 96 after the prune operation has been performed. As shown inFIG. 10A , whenaccess point 54 is to pruneaccess points access point 54 sends a prune inquiry request to theroot access point 52 at time t1. Theroot access point 52 then permitsaccess point 54 to prune itsdependent access points dependent access points access point 54 at time t2. The prune inquiry reply contains a CMAP containingaccess point 54's dependent access points.Access point 54 removesaccess points points access point 54 at time t4.FIG. 10B showsaccess point group 50 andaccess points Access point group 50 has a reducedpaging area 92 defined by a reducedpaging area boundary 94. Access points 53, 55 and 60, are free-standing access points which are not the member of any access point group. - When a root access point is to leave an access point group, the devolution operation is used. The devolution operation begins when the root access point sends a devolution request containing all the CMAPs and a delegation of the root role to its slaves. The slaves then send a devolution reply back to the root access point. The root access point removes all the slaves from its CMAP. Each of the slave access points then become the root access point for a new access point group. Each of the newly-formed root access points then sends a delegation request to each of its respective slaves. If any of the slaves is not a leaf access point, then that slave forwards the delegation request its slaves. This forwarding process continues until every leaf access point receives the delegation request. Each slave then sends back a delegation reply to its respective newly-formed root access point.
-
FIGS. 11A , 11B and 11C demonstrate the steps included in one embodiment of the devolution operation.FIG. 11A shows anaccess point group 500 before a devolution operation is performed,FIG. 11B shows the steps in the devolution operation, andFIG. 11C shows twoaccess points access point group 520 after the devolution operation has been performed. Access point group, as shown inFIG. 11A , includes aroot access point 504,intermediate access points leaf access points Access group 500 has apaging area 501 defined by apaging area boundary 502. As shown inFIG. 11B , whenroot access point 504 is to leaveaccess point group 500,access point 504 sends a devolution request containing all the CMAPs to itsslave access points access point 504 at time t2. Rootaccess point 504 then removes thedependent access points Access point 506 then sends a delegation request to itsslave access points access point 504 at time t4.FIG. 11C shows a newaccess point group 520 andaccess point access point group 520 has apaging area 522 defined by apaging area boundary 524. - Once access point groups have been formed, they must have some way of communicating their identity to any computing device that is within the paging area that they define so that the computing devices can be located. The step of communicating access point group information to computing devices generally includes the steps of (a) including the access point group's paging area ID in the beacon of each access point in the access point group; (b) assigning a channel over which to broadcast the beacon; (c) awakening the computing device to periodically detect the beacon; and (d) synchronizing the timing of the beacon broadcasts of all the access points within an access point group. Although the following examples will discuss these methods with regard to a single computing device for clarity, the methods may also be applied when a plurality of computing devices are present.
- The step of including an access point group's unique paging area ID in the beacon of each access point enables one paging group (or paging area) to be distinguished from another. So that a computing device can determine in which paging area it is located, each paging group is assigned a unique paging area ID and communicates this paging area ID to any computing devices within its respective paging area. This may be accomplished using the beacon packet (hereinafter “beacon”) in the IEEE 802.11 protocol.
- Beacons provide a mechanism for access points in an access group to communicate with each other. The beacon is a signal that is periodically broadcast by each of the access points and can contain a variety of information. Each packet of information in the beacon is called an “element.” The beacon included in the IEEE 802.11 protocol contains the
elements 110 shown inFIG. 12A . The elements are identified by an element name and an element ID. Element IDs 32-255 are reserved and therefore available for use.FIG. 12B shows theenhanced elements 110 which contain apaging area ID 112 at one of the formerly-reserved elements,element ID 32. The otherreserved elements 114 remain available for use. -
FIG. 12C shows the format of thepaging area ID 120. This format includes a one octet space for the element ID, a one octet space for the length of thepaging area ID 124, and an eight octet space for the paging area ID itself 128. The paging area ID can include one or both of EUI 48 and EUI 64 (the MAC address). Alternatively, the paging area ID can include any other indicator so long as that indicator is unique to each paging area. Additionally, the size of the space used for the paging area ID (an eight octet space as shown inFIG. 12C ) can be varied to accommodate paging area IDs of different lengths. Furthermore, the paging area ID can be included in any of the other packets broadcast by the access points. By including the paging area ID as an element in the beacon of the IEEE 802.11 protocol or other broadcast packet, the paging area ID will be periodically broadcasted by each access point in an access point group every time the beacon or other packet is broadcast throughout the range of each access point, respectively. - In assigning a channel over which to broadcast the beacon or other packet containing the access point ID, there are several issues to consider. It is advantageous for adjacent access points to broadcast the beacon over different channels because this helps avoid interference. It is also advantageous for the access points to broadcast the beacon or other packet over a different channel than that used to broadcast the IP traffic because this helps to avoid interference between the IP traffic and the beacon or other packet. Although the IEEE 802.11 protocol's physical layer defines multiple channels, the more channels that are used the more channels a computing device must search every time a computing device moves from the range of one access point into the range of another. Clearly there is a conflict in the requirements of channel separation and minimizing the number of channels. Therefore, several methods of assigning the channel which will be used to broadcast the beacon are provided so that the assignment can be optimized for a given situation.
- Methods of channel assignment include: (1) static assignment; (2) standard common paging channel assignment; and (3) local common paging channel assignment method. In the static assignment method, all the access points in the WLAN are assigned the same common channel over which the IP traffic and the beacon or other packet containing the paging area ID will be broadcast.
- In the standard common paging channel assignment method, a single paging channel is assigned to all the access points in the WLAN. The access points are assigned a common channel over which to broadcast the beacon or other packet containing the paging area ID (the “beacon channel”) and different common channel over which to broadcast the IP traffic (the “IP channel”). This method can reduce the need for a computing device to search for the beacon channel and can eliminate the risk of interference between the beacon channel and the IP channel. However, there is still a risk of interference among the broadcasts of adjacent access points. Although this method can eliminate the need for a computing device to search for the beacon broadcast, there is a risk of interference between the beacon or other packet and the IP traffic. Additionally, there is a risk of interference among the broadcasts of adjacent access points.
- The local common paging channel helps to reduce the risk of interference among the broadcasts of adjacent access points. In the local common paging channel assignment method, all the access points in the same access point group are assigned the same paging channel. However, no adjacent access paging groups are assigned the same paging channel. The IP channel is a channel which is different from any of the paging channels. Generally, the paging channel for each access point group is assigned by that access point group's root access point. Additionally, each slave access point uses the same paging channel as its master and none of the slave access points uses the paging channel as its IP channel. In this approach, the computing device need only search for the paging channel when it crosses a paging area boundary because all the access points in the access point group have the same paging area ID. Additionally, assigning different beacon channels to adjacent access point groups helps to reduce the risk of interference among the beacon channels of these groups.
- No matter the method of channel assignment used, in order for a computing device to detect a beacon or other packet, it must be awakened from dormant mode. Once awakened into active mode, the computing device will search for the paging channel if the local common paging channel assignment method was used for the beacon or other packet. Generally, the computing device itself is programmed to periodically awaken at set intervals and remain in active mode for a predetermined time period (the “beacon window”). However, the set intervals and beacon window need to generally correspond with the timing of the beacon broadcast (the “beacon timing”) of the access points.
- Synchronizing the beacon timing of all the access points within an access point group not only allows the computing device to awaken from dormant mode only periodically, it enhances the battery life of the computing device. Access points need to continuously and periodically broadcast their paging area ID so that the access points can be recognized by a computing device when the computing device crosses a paging area boundary. As noted above, the computing device must periodically awaken from dormant mode to detect the beacon or other packet containing the paging area ID. However, frequent awakening causes heavy battery consumption. To save battery consumption, the number of awakenings needs to be reduced. If the access points in the same access point group all broadcast their beacons or other packets at the same time, the computing device only needs to awaken during the period of time during which the beacon is broadcast, even if the computing device has crossed from within the range of one access point into that of another.
- If all the access points in an access point group are in the same subnet of the WLAN, the access points can adjust their beacon timings to coincide with the beacon timings of the other access points using the local subnet broadcast which can be realized by IAPP. However, if some of the access points in an access point group reside in different subnets, transition delays and router queuing delays make the local subnet broadcast an imprecise mechanism for synchronizing the beacon timings. Therefore, if all the access points in an access point group are not in the same subnet, synchronizing the beacon timing of all the access points cannot be accomplished using the distribution system. Instead synchronization is achieved by using the computing device's timing reports. The computing device's timing reports contain at least a beacon timing difference.
- The method used for synchronizing the beacon timings of all the access points in an access point group is shown in
FIGS. 13A and 13B . Initially, as shown inFIG. 13A , when a computing device enters a paging area (“the first paging area”), the computing device registers with the access point of which it is in range (the “first access point”) 202. The computing device then listens for an initial beacon from thefirst access point 204. As it listens, the computing device determines whether it senses theinitial beacon 204. If the computing device does not sense the initial beacon, it continues to listen 204 until it determines that it has sensed theinitial beacon 206. The initial beacon (as do all beacons) contains the beacon timing for the access point group of which the first access point is a member. The beacon timing lets the computing device know when to anticipate the next beacon. Upon sensing the initial beacon, the computing device sets its set intervals to the group beacon timing 208 and then goes intodormant mode 210. The computing device will now anticipate beacons according to the group beacon timing. - While in dormant mode, the computing device may remain stationary, move within the range of the first access point, move into the range of another access point within the first paging area (the “second access point”) or move into a
second paging area 212. If the computing device remains stationary, moves within the range of the first access point or moves into the range of a second access point, it will awaken at its set interval (now set to the group beacon timing) 214 and listen for anew beacon 216. The new beacon will either be the first access point's beacon, or it will be the second access point's beacon if the computing device has moved into the range of the second access point. The computing device then determines whether it senses a new beacon during thebeacon window 218. If it determines that it has sensed a beacon during the beacon window, the timing of the new beacon and the set interval of the computing device are already synchronized. Therefore, the computing device returns todormant mode 210 and steps 210-218 are repeated until the computing device determines that it does not sense a new beacon during itsbeacon window 218. - If the computing device determines that it has not sensed a new beacon during its
beacon window 218, the set intervals and the timing of the new beacon are not synchronized. Therefore, the computing device remains in active mode until it determines that it does sense a new beacon from which it calculates abeacon timing difference 220. The beacon timing difference is the difference in time between the beginning of the beacon window during which a new beacon was anticipated by the computing device and the time when the new beacon is actually sensed by the computing device. If the new beacon did not come from thesecond access point 221, it came from the first access point. This means that the computing device has stayed within range of the first access point and the set interval of the computing device is not synchronized with the beacon timing of the first access point. Therefore, the computing device sends a beacon timing report containing at least the beacon timing difference to thefirst access point 250. The computing device then sets its timer to the beacon timing of thefirst access point 252 and the computing device returns todormant mode 210 and the process continues fromstep 210. - If the new beacon is from the
second access point 221, this means that the computing device has moved into the range of the second access point. The computing device sends the beacon timing report including at least the beacon timing difference and an identification of the first access point to thesecond access point 222. Then it is determined if the second access point is the master of thefirst access point 226. The second access point makes this determination from the identification of the first access point in the beacon timing report. If the second access point is the master of the first access point, the beacon timing of the first access point is set to that of thesecond access point 228. The set intervals of the computing device are also set to the beacon timing of thesecond access point 230. If, however, the second access point is not the master of thefirst access point 226, it must be determined whether the first access point is the master of thesecond access point 232. If the first access point is the master of the second access point, the beacon timing of the second access point is set to that of thefirst access point 234. Then the set intervals of the computing device are set to the beacon timing of thefirst access point 238. In contrast, if the first access point is not the master of the second access point, the beacon timings of the first and second access points are set to that of theircommon master 236. The set interval of the computing device is then also set to the beacon timing of thecommon master 237. After the set interval of the computing device is set in any ofsteps - An example of the signaling activity involved in beacon synchronization is shown in
FIG. 14 . In this example, a computing device moves from within the rage of a first access point to within the range of a second access point at a time t8 wherein the beacon timings of the two access points are not synchronized. Additionally, both access points are located in the same access point group and the first access point is the master of the second access point. The signal for thecomputing device 360 is indicated as “low” when the computing device is in dormant mode and is indicated as “high” when the computing device is in active mode. The signals of thefirst access point 320 and thesecond access point 322 are divided into a plurality of segments. Eachsegment first time period 324 and moves within the range of the second access point at a time t8 and remains there during asecond time period 326. Although the second access point is broadcasting itsbeacon first time period 324, the computing device does not sense thesebeacons first time period 324. Subsequently, the computing device moves into the range of the second access point at time t8, is within the range of the second access point during asecond time period 326 and remains there during asecond time period 326. Although the first access point is broadcasting itsbeacon second time period 326, the computing device does not sense thesebeacons second time period 326. - Initially when the computing device is within the range of the first access point during the
first time period 324, the computing device's signal is “high” at time t1. The first access point broadcasts itsbeacon 328 between time t2 and t3. After the first access point'sbeacon 328 has been broadcast, the computing device returns to dormant mode at time t4 (the signal of the computing device becomes “low”). Because the first access point'sbeacon 328 contains the beacon timing, the computing device knows when to anticipate the first access point's next beacon. Therefore, at time t5, a short time before the first access point'sbeacon 330 is anticipated, the computing device's signal goes “high” and remain “high” until the first access point has completed broadcasting the first access point'sbeacon 332. - At time t8, the beginning of the
second time period 326, the computing device moves from within the range of the first access point to within the range of the second access point. However, just prior to its move at time t7, the computing device had anticipated thenext beacon 332 from the first access point. If the beacon timings of the first and second access points were synchronized, the computing device should sense the second access points beacon shortly after time t7. Because the beacon timings of the first and second access points are not synchronized, the computing device does not sense the second access point's beacon at time t8 but instead at time t9. Therefore, the signal of the computing device must remain “high” until time t10 when the second access point has completed the broadcast of itsbeacon 350. - In order to synchronize the beacon timings of the first access point and the second access point, the computing device calculates the
beacon timing difference 362. In this case, thebeacon timing difference 362 is the difference between time t10 (when the broadcast of the second access point'sbeacon 350 is complete) and time t7 (shortly before the broadcast of the first access point'sbeacon 332 was anticipated). The computing device then sends the beacon timing difference to the second access point. The second access point identifies the first access point using IAPP and the Service Location Protocol (“SLP”). Because the first access point is the master of the second access point, the second access point must adjust its beacon timing to that of the first access point. - Because at this point the last beacon sensed by the computing device is the second access point's
beacon 350 andbeacon 350 contains the unsynchronized beacon timing of the second access point, the signal of the computing device will go “high” at time t11 just before the computing device anticipates the next beacon at time t12. Therefore, before adjusting its beacon timing to that of the first access point, the second access point broadcasts onemore beacon 352 according to its original beacon timing at t12. However,beacon 352 contains a beacon timing adjusted to that of the first access point. The computing device's signal will go “low” at time t13 after the broadcast ofbeacon 352 is complete. The computing device's signal will go “high” again at t14 just before the second access point'snext beacon 354 is anticipated according to the adjusted beacon timing. - The step of locating a computing device includes associating the computing device whenever it crosses an access point boundary and whenever it is paged. Whenever a computing device crosses an access point boundary, it must associate with a new access point group. In order to associate with a new access point group, the computing device will communicate with an access point in the access point group of which the computing device is in range (the “in-range access point”). More specifically, to associate with a new access point group, the computing device sends a request to associate to the in-range access point. The root access point of the new access point group, which may be the in-range access point, then assigns an association identification (“AID”) to the computing device and adds the AID and the associated MAC address of the computing device to its association table. The A/D will typically have a value of in the range of about 1 to about 2007 and is placed in the 14 least significant bits of the AID field with the two least significant bits of the AID filed each set to “1.” The root access point of the new access point group will then communicate the MAC address and AID of the computing device to the other access points in the new access point group. This communication occurs during association and thru the use of IAPP to broadcast the IAPP-ADD.request (which includes the MAC address and AID of the computing device) over the local subnet broadcast using IAPP to all the access points on the same subnet. This communicates the MAC address of the computing device to the access points on the same subnet as the root access point. For access points in the access point group that are not on the same subnet as the root access point, IAPP may also be used to communicate the MAC address of the computing device. Because the MAC address is used to identify the computing device instead of the IP address, the problems normally associated with a computing device moving from one subnet to the other are avoided.
- The AID will remain associated with the computing device and the MAC number of the computing device will remain in the association tables of the access points of the new access point group until the computing device explicitly or implicitly disassociates from the new access point group. To disassociate explicitly, the computing device invokes a disassociation service. To disassociate implicitly the computing device simply leaves the range of the new access point group without explicitly disassociating. The new access point group will discover that the computing device has left its range without explicitly disassociating when the new access point group does not receive a communication from the computing device within a predetermined time period. At this time, the computing device will be disassociated. When the computing device disassociates from the access point group, the AID is available to be reused and the computing device's MAC address is deleted from the association tables of the access points in the new access point group.
- In addition to associating with an access point group, the computing device must also associate with an access point when it is paged so that it can receive IP traffic. Once a computing device has associated with an access point group, that access point group may then receive IP traffic for that computing device through the root access point. When the root access point receives IP traffic for the computing device, the computing device must then be located within the access point group and, if in dormant mode, the computing device must be moved into active mode. Because the location of the computing device within the access point group is unknown, the root access point communicates to the other access points in the access point group that the communication device needs to be paged. All the access points in the access point group then page the communication device. After receiving the page, the communication device then sends a request to associate to whichever of the access points the computing device is in range. That access point then notifies the root access point of the presence of the computing device within its range and the root access point then forwards the IP traffic to that access point. That access point then forwards the IP traffic to the computing device. While the computing device is in active mode, if it moves into the range of a second access point in the same access point group, it will register with the second access point.
- Although the methods and apparatuses disclosed herein have been described in terms of specific embodiments and applications, persons skilled in the art can, in light of this disclosure, generate additional embodiments without exceeding the scope or departing from the spirit of the claimed inventions. For example, the methods and apparatuses disclosed herein can be implemented in any protocol that supports dormant mode and paging functionalities. Accordingly, it is to be understood that the drawings and descriptions in this disclosure are proffered to facilitate comprehension of the invention and should not be construed to limit the scope thereof.
Claims (2)
1. A WLAN, comprising:
a means for establishing paging areas; a means for communicating access group information to a computing device; and
a means for locating a computing device within the WLAN.
2. A method for implementing dormant mode with paging in a WLAN, comprising:
establishing paging areas;
communicating access group information to a computing device; and
locating a computing device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/133,273 US20080244069A1 (en) | 2002-01-28 | 2008-06-04 | Method and apparatus for dormant mode support with paging |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US35242302P | 2002-01-28 | 2002-01-28 | |
US10/264,807 US7689225B2 (en) | 2002-01-28 | 2002-10-04 | Method and apparatus for dormant mode support with paging |
US11/336,236 US7610053B2 (en) | 2002-01-28 | 2006-01-19 | Method and apparatus for dormant mode support with paging |
US12/133,273 US20080244069A1 (en) | 2002-01-28 | 2008-06-04 | Method and apparatus for dormant mode support with paging |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/336,236 Division US7610053B2 (en) | 2002-01-28 | 2006-01-19 | Method and apparatus for dormant mode support with paging |
Publications (1)
Publication Number | Publication Date |
---|---|
US20080244069A1 true US20080244069A1 (en) | 2008-10-02 |
Family
ID=27616446
Family Applications (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/264,807 Expired - Fee Related US7689225B2 (en) | 2002-01-28 | 2002-10-04 | Method and apparatus for dormant mode support with paging |
US11/336,236 Expired - Fee Related US7610053B2 (en) | 2002-01-28 | 2006-01-19 | Method and apparatus for dormant mode support with paging |
US11/807,025 Expired - Fee Related US8510442B2 (en) | 2002-01-28 | 2007-05-24 | Method and apparatus for dormant mode support with paging |
US11/861,083 Expired - Fee Related US7920879B2 (en) | 2002-01-28 | 2007-09-25 | Method and apparatus for dormant mode support with paging |
US12/133,273 Abandoned US20080244069A1 (en) | 2002-01-28 | 2008-06-04 | Method and apparatus for dormant mode support with paging |
US12/133,265 Expired - Fee Related US7769397B2 (en) | 2002-01-28 | 2008-06-04 | Method and apparatus for dormant mode support with paging |
Family Applications Before (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/264,807 Expired - Fee Related US7689225B2 (en) | 2002-01-28 | 2002-10-04 | Method and apparatus for dormant mode support with paging |
US11/336,236 Expired - Fee Related US7610053B2 (en) | 2002-01-28 | 2006-01-19 | Method and apparatus for dormant mode support with paging |
US11/807,025 Expired - Fee Related US8510442B2 (en) | 2002-01-28 | 2007-05-24 | Method and apparatus for dormant mode support with paging |
US11/861,083 Expired - Fee Related US7920879B2 (en) | 2002-01-28 | 2007-09-25 | Method and apparatus for dormant mode support with paging |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/133,265 Expired - Fee Related US7769397B2 (en) | 2002-01-28 | 2008-06-04 | Method and apparatus for dormant mode support with paging |
Country Status (5)
Country | Link |
---|---|
US (6) | US7689225B2 (en) |
EP (1) | EP1470495A4 (en) |
JP (1) | JP4099149B2 (en) |
CN (1) | CN1602477B (en) |
WO (1) | WO2003065237A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080188247A1 (en) * | 2007-02-02 | 2008-08-07 | Ipwireless, Inc. | Hierarchical organization of paging groups |
US20130142183A1 (en) * | 2011-12-06 | 2013-06-06 | At&T Intellectual Property I, Lp | Cluster-based derivation of antenna tilts in a wireless network |
US9544811B2 (en) | 2012-11-19 | 2017-01-10 | Qualcomm Incorporated | Systems and methods for beacon timing adjustment in wireless networks |
Families Citing this family (116)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AUPR292301A0 (en) * | 2001-02-06 | 2001-03-01 | Silverbrook Research Pty. Ltd. | A method and apparatus (ART99) |
US7937096B2 (en) * | 2001-10-03 | 2011-05-03 | Ntt Docomo, Inc. | Method and associated apparatus for distributed dynamic paging area clustering under heterogeneous access networks |
US7574223B2 (en) * | 2001-10-04 | 2009-08-11 | Ntt Docomo, Inc. | Method and associated apparatus for distributed dynamic paging area clustering under heterogeneous access networks |
US7689225B2 (en) * | 2002-01-28 | 2010-03-30 | Ntt Docomo, Inc. | Method and apparatus for dormant mode support with paging |
GB2388275B (en) * | 2002-04-30 | 2005-11-02 | Hewlett Packard Co | Wireless data network security |
JP3862073B2 (en) * | 2002-06-07 | 2006-12-27 | ソニー株式会社 | Wireless communication apparatus, wireless communication method, recording medium, and program |
US20040203787A1 (en) * | 2002-06-28 | 2004-10-14 | Siamak Naghian | System and method for reverse handover in mobile mesh Ad-Hoc networks |
CN100418323C (en) * | 2002-08-22 | 2008-09-10 | 松下电器产业株式会社 | Position management server and mobile communication system |
US7417971B2 (en) * | 2002-10-04 | 2008-08-26 | Ntt Docomo, Inc. | Method and apparatus for dormant mode support with paging |
US20040203828A1 (en) * | 2002-12-06 | 2004-10-14 | Vinod Mirchandani | Selective channel assignment in a wireless data communications network |
SE0301964D0 (en) * | 2003-07-03 | 2003-07-03 | Ericsson Telefon Ab L M | Wlan session control |
US7043256B2 (en) * | 2003-08-13 | 2006-05-09 | Alcatel | Apparatus, and an associated method, for paging a mobile station operable in a radio communication system |
US7231221B2 (en) * | 2003-09-12 | 2007-06-12 | Telefonaktiebolaget L M Ericsson (Publ) | Channel access methods and apparatus in low-power wireless communication systems |
US8010633B2 (en) * | 2003-10-20 | 2011-08-30 | Sony Computer Entertainment America Llc | Multiple peer-to-peer relay networks |
JP4396416B2 (en) | 2003-10-24 | 2010-01-13 | ソニー株式会社 | Wireless communication system, wireless communication apparatus, wireless communication method, and computer program |
JP4399284B2 (en) * | 2004-01-30 | 2010-01-13 | 京セラ株式会社 | Mobile communication system, mobile communication method, and mobile communication base station apparatus |
US7299009B2 (en) | 2004-02-25 | 2007-11-20 | Nokia Corporation | Blue-tooth assisted wireless local area network (WLAN) home network systems |
AU2005219898B2 (en) * | 2004-03-04 | 2008-07-24 | Samsung Electronics Co., Ltd. | System and method for controlling an operational mode of a mac layer in a broadband wireless access communication system |
US7969937B2 (en) | 2004-03-23 | 2011-06-28 | Aruba Networks, Inc. | System and method for centralized station management |
US9432848B2 (en) | 2004-03-23 | 2016-08-30 | Aruba Networks, Inc. | Band steering for multi-band wireless clients |
KR20050097674A (en) * | 2004-04-02 | 2005-10-10 | 삼성전자주식회사 | Internet connection service method of mobile node and system thereof |
US7388857B2 (en) * | 2004-04-12 | 2008-06-17 | Samsung Electronics Co., Ltd. | Method and system for synchronizing two end terminals using beacon synchronization with multiple channels in a wireless local area network |
WO2005109695A1 (en) * | 2004-05-07 | 2005-11-17 | Samsung Electronics Co., Ltd. | Method for receiving broadcast service using broadcast zone identifier in a mobile communication system |
US8099094B2 (en) | 2004-07-12 | 2012-01-17 | Interdigital Technology Corporation | Neighbor scanning in wireless local area networks |
EP1626537A1 (en) * | 2004-08-11 | 2006-02-15 | Iwatsu Electric Co., Ltd. | Wireless LAN network system and a method for connecting access points thereof |
US7440418B2 (en) * | 2004-09-10 | 2008-10-21 | Interdigital Technology Corporation | Accelerating discovery of access points in a wireless local area network |
DE102004052331A1 (en) * | 2004-10-27 | 2006-05-04 | Nec Europe Ltd. | Method for controlling communication with mobile stations in a network |
EP1657853A1 (en) * | 2004-11-12 | 2006-05-17 | STMicroelectronics (Research & Development) Limited | Roaming network stations using a MAC address identifier to select a new access point |
US7186149B2 (en) * | 2004-12-06 | 2007-03-06 | Commscope Solutions Properties, Llc | Communications connector for imparting enhanced crosstalk compensation between conductors |
KR100713145B1 (en) * | 2005-02-18 | 2007-05-02 | 삼성전자주식회사 | Method for forming power efficient network |
US8543138B2 (en) * | 2005-03-04 | 2013-09-24 | Qualcomm Incorporated | Multi-sector broadcast paging channel |
EP1856935A1 (en) * | 2005-03-09 | 2007-11-21 | Nokia Corporation | Base-station-controlled paging in mobile radio systems |
WO2006105060A1 (en) * | 2005-03-28 | 2006-10-05 | Mediacell Licensing Corp. | Synchronized beacon for network having multiple radios |
US8023495B1 (en) | 2005-04-08 | 2011-09-20 | Hewlett-Packard Company | Method and system for WLAN synchronization |
WO2006119452A1 (en) * | 2005-05-04 | 2006-11-09 | Sandwave Ip, Llc | Externally sourced synchronized beacon |
US7646355B2 (en) * | 2005-05-04 | 2010-01-12 | Sandwave Ip, Llc | Enclosure with ground plane |
US7440436B2 (en) * | 2005-05-13 | 2008-10-21 | Natural Lighting Systems, Inc. | Self-organizing multi-channel mesh network |
WO2007011632A1 (en) * | 2005-07-14 | 2007-01-25 | Sandwave Ip, Llc | Virtual cells for wireless networks |
DE102005038548B4 (en) * | 2005-08-12 | 2010-04-08 | Nec Europe Ltd. | Method for controlling communication with mobile stations in a network |
AU2006312041B2 (en) * | 2005-11-02 | 2010-04-08 | Interdigital Technology Corporation | Method and system for autonomous channel coordination for a wireless distribution system |
KR101009804B1 (en) | 2005-11-04 | 2011-01-19 | 재단법인서울대학교산학협력재단 | Power-saving method for mobile terminal in wireless local area network |
WO2007062004A2 (en) * | 2005-11-22 | 2007-05-31 | The Trustees Of Columbia University In The City Of New York | Methods, media, and devices for moving a connection from one point of access to another point of access |
CN1992660B (en) * | 2005-12-30 | 2010-05-05 | 技嘉科技股份有限公司 | Method for auto-establishing distributed network of multiple wireless connection points |
US8504678B2 (en) * | 2005-12-30 | 2013-08-06 | Sandwave Ip, Llc | Traffic routing based on geophysical location |
US20070167171A1 (en) * | 2005-12-30 | 2007-07-19 | Mediacell Licensing Corp | Determining the Location of a Device Having Two Communications Connections |
US20070167159A1 (en) * | 2006-01-17 | 2007-07-19 | Rajaram Ramesh | Broadcast-centric cellular communication system, method, and mobile station |
US7590418B1 (en) * | 2006-01-20 | 2009-09-15 | Cisco Technology, Inc. | Method and apparatus of a location server for hierarchical WLAN systems |
US8582498B2 (en) * | 2006-03-07 | 2013-11-12 | Sandwave Ip, Llc | Service subscription using geophysical location |
US7620370B2 (en) * | 2006-07-13 | 2009-11-17 | Designart Networks Ltd | Mobile broadband wireless access point network with wireless backhaul |
CN101114996A (en) * | 2006-07-27 | 2008-01-30 | 朗迅科技公司 | Method of generating a polling schedule for a wireless local area network |
US7496078B2 (en) * | 2006-08-15 | 2009-02-24 | Cisco Technology, Inc. | Route tree building in a wireless mesh network |
US8634342B2 (en) * | 2006-10-05 | 2014-01-21 | Cisco Technology, Inc. | Upgrading mesh access points in a wireless mesh network |
JP4940082B2 (en) * | 2007-09-28 | 2012-05-30 | 株式会社日立製作所 | Wireless LAN system |
US8264994B2 (en) * | 2008-02-29 | 2012-09-11 | Futurewei Technologies, Inc. | Method for supporting paging and deep sleep with multiple radio interfaces |
US8589541B2 (en) | 2009-01-28 | 2013-11-19 | Headwater Partners I Llc | Device-assisted services for protecting network capacity |
US8340634B2 (en) | 2009-01-28 | 2012-12-25 | Headwater Partners I, Llc | Enhanced roaming services and converged carrier networks with device assisted services and a proxy |
US20100188993A1 (en) | 2009-01-28 | 2010-07-29 | Gregory G. Raleigh | Network tools for analysis, design, testing, and production of services |
US8391834B2 (en) | 2009-01-28 | 2013-03-05 | Headwater Partners I Llc | Security techniques for device assisted services |
US8346225B2 (en) | 2009-01-28 | 2013-01-01 | Headwater Partners I, Llc | Quality of service for device assisted services |
US8832777B2 (en) | 2009-03-02 | 2014-09-09 | Headwater Partners I Llc | Adapting network policies based on device service processor configuration |
US8548428B2 (en) | 2009-01-28 | 2013-10-01 | Headwater Partners I Llc | Device group partitions and settlement platform |
US8402111B2 (en) | 2009-01-28 | 2013-03-19 | Headwater Partners I, Llc | Device assisted services install |
US8406748B2 (en) | 2009-01-28 | 2013-03-26 | Headwater Partners I Llc | Adaptive ambient services |
US8626115B2 (en) * | 2009-01-28 | 2014-01-07 | Headwater Partners I Llc | Wireless network service interfaces |
US8275830B2 (en) | 2009-01-28 | 2012-09-25 | Headwater Partners I Llc | Device assisted CDR creation, aggregation, mediation and billing |
US20100080197A1 (en) * | 2008-09-29 | 2010-04-01 | Nortel Networks Limited | Method and system for gigabit wireless transmission |
US10484858B2 (en) | 2009-01-28 | 2019-11-19 | Headwater Research Llc | Enhanced roaming services and converged carrier networks with device assisted services and a proxy |
US11218854B2 (en) | 2009-01-28 | 2022-01-04 | Headwater Research Llc | Service plan design, user interfaces, application programming interfaces, and device management |
US10798252B2 (en) | 2009-01-28 | 2020-10-06 | Headwater Research Llc | System and method for providing user notifications |
US9980146B2 (en) | 2009-01-28 | 2018-05-22 | Headwater Research Llc | Communications device with secure data path processing agents |
US10237757B2 (en) | 2009-01-28 | 2019-03-19 | Headwater Research Llc | System and method for wireless network offloading |
US9572019B2 (en) | 2009-01-28 | 2017-02-14 | Headwater Partners LLC | Service selection set published to device agent with on-device service selection |
US9955332B2 (en) | 2009-01-28 | 2018-04-24 | Headwater Research Llc | Method for child wireless device activation to subscriber account of a master wireless device |
US10783581B2 (en) | 2009-01-28 | 2020-09-22 | Headwater Research Llc | Wireless end-user device providing ambient or sponsored services |
US10064055B2 (en) | 2009-01-28 | 2018-08-28 | Headwater Research Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
US11973804B2 (en) | 2009-01-28 | 2024-04-30 | Headwater Research Llc | Network service plan design |
US10715342B2 (en) | 2009-01-28 | 2020-07-14 | Headwater Research Llc | Managing service user discovery and service launch object placement on a device |
US10057775B2 (en) | 2009-01-28 | 2018-08-21 | Headwater Research Llc | Virtualized policy and charging system |
US9270559B2 (en) | 2009-01-28 | 2016-02-23 | Headwater Partners I Llc | Service policy implementation for an end-user device having a control application or a proxy agent for routing an application traffic flow |
US9954975B2 (en) | 2009-01-28 | 2018-04-24 | Headwater Research Llc | Enhanced curfew and protection associated with a device group |
US9392462B2 (en) | 2009-01-28 | 2016-07-12 | Headwater Partners I Llc | Mobile end-user device with agent limiting wireless data communication for specified background applications based on a stored policy |
US9565707B2 (en) | 2009-01-28 | 2017-02-07 | Headwater Partners I Llc | Wireless end-user device with wireless data attribution to multiple personas |
US10326800B2 (en) | 2009-01-28 | 2019-06-18 | Headwater Research Llc | Wireless network service interfaces |
US9706061B2 (en) | 2009-01-28 | 2017-07-11 | Headwater Partners I Llc | Service design center for device assisted services |
US10779177B2 (en) | 2009-01-28 | 2020-09-15 | Headwater Research Llc | Device group partitions and settlement platform |
US11985155B2 (en) | 2009-01-28 | 2024-05-14 | Headwater Research Llc | Communications device with secure data path processing agents |
US10841839B2 (en) | 2009-01-28 | 2020-11-17 | Headwater Research Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
US10200541B2 (en) | 2009-01-28 | 2019-02-05 | Headwater Research Llc | Wireless end-user device with divided user space/kernel space traffic policy system |
US10492102B2 (en) | 2009-01-28 | 2019-11-26 | Headwater Research Llc | Intermediate networking devices |
US10248996B2 (en) | 2009-01-28 | 2019-04-02 | Headwater Research Llc | Method for operating a wireless end-user device mobile payment agent |
US10264138B2 (en) | 2009-01-28 | 2019-04-16 | Headwater Research Llc | Mobile device and service management |
EP2396990B1 (en) * | 2009-02-10 | 2019-03-27 | Nokia Technologies Oy | Method, apparatus and computer program product for source identification for single radio voice call continuity |
DE102009041821A1 (en) * | 2009-09-18 | 2011-03-24 | Phoenix Contact Gmbh & Co. Kg | network |
US8644821B2 (en) * | 2009-10-28 | 2014-02-04 | Taiwan Gomet Technology Co., Ltd. | Method of beacon synchronization for base stations |
US8437782B2 (en) | 2009-10-30 | 2013-05-07 | Telefonaktiebolaget L M Ericsson (Publ) | Method for contacting a group of terminals within a communication network, arrangement and terminal within a communication network |
US8934420B2 (en) * | 2010-10-12 | 2015-01-13 | Cisco Technology, Inc. | Multiple wired client support on a wireless workgroup bridge |
US8532004B2 (en) * | 2011-01-10 | 2013-09-10 | Lenovo (Singapore) Pte. Ltd. | Power management on portable devices |
JP5601211B2 (en) | 2011-01-14 | 2014-10-08 | 富士通株式会社 | Wireless communication system, wireless access station, and communication method |
US9191977B2 (en) | 2011-10-28 | 2015-11-17 | Qualcomm Incorporated | Systems and methods for fast initial network link setup |
US9271317B2 (en) | 2011-10-28 | 2016-02-23 | Qualcomm Incorporated | Systems and methods for fast initial network link setup |
US9814085B2 (en) | 2011-10-28 | 2017-11-07 | Qualcomm, Incorporated | Systems and methods for fast initial network link setup |
US9338732B2 (en) | 2011-10-28 | 2016-05-10 | Qualcomm Incorporated | Systems and methods for fast initial network link setup |
US9445438B2 (en) | 2011-10-28 | 2016-09-13 | Qualcomm Incorporated | Systems and methods for fast initial network link setup |
US9402243B2 (en) | 2011-10-28 | 2016-07-26 | Qualcomm Incorporated | Systems and methods for fast initial network link setup |
US8873494B2 (en) | 2011-10-28 | 2014-10-28 | Qualcomm Incorporated | Systems and methods for fast initial network link setup |
US9295030B2 (en) | 2011-12-02 | 2016-03-22 | Qualcomm Incorporated | Methods and apparatuses for improved paging area identifier selection in wireless networks containing low power base stations |
US8923180B2 (en) * | 2013-01-23 | 2014-12-30 | Conversant Intellectual Property Management Incorporated | Power saving in wireless network entities |
WO2014159862A1 (en) | 2013-03-14 | 2014-10-02 | Headwater Partners I Llc | Automated credential porting for mobile devices |
US9277528B1 (en) * | 2013-08-12 | 2016-03-01 | Sprint Spectrum L.P. | Configuration of tracking area layers |
JP6212443B2 (en) * | 2014-07-07 | 2017-10-11 | 日本電信電話株式会社 | Wireless communication system and wireless communication method |
BE1023514B1 (en) * | 2015-10-05 | 2017-04-12 | Henri Crohas | Method and device for wireless communication |
CN107666683B (en) * | 2016-07-29 | 2019-08-30 | 电信科学技术研究院 | A kind of method, terminal and the base station of wireless system district management |
US10701707B2 (en) * | 2017-03-28 | 2020-06-30 | Arris Enterprises Llc | Allocation of wireless channels for preferred stations |
CN109544893B (en) * | 2019-01-09 | 2023-09-22 | 福州大学 | Low-noise real-time wireless data acquisition system suitable for civil structure monitoring |
CN113518339B (en) * | 2020-04-10 | 2022-10-18 | 华为技术有限公司 | Terminal roaming method and device and computer readable storage medium |
CN114980283A (en) * | 2021-02-22 | 2022-08-30 | 维沃移动通信有限公司 | State switching method and device, and beacon signal transmission and device |
Citations (53)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4679244A (en) * | 1984-02-29 | 1987-07-07 | Nippon Telegraph & Telephone Public Corporation | Method of transmitting terminating call signals within a restricted duration and a base station and a portable unit for use in the same |
US5077834A (en) * | 1989-03-28 | 1991-12-31 | Telefind Corporation | Paging receiver with continuously tunable antenna and RF amplifier |
US5109530A (en) * | 1990-10-24 | 1992-04-28 | Motorola, Inc. | Receiver with battery saver |
US5237603A (en) * | 1989-12-11 | 1993-08-17 | Sony Corporation | Cordless telephone which intermittently monitors predetermined channels from all available channels |
US5241568A (en) * | 1991-12-02 | 1993-08-31 | Motorola, Inc. | Method and apparatus for synchronizing a receiver to a transmitted signal while conserving power |
US5613204A (en) * | 1994-12-22 | 1997-03-18 | Bell Atlantic Mobile Systems, Inc. | Beacon system for roaming cellular stations |
US5734984A (en) * | 1993-11-30 | 1998-03-31 | Northern Telecom Limited | Telephone system for mobile wireless telephone services |
US5778075A (en) * | 1996-08-30 | 1998-07-07 | Telefonaktiebolaget, L.M. Ericsson | Methods and systems for mobile terminal assisted handover in an private radio communications network |
US5835860A (en) * | 1995-04-04 | 1998-11-10 | Ericsson Inc. | Operation and administration of mobile station user groups in wireless communications systems |
US5940771A (en) * | 1991-05-13 | 1999-08-17 | Norand Corporation | Network supporting roaming, sleeping terminals |
US5945948A (en) * | 1996-09-03 | 1999-08-31 | Motorola, Inc. | Method and apparatus for location finding in a communication system |
US5970062A (en) * | 1996-04-23 | 1999-10-19 | Armonk Business Machines Corporation | Method and apparatus for providing wireless access to an ATM network |
US6065058A (en) * | 1997-05-09 | 2000-05-16 | International Business Machines Corp. | Dynamic push filtering based on information exchanged among nodes in a proxy hierarchy |
US6085193A (en) * | 1997-09-29 | 2000-07-04 | International Business Machines Corporation | Method and system for dynamically prefetching information via a server hierarchy |
US6088591A (en) * | 1996-06-28 | 2000-07-11 | Aironet Wireless Communications, Inc. | Cellular system hand-off protocol |
US6195046B1 (en) * | 1996-06-06 | 2001-02-27 | Klein S. Gilhousen | Base station with slave antenna for determining the position of a mobile subscriber in a CDMA cellular telephone system |
US6201803B1 (en) * | 1995-05-02 | 2001-03-13 | British Telecommunications Public Limited Company | Cellular radio location system |
US6246875B1 (en) * | 1995-12-04 | 2001-06-12 | Bell Atlantic Network Services, Inc. | Use of cellular digital packet data (CDPD) communications to convey system identification list data to roaming cellular subscriber stations |
US20010004594A1 (en) * | 1999-12-14 | 2001-06-21 | Nec Corporation | Power management system for use with wireless LAN terminal unit |
US6259898B1 (en) * | 1998-05-05 | 2001-07-10 | Telxon Corporation | Multi-communication access point |
US20010024953A1 (en) * | 2000-02-24 | 2001-09-27 | Peter Balogh | Method and equipment for supporting mobility in a telecommunication system |
US20010032262A1 (en) * | 2000-02-10 | 2001-10-18 | Jim Sundqvist | Method and apparatus for network service reservations over wireless access networks |
US20010049282A1 (en) * | 1998-05-08 | 2001-12-06 | Kazumasa Ushiki | Mobile communication system |
US6345043B1 (en) * | 1998-07-06 | 2002-02-05 | National Datacomm Corporation | Access scheme for a wireless LAN station to connect an access point |
US20020023164A1 (en) * | 2000-01-28 | 2002-02-21 | Lahr Nils B. | Method and apparatus for client-side authentication and stream selection in a content distribution system |
US6351468B1 (en) * | 1998-07-02 | 2002-02-26 | Gte Service Corporation | Communications protocol in a wireless personal area network |
US20020026492A1 (en) * | 2000-08-22 | 2002-02-28 | Shigeru Fujita | Communications equipment that carries out communication within network having plural pieces of communications equipment |
US20020085719A1 (en) * | 2000-07-24 | 2002-07-04 | Bluesocket, Inc. | Method and system for enabling centralized control of wireless local area networks |
US6421716B1 (en) * | 1998-09-30 | 2002-07-16 | Xerox Corporation | System for generating context-sensitive hierarchically ordered document service menus |
US20020152288A1 (en) * | 2000-11-06 | 2002-10-17 | Rajesh Hora | System and method for providing automated database assistance to financial service operators |
US6522670B1 (en) * | 1997-06-18 | 2003-02-18 | Nokia Mobile Phones Limited | Method for identifying base stations of a time division cellular network in a mobile station and mobile station |
US20030073434A1 (en) * | 2001-09-05 | 2003-04-17 | Shostak Robert E. | Voice-controlled wireless communications system and method |
US20030118623A1 (en) * | 2001-12-20 | 2003-06-26 | Gianfranco De Paoli Ambrosi | Composition based on etyl ester of linoleic acid and triethyl ester of citric acid for topical use in the treatment of seborrhea and acne |
US20030134642A1 (en) * | 2001-11-19 | 2003-07-17 | At&T Corp. | WLAN having load balancing by access point admission/termination |
US6594931B1 (en) * | 1999-08-19 | 2003-07-22 | Jeffrey C. Barton | Fluorescent illuminated sign assembly |
US20030145092A1 (en) * | 2002-01-28 | 2003-07-31 | Docomo Communications Laboratories Us, Inc. | Method and apparatus for dormant mode support with paging |
US6650630B1 (en) * | 1999-06-25 | 2003-11-18 | Telefonaktiebolaget Lm Ericsson (Publ) | Resource management and traffic control in time-division-duplex communication systems |
US6659947B1 (en) * | 2000-07-13 | 2003-12-09 | Ge Medical Systems Information Technologies, Inc. | Wireless LAN architecture for integrated time-critical and non-time-critical services within medical facilities |
US6717926B1 (en) * | 1999-09-13 | 2004-04-06 | Nokia Corporation | Apparatus and associated method, by which to transmit beacon signals in a radio communication system |
US6788668B1 (en) * | 2000-02-29 | 2004-09-07 | National Semiconductor Corporation | Low power long code synchronization scheme for sleep mode operation of CDMA systems |
US6868272B1 (en) * | 1999-06-08 | 2005-03-15 | Utstarcom, Inc. | Method and apparatus for roaming in hierarchical mobile communications network |
US6914906B1 (en) * | 1998-07-01 | 2005-07-05 | Motorola, Inc. | Method for RF network virtual end nodes |
US6921071B2 (en) * | 2003-10-16 | 2005-07-26 | Muncie Novelty Company, Inc. | Multi-play jar tickets |
US6968219B2 (en) * | 2001-08-15 | 2005-11-22 | Qualcomm, Incorporated | Method for reducing power consumption in bluetooth and CDMA modes of operation |
US6975613B1 (en) * | 1999-12-06 | 2005-12-13 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for scheduling communication sessions in an ad-hoc network |
US6980660B1 (en) * | 1999-05-21 | 2005-12-27 | International Business Machines Corporation | Method and apparatus for efficiently initializing mobile wireless devices |
US6985750B1 (en) * | 1999-04-27 | 2006-01-10 | Bj Services Company | Wireless network system |
US7003297B2 (en) * | 1999-04-06 | 2006-02-21 | Telefonaktiebolaget Lm Ericsson (Publ) | Partial support of mobility between radio access networks |
US7039027B2 (en) * | 2000-12-28 | 2006-05-02 | Symbol Technologies, Inc. | Automatic and seamless vertical roaming between wireless local area network (WLAN) and wireless wide area network (WWAN) while maintaining an active voice or streaming data connection: systems, methods and program products |
US7106326B2 (en) * | 2003-03-03 | 2006-09-12 | Sun Microsystems, Inc. | System and method for computing filtered shadow estimates using reduced bandwidth |
US7313628B2 (en) * | 2001-06-28 | 2007-12-25 | Nokia, Inc. | Protocol to determine optimal target access routers for seamless IP-level handover |
US20080170679A1 (en) * | 2001-07-17 | 2008-07-17 | Networks In Motion, Inc. | System and method for providing routing, mapping, and relative position information to users of a communication network |
US7417971B2 (en) * | 2002-10-04 | 2008-08-26 | Ntt Docomo, Inc. | Method and apparatus for dormant mode support with paging |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2985773B2 (en) * | 1996-06-10 | 1999-12-06 | 日本電気株式会社 | Synchronizer between wireless base stations |
JPH10271553A (en) | 1997-03-25 | 1998-10-09 | Pioneer Electron Corp | Radio telephone system |
FI980584A0 (en) | 1998-03-17 | 1998-03-17 | Nokia Telecommunications Oy | Cellular phytochemical and cellular radio systems |
US6519248B1 (en) * | 1998-07-24 | 2003-02-11 | Telefonaktiebolaget Lm Ericsson (Publ) | Packet data network having distributed database |
US6594493B1 (en) * | 2000-02-09 | 2003-07-15 | Lucent Technologies Inc. | Paging arrangement for wireless communications |
DK1273111T3 (en) | 2000-04-07 | 2006-07-10 | Interdigital Tech Corp | Base station synchronization for wireless communication systems |
US20020026592A1 (en) * | 2000-06-16 | 2002-02-28 | Vdg, Inc. | Method for automatic permission management in role-based access control systems |
US6940869B1 (en) * | 2000-06-22 | 2005-09-06 | Nokia Corporation | Apparatus, and associated method, for integrating operation of packet radio communication systems |
US6831896B1 (en) * | 2000-07-11 | 2004-12-14 | Nokia Corporation | Short range RF network |
US6920171B2 (en) * | 2000-12-14 | 2005-07-19 | Motorola, Inc. | Multiple access frequency hopping network with interference anticipation |
US7308263B2 (en) * | 2001-02-26 | 2007-12-11 | Kineto Wireless, Inc. | Apparatus for supporting the handover of a telecommunication session between a licensed wireless system and an unlicensed wireless system |
US20030018623A1 (en) * | 2001-07-18 | 2003-01-23 | International Business Machines Corporation | System and method of query processing of time variant objects |
US7283496B2 (en) * | 2001-10-17 | 2007-10-16 | Alcatel Lucent | Network paging system and method |
US20030087645A1 (en) * | 2001-11-08 | 2003-05-08 | Kim Byoung-Jo J. | Frequency assignment for multi-cell IEEE 802.11 wireless networks |
US7630333B2 (en) * | 2001-12-05 | 2009-12-08 | Thomson Licensing | Method and apparatus for paging a mobile terminal in a wireless LAN |
US7016326B2 (en) * | 2001-12-07 | 2006-03-21 | Qualcomm Incorporated | Method and apparatus for effecting handoff between different cellular communications systems |
-
2002
- 2002-10-04 US US10/264,807 patent/US7689225B2/en not_active Expired - Fee Related
-
2003
- 2003-01-24 CN CN038012510A patent/CN1602477B/en not_active Expired - Fee Related
- 2003-01-24 JP JP2003564759A patent/JP4099149B2/en not_active Expired - Fee Related
- 2003-01-24 EP EP03707529A patent/EP1470495A4/en not_active Withdrawn
- 2003-01-24 WO PCT/US2003/002203 patent/WO2003065237A1/en active Application Filing
-
2006
- 2006-01-19 US US11/336,236 patent/US7610053B2/en not_active Expired - Fee Related
-
2007
- 2007-05-24 US US11/807,025 patent/US8510442B2/en not_active Expired - Fee Related
- 2007-09-25 US US11/861,083 patent/US7920879B2/en not_active Expired - Fee Related
-
2008
- 2008-06-04 US US12/133,273 patent/US20080244069A1/en not_active Abandoned
- 2008-06-04 US US12/133,265 patent/US7769397B2/en not_active Expired - Fee Related
Patent Citations (56)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4679244A (en) * | 1984-02-29 | 1987-07-07 | Nippon Telegraph & Telephone Public Corporation | Method of transmitting terminating call signals within a restricted duration and a base station and a portable unit for use in the same |
US5077834A (en) * | 1989-03-28 | 1991-12-31 | Telefind Corporation | Paging receiver with continuously tunable antenna and RF amplifier |
US5237603A (en) * | 1989-12-11 | 1993-08-17 | Sony Corporation | Cordless telephone which intermittently monitors predetermined channels from all available channels |
US5109530A (en) * | 1990-10-24 | 1992-04-28 | Motorola, Inc. | Receiver with battery saver |
US5940771A (en) * | 1991-05-13 | 1999-08-17 | Norand Corporation | Network supporting roaming, sleeping terminals |
US5241568A (en) * | 1991-12-02 | 1993-08-31 | Motorola, Inc. | Method and apparatus for synchronizing a receiver to a transmitted signal while conserving power |
US5734984A (en) * | 1993-11-30 | 1998-03-31 | Northern Telecom Limited | Telephone system for mobile wireless telephone services |
US5613204A (en) * | 1994-12-22 | 1997-03-18 | Bell Atlantic Mobile Systems, Inc. | Beacon system for roaming cellular stations |
US5835860A (en) * | 1995-04-04 | 1998-11-10 | Ericsson Inc. | Operation and administration of mobile station user groups in wireless communications systems |
US6201803B1 (en) * | 1995-05-02 | 2001-03-13 | British Telecommunications Public Limited Company | Cellular radio location system |
US6246875B1 (en) * | 1995-12-04 | 2001-06-12 | Bell Atlantic Network Services, Inc. | Use of cellular digital packet data (CDPD) communications to convey system identification list data to roaming cellular subscriber stations |
US5970062A (en) * | 1996-04-23 | 1999-10-19 | Armonk Business Machines Corporation | Method and apparatus for providing wireless access to an ATM network |
US6195046B1 (en) * | 1996-06-06 | 2001-02-27 | Klein S. Gilhousen | Base station with slave antenna for determining the position of a mobile subscriber in a CDMA cellular telephone system |
US6088591A (en) * | 1996-06-28 | 2000-07-11 | Aironet Wireless Communications, Inc. | Cellular system hand-off protocol |
US5778075A (en) * | 1996-08-30 | 1998-07-07 | Telefonaktiebolaget, L.M. Ericsson | Methods and systems for mobile terminal assisted handover in an private radio communications network |
US5945948A (en) * | 1996-09-03 | 1999-08-31 | Motorola, Inc. | Method and apparatus for location finding in a communication system |
US6065058A (en) * | 1997-05-09 | 2000-05-16 | International Business Machines Corp. | Dynamic push filtering based on information exchanged among nodes in a proxy hierarchy |
US6522670B1 (en) * | 1997-06-18 | 2003-02-18 | Nokia Mobile Phones Limited | Method for identifying base stations of a time division cellular network in a mobile station and mobile station |
US6085193A (en) * | 1997-09-29 | 2000-07-04 | International Business Machines Corporation | Method and system for dynamically prefetching information via a server hierarchy |
US6259898B1 (en) * | 1998-05-05 | 2001-07-10 | Telxon Corporation | Multi-communication access point |
US20010049282A1 (en) * | 1998-05-08 | 2001-12-06 | Kazumasa Ushiki | Mobile communication system |
US6914906B1 (en) * | 1998-07-01 | 2005-07-05 | Motorola, Inc. | Method for RF network virtual end nodes |
US6351468B1 (en) * | 1998-07-02 | 2002-02-26 | Gte Service Corporation | Communications protocol in a wireless personal area network |
US6345043B1 (en) * | 1998-07-06 | 2002-02-05 | National Datacomm Corporation | Access scheme for a wireless LAN station to connect an access point |
US6421716B1 (en) * | 1998-09-30 | 2002-07-16 | Xerox Corporation | System for generating context-sensitive hierarchically ordered document service menus |
US7003297B2 (en) * | 1999-04-06 | 2006-02-21 | Telefonaktiebolaget Lm Ericsson (Publ) | Partial support of mobility between radio access networks |
US6985750B1 (en) * | 1999-04-27 | 2006-01-10 | Bj Services Company | Wireless network system |
US6980660B1 (en) * | 1999-05-21 | 2005-12-27 | International Business Machines Corporation | Method and apparatus for efficiently initializing mobile wireless devices |
US6868272B1 (en) * | 1999-06-08 | 2005-03-15 | Utstarcom, Inc. | Method and apparatus for roaming in hierarchical mobile communications network |
US6650630B1 (en) * | 1999-06-25 | 2003-11-18 | Telefonaktiebolaget Lm Ericsson (Publ) | Resource management and traffic control in time-division-duplex communication systems |
US6594931B1 (en) * | 1999-08-19 | 2003-07-22 | Jeffrey C. Barton | Fluorescent illuminated sign assembly |
US6717926B1 (en) * | 1999-09-13 | 2004-04-06 | Nokia Corporation | Apparatus and associated method, by which to transmit beacon signals in a radio communication system |
US6975613B1 (en) * | 1999-12-06 | 2005-12-13 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for scheduling communication sessions in an ad-hoc network |
US20010004594A1 (en) * | 1999-12-14 | 2001-06-21 | Nec Corporation | Power management system for use with wireless LAN terminal unit |
US20020023164A1 (en) * | 2000-01-28 | 2002-02-21 | Lahr Nils B. | Method and apparatus for client-side authentication and stream selection in a content distribution system |
US20010032262A1 (en) * | 2000-02-10 | 2001-10-18 | Jim Sundqvist | Method and apparatus for network service reservations over wireless access networks |
US20010024953A1 (en) * | 2000-02-24 | 2001-09-27 | Peter Balogh | Method and equipment for supporting mobility in a telecommunication system |
US6788668B1 (en) * | 2000-02-29 | 2004-09-07 | National Semiconductor Corporation | Low power long code synchronization scheme for sleep mode operation of CDMA systems |
US6659947B1 (en) * | 2000-07-13 | 2003-12-09 | Ge Medical Systems Information Technologies, Inc. | Wireless LAN architecture for integrated time-critical and non-time-critical services within medical facilities |
US20020085719A1 (en) * | 2000-07-24 | 2002-07-04 | Bluesocket, Inc. | Method and system for enabling centralized control of wireless local area networks |
US20020026492A1 (en) * | 2000-08-22 | 2002-02-28 | Shigeru Fujita | Communications equipment that carries out communication within network having plural pieces of communications equipment |
US20020152288A1 (en) * | 2000-11-06 | 2002-10-17 | Rajesh Hora | System and method for providing automated database assistance to financial service operators |
US7039027B2 (en) * | 2000-12-28 | 2006-05-02 | Symbol Technologies, Inc. | Automatic and seamless vertical roaming between wireless local area network (WLAN) and wireless wide area network (WWAN) while maintaining an active voice or streaming data connection: systems, methods and program products |
US7480307B2 (en) * | 2001-06-28 | 2009-01-20 | Nokia, Inc. | Protocol to determine optimal target access routers for seamless IP-level handover |
US7313628B2 (en) * | 2001-06-28 | 2007-12-25 | Nokia, Inc. | Protocol to determine optimal target access routers for seamless IP-level handover |
US20080170679A1 (en) * | 2001-07-17 | 2008-07-17 | Networks In Motion, Inc. | System and method for providing routing, mapping, and relative position information to users of a communication network |
US6968219B2 (en) * | 2001-08-15 | 2005-11-22 | Qualcomm, Incorporated | Method for reducing power consumption in bluetooth and CDMA modes of operation |
US20030073434A1 (en) * | 2001-09-05 | 2003-04-17 | Shostak Robert E. | Voice-controlled wireless communications system and method |
US6892083B2 (en) * | 2001-09-05 | 2005-05-10 | Vocera Communications Inc. | Voice-controlled wireless communications system and method |
US20030134642A1 (en) * | 2001-11-19 | 2003-07-17 | At&T Corp. | WLAN having load balancing by access point admission/termination |
US20030118623A1 (en) * | 2001-12-20 | 2003-06-26 | Gianfranco De Paoli Ambrosi | Composition based on etyl ester of linoleic acid and triethyl ester of citric acid for topical use in the treatment of seborrhea and acne |
US20030145092A1 (en) * | 2002-01-28 | 2003-07-31 | Docomo Communications Laboratories Us, Inc. | Method and apparatus for dormant mode support with paging |
US20080240323A1 (en) * | 2002-01-28 | 2008-10-02 | Daichi Funato | Method and apparatus for dormant mode support with paging |
US7417971B2 (en) * | 2002-10-04 | 2008-08-26 | Ntt Docomo, Inc. | Method and apparatus for dormant mode support with paging |
US7106326B2 (en) * | 2003-03-03 | 2006-09-12 | Sun Microsystems, Inc. | System and method for computing filtered shadow estimates using reduced bandwidth |
US6921071B2 (en) * | 2003-10-16 | 2005-07-26 | Muncie Novelty Company, Inc. | Multi-play jar tickets |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080188247A1 (en) * | 2007-02-02 | 2008-08-07 | Ipwireless, Inc. | Hierarchical organization of paging groups |
US20130142183A1 (en) * | 2011-12-06 | 2013-06-06 | At&T Intellectual Property I, Lp | Cluster-based derivation of antenna tilts in a wireless network |
US8971302B2 (en) * | 2011-12-06 | 2015-03-03 | At&T Mobility Ii Llc | Cluster-based derivation of antenna tilts in a wireless network |
US20150133142A1 (en) * | 2011-12-06 | 2015-05-14 | At&T Intellectual Property I, L.P. | Cluster-based derivation of antenna tilts in a wireless network |
US9288807B2 (en) * | 2011-12-06 | 2016-03-15 | At&T Intellectual Property I, L.P. | Cluster-based derivation of antenna tilts in a wireless network |
US10034291B2 (en) | 2011-12-06 | 2018-07-24 | At&T Intellectual Property I, L.P. | Cluster-based derivation of antenna tilts in a wireless network |
US10602522B2 (en) | 2011-12-06 | 2020-03-24 | At&T Intellectual Property I, L.P. | Cluster-based derivation of antenna tilts in a wireless network |
US9544811B2 (en) | 2012-11-19 | 2017-01-10 | Qualcomm Incorporated | Systems and methods for beacon timing adjustment in wireless networks |
Also Published As
Publication number | Publication date |
---|---|
US20030145092A1 (en) | 2003-07-31 |
CN1602477A (en) | 2005-03-30 |
US20080069022A1 (en) | 2008-03-20 |
EP1470495A1 (en) | 2004-10-27 |
JP4099149B2 (en) | 2008-06-11 |
US7689225B2 (en) | 2010-03-30 |
US7920879B2 (en) | 2011-04-05 |
US20080240323A1 (en) | 2008-10-02 |
US8510442B2 (en) | 2013-08-13 |
JP2005516509A (en) | 2005-06-02 |
CN1602477B (en) | 2010-05-05 |
US20070233863A1 (en) | 2007-10-04 |
US7769397B2 (en) | 2010-08-03 |
US20060155860A1 (en) | 2006-07-13 |
US7610053B2 (en) | 2009-10-27 |
WO2003065237A1 (en) | 2003-08-07 |
EP1470495A4 (en) | 2010-09-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7610053B2 (en) | Method and apparatus for dormant mode support with paging | |
US7417971B2 (en) | Method and apparatus for dormant mode support with paging | |
KR100904003B1 (en) | Control of a short-range wireless terminal | |
RU2693592C1 (en) | Method, device and a computer program product for a service detection proxy session for wireless communication | |
KR100594116B1 (en) | Information Configuration and Transmission / Reception Method and System of Adjacent Base Station in Broadband Wireless Access Communication System | |
EP1608191B1 (en) | Power saving system in distributed wireless personal area network and coresponding method | |
JP4112241B2 (en) | Communication system and communication method | |
CN107743718B (en) | Method and apparatus for providing proxy service via NAN proxy server | |
AU2007281912B2 (en) | Synchronization between wireless devices while saving power | |
WO2002025967A1 (en) | Wireless network and method for providing improved handoff performance | |
JP2004513565A (en) | Ad hoc network with multiple terminals, determining terminal as controller of sub-network | |
US20040114538A1 (en) | Device roles and piconet connections | |
US20040198358A1 (en) | Method for performing bluetooth high rate supervisor handover | |
JP2020534756A (en) | Wireless Communication Node Scanning and Association | |
EP1519515A1 (en) | Radio access network with paging capability | |
JP2007288293A (en) | Network management system, management server for network management, network management method, and network management program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |