US20150110100A1 - Wireless communication system, wireless communication device, projector, and wireless communication method - Google Patents
Wireless communication system, wireless communication device, projector, and wireless communication method Download PDFInfo
- Publication number
- US20150110100A1 US20150110100A1 US14/589,346 US201514589346A US2015110100A1 US 20150110100 A1 US20150110100 A1 US 20150110100A1 US 201514589346 A US201514589346 A US 201514589346A US 2015110100 A1 US2015110100 A1 US 2015110100A1
- Authority
- US
- United States
- Prior art keywords
- address
- service set
- set identifier
- terminal
- ssid
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000004891 communication Methods 0.000 title claims abstract description 64
- 238000000034 method Methods 0.000 title claims description 11
- 238000000060 site-specific infrared dichroism spectroscopy Methods 0.000 claims abstract description 20
- 230000004044 response Effects 0.000 claims description 11
- 230000007246 mechanism Effects 0.000 claims description 5
- 238000010586 diagram Methods 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 5
- 230000008859 change Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000007274 generation of a signal involved in cell-cell signaling Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/12—Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/14—Access restriction or access information delivery, e.g. discovery data delivery using user query or user detection
-
- H04W76/02—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/005—Discovery of network devices, e.g. terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/20—Selecting an access point
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Definitions
- the present invention relates to technologies for wirelessly transmitting data to a projector.
- SSID service set identifier
- an SSID is usually set in advance by an administrator of the network, and an IP address is usually set automatically by the base station.
- Each device can perform communication by using the IP address and the SSID.
- a master unit In ad-hoc mode, an administrator of the wireless network is not present. Therefore, in ad-hoc mode, one device (hereinafter referred to as a “master unit”) generates an independent basic service set (IBSS) network and an SSID for identifying an IBSS network, and sends a beacon signal including the SSID.
- Other devices hereinafter referred to as “slave units”) can take part in a wireless network (an IBSS network) corresponding to the SSID by receiving the SSID and setting the SSID in a wireless adapter.
- communication in which the other party is identified requires the IP address of the other party.
- the master unit when the technologies which provide the SSID included in the beacon signal with an IP address are used, if the IP address of the master unit is changed, the master unit generates the SSID again and transmits the SSID.
- a slave unit since it takes time to perform scanning via a wireless network, a slave unit sometimes accumulates the acquired SS ID information for a predetermined period. In such a case, the slave unit has a plurality of SSIDs, that is, an SSID acquired before address change and an SSID acquired after address change. In this case, even though the wireless networks are generated by the same master unit, the slave unit cannot determine which of the wireless networks corresponding to the SSIDs is a wireless network to which the slave unit makes connection.
- An advantage of some aspects of the invention is to solve at least part of the problems described above and improve the convenience of wireless communication in ad-hoc mode.
- the invention can be realized as forms or application examples described below.
- a wireless communication system which performs communication between first and second terminals in ad-hoc mode
- the first terminal includes an identification information storing section storing identification information of the first terminal, an IP address storing section storing an IP address of the first terminal, a service set identifier generating section generating a service set identifier by using priority information indicating priority of wireless connection, the identification information, and the IP address, a priority information updating section updating the priority information every time the service set identifier is generated, and a beacon signal generating section generating a beacon signal including the service set identifier
- the second terminal includes a service set identifier acquiring section acquiring the service set identifier from the beacon signal, memory storing the service set identifier as a candidate for selection, a service set identifier selecting section selecting, when a plurality of service set identifier candidates having the same identification information are stored in the memory, one service set identifier from the plurality of candidates based on the priority information, an IP address acquiring section
- the second terminal can select one service set identifier based on the updated priority information. This makes it possible to improve the convenience of wireless communication in ad-hoc mode.
- a firewall is set in the second terminal, and the communicating section establishes wireless communication between the first and second terminals by transmitting a unicast packet including the IP addresses of the first and second terminals to the first terminal and receiving a response to the unicast packet from the first terminal.
- the service set identifier includes check information for checking correctness of the service set identifier.
- the first and second terminals each store an address series table for establishing correspondence between IP address related information and the IP address.
- the SSID does not include the IP address itself. Therefore, the third party cannot acquire the IP address of the first terminal even when the third party receives the SSID sent from the first terminal.
- a wireless communication device performing communication in ad-hoc mode, including: an identification information storing section storing identification information; an IP address storing section storing an IP address; a service set identifier generating section generating a service set identifier by using priority information indicating priority of wireless connection, the identification information, and the IP address; a priority information updating section updating the priority information every time the service set identifier is generated; and a beacon signal generating section generating a beacon signal including the service set identifier.
- a projector projecting an image corresponding to data received from an information terminal including: the wireless communication device described in the application example described above, the wireless communication device for receiving the data; a CPU converting the received data into projection data; and an image projection mechanism projecting an image based on the projection data.
- a wireless communication method for performing communication between first and second terminals in ad-hoc mode including: sending a beacon signal including a service set identifier including IP address related information related to an IP address of the first terminal, priority information indicating priority of wireless connection, and identification information of the first terminal; acquiring the service set identifier from the beacon signal and storing the service set identifier in memory of the second terminal as a candidate for selection; when a plurality of service set identifier candidates having the same identification information are stored in the memory, selecting one service set identifier from the plurality of candidates based on the priority information; acquiring the IP address of the first terminal from the IP address related information of the selected service set identifier; and making a connection to the first terminal by using the acquired IP address.
- the second terminal can select one service set identifier based on the priority information. This makes it possible to improve the convenience of wireless communication in ad-hoc mode.
- the second terminal sets a firewall, transmits a unicast packet including the IP addresses of the first and second terminals to the first terminal, and establishes wireless communication between the first and second terminals by receiving a response to the unicast packet from the first terminal.
- the service set identifier includes check information for checking correctness of the service set identifier.
- the first and second terminals establish correspondence between the IP address related information and the IP address.
- the SSID does not include the IP address itself. Therefore, the third party cannot acquire the IP address of the first terminal even when the third party receives the SSID sent from the first terminal.
- the invention can be realized in various forms such as a network communication method in ad-hoc mode in addition to a wireless communication system.
- FIG. 1 is an explanatory diagram showing a wireless communication system according to a first embodiment.
- FIGS. 2A and 2B are explanatory diagrams showing the structure of an SSID which is generated by a projector.
- FIG. 3 is an operation flowchart of a personal computer.
- FIGS. 4A and 4B are explanatory diagrams showing an SSID in a second embodiment.
- FIGS. 5A and 5B are explanatory diagrams showing an SSID in a third embodiment.
- FIG. 6 is an operation flowchart of a personal computer in the third embodiment.
- FIGS. 7A to 7D are explanatory diagrams showing an SSID in a fourth embodiment.
- FIG. 1 is an explanatory diagram showing a wireless communication system according to a first embodiment.
- the wireless communication system includes a personal computer 10 and a projector 20 .
- the personal computer 10 includes a CPU 100 , RAM 110 , ROM 120 , a hard disk 122 , a wireless adapter 130 , and an antenna 150 .
- the wireless adapter 130 includes a service set identifier (SSID) storage region 140 .
- the wireless adapter 130 corresponds to a “communicating section” in the claims, and the service set identifier storage region 140 corresponds to “memory storing a service set identifier as a candidate for selection” in the claims.
- SSID service set identifier
- the hard disk 122 includes an IP address storing section 123 , an identification information storing section 124 , an SSID acquisition program product 125 , an SSID selection program product 126 , and an IP address acquisition program product 127 .
- the IP address which is stored in the IP address storing section 123 is the IP address of the personal computer 10 .
- the identification information which is stored in the identification information storing section 124 is the identification information of the personal computer 10 .
- the SSID acquisition program product 125 acquires an SSID from a beacon signal received from the projector 20 , the SSID used when communication with the projector 20 is performed. When there are a plurality of acquired SSIDs, the SSID selection program product 126 selects one SSID from the plurality of SSIDs.
- the IP address acquisition program product 127 acquires an IP address of the projector 20 from the acquired SSID of the projector 20 .
