WO2008140325A2 - Procédés et dispositifs pour initier un transfert, découverte de points d'accès candidats et initiation d'authentification d'un terminal sans fil dans un réseau sans fil - Google Patents

Procédés et dispositifs pour initier un transfert, découverte de points d'accès candidats et initiation d'authentification d'un terminal sans fil dans un réseau sans fil Download PDF

Info

Publication number
WO2008140325A2
WO2008140325A2 PCT/NO2008/000166 NO2008000166W WO2008140325A2 WO 2008140325 A2 WO2008140325 A2 WO 2008140325A2 NO 2008000166 W NO2008000166 W NO 2008000166W WO 2008140325 A2 WO2008140325 A2 WO 2008140325A2
Authority
WO
WIPO (PCT)
Prior art keywords
access point
identification
wireless
frame
wireless terminal
Prior art date
Application number
PCT/NO2008/000166
Other languages
English (en)
Other versions
WO2008140325A3 (fr
Inventor
Paal Engelstad
Original Assignee
Telenor Asa
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telenor Asa filed Critical Telenor Asa
Publication of WO2008140325A2 publication Critical patent/WO2008140325A2/fr
Publication of WO2008140325A3 publication Critical patent/WO2008140325A3/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/08Reselecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys

Definitions

  • the present invention relates in general to the technical field of wireless local area networks.
  • a first aspect of the invention relates to methods and devices for initiating/performing handover of a wireless terminal operating in a wireless local area network, from a first access point to a second access point.
  • a second aspect of the invention relates to methods and devices for discovering candidate access points in a wireless local area network.
  • a third aspect of the invention relates to methods and devices for initiating authentication of a wireless terminal with an access point in a wireless local area network.
  • WLANs Wireless local area networks
  • WLANs are increasingly used in offices, industry, public areas and homes.
  • IEEE 802.11 General background of the present invention is provided in the IEEE 802.11 specification, including its subsequent amendments, such as the IEEE 802.1 Ia, 802.11b, 802.1 Ig, 802.1 Ii, 802.1 In, 802.1 Iu, 802.1 Iv, and more.
  • a wireless terminal Before a wireless terminal can associate with an AP in order to connect to a wireless local area network, it has to detect or discover the basic service set and extended service set it belongs to.
  • Several solutions to this problem have been previously presented in the IEEE 802.11 specification, including its amendments.
  • a wireless terminal may scan the surrounding area in order to discover candidate access points, i.e. possible access points with which the terminal can associate.
  • the wireless terminal may also build a list of candidate access points within its wireless range.
  • the invention relates to methods and devices for initiating/performing handover of a wireless terminal operating in a wireless local area network from a first access point to a second access point.
  • the present invention relates to a method and a wireless terminal for discovering candidate access points in a wireless local area network, as well as a method and an access point for identifying candidate access points in a wireless local area network.
  • the present invention relates to methods and devices for initiating authentication of a wireless terminal with an access point in a wireless local area network.
  • the present invention is defined by the appended claims 1-118.
  • FIG. 1 is a schematic block diagram illustrating a basic wireless local area network structure
  • Fig. 2 includes flow charts illustrating a method in a wireless terminal for obtaining data communication access and a method for initiating handover of a wireless terminal from a first, initiating access point to a second, target access point;
  • Fig. 3 includes flow charts illustrating a method in a wireless terminal for obtaining data communication access, and a method for initiating handover of a wireless terminal from a first, initiating access point to a second, target access point;
  • Fig. 4 is a schematic flow chart illustrating exemplary details of a timeout/check submethod
  • Fig. 5 is a schematic diagram illustrating the principles of an exemplary frame structure applicable for the handover of a wireless terminal from a first, initiating access point to a second, target access point;
  • Fig. 6 is a schematic diagram illustrating exemplary details of the frame structure illustrated in fig. 5;
  • Fig. 7 is a schematic diagram illustrating exemplary details of the frame structure illustrated in fig. 5;
  • Fig. 8 is a schematic diagram illustrating exemplary details of the frame structure illustrated in fig. 5;
  • Fig. 9 is a schematic diagram illustrating exemplary details of the frame structure illustrated in fig. 5;
  • Fig. 10 is a schematic flow chart illustrating a first embodiment of a method for discovering candidate access points in a wireless local area network
  • Fig. 11 is a schematic flow chart illustrating a second embodiment of a method for discovering candidate access points in a wireless local area network
  • Fig. 12 is a schematic flow chart illustrating a third embodiment of a method for discovering candidate access points in a wireless local area network
  • Fig. 13 is a schematic flow chart illustrating a fourth embodiment of a method for discovering candidate access points in a wireless local area network
  • Fig. 14 is a schematic diagram illustrating the principles of an exemplary frame structure applicable for the first and the second embodiments of a method for discovering candidate access points
  • Fig. 15 is a schematic diagram illustrating the principles of an alternative, exemplary frame structure applicable for the first and the second embodiments of a method for discovering candidate access points;
  • Fig. 16 is a schematic diagram illustrating the principles of an exemplary frame structure applicable for the third and fourth embodiments of a method for discovering candidate access points;
  • Fig. 17 is a schematic diagram illustrating exemplary details of the frame structure illustrated in fig. 16;
  • Fig. 18 is a schematic diagram illustrating alternative exemplary details of the frame structure illustrated in fig. 16;
  • Fig. 19 is a schematic diagram illustrating further principles of a frame structure applicable for a method for discovering candidate access points;
  • Fig. 20 is a schematic diagram illustrating further principles of a frame structure applicable for embodiments of the invention.
  • Fig. 21 is a schematic flow chart illustrating a method performed by a wireless terminal in a wireless local area network for initiating authentication of the wireless terminal with an access point;
  • Fig. 22 is a schematic flow chart illustrating a method performed by an access point in a wireless local area network for initiating authentication of a wireless terminal with the access point
  • Fig. 23 is a schematic diagram illustrating the principles of an exemplary frame structure applicable for an embodiment of a method for initiating the authentication of a wireless terminal with an access point
  • Fig. 24 is a schematic diagram illustrating the principles of an exemplary frame structure applicable for an embodiment of a method for initiating the authentication of a wireless terminal with an access point.
  • the present disclosure has been provided in terms of wireless local area network technology that conforms to the IEEE 802.11 specification. Although the embodiments may be implemented and used in completely or partly conformity with the IEEE 802.11 specification and its existing and future amendments, the invention is not necessarily restricted to this specification.
  • wireless terminal includes, but is not limited to, a “station” (STA) as defined in the IEEE 802.11 specification.
  • STA station
  • the "wireless terminal” has been used in the present disclosure in the meaning "non-AP STA", i.e. an IEEE 802.11 station which is not also an access point.
  • a wireless terminal may be embodied as a portable personal computer, including a laptop, a notebook, a handheld computer such as a PDA, or a mobile telephone or smartphone with WLAN capabilities, an IP phone, etc.
  • a wireless terminal may also be embodied as a stationary computer device such as a desktop or workstation computer provided with WLAN capabilities.
  • wireless local area network communication adapter includes, but is not limited to, a wireless network card for external or internal use, a USB-dongle, etc.
  • the term "access point” includes, but is not limited to, an access point as defined by the IEEE 802.11 specification, i.e. any entity that has station functionality and provides access to the distribution system via the wireless medium for associated stations.
  • the access point thus has the function of connecting wireless communication devices (such as wireless terminals) together to form a wireless network, and in particular to form a basic service set in such a network.
  • An access point may be physical or virtual.
  • a virtual access point is a logical entity that exists within a physical access point.
  • a single physical access point may support multiple virtual access points.
  • Each virtual access point appears to stations/terminals to be an independent physical access point, even though only a single physical access point is present.
  • Other terms and phrases used in the following detailed description include, but are not necessarily limited to, their definitions in the IEEE 802.11 specification, or their interpretation as recognized by a skilled person within the field of wireless communication network technology.
  • Fig. 1 is a schematic block diagram illustrating a basic wireless local area network structure.
  • a wired LAN segment 150 operates as a distribution system which communicatively interconnects a first wireless access point (AP) 100 and a second wireless access point (AP) 110.
  • the distribution system may comprise a wired network segment.
  • the first 100 and the second 1 10 access points may alternatively be interconnected by means of a wireless link (not shown).
  • Fig. 1 also schematically shows a server 160 connected to the LAN segment 150. Consistent with the invention, any type and number of network elements such as bridges routers, hubs, gateways etc. may alternatively or additionally be connected to the LAN segment 150, interconnecting the segment with additional network structures.
  • a first wireless terminal 102 and a second wireless terminal 104 are communicatively connected to the first access point 100.
  • the first 102 and second 104 wireless terminals and the first access point 100 constitute a first basic service set (BSS) 120.
  • the first 102 and second 104 wireless terminals operate as non- access point Stations, i.e. clients, in the first basic service set 120.
  • the first basic service set 120 is identified by a first, globally unique basic service set identifier, BSSID.
  • a third wireless terminal 112 and a fourth wireless terminal 114 are communicatively connected to the second access point 1 10.
  • the third 112 and fourth 114 wireless terminals and the second access point 110 constitute a second basic service set (BSS) 130.
  • the third 1 12 and fourth 1 14 wireless terminals operate as non-access point stations, i.e. clients, in the second basic service set 130.
  • the second basic service set 120 is identified by a second, globally unique basic service set identifier, BSSID.
  • the interconnected first basic service set 120 and second basic service set 130 form an extended service set (ESS) 140.
  • ESS extended service set
  • the extended service set 140 is identified by a service set identifier.
  • service set identifier (or “SSID”) used in this document, includes, but is not limited to, an SSID as defined by the IEEE 802.1 1 specification, which is also referred to as "ESSID” by some vendors and authors.
  • service set identifier (or “SSID") used in this document, includes, but is not limited to, an ESSID as defined by the current draft version or future versions of the IEEE 802.1 Iu amendment.
  • service set identifier (or “SSID”) used in this document, includes, but is not limited to, a combination of the SSID and ESSID as defined by the IEEE 802.11 specification or any current or future amendments to this specification.
  • a basic service set may be thought of as including one (physical or virtual) access point and the stations present in its coverage area.
  • two stations that communicate with each other may also be considered a basic service set.
  • An extended service set may be thought of as including one or more (physical and/or virtual) access points that are somehow associated with each other (e.g. at the data link level) such that they appear as a single service.
  • the stations present in the coverage area of any of the associated access points may also be considered part of the extended service set.
  • Wireless local networks applicable with embodiments of the present invention may have several basic modes of operation, including the Infrastructure mode that is used in an Infrastructure Basic Service Set (BSS) and the Ad hoc mode that is used in an Independent Basic Service Set (IBSS).
  • BSS Infrastructure Basic Service Set
  • IBSS Independent Basic Service Set
  • Infrastructure mode wireless terminals communicate through an access point that serves as bridge to an external network infrastructure.
  • Ad hoc mode peer-to-peer transmission between wireless terminals is allowed.
  • Embodiments of the present invention are applicable for Infrastructure mode, but other modes, including Ad hoc mode, should not necessarily be excluded from the principles and scope of the invention.
  • access points such as the access point 100 and the access point 110, or virtual access points embodied in one or both of the access points 100 and/or 110, may be configured to perform an initiation of a handover of a wireless terminal from a first access point in a first wireless network to a second access point in a second wireless network, such as a method as described by example below with reference to fig. 2 or 3 and further explained by example with reference to the present detailed description and figures.
  • the communication between an access point in the wireless local area network and a wireless terminal is enabled by means of, e.g., a wireless local area network communication adapter included in the wireless terminal.
  • the communication is enabled by means of, e.g., a wireless local area network communication adapter included in the access point.
  • the wireless local area network adapter included in the access point is adapted to perform a method for initiating a handover of a wireless terminal in a first wireless network to a second access point in a second wireless network, e.g. as described by example with reference to fig. 2 or fig. 3 and further explained by example with reference to the present detailed description and figures.
  • the access point may contain a wireless local area network communication adapter which is configured to perform such a method.
  • the WLAN communication adapter in the access point includes a processor for executing the method and a memory in which processor instructions are stored. The instructions are programmed to cause the processor to perform the disclosed method when they are executed by the processor.
  • the instructions may thus be tangibly embodied in the memory in the WLAN communication adapter, or they may be tangibly embodied in another memory, or on any computer-readable medium such as a hard disk drive or an optical disk.
  • embodiments of the present invention may be implemented - in its entirety or in part - by means of specially adapted hardware, e.g. programmable logic devices, such as field-programmable gate arrays, or by means of application- specific integrated circuits (ASICs), which may be incorporated in the communication adapter included in the access point.
  • ASICs application- specific integrated circuits
  • the wireless local area network adapter included in the wireless terminal is adapted to perform a method for obtaining data communication access, e.g. as described by example with reference to fig. 2 or fig. 3 and further explained by example with reference to the present detailed description and figures.
  • the wireless terminal may contain a wireless local area network communication adapter which is configured to perform such a method.
  • the WLAN communication adapter in the wireless terminal includes a processor for executing the method and a memory in which processor instructions are stored. The instructions are programmed to cause the processor to perform the disclosed method when they are executed by the processor.
  • the instructions may thus be tangibly embodied in the memory in the WLAN communication adapter, or they may be tangibly embodied in another memory, or on any computer-readable medium such as a hard disk drive or an optical disk.
  • embodiments of the present invention may be implemented - in its entirety or in part - by means of specially adapted hardware, e.g. programmable logic devices, such as field-programmable gate arrays, or by means of application- specific integrated circuits (ASICs), which may be incorporated in the communication adapter included in the wireless terminal.
  • ASICs application- specific integrated circuits
  • At least one wireless terminal such as the terminal 102, 104, 112 and/or 114 may be configured to perform a method for discovering candidate access points in the wireless local area network, such as a method as described by example with reference to the present detailed description and figures.
  • a candidate access point is an access point that is possibly available (for authentication/association) to a wireless terminal in a certain situation and/or location.
  • the communication between an access point in the wireless local area network and a wireless terminal is enabled by means of a wireless local area network communication adapter included in the wireless terminal.
  • the wireless local area network adapter included in the wireless terminal is adapted to perform a method for discovering candidate access points, such as a method as described by example with reference the present detailed description and figures.
  • the wireless terminal may contain a wireless local area network communication adapter which is configured to perform such a method.
  • the WLAN communication adapter includes a processor for executing the method and a memory in which processor instructions are stored. The instructions are programmed to cause the processor to perform the disclosed method when they are executed by the processor.
  • the instructions may thus be tangibly embodied in the memory in the WLAN communication adapter, or they may be tangibly embodied in another memory, or on any computer-readable medium such as a hard disk drive or an optical disk.
  • embodiments of the present invention may be implemented - in its entirety or in part - by means of specially adapted hardware, e.g.
  • FIGS. 10, 11, 12 and 13 illustrate exemplary embodiments of a method for discovering candidate access points in a wireless local area network. Certain aspects of various exemplary embodiments are described below:
  • a first wireless access point may be configured to identify candidate access points in a wireless local area network to wireless terminals, or stations, present in that network.
  • Each candidate access point may be represented by a basic service set identification, BSSID, and an extended service set identification, SSID.
  • the access point will have knowledge of its own BSSID and SSID. In addition it may obtain additional identification pairs, each pair including a first identification (BSSID) that identifies a basic service set, and a second identification (SSID) that identifies an extended service set. Each such identification pair may correspond to a candidate access point. The access point may then insert a number of such identification pairs into a frame and transmit the frame. Terminals that receive the frame will identify candidate access points by deriving the identification pairs from the frame.
  • BSSID first identification
  • SSID second identification
  • Terminals that receive the frame will identify candidate access points by deriving the identification pairs from the frame.
  • the number of identification pairs is 1. In other embodiments, the number is 2, 3, 4, or 5, respectively. Alternatively, the number may be any number larger than 5.
  • the identification pairs may then comprise a first, default identification pair, and a second, non-default identification pair.
  • the first, default identification pair may be associated with the first access point, and the second (and additional), non-default identification pair is associated with a second (and possibly third, fourth etc) access point.
  • the access points may be physical or virtual access points as defined above.
  • the candidate access points as well as the first access point may be virtual access points among a plurality of virtual access points implemented on a single physical access point node.
  • the transmitted frame may typically be a beacon frame, a probe response frame or an action frame, but the invention is not limited to only such types of frames.
  • a request frame may be received from a terminal in the local area network, and the first access point responds by transmitting a response frame including the identification pairs.
  • the response frame can then be received by the terminal in response to the request.
  • the request frame may e.g. be a probe request frame or an action frame and the response frame may be a probe response frame or an action frame, but the invention is not limited to only such types of frames. If a second access point identified by a non-default identification pair is a virtual access point configured on the same physical device as said first access point (i.e. on a physical access point capable of hosting multiple access points), the first access point will readily have information about the BSSID and the SSID of the second access point.
  • each such virtual access point may have different SSIDs, but they do not have to have different SSIDs. Also, they may have, but do not have to have, different BSSIDs.
  • the present invention allows for any combination of virtual access points with different BSSIDs and SSIDs, the same BSSID but different SSIDs, different BSSIDs but the same SSID, or the same BSSID and the same SSID.
  • a basic service set with its corresponding BSSID, may be associated with a physical access point where a plurality of virtual access points have the same BSSID, or that each virtual access point configured on a physical access point have different BSSIDs. In the latter case, we may refer to the basic service set associated with a virtual access point as a virtual basic service set.
  • the second access point is a different physical access point from the first access point, it may, or may not, be associated with the same extended service set as said first access point. If it is, the two access points will typically have the same SSID, but different BSSIDs. If it is not, both SSID and BSSID will typically be different.
  • An access point operating in accordance with the invention may further be configured with knowledge about neighboring access points, and a terminal on the network may be able to learn about neighboring access points by retrieving the information from the current access point with which it is communicating.
  • the access points may share the same SSID, or they may have different SSIDs. In either case the access points may be configured to exchange information regarding each other's SSIDs and BSSIDs according to predefined criteria. Alternatively, such information may be provided to access points operating in accordance with the invention when the network is configured, or when the access point is configured and added to the network.
  • An access point configured with such knowledge of neighbouring access points may, of course, also be the host of a plurality of virtual access points.
  • This means that an extended service set may consist of one or more basic service sets where any one or more of these basic service sets may be a virtual basic service set as defined above.
  • At least one wireless terminal such as the terminal 102, 104, 112 and/or 114 may be configured to perform a method for initiating authentication of the wireless terminal, such as a method as described by example below with reference to fig. 21 and further explained by example with reference to the present detailed description and figures.
  • At least one access point such as the access point 100 and/or the access point 110 may be configured to perform a method for initiating authentication of the wireless terminal, such as a method as described by example below with reference to fig. 22 and further explained by example with reference to the present detailed description and figures.
  • the communication between an access point in the wireless local area network and a wireless terminal is enabled by means of, i.a., a wireless local area network communication adapter included in the wireless terminal.
  • the communication is enabled by means of, i.a., a wireless local area network communication adapter included in the access point.
  • the wireless local area network adapter included in the wireless terminal is adapted to perform a method for initiating authentication of the wireless terminal, e.g. as described by example with reference to fig. 21 and further explained by example with reference to the present detailed description and figures.
  • the wireless terminal may contain a wireless local area network communication adapter which is configured to perform such a method.
  • the WLAN communication adapter includes a processor for executing the method and a memory in which processor instructions are stored. The instructions are programmed to cause the processor to perform the disclosed method when they are executed by the processor.
  • the instructions may thus be tangibly embodied in the memory in the WLAN communication adapter, or they may be tangibly embodied in another memory, or on any computer-readable medium such as a hard disk drive or an optical disk.
  • embodiments of the present invention may be implemented - in its entirety or in part - by means of specially adapted hardware, e.g.
  • the wireless local area network adapter included in the access point is adapted to perform a method for initiating authentication of the wireless terminal, e.g. as described by example with reference to fig. 22 and further explained by example with reference to the present detailed description and figures.
  • access point may contain a wireless local area network communication adapter which is configured to perform such a method.
  • the WLAN communication adapter in the access point includes a processor for executing the method and a memory in which processor instructions are stored.
  • the instructions are programmed to cause the processor to perform the disclosed method when they are executed by the processor.
  • the instructions may thus be tangibly embodied in the memory in the WLAN communication adapter, or they may be tangibly embodied in another memory, or on any computer-readable medium such as a hard disk drive or an optical disk.
  • embodiments of the present invention may be implemented - in its entirety or in part - by means of specially adapted hardware, e.g. programmable logic devices, such as field- programmable gate arrays, or by means of application-specific integrated circuits (ASICs), which may be incorporated in the communication adapter included in the access point. Exemplary methods and devices for initiating handover of a wireless terminal, in accordance with the invention, will now be described.
  • Fig. 2 includes three schematic flow charts illustrating methods/steps involved in the handover of a wireless terminal operating in a wireless local area network from a first, initiating access point to a second, target access point.
  • the vertical arrows illustrate transitions between steps performed by a network element, more particularly the wireless terminal (a), the first, initiating access point (b) and the second, target access point (c).
  • the horizontal, dotted lines schematically represent data flow between the network elements.
  • the arrows of the horizontal, dotted lines indicate a normal direction of data flow.
  • a bidirectional arrow indicates that the data flow will normally comprise messages traveling in either direction.
  • the wireless terminal has been denoted by STA.
  • the first access point is denoted API
  • the second access point is denoted AP2.
  • the first access point, the second access point or both may be virtual access points.
  • the first and the second access points are virtual access points implemented on a single physical access point.
  • the first wireless network is identified by a first extended service set identifier and the second wireless network is identified by a second extended service set identifier.
  • the first wireless network is an unsecured wireless local area network (WLAN) and the second wireless network is a secured wireless local area network (WLAN).
  • the first wireless network provides restricted access to a limited set of network services and the second wireless network provides access to a full set of network services.
  • the initiating step 200 initiates a method in a wireless terminal for obtaining data communication access.
  • Corresponding steps performed by the first access point are initiated by the initiating step 300.
  • Corresponding steps performed by the second access point are initiated by the initiating step 400.
  • step 201 performed by the wireless terminal, a communication is established between the wireless terminal and the first access point in the first wireless network. More specifically, the wireless terminal may be associated with the first access point. Alternatively, the wireless terminal may have been associated with the first access point in a previous step which has not been illustrated.
  • a corresponding step 301 is performed by the first access point, establishing communication with the wireless terminal. More specifically, the first access point may associate the wireless terminal in step 301. Alternatively, the wireless terminal may have been associated with the first access point in a previous step which has not been illustrated.
  • step 310 the first access point establishes that the wireless terminal is to be handed over to the second access point.
  • a handover instruction is composed.
  • the composed handover instruction will be transmitted to the wireless terminal in order to initiate handover to the second access point.
  • the composing step 320 comprises including in the handover instruction information that identifies the second access point.
  • the information that identifies the second access point includes an extended service set identifier of the second wireless network.
  • This identification may e.g. be an SSID in conformity with the IEEE 802.11 specification, or another service set identifier as described below.
  • the information identifying said second access point includes a basic service set identifier, or a media access control (MAC) address, or both, of the second, target access point.
  • the basic service set identifier may be a BSSID in conformity with the IEEE 802.11 specification, or another basic service set identifier as described below.
  • the wireless terminal may choose any preferable access point in the target extended service set.
  • the handover instruction may include the BSSID of the target access point. Moreover, the inclusion of the BSSID in the handover instruction may remove the need for the wireless terminal to perform a subsequent discovery of the second target access point.
  • Step 320 of composing the handover instruction may comprise to embody the handover instruction as a single data frame, such as an IEEE 802.1 1 Action frame, e.g. as further illustrated below with reference to figures 5-9.
  • a single data frame such as an IEEE 802.1 1 Action frame, e.g. as further illustrated below with reference to figures 5-9.
  • Step 320 of composing the handover instruction may comprise authentication information in the handover instruction.
  • authentication information may comprise security information, such as information about security/encryption schemes, e.g. WPA or WP A2, (Wi-Fi Protected Access), WEP (Wired Equivalent Privacy), No Encryption, Message Integrity, or 802.11 Authentication.
  • security information such as information about security/encryption schemes, e.g. WPA or WP A2, (Wi-Fi Protected Access), WEP (Wired Equivalent Privacy), No Encryption, Message Integrity, or 802.11 Authentication.
  • the authentication information may also specify primary methods for authentication such as Captive Web portal authentication (also known as Sticky Page Authentication), or EAP-based (Extensible Authentication Protocol) authentication using WPA/WPA2 or IEEE 802. Ix.
  • the authentication information may also, or alternatively, comprise specification of secondary authentication methods, such as the type of EAP method that is supported (in case of EAP based authentication), information that indicates if the authentication is based on certificates or other credentials, such as passwords, etc.
  • Step 320 of composing the handover instruction may comprise including in the handover instruction information representing the remaining time period the wireless terminal is allowed to be connected to said first access point.
  • the method may further comprise the step of handing over to the second access point when the remaining time, identified by content for the handover instruction, has elapsed.
  • Such timeout/check steps may further involve the use of disassociation and/or de-authentication instructions, and will be described in closer detail below with reference to a timeout/check submethod illustrated in fig. 4.
  • step 330 the handover instruction composed in step 320 is transmitted to the wireless terminal.
  • the handover instruction is received from the first access point.
  • the wireless terminal then transmits a request to the second wireless network to establish communication over the second access point.
  • step 220 is performed by the wireless terminal for authenticating with the second access point.
  • the transmission of a request to the second wireless network to establish communication over the second access point is a part of the authenticating step 220.
  • the second access point performs step 410 of authenticating the wireless terminal.
  • the authentication process may include steps in which the wireless terminal and access point are not successfully authenticated with each other unless the wireless terminal is able to prove to the access point that it is holding sufficient credentials to be authenticated and/or unless the access point is able to prove to the wireless terminal that it is holding sufficient credentials to be authenticated.
  • the authentication process may also include only a no-authentication approach, in which the wireless terminal and the access point is successfully authenticated with each other without any of them having to prove that they hold any credentials. Whether or not authentication is undertaken with the use of such a no-authentication approach is a matter of definition.
  • a no-authentication method may also be considered as a method for authentication.
  • step 420 of associating the wireless terminal is performed by the second access point.
  • step 230 is performed by the wireless terminal as the counterpart to step 420 in the second access point.
  • the wireless terminal associates with the second access point.
  • the transmission of a request to the second wireless network to establish communication over the second access point is a part of the authenticating step 220.
  • the transmission of a request to the second wireless network to establish communication over the second access point is a part of the association step 230. Subsequent to the association, the steps performed at the second access point terminates at step 490, and the steps performed at wireless terminal terminate at step 290.
  • Fig. 3 includes three schematic flow charts illustrating methods/steps involved in the handover of a wireless terminal operating in a wireless local area network from a first, initiating access point to a second, target access point.
  • the vertical arrows illustrate transitions between steps performed by a network element, more particularly the wireless terminal (a), the first, initiating access point (b) and the second, target access point (c).
  • the horizontal, dotted lines schematically represent data flow between the network elements.
  • the arrows of the horizontal, dotted lines indicate a normal direction of data flow.
  • a bidirectional arrow indicates that the data flow will normally comprise messages traveling in either direction.
  • the wireless terminal has been denoted by STA.
  • the first access point is denoted API
  • the second access point is denoted AP2.
  • the illustrated sequences of steps are provided in order to make the methods easier to understand. Some of the steps may be performed in different order without any consequences for the result, and in this case, the order of the steps may be performed in a different order. Certain steps may even be performed concurrently or simultaneously, if desired.
  • the methods and steps illustrated in figure 3 may include all the features that have already been described above with reference to fig. 2. In the following description, emphasis will therefore be put on describing the additional or distinguishing features.
  • the initiating step 200 initiates a method in a wireless terminal for obtaining data communication access. Corresponding steps performed by the first access point are initiated by the initiating step 300. Corresponding steps performed by the second access point are initiated by the initiating step 400. Upon the establishing of a communication with the first access point in step 201, the wireless terminal performs step 202 of obtaining security credentials.
  • the wireless terminal obtains security credentials while it is associated with the first access point.
  • the security credentials will enable the terminal to authenticate with the second, target access point.
  • the security credentials may, e.g., be a digital certificate, and they may, e.g., have been provided as a result of an authentication using a captive web portal, i.e. a web portal that forces a client to complete a user authentication.
  • the security credentials are first requested and then received from the first access point. The security credentials are further transmitted to the second access point as part of the authentication request 220.
  • the first access point is configured to include a service which maintains such credentials in memory. Credentials are then obtained from memory and provided to wireless terminals e.g. dependent on authentication from the wireless terminal.
  • the first access point may be configured to request and obtain such credentials from a server with which it is in communication. Such a request may be sent by the first access point using its own authentication capabilities towards the server, or the role of the first access point may simply be to forward a request from the wireless client, e.g. to a captive web server as described above, and to forward the response from the server to the wireless client.
  • the first access point performs step 301 of establishing a communication with the wireless terminal in step.
  • the first access point performs step 302 of observing that the wireless terminal has obtained security credentials, e.g. a digital certificate.
  • the wireless access point is configured to administer its own service of providing credentials, or to request credentials from a server using its own authentication, it is trivial for the first access point to observe that the wireless terminal has obtained security credentials. If the first access point is simply forwarding requests and responses between the wireless client and a server, the first access point may monitor such traffic in order to detect that a request for credentials has resulted in a response.
  • the security credentials may according to some embodiments be transmitted to the wireless terminal as application data.
  • the first access point performs step 310 of establishing that the wireless terminal is to be handed over to the second access point, e.g. in the same way as the in the method described above with reference to fig. 2. This may e.g. be established as a consequence of a positive observation of the fact that the wireless terminal has received security credentials.
  • a handover instruction is composed, e.g. in the same way as described above with reference to fig. 2.
  • the handover instruction is transmitted to the wireless terminal in step 330, e.g. in the same way as described above with reference to fig. 2.
  • the handover instruction is transmitted as data link control data, e.g. as service data on layer two of the OSI model. According to other embodiments the handover instruction is transmitted as application data.
  • the timeout/check submethod 340 may be performed. The timeout/check submethod 340 is described in closer detail below with reference to fig. 4.
  • the terminating step 390 terminates the steps performed by the first access point.
  • receiving step 210 is performed by the wireless terminal, e.g. in the same way as explained above with reference to fig. 2.
  • the handover instruction was transmitted as application data, as per some embodiments of the application, there may be an application running on the wireless client that is capable of receiving such application data and interacting with services operating e.g. at the data link level in order to compose the request that is to be transmitted to the second access point.
  • an application running on the wireless client that is capable of receiving such application data and interacting with services operating e.g. at the data link level in order to compose the request that is to be transmitted to the second access point.
  • all data is received as data link control data, it may be sufficient to involve services on the wireless terminal operating on the data link control level.
  • the method illustrated in fig. 3 further includes steps relating to discovery of the second access point, which may be performed in certain embodiments. These steps are illustrated at 212, 402, 404 and 214, which are explained further below.
  • the steps relating to discovery of the second access point may be omitted or irrelevant, in particular in case the wireless terminal has already discovered the second access point, or if the wireless terminal discovers the second access point by other means.
  • the discovery instruction transmitting step 212 might be performed by the wireless terminal. Such a discovery instruction transmitting step comprises transmitting a discovery instruction to surrounding access points, including the second access point.
  • the discovery instruction may be received by the second access point in the discovery instruction receiving step 402.
  • the second access point may transmit a response in the response transmitting step 404.
  • the response may announce the presence of the second access point.
  • the response may further announce information about certain capabilities of the second access point.
  • the wireless terminal may perform the step 214 of discovering the presence of the second access point.
  • Step 214 may also comprise providing information about the capabilities of the second access point.
  • the discovery instruction may, e.g., be a probe request frame in conformity with the IEEE 802.11 specification.
  • the discovery instruction may contain the extended service set identifier of the second access point, in order to identify the second access point.
  • the discovery instruction may further include the basic service set identifier of the second access point.
  • the response transmitted by the second access point in the transmitting step 404 and received by the wireless terminal in step receiving step 214 may, e.g., be a probe response frame in conformity with the IEEE 802.11 specification.
  • the response may contain the extended service set identifier and the basic service set identifier of the second access point.
  • the discovery in steps 402 and 404 may be replaced by a step where the second access point transmits a discovery message, e.g. periodically or arbitrarily, to surrounding nodes, including the wireless terminal.
  • the discovery message may, e.g., be a beacon frame transmitted by the second access point.
  • the wireless terminal might go directly from step 210 to 214, where the discovery in 214 comprises the reception of the beacon frame transmitted by the second access point.
  • the authenticating step 220 and the associating step 230 are performed, wherein the wireless terminal authenticates and associates with the second access point, e.g. in the same way as described above with reference to fig. 2.
  • the authenticating step 410 and the associating step 420 are performed by the second access point.
  • a request to the second wireless network to establish communication over the second access point, transmitted by the wireless terminal may be considered as a substep contained in the authenticating step 220 or the associating step 230, analogous to what has been described above with reference to fig. 2.
  • the associating step 230 in the wireless terminal and the associating step 420 in the second access point data frames are exchanged with the second access point in step 232, i.e. data communication access has been obtained.
  • the method in the wireless terminal terminates at step 290, while the terminating step 490 terminates the steps performed by the second access point.
  • Fig. 4 is a schematic flow chart illustrating exemplary steps of the timeout/check submethod 340, referred to in figures 2 and 3.
  • the timeout/check submethod is initiated at step 800.
  • information representing the remaining period of time that the wireless terminal is allowed to be connected to the first, initiating access point is provided in the submethod. Consistent with an embodiment, such information representing the allowable, remaining period of time may be included in the handover instruction.
  • the wireless terminal is forced to hand over to the second, target access point when the remaining time has elapsed. This is illustrated by the time test substep 860, testing if the time limit, representing the time period, has expired. If the time limit has not expired, the time test step 860 is repeated. It will be understood that such iteration does not necessarily mean that the access point is busy in the resulting loop. Instead, the access point may perform other tasks or be idle until the time limit has expired, and the method may continue at the association test step 870.
  • the first access point determines if the terminal is still associated with the first access point.
  • the first access point may maintain a list of wireless terminals that are associated with it.
  • an identifier of the wireless terminal e.g. the MAC address of the wireless terminal
  • the wireless terminal disassociates with the access point, it is removed from the list.
  • the association test is performed by checking if the terminal is still on the list of associated terminals.
  • the disassociation step 875 is performed, wherein a disassociation message is transmitted to the wireless terminal.
  • the disassociation message might be a
  • disassociation frame according to the IEEE 802.11 specification. After the disassociation step 875, or alternatively if the terminal was determined not to be still associated, the method continues at the authentication test step 880.
  • an authentication test step 880 is performed, wherein the first access point determines if the terminal is still authenticated with the first access point.
  • the first access point may maintain a list of wireless terminals that are authenticated with it.
  • an identifier of the wireless terminal e.g. the MAC address of the wireless terminal
  • the authentication test is performed by checking if the terminal is still on the list of authenticated terminals.
  • the de-authentication step 885 is performed, wherein a de-authentication message is transmitted to the wireless terminal.
  • the de-authentication message may be a "de-authentication frame", according to the IEEE 802.11 specification.
  • the step of forcing the wireless terminal to hand over to the second, target access point may comprise the transmitting of a disassociation message to the wireless terminal.
  • the step of forcing the wireless terminal to hand over to the second access point may comprise the transmitting of a de-authentication message to the wireless terminal.
  • the timeout/check submethod is terminated at step 890.
  • Fig. 5 is a schematic diagram illustrating the principles of an exemplary frame structure applicable for the methods described above.
  • the Action Frame includes, i.a., a MAC portion field 902.
  • the MAC portion field includes, i.a., a Frame Body 903.
  • the Frame Body 903, which is illustrated in further detail in the lower part of fig. 9 contains an Action field 904.
  • the Action field 904 includes a Category subfield 905 and an Action Details subfield 906.
  • the Category subfield 905 carries an 8-bit code with a value that indicates that this Action Frame 901 is an action frame for handover between extended service sets.
  • the Action Details subfields 906 carries information that is necessary to instruct the terminal to hand over to a new target extended service set, including the SSID of the new target extended service set.
  • Fig. 6 is a schematic diagram illustrating exemplary details of the frame structure illustrated in fig. 5.
  • the Frame Body 903 of the Action Frame 901 includes a Category subf ⁇ eld 905 and an Action Details subfield 906.
  • the Action Details subf ⁇ eld 906 contains an Action subfield 1005 that carries an 8-bit code indicating further detail about the content of the Action frame 901.
  • the code might indicate that this Action Frame 901 carries a handover instruction to hand over any access point within the target extended service set identified by the SSID found in the Action Frame 901, where the SSID here is defined according to the IEEE 802.11 specification.
  • the Action subfield 1001 follows the SSID information element (SSID IE) 1002.
  • SSID IE SSID information element
  • the Element ID field 1003 within the SSID IE is an 8-bit field indicating that this information element is an SSID IE, and that the format of the fields after the Element ID 1003 is on a format according to how SSID IEs must be formed.
  • An SSID IE 1002 must carry an 8-bit Length subfield 1004 after the Element ID subfield 1003 indicating the length in bit-octets (bytes) of the SSID 1005 that follows after the Length subfield 1004.
  • the SSID 1005 is identifying the target extended service set that the terminal is instructed to hand over to.
  • the length indicator in the Length subfield 1003 is necessary since the SSID length may generally be variable.
  • Fig. 7 is another schematic diagram illustrating exemplary details of the frame structure illustrated in fig. 5.
  • the Frame Body 903 of the Action Frame 901 includes a Category subfield 905 and an Action Details subfield 906.
  • the Action Details subfield 906 contains an Action subfield 1101 that carries an 8-bit code indicating further detail about the content of the Action frame 901.
  • the code in the Action subfield 1201 might indicate that this Action Frame 901 carries a handover instruction to hand over to a specific access point within the target extended service set identified by the SSID 1005 and ESSID 1104 found in the Action Frame 901, where the SSID here is defined according to the IEEE 802.11 specification and where the ESSID here is defined according to the current draft 802.1 Iu amendment to this specification.
  • the Action subfield 1001 follow the SSID information element (SSID IE) 1002 and the ESSID information element (BSSID IE) 1102.
  • the SSID IE 1002 is on the same format as shown in figure 6, and contains the
  • the Element ID field 1103 within the ESSID IE is an 8-bit field indicating that this information element is an ESSID IE, and that the format of the fields after the Element ID 1103 is on a format according to how ESSID IEs must be formed.
  • An ESSID IE 1102 must carry a 48-bit (6 octets) ESSID subfield 1104 after the Element ID subfield 1103.
  • the ESSID in the ESSID subfield 1104 is a globally unique number that ensures that the service set identifier comprised by the SSID and ESSID found in the SSID IE and ESSID IE subfields, respectively, is globally unique.
  • Fig. 8 is another schematic diagram illustrating exemplary details of the frame structure illustrated in fig. 5.
  • the Frame Body 903 of the Action Frame 901 includes a Category subfield 905 and an Action Details subfield 906.
  • the Action Details subfield 906 contains an Action subfield 1201 that carries an 8-bit code indicating further detail about the content of the Action frame 901.
  • the code in the Action subfield 1201 might indicate that this Action Frame 901 carries a handover instruction to hand over to a specific access point within the target extended service set identified by the SSID 1005 found in the Action Frame 901, where the specific target access point is identified by the BSSID 1204 found in the Action Frame.
  • the Action subfield 1201 follow the SSID information element (SSID IE) 1002 and the BSSID information element (BSSID IE) 1202.
  • SSID IE SSID information element
  • BSSID IE BSSID information element
  • the SSID IE 1002 is on the same format as shown in figure 6, and contains the SSID of the target extended service set that the target access points belongs to.
  • the Element ID field 1203 within the BSSID IE 1202 is an 8-bit field indicating that this information element is a BSSID IE, and that the format of the fields after the Element ID 1203 is on a format according to how BSSID IEs must be formed.
  • a BSSID IE 1202 must carry a 48-bit (6 octets) BSSID subfield 1204 after the Element ID subfield 1203.
  • the BSSID in the BSSID subfield 1204 identifies the target access point that the terminal is instructed to hand over to.
  • Fig. 9 is another schematic diagram illustrating exemplary details of the frame structure illustrated in fig. 5.
  • the Frame Body 903 of the Action Frame 901 includes a Category subfield 905 and an Action Details subfield 906.
  • the Action Details subfield 906 contains an Action subfield 1301 that carries an 8 -bit code indicating further detail about the content of the Action frame 901.
  • the code in the Action subfield 1301 might indicate that this Action Frame 901 carries a handover instruction to hand over to a specific access point as explained for figure 8, as well as with further authentication details about how to authenticate with the target access point.
  • the SSID IE 1002 is on the same format as shown in figure 6, and contains the SSID of the target extended service set that the target access points belongs to.
  • the BSSID IE 1202 is on the same format as shown in figure 8, and contains the BSSID of the target access points that the terminal is instructed to hand over to.
  • the Element ID field 1303 within the RSN (Robust Secure Network) IE 1302 is an 8-bit field indicating that this information element is an RSN IE, and that the format of the fields after the Element ID 1303 is on a format according to how RSN IEs must be formed.
  • the RSN IE carries further information about how to authenticate with the target access point in the Authentication details subfield 1304. Consistent with certain embodiments of the methods described above, the
  • BSSID/SSID fields contained in the action frame may be used for including the SSID and the BSSID of the second, target access point in a handover instruction.
  • the RSN IE fields contained in the action frame in particular in the Action Details of the frame body of the MAC portion, may be used for including authentication information.
  • the Preamble of the Action frame 901 may be an action frame preamble
  • the PLCP header may be a physical layer convergence protocol header of an action frame.
  • identification elements and/or information elements may be arranged in various ways without departing from the principles and scope of the shown embodiments.
  • the order of BSSID and SSID elements may be interchanged, and the location of certain elements in the frames, frame bodies and information element may be changed according to implementation specifications.
  • the authentication information has been illustrated in an RSN IE field at the end of the Action Details part of the frame body, it should be recognized that many other possibilities exist for including authentication information in the handover instruction.
  • Fig. 10 is a schematic flow chart illustrating a first embodiment of a method for discovering candidate access points in a wireless local area network.
  • the method is performed by a wireless terminal communicatively operating in the wireless local area network. Consistent with this embodiment, the method is initiated by an announcement frame transmitted from an access point in the wireless local area network.
  • An announcement frame is a communication frame that is transmitted by another network element either randomly, or periodically, or substantially periodically, i.e. not as a response to a preceding request.
  • An announcement frame may e.g. be a beacon frame.
  • the left portion of the flowchart corresponds to steps performed by the wireless terminal.
  • the right portion of the flowchart corresponds to steps performed by a physical or virtual access point in the communication coverage area of the wireless terminal.
  • the dotted lines between the left and right portions represent communication, in the direction indicated by the arrows, between the wireless terminal and an access point.
  • the method starts at the initiating step 2200.
  • An aim of the illustrated method is to discover candidate access points (which do not necessarily include the access point that is part of the communication illustrated in fig. 10).
  • Each candidate access point is represented by a basic service set and an extended service set.
  • step 2210 the wireless terminal waits for an announcement frame transmitted by the access point in the communication coverage area.
  • the access point transmits an announcement frame which includes a number of identification pairs. Each pair includes a first identification (BSSID) that identifies a basic service set, and a second identification (SSID) that identifies an extended service set. Consistent with an embodiment, the transmitting step 2280 comprises transmitting the IEEE 802.11 Beacon frame. Alternatively, other frame types may be used. Step 2280 may be repeated after a pause or idle step 2290, wherein the access point may perform other tasks.
  • BSSID first identification
  • SSID second identification
  • the transmitting step 2280 comprises transmitting the IEEE 802.11 Beacon frame. Alternatively, other frame types may be used. Step 2280 may be repeated after a pause or idle step 2290, wherein the access point may perform other tasks.
  • the announcement frame is received in the receiving step 2220.
  • the announcement frame includes a number of identification pairs, each pair including a first identification (BSSID) that identifies a basic service set, and a second identification (SSID) that identifies an extended service set.
  • the announcement frame is an IEEE 802.11 Beacon frame, i.e. the Beacon frame transmitted by the access point in step 2280 referred to above. Further details of frame structures that may be used with the first embodiment of the method, as illustrated in fig. 10, are described below with reference to fig. 14 and 15.
  • the receiving step 2220 comprises or is followed by a step (not illustrated) of deriving the identification pairs from the received frame.
  • the step of deriving identification pairs appears directly from the frame structure scheme that has been implemented. For instance, if the exemplary frame structure illustrated in fig. 14 is applied, the identification pairs BSSIDl /SSIDl, BSSID2/SSID2, etc. are explicitly obtainable from the Multi-SSID IE field 2603 included in the Frame Body field 2602 of the (e.g.) Beacon Frame 2601.
  • the number of identification pairs is 1. In other embodiments, the number is 2, 3, 4, or 5, respectively. Alternatively, the number may be any number larger than 5. At this point in the process, the candidate access points have been discovered.
  • a candidate access point is a virtual access point among a plurality of virtual access points implemented on a single physical access point node.
  • a candidate access point is a non-virtual access point, i.e. a physical access point node.
  • the selecting step 2230 is subsequently performed. In the selecting step 2230, an identification pair is selected from the number of identification pairs.
  • the selecting step 2230 includes reading an input that represents the selected identification pair, e.g. from a user interface.
  • information representing the discovered candidate access points may be presented to the user, and the input is provided by the user.
  • the selection may be performed automatically, based on certain policies, based on physical signal parameters such as signal strength, as a result of a network initiated handover, pseudo-randomly, or as a result of other, e.g. external events or other information.
  • the selected candidate access point has been determined.
  • further steps may additionally be performed for authenticating and associating the wireless terminal with the selected candidate access point that has been discovered, enabling the exchange of data frames between the wireless terminal and the selected candidate access point.
  • the method further comprises steps of authenticating said wireless terminal with said selected candidate access point, and associating said wireless terminal with said selected candidate access point.
  • step 2244 of transmitting an association request using the SSID of the selected identification pair may be performed, followed by step 2246 of receiving an association response corresponding to the association request.
  • the data exchange step 2250 may be performed, wherein data frames are allowed to be exchanged between the wireless terminal and the selected discovered candidate access point.
  • Fig. 11 is a schematic flow chart illustrating a second embodiment of a method for discovering candidate access points in a wireless local area network.
  • the embodiment of fig. 11 corresponds largely to the embodiment of figure 10, except from the initiating part. While the embodiment of fig. 10 was initiated by waiting for an announcement frame, the embodiment of fig. 11 is actively initiated by transmitting a request frame.
  • the method is performed by a wireless terminal communicatively operating in the wireless local area network.
  • the left portion of the flowchart corresponds to steps performed by the wireless terminal.
  • the right portion of the flowchart corresponds to steps performed by a physical or virtual access point in the communication coverage area of the wireless terminal.
  • the dotted lines between the left and right portions represent communication, in the direction indicated by the arrows, between the wireless terminal and an access point.
  • the method starts at the initiating step 2300.
  • An aim of the illustrated method is to discover candidate access points (which do not necessarily include the access point that is part of the communication illustrated in fig. 11.)
  • Each candidate access point is represented by a basic service set and an extended service set.
  • step 2310 the wireless terminal transmits a request frame.
  • step 2380 the access point waits for a request frame transmitted by a wireless terminal, while performing other tasks.
  • a response frame is transmitted, which includes a number of identification pairs.
  • Each pair includes a first identification (BSSID) that identifies a basic service set, and a second identification (SSID) that identifies an extended service set.
  • the response frame is received in the receiving step 2320.
  • the response frame thus includes a number of identification pairs, each pair including a first identification (BSSID) that identifies a basic service set, and a second identification (SSID) that identifies an extended service set. Consistent with an embodiment of the method illustrated in fig.
  • the request transmitting step 2310 comprises transmitting an IEEE 802.11 Probe Request frame.
  • the receiving step 2320 comprises receiving an IEEE 802.11 Probe Response frame.
  • the transmitting step 2380 performed by the access point comprises transmitting the IEEE 802.11 Probe Response frame.
  • other frame types may be used. Further details of frame structures that may be used with the second embodiment of the method, as illustrated in fig. 11, are described below with reference to fig. 14 and 15.
  • the receiving step 2320 comprises or is followed by a step (not illustrated) of deriving the identification pairs from the frame.
  • the step of deriving will be explicitly understood from the frame structure scheme that has been implemented, in the same manner as explained above with reference to the first embodiment of fig. 10.
  • the number of identification pairs is 1. In other embodiments, the number is 2, 3, 4, or 5, respectively. Alternatively, the number may be any number larger than 5.
  • the candidate access point is a virtual access point among a plurality of virtual access points implemented on a single physical access point node.
  • the candidate access point is a non-virtual access point, i.e. a physical access point node.
  • the selecting step 2230 is subsequently performed. The selecting step 2230 has been previously described above with reference to fig 10.
  • steps may additionally be performed for authenticating and associating the wireless terminal with the candidate access point that has been discovered, enabling the exchange of data frames between the wireless terminal and the candidate access point.
  • steps 2240, 2242, 2244, 2246, 2250 have been described above with reference to fig. 10.
  • Fig. 12 is a schematic flow chart illustrating a third embodiment of a method for discovering candidate access points in a wireless local area network.
  • the method is performed by a wireless terminal communicatively operating in the wireless local area network. Consistent with this embodiment, the method is initiated by a request transmitted by the wireless terminal, similar to the embodiment illustrated in fig. 11.
  • the wireless terminal is pre-associated with an access point, but is also looking for further SSID/BSSID pairs in order to discover candidate access points, e.g. for the further purpose of associating with a selected candidate access point.
  • the left portion of the flowchart corresponds to steps performed by the wireless terminal.
  • the right portion of the flowchart corresponds to steps performed by an access point in the communication coverage area of the wireless terminal.
  • the dotted lines between the left and right portions represent communication, in the direction indicated by the arrows, between the wireless terminal and an access point.
  • the method starts at the initiating step 2400.
  • An aim of the illustrated method is to discover candidate access points (which do not necessarily include the access point that is part of the communication illustrated in fig. 11.)
  • Each candidate access point is represented by a basic service set and an extended service set.
  • the wireless terminal transmits a request frame.
  • step 2480 the access point waits for a request frame transmitted by a wireless terminal, while performing other tasks.
  • step 2490 which is performed by the access point upon the receipt of a request frame, a response frame is transmitted, which includes a number of identification pairs.
  • Each pair includes a first identification (BSSID) that identifies a basic service set, and a second identification (SSID) that identifies an extended service set.
  • BSSID first identification
  • the response frame is received in the receiving step 2420.
  • the response frame thus includes a number of identification pairs, each pair including a first identification (BSSID) that identifies a basic service set, and a second identification (SSID) that identifies an extended service set.
  • the request transmitting step 2410 comprises transmitting an IEEE 802.11 Action frame.
  • the receiving step 2420 comprises receiving an IEEE 802.11 Action frame.
  • the transmitting step 2480 performed by the access point comprises transmitting the IEEE 802.11 Action frame.
  • other frame types may be used. Further details of frame structures that may be used with the third embodiment of the method, as illustrated in fig. 12, are described below with reference to fig. 16, 17, 18, and 19.
  • the receiving step 2420 comprises or is followed by a step (not illustrated) of deriving the identification pairs from the frame.
  • the step of deriving will be explicitly understood from the frame structure scheme that has been implemented, in the same manner as explained above with reference to the first embodiment of fig. 10.
  • the number of identification pairs is 1. In other embodiments, the number is 2, 3, 4, or 5, respectively. Alternatively, the number may be any number larger than 5.
  • the candidate access point is a virtual access point among a plurality of virtual access points implemented on a single physical access point node.
  • the candidate access point is a non-virtual access point, i.e. a physical access point node.
  • the identification pairs are stored in a memory as a list of pairs for later use. The list may be embodied in a memory in the wireless terminal, in particular in a wireless communication adapter of the wireless terminal.
  • the selecting step 2230 is subsequently performed.
  • the selecting step has been previously described above with reference to fig 10.
  • the identification pair may be selected from the stored list of pairs.
  • the selected identification pair corresponds to the selected discovered candidate access point.
  • steps may additionally be performed for authenticating and associating the wireless terminal with the candidate access point that has been discovered, enabling the exchange of data frames between the wireless terminal and the candidate access point.
  • steps 2240, 2242, 2244, 2246, 2250 have been described above with reference to fig. 10.
  • the process in the wireless terminal may be terminated at 2460.
  • Fig. 13 is a schematic flow chart illustrating a fourth embodiment of a method for discovering candidate access points in a wireless local area network.
  • the method is performed by a wireless terminal communicatively operating in the wireless local area network. Consistent with this embodiment, the method is initiated by an announcement frame transmitted by an access point, similar to the first embodiment illustrated in fig. 10. However, in the embodiment of fig. 13, the wireless terminal is pre-associated with an access point, as opposed to the embodiment of fig. 10. The wireless terminal is also looking for further SSID/BSSID pairs in order to discover candidate access point, e.g. for the further purpose of associating with a selected discovered candidate access point, similar to the embodiment of fig. 12.
  • the left portion of the flowchart corresponds to steps performed by the wireless terminal.
  • the right portion of the flowchart corresponds to steps performed by an access point in the communication coverage area of the wireless terminal.
  • the dotted lines between the left and right portions represent communication, in the direction indicated by the arrows, between the wireless terminal and an access point.
  • the method starts at the initiating step 2500.
  • An aim of the illustrated method is to discover candidate access points each represented by a basic service set and an extended service set.
  • step 2510 the wireless terminal waits for an announcement frame transmitted by an access point in the communication coverage area.
  • a parallel process performed by an access point in the communication coverage area, shown to the right in fig. 13, is initiated at the access point process initiating step 2570.
  • the access point transmits an announcement frame which includes a number of identification pairs. Each pair includes a first identification (BSSID) that identifies a basic service set, and a second identification (SSID) that identifies an extended service set. Consistent with an embodiment, the transmitting step 2580 comprises transmitting an IEEE 802.11 Action frame. Alternatively, other frame types may be used. Step 2580 may be repeated after a pause or idle step 2590, wherein the access point may perform other tasks. Further details of frame structures that may be used with the fourth embodiment of the method, as illustrated in fig. 13, are described below with reference to fig. 16, 17, and 18.
  • the announcement frame is received in the receiving step 2520.
  • the announcement frame thus includes a number of identification pairs, each pair including a first identification (BSSID) that identifies a basic service set, and a second identification (SSID) that identifies an extended service set.
  • BSSID first identification
  • SSID second identification
  • the receiving step 2520 comprises receiving an IEEE 802.11 Action frame. Alternatively, other frame types may be used.
  • the receiving step 2520 comprises or is followed by a step (not illustrated) of deriving the identification pairs from the frame.
  • the step of deriving will be explicitly understood from the frame structure scheme that has been implemented, in the same manner as explained above with reference to the first embodiment of fig. 10.
  • the number of identification pairs is 1. In other embodiments, the number is 2, 3, 4, or 5, respectively. Alternatively, the number may be any number larger than 5.
  • the identification pairs are stored in the storing step 2530 as a list of pairs for later use.
  • the list may be embodied in a memory in the wireless terminal, in particular in a wireless communication adapter of the wireless terminal.
  • the selecting step 2230 is subsequently performed.
  • the selecting step 2230 has been previously described above with reference to fig 10. Additionally, if the identification pairs have been stored in a storing step 2530, the identification pair may be selected from the stored list of pairs. The selected identification pair corresponds to the selected discovered candidate access point.
  • each candidate access point is a virtual access point among a plurality of virtual access points implemented on a single physical access point node.
  • the candidate access point is a non-virtual access point, i.e. a physical access point node.
  • further steps may additionally be performed for authenticating and associating the wireless terminal with the selected discovered candidate access point, enabling the exchange of data frames between the wireless terminal and the selected candidate access point.
  • steps 2240, 2242, 2244, 2246, 2250 have been described above with reference to fig. 10.
  • the process in the wireless terminal may be terminated at 2560.
  • Fig. 14 is a schematic diagram illustrating the principles of an exemplary frame structure applicable for the first and second embodiments of a method for discovering candidate access points.
  • a Beacon frame may be used as a possible frame type consistent with the first embodiment of the invention.
  • a Beacon Frame is illustrated at 2601.
  • the Beacon Frame includes, i.a., a BSSID field and a Frame Body field 2602.
  • the Frame Body field 2602 includes, i.a., an SSID IE field and a Multi-SSID IE-field 2603.
  • IE denotes "Information Element”.
  • the BSSID field and the SSID IE field together constitute a default BSSID/SSID pair, illustrated at 2604.
  • the Multi-SSID IE field which is illustrated in further detail in the lower part of fig.
  • BSSIDl comprises, i.a., the fields BSSIDl, SSIDl, BSSID2, and SSID2.
  • n BSSID and SSID fields may be included in the Multi-SSID IE field 2603.
  • a first non-default BSSID/SSID pair has been illustrated at 2605.
  • a «-th non-default BSSID/SSID pair has been illustrated at 2606.
  • the Multi-SSID field 2603 may also include an element identification (Element ID) and a total length indicator (Length).
  • element ID element identification
  • Lem length field
  • Fig. 15 is a schematic diagram illustrating the principles of an alternative, exemplary frame structure applicable for the first and second embodiments of a method for discovering candidate access points.
  • a Beacon frame may be used as a possible frame type consistent with the first embodiment of the invention.
  • a Beacon Frame is illustrated at 2701.
  • the Beacon Frame includes, i.a., a BSSID field and a Frame Body field 2702.
  • the Frame Body field 2702 includes, i.a., an SSID IE (Information Element) field.
  • the BSSID field and the SSID IE field together constitute a default BSSID/SSID pair 2704.
  • a plurality of (three illustrated by example) BSSID/SSID IE fields 2703, also contained in the Frame Body field 2702, are illustrated in further detail in the lower part of fig. 15.
  • Each such BSSID/SSID IE field comprises, i.a., a BSSID and an SSID.
  • each BSSID/SSID IE field 2703 may also include an element identification (Element ID) and a length indicator (Length), since the SSID length may generally be variable.
  • element ID element identification
  • Length length indicator
  • a first non-default BSSID/SSID pair has been illustrated at 2705.
  • an n-th non-default BSSID/SSID pair has been illustrated at 2706.
  • a Probe Request frame and a Probe Response frame may be used as possible frame types consistent with the second embodiment of the invention.
  • the frame structure of the Probe Response frame will correspond directly to the Beacon Frame structure described above with reference to fig. 14 and 15, since the structures of the frame body of a Beacon frame (illustrated as 2602, 2702) and the frame body of a Probe Response frame are substantially equal.
  • fig. 14 and 15 are also illustrative for describing details in case of the use of a Probe Response frame.
  • Fig. 16 is a schematic diagram illustrating the principles of an exemplary frame structure applicable for the third and fourth embodiments of a method for discovering candidate access points.
  • the Action Frame includes, i.a., a MAC portion field 2802.
  • the MAC portion field includes, i.a., a Frame Body 2803.
  • the Frame Body 2803 which is illustrated in further detail in the lower part of fig. 16, includes a Category field and an Action Details field. The remaining elements on figure 16 will be well understood by the skilled person.
  • Fig. 17 is a schematic diagram illustrating exemplary details of the frame structure illustrated in fig. 16.
  • the Frame Body 2803 of the Action Frame 2801 includes a Category field and an Action Details field.
  • the Category field contains a byte, or another suitable data element, that indicates that the frame is a single BSSID/SSID pair action frame
  • the Action field contains a bit, a byte or another suitable data element that indicates that this is a request type Action frame.
  • the frame includes the BSSID/SSID pair.
  • the frame may include the contents of the Category field and Action field that was also included in the corresponding Action Request Frame 2901.
  • Fig. 18 is a schematic diagram illustrating alternative exemplary details of the frame structure illustrated in fig. 16.
  • the Frame Body 2803 of the Action Frame includes a Category field and an Action Details field.
  • the Category field contains a byte, or another suitable data element, that indicates that the frame is a multiple
  • the Action field contains a bit, a byte or another suitable data element that indicates that this is a request type Action frame.
  • the frame includes the plurality of BSSID/SSID pairs.
  • the frame may include the contents of the Category field and Action field that were also included in the corresponding Action Request Frame 291 1.
  • the frame may also include an element (# pairs) containing information on the number of BSSID/SSID pairs.
  • the Action Response Frame 2912 may also include, for each BSSID/SSID pair number /, a length field Len/ which indicates the length (e.g. in bytes) of the SSID number /.
  • Fig. 19 is a schematic diagram illustrating further principles of a frame structure applicable in certain aspects of the invention.
  • the identification pairs that are included in and derived from the received frame may comprise a first, default identification pair, and a second, non- default identification pair. This feature is illustrated in fig. 19.
  • Fig 19 has many points of resemblance with fig. 14 as described above. Reference is therefore also made to fig. 14 and the corresponding description above, and the differences will explained in detail in the following. Further, the frame structure shown in fig. 19 is directly applicable with the first and second embodiments of the invention as illustrated in fig. 10 and 11, respectively. However, the principles of using a first, default identification pair and a second, non-default identification pair in the frame, may also be applicable in other embodiments.
  • the frame shown at 2921 is a response frame, exemplified as a Probe Response frame, i.e. the frame type used in the second embodiment illustrated in fig. 1 1.
  • the Probe Response frame includes, i.a., a BSSID field and a Frame Body field 2922.
  • the Frame Body field 2922 includes, i.a., an SSID IE field and a Multi-SSID IE-field 2923.
  • the Multi-SSID IE-field actually contains only one SSID.
  • the field is however denoted "Multi-SSID" in order to obtain consistency with the other embodiments.
  • the BSSID field and the SSID IE field together constitute a default BSSID/SSID pair.
  • the Multi-SSID IE field which is illustrated in further detail in the lower part of fig. 14, comprises, i.a., the fields BSSIDl and SSIDl, which form a non-default BSSID/SSID pair.
  • identification pair there are two identification pairs, wherein one identification pair is the default pair that is contained partly at Probe Response Frame level (BSSID) and partly at Frame Body field level (SSID).
  • BSSID Probe Response Frame level
  • SSID Frame Body field level
  • the second identification pair is the non-default pair that is contained in the Multi-SSID IE field 2923.
  • Fig. 20 is a schematic diagram illustrating further principles of a frame structure applicable for embodiments of the invention.
  • the frame structure shown in fig. 20 may be applicable with an embodiment of the invention that conforms to the emerging GAS (Generic Advertisement Service) protocol, which is a part of the IEEE 802.1 Iu amendment.
  • GAS Generic Advertisement Service
  • the frame structure shown in fig. 20 may also be applicable with embodiments utilizing IEEE 802.11 Action Frames for communication. Examples of such embodiments are the third embodiment above, illustrated with reference to fig. 12, and the fourth embodiment illustrated above with reference to fig. 13. However, the principles of fig. 20 may also be applicable in other embodiments.
  • an Action frame is shown at 2931.
  • the Action frame 2931 may be an advertisement response element in conformity with the GAS protocol.
  • the Action frame comprises, i .a., an Advertisement Response Information Element (IE) 2932.
  • the Action frame may also comprise further elements which are not described herein.
  • the Advertisement Response IE 2932 comprises a Native Query Response Information Element (IE) 2933.
  • the Advertisement Response IE 2932 may also comprise further elements, including an Element IE, a Length indicator and an Advertisement Protocol IE.
  • the Native Query Response IE 2933 comprises an information elements denoted Native Info Multiple SSID Information Elements (Native Info mSSID IE) 2934.
  • the Native Query Response IE 2933 may also comprise further elements, including an Element IE, a Length indicator and other information elements (Other IEs).
  • the information element Native Info mSSID IEl 2934 comprises, i.a. a number n of container elements, denoted SSID Containers, SSID Container IE ⁇ ...n.
  • the first such container element, SSID Container IE 1 is illustrated at 2935.
  • the Native Info mSSID IEl may also comprise further elements, including an information element Info IE, a Length indicator, and a Status Code element.
  • Each SSID Container IE (for the purpose of illustration, only SSID Container IEl and SSID Container IEn have been illustrated) comprises, i.a., a BSSID IE 2936 and an SSID IE 2937.
  • Each SSID Container IE may comprise further elements, including an Element IE, a Length indicator, and an optional supplementary information element 2938, which may e.g. be used for an element such as the "RSN IE" of the IEEE 802.1 Ii amendment.
  • the BSSID IE 2936 includes, i.a., a BSSID.
  • the BSSID IE 2936 may also include further elements, including an Element IE and a Length indicator.
  • the SSID IE 2937 includes, i.a., an SSID.
  • the SSID IE 2937 may also include further elements, including an Element IE and a Length indicator.
  • Fig. 21 is a schematic flow chart illustrating a method performed by a wireless terminal in a wireless local area network for initiating authentication of the wireless terminal with an access point.
  • the method is performed by a wireless terminal communicatively operating in the wireless local area network. Consistent with this embodiment, the method is initiated by an authentication frame transmitted from an access point in the wireless local area network.
  • An aim of the illustrated method is to initiate authentication of a wireless terminal with an access point in a wireless local area network. Steps are also described for performing the initiated authentication, to perform a subsequent association and to exchange data between the terminal and the access point.
  • the method starts at the initiating step 3200.
  • identification information related to the access point is provided. More specifically, a first identification (BSSID) that identifies a basic service set of the access point and a second identification (SSID) that identifies an extended service set of the access point are provided.
  • BSSID first identification
  • SSID second identification
  • the step 3210 of providing the first and second identification is performed first.
  • This step 3210 comprises steps of discovering the first and second identification of a number of access points, followed by selecting an access point.
  • an authentication request frame is composed.
  • the including step 3220 comprises including the first identification (BSSID) and the second identification (SSID) in the authentication frame.
  • the including step 3220 comprises including the first identification (BSSID) in a MAC portion of the authentication frame.
  • the including step 3220 comprises including the second identification (SSID) in a frame body of a MAC portion of the authentication frame.
  • SSID second identification
  • the second identification is included in an information element (SSID IE) in the frame body.
  • the method for initiating an authentication further comprises a step 3230 of transmitting the authentication request frame.
  • the initiating of an authentication may be considered as terminated at this point.
  • the method may further comprise a step 3240 of authenticating the wireless terminal with the access point.
  • the method may further comprise a step 3250 of receiving an authentication response, confirming successful authentication, from the access point. Consistent with an embodiment, the method may further comprise associating the wireless terminal with the access point, enabling the exchange of data frames between the wireless terminal and the access point.
  • the step of associating the wireless terminal with the access point may include the step 3260 of transmitting an association request frame that includes the second identification (SSID). Consistent with an embodiment, the method may further comprise the step 3270 of receiving an association response.
  • the data exchange step 3280 may be performed, wherein data frames are allowed to be exchanged between the wireless terminal and the access point.
  • the access point may be a virtual access point among a plurality of virtual access points implemented on a single physical access point node.
  • the access point is a physical access point.
  • the method in the wireless terminal may be terminated at 3290.
  • the method may be implemented in conformity with the IEEE 802.11 specification.
  • the above steps relating to authenticating and associating may be implemented in conformity with the IEEE 802.11 specification.
  • Fig. 22 is a schematic flow chart illustrating a method performed by an access point in a wireless local area network for initiating authentication of a wireless terminal with the access point.
  • the method starts at step 3300.
  • an initial step 3310 may be performed.
  • the access point may perform initial actions such as transmitting beacon frames (e.g. periodically) or it may have transmitted a probe response upon reception of a probe request.
  • an authentication request frame is received.
  • the authentication request frame includes a first identification (BSSID) that identifies a desired basic service set and a second identification (SSID) that identifies a desired extended service set. Consistent with an embodiment, the first identification (BSSID) is included in a MAC portion of the authentication request frame.
  • the second identification is included in a frame body of a MAC portion of the authentication request frame. More specifically, the second identification (SSID) may be included in an information element (SSID IE) in the frame body.
  • SSID IE information element
  • the first identification (BSSID) and said second identification (SSID) are extracted from the authentication request frame, and the access point verifies that the first identification (BSSID) and the second identification (SSID) correspond to a current configuration of the access point.
  • the extracting may comprise extracting the first identification (BSSID) from a MAC portion of the authentication request frame, and extracting the second identification (SSID) from the frame body of a MAC portion of the authentication request frame.
  • the second identification (SSID) is extracted from an information element (SSID IE) in the frame body of the MAC portion of the authentication request frame.
  • the initiating of an authentication may be considered as terminated at this point.
  • the method further comprises the selecting step 3340 of selecting an authentication procedure, based on the second identification (SSID).
  • SSID second identification
  • the method further comprises the authentication step 3350 of authenticating the access point with the wireless terminal.
  • the method further comprises a transmitting step 3360 of transmitting an authentication response, confirming successful authentication.
  • the method further comprises associating the access point with said wireless terminal, enabling the exchange 3390 of data frames between the access point and the wireless terminal.
  • the associating step may include a step 3370 of receiving an association request frame which includes the second identification (SSID). Upon this request, an association response corresponding to the association request may be transmitted 3380.
  • the access point may be a virtual access point among a plurality of virtual access points implemented on a single physical access point node.
  • the method may be implemented in conformity with the IEEE 802.11 specification.
  • the above steps relating to authenticating and associating may be implemented in conformity with the IEEE 802.11 specification.
  • Fig. 23 is a schematic diagram illustrating the principles of an exemplary frame structure applicable for an embodiment of a method for initiating the authentication of a wireless terminal with an access point.
  • An Authentication Request frame is illustrated at 3401.
  • the Authentication Request frame 3401 includes, i.a., a MAC portion 3402.
  • the Authentication Request frame 3401 may also include other elements including a preamble (denoted Preamble etc.) and a header (denoted PLCP header).
  • the MAC portion 3402 comprises, i.a., a Frame Body 3403. It also comprises an identification element 3404, denoted BSSID, which may contain the first identification BSSID.
  • BSSID an identification element 3404, denoted BSSID, which may contain the first identification BSSID.
  • the MAC portion 3402 may also include other elements as indicated on fig. 23 and/or other elements, which will be understood by the skilled person acquainted with the IEEE 802.11 specification.
  • the Frame Body 3403 includes, i.a., an information element 3405, denoted SSID IE.
  • the Frame Body 3403 may also include other elements as indicated on fig. 23, and/or other elements, which will be understood by the skilled person acquainted with the IEEE 802.11 specification.
  • the information element 3405 comprises, i.a., a field denoted SSID, which contains the second identification SSID 406.
  • the information element 3405 may also include other fields, including an Element ID, a Length indicator, and/or other elements which will be understood by the skilled person acquainted with the IEEE 802.11 specification.
  • Fig. 24 is a schematic diagram illustrating the principles of an exemplary frame structure applicable for an embodiment of a method for initiating the authentication of a wireless terminal with an access point.
  • Fig. 24 equals fig. 23, except from the content of the information element 3405, denoted SSID IE.
  • the information element 3405 further comprises a field 3407 which contains the first identification BSSID, here denoted BSSIDl. Consequently, the first identification is contained in the field 3407 rather than in the field 3404 on MAC portion level, as was the case in the embodiment of fig. 23.
  • the information element 3405, and thus also the frame body 3403, included in the MAC portion 3402 of the Authentication frame 3401 includes an identification pair, resulting in that first (BSSID) and second (SSID) identifications are included in the Authentication frame 3401.
  • BSSID first identification
  • SSID second identifications
  • the content of the field 3404 may be another identification of a BSSID, which may either be disregarded or used for other purposes.
  • Specific embodiments of the present invention have been described by example above. As described in the foregoing, embodiments of the present invention have particular advantages when implemented in conformity with the IEEE 802.11 specification. However, the skilled person will realize that the principles of the invention may also be applied in other wireless local area network environments, including future network types and standards. The scope of the invention is therefore defined by the appended claims.

Abstract

La présente invention concerne des procédés et des dispositifs sans fil, qui comprennent un procédé pour initier le transfert d'un terminal sans fil, d'un premier point d'accès dans un premier réseau sans fil à un second point d'accès dans un second réseau sans fil. Dans le procédé, une instruction de transfert, qui comprend des informations qui identifient le second point d'accès, est transmise du premier point d'accès au terminal. Une requête pour établir une communication sur le second point d'accès est reçue sur le second point d'accès. Le terminal est associé au second réseau sans fil et assure la communication avec le terminal sur le second point d'accès. L'invention concerne aussi les procédés et les dispositifs pour découvrir les points d'accès candidats dans un réseau local sans fil et pour initier l'authentification d'un terminal sans fil avec un point d'accès.
PCT/NO2008/000166 2007-05-11 2008-05-09 Procédés et dispositifs pour initier un transfert, découverte de points d'accès candidats et initiation d'authentification d'un terminal sans fil dans un réseau sans fil WO2008140325A2 (fr)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US92437807P 2007-05-11 2007-05-11
US92437907P 2007-05-11 2007-05-11
US60/924,379 2007-05-11
US60/924,378 2007-05-11
US92498507P 2007-06-07 2007-06-07
US60/924,985 2007-06-07

Publications (2)

Publication Number Publication Date
WO2008140325A2 true WO2008140325A2 (fr) 2008-11-20
WO2008140325A3 WO2008140325A3 (fr) 2009-03-12

Family

ID=39790030

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/NO2008/000166 WO2008140325A2 (fr) 2007-05-11 2008-05-09 Procédés et dispositifs pour initier un transfert, découverte de points d'accès candidats et initiation d'authentification d'un terminal sans fil dans un réseau sans fil

Country Status (1)

Country Link
WO (1) WO2008140325A2 (fr)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010149076A1 (fr) * 2009-06-25 2010-12-29 华为技术有限公司 Procede, dispositif et systeme de communication pour etablir un echange local
WO2014001608A1 (fr) * 2012-06-29 2014-01-03 Nokia Corporation Procédé et appareil pour le partage de paramètres d'accès
EP2747480A1 (fr) * 2012-12-21 2014-06-25 Gemalto SA Procédé permettant d'accéder à un second réseau de communication de données et dispositif et système correspondants
CN104363990A (zh) * 2014-03-31 2015-02-18 华为终端有限公司 用户设备接入无线保真Wi-Fi的方法及Wi-Fi接入节点
WO2015116815A3 (fr) * 2014-01-31 2015-11-12 Qualcomm Incorporated Direction de l'association de réseau d'un client sans fil
US9693296B2 (en) 2014-07-17 2017-06-27 Xiaomi Inc. Network connection method and apparatus
EP3531742A4 (fr) * 2016-10-24 2019-09-25 Sony Corporation Appareil de communication, et procédé de communication
US20210242929A1 (en) * 2015-12-30 2021-08-05 Futurewei Technologies, Inc. System and Method for Inter-Basic Service Set Communications

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1441469A2 (fr) * 2003-01-23 2004-07-28 Samsung Electronics Co., Ltd. Procédé de transfert dans un réseau local sans fil, point d'accès et station mobile mettant en oeuvre le procédé
WO2005027560A1 (fr) * 2003-09-12 2005-03-24 Ntt Docomo, Inc. Transfert intra-domaine et inter-domaine fiable
WO2006002676A1 (fr) * 2004-07-02 2006-01-12 Ntt Docomo, Inc. Procede pour transfert intercellulaire sur
US20060251021A1 (en) * 2005-03-25 2006-11-09 Oki Electric Industry Co., Ltd. Handover method in wireless LAN by assigning an identification code to a mobile station

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1441469A2 (fr) * 2003-01-23 2004-07-28 Samsung Electronics Co., Ltd. Procédé de transfert dans un réseau local sans fil, point d'accès et station mobile mettant en oeuvre le procédé
WO2005027560A1 (fr) * 2003-09-12 2005-03-24 Ntt Docomo, Inc. Transfert intra-domaine et inter-domaine fiable
WO2006002676A1 (fr) * 2004-07-02 2006-01-12 Ntt Docomo, Inc. Procede pour transfert intercellulaire sur
US20060251021A1 (en) * 2005-03-25 2006-11-09 Oki Electric Industry Co., Ltd. Handover method in wireless LAN by assigning an identification code to a mobile station

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010149076A1 (fr) * 2009-06-25 2010-12-29 华为技术有限公司 Procede, dispositif et systeme de communication pour etablir un echange local
WO2014001608A1 (fr) * 2012-06-29 2014-01-03 Nokia Corporation Procédé et appareil pour le partage de paramètres d'accès
EP2747480A1 (fr) * 2012-12-21 2014-06-25 Gemalto SA Procédé permettant d'accéder à un second réseau de communication de données et dispositif et système correspondants
WO2014096286A1 (fr) * 2012-12-21 2014-06-26 Gemalto Sa Procédé d'accès à un second réseau de communication de données et dispositif et système correspondants
WO2015116815A3 (fr) * 2014-01-31 2015-11-12 Qualcomm Incorporated Direction de l'association de réseau d'un client sans fil
EP2966932A4 (fr) * 2014-03-31 2016-03-23 Huawei Device Co Ltd Procédé d'accès wi-fi (fidélité sans fil) pour un équipement d'utilisateur, et noeud d'accès wi-fi
CN104363990A (zh) * 2014-03-31 2015-02-18 华为终端有限公司 用户设备接入无线保真Wi-Fi的方法及Wi-Fi接入节点
JP2016533683A (ja) * 2014-03-31 2016-10-27 ▲華▼▲為▼終端有限公司Huawei Device Co., Ltd. ユーザーイクイップメントによりワイヤレス・フィディリティ(Wi−Fi)にアクセスする方法およびWi−Fiアクセスポイント
CN104363990B (zh) * 2014-03-31 2018-06-08 华为终端有限公司 用户设备接入无线保真Wi-Fi的方法及Wi-Fi接入节点
CN108811035A (zh) * 2014-03-31 2018-11-13 华为终端有限公司 用户设备接入无线保真Wi-Fi的方法及Wi-Fi接入节点
CN108811035B (zh) * 2014-03-31 2020-04-14 华为终端(深圳)有限公司 用户设备接入无线保真Wi-Fi的方法及Wi-Fi接入节点
US9693296B2 (en) 2014-07-17 2017-06-27 Xiaomi Inc. Network connection method and apparatus
US20210242929A1 (en) * 2015-12-30 2021-08-05 Futurewei Technologies, Inc. System and Method for Inter-Basic Service Set Communications
EP3531742A4 (fr) * 2016-10-24 2019-09-25 Sony Corporation Appareil de communication, et procédé de communication
US10849015B2 (en) 2016-10-24 2020-11-24 Sony Corporation Communication apparatus and communication method

Also Published As

Publication number Publication date
WO2008140325A3 (fr) 2009-03-12

Similar Documents

Publication Publication Date Title
US11166324B2 (en) Access point and method for instructing link resumption of a station in a power saving mode
US11172434B2 (en) Method and apparatus of scanning in wireless local area network system
US10356700B2 (en) Method and apparatus of scanning in wireless local area network system
US9847988B2 (en) Single-SSID and dual-SSID enhancements
EP2416617B1 (fr) Procédé et appareil pour connecter un réseau sans fil dans un dispositif numérique
KR100970827B1 (ko) 무선랜에서의 스캔 절차, 이를 지원하는 스테이션, 및 이를 위한 프레임 포맷
EP1589703B1 (fr) Système et procédé pour l'accès à un réseau sans fil
KR101092763B1 (ko) 무선 메쉬 네트워크에서의 피어 링크 설정 방법 및 이를 지원하는 무선 스테이션
US9071968B2 (en) Method, apparatus, and system for centralized 802.1X authentication in wireless local area network
WO2008140325A2 (fr) Procédés et dispositifs pour initier un transfert, découverte de points d'accès candidats et initiation d'authentification d'un terminal sans fil dans un réseau sans fil
US20050147073A1 (en) Method and apparatus for indicating service set identifiers to probe for
CN106105134A (zh) 改进的端到端数据保护
TWI744287B (zh) 無線廣域網路無線區域網路聚合保全
CN101785343B (zh) 用于快速转换资源协商的方法、系统和装置
JPWO2009034624A1 (ja) 無線端末装置、無線接続方法及びプログラム
KR101873391B1 (ko) Ap에 접속된 sta에 대한 재연관 시간 감소
US20070197190A1 (en) Access point and method for identifying communicable statuses for the same
JP2021040202A (ja) 無線中継装置、通信システム、および制御方法
CN116156493A (zh) 一种漫游方法及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08753827

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08753827

Country of ref document: EP

Kind code of ref document: A2