- the SSID acquisition program product 125 corresponds to a “service set identifier acquiring section” in the claims
- the SSID selection program product 126 corresponds to a “service set identifier selecting section” in the claims
- the IP address acquisition program product 127 corresponds to an “IP address acquiring section” in the claims.
- the projector 20 includes a CPU 200 , RAM 210 , ROM 220 , flash memory 222 , a wireless adapter 230 , an antenna 250 , a Video RAM 26 , and an image projection mechanism 270 .
- the wireless adapter 230 includes a service set identifier (SSID) storage region 240 .
- the flash memory 222 includes an IP address storing section 223 , an identification information storing section 224 , an SSID generation program product 225 , a priority information update program product 226 , and a beacon signal generation program product 227 .
- the IP address which is stored in the IP address storing section 223 is the IP address of the projector 20 .
- the identification information which is stored in the identification information storing section 224 is the identification information of the projector 20 .
- the SSID generation program product 225 By using the IP address stored in the IP address storing section 223 and the identification information stored in the identification information storing section 224 , the SSID generation program product 225 generates an SSID which is used when communication with the computer 10 is performed.
- the priority information update program product 226 updates the priority information every time the SSID generation program product 225 generates an SSID.
- the beacon signal generating section 227 generates a beacon signal including an SSID.
- the SSID generation program product 225 corresponds to a “service set identifier generating section” in the claims
- the priority information update program product 226 corresponds to a “priority information updating section” in the claims
- the beacon signal generating section 227 corresponds to a “beacon signal generating section” in the claims.
- the projector 20 projects the data received from the personal computer 10 onto a screen (not shown). This is performed in the manner described below.
- the CPU 100 of the personal computer 10 generates data to be projected by the projector 20 .
- the CPU 100 transmits the data to the projector 20 by using the wireless adapter 130 and the antenna 150 .
- the wireless adapter 130 of the personal computer 10 and the wireless adapter 230 of the projector 20 form a wireless LAN specified by IEEE 802.11, for example.
- the CPU 200 of the projector 20 receives the data by using the antenna 250 and the wireless adapter 230 .
- the CPU 200 converts the received data into projection data, and writes the projection data into the Video RAM 260 .
- the image projection mechanism 270 reads the data in the Video RAM 260 , and projects the data onto the screen (not shown).
- the structure of the image projection mechanism 270 is a structure usually used in the projectors, and therefore the descriptions thereof are omitted.
- the personal computer 10 and the projector 20 perform communication directly with each other without using abase station, in other words, perform communication in ad-hoc mode.
- either the personal computer 10 or the projector 20 has to generate an independent basic service set (IBSS) network and an SSID corresponding to the IBSS network.
- the projector 20 generates an IBSS network and an SSID corresponding to the IBSS.
- the SSID is used to identify the IBSS network.
- the IBSS network is an independent network which is identified by the SSID, and any device can take part in the IBSS network by matching the SSID with that of the IBSS network.
- FIGS. 2A and 2B are explanatory diagrams showing the structure of an SSID which is generated by a projector.
- the CPU 200 of the projector 20 in the generation of an SSID, the CPU 200 of the projector 20 generates identification information for identifying the projector 20 and an SSID including the IP address of the projector 20 .
- the SSID is formed of up to 32 characters, and the IP address can be represented by 8 characters in the case of IPV4. Therefore, the CPU 200 can assign up to 24 characters to the identification information of the device.
- descriptions will be given on the assumption that an SSID is formed of 32 characters.
- a region in which the identification information of the device is stored is referred to as a device name field, and a region in which the IP address is stored is referred to as an address information field.
- the CPU 200 assigns the first 24 characters of 32 characters of an SSID to the device name field, and assigns the remaining characters to the address information field.
- the identification information of the device is “MyProjector”, and the IP address is “192.168.0.192”.
- the CPU 200 assigns “MyProjector” to the device name field from the beginning thereof in this order, and leaves the remaining space blank. Incidentally, the CPU 200 may assign NULL to the remaining space instead of leaving the space blank.
- the CPU 200 assigns “C0A800C0” which is the IP address “192.168.0.192” given in hexadecimal to the address information field (the remaining 8-character field).
- the CPU 200 stores the generated SSID in the SSID storage region 240 ( FIG. 1 ), and intermittently sends a beacon signal including the SSID at predetermined intervals.
- FIG. 3 is an operation flowchart of the personal computer.
- the CPU 100 ( FIG. 1 ) of the personal computer 10 searches for neighboring wireless networks. Specifically, the CPU 100 determines whether or not a beacon signal is sent from the projector 20 ( FIG. 1 ). If the beacon signal is sent, the CPU 100 receives the beacon signal and acquires an SSID from the beacon signal. In this embodiment, the SSID has values shown in FIGS. 2A and 2B .
- step S 310 the CPU 100 determines whether or not the SSID includes an IP address.
- the maximum value of the IP address is “255.255.255.255”. Therefore, when the IP address is given in hexadecimal, the characters used therein are 0 to 9 and A to F. Thus, when the lower 8 characters of the SSID are only these characters (any of 0 to 9 or A to F), the CPU 100 can determine that these 8 characters represent the IP address. If the SSID includes the IP address, the CPU 100 stores the received SSID in the own SSID storage region 140 , and proceeds to step S 340 . If the SSID does not include the IP address, the CPU 100 goes back to step S 300 , and continuously searches for networks.
- step S 340 the CPU 100 connects to the network (IBSS network) identified by the SSID.
- the personal computer 10 can merely take part in the IBSS network.
- the personal computer 10 needs the IP address of the projector 20 to perform communication directly with the projector 20 .
- step S 350 the CPU 100 acquires the IP address from the SSID.
- the CPU 100 extracts 8 characters in the address information field. Since the 8 characters are formed of any of 0 to 9 or A to F as described above, the CPU 100 can determine that they are an 8-digit hexadecimal number.
- the CPU 100 generates a 32-bit IP address from the 8-digit hexadecimal number.
- step S 360 the CPU 100 of the personal computer 10 transmits a unicast packet to the IP address acquired in step S 350 , and issues a connection request.
- the personal computer 10 and the projector 20 have to perform communication by identifying the IP address of the other party.
- the CPU 100 of the personal computer 10 knows the IP address of the projector 20 , but the CPU 200 of the projector 20 does not know the IP address of the personal computer 10 .
- the CPU 100 can inform the CPU 200 of the projector 20 of the IP address of the personal computer 10 .
- unicast means specifying a single IP address and transmitting data.
- sending a broadcast packet means sending data to all the devices connected to the network.
- the CPU 100 usually specifies a unique address (a broadcast address) indicating the entire network and sends a packet.
- the projector 20 which has received the broadcast packet returns a response packet to the personal computer by unicast.
- the firewall may reject the response packet to the broadcast packet. Therefore, it is preferable that the CPU 100 send a unicast packet as described above. If the CPU 100 receives a valid response packet in step 5370 , the CPU 100 proceeds to step S 380 , and performs data communication with the CPU 200 of the projector 20 .
- step S 390 When the CPU 100 sends all the data to the projector 20 , the CPU 100 ends the communication in step S 390 . If the CPU 100 does not receive a valid response packet in step S 370 , the CPU 100 goes back to step S 300 , and searches for other networks.
- the CPU 200 of the projector 20 provides an SSID generated thereby with an IP address.
- the CPU 100 of the personal computer 10 acquires the IP address of the projector 20 from the received SSID, and transmits data to the IP address. Therefore, in ad-hoc mode, it is possible to perform communication between the personal computer 10 and the projector 20 .
- the CPU 100 of the personal computer 10 which has received the SSID specifies the IP address of the projector 20 and sends a unicast packet. Therefore, even when the personal computer 10 is placed in the firewall, a response packet from the projector 20 is not rejected by the firewall.
- FIGS. 4A and 4B are explanatory diagrams showing an SSID in a second embodiment.
- an SSID is not provided with an IP address itself of the projector 20 , but with an item number of an address series corresponding to the IP address.
- FIG. 4A shows the structure of an SSID in the second embodiment. In this embodiment, 30 characters are assigned to a device name field, and 2 characters are assigned to an address series field.
- FIG. 4B is a table of correspondence between the item number of the address series and the IP address. The item number and the IP address have one-to-one correspondence. For example, when the item number is “01”, a corresponding IP address is “192.168.0.1”. The correspondence table is stored in both the personal computer 10 and the projector 20 .
- step S 350 the CPU 100 acquires the IP address of the projector.
- the SSID does not include the IP address itself.
- step S 350 the CPU 100 first acquires the item number of the address series. The CPU 100 then acquires a corresponding IP address by using the table of correspondence between the item number of the address series and the IP address and using the item number of the address series as a key.
- the SSID does not include the IP address itself. Therefore, the third party cannot acquire the IP address of the projector 20 even when the third party receives the SSID sent from the projector 20 . As a result, it is possible to prevent unauthorized access to and attack on the projector 20 .
- the IP address of the first embodiment and the item number of the address series of the second embodiment are collectively referred to as “IP address related information”.
- the IP address related information includes both the IP address itself and information corresponding to the IP address.
- 2 characters are assigned to the address series field; however, any number of characters can be selected as the number of characters assigned to the address series field as long as the total number of characters of an SSID is 32 characters or less.
- FIGS. 5A and 5B are explanatory diagrams showing an SSID in a third embodiment.
- FIG. 5A shows the structure of an SSID in the third embodiment.
- the SSID of the third embodiment differs from the SSID of the first embodiment in that it is provided with a priority field for 2 characters. A two-digit number is assigned to the priority field.
- the CPU 200 of the projector 20 increments the value of the priority field by 1 every time the IP address is changed. When the IP address is changed when the value of the priority field is 99, the CPU 200 restores the value of the priority field to 0 (00). The value of the priority field is restored to zero when the IP address is changed when the value of the priority field is a predetermined value.
- FIG. 6 is an operation flowchart of the personal computer in the third embodiment.
- steps S 620 and S 630 are performed between steps S 310 and S 340 of the first embodiment.
- step S 620 the CPU 100 determines whether or not the SSIDs stored in the SSID storage region 140 include a plurality of SSIDs having the same identification information in the device name fields of the SSIDs. If there is only one SSID, the CPU 100 selects the SSID and proceeds to step S 340 . If there are a plurality of such SSIDs, the CPU 100 proceeds to step S 630 and determines which SSID is used.
- step S 630 the CPU 100 determines which SSID to select.
- FIG. 5B is a comparison table for determining which SSID has higher priority. An SSID having a greater priority information value has higher priority. As described above, since the priority information is restored to zero when the IP address is changed when the value of the priority field is a predetermined value, the CPU 100 determines the SSID to which higher priority is given by considering the above fact. Assume that the value in the priority field of one SSID stored in the SSID storage region 140 is X and the value in the priority field of the other SSID is Y. The CPU 100 obtains the value of X-Y and the value of
- the CPU 100 determines whether the value of X ⁇ Y is more than 0, less than 0, or equal to 0.
- the CPU 100 determines whether the value of
- 110 ⁇ 90
- the CPU 100 selects an SSID having X as a value in the priority field.
- the CPU 100 selects the SSIDs. It is to be noted that, in this case, since the value of X
- the CPU 100 selects an SSID based on the value in the priority field. Therefore, the CPU of the personal computer 10 sends a unicast packet to the IP address which is currently used by the projector, and does not send a unicast packet to the IP address which is not used by the projector 20 .
- the number of characters in the priority field is two; however, any number of characters can be adopted.
- FIGS. 7A to 7D are explanatory diagrams showing an SSID in a fourth embodiment.
- FIG. 7A shows the structure of an SSID.
- the fourth embodiment is obtained by adding a check information field to an SSID in the first embodiment. Incidentally, the number of characters in the device name field is reduced by the number of characters in the check information field.
- FIG. 7B is obtained by adding check information to an SSID of the first embodiment.
- the check information is calculated by using CRC-8, for example.
- FIG. 7C shows an SSID which the third party who has seen the SSID of FIG. 7B sets in another device.
- the SSID of FIG. 7C and the SSID of FIG. 7B have the same values in the device name field, but they have one different value in the address information field, and the device in which the third party sets the SSID is a device different from the projector 20 .
- Such a situation can occur when, for example, the third party tries to steal the information from the personal computer 10 by faking the SSID.
- the CPU 100 of the personal computer 10 can easily determine whether or not the SSID is a faked SSID by comparing the check information calculated based on the values of the SSID and the values in the check information field of the SSID. As a result, the CPU 100 does not take part in the network with the faked SSID shown in FIG. 7C and does not transmit the data.
- FIG. 7D is obtained by providing a correct check information field to the SSID shown in FIG. 7C .
- CRC-8 is used for generating the check information; however, it is also possible to adopt other methods such as a checksum.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
A wireless communication system performs ad-hoc mode communication, wherein a first terminal includes an identification information storing section, an IP address storing section, an SSID generating section generating a service set identifier, a beacon signal generating section generating a beacon signal including an SSID, and a priority information updating section updating priority information, and the second terminal includes an SSID acquiring section acquiring the SSID from the beacon signal, memory storing the SSID, an SSID selecting section selecting one SSID based on the priority information, an IP address acquiring section acquiring the IP address of the first terminal from the selected SSID, and a communicating section making a connection to the first terminal by using the acquired IP address.
Description
- This application is a continuation application of U.S. patent application Ser. No. 13/022,041 filed Feb. 7, 2011, which claims priority to Japanese Patent Application No. 2010-051460 filed Mar. 9, 2010, the entire disclosure of which is expressly incorporated by reference herein.
- 1. Technical Field
- The present invention relates to technologies for wirelessly transmitting data to a projector.
- 2. Related Art
- As a network configuration of a wireless network, there are infrastructure mode in which devices perform communication with each other via a base station and ad-hoc mode in which the devices perform communication directly with each other. Each device identifies a wireless network by using a service set identifier (SSID) and connects to a wireless network having a common SSID. In infrastructure mode, an SSID is usually set in advance by an administrator of the network, and an IP address is usually set automatically by the base station. Each device can perform communication by using the IP address and the SSID.
- On the other hand, in ad-hoc mode, an administrator of the wireless network is not present. Therefore, in ad-hoc mode, one device (hereinafter referred to as a “master unit”) generates an independent basic service set (IBSS) network and an SSID for identifying an IBSS network, and sends a beacon signal including the SSID. Other devices (hereinafter referred to as “slave units”) can take part in a wireless network (an IBSS network) corresponding to the SSID by receiving the SSID and setting the SSID in a wireless adapter. Here, communication in which the other party is identified requires the IP address of the other party. In the past, the technologies for allowing a master unit to inform a slave unit of the IP address of the master unit by providing the SSID included in the beacon signal with the IP address have been known (see, for example, JP-A-2005-323117 and JP-A-2006-254301).
- Incidentally, when the technologies which provide the SSID included in the beacon signal with an IP address are used, if the IP address of the master unit is changed, the master unit generates the SSID again and transmits the SSID. Here, since it takes time to perform scanning via a wireless network, a slave unit sometimes accumulates the acquired SS ID information for a predetermined period. In such a case, the slave unit has a plurality of SSIDs, that is, an SSID acquired before address change and an SSID acquired after address change. In this case, even though the wireless networks are generated by the same master unit, the slave unit cannot determine which of the wireless networks corresponding to the SSIDs is a wireless network to which the slave unit makes connection.
- An advantage of some aspects of the invention is to solve at least part of the problems described above and improve the convenience of wireless communication in ad-hoc mode. The invention can be realized as forms or application examples described below.
- According to this application example, there is provided a wireless communication system which performs communication between first and second terminals in ad-hoc mode, wherein the first terminal includes an identification information storing section storing identification information of the first terminal, an IP address storing section storing an IP address of the first terminal, a service set identifier generating section generating a service set identifier by using priority information indicating priority of wireless connection, the identification information, and the IP address, a priority information updating section updating the priority information every time the service set identifier is generated, and a beacon signal generating section generating a beacon signal including the service set identifier, and the second terminal includes a service set identifier acquiring section acquiring the service set identifier from the beacon signal, memory storing the service set identifier as a candidate for selection, a service set identifier selecting section selecting, when a plurality of service set identifier candidates having the same identification information are stored in the memory, one service set identifier from the plurality of candidates based on the priority information, an IP address acquiring section acquiring the IP address of the first terminal from the selected service set identifier, and a communicating section making a connection to the first terminal by using the acquired IP address.
- According to this application example, even when the IP address of the first terminal is changed and the SSID is changed, the second terminal can select one service set identifier based on the updated priority information. This makes it possible to improve the convenience of wireless communication in ad-hoc mode.
- In the wireless communication system, a firewall is set in the second terminal, and the communicating section establishes wireless communication between the first and second terminals by transmitting a unicast packet including the IP addresses of the first and second terminals to the first terminal and receiving a response to the unicast packet from the first terminal.
- According to this application example, even when a firewall is set in the second terminal, a response from the first terminal is not rejected.
- In the wireless communication system, the service set identifier includes check information for checking correctness of the service set identifier.
- According to this application example, it is possible to find out an SSID faked by the third party.
- In the wireless communication system, the first and second terminals each store an address series table for establishing correspondence between IP address related information and the IP address.
- According to this application example, the SSID does not include the IP address itself. Therefore, the third party cannot acquire the IP address of the first terminal even when the third party receives the SSID sent from the first terminal.
- According to this application example, there is provided a wireless communication device performing communication in ad-hoc mode, including: an identification information storing section storing identification information; an IP address storing section storing an IP address; a service set identifier generating section generating a service set identifier by using priority information indicating priority of wireless connection, the identification information, and the IP address; a priority information updating section updating the priority information every time the service set identifier is generated; and a beacon signal generating section generating a beacon signal including the service set identifier.
- According to this application example, even when the IP address of the wireless communication device is changed and the SSID is changed, it is possible to select one service set identifier based on the priority information. This makes it possible to improve the convenience of wireless communication in ad-hoc mode.
- According to this application example, there is provided a projector projecting an image corresponding to data received from an information terminal, including: the wireless communication device described in the application example described above, the wireless communication device for receiving the data; a CPU converting the received data into projection data; and an image projection mechanism projecting an image based on the projection data.
- According to this application example, even when the IP address of the projector is changed and the SSID is changed, it is possible to make a connection to an information terminal which supplies data to the projector with reliability and project an image corresponding to the supplied data.
- According to this application example, there is provided a wireless communication method for performing communication between first and second terminals in ad-hoc mode, including: sending a beacon signal including a service set identifier including IP address related information related to an IP address of the first terminal, priority information indicating priority of wireless connection, and identification information of the first terminal; acquiring the service set identifier from the beacon signal and storing the service set identifier in memory of the second terminal as a candidate for selection; when a plurality of service set identifier candidates having the same identification information are stored in the memory, selecting one service set identifier from the plurality of candidates based on the priority information; acquiring the IP address of the first terminal from the IP address related information of the selected service set identifier; and making a connection to the first terminal by using the acquired IP address.
- According to this application example, even when the IP address of the first terminal is changed and the SSID is changed, the second terminal can select one service set identifier based on the priority information. This makes it possible to improve the convenience of wireless communication in ad-hoc mode.
- In the wireless communication method, the second terminal sets a firewall, transmits a unicast packet including the IP addresses of the first and second terminals to the first terminal, and establishes wireless communication between the first and second terminals by receiving a response to the unicast packet from the first terminal.
- According to this application example, even when a firewall is set in the second terminal, a response from the first terminal is not rejected.
- In the wireless communication method, the service set identifier includes check information for checking correctness of the service set identifier.
- According to this application example, it is possible to find out an SSID faked by the third party.
- In the wireless communication method, the first and second terminals establish correspondence between the IP address related information and the IP address.
- According to this application example, the SSID does not include the IP address itself. Therefore, the third party cannot acquire the IP address of the first terminal even when the third party receives the SSID sent from the first terminal. The invention can be realized in various forms such as a network communication method in ad-hoc mode in addition to a wireless communication system.
- The invention will be described with reference to the accompanying drawings, wherein like numbers reference like elements.
-
FIG. 1 is an explanatory diagram showing a wireless communication system according to a first embodiment. -
FIGS. 2A and 2B are explanatory diagrams showing the structure of an SSID which is generated by a projector. -
FIG. 3 is an operation flowchart of a personal computer. -
FIGS. 4A and 4B are explanatory diagrams showing an SSID in a second embodiment. -
FIGS. 5A and 5B are explanatory diagrams showing an SSID in a third embodiment. -
FIG. 6 is an operation flowchart of a personal computer in the third embodiment. -
FIGS. 7A to 7D are explanatory diagrams showing an SSID in a fourth embodiment. -
FIG. 1 is an explanatory diagram showing a wireless communication system according to a first embodiment. The wireless communication system includes apersonal computer 10 and aprojector 20. Thepersonal computer 10 includes aCPU 100,RAM 110,ROM 120, ahard disk 122, awireless adapter 130, and anantenna 150. Thewireless adapter 130 includes a service set identifier (SSID)storage region 140. Thewireless adapter 130 corresponds to a “communicating section” in the claims, and the service setidentifier storage region 140 corresponds to “memory storing a service set identifier as a candidate for selection” in the claims. - The
hard disk 122 includes an IPaddress storing section 123, an identificationinformation storing section 124, an SSIDacquisition program product 125, an SSIDselection program product 126, and an IP addressacquisition program product 127. - Here, the IP address which is stored in the IP
address storing section 123 is the IP address of thepersonal computer 10. The identification information which is stored in the identificationinformation storing section 124 is the identification information of thepersonal computer 10. The SSIDacquisition program product 125 acquires an SSID from a beacon signal received from theprojector 20, the SSID used when communication with theprojector 20 is performed. When there are a plurality of acquired SSIDs, the SSIDselection program product 126 selects one SSID from the plurality of SSIDs. The IP addressacquisition program product 127 acquires an IP address of theprojector 20 from the acquired SSID of theprojector 20. The SSIDacquisition program product 125 corresponds to a “service set identifier acquiring section” in the claims, the SSIDselection program product 126 corresponds to a “service set identifier selecting section” in the claims, and the IP addressacquisition program product 127 corresponds to an “IP address acquiring section” in the claims. - The
projector 20 includes aCPU 200,RAM 210,ROM 220,flash memory 222, awireless adapter 230, anantenna 250, a Video RAM 26, and animage projection mechanism 270. Thewireless adapter 230 includes a service set identifier (SSID)storage region 240. - The
flash memory 222 includes an IPaddress storing section 223, an identificationinformation storing section 224, an SSIDgeneration program product 225, a priority informationupdate program product 226, and a beacon signalgeneration program product 227. Here, the IP address which is stored in the IPaddress storing section 223 is the IP address of theprojector 20. The identification information which is stored in the identificationinformation storing section 224 is the identification information of theprojector 20. By using the IP address stored in the IPaddress storing section 223 and the identification information stored in the identificationinformation storing section 224, the SSIDgeneration program product 225 generates an SSID which is used when communication with thecomputer 10 is performed. The priority informationupdate program product 226 updates the priority information every time the SSIDgeneration program product 225 generates an SSID. The beaconsignal generating section 227 generates a beacon signal including an SSID. The SSIDgeneration program product 225 corresponds to a “service set identifier generating section” in the claims, the priority informationupdate program product 226 corresponds to a “priority information updating section” in the claims, and the beaconsignal generating section 227 corresponds to a “beacon signal generating section” in the claims. - The
projector 20 projects the data received from thepersonal computer 10 onto a screen (not shown). This is performed in the manner described below. First, theCPU 100 of thepersonal computer 10 generates data to be projected by theprojector 20. Then, theCPU 100 transmits the data to theprojector 20 by using thewireless adapter 130 and theantenna 150. Here, thewireless adapter 130 of thepersonal computer 10 and thewireless adapter 230 of theprojector 20 form a wireless LAN specified by IEEE 802.11, for example. TheCPU 200 of theprojector 20 receives the data by using theantenna 250 and thewireless adapter 230. TheCPU 200 converts the received data into projection data, and writes the projection data into theVideo RAM 260. Theimage projection mechanism 270 reads the data in theVideo RAM 260, and projects the data onto the screen (not shown). Incidentally, the structure of theimage projection mechanism 270 is a structure usually used in the projectors, and therefore the descriptions thereof are omitted. - In this embodiment, the
personal computer 10 and theprojector 20 perform communication directly with each other without using abase station, in other words, perform communication in ad-hoc mode. In ad-hoc mode, either thepersonal computer 10 or theprojector 20 has to generate an independent basic service set (IBSS) network and an SSID corresponding to the IBSS network. In this embodiment, theprojector 20 generates an IBSS network and an SSID corresponding to the IBSS. The SSID is used to identify the IBSS network. The IBSS network is an independent network which is identified by the SSID, and any device can take part in the IBSS network by matching the SSID with that of the IBSS network. -
FIGS. 2A and 2B are explanatory diagrams showing the structure of an SSID which is generated by a projector. In this embodiment, in the generation of an SSID, theCPU 200 of theprojector 20 generates identification information for identifying theprojector 20 and an SSID including the IP address of theprojector 20. The SSID is formed of up to 32 characters, and the IP address can be represented by 8 characters in the case of IPV4. Therefore, theCPU 200 can assign up to 24 characters to the identification information of the device. Hereinafter, descriptions will be given on the assumption that an SSID is formed of 32 characters. In this embodiment, a region in which the identification information of the device is stored is referred to as a device name field, and a region in which the IP address is stored is referred to as an address information field. In this embodiment, the CPU 200 (FIG. 1 ) assigns the first 24 characters of 32 characters of an SSID to the device name field, and assigns the remaining characters to the address information field. In this embodiment, the identification information of the device is “MyProjector”, and the IP address is “192.168.0.192”. TheCPU 200 assigns “MyProjector” to the device name field from the beginning thereof in this order, and leaves the remaining space blank. Incidentally, theCPU 200 may assign NULL to the remaining space instead of leaving the space blank. TheCPU 200 assigns “C0A800C0” which is the IP address “192.168.0.192” given in hexadecimal to the address information field (the remaining 8-character field). TheCPU 200 stores the generated SSID in the SSID storage region 240 (FIG. 1 ), and intermittently sends a beacon signal including the SSID at predetermined intervals. -
FIG. 3 is an operation flowchart of the personal computer. In step S300, the CPU 100 (FIG. 1 ) of thepersonal computer 10 searches for neighboring wireless networks. Specifically, theCPU 100 determines whether or not a beacon signal is sent from the projector 20 (FIG. 1 ). If the beacon signal is sent, theCPU 100 receives the beacon signal and acquires an SSID from the beacon signal. In this embodiment, the SSID has values shown inFIGS. 2A and 2B . - In step S310, the
CPU 100 determines whether or not the SSID includes an IP address. The maximum value of the IP address is “255.255.255.255”. Therefore, when the IP address is given in hexadecimal, the characters used therein are 0 to 9 and A to F. Thus, when the lower 8 characters of the SSID are only these characters (any of 0 to 9 or A to F), theCPU 100 can determine that these 8 characters represent the IP address. If the SSID includes the IP address, theCPU 100 stores the received SSID in the ownSSID storage region 140, and proceeds to step S340. If the SSID does not include the IP address, theCPU 100 goes back to step S300, and continuously searches for networks. - In step S340, the
CPU 100 connects to the network (IBSS network) identified by the SSID. Incidentally, at this stage, thepersonal computer 10 can merely take part in the IBSS network. Thepersonal computer 10 needs the IP address of theprojector 20 to perform communication directly with theprojector 20. In step S350, theCPU 100 acquires the IP address from the SSID. TheCPU 100extracts 8 characters in the address information field. Since the 8 characters are formed of any of 0 to 9 or A to F as described above, theCPU 100 can determine that they are an 8-digit hexadecimal number. TheCPU 100 generates a 32-bit IP address from the 8-digit hexadecimal number. - In step S360, the
CPU 100 of thepersonal computer 10 transmits a unicast packet to the IP address acquired in step S350, and issues a connection request. To perform mutual communication between thepersonal computer 10 and theprojector 20, thepersonal computer 10 and theprojector 20 have to perform communication by identifying the IP address of the other party. TheCPU 100 of thepersonal computer 10 knows the IP address of theprojector 20, but theCPU 200 of theprojector 20 does not know the IP address of thepersonal computer 10. By transmitting the unicast packet as described above, theCPU 100 can inform theCPU 200 of theprojector 20 of the IP address of thepersonal computer 10. Here, unicast means specifying a single IP address and transmitting data. - Incidentally, when the
CPU 100 of thepersonal computer 10 sends a broadcast packet, the following problem arises. Here, sending a broadcast packet means sending data to all the devices connected to the network. TheCPU 100 usually specifies a unique address (a broadcast address) indicating the entire network and sends a packet. Theprojector 20 which has received the broadcast packet returns a response packet to the personal computer by unicast. Here, when thepersonal computer 10 is placed in a firewall, the firewall may reject the response packet to the broadcast packet. Therefore, it is preferable that theCPU 100 send a unicast packet as described above. If theCPU 100 receives a valid response packet in step 5370, theCPU 100 proceeds to step S380, and performs data communication with theCPU 200 of theprojector 20. When theCPU 100 sends all the data to theprojector 20, theCPU 100 ends the communication in step S390. If theCPU 100 does not receive a valid response packet in step S370, theCPU 100 goes back to step S300, and searches for other networks. - As described above, according to this embodiment, the
CPU 200 of theprojector 20 provides an SSID generated thereby with an IP address. TheCPU 100 of thepersonal computer 10 acquires the IP address of theprojector 20 from the received SSID, and transmits data to the IP address. Therefore, in ad-hoc mode, it is possible to perform communication between thepersonal computer 10 and theprojector 20. - Moreover, in this embodiment, the
CPU 100 of thepersonal computer 10 which has received the SSID specifies the IP address of theprojector 20 and sends a unicast packet. Therefore, even when thepersonal computer 10 is placed in the firewall, a response packet from theprojector 20 is not rejected by the firewall. -
FIGS. 4A and 4B are explanatory diagrams showing an SSID in a second embodiment. In the second embodiment, an SSID is not provided with an IP address itself of theprojector 20, but with an item number of an address series corresponding to the IP address.FIG. 4A shows the structure of an SSID in the second embodiment. In this embodiment, 30 characters are assigned to a device name field, and 2 characters are assigned to an address series field.FIG. 4B is a table of correspondence between the item number of the address series and the IP address. The item number and the IP address have one-to-one correspondence. For example, when the item number is “01”, a corresponding IP address is “192.168.0.1”. The correspondence table is stored in both thepersonal computer 10 and theprojector 20. - Since an operation flowchart of this embodiment is almost the same as the operation flowchart of the first embodiment, only a difference will be described. In step S350, the
CPU 100 acquires the IP address of the projector. Here, in the second embodiment, unlike the first embodiment, the SSID does not include the IP address itself. In step S350, theCPU 100 first acquires the item number of the address series. TheCPU 100 then acquires a corresponding IP address by using the table of correspondence between the item number of the address series and the IP address and using the item number of the address series as a key. - According to the second embodiment, the SSID does not include the IP address itself. Therefore, the third party cannot acquire the IP address of the
projector 20 even when the third party receives the SSID sent from theprojector 20. As a result, it is possible to prevent unauthorized access to and attack on theprojector 20. Incidentally, the IP address of the first embodiment and the item number of the address series of the second embodiment are collectively referred to as “IP address related information”. The IP address related information includes both the IP address itself and information corresponding to the IP address. Incidentally, in this embodiment, 2 characters are assigned to the address series field; however, any number of characters can be selected as the number of characters assigned to the address series field as long as the total number of characters of an SSID is 32 characters or less. -
FIGS. 5A and 5B are explanatory diagrams showing an SSID in a third embodiment.FIG. 5A shows the structure of an SSID in the third embodiment. The SSID of the third embodiment differs from the SSID of the first embodiment in that it is provided with a priority field for 2 characters. A two-digit number is assigned to the priority field. TheCPU 200 of theprojector 20 increments the value of the priority field by 1 every time the IP address is changed. When the IP address is changed when the value of the priority field is 99, theCPU 200 restores the value of the priority field to 0 (00). The value of the priority field is restored to zero when the IP address is changed when the value of the priority field is a predetermined value. -
FIG. 6 is an operation flowchart of the personal computer in the third embodiment. The same steps in the operation of the personal computer in the third embodiment as those in the operation in the first embodiment are identified with the same step numbers, and the descriptions thereof will be omitted. In the third embodiment, steps S620 and S630 are performed between steps S310 and S340 of the first embodiment. In step S620, theCPU 100 determines whether or not the SSIDs stored in theSSID storage region 140 include a plurality of SSIDs having the same identification information in the device name fields of the SSIDs. If there is only one SSID, theCPU 100 selects the SSID and proceeds to step S340. If there are a plurality of such SSIDs, theCPU 100 proceeds to step S630 and determines which SSID is used. - In step S630, the
CPU 100 determines which SSID to select.FIG. 5B is a comparison table for determining which SSID has higher priority. An SSID having a greater priority information value has higher priority. As described above, since the priority information is restored to zero when the IP address is changed when the value of the priority field is a predetermined value, theCPU 100 determines the SSID to which higher priority is given by considering the above fact. Assume that the value in the priority field of one SSID stored in theSSID storage region 140 is X and the value in the priority field of the other SSID is Y. TheCPU 100 obtains the value of X-Y and the value of |X−Y|. Then, theCPU 100 determines whether the value of X−Y is more than 0, less than 0, or equal to 0. Next, theCPU 100 determines whether the value of |X−Y| is equal to or less than 50 or more than 50. For example, when X=25 and Y=60, X−Y=25−60<0 and |X−Y|=|25−60|≦50. Therefore, theCPU 100 determines that Y has higher priority. In this case, theCPU 100 selects an SSID having Y as a value in the priority field. Moreover, for example, when X=10 and Y=90, X−Y=10−90<0 and |X−Y|=110−90|>50. Therefore, theCPU 100 determines that X has higher priority. In this case, theCPU 100 selects an SSID having X as a value in the priority field. Incidentally, when X−Y=0 (X=Y), the two SSIDs are the same, and therefore X and Y have the same priority. TheCPU 100 selects the SSIDs. It is to be noted that, in this case, since the value of X|Y is 0, the value of |X−Y| does not become more than 50. - As described above, according to this embodiment, the
CPU 100 selects an SSID based on the value in the priority field. Therefore, the CPU of thepersonal computer 10 sends a unicast packet to the IP address which is currently used by the projector, and does not send a unicast packet to the IP address which is not used by theprojector 20. This makes it possible to improve the convenience of wireless communication in ad-hoc mode. In this embodiment, the number of characters in the priority field is two; however, any number of characters can be adopted. -
FIGS. 7A to 7D are explanatory diagrams showing an SSID in a fourth embodiment.FIG. 7A shows the structure of an SSID. The fourth embodiment is obtained by adding a check information field to an SSID in the first embodiment. Incidentally, the number of characters in the device name field is reduced by the number of characters in the check information field. -
FIG. 7B is obtained by adding check information to an SSID of the first embodiment. The check information is calculated by using CRC-8, for example.FIG. 7C shows an SSID which the third party who has seen the SSID ofFIG. 7B sets in another device. The SSID ofFIG. 7C and the SSID ofFIG. 7B have the same values in the device name field, but they have one different value in the address information field, and the device in which the third party sets the SSID is a device different from theprojector 20. Such a situation can occur when, for example, the third party tries to steal the information from thepersonal computer 10 by faking the SSID. However, since the SSID has a check information field, theCPU 100 of thepersonal computer 10 can easily determine whether or not the SSID is a faked SSID by comparing the check information calculated based on the values of the SSID and the values in the check information field of the SSID. As a result, theCPU 100 does not take part in the network with the faked SSID shown inFIG. 7C and does not transmit the data. Incidentally,FIG. 7D is obtained by providing a correct check information field to the SSID shown inFIG. 7C . As described above, according to the fourth embodiment, it is possible to find out the SSID faked by the third party. In this embodiment, CRC-8 is used for generating the check information; however, it is also possible to adopt other methods such as a checksum. - The technologies described in the above embodiments can be adopted independently. Therefore, arbitrary two or more technologies may be combined. For example, the address series of the second embodiment and the priority of the third embodiment may be combined. Moreover, in the embodiments described above, descriptions have been given by taking up a projector as an example; however, the projector may be replaced with a printer.
- Although the invention has been described by way of embodiments, the embodiments described above are merely intended to make the invention more easily understandable, and are not meant to limit the scope of the invention in any way. It is to be understood that many modifications and variations are possible within the spirit of what is described herein and claimed in the appended claims, and the invention includes the equivalent thereof.
Claims (12)
1. A wireless communication system which performs communication between first and second terminals, wherein
the first terminal includes
an identification information storing section storing identification information of the first terminal,
an IP address storing section storing an IP address of the first terminal,
a service set identifier generating section generating a service set identifier by using priority information indicating priority of wireless connection, the identification information, and the IP address,
a priority information updating section updating the priority information responsive to the service set identifier generating section generating a new service set identifier; and
a beacon signal generating section generating a beacon signal including the service set identifier, and
the second terminal includes
a service set identifier acquiring section acquiring the service set identifier from the beacon signal,
memory storing the service set identifier as a candidate for selection,
a service set identifier selecting section selecting, when a plurality of service set identifier candidates having the same identification information are stored in the memory, one service set identifier from the plurality of candidates based on a the priority information,
an IP address acquiring section acquiring the IP address of the first terminal from the selected service set identifier, and
a communicating section making a connection to the first terminal by using the acquired IP address.
2. The wireless communication system according to claim 1 , wherein
a firewall is set in the second terminal, and
the communicating section establishes wireless communication between the first and second terminals by transmitting a unicast packet including the IP addresses of the first and second terminals to the first terminal and receiving a response to the unicast packet from the first terminal.
3. The wireless communication system according to claim 1 , wherein
the service set identifier includes check information for checking correctness of the service set identifier.
4. The wireless communication system according to claim 1 , wherein
the first and second terminals each store an address series table for establishing correspondence between IP address related information and the IP address.
5. A wireless communication device performing communication between first and second terminals, comprising:
an identification information storing section storing identification information of the first terminal;
an IP address storing section storing an IP address of the first terminal;
a service set identifier generating section generating a service set identifier by using priority information indicating priority of wireless connection, the identification information, and the IP address;
a priority information updating section updating the priority information responsive to the service set identifier generating section generating a new service set identifier; and
a beacon signal generating section generating a beacon signal including the service set identifier.
6. A projector projecting an image corresponding to received data, comprising:
the wireless communication device according to claim 5 , the wireless communication device for receiving the data;
a CPU converting the received data into projection data; and
an image projection mechanism projecting an image based on the projection data.
7. A wireless communication method for performing communication between first and second terminals, comprising:
sending a beacon signal including a service set identifier including IP address related information related to an IP address of the first terminal, priority information indicating priority of wireless connection, and identification information of the first terminal;
updating the priority information responsive to a new service set identifier being generated;
acquiring the service set identifier from the beacon signal and storing the service set identifier in memory of the second terminal as a candidate for selection;
when a plurality of service set identifier candidates having the same identification information are stored in the memory,
selecting one service set identifier from the plurality of candidates based on the priority information;
acquiring the IP address of the first terminal from the IP address related information of the selected service set identifier; and
making a connection to the first terminal by using the acquired IP address.
8. The wireless communication method according to claim 7 , wherein
the second terminal
sets a firewall,
transmits a unicast packet including the IP addresses of the first and second terminals to the first terminal, and
establishes wireless communication between the first and second terminals by receiving a response to the unicast packet from the first terminal.
9. The wireless communication method according to claim 7 , wherein
the service set identifier includes check information for checking correctness of the service set identifier.
10. The wireless communication method according to claim 7 , wherein
the first and second terminals establish correspondence between the IP address related information and the IP address.
11. The wireless communication system according to claim 1 , wherein the priority information updating section sets the priority information to zero when the IP address is changed and the priority field has acquired a predetermined value.
12. The wireless communication system according to claim 1 , wherein the priority is calculated as being an absolute value of a difference between a first SSID priority value and a second SSID priority value.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/589,346 US20150110100A1 (en) | 2010-03-09 | 2015-01-05 | Wireless communication system, wireless communication device, projector, and wireless communication method |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2010-051460 | 2010-03-09 | ||
JP2010051460A JP5293649B2 (en) | 2010-03-09 | 2010-03-09 | Wireless communication system, wireless communication terminal, and wireless communication method |
US13/022,041 US8958402B2 (en) | 2010-03-09 | 2011-02-07 | Wireless communication system, wireless communication device, projector, and wireless communication method |
US14/589,346 US20150110100A1 (en) | 2010-03-09 | 2015-01-05 | Wireless communication system, wireless communication device, projector, and wireless communication method |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/022,041 Continuation US8958402B2 (en) | 2010-03-09 | 2011-02-07 | Wireless communication system, wireless communication device, projector, and wireless communication method |
Publications (1)
Publication Number | Publication Date |
---|---|
US20150110100A1 true US20150110100A1 (en) | 2015-04-23 |
Family
ID=44559916
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/022,041 Active 2033-12-17 US8958402B2 (en) | 2010-03-09 | 2011-02-07 | Wireless communication system, wireless communication device, projector, and wireless communication method |
US14/589,346 Abandoned US20150110100A1 (en) | 2010-03-09 | 2015-01-05 | Wireless communication system, wireless communication device, projector, and wireless communication method |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/022,041 Active 2033-12-17 US8958402B2 (en) | 2010-03-09 | 2011-02-07 | Wireless communication system, wireless communication device, projector, and wireless communication method |
Country Status (2)
Country | Link |
---|---|
US (2) | US8958402B2 (en) |
JP (1) | JP5293649B2 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107592679A (en) * | 2016-07-06 | 2018-01-16 | 精工爱普生株式会社 | Wireless communication system and wireless communication device |
US10372386B2 (en) | 2015-04-10 | 2019-08-06 | Canon Kabushiki Kaisha | Communication apparatus, method of controlling the same, and storage medium |
US11468392B2 (en) * | 2017-04-05 | 2022-10-11 | Icontrol, Inc. | Methods, systems, and communication protocols for proximity monitoring mobile network and associated methods |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8830872B2 (en) * | 2011-04-08 | 2014-09-09 | Texas Instruments Incorporated | Network configuration for devices with constrained resources |
EP2708053A4 (en) * | 2011-05-13 | 2014-11-19 | Blackberry Ltd | Automatic access to network nodes |
KR101797039B1 (en) * | 2011-08-31 | 2017-11-13 | 삼성전자주식회사 | Method for wireless connecting among at least two devices and device capable wireless connection using it |
KR101915314B1 (en) | 2011-10-25 | 2018-11-07 | 삼성전자주식회사 | Method and apparatus for wi-fi connecting using wi-fi protected setup in a portable terminal |
US9814085B2 (en) * | 2011-10-28 | 2017-11-07 | Qualcomm, Incorporated | Systems and methods for fast initial network link setup |
JP2013222991A (en) | 2012-04-12 | 2013-10-28 | Ricoh Co Ltd | Radio communication system, radio communication method, and radio terminal device |
JP6241033B2 (en) * | 2012-12-27 | 2017-12-06 | 株式会社リコー | Information input device, information output device, information processing system, and program |
JP6263962B2 (en) * | 2013-03-05 | 2018-01-24 | 株式会社リコー | COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM |
US9728227B2 (en) * | 2013-07-24 | 2017-08-08 | Ricoh Company, Ltd. | Display system, information terminal, display device, and recording medium |
JP5660242B1 (en) | 2013-09-06 | 2015-01-28 | 株式会社リコー | Communication system, communication control system, communication apparatus, communication method, and connection program |
JP5660241B1 (en) | 2013-09-10 | 2015-01-28 | 株式会社リコー | Communication system, communication control system, communication apparatus, communication method, and connection program |
US9608859B2 (en) * | 2013-10-25 | 2017-03-28 | Aruba Networks, Inc. | System, apparatus and method for reducing failover time through redundancy using virtual access points |
CN107240369B (en) * | 2014-09-08 | 2019-11-22 | 上海和煦展览有限公司 | Using the projection control system of the projector of soft AP control |
US11696216B2 (en) | 2016-02-18 | 2023-07-04 | Comcast Cable Communications, Llc | SSID broadcast management to support priority of broadcast |
CN106792679A (en) * | 2016-11-25 | 2017-05-31 | 迈普通信技术股份有限公司 | A kind of wireless communications method and system |
WO2018220817A1 (en) | 2017-06-02 | 2018-12-06 | Necディスプレイソリューションズ株式会社 | Electronic device, wireless lan terminal and wireless lan system |
JP6984213B2 (en) * | 2017-07-31 | 2021-12-17 | セイコーエプソン株式会社 | Terminal devices, processing systems, programs, and control methods for terminal devices |
JP6547820B2 (en) * | 2017-12-14 | 2019-07-24 | ブラザー工業株式会社 | Communication device |
US11032143B2 (en) | 2018-08-03 | 2021-06-08 | Netapp, Inc. | Assignment of network configuration for a wired network using a wireless network |
KR101982199B1 (en) * | 2018-10-30 | 2019-05-24 | 삼성전자주식회사 | Method and apparatus for wi-fi connecting using wi-fi protected setup in a portable terminal |
KR102045944B1 (en) * | 2019-05-20 | 2019-11-18 | 삼성전자주식회사 | Method and apparatus for wi-fi connecting using wi-fi protected setup in a portable terminal |
KR102181159B1 (en) * | 2019-11-12 | 2020-11-20 | 삼성전자주식회사 | Method and apparatus for wi-fi connecting using wi-fi protected setup in a portable terminal |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030026211A1 (en) * | 1999-12-31 | 2003-02-06 | Lin Xu | Packet routing in a multi-bearer-type network |
US20040179488A1 (en) * | 2003-03-13 | 2004-09-16 | Samsung Electronics Co., Ltd. | Resynchronization method in wireless ad-hoc network environments |
US20050036509A1 (en) * | 2003-06-03 | 2005-02-17 | Shrikant Acharya | Wireless presentation system |
US20060014537A1 (en) * | 2004-06-22 | 2006-01-19 | Takashi Arai | Wireless LAN communication system, wireless LAN connection method, and wireless LAN terminal apparatus |
US20060023693A1 (en) * | 2003-01-21 | 2006-02-02 | Lenovo ( Singapore) Pte. Ltd. | Information processing apparatus, communication control method, and communication control program |
US20060221858A1 (en) * | 2005-04-01 | 2006-10-05 | Microsoft Corporation | User experience for collaborative ad-hoc networks |
US20060221901A1 (en) * | 2005-04-01 | 2006-10-05 | Toshiba America Research, Inc. | Autonomous and heterogeneous network discovery and reuse |
US20070171910A1 (en) * | 2005-10-05 | 2007-07-26 | Ravi Kumar | Peer-to-peer communication in ad hoc wireless network |
US20100111057A1 (en) * | 2007-03-15 | 2010-05-06 | Panasonic Corporation | Wireless communication device and access point connection method |
US7720021B1 (en) * | 2006-03-30 | 2010-05-18 | Sprint Spectrum L.P. | Method and system for setting up a call to a mobile station via another mobile station |
US8391260B1 (en) * | 2009-06-22 | 2013-03-05 | Marvell International Ltd | Power management systems and methods for peer-to-peer network devices |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100893070B1 (en) * | 2002-09-19 | 2009-04-17 | 엘지전자 주식회사 | Method and apparatus for providing and receiving multicast service in a radio communication system |
US7350077B2 (en) * | 2002-11-26 | 2008-03-25 | Cisco Technology, Inc. | 802.11 using a compressed reassociation exchange to facilitate fast handoff |
US7603710B2 (en) * | 2003-04-03 | 2009-10-13 | Network Security Technologies, Inc. | Method and system for detecting characteristics of a wireless network |
US7668126B2 (en) * | 2004-02-05 | 2010-02-23 | Texas Instruments Incorporated | Beacon coordination and medium access |
JP4607477B2 (en) | 2004-03-12 | 2011-01-05 | 日本碍子株式会社 | Film pasting machine |
US7768943B1 (en) * | 2004-03-25 | 2010-08-03 | Verizon Corporate Services Group Inc. | No-sight routing for ad-hoc networks |
JP3698711B1 (en) | 2004-05-07 | 2005-09-21 | 株式会社ソニー・コンピュータエンタテインメント | Network identifier setting method, communication method, and wireless communication terminal device |
EP1599062B1 (en) * | 2004-05-17 | 2017-04-19 | Samsung Electronics Co., Ltd. | Fast handover method for IEEE 802.11 wireless LAN networks |
EP1615380A1 (en) * | 2004-07-07 | 2006-01-11 | Thomson Multimedia Broadband Belgium | Device and process for wireless local area network association |
JP2006254301A (en) * | 2005-03-14 | 2006-09-21 | Fuji Xerox Co Ltd | Ip address setting system |
US7717342B2 (en) * | 2005-08-26 | 2010-05-18 | Hand Held Products, Inc. | Data collection device having dynamic access to multiple wireless networks |
EP1804424A1 (en) * | 2005-12-27 | 2007-07-04 | THOMSON Licensing | Method for dynamically selecting a channel in a wireless local area network |
JP4840230B2 (en) * | 2007-03-30 | 2011-12-21 | ブラザー工業株式会社 | Wireless network system and wireless device for configuring the same |
US8358638B2 (en) * | 2007-05-24 | 2013-01-22 | Wefi, Inc. | Dynamically created and expanded wireless network |
JP4425298B2 (en) * | 2007-08-01 | 2010-03-03 | 富士通株式会社 | Packet routing control method, packet routing control program, terminal device, and VPN server |
US20090073943A1 (en) * | 2007-08-17 | 2009-03-19 | Qualcomm Incorporated | Heterogeneous wireless ad hoc network |
US9084231B2 (en) * | 2008-03-13 | 2015-07-14 | Qualcomm Incorporated | Methods and apparatus for acquiring and using multiple connection identifiers |
-
2010
- 2010-03-09 JP JP2010051460A patent/JP5293649B2/en not_active Expired - Fee Related
-
2011
- 2011-02-07 US US13/022,041 patent/US8958402B2/en active Active
-
2015
- 2015-01-05 US US14/589,346 patent/US20150110100A1/en not_active Abandoned
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030026211A1 (en) * | 1999-12-31 | 2003-02-06 | Lin Xu | Packet routing in a multi-bearer-type network |
US20060023693A1 (en) * | 2003-01-21 | 2006-02-02 | Lenovo ( Singapore) Pte. Ltd. | Information processing apparatus, communication control method, and communication control program |
US20040179488A1 (en) * | 2003-03-13 | 2004-09-16 | Samsung Electronics Co., Ltd. | Resynchronization method in wireless ad-hoc network environments |
US20050036509A1 (en) * | 2003-06-03 | 2005-02-17 | Shrikant Acharya | Wireless presentation system |
US20060014537A1 (en) * | 2004-06-22 | 2006-01-19 | Takashi Arai | Wireless LAN communication system, wireless LAN connection method, and wireless LAN terminal apparatus |
US20060221858A1 (en) * | 2005-04-01 | 2006-10-05 | Microsoft Corporation | User experience for collaborative ad-hoc networks |
US20060221901A1 (en) * | 2005-04-01 | 2006-10-05 | Toshiba America Research, Inc. | Autonomous and heterogeneous network discovery and reuse |
US20070171910A1 (en) * | 2005-10-05 | 2007-07-26 | Ravi Kumar | Peer-to-peer communication in ad hoc wireless network |
US7720021B1 (en) * | 2006-03-30 | 2010-05-18 | Sprint Spectrum L.P. | Method and system for setting up a call to a mobile station via another mobile station |
US20100111057A1 (en) * | 2007-03-15 | 2010-05-06 | Panasonic Corporation | Wireless communication device and access point connection method |
US8391260B1 (en) * | 2009-06-22 | 2013-03-05 | Marvell International Ltd | Power management systems and methods for peer-to-peer network devices |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10372386B2 (en) | 2015-04-10 | 2019-08-06 | Canon Kabushiki Kaisha | Communication apparatus, method of controlling the same, and storage medium |
US10552097B2 (en) | 2015-04-10 | 2020-02-04 | Canon Kabushiki Kaisha | Communication apparatus, method of controlling the same, and storage medium |
US10599368B2 (en) | 2015-04-10 | 2020-03-24 | Canon Kabushiki Kaisha | Communication apparatus, method of controlling the same, and storage medium |
US10901662B2 (en) | 2015-04-10 | 2021-01-26 | Canon Kabushiki Kaisha | Communication apparatus, method of controlling the same, and storage medium |
CN107592679A (en) * | 2016-07-06 | 2018-01-16 | 精工爱普生株式会社 | Wireless communication system and wireless communication device |
US11468392B2 (en) * | 2017-04-05 | 2022-10-11 | Icontrol, Inc. | Methods, systems, and communication protocols for proximity monitoring mobile network and associated methods |
Also Published As
Publication number | Publication date |
---|---|
JP5293649B2 (en) | 2013-09-18 |
CN102196418A (en) | 2011-09-21 |
US8958402B2 (en) | 2015-02-17 |
US20110222518A1 (en) | 2011-09-15 |
JP2011188238A (en) | 2011-09-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8958402B2 (en) | Wireless communication system, wireless communication device, projector, and wireless communication method | |
US7313111B2 (en) | Method and apparatus for indicating service set identifiers to probe for | |
CN103379589B (en) | Wireless communication system, wireless communications method and wireless terminal | |
US7440424B2 (en) | Apparatus and method for detecting duplicate IP addresses in mobile ad hoc network environment | |
US9722979B2 (en) | System and method for automatic wireless connection between a portable terminal and a digital device | |
US9094897B2 (en) | Communication apparatus and control method thereof | |
CN111432044B (en) | Multi-link equipment MAC address management method and device and multi-link equipment | |
US20080276303A1 (en) | Network Type Advertising | |
EP3111701B1 (en) | Access point initiated neighbor report request | |
US9370031B2 (en) | Wireless network setup and configuration distribution system | |
US20190104422A1 (en) | System and Method for Easy Configuration and Authentication of Network Devices | |
TWI508609B (en) | Network configuration method and wireless networking system | |
US20160183176A1 (en) | Service discovery technique in wireless communication network for forming p2p group | |
CN112636901B (en) | Identity recognition method, device, storage medium and electronic equipment | |
CN104125568A (en) | Wireless access point safe authentication method and system | |
US9113449B2 (en) | Apparatus for managing network zone having plurality of wireless access points, method of connecting mobile terminal to wireless access point by the apparatus, and the mobile terminal | |
US20180063773A1 (en) | System and method of anqp querying using a common anqp group version | |
JP4836537B2 (en) | Radio base station apparatus and communication parameter setting method for radio base station apparatus | |
WO2004088936A2 (en) | Discovering proximate apparatuses and services in a wireless network | |
CN106713287A (en) | Method, apparatus and system for automatically registering wireless access point | |
CN115190275A (en) | Network video recorder, video monitoring system and video monitoring method | |
US20240015468A1 (en) | System and method for generating a map of a line array of loudspeakers assemblies | |
CN113037704B (en) | Detection device and detection method | |
CN102196418B (en) | Wireless communication system, radio communication device, projector and wireless communications method | |
JP2006074450A (en) | Ad hoc multi-hop communication system, its wireless terminal, and ad hoc multi-hop network connection method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